Actions with trusted devices

January 10, 2024

ID 65742

You can perform the following actions while working with trusted devices:

If you have added a device to the list of trusted devices and created an access rule for this type of device which blocks or restricts access, Kaspersky Security decides whether or not to grant access to the device based on its presence in the list of trusted devices. Presence in the list of trusted devices has a higher priority than an access rule.

In this section:

Adding devices to the Trusted list based on the device model or ID

Adding devices to the Trusted list based on the mask of the device ID

Adding devices to the list of trusted devices in a local interface

Configuring user access to a trusted device

Removing a device from the list of trusted devices

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.