Actions with trusted devices
Actions with trusted devices
September 5, 2024
ID 65742
You can perform the following actions while working with trusted devices:
- Add devices to the Trusted list based on the device model or ID.
- Add devices to the Trusted list based on the mask of the device ID.
- Add a device to the Trusted list in the local interface.
- Configure access of a user and/or user group to a trusted device.
- Remove a device from the list of trusted devices.
If you have added a device to the list of trusted devices and created an access rule for this type of device which blocks or restricts access, Kaspersky Security decides whether or not to grant access to the device based on its presence in the list of trusted devices. Presence in the list of trusted devices has a higher priority than an access rule.
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.