Port Protection

Port Protection protects the physical port when using peripheral devices.

Peripheral devices are for example, keyboards, screens, blue tooth, Printers, Smart Card, network adapters, mice and so on.

To create a new Port Protection rule:

  1. In the Data Protection policy, go to the right pane - Capabilities & Exclusions > Port Protection > Edit Policy.

    The Port Protection Settings window opens.

  2. Click New.

    The New Port Protection Rule window opens.

  3. Select a device from the drop-down menu or click New to create a new device (see Managing Devices for details on how to create a new device).

  4. Select the Access Type from the drop-down menu:

    Accept - Allow connecting the peripheral device.

    Block - Do not allow connecting the peripheral device.

  5. In the Log Type field, select the log settings:

    • Log - Create log entries when a peripheral device is connected to an endpoint computer (Action IDs 11 and 20).

    • None - Do not create log entries.

  6. Click Create.