Enable USB Protect for policies

The USB Protect feature in Xprotect is an additional layer of security for hosts that have already been enforced with Application Control and/or File Protect policies. The USB Protect feature is available as an additional Policy setting (on the Policies > Policy Settings > General page) for the Host policy you enforced on a host of hosts.

USB Protect for a Host policy can be set to block all access to USB devices through the USB ports on the hosts or to selectively allow Read, and Write, Execute, or Delete access to USB devices.

USB Protect can be enforced on hosts of all Xprotect-supported Windows and Linux OSes. See Supported OSes for the list of Xprotect-supported OSes.


USB Protect Controls

You can use the following controls to control USB access on the group of hosts (policy) for which you enable the USB Protect feature.

  • Block All Access - block all types of access to USB devices.

  • Read - the host reads the USB device and displays the files saved on the device. You can open the files, but you cannot copy them to the host. Also, you cannot copy files to the USB device.

  • Write - in addition to Read access, you can copy files from or to the USB device.

  • Execute - in addition to Read access, you can execute programs and utilities saved on the USB device.

  • Delete - in addition to Read access, you can delete the files on the USB device.

The actual time when the USB Protect is enforced or disabled on the hosts depends on when the last operation was performed on the hosts, and the duration you specify for the Agent Fetches Command Every option (on the Policies > Policy Settings > Advanced page) for the policy on the host.


Expected behavior

The USB Protect feature in Xprotect is designed to regulate access to USB devices connected through the Mass Storage Class (MSC) or Picture Transfer Protocol (PTP) connection modes/protocols. USB Protect does not prevent access to devices connected to hosts by using the Media Transfer Protocol (MTP) or similar protocols. So, you will see that mobile phones connected to hosts can transfer data to and from the hosts and execute utilities on the hosts without any restrictions.


When to use USB Protect

Enable USB Protect for a policy and consequently the hosts that use the policy when you want to:

  • Completely lock down USB access to mission-critical and supporting workloads, Point of Sale (PoS) systems, and end user hosts. For example, use Block All Access.

  • Enforce restricted access to USB devices on hosts that must occasionally use USB devices. For example, enable only Execute permissions to allow running utilities on hosts, or only Read permissions to allow users to open documents and media files. 

  • Enable data backup activities from on to hosts by using only Write permissions

  • Enable USB device cleanup activities by enforcing only Delete permissions


Enable USB Protect

When you enable USB Protect for a policy, all the hosts on which the policy is enforced using the USB Protect settings.

The actual time when the USB Protect feature is enforced or disabled on the hosts depends on when the last operation was performed on the hosts, and the duration you specify for the Agent Fetches Command Every option (on the Policies > Policy Settings > Advanced page). 

  1. Go to Policies.

  2. Click the 3-dot menu of a policy and click View and Edit Policy.

  3. Click Policy Settings (located at the top-right corner)

  4. In the General tab, set USB Protect to Active (turns Green) and select the required controls.

    See Controls for the type of controls you can enforce with USB Protect.

  5. Click Save.

Alternatively, you can enable USB Protect for a policy when you create and push the policy to a group of hosts.


Alerts

Currently, alerts are not generated when USB devices violate the USB Protect settings on a host.


Disable USB Protect

Disable USB Protect policies when you want to allow unrestricted access to USB devices to a group of hosts. Remember that all hosts in the group will have unrestricted access to USB devices.

  • To disable the USB Protect feature, go to the General Policy settings of the policy (on the Policies page) and set USB Protect to Paused (turns Grey).


Verify USB Protect status

Currently, Audit logs are not generated when you enforce or disable USB Protect. You must verify the status of this feature directly on the hosts. For example, if you set USB Protect to Read-only access to USB devices, users must not be able to execute utilities from USB devices.

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.