Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Using Device Control in Worry-Free Business Security Services (WFBS-SVC)

    • Updated:
    • 17 Oct 2016
    • Product/Version:
    • Worry-Free Business Security Services 5.7
    • Platform:
    • N/A N/A
Summary

Device Control is a new feature of WFBS-SVC that allows users to regulate access to connected USB devices.

This article shows you how configure Device Control, specifically on external storage devices.

Details
Public

To use the Device Control: 

  1. Log on to the WFBS-SVC console.
  2. Click Devices > Choose the group you want to configure.
  3. Choose Configure Policy.
  4. Under the Windows tab, choose Device Control
  5. Tick Enable device control to start using the feature.
    Tick Enable device control
  6. Tick Block the autorun function on USB storage devices to block the autorun function in external devices and provide autorun protection.
  7. Under the Permission dropdown menu, choose the desired permission level. 
    Choose the permission level.

    Refer to the table for the definition of permission levels.

    PermissionsFiles on the DeviceIncoming Files
    Full accessPermitted operations: Copy, Move, Open, Save, Delete, ExecutePermitted operations: Save, Move, Copy

    This means that a file can be saved, moved, and copied to the devices.
    ModifyPermitted operations: Copy, Move, Open, Save, Delete

    Permitted operations: Execute
    Prohibited operations: Save, Move, Copy
    Read and executePermitted operations: Copy, Open, Execute

    Prohibited: Save, Move, Delete
    Prohibited operations: Save, Move, Copy
    ReadPermitted operations: Copy, Open

    Prohibited operations: Save, Move, Delete, Execute
    Prohibited operations: Save, Move, Copy
    List device content onlyProhibited operations: All operations

    The device and the files it contains are visible to the user (for example: Windows Explorer).
    Prohibited operations: Save, Move, Copy
  8. Configure the exception list. This is only applicable if the device permission is not "Full Access".

    Configure the exception list

Premium
Internal
Rating:
Category:
Configure
Solution Id:
1095518
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.