Device Control Plus

Device Control Plus centralises control and visibility over USB and peripheral access.

Central control and auditing of removable media and peripherals on endpoints

Many IT teams need a straightforward way to limit what can be connected to endpoints. USB sticks, external drives and other peripherals are frequent sources of accidental data loss, deliberate exfiltration and malware introduction, and tracking transfers across a large Windows fleet is time-consuming without central tooling.

Device Control Plus centralises policy enforcement and audit logging for removable media and ports. It lets teams define allow, block or restricted rules, capture transfer activity and produce searchable logs to support investigations and compliance reporting.

Where Device Control Plus is used

Apply per-user or per-group policies to block unauthorised USB storage while permitting approved devices for specific staff.

Record file transfers from removable media and produce searchable logs for security investigations or audit requests.

Suitable environments

Best suited to mid-market and enterprise organisations with large Windows endpoint fleets and centralised IT teams. It fits regulated sectors or environments with heavy removable-media use where device access control and auditability are required.

Features

Granular USB control

Restricts or permits USB device access based on user, department, or device type.

Read-only mode

Allows data access from USB devices while preventing data write or transfer, ensuring data protection.

File access auditing

Tracks and logs all file operations on portable storage devices for visibility and compliance.

Temporary access permissions

Grants time-bound device access for specific users or scenarios.

Trusted device management

Whitelists authorised devices to ensure only approved hardware can connect.

Real-time alerts and notifications

Instantly notifies admins of unauthorised device connections or suspicious activity.

Comprehensive reports

Generates detailed reports on device usage, violations, and policy enforcement.

Offline device control

Enforces policies even when endpoints are not connected to the corporate network.

Screenshots