This chapter describes how to protect computers from security risks using the Device Control feature.
Topics include:
Device Control
Permissions for Storage Devices
Permissions for Non-storage Devices
Managing Access to External Devices (Data Protection Activated)
Managing Access to External Devices (Data Protection Not Activated)
Modifying Device Control Notifications
Device Control Logs