On the Endpoint Protection > Device Control pages you can control devices attached to computers monitored by endpoint protection. Basically, in a device policy, you define which types of devices are allowed or blocked for the computer groups the policy is assigned to. As soon as a device is detected, the endpoint protection checks if it is allowed according to the device policy applied to the computer group of the respective computer. If it is blocked or restricted due to the device policy it will be displayed on the Exceptions tab, where you can add an exception for the device.
|© 2019 Sophos Limited
|Sophos UTM 9.600