Block USB File Transfers by File Type

With the AccessPatrol USB blocker you can block file extensions from being transferred to USB devices. Prevent data exfiltration by stopping users from transferring unauthorized files. Protect sensitive data such as Microsoft Access database files, spreadsheets and executable files.

Protect sensitive business data by blocking high-risk file extensions

Restrict file transfers to external storage devices

Manage custom file blocking policies for each department and endpoint device


Even authorized USB devices used by trusted employees can potentially be misused. AccessPatrol’s Block File Extensions feature provides an added layer of security to proactively prevent employees from transferring high-risk file types.

All of CurrentWare’s products continue to enforce policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.

Why use a USB blocker?

As part of a multi-layered data loss prevention strategy you will need access control measures to protect against USB storage devices. AccessPatrol provides the critical security controls you need to prevent employees, guests, and contractors from stealing sensitive data such as personally identifiable information (PII), trade secrets, and financial records.

USB Security: Enforce the exclusive use of authorized USB devices. Combine AccessPatrol’s software-based policies with existing administrative safeguards to prevent employees from using personal USB devices.

Prevent Data Breaches: Flash drives are portable and easy to hide. AccessPatrol’s technical safeguards stop insider threats from transferring sensitive data to all forms of removable media.

Endpoint Security: USB devices can unknowingly infect company computers with ransomware and other malicious software. AccessPatrol protects these endpoints against rogue USB devices by proactively preventing the transmission of data.

Combine this feature with AccessPatrol’s full suite of external device policy management features for full control over how removable media and other peripherals are used in your organization.

Get Started with AccessPatrol Today

Control USB Device Access
Quick & Easy Setup


AccessPatrol’s Endpoint Security Features


Block USB

Block USB

One click to block USB devices completely
Learn More
Block External Devices

Block External Devices

Easily block DVDs, iPods, external hard drives and more from being accessed on your computers
Learn More

Device Permissions

Set full access, read only or no access on storage devices
Learn More

Allowed List

Allow specific storage devices to be always allowed on your network
Learn More

Reports

Device Report

Report on devices accessed or blocked on your network
Learn More
Track File Transfers

Log USB File Transfer

Prevent data theft by monitoring files created and deleted on USB devices
Learn More
Deivce Access Code

Access Code Generator

Provide end users with temporary access to their devices
Learn More
Email Alert

Email Alerts

Alert administrators of unauthorized file transfers and devices access
Learn More

Email Reports

Email device reports directly to your administrator's inbox
Learn More

Block Phones

Prevent users from connecting their phones to company computers
Learn More
Block Files

Block File Extensions

Prevent users from transferring restricted file types to their devices
Learn More
Stealth

Stealth Mode

The CurrentWare client runs silently in the background and can be configured to alert users of device blocking policies

Centralized Console

Centralized Console

Manage all your users from the centralized console with Active Directory import or syncing
Remote Client Install

Remote Client Install

Deploy the client agent remotely to start enforcing endpoint security policies right away
Offsite Management

Offsite Management

Enforce endpoint security policies for laptops operating offline or outside of the network
SQL Supported

SQL Server Supported

Database scaled for enterprise and large business operations