USB Device Activity Reports, Alerts & Dashboards

AccessPatrol’s USB device activity reports and dashboards provide your organization with the USB activity monitoring and management capabilities it needs to protect sensitive data against the threat of USB flash drives and other peripheral storage devices.

CurrentWare icon- security

Stop Insider Data Theft

Track data transfers to USB devices to detect attempted data theft and negligence


Data Flow Management

Discover files that have been copied, created, deleted, or renamed through USB devices


USB Detection & Response

Receive alerts of data transfers and attempts to use unauthorized USB devices

Access Patrol

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s USB Device History Reports & Dashboards

USB File Tracing—Track Files Copied to Portable Storage

  • Track files that are copied, created, deleted, or renamed on portable storage devices within a given date range
  • Selectively choose which file operations to include in the report, such as tracking files copied to USB
  • Track USB file transfer history based on individual users and computers as evidence of who copied data

Top File Types Copied/Created

  • See what file types are commonly transferred to internal hard drives and external devices
  • Find out which groups and users/PCs use removable media device the most
  • Review the Activity Log for specific details on what files are being transferred and by who

USB History Reports and Dashboards

  • Track USB drive usage, previously connected storage devices, wireless devices, imaging devices, and other peripherals
  • Drill down into the USB drive usage history of specific users or computers
  • Retain USB drive usage history data with date and time, user/computer name, policy group name, device type, description, and allowed vs blocked status

Track Usage of Allowed vs Denied USB Drives

  • Collect evidence of users attempting to use unauthorized portable storage devices
  • Alert IT security teams to high-risk USB activities such as transferring sensitive data to a USB stick
  • Find out which groups require further USB security training
viking yachts

Case Study

Viking Yachts Protects Sensitive Information From a Departing Employee

“CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”

A departing employee was caught stealing classified files! If we didn’t have AccessPatrol we would never have known.

AccessPatrol’s USB Security Alerts & Automated Reports

AccessPatrol’s automated email reports and alerts provide your organization with the USB monitoring  tools it needs to protect data against insider threats.

Instantly notify designated people to high-risk activities and automate the distribution of data loss prevention reports for easy archiving and USB file operations monitoring.

  • USB Security Alerts: Send AccessPatrol’s USB security reports straight to your security team’s inbox when alerts are triggered

  • USB Data Loss Prevention: Customize thresholds to send email alerts based on suspicious USB connection history, file operations, or specific file types

  • Removable Media Control: Combine the USB security alerts with AccessPatrol’s other USB control features to enforce your removable media device policy and improve your USB data loss prevention capabilities

USB File Operations Alerts

Protect sensitive data against theft by alerting security personnel when suspicious file operations are performed on USB storage devices, cell phones, and cameras.

Configure file operations alerts based on file extensions (.exe, .zip, .msi, .xslx, .cad, etc) or file names to get alerted when these copied files are detected.

You can configure file operations alerts to trigger when:

  • Files are created on external storage devices
  • Files are transferred to external storage devices

  • Files are deleted from external storage devices

  • Files are saved as to external storage devices

  • Files are renamed on external storage devices

AccessPatrol USB Device Control Software Report - USB File Operations
Screenshot of AccessPatrol's USB activity email alerts setup window. Alerts are set for .exe, .zip, .cad, and .xlsx file transfers

USB File Transfers Alerts

Get alerts when specific file types and file names are transferred to removable storage devices.

You can configure USB file activity alerts to trigger when:

  • A user commits any sort of file operation

  • A user transfers specific file types
  • A user transfers files with pre-defined keywords in the file name

USB Device Usage Alerts

With the Email Alerts by Devices feature you can trigger real-time usb security alerts based on the peripheral device usage of your organization

You can configure USB connection history alerts to trigger when:

  • A Specific USB device is used
  • Any USB device is used
  • An unknown USB device is used
  • Any blocked or allowed USB device is used
AccessPatrol allowed vs denied USB device report with a list of storage devices listed
Access Patrol

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s USB Control Features

Block USB

Block USB

One click to block USB portable storage devices 

Block External Devices

Peripheral Control

Easily block DVDs, iPods, external hard drives and more

Device Permissions

Device Permissions

Set full access, read only or no access on storage devices

Allowed List

Allowed List

Allow specific trusted peripheral devices to be used


USB Activity Reports

Report on devices accessed or blocked on your network

Track File Transfers

Log USB File Transfer

Monitor files that are copied to USB storage devices

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Email Alert

Email Alerts

Get alerts of unauthorized file transfers and device use

Email Report

Email Reports

Schedule device reports directly to your administrator's inbox

Block Phones

Block Phones

Prevent users from connecting phones to company computers

Block Files

Block File Transfers

Prevent files from being transferred to portable storage


Stealth Mode

AccessPatrol can run silently in the background or alert users

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite Internet usage
policies to laptops running outside
the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server

Free removable media policy template from CurrentWare

Removable Media Policy

Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.

  • Set data security standards for portable storage
  • Define the acceptable use of removable media
  • Inform your users about their security responsibilities

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.