How do I Set Read-only Permissions for Devices?

How do I Set Read-only Permissions for Devices?

AccessPatrol allows the administrator to control the device access privileges for a group of clients or an individual computer.

Read Only: The computer with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.

Here is a list of devices that are supported by AccessPatrol’s read-only permission:

Storage Devices:

  • USB (Removable disk, iPod)
  • CD/DVD
  • Floppy
  • Tape
  • External Hard Drive
  • FireWire
  • SD Card
  • MM Card

    • Related Articles

    • Can I block devices at specific times?

      Device Scheduler The device scheduler allows the administrator to assign when the device permissions will be enforced by assigning the start time and stop time for particular devices on the network. Only storage devices are available for the device ...
    • Which devices can I control with AccessPatrol?

      AccessPatrol allows you to control the following external devices on your users computers. Device Class Devices Access Permissions Storage Devices USB Full / Read only / No access DVD /CD Full / Read only / No access Floppy Full / Read only / No ...
    • Assign Operator Permissions

      If you create secondary users to access your password-protected CurrentWare console, you can configure their user profiles to restrict privileges on the CurrentWare console. For instructions on how to create users and password protect your ...
    • Set different device restrictions for different users

      AccessPatrol allows you to set different device policies to different groups of computers or users. The management console allows you to create group folders to set separate policies amongst different computers or users. Creating new folders to place ...
    • Block unauthorized Human Interface Devices

      What does this do? Allows specific Human Interface Devices (HID), such as company-authorized keyboards and mice, and blocks all other keyboards and mice. This allows control of keyboards and other input devices that may pose a security risk. What ...