Managing Bluetooth Devices

Managing Bluetooth Devices

As of v7.0.0 you have more control over Bluetooth devices through AccessPatrols Device Restrictions. You have more granularity to be able to decide on more indepth blocking ability as Bluetooth can encompass a large range of device types.

Here you can see you now have 3 options for Bluetooth control.

  1. Full Access – Allows access to all Bluetooth devices on the client PC.
  2. Allow Audio Only – This will only allow you to connect devices for audio only. Some examples would be Bluetooth headsets, or earphones. Microphones will not work. You cannot do any bluetooth file transferring.
  3. No Access – Fully blocks access to all Bluetooth devices

    • Related Articles

    • Block unauthorized Human Interface Devices

      What does this do? Allows specific Human Interface Devices (HID), such as company-authorized keyboards and mice, and blocks all other keyboards and mice. This allows control of keyboards and other input devices that may pose a security risk. What ...
    • Which devices can I control with AccessPatrol?

      AccessPatrol allows you to control the following external devices on your users computers. Device Class Devices Access Permissions Storage Devices USB Full / Read only / No access DVD /CD Full / Read only / No access Floppy Full / Read only / No ...
    • Managing Remote Client Computers outside your network

      CurrentWare allows you to manage remote client computers outside your company’s network! First, refer to this article on managing remote workers working from home or outside our network to learn more about which method you should use. If you are ...
    • How do I whitelist external devices?

      Administrators can utilize AccessPatrol’s Device Allowed List to specify which devices your end users can have access to. By adding a device to the Allowed List, any authorized users on the network will be able to access it even if the device’s ...
    • Can I block devices at specific times?

      Device Scheduler The device scheduler allows the administrator to assign when the device permissions will be enforced by assigning the start time and stop time for particular devices on the network. Only storage devices are available for the device ...