USB Device Reports
AccessPatrol’s device reports provide your organization with the endpoint monitoring and management insights it needs to protect sensitive data against insider threats and investigate data breaches.
Collect evidence of data exfiltration, attempts to use unauthorized USB devices, and peripheral device usage.
Monitor file operations history on USB devices, cell phones, and cameras for high-risk behavior and data mismanagement.
Immediately send reports to administrators if any undesirable behavior is detected.
File Operations Reports
AccessPatrol’s file operations reports are critical for alerting administrators to suspicious file transfers and investigating the cause of a data breach. Monitor employees and company endpoints to generate auditable data loss prevention reports.
Insider Threats
Monitor the flow of data to and from USB storage devices and identify the user responsible for the transfer.
Data Flow Management
Discover files that have been copied, created, deleted, or renamed through USB devices.
Detection & Response
Receive alerts of large data transfers, employees interacting with sensitive data, and attempts to use unauthorized USB devices
All Devices Accessed
A detailed report of all whitelisted, blacklisted, and unassigned storage devices used in the workplace by each employee or workstation
This highly detailed device history report is ideal evidence for use in digital forensics investigations
Trace an employee’s entire USB device usage history across all of the organization’s endpoint devices
Allowed Devices History
Study usage patterns of approved peripherals to confirm employees are using them as expected
Collect records of each instance that an employee plugs a permitted USB device into their workstation
Study usage patterns of approved peripherals to confirm employees are using them as expected
Blocked Devices History
A report of all blacklisted devices with descriptions and time stamped entries
Collect evidence of employees attempting to connect unauthorized peripherals into company devices
The unauthorized devices will be blocked by AccessPatrol and the user/device interaction will be logged for further investigation.
AccessPatrol’s Endpoint Security Features

Block External Devices
Device Permissions
Allowed List

Device Report

Log USB File Transfer

Access Code Generator
