USB Device Reports

AccessPatrol’s device reports provide your organization with the endpoint monitoring and management insights it needs to protect sensitive data against insider threats and investigate data breaches.

Collect evidence of data exfiltration, attempts to use unauthorized USB devices, and peripheral device usage.

Monitor file operations history for high-risk behavior and data mismanagement

Immediately send reports to administrators if any undesirable behavior is detected


File Operations Reports

AccessPatrol’s file operations reports are critical for alerting administrators to suspicious file transfers and investigating the cause of a data breach. Monitor employees and company endpoints to generate auditable data loss prevention reports.


All Devices Accessed

A detailed report of all whitelisted, blacklisted, and unassigned storage devices used in the workplace by each employee or workstation

This highly detailed device history report is ideal evidence for use in digital forensics investigations

Trace an employee’s entire USB device usage history across all of the organization’s endpoint devices

Allowed vs Denied Access History

A report that indicates each device inserted into a given endpoint and whether they were blocked or permitted by your AccessPatrol endpoint device policy settings

Allowed Devices History

Study usage patterns of approved peripherals to confirm employees are using them as expected

Collect records of each instance that an employee plugs a permitted USB device into their workstation

Study usage patterns of approved peripherals to confirm employees are using them as expected

Blocked Devices History

A report of all blacklisted devices with descriptions and time stamped entries

Collect evidence of employees attempting to connect unauthorized peripherals into company devices

The unauthorized devices will be blocked by AccessPatrol and the user/device interaction will be logged for further investigation.

Get Started with AccessPatrol Today

Control USB Device Access
Quick & Easy Setup


Other AccessPatrol Features


Block USB

Block USB

One click to block USB devices completely
Learn More
Block External Devices

Block External Devices

Easily block DVDs, iPods, external hard drives and more from being accessed on your computers
Learn More

Device Permissions

Set full access, read only or no access on storage devices
Learn More

Allowed List

Allow specific storage devices to be always allowed on your network
Learn More

Reports

Device Report

Report on devices accessed or blocked on your network
Learn More
Track File Transfers

Log USB File Transfer

Prevent data theft by monitoring files created and deleted on USB devices
Learn More
Deivce Access Code

Access Code Generator

Provide end users with temporary access to their devices
Learn More
Email Alert

Email Alerts

Alert administrators of unauthorized file transfers and devices access
Learn More

Email Reports

Email device reports directly to your administrator's inbox
Learn More

Block Phones

Prevent users from connecting their phones to company computers
Learn More
Block Files

Block File Extensions

Prevent users from transferring restricted file types to their devices
Learn More
Stealth

Stealth Mode

The CurrentWare client runs silently in the background and can be configured to alert users of device blocking policies

Centralized Console

Centralized Console

Manage all your users from the centralized console with Active Directory import or syncing
Remote Client Install

Remote Client Install

Easily deploy the CurrentWare Client remotely
Offsite Management

Offsite Management

Keep device access policies enforced even when laptops are outside the of network
SQL Supported

SQL Server Supported

Database scaled for enterprise and large business operations