Choose Which Devices to Allow with the Allowed List
To eliminate leakage of sensitive data and system infection, total blockage of all endpoint devices may be the ideal. However, specific users may need access to some devices to get their job done. For example the IT team would need CD/DVD access to install software, the marketing department may need USB flash access to store presentations etc.
With the Allowed List feature, you have the freedom to give specific users access to certain devices. Depending on the device type, permissions of read, write or no access can be assigned to the users.
To compile a list of company authorized devices, simply add the devices you wish to the allowed list. Users will have read/write privileges to those devices listed under the Allowed List.