How to block usb port using usb monitoring software

20
Submitted By: DRPU Software Team support@MonitorUsb.com www.MonitorUsb.com Email: [email protected] Site: www.MonitorUsb.Com

Transcript of How to block usb port using usb monitoring software

Submitted By: DRPU Software [email protected]

www.MonitorUsb.com

Email: [email protected] Site: www.MonitorUsb.Com

1-What is Data Theft?

2-What is Usb Monitoring Software

3-Settings to block USB port for PC datasecurity

4-Features of Usb Monitoring Software

5-References

Email: [email protected] Site: www.MonitorUsb.Com

Data theft is now a growing concern amongbusiness as well as clients. This is mainlydone by an unauthorized user who cantransfer your sensitive data or information inany removable media device. In anorganization there are also chances thatcompany employees may also carrying yourdata out of the office on pen drives. If someintruder has access on your PC then he caninject viruses, worms and Trojans that willharm your system badly.

Email: [email protected] Site: www.MonitorUsb.Com

USB Blocker Software allows users to enableor disable access permissions of any USBdrive to prevent data theft on your computersystem. Data Leakage Protection Toolprovides option to enable camera settings tocapture photograph of an intruder during USBconnection/ removal activities. Usb datatheft protection program generates log filesof every performed activity on your system inhtml or text format and also uploads them onFTP server for future reference purposes.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

1-General Settings: Here users can adjust USB accesssettings, start-up settings, privacy settings, logsettings, log format, security settings as per theirneed.By using USB access settings, users can enable ordisable USB settings.In start-up settings, software runs in stealth modeIn privacy settings users can remove the programshortcut from desktop, remove program from“Add/Remove program options”, hide program folderand many more.In security settings users can make software accesspassword protected.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

2-Email settings: Users can send all generatedlog files on specific email address. Users cansend log file in standard or detailed format.There is also available option to send imagealong with log files. Set server details. Sendtest mail to check your settings and click onapply button.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

3-FTP Settings: Users can upload log files onFTP server for future reference purposes.There is also available option to upload imageon server. Now adjust FTP settings includingFTP server, Directory Path, User name andpassword. Click on Test Now button to checkyour settings and click on apply button.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

4-Camera Settings: By enabling camerasettings option, software capturesphotograph of intruder during USBconnection/removal activities. Users canselect camera from dropdown list.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

5-Export settings: Users can export currentsettings and import previously saved settings.This feature is beneficial if you are needed toinstall Network USB Monitoring Software inmultiple machines.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

6-Log file status: Generate log files of allactivities done by unauthorized person onyour system.

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com

Monitors all usb insertion/deletion activities on PC Create log files in html or text format of all activities

performed by a intruder on your system Upload log files on FTP server Automatically creates backup of all log files Option to enable/disable USB access permissions Email created log files on specific addresses Option to enable camera settings to capture

photograph of intruder during USB insertion/removal activities

Facility to export current settings and import previously saved settings

Completely runs in hidden mode Password protected utility to have access on software

Email: [email protected] Site: www.MonitorUsb.Com

Website – www.MonitorUSB.com

Email – [email protected]

Blogs-

https://usbdatasecurity.wordpress.com

http://usbdatatheftprotectionsoftware.pen.io

http://usbdrivemonitoring.blogspot.in

http://usbsecuritysoftware.unblog.fr

Email: [email protected] Site: www.MonitorUsb.Com

Email: [email protected] Site: www.MonitorUsb.Com