Business Utilities
Home Contact Us Support Downloads Buy Now Solution Knowledgebase  

Data leakage detection and protection software provide drive access permission to enable and disable USB storage media status

Facebook
Introduction
Preface
Overview of USB Data Theft Protection Utility
Why DRPU Software?
Need of USB Data Theft Protection Utility?

Software Installation Guide
System Requirements
Installation Instructions
How to Activate your Product Copy?
Uninstallation Instructions

Software Version Information
Version Details
Demo and Full Software Version

Describing the Software
USB Data Theft Protection Utility
Advance Software Features

Software Interface Description
Software Menu Bar
Software Tool Bar
Minimized Mode

Working with Software Modules
USB Activity Monitoring-Server Module
USB Activity Monitoring-Client Module

License and Ordering
How to Order the Product?
License Agreement

FAQ and Troubleshooting
General Queries
Technical Queries
Purchase Queries
Activation Queries

Getting Assistance
Online Help
Technical Support
Contact Information

Quick Reference
Glossary
Recommended websites
usb data leakage prevention tool
Working with Software Modules
 

USB Activity Monitoring-Server Module Continued...

Following are the access and permission settings assigned by the administrator to control USB device access on the client’s machine:

Drive Permission Status: Shows the entire status of changing access and permission settings.

  • Enable: If Enable, Client machine USB Storage device access is enabled.
  • Disable: If Disable, Client machine USB Storage device access is disabled.

General Information includes the following:

  • IP Address: IP Address of the Client machine that is detected.
  • Domain IP: IP Address of the Domain/Server.
  • Domain Name: Contains a name that identifies computers on network.
  • Computer Name: Name of the Client machine.
  • Server Name: Name of the Server to which all Clients are connected.

Access Settings: Makes the USB drive accessible or inaccessible on the client’s machine. These settings can be:

  • Enable: If enable, the client can access the USB device.
  • Disable: If disable, client cannot access the USB storage device.

Permission Settings: Includes the following settings for client machine:

  • Set to Read Only: If set, then the client will only have the permission of reading the USB device.
  • Set to Readable/Writable: If set, then client will be allowed to Read/Write, delete and modify the USB device.

Access Setting Activity Log

On clicking the Activity Log option the following window will open:

Access Setting Activity Log

Logged Activity: Logged activity includes the details of change in access and permission settings along with computer name, date and time details. The administrator will have two options in it:

Previous Next
 
 
Home | Contact Us | Support | Downloads | Sitemap | Terms and Conditions

© Copyright DRPU Software Pvt. Ltd.