AccessPatrol's USB Activity Dashboards - USB Device Forensics | CurrentWare
Ready to protect your sensitive data against theft to USB portable storage devices? Block and monitor peripheral device usage today with a free trial of AccessPatrol, CurrentWare’s USB control software.
⬇️ Instantly Try a FREE Trial ⬇️
With AccessPatrol’s USB activity dashboards, you can…
➡️ Audit USB device usage for indicators of insider threat risks
➡️ Get an instant overview of USB file operations and device activities
➡️ Discover peaks in device usage and attempts to use blocked devices
Similar to the ones in BrowseReporter, these dashboards provide a convenient overview of your entire workforce or specific groups/users—all from the convenience of a web browser.
They work in tandem with AccessPatrol’s USB device usage alerts and reports to help IT security teams enforce removable media policies and detect insider threats.
What USB Activities You Can Audit in AccessPatrol 7.0:
👉 Names & types of files that are transferred to USB storage devices
👉 Names of the groups, users, and computers associated with each USB activity
👉 USB devices outside of normal operating hours
👉 Attempts to use unauthorized USB devices👉 # of USB file operations (Copied/Created, Deleted, Rename/Saved As)
👉 The most commonly transferred file types & device types
Each dashboard comes with its own Activity Log with a raw feed of the data used to populate the dashboards. These USB activity logs can be sorted, searched, or exported to Excel/PDF.
The data used to populate the dashboards can be limited to a given time period, computer groups, computers, user groups, or specific users to provide the exact details you need to investigate.
- 00:00 Intro & AccessPatrol Overview
- 01:39 Dashboards Overview
- 03:48 Insider Threat Sample Investigation
- 05:19 Get Your Free Trial
- DETAILED ACCESSPATROL 7.0 DASHBOARDS BREAKDOWN**
File operations: Total # of file operations, with breakdowns of the # of copied/created, Deleted, & Other (renamed/saved as) file operations
# of Blocked vs Allowed peripheral devices
Top 5 File Types Copied/Created & Deleted on portable storage devices
Top 5 most active users/computers/groups based on file events & device events
A stacked bar chart with a timeline of USB file activities for each day in the chosen time period.
Top 5 file types copied/created to internal hard drives
Top 5 file types copied/created to external devices
Top 5 most active users/computers/groups based on files copied/created & deleted
A stacked bar chart with a timeline of the # of allowed vs blocked peripheral devices for each day in the chosen time period.
Top 5 users with the most attempts to use blocked devices
Top 5 users that used the most authorized devices
- MORE ABOUT ACCESSPATROL**
- AccessPatrol is a data loss prevention and USB control software for auditing and controlling the use of portable storage devices. CurrentWare customers use AccessPatrol to mitigate the risk of insider data theft and enforce their removable media policies.
With AccessPatrol you can block portable storage devices, allow trusted devices, monitor USB activities, and restrict the types of files that can be transferred to portable storage devices.
AccessPatrol Product Page
Case Study: AccessPatrol Stops Data Theft From a Departing Employee
Check Out Our Great Reviews on Capterra!
AccessPatrol USB Device Control Software Overview
How to Keep Data Safe When Offboarding Employees - Data Theft Prevention Tips
#datalossprevention #usbcontrol #insiderthreat #datatheftprevention #usbforensics