Trusted Extensions User's Guide

Exit Print View

Updated: July 2014
 
 

Peripheral Devices Are Protected

    In Trusted Extensions, administrators control access to local peripheral devices such as tape drives, CD-ROM drives, USB devices, printers, and microphones. Access can be granted on a user-by-user basis. The software restricts access to peripheral devices as follows:

  • By default, devices must be allocated for use.

  • You must be authorized to access devices that control removable media.

  • Remote users cannot use local devices such as microphones or CD-ROM drives. Only local users can allocate a device.