How does one prohibit copying files on the company's LAN or copying computer files on a USB flash drive?
In the process of enterprise LAN file transmission, the most common reason is to use a USB flash disk or a mobile hard disk to copy files, especially some large files. Now, the speed of copying files from usb storage devices is very fast, which further increases the risk of confidential file leakage. In general, we can disable the USB port to restrict storage devices such as USB flash drives or mobile hard disks. The common methods include:
1. Disable USB through Device Manager
Right-click my computer --> Manage, and choose Device Manager --> Universal Serial Bus Controller --> Two usb root hubs to disable these two items: General --> device Method --> disable
2. Disable USB in Registry
Start "run", enter regedit, and press Enter.
"HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ USBSTOR \ Start", 4, "REG_DWORD"
Change the key value start from 3 to 4.
3. BIOS plugging
Restart the system, press Delete to enter the BIOS, and disable USB. Because there are many BIOS types, you can leave it alone. The specific disabling method is not complex.
4. Super Rabbit
Download the latest version of Super Rabbit, choose --> Super Rabbit magic settings --> files and media --> USB flash drive --> disable the use of the USB flash drive storage function.
There are many ways to disable the USB port, so there are not many examples here. Each method has its own advantages and disadvantages. For example, USB mouse, USB keyboard, USB shield, USB printer data cable, USB audio, and other devices cannot be used after U port is disabled, after the U port is disabled, the user can easily restore the use of the USB port, or install some management software is also easy to uninstall, in short, it does not achieve the best management effect.
However, the demand for managing USB storage devices to connect to a company's computers at will and prohibit unauthorized copying of company computer files is urgent for every enterprise. At present, there are some related software products on the market, after a period of trial and experience, found a software called "license to USB control software", click the link to learn (http://grabsun.com/monitorusb.html ), this software is not bad and has very powerful functions, which can solve the troubles of enterprises in this aspect.
First, software installation and operation are very simple. It takes only five seconds to install the software. After installation, the software is automatically hidden. You can enter the software interface by entering the hotkey and password:
After the software is installed, the USB storage device is disabled by default. You do not need to modify any settings. Click "run in the background" to make it take effect. It is really easy! To the USB management software, only disable USB devices with storage functions, such as: Disable USB flash drives, disable mobile hard disks, disable SD cards, disable mobile phone memory cards, and so on, it does not affect the mouse, keyboard, printer and other non-USB storage devices. At this point, the software is designed to be very user-friendly.
In terms of security, this software is also very good, almost blocking all possible ways to uninstall or close the software ,:
In addition, the channel is not uninstalled In the Add/delete Programs list, and the user cannot close the software by ending the process. Only by knowing the password can the user enter the software interface for modification and other operations.
Although disabling a USB storage device can protect the security of confidential corporate files to some extent, some files still need to be copied through a USB flash disk in daily work. What should I do?
The USB control software also provides a function to allow a specified USB storage device to connect to a computer to copy a file, or to copy a file requires a password. This is really convenient. As long as the USB flash drive is inserted into the computer, the software will automatically identify the serial number and add it to the White List. The operation is very simple.
In addition to the above features, the software can also prohibit QQ files, prohibit online storage, prohibit email sending, prohibit installation of portable WIFI and other functions, to the maximum extent limit the transmission of files, this protects the security of confidential enterprise files. The software can also prohibit the running of some programs, and the program can be blocked by entering keywords in the disabled program.
In short, no matter which method, enterprises should find the most suitable management method based on their actual situation. Security awareness should be strengthened at all times, strive to eliminate all security risks in the early stage.