Stay secure over the holidays with the ThreatLocker Lights-Out Checklist

Storage Control
enterprise-level data protection

Storage Control allows you to protect your data from unauthorized access or theft by setting granular policies over your storage devices.

What is Storage Control?

Storage Control provides policy-driven control over storage devices, whether the storage device is a local folder, a network share, or external storage such as a USB drive. ThreatLocker® Storage Control allows granular policies to be set, which could be as simple as blocking USB drives, or as detailed as blocking access to your backup share, except when accessed by your backup application.

Digital trail with Unified Audit

The Unified Audit provides a central log of all storage access by users on the network and those working remotely, down to the exact files that were copied and the device's serial number.

How does ThreatLocker® Storage Control work?

When a storage device is blocked, the user is presented with a pop-up where they can request access to the storage device. The administrator can then choose to permit the storage device in as little as 60 seconds.

Illustration of ThreatLocker Storage Control Request Access Notification

Storage Control features

Audit Access to All Your Files - White Icon

Audit access to all your files

A full detailed audit of all file access on USB, network, and local hard drives is centrally accessible within minutes of a file being opened.

Granular Application Policies - White Icon

Granular storage policies

These policies allow or deny access to storage based on user, time, applications, and more.

Deny By Default Simple Requests - White Icon

Simple requests for access

A pop-up with the option to request access to the storage device.

Simple USB Device Blocking - White Icon

Simple USB device blocking

USB policies allow access based on device serial number, vendor, and/ or file type.

Related posts

Frequently asked questions

Will "blocking USB" block peripherals or just storage devices?

This will only block storage devices that Windows recognizes as a USB.

Can we limit users from uploading certain files and apps in certain paths to web locations (domains)?

Although Storage Control cannot restrict access to specific domains, it can effectively prevent users from accessing sensitive data through known file-sharing applications. It also ensures that sensitive data is only accessible via approved applications that are incapable of sharing it.

What are the default policies/settings on Storage Control?

By default, Storage Control is configured to MONITOR data in certain local folders, on the DVD/CD interface, USB interface, UNC interface, and other external drives across all protected endpoints. Some policies are Ringfenced by default to prevent certain applications from accessing files in these monitored locations.

Can Storage Control be used to limit USB access without blocking keyboards, mice, etc.?

Yes. Storage Control only controls storage actions (read, write, move, delete) on the USB interface and not the power on the USB port itself.

Does Storage Control replace my DLP Application?

Not at the moment. At the same time, Storage Control provides many of the same capabilities. Speak with your Solutions Engineer or schedule a demo to see if Storage Control meets your needs.

Are Storage Control policies as granular as Application Control policies with a hierarchy and user/group options?

Yes. Storage Control policies can be configured to allow or block access based on things like Users/Groups, Device Serial Numbers, Applications, and even contain expiration dates.

More ThreatLocker® enterprise-level data protection solutions

Harness the Power of ThreatLocker Community

Community

See Solution
ThreatLocker Network Control logo

Network Control

See Solution
ThreatLocker Elevation Control Logo

Elevation Control

See Solution