Themes
- Advanced Configuration
- Advanced Monitoring and Alerting
- Antivirus
- App Delivery & Patching
- Application & Service Catalog
- Application Control
- Apps, Browsers, & Java Security
- Auditing Devices & Drives
- Change Auditing
- Cloud Detection and Response for M365
- Cloud Detection and Response for Public Cloud
- Data Classification
- Data Detection
- Data Filtering
- Data Tagging
- Desktop Automation & Connectivity
- Device Control
- Encryption of Full Disks
- Encryption of Removable Media
- GPO Compliance
- GPO Reductions & Transitions
- Hardware and Software Inventory for Windows
- Identity Threat Detection and Response (IDR) for Azure AD
- Inbound Email Security
- Integration Services
- Layer 2 Visualization
- Least Privilege Management
- Managed Detection and Response (MDR)
- Monitoring Logs, Servers, Virtualization and Applications
- Monitoring Platform
- Network Detection and Response (NDR)
- Network Profiles
- Outbound Email Security
- Password Manager
- Password Policy Enforcer
- Port Control
- Privileged Account Management
- Shadowing
- SNMP & Core Monitoring
- Traffic Flow Analyzer
- Windows 10 & 11 Management
Auditing Devices & Drives
DriveLock
Port, device, drive & application control, encryption of media and full disks, and more
What can it do for you?
DriveLock logs operations with peripheral devices, for example data transfer, read and write operations to and from removable storage media. Reports can be generated from log events.
This product covers also the following themes: Data FilteringDevice ControlPort ControlEncryption of Full DisksApplication ControlEncryption of Removable MediaNetwork ProfilesShadowing Features:-
Event suppression for double events.
-
Cached events are stored in a file.
-
Advanced features including log configuration changes (including change details), use of management console, a temporary release of DriveLock agent, agent using remote control, encryption events, or launch an application blocking, network configuration changes.
-
Additional analysis capabilities of these events are possible by using the Security Reporting Center.