Device groups


Device connected to your computer may pose a security risk..

The Device groups window is divided into two parts. The right part of the window contains a list of devices belonging to respective group and the left part of the window contains created groups. Select a group with a list of devices you want to display in the right pane.

When you open the Device groups window and select a group, you can add or remove devices from the list. Another way to add devices to the group is to import them from a file. Alternatively, you can click Populate button and all devices connected to your computer will be listed in the Detected devices window. Select a devices from the populated list to add it to the group by clicking OK.

Control elements

Add – You can add a group by entering its name, or a device to existing group (optionally, you can specify details such as vendor name, model and serial number) depending on which part of the window you clicked the button.

Edit – Lets you modify the name of selected group or device's parameters (vendor, model, serial number).

Delete – Deletes selected group or device depending on which part of the window you clicked on the button.

Import – Imports a list of devices from a text file. Importing devices from a text file requires correct formatting:

Each device starts at the new line.

Vendor, Model, and Serial must be present for each device and separated with a comma.


Here is an example of the text file content:

Kingston,DT 101 G2,001CCE0DGRFC0371

04081-0009432,USB2.0 HD WebCam,20090101

Export – Exports a list of devices to a file.

The Populate button provides an overview of all currently connected devices with information about device type, vendor, model and serial number (if available).

When you are done with customization click OK. Click Cancel if you want to leave the Device groups window without saving changes.


You can create different groups of devices for which different rules will be applied. You can also create only one group of devices for which the rule with action Read/Write or Read only will be applied. This ensures blocking unrecognized devices by Device control when connected to your computer.

Note that not all Actions (permissions) are available for all device types. If it is a device of storage type, all four Actions are available. For non-storage devices, there are only three Actions available (for example Read Only is not available for Bluetooth, therefore Bluetooth devices can only be allowed, blocked or warned).