In order to protect the security of computer files, prevent the USB interface of the computer from randomly inserting USB storage devices such as USB flash drives and mobile hard disks to copy computer files. We need to disable the use of the U port of the computer and shield the use of the USB port; however, due to the current computer Non-USB storage devices such as USB mouse and keyboard are often used, so we should only disable USB storage devices when disabling the USB port, but not for non-USB storage devices such as USB mouse and keyboard and U-Shield. So, how to prohibit computer USB storage devices and prohibit U disk use?
I believe that USB storage devices can be disabled in two ways, without affecting the use of non-USB storage devices.
Method 1. Disable the U disk and group policy through the group policy of the operating system to disable the use of the USB storage device.
We take Win7 as an example, specifically how to disable the U disk:
1. Click Start, Run, enter the Group Policy command gpedit.msc, open the Group Policy Editor, find Local Group Policy Editor, select Computer Configuration---Administrative Template---System---Device Installation---Device installation limit item, you can set it on the right side: prohibit installation of mobile device, as shown in the figure:
2, by double-clicking the above prohibiting the installation of the removable device, and then the configuration option is enabled, you can prohibit the use of the U disk in win7.
The above is the method of prohibiting the use of U disk in Windows7 Ultimate. This method is mainly done by modifying the group policy. In addition, the USB storage device can be disabled through the registry. Use, no longer repeat.
Method 2: Disable the use of USB storage devices through a special computer USB flash drive disable software and USB disable tool software.
Although the USB storage device is blocked by Group Policy and the USB storage device is disabled through the registry, it is possible to prevent the computer from using the USB storage device. However, the use of Group Policy and the registry to prohibit the use of U disk requires a certain amount of computer operating system expertise, the settings are more complicated, especially through the registry to prohibit U disk use, shield USB port usage, if not set properly, it will be The security and stability of the operating system have a negative impact; at the same time, some technically savvy employees can re-enable the USB storage device and restore the use of the USB flash drive by modifying the group policy and the registry in reverse. Therefore, the above method of disabling the USB storage device is relatively fragile, and in this case, it can be implemented by software that specifically disables the USB interface.
For example, there is a "Big to USB port management software" (download address: http://www.grabsun.com/monitorusb.html), you only need to install it on your computer, you can automatically Disable all software with USB storage devices, such as USB flash drives, mobile hard drives, and mobile phones, without affecting non-USB storage devices (such as USB mouse and keyboard and dongle). At the same time, you can also completely disable the optical drive, floppy drive, Bluetooth, wireless network card, portable wifi, etc., to prevent the network from expanding properly. In addition, it is also possible to completely prohibit the sending of email attachments, prohibit the uploading of network disk files, prohibit the uploading of FTP files, prohibit the sending of files by QQ, prohibit the uploading of shared files by QQ, etc., and completely prevent the leakage through the network. As shown below:
Figure: computer U port disable software, USB disable tool
In short, whether through the operating system's registry, group policy to disable USB The storage device can also realize the management of the USB interface of the computer through the special computer USB port monitoring software and the computer U disk shielding software. It can disable the use of the USB storage device, but the software is disabled through the special computer U port. Simple and effective, but also more secure, and the operating system settings are easy to crack, there is a certain risk of vulnerability. What kind of measures are specifically adopted, enterprises and institutions can make choices according to their own needs.
Win7 Ultimate system computer installed office 2010 software, friends sent a document over, found th
How does the Win8 system delete the application store cache garbage? We all know that the Win8 syste
Solution: 1, 360 open browser, click on the & ldquo; extended & rdquo; & mdash; & ldquo; Addons & r
July 21 news, previously reported that Win10 free upgrade will face the end on July 29, when Win7, W
How does Win10 add this computer, network icon, recycle bin and other icons on the desktop?
Various magical effects of Win7 mouse wheel
After installing Win10 with U disk, you often need to select the boot media specific solution
Task Manager WIN10 open method
How to set automatic lock screen in win8? Win8 closes the two methods of automatic lock screen
Win7 system installed .net framework4.0 after the blue screen solution
The minimum hardware configuration required by the Win7 system
How to manage the boot project in Windows? Boot boot settings tutorial
The perfect solution to the system drive error under Win7 32-bit system
What is the difference between the Linux command rmdir and rm?
How to delete the theme of Chrome download
What is the process of TenioDL.exe? Can the TenioDL.exe process be disabled?
A simple way to modify the background color of the xp system login
Tip: Vista and XP dual system resource sharing
After installing Win8, "Starting Windows" and then stuck still
Upgrade Win10 RTM official version C disk is too small how to do?
Windows 7 is only Windows Vista SP2?
Devil's height: Windows7 new crack mechanism easily bypass, shield activation prompt