USB Device Control - Device Control, Firewall Management, and ZTA - Endpoint Security - Documentation - Support and Resources - Falcon
USB Device Control - Device Control, Firewall Management, and ZTA - Endpoint Security - Documentation - Support and Resources - Falcon
Overview
With Device Control, you can create USB device policies to gain visibility into and control over USB devices in your environment.
Configure USB device policies to control which USB devices can connect to your Windows hosts.
Review Device Control dashboards to see USB device connections, USB device policy violations, and actions taken automatically by your policies.
Customize the notification that a user sees when a USB device is blocked or given restricted access.
Device Control is an add-on module for Falcon Insight XDR, Falcon Prevent, or Falcon Pro subscriptions.
Requirements
Subscription: Device Control (a Falcon Insight XDR or Falcon Prevent add-on)
Sensor support:
Reboot requirements:
Windows: Hosts must be rebooted after initially enabling USB Device Control for Falcon to collect USB events
Roles:
Falcon Administrator
Falcon Analyst
Apply policies to all devices and hosts and set up exceptions to allow select devices on select hosts.
Grant individual device permissions that range from fully blocking devices to allowing complete functionality.
Configure policies to monitor when you only want to collect data, configure them to enforce when you’re ready for them to take action.
Customize the notification that a user sees when a USB device is blocked or given restricted access.
After you’ve configured your USB device policies and assigned them to hosts, you can monitor USB device connections in the Falcon console. Each time a USB
device attempts to connect to a host, the Falcon sensor logs an event that contains information about the connection attempt:
USB device info: its serial number, device class, vendor description, and more
Policy info: action taken in response to the connection attempt (allowed or blocked), the criteria used to match the USB device to a policy setting
Review USB device connection activity and events to understand how USB devices are used in your organization and fine-tune your USB device policy settings
and exceptions over time to meet your organization’s specific needs.
Limitations (Windows)
Device Control might not function as expected in the following situations.
For Virtual Machines (VM)s such as Citrix and VMWare, global allowlisting is not supported, and as a result incompatible devices should not be used.
Known VID/PID for incompatible devices include (but are not necessarily limited to):
0xC1CA / 0x0004 –
Using Device Control and Dell Data Protect DDPE can cause errors, including BSODs for the host and is not recommended.
For Virtual Desktop Infrastructures (VDIs) such as Citrix Virtual Apps and Desktop and VMware Horizon, compatibility issues can cause errors, including
BSODs for the client/host, we don't recommend using Device Control in virtualized environments.
USB forwarding technologies such as RemoteFx, RDP: To block devices, you must apply USB device policies on the server, not the client.
Custom/third party USB device stacks or UAS storage drivers such as ASUS USB 3.0 Boost:
USB devices initialized on third party USB stacks aren't blocked by Device Control.On Windows 7 hosts, Device Control can't block USB 3.0
drives.Device Control doesn’t work correctly when DLP applications are active.DLP Applications such as Digital Guardian will cause Device Control
to not function as expected.
On Windows 7 hosts, Device Control can't block USB 3.0 drives.
Device Control doesn’t work correctly when DLP applications are active.
DLP Applications such as Digital Guardian will cause Device Control to not function as expected,
Setup
Out of the box, all host groups are assigned to the Default Policy, which is initially configured to allow all USB device connections. Create, configure, and assign a
collection of USB device policies to your hosts to block and allow device connections.
Assign the Device Control Manager role to additional Falcon users who need to be able to create and configure USB device policies.
Understand the risk of potentially blocking all USB device connections. Falcon USB Device Control grants you flexibility and control to create and
configure policies. Be aware that this includes the ability to create and assign policies that could block essential USB device connections. Configuring the
Default Policy to Monitor only or Off is a helpful safeguard. This ensures that the catch-all policy for hosts that are not specifically added to any other USB
device policies won’t have any blocking actions taken on them.
Determine whether the default notification message for a blocked or access restricted device is appropriate for your organization. Write custom
notification messages per policy, as necessary.
Going live
The process of going live depends on how you did your testing.
If you limit your testing to a test group of hosts, you’ll need to add the rest of your host groups to your USB device policies as needed.
If you perform your testing by configuring your USB device policies to Monitor only and observing the device connections, going live will involve updating some of
your policies to Monitor and enforce as needed.
At the policy level, USB Device policies have these policy mode options:
Monitor and enforce: Takes action on USB devices based on your policy settings: blocking or allowing the USB device connection and displaying default or
custom notification messages.
Monitor only: Records the USB device connection and the action defined by your policy setting, but doesn’t enforce restrictions on assigned hosts. This
mode is intended to help you test your policy behavior without disrupting users in your environment.
Off (macOS only): Has no USB device visibility, so doesn’t track violations or enforce restrictions.
Later, you can create more specific exceptions [/documentation/page/a0f90068/usb-device-control#rea3b5f9] to the broad rules defined by a policy.
Monitor
2. Click any USB device class to configure policy settings for that class:
Printer (Printers)
When a device does not belong to any of the device classes listed above, the device goes into the Any class class. By default, devices in
this class have Full access permissions and are allowed to function. To control the permissions level for such a device, add an exception
to the Any class class for the device. See Set Exceptions to Your Policy [/documentation/page/a0f90068/usb-device-control#rea3b5f9].
Full access (or Read, write and execute, for the Mass Storage class)
Full block
Read and write only (applies only to the Mass Storage class)
7. Click Save.
product ID (PID)
serial number
For example, you might create a policy that blocks all USB mass storage devices, then create exceptions for the specific USB devices that are issued and approved
by your organization.
It's possible to set a class's exception permissions to the same behavior as the class's permissions. If the class's permissions are changed in the future, the
exception's permissions remain the same.
Temporary exceptions expire at a scheduled end date and time and are then automatically deleted from the policy. Temporary exceptions are scheduled in UTC
time. The date and time set is when the channel file update is sent to the sensor to remove the exception. Depending on your policy update settings, it might take
some time before an expired exception is no longer in effect.
Note: When viewing policy exceptions, the End time column that shows a temporary exception’s expiration date and time is not visible in the table by
default. You can enable the column header from the Toggle table column menu in the upper-right corner of the table.
Use wildcards to include multiple USB devices
If your serial numbers follow a predictable pattern, you can use a wildcard value to add multiple devices to a policy exception and reduce the total number of
exceptions you’ll need to create. To enable the use of glob wildcards and match patterns in text strings, select the Manual Entry option.
Note: There is a limit of 15,000 exceptions per policy. We recommend reducing your exception count by using wildcard serial numbers whenever
possible.
Alternatively, you can streamline the process of adding multiple individual exceptions at once by selecting Let me add multiple exceptions without leaving this
page. This causes the Manual Entry option to clear the Serial number field but keeps all other information.
You can create exceptions at the class level or an individual event level:
Class level
1. Go to Endpoint security > USB device control > Policies > Settings.
2. Click to select a USB device class that you’d like to add the exception to.
2. Select a USB device class, or select Any class, to view the exceptions in that class.
Choose whether to create the exception using a USB device's Combined ID or Manual Entry, and then follow the corresponding steps.
Combined ID
2. Copy the combined ID value of the USB device you want to add an exception for.
3. Go to Endpoint security > USB device control > Policies and select the policy to add an exception to.
4. Click Add exception and paste the combined ID value in the Combined ID field.
8. Optional. Select Make temporary exception and enter a future end date and time.
Tip: The default format for Vendor ID or Product ID is decimal (0 to 65535). If you enter a hexadecimal value beginning with 0x (0x0 to 0xFFFF), the
Falcon console automatically converts it to decimal format.
1. Go to Endpoint security > USB device control > Policies and select the policy to add an exception to.
5. Optional. To allow the use of wildcards in serial numbers, select Allow wildcards.
Note: This feature is available for macOS and Windows sensor 6.56 and later.
6. Enter a Serial Number or, use a wildcard value using glob syntax to include a block of serial numbers. Accepted glob syntax include *, ?, and []. To escape a
wildcard character, add square brackets around the character you’d like to escape, for example [*]. For more info, see
Glob Syntax [/documentation/page/e2e4b1b4/glob-syntax].
7. Optional. Enter a sample serial number value in the Serial Number for Glob Pattern Test field and click Test to confirm that the wildcard works as
expected.
Exceptions are applied according to the following precedence from highest to lowest:
4. Vendor ID only
Note: When you use Manual Entry, exceptions that include more information automatically override exceptions that contain less information.
4. Click Save.
Windows
USB device policies take effect when a USB device is connected to a host. If a host has USB devices connected when you assign a policy, those devices aren't
affected until the next time they're reconnected or the next time the host reboots.
macOS
USB device policies take effect when a USB device is connected to a host. If a host has USB devices connected when you assign a policy, the policy will take effect
immediately, meaning that if the policy blocks that USB device, it will be disconnected.
3. On the Policy Details page, click to select Enable policy or Disable policy.
Default configuration
Windows:
macOS:
Each host can belong to one or more host groups. Host groups can be assigned one or more policies. With dynamic groups, a newly-installed sensor inherits the
relevant groups and applies the policy with highest precedence to the host. This provides the host with its initial policy settings.
If a host is not a part of any groups, or its groups have no policies assigned, it is automatically assigned to the default policy.
Policy precedence determines which policy's settings are applied to a host when the host is a member of more than one policy. Define policies with different
precedences to resolve conflicts. Then, when faced with a conflict, the cloud will automatically apply the policy with the higher precedence (1 being higher than 2,
which is higher than 3, and so on).
On a host, the policy with the highest ranking precedence (1 being highest) is applied and active. If something changes with that highest-ranking policy, for
example if it gets disabled, then the next highest-ranking policy gets applied and becomes active.
3. To reorder the policies, use the arrows in the precedence column to drag a policy up or down.
4. Click Save.
Note: This Device Control dashboard only shows instances of USB devices connecting to hosts. It doesn’t track other user or system actions, such as
file transfers.
Here you can see all instances of USB devices connecting to your hosts, including details about:
The USB device, such as its device name, vendor name, and IDs
The specific host it attempted to connect to, including whether the connection was allowed or blocked
The USB device policy that defined whether the connection was allowed or blocked - and you can create policy exceptions here without returning to
Endpoint security > USB device control > Policies
Filter USB device events
By default, Endpoint security > USB device control > USB device usage shows all instances of USB devices connecting to your hosts. You can filter these events
with the filter bar at the top.
Enforce: view events associated with policies set to Monitor and Enforce mode
Policy mode
Monitor only: view events associated with policies set to Monitor only mode
A value of N/A indicates that the USB device was allowed to connect (the Full access permission).
View events that resulted in a selected action, based on the Permission setting in your USB device policy. Read only and Read and write
Permissions
only appear only for devices with the mass storage USB device class.
Device class The USB device class of the device. This is set by the device manufacturer.
Vendor name The manufacturer of the USB device. This is set by the device manufacturer.
Product
The product name for the device. This is set by the device manufacturer.
name
Event time The time the USB device attempted to connect. This time is recorded in UTC but displayed according to your user profile’s time setting.
You'll also use this information when you create exceptions in USB device policies. When creating exceptions, you identify USB devices by their vendor IDs (VIDs),
product IDs (PIDs), and serial numbers. We recommend using the USB device dashboards to get accurate information, but you can also use another source of USB
devices' VIDs, PIDs, and serial numbers.
You can narrow your search by entering a serial number, vendor name, device class, product name, or company. Depending on the size of your environment,
changing the Time Range can result in a search that takes some time to complete.
Device Blocks
The Device Blocks dashboard shows instances of USB devices that were blocked by a USB device policy set to Full Block on any host in your environment.
Instances of mass storage devices using policies set to Read only or Read and write only aren't included. This dashboard helps you determine whether your USB
device policies are blocking devices as intended.
You can narrow your search by entering a serial number, vendor name, product name, or company. Depending on the size of your environment, changing the Time
Range can result in a search that takes some time to complete.
You can narrow your search by entering a serial number, vendor name, product name, or company. Depending on the size of your environment, changing the Time
Range can result in a search that takes some time to complete.
To enable this feature, go to Endpoint security > USB device control > Policies and turn on Enhanced file metadata collection.
Note: Enabling the Enhanced file metadata collection feature initiates three Falcon sensor servlet containers on managed hosts. We recommend
testing the feature within your environment before enabling it on hosts with very high I/O workloads.
Sensor support:
To view the Files written to USB dashboard, go to Endpoint security > USB Device Control > Files written to USB.
Identified file type File type based on file structure and content analysis
Identified file category Identified file category such as archive, document, and multimedia
Host filepath The full source file path detected on the managed host
Hostname Name of the host where the file write event was observed
Note: There might be a short delay in the availability of file provenance data for new files transferred onto removable media.
Use the search feature to narrow your results. Search by computer name, username, file path or name, file type, or company. Depending on the size of your
environment, changing the time range can impact how quickly results are displayed.
Falcon sensor creates a unique session ID based on when the removable storage device was inserted.
Select View full session to show all files covered by the USB session.
File
file size
SHA25
Detailed view Information included
This information is shown instead of file details when an archive file type is detected.
filename
file size
SHA256
Select View filenames, to view more details about individual files contained in the archive. You can export these details to a CSV file.
device type
vendor
username
user ID
logon type
User
logon time
logon server
logon domain
Host
operating system
IP address
local IP address
host ID
sensor version
Detailed view Information included
containment status
Note: Archive file introspection for ZIP files is limited to the first 100MB of the ZIP file. If the archive includes more than 50 files, only the top 50 files,
prioritized by file type and size, are scanned. File names might not be available for some password protected ZIP files.
7Zip
ARC
ARJ
BZ2
CAB
DEB
JAR
RAR
RPM
TAR
XAR
ZIP
Document
DOCX
MS DOCX
MS PPTX
MS XLSX
MSVSDX
OLE
OOXML
PPTX
RTF
VSDX
File Category File Type
XLSX
DWG
Design DXF
IDW
BMP
GIF
Multimedia JPEG
PNG
TIFF
CAB
CLASS
ELF
Executable
MACHO
MSI
PE
VDI
Virtual Machine
VMDK
EMAILARC
EML
Email
MSG
OST
PST
File Category File Type
BLF
ESE
Other DMGLNK
You can narrow your search by entering a computer name, user name, file path or name, file type, or company. Depending on the size of your environment,
changing the time range can result in a search that takes some time to complete.
1. Confirm that the host is updated to Windows sensor version 4.7.7002 or later. Confirm it was rebooted after the sensor update.
2. Verify that the host belongs to a group with the USB device policy assigned.
3. Confirm that there isn’t a higher-precedence USB device policy assigned to the host's group.
5. Confirm that the USB device policy is set to Monitor and enforce.
6. Verify that the USB device policy is configured to allow or deny access correctly for that device's USB device class.
7. Confirm that there aren’t any exceptions which specify different behavior for that USB device class.
8. Confirm that there isn’t a more specific exception applied to the host.
9. Confirm that you entered a combined ID or manual entry in the correct USB device class.
10. If you entered an exception with a combined ID, confirm that the combined ID is correct.
If a multiple-class device has Mass Storage, you can set Mass Storage to Full Block to block only the storage component of the device. Other functions of
the device continue to work normally. For example, if your policy blocks mass storage for a multi-function printer, the printer can't use its SD card storage,
but it can continue to print normally.
If a multiple-class device doesn't have Mass Storage, blocking any of the device's classes completely prevents connections for that device. For example, if
your policy blocks Audio/Video for a USB camera that also has the Imaging class, the camera can't connect using USB in any way.
This event type means an external device that is potentially incompatible with the Device Control module has been detected. As a result, the Device Control
module can't perform any actions on the device, such as blocking or allowing the device. An associated event however is logged in the Falcon UI for visibility.
Also, the device might run into compatibility issues or other issues and not be able to function correctly. If such an issue occurs, open a Support ticket for further
investigation and possible remediation.
Additional errors
When an external storage device is connected to the host the following pop-up will appear:
This popup is expected and occurs when device permissions are set to Full Block for Mass Storage devices. This occurs because a file system was unable to be
mounted because Device Control imposed restrictions.
When you have Mass Storage permission set to Read Only and you attempt to write to the external storage device, a username/password prompt will appear. After
entering in your credentials the following pop-up will appear:
The username/password prompt and the follow-up pop-up is expected behavior for some applications. If the application is unable to write with the current user
credentials, it will request alternative user credentials. This behavior is not controlled by Device Control, it is application specific.
Falcon Firewall Management [/documentation/page/a6e15696/falcon-firewall-management]