Function introduction
Permission settings: Encrypt and authorize mobile storage devices and identify the computer.
Organization management: You can add certain departments of the enterprise to realize group management of mobile storage devices and computers. You can also add other identifiers (such as personal information) to realize the binding of mobile disks and computers.
Password setting: You can modify the software login and uninstall password (this function is available in the official version).
Port settings: You can set the port to read-write mode, read-only mode, fully prohibited mode, and also disable and enable functions such as floppy drive, optical drive, and Bluetooth.
View logs: You can choose four query methods to query logs, query all logs, query by date, query by operation type, and query by keyword.
Read and write program: Permission restrictions for read and write operations based on matching permissions. Permission matching works fine.
Permission mismatch - encrypted mobile storage devices and unencrypted authorized mobile storage devices cannot be operated.
---Unencrypted and unauthorized mobile storage devices can operate normally in read-write mode; they cannot be operated in full ban mode; data can be exported from foreign disks in read-only mode, but data cannot be imported.
it works
it works
it works