How to block USB storage devices in ThreatLocker?

How to block USB storage devices in ThreatLocker?

This document outlines the step-by-step process of how to block USB storage devices in ThreatLocker Dashboard.

This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control.

Introduction

USB storage devices present a significant risk to endpoint security, from data exfiltration to malware infections.

ThreatLocker’s Storage Control module provides granular control over external storage access, allowing administrators to block USB drives entirely or selectively.In this guide, we’ll walk through the step-by-step process of blocking all USB storage devices using a custom policy.

What is USB control?

USB Control helps secure your environment by limiting how and when storage devices can be accessed on endpoints. It enables policies such as read-only access, full blocking, or allowing only encrypted devices.

Objective

The goal is to prevent unauthorized data transfer and reduce the risk of malware introduced through external devices.

In this guide, we’ll walk through the step-by-step process to block USB storages by creating a policy using the ThreatLocker Storage Control module.

Implementation

Step 1: Access the Storage Control Module

  1. Log in to the ThreatLocker Portal.
  2. Navigate to Modules > Storage Control.
block USB storage devices in ThreatLocker

Step 2: Create or Modify a USB Blocking Policy

1. In the Storage Control module, locate the policy you want to modify:

  • If a USB policy already exists, click on it to modify.
  • If no such policy exists, click Create Policy to start a new one.
block USB storage devices in ThreatLocker

2. In the Policy Details section:

  • Name: e.g., USB Control Policy

Description: Control USB devices.

3. In the Apply To section:

  • Select the appropriate Computer Group or specific devices where the policy will be applied.
block USB storage devices in ThreatLocker

4. In the Conditions section, configure the USB access parameters:

  • Access Type: Choose either
    • Read or
    • Read/Write depending on the level of access you want to allow.
  • Interface Type:
    • Select Selected Interfaces, then choose USB to specifically block USB ports.
  • Program Filter:
    • Leave set to All Programs, unless you need to restrict specific ones.
  • Device Filter:
    • Choose among:
      • All Devices
      • Encrypted Devices Only
      • Non-Encrypted Devices Only
block USB storage devices in ThreatLocker

5. In the Action section:

  • Set Action to Deny
  • Enable “Allow User to Request” to give users a way to submit a request for temporary access.

6. Once everything is configured:

  • Click Save to save the policy.
block USB storage devices in ThreatLocker
  • Then click Deploy from the policy list to apply it to the selected endpoints.
block USB storage devices in ThreatLocker

Conclusion

Blocking USB storage devices using ThreatLocker’s Storage Control ensures that only authorized peripherals can interact with your endpoints. This proactive control helps protect your environment against data leakage, malware injection, and unauthorized file transfers.

By applying a deny policy with clearly defined interface restrictions (e.g., USB) and enabling the user request option, organizations can enforce strong security while maintaining flexibility when legitimate access is needed.

This approach is an essential part of a Zero Trust strategy, reinforcing endpoint security without compromising productivity.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top