McAfee Device Control

McAfee Device Control

Prevent unauthorized use of removable media

Next Steps:


McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:

Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.

Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.

Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.

Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.

Features & Benefits

Protect your business from data loss

Gain visibility and manage what and how users copy valuable company data to removable media.

Maintain control over your confidential data

Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.

Enable productivity while ensuring data protection

Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.

Centralize and simplify your security management

Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.

Prove compliance with less effort

Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.

System Requirements

The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

McAfee ePolicy Orchestrator (ePO) Server

  • Operating systems
    • Microsoft Server 2003 Service Pack 1 (SP1), 2003 R2
  • Hardware requirements
    • CPU: Pentium II-class or higher, 450 MHz minimum
    • RAM: 512 MB (1 GB recommended)
    • Disk space: 250 MB

Device Control Endpoint

  • Operating systems
    • Microsoft Windows XP Professional with SP1 or higher
    • Microsoft Windows 2000 SP4 or higher
  • Hardware requirements
    • CPU: Pentium III, 1 GHz or faster
    • RAM: 512 MB, 1 GB (recommended)
    • Disk space: 200 MB minimum
    • Network connection: TCP/IP for remote access

Customer Stories

Alcatel-Lucent Shanghai Bell

Alcatel-Lucent Shanghai Bell uses McAfee Network Security Platform to secure 100 Mbps to 10 Gbps corporate networks against threats and attacks.

  • Increased identification and interception of up to 99% of the threats
  • Improved the work efficiency and allowed the information security and network departments to cooperate with each other in monitoring security threats and risks


Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.

  • Gained fast ROI through solid protection, reasonable pricing, and reduced internal costs
  • Created an environment of easy deployment and administration
  • Protected against malware with augmented malware detection abilities
  • Assured that the entire network is protected
  • Increased control over the security infrastructure

Memorial Hermann Healthcare System

Memorial Hermann Healthcare System guards patient data with McAfee Endpoint Encryption and Device Control.

  • Streamlined deployment of endpoint encryption and device control solutions
  • Automatically enforced detailed device and data policies
  • Simplified configuration; McAfee Professional Services team provided expert support during migration
  • Protected Memorial Hermann’s company image, reputation, and brand

Xinjiang Mobile

Xinjiang Mobile's comprehensive assessment of data protection products in the market lead them to choose and deploy McAfee’s solution.

  • Keeps data in Xinjiang Mobile’s core network safe and free from risks of financial loss, brand damage, lost customers, competitive disadvantage and other risk factors
  • Tightens management and control of removable media and ensures security of corporate data