DeviceLock allows network administrators to specify which users can access which devices (ports, floppies, MOs, etc.) on the local computer. Once DeviceLock is installed, administrators can assign permissions to LPT ports, CD-ROMs, COM Ports, or any other device, just as they would to any share on the hard disk. Network administrators may use DeviceLock to flush a storage device's buffers and to get extended information about devices and NTFS partitions.
- NetworkLock: Added new WebMail service: Microsoft Outlook Web Access (OWA). Using Service Options parameter "OWA Servers", you can specify certain server URLs that NetworkLock will treat as approved OWA servers
- NetworkLock: "Log Event" and "Send Alert" options now available for all supported protocols in Protocols White List rules
- NetworkLock: Performance improvements made for handling HTTPS connections when wildcards are set in Protocols White List rules for SSL
- NetworkLock: Enhanced Dropbox File Sharing web service control
- DeviceLock: Added new separately licensed component: DeviceLock Discovery Server. DeviceLock Discovery Server is a server-based component of the DeviceLock Content Security Server. DeviceLock Discovery Server is designed to scan users' workstations and
- DeviceLock: "Log Event" and "Send Alert" flags in the Protocols White List and Content Aware Rules now override all device-level (and protocol-level) auditing and alerting options
- DeviceLock: New feature: "Shadow Data Access" option added to DeviceLock Administrators feature to disable access to shadow files to users without this option enabled. This applies to DeviceLock Service, DeviceLock Enterprise Server and DeviceLock Servi
- DeviceLock: Added new administrative alert: "Notify if Service is uninstalled"
- DeviceLock: Added new audit and shadow log reports: "Top printed documents", "Top active processes" and "Top copied files by extension"
- DeviceLock: Added new parameter "Report TS Devices as regular devices". It allows user to treat mapped TS Devices as regular physical devices while generating a report
- DeviceLock: Console enhancement allows Administrator to switch between Mac & Windows policy mode in Service Settings Editor and Group Policy Editor by using corresponding elements in the context menu of the DeviceLock Settings console node
- DeviceLock: General improvements to avoid potential problems with Clipboard, Printer and MTP device access controls, auditing and shadowing on localized (non-English) versions of Windows
- DeviceLock: DeviceLock Service for Mac now has full support for "Log policy changes and Start/Stop events" parameter in Service Options
Reviewing 7.2.51171 (Aug 24, 2013)
love this app
Reviewing 6.3 RC1 (Apr 7, 2008)
WHY DONT THEY GIVE ABILITY TO INTERNET SECURITIES LOCKING DEVICES OF PC S. EVERY ATTACK COMES FROM WHO ARE INTERNET USERS OR NETWORK USERS. MOST USERS DO JOKE ATTACKS OR TRY TO SEE YOUR IMPORTANT FILES BY THE HELP OF YOUR OPERATING SYSTEMS CAPABILITY. IF YOU HAVE INTELLIGENT ON YOUR SYSTEM AND HARDWARE YOU
CAN LOCK THEM BUT SECURITY PROGRAMS MUST HAVE THIS ABILITY TOO.
Reviewing 6.0 Beta 1 (Feb 4, 2006)
We used DeviceLock initially, but as we added more systems to our network found it to be unreliable and ended up ditching it. We ended up switching to a product called DeviceWall, which was much easier to setup and also had security audit tools that the other products we reviewed did not.
Reviewing 6.0 Beta 1 (Jan 6, 2006)
ModderXManiac wrote: "Should be free"
Yes, shareware is evil! How dare they want to make money to feed their families and pay their bills!
We should hang all shareware authors for wanting money!
Let their kids starve because mommy or daddy isn't allowed to be successful and prosper so they can have food on their table!
Anybody else have a problem with shareware????
Reviewing 5.7 Beta (Dec 6, 2004)
Seems OK, but not that great. Fortress is better but Fortress is easily hacked.
Why would network admins need this? If you're a network admin you should be using Active Directory and and network permissions. If you need to lock devices out on a client PC you can do it with a Group Policy Object (GPO).
This software seems like it would only be good if you are in need to lock down your PC at home or in a dorm environment for students. Maybe if you don't want your roommate to have access to stuff.
No comments yet