CrowdStrike Falcon’s Device Control feature allows administrators to monitor, block, or restrict USB devices connected to endpoints. This helps prevent data exfiltration, unauthorized access, and malware infections via removable media.
This guide explains how to enable, configure, and manage Device Control policies in the CrowdStrike Falcon Console.
Step 1: Log Into the Falcon Console
- Open a browser and go to https://falcon.crowdstrike.com.
- Sign in using your admin credentials.
Step 2: Enable Device Control
- In the left-hand menu, go to Configuration > Prevention Policies.
- Select the policy group where you want to enable Device Control (e.g., Standard, High Security, or a Custom Policy).
- Click Edit Policy.
- Navigate to the Device Control section.
- Toggle Enable Device Control to ON.
- Click Save Policy.
📌 Note: Once enabled, all USB activity will be logged, and restrictions will apply based on policy settings.
Step 3: Configure Device Control Rules
Option 1: Allow or Block All USB Storage Devices
- Click Add Rule.
- Select Rule Type: USB Storage Device.
- Choose an Action:
- Allow – Grants full access to all USB storage devices.
- Block – Prevents access to USB storage devices.
- Read-Only – Allows access but prevents file modifications.
- Click Save Rule.
Option 2: Allow Only Specific USB Devices
- Click Add Rule.
- Select Rule Type: USB Device Vendor or Model.
- Enter the Vendor ID (VID) and Product ID (PID) of the approved USB device.
- Example: SanDisk USB Drive (VID:
0781
, PID:5580
).
- Example: SanDisk USB Drive (VID:
- Set Action: Allow.
- Click Save Rule.
Option 3: Block Unauthorized USB Devices
- Click Add Rule.
- Select Rule Type: USB Device Vendor or Model.
- Set Action: Block.
- (Optional) Add a message to notify users why the device is blocked.
- Click Save Rule.
Step 4: Assign Device Control Policies to Endpoints
- Go to Hosts > Host Management.
- Select the endpoints where the policy should apply.
- Assign the prevention policy containing the Device Control rules.
- Click Apply Policy.
Step 5: Monitor USB Activity
- Navigate to Activity > Device Control in the Falcon Console.
- View logs of USB devices connected to endpoints.
- Filter by Blocked Devices to check enforcement.
- Adjust rules if necessary based on security requirements.
Best Practices for Device Control
✅ Use Read-Only Mode for Approved Devices – Prevents unauthorized data modifications.
✅ Whitelist Business-Critical USB Devices – Allow only necessary storage devices.
✅ Regularly Review Logs – Identify unauthorized USB usage and refine policies.