Configuring user access to device features

5 March 2024

ID 116218

This section provides instructions on how to manage user access to the features of mobile devices and Windows devices, how to configure the behavior of security applications on your users' devices, and actions that end users can perform.

In this section

Controlling network and storage devices on Windows devices

Generating a list of trusted network and storage devices on Windows devices

Configuring interaction of Kaspersky Endpoint Security for Windows with end users

Configuring interaction of Kaspersky Endpoint Security for Mac with end users

Controlling user access to the features of Android devices

Controlling user access to the features of iOS devices

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.