NetLock RMMNetLock RMM Docs
III — How-To Guides

Restrict USB devices on a group

Approve a USB device from the Blocked Devices queue into the whitelist at group scope.

Restrict USB devices on a group

USB access in NetLock RMM is an allowlist: anything not on the whitelist is blocked. There is no create-from-scratch dialog for whitelist entries — the only way to add one is through the approval flow on the Blocked Devices tab. In practice that means plugging in an intended USB device once so the agent reports it as blocked, then approving it with the chosen scope. This guide walks through that flow at group scope.

Blocked Devices tab with one pending USB entry selected

Before you start

  • USB Device Control is enabled on the policy assigned to the target device: the policy's Windows → USB Device Control section has the whitelist enforcement on.
  • The policy routes to the target group via an automation (see Guide H.4).
  • You have the USB device in question and physical access to an affected Windows device in the group, or you can wait for a user to plug theirs in.
  • Required permission: collections_enabled, collections_device_control_enabled.

Steps

  1. On an affected device, plug in the USB device. The agent detects the attempt, blocks it, and reports it to the Console.
  2. In the Console, open Collections → Device Control and switch to the Blocked Devices tab (route /device-control/blocked).
  3. Find the row for the USB device. The Blocked Devices table shows Count, Date, Reporting Device, the USB metadata (name and manufacturer), the device Type (Mouse / Keyboard / HID / USB / DiskDrive / and so on), the Device ID, the Actions Taken, and a Pending status chip.
  4. Confirm this is the intended device. If more than one pending row looks similar, select the row and open its details to verify the vendor-id, product-id, and serial encoded in the Device ID.
  5. Open the row's menu and pick one of the approval scopes:
    • Approve for this device
    • Approve for tenant
    • Approve for location
    • Approve for group — the choice for this guide.
    • Approve globally
    • Dismiss — if it was a mistake.
  6. When the scope dialog asks, pick the target group. The server inserts the device into the whitelist scoped to that group, flips the row's status chip to Approved, and forces a resync so every device in the group picks up the updated whitelist.

Note: Scope is chosen once, at approval time. To widen or narrow a whitelist entry later, delete it from the Whitelist tab and re-approve the blocked-device entry with a different scope.

Verify it worked

  • On the Whitelist tab (route /device-control/whitelist) a new row appears with the USB device's metadata, the group scope chip, and the target group as Scope Target. Status is on.
  • On any device in the approved group, the same USB device now connects successfully.
  • On devices outside the group, the USB device continues to be blocked.

Troubleshooting

  • USB device does not appear as blocked. Confirm the agent on the affected device enforces USB Device Control — the policy assigned to that device must have USB Device Control turned on in the Windows tab. If it does not, edit the policy and save.
  • Approved but still blocked. Allow a sync cycle to pass — the whitelist push is immediate but the device must pick it up. Replug the USB device to trigger a fresh evaluation.
  • Multiple similar rows appear. Each failed enumeration is logged as a separate attempt; approve one and delete the others, or dismiss the stragglers.