USB-Lock-RP Device Control Endpoint Security by Advanced Systems International

USB Lockdown Software for Enterprise

Control USB Devices Access and Lock USB Ports in Real-time.
USB Blocking, Whitelisting, Encryption and Monitoring

USB Lock RP is the strongest USB device control software solution to centrally control removable drives, mobile devices and wireless adapters access to servers, workstations and laptops in a network. Presents smart USB lockdown designed to block USB removable devices to protect computers data in Industrial processes as well as corporate offices.

USB-Lock-RP Control (screenshot)
USB-Lock-RP Device Control Software.

Classified as USB port control for enterprise, USB-Lock-RP software is an administrative and enforcement tool specifically designed block USB devices to protect data assets in windows operating systems, without concern to dependencies, at a very small memory/storage footprint.

The Management console operates on-premises within the enterprise network and provides real-time granular control and visibility over USB activity and endpoint computers. It controls devices access policy and enforces rules to specific computers, as well as groups of computers with ease. Receives devices connection alerts and logs events automatically, including USB Monitoring for details on approved file transfers.

USB Lock RP detects devices hardware ID to allow specific USB devices and block the rest without interfering with harmless peripherals. USB flash drives can be authorized to work on specific machines, groups or across the network


USB Lockdown is required to effectively prevent data loss and malware infection by means of USB media, USB Lock rejects unauthorized devices at system level and blocks USB incoming and outgoing data.

USB blocking and Lock down characteristics are unique and offer superior data security than consumer-based USB control solutions or antivirus software attempting to analyze unauthorized devices, because accessing unknown devices creates unnecessary risk and results in a waste of system resources.

Additionally, it can set strong encryption to data transferred from the PC to authorized USB drives. Auto-Encryption can be turned ON/OFF in real-time.

Also capable of setting read-only policy to specific USB drives in real-time. This advanced read-only function write-protects specific USB drives data while other authorized USB drives can be full access on the same machine. (While unauthorized USB drives continue to be blocked)

  • Centralized USB Management, easy to set and operate.
  • Proven capability to control USB in large networks.
  • Secure Groups of Computers or Specific Computers from USB threat.
  • Whitelists USB Devices by Hardware ID and Block the rest.
  • Enforces Groups security Policy settings in real-time.
  • Automatic Authorizations Mode, Whitelist USB devices across the network automatically.
  • Receives alerts & logs USB device connections in the network.
  • Set read-only to specific usb drives.
  • Compatible with Remote Desktop, Adapts to screen resolution changes, Smart desktop area use.
  • Export Status and Alerts Reports to csv format (Comma-separated value)
  • Presents Full Screen Locking upon Blocking USB Devices (includes your company logo).
  • Monitors & Encrypts File Transfers from Endpoints to Authorized USB drives (ON/OFF).
  • Easy Client Deployment through Group Policy (Windows Installer MSI).
  • Event logs in CEF (Common events format) for integration with SIEM.
  • Controls USB even if no user is logged into the client system (Setting and enforcement).

  • Block usb devices to prevent malware infection entering computer by usb media.
  • Prevent Data loss from Computers & Authorized USB Devices (USB DLP)
  • Inform of USB blocking, approval and other device connection events & Activity
  • Compliance with Removable Media Policy.
  • Permanent end-user enterprise licensing model, One-time payment only.
  • Designed for organization autonomous control, doesn't require internet.
  • Strong Device Control, blocks or authorizes devices at endpoint system level in real-time.
  • All included, no need to order additional modules for encryption or monitoring.

  • Network TCP/IP (LAN, WLAN or WAN)
  • Windows Operating Systems from NT 10 to NT 5.1 (Physical or Virtual Machine)
  • Other Dependencies: None

Software Type:
  • Control: USB Management application On-Premises (not cloud-based)
  • Client: Local System Service

Development Status: Active.

Version 13.838 highlights:

Disconnected Machines Enhanced Visibility:

  • Shows all settings, most recent alerts, and authorized devices for machines not logged into the system.
  • This highly requested feature now provides administrators with the ability to monitor and manage disconnected machines efficiently.

Enhanced Approved Devices Visibility:

  • Displays and reports (CSV) all authorized devices name and ID divided by Groups,Per Machine, and Group-wide approved from one place.
  • The New Centralized view simplifies the management of USB device authorizations across the network.
  • Dedicated Technical Team on Stand by

USB Authorization Panel: Provides 4 easy ways to remotelly authorize USB devices on any machine in real-time:

USB Authorization Panel: Offers 4 easy ways to authorize USB devices on any machine in real-time
  1. Drag and Drop: Drag from USB blocked or allowed most recent alerts list and Drop into any of the 20 available spots per machine.
  2. Automatic Authorization: Authorize USB devices automatically as they connect to the selected client machine.(Turn ON/OFF to activate or deactivate).
  3. Authorize a USB device already connected at client while the sector is unprotected.
  4. Manual USB Authorization: Manually enter the device ID to be authorized.
Block & Control the following Devices: USB, e-SATA, FireWire drives, mobile phones MTP, CD, Bluetooth, IRDA, WiFI and type HID keyboard impersonator BadUSB devices.
USB Control Scope
  • UMS (USB Mass Storage Device).
    • USB flash drives.
    • Memory Card readers.
    • Memory Cards.
  • UASP (USB Attached SCSI Protocol).
    • Portable Hard drives.
    • SSD Enclosures.
  • USB-MTP (Media Transfer Protocol).
    • Smartphones.
    • Tablets.
    • Portable devices.
    • Smart card readers.
    • Smart cards.
  • External magnetic hard drives.
    • e-SATA.
    • Firewire (IEEE 1394).
  • Wireless Transceivers.
    • WiFi.
    • Bluetooth.
    • IrDA.
  • External and Internal.
    • CD.
    • DVD.
    • Blu-Ray.
  • USB-HID (Human Interface Device).
    • BadUSBs (Keystroke Injection).
    • Arduino.
    • USB Rubber Ducky.

USB lock rp device control is licensed by over 1000 organization worldwide, since 2004

More USB lock rp licensed organization
USB-Lock-RP Device Control Software is Licensed by top-notch Organizations

Control USB Devices in Real-time

Strong USB Control:

Prevents zero-day USB-based exploit from entering your systems. Block USB incoming and outgoing of data. Device identifiers storage are AES 256 encrypted and HEX masked(variable key, variable initiation vector CBC Mode). Prevents Hardware ID spoofing. Secures systems even if the user is running with administrative credentials.

Straightforward Operation:

Start protecting your network in minutes. Very easy to operate and set security policy. Protection scope is divided in 4 sectors; just select a client machine or computer group and press the desired lock to keep removable storage and portable devices threats away. Once set operation is automatic. Intuitive administrative GUI, virtually no learning curve involved.

Granular Policy:

Authorize specific USB removable drives and/or specific smartphones access to specific computers or to all computers in the network and block the rest. Prevents unauthorized access to USB ports, removable storage, portable devices and other Removable Media from accessing operating systems in the network.

Centralized USB Devices Management:

Centrally set or change security measures and automatically receive and log details on blocked, and authorized USB devices as they are plugged into endpoint computers in real-time. As well as logging and receiving records of files transferred from endpoints to authorized USB Devices as events occur.

Personalized USB Lockdown:

Presents informative Lockdown alerts screens at client computers upon blocking USB devices, USB Lockdown screens presented at endpoint computers are personalized with the end-user organization/enterprise logo. Personalization is automatically done by our team prior to secure electronic delivery (within 3 hours order made)

Smart USB Port Control:

Designed to block usb devices & control USB port access without interfering with non-storage USB peripherals (mouse, keyboards, webcams, printers), But capable of detecting and unobtrusively protect against keystroke injection and malicious payload attacks by devices such as BadUSBs (USB Rubber Ducky) that impersonate HID keyboards or mouse.

USB Monitoring:

Effective monitoring of data transferred from endpoint computers to authorized USB portable storage (thumb/flash/pen drives). Records automatically arrive and are stored secured at the Control server. The Administrative Console can be set to send these records to a SMTP (TLS/SSL) email within your domain in real-time.


Effective data loss protection USB Lock protects information contained inside authorized thumb drives by optionally forcing automatic AES 256 encryption of all transferred data files from computers to authorized USB drives, effectively locking out USB access to protect confidential information in case the authorized device is lost or stolen. USB DLP policy can be enabled or disabled with just a click.

Perpetual use Licenses:

Licenses are end-user organization perpetual use licenses and include 2 years updates, after 2 years updates are optional at 20% of licensing cost. USB-Lock-RP is not support demanding, once it's set, it works as intended, this has to do with product maturity and that at client-side the software deals with hardware, not users. Support is in English at no charge by email or phone.

Autonomous Control:

Doesn’t require internet or Active directory.
Protects endpoints data even if the client is disconnected from the network. (At the Control, disconnected Laptops will show in the out-list). Protects at System level. (Effective even if running under administrative account.) Starts protecting even if no user is logged into the system. Works on air-gapped networks and remote locations.

Available for Download:

Download the functional DEMO or request a small set licensed as Proof-of-Concept to your organization. Test how USB Lock Software, manages USB ports and devices access to endpoints for free, no cost or commitment. POC Licenses are personalized with your organization logo. Dedicated team on standby to assist on any questions you may have (24x7).

Easy Deployment:

USB Lock client can be easily mass deployed with GPO or any software deployment tool, the USB Lock client is presented as a standalone Windows Installer MSI that is configurable by command line, ensuring effective initial client deployment and updates. Our team can also preconfigure the MSI for you if required at no cost.

USB Lockdown

Refers to automatically blocking access to the computer desktop. Lockdown occurs when unauthorized USB storage devices (e.g., USB 2.0, USB 3.x) are connected to the usb ports (e.g., standard USB type-A, USB type-C), or remote USB. USB-Lock-RP considers the unauthorized connection of usb storage devices a serious intrusion attempt that should be stopped by all means.

USB Lockdown (a.k.a., USB blocking) is part of the software redundant measures applied to protect the system. This measures take place upon USB detection and included preventing drivers to load, stopping, dismounting, disabling, ejecting devices while blocking USB and access to the desktop. Protection measures escalated depending on the device type and the device status but lockdown is normally included when blocking usb and other removable storage under the software protection scope.

USB Lockdown

USB blocking is a software capability used by IT security administrators to protect computer systems and data assets from threats posed by the connection of unauthorized USB peripherals.

Blocking USB & desktop Lockdown are simultaneous and present full-screen window alerts that extend to multiple monitors.
Lockdown remains until any of the following conditions is met:

  • The blocked USB device is removed. (client-side)
  • The master password is used. (client-side.)
  • The sector is unprotected. (control-side)
  • The USB device is authorized. (control-side)

USB Lock RP Straightforward Operation

Blocking USB Devices on Specific Computers

  1. Select a client PC from the USB-Lock-RP Control Dashboard network list.
  2. Click on the left side lock.

Done!, you have just protected the removable drives sector on the selected computer in realtime, now the following devices will be blocked: USB, eSATA and Firewire drives, Mobile phones (MTP Protocol), and memory cards while also smart blocking USB keystroke injection attacks. Setting are enforced in real-time (To unprotect just click the lock again).

Locking Peripheral Ports on Groups of Computers

By default 5 groups are created, and all new installed clients will belong to group 1 as seen on the groups column, so you are ready to lock removable storage on all computers at this point.

  1. Rename groups using the group rename function.(optional.)
  2. Add computers to groups by right clicking on the selected machine and choosing a group name.(optional.)
  3. Click the Group security button and choose the group name, sector (e.g., Removable drives), desired action (e.g., Protect) and press OK.

Great!, you just Locked removable drives sector on all computers that belong to the chosen group. You will see all computers in that group changing its security status to protected in real-time.

Whitelist USB Thumb drives and Smartphones

Authorizing specific USB pen drives and Mobile phones is as easy, just insert the device you need to authorize (at the control or at the client) and press authorize. Done!

Besides USB Control (Removable Storage Sector), three other sectors to manage are available and are as easy to protect: CD/DVD Sector, iRDA/Bluetooth Sector, and WiFi Sector.

Blocked or authorized device connection to any client computer automatically generate an alert event stored encrypted at Control server. This records are readable from within the Central USB-Lock-RP Device Control interface and show date-time, Hardware ID, logged user & machine name.

At client-side a full screen alert instructs the user to remove the device, this alerts bear the licensed organization logo at top-left corner.

USB Encryption

The protection of data inside removable storage is done by forcing automatic encryption, this function can also be turned ON or OFF with just one click. (Monitoring needs to be activated for USB encryption to work).

When USB encryption is active all files transferred from the endpoint computer to authorized USB flash drives are automatically AES 256 encrypted. (all data not just the headers)

Stored files on encrypted USB Thumb drives can be opened within the endpoint originating client or within any other endpoint USB-Lock-RP client that has USB Encryption activated. (files are automatically decrypted in those systems when opened)

This function ensures that information contained inside authorized devices is only accessible within determined computers in the network and none outside the network.

Protection against badUSB devices

Protecting against badUSB device e.g. USB Rubber Ducky is very important. This device type is extremely dangerous, its firmware has been modified to impersonate Human interface devices (HID) such as keyboards.

This class of BadUSB can inflict keystroke injection attacks and introduce malicious payloads to harm the operating system and network infrastructure. Blocking BadUSB is a standard function in USB Lock, the program makes a quick analysis when it detects any change on keyboard or mouse enumeration to prevent such attacks, other than that keyboards and mouse can work normally without restriction.

USB Monitoring

USB Monitoring side-panel showing file transfer detail

Monitoring the transfer of files to removable drives is activated or deactivated with just one click independently of the removable storage sector protection state. Monitoring can be set to groups or to specific machines, While USB removable drives sector is in protected state authorized devices will be monitored and while in unprotected state any connected usb drive is monitored

USB File transfer monitoring records include:

  • File name including extension
  • File size in bytes
  • Date of the file transfer event.
  • Date the file was last modified.
  • The machine name from were the file trasfer originated
  • Name of user or users logged in the machine when files were transfered to the USB device.
  • The USB drive letter assigned to destination device
  • The complete device ID including the vendor and product and unique identifiers

Records are received by the control in near real-time and are presented for an at a glance view on two side panels and stored organized by machine name/date/time for review when needed.
At the Central control server the collected data remains encrypted and same as all device connection alert records are protected only readable within the control interface.
USB File transfer monitoring can be set to be simultaneously sent as part of the secure email alert function if configured.


Auditable USB control

QUOTE: USB control – USB Lockdown blocking screens, which appear at endpoint workstations make it easy for security auditors to test the solution’s effectiveness. With most other solutions on the market, this sort of auditing is not possible.

Auditable USB control, December 18, 2023: USB-Lock-RP, Article in Security on Screen.

Auditable USB control, December 18, 2023: USB-Lock-RP,
Article by Francesca Seden in

Product showcase: USB-Lock-RP

QUOTE: USB-Lock-RP allows security system administrators to manage USB access from a central administrative console...Preventing unauthorized use of removable media, The solution blocks unauthorized devices as they are connected to computers in the network in real-time.

Product showcase February 9, 2021: USB-Lock-RP, Article in Help Net Security.

Product Showcase: February 9, 2021

Central Control of Device Access to Computers.

QUOTE: USB-Lock-RP Device Control Software is a unified system to centrally control access to computers by external and remote devices. This protection includes USB ports, removable storage, mobile devices and wireless adapters to servers, workstations and laptops in a network. Specifically, USB-Lock-RP responds to the vulnerability of individual and enterprise-wide computers to cyber exploits...

USB-Lock-RP Review: Central Control of Device Access to Computers., Article by Yan Ross, J.D. in Cyber Defense Magazine.

Article: by Yan Ross

Direct means of organizations information protection.

QUOTE: ...USB Lock RP is also one of the only pieces of USB control software that personalizes block screens and relevant boxes with a customer’s logo. This builds USB Lock RP into a company’s policy and gives each and every client a feeling of personalized control...

USB Lock RP Centralized Direct means of organizations information protection, Article: by David Bisson in:
Article: by David Bisson

Endpoint security that is not a pain in your end!.

QUOTE: ...USB Lock RP not only allows you to maintain control and have flexibility. It gives you peace of mind when it comes to endpoint security and removable devices and more importantly is gets rid of PEST!...

USB Lock RP: Endpoint security that is not a pain in your end!, Article by Ron Barrett in Network World

Article: by Ron Barrett

Second to none USB Control Software.

Advanced USB Control Features:

  • Autonomous device control: The licensed organization has independent full control. The solution does not require any external access, has no internal dependencies and it's permanently licensed. More so it allows to massively recover licenses from unused machines.
  • Always active control: Can be set to automatically operate 24 x 7 while no administrator is logged to the device control console.
  • Large network management: Proven capability is 9000 endpoints managed from a single administrative console.
  • Superior visibility:. Its intuitive user interface gives a bird’s eye view over the network, connected devices, security status and events at a glance.
  • Always encrypted logs: All events presented by the admin interface are stored encrypted AES 256 always, logs data is only readable when reports are made on demand or automatically.
  • Real-time USB control and visibility: All policy settings are imparted and enforced without delay and the program is even capable of showing when any locally authorized USB device is in use.
  • Personalized device control:. The software is delivered personalized and certified to the licensing organization, all order permit the inclusion of a custom message to be presented below the organization logo at endpoint stations upon USB blocking.
  • Automatic USB authorization mode:. This unique feature can set to automatically acquire devices ID and approve them upon connection. This can help IT infrastructure engineers control USB access in no time while not disrupting normal operations.
  • Auditable USB control:. USB Lockdown blocking screens appearing at endpoint workstations make it easy for security auditors to test the solution effectiveness. Most other solutions silent blocking are not easy to audit.
  • Experience and reputation:. This solution is an important part of the security arsenal of top notch organizations. In the market since 2006 and has a dedicated team behind it. Such long development curve has resulted in a superb USB control tool that incorporates the requirements of real IT infrastructure engineers and IT security managers. (Last updated July 8, 2024.)

The Advanced Systems Team invites you to test USB Lock RP to control USB devices access to computers in your network.

Download usb lock demo version.
(5 client capacity).
Request courtesy licenses for a complete proof of concept review.
(Licensed and personalized, 10 client capacity).