USB Security, Detection and Prevention

with Log & Event Manager


Fully functional for 30 days

USB Defender is an endpoint USB security technology used to protect your sensitive data against potential threats by detecting unauthorized usage of USB devices. Major challenges of USB flash drives include:

  • Protecting sensitive data from leakage.
  • Preventing the compromise of networks and computers through infection from viruses and other malicious software.

With SolarWinds Log & Event Manager you can have more control over monitoring, detecting, and limiting USB device usage.

Benefits of USB Security & Endpoint Monitoring

  • Protect sensitive data with real-time notification when USB devices are connected.
  • Create whitelists of authorized USB devices.
  • Disable USB access.
  • Monitor what files or processes are accessed on the drive.
  • Automatically or manually eject USB devices.
  • Leverage built-in reporting to audit USB usage over time.


Prevent sensitive data leakage from unauthorized USB device use

USB devices are easily available, which increases the risk of data loss and breaches due to insecure transfer of sensitive data. The loss of data (be it intentional or accidental) leads to serious damage not only to the intellectual property but also to an organization’s reputation and brand. Therefore monitoring removable devices with USB security software is essential to safeguard and prevent the leakage of vital data.

Log & Event Manager, with its USB Defender technology, monitors the usage of USB devices, including mass storage media devices on phones, cameras, and wireless networking devices. You can prevent users from copying unauthorized files to external devices and identify unauthorized applications launched from USB devices. Log & Event Manager includes an extensive library of active responses to trigger actions and send notifications when security threats or compliance violations are detected. Preventive measures include automatically detaching USB devices, killing process by ID or name, blocking IP addresses, or shutting down machines.

Monitor what files or processes are accessed on the drive

From the outlook of IT security, compliance, and operations, a network has to be monitored against USB threats. With Log & Event Manager, you can monitor the log activity of all USB devices, and correlate user events to:

  • Track suspicious user activity like unwarranted data transfer from an authorized USB port.
  • Confirm that USB access is in compliance with organizational policies.

Respond automatically to security threats and compliance violations

With Log & Event Manager you can build an Active Response rule to disable USB devices when USB access is detected for user accounts that are blacklisted. You can also have whitelisted user-accounts to identify who is authorized to have USB access. When USB devices connect to your network, USB Defender enabled workstations process the Active Response rule to:

  • Check if the device belongs to the whitelisted, user defined group of “authorized” USB devices.
  • Execute the Active Response to detach all USB devices except the ones in the whitelisted group.
  • Alert you about USB activity in real-time on this event.
USB Defender for Data Loss Protection

With our DIY deployment wizard, you’ll be up and monitoring USB usage in less than an hour

Log & Event Manager Starts at $4495


  • Proactively responds to events in real-time
  • Robust search capabilities
  • Out-of-the-box compliance rules and reports



or Learn more

Fully functional for 30 days

Let's talk it over

Call us at 866.530.8100

Email us at