Fal.Con 2025: Where security leaders shape the future. Register now

Take control of USB devices

CrowdStrike Falcon® Device Control

Take control of USB devices

Complete USB device visibility and control to safeguard your data and your business.

CrowdStrike 2025 Global Threat Report
Discover the latest emerging threats.

Download the report

Comprehensive USB control that’s easy to manage


Immediate USB device visibility, granular control, and protection at your fingertips.

Mitigate malware risk

Mitigate malware risk

Gain the granular control needed to enable safe USB device use and prevent the spread of malware.

Compare Products icon

Track every move

Track every move

Easily monitor and track approved USB device use with visibility into USB data and file activity.

Streamline policy management

Streamline policy management

Easily manage policies through intuitive dashboards. No extra agents, software, or hardware required.

See all USB activity


View comprehensive file metadata and USB activity context to easily detect and investigate data loss and exfiltration. With detailed user and device information, ZIP archive introspection, and Microsoft sensitivity labels, you gain the visibility you need for a proactive defense.

CrowdStrike Falcon interface showing USB device activity with charts on blocked events, device types, and access permissions.
×
CrowdStrike Falcon security policy settings for USB device access, showing restrictions by device type and enhanced file metadata collection options.
×

Identify and safeguard source code


Detect source code movement with precision. Advanced machine learning watches over 40 source code languages, catching any sign of exfiltration. Simple, effective, and relentless — your intellectual property is safeguarded against threats.

Precise and granular control


Implement granular access rights to ensure only approved external USB devices are used. Simple workflows accelerate policy creation and allow analysts to test policy impacts prior to enforcement, eliminating potential disruption.

CrowdStrike Falcon USB device block policy settings with granular access controls, exceptions, and enforcement modes.
×

See Falcon Device Control in action

See why customers trust CrowdStrike

Norgine: Winning the cyberwar with CrowdStrike

Norgine: Winning the cyberwar with CrowdStrike

"We use CrowdStrike to lock down the USBs, because of the granular control."

Nick Prescot, CISO, Norgine

Try CrowdStrike free for 15 days

Try CrowdStrike free for 15 days

Total protection has never been easier. Take advantage of our free 15-day trial.

Featured resources

Find the adversaries targeting your industry

Find the adversaries targeting your industry

Discover the adversaries targeting your industry.