All Products
Search
Document Center

Secure Access Service Edge:Control peripheral devices for data security

Last Updated:Mar 31, 2026

Employees who transfer sensitive files through peripherals such as USB flash drives, Bluetooth, or AirDrop can expose your organization to significant data loss. The data loss prevention (DLP) feature of Secure Access Service Edge (SASE) lets you control which peripherals employees can use, monitor outbound file transfers in real time, and investigate sensitive behavior events.

This topic describes how to create peripheral control policies, review sensitive behavior detection results, manage the peripheral whitelist, and perform other policy management tasks.

Supported peripherals

OSPeripheralsDevice ports
WindowsUSB flash drives, USB storage devices, printers, portable devices, card readers, optical drivesBluetooth
macOSUSB flash drives and USB storage devicesBluetooth, AirDrop

Control options by device type:

  • USB flash drives and USB storage devices: Disable Use, Read/Write, or Read-only

  • All other peripherals and device ports: Disable Use only

When USB Flash Drive and USB Storage is set to Read/Write, DLP triggers sensitive behavior detection whenever a user transfers internal files using a USB flash drive or USB storage device.

Prerequisites

Before you begin, ensure that you have:

Create a peripheral control policy

  1. Log on to the SASE console.

  2. In the left-side navigation pane, choose Data Loss Prevention > Policy Center.

  3. Click the Peripheral Management tab, then click Create Policy.

  4. In the Create Policy panel, configure the following parameters.

    ParameterDescription
    Policy NameA name for the policy. Must be 2–32 characters and can contain letters, digits, hyphens (-), and underscores (_).
    Policy DescriptionAn optional description of the policy.
    StatusEnable or disable the policy. The policy takes effect only when the switch is turned on.
    PriorityA number from 1 to 10. A lower number means higher priority.
    Applicable UserThe users or user groups to which this policy applies.
    WindowsSelect peripherals and device ports to control. For USB flash drives and USB storage devices, choose Disable Use, Read/Write, or Read-only. For all other peripherals and Bluetooth, the only option is Disable Use.
    macOSSelect peripherals and device ports to control. For USB flash drives and USB storage devices, choose Disable Use, Read/Write, or Read-only. For Bluetooth and AirDrop, the only option is Disable Use.
    Approval Process ConfigurationSpecify whether users can submit an application for approval when the users want to use an at-risk peripheral. If you enable this option, select an approval workflow. For more information, see Create an approval workflow.
    Prompt Display ConfigurationConfigure the prompt message that appears in the dialog box when users want to use an at-risk peripheral. Supports Chinese and English.
  5. Click OK.

The policy appears in the policy list and DLP manages peripherals based on the policy.

Example: To give your finance team read-only access to USB drives while allowing your IT team full read/write access, create two policies — one targeting the finance user group with Read-only, and another targeting the IT user group with Read/Write. Assign a lower priority number to the IT policy so it takes precedence if a user belongs to both groups.

View sensitive behavior detection results

When USB Flash Drive and USB Storage is set to Read/Write, DLP automatically detects internal file transfers and logs them as sensitive behavior events. DLP analyzes data from the last 30 days, 7 days, or 24 hours.

The following event details are recorded for each detected transfer: Sensitive Message, Hit Policy, Office Terminal, and Outbound Transfer Channel.

  1. In the left-side navigation pane, choose Data Loss Prevention > Sensitive Behavior Detection.

  2. On the Sensitive Behavior Detection page, review the statistics about outbound transfers of sensitive files performed using USB flash drives or USB storage devices within the selected time period.

  3. In the user list at the bottom of the page, find a user and click Details in the Actions column to see that user's activity.

  4. Find a file in the results and click Details in the Actions column to view the full event information.

Configure the peripheral whitelist

Add users to the whitelist to exempt them from all peripheral control policies. The whitelist is designed for users who have a legitimate, ongoing need to use peripherals freely — for example, IT administrators who routinely manage USB-connected devices. Keep the whitelist short and limit it to users with a clear business justification.

  1. On the Peripheral Management page, click Peripheral Whitelist.

  2. On the Whitelist tab, add the users to exempt.

    image.png

  3. Click Submit.

More policy operations

Change a policy's priority

Click the 编辑 icon next to the policy and enter a new priority value (1–10). A lower number means higher priority.

image.png

Disable a policy

Find the policy and turn off the switch in the Policy Status column. The policy is retained and can be re-enabled at any time.

Delete a policy

Find the policy and click Delete in the Actions column.

Important

Deleted policies cannot be restored.

What's next