Skip to main content

About Accessory & Storage Access Library Item

Iru Endpoint’s Accessory & Storage Access Library Item allows you, as the device or security administrator, to define access privileges and controls for external storage volumes, server volumes, and DMG file types on Mac computers.
To use this Library Item, the Endpoint Detection & Response add-on is necessary. However, you do not need to assign the EDR Library Item to the device Blueprint in order to deploy this Library Item.

How It Works

The Accessory & Storage Access Library Item provides granular control over storage device access on managed Mac computers. It allows administrators to configure access privileges for external storage devices, disk images, and server volumes, with options for encryption requirements, password protection, and user-specific access controls.

Adding an Accessory & Storage Access Library Item

To add this Library Item to your Iru Endpoint Library, follow the steps outlined in the Library Overview article.
1

Name the Library Item

Give the new Accessory & Storage Access Library Item a Name.
2

Assign to Blueprints

Assign to your desired Blueprints.

Configuring External Volumes

The External volumes section allows you to manage access privileges for external storage devices such as USB, CD, and DVD drives connected to the accessory port and memory cards (SD, SDXC) inserted in the SD card slot. To manage access for external volumes, follow the steps below.
The Require encryption and Require admin password to access settings are only available for Read & Write and Read only access privileges.
1

Enable External Volume Management

Turn on management for external volumes.
2

Configure Access Privileges

From the Access privileges menu, select the desired access privileges for external volumes. The available options are: Read & Write, Read only, or No access.
3

Set Encryption Requirements

Optionally, select Require encryption to ensure only encrypted volumes are mounted. For information about using Disk Utility to encrypt storage devices, see this Apple support article.
4

Configure Password Protection

Optionally, select Require admin password to access to prompt users for an admin password to access content.
5

Set User Scope

Select All users to apply the access privileges to all users, including admin, or select Standard users to apply the access privileges only to standard users.
6

Configure Alert Messages

Optionally, select Display alert messages to alert users when the mounting of external volumes are blocked. Note, this setting is forced on when Require admin password to access is selected.
BylCixaksvL2hNh_uH4ez_nQXslfX0rjgQ

Configuring Disk Images

The Disk images section allows you to manage access privileges for DMG file types. To manage access for disk images, follow the steps below. Disk image settings specified here will apply to all DMG mounts on the device, including those in scripted automated workflows and in-app DMG mounts such as Google Chrome’s Auto Update Agent.
The Require admin password to access setting is only available for Read & Write and Read only access privileges.
1

Enable Disk Image Management

Turn on management for disk images.
2

Configure Access Privileges

The Access privileges menu allows you to select the desired access privileges for disk images. The available options are: Read & Write, Read only, or No access.
3

Set Password Protection

Optionally, select Require admin password to access to prompt users for an admin password to access content.
4

Set User Scope

Select All users to apply the access privileges to all users, including admin, or select Standard users to apply the access privileges only to standard users.
5

Configure Alert Messages

Optionally, select Display alert messages to alert users when the mounting of disk images is blocked. Note, this setting is forced on when Require admin password to access is selected.
4ZnF8-asPD0L4xHOcp5WrdNUun3semwdGQ

Configuring Server Volumes

The Server volumes section allows you to manage access privileges for server volume mounts such as SMB shares. To manage access for server volumes, follow the steps below.
Any external, server and DMG volumes previously mounted on the device prior to the deployment of this Library Item will not be managed by Iru Endpoint until these items are unmounted and a re-mount is attempted.
1

Enable Server Volume Management

Turn on management for server volumes.
2

Configure Access Privileges

Choose the desired access privileges for disk images from the Access privileges menu. The available options are: Read & Write or No access.
3

Set User Scope

Select All users to apply the access privileges to all users, including admin, or select Standard users to apply the access privileges only to standard users.
4

Configure Alert Messages

Optionally, select Display alert messages to display alert messages to users when the mounting of external volumes is blocked.
5

Save Configuration

Click the Save button to save the Accessory & Storage Library Item to your Library.
16ZAM8Zt4tsMyYfg8d1xvG8Iwh2zRot0LA

Understanding Restricted Mode on Apple Silicon

On a Mac with Apple silicon running macOS 13+ and depending on the device’s Privacy & Security settings, when new or unknown USB accessories are used, the user may get an alert asking whether or not the USB accessory should be allowed to connect. This is known as Restricted Mode on macOS and is independent of Device alert settings in this Library Item. Restricted Mode can be managed with the Allow USB accessories while device is locked setting in the Restrictions Library item. See this Apple support article for more details.

Considerations

  • EDR Requirement: The Endpoint Detection & Response add-on is required to use this Library Item, but the EDR Library Item doesn’t need to be assigned to device Blueprints
  • Access Privilege Configuration: Configure appropriate access levels (Read & Write, Read only, No access) based on your security requirements and user needs
  • Encryption Requirements: Use encryption requirements for external volumes to ensure data protection, especially for sensitive information
  • Password Protection: Implement admin password requirements for additional security when accessing external storage devices
  • User Scope Management: Choose between All users and Standard users based on your organization’s access control policies
  • Alert Configuration: Configure alert messages to inform users when access is blocked, improving user experience and security awareness
  • Existing Volume Management: Previously mounted volumes won’t be managed until they are unmounted and re-mounted after Library Item deployment
  • Apple Silicon Compatibility: Be aware of macOS Restricted Mode on Apple Silicon devices, which operates independently of this Library Item’s settings
  • Disk Image Security: DMG file access controls apply to all disk image mounts, including automated workflows and application updates
  • Server Volume Access: Configure server volume access carefully to balance security with legitimate business needs for network storage
  • Testing and Validation: Test configuration changes in a controlled environment to ensure they meet security requirements without disrupting workflows
  • Regular Review: Periodically review and update access privilege settings to align with changing security policies and business requirements