Limit Hardware Installation
Block users or groups from installing or using unapproved hardware on systems, including USB devices.
Techniques Addressed by Mitigation
Block unknown devices and accessories by endpoint security configuration and monitoring agent.
|Enterprise||T1091||Replication Through Removable Media||
Limit the use of USB devices and removable media within a network.