3c6f788
#
3c6f788
# Rule set file path.
3c6f788
#
3c6f788
# The USBGuard daemon will use this file to load the policy
3c6f788
# rule set from it and to write new rules received via the
3c6f788
# IPC interface.
3c6f788
#
3c6f788
# RuleFile=/path/to/rules.conf
3c6f788
#
3c6f788
RuleFile=/etc/usbguard/rules.conf
3c6f788
34e41d6
#
34e41d6
# Implicit policy target.
34e41d6
#
34e41d6
# How to treat devices that don't match any rule in the
34e41d6
# policy. One of:
34e41d6
#
34e41d6
# * allow  - authorize the device
34e41d6
# * block  - block the device
34e41d6
# * reject - remove the device
34e41d6
#
34e41d6
ImplicitPolicyTarget=block
34e41d6
34e41d6
#
34e41d6
# Present device policy.
34e41d6
#
34e41d6
# How to treat devices that are already connected when the
34e41d6
# daemon starts. One of:
34e41d6
#
34e41d6
# * allow        - authorize every present device
34e41d6
# * block        - deauthorize every present device
34e41d6
# * reject       - remove every present device
34e41d6
# * keep         - just sync the internal state and leave it
34e41d6
# * apply-policy - evaluate the ruleset for every present
34e41d6
#                  device
34e41d6
#
d1dc25e
PresentDevicePolicy=apply-policy
34e41d6
34e41d6
#
34e41d6
# Present controller policy.
34e41d6
#
34e41d6
# How to treat USB controllers that are already connected
34e41d6
# when the daemon starts. One of:
34e41d6
#
34e41d6
# * allow        - authorize every present device
34e41d6
# * block        - deauthorize every present device
34e41d6
# * reject       - remove every present device
34e41d6
# * keep         - just sync the internal state and leave it
34e41d6
# * apply-policy - evaluate the ruleset for every present
34e41d6
#                  device
34e41d6
#
161738c
PresentControllerPolicy=keep
34e41d6
3c6f788
#!!! WARNING: It's good practice to set at least one of the !!!
3c6f788
#!!!          two options bellow. If none of them are set,  !!!
3c6f788
#!!!          the daemon will accept IPC connections from   !!!
3c6f788
#!!!          anyone, thus allowing anyone to modify the    !!!
3c6f788
#!!!          rule set and (de)authorize USB devices.       !!!
3c6f788
3c6f788
#
3c6f788
# Users allowed to use the IPC interface.
3c6f788
#
3c6f788
# A space delimited list of usernames that the daemon will
3c6f788
# accept IPC connections from.
3c6f788
#
3c6f788
# IPCAllowedUsers=username1 username2 ...
3c6f788
#
f2a846b
IPCAllowedUsers=root
3c6f788
3c6f788
#
3c6f788
# Groups allowed to use the IPC interface.
3c6f788
#
3c6f788
# A space delimited list of groupnames that the daemon will
3c6f788
# accept IPC connections from.
3c6f788
#
3c6f788
# IPCAllowedGroups=groupname1 groupname2 ...
3c6f788
#
3c6f788
IPCAllowedGroups=wheel
f2a846b
f2a846b
#
f2a846b
# Generate device specific rules including the "via-port"
f2a846b
# attribute.
f2a846b
#
f2a846b
# This option modifies the behavior of the allowDevice
f2a846b
# action. When instructed to generate a permanent rule,
f2a846b
# the action can generate a port specific rule. Because
f2a846b
# some systems have unstable port numbering, the generated
f2a846b
# rule might not match the device after rebooting the system.
f2a846b
#
f2a846b
# If set to false, the generated rule will still contain
f2a846b
# the "parent-hash" attribute which also defines an association
f2a846b
# to the parent device. See usbguard-rules.conf(5) for more
f2a846b
# details.
f2a846b
#
f2a846b
DeviceRulesWithPort=false
d1dc25e
d1dc25e
#
d1dc25e
# USBGuard audit events log file path.
d1dc25e
#
d1dc25e
AuditFilePath=/var/log/usbguard/usbguard-audit.log