The "SmartDocs" bar can customize this page to show only the features present on a particular Zebra device.
OSX, MX and Android version information for a device can be found in the Android Settings panel or by querying the device through ADB, EMDK or the MX CSP. More info.
The USB Manager (UsbMgr) controls which USB functions can be used on the device.
Android devices generally have one or more Universal Serial Bus (USB) ports that can be used for various purposes. A given USB port could implement "Host" mode, which is used to connect various USB peripherals (e.g. mice, keyboards, USB storage devices) to the Android device. A given USB port could implement "Peripheral" mode, which is used to connect the Android device to a Host, such as a PC. A given USB port could implement On The Go (OTG) support, which can act in either "Host" or "Peripheral" mode, based on the cable connected.
Controls whether to allow all USB peripherals to be used when the device is in USB Host Mode or to restrict usage to peripherals as defined in Rules created by the administrator. Works with Custom Rules List parameter.
On devices with MX 11.5 and later, MX allows an administrator to control which USB peripherals can be used by the mobile device when in Host Mode. Allowed peripherals can be categorized by device class, vendor ID (VID), product ID (PID) as described in an XML-based list of rules created by the administrator. See Host Mode Peripherals for more information.
Controls whether the device is allowed to use the USB module, which controls USB peripherals in and connected to the device.
Parm Name: UsbModuleUsage
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
OSX: 1.3+ MX: 4.2+ |
||
1 | Enable | Allows usage of the USB module. |
OSX: 1.3+ MX: 4.2+ |
||
2 | Disable | Prevents usage of the USB module. |
OSX: 1.3+ MX: 4.2+ |
Used to select the default operating mode of the USB port each time the device establishes a client-mode USB connection with a host PC. NOTE: File Transfer mode (option 4) is bi-directional; it allows files to be copied from the host PC to the device and/or from the device to the host PC.
Note: This parameter is not applicable to devices connected through the Zebra Workstation Connect cradle; previously configured USB Client Mode settings are ignored while the device is docked.
Shown if: USB All Access Device Storage Usage is NOT "Disable"
Parm Name: UsbClientModeDefault
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
86 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
MX: 10.4+ Android API: 29+ |
||
0 | Charging only (no data transfer) | Sets USB port for battery charging only. |
MX: 10.4+ Android API: 29+ |
||
4 | File Transfer | Sets USB port for bi-directional copying of files between the the mobile device and the host PC. |
MX: 10.4+ Android API: 29+ |
||
8 | MIDI | Sets USB port for use with Musical Instrument Digital Interface (MIDI) apps. |
MX: 10.4+ Android API: 29+ |
||
16 | PTP | Sets USB port for use with Picture Transfer Protocol (PTP) apps. |
MX: 10.4+ Android API: 29+ |
||
32 | USB tethering | Sets USB port for tethering the device for sharing its internet connection with the host PC. |
MX: 10.4+ Android API: 29+ |
Controls whether to allow all USB peripherals to be used when the device is in USB Host Mode or to restrict usage to peripherals as defined in Rules created by the administrator using the Custom Rules parameter. Allowed USB peripherals connect "silently" to the device, displaying no pop-up message to the user upon connection. Optionally, such rules also can permit an app to launch on connection and/or grant an app permission to access the peripheral.
Parm Name: HostModePeripherals
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
MX: 11.6+ Android API: 30+ |
||
1 | Custom (rules list) | Restricts USB peripheral usage and pop-ups to a set of admin-defined rules while device is in USB Host Mode. |
MX: 11.6+ Android API: 30+ |
||
2 | Allow all (default) | Allows connections and pop-ups of all USB periherals when device is in USB Host Mode (default). |
MX: 11.6+ Android API: 30+ |
Used to enter one or more custom rules by which to control USB peripheral usage when the device is in USB Host Mode. Allowed peripherals can be categorized by device class (sometimes referred to as device "type"), vendor ID (VID) and/or product ID (PID). When a device is in USB Host Mode and a Custom Rules file is deployed, a given USB peripheral is usable only if there is at least one rule that allows it, and unusable if there are NO rules that allow it. Rules also can be used to "pre-grant" app(s) permission to use the peripheral(s) without a pop-up message seeking permission from the device user.
More than one rule can apply to the same peripheral. For example, if a rule allowing all printers existed with a rule to allow all devices from Zebra (VID = 0A5F), Zebra printers would remain usable if either of those rules were deleted.
All connected USB peripherals NOT explicitly allowed are rendered unusable by apps. Such peripherals continue to receive power (via USB) and in some cases could appear to be enabled, but are effectively prevented from communicating with apps.
Parm value input rules:
To use the Custom Rules List parameter, create a file using the format below to specify the device class(es), vendor(s) and/or product(s) to be allowed. Then paste the file's XML-formatted contents into the Custom Rules List field in the relevant StageNow or EMM device-configuration Profile.
<?xml version="1.0" encoding="UTF-8"?>
<usbconfig mode="whitelist">
<class>AINPUT_SOURCE_DPAD</class>
<class>AINPUT_SOURCE_JOYSTICK</class>
<class>USB_CLASS_AUDIO</class>
<vid vendorid="1504">
<pid>5889</pid>
</vid>
</usbconfig>
<?xml version="1.0" encoding="UTF-8"?>
<popupsuppress>
<rule>
<pkg>com.example.usbpopup</pkg>
<cert>appsigningcertificate</cert>
<vid vendorid="1008">
<pid>842</pid></vid>
</rule>
</popupsuppress>
<usbconfig mode="whitelist">
<class>USB_CLASS_MASS_STORAGE</class>
</usbconfig>
* Restricted class; NOT effective as a device rule.
Shown if: Host Mode Peripherals is set to "Custom (rules list)"
Parm Name: CustomRules
Requires:
- MX: 11.6+
- Android API: 30+
Controls whether the use of USB External Storage devices will be allowed. When allowed, a USB External Storage device could have to be connected via a USB port that supports Host mode or via an OTG USB port with an OTG adapter cable or OTG compliant storage device. Use of USB External Storage could represent a security risk since it could be used as a path to extract sensitive data from a device or to inject unwanted data or applications into a device.
Shown if: The "USB Module Usage" value is not "Disable"
Parm Name: UsbExternalStorageUsage
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
OSX: 4.1+ MX: 4.2+ |
||
1 | Enable | This value will cause use of USB External Storage to be allowed. |
OSX: 4.1+ MX: 4.2+ |
||
2 | Disable | This value will cause use of USB External Storage to be prevented. |
OSX: 4.1+ MX: 4.2+ |
Controls whether Android Debug Bridge (ADB) mode can be enabled on the device. When allowed, a PC could be connected to the device through a USB port that supports Peripheral mode or by using a USB "on the go" cable. Once connected, an ADB command line tool could allow communication between the PC and the Android device for copying files, installing apps, running shell commands, etc. Use of ADB could represent a security risk since it could be used as a path to extract sensitive data from a device, to inject unwanted data or applications into a device, or to remove or modify the operation of important applications on a device.
Status: In devices running Android 13 and later, this feature can be accessed through StageNow and compatible EMM systems, or using Android Device Policy Manager (DPM) APIs.
Shown if: The "USB Module Usage" value is not "Disable"
Parm Name: UsbADBUsage
Controls whether the use of any direct method of accessing device storage from a PC via USB is allowed. This controls the use of USB Mass Storage (UMS), Media Transfer Protocol (MTP) and Picture Transfer Protocol (PTP). Does not control the use of ADB mode, which is controlled separately.
When these modes are allowed, a PC could be connected to the device via a USB port that supports Peripheral mode or using an "on-the-go" (OTG) USB port. Once connected, such a PC could browse exposed portions of the device file system, copy files to or from the device, delete files, etc. Use of these modes could represent a security risk since it could be used as a path to extract sensitive data from a device, to inject unwanted data or applications into a device, or to delete important information from a device.
Shown if: The "USB Module Usage" value is not "Disable"
Parm Name: UsbAllAccessDeviceStorageUsage
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
OSX: 4.1+ MX: 4.2+ |
||
1 | Enable | Allows access to device storage from a PC via USB. This value will also prevent other parms from being presented since individual modes cannot be controlled if all modes are being allowed. |
OSX: 4.1+ MX: 4.2+ |
||
2 | Disable | Prevents access to device storage from a PC via USB. This value will also prevent other parms from being presented since individual modes cannot be controlled if all modes are being prevented. |
OSX: 4.1+ MX: 4.2+ |
The is the On/Off switch for the use of Media Transfer Protocol (MTP) on the device. When this mode is enabled, a PC can connect to the device through a USB port that supports Peripheral mode or the "on-the-go" specification. Once connected, such a PC could browse exposed portions of the device file system, copy files to or from the device, or delete files. Use of this mode could represent a security risk since it could be used as a path to extract sensitive data from a device, to inject unwanted data or applications into a device, or to delete important information from a device.
Shown if: The "USB Module Usage" value is not "Disable" *AND* the "Access device storage from PC via USB" value is not "Enable" or "Disable"
Parm Name: UsbMTPAccessDeviceStorageUsage
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
OSX: 4.1+ MX: 4.2+ |
||
1 | Enable | This value will cause access to the device storage from a PC via USB MTP to be allowed. |
OSX: 4.1+ MX: 4.2+ |
||
2 | Disable | This value will cause access to the device storage from a PC via USB MTP to be prevented. |
OSX: 4.1+ MX: 4.2+ |
This is the On/Off switch for the use of Picture Transfer Protocol (PTP) on the device. When this mode is enabled, a PC can connect to the device through a USB port that supports Peripheral mode or the "on-the-go" specification. Once connected, such a PC could browse exposed portions of the device file system, copy files to or from the device, or delete files. Use of this mode could represent a security risk since it could be used as a path to extract sensitive data from a device, to inject unwanted data or applications into a device, or to delete important information from a device.
Shown if: The "USB Module Usage" value is not "Disable" *AND* the "Access device storage from PC via USB" value is not "Enable" or "Disable"
Parm Name: UsbPTPAccessDeviceStorageUsage
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings on the device; any previous setting is retained. |
OSX: 4.1+ MX: 4.2+ |
||
1 | Enable | Allows access to the device storage from a PC using USB PTP. |
OSX: 4.1+ MX: 4.2+ |
||
2 | Disable | Prevents access to the device storage from a PC using USB PTP. |
OSX: 4.1+ MX: 4.2+ |
Controls access to the device as USB Mass Storage (UMS). When this mode is allowed, a PC can be connected to the device through a USB port that supports Peripheral mode or using an "on-the-go" (OTG) USB port. Once connected, such a PC could browse exposed portions of the device file system, copy files to or from the device, delete files, or even format an entire storage volume. Use of this mode could represent a security risk since it could be used as a path to extract sensitive data from a device, to inject unwanted data or applications into a device, or to delete important information from a device.
Note: This feature is not supported on devices running Android 5.x Lollipop or later.
Shown if: The "USB Module Usage" value is NOT "Disable" AND the "Access device storage from PC via USB" value is NEITHER "Enable" nor "Disable"
Parm Name: UsbUMSAccessDeviceStorageUsage
Option | Name | Description | Note | Status | Requires |
---|---|---|---|---|---|
0 | Do not change | This value (or the absence of this parm from the XML) causes no change to settings; any previously selected setting is retained. |
OSX: 4.1 - 5.4 NOT IN OSX 6.0 OR LATER MX: 4.2+ |
||
1 | Enable | Enables access to device storage from a PC via USB UMS. |
OSX: 4.1 - 5.4 NOT IN OSX 6.0 OR LATER MX: 4.2+ |
||
2 | Disable | Disables access to device storage from a PC. |
OSX: 4.1 - 5.4 NOT IN OSX 6.0 OR LATER MX: 4.2+ |