Official Site: www.thugon.com

THUGON Port and Device Scanner

Download Full Exe APP (READ THE DISCLAIMER BEFORE YOU USE)

Download THUGON Port and Device Scanner (ZIP)

ZIP File Verification SHA256 Hash:

EB0DDAA2A73147E0394B79D681E3F1C6A57F9A36EE551279D74E815BE01D6AE1

Watch the How-To Video on YouTube

Professional Device Monitoring and Control Tool

The THUGON Port and Device Scanner is a Windows administrative device monitoring and control utility designed to give system administrators, security professionals, and advanced users full visibility into the devices connected to their system. The tool scans and categorizes hardware devices, tracks USB connection history, and provides the ability to safely enable or disable specific device types directly from an intuitive graphical interface.

Built with reliability and system-level visibility in mind, the tool integrates with Windows device management and event logging systems to provide detailed device information, operational status, and connection history for USB and storage devices. This enables improved oversight of endpoint hardware activity and helps maintain system control in environments where device monitoring is important.

How the Tool Works

The THUGON Port and Device Scanner queries Windows Plug-and-Play device information and system event logs to build a live inventory of all hardware devices connected to the system. Devices are categorized by type and status, allowing administrators to quickly identify USB devices, storage devices, network adapters, Bluetooth hardware, and other components.

The application also reads Windows driver framework event logs to retrieve recent USB device activity. This history allows users to see when devices were connected and identify important attributes such as vendor, product identification, revision number, and serial identifiers when available.

Through administrative controls built into the interface, supported device types can be enabled or disabled directly using Windows device management commands. All actions performed through the tool can be logged locally for reference and review.

Special Notes For Investigators

When investigating USB devices, it is important to understand that Windows records information about device installation, connections, users, and activity in multiple locations across the system. Pay particular attention to the earlier discussion on “USERS” logging, as it can provide valuable insights during an investigation. Relevant data sources may include registry keys, event logs, system databases, and user-specific metadata. This tool captures only a subset of these data points, offering initial clues rather than a complete picture. Use these clues to guide a more thorough examination of other sources as needed.

USB devices can also contain hidden or non-standard structures, such as concealed volumes, unallocated sectors, or undocumented partitions. These areas may not be immediately visible through standard file explorers or system utilities, and they may store data that is not logged in typical Windows sources. By analyzing the NAND flash memory or examining low-level device structures, you can detect discrepancies between the documented device layout and its actual state, which can be critical for forensic or investigative purposes.

In short, this tool is a starting point—it highlights potential areas of interest but cannot replace a comprehensive forensic examination. Always consider multiple sources of system and device data, and use low-level analysis when hidden or unexpected storage areas may exist.

Key Features

Disclaimer

This software is provided as-is, where-is without warranties of any kind. The authors make no guarantees regarding performance, compatibility, or suitability for any particular purpose. Users assume full responsibility for operation and use of the software in their own environment.

Important Safety Notice: Enabling or disabling all ports, devices, or drivers may cause your system to become unstable or experience a critical failure (Blue Screen of Death). On Windows PCs, some drivers do not interact well with others. Overriding these settings can cause unpredictable behavior. This is a known issue with Windows, not the software. Use extreme caution when modifying device settings.

All rights reserved by www.thugon.com.