How does the KM Switch with roaming present peripherals to the OS?

I really want to get one to connect my PCs, but I want to make sure I’ll be able to use it with my work PC.
Certain types of peripherals are blocked on my work PC, so if it presents as just a basic peripheral I’m hoping it could also allow me to use disallowed devices in an “allowed” way.

(If the point of them being blocked is to prevent devices that can store info or communicate things other than pointer/key-press data, in your opinion, do you think the KM switch would sufficiently prevent malicious data transfer?)

This topic was automatically closed 273 days after the last reply. New replies are no longer allowed.