Maybe this can help. https://rahuljindalmyit.blogspot.com/2023/02/deny-all-access-to-removable-storage.html
How to restrict USB devices installation on Windows 10 devices managed by Intune (Attack Sufrace Reduction)
Hello everyone,
I am trying to restrict access to USB devices and limit the USB thumbs devices that can be installed/accessible on certain Windows machines I enrolled to Intune.
I have following this: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/mde-device-control-device-installation?view=o365-worldwide
Created a policy under Endpoint Security > Attack Surface reduction > Create Policy (with Device Control type selected)
The policy has the following configured:
- Allow installation of devices that match any of these device IDs (Enabled and added all the Instance IDs from the devices I want allowed)
- Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria (Enabled)
- Prevent installation of devices not described by other policy settings (Enabled)
- Every other setting was left Not Enalbled.
I pushed the policy to the devices. On the devices I can notice the following registry key getting populated with Device Instance IDs:
| Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions |
|---|
| AllowInstanceIDs |
I also noticed the following registry keys on the same location:
But all my tests with the devices that are not on the Instance IDs list specified fail. All the USB devices are able to be installed and accessed form this device.
I am mainly testing with USB thumb drives.
Any input or feedback will be valued.
Thank you!
Regards,