Blog Post

Intune Customer Success
3 MIN READ

New device control capabilities to manage removable storage media access in Microsoft Intune

Intune_Support_Team's avatar
Intune_Support_Team
Silver Contributor
Oct 31, 2022

By: Laura Arrizza – Product Manager | Microsoft Intune

 

Intune is excited to announce new device control capabilities that allows greater flexibility for enhanced endpoint security. This feature allows IT admins to manage access and use of removable storage devices, such as USB and solid-state drives, on Intune-managed devices. Admins will be able to configure the allow, block, or auditing permissions to read, write, and execute access to specific removable storage devices, enabling scenarios like allowing only authorized users to have write access to a set of authorized USBs or preventing read access to specific removable storage for specific user groups on a shared PC.

 

To use this feature, customers can target and configure their device control policies for Windows 10 and later and that have the latest anti-malware client version. The settings leverage Microsoft Defender for Endpoint detailed in Microsoft Defender for Endpoint Device Control Removable Storage Access Control.

 

Create a reusable setting group

To begin, admins will need to set up a reusable setting group. The reusable setting group allows for the same settings to be applied across multiple devices. To configure reusable settings, navigate to the Endpoint Security pane and select the Attack surface reduction section in the Endpoint Manager admin center. There will be a new tab available to manage “Reusable setting groups.” You will see groups of removable storage media that can later be referenced when defining the device control policy. The tab also shows existing groups and the number of device control policies that are inheriting the group properties.

 

A screenshot of the Attack surface reduction setup on the Endpoint security pane in Intune.

 

To create a new reusable setting group, select Add and give the setting group a name and description. Next, define the list of removable storage media. Up to 100 entries can be listed in a single reusable setting group. Each removable storage device can be given a name and leverage any of the device properties to reference it. To find the property value for a given media, right-click on it in Device Manager and select Properties to view the removable storage device information. Once the set of media has been defined, you can choose the relationship of how multiple device properties are used via the “Match type” setting.

 

A screenshot of configuring reusable settings in the Endpoint Manager admin center.

Create a new device control policy

After the reusable group has been saved and successfully created, the admin can create a new device control policy, which now includes the option to configure the removable storage access control settings.

 

To begin, name the setting instance by navigating to Endpoint security > Attack surface reduction > Create policy, “Name the setting”. Select the reusable setting group(s) that contains removable storage media to either include or exclude from the defined access control role. Then, Edit entry and define each access control instance. Name the setting instance then select the allow, prevent, or auditing action behavior. Choose the level of access and scope the settings to a specific user or device group, as desired. Multiple entries can be added, allowing for flexibility and granular control.

 

A screenshot of configuring a profile in the Attack surface reduction option in Intune.

 

Once complete, admins can target the policy using the Assignments tab. If any changes need to be made to the reusable setting groups, the linked policy will inherit them.

 

For customers who have access to the Microsoft 365 Defender portal with E5 reporting subscription , audit events for covered access will appear in advanced hunting reports if this has been configured in the policy.

 

Example query script for event auditing.

 

A screenshot of the Microsoft 365 Defender portal with example audit events.

 

If you have questions or comments for the Intune team, reply to this post or reach out to @IntuneSuppTeam on Twitter.

Updated Dec 19, 2023
Version 2.0

80 Comments

  • MagicHair it should, you just won't have the events in the security portal.

     

    Jakub Piesikmy apologies ..., it seems AAD group support was added and you should provide the AAD group's ObjectId (haven't tested it myself yet).

    https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/deploy-manage-removable-storage-intune?view=o365-worldwide 

  • zachmintonSTENA's avatar
    zachmintonSTENA
    Copper Contributor

    @Intune_Support_Team
    It appears if you use the Custom OMA URIs settings as defined here:
    https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/deploy-manage-removable-storage-intune?view=o365-worldwide

    These will deploy and work with no issue however if you take exactly what was created and deployed with the Cutom OMA URIs and put it in the new Device Control settings these do not function and fail to apply with a conflict error it acts the policy conflicts with itself

  • JonAbbott's avatar
    JonAbbott
    Copper Contributor

    zachmintonSTENA I see the same issue.  Having disabled and mirrored the OMA-URI RSAC rules, this reports a Conflict on the Policy rules and fails to apply any policy.  Our fall-back rule is to block everything and that isn't being applied either.


    Intune_Support_Team I've also noticed it doesn't offer separate Disk level and File system level access control.  Are the two now combined or is this only configuring Disk level access?

    There's also an issue with policy reordering.  Although there's three dots to the left of the policy rule entries which allow reordering, when saving the reorder is lost.

  • zachmintonSTENA's avatar
    zachmintonSTENA
    Copper Contributor

    Intune_Support_Team it seems this doesn't seem to function yet as trying to even deploy it results in it either reporting a Conflict (Which shouldn't be possible as these settings never existed before) or results in an error 65000

  • DylanThomasCSAC's avatar
    DylanThomasCSAC
    Copper Contributor

    We've created a new reusable setting with the PrimaryID defined as 'RemovableMediaDevices' and then created a new ASR Device Control policy, where we've 'included' this setting with the Deny action, which should theoretically block all RemovableMediaDevices... however this hasn't happened. Are we missing something here? The plan for us is to put a blanket block in place for all removable media, and have a list of predefined devices which we permit in our environment. Some of these will be unblocked for everyone, others will be unblocked on a per-team basis. What's the best way to configure with the new Device Control structure?

  • Jakub Piesik's avatar
    Jakub Piesik
    Brass Contributor

    Glenn_Van_Rymenant so...still nothing interesting for specific case.

    Because for couple countries, some of users are allowed to use USB rest are not allowed. 😉 

  • MagicHair's avatar
    MagicHair
    Brass Contributor

    Do the endpoint need to have been on-boarded into MDE for this to work? Or is enrollment into Intune enough?

    Also does it work with Defender for business?