Skip to content

Commit 05f4b3f

Browse files
authored
Merge pull request #657 from MicrosoftDocs/main
Publish main to live, Monday 10:30AM PDT, 06/10
2 parents 2add3c0 + cb952c0 commit 05f4b3f

11 files changed

+41
-183
lines changed

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,11 +91,9 @@ In the following table, identify the setting you want to configure, and then use
9191

9292
| Setting | OMA-URI, data type, & values |
9393
|---|---|
94-
| **Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match | `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2` |
94+
| **Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match | `./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2` |
9595
| **Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on | `./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices` |
9696
| **Enable device control** <br/>Enable or disable device control on the device | `./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`<br/><br/>Integer:<br/>- Disable = `0`<br/>- Enable = `1` |
97-
| **Evidence data remote location** <br/>Device control moves evidence data captured | `./Vendor/MSFT/Defender/Configuration/DataDuplicationRemoteLocation`<br/><br/>String |
98-
| **Local evidence cache duration** <br/>Sets the retention period in days for files in the local device control cache | `./Vendor/MSFT/Defender/Configuration/DataDuplicationLocalRetentionPeriod`<br/><br/>Integer <br/>Example: `60` (60 days) |
9997

10098
### Creating policies with OMA-URI
10199

defender-endpoint/device-control-policies.md

Lines changed: 0 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -660,26 +660,6 @@ Then the group is then referenced as parameters in an entry, as illustrated in t
660660
</Entry>
661661
```
662662

663-
### File Conditions
664-
665-
The following table describes file group properties:
666-
667-
| Name | Description |
668-
|---|---|
669-
| `PathId` | String, value of file path or name. <br/>Wildcards are supported. <br/>Only applicable for file type groups. |
670-
671-
The following table illustrates how properties are added to the `DescriptorIdList` of a file group:
672-
673-
```xml
674-
675-
<Group Id="{e5f619a7-5c58-4927-90cd-75da2348a30f}" Type="File" MatchType="MatchAny">
676-
<DescriptorIdList>
677-
<PathId>*.exe</PathId>
678-
<PathId>*.dll</PathId>
679-
</DescriptorIdList>
680-
</Group>
681-
```
682-
683663
The group is then referenced as parameters in an entry, as illustrated in the following snippet:
684664

685665
```xml
@@ -734,53 +714,6 @@ The group is then referenced as parameters in an entry, as illustrated in the fo
734714
</Entry>
735715
```
736716

737-
## File evidence
738-
739-
With device control, you can store evidence of files that were copied to removable devices or were printed. When file evidence is enabled, a `RemovableStorageFileEvent` is created. The behavior of file evidence is controlled by options on the Allow action, as described in the following table:
740-
741-
| Option | Description |
742-
|---|---|
743-
| `8` | Create a `RemovableStorageFileEvent` event with `FileEvidenceLocation` |
744-
| `16` | Create a `RemovableStorageFileEvent` without `FileEvidenceLocation` |
745-
746-
The `FileEvidenceLocation` field of has the location of the evidence file, if one is created. The evidence file has a name which ends in `.dup`, and its location is controlled by the `DataDuplicationFolder` setting.
747-
748-
### Storing file evidence in Azure Blob Storage
749-
750-
1. Create an Azure Blob Storage account and container.
751-
752-
2. Create a custom role called `Device Control Evidence Data Provider` for accessing the container. The role should have the following permissions:
753-
754-
```json
755-
"permissions": [
756-
{
757-
"actions": [
758-
"Microsoft.Storage/storageAccounts/blobServices/containers/read",
759-
"Microsoft.Storage/storageAccounts/blobServices/containers/write",
760-
"Microsoft.Storage/storageAccounts/blobServices/read"
761-
],
762-
"notActions": [],
763-
"dataActions": [
764-
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action",
765-
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"
766-
],
767-
"notDataActions": []
768-
}
769-
]
770-
```
771-
772-
Custom roles can be created via [CLI](/azure/role-based-access-control/custom-roles-cli) or [PowerShell](/azure/role-based-access-control/custom-roles-powershell)
773-
774-
> [!TIP]
775-
> The built-in role, [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles/storage) has delete permissions for the container, which is not required to store device control feature evidence. The built-in role, [Storage Blob Data Reader](/azure/role-based-access-control/built-in-roles/storage) lacks the write permissions that are required. This is why a custom role is recommended.
776-
777-
> [!IMPORTANT]
778-
> To ensure that the integrity of the file evidence use [Azure Immutable Storage](/azure/storage/blobs/immutable-storage-overview)
779-
780-
3. Assign the users of device control to the `Device Control Evidence Data Provider` role.
781-
782-
4. Set the `RemoteStorageFileEvent` to the URL of the Azure Blob Storage container.
783-
784717
## Next steps
785718

786719
- [View device control events and information in Microsoft Defender for Endpoint](device-control-report.md)

defender-endpoint/device-control-report.md

Lines changed: 0 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -67,34 +67,6 @@ DeviceEvents
6767
6868
```
6969

70-
### Example 2: Removable storage file event
71-
72-
If a policy is configured to gather file evidence, then a `RemovableStorageFileEvent` is created. The event is generated for both printers and removable storage devices. Here's an example query you can use with advanced hunting:
73-
74-
```kusto
75-
76-
//information of the evidence file
77-
DeviceEvents
78-
| where ActionType contains "RemovableStorageFileEvent"
79-
| extend parsed=parse_json(AdditionalFields)
80-
| extend Policy = tostring(parsed.Policy)
81-
| extend PolicyRuleId = tostring(parsed.PolicyRuleId)
82-
| extend MediaClassName = tostring(parsed.ClassName)
83-
| extend MediaInstanceId = tostring(parsed.InstanceId)
84-
| extend MediaName = tostring(parsed.MediaName)
85-
| extend MediaProductId = tostring(parsed.ProductId)
86-
| extend MediaVendorId = tostring(parsed.VendorId)
87-
| extend MediaSerialNumber = tostring(parsed.SerialNumber)
88-
| extend FileInformationOperation = tostring(parsed.DuplicatedOperation)
89-
| extend FileEvidenceLocation = tostring(parsed.TargetFileLocation)
90-
| project Timestamp, DeviceId, DeviceName, InitiatingProcessAccountName, ActionType, Policy, PolicyRuleId, FileInformationOperation, MediaClassName, MediaInstanceId, MediaName, MediaProductId, MediaVendorId, MediaSerialNumber, FileName, FolderPath, FileSize, FileEvidenceLocation, AdditionalFields
91-
| order by Timestamp desc
92-
93-
```
94-
95-
> [!NOTE]
96-
> The `RemovableStorageFileEvent` does not appear immediately after a file is copied to the device. It may take as long as 24 hours to appear.
97-
9870
## [**Device control report**](#tab/report)
9971

10072
## Device control report

0 commit comments

Comments
 (0)