You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-intune.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,11 +91,9 @@ In the following table, identify the setting you want to configure, and then use
91
91
92
92
| Setting | OMA-URI, data type, & values |
93
93
|---|---|
94
-
|**Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match |`./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2`|
94
+
|**Device control default enforcement** <br/>Default enforcement establishes what decisions are made during device control access checks when none of the policy rules match |`./Vendor/MSFT/Defender/Configuration/DefaultEnforcement`<br/><br/>Integer: <br/>- `DefaultEnforcementAllow` = `1`<br/>- `DefaultEnforcementDeny` = `2`|
95
95
|**Device types** <br/>Device types, identified by their Primary IDs, with device control protection turned on |`./Vendor/MSFT/Defender/Configuration/SecuredDevicesConfiguration`<br/><br/>String:<br/>- `RemovableMediaDevices`<br/>- `CdRomDevices`<br/>- `WpdDevices`<br/>- `PrinterDevices`|
96
96
|**Enable device control** <br/>Enable or disable device control on the device |`./Vendor/MSFT/Defender/Configuration/DeviceControlEnabled`<br/><br/>Integer:<br/>- Disable = `0`<br/>- Enable = `1`|
97
-
|**Evidence data remote location** <br/>Device control moves evidence data captured |`./Vendor/MSFT/Defender/Configuration/DataDuplicationRemoteLocation`<br/><br/>String |
98
-
|**Local evidence cache duration** <br/>Sets the retention period in days for files in the local device control cache |`./Vendor/MSFT/Defender/Configuration/DataDuplicationLocalRetentionPeriod`<br/><br/>Integer <br/>Example: `60` (60 days) |
The group is then referenced as parameters in an entry, as illustrated in the following snippet:
684
664
685
665
```xml
@@ -734,53 +714,6 @@ The group is then referenced as parameters in an entry, as illustrated in the fo
734
714
</Entry>
735
715
```
736
716
737
-
## File evidence
738
-
739
-
With device control, you can store evidence of files that were copied to removable devices or were printed. When file evidence is enabled, a `RemovableStorageFileEvent` is created. The behavior of file evidence is controlled by options on the Allow action, as described in the following table:
740
-
741
-
| Option | Description |
742
-
|---|---|
743
-
|`8`| Create a `RemovableStorageFileEvent` event with `FileEvidenceLocation`|
744
-
|`16`| Create a `RemovableStorageFileEvent` without `FileEvidenceLocation`|
745
-
746
-
The `FileEvidenceLocation` field of has the location of the evidence file, if one is created. The evidence file has a name which ends in `.dup`, and its location is controlled by the `DataDuplicationFolder` setting.
747
-
748
-
### Storing file evidence in Azure Blob Storage
749
-
750
-
1. Create an Azure Blob Storage account and container.
751
-
752
-
2. Create a custom role called `Device Control Evidence Data Provider` for accessing the container. The role should have the following permissions:
Custom roles can be created via [CLI](/azure/role-based-access-control/custom-roles-cli) or [PowerShell](/azure/role-based-access-control/custom-roles-powershell)
773
-
774
-
> [!TIP]
775
-
> The built-in role, [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles/storage) has delete permissions for the container, which is not required to store device control feature evidence. The built-in role, [Storage Blob Data Reader](/azure/role-based-access-control/built-in-roles/storage) lacks the write permissions that are required. This is why a custom role is recommended.
776
-
777
-
> [!IMPORTANT]
778
-
> To ensure that the integrity of the file evidence use [Azure Immutable Storage](/azure/storage/blobs/immutable-storage-overview)
779
-
780
-
3. Assign the users of device control to the `Device Control Evidence Data Provider` role.
781
-
782
-
4. Set the `RemoteStorageFileEvent` to the URL of the Azure Blob Storage container.
783
-
784
717
## Next steps
785
718
786
719
-[View device control events and information in Microsoft Defender for Endpoint](device-control-report.md)
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-report.md
-28Lines changed: 0 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,34 +67,6 @@ DeviceEvents
67
67
68
68
```
69
69
70
-
### Example 2: Removable storage file event
71
-
72
-
If a policy is configured to gather file evidence, then a `RemovableStorageFileEvent` is created. The event is generated for both printers and removable storage devices. Here's an example query you can use with advanced hunting:
73
-
74
-
```kusto
75
-
76
-
//information of the evidence file
77
-
DeviceEvents
78
-
| where ActionType contains "RemovableStorageFileEvent"
0 commit comments