You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-gpo.md
+8-26Lines changed: 8 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 02/14/2024
7
+
ms.date: 08/27/2024
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -34,7 +34,7 @@ If you're using Group Policy to manage Defender for Endpoint settings, you can u
34
34
35
35
:::image type="content" source="media/deploy-dc-gpo/enable-disable-rsac.png" alt-text="Screenshot of enable disable rsac." lightbox="media/deploy-dc-gpo/enable-disable-rsac.png":::
36
36
37
-
1. On a device running Windows, go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Features**\>**Device Control**.
37
+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Features** > **Device Control**.
38
38
39
39
2. In the **Device Control** window, select **Enabled**.
40
40
@@ -49,7 +49,7 @@ You can set default access such as, `Deny` or `Allow` for all device control fea
49
49
50
50
For example, you can have either a `Deny` or an `Allow` policy for `RemovableMediaDevices`, but not for `CdRomDevices` or `WpdDevices`. If you set `Default Deny` through this policy, then Read/Write/Execute access to `CdRomDevices` or `WpdDevices` is blocked. If you only want to manage storage, make sure to create `Allow` policy for printers. Otherwise, default enforcement (Deny) is applied to printers, too.
51
51
52
-
1. On a device running Windows, go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Features**\>**Device Control**\>**Select Device Control Default Enforcement Policy**.
52
+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Features** > **Device Control** > **Select Device Control Default Enforcement Policy**.
53
53
54
54
2. In the **Select Device Control Default Enforcement Policy** window, select **Default Deny**.
55
55
@@ -59,7 +59,7 @@ For example, you can have either a `Deny` or an `Allow` policy for `RemovableMed
59
59
60
60
To configure the device types that a device control policy is applied, follow these steps:
61
61
62
-
1. On a computer running Windows, go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Device Control**\>**Turn on device control for specific device types**.
62
+
1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**.
63
63
64
64
2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
65
65
@@ -75,7 +75,7 @@ To configure the device types that a device control policy is applied, follow th
75
75
76
76
4. Define the settings as follows:
77
77
78
-
1. On a device running Windows, go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Device Control**\>**Define device control policy groups**.
78
+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy groups**.
79
79
80
80
2. In the **Define device control policy groups** window, specify the network share file path containing the XML groups data.
81
81
@@ -97,33 +97,15 @@ You can create different group types. Here's one group example XML file for any
97
97
98
98
4. Define the settings as follows:
99
99
100
-
1. On a device running Windows, go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Device Control**\>**Define device control policy rules**.
100
+
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy rules**.
101
101
102
102
2. In the **Define device control policy rules** window, select **Enabled**, and then specify the network share file path containing the XML rules data.
103
103
104
+
> [!NOTE]
105
+
> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
104
106
> [!NOTE]
105
107
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
106
108
107
-
## Set location for a copy of the file (evidence)
108
-
109
-
:::image type="content" source="media/deploy-dc-gpo/set-loc-copy-file.png" alt-text="Screenshot of set location for a copy of the file." lightbox="media/deploy-dc-gpo/set-loc-copy-file.png":::
110
-
111
-
If you want to have a copy of the file (evidence) having Write access, set right **Options** in your removable storage access policy rule in the XML file, and then specify the location where system can save the copy.
112
-
113
-
1. On a device running Windows, go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Device Control**\>**Define Device Control evidence data remote location**.
114
-
115
-
2. In the **Define Device Control evidence data remote location** window, select **Enabled**, and then specify the local or network share folder path.
116
-
117
-
## Retention period for local evidence cache
118
-
119
-
:::image type="content" source="media/deploy-dc-gpo/retention-loc-cache.png" alt-text="Screenshot of retention period for local cache." lightbox="media/deploy-dc-gpo/retention-loc-cache.png":::
120
-
121
-
If you want to change the default value of 60 days for persisting the local cache for file evidence, follow these steps:
122
-
123
-
1. Go to **Computer Configuration**\>**Administrative Templates**\>**Windows Components**\>**Microsoft Defender Antivirus**\>**Device Control**\>**Set the retention period for files in the local device control cache**.
124
-
125
-
2. In the **Set the retention period for files in the local device control cache** window, select **Enabled**, and then enter the number of days to retain the local cache (default 60).
126
-
127
109
## See also
128
110
129
111
-[Device control in Defender for Endpoint](device-control-overview.md)
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-overview.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get an overview of device control, including removable storage acce
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 05/15/2024
7
+
ms.date: 08/27/2024
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -62,7 +62,7 @@ Device control capabilities from Microsoft can be organized into three main cate
62
62
- Device control in Microsoft Defender can be managed using Intune or [Group Policy](device-control-deploy-manage-gpo.md).
63
63
-**Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md).
64
64
65
-
-**Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about).
65
+
-**Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. Endpoint DLP can capture file evidence. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about).
66
66
67
67
## Common device control scenarios
68
68
@@ -187,6 +187,10 @@ Device control can also restrict the types of files that are printed. Device con
187
187
188
188
To block printing of documents based on information classification use [Endpoint DLP](/purview/endpoint-dlp-learn-about).
189
189
190
+
### Use Endpoint DLP to capture file evidence of printed files
191
+
192
+
To capture evidence of a file being printed, use [Endpoint DLP](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
193
+
190
194
## Control access to Bluetooth devices
191
195
192
196
You can use device control to control access to Bluetooth services on Windows devices or by using Endpoint DLP.
@@ -202,6 +206,10 @@ Administrators can control the behavior of the Bluetooth service (Allowing adver
202
206
203
207
To block copying of sensitive document to any Bluetooth Device use [Endpoint DLP](/purview/endpoint-dlp-learn-about).
204
208
209
+
### Use Endpoint DLP to capture file evidence of files copied to USB
210
+
211
+
To capture evidence of a file being copied to a USB, use [Endpoint DLP](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
212
+
205
213
## Device control policy samples and scenarios
206
214
207
215
Device control in Defender for Endpoint provides your security team with a robust access control model that enables a wide range of scenarios (see [Device control policies](device-control-policies.md)). We have put together a GitHub repository that contains samples and scenarios you can explore. See the following resources:
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-policies.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 06/04/2024
7
+
ms.date: 08/27/2024
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -194,9 +194,9 @@ Device control policies define access (called an entry) for a set of devices. En
194
194
195
195
| Entry setting | Options |
196
196
|---|---|
197
-
| AccessMask | Applies the action only if the access operations match the access mask - The access mask is the bit-wise OR of the access values:<br><br> 1 - Device Read<br>2 - Device Write<br>4 - Device Execute<br>8 - File Read<br>16 - File Write<br>32 - File Execute<br>64 - Print<br><br>For example:<br>Device Read, Write, and Execute = 7 (1+2+4)<br>Device Read, Disk Read = 9 (1+8)<br>
197
+
| AccessMask | Applies the action only if the access operations match the access mask - The access mask is the bit-wise OR of the access values:<br><br> 1 - Device Read<br>2 - Device Write<br>4 - Device Execute<br>8 - File Read<br>16 - File Write<br>32 - File Execute<br>64 - Print<br><br>For example:<br>Device Read, Write, and Execute = 7 (1+2+4)<br>Device Read, Disk Read = 9 (1+8)<br>|
| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> File evidence is captured |
199
+
| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> |
200
200
201
201
If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
202
202
@@ -254,7 +254,7 @@ The following table provides more context for the XML code snippet:
254
254
|---|---|---|
255
255
|`Entry Id`| GUID, a unique ID, represents the entry and is used in reporting and troubleshooting. | You can generate the GUID by using PowerShell. |
256
256
|`Type`| Defines the action for the removable storage groups in `IncludedIDList`. <br/>- `Allow` <br/>- `Deny` <br/>- `AuditAllowed`: Defines notification and event when access is allowed <br/>- `AuditDenied`: Defines notification and event when access is denied; works together with a `Deny` entry. <br/><br/>When there are conflict types for the same media, the system applies the first one in the policy. An example of a conflict type is `Allow` and `Deny`. | - `Allow` <br/>- `Deny` <br/>- `AuditAllowed` <br/>- `AuditDenied`|
257
-
|`Option`| If type is `Allow`| - `0`: nothing <br/>- `4`: disable `AuditAllowed` and `AuditDenied` for this entry. If `Allow` occurs and the `AuditAllowed` setting is configured, events aren't generated.<br/>- `8`: create a copy of the file as evidence, and generate a `RemovableStorageFileEvent` event. This setting must be used together with the **Set location for a copy of the file** setting in [Intune](device-control-deploy-manage-intune.md) or [Group Policy](device-control-deploy-manage-gpo.md).|
257
+
|`Option`| If type is `Allow`| - `0`: nothing <br/>- `4`: disable `AuditAllowed` and `AuditDenied` for this entry. If `Allow` occurs and the `AuditAllowed` setting is configured, events aren't generated. |
258
258
|`Option`| If type is `Deny`| - `0`: nothing <br/>- `4`: disable `AuditDenied` for this Entry. If Block occurs and the `AuditDenied` is setting configured, the system doesn't show notifications. |
259
259
|`Option`| If type is `AuditAllowed`| - `0`: nothing<br/>- `1`: nothing <br/>- `2`: send event |
260
260
|`Option`| If type is `AuditDenied`| - `0`: nothing <br/>- `1`: show notification <br/>- `2`: send event <br/>- `3`: show notification and send event |
0 commit comments