Skip to content

Commit 460101b

Browse files
authored
Merge pull request #1355 from j0shbregman/docs-editor/device-control-policies-1726495676
Update device-control-policies.md
2 parents a1884cb + b5eba98 commit 460101b

File tree

1 file changed

+21
-7
lines changed

1 file changed

+21
-7
lines changed

defender-endpoint/device-control-policies.md

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Device control policies in Microsoft Defender for Endpoint
33
description: Learn about Device control policies in Defender for Endpoint
4-
author: siosulli
5-
ms.author: siosulli
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 09/13/2024
7+
ms.date: 09/18/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -73,7 +73,7 @@ Device control policies can be applied to users and/or user groups.
7373
> [!NOTE]
7474
> In the articles related to device control, groups of users are referred to as <i>user groups</i>. The term <i>groups</i> refer to [groups](#groups) defined in the device control policy.
7575
76-
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
76+
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
7777

7878
On Windows, a user or user group can be a condition on an [entry](#entries) in a policy.
7979

@@ -198,15 +198,29 @@ Device control policies define access (called an entry) for a set of devices. En
198198
| Action | Allow <br/> Deny <br/> AuditAllow <br/> AuditDeny |
199199
| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> |
200200

201-
If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
201+
### Entry evaluation
202+
203+
There are two types of entries: enforcement entries (Allow/Deny) and audit entries (AuditAllow/AuditDeny).
204+
205+
Enforcement entries for a rule are evaluated in order until all of the requested permissions have been matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied.
206+
207+
### Audit entries
208+
209+
Audit events control the behavior when device control enforces a rule (allow/deny). Device control can display a notification to the end-user. The user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
210+
211+
Device control can also create an event that is available in Advanced Hunting.
212+
213+
> [!IMPORTANT]
214+
> There is a limit of 300 events per device per day. Audit entries are processed after the enforcement decision has been made. All corresponding audit entries are evaluated.
215+
216+
### Conditions
202217

203218
An entry supports the following optional conditions:
204219

205220
- User/User Group Condition: Applies the action only to the user/user group identified by the SID
206221

207222
> [!NOTE]
208-
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored localy, use the Security Identifier (SID)
209-
223+
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored locally, use the Security Identifier (SID)
210224
> [!NOTE]
211225
> On Windows, The SID of the user who's signed in can be retrieved by running the PowerShell command `whoami /user`.
212226

0 commit comments

Comments
 (0)