|
1 | 1 | ---
|
2 | 2 | title: Device control policies in Microsoft Defender for Endpoint
|
3 | 3 | description: Learn about Device control policies in Defender for Endpoint
|
4 |
| -author: siosulli |
5 |
| -ms.author: siosulli |
| 4 | +author: denisebmsft |
| 5 | +ms.author: deniseb |
6 | 6 | manager: deniseb
|
7 |
| -ms.date: 09/13/2024 |
| 7 | +ms.date: 09/18/2024 |
8 | 8 | ms.topic: overview
|
9 | 9 | ms.service: defender-endpoint
|
10 | 10 | ms.subservice: asr
|
@@ -73,7 +73,7 @@ Device control policies can be applied to users and/or user groups.
|
73 | 73 | > [!NOTE]
|
74 | 74 | > In the articles related to device control, groups of users are referred to as <i>user groups</i>. The term <i>groups</i> refer to [groups](#groups) defined in the device control policy.
|
75 | 75 |
|
76 |
| - Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id. |
| 76 | +Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id. |
77 | 77 |
|
78 | 78 | On Windows, a user or user group can be a condition on an [entry](#entries) in a policy.
|
79 | 79 |
|
@@ -198,15 +198,29 @@ Device control policies define access (called an entry) for a set of devices. En
|
198 | 198 | | Action | Allow <br/> Deny <br/> AuditAllow <br/> AuditDeny |
|
199 | 199 | | Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> |
|
200 | 200 |
|
201 |
| -If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied. |
| 201 | +### Entry evaluation |
| 202 | + |
| 203 | +There are two types of entries: enforcement entries (Allow/Deny) and audit entries (AuditAllow/AuditDeny). |
| 204 | + |
| 205 | +Enforcement entries for a rule are evaluated in order until all of the requested permissions have been matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied. |
| 206 | + |
| 207 | +### Audit entries |
| 208 | + |
| 209 | +Audit events control the behavior when device control enforces a rule (allow/deny). Device control can display a notification to the end-user. The user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied. |
| 210 | + |
| 211 | +Device control can also create an event that is available in Advanced Hunting. |
| 212 | + |
| 213 | +> [!IMPORTANT] |
| 214 | +> There is a limit of 300 events per device per day. Audit entries are processed after the enforcement decision has been made. All corresponding audit entries are evaluated. |
| 215 | +
|
| 216 | +### Conditions |
202 | 217 |
|
203 | 218 | An entry supports the following optional conditions:
|
204 | 219 |
|
205 | 220 | - User/User Group Condition: Applies the action only to the user/user group identified by the SID
|
206 | 221 |
|
207 | 222 | > [!NOTE]
|
208 |
| -> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored localy, use the Security Identifier (SID) |
209 |
| -
|
| 223 | +> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored locally, use the Security Identifier (SID) |
210 | 224 | > [!NOTE]
|
211 | 225 | > On Windows, The SID of the user who's signed in can be retrieved by running the PowerShell command `whoami /user`.
|
212 | 226 |
|
|
0 commit comments