Skip to content

Commit e81cd03

Browse files
authored
Merge pull request #60 from AndNovian/patch-3
Update device-control-deploy-manage-intune.md (Typo and formatting + Note Update)
2 parents 24890be + 5f75da7 commit e81cd03

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 07/25/2024
7+
ms.date: 07/30/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -80,7 +80,7 @@ You can add audit policies, and you can add Allow/Deny policies. It is recommend
8080
> If you only configure audit policies, the permissions are inherited from the default enforcement setting.
8181
8282
> [!NOTE]
83-
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to Deny, any allow policy results in blocking actions.
83+
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to `Deny`, and create an `Allow` policy to be applied specific devices, all devices are blocked except for any devices that are set in the `Allow` policy.
8484
8585
## Defining Settings with OMA-URI
8686

@@ -104,13 +104,13 @@ When you create policies with OMA-URI in Intune, create one XML file for each po
104104
In the **Add Row** pane, specify the following settings:
105105

106106
- In the **Name** field, type `Allow Read Activity`.
107-
- In the **OMA-URI** field, type `/Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`.
107+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`. (You could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[PolicyRule Id]`.)
108108
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
109109

110110
You can use parameters to set conditions for specific entries. Here's a [group example XML file for Allow Read access for each removable storage](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Intune%20OMA-URI/Allow%20Read.xml).
111111

112112
> [!NOTE]
113-
> Comments using XML comment notation <!-- COMMENT --> can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
113+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
114114
115115
### Creating groups with OMA-URI
116116

@@ -121,7 +121,7 @@ When you create groups with OMA-URI in Intune, create one XML file for each grou
121121
In the **Add Row** pane, specify the following settings:
122122

123123
- In the **Name** field, type `Any Removable Storage Group`.
124-
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b**[GroupId]**%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**.)
124+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b[GroupId]%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**. Or, you could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[GroupId]`.)
125125
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
126126

127127
> [!NOTE]

0 commit comments

Comments
 (0)