Device control in Microsoft Defender for Endpoint (2024)

  • Article

Applies to:

  • Microsoft Defender for Endpoint Plan 1
  • Microsoft Defender for Endpoint Plan 2
  • Microsoft Defender for Business

Device control capabilities in Microsoft Defender for Endpoint enable your security team to control whether users can install and use peripheral devices, like removable storage (USB thumb drives, CDs, disks, etc.), printers, Bluetooth devices, or other devices with their computers. Your security team can configure device control policies to configure rules like these:

  • Prevent users from installing and using certain devices (like USB drives)
  • Prevent users from installing and using any external devices with specific exceptions
  • Allow users to install and use specific devices
  • Allow users to install and use only BitLocker-encrypted devices with Windows computers

This list is intended to provide some examples. It's not an exhaustive list; there are other examples to consider (see the device control in Windows section in this article).

Device control helps protect your organization from potential data loss, malware, or other cyberthreats by allowing or preventing certain devices to be connected to users' computers. With device control, your security team can determine whether and what peripheral devices users can install and use on their computers.

Device control in Windows

This section lists scenarios for device control in Windows.

Tip

If you're using Mac, device control can control access to Bluetooth, iOS devices, portable devices such as cameras, and removable media such as USB devices. See Device Control for macOS.

Select a tab, review the scenarios, and then identify the type of device control policy to create.

  • Removable storage
  • Printers
  • Bluetooth
ScenarioDevice control policy
Prevent installation of a specific USB deviceDevice control in Windows. See Device control policies.
Prevent installation of all USB devices while allowing an installation of only an authorized USBDevice control in Windows. See Device control policies.
Prevent Write and Execute access to all but allow specific approved USBsDevice control in Defender for Endpoint. See Device control policies.
Audit Write and Execute access for all but block specific blocked USBsDevice control in Defender for Endpoint. See Device control policies.
Block read and execute access to specific file extensionDevice control in Microsoft Defender. See Device control policies.
Block people from access removable storage when the machine isn't connecting corporate networkDevice control in Microsoft Defender. See Device control policies.
Block write access to removable data drives not protected by BitLockerDevice control in Windows. See BitLocker.
Block write access to devices configured in another organizationDevice control in Windows. See BitLocker.
Prevent copying of sensitive files to USBEndpoint DLP

Supported devices

Device control supports Bluetooth devices, CD/ROMs and DVD devices, printers, USB devices, and other types of portable devices. On a Windows device, based on the driver, some peripheral devices are marked as removable. The following table lists examples of devices that device control supports with their primary_id values and media class names:

Device typePrimaryId in Windowsprimary_id in macOSMedia Class Name
Bluetooth devicesbluetoothDeviceBluetooth Devices
CD/ROMs, DVDsCdRomDevicesCD-Roms
iOS devicesappleDevice
Portable devices (such as cameras)portableDevice
PrintersPrinterDevicesPrinters
USB devices (removable media)RemovableMediaDevicesremovableMediaUSB
Windows Portable DevicesWpdDevicesWindows Portable Devices (WPD)

Categories of Microsoft device control capabilities

Device control capabilities from Microsoft can be organized into three main categories: device control in Windows, device control in Defender for Endpoint, and Endpoint Data Loss Prevention (Endpoint DLP).

  • Device control in Windows. The Windows operating system has built-in device control capabilities. Your security team can configure device installation settings to prevent (or allow) users from installing certain devices on their computers. Policies are applied at the device level, and use various device properties to determine whether or not a user can install/use a device. Device control in Windows works with BitLocker and ADMX templates, and can be managed using Intune.

    • BitLocker and Intune. BitLocker is a Windows security feature that provides encryption for entire volumes. Together with Intune, policies can be configured to enforce encryption on devices using BitLocker for Windows (and FileVault for Mac). For more information, see Disk encryption policy settings for endpoint security in Intune.

    • Administrative Templates (ADMX) and Intune. You can use ADMX templates to create policies that restrict or allow specific types of USB devices to be used with computers. For more information, see Restrict USB devices and allow specific USB devices using ADMX templates in Intune.

  • Device control in Defender for Endpoint. Device control in Defender for Endpoint provides more advanced capabilities and is cross platform. You can configure device control settings to prevent (or allow) users to have Read, Write, or Execute access to content on removable storage devices. You can define exceptions, and you can choose to employ audit policies that detect but don't block users from accessing their removable storage devices. Policies are applied at the device level, user level, or both. Device control in Microsoft Defender can be managed using Intune.

    • Device control in Microsoft Defender and Intune. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See Configure device restriction settings in Microsoft Intune.
  • Endpoint data loss prevention (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. Learn about Endpoint DLP.

See the device control scenarios section (in this article) for more details about these capabilities.

Device control samples and scenarios

Device control in Defender for Endpoint provides your security team with a robust access control model that enables a wide range of scenarios (see Device control policies). We have put together a GitHub repository that contains samples and scenarios you can explore. See the following resources:

If you're new to device control, see Device control walkthroughs.

Prerequisites

Device control in Defender for Endpoint can be applied to devices running Windows 10 or Windows 11 that have the anti-malware client version 4.18.2103.3 or later. (Currently, servers are not supported.)

  • 4.18.2104 or later: Add SerialNumberId, VID_PID, filepath-based GPO support, and ComputerSid
  • 4.18.2105 or later: Add Wildcard support for HardwareId/DeviceId/InstancePathId/FriendlyNameId/SerialNumberId, the combination of specific user on specific machine, removable SSD (a SanDisk Extreme SSD)/USB Attached SCSI (UAS) support
  • 4.18.2107 or later: Add Windows Portable Device (WPD) support (for mobile devices, such as tablets); add AccountName into advanced hunting
  • 4.18.2205 or later: Expand the default enforcement to Printer. If you set it to Deny, it blocks Printer as well, so if you only want to manage storage, make sure to create a custom policy to allow Printer
  • 4.18.2207 or later: Add File support; the common use case can be: block people from Read/Write/Execute access specific file on removable storage. Add Network and VPN Connection support; the common use case can be: block people from access removable storage when the machine isn't connecting corporate network.

For Mac, see Device Control for macOS.

Currently, device control is not supported on servers.

Next steps

  • Device control walkthroughs
  • Learn about Device control policies
  • View device control reports
Device control in Microsoft Defender for Endpoint (2024)

FAQs

What is endpoint device control? ›

Device control is the technology that ensures protection against data loss by monitoring and controlling data transfers from endpoints to removable storage devices.

How does device control work? ›

Device control refers to the ability to manage and manipulate various aspects of your Android phone's functionalities. It goes beyond the standard interactions and allows users to customize settings, access files remotely, and even troubleshoot issues.

What is device control policy rules? ›

Essentially, device control policies define access for a set of devices. The devices that are in scope are determined by a list of included device groups and a list of excluded device groups. A policy applies if the device is in all of the included device groups and none of the excluded device groups.

How do I select device control default enforcement policy? ›

On a device running Windows, go to Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Features > Device Control > Select Device Control Default Enforcement Policy.

What are the benefits of device control? ›

Device control helps protect your organization from potential data loss, malware, or other cyberthreats by allowing or preventing certain devices to be connected to users' computers. With device control, your security team can determine whether and what peripheral devices users can install and use on their computers.

How do I turn off device control? ›

Android 12: Go to Settings > Display > Lock screen. Under "Show device controls," toggle off the switch next to "Home."

What is an example of a device control? ›

Device control solutions allow organizations to define and enforce policies regarding the use of devices. For example, they can restrict the installation of unauthorized software, block access to certain websites, or enforce strong password requirements.

What is device control in antivirus? ›

Device Control ensures the security of confidential data by restricting user access to devices that are installed on the computer or connected to it, including: Data storage devices (hard drives, removable drives, tape drives, CD/DVD drives) Data transfer tools (modems, external network cards)

What is the purpose of a control device? ›

Purpose of control devices

A control device. processes the input. When processed, this will cause an output to turn on. Sensors gather measurable data, such as a change in light or temperature, which is collected by a processor that is programmed with code on how to respond.

What does device control active mean? ›

Device control enhances your organization's existing endpoint security by giving your team the full control to define, restrict, or block data transfer from external storage media, such as USB (Universal Serial Bus) devices, USB media controllers, USB peripheral ports, CD/DVDs, and Bluetooth storage devices.

What is a device control block? ›

The Device Control (DC) block coordinates the opening and closing of digital devices on the plant floor based upon certain user-defined conditions.

How does device policy work? ›

When the Android Device Policy is installed on your device, it can access your device's: Location—used to check for available WiFi networks, to align with security policies and offer a new network when needed. Phone—used for device registration and to report device IDs to your administrator.

How do I access device controls? ›

People can simply swipe down from the top of the screen to reveal the Quick Settings panel, where they can find a Device Controls tile. Alternatively, they can long-press the power button to launch a lock screen shortcut that shows their connected devices.

How do I stop a device from being managed? ›

To turn off management for all mobile devices, select Turn off mobile management. To turn it off only for certain device types, select Custom. Then, for the devices you don't want to manage, select Unmanaged.

Why is endpoint security on my computer? ›

Windows Defender or Endpoint Protection uses definitions to determine if software that it detects is a virus, spyware, or other potentially unwanted software, and then to alert you to potential risks.

What is an endpoint and what does it do? ›

Endpoints are physical devices that connect to and exchange information with a computer network. Some examples of endpoints are mobile devices, desktop computers, virtual machines, embedded devices, and servers.

What is endpoint controller? ›

The Endpoint Controller makes it possible to send and receive trusted safety commands over a variety of wireless networks. It can be mounted to a machine or machine attachment for remote control.

Top Articles
Latest Posts
Article information

Author: Nicola Considine CPA

Last Updated:

Views: 6628

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Nicola Considine CPA

Birthday: 1993-02-26

Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

Phone: +2681424145499

Job: Government Technician

Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.