Added note

This commit is contained in:
ManikaDhiman 2019-09-23 14:14:52 -07:00
parent 550b39f6c6
commit 3418449fcc

View File

@ -6,17 +6,13 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.date: 01/14/2019
ms.date: 09/23/2019
ms.reviewer:
manager: dansimp
---
# Policy CSP - Storage
> [!WARNING]
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
<hr/>
<!--Policies-->
@ -627,7 +623,10 @@ ADMX Info:
<!--/Scope-->
<!--Description-->
If you enable this policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class. Note: To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives."
If you enable this policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class.
> [!Note]
> To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives."
Supported values:
- 0 - Disable
@ -647,7 +646,8 @@ ADMX Info:
<!--/SupportedValues-->
<!--Example-->
Example for setting the device custom OMA-URI setting for this policy:
To deny write access to removable storage within Intunes custom profile, set the OMA-URI, ```.\[device|user]\vendor\msft\policy\[config|result]\Storage/RemovableDiskDenyWriteAccess```, with integer=1.
<!--/Example-->
<!--Validation-->