mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 12:53:38 +00:00
Added related topics and items under allow installation area
Added images and context under allow installation section. As well I added on link to the related topics section.
This commit is contained in:
@ -134,6 +134,14 @@ One way to approach allowing installation and usage of USB drives and other peri
|
|||||||
>2. Enable **allow installation of devices using drivers that match these device setup classes** for all [device setup classes](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/system-defined-device-setup-classes-available-to-vendors).
|
>2. Enable **allow installation of devices using drivers that match these device setup classes** for all [device setup classes](https://docs.microsoft.com/en-us/windows-hardware/drivers/install/system-defined-device-setup-classes-available-to-vendors).
|
||||||
To enforce the policy for already installed devices, apply the prevent policies that have this setting.
|
To enforce the policy for already installed devices, apply the prevent policies that have this setting.
|
||||||
|
|
||||||
|
When configuring the allow device installation policy, you will need to allow all parent attributes as well. You can view the parents of a device by opening device manager and view by connection.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
In this example, the following classesneeded to be added: HID, Keboard, and {36fc9e60-c465-11cf-8056-444553540000}. More information on [Microsoft-provided USB drivers](https://docs.microsoft.com/en-us/windows-hardware/drivers/usbcon/supported-usb-classes).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
If you want to restrict to certain devices, remove the device setup class of the peripheral that you want to limit. Then add the device id that you want to add. For example,
|
If you want to restrict to certain devices, remove the device setup class of the peripheral that you want to limit. Then add the device id that you want to add. For example,
|
||||||
|
|
||||||
1. Remove class USBDevice from the **allow installation of devices using drivers that match these device setup**
|
1. Remove class USBDevice from the **allow installation of devices using drivers that match these device setup**
|
||||||
@ -256,6 +264,7 @@ Both machine and file level actions can be applied.
|
|||||||
- [Defender/AllowFullScanRemovableDriveScanning](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-allowfullscanremovabledrivescanning)
|
- [Defender/AllowFullScanRemovableDriveScanning](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-allowfullscanremovabledrivescanning)
|
||||||
- [Policy/DeviceInstallation CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation)
|
- [Policy/DeviceInstallation CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation)
|
||||||
- [Perform a custom scan of a removable device](https://aka.ms/scanusb)
|
- [Perform a custom scan of a removable device](https://aka.ms/scanusb)
|
||||||
|
- [Device Control PowerBI Template for custom reporting](https://github.com/microsoft/MDATP-PowerBI-Templates)
|
||||||
- [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview)
|
- [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview)
|
||||||
- [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure)
|
- [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure)
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user