new topic

This commit is contained in:
Justin Hall
2018-11-12 16:00:57 -08:00
parent c944630db8
commit 5f460889f8

View File

@ -18,10 +18,14 @@ ms.date: 11/12/2018
You can configure Intune settings to reduce threats from removable storage such as USB devices, including these options:
- Completely block the use of removable storage or USB
- Allow removable storage or USB connections but block unsigned or untrusted processes from running
- [Completely block the use of removable storage or USB](#completely-block-removable-storage-or-usb-connections)
- [Allow removable storage or USB connections but block unsigned or untrusted processes from running](#allow-removable-storage-or-usb-connections-but-block-unsigned-or-untrusted-processes-from-running)
You can also [run a PowerShell script to perform a custom scan](https://aka.ms/scanusb) of a USB drive after it is mounted.
>[!NOTE]
>For more comprehensive data loss prevention for Windows 10 devices, you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device.
>For more comprehensive data loss prevention for Windows 10 devices, you can configure [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) and [Windows Information Protection](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure), which will encrypt company data even if it is stored on a personal device.
## Completely block removable storage or USB connections
## Allow removable storage or USB connections but block unsigned or untrusted processes from running