mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 12:53:38 +00:00
Merge pull request #815 from MicrosoftDocs/master
updating v-jowirt with Master
This commit is contained in:
@ -114,7 +114,7 @@ To prevent malware infections or data loss, an organization may restrict USB dri
|
||||
|
||||
All of the above controls can be set through the Intune [Administrative Templates](https://docs.microsoft.com/en-us/intune/administrative-templates-windows). The relevant policies are located here in the Intune Administrator Templates:
|
||||
|
||||

|
||||

|
||||
|
||||
>[!Note]
|
||||
>Using Intune, you can apply device configuration policies to AAD user and/or device groups.
|
||||
@ -199,13 +199,13 @@ Windows Defender ATP blocks installation and usage of prohibited peripherals by
|
||||
|
||||
The Microsoft Defender Advanced Threat Protection (ATP) baseline settings, represent the recommended configuration for ATP. Configuration settings for baseline are located here in the edit profile page of the configuration settings.
|
||||
|
||||

|
||||

|
||||
|
||||
### Bluetooth
|
||||
|
||||
Using Intune, you can limited the services that can use Bluetooth through the “Bluetooth allowed services”. The default state of “Bluetooth allowed services” settings means everything is allowed. As soon as a service is added, that becomes the allowed list. If the customer adds the Keyboards and Mice values, and don’t add the file transfer GUIDs, file transfer should be blocked.
|
||||
|
||||

|
||||

|
||||
|
||||
## Detect plug and play connected events
|
||||
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 211 KiB |
Binary file not shown.
After Width: | Height: | Size: 111 KiB |
Binary file not shown.
After Width: | Height: | Size: 126 KiB |
Reference in New Issue
Block a user