Removable Media (Device Control)
To satisfy NIST 3.8.1 and 3.8.7 with SOC visibility, we replace the standard Administrative Template blocks with a granular, XML-based Device Control policy. This requires a two-part setup: a Reusable Setting (the allowed hardware) and the ASR Profile (the block/audit rules).
Step 1: Create the Reusable Setting (The Whitelist)
- In the Intune Admin Center, navigate to Endpoint Security > Attack Surface Reduction.
- Click the Reusable settings tab at the top.
- Click Add.
- Name the setting
Custom - Device Control - Approved SanDisk USBs. - Under Configuration settings, click Add and paste the Approved Hardware XML (containing the Vendor ID and Product ID) detailed in the main architecture chapter.
- Save the reusable setting.
Step 2: Create the Device Control Profile
- Return to the Summary tab of Attack Surface Reduction and click Create Profile.
- Select Platform: Windows 10, later, and Windows Copilot+ PCs.
- Select Profile: Device Control, then click Create.
- Name the profile
Win - Custom - ES - Device Control (Block & Audit). - In the Configuration settings step, locate the Device Control setting and upload the Policy Rule XML (the file that blocks writes and generates the
AuditDeniedSOC alert). - Under the Included ID List or Excluded ID List section of the UI, click Select reusable settings and link the
Approved SanDisk USBsgroup you created in Step 1. - Click Review + save and assign to your deployment rings.
📩 Don't Miss the Next Solution
Join the list to see the real-time solutions I'm delivering to my GCC High clients.