Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Many organizations want to block specific types of USB devices, such as USB flash drives or cameras. You might also want to allow specific USB devices, such as a keyboard or mouse.
You can use the settings catalog in Microsoft Intune to configure these settings in a policy, and then deploy this policy to your Windows devices. For more information on the settings catalog, see Use the settings catalog to configure device settings in Microsoft Intune.
This article shows you:
- How to create a settings catalog policy with USB settings in the Intune admin center
- How to use a log file to troubleshoot devices that shouldn't be blocked
This article applies to:
- Windows 11
- Windows 10
Prerequisites
- To configure the settings catalog policy, at a minimum, sign into the Intune admin center with the Policy and Profile manager role. For information on the built-in roles in Intune, and what they can do, go to Role-based access control (RBAC) with Microsoft Intune.
Create the profile
This policy gives an example of how to block (or allow) features that affect USB devices. You can use this policy as a starting point, and then add or remove settings as needed for your organization.
Sign in to the Microsoft Intune admin center.
Select Devices > Manage devices > Configuration > Create > New policy.
Enter the following properties:
- Platform: Select Windows 10 and later.
- Profile type: Select Settings catalog.
Select Create.
In Basics, enter the following properties:
- Name: Enter a descriptive name for the profile. For example, enter Restrict USB devices.
- Description: Enter a description for the profile. This setting is optional, but recommended.
Select Next.
In Configuration settings, select Add settings. In the settings picker, go to Administrative templates > System > Device installation > Device Installation Restrictions. Select the following settings:
- Allow installation of devices that match any of these Device IDs
- Allow installation of devices using drivers that match these device setup classes
- Prevent installation of devices not described by other policy settings
Close the settings picker. Configure the settings you selected:
Allow installation of devices that match any of these Device IDs: Select Enabled. Add the device/hardware IDs for devices you want to allow.
To get the device/hardware ID, you can use Device Manager, find the device, and look at the properties. For the specific steps, see find the hardware ID on a Windows device.
There's also some helpful device ID information at Deploy and manage device control in Microsoft Defender for Endpoint with Microsoft Intune.
Allow installation of devices using drivers that match these device setup classes: Select Enabled. Add the System-defined device setup classes available to vendors you want to allow.
In the following image, the Keyboard, Mouse, and Multimedia classes are allowed.
Prevent installation of devices not described by other policy settings: Select Enabled.
When the settings are enabled and configured, your policy looks similar to the following policy settings:
Select Next.
In Scope tags (optional), assign a tag to filter the profile to specific IT groups, such as
US-NC IT Team
orJohnGlenn_ITDepartment
. For more information about scope tags, see Use role-based access control (RBAC) and scope tags for distributed IT.Select Next.
In Assignments, select the device groups that will receive the profile. Select Next.
In Review + create, review your settings. When you select Create, your changes are saved and the profile is assigned.
Verify on Windows devices
After the device configuration profile is deployed to your targeted devices, you can confirm that it works correctly.
If a USB device is blocked from installing, then you see a message similar to the following message:
The installation of this device is forbidden by system policy. Contact your system administrator.
In the following example, the iPad is blocked because its device ID isn't in the allowed device ID list:
A device is blocked but should be allowed
Some USB devices have multiple GUIDs, and it's common to miss some GUIDs in your policy settings. As a result, a USB device that's allowed in your settings, might be blocked on the device.
In the following example, in the Allow installation of devices using drivers that match these device setup classes setting, the Multimedia class GUID is entered, and the camera is blocked:
Resolution:
To find the GUID of your device, use the following steps:
On the device, open the
%windir%\inf\setupapi.dev.log
file.In the file:
Search for Restricted installation of devices not described by policy.
In this section, find the
Class GUID of device changed to: {GUID}
text. Add this{GUID}
to your policy.In the following example, you see the
Class GUID of device changed to: {36fc9e60-c465-11cf-8056-444553540000}
text:>>> [Device Install (Hardware initiated) - USB\VID_046D&PID_C534\5&bd89ed7&0&2] >>> Section start 2020/01/20 17:26:03.547 dvi: {Build Driver List} 17:26:03.597 … dvi: {Build Driver List - exit(0x00000000)} 17:26:03.645 dvi: {DIF_SELECTBESTCOMPATDRV} 17:26:03.647 dvi: Default installer: Enter 17:26:03.647 dvi: {Select Best Driver} dvi: Class GUID of device changed to: {36fc9e60-c465-11cf-8056-444553540000}. dvi: Selected Driver: dvi: Description - USB Composite Device dvi: InfFile - c:\windows\system32\driverstore\filerepository\usb.inf_amd64_9646056539e4be37\usb.inf dvi: Section - Composite.Dev dvi: {Select Best Driver - exit(0x00000000)} dvi: Default installer: Exit dvi: {DIF_SELECTBESTCOMPATDRV - exit(0x00000000)} 17:26:03.664 dvi: {Core Device Install} 17:26:03.666 dvi: {Install Device - USB\VID_046D&PID_C534\5&BD89ED7&0&2} 17:26:03.667 dvi: Device Status: 0x01806400, Problem: 0x1 (0xc0000361) dvi: Parent device: USB\ROOT_HUB30\4&278ca476&0&0 !!! pol: The device is explicitly restricted by the following policy settings: !!! pol: [-] Restricted installation of devices not described by policy !!! pol: {Device installation policy check [USB\VID_046D&PID_C534\5&BD89ED7&0&2] exit(0xe0000248)} !!! dvi: Installation of device is blocked by policy! ! dvi: Queueing up error report for device install failure. dvi: {Install Device - exit(0xe0000248)} 17:26:03.692 dvi: {Core Device Install - exit(0xe0000248)} 17:26:03.694 <<< Section end 2020/01/20 17:26:03.697 <<< [Exit status: FAILURE(0xe0000248)]
In the device configuration profile, go to the Allow installation of devices using drivers that match these device setup classes setting, and add the class GUID from the log file.
If the issue continues, repeat these steps to add the other class GUIDs until the device is successfully installed.
In our example, the following class GUIDs are added to the device profile:
- USB Bus devices (hubs and host controllers):
{36fc9e60-c465-11cf-8056-444553540000}
- Human Interface Devices (HID):
{745a17a0-74d3-11d0-b6fe-00a0c90f57da}
- Camera devices:
{ca3e7ab9-b4c3-4ae6-8251-579ef933890f}
- Imaging devices:
{6bdd1fc6-810f-11d0-bec7-08002be2092f}
- USB Bus devices (hubs and host controllers):
Common class GUIDs to allow USB devices
Keyboard and mouse: Add the following GUIDs to the device profile:
- Keyboard:
{4d36e96b-e325-11ce-bfc1-08002be10318}
- Mouse:
{4d36e96f-e325-11ce-bfc1-08002be10318}
- Keyboard:
Cameras, headphones and microphones: Add the following GUIDs to the device profile:
- USB Bus devices (hubs and host controllers):
{36fc9e60-c465-11cf-8056-444553540000}
- Human Interface Devices (HID):
{745a17a0-74d3-11d0-b6fe-00a0c90f57da}
- Multimedia devices:
{4d36e96c-e325-11ce-bfc1-08002be10318}
- Camera devices:
{ca3e7ab9-b4c3-4ae6-8251-579ef933890f}
- Imaging devices:
{6bdd1fc6-810f-11d0-bec7-08002be2092f}
- System devices:
{4D36E97D-E325-11CE-BFC1-08002BE10318}
- Biometric devices:
{53d29ef7-377c-4d14-864b-eb3a85769359}
- Generic software devices:
{62f9c741-b25a-46ce-b54c-9bccce08b6f2}
- USB Bus devices (hubs and host controllers):
3.5 mm headphones: Add the following GUIDs to the device profile:
- Multimedia devices:
{4d36e96c-e325-11ce-bfc1-08002be10318}
- Audio endpoint:
{c166523c-fe0c-4a94-a586-f1a80cfbbf3e}
- Multimedia devices:
Note
The actual GUIDs might be different for your specific devices.