2 Ways to Block USB Drives using Intune

There is always a security risk when USB storage drive access is allowed on corporate devices. Users can download sensitive data on External drives, which could affect the organization’s reputation if misused.

Blocking removable storage devices on company-owned devices is essential for preventing potential security breaches. By doing so, you can ensure that confidential information is not saved or copied to personal storage devices, thereby safeguarding sensitive data and maintaining a secure working environment.

This blog post will explore two methods to block USB drives using the Intune admin center. Let’s check these methods.

Method 1 – Using Device Restrictions Intune Template

Using the Intune device configuration profile based on the device restriction template, we will block complete access to removable storage like USB drives. Let’s check the steps to create a policy to block the removable storage on Intune-managed devices.

  • Sign in to the Intune admin center.
  • Go to Devices Configuration Create > New Policy.
  • Select Platform as Windows 10 and later
  • Profile type as Settings Catalog
  • Click on the Create button.
Device restriction template for blocking USB drive via Intune
Device restriction template for blocking USB drive via Intune

Basics Tab

Provide a Name and Description of the Policy and Click on Next.

Configuration settings

Scroll down and Expand the General category settings. Look for Removable storage and use the toggle switch to select Block.

Select Removable storage setting and set it to Block
Select Removable storage setting and set it to Block

Assignments

Assign this profile to an Entra security group containing users or devices. If you add users to the group, the profile will be applied to them even if they change their device. However, if you want to apply this profile to specific devices, target it to an Entra security group containing only devices.

Applicability Rules

You can create rules for assigning this device configuration profile, ensuring it applies only to devices meeting specific criteria, such as OS Edition. If you prefer not to create such a rule, click Next without specifying anything on this page.

Review + create

Review the deployment Summary and click on the Create button.

End-user Experience

Once the policy has been successfully applied, users will encounter an Access is denied message when attempting to access a USB drive. This restriction results from the applied policy, which prevents removable storage.

Error message when accessing USB drive on a Windows device
Error message when accessing USB drive on a Windows device

Method 2 – Using Attack Surface Reduction Policy

Check the steps to block USB drive access by creating an Attack Surface Reduction (ASR) policy.

  • Sign in to the Intune admin center.
  • Click on Endpoint security > Attack surface reduction.
  • Click on + Create Policy.
Using Attack Surface Reduction Policy
Using Attack Surface Reduction Policy
  • Platform: Windows 10, Windows 11, and Windows Server.
  • Profile: Device Control.
Using Attack Surface Reduction Policy

Basics Tab

Provide a Name and Description of the Policy and Click on Next.

Configuration settings Tab

Scroll down to find a Removable Disk Deny Write Access setting under Storage. Use the drop-down and select Enabled. Click on Next.

If you enable this policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class. Note: To require that users write data to BitLocker-protected storage, enable the policy setting “Deny write access to drives not protected by BitLocker,” which is located in “Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives.”

About Removable Disk Deny Write Access
Using Attack Surface Reduction Policy

Scope tags

Click on Next.

Assignments

Assign this profile to an Entra security group containing users or devices. If you add users to the group, the profile will be applied to them even if they change their device. However, if you want to apply this profile to specific devices, target it to an Entra security group containing only devices.

Using Attack Surface Reduction Policy
Using Attack Surface Reduction Policy

Review + create

Review the deployment Summary and click on the Create button.

Sync Intune Policies

The device check-in process might not begin immediately. If you’re testing this policy on a test device, you can manually kickstart the Intune sync from the device itself or remotely through the Intune admin center.

Alternatively, you can use PowerShell to force the Intune sync on Windows devices. Restarting the device is another way to trigger the Intune device check-in process.

Monitoring Deployment Progress

To monitor the deployment progress of a Device configuration profile, follow the below steps:

  • Sign in to the Intune admin center.
  • Click on Devices and then select Configuration profiles
  • Choose the Device Configuration profile you want to work with, and at the top of the page, you’ll see a quick view of the Success, Failure, Conflict, Not Applicable, and In Progress status.
  • Click on View report to access more detailed information.

End-user Experience

Once the policy has been successfully applied, users will encounter a Destination Folder Access is denied message when attempting to write to the USB drive. Read access to the removable storage will still be permitted when you block it using the Removable Disk Deny Write Access policy.

Error message when trying to write to the USB drive
Error message when trying to write to the USB drive

Method 3 – Using Intune Device Remediations

You can leverage Intune Device Remediations to block USB drives. For a detailed, step-by-step guide, please refer to the link: Block USB Drives access on Windows using Intune remediations.

7 thoughts on “2 Ways to Block USB Drives using Intune”

    • Hi Ulisses, Thank you for bringing that to my attention. Please select the platform: Windows 10, Windows 11, and Windows Server, and then choose Device Control. I’ve updated the blog post.

      Reply
  1. If you enable this policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class. Note: To require that users write data to BitLocker-protected storage, enable the policy setting “Deny write access to drives not protected by BitLocker,” which is located in “Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives.”
    Should it be Enabled instead of disabled?

    Reply
  2. I have the same question, why set it to disabled? Surely you need to enable the deny access?

    Alex did you get this working? I cannot figure this out. Something so simple is worded so awkwardly.

    Reply
  3. Hi Jatin,

    With this setup, I can still access the USB and read but cannot write.

    I would like it to stop the access as how you have it on your screenshot.

    Do you know why it is not working for me the way you have?

    Thank you,
    Jay

    Reply
    • Hi Jay, You can use the Device restriction template and configue a setting called Removable storage to Block to block complete access to the USB drives. The post has also been updated.

      Reply

Leave a Comment