IT administrator configuring USB blocking policies in Microsoft Intune admin center
CybersecurityIntermediate

How to Block USB Drives Using Microsoft Intune Attack Surface Reduction Policies

Configure Microsoft Intune Attack Surface Reduction policies to prevent USB drive access on Windows 10/11 devices, protecting against data breaches and malware threats through removable storage restrictions.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
March 11, 202615 min read10 Steps

What You Need

  • Microsoft Intune license with Endpoint security access
  • Windows 10/11 devices enrolled in Intune with Microsoft Defender for Endpoint
  • Entra ID (Azure AD) security groups configured for device assignments
  • Microsoft 365 E5 or equivalent license for full ASR Device Control features
  • Administrative access to Intune admin center (endpoint.microsoft.com)

Why Should Organizations Block USB Drive Access Through Microsoft Intune?

USB drives represent one of the most significant security risks in corporate environments. They can introduce malware, facilitate data exfiltration, and bypass network security controls. Microsoft Intune's Attack Surface Reduction (ASR) policies provide a robust, cloud-based solution for controlling removable storage access across Windows 10 and 11 devices.

This comprehensive guide walks you through implementing USB drive restrictions using Intune's Device Control policies, which leverage Microsoft Defender for Endpoint capabilities to provide granular control over removable storage devices.

What Are the Prerequisites for Implementing USB Blocking in Intune?

Before diving into the configuration process, ensure your environment meets these essential requirements:

  • Licensing: Microsoft 365 E5 or equivalent license for full ASR Device Control features
  • Device Management: Windows 10/11 devices enrolled in Intune with Microsoft Defender for Endpoint enabled
  • Administrative Access: Permissions to access the Intune admin center and configure endpoint security policies
  • Group Management: Entra ID (Azure AD) security groups configured for device assignments
Pro tip: Verify that Microsoft Defender Antivirus is enabled on all target devices before implementing these policies. ASR features require an active Defender installation.

How Do You Access and Navigate Microsoft Intune's Attack Surface Reduction Settings?

Begin by accessing the Microsoft Intune admin center through your web browser. Navigate to https://endpoint.microsoft.com and sign in with administrative credentials that have Endpoint security permissions.

Once authenticated, locate Endpoint security in the left navigation panel and click on Attack surface reduction. This section houses all policies related to reducing potential attack vectors, including device control capabilities.

The Attack surface reduction dashboard displays existing policies and provides options to create new ones. Click + Create Policy to begin configuring your USB blocking policy.

Warning: Ensure you're working in the correct tenant environment. Intune policies deploy immediately to assigned devices, so verify your environment before making changes.

What Platform and Profile Settings Should You Choose for USB Device Control?

When creating a new policy, you'll need to specify the target platform and profile type. For USB drive blocking, configure these settings:

  • Platform: Windows 10, Windows 11, and Windows Server
  • Profile: Device Control

The Device Control profile provides comprehensive options for managing removable storage devices, including USB drives, external hard drives, and other removable media. This profile leverages Microsoft Defender for Endpoint's advanced device control capabilities.

Policy Configuration:
Platform: Windows 10, Windows 11, and Windows Server
Profile: Device Control
Capabilities: Removable storage control, device exceptions, audit mode

How Do You Configure the Basic Policy Information and Naming Convention?

Proper policy naming and documentation are crucial for long-term management. On the Basics tab, provide clear, descriptive information:

  • Name: Use a descriptive format like "USB Write Block - [Department/Scope]"
  • Description: Include the policy's purpose, scope, and any relevant compliance requirements

Example naming conventions:

Policy Names:
- "USB Write Block - Finance Department"
- "Complete USB Block - Executive Devices"
- "USB Read-Only - General Corporate Devices"

Description Template:
"Prevents [read/write/all] access to USB drives to protect against [data exfiltration/malware introduction]. Applied to [target group]. Compliance requirement: [relevant standard]"
Pro tip: Include version numbers or dates in policy names when testing different configurations. This helps track policy evolution and rollback if needed.

What Are the Different USB Blocking Configuration Options Available?

The Configuration settings tab offers several options for controlling USB device access. Understanding these options helps you choose the appropriate level of restriction:

SettingEffectUse Case
Removable Disk: Deny Write AccessPrevents writing to USB drivesAllow data reading but prevent data exfiltration
Removable Disk: Deny Read AccessPrevents reading from USB drivesBlock potential malware introduction
Both settings enabledComplete USB drive blockingMaximum security environments

For most organizations, enabling Removable Disk: Deny Write Access provides an effective balance between security and usability. This configuration allows users to read data from USB drives (such as software installers or documentation) while preventing data exfiltration.

Recommended Configuration for Standard Corporate Environment:
- Removable Disk: Deny Write Access = Enabled
- Removable Disk: Deny Read Access = Not configured
- Other storage options = Not configured

How Should You Assign USB Blocking Policies to Target Groups?

Policy assignment determines which devices receive your USB blocking configuration. Use a phased approach for deployment:

Phase 1: Pilot Testing

  • Create a small security group with 5-10 test devices
  • Include devices from different departments to test various use cases
  • Exclude administrator devices that require USB access

Phase 2: Department Rollout

  • Deploy to specific departments based on risk assessment
  • Prioritize high-risk areas like finance, HR, and executive teams
  • Monitor for user impact and adjust as needed

Phase 3: Organization-wide Deployment

  • Expand to all corporate devices
  • Maintain exception groups for legitimate business needs
Example Group Structure:
Include Groups:
- "Corporate-Devices-Pilot" (testing)
- "Finance-Department-Devices" (high-risk department)
- "All-Corporate-Windows-Devices" (full deployment)

Exclude Groups:
- "IT-Admin-Devices" (administrative exceptions)
- "USB-Approved-Devices" (business exceptions)
Warning: Always test policies with a pilot group before organization-wide deployment. USB blocking can significantly impact user workflows if not properly planned.

How Do You Monitor Policy Deployment and Force Device Synchronization?

After creating your policy, monitor its deployment status and force synchronization when needed. Intune policies typically deploy within 5-10 minutes but can take up to 8 hours in some cases.

To force immediate synchronization:

  1. Navigate to Devices > All devices in the Intune admin center
  2. Select target devices and click Sync
  3. Monitor the sync status until completion

Use PowerShell on target devices to check and force synchronization:

# Check last sync time
Get-ScheduledTask | Where-Object {$_.TaskName -like "*EnterpriseMgmt*"} | Get-ScheduledTaskInfo

# Force immediate sync (run as administrator)
Get-ScheduledTask | Where-Object {$_.TaskName -like "*EnterpriseMgmt*"} | Start-ScheduledTask

# Verify policy application
Get-MpPreference | Select-Object AttackSurfaceReductionRules_*

Monitor deployment progress through the policy's device status view, which shows successful, failed, and pending deployments across your assigned device groups.

What Methods Can You Use to Test and Verify USB Blocking Functionality?

Thorough testing ensures your USB blocking policy works as expected. Follow this systematic testing approach:

Basic Functionality Test:

  1. Insert a USB drive into a test device
  2. Attempt to copy a file to the USB drive
  3. Verify that write access is denied with an appropriate error message
  4. Test read access (if allowed) by opening files from the USB drive

Event Log Verification:

Check Windows Event Viewer for ASR events that confirm policy enforcement:

# View ASR events in Event Viewer
# Navigate to: Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational

# PowerShell command to check ASR events
Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-Windows Defender/Operational'; ID=1121,1122} -MaxEvents 10 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap

Device Inventory Verification:

# List connected USB mass storage devices
Get-WmiObject Win32_USBControllerDevice | ForEach-Object {[wmi]($_.Dependent)} | Where-Object {($_.Description -like '*mass*')} | Sort-Object Description,DeviceID | Format-Table Description,DeviceID -AutoSize

# Check removable drives
Get-WmiObject -Class Win32_LogicalDisk | Where-Object {$_.DriveType -eq 2} | Select-Object DeviceID, VolumeName, Size, FreeSpace
Pro tip: Create a standardized test procedure document that includes specific files to copy, expected error messages, and verification steps. This ensures consistent testing across different devices and users.

How Can You Configure Advanced Settings and Device Exceptions?

Some business scenarios require exceptions to USB blocking policies. Intune's reusable settings feature allows you to create granular exceptions based on device characteristics:

Creating Device Exceptions:

  1. Edit your existing Device Control policy
  2. Navigate to the Configuration settings tab
  3. Click + Add under Reusable settings
  4. Create a new setting named "Approved USB Devices"
  5. Under Device controller, add specific device identifiers

Identifying USB Device Information:

# Get detailed USB device information
Get-WmiObject -Class Win32_LogicalDisk | Where-Object {$_.DriveType -eq 2} | ForEach-Object {
    $drive = $_.DeviceID
    Write-Host "Drive: $drive"
    
    # Get associated physical disk information
    Get-WmiObject -Class Win32_LogicalDiskToPartition | Where-Object {$_.Dependent -like "*$drive*"} | ForEach-Object {
        $partition = $_.Antecedent
        Get-WmiObject -Class Win32_DiskDriveToDiskPartition | Where-Object {$_.Dependent -eq $partition} | ForEach-Object {
            $diskDrive = $_.Antecedent.Split('=')[1] -replace '"',''
            Get-WmiObject -Class Win32_DiskDrive | Where-Object {$_.DeviceID -eq $diskDrive} | Select-Object Model, SerialNumber, PNPDeviceID
        }
    }
}

# Alternative method for USB device Instance IDs
Get-PnpDevice | Where-Object {$_.Class -eq "DiskDrive" -and $_.Status -eq "OK"} | Select-Object FriendlyName, InstanceId, HardwareID

Exception Configuration Options:

  • Instance ID: Specific to individual devices
  • Hardware ID: Applies to device models
  • Serial Number: Unique device identifier (most reliable)
Warning: Device exceptions can take 6+ hours to apply and may require device restarts. Test exception configurations thoroughly in a controlled environment.

What Troubleshooting Steps Should You Follow for Policy Issues?

When USB blocking policies don't work as expected, follow this systematic troubleshooting approach:

Verify Prerequisites:

# Check Windows Defender status
Get-MpComputerStatus | Select-Object AntivirusEnabled, RealTimeProtectionEnabled, IoavProtectionEnabled, AMServiceEnabled

# Verify Defender for Endpoint connectivity
Get-MpComputerStatus | Select-Object AMServiceVersion, AMProductVersion, AntispywareSignatureVersion

# Check ASR rules configuration
Get-MpPreference | Select-Object AttackSurfaceReductionRules_Ids, AttackSurfaceReductionRules_Actions

Common Issues and Solutions:

IssueCauseSolution
Policy not applyingDevice sync failureForce device sync, restart device
Inconsistent enforcementDefender not enabledEnable Windows Defender Antivirus
Admin bypass not workingNo built-in admin exceptionCreate separate admin group exclusion
All USB devices not blockedIncomplete configurationVerify all removable storage settings

Advanced Troubleshooting Commands:

# Check Intune management extension status
Get-Service -Name "Microsoft Intune Management Extension" | Select-Object Status, StartType

# Verify device enrollment status
dsregcmd /status | Select-String "AzureAdJoined", "DomainJoined", "WorkplaceJoined"

# Check for conflicting Group Policy settings
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices" -ErrorAction SilentlyContinue
Pro tip: Enable audit mode initially to monitor USB usage patterns before implementing blocking. This helps identify legitimate business needs and potential impact areas.

How Do You Monitor Long-term Policy Compliance and Effectiveness?

Ongoing monitoring ensures your USB blocking policies remain effective and don't negatively impact business operations:

Regular Compliance Checks:

  • Review device compliance reports weekly
  • Monitor user help desk tickets related to USB access
  • Analyze security incident reports for USB-related threats

Policy Performance Metrics:

  • Deployment Success Rate: Percentage of devices successfully receiving the policy
  • Compliance Rate: Devices properly enforcing USB restrictions
  • Exception Usage: Frequency of approved device exceptions
  • User Impact: Help desk tickets and user feedback

Automated Monitoring with PowerShell:

# Create a compliance check script
$devices = Get-MgDevice -Filter "operatingSystem eq 'Windows'"
foreach ($device in $devices) {
    $compliance = Get-MgDeviceCompliancePolicyDeviceStatus -DeviceId $device.Id
    Write-Output "Device: $($device.DisplayName), Compliance: $($compliance.Status)"
}

# Monitor ASR rule effectiveness
Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-Windows Defender/Operational'; ID=1121,1122; StartTime=(Get-Date).AddDays(-7)} | Group-Object Id | Select-Object Name, Count

Regular policy reviews should include:

  • Quarterly assessment of business requirements
  • Annual review of exception lists and their justifications
  • Continuous monitoring of emerging USB-based threats
  • User training updates based on policy changes
Warning: USB blocking policies can significantly impact user productivity if not properly managed. Maintain clear communication channels for legitimate business requests and establish a formal exception approval process.

Step-by-Step Guide

1
Step 1 / 10

Access Microsoft Intune Admin Center and Navigate to Attack Surface Reduction

Open your web browser and navigate to the Intune admin center. Sign in with your administrative credentials that have Endpoint security permissions.

https://endpoint.microsoft.com

Once logged in, navigate to Endpoint security in the left sidebar, then click on Attack surface reduction. This section contains all the policies for controlling device access and reducing potential attack vectors.

Pro tip: Bookmark the Intune admin center URL for quick access. The interface updates frequently, so familiarize yourself with the current layout.

Verification: You should see the Attack surface reduction dashboard with options to create new policies and view existing ones.

2
Step 2 / 10

Create a New Device Control Policy

Click the + Create Policy button to start creating your USB blocking policy. You'll be presented with platform and profile options.

Configure the following settings:

  • Platform: Select "Windows 10, Windows 11, and Windows Server"
  • Profile: Choose "Device Control"

Click Create to proceed to the policy configuration wizard.

Warning: Ensure you select the correct platform. Device Control policies only work on supported Windows versions with Microsoft Defender for Endpoint enabled.

Verification: The policy creation wizard should open with the "Basics" tab active.

3
Step 3 / 10

Configure Basic Policy Information

On the Basics tab, provide essential information about your policy:

  • Name: Enter a descriptive name like "Block USB Write Access - Corporate Devices"
  • Description: Add details such as "Prevents write access to USB drives to protect against data exfiltration and malware introduction"

Click Next to proceed to the configuration settings.

Pro tip: Use clear, descriptive names that indicate the policy's purpose and scope. This helps with management when you have multiple policies.

Verification: The "Configuration settings" tab should now be active, showing various device control options.

4
Step 4 / 10

Configure USB Drive Blocking Settings

On the Configuration settings tab, locate the Storage section. Here you'll find the removable disk controls.

For basic USB write blocking, configure:

  • Removable Disk: Deny Write Access: Set to Enabled

For complete USB blocking (read and write), you can also enable:

  • Removable Disk: Deny Read Access: Set to Enabled
Configuration Example:
- Removable Disk: Deny Write Access = Enabled
- Removable Disk: Deny Read Access = Not configured (allows reading)
- Other storage options = Not configured

Click Next to proceed to assignments.

Warning: Enabling both read and write denial will completely block USB access. Test this thoroughly before deploying to production devices.

Verification: Your selected options should show as "Enabled" in the configuration summary.

5
Step 5 / 10

Assign the Policy to Target Groups

On the Assignments tab, you need to specify which devices or users will receive this policy. Click + Add groups to select your target groups.

Choose from:

  • Device groups: Entra ID security groups containing Windows devices
  • User groups: Groups containing users whose devices should receive the policy

For testing, start with a small pilot group:

Example Assignment:
- Include: "IT-Pilot-Devices" (security group with 5-10 test devices)
- Exclude: "IT-Admin-Devices" (admin devices that need USB access)

Click Next to review your configuration.

Pro tip: Always test with a pilot group first. Create separate security groups for testing and production rollouts to maintain control over policy deployment.

Verification: Your selected groups should appear in the "Included groups" section with the correct member count.

6
Step 6 / 10

Review and Create the Policy

On the Review + create tab, carefully review all your policy settings:

  • Policy name and description
  • Platform and profile type
  • Configuration settings (USB blocking options)
  • Group assignments

If everything looks correct, click Create to deploy the policy.

The policy will now appear in your Attack surface reduction policies list with a status of "Deploying" or "Active".

Warning: Once created, the policy will begin deploying to assigned devices within 5-10 minutes. Ensure your assignments are correct before creating.

Verification: The new policy should appear in your policies list with the correct name and assignment count.

7
Step 7 / 10

Force Device Synchronization and Monitor Deployment

To speed up policy deployment, force synchronization on target devices. Navigate to Devices > All devices in the Intune admin center.

For each test device:

  1. Select the device from the list
  2. Click Sync in the device overview
  3. Wait for the sync to complete (usually 1-2 minutes)

You can also check sync status using PowerShell on the target device:

# Check last sync time
Get-ScheduledTask | Where-Object {$_.TaskName -like "*EnterpriseMgmt*"} | Get-ScheduledTaskInfo

# Force immediate sync (run as administrator)
Get-ScheduledTask | Where-Object {$_.TaskName -like "*EnterpriseMgmt*"} | Start-ScheduledTask

Monitor deployment status in Endpoint security > Attack surface reduction by clicking on your policy and viewing the device status.

Pro tip: Policies typically take 5-10 minutes to apply, but can take up to 8 hours in some cases. Device restarts can help speed up the process.

Verification: Device status should show "Succeeded" for successfully deployed policies.

8
Step 8 / 10

Test USB Drive Blocking Functionality

Once the policy is deployed, test the USB blocking functionality on a target device:

  1. Insert a USB drive into the test device
  2. Attempt to copy a file to the USB drive
  3. Verify that write access is denied

Check the Windows Event Viewer for ASR events:

# Open Event Viewer and navigate to:
# Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational

# Or use PowerShell to check for ASR events:
Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-Windows Defender/Operational'; ID=1121,1122} -MaxEvents 10

You can also verify connected USB devices using PowerShell:

# List USB mass storage devices
Get-WmiObject Win32_USBControllerDevice | ForEach-Object {[wmi]($_.Dependent)} | Where-Object {($_.Description -like '*mass*')} | Sort-Object Description,DeviceID | Format-Table Description,DeviceID -AutoSize
Warning: If the policy isn't working, check that Microsoft Defender Antivirus is enabled and that the device has successfully synced the policy.

Verification: USB write operations should fail with an access denied error, and Event Viewer should show ASR block events.

9
Step 9 / 10

Configure Advanced Settings and Exceptions (Optional)

For more granular control, you can create reusable settings with specific device exceptions. Navigate back to your Device Control policy and edit the configuration.

To create exceptions for specific USB devices:

  1. In the policy configuration, click + Add under Reusable settings
  2. Name the setting (e.g., "Approved USB Devices")
  3. Under Device controller, click + Add
  4. Select Removable storage
  5. Add specific device Instance IDs or serial numbers for exceptions

Find USB device Instance ID using PowerShell:

# Get USB device Instance IDs
Get-WmiObject -Class Win32_LogicalDisk | Where-Object {$_.DriveType -eq 2} | ForEach-Object {
    $drive = $_.DeviceID
    Get-WmiObject -Class Win32_LogicalDiskToPartition | Where-Object {$_.Dependent -like "*$drive*"} | ForEach-Object {
        Get-WmiObject -Class Win32_DiskDriveToDiskPartition | Where-Object {$_.Dependent -eq $_.Antecedent} | ForEach-Object {
            Get-WmiObject -Class Win32_DiskDrive | Where-Object {$_.DeviceID -eq ($_.Antecedent.Split('=')[1] -replace '"','')}
        }
    }
} | Select-Object Model, SerialNumber, PNPDeviceID
Pro tip: Use device serial numbers for exceptions rather than Instance IDs when possible, as they're more stable across different systems.

Verification: Excepted devices should maintain full read/write access while other USB drives remain blocked.

10
Step 10 / 10

Monitor Policy Compliance and Troubleshoot Issues

Regularly monitor your USB blocking policy's effectiveness through the Intune admin center. Navigate to Endpoint security > Attack surface reduction and click on your policy.

Review the following metrics:

  • Device status: Shows successful, failed, and pending deployments
  • User status: Displays policy application per user
  • Per-setting status: Details which specific settings succeeded or failed

Common troubleshooting steps for policy failures:

# Check Windows Defender status
Get-MpComputerStatus | Select-Object AntivirusEnabled, RealTimeProtectionEnabled, IoavProtectionEnabled

# Verify ASR rules status
Get-MpPreference | Select-Object AttackSurfaceReductionRules_*

# Check device compliance
Get-MpComputerStatus | Select-Object AMServiceEnabled, AntispywareEnabled

If devices show as non-compliant:

  1. Verify the device is properly enrolled in Intune
  2. Check that Microsoft Defender for Endpoint is installed and running
  3. Force a device sync and wait 10-15 minutes
  4. Restart the device if necessary
Warning: Inconsistent policy application often indicates licensing issues or incomplete Defender for Endpoint deployment. Verify all prerequisites are met.

Verification: Policy compliance should show 100% success rate for properly configured devices within 24 hours of deployment.

Frequently Asked Questions

How long does it take for Microsoft Intune USB blocking policies to apply to devices?
Intune USB blocking policies typically apply within 5-10 minutes after deployment, but can take up to 8 hours in some cases. You can force immediate synchronization by selecting target devices in the Intune admin center and clicking 'Sync'. Device restarts can also help speed up policy application. Monitor deployment status through the policy's device status view to track successful application across your organization.
Can administrators bypass USB blocking policies created in Microsoft Intune?
Microsoft Intune's Attack Surface Reduction USB blocking policies don't include built-in administrator exceptions. To allow admin access, you must create separate security groups for administrative devices and exclude them from the USB blocking policy assignments. Alternatively, you can configure device-specific exceptions using reusable settings with Instance IDs or serial numbers for approved USB devices that administrators need to use.
What's the difference between blocking USB write access versus complete USB blocking in Intune?
Blocking USB write access prevents users from copying data to USB drives while still allowing them to read files from USB devices, which is useful for software installations or accessing documentation. Complete USB blocking (both read and write denial) prevents all USB drive interaction, providing maximum security but potentially impacting legitimate business operations. Most organizations start with write-only blocking to balance security and usability.
How do you troubleshoot when Intune USB blocking policies aren't working on some devices?
First, verify that Microsoft Defender Antivirus is enabled on affected devices using 'Get-MpComputerStatus' in PowerShell. Check that devices are properly enrolled in Intune and have synced recently. Force device synchronization through the Intune admin center or use PowerShell to trigger sync tasks. Verify ASR rules are configured correctly with 'Get-MpPreference' and check Windows Event Viewer for ASR events. Device restarts often resolve policy application issues.
What are the licensing requirements for using Microsoft Intune USB device control policies?
Microsoft Intune USB device control through Attack Surface Reduction policies requires Microsoft 365 E5 or equivalent licensing that includes Microsoft Defender for Endpoint capabilities. Basic Intune licenses don't include the full ASR Device Control features needed for comprehensive USB blocking. Devices must also be enrolled in Intune with Microsoft Defender for Endpoint enabled to support these advanced device control policies.

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Last updated March 11, 2026

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...