Block USB Device Access using Intune

In this post, we will see how to Block USB Device Access in Microsoft Intune, aka Endpoint Manager. As an organization, It’s important to understand all security aspects to protect and be safe.

You can block access to USB storage to restrict copying the data to USB devices and control the use of unauthorized USB devices in your corporate network. Removable Disk Deny Write Acess.

With the settings for device control, you can configure devices for a layered approach to secure removable media. Microsoft Defender for Endpoint provides multiple monitoring and control features to help prevent threats in unauthorized peripherals from compromising your devices.

You can check more Windows 10 Security Enhancements and Security Survey that will give you more details on what the industry is thinking about modern security threats and how they plan to handle them for their environment.

Patch My PC

Block USB Device Access using Intune

Let’s follow the below steps to block USB Device Access using Intune

  • Sign in to the Microsoft Endpoint Manager admin center
  • Select Endpoint security > Attack surface reduction Create Policy.
Block USB Device Access using Intune 1

In Create Profile, Select Platform, Windows 10 and later, and Profile, Device control. Click on Create button. 

Intune Attack surface reduction – Select Platform, Profile type
Intune Attack surface reduction – Select Platform, Profile type

On the Basics tab, enter a descriptive name, such as USB Device Restriction – Windows 10. Optionally, enter a Description for the policy, then select Next.

Create Device Control Policy - Block USB Drive Access
Create Device Control Policy – Block USB Drive Access

On the Configuration settings, Scroll down the lists of available device control settings and Configure Removable Disk Deny Write Access to Yes. This policy will block the use of removable storage on the device. And Click Next.


If you enable the Removable Disk Deny Write Access policy setting, write access is denied to this removable storage class. If you disable or do not configure this policy setting, write access is allowed to this removable storage class.

Note: To require that users write data to BitLocker-protected storage, enable the policy setting “Deny write access to drives not protected by BitLocker,” which is located in “Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives.”

Note 2: Allow USB Connection policy is applicable only in HoloLens 2, Hololens (1st gen) Commercial Suite, and HoloLens (1st gen) Development Edition. This enables a USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications.

Changing this policy does not affect USB charging. Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. The most restricted value is 0.

Block USB Device Access using Intune Fig 2.2
Block USB Device Access using Intune Fig 2.2

In Scope tags, you can assign a tag to filter the profile to specific IT groups. Add scope tags (if required) and click Next.

Under Assignments, In Included groups, select Add groups and then choose Select groups to include one or more groups. Select Next to continue.

Assignments – Select groups to include | Block USB Drive Access using Intune
Assignments – Select groups to include | Block USB Drive Access using Intune

In Review + create, review your settings. When you select Create, your changes are saved, and the policy is assigned.

Review + Create – Policy
Review + Create – Policy

A notification will appear automatically in the top right-hand corner with a message. Here you can see, Profile was created successfully. The policy is also shown in the list as shown below.

Your groups will receive your policy settings when the devices check-in with the Intune service.

Policy “Block USB Device Access” created successfully
Policy “Block USB Device Access” created successfully

End User Experience

Once the policy applies to the device, users will not access removable storage devices connected with the system.

 Block USB Device Access - Intune
Block USB Device Access – Intune


About Author -> Jitesh has over 5 years of working experience in the IT Industry. He writes and shares his experiences related to Microsoft device management technologies and IT Infrastructure management. His primary focus area is Windows 10 Deployment solution with Configuration Manager, Microsoft Deployment Toolkit (MDT), and Microsoft Intune.

21 thoughts on “Block USB Device Access using Intune”

  1. Hi,

    Great post!

    I have applied the above policy to a few machines and there is one machine that has an exception but when I added that device to the exception group (after applying block policy) and assigned the policy, the USB storage block policy is not removed and the device is still blocking the USB storage.
    any help?

  2. Just putting a note here this will not work with windows 10 teams edition (SurfaceHub) You may have to create a custom policy.

  3. How would we deny read access to removable devices while still allowing printers, keyboards, mouses etc? It seems the only option now is to block write access but i do not see an option for read.

  4. As one user mentioned in Nov 2022, the “Removable Disk Deny Write Access” setting is no longer available in Intune ASR policies.

    How is blocking of USB storage devices now managed?

  5. I’ve established a policy called Attack surface reduction policies-USB Drive Restrictions for Block USB and assigned it to all users. This policy excludes some allowed USB groups, but USB access is still blocked.

    How can the excluded USB group have access to USB?

  6. Has anyone figured out how to create an exception list after blocking all removable storage? most articles online suggest you first “Enable” (Prevent installation of devices not described by other policy settings) and then create an allow list with (Allow installation of devices that match any of these device instance IDs).

    but somehow this fails to work on my end. Has anyone successfully done this?

  7. How to disable USB hard drives via policy in Intune and defender as well for devices but keep mouse, keyboard and audio classes open for those devices?

  8. Dear Anoop,
    I want to block USB removal storage and type C port which can connect mobile data transfer to be blocked by using intune portal.



Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.