Configure the access to removable devices, protect your devices against virus execution and prevent the usage of removable devices.
Script Set USB Storage Access
- Version 18.104.22.168 – Initial release
Sets USB storage access by modifying group policies. The script is designed for Windows 10 and 7.
Execution context and suggested scheduling
Run the script as local system. The script should be executed manually.
A timeout of 120 seconds is recommended.
|1||Campaign Id||UID of the campaign to notify user that the device must be restarted|
|2||Deny USB Storage Execute Access||Deny removable device execute access. Type “true” for denying execution, “false” otherwise|
|3||Deny USB Storage Read Access||Deny removable device read access. Type “true” for denying reading, “false” otherwise|
|4||Deny USB Storage Write Access||Deny removable device write access. Type “true” for denying writing, “false” otherwise|
Deny execute access: Device will not prevent users from transferring anything from/to the removable storage, but it will block users from opening programs and files stored in the removable storage. This action is suitable if the administrator only wants to protect the device from virus or malware that could be in the removable storage.
Deny read access: Device will totally block all users from reading contents in the removable storage. It also effectively prevents users from transferring anything from/to the removable storage. Administrator can use this if they want to completely restrict the usage of removable storage.
Deny write access: Device will prevent all users transferring anything to the removable storage, but not the other way around. Users will still be able to read contents in the removable storage. This action is suitable if the administrator only wants to protect confidential data in the device from being copied out to a removable storage.