No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


How to disable USB drive use in an Active Directory domain

Publication Date:  2014-12-04 Views:  2789 Downloads:  0

Issue Description

How to disable USB drive use in an Active Directory domain ?


steps for how to disable USB derive in an Active Directory Domain :
 1-  from one of your Active Directory Domain Services domain controllers or from an administrative workstation, open the Group Policy Management Console and link a new GPO to the appropriate target (domain, OU, etc.).

2- Within the Group Policy Editor, navigate to \Computer Configuration\Policies\Administrative Templates\System\Removable Storage Access.

NOTE: If you prefer to set these restrictions on a per-user basis instead of computer-wide, then use the Group Policy path \User Configuration\Policies\Administrative Templates\System\Removable Storage Access.

Note from the above screenshot that we can use Group Policy to limit access to the following device classes:

By far, the most restrictive restriction (pardon the redundancy) is the policy All Removable Storage Classes: Deny All Access. If we enable this policy, as is shown in the following screen capture, then we prevent affected users from mounting ANY class of removable media.

Naturally, we want to apply GPO security filtering to ensure that only our desired users and computers are affected by our new policy. From the Group Policy Management Console we can make use of the Security Filtering and/or the WMI Filtering areas to properly scope our GPO. This is depicted in the following screen image:

Note :In order to put your new GPO into effect immediately, open an administrative command prompt and issue the following command:gpupdate/ force .This command refreshes Group Policy throughout your Active Directory domain.