We do use this however like you said its quite tricky to get that set up the 
way you want.  In the end we went with a group with security filtering to 
remove certain users from the policy.  It doesn’t sound like that’s what you 
want but its what we went with and has worked well for us

From: [email protected] [mailto:[email protected]] On 
Behalf Of Steve Whitcher
Sent: Thursday, February 23, 2017 7:16 AM
To: [email protected]
Subject: [NTSysADM] Anyone using Device Installation Restrictions Group 
Policies?

We are currently using Symantec Endpoint Protection's Device Control Policies 
to block use of unapproved USB devices on our computers.  We'll be switching to 
a different antivirus program soon, so I need to replace the device control 
functionality.

I've begun testing the Device Installation Restrictions group policy settings, 
but it's not working quite as well as I'd hoped.  The goal is to block all USB 
devices except those that are whitelisted by hardware ID or device setup class. 
 I've enabled the settings for:


 *   Allow administrators to override Device Installation Restriction policies
 *   Allow installation of devices using drivers that match these device setup 
classes
 *   Allow installation of devices that match any of these device IDs
 *   Prevent installation of devices not described by other policy settings
The 2 'allow installation' settings are configured with a list of hardware ID's 
and device setup classes which should be allowed.

In testing, I found that the policies are blocking installation of all devices, 
including those which I believe should be allowed.

Some devices I expect to be allowed because they should fall under a 
whitelisted device setup class.  For example, I added device setup class 
{745a17a0-74d3-11d0-b6fe-00a0c90f57da} to the allow list, which should allow 
all HID devices.  But when I plug in a USB keyboard, installation is blocked.  
If I allow that specific keyboard's hardware ID, it will be installed, and then 
changes to appear in device manager as an HID device, which is allowed 
automatically.

If a device is whitelisted by hardware ID, the initial detection of that device 
and hardware ID will be allowed, but then another device appears in device 
manager with a different hardware ID (obviously the same hardware, but detected 
a bit differently) and that device gets blocked.  If I add that new hardware ID 
to the whitelist, then another new device appears and is blocked... In some 
cases I got about 4-5 layers deep before the device was fully installed and 
available for use.  It doesn't seem like I should have to individually allow 
the hardware ID's listed at each subsequent level of device detection.  Still, 
while that would be a big pain, it is possible.  My bigger concern here is that 
the later devices detected & whitelisted were using very generic hardware ID's, 
and that by whitelisting those generic ID's I might end up allowing other 
devices which do not have the same hardware ID, but do fit the same generic 
hardware ID.

Is anyone using these Device Installation Restriction policies in their 
environment?  If so, did you run into these issues?  How did you deal with them?

Thanks,
Steve Whitcher




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The information contained in this communication and all accompanying documents 
from Coilcraft may be confidential and/or legally privileged, and is intended 
only for the use of the recipient(s) named above. If you are not the intended 
recipient you are hereby notified that any review, disclosure, copying, 
distribution or the taking of any action in reliance on the contents of this 
transmitted information is strictly prohibited. If you have received this 
communication in error, please return it to the sender immediately and destroy 
the original message or accompanying materials and any copy thereof. If you 
have any questions concerning this message, please contact the sender. 

Reply via email to