If you do not have Group Policy Preferences installed see Install Group Policy Preferences. This link tells you how to do it in a 2003 domain. In a 2008 domain it is much easer as all you have to do is enable the feature. See “The Steps” section below if you need a step by step.
Our objective is to prevent users from being able to take data away with them by plugging in a USB drive or memory stick. Due to the way that windows works and specifically order of precedence on when things run we have to “lock down” two different components.
A) Group Policy Preference:
Group Policy Preference: Change Registry Value: HKLMSYSTEMCurrentControlSetServicesUSBSTORStart (4=Disable USB Drives; 3=Enable USB Drives). This setting will change the registry USB Drive Start Value to 4 which is disabled. Thus, the USB Drive is not allowed to be installed. There is a limitation of this policy. That is, it only does it’s job if the driver is already installed. If the driver is installed after the policy is executed, windows automatically changes the value back to 3 upon driver installation. Therefore, when using this setting, you must also pair it with the setting to disable the installation of the driver USBSTOR.
How to do this: From your Vista machine with Group Policy Preferences installed or from a Windows Server 2008 machine with Group Policy Management Tools Installed. StartControl PanelAdministrative ToolsGroup Policy Management Tools. Open a group policy that you want to add these setting to (or create a new one). Edit the policy and expand User ConfigurationPreferencesWindows Settings. Right-Click on Registry select New from the drop down menu then select Registry Item. In Fill out the form as indicated in the screen shot of Group Policy Preference A Main . The items you need to select are as follow:
- Action: Replace
- Hive: HKEY_LOCAL_MACHINE
- Key Path: SYSTEMCurrentControlSetServicesUSBSTOR
- Value Name: Start
- Value Type: REG_DWORD
- Value Data: 4 -> if you want to turn this off later, change the value back to 3
- Description: Changes Registry Value: SYSTEMCurrentControlSetServicesUSBSTORStart (4=Disable USB Drives; 3=Enable USB Drives)
This setting will change the registry USB Drive Start Value to 4 which is disabled. Thus, the USB Drive is not allowed to be installed. There is a limitation of this policy. That is, it only does it’s job if the driver is already installed. If the driver is installed after the policy is executed, windows automatically changes the value back to 3 upon driver installation. Therefore, when using this setting, you must also pair it with the setting to disable the installation of the driver USBSTOR.INF. This can be done via group policy “Computer ConfigurationPoliciesWindows SettingsSecurity SettingsFile System” and denying access to users that should not have access to drives.
- Turn On Item-Level Targeting and click Targeting
- At the top of the targeting editor screen click New Item then Select Security Group
- On the Targeting Editor Screen for Security Groups click the Browse button and type in the group of users (in my case “Deny USB Drive“) that you want this to apply to then click Check Names
- Click OK all the way out
Click the links for screen shots:
- screen shot of Group Policy Preference A Main
- screen shot of Group Policy Preference A [Common]
- screen shot of Group Policy Preference A [Targeting]
- screen shot of Group Policy Preference A [Targeting Security Group]
I strongly recommend you click on the Common tab and copy and paste the description above into the description field
B) Group Policy:
This can be done via group policy “Computer ConfigurationPoliciesWindows SettingsSecurity SettingsFile System” and denying access to users that should not have access to drives. At this location add the files “%SystemRoot%infusbstore.inf” and “”%SystemRoot%infusbstore.pnf” and set permissions so users that you do not want to be able to install drives, cannot read the files. You can do this this second piece in one of two ways. You can deny access by adding the group and selecting deny or you can simply not allow access by removing the users from the security list. Keep in mind that when you apply this policy it will OVERWRITE the permissions on these files for all machines where the policy is applied. For this reason, you will no longer have “local” access to the files when you login using a non-domain account. Usually when you want to turn this setting on this is an acceptable side effect because you do not want to give users any method of getting there including logging in as a non-domain user. Click link for screen shot of Group Policy Preference B
I have been thinking about created a step by step video of this process. If that would be beneficial to you, let me know and I will try to make it happen. In a nutshell the process is as follows:
The Steps:
- Install Group Policy Preferences (if they are not already installed). If you are on a Windows 2008 domain you only need to add the Group Policy Management feature using server manager.
- Make sure all clients have Group Policy Preferences in Windows Server 2008 Client Side Extensions installed
- Create a security group of “users or computers” that will have USB drive install blocked. In my example I called it “Block USB Drive Install”. Add computers and users to above group – This group will be used in Item Level Targeting
- Create a group policy with the settings outlined in Section A and B above
- Setup the Links and Security of the Group Policy to apply to the proper users and computers
- Apply the group policy (apply to a test group / OU first) test and let me know if you have any problems with these instructions
- Make sure that you reboot the destination computers before testing. The “policy” part of this will only be applied after a reboot.
Additional Comments and Security Alerts:
By using this method of applying the policy, a non-deny user can login to the machine and run the “Net Start USBStor” from the command line and then insert the USB drive and it will work. Be advised though that the Computer part of the policy applies prior to login so you will have to login with the correct credentials of a user that has access and then reboot the computer (or do “gpupdate /force” from the command line). However, when you are done, remember that the computer setting is done before you login so the next time a deny user logs in they may have access to these features until they reboot the computer and the policy is “re-applied” with their credentials. To avoid this situation, I recommend you try to avoid using USB drives from a machine where the typical user does not have access to USB. This way you will not “accidentally” give them temp access to the feature. If you must use a USB drive on this system just remember to login as a deny user and then “reboot” the workstation to confirm that the security profiles are correct.
If you need to remove the Group Policy, remember the security rights of the files that you changed the security of will NOT change back to the original. Therefor, you will want to change the policy to remove the deny user group and make sure the policy gets applied to all workstations before removing it. Even if you do this, the “local Users” will not necessarily have rights unless you specifically go back to the machine and give them rights.
A Knowledge Base article was posted with the manual steps to disable adding usb drives to a machine. However, I wanted to share a way to “automate” this process using Group Policy and Group Policy Preferences. There are more ways to accomplish this task but this one is easy to implement and will teach you about some features in Group Policy and in Group Policy Preferences that are not often used. If you want to see the manual process for disabling access or install of USB drives (memory sticks, etc) check out KB article 823732 from http://support.microsoft.com/kb/823732
So that you have the text from the GP that I created in preparing this content, I have put a copy of the report of the resulting GPO below
Happy Configuring!!!
Block USB Drive Install | |
Domain | DanDemo.loc |
Owner | DANDEMODomain Admins |
Created | 1/20/2009 2:05:54 PM |
Modified | 1/20/2009 3:19:26 PM |
User Revisions | 8 (AD), 8 (sysvol) |
Computer Revisions | 2 (AD), 2 (sysvol) |
Unique ID | {5C45547D-874A-40EF-A74E-5976A30CC20A} |
GPO Status | Enabled |
Location | Enforced | Link Status | Path |
---|---|---|---|
DanDemo | No | Enabled | DanDemo.loc |
This list only includes links in the domain of the GPO.
Name |
---|
DANDEMOGPUser |
WMI Filter Name | None |
Description | Not applicable |
Name | Allowed Permissions | Inherited |
---|---|---|
DANDEMODomain Admins | Edit settings, delete, modify security | No |
DANDEMOEnterprise Admins | Edit settings, delete, modify security | No |
DANDEMOGPUser | Read (from Security Filtering) | No |
NT AUTHORITYENTERPRISE DOMAIN CONTROLLERS | Read | No |
NT AUTHORITYSYSTEM | Edit settings, delete, modify security | No |
Owner |
Type | Name | Permission | Apply To |
---|---|---|---|
Deny | DANDEMODeny USB Drive | Full Control | This folder, subfolders and files |
Allow | CREATOR OWNER | Full Control | Subfolders and files only |
Allow | NT AUTHORITYSYSTEM | Full Control | This folder, subfolders and files |
Allow | BUILTINAdministrators | Full Control | This folder, subfolders and files |
Allow | DANDEMODomain Admins | Read and Execute | This folder, subfolders and files |
Allow | DANDEMODomain Users | Read and Execute | This folder, subfolders and files |
Allow | BUILTINUsers | Read and Execute | This folder, subfolders and files |
Allow inheritable permissions from the parent to propagate to this object and all child objects | Disabled |
No auditing specified
Owner |
Type | Name | Permission | Apply To |
---|---|---|---|
Deny | DANDEMODeny USB Drive | Full Control | This folder, subfolders and files |
Allow | CREATOR OWNER | Full Control | Subfolders and files only |
Allow | DANDEMODomain Admins | Read and Execute | This folder, subfolders and files |
Allow | DANDEMODomain Users | Read and Execute | This folder, subfolders and files |
Allow | NT AUTHORITYSYSTEM | Full Control | This folder, subfolders and files |
Allow inheritable permissions from the parent to propagate to this object and all child objects | Disabled |
No auditing specified
Action | Replace |
Properties
Hive | HKEY_LOCAL_MACHINE |
Key path | SYSTEMCurrentControlSetServicesUSBSTOR |
Value name | Start |
Value type | REG_DWORD |
Value data | 0x4 (4) |
Stop processing items on this extension if an error occurs on this item | No |
Run in logged-on user’s security context (user policy option) | No |
Remove this item when it is no longer applied | No |
Apply once and do not reapply | No |
Item-level targeting: Security Group
Attribute | Value |
---|---|
bool | AND |
not | 0 |
name | DANDEMODeny USB Drive |
sid | S-1-5-21-3082481891-2805113795-337179952-1111 |
userContext | 1 |
primaryGroup | 0 |
localGroup | 0 |
Description
Changes Registry Value: SYSTEMCurrentControlSetServicesUSBSTORStart (4=Disable USB Drives; 3=Enable USB Drives) This setting will change the registry USB Drive Start Value to 4 which is disabled. Thus, the USB Drive is not allowed to be installed. There is a limitation of this policy. That is, it only does it’s job if the driver is already installed. If the driver is installed after the policy is executed, windows automatically changes the value back to 3 upon driver installation. Therefore, when using this setting, you must also pair it with the setting to disable the installation of the driver USBSTOR.INF. This can be done via group policy “Computer ConfigurationPoliciesWindows SettingsSecurity SettingsFile System” and denying access to users that should not have access to drives. The files that need to limit access to are: “%SystemRoot%infusbstore.inf” and “”%SystemRoot%infusbstore.pnf” |
-
Deepak Talreja10 Feb 2009 9:13 AM
Hi
Very good & informative. I hv some query if u can solve.
We had implemented the GPO in which “Regedit” couldnot run setting was done for each of the PC in the Win2k8 domain. Now I want to know how to get it enabled. Please advise or email me the links on
deepakbt@ravin-it.com
-
27 Feb 2009 7:32 AM
Went through your comprehensive document but unfortunately was unable to toggle between enable /disable as net start usbstor errored for allow user. My workaround was to create 2 Registry Items within User ConfigurationPreferencesWindows SettingsRegistry The first with a value of 4 targetting the Deny group I created. The second with a value of 3 targetting the Allow group I created. Each of these groups populated the Computer ConfigurationWindows SettingsSecurity SettingsFile SystemObject name with explicit deny for the Deny Group and explicit allow for the Allow Group.
I shall be expanded the area of control to a small test group to see if their are any further issues. Thanks for the initial advice.
-
max10 Dec 2009 12:30 PM
hi!
will this block printers and usb mouses=?
thanks,.
bye
-
Riccardo10 Jun 2010 5:58 AM
In my environment I had to deny access to usbstore.inf and usbstore.pnf files to the system account as well, otherwise new drives would be installed and accessible the first time
-
Anurag Pathak14 Jun 2010 11:00 PM
Hi,
Very good information.
but i have one query, through this exersice you can block only pendrive right ???
but when i plug USB hard disk is working fine, it is opeing properly.
i also update the policy as well as, i also restart the system but still i got the same result.
so kinldy tell me is there any other strp to block CD rom, USB HARD DISK, Pen Drive & etc.
Thanks & Regards,
Anurag
anurag.pathak88@gmail.com
kindly give me the replay on my above mail address.
-
User in group disable on Targeting Editor17 Feb 2011 3:26 AM
I’m stuck at adding “User in Group” after select the targeting editor screen click New Item then Select Security Group.
We have user in groups but is not able to select.
Much appreciated can email me a feedback at tchuan@gmail.com