Git Product home page Git Product logo

mdatp-devicecontrol's Introduction

Device Control

This repository contains samples and resources for Microsoft Defender for Endpoint Device Control for Windows and Microsoft Defender for Endpoint Device Control for Mac

Check the groups inventory and rules inventory for a complete list.

The repository also contains tools for converting, upgrading and documenting device control policies.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

mdatp-devicecontrol's People

Contributors

arysef avatar bryan-lipinski avatar j0shbregman avatar microsoft-github-operations[bot] avatar microsoftopensource avatar tewchen avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

mdatp-devicecontrol's Issues

mdatp-devicecontrol

device_control_policy_schema.json throws errors with the object type when I tried to use on JAMF

Define Device Control Evidence Data Remote Location : GPO

GPO 'Define Device Control Evidence Data Remote Location' does not appear to function.

When configured, workstations with access 8 and mask 16 only copy evidence data - files written to removable media - locally to 'C:\Windows\Defender Duplication Data'

Defender engine 4.18.2202.4
Windows 10 21H2 Enterprise
GPO setting is successfully written to registry HKLM:\Software\Policies\Microsoft\Windows Defender\Device Control\DefaultDuplicationRemoteLocation'

I have tried configuring SMB shares and specifying GPO as a UNC path ( I assume this is what is required, given the setting has absolutely no documentation or description within the GPO's adml file or this Repo, but that results in no change in behaviour. Endpoint devices will successfully create 'duplicates' of files written to removable media locally, but not to any 'remote path' specified in this GPO.

There's also no errors or issues recorded in MPDeviceControl.log on the endpoint to suggest any attempts yet alone issues with it attempting to copy evidence data to remote location.

any updates available?

Hi, I am currently working on project to enable the device control using GPOs and the documentation / steps is not clear / complete. Will there be any updates to this in near future?

audit of files

Hello,

I got this working and it’s really cool, however when you use the audit it doesn't seem to capture the files/folder. Is this a bug on my side or is it something that will come in the future?

Azure AD Group SID

Hello all...

I am trying to use an Azure AD group SID for an allow option and it does not work.
I have used my local user SID to verify the rule syntax and it worked ok.

Any idea's?
Thanks

Resource Not Found Error

Screenshot 2022-08-04 131644

Attached error after copying the latest files from this repo into the Policy Definitions folder.

Even opened the existing ADMX/ADMX files and saved as new copies in notepad as per README but still fails.

[MacOS] Deny All Bluetooth Devices Except Samsung sample difficulties in working

Hi,

Thanks for reading this issue! Hopefully this is monitored by someone.

TL;DR

Unable to block Bluetooth globally and/or Bluetooth sending files using the sample provided json.

Steps to Repro:

  1. Apply the sample for MacOS under:

macOS/policy/samples/deny_all_bluetooth_devices_except_samsung.json

e.g. Manual policy apply command:

mdatp config device-control policy set --path macOS/policy/samples/deny_all_bluetooth_devices_except_samsung.json

Expected output:

Configuration property updated.

  1. Open Bluetooth file exchange app (native macOS app)

  2. Select files you desire to transfer

  3. Files are successfully transfer to any device

Steps to Repro global exclusion:

  1. Download sample under:

macOS/policy/samples/deny_all_bluetooth_devices_except_samsung.json

  1. Modify settings.features.bluetoothDevice.disable to equal true and set global default enforcement to deny

e.g.

    "settings": {
        "features": {
            "bluetoothDevice": {
                "disable": true
            },
        },
        "global": {
            "defaultEnforcement": "deny"
        },
        "ux": {
            "navigationTarget": "http://www.microsoft.com"
        }
    }
  1. Apply the configuration

e.g. Manual policy apply command:

mdatp config device-control policy set --path macOS/policy/samples/deny_all_bluetooth_devices_except_samsung.json

Expected output:

Configuration property updated.

  1. Open Bluetooth file exchange app (native macOS app)

  2. Select files you desire to transfer

  3. Files are successfully transfer to any device

Thank you!

Multiple elements of ADML file are missing (referenced in the ADMX)

The following items are referenced in the ADMX but have no association in the ADML file

Reporting_ServiceHealthReportInterval (reported by others at Line 698 of the ADMX - confirmed).

I removed this element and found that these further 2 are also not referenced in the ADML file.

Reporting_EnableDynamicSignatureDroppedEventReporting
Features_TDTFeatureEnabled

The ADML file needs these additional elements defining.

Deny all removable media except APFS Encrypted devices

I’m currently facing a challenge with blocking all removable media, except for those that are encrypted. I’ve attempted to adjust the existing JSON example to include the Encryption Clause, but it seems to be ineffective. I would greatly appreciate any assistance or guidance on this matter. If anyone has a working example that I could reference, that would be extremely helpful as well. Thank you in advance for your time and support.

{
"groups": [
{
"$type": "device",
"id": "519a2e50-3bb7-49b7-9ae0-6feb415d58ca",
"name": "All Removable Media Devices",
"query": {
"$type": "all",
"clauses": [
{
"$type": "primaryId",
"value": "removable_media_devices"
}
]
}
}
],
"encryption": {
"title": "Encryption Clause",
"description": "Match if a device is encrypted. (Only supports Removable Media Devices)",
"required": [
"$type",
"value"
],
"additionalProperties": true,
"properties": {
"$type": {
"enum": [
"encryption"
]
},
"value": {
"enum": [
"apfs"
],
"title": "Encryption Type",
"examples": [
"apfs"
]
},
"__comments": {
"type": "string"
}
},
"examples": [
{
"$type": "encryption",
"value": "apfs"
}
]
},
"rules": [
{
"id": "69a4a010-acb1-4573-8a58-50cf4ee7bc7f",
"name": "Deny WX to all Removable Media Devices",
"includeGroups": [
"519a2e50-3bb7-49b7-9ae0-6feb415d58ca"
],
"entries": [
{
"__comments": "Deny Write, and Execute.",
"$type": "removableMedia",
"id": "c7a13940-5c14-49f6-b0fb-b0978bf0f8cc",
"enforcement": {
"$type": "deny"
},
"access": [
"write",
"execute"
]
},
{
"__comments": "Show UX and send events for all blocked operations.",
"$type": "removableMedia",
"id": "ae5672a9-0746-41e7-8c21-63222f1aa304",
"enforcement": {
"$type": "auditDeny",
"options": [
"send_event",
"show_notification"
]
},
"access": [
"read",
"write",
"execute"
]
}
]
}
],
"settings": {
"features": {
"removableMedia": {
"disable": false
}
},
"global": {
"defaultEnforcement": "allow"
},
"ux": {
"navigationTarget": "http://www.microsoft.com"
}
}
}

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.