| |

Block Device Drivers by Setup Class GUID in Intune – Stop USB, Thunderbolt & Webcam Drivers (2025 Guide)

Block Driver Installation by Device Setup Class GUID in Intune – Complete 2025 Deep-Dive Guide

In 2025, one of the most powerful (yet under-used) Windows security controls is blocking entire device classes at the driver level using their Setup Class GUIDs. This stops USB sticks, Thunderbolt docks, FireWire DMA attacks, webcams, printers, Bluetooth devices — anything — from ever installing, even if the user is local admin.

This is not the same as removable storage restrictions in Defender/Endpoint DLP — this works at the kernel driver level and blocks the device before Windows even sees it.

Why This Matters in 2025

  • Prevents DMA attacks (Thunderbolt/FireWire/ExpressCard) used in <5-minute physical breaches
  • Stops rubber-ducky / BadUSB payloads
  • Enforces “no local printers” or “no webcams” policies in high-security environments
  • Blocks legacy or vulnerable drivers forever
  • Works on Windows 10 1809+ and all Windows 11 versions (including 25H2)

Two Official Methods (Both Supported in 2025)

Method Best For Granularity Requires Intune License
Administrative Templates (GPO-style) Most organizations Simple, readable, supported Microsoft 365 E3+
Custom OMA-URI (DeviceInstallation CSP) Advanced/granular control Full CSP power Same

Method 1: Administrative Templates (Recommended for 99% of Orgs)

  1. Intune Admin Center → Devices → Configuration profiles → Create profile
    Platform: Windows 10 and later
    Profile type: Templates → Administrative Templates
  2. Basics
    Name: Block Unauthorized Device Classes – Enterprise Standard
    Description: Prevents installation of USB storage, Thunderbolt, printers, webcams, etc.
  3. Configuration settings
    Search for:
    Prevent installation of devices using drivers that match these device setup classes
    → Enabled Then click Show and add any of these GUIDs:
Device Class Setup Class GUID Real-World Use Case
USB Mass Storage {36fc9e60-c465-11cf-8056-444553540000} Block all USB sticks/drives
Portable Devices (MTP/PTP) {eec5ad98-8080-425f-922a-dabf3de3f69a} Block phones, cameras as storage
CD/DVD/Blu-ray {4d36e965-e325-11ce-bfc1-08002be10318} Block optical drives
Printers {4d36e979-e325-11ce-bfc1-08002be10318} No local printer installation
Imaging Devices (Webcams) {6bdd1fc6-810f-11d0-bec7-08002be2092f} Prevent webcam driver install
Bluetooth {e0cbf06c-cd8b-4647-bb8a-263b43f0f974} Block all Bluetooth devices
Thunderbolt {c06ff265-ae09-48f0-812c-16753d7cba83} Critical for DMA attack prevention
FireWire (SBP-2) {d48179be-ec20-11d1-b6b8-00c04fa372a7} Legacy DMA attack vector
Biometric Devices {53d29ef7-377c-4d14-864b-eb3a85769359} Block external fingerprint readers
  1. Critical Checkbox
    Also apply to matching devices that are already installed
    → Without this, existing devices keep working. With it = instant disable on next sync.
  2. Assignments → Target your device or user groups
    Recommended: All corporate Windows devices (exclude kiosks/shared PCs if needed)
  3. Review + create

Method 2: Custom OMA-URI (Full CSP Control – For Power Users)

Create profile → Custom → Windows 10 and later

Setting Value
Name Block Device Classes via CSP
OMA-URI ./Device/Vendor/MSFT/Policy/Config/DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses
Data type String
Value {36fc9e60-c465-11cf-8056-444553540000},{eec5ad98-8080-425f-922a-dabf3de3f69a},{c06ff265-ae09-48f0-812c-16753d7cba83}

Optional second policy to block already-installed devices:

  • OMA-URI: ./Device/Vendor/MSFT/Policy/Config/DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClassesApplyToExisting
  • Value: 1

Whitelisting Specific Devices (When You Must Allow Some)

Use the companion policy:
Allow installation of devices that match any of these device instance IDs
→ Add specific Hardware IDs (from Device Manager → Details → Hardware IDs)

Verification & Monitoring (2025)

  1. On a test device:
    Event Viewer → Microsoft-Windows-DeviceSetupManager/Admin
    Look for Event ID 301 – “Device installation is denied by policy”
  2. Intune → Devices → [Device] → Device configuration → Check policy status
  3. Run on device:
    dsregcmd /status + check sync
    Or PowerShell:
   Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\PolicyManager\current\device\DeviceInstallation"

Pro Tips for 2025 Deployments

  • Always pilot on 50 devices first
  • Combine with BitLocker + DMA port protection for defense-in-depth
  • Use dynamic groups: “All devices except shared kiosks”
  • For Surface/approved docks → whitelist their specific Device Instance Paths
  • Works perfectly on Windows 11 24H2/25H2 and Windows 10 22H2+

This single policy is used by banks, defense contractors, and Fortune 100 companies to achieve true kernel-level peripheral control — all managed from the cloud with Intune.

Deploy it today. Your attack surface will thank you. 🛡️

Official Docs (2025):
https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-deviceinstallation

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *