
- #Usb mass storage device driver window 7 driver#
- #Usb mass storage device driver window 7 portable#
- #Usb mass storage device driver window 7 windows#
#Usb mass storage device driver window 7 driver#
When you connect any USB storage device to the computer, the USBSTOR driver installs the device and creates a separate registry key under the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR. Let’s take a quick look at how this can be configured. You can use a certain registry setting to allow a specific (approved) USB storage drive to connect to your computer. Key path: SYSTEM\CurrentControlSet\Services\USBSTORĪllow Only a Specific USB Storage Device to be Connected.
#Usb mass storage device driver window 7 windows#
Create a new Group Policy, link it to the OU with computers and in the Computer Configuration -> Preferences -> Windows Settings -> Registry section, create a new parameter with the values: These settings can be deployed to all domain computers. To do this, you need to make changes to the registry through the GPO. You can disable the USBSTOR driver from running on domain computers using Group Policy Preferences. This is the only way to disable USB drives in outdated Windows XP/Windows Server 2003, since in these versions there are no separate Group Policy settings to restrict access to external USB devices. With the help of REG_DWORD parameters, I prohibited writing and running executable from USB drives. In the screenshot below, I’ve created a RemovableStorageDevices key, and a subkey named. You can manually create the specified registry keys and parameters. If the value of this parameter is equal to 1, the USB restriction is active, if 0 – there are no recstrcition on this device class. To enable one of these policies, you must create a new subkey in the specified key with the name of the device class you want to block access to (column 2) and REG_DWORD parameter with constraint type ( Deny_Read, Deny_Write or Deny_Execute). All the above policies correspond to certain registry keys in the HKLM (or HKCU) \SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices key (by default this registry key is missing). You can more flexibly control access to external devices by configuring the registry settings that are set by the policies discussed above via the Group Policy Preferences (GPP). For this group, set permissions to read and apply the GPO, and leave only read permission for the Authenticated Users or Domain Computers group (by unchecking the Apply group policy checkbox).īlocking USB and Removable Devices via Registry and Group Policy Preferences Create a security group “Deny USB” and add this group in the security settings of the GPO. There may be another task – you need to allow the use of external USB drives for everyone except a certain group of users. In the security settings editor, specify that the Domain Admins group is not allowed to apply this GPO ( Apply group policy – Deny). Go to the Delegation tab and click the Advanced.In the Security Filtering section, add the Domain Admins group.Select your Disable USB Access policy in the Group Policy Management console.
#Usb mass storage device driver window 7 portable#
Windows Portable Device – this class includes smartphones, tablets, players, etc.Īs you can see, you can deny the launch of executable files for each device class (protect computers against viruses), prohibit reading data and writing /editing files on external media.

