HARDWARE

Windows 8 : Managing enterprise hardware policies - Managing enterprise hardware installation policies

2/22/2014 3:32:13 AM

Managing enterprise hardware installation policies

Administrators can create organizational policies that define how devices are managed by using Group Policy. You can disable the installation of removable devices completely, or you can take a more surgical approach by allowing or preventing the installation of removable devices.

Before undertaking this effort, make sure you understand the two ways by which you can choose devices to allow or prevent such installations:

  • Device identification strings This is the most granular way to allow or prevent the installation of hardware devices. By using this method, you can identify specific devices to include in the policy.

  • Device setup classes By using device setup classes, you take a group-based approach to allow or prevent hardware devices from being installed. For example, you could prevent the installation of any device that’s a scanner.

Identifying hardware strings and classes

To identify the hardware string and class for a hardware device:

  1. Plug the device into a Windows-based computer.

  2. Open Device Manager.

  3. Open the Properties page for the newly installed device.

  4. Navigate to the device’s Details page.

    • Select the Hardware Ids property to view all the hardware IDs associated with the device (Figure 1).

    • Select the Compatible Ids property to view the device class for the new device (Figure 1).

Hardware IDs for a USB thumb drive

Figure 1. Hardware IDs for a USB thumb drive

Compatible IDs for a USB thumb drive

Figure 2. Compatible IDs for a USB thumb drive

Note that there are multiple options for both hardware ID and class ID. For the hardware ID, the options give you a way to be somewhat granular in how you handle devices. For example, you could choose to prevent or allow just SanDisk devices or prevent or allow just the specific device model.

REAL WORLD: COPY AND PASTE THE HARDWARE ID

To save a lot of trouble, copy and paste the hardware IDs rather than trying to type them and match the number of underscore characters. You will minimize errors this way.

Disabling installation of removable devices

High-security organizations do not generally allow the use of any removable devices on a system. To do so would enable an insider to just connect a USB thumb drive and steal corporate assets or other secrets. By using Group Policy, it’s possible to disable the installation of removable devices completely. The Group Policy described in the following list will, when set, enable you to disable the installation of removable devices on as many computers in your organization as you like:

  • Policy name Prevent Installation Of Removable Devices.

  • Policy path Windows Settings, Administrative Templates, System, Device Installation, Device Installation Restrictions.

  • Policy description This policy setting enables you to prevent Windows from installing removable devices. A device is considered removable when its driver indicates that the device is removable. For example, a USB device is reported to be removable by the drivers for the USB hub to which the device is connected. This policy setting takes precedence over any other policy setting that allows Windows to install a device.

  • Enabled If you enable this policy setting, it prevents Windows from installing removable devices, and the drivers for existing removable devices cannot be updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server.

  • Disabled or not configured If you disable or do not configure this policy setting, Windows can install and update device drivers for removable devices as allowed or prevented by other policy settings.

Managing installation of specific devices based on device ID or group

The ability to prevent the installation of removable devices is nice, but it is a heavy-handed approach to the problem. Other policies are available by which you can be a bit more granular in how you handle allowed and disallowed devices.

For these policies, you need to know the class of the device.

Restricting Device Installation Based on Class

The following Group Policy enables you to specify device classes that are not allowed to be installed in the organization:

  • Policy name Prevent installation of devices using drivers that match these devices’ setup classes.

  • Policy path Windows Settings, Administrative Templates, System, Device Installation, Device Installation Restrictions.

  • Policy description This policy setting enables you to specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device.

  • Enabled If you enable this policy setting, Windows is prevented from installing or updating device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.

  • Disabled or not configured If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings.

Allowing Device Installation Based on Class

The following Group Policy enables you to specify device classes that are allowed to be installed in the organization. Use this policy only when you also configure the Prevent Installation Of Devices Not Described By Other Policy Settings policy setting. This policy overrides the hardware installation restrictions for any device classes you list.

  • Policy name Prevent installation of devices using drivers that match these devices’ setup classes.

  • Policy path Windows Settings, Administrative Templates, System, Device Installation, Device Installation Restrictions.

  • Policy description This policy setting enables you to specify a list of device setup class GUIDs for device drivers that Windows is allowed to install. Use this policy setting only when the Prevent Installation Of Devices Not Described By Other Policy Settings policy setting is enabled. Other policy settings that prevent device installation take precedence over this one.

  • Enabled If you enable this policy setting, Windows is allowed to install or update device drivers whose device setup class GUIDs appear in the list you create unless another policy setting specifically prevents installation. (Examples are the Prevent Installation Of Devices That Match These Device IDs policy setting, the Prevent Installation Of Devices For These Device Classes policy setting, and the Prevent Installation Of Removable Devices policy setting). If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.

  • Disabled or not configured If you disable or do not configure this policy setting, and no other policy setting describes the device, the Prevent Installation Of Devices Not Described By Other Policy Settings policy setting determines whether the device can be installed.

Restricting Device Installation Based on Hardware ID

The following Group Policy enables you to specify device IDs that are not allowed to be installed in the organization. You need to specify hardware IDs when enabling this policy.

  • Policy name Prevent installation of devices that use any of these device IDs.

  • Policy path Windows Settings, Administrative Templates, System, Device Installation, Device Installation Restrictions.

  • Policy description This policy setting enables you to specify a list of plug-and-play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device.

  • Enabled If you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.

  • Disabled or not configured If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings.

Allowing Device Installation Based on Hardware ID

The following Group Policy enables you to specify device IDs that are allowed to be installed in the organization. You need to specify hardware IDs when enabling this policy.

  • Policy name Allow installation of devices that use any of these device IDs.

  • Policy path Windows Settings, Administrative Templates, System, Device Installation, Device Installation Restrictions.

  • Policy description This policy setting enables you to specify a list of plug-and-play hardware IDs and compatible IDs for devices that Windows is allowed to install. Use this policy setting only when the Prevent Installation Of Devices Not Described By Other Policy Settings policy setting is enabled. Other policy settings that prevent device installation take precedence over this one.

  • Enabled If you enable this policy setting, Windows is allowed to install or update any device whose plug-and-play hardware ID or compatible ID appears in the list you create unless another policy setting specifically prevents that installation. (Examples are the Prevent Installation Of Devices That Match Any Of These Device IDs policy setting, the Prevent Installation Of Devices For These Device Classes policy setting, and the Prevent Installation Of Removable Devices policy setting). If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.

  • Disabled or not configured If you disable or do not configure this policy setting, and no other policy setting describes the device, the Prevent Installation Of Devices Not Described By Other Policy Settings policy setting determines whether the device can be installed.

Creating an administrative override for device installation

As an administrator, it might be necessary to install a device that is generally restricted in the organization. To accomplish this goal, use the following policy settings:

  • Policy name Allow administrators to override Device Installation Restriction policies.

  • Policy path Windows Settings, Administrative Templates, System, Device Installation, Device Installation Restrictions.

  • Policy description This policy setting enables you to determine whether members of the Administrators group can install and update the drivers for any device regardless of other policy settings.

  • Enabled If you enable this policy setting, members of the Administrators group can use the Add Hardware Wizard or the Update Driver Wizard to install and update the drivers for any device. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.

  • Disabled or not configured If you disable or do not configure this policy setting, members of the Administrators group are subject to all policy settings that restrict device installation.

Other  
  •  Windows 8 : Managing hardware devices - Enabling and disabling hardware devices, Monitoring USB devices
  •  Windows 8 : Managing drivers (part 7) - Discovering the Driver Verifier utility, Adding device drivers to the driver store
  •  Windows 8 : Managing drivers (part 6) - Using the System Information utility - Viewing conflicting or shared resources, System Information highlights
  •  Windows 8 : Managing drivers (part 5) - Using Device Manager - Update Driver, Roll Back Driver, Displaying hidden devices
  •  Windows 8 : Managing drivers (part 4) - Using Device Manager - The Resources tab, Managing drivers, Driver Details
  •  Windows 8 : Managing drivers (part 3) - Using Device Manager - Viewing device and driver information
  •  Windows 8 : Managing drivers (part 2) - Using Device Manager - Opening Device Manager
  •  Windows 8 : Managing drivers (part 1) - Driver installation methods,Driver types
  •  NZXT H230 Classic - Silent Mid-Tower Case
  •  Alternatives To Online Backups
  •  
    Top 10
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS