Intune / MDE device control policy audit events
I find that this feature is inconsistent on outputting the audit events to advanced hunting. I have not had an issue making the policies block devices including allowing specific ones, however it seems to be finicky on when it will output the RemovableStoragePolicyTriggered events. If I reboot the device it seems to emit the audit events briefly. The Windows Toast notifications are also inconsistent, but I suspect that is due to some function of Windows that limits the number of notifications that can occur.
Is there some trick to make the audit events show up in advanced hunting consistently?
My configuration is targeting USB/WPD/CDROM each one denying “File Write/File Execute” with an audit allowed + audit denied for everything but print.
I tried explicitly “allowing” read/write/execute/fileread but it had no effect other than changing the policy label from “DefaultAllow” to the policy name when it did happen to emit a RemovableStoragePolicyTriggered event. I “clean” the registry keys associated with the policies prior to testing to get rid of duplicate data from policy updates.
HKLM:SOFTWAREPoliciesMicrosoftWindows DefenderPolicy Manager (PolicyRules/PolicyGroups)
I find that this feature is inconsistent on outputting the audit events to advanced hunting. I have not had an issue making the policies block devices including allowing specific ones, however it seems to be finicky on when it will output the RemovableStoragePolicyTriggered events. If I reboot the device it seems to emit the audit events briefly. The Windows Toast notifications are also inconsistent, but I suspect that is due to some function of Windows that limits the number of notifications that can occur. Is there some trick to make the audit events show up in advanced hunting consistently? My configuration is targeting USB/WPD/CDROM each one denying “File Write/File Execute” with an audit allowed + audit denied for everything but print. I tried explicitly “allowing” read/write/execute/fileread but it had no effect other than changing the policy label from “DefaultAllow” to the policy name when it did happen to emit a RemovableStoragePolicyTriggered event. I “clean” the registry keys associated with the policies prior to testing to get rid of duplicate data from policy updates. HKLM:SOFTWAREPoliciesMicrosoftWindows DefenderPolicy Manager (PolicyRules/PolicyGroups) Read More