IntuneDeviceControlPolicyWindows10

Parameters

Parameter Attribute DataType Description Allowed Values
Description Write String Policy description
DisplayName Key String Policy name
RoleScopeTagIds Write StringArray[] List of Scope Tags for this Entity instance.
Id Write String The unique identifier for an entity. Read-only.
PolicyRule Write MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRule[] The list of policy rules to apply.
DeviceInstall_Allow_Deny_Layered Write String Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_IDs_Allow Write String Allow installation of devices that match any of these device IDs (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_IDs_Allow_List Write StringArray[] Allowed device IDs
DeviceInstall_Instance_IDs_Allow Write String Allow installation of devices that match any of these device instance IDs (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_Instance_IDs_Allow_List Write StringArray[] Allowed Instance IDs
DeviceInstall_Classes_Allow Write String Allow installation of devices using drivers that match these device setup classes (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_Classes_Allow_List Write StringArray[] Allowed classes
DeviceInstall_Unspecified_Deny Write String Prevent installation of devices not described by other policy settings (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_IDs_Deny Write String Prevent installation of devices that match any of these device IDs (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_IDs_Deny_List Write StringArray[] Prevented device IDs
DeviceInstall_IDs_Deny_Retroactive Write String Also apply to matching devices that are already installed. (0: False, 1: True) 0, 1
DeviceInstall_Instance_IDs_Deny Write String Prevent installation of devices that match any of these device instance IDs (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_Instance_IDs_Deny_Retroactive Write String Also apply to matching devices that are already installed. (Device) (0: False, 1: True) 0, 1
DeviceInstall_Instance_IDs_Deny_List Write StringArray[] Prevented Instance IDs
DeviceInstall_Classes_Deny Write String Prevent installation of devices using drivers that match these device setup classes (0: Disabled, 1: Enabled) 0, 1
DeviceInstall_Classes_Deny_List Write StringArray[] Prevented Classes
DeviceInstall_Classes_Deny_Retroactive Write String Also apply to matching devices that are already installed. (0: False, 1: True) 0, 1
DeviceInstall_Removable_Deny Write String Prevent installation of removable devices (0: Disabled, 1: Enabled) 0, 1
WPDDevices_DenyRead_Access_2 Write String WPD Devices: Deny read access (0: Disabled, 1: Enabled) 0, 1
WPDDevices_DenyRead_Access_1 Write String WPD Devices: Deny read access (User) (0: Disabled, 1: Enabled) 0, 1
WPDDevices_DenyWrite_Access_2 Write String WPD Devices: Deny write access (0: Disabled, 1: Enabled) 0, 1
WPDDevices_DenyWrite_Access_1 Write String WPD Devices: Deny write access (User) (0: Disabled, 1: Enabled) 0, 1
AllowFullScanRemovableDriveScanning Write String Allow Full Scan Removable Drive Scanning (0: Not allowed. Turns off scanning on removable drives., 1: Allowed. Scans removable drives.) 0, 1
AllowDirectMemoryAccess Write String Allow Direct Memory Access (0: Not allowed., 1: Allowed.) 0, 1
DeviceEnumerationPolicy Write String Device Enumeration Policy (0: Block all (Most restrictive), 1: Only after log in/screen unlock, 2: Allow all (Least restrictive)) 0, 1, 2
RemovableDiskDenyWriteAccess Write String Removable Disk Deny Write Access (0: Disabled., 1: Enabled.) 0, 1
AllowUSBConnection Write String Allow USB Connection (0: Not allowed., 1: Allowed.) 0, 1
AllowBluetooth Write String Allow Bluetooth (0: Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be grayed out and the user will not be able to turn Bluetooth on., 1: Reserved. If this is set to 1, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on., 2: Allow Bluetooth. If this is set to 2, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on.) 0, 1, 2
AllowAdvertising Write String Allow Advertising (0: Not allowed. When set to 0, the device will not send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is not received by the peripheral., 1: Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral.) 0, 1
AllowDiscoverableMode Write String Allow Discoverable Mode (0: Not allowed. When set to 0, other devices will not be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you cannot see the name of the device., 1: Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it.) 0, 1
AllowPrepairing Write String Allow Prepairing (0: Not allowed., 1: Allowed.) 0, 1
AllowPromptedProximalConnections Write String Allow Prompted Proximal Connections (0: Disallow. Block users on these managed devices from using Swift Pair and other proximity based scenarios, 1: Allow. Allow users on these managed devices to use Swift Pair and other proximity based scenarios) 0, 1
ServicesAllowedList Write StringArray[] Services Allowed List
AllowStorageCard Write String Allow Storage Card (0: SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card., 1: Allow a storage card.) 0, 1
Assignments Write MSFT_DeviceManagementConfigurationPolicyAssignments[] Represents the assignment to the Intune policy.
Ensure Write String Present ensures the policy exists, absent ensures it is removed. Present, Absent
Credential Write PSCredential Credentials of the Admin
ApplicationId Write String Id of the Azure Active Directory application to authenticate with.
TenantId Write String Id of the Azure Active Directory tenant used for authentication.
ApplicationSecret Write PSCredential Secret of the Azure Active Directory tenant used for authentication.
CertificateThumbprint Write String Thumbprint of the Azure Active Directory application's authentication certificate to use for authentication.
ManagedIdentity Write Boolean Managed ID being used for authentication.
AccessTokens Write StringArray[] Access token used for authentication.

MSFT_DeviceManagementConfigurationPolicyAssignments

Parameters

Parameter Attribute DataType Description Allowed Values
dataType Write String The type of the target assignment. #microsoft.graph.groupAssignmentTarget, #microsoft.graph.allLicensedUsersAssignmentTarget, #microsoft.graph.allDevicesAssignmentTarget, #microsoft.graph.exclusionGroupAssignmentTarget, #microsoft.graph.configurationManagerCollectionAssignmentTarget
deviceAndAppManagementAssignmentFilterType Write String The type of filter of the target assignment i.e. Exclude or Include. Possible values are:none, include, exclude. none, include, exclude
deviceAndAppManagementAssignmentFilterId Write String The Id of the filter for the target assignment.
groupId Write String The group Id that is the target of the assignment.
groupDisplayName Write String The group Display Name that is the target of the assignment.
collectionId Write String The collection Id that is the target of the assignment.(ConfigMgr)

MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRule

Parameters

Parameter Attribute DataType Description Allowed Values
Entry Write MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRuleEntry[] Entry
Name Write String Name
ExcludedIdList_GroupId Write StringArray[] Excluded ID
IncludedIdList_GroupId Write StringArray[] Included ID

MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRuleEntry

Parameters

Parameter Attribute DataType Description Allowed Values
Type Write String Type (allow: Allow, deny: Deny, auditallowed: AuditAllowed, auditdenied: AuditDenied) allow, deny, auditallowed, auditdenied
Options Write String Options (0: None, 1: ShowNotification, 2: SendEvent, 3: SendNotificationAndEvent, 4: Disable) 0, 1, 2, 3, 4
Sid Write String Sid
AccessMask Write SInt32Array[] Access mask (1: WDD_READ_ACCESS, 2: WDD_WRITE_ACCESS, 4: WDD_EXECUTE_ACCESS, 8: WDD_FS_READ_ACCESS, 16: WDD_FS_WRITE_ACCESS, 32: WDD_FS_EXECUTE_ACCESS, 64: WDD_PRINT_ACCESS) 1, 2, 4, 8, 16, 32, 64
ComputerSid Write String Computer Sid

Description

Intune Device Control Policy for Windows10

Permissions

Microsoft Graph

To authenticate with the Microsoft Graph API, this resource required the following permissions:

Delegated permissions

  • Read

    • Group.Read.All, DeviceManagementConfiguration.Read.All
  • Update

    • Group.Read.All, DeviceManagementConfiguration.ReadWrite.All

Application permissions

  • Read

    • Group.Read.All, DeviceManagementConfiguration.Read.All
  • Update

    • Group.Read.All, DeviceManagementConfiguration.ReadWrite.All

Examples

Example 1

This example creates a new Device Control Policy.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneDeviceControlPolicyWindows10 'ConfigureDeviceControlPolicy'
        {
            AllowStorageCard      = "1";
            Assignments           = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments{
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    dataType = '#microsoft.graph.groupAssignmentTarget'
                    groupId = '11111111-1111-1111-1111-111111111111'
                }
            );
            Description           = 'Description'
            DisplayName           = "Device Control";
            DeviceInstall_IDs_Allow      = "1";
            DeviceInstall_IDs_Allow_List = @("1234");
            PolicyRule                   = @(
                MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRule{
                    Name = 'asdf'
                    Entry = @(
                        MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRuleEntry{
                            AccessMask = @(
                                '1'
                                '2'
                            )
                            Sid = '1234'
                            ComputerSid = '1234'
                            Type = 'allow'
                            Options = '4'
                        }
                    )
                }
            );
            Ensure                = "Present";
            Id                    = '00000000-0000-0000-0000-000000000000'
            RoleScopeTagIds       = @("0");
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 2

This example updates a Device Control Policy.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneDeviceControlPolicyWindows10 'ConfigureDeviceControlPolicy'
        {
            AllowStorageCard      = "1";
            Assignments           = @(
                MSFT_DeviceManagementConfigurationPolicyAssignments{
                    deviceAndAppManagementAssignmentFilterType = 'none'
                    dataType = '#microsoft.graph.groupAssignmentTarget'
                    groupId = '11111111-1111-1111-1111-111111111111'
                }
            );
            Description           = 'Description'
            DisplayName           = "Device Control";
            DeviceInstall_IDs_Allow      = "1";
            DeviceInstall_IDs_Allow_List = @("1234");
            PolicyRule                   = @(
                MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRule{
                    Name = 'asdf'
                    Entry = @(
                        MSFT_MicrosoftGraphIntuneSettingsCatalogPolicyRuleEntry{
                            AccessMask = @(
                                '1'
                                '2'
                            )
                            Sid = '1234'
                            ComputerSid = '1234'
                            Type = 'deny' # Updated property
                            Options = '4'
                        }
                    )
                }
            );
            Ensure                = "Present";
            Id                    = '00000000-0000-0000-0000-000000000000'
            RoleScopeTagIds       = @("0");
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}

Example 3

This example removes a Device Control Policy.

Configuration Example
{
    param(
        [Parameter()]
        [System.String]
        $ApplicationId,

        [Parameter()]
        [System.String]
        $TenantId,

        [Parameter()]
        [System.String]
        $CertificateThumbprint
    )
    Import-DscResource -ModuleName Microsoft365DSC

    node localhost
    {
        IntuneDeviceControlPolicyWindows10 'ConfigureDeviceControlPolicy'
        {
            Id          = '00000000-0000-0000-0000-000000000000'
            DisplayName = 'Device Control'
            Ensure      = 'Absent'
            ApplicationId         = $ApplicationId;
            TenantId              = $TenantId;
            CertificateThumbprint = $CertificateThumbprint;
        }
    }
}