Solved

Implementing device restriction policies for windows 8 phone on windows 7 pro machine

Posted on 2013-06-07
1
423 Views
Last Modified: 2013-07-15
Hi,

I have successfully implemented device restriction policies on the Windows 7 pro machines and Android phones are denied usb storage access.

But, Windows 8 phone is able to workaround the device restriction policies and is displayed under portable devices and I am able to access the Windows 8 phone's internal memory as well as sd card storage in my windows 7 pro desktop.

How do I implement device restriction policies so that my windows 8 phone is denied access to the usb port and the Windows 8 phone and its storage should not be displayed on my Windows desktop and access to the Windows 8 phone should be denied when it tries to connect to the windows 7 pro desktop using the usb port.

Please reply to this post as soon as possible.

Thanks and Regards,
Sriram.
0
Comment
Question by:sriramk7
1 Comment
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 39230998
They are consider as WPD Devices and there is GPO settings that allow you to deny read or write access to devices in the Windows Portable Device class. These devices include "smart" devices, such as media players, mobile phones, Windows CE devices, etc.

In the Group Policy Object Editor navigation pane, open Computer Configuration, then open Administrative Templates, open System, and then open Removable Storage Access. There should be a WPD Devices: Deny write access and WPD Devices: Deny read access

http://msdn.microsoft.com/en-us/library/bb530324.aspx

You may also want to note  on MTP which there is no default GPO about disable MTP devices. Maybe the best way is to try out WPD and see if that can already prevent device from connecting first - if we can do that the storage in the device access should be prevented @ http://social.technet.microsoft.com/Forums/en-US/w7itprogeneral/thread/89743ac1-856a-43dc-8b55-a94cbcbae979/
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many times while working on a computer regardless of any Operating System, lag and crashes seem to creep in, hindering your working speed. Sometimes, it can also cause your work to be lost unexpectedly and as a result, you are unable to meet your de…
I recently purchased an HP EliteBook 2540p notebook/laptop. It has two video ports on it – VGA and DisplayPort. HP offers an optional docking station for the 2540p that also has both a VGA port and a DisplayPort. There are numerous online reports do…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now