Forum Discussion

Sochito's avatar
Sochito
Brass Contributor
Jan 22, 2025

Defender of Endpoint on Comanaged Laptop

We are testing device control feature of Microsoft Defender for Endpoint (MDE).

  1. Onboarded a laptop to MDE only (not enrolled to Intune) - created two policies in Defender portal
  2. Onboarded to MDE and co-managed (Intune, SCCM) - Configured Endpoint protection workload to be managed by Intune. Created Attack surface reduction Device control policy in Intune portal - policy deployed successfully on the laptop.
    • Connected the USB on the device it showed the following

       

    • Left the device connected, after few hours, I could see the capacity, used storage of the USB, 

      clicking continue and entering admin credentials also wont allow the access of the USB.

       

    • Left the device connected overnight, and next Morning, I could double click on the drive and access the content, it directly allowed me the read-write access of the USB.
    • Unplugged and re-plugged the USB, then it shows USB is not accessible

I am not able to understand this inconsistent behaviour, please suggest if I am doing something wrong.

Also, instead of Access is denied messaged, can we display a message like "As per the corporate policy, you cant access the removable devices." when the user tries to access a USB.

Please help.

  • micheleariis's avatar
    micheleariis
    Steel Contributor

    To check the Device Control logs, open the Event Viewer and navigate to:

    Applications and Services Logs - Microsoft - Windows - Windows Defender - Operational

    There you should see events related to Attack Surface Reduction and Device Control. Make sure you run the Event Viewer with administrative privileges, and you can filter the logs for specific errors or messages related to Device Control

  • micheleariis's avatar
    micheleariis
    Steel Contributor

    Hi, it’s happening because Device Control isn’t supported on devices managed only by Defender (without Intune). In your co-managed scenario, you may see intermittent behavior due to policy sync delays or conflicts between Intune, SCCM, and any GPOs.

    Suggestions:

    -Make sure the Endpoint Protection workload is truly moved to Intune
    -Force policy sync from both Intune and the client
    -Check security/Device Control logs for conflicts
    -Reboot after policy application


    As for replacing “Access Denied” with a custom message, Windows doesn’t provide a built-in way to override that system error text.

    • Sochito's avatar
      Sochito
      Brass Contributor

      Thank you Michelariis, now the device is managed by Intune but behaviour is still the same.

      Endpoint Protection, device management workloads are moved to Intune for a pilot collection and the machines are member of that collection.

      Policy forced several Times behaviour is still the same

      Please share the location of of Device control logs

Resources