How to Restrict USB and Removable Storage Devices using Group Policy in Active Directory

This lab documents a real-world Group Policy implementation used to restrict USB drives, external hard drives, and all removable storage devices across domain-joined systems in an Active Directory environment.

The configuration addresses a critical security risk in modern on-premises and hybrid environments by preventing unauthorized data transfers, blocking removable media access, and securing Remote Desktop sessions.

Lab Objective

To centrally enforce removable media restrictions using Group Policy, ensuring:

  • No read/write access to USB storage

  • All removable storage classes are blocked

  • USB passthrough is disabled in RDP sessions

  • Policies apply consistently across all domain-joined systems

Lab Prerequisites

Before starting this lab, ensure the following:

  • A functioning Active Directory domain

  • Domain-joined client computers

  • Group Policy Management Console (GPMC) installed

  • Administrative privileges in the domain

  • Target computers placed in the correct OU

Step-by-Step Lab Tasks

 

Step 1: Open Group Policy Management

  • Log in to the Domain Controller

  • Open Group Policy Management

  • Identify the OU containing target computers

Step 2: Create and Link a New GPO

  • Create a new Group Policy Object (e.g., Disable USB & Removable Media)

  • Link the GPO to the appropriate computer-based OU

💡 These settings apply under Computer Configuration, so the GPO must target computer objects, not users.

Step 3: Edit the Group Policy Object

Navigate to:

Computer Configuration → Administrative Templates → System → Removable Storage Access

Step 4: Configure Removable Storage Policies

Navigate to Computer Configuration → Administrative Templates → System → Removable Storage Access

Enable/Disable the options shown on the right side as per the company requirements.

Enabled Settings (Full Removable Media Restriction)

Removable Disks: Deny read access – Enabled

  • Prevents users from opening or viewing files on USB storage

  • Blocks access even if the device is physically connected

Removable Disks: Deny write access – Enabled

  • Prevents copying or saving files to USB drives

  • Reduces data leakage and unauthorized file transfers

All Removable Storage Classes: Deny all access – Enabled

  • Blocks all removable storage types, including:

    • USB flash drives

    • External hard drives

    • CDs/DVDs

    • Tape drives

    • Smartphones and portable devices (WPD)

This setting overrides individual device permissions and enforces a blanket restriction.

Disabled Setting (USB Passthrough via RDP)

All Removable Storage: Allow direct access in remote sessions – Disabled

  • Prevents USB devices from being redirected into Remote Desktop sessions

  • Secures remote access scenarios and hybrid work environments

Not Configured Settings (Left at Default)

The following remain Not Configured:

  • CD/DVD (deny read/write/execute)

  • Floppy drives

  • Tape drives

  • Custom device classes

  • WPD devices (phones, tablets)

Because “Deny all access to all removable storage classes” is enabled, these device types are already blocked.
Granular configuration is only required if exceptions are needed later.

Step 5: Apply and Enforce the Policy

On target client machines, run:

gpupdate /force

Then:

  • Reboot if required

  • Test USB access using a standard user account

  • Confirm removable media is blocked locally and via RDP

 

 

Lab Outcome

After completing this lab:

  • USB and removable storage access is fully restricted

  • USB passthrough is blocked in Remote Desktop sessions

  • Policy enforcement is centralized and consistent

  • Endpoint security posture is significantly improved

This configuration reflects real enterprise security controls used in regulated and hybrid environments.

Why This Matters (Real-World Context)

Removable media remains a common attack vector for:

  • Data exfiltration

  • Malware introduction

  • Policy and compliance violations

Microsoft provides native Group Policy settings to control removable storage access, making this approach fully supported, auditable, and enterprise-ready.


Discover more from Humble Cloud Tech

Subscribe to get the latest posts sent to your email.

Leave a Comment

Your email address will not be published. Required fields are marked *

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://humbletech.cloud.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymised string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service Privacy Policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognise and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.
Save settings
Scroll to Top