How to create a BitLocker policy to exclude a specific USB model from encryption

 



BitLocker is one of Microsoft's well known policies to secure drives by encrypting them, using different encryption methods.

It is not a new method, it has been around since SCCM, and when Intune was introduced, it became available on the cloud side. The new policy will focus on TPM 2.0, which has become mandatory for Windows 11.

There are many fantastic blogs in our community about BitLocker details, and Microsoft has well documented it, so I will go very quickly on how to configure it, because my blog is about USB encryption.

How to configure BitLocker Policy:-

You can do it in different ways, by configuring a new policy under ‘Devices’, or you can do it from ‘Endpoint Security. I personally prefer the  2nd way.


Endpoint Security>Device encryption> create a new policy and select Windows and BitLocker



Configuration settings:-

These settings have many submenus (I'm doing Entra join if you have a different selection, AD, or both, like I did).

BitLocker:





BitLocker Drive Encryption: I used the highest and most secure method 256, please check the Microsoft document for the best method for you.



Operating System Drives: This section has many settings, so please take your time to go through it.






Fixed Data Drives






 

Removable Data Drives



Now the encryption has started as expected.


We began with our focus point. This setting will encrypt any drive on the computer, including removable drives like USBs. The customer’s security team was seeking a setting to exclude a specific USB model they want to use, and they do not want it to be encrypted.

Unfortunately, there is no setting in Intune. However, after extensive research, I found that a Configuration Service Provider (CSP) can do it for me.  

Here is how to configure it:-

Create a new policy>Windows 10 and later>Templates>Custom


After you name it, now we have to configure it,

Name: Give it a name, I name it ‘USE Drives Excluded From Encryption’

Description: As you wish.

OMA-URI: ./Device/Vendor/MSFT/BitLocker/RemovableDrivesExcludedFromEncryption

Data type: String

Value: USBSTOR\DiskPNY_____USB_2.0_FD______PMAP

 

Now, let me explain the CSP custom policy,

·         This is a Device policy, NOT a User policy, so ensure to target devices, not Users.

·         The Value depends on your USB type and model, you need to get this information from Compute Management>USB>Properties>Details>Hardware Ids


In my case, I used a USB ‘PNY.’ As you can see here, there are many values. What you need to understand is that, according to my test, these values are different, for example:

Value: USBSTOR\DiskPNY_____USB_2.0_FD______PMAP, this value targets a very specific model. I used this one.


Value: USBSTOR\DiskPNY_____USB_2.0_FD______, this value is a broad model of PNY related to USB_2.0_FD, regardless of the firmware.

Value: USBSTOR\DiskPNY_____, this value is not ideal because it is too broad and could include all PNY models, as well as other values like PNY_____USB_2.0_FD______P, USBSTOR\GenDisk, and GenDisk. The last two could include any USB device.

Value: USBSTOR\PNY_____USB_2.0_FD______P, PNY_____USB_2.0_FD______P. These two values did not work for my test. They appear to be invalid values.

 

You can also specify multiple values separated by commas. This setting was approved, as the customer had requested, and we successfully excluded their USB-specific model and firmware from the Drive Encryption prompt.



I hope this helps with your issue, and thank you for reading.

 

References:

BitLocker Overview | Microsoft Learn

BitLocker CSP | Microsoft Learn


Comments

Popular posts from this blog

New LAPS for Windows 11 24H2

Windows Autopatch Hotpatch

How to block TikTok or other social media