Bluetooth Device Control Windows 10
View the settings you can configure in profiles for Attack surface reduction policy in the endpoint security node of Intune as part of an Endpoint security policy.
- Bluetooth technology lets you connect gadgets wirelessly to your computer running Windows 10, removing clutter from your desktop. On a tablet, Bluetooth lets you add a mouse and keyboard without hogging one of your coveted USB ports. Bluetooth can also connect your computer, laptop, or tablet with some cellphones for wireless Internet access — if.
- Jun 12, 2012 In case anybody stumbles upon this thread and still wants to know, you can access the Bluetooth Device Control by going to 'Devices and Printers,' then right-clicking your device, and going to Control.
- Windows troubleshooting Bluetooth and Sound devices. Checking for issues in Device Manager6 9. Disabling, enabling, disconnecting combinations of the two in Control Panel, Sound3. Connecting through AUX cable but I get an annoying background noise, and windows doesn't even recognize the speakers.
Supported platforms and profiles:
For example, on Windows 10 devices you can configure BitLocker and Windows Information Protection, which will encrypt company data even if it is stored on a personal device, or use the Storage/RemovableDiskDenyWriteAccess CSP to deny write access to removable disks. How to Enable or Disable Bluetooth Absolute Volume in Windows 10 Absolute Volume is a feature released starting with the Windows 10 April 2018 update version 1803. This feature allows the Windows volume slider to precisely control the local volume of compatible Bluetooth speakers or headphones connected to the computer.
Bluetooth Device Control Windows 10 Driver
- Windows 10 and later:
- Profile: App and browser isolation
- Profile: Web protection
- Profile: Application control
- Profile: Attack surface reduction rules
- Profile: Device control
- Profile: Exploit protection
App and browser isolation profile
App and browser isolation
Turn on Application Guard for Edge (Options)
CSP: AllowWindowsDefenderApplicationGuard- Not configured (default)
- Enabled for Edge - Application Guard opens unapproved sites in a Hyper-V virtualized browsing container.
When set to Enabled for Edge, the following settings are available:
Clipboard behavior
CSP: ClipboardSettingsChoose what copy and paste actions are allowed from the local PC and an Application Guard virtual browser.
- Not configured (default)
- Block copy and paste between PC and browser
- Allow copy and paste from browser to PC only
- Allow copy and paste from PC to browser only
- Allow copy and paste between PC and browser
Block external content from non-enterprise approved sites
CSP: BlockNonEnterpriseContent- Not configured (default)
- Yes - Block content from unapproved websites from loading.
Collect logs for events that occur within an Application Guard browsing session
CSP: AuditApplicationGuard- Not configured (default)
- Yes - Collect logs for events that occur within an Application Guard virtual browsing session.
Allow user-generated browser data to be saved
CSP: AllowPersistence- Not configured (default)
- Yes - Allow user data that is created during an Application Guard virtual browsing session to be saved. Examples of user data include passwords, favorites, and cookies.
Enable hardware graphics acceleration
CSP: AllowVirtualGPU- Not configured (default)
- Yes - Within the Application Guard virtual browsing session, use a virtual graphics processing unit to load graphics-intensive websites faster.
Allow users to download files onto the host
CSP: SaveFilesToHost- Not configured (default)
- Yes - Allow users to download files from the virtualized browser onto the host operating system​.
Application guard allow print to local printers
- Not configured (default)
- Yes - Allow printing to local printers.
Application guard allow print to network printers
- Not configured (default)
- Yes - Allow printing print to network printers.
Application guard allow print to PDF
- Not configured (default)
- Yes- Allow printing print to PDF.
Application guard allow print to XPS
- Not configured (default)
- Yes - - Allow printing print to XPS.
Windows network isolation policy
- Not configured (default)
- Yes - Configure Windows network isolation policy.
When set to Yes, you can configure the following settings.
IP ranges
Expand the dropdown, select Add, and then specify a lower address and then an upper address.Cloud resources
Expand the dropdown, select Add, and then specify an IP address or FQDN and a Proxy.Network domains
Expand the dropdown, select Add, and then specify Network domains.Proxy servers
Expand the dropdown, select Add, and then specify Proxy servers.Internal proxy servers
Expand the dropdown, select Add, and then specify Internal proxy servers.Neutral resources
Expand the dropdown, select Add, and then specify Neutral resources.Disable Auto detection of other enterprise proxy servers
- Not configured (default)
- Yes - Disable Auto detection of other enterprise proxy servers.
Disable Auto detection of other enterprise IP ranges
- Not configured (default)
- Yes - Disable Auto detection of other enterprise IP ranges.
Web protection profile
Web Protection
Enable network protection
CSP: EnableNetworkProtection- Not configured (default) - The setting returns to the Windows default, which is disabled.
- User defined
- Enable - Network protection is enabled for all users on the system.
- Audit mode - Users aren't blocked from dangerous domains and Windows events are raised instead.
Require SmartScreen for Microsoft Edge
CSP: Browser/AllowSmartScreen- Yes - Use SmartScreen to protect users from potential phishing scams and malicious software.
- Not configured (default)
Block malicious site access
CSP: Browser/PreventSmartScreenPromptOverride- Yes - Block users from ignoring the Microsoft Defender SmartScreen Filter warnings and block them from going to the site.
- Not configured (default)
Block unverified file download
CSP: Browser/PreventSmartScreenPromptOverrideForFiles- Yes - Block users from ignoring the Microsoft Defender SmartScreen Filter warnings and block them from downloading unverified files.
- Not configured (default)
Application control profile
Microsoft Defender Application Control
App locker application control
CSP: AppLocker- Not configured (default)
- Enforce Components and Store Apps
- Audit Components and Store Apps
- Enforce Components, Store Apps, and Smartlocker
- Audit Components, Store Apps, and Smartlocker
Block users from ignoring SmartScreen warnings
CSP: SmartScreen/PreventOverrideForFilesInShell- Not configured (default) - Users can ignore SmartScreen warnings for files and malicious apps.
- Yes - SmartScreen is enabled and users can't bypass warnings for files or malicious apps.
Turn on Windows SmartScreen
CSP: SmartScreen/EnableSmartScreenInShell- Not configured (default) - Return the setting to Windows default, which is to enable SmartScreen, however users may change this setting. To disable SmartScreen, use a custom URI.
- Yes - Enforce the use of SmartScreen for all users.
Attack surface reduction rules profile
Attack Surface Reduction Rules
Block credential stealing from the Windows local security authority subsystem (lsass.exe)
This attack surface reduction (ASR) rule is controlled via the following GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
- Not configured (default) - The setting returns to the Windows default, which is off.
- User defined
- Enable - Attempts to steal credentials via lsass.exe are blocked.
- Audit mode - Users aren't blocked from dangerous domains and Windows events are raised instead.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
Block Adobe Reader from creating child processes
Reduce attack surfaces with attack surface reduction rulesThis ASR rule is controlled via the following GUID: 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
- Not configured (default) - The Windows default is restored, is to not block creation of child processes.
- User defined
- Enable - Adobe Reader is blocked from creating child processes.
- Audit mode - Windows events are raised instead of blocking child processes.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
Block Office applications from injecting code into other processes
Protect devices from exploitsThis ASR rule is controlled via the following GUID: 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Office applications are blocked from injecting code into other processes.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block Office applications from creating executable content
Protect devices from exploitsThis ASR rule is controlled via the following GUID: 3B576869-A4EC-4529-8536-B80A7769E899
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Office applications are blocked from creating executable content.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block all Office applications from creating child processes
Protect devices from exploitsThis ASR rule is controlled via the following GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Office applications are blocked from creating child processes.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block Win32 API calls from Office macro
Protect devices from exploitsThis ASR rule is controlled via the following GUID: 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Office macro's are blocked from using Win32 API calls.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block Office communication apps from creating child processes
Protect devices from exploitsThis ASR rule is controlled via the following GUID: 26190899-1602-49e8-8b27-eb1d0a1ce869.
- Not configured (default) - The Windows default is restored, which is to not block creation of child processes.
- User defined
- Enable - Office communication applications are blocked from creating child processes.
- Audit mode - Windows events are raised instead of blocking child processes.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
Block execution of potentially obfuscated scripts (js/vbs/ps)
Protect devices from exploitsThis ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Defender blocks execution of obfuscated scripts.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block JavaScript or VBScript from launching downloaded executable content
Protect devices from exploitsThis ASR rule is controlled via the following GUID: D3E037E1-3EB8-44C8-A917-57927947596D
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Defender blocks JavaScript or VBScript files that have been downloaded from the Internet from being executed.
- Audit mode - Windows events are raised instead of blocking.
- Disable - This setting is turned off.
Block process creations originating from PSExec and WMI commands
Protect devices from exploitsThis ASR rule is controlled via the following GUID: d1e49aac-8f56-4280-b9ba-993a6d77406c
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Process creation by PSExec or WMI commands is blocked.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block untrusted and unsigned processes that run from USB
Protect devices from exploitsThis ASR rule is controlled via the following GUID: b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Untrusted and unsigned processes that run from a USB drive are blocked.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block executable files from running unless they meet a prevalence, age, or trusted list criteria
Protect devices from exploitsThis ASR rule is controlled via the following GUID: 01443614-cd74-433a-b99e-2ecdc07bfc25e
- Not configured (default) - The setting returns to the Windows default, which is off.
- Block
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Block executable content download from email and webmail clients
Protect devices from exploits- Not configured (default) - The setting returns to the Windows default, which is off.
- Block - Executable content downloaded from email and webmail clients is blocked.
- Audit mode - Windows events are raised instead of blocking.
- Warn - For Windows 10 version 1809 or later, the device user receives a message that they can bypass Block of the setting. On devices that run earlier versions of Windows 10, the rule enforces the Enable behavior.
- Disable - This setting is turned off.
Use advanced protection against ransomware
Protect devices from exploitsThis ASR rule is controlled via the following GUID: c1db55ab-c21a-4637-bb3f-a12568109d35
- Not configured (default) - The setting returns to the Windows default, which is off.
- User defined
- Enable
- Audit mode - - Windows events are raised instead of blocking.
Enable folder protection
CSP: EnableControlledFolderAccess The night rhonda ferguson was killed pdf reader full.- Not configured (default) - This setting returns to its default, which is no read or writes are blocked.
- Enable - For untrusted apps, Defender blocks attempts to modify or delete files in protected folders, or write to disk sectors. Defender automatically determines which applications can be trusted. Alternatively, you can define your own list of trusted applications.
- Audit mode - Windows events are raised when untrusted applications access controlled folders, but no blocks are enforced.
- Block disk modification - Only attempts to write to disk sectors are blocked.
- Audit disk modification - Windows events are raised instead of blocking attempts to write to disk sectors.
List of additional folders that need to be protected
CSP: ControlledFolderAccessProtectedFoldersDefine a list of disk locations that will be protected from untrusted applications.
List of apps that have access to protected folders
CSP: ControlledFolderAccessAllowedApplicationsDefine a list of apps that have access to read/write to controlled locations.
Exclude files and paths from attack surface reduction rules
CSP: AttackSurfaceReductionOnlyExclusionsExpand the dropdown and then select Add to define a Path to a file or folder to exclude from your attack surface reduction rules.
Bluetooth Device Control Windows 10
Device control profile
Device Control
Allow hardware device installation by device identifiers
- Not configured(default)
- Yes - Windows can install or update any device whose Plug and Play hardware ID or compatible ID appears in the list you create unless another policy setting specifically prevents that installation. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
- No
When set to Yes you can configure the following options:
- Allow list - Use Add, Import, and Export to manage a list of device identifiers.
Block hardware device installation by device identifiers
CSP: AllowInstallationOfMatchingDeviceIDs- Not configured(default)
- Yes - Specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
- No
When set to Yes you can configure the following options:
Remove matching hardware devices
- Yes
- Not configured(default)
Block list - Use Add, Import, and Export to manage a list of device identifiers.
Allow hardware device installation by setup class
- Not configured(default)
- Yes - Windows can install or update device drivers whose device setup class GUIDs appear in the list you create unless another policy setting specifically prevents that installation. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
- No
When set to Yes you can configure the following options:
- Allow list - Use Add, Import, and Export to manage a list of device identifiers.
Block hardware device installation by setup classes
CSP: AllowInstallationOfMatchingDeviceSetupClasses- Not configured(default)
- Yes - Specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
- No
When set to Yes you can configure the following options:
Remove matching hardware devices
- Yes
- Not configured(default)
Block list - Use Add, Import, and Export to manage a list of device identifiers.
Allow hardware device installation by device instance identifiers
- Not configured(default)
- Yes - Windows is allowed to install or update any device whose Plug and Play device instance ID appears in the list you create unless another policy setting specifically prevents that installation. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
- No
When set to Yes you can configure the following options:
- Allow list - Use Add, Import, and Export to manage a list of device identifiers.
Block hardware device installation by device instance identifiers
If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.- Not configured(default)
- Yes - Specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
- No
When set to Yes you can configure the following options:
Remove matching hardware devices
- Yes
- Not configured(default)
Block list - Use Add, Import, and Export to manage a list of device identifiers.
Block write access to removable storage
CSP: RemovableDiskDenyWriteAccess- Not configured(default)
- Yes - Write access is denied to removable storage.
- No - Write access is allowed.
Scan removable drives during full scan
CSP: Defender/AllowFullScanRemovableDriveScanning- Not configured (default) - The setting returns to client default, which scans removable drives, however the user can disable this scan.
- Yes - During a full scan, removable drives (like USB flash drives) are scanned.
Block direct memory access
CSP: DataProtection/AllowDirectMemoryAccessThis policy setting is only enforced when BitLocker or device encryption is enabled.
- Not configured (default)
- Yes - block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. After a user logs in, Windows enumerates the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA is blocked on hot plug PCI ports with no children devices until the user logs in again. Devices that were already enumerated when the machine was unlocked will continue to function until unplugged.
Enumeration of external devices incompatible with Kernel DMA Protection
CSP: DmaGuard/DeviceEnumerationPolicyThis policy can provide additional security against external DMA capable devices. Adobe cs2 free download. It allows for more control over the enumeration of external DMA capable devices incompatible with DMA Remapping/device memory isolation and sandboxing.
This policy only takes effect when Kernel DMA Protection is supported and enabled by the system firmware. Kernel DMA Protection is a platform feature that must be supported by the system at the time of manufacturing. To check if the system supports Kernel DMA Protection, check the Kernel DMA Protection field in the Summary page of MSINFO32.exe.
- Not configured - (default)
- Block all
- Allow all
Block bluetooth connections
CSP: Bluetooth/AllowDiscoverableMode- Not configured (default)
- Yes - Block bluetooth connections to and from the device.
Block bluetooth discoverability
CSP: Bluetooth/AllowDiscoverableMode- Not configured (default)
- Yes - Prevents the device from being discoverable by other Bluetooth-enabled devices.
Block bluetooth pre-pairing
CSP: Bluetooth/AllowPrepairing- Not configured (default)
- Yes - Prevents specific Bluetooth devices from automatically pairing with the host device.
Block bluetooth advertising
CSP: Bluetooth/AllowAdvertising- Not configured (default)
- Yes - Prevents the device from sending out Bluetooth advertisements.
Block bluetooth proximal connections
CSP: Bluetooth/AllowPromptedProximalConnectionsBlock users from using Swift Pair and other proximity-based scenarios- Not configured (default)
- Yes - Prevents a device user from using Swift Pair and other proximity-based scenarios.
Bluetooth allowed services
CSP: Bluetooth/ServicesAllowedList.
For more information on the service list, see ServicesAllowedList usage guide- Add - Specify allowed Bluetooth services and profiles as hex strings, such as
{782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}
. - Import - Import a .csv file that contains a list of bluetooth services and profiles, as hex strings, such as
{782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}
- Add - Specify allowed Bluetooth services and profiles as hex strings, such as
Removable storage
CSP: Storage/RemovableDiskDenyWriteAccess- Block (default) - Prevent users from using external storage devices, like SD cards with the device.
- Not configured
USB connections (HoloLens only)
CSP: Connectivity/AllowUSBConnection- Block - Prevent use of a USB connection between the device and a computer to sync files, or to use developer tools to deploy or debug applications. USB charging isn't affected.
- Not configured (default)
Exploit protection profile
Exploit protection
Upload XML
CSP: ExploitProtectionSettingsEnables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML file. Exploit protection can help protect devices from malware that use exploits to spread and infect. You use the Windows Security app or PowerShell to create a set of mitigations (known as a configuration). You can then export this configuration as an XML file and share it with multiple machines on your network so they all have the same set of mitigation settings. You can also convert and import an existing EMET configuration XML file into an exploit protection configuration XML.
Choose Select XML File, specify the XML filet upload, and then click Select.
- Not configured (default)
- Yes
Block users from editing the Exploit Guard protection interface
CSP: DisallowExploitProtectionOverride- Not configured (default) - Local users can make changes in the exploit protection settings area.
- Yes - Prevent users from making changes to the exploit protection settings area in the Microsoft Defender Security Center.