Windows
View all Worklets
WindowsWindows

Disable USB Storage

Blocks USB removable storage access on Windows endpoints by configuring registry-based device policies

Worklet Details

What the USB Storage Blocker does

This Automox Worklet™ blocks access to USB removable storage devices by configuring Windows endpoint installation policies through the registry. The Worklet targets the specific device class GUID for USB mass storage ({53f5630d-b6bf-11d0-94f2-00a0c91efb8b}) and sets both Deny_Read and Deny_Write values to prevent any data transfer.

The policy operates at the Windows device class level, which means it blocks all USB mass storage devices including thumb drives, external hard drives, SD card readers, and mobile phones in USB storage mode. Other USB device classes remain unaffected, so keyboards, mice, printers, and other non-storage peripherals continue to work normally.

The Worklet creates registry entries under HKLM:\Software\Policies\Microsoft\Windows\RemovableStorageDevices to enforce the storage restriction. This approach uses the same mechanism as Group Policy, making it compatible with enterprise management tools and audit processes.

Why block USB storage on endpoints

USB storage devices represent one of the most common vectors for data exfiltration and malware introduction. Employees can intentionally or accidentally copy sensitive files to personal drives, and malicious actors can use USB devices to bypass network-based security controls. Blocking USB storage reduces the risk of data loss prevention (DLP) violations and insider threats.

Many compliance frameworks require organizations to control removable media access. PCI-DSS requirement 12.3.5 addresses removable electronic media usage. HIPAA security rules require controls on endpoints that can transfer electronic protected health information. CIS Controls include removable media restrictions as part of data protection measures.

USB storage restrictions also protect against BadUSB attacks and USB-based malware that can autorun when endpoints are connected. By preventing USB storage mounting entirely, you eliminate this attack vector regardless of the specific malware technique used.

How USB storage blocking works

  1. Evaluation phase: The Worklet checks for the existence of the Deny_Read registry value at HKLM:\Software\Policies\Microsoft\Windows\RemovableStorageDevices\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}. If the value exists and is populated, USB storage blocking is already enabled. If the registry key or value is missing, the endpoint requires remediation.

  2. Remediation phase: The Worklet creates the RemovableStorageDevices registry path if it does not exist, then creates the device class subkey for USB mass storage. It sets both Deny_Read and Deny_Write DWORD values to 1, which blocks all read and write operations to USB storage devices. A reboot is required for the policy to take effect.

USB storage policy requirements

  • Windows 7 or later, Windows Server 2008 R2 or later

  • Administrative privileges to modify HKLM registry

  • Reboot required after remediation for policy to take effect

  • No conflicting Group Policy settings for removable storage

Expected USB access state after remediation

After the endpoint reboots, USB mass storage devices will not be accessible. When users connect a thumb drive or external hard drive, Windows will not assign a drive letter or allow access to the storage contents. Users may see the device in Device Manager but cannot read from or write to it. You can verify this change through the Automox Activity Log or by checking the endpoint configuration directly.

You can verify the policy by checking the registry at HKLM:\Software\Policies\Microsoft\Windows\RemovableStorageDevices\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} for Deny_Read and Deny_Write values set to 1. Non-storage USB devices like keyboards, mice, webcams, and audio devices remain fully functional.

View in app
evalutation image
remediation image

Consider Worklets your easy button

What's a Worklet?

A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

do more with worklets