Information
This policy is intended to provide additional security against external DMA-capable devices. It allows for more control over the enumeration of external DMA-capable devices that are not compatible with DMA Remapping/device memory isolation and sandboxing.
The recommended state for this setting is: Enabled: Block All
Note : This policy does not apply to 1394, PCMCIA or ExpressCard devices. The protection also only applies to Windows 10 R1803 or higher and requires a UEFI BIOS to function.
Note #2 : More information on this feature is available at this link:
Kernel DMA Protection for Thunderbolt 3 (Windows 10) | Microsoft Docs
.
Device memory sandboxing allows the OS to leverage the I/O Memory Management Unit (IOMMU) of a device to block unpermitted I/O, or memory access, by the peripheral.
Solution
To establish the recommended configuration via configuration profiles, set the following
Custom
profile path to Enabled: Block All :
Name: <Enter name>
Description: <Enter Description>
OMA-URL: ./Device/Vendor/MSFT/Policy/Config/DmaGuard/DeviceEnumerationPolicy
Data Type: Integer
Value: 0
Impact:
External devices that are not compatible with DMA-remapping will not be enumerated and will not function unless/until the user has logged in successfully
and
has an unlocked user session. Once enumerated, these devices will continue to function, regardless of the state of the session. Devices that are compatible with DMA-remapping will be enumerated immediately, with their device memory isolated.