/
/

How to Enable or Disable Mobile Devices in Windows

How to Enable or Disable Mobile Devices in Windows blog banner image

Mobile devices boost the productivity of end users, especially those who use them for file transfers, tethering, and app syncing in BYOD environments. Windows streamlines connectivity by further integrating mobile device support into its system, allowing different modes of connection via USB, Bluetooth, or Wi-Fi.

However, administrators typically disable external device connections in airtight environments to prevent unauthorized data exfiltration and mitigate risks from malware-infected devices. Additionally, having tighter mobile device management policies in Windows environments helps enforce endpoint security, particularly in public, shared, or kiosk systems.

If you want to configure your Windows mobile device settings to fit your environment’s requirements, you’re in the right place. This guide will walk you through several ways to manage mobile device connectivity, along with optional steps to automate this change and additional considerations for deployment.

Steps to enable or disable mobile devices in Windows

To ensure trouble-free management of mobile devices, make sure that the following prerequisites are met:

  • Elevated privileges. Implementing device-level changes on a local machine—particularly through the Local Group Policy Editor, Device Manager, or Registry Editor—requires administrative privileges.
  • Device connection. When targeting specific mobile devices via the Device Manager, ensure they’re properly connected or recognized for the change to take effect.
  • Backup. Before making this change for multiple endpoints, creating a system restore point is crucial to ensure easy rollback in case a configuration goes wrong.

Method 1: Manage Windows mobile device settings via Local Group Policy Editor

Using the Local Group Policy Editor effectively targets specific mobile devices and prevents their installation during future sessions. When applied, administrators can leverage this method to limit the installation of unauthorized mobile devices on local machines.

💡 Remember: The Local Group Policy Editor is only accessible using Windows 10/11 Pro, Enterprise, and Education editions. If you meet this requirement, it’s advisable to create a backup of your Local Group Policy Editor settings so you can easily revert to your original settings in case something breaks.

  1. Press Win + R, type gpedit.msc, and then simultaneously press Ctrl + Shift + Enter.
  2. Follow the path outlined below: Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
  3. Double-click Prevent installation of devices that match any of these device IDs.
  4. Set the policy to Enabled and then click the Show button below.Set it to enabled and press Show...
  5. Add the vendor IDs of the mobile device manufacturer you want to prevent from connecting.
    • You can find the vendor IDs of popular mobile device manufacturers below:

      List of Vendor ID

      Device manufacturer

      USB\VID_05ACApple
      USB\VID_04E8Samsung
      USB\VID_18D1Google (Pixel)
      USB\VID_12D1Huawei
      USB\VID_2717Xiaomi
      USB\VID_1004LG
      USB\VID_0FCESony
      USB\VID_22B8Motorola
      USB\VID_2A70OnePlus
      USB\VID_17EFLenovo

      ⚠️ Warning: Making a blanket ban using vendor IDs can result in overblocking of legitimate devices. For example, iPhones and iPads can be blocked, but peripheral devices made by the same vendor like Apple keyboards are also blocked. If you require a more granular approach, consider inputting a device’s HWID instead.

  6. Once you’re done adding the target HWIDs, press OK.
  7. Optionally, you can mark the check box beside Also apply to matching devices that are already installed to uninstall the target HWIDs.check box beside Also apply to matching devices that are already installed
  8. Press ApplyOK, and then reboot your PC.

Method 2: Block Media Transfer Protocol (MTP) and Mobile Sync via Registry Editor

You can leverage the Registry Editor if you manage an environment that requires airtight data protection policies. This method also prevents unauthorized data exfiltration and mobile device syncing and is useful for kiosks and public devices that require these specific restrictions.

⚠️ Warning: When done incorrectly, changes in the Registry can cause system issues, which may lead to system instability or failure. It’s recommended that you create a registry backup before proceeding.

  1. Press Win + R to open Run, type regedit, and press Enter.
  2. Navigate the following path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsPortableDevices
  3. If WindowsPortableDevices doesn’t exist, follow the steps below to manually create it:
    1. Right-click Microsoft on the left pane, then select New > Key.Registry Editor. Right-click Microsoft on the left pane, then select New,Key.
    2. Name the new key WindowsPortableDevices.
  4. Inside WindowsPortableDevices, find the DisableWPDDevices DWORD value.
    1. If it doesn’t exist, right-click WindowsPortableDevices on the left pane.
    2. Select New > DWORD (32-bit) Value and name it DisableWPDDevices.
  5. Change the value data inside DisableWPDDevices to match the behavior you prefer:
    1. Set the value data to 1: This setting completely blocks mobile device connection.
    2. Set the value data to 0: This allows mobile devices to connect with the device.
  6. Once done, select OK, close the Registry Editor, and reboot your PC.

💡Note: This method is fully supported on both Windows 10 and Windows 11. It blocks mobile devices that use the MTP protocol via Registry, but it does not prevent connections through other methods like Bluetooth or Thunderbolt.

Optional: Use PowerShell to manage Windows mobile device settings

You can use PowerShell to automate the Windows Registry change outlined above. This method is applicable if you want to disable portable devices for multiple endpoints without manually configuring this for all endpoints in your environment.

  1. Press Win + R, type PowerShell, and press Ctrl + Shift + Enter.
  2. Enter the command that fits the action you want to perform:
    •  To block MTP protocol and mobile sync:New-Item -Path “HKLM:\SOFTWARE\Policies\Microsoft\WindowsPortableDevices” -ForceSet-ItemProperty -Path “HKLM:\SOFTWARE\Policies\Microsoft\WindowsPortableDevices” `-Name “DisableWPDDevices” -Value 1
    •  To allow MTP protocol and mobile sync:
      Set-ItemProperty -Path
      “HKLM:\SOFTWARE\Policies\Microsoft\WindowsPortableDevices”
      -Name “DisableWPDDevices” -Value 0
  3. Close the Registry Editor and reboot the system.

Note: This method works the same on both Windows 10 and Windows 11. PowerShell 5.1 and later support the commands used for registry configuration.

Want to run scripts remotely and at scale with just one click?

→ Discover how NinjaOne’s remote script deployment can simplify IT management.

Method 3: Configure Windows mobile devices via Device Manager

By leveraging the Device Manager, administrators can easily configure the drivers of existing mobile device connections. Depending on the change made, administrators can allow or prevent these devices from being detected and connecting for future sessions.

  1. Press Win + X to open the Windows-X menu and click Device Manager.
  2. Click the dropdown beside Portable Devices and Universal Serial Bus controllers.
  3. Find and right-click the mobile device you want to manage.
  4. In the resulting pop-up menu, select Disable device.
    • To reverse this, right-click the device again and select Enable device.
  5. Repeat steps 3 and 4 for all the mobile devices you want to manage.
  6. Exit the Device Manager window.

📝 Take Note: This method works on both Windows 10 and Windows 11. It disables currently connected mobile devices for all users, but does not prevent new devices from being installed. For stronger enforcement, pair this with the Local Group Policy method to block future connections.

Additional considerations for enterprise-level deployment

Limitations of disabling the MTP protocol

Disabling the MTP via Registry Editor or PowerShell will stop mobile devices from accessing files and syncing on a local system. However, this will not disable other forms of connection, like Bluetooth-based connections through the Phone Link app. If your environment requires tighter connectivity policies, consider managing Bluetooth functionality separately.

USB restrictions

Configuring the MTP and mobile device sync doesn’t completely disable USB drive functionality. To ensure a robust data protection policy for your environment, you can combine the methods in this guide with USB blocking policies.

Device classes

Instead of manually locating HWIDs or broadly banning vendor IDs to manage Windows mobile devices, administrators can opt to manage the entirety of a device setup class, such as Windows Portable Devices (WPD), for simpler policy enforcement.

Here’s how you do it:

  1. Open the Local Group Policy Editor.
  2. Go to Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions.
  3. Double-click Prevent installation of devices that match any of these device IDs.
  4. Set the policy to Enabled and click the Show button.
  5. Inside the Show Contents window, input the device setup class GUID you want.
    1. To find a device’s setup class GUID, run the Device Manager as an administrator.
    2. Right-click the device you want to manage and select Properties.Device Manager click Portable Devices and Right-click the device you want to manage and select Properties.
    3. Select Details and choose Class Guid within the Property dropdown menu.On Properties, Select Details and choose Class Guid within the Property dropdown menu.
    4. Copy the Class Guid under Value and paste it on the field found in Step 5.
  6. Apply the changes to the policy and exit the Local Group Policy Editor.
  7. Alternatively, you can enter gpupdate /force via Command Prompt to apply the changes without restarting.

Roaming profiles

If your environment employs roaming profiles, ensure that the changes you make are replicated across all devices. This ensures uniform and consistent mobile device configurations for all end users regardless of their account preferences and settings.

Manage Windows mobile device settings to secure endpoints

Proper mobile device management for Windows environments is essential to strike a balance between productivity, security, and data standard compliance. This change determines how end users connect external mobile devices to their system and how administrators restrict data flow for endpoint protection. You can manage mobile devices in Windows in three ways, and choosing which method to employ will depend on the scope of the change you want.

You can use the Local Group Policy Editor to prevent the installation of specific mobile devices; however, this doesn’t include installed devices. Leveraging the Registry Editor allows you to disable Windows’s MTP and Mobile Sync features, stopping mobile devices from transferring files or syncing with a local device. Lastly, the Device Manager is ideal for manually disabling currently connected mobile devices.

Use all three primary methods outlined in this guide to reinforce data protection and prevent unauthorized mobile device syncs. Consider combining these methods with USB and Bluetooth restrictions to further tighten your environment’s endpoint security.

You might also like

Ready to simplify the hardest parts of IT?