
In Azure AD Connect sync, you can enable filtering at any time. As a result, Microsoft can't provide technical support for such deployments. Any of these actions might result in an inconsistent or unsupported state of Azure AD Connect sync.

Microsoft doesn't support modifying or operating Azure AD Connect sync outside of the actions that are formally documented.
WINDOWS AD USB BLOCK RULE HOW TO
This article covers how to configure the different filtering methods. But in Azure AD, you only want active accounts to be present.
WINDOWS AD USB BLOCK RULE SERIAL
With all that said, this solution works if you assume that all your devices expose unique serial IDs and that nobody tries to forge a USB device to get it accepted by your computer.By using filtering, you can control which objects appear in Azure Active Directory (Azure AD) from your on-premises directory. A bad guy could build a USB device with forged USB device ID and forged serial ID, in order to get it accepted by you computer, though even then. if a USB device claims to be a certain device, with a particular serial ID, there is no way for the computer to tell whether that's true.

E.g if a certain vendor model of USB mass storage device doesn't expose a unique serial ID, and you have installed one, then group policy might allow any other instances of the same vendor model to be mounted. Group policy probably can't effectively block some devices that don't expose a unique serial ID.

WINDOWS AD USB BLOCK RULE INSTALL
Install the USB device that I want in this case, a USB mass storage device.In Device Manger, uninstall all USB devices that I don't want, including the ones that are currently not connected - there's an environment variable called DEVMGR_SHOW_NONPRESENT_DEVICES that enables the display of installed, but currently disconnected devices just search the web for "DEVMGR_SHOW_NONPRESENT_DEVICES".So here's a summary of what I ended up doing: In particular, the "Prevent installation of removable devices" rule is what I need. The general direction is documented here: Following suggestion, I got it working using group policy.
