Information Security
CIS Safeguard 10.3 - Disable Autorun and Autoplay for Removable Media
Last modified 7/8/2021
Objective
Disable autorun and autoplay auto-execute functionality for removable media.
Guidance
The Information Security Office provides the following guidance for complying with CIS Control 10 - Malware Defenses.
- Windows Desktop
The Information Security Office manages a baseline configuration for complying with CIS Control 10 - Malware Defenses. Devices successfully configured with the items below will be considered compliant.
- Deploy Configuration Baseline
Deploy the Configuration Baseline named ISU CIS Control 10 - Malware Defenses, with remediation enabled to your devices using Microsoft Endpoint Configuration Manager (ConfigMgr).
For more information, follow this procedure here - Deploying a ConfigMgr Configuration Baseline Procedure
- Configuration Baseline Settings
Configuration Item - ISU CIS Safeguard 10.3
Windows Registry
- Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled'
- Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands'
- Ensure 'Turn off Autoplay' is set to 'Enabled: All drives'
- Verify Device Compliance
Monitor your deployment of Configuration Baseline ISO CIS Control 10 - Malware Defenses in ConfigMgr.
For more information, follow this procedure here - Monitoring a ConfigMgr Configuration Baseline Procedure
Additional Information
The following items are to provide context or better understanding of this standard:
- CIS Controls v8 License Statement
This work is licensed under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International Public License (the link can be found at https://creativecommons.org/licenses/bync-nd/4.0/legalcode). To further clarify the Creative Commons license related to the CIS Controls content, you are authorized to copy and redistribute the content as a framework for use by you, within your organization and outside of your organization, for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, and (ii) a link to the license is provided. Additionally, if you remix, transform, or build upon the CIS Controls, you may not distribute the modified materials. Users of the CIS Controls framework are also required to refer to (http://www.cisecurity.org/controls/) when referring to the CIS Controls in order to ensure that users are employing the most up-to-date guidance. Commercial use of the CIS Controls is subject to the prior approval of CIS® (Center for Internet Security, Inc.®).