Check: WN10-CC-000185
Microsoft Windows 10 STIG:
WN10-CC-000185
(in versions v3 r2 through v1 r7)
Title
The default autorun behavior must be configured to prevent autorun commands. (Cat I impact)
Discussion
Allowing autorun commands to execute may introduce malicious code to a system. Configuring this setting prevents autorun commands from executing.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: NoAutorun Value Type: REG_DWORD Value: 1
Fix Text
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled:Do not execute any autorun commands".
Additional Identifiers
Rule ID: SV-220828r958804_rule
Vulnerability ID: V-220828
Group Title: SRG-OS-000368-GPOS-00154
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001764 |
Prevent program execution in accordance with organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions; rules authorizing the terms and conditions of software program usage. |
Controls
Number | Title |
---|---|
CM-7(2) |
Prevent Program Execution |