Check: WN16-CC-000260
Microsoft Windows Server 2016 STIG:
WN16-CC-000260
(in versions v2 r9 through v1 r1)
Title
The default AutoRun behavior must be configured to prevent AutoRun commands. (Cat I impact)
Discussion
Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun commands from executing.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ Value Name: NoAutorun Type: REG_DWORD Value: 0x00000001 (1)
Fix Text
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled" with "Do not execute any autorun commands" selected.
Additional Identifiers
Rule ID: SV-224933r958804_rule
Vulnerability ID: V-224933
Group Title: SRG-OS-000368-GPOS-00154
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001764 |
Prevent program execution in accordance with organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions; rules authorizing the terms and conditions of software program usage. |
Controls
Number | Title |
---|---|
CM-7(2) |
Prevent Program Execution |