5.286 - The default autorun behavior must be configured to prevent autorun commands.

Information

Allowing autorun commands to execute may introduce malicious code to a system. Configuring this setting prevents autorun commands from executing.

Solution

Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> AutoPlay Policies -> 'Default behavior for AutoRun' to 'Enabled' with 'Do not execute any autorun commands' selected.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_7_V1R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-18(4), CAT|I, CCI|CCI-001764, CSCv6|8.3, Rule-ID|SV-27159r2_rule, STIG-ID|5.286, Vuln-ID|V-22692

Plugin: Windows

Control ID: b8f6fe8dbe4fc42312904bee20f534159d0915384c0dd6b6781a7c6c9b68a5c6