22.06.2016 Views

CIS Microsoft Windows 10 Enterprise RTM (Release 1507) Benchmark

CIS_Microsoft_Windows_10_Enterprise_RTM_Release_1507_Benchmark_v1.0.0

CIS_Microsoft_Windows_10_Enterprise_RTM_Release_1507_Benchmark_v1.0.0

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

18.9.8 AutoPlay Policies<br />

This section contains recommendations for AutoPlay policies.<br />

18.9.8.1 (L1) Set 'Disallow Autoplay for non-volume devices' to 'Enabled'<br />

(Scored)<br />

Profile Applicability:<br />

Level 1<br />

Level 1 + BitLocker<br />

Description:<br />

This policy setting disallows AutoPlay for MTP devices like cameras or phones.<br />

The recommended state for this setting is: Enabled.<br />

Rationale:<br />

An attacker could use this feature to launch a program to damage a client computer or data<br />

on the computer.<br />

Audit:<br />

Navigate to the UI Path articulated in the Remediation section and confirm it is set as<br />

prescribed. This group policy setting is backed by the following registry location:<br />

HKEY_LOCAL_MACHINE\Software\Policies\<strong>Microsoft</strong>\<strong>Windows</strong>\Explorer:NoAutoplayfornonVolume<br />

Remediation:<br />

To establish the recommended configuration via GP, set the following UI path to Enabled:<br />

Computer Configuration\Policies\Administrative Templates\<strong>Windows</strong> Components\AutoPlay<br />

Policies\Disallow Autoplay for non-volume devices<br />

Impact:<br />

If you enable this policy setting, AutoPlay is not allowed for MTP devices like cameras or<br />

phones.<br />

560 | P a g e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!