Disable autorun in windows server 2003


















You are commenting using your Google account. You are commenting using your Twitter account. You are commenting using your Facebook account. Notify me of new comments via email. Notify me of new posts via email.

Error: Please make sure the Twitter account is public. Rishiraj's Blog. Rishiraj's Blog A Blog featuring technical skills with fun! About Subscribe to RSS. September 3, Leave a comment. In the Settings pane, right-click Turn off Autoplay , and then click Properties. Share this: Twitter Facebook. Like this: Like Loading Next post ».

Leave a Reply Cancel reply Enter your comment here Note Updates , , and provide the same functionality for Autorun. Update was repackaged as security update to provide an additional security update for Windows Vista and Windows Server The following table shows the differences in the three updates:.

After the prerequisite updates are installed, you can use the procedures in any of the following sections to disable Autorun features:. The main purpose of Autorun is to provide a software response to hardware actions that you start on a computer. Autorun has the following features:. These features are typically called from removable media or from network shares. During AutoPlay, the Autorun. This file specifies which commands the system runs. Many companies use this functionality to start their installers.

AutoPlay begins reading from a drive as soon as you insert media into the drive. Therefore, the Setup file of programs and the music on audio media start immediately.

If you enable the settings to disable AutoPlay the procedure to do this is described in this article , you can disable AutoPlay on a CD drive, on removable media drives, on all drives. If the settings conflict, the setting in Computer Configuration takes precedence over the setting in User Configuration. Autorun commands are generally stored in Autorun. These commands enable applications to start, start installation programs, or start other routines.

In versions of Windows that are earlier than Windows Vista, when media that contains an Autorun command is inserted, the system automatically executes the program without requiring user intervention.

Because code may be executed without user's knowledge or consent, users may want to disable this feature because of security concerns. The configuration settings that are described in this article give Administrators the ability to selectively or completely disable all Autorun capabilities for systems that run Windows , Windows XP, Windows Server , Windows Vista, and Windows Server systems.

The default behavior in Windows Vista and Windows Server is to prompt the user whether an Autorun command is to be run. Changes to these settings are described later in this article. An Administrator can completely disable Autorun commands or revert to the pre-Windows Vista behavior of automatically executing the Autorun command. If the feature is configured to disable Autorun capabilities, or if this policy is not configured, Windows Vista and Windows Server will continue to prompt the user whether the Autorun command is to be run.

Windows Vista-based and Windows Server based systems must have update Security bulletin MS installed to take advantage of the registry key settings that disable Autorun. Click Start , type Gpedit. If you are prompted for an administrator password or for confirmation, type the password, or click Allow. In the Details pane, double-click Turn off Autoplay. Click Enabled , and then select All drives in the Turn off Autoplay box to disable Autorun on all drives.

Click Enabled , and then select Do not execute any autorun commands in the Default Autorun behavior box to disable Autorun on all drives. Click Start , click Run , type Gpedit.

In the Settings pane, right-click Turn off Autoplay , and then click Properties. Note In Windows , the policy setting is named Disable Autoplay. ImportantThis section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it.

Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:.

In the Value data box, type 0xFF to disable all types of drives. Or, to selectively disable specific drives, use a different value as described in the "How to selectively disable specific Autorun features" section. To selectively disable specific Autorun features, you must change the NoDriveTypeAutoRun entry in one of the following registry key subkeys:.

The value of the NoDriveTypeAutoRun registry entry determines which drive or drives the Autorun functionality will be disabled for. For example, if you want to disable Autorun for network drives only, you must set the value of NoDriveTypeAutoRun registry entry to 0x If you want to disable Autorun for multiple drives, you must add the corresponding hexadecimal values to the 0x10 value. For example, if you want to disable Autorun for removable drives and for network drives, you must add 0x4 and 0x10, which is the mathematical addition of 2 hexadecimal values, to determine the value to use.

These default values are listed in the following table. All the fixes in the current update for Windows XP and for Windows Server are included in the HonorAutorunSetting registry entry in the following subkey:. Note For Windows Server and Windows XP, all changes of this update are controlled by the HonorAutorunSetting registry entry so that you can revert to the previous configuration if it is required.

The registry key has a default value of 0x1. This value enables the functionality that is present in the current update. Before you install the current update, this registry key is not present in the system. You can obtain prepackage installation Autorun behavior by manually setting the registry key to 0.

To do this, type 0 instead of 1 in step 6 of the following procedures to manually set the registry key. In the Open box, type regedit , and then click OK. In the Value data box, type 1 , click Hexadecimal if it is not already selected, and then click OK. To prevent the Autorun feature from being invoked, and to keep any programs from writing Autoun. Note After you implement this procedure, Autorun features will not be available from network drives.

The following Microsoft Knowledge Base article contains two methods to prevent users from connecting to a USB storage device:. Note After you implement one of these procedures on a system, USB storage devices no longer function on the system.

The update does not change the current Autorun settings on your system. Instead, the update lets users correctly enforce Autorun settings. Is there a change in user experience after this update is installed? After you install update , you might notice that Autorun features for network drives no longer function. This is because, by default, Autorun on network drives is set to disabled in the registry. After you install the update, a registry key that was already set to disable Autorun on network drives is enforced correctly.

This is the only functionality that will change after the update is installed. If a user had disabled Autorun for other drives before the update, they may notice a change in the double-click and contextual menu behavior after the update. Is this a security vulnerability that requires Microsoft to issue a security update? Disabling the Autorun feature is an optional configuration that some customers may decide to deploy.



0コメント

  • 1000 / 1000