Skip to main content

Windows Settings Policy

Updated today

The Windows Settings Policy in Swif.ai allows administrators to control key system behavior related to AutoPlay and device autorun on Windows endpoints. This policy is commonly used for compliance requirements that mandate disabling autorun functionality across corporate devices.

This policy can be applied to BYOD and company-owned Windows devices.


Requirements

This policy is supported on the following Windows editions:

  • Windows Pro 10+

  • Windows Enterprise 10+

  • Windows Education 10+

  • Windows SE 10+

  • Windows IoT Enterprise / IoT Enterprise LTSC 10+


What This Policy Controls

Many compliance frameworks require disabling any automatic execution of media or external storage, known as AutoRun or AutoPlay. These features allow removable drives, CDs/DVDs, and certain file types to automatically launch handlers when connected — posing a security risk.

The Windows Settings Policy allows you to control this behavior remotely from Swif.ai by managing the AutoPlay setting.


Available Setting

Allow AutoPlay

This setting defines whether users can change or use AutoPlay on the system.

Options:

  • True – AutoPlay is allowed and users may modify AutoPlay settings.

  • False – AutoPlay is disabled, preventing autorun-type behavior.

Minimum Requirements:
Windows Pro 10+, Windows Enterprise 10+, Windows Education 10+, Windows SE 10+, Windows IoT Enterprise / IoT Enterprise LTSC 10+


Compliance Use Case: Disabling Autorun

Some customers must provide evidence that autorun (AutoPlay) is disabled on all corporate devices. This fulfills common audit requirements across frameworks such as:

  • SOC 2

  • ISO 27001

  • HIPAA

  • CIS Benchmarks

  • Zero-Trust Hardening Standards

The Windows equivalent of macOS AutoRun settings (described here) is to disable AutoPlay.

Setting Allow AutoPlay = False in this Swif.ai policy:

  • Prevents Windows from automatically launching content from USB drives, cameras, SD cards, and removable media.

  • Ensures users cannot re-enable AutoPlay in Windows Settings.

  • Helps organizations meet security hardening and compliance requirements by eliminating autorun-based attack vectors.


How to Verify AutoPlay is Disabled on the Device

Users can manually confirm AutoPlay is disabled:

Method 1: Using Windows Settings

  1. Open Settings

  2. Navigate to Bluetooth & devices → AutoPlay

  3. Confirm:

    • Use AutoPlay for all media and devices is Off

Method 2: Using Control Panel

  1. Open Control Panel

  2. Select Hardware and Sound → AutoPlay

  3. Ensure all dropdowns are set to Take no action or AutoPlay is disabled entirely

Method 3: Registry Check (Optional)

Run the following in PowerShell:

Get-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers" | Select NoDriveTypeAutoRun

A correct hardened value is typically: 255


Best Practices

  • Combine this policy with Windows Security Policy (for encryption) and Windows Connectivity Policy (for VPN & Bluetooth restrictions) to strengthen endpoint security.

  • Apply to all device groups that include Windows laptops or desktops storing sensitive corporate data.

  • Periodically audit AutoPlay enforcement using Swif.ai’s Compliance Center.

Did this answer your question?