The Windows Settings Policy in Swif.ai allows administrators to control key system behavior related to AutoPlay and device autorun on Windows endpoints. This policy is commonly used for compliance requirements that mandate disabling autorun functionality across corporate devices.
This policy can be applied to BYOD and company-owned Windows devices.
Requirements
This policy is supported on the following Windows editions:
Windows Pro 10+
Windows Enterprise 10+
Windows Education 10+
Windows SE 10+
Windows IoT Enterprise / IoT Enterprise LTSC 10+
What This Policy Controls
Many compliance frameworks require disabling any automatic execution of media or external storage, known as AutoRun or AutoPlay. These features allow removable drives, CDs/DVDs, and certain file types to automatically launch handlers when connected — posing a security risk.
The Windows Settings Policy allows you to control this behavior remotely from Swif.ai by managing the AutoPlay setting.
Available Setting
Allow AutoPlay
This setting defines whether users can change or use AutoPlay on the system.
Options:
True – AutoPlay is allowed and users may modify AutoPlay settings.
False – AutoPlay is disabled, preventing autorun-type behavior.
Minimum Requirements:
Windows Pro 10+, Windows Enterprise 10+, Windows Education 10+, Windows SE 10+, Windows IoT Enterprise / IoT Enterprise LTSC 10+
Compliance Use Case: Disabling Autorun
Some customers must provide evidence that autorun (AutoPlay) is disabled on all corporate devices. This fulfills common audit requirements across frameworks such as:
SOC 2
ISO 27001
HIPAA
CIS Benchmarks
Zero-Trust Hardening Standards
The Windows equivalent of macOS AutoRun settings (described here) is to disable AutoPlay.
Setting Allow AutoPlay = False in this Swif.ai policy:
Prevents Windows from automatically launching content from USB drives, cameras, SD cards, and removable media.
Ensures users cannot re-enable AutoPlay in Windows Settings.
Helps organizations meet security hardening and compliance requirements by eliminating autorun-based attack vectors.
How to Verify AutoPlay is Disabled on the Device
Users can manually confirm AutoPlay is disabled:
Method 1: Using Windows Settings
Open Settings
Navigate to Bluetooth & devices → AutoPlay
Confirm:
Use AutoPlay for all media and devices is Off
Method 2: Using Control Panel
Open Control Panel
Select Hardware and Sound → AutoPlay
Ensure all dropdowns are set to Take no action or AutoPlay is disabled entirely
Method 3: Registry Check (Optional)
Run the following in PowerShell:
Get-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers" | Select NoDriveTypeAutoRun
A correct hardened value is typically: 255
Best Practices
Combine this policy with Windows Security Policy (for encryption) and Windows Connectivity Policy (for VPN & Bluetooth restrictions) to strengthen endpoint security.
Apply to all device groups that include Windows laptops or desktops storing sensitive corporate data.
Periodically audit AutoPlay enforcement using Swif.ai’s Compliance Center.
