A.4.3.6, A.4.3.7, A.4.3.8 – BECKHOFF IPC-Security User Manual

Page 54

Advertising
background image

Value

Description

0x1

Disables Autorun on drives of unknown type

0x4

Disables Autorun on removable devices

0x8

Disables Autorun on fixed drives

0x10

Disables Autorun on network drives

0x20

Disables Autorun on CD-ROM drives

0x40

Disables Autorun on RAM disks

0x80

See 0x1

0xFF

Disables Autorun on all kinds of drives

If you would like to configure a mix of the settings shown above, you only need to add the corresponding
hexadecimal values, for example 0x4 + 0x10 = 0x14.

A.4.3.6. Deactivating the webserver

To deactivate the IIS Webserver, please open the Windows Service MMC, for example, by going to Start →
Run → services.msc and pressing Enter. Deactivate the World Wide Web Publishing Service and IIS Admin
Service
.

Please keep in mind that all services that depend on the Webserver won’t work afterwards!

A.4.3.7. Deactivating the Windows registry

Blocking access to Windows Registry tools like regedit.exe or regedt32.exe can be achieved by adding the
DWORD value DisableRegistryTools to the following registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\

Setting this value to 1 results in an error message as soon as one of the registry editors is started. Please
note that you could also block access to these tools by creating a corresponding Software Restriction Policy,
as described in chapter 3.2.3.5.

A.4.3.8. Deactivating the Windows command prompt

To block access to the Windows command line, just add the DWORD value DisableCMD to the following
registry key:

HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System\

54

Advertising