"RAMNIT desktoplayer" Worm Removal Guide

  • Thread starter Thread starter Trimble Bracegirdle
  • Start date Start date
T

Trimble Bracegirdle

http://therachmat.blogspot.com/2011/01/ramnit-worm-removal-guide.html

@@Will the experts here please comment on the approach given on this Web
Page@@.

http://therachmat.blogspot.com/2011/01/ramnit-worm-removal-guide.html

I had this very badly back in late summer ...My main method was with DR WEB
CUREIT ( A Free download) told it to 'Cure' the ramnit infected files but I
left the HTML files it detected with 'Igor' alone.

Since then the system has seemed free until late Jan. (last week). when a
new one got in .. Slightly different from the 1st & spread very fast though
out my complex Win XP & Win Vista & Win 7(64bit) system.
Infection getting into any corner.
I stopped it (I hope) with repeated DR WEB.
@@@@@

"Win32/RAMNET" Symptoms:

A file called Desktoplayer.exe persistently re appears in C:/Program
Files/Microsoft.
Fake FireFox and/or iExplore Processes are shown in Task Manager .
These are much smaller 2Kb to 8 Kb than the real thing 80+Kb They will be
there whether a Browser is really running or not.
The processes are directly connected to a High, near constant,(very High)
level of Disc Activity . Stopping the fakes in TaskMan stops this Disc
activity.

Files with the names of actual files (always exe's ???) are created which
are copies of that Destoplayer.exe file which is 60,416 Bytes in size & has
the actual file name with an addition of 'Srv'
added into it.
Thus; Real "ProgName.exe" ...
fake 59Kb files in same Folder,
"ProgNameSrv.exe""ProgNameSrvSrv.exe""ProgNameSrvSrvSrv.exe"
Etc ...etc...etc
@@@@@@
 
Trimble said:
http://therachmat.blogspot.com/2011/01/ramnit-worm-removal-guide.html

@@Will the experts here please comment on the approach given on this Web
Page@@.

http://therachmat.blogspot.com/2011/01/ramnit-worm-removal-guide.html

I had this very badly back in late summer ...My main method was with DR WEB
CUREIT ( A Free download) told it to 'Cure' the ramnit infected files but I
left the HTML files it detected with 'Igor' alone.

Since then the system has seemed free until late Jan. (last week). when a
new one got in .. Slightly different from the 1st & spread very fast though
out my complex Win XP & Win Vista & Win 7(64bit) system.
Infection getting into any corner.
I stopped it (I hope) with repeated DR WEB.
@@@@@

"Win32/RAMNET" Symptoms:

A file called Desktoplayer.exe persistently re appears in C:/Program
Files/Microsoft.
Fake FireFox and/or iExplore Processes are shown in Task Manager .
These are much smaller 2Kb to 8 Kb than the real thing 80+Kb They will be
there whether a Browser is really running or not.
The processes are directly connected to a High, near constant,(very High)
level of Disc Activity . Stopping the fakes in TaskMan stops this Disc
activity.

Files with the names of actual files (always exe's ???) are created which
are copies of that Destoplayer.exe file which is 60,416 Bytes in size & has
the actual file name with an addition of 'Srv'
added into it.
Thus; Real "ProgName.exe" ...
fake 59Kb files in same Folder,
"ProgNameSrv.exe""ProgNameSrvSrv.exe""ProgNameSrvSrvSrv.exe"
Etc ...etc...etc
@@@@@@

Seems with your vulnerability that you need to investigate the use of
HIPS or SRPs to restrict executables to only those in a whitelist (and
specify bar some in a blacklist), or to automatically sandbox and/or
automatically reduce privileges of any unknown executables and all
Internet-facing processes.
 
Do not think that would work.
This Super Nasty modifies any exe it finds to add an extra section.
Also it 'lives' in HTML files where a script is added to drop code into the
system.
I can not pretend to greatly understand this.
Thanks@@@@Mouse@@@
 
Trimble said:
Do not think that would work.

Of course it would.
This Super Nasty modifies any exe it finds to add an extra section.

..rmnet

To do so, it has to run. VanguardLH has outlined some software
restriction methods to prevent that from happening.
Also it 'lives' in HTML files where a script is added to drop code into
the system.

IIRC all to get you to download and execute something that you shouldn't.
I can not pretend to greatly understand this.

You are not alone.
 
My main point in posting this thread
is to see what people think of that Web Page with
routines for Removal & Prevention.
In much, much searching over months its the most usefull (only)
guide of its type.
So what do the experts think of it ???

http://therachmat.blogspot.com/2011/01/ramnit-worm-removal-guide.html

(\__/)
(='.'=) This is Bunny. Copy and paste Bunny into your
(")_(") signature to help him gain world domination.
 
Trimble said:
Do not think that would work.
This Super Nasty modifies any exe it finds to add an extra section.
Also it 'lives' in HTML files where a script is added to drop code into the
system.
I can not pretend to greatly understand this.

If HIPS only worked by filename, it would be worthless. SRPs (using
Path rules) has that deficiency (and why I mostly use it to blacklist
unwanted executables, like malware/unknownware or programs that I don't
want to run, like qttask, wgatray, etc). For usable HIPS, it has to
create a hash of the whitelisted file so only THAT version is allowed to
run. If the file ever gets modified, whether by malware or even by an
official and sanctioned update, that executable won't match on the
previously recorded hash and you would have to decide whether to
whitelist it again in its new incarnation. If you didn't do an update
or modify the executable file yourself then it would be immediately
suspect as to why it got changed. Obviously for YOU to know if an
update occurred (and to subsequently re-allow the new file version), you
do NOT want to permit automatic updates where someone else gets to
decide if and when they modify the state of your host. Disable
automatic updates in every program. Disable automatic updates in
Windows. At most, just get notified of a new update but don't don't
install automatically and don't even bother to download until you decide
to do the update. The only software where I recommend automatic updates
is for your security software (anti-malware, firewall, HIPS white/black
lists, sandboxes or policy enforcers with white/blacklists).

Sandboxing or reducing privileges on the Internet-facing apps, like your
web browser or email clients reading those HTML files, likely takes care
of any malicious action they attempt in their scripts. Sandboxing or
privilege reduction must work on ALL instances of the Internet-facing
app, not just those you start yourself, like with a shortcut or double-
clicking on the executable file. This means if you click on a URL link
in an e-mail that the web browser it loads to show that web page must
get sandboxed or privilege restricted. Child processes for the
Internet-facing apps must also get secured.

By the way, the article to which you referred mentioned the pest
probably arrived via USB device and using auto-run in Windows. Auto-run
is a security breach in Windows. Anytime you insert a CD/DVD disc into
the drive or plug in a USB storage device, Windows will look for
autorun.inf and run the executable listed in that file. Auto-Run is
something you should DISABLE in Windows. Think about it: why would you
let any unknown program run if YOU didn't elect to load it? There are
articles that tell how to disable auto-run. I found TweakUI to be easy
and intuitive.

Also note that it isn't just HTML files with scripts (when the user logs
in as admin instead of under a restricted account) that can deposit
malware or commit malicious actions. If you had a PDF viewer, make sure
its support for scripts is disabled. Unless you are in a corporate
environment, it is highly unlikely that you will ever get a .pdf file
with scripts inside of it. Plus PDF allows for *launching* an external
application; that is, the .pdf file you load might try to run a program.
It doesn't deliver the program (although, I suppose, the script could
write a file with the malware code) but it may try to run it. So turn
off scripting in your PDF viewer and also disable its ability to launch
a program specified by the .pdf file. I don't know if Adobe's Reader
lets you disable launching but PDFXchange does, and both let you disable
their Javascript support.

That article also mentioned using Clamwin. Well, gee, some malware got
past a lackluster security program. No surprise there. There are other
free and far superior security products available. Clamwin is
ineffective. On what it detects it is good but that's true of just
about any security software even if all it detected was 1 pest.
Besides, just how much protection are you going to get from a security
product that has to be ran manually? It's an on-demand scanner, not an
on-access (realtime) scanner. You know of users that rerun the AV
program after every change to their file system or after every action
committed by them or some other program? (http://www.clamwin.com/,
"ClamWin Free Antivirus does not include an on-access real-time
scanner"). You exhibiting a case where the users got infected because
of a poor OS and security setup. By the way, you mentioned Dr Web. If
it's the free version, that's just an on-demand scanner. You never
mentioned what you use for on-access or realtime protection.
 
Trimble said:
My main point in posting this thread
is to see what people think of that Web Page with
routines for Removal & Prevention.
In much, much searching over months its the most usefull (only)
guide of its type.
So what do the experts think of it ???

http://therachmat.blogspot.com/2011/01/ramnit-worm-removal-guide.html

(\__/)
(='.'=) This is Bunny. Copy and paste Bunny into your
(")_(") signature to help him gain world domination.

The *site* is blogspot.com. That's a bunch of blogs. Some have AV help
but they're still blogs, not an AV help site. There are tons of blogs
or personal web pages with this type of removal help. This blog has
several different unassociated categories of topics (but not many
articles in each category). The author never attributes the information
he culled as to from where he found it. You think this blogger really
found all that info by himself? Nothing special here.
 
Is the approach you give really practical or even possible
in a installation like mine..
busy Home system 3 different version installs of Windows.
100's of games on 3 hard discs ...around 500 GB ....video TV, radio stuff
coming & going from the Net ... Online shopping ...
Email ...many, many various utility programs ..some only used once in a Blue
Moon but still needed.
@@@Mouse@@@
 
I think his tactic of making a Folder at the same location & name
as the expected 'desktoplayer' file so Widows won't allow that files
creation
is clever.
I have used all that pages given routines on both my Win 7 (64bit)
& XP installs & have seen no Worm signs (or problems) for some days.
BUT then I had probably already stopped Super Nasty with Dr Web already.

@@@Mouse@@@
 
Trimble said:
Is the approach you give really practical or even possible
in a installation like mine..
busy Home system 3 different version installs of Windows.
100's of games on 3 hard discs ...around 500 GB ....video TV, radio stuff
coming & going from the Net ... Online shopping ...
Email ...many, many various utility programs ..some only used once in a Blue
Moon but still needed.
@@@Mouse@@@

I use SRPs on every host (over which I have admin rights). Using SRPs
to force Internet-facing apps takes one registry edit and then defining
one SRP path rule for each Internet-facing app that you use (where you
suspect it may have vulnerabilities due to scripting or used as a vector
into your host), like for the web browser and e-mail client. Not all
e-mail clients run well under a LUA token (e.g., Outlook - but then it
has its own sufficient security). To make the registry edit, I tote
around a .reg file that makes the change super easy. The SRP path rules
take maybe 20 seconds each to define, so 3 rules takes me a minute.
Compared to all the other tweaks and configuration of my hosts, that is
a minisule investment in time and effort. If you don't want to do even
that, you could use GeSwall Free but then you would have to install it.

Disabling automatic updating in Windows and every non-security app
should be a common task for every host over which you manage. It should
be part of the installation of Windows and of the apps you put on it.
It takes very little time to disable Windows Update (change to Notify)
and very little time for each app install to wander through its options
looking for an update setting. Disabling Javascript and app launch in
PDF programs is, again, just part of configuring an app after its
installation.

Microsoft just pushed out an update to disable AutoRun on USB drives.
Yeah, that's only 10 years too late. So if you elect to include that
update then you eliminate that security breach. You can either opt for
a registry edit, a .reg file with the changes, or a utility, like
TweakUI, to disable AutoRun on removable media (e.g., CD/DVD drives).
There are many other settings in TweakUI that you'll probably want this
utility on your host, anyway.

If you are managing many workstations then SRPs can be pushed out
through policies or sysprep images. Same for the images you distribute
to your workstations regarding Windows and app update configurations.

If you are connecting to any network or permitting access to your host
by anyone else then installing security software (anti-virus, anti-
malware, HIPS, firewall, etc) would be a normal expenditure in setting
up your instance of Windows. So far, you haven't mentioned if any
on-access (real-time) protection is used on your host. If you don't run
*active* security software then figure on spending the time to flattern
and rebuild your hosts with fresh installs of the OS and apps rather
than the much shorter time to install security software. Like with
cars, you can choose to do no maintainence now and suffer the cost in a
catastrophic failure or incrementally expend the effort now to avoid the
catastrophic failure.
 
Trimble said:
I think his tactic of making a Folder at the same location & name
as the expected 'desktoplayer' file so Widows won't allow that files
creation
is clever.
I have used all that pages given routines on both my Win 7 (64bit)
& XP installs & have seen no Worm signs (or problems) for some days.
BUT then I had probably already stopped Super Nasty with Dr Web already.

@@@Mouse@@@

The ability to define permissions on folders and files have been present
in an NT-based versions of Windows. If you don't want to permit execute
permissions for folder and its child objects (files and subfolders) then
you can change the security on that folder and its child objects.

As a matter of fact, some IT depts will change the permissions on the
C:\Documents and Settings folder and all child objects thereunder to
remove the execute permission. That path was intended for data files
for organizing and setting account permissions for the %userprofile%
folders. However, Google has decided to install their Earth and Chrome
product under there knowing the default permissions allow for
executables to load from there. Because this was intended to be a data
path, the execute permission gets removed. Execute permissions can be
removed from any folder or file and some paranoid users will remove
execute permissions from anywhere other than the Program Files folder
(and, I suspect, leave permissions as they are for the Windows folder).
They may even decide that only authorized programs are allowed to run so
they block the load of all executables (can be done using SRPs) and
maintain a whitelist of authorized executables. Rather than pre-compile
a list of whitelisted programs, it is often easier for users to install
security software that incorporates HIPS with app rules where the users
can decide just what is allowed to load or not. Many such app guard
utilities include their own safe- or whitelist to reduce the number of
prompts asking the user for permission to allow a program to load (so
they only get prompted on the unknown programs).
 
VanguardLH said:
The ability to define permissions on folders and files have been
present in an NT-based versions of Windows. If you don't want to
permit execute permissions for folder and its child objects (files
and subfolders) then you can change the security on that folder and
its child objects.

As a matter of fact, some IT depts will change the permissions on
the C:\Documents and Settings folder and all child objects
thereunder to remove the execute permission. That path was intended
for data files for organizing and setting account permissions for
the %userprofile% folders. However, Google has decided to install
their Earth and Chrome product under there knowing the default
permissions allow for executables to load from there. Because this
was intended to be a data path, the execute permission gets removed.
Execute permissions can be removed from any folder or file and some
paranoid users will remove execute permissions from anywhere other
than the Program Files folder (and, I suspect, leave permissions as
they are for the Windows folder). They may even decide that only
authorized programs are allowed to run so they block the load of all
executables (can be done using SRPs) and maintain a whitelist of
authorized executables. Rather than pre-compile a list of
whitelisted programs, it is often easier for users to install
security software that incorporates HIPS with app rules where the
users can decide just what is allowed to load or not. Many such app
guard utilities include their own safe- or whitelist to reduce the
number of prompts asking the user for permission to allow a program
to load (so they only get prompted on the unknown programs).

All fine and good. However, even with permissions set; if the user is
using an administrator account software has the right to alter those
permissions as well.
 
VanguardLH said:
I use SRPs on every host (over which I have admin rights). Using
SRPs to force Internet-facing apps takes one registry edit and then
defining one SRP path rule for each Internet-facing app that you use
(where you suspect it may have vulnerabilities due to scripting or
used as a vector into your host), like for the web browser and
e-mail client. Not all e-mail clients run well under a LUA token
(e.g., Outlook - but then it has its own sufficient security). To
make the registry edit, I tote around a .reg file that makes the
change super easy. The SRP path rules take maybe 20 seconds each to
define, so 3 rules takes me a minute. Compared to all the other
tweaks and configuration of my hosts, that is a minisule investment
in time and effort. If you don't want to do even that, you could
use GeSwall Free but then you would have to install it.

I'm not entirely sure I agree with disabling windows updates. That
ensures the system won't get the patches it may need and thus remain
vulnerable; even with your improved security settings in place.

You can't rely on the user keeping the machine updated. If you could,
there would be very little in the way of compromised machines.
Disabling automatic updating in Windows and every non-security app
should be a common task for every host over which you manage. It
should be part of the installation of Windows and of the apps you

Automatic updates with windows is a security concern. Yes, sometimes
they include new drivers (optional last time I checked) and various
other non security related items. But, they do include security updates
that patch (not actually fix in most cases) an issue they've been told
about. While true sometimes a windows update will cause an IT headache;
it's still not something to be taken lightly or ignored.

put on it. It takes very little time to disable Windows Update
(change to Notify) and very little time for each app install to
wander through its options looking for an update setting. Disabling
Javascript and app launch in PDF programs is, again, just part of
configuring an app after its installation.
True...

Microsoft just pushed out an update to disable AutoRun on USB
drives. Yeah, that's only 10 years too late. So if you elect to
include that update then you eliminate that security breach. You
can either opt for a registry edit, a .reg file with the changes, or
a utility, like TweakUI, to disable AutoRun on removable media
(e.g., CD/DVD drives). There are many other settings in TweakUI that
you'll probably want this utility on your host, anyway.

I have autorun showing as disabled in tweakui on all removable drives,
but if I bring the external power supply online; I'll still get the
autorun window. It's a known windows bug. I suspect the microsoft patch
fixes their ****ed up code. And yes, it's 10 years too late. :)

You can actually google the autorun issue if you doubt my claims of it
being a known bug. You can disable it with the registry settings, and
occasionally; it'll still work regardless.
If you are managing many workstations then SRPs can be pushed out
through policies or sysprep images. Same for the images you
distribute to your workstations regarding Windows and app update
configurations.

Completely agree with you here.

I'm assuming at this point that you aren't really discussing end users
but corp/client configurations?
 
Dustin said:
I'm not entirely sure I agree with disabling windows updates.

Sorry if my reply got misread to imply permanent refusal to accept
Windows updates or even app updates. Disabling their *automatic*
installation is what I meant to address. You decide when the state of
your host changes, not someone else. You investigate the updates to
determine if you will accept them. Provide an escape route should the
updates cause problem before applying the updates. What good is an
update if the behavior you need from the OS or apps becomes unavailable
or they become unusable?
Automatic updates with windows is a security concern. Yes, sometimes
they include new drivers (optional last time I checked) and various
other non security related items.

Hardware updates should NEVER be accepted through Windows Updates. Its
detection scheme is known to be flawed and will offer driver updates
that should NOT be applied to your particular platform. For example,
it took over 3 months for Promise to get Microsoft to yank out an
update after Promise discovered it caused severe problems, even
crashing the OS. Another example is the SATAraid updates for the
SI3112 controller chip. The driver applied depends on which versions
of the SATAraid BIOS are installed on the host. Some drivers are NOT
to be installed in you have a later SATAraid BIOS version than the
driver supports. Yet Windows Updates will tell you that you need a
later version of the driver that not only does not apply to your host
but should never be applied to your host (since there is no need to
flash the BIOS if the hardware is fully functional under your setup, a
newer BIOS version can introduce more problems than it solves, and you
may not be able to update the BIOS version).

NEVER accept hardware updates from Windows Updates. Instead use it
merely as a prompt to have you visit the *manufacturer's* web site to
determine if the updates applies to your hardware and if you are
willing to risk the brain surgery on your host. Also, the direct
manufacturer of the chip may not be the appropriate place to obtain the
driver since the implementation of the chip or ancilliary hardware may
modify the hardware setup where you must use the drivers recommended
by, say, the motherboard maker and NOT the chip maker.

Again, NEVER accept hardware updates from Windows Updates. If the
hardware is working, ignore the suggestion from Windows Updates (you can
even select to never see that suggestion again until you decide to later
unhide the hidden updates). If the hardware is not functioning
correctly or features are not available due to a deficient driver then
use Windows Updates merely as a prompt for you to determine the proper
driver to install. Windows Updates will NOT ensure the suggested driver
is appropriate for your particular platform (hardware+software).
But, they do include security updates that patch (not actually fix in
most cases) an issue they've been told about. While true sometimes a
windows update will cause an IT headache; it's still not something to
be taken lightly or ignored.

But it is something that should be PLANNED ahead and committed *after*
investigation. You can't do that with *automatic* updates.
I have autorun showing as disabled in tweakui on all removable
drives, but if I bring the external power supply online; I'll still
get the autorun window. It's a known windows bug. I suspect the
microsoft patch fixes their ****ed up code. And yes, it's 10 years
too late. :)

Do not confuse AutoRun with AutoPlay. Those are different functions.
For removable media, the notification of available media will trigger
AutoPlay to present a list of handlers associated with the media type.
One, you are not *running* an exectuable from the removable media.
Two, you are getting *prompted* BEFORE selecting any action, if any,
regarding the removable media.

In TweakUI, with the update, or via registry edits, you can disable the
Auto*RUN* feature of Windows so unknown programs on the removable media
are not automatically executed. AutoPlay is separate. Alas, it is
unfortunate that AutoRun and AutoPlay often get mixed together. It
even happens in TweakUI. I believe even the policies hence the
registry keys also confuse what is AutoRun versus AutoPlay. See:

http://en.wikipedia.org/wiki/AutoRun

AutoPlay is a companion feature of AutoRun. While AutoRun should be
disabled, AutoPlay can remain enabled. Getting prompted based on media
type to select a handler has not yet executed anything from the
removable media. This is very similar to app rules in HIPS where you
get prompted to grant whether or not an so-far-as-yet untrusted program
to load into memory. It's your choice. You actually get a choice.
With AutoRun, you don't get a choice.

AutoPlay is where you get a popup window showing you the various
handlers defined for the object type. AutoRun doesn't prompt you at
all and looks for autorun.inf on the media and will *automatically*
execute the specified executable file.

I haven't investigated on how to disable AutoPlay. One method may be
to de-register all the handlers. While something that Microsoft might
not permit easily, I remembering using some Nirsoft utility to disable
handlers and that probably will also list the AutoPlay handlers. When
you Google on "+disable +autoplay +windows", most of the articles are
actually discussing how to disable autorun. It might be as simple as
using gpedit.msc (not available in Home editions of Windows) which
means also a registry edit where you go to Computer Configuration ->
Administrative Templates -> System and configure the "Turn off
AutoPlay" option. While I have AutoRun disabled using TweakUI (under
its AutoPlay section) or have previously used direct registry edits,
this policy (registry) setting has remained at "Not configured" which
means the default gets used (which means AutoPlay is enabled).
Enabling this policy will turn off AutoPlay. Well, that's how it is
described.
I'm assuming at this point that you aren't really discussing end users
but corp/client configurations?

SRPs can be defined on a non-domain host but that does mean configuring
each host separately rather than pushing out using policies in a
domain. Alas, when I last looked at the registry keys for the SRP
rules, each gets a randomly named key name. You can't just export the
registry key under which the SRPs are defined and then transport to
another host where you run "regedit.exe /s <regfile>". To be fair, I
haven't determined if there is some order to the oddball key name to
see if migration via .reg file was possible but it takes little time to
define the 3-4 path rules for SRP. However, the registry edit to add
the Basic (limited) account is just a registry entry that can be
installed easily using a .reg file (and I'm guessing could also be
pushed via policy).

Policies are nothing more than registry entries. If you are granted
admin privileges to your workstation (i.e., to your host in the domain)
or are logging on locally as an admin then you can always undo these
policies. For example, my company has a global policy that the
screensaver will activate after 15 minutes of idle time. The
screensaver will lock the workstation. This was unacceptable on a
shared host where physical access was controlled and where we wanted
users some access to a limited set of programs but never wanted them to
login (initially or to get out of screensaver mode). Those of us that
admin'ed that host were allowed admin privileges to that host (i.e., we
has Administrators rights on the host where we logged in, not admin
rights to the PDC or elsewhere we were not allowed to login). To get
around the screensaver problem, a login script was used (although other
startup locations could have been used) that simply ran "regedit.exe /s
<regfile>". The policies get pushed out at login but the script or
startup for the .reg file can undo those policies if the user logs in
under an admin-level account. Policies are just registry entries. If
you have admin rights on the host, you can undo the policies. While I
may mention using gpedit.msc, it's just a convenient means of editing
the registry instead of using regedit.exe.
 
VanguardLH said:
Hardware updates should NEVER be accepted through Windows Updates.
Its detection scheme is known to be flawed and will offer driver

I agree. I wouldn't ever let windows update any drivers via windows
update.
Do not confuse AutoRun with AutoPlay. Those are different
functions. For removable media, the notification of available media
will trigger AutoPlay to present a list of handlers associated with
the media type. One, you are not *running* an exectuable from the
removable media. Two, you are getting *prompted* BEFORE selecting
any action, if any, regarding the removable media.

AutoRun off isn't supposed to process the autorun.inf file if it's
present on removable media, right? I wasn't getting the two confused. I
personally don't like either of the features, and typically have both
off.
In TweakUI, with the update, or via registry edits, you can disable
the Auto*RUN* feature of Windows so unknown programs on the
removable media are not automatically executed. AutoPlay is
separate. Alas, it is unfortunate that AutoRun and AutoPlay often
get mixed together. It even happens in TweakUI. I believe even the
policies hence the registry keys also confuse what is AutoRun versus
AutoPlay. See:

http://en.wikipedia.org/wiki/AutoRun

I understand the difference (although minor I suppose) between the two;
but I thank you for providing the link for those who don't.
Policies are nothing more than registry entries. If you are granted
admin privileges to your workstation (i.e., to your host in the
domain) or are logging on locally as an admin then you can always
undo these policies. For example, my company has a global policy
that the screensaver will activate after 15 minutes of idle time.

I know. :)
The screensaver will lock the workstation. This was unacceptable on
a shared host where physical access was controlled and where we
wanted users some access to a limited set of programs but never
wanted them to login (initially or to get out of screensaver mode).
Those of us that admin'ed that host were allowed admin privileges to
that host (i.e., we has Administrators rights on the host where we
logged in, not admin rights to the PDC or elsewhere we were not
allowed to login). To get around the screensaver problem, a login
script was used (although other startup locations could have been
used) that simply ran "regedit.exe /s <regfile>". The policies get
pushed out at login but the script or startup for the .reg file can
undo those policies if the user logs in under an admin-level
account. Policies are just registry entries. If you have admin
rights on the host, you can undo the policies. While I may mention
using gpedit.msc, it's just a convenient means of editing the
registry instead of using regedit.exe.

Overly detailed for me, but again, likely useful to others here.
 
Back
Top