Skip to the main content.
Talk to sales Start for free
Talk to sales Start for free

2 min read

How to disable autorun on your computer

How to disable autorun on your computer

Healthcare professionals should disable autorun on their computers to prevent security risks like unauthorized access and data breaches. Disabling autorun involves accessing system settings: Windows users can use Group Policy Editor or AutoPlay settings, while Mac users must configure Security & Privacy preferences. This action strengthens systems against autorun-related threats, ensuring patient data security and compliance with healthcare regulations.


Autorun and its risks in healthcare

Autorun automatically executes programs or scripts upon device connection, presenting a potential gateway for security breaches. In healthcare, where safeguarding patient information is required, autorun's unchecked operation poses serious risks.

Misconfigured autorun settings or pre-loaded malware on external drives can lead to unauthorized access to patient data. For example, an external drive containing unencrypted patient information connects to a healthcare workstation with enabled autorun. In this case, autorun might trigger a script, copying all data onto the workstation, potentially breaching patient privacy and HIPAA compliance.

Moreover, hackers exploit autorun vulnerabilities to launch cyberattacks. Specially crafted autorun scripts can bypass security measures, allowing access to confidential patient information. Malware introduced via autorun can spread across a healthcare network, compromising a vast amount of patient data.

Beyond breaches, errors or bugs in autorun functionalities can corrupt or alter patient data stored on removable media. Even seemingly harmless autorun scripts intended for data encryption can malfunction, rendering the data inaccessible and violating HIPAA regulations.

Read more: Why disabling Autorun is smart for cybersecurity


Step-by-step guide for disabling autorun on different operating systems

Windows 10 and 11:

  1. Go to Start > Settings > Apps
  2. Click on Optional features
  3. Select Add a feature.
  4. Scroll down and locate Group Policy.
  5. Click Install
  6. Open the Start Menu and search for Group Policy Editor.
  7. Expand Computer Configuration > Administrative Templates > System > Removable Storage Drives.
  8. Enable Prevent the execution of AutoRun.inf or Autorun.exe from removable drives:
  • Double-click the setting.
  • Select Enabled.
  • Click Apply and then OK.


  1. Open System Preferences.
  2. Go to Security & Privacy.
  3. Access the General tab.
  4. Under Allow apps downloaded from:**, select App Store only.

Following these instructions ensures a secure environment by disabling autorun across various operating systems. Windows 10 and 11 users can use Group Policy Editor. Mac users can enhance security by restricting app downloads, thereby mitigating autorun-related risks.


Healthcare-specific security measures

  • Deploy Group Policy for network-wide control to ensure disabled autorun across all connected devices.
  • Use third-party security software with autorun prevention features for enhanced defense against potential threats.
  • Impose restrictions on removable media usage to limit exposure to external threats.
  • Conduct regular security audits to verify ongoing compliance and the maintenance of disabled autorun settings.

Recommended practices for maintaining a secure environment

Healthcare professionals must undergo regular training on security protocols to remain updated on evolving threats and best practices. IT departments implement and enforce security measures, ensuring compliance, and reinforcing data security standards.

Related: HIPAA Compliant Email: The Definitive Guide 

Subscribe to Paubox Weekly

Every Friday we'll bring you the most important news from Paubox. Our aim is to make you smarter, faster.