Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Using Device Access Control to protect your computer against Autorun malware in OfficeScan (OSCE)

    • Updated:
    • 24 Nov 2016
    • Product/Version:
    • OfficeScan 10.6
    • OfficeScan 11.0
    • OfficeScan 11.0
    • OfficeScan XG
    • OfficeScan XG.All
    • Platform:
    • Windows 10
    • Windows 10 32-bit
    • Windows 10 64-bit
    • Windows 2003 Datacenter 64-bit
    • Windows 2003 Enterprise
    • Windows 2003 Enterprise 64-bit
    • Windows 2003 Server R2
    • Windows 2003 Standard
    • Windows 2003 Standard 64-bit
    • Windows 2008 32-Bit
    • Windows 2008 64-Bit
    • Windows 2008 Datacenter
    • Windows 2008 Datacenter 64-bit
    • Windows 2008 Enterprise
    • Windows 2008 Enterprise 64-bit
    • Windows 2008 Server Core
    • Windows 2008 Server R2 Enterprise
    • Windows 2008 Standard
    • Windows 2008 Standard 64-bit
    • Windows 2008 Web Server Edition
    • Windows 2008 Web Server Edition 64-bit
    • Windows 2012 Datacenter
    • Windows 2012 Datacenter R2
    • Windows 2012 Enterprise
    • Windows 2012 Enterprise R2
    • Windows 2012 Server Essential R2
    • Windows 2012 Server Essentials
    • Windows 2012 Server R2
    • Windows 2012 Standard
    • Windows 2012 Standard R2
    • Windows 2012 Web Server Edition
    • Windows 2016 Server Core
    • Windows 2016 Server Datacenter
    • Windows 2016 Server Standard
    • Windows 7 32-Bit
    • Windows 7 64-Bit
    • Windows 8 32-Bit
    • Windows 8 64-Bit
    • Windows 8.1 32-Bit
    • Windows 8.1 64-Bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Home
    • Windows XP Professional
    • Windows XP Professional 64-bit

Autorun malware consistently tops the charts as the most prevalent malware, particularly in the Asia-Pacific region. This article provides a brief background about autorun and a steps on how you can be protected against it with the OfficeScan Device Access Control.


Autorun malware, also known as "autorun worm", propagates on removable devices such as USB hard drives, flash drives and memory sticks. These malware can also infest mapped drives. They are also notorious and very difficult to prevent from infecting the computer.

The following are examples of malware families categorized as autorun:

  • WORM_DOWNAD (Conficker)

Since autorun malware is highly prevalent, Trend Micro developed a new preventive solution, called Device Control, to combat autorun threats.

Device Control is a feature in OfficeScan that regulates access to external storage devices and network resources connected to computers. It helps prevent data loss and leakage, and, when combined with file virus scanning, helps guard against security risks. It also functions by allowing you to set specific permissions for files on network devices.

Device Control does not support Windows XP 64-bit, Windows Server 2003 64-bit, and Windows Vista (without any service packs) 64-bit platforms.

To configure Device Control:

  1. Log on to the OfficeScan management console
  2. Go to any of the following:
    • For OfficeScan 10.x: Go to Networked Computers > Client Management and then select the target agents or domains from the client tree.
    • For OfficeScan 11.0/XG: Go to Agents > Agent Management, and then select the target clients or domains from the client tree.
  3. On the toolbar above the client tree, click Settings > Device Control Settings.
  4. Tick the "Block AutoRun function in USB devices" checkbox to prevent maliciously altered autorun.ini files from instructing the OS from running applications.

To manage access to external devices:

  1. On the management console, go to:
    • For OfficeScan 10.x: Networked Computers > Client Management > Settings > Device Control Settings.
    • For OfficeScan 11.0/XG: Agents > Agent Management > Settings > Device Control Settings.
  2. Select the check box to enable Device Control.
  3. Choose whether to block or allow the AutoRun function (autorun.inf) on USB devices connected to the computer.
  4. Select the permission for each device type.
  5. Select whether to display a notification message on the client computer when OfficeScan detects unauthorized device access, which includes all operations that OfficeScan blocks, or not.
  6. If you selected domains or clients on the client tree, click Save to apply settings. If you selected the root icon, you can choose from the following options:
    • Apply to All Clients - This applies settings to all existing clients and to any new client added to an existing/future domain. Future domains are not yet created at the time you configure the settings.
    • Apply to Future Domains Only - This applies settings only to clients added to future domains. This option will not apply settings to new clients added on an existing domain.

OfficeScan 10.x Device Control also features a logging mechanism. Clients send device control logs to the server daily. Only unauthorized access events are logged.

To view the device control logs:

  1. In the management console, go to:
    • For OfficeScan 10.x: Logs > Networked Computer Logs > Security Risks > View Logs > Device Control Logs.
    • For OfficeScan 11.0/XG: Agents > Agent Management > Logs > Device Control Logs.
  2. Specify the log criteria and then click Display Logs.
  3. View logs with the following information:
    • Date/Time unauthorized access was detected
    • Computer where external device is connected or where network resource is mapped
    • Device type or network resource accessed
    • Target, which is the item on the device or network resource that was accessed
    • Accessed by, which specifies where access was initiated
    • Permissions set for target

Below are the recommended settings for OfficeScan Device Control:

  1. For Plugin Devices like USB drives, set permission to Read and Write Only.
  2. For Optical Disk like CDROM drives, set permission to Read and Execute Only.
  3. For Floppy drives, set permission to Read and Write Only.
  4. For Network Resources such as mapped drives, set permission to Read Only.
Configure; Remove a Malware / Virus
Solution Id:
Did this article help you?

Thank you for your feedback!

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.