2.4.2. Is it possible to leverage Application and Device Control |
2.4.2.2. Is threat spreading through Autorun.inf files? |
2.4.2.2.1. LINK http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2008050910464348 | |
2.4.2.2.2. Create Autorun.inf blocking policy using article in link 1.4.2.2.1. |