Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-0843 |
| Revision | 9 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | Operating system hardening |
| Topic | Application control |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
App control on workstations uses Windows Defender Application Control to restrict execution to trusted applications, reducing risk from malware and unauthorized software.1
Implemented via App Control for Business and deployed through Intune to enforce policies across devices.2 Policies should be built using publisher rules as the primary mechanism, with hash rules as a fallback for unsigned internal applications. Path rules are discouraged — particularly for user-profile locations — because folder permissions can be modified by users.3
The policy should be deployed in Audit mode first (typically 2–4 weeks) to capture Event IDs 3076–3077 and identify missing allow-list entries before switching to Enforce mode.4 Hypervisor-Protected Code Integrity (HVCI) strengthens the stack by protecting the integrity verification process in an isolated environment, and is recommended for all workstations.2
[!NOTE] The App Control for Business policy will be deployed via Intune to enforce Windows Defender Application Control on workstations as part of operating system hardening. Policies will be defined based on publisher certificates, file hashes and file paths to authorize trusted software. This aligns with the App Control for Business deployment guidance via Intune.
Under OMA-URI Settings, select Add. 3
Note: This information depends on the Policy ID generated by the Windows Defender App Control Wizard for the policy XML created from “Create Audit Policy” above. Example values:
- Name: Microsoft Allow Audit
- OMA-URL: ./Vendor/MSFT/ApplicationControl/Policies/CB46B243-C19C-4870-B098-A2080923755C/Policy
- Data Type: Base64 (File)
.BIN (for example {CB46B243-C19C-4870-B098-A2080923755C}.bin). 3[!NOTE] Audit guidance: apply the policy in Audit mode to a pilot group first. Audit policies only record events and do not block execution — use them to identify legitimate applications that must be allowed. Review WDAC event logs (Event IDs such as 3076/3077), confirm Intune deployment status, adjust rules (publisher/hash/path) and retest before moving to Enforce. Ensure a recovery path (Safe Mode or system recovery image) is available in case rules are overly restrictive.
The following rule types are supported, in order of preference per ASD guidance:34
| Rule type | Recommended use |
|---|---|
| Publisher (signer) rules | Primary mechanism. Covers all binaries signed by a trusted certificate (Microsoft, third-party vendors). |
| Hash rules | Fallback for unsigned internal (LOB) applications. Use when no publisher certificate is available. |
| Path rules | Last resort only. The target folder must have locked-down ACLs (Administrators read/execute only). Never use for user-profile or temporary paths. |
| Managed Installer rules | Allows any package deployed via Intune to run without explicit hash/publisher entries. Enable via the WDAC Wizard or a supplemental AppLocker policy. |
| Recommended block rules | Microsoft publishes a maintained list of vulnerable user-mode and kernel-mode (driver) binaries. Import and merge these into the base policy. |
[!NOTE] Intune OMA-URI payload limit: Custom Configuration Profile OMA-URI uploads are limited to approximately 350 KB. If a policy contains many hash rules and exceeds this limit, split the policy into a base policy and supplemental policies, or convert hash-only entries to publisher rules where possible.
ASD Blueprint — Application control (ASD Blueprint for Secure Cloud) ↩ ↩2 ↩3 ↩4 ↩5
App Control for Business and AppLocker overview — Microsoft Learn ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7
Essential Eight application control — Microsoft Learn ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8 ↩9
ASD Blueprint — Windows Defender Application Control ↩ ↩2 ↩3