🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1380
ISM-1485 →

Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Property Value
ISM Control ISM-1412
Revision 6
Updated Dec-23
Guideline Not provided
Section User application hardening
Topic Hardening user application configurations
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Hardening of web browsers, particularly Microsoft Edge, follows ASD and vendor guidance to minimize attack surface when conflicts occur. Deploying the ACSC Edge Hardening Guidelines through Intune enforces consistent, policy-driven controls across devices.1

The Microsoft Edge security baseline (available in Intune under Endpoint Security → Security Baselines) covers the majority of required settings. However, several ACSC-mandated settings are not in the baseline and must be added via a custom Settings Catalog profile or by importing the ACSC Edge JSON policy directly.[^2]

Design Decision

[!NOTE] The ACSC Microsoft Edge Hardening Guidelines policy will be deployed through Intune configuration profiles to harden Microsoft Edge in accordance with ACSC guidance. This approach deploys the ACSC Edge hardening configuration through Intune as per ACSC guidance.

Prerequisites

Implementation Steps

Import ACSC Edge Hardening Policy into Intune

  1. Save the ACSC Microsoft Edge Hardening Guidelines policy to your local device.1
  2. Navigate to the Microsoft Intune console.1
  3. Import a policy, under Devices > Windows > Configuration profiles > Create > Import Policy.1
  4. Name the policy, select Browse for files under Policy file and navigate to the saved policy from step 1.1
  5. Select Save.1

Deploy Edge Security Baseline via Intune

  1. To implement the security baseline: Navigate to Endpoint Security > Security Baselines > Microsoft Edge Baseline.1
  2. Create a new Microsoft Edge Baseline by selecting Create Profile.1
  3. Review the configuration, and assign the Security Baseline to a group.1

[!NOTE] The ACSC recommended hardening policies for Microsoft Edge are contained within these policies. The Microsoft Edge Baseline approach provides a baseline deployment pathway in Intune.1

Policy settings: baseline vs. custom

The following table shows which ACSC-required settings are already covered by the Microsoft Edge security baseline deployed in step 2, and which must be added separately via a custom Settings Catalog profile (or by importing the ACSC Edge JSON):34

Setting Intune Edge baseline Action required
TLS 1.2+ (MinimumTLSVersion) ✅ Covered None
SmartScreen enabled (SmartScreenEnabled) ✅ Covered None
SmartScreen PUA blocking (SmartScreenPuaEnabled) ✅ Covered None
Prevent SmartScreen bypass for sites ✅ Covered None
Prevent SmartScreen bypass for downloads ✅ Covered None
Block Flash / legacy plugins ✅ Covered None
Site isolation (SiteIsolationEnabled) ✅ Covered None
Password manager disabled ✅ Covered None
Block legacy extension points ✅ Covered None
SharedArrayBuffer disabled ✅ Covered None
WebSQL disabled ✅ Covered None
Extensions: block all by default ⚠️ Not configured Add ExtensionInstallBlocklist = *; then add approved extension IDs to ExtensionInstallAllowlist
Developer tools disabled for standard users ⚠️ Not configured Set DeveloperToolsAvailability = Disallow
Do Not Track enabled ⚠️ Not configured Enable DoNotTrackEnabled
DNS-over-HTTPS disabled ⚠️ Not configured Set DnsOverHttpsMode = Disabled (force system/government-managed DNS)
Intrusive ads blocked ⚠️ Not configured Enable AdsSettingForIntrusiveAdsEnabled
Network Protection (block mode) ⚠️ Not configured Enable NetworkProtectionEnabled
SHA-1 certificates from local anchors disabled ⚠️ Not configured Set AllowSha1CertificatesFromLocalAnchors = Disabled

[!NOTE] The ACSC Edge JSON policy (importable via Settings Catalog) includes most of the ⚠️ items above. After importing, verify the settings listed and add any missing entries manually. Validate applied settings on each device by browsing to edge://policy.

HOME ← ISM-1380
ISM-1485 →