Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1486 |
| Revision | 1 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Hardening user application configurations |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
ISМ-1486 hardens user applications by preventing Java applets from executing in browsers, reducing exposure to Java-based exploits. By ensuring Java is not installed and by using a browser such as Edge that does not support Java applets, this control blocks common web-based vectors for Java-driven attacks.12 Current state (2024–2025): All major modern browsers — Microsoft Edge (Chromium), Google Chrome, Mozilla Firefox, and Apple Safari — removed NPAPI plugin support between 2015 and 2020. Java applets therefore cannot execute in any supported modern browser by default. The primary residual risk is: (1) Internet Explorer 11 remains present on Windows devices and still loads the Java Runtime Environment (JRE) as a legacy NPAPI plugin; (2) the JRE is installed on a device and a niche browser with NPAPI support is present.2
The key actions for this control are therefore: ensure Internet Explorer 11 is disabled (not just unused), ensure the JRE is not installed on managed workstations, and confirm the Windows MDM security baseline disables Java permissions for any remaining IE-mode usage.
Not provided in source documentation.
[!NOTE] The Scripting of Java applets Baseline will be applied via Intune configuration profiles to disable Java applets, ensuring Java is not available on endpoints. Edge browser will be used because it does not support Java applets.
java.exe via WDAC/AppLocker.[!NOTE] Internet Explorer 11 reached end-of-support on 15 June 2022. Microsoft recommends disabling it as a standalone browser via Group Policy or Intune. If IE compatibility is required for legacy internal sites, use Edge IE Mode which does not support legacy NPAPI plugins (including Java).
java.exe and javaw.exe targeting all standard users. This ensures that even if the JRE is inadvertently installed, browsers and other applications cannot launch it.
Mitigation guidance for poisoned Java applet vulnerability CVE-2011-1969 and related Java applet mitigations is covered in Microsoft Security Bulletin MS11-079 - Important Microsoft Security Bulletin MS11-079 - Important
Gateway-level web content filtering references ASD’s Blueprint Gateways for controlling web traffic and Java applet delivery through gateway protections ASD Blueprint Gateways