Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1488 |
| Revision | 1 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Microsoft Office macros |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Microsoft Office macros in files originating from the internet are blocked by applying a centralized Anti-Malware Threat Policy that blocks all macro-containing file types, including DOCM, XLSM and PPTM. This reduces the risk of macro-based malware and aligns with established hardening guidelines and baseline configurations.1
The primary enforcement mechanism is the Mark of the Web (MOTW). When a file is downloaded from the internet, Windows attaches a Zone.Identifier alternate data stream (ZoneId=3) to the file on NTFS volumes. When a macro-enabled Office document carrying this flag is opened, Office 2203 and later automatically blocks macro execution and displays a Security Risk banner — with no “Enable Content” button. This behaviour is enabled by default in modern Office builds and does not require additional configuration, but must be confirmed via the ACSC Office Hardening policy.1
Attack Surface Reduction (ASR) rules complement MOTW enforcement by preventing macro-initiated code execution even if the MOTW is stripped or bypassed.
[!NOTE] The Anti-Malware Threat Policy will be used to block all file types that may contain macros, including DOCM, XLSM, and PPTM. It will be applied through the Intune policy set framework to enforce macro blocking across Office clients.
Note When using Trusted Publishers, macros are restricted to those signed by a Trusted Publisher, and a separate policy is created per Publisher to simplify management and removal.
The following diagram describes how MOTW enforcement works for internet-origin macros:
:Zone.Identifier ADS to the file on NTFS (ZoneId=3 = Internet zone)[!NOTE] MOTW does not survive on FAT32 or USB/removable storage. Files copied from NTFS to FAT32 media and back lose the Zone.Identifier stream. This is a known MOTW bypass; supplement with ASR rules for defence-in-depth.
Deploy the following Attack Surface Reduction rules in Block mode (1) to prevent macro-initiated code execution, even if MOTW is bypassed:1
| ASR rule | GUID | Purpose |
|---|---|---|
| Block Win32 API calls from Office macros | 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b |
Prevents VBA from calling system APIs |
| Block Office apps from creating child processes | d4f940ab-401b-4efc-aadc-ad5f3c50688a |
Stops macros from launching executables |
| Block Office apps from creating executable content | 3b576869-a4ec-4529-8536-b80a7769e899 |
Prevents macros writing .exe files |
| Block Office apps from injecting code into other processes | 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 |
Stops code-injection after macro execution |
Deploy rules via Intune under Endpoint Security → Attack surface reduction as GUID=1 (Block). Start in Audit mode (GUID=2) and review the Defender for Endpoint ASR report for false positives before switching to Block.
ASD Blueprint: Microsoft Office hardening provides design decisions for securing Office macros and Defender integration on Windows endpoints ASD Blueprint: Microsoft Office hardening
Macros from the internet are blocked by default in Office Macros from the internet are blocked by default in Office
Essential Eight application hardening provides core guidance on Office macro controls and ASR usage Essential Eight application hardening
ASD Blueprint: Microsoft Defender describes Defender for Endpoint integration with ASR and macro hardening ASD Blueprint: Microsoft Defender
Microsoft 365 Apps for Enterprise security baseline settings reference for Microsoft Intune (v2306) includes macro-related baseline controls Microsoft 365 Apps for Enterprise security baseline settings reference for Microsoft Intune (v2306)
ASD Blueprint: Restrict Microsoft Office macros provides guidance on restricting macros to trusted sources ASD Blueprint: Restrict Microsoft Office macros
Microsoft Security Bulletin MS08-014 - Critical describes macro vulnerability mitigations Microsoft Security Bulletin MS08-014 - Critical
Microsoft Security Bulletin MS07-014 - Critical describes macro vulnerability mitigations Microsoft Security Bulletin MS07-014 - Critical