🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1542
ISM-1585 →
Property Value
ISM Control ISM-1544
Revision 3
Updated Dec-23
Guideline Not provided
Section Operating system hardening
Topic Application control
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Microsoft’s recommended application blocklist is implemented by Windows Defender Application Control (WDAC) via App Control for Business, restricting execution to organization-approved apps and drivers to prevent malicious code from running1. Intune can configure App Control for Business in the admin console, including setting up Intune as a managed installer to simplify deployment1.

Design Decision

[!NOTE] The Windows Defender Application Control policy will be implemented using App Control for Business to enforce Microsoft’s recommended application blocklist, deployed via Intune as the managed installer.

Prerequisites

Implementation Steps

  1. Install the WDAC Policy Wizard (App Control for Business Wizard) from the Microsoft Store.
  2. Launch the Wizard → Policy CreatorMultiple Policy Format → Base Policy.
  3. On the Policy Template screen, select Microsoft Recommended Block List. Export the XML.
  4. If you also need a base allow policy, start from AllowAll.xml located at %windir%\schemas\CodeIntegrity\ExamplePolicies — the block-list deny rules take effect over a blanket allow.2

Step 2 — (Optional) Merge with a custom base policy

  1. In the Wizard, choose Policy Merger. Select your custom base policy XML and the recommended block list XML.
  2. Ensure any <AllowAll> rules are removed from the merged result before converting to binary — an allow-all rule will override deny rules.
  3. Validate with: ConvertFrom-CIPolicy -XmlFilePath MergedPolicy.xml -BinaryFilePath MergedPolicy.p7b

Step 3 — Deploy via Intune

  1. In the Microsoft Intune admin centre, go to Endpoint security → App control for Business (Preview) → Create policy.
  2. Platform: Windows 10 and later; Profile type: Windows Defender Application Control.
  3. Under Configuration settings, select Enter XML data and paste the merged policy XML.
  4. Start in Audit only mode to observe impact before enforcing.
  5. Assign the profile to the target Azure AD device group.
  6. After a policy refresh (or manual trigger via Invoke-CimMethod on the device), verify the policy is loaded: Event Viewer → Applications and Services Logs → Microsoft → CodeIntegrity → Operational (Event ID 3033 = loaded; 3076 = block event in audit mode).
  7. Once validated, edit the profile to switch from Audit to Enforcement mode.

Step 4 — Add the vulnerable driver blocklist

Method Description
Supplemental policy Download the pre-built .p7b binary from Microsoft Download Center. Copy to %windir%\System32\CodeIntegrity\SiPolicy.p7b; run the App Control policy refresh tool.
Merge into base policy Extract Recommended_Driver_Blocklist.xml from the WDAC Wizard templates folder. Merge with your base policy (see Step 2). Remove any AllowAll rules. Deploy via Intune.
ASR rule (supplemental) Enable ASR rule GUID 56a863a9-875e-4185-98a7-b882c64b5ce5 (Block abuse of exploited vulnerable signed drivers) via an Intune Attack surface reduction profile as a complementary control.3
HOME ← ISM-1542
ISM-1585 →