Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1544 |
| Revision | 3 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | Operating system hardening |
| Topic | Application control |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Microsoft’s recommended application blocklist is implemented by Windows Defender Application Control (WDAC) via App Control for Business, restricting execution to organization-approved apps and drivers to prevent malicious code from running1. Intune can configure App Control for Business in the admin console, including setting up Intune as a managed installer to simplify deployment1.
[!NOTE] The Windows Defender Application Control policy will be implemented using App Control for Business to enforce Microsoft’s recommended application blocklist, deployed via Intune as the managed installer.
Licensing: M365-related services described in Microsoft 365 and Office 365 service descriptions to understand licensing requirements.1
Permissions/Roles: Administrators have appropriate permissions across the solutions used.1
Dependencies: Windows 11 22H2 Enterprise; Intune management solution; Defender for Endpoint; Microsoft Sentinel; App Control for Business configuration via Intune (Intune as managed installer).1
AllowAll.xml located at %windir%\schemas\CodeIntegrity\ExamplePolicies — the block-list deny rules take effect over a blanket allow.2<AllowAll> rules are removed from the merged result before converting to binary — an allow-all rule will override deny rules.ConvertFrom-CIPolicy -XmlFilePath MergedPolicy.xml -BinaryFilePath MergedPolicy.p7bInvoke-CimMethod on the device), verify the policy is loaded: Event Viewer → Applications and Services Logs → Microsoft → CodeIntegrity → Operational (Event ID 3033 = loaded; 3076 = block event in audit mode).| Method | Description |
|---|---|
| Supplemental policy | Download the pre-built .p7b binary from Microsoft Download Center. Copy to %windir%\System32\CodeIntegrity\SiPolicy.p7b; run the App Control policy refresh tool. |
| Merge into base policy | Extract Recommended_Driver_Blocklist.xml from the WDAC Wizard templates folder. Merge with your base policy (see Step 2). Remove any AllowAll rules. Deploy via Intune. |
| ASR rule (supplemental) | Enable ASR rule GUID 56a863a9-875e-4185-98a7-b882c64b5ce5 (Block abuse of exploited vulnerable signed drivers) via an Intune Attack surface reduction profile as a complementary control.3 |
ASD Blueprint: Windows Defender application control explains WDAC design decisions and cloud-managed deployment guidance via Intune ASD Blueprint: Windows Defender application control
ASD Blueprint: Application management covers WDAC deployment considerations with Endpoint Manager ASD Blueprint: Application management
ASD Blueprint: User application hardening discusses Essential Eight aligned WDAC user hardening guidance ASD Blueprint: User application hardening
Essential Eight application control provides recommended controls for workstation app control and WDAC guidance Essential Eight application control
Microsoft recommended driver block rules describe how to apply the vulnerable driver blocklist within WDAC Microsoft recommended driver block rules
Smart App Control overview explains enforcement mode blocks for unsafe apps and file intelligence Smart App Control overview
Application Control for Windows provides WDAC guidance for Windows Defender Application Control fundamentals Application Control for Windows