Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1659 |
| Revision | 1 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | Operating system hardening |
| Topic | Application control |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Microsoft’s vulnerable driver blocklist is implemented to prevent loading vulnerable kernel drivers, reducing the risk of kernel-mode malware and privilege escalation. The control is enforced through WDAC policies managed in Intune, following Microsoft guidance to deploy the vulnerable driver blocklist across devices12 The vulnerable driver blocklist is enabled by default on Windows 11 22H2 and later when any of the following are active: Memory integrity (HVCI), Smart App Control, or S mode. The UI toggle in Windows Security → Core isolation is greyed out and cannot be disabled while these features are on.3
There are two complementary enforcement mechanisms:
| Mechanism | How it works | When to use |
|---|---|---|
| HVCI (Memory integrity) | Kernel-mode blocklist enforced in a hypervisor-isolated environment. Applied automatically. No policy authoring needed. | Default on all modern Windows 11 hardware. Enable via Windows Security → Core isolation → Memory integrity. |
| WDAC policy blocklist | Deny rules inside a WDAC XML policy deployed via Intune. Works independently of HVCI — useful on older hardware or Windows 10 devices that cannot run VBS. | Required when HVCI is not available. Use the Recommended_Driver_Blocklist.xml template from the WDAC Policy Wizard. |
| ASR rule (complementary) | Blocks applications from writing vulnerable signed drivers to disk. GUID: 56a863a9-875e-4185-98a7-b882c64b5ce5. Does not block an already-present driver. |
Layer on top of HVCI/WDAC; creates audit events in Advanced Hunting (AsrVulnerableSignedDriverAudited/Blocked). |
Not provided in source documentation.
[!NOTE] The Microsoft vulnerable driver blocklist will be enabled via Intune device security settings. The WDAC configuration will include the Microsoft vulnerable driver blocklist and will be enforced through Intune management.
Check the registry:
reg query HKLM\SYSTEM\CurrentControlSet\Control\CI\Config /v VulnerableDriverBlocklistEnable
Value 0x1 = enabled; 0x0 = disabled.
Check HVCI / Device Guard status:
Get-CimInstance -Namespace root\Microsoft\Windows\CI -ClassName Win32_DeviceGuard
Confirm KernelModeCodeIntegrityPolicyEnabled = True.
| Event log | Event ID | Meaning |
|---|---|---|
| Microsoft-Windows-Windows Defender/Operational | 1121 | ASR rule blocked (vulnerable driver write blocked) |
| Microsoft-Windows-Windows Defender/Operational | 1122 | ASR rule audited (would have blocked in block mode) |
| Microsoft-Windows-CodeIntegrity/Operational | 3023 | Driver failed WDAC policy validation (blocked) |
| Microsoft-Windows-CodeIntegrity/Operational | 3076 | Audit event — driver would have been blocked |
| Microsoft-Windows-CodeIntegrity/Operational | 3077 | Enforcement event — driver was blocked |
| Microsoft-Windows-CodeIntegrity/Operational | 3089 | Signature information for a blocked driver |