Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1671 |
| Revision | 0 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Microsoft Office macros |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Microsoft Office macros are disabled by default to minimize macro-based attack risk; only users with a demonstrated business need should be granted macro access. If approved, create a dedicated exemption group (for example, “Allow macro execution - Trusted Publisher”) and deploy an Entra ID Access Package so that membership is periodically reviewed.1
Macros in Microsoft Office are one of the primary initial-access vectors in malware campaigns. Disabling macros by default — and granting access only on demonstrated business need — reduces the exploitable attack surface while still accommodating legitimate business processes through a controlled approval lifecycle.
Two-tier macro policy approach:
| Tier | Group | Macro policy (VBA Macro Notification Settings) | Notes |
|---|---|---|---|
| Default (all users) | Entire user population | 4 = Disable all macros without notification |
ACSC recommended baseline |
| Exemption (approved users) | Allow macro execution - Trusted Publisher | 3 = Disable all macros except digitally signed macros |
User must accept a prompt from a trusted publisher |
By assigning two separate Intune configuration profiles with different VBA Macro Notification Settings registry values (HKCU\Software\Policies\Microsoft\Office\16.0\<App>\Security\VBAWarnings), the exemption group receives a less restrictive setting without changing the default posture for all other users.
Entra ID Access Package — why:
[!NOTE] The Allow macro execution - Trusted Publisher group will be exempt from the policy that disables macros. Membership will be managed via an Entra ID Access Package and will be periodically reviewed. Only users approved to run macros will be added to the group.
Devices must be Windows 10 or later and managed through a deployment platform that can deliver WDAC policies. [^2]
Create a group that contains users who are able to run Office macros if they’re signed by a Trusted Publisher. This group is referred to as Allow macro execution - Trusted Publisher.1
Save the All Macros Disabled policy to your local device.1
In the Intune admin center, navigate to Devices → Configuration Profiles.1
Create a profile with Platform – Windows 10 or Later, Profile Type Templates and Custom.1
Create a name for the policy (for example, ‘Application Control - Microsoft Allow – Audit’) and select Next.1
Under OMA-URI Settings, select Add.1
Note that the OMA-URI configuration depends on the policy ID generated by the Windows Defender App Control Wizard. Use the policy as generated by the wizard: Name = Microsoft Allow Audit, OMA-URL = ./Vendor/MSFT/ApplicationControl/Policies/{GUID}/Policy, Data Type = Base64 (File).1
The Windows Defender App Control Wizard-generated policy XML also creates a CIP file. Copy the CIP file and rename the extension to .BIN (for example, {GUID}.bin).1
Upload the BIN under Base64 (File).1
Save the configuration profile.1
Follow the prompts to create the Configuration Profile and then deploy the policy to the intended system. For example, deploy a profile named ‘Application Control - Microsoft Allow – Audit’ to the target devices.1