🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1671
ISM-1673 →

Microsoft Office macro antivirus scanning is enabled.

Property Value
ISM Control ISM-1672
Revision 0
Updated Sep-21
Guideline Not provided
Section User application hardening
Topic Microsoft Office macros
Essential Eight ML1, ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Microsoft Office macros pose a significant security risk, which this control mitigates by enabling antivirus scanning for Office macros and importing the ACSC Office Hardening policy via Intune to enforce macro protections. This reduces the macro-enabled attack surface in end-user environments and aligns with ACSC and Defender guidance.12

Justification

How macro antivirus scanning (AMSI) works:

Office VBA and XLM runtimes are instrumented with a circular buffer that records potentially dangerous API calls (e.g., CreateProcess, ShellExecute, URLDownloadToFile). When a trigger API is called, the runtime pauses the macro, packages the buffered log, and passes it to the Antimalware Scan Interface (AMSI) via AmsiScanBuffer. The registered AV provider returns a verdict — if malicious, Office aborts the macro session and the AV can quarantine the file.

Macro Runtime Scan Scope — setting details:

Value Behaviour
0 Disabled — no runtime scanning of macros
1 Scan for low-trust documents (default when not configured) — excludes Trusted Locations, Trusted Documents, and macros signed by a Trusted Publisher
2 Scan all documents — no exclusions, maximum coverage

Registry path: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Security, value name MacroRuntimeScanScope (DWORD). Group Policy writes to the same key.

Does this require Windows Defender? No — AMSI is a generic interface. Any AV registered under HKLM\SOFTWARE\Microsoft\AMSI\Providers (including Defender, CrowdStrike, Trend Micro) will receive the scan request. Windows Defender is the guaranteed default on all supported Windows devices, which is why ACSC guidance references it explicitly. Third-party AV vendors that implement the AMSI provider API will be invoked in the same way.

Supported Office versions: Office 2016, 2019, 2021, and Microsoft 365 Apps. Office 2010/2013 do not include the AMSI runtime integration.

Design Decision

[!NOTE] The ACSC Office Hardening policy will be imported into Intune configuration profiles and applied to All Office Users. It will enable the Macro Runtime Scan Scope: Enabled for all documents setting, corresponding to the Scan macros in Office files requirement.

Prerequisites

Implementation Steps

Enable Scan macros in Office files using Intune

  1. Save the ACSC Office Hardening Guidelines policy to your local device.1

  2. In the Intune console, import a policy under Devices > Windows > Configuration profiles > Create > Import Policy. Name the policy, browse for the policy file saved in step 1, and click Save.1

  3. Create a policy set to apply the hardening policies. Navigate to Devices > Policy sets > Create. Under Application Management > Apps, select Microsoft 365 Apps (for Windows 10 and later). Under Device Management > Device Configuration Profiles, select ACSC Office Hardening. Under Assignments, select All Office Users.1

  4. Import the Attack Surface Reduction (ASR) policy as part of the policy set. Import the Endpoint Security ASR policy by navigating to Graph Explorer and authenticating. Copy the JSON from the ACSC Windows Hardening Guidelines-Attack Surface Reduction policy and paste it into the request body. (Optional) modify the name value if necessary, then assign the policy to All Office Users.1

  5. Confirm macro antivirus scanning is enabled as part of the ACSC Office Hardening configuration. The policy configures the Macro Runtime Scan Scope setting to scan macros in all Office documents.

HOME ← ISM-1671
ISM-1673 →