🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1673
ISM-1683 →

Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute.

Property Value
ISM Control ISM-1674
Revision 0
Updated Sep-21
Guideline Not provided
Section User application hardening
Topic Microsoft Office macros
Essential Eight ML3
PSPF Levels NC, OS, P, S, TS

Summary

Only Microsoft Office macros running in a sandboxed environment, from a Trusted Location, or digitally signed by a trusted publisher are allowed to execute. This mitigates macro-based malware risk and requires a separate policy targeted to specific devices that allow only macros signed by Trusted Publishers via Intune policy, with members excluded from other macro-blocking policies to avoid conflicts.1

Justification

Restricting macro execution to only digitally signed macros from trusted publishers provides a cryptographically verifiable chain of trust between a macro’s author and its execution on a device. This is the final control in a layered macro governance model:

Layer ISM Control What it does
Block all macros by default ISM-1671 Reduces attack surface for the general user population
Scan enabled macros at runtime ISM-1672 Catches malicious behaviour even in permitted macros
Block Win32 API calls from macros ISM-1673 Blocks post-execution exploitation
Only allow signed macros for approved users ISM-1674 Ensures any permitted macro has a verifiable author

Why V3 signatures are required:

[!WARNING] V3 signatures require Microsoft 365 current channel or Office 2019/2021/LTSC 2024 (build ≥ 1808 with December 2020 security updates). Office 2016 pre-December 2020 does not support V3 and will reject V3-signed macros.

Risk of a compromised Trusted Publisher certificate:

A compromised code-signing certificate allows an attacker to sign malicious VBA code that any device with the publisher’s certificate in its Trusted Publishers store will automatically execute. Mitigate by storing the private key on a Hardware Security Module (HSM), enabling the Group Policy “Block certificates from trusted publishers that are installed in the current user store”, and monitoring certificate usage through audit logs. Revoke and rotate the certificate immediately if compromise is suspected.

Design Decision

[!NOTE] The Allow macro execution - Trusted Publisher policy will be created and targeted to a specific device set using Intune policy to allow only macros signed by a Trusted Publisher. Members of this policy will be excluded from the All Macros Disabled policy to avoid conflicts with macro blocking policy settings.

Prerequisites

Dependencies

Implementation Steps

Separate policy for Trusted Publisher macro execution

  1. Create a group that contains users that can run Office macros if they’re signed by a Trusted Publisher. This group is referred to as: Allow macro execution - Trusted Publisher and must be excluded from other Office macro policies to avoid conflicts.1

  2. Save the All Macros Disabled policy to your local device. (The policy to block macros is not included in the Policy Set; this provides the ability to selectively exempt groups of users.)1

  3. In the Microsoft Intune console, navigate to Devices > Windows > Configuration profiles > Create > Import Policy.1

  4. Name the policy, select Browse for files under Policy file and navigate to the saved policy from step 2.1

  5. Select Save.1

  6. Assign the All Macros Disabled policy to All Office Users (that was created at the start).1

  7. Exclude the Allow macro execution - Trusted Publisher group (from step 1) to avoid conflicts with the block policy.1

  8. Save the Macros Enabled for Trusted Publishers policy to your local device. (This policy allows macros signed by Trusted Publishers to run for the exempt group.)1

  9. In the Microsoft Intune console, navigate to Devices > Windows > Configuration profiles > Create > Import Policy, and import the policy saved in step 8.1

  10. Name the policy, select Browse for files under Policy file and navigate to the saved policy from step 8.1

  11. Select Save.1

  12. Assign the policy to the group: Allow macro execution - Trusted Publisher.1

  13. Create a new policy for each Trusted Publisher, and deploy any Trusted Publishers certificate policies to the same group: Allow macro execution – Trusted Publisher.1

  14. Note: When signing macros, use the more secure version of the VBS project signature scheme: V3 signature.1

HOME ← ISM-1673
ISM-1683 →