Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1690 |
| Revision | 2 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | System patching |
| Topic | Mitigating known vulnerabilities |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Patch management ensures vulnerabilities are mitigated by applying vendor updates within two weeks of release when advisories are noncritical and no working exploits exist1. This control requires configuring and enabling Windows Autopatch for all workstations via the Intune admin portal to automate timely patch deployment and reduce security risk2.
The Essential Eight requires that non-critical patches for online services be applied within two weeks of release. Windows Autopatch implements this through deployment rings that progressively roll out updates:
| Ring | Description | Approximate coverage | Deployment cadence |
|---|---|---|---|
| Test | A small set of devices used to validate the update | ~1% | First available |
| First | Early-adopter devices (power users, IT) | ~1% | 1 week after Test |
| Fast | Broader early majority | ~9% | 1 week after First |
| Broad | Remaining production devices | ~90% | 2 weeks after Fast |
By default, all devices in the Broad ring receive updates within two weeks of release, satisfying the Essential Eight ML1/ML2/ML3 cadence requirement for non-critical patches. For critical patches (zero-day or CVSS ≥ 9.0), Autopatch accelerates deployment to within 48 hours using an Expedited deployment policy.
Windows Autopatch covers four update types: Windows OS quality updates, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams. This consolidates patching of the most commonly exploited Microsoft software surfaces into a single managed workflow.
Licensing: Windows Autopatch requires Windows 10/11 Enterprise E3 or higher (included in Microsoft 365 E3+). It is not available on Windows Pro or Business editions.
[!NOTE] The Windows Autopatch configuration will be configured and enabled for all workstations via the Intune admin portal. It will ensure patching occurs within two weeks of release for vulnerabilities deemed noncritical by vendors.
For organisations that cannot use Windows Autopatch (e.g., those without Windows Enterprise E3+ licensing, those using on-premises WSUS, or hybrid environments in transition), ring-based update deployment can be achieved using WSUS + Group Policy or Windows Update for Business (WUfB) + Group Policy. Both approaches implement the same progressive ring model as Autopatch, using GPO security filtering to stage update rollout across waves.
[!NOTE] The approach documented below is based on the best-practice model published by Group Policy MVP Alan Burchill at grouppolicy.biz/2011/06/best-practices-group-policy-for-wsus/3 and the Microsoft WSUS ring deployment guide.4
This is the traditional on-premises model. WSUS manages update approvals; Group Policy assigns devices to WSUS target groups and controls the deployment schedule for each ring.
Ring model:
| Ring | WSUS target group | AD security group | Deployment schedule | Coverage |
|---|---|---|---|---|
| Ring 1 — Test / Pilot IT | Ring 1 - Pilot IT |
WSUS-Ring1-PilotIT |
First available after approval | ~1–5% (IT staff, test devices) |
| Ring 2 — Broad IT | Ring 2 - Broad IT |
WSUS-Ring2-BroadIT |
+3–5 days after Ring 1 | ~5–10% (technical users) |
| Ring 3 — Broad Business (workstations) | Ring 3 - Broad Business |
WSUS-Ring3-BroadBusiness |
+7 days after Ring 1 | ~80–85% (standard users) |
| Ring 4 — Servers | Ring 4 - Servers |
WSUS-Ring4-Servers |
Separate maintenance window | All servers |
[!IMPORTANT] Servers should always be in a separate ring with a distinct maintenance window, scheduled well after workstation rings have validated stability. A typical schedule is: workstations Friday night → Ring 1 servers Saturday midday → Ring 2 servers Sunday midday.3
Ring 1 - Pilot IT, Ring 2 - Broad IT, Ring 3 - Broad Business, Ring 4 - Servers).For each ring, create a dedicated GPO. Security-filter each GPO to its corresponding AD security group (remove Authenticated Users from the security filter and add the ring-specific group).3
WSUS - Workstations - Ring 1 Pilot IT.Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Updatehttp://wsus.contoso.com:8530)Ring 1 - Pilot IT)4[!TIP] GPO naming convention: Prefix all WSUS GPOs consistently for easy identification in GPMC, e.g.
WSUS - [Tier] - [Ring] - [Site]. For multi-site deployments, create site-specific variants (e.g.,WSUS - Servers - Sydney - Round 1,WSUS - Servers - Sydney - Round 2) to stagger deployment across geographic locations within the same ring.3
For cloud-connected environments that want ring-based deployment without WSUS, Windows Update for Business delivers updates directly from Microsoft Update and uses Group Policy (or MDM) deferral periods to stagger rings. No WSUS server is required.5
Deferral ring model:
| Ring | GPO name | Quality update deferral | Feature update deferral | Coverage |
|---|---|---|---|---|
| Ring 0 — Pilot | WUfB - Pilot |
0 days | 0 days | IT/test devices |
| Ring 1 — Fast | WUfB - Fast |
5 days | 30 days | Power users / early adopters |
| Ring 2 — Broad | WUfB - Broad |
14 days | 60–90 days | Standard production devices |
[!NOTE] A 14-day quality update deferral on the Broad ring satisfies the ISM two-week non-critical patching requirement for devices that receive updates directly from Microsoft Update (no WSUS).
Download the latest Windows 11 Administrative Templates from the Microsoft Download Centre and update the Central Store (\\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions) to ensure WUfB settings are available in GPMC.
WUfB - Pilot, WUfB - Fast, WUfB - Broad).Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Update\Windows Update for BusinessIf a quality update causes issues after Ring 0 deployment, pause rollout to downstream rings:
Frequently Asked Questions about Windows Autopatch ↩ ↩2 ↩3 ↩4 ↩5
Essential Eight patch operating systems ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8 ↩9 ↩10 ↩11
Best practices: Group Policy for WSUS — grouppolicy.biz (Alan Burchill, Group Policy MVP) ↩ ↩2 ↩3 ↩4 ↩5
Deploy updates using Windows Server Update Services — Microsoft Learn ↩ ↩2 ↩3 ↩4
Configure Windows Update client policies via Group Policy — Microsoft Learn ↩ ↩2 ↩3