Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1696 |
| Revision | 1 |
| Updated | Sep-23 |
| Guideline | Not provided |
| Section | System patching |
| Topic | Mitigating known vulnerabilities |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Addresses the risk of exploitation by ensuring critical operating system patches are applied within 48 hours of release. Expedited updates through Intune Windows Autopatch are used to push these patches quickly and reduce exposure to active exploits on Intune-enrolled workstations (Windows 10/11).12
[!NOTE] Windows Autopatch and Intune expedited updates apply to Intune-enrolled workstations (Windows 10/11 Enterprise/Education) only. For non-internet-facing Windows Servers, OS patching is delivered through WSUS + Group Policy (on-premises environments) or Azure Update Manager (Azure VMs and Azure Arc-connected servers). Network devices use vendor-specific update mechanisms. The 48-hour critical patching requirement applies to all of these scopes regardless of the management tool used.
Critical OS vulnerabilities — particularly those with working exploits or CVSS ≥ 9.0 on network-accessible attack vectors — represent an existential risk because the OS underlies all workloads and controls. Past incidents (EternalBlue/MS17-010, PrintNightmare/CVE-2021-34527, Log4Shell lateral movement via OS-level JVM) demonstrate that unpatched internal systems are rapidly exploited for lateral movement and ransomware deployment once an initial foothold is established, even in non-internet-facing environments.
The 48-hour window reflects the industry-observed timeline between public PoC publication and widespread automated exploitation, balancing:
How Intune Expedited Updates achieve 48-hour delivery:
Complementary application-layer patching via Enterprise App Management (workstations only):
Expediting OS patches closes the OS-level vulnerability window, but the same workstations also run dozens of third-party applications — each independently exploitable. Microsoft Enterprise App Management (EAM) addresses the application layer on these Intune-enrolled workstations without requiring manual repackaging.
[!NOTE] EAM applies to Intune-enrolled Windows 10/11 workstations only. Windows Servers are not supported by EAM or the Enterprise App Catalog. Server-side application patching should follow WSUS/SCCM or Azure Update Manager workflows. Microsoft pre-packages and hosts updates for hundreds of common Win32 applications in the Enterprise App Catalog; IT Pros apply updates via a supersedence workflow in the Intune console in minutes rather than days. EAM’s SLO of 80–90% of app updates available within 24 hours of vendor release means that for EAM-covered apps, the same 48-hour patching cadence applied to critical OS patches (ISM-1696) and critical application patches (ISM-1692) is operationally achievable without a bespoke packaging pipeline.3
[!NOTE] The Windows Autopatch approach will be used to push critical OS patches within 48 hours. Intune expedited updates will be used to deliver these patches to Intune-enrolled workstations (Windows 10/11 Enterprise/Education).
For non-internet-facing Windows Servers, deploy critical OS patches within 48 hours using one of the following tools:
- WSUS + Group Policy — for on-premises domain-joined servers (configure an Automatic Approval Rule for Critical/Security classifications with a 0-day deadline)
- Azure Update Manager — for Azure VMs and Azure Arc-connected on-premises servers (configure a Maintenance Configuration with a 48-hour schedule window)
For non-internet-facing network devices (routers, switches, firewalls), follow the vendor-specific firmware update process and verify against the Defender Vulnerability Management network device inventory.
Enable Defender Vulnerability Management (DVM) integration and onboard devices to DVM to support patching within 48 hours.1
Onboard devices to Defender Vulnerability Management (DVM) if not already onboarded. If devices are already onboarded, DVM features are enabled. If not, ensure Defender for Endpoint is running in block mode and onboard devices via Group Policy, Endpoint Manager, or local scripts. Detailed guidance is available for onboarding Defender for Endpoint capabilities.1
In the Defender portal, enable the Intune connection to enable remediation tasks. Navigate to Settings > Endpoints > General > Advanced features and turn on Microsoft Intune connection. Note: If Intune connection is enabled, you can create an Intune security task when creating a remediation request. This option does not appear if the connection is not set.1
Use the remediation workflow to address vulnerabilities. Go to Vulnerability management > Recommendations, select a security recommendation, and choose Remediation options. Fill out the form (including applicable device groups, priority, due date, and any notes) and submit. A remediation activity item is created in vulnerability management and a security task is created in Intune. The Intune admin accepts the task and remediates per the provided guidance, which may include links to relevant Intune configurations.1
Monitor and verify patch deployment. Track remediation progress and patch status in both Defender Vulnerability Management and Intune to ensure critical OS patches are deployed within the 48-hour window.1
While this control (ISM-1696) targets OS-level patches, the Intune-enrolled workstations being patched also run third-party applications that require independent patching under ISM-1692 (48-hour critical) and ISM-1693 (one-month general). Microsoft Enterprise App Management (EAM) is the Intune-native mechanism for keeping these applications current without a manual repackaging pipeline.
[!NOTE] This EAM section applies to Intune-enrolled workstations (Windows 10/11) only. Windows Servers are not supported targets for EAM or the Enterprise App Catalog.
What EAM provides:
| Without EAM | With EAM |
|---|---|
IT Pro downloads vendor installer, repackages as .intunewin, validates detection rules |
Microsoft pre-packages and hosts the app; detection rules pre-filled |
| 2–7+ days per application update | 80–90% of updates available within 24 hours of vendor release (SLO) |
| Separate process per application, per update | Single workflow via the Enterprise App Catalog apps with updates report |
| Risk of missing 48-hour or one-month patch windows | Consistent, auditable update cadence fully within compliance windows |
Steps to apply an EAM app update:4
[!NOTE] EAM updates are not automatic — IT Pros must initiate the supersedence workflow. Review the Enterprise App Catalog apps with updates report on every Patch Tuesday and on critical-vulnerability disclosure days to identify pending application updates alongside OS patch activities.
[!IMPORTANT] Licensing: Enterprise App Management is an Intune add-on (standalone or as part of the Microsoft Intune Suite). It is not included in standard Microsoft 365 E3/E5 licences.
Supported applications: The Enterprise App Catalog covers hundreds of commonly deployed Win32 applications. For the complete current list, see Apps available in the Enterprise App Catalog.35
For Windows Server 2016/2019/2022 (not Intune-managed), use one of the following approaches to meet the 48-hour critical patching requirement.
Critical — Servers 48hr. Set:
Computer Configuration → Administrative Templates → Windows Components → Windows Update:
4 – Auto download and schedule the install1 (hour)EnabledIfRequired.ASD Blueprint for Windows update and patching provides design guidance for implementing patching and update controls in cloud-based Windows deployments ASD Blueprint: Windows update and patching
Azure Update Manager overview explains how to manage updates at scale for Azure VMs and Arc-enabled servers, including on-demand assessment, maintenance configurations, and compliance reporting Azure Update Manager documentation
Configure Windows Server Update Services (WSUS) describes how to set up WSUS synchronisation, automatic approval rules with deadlines, and GPO-based deployment for domain-joined servers Windows Server Update Services (WSUS)
Microsoft Security Advisory 4025685 offers guidance for prioritizing and deploying critical security updates during high-risk exposure events Microsoft Security Advisory 4025685
Walkthrough: Use Group Policy to configure Windows Update client policies explains how to manage update rings, deferrals, and automatic updates via Group Policy Walkthrough: Use Group Policy to configure Windows Update client policies
Lifecycle FAQ - Windows clarifies servicing and update requirements and support timelines for Windows platforms Lifecycle FAQ - Windows