🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1696
ISM-1699 →

A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services.

Property Value
ISM Control ISM-1698
Revision 1
Updated Sep-23
Guideline Not provided
Section System patching
Topic Scanning for unmitigated vulnerabilities
Essential Eight ML1, ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

A vulnerability scanner is used on a daily basis to identify missing patches and vulnerabilities across online services1. Monitor the Microsoft 365 Admin Portal “Service Health” to watch for service vulnerability announcements2.

Justification

Daily vulnerability scanning for online services is required because:

Microsoft Defender for Cloud / Defender Vulnerability Management provides automated, continuous scanning with daily refresh of recommendations, satisfying the daily frequency requirement without manual intervention. For Microsoft 365 specifically, the Service Health dashboard surfaces Microsoft-disclosed vulnerabilities and service advisories that may require immediate tenant-side action (configuration changes, temporary workarounds) before a vendor patch is available.

Design Decision

[!NOTE] The Microsoft 365 Admin Portal Service Health monitoring will be deployed to monitor for service vulnerability announcements. Alerts will be surfaced for any such announcements.

Prerequisites

Licensing

Permissions/Roles

Dependencies

Implementation Steps

Monitor the Microsoft 365 Admin Portal Service Health

  1. Sign in to the Microsoft 365 admin center with at least the Service Support Administrator role.
  2. In the left navigation, select Health > Service health to view current service status and any active advisories.
  3. Select Preferences to configure email notifications for service incidents, advisories, and message center posts.
  4. Enable the Send me email notifications about service health option and add the security team distribution list as a recipient.
  5. In the Microsoft Defender portal (security.microsoft.com), navigate to Threat & vulnerability management > Recommendations and review the daily-refreshed list of cloud service recommendations.
  6. Filter by Category: Online services or Platform: Azure AD / Microsoft 365 to focus on online service vulnerabilities.
  7. For any critical recommendations, use the Remediation workflow to create Intune remediation tasks or assign manual remediation to the responsible team with a due date matching the two-week SLA for non-critical vulnerabilities.
  8. Optionally, configure a Logic App or Power Automate flow to push Service Health notifications into Microsoft Teams or the organisation’s ITSM system for automated ticketing.
HOME ← ISM-1696
ISM-1699 →