🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1699
ISM-1703 →

A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices.

Property Value
ISM Control ISM-1702
Revision 2
Updated Dec-23
Guideline Not provided
Section System patching
Topic Scanning for unmitigated vulnerabilities
Essential Eight ML1, ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

ISM-1702 requires a vulnerability scanner to run at least fortnightly to identify missing patches for operating systems on workstations, non-internet-facing servers, and non-internet-facing network devices. Onboard devices to Defender for Endpoint and use Microsoft Defender Vulnerability Management to continuously monitor and identify vulnerabilities across the environment for remediation.1

Justification

Fortnightly scanning ensures that:

Microsoft Defender Vulnerability Management provides continuous, automated scanning with database updates daily from the Microsoft Threat Intelligence feed, exceeding the fortnightly minimum requirement.

Design Decision

[!NOTE] The vulnerability scanning implementation will onboard devices to Microsoft Defender for Endpoint. The Microsoft Defender security portal report under Exposure management > Vulnerabilities will be used to monitor and manage identified vulnerabilities.

Prerequisites

Implementation Steps

Onboard devices to Microsoft Defender for Endpoint and review vulnerabilities in Defender portal

  1. Create a new Windows Configuration Profile with a type of template for Microsoft Defender for Endpoint (desktop devices running Windows 10 or later).3
  2. Set Expedite telemetry reporting frequency to Enable.3
  3. Assign the profile to a group containing all applicable Windows devices.3
  4. Confirm devices are onboarded to Microsoft Defender for Endpoint and that Microsoft Defender Vulnerability Management will continuously monitor risk across devices.3
  5. Open the Microsoft Security Portal and navigate to Vulnerability Management > Inventories to view software products identified across endpoints onboarded to Defender for Endpoint, including vendor name, weaknesses found, threats, and exposed devices.3
  6. (Optional) Initiate remediation using the Defender and Intune workflow:
    • Enable the Microsoft Intune connection in the Defender portal: Settings > Endpoints > General > Advanced features > turn on the Microsoft Intune connection.3
    • In Defender portal, go to Vulnerability Management > Recommendations; select a security recommendation and choose Remediation options; fill out the form with what you are requesting remediation for, applicable device groups, priority, due date, and optional notes.3
    • Submit remediation to create a remediation activity item in Defender for Vulnerability Management and a remediation ticket in Intune; remediation actions will be tracked but will not automatically apply changes to devices.3

Note: Onboarded devices and vulnerability data are accessed through the Defender security portal as part of exposure management and ongoing risk monitoring.3

HOME ← ISM-1699
ISM-1703 →