🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1702
ISM-1704 →

A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in drivers.

Property Value
ISM Control ISM-1703
Revision 2
Updated Dec-23
Guideline Not provided
Section System patching
Topic Scanning for unmitigated vulnerabilities
Essential Eight ML3
PSPF Levels NC, OS, P, S, TS

Summary

Onboard devices to Microsoft Defender for Endpoint and use the Microsoft Defender security portal report under Exposure management > Vulnerabilities to identify missing patches or vulnerabilities in drivers on a fortnightly basis. This cadence enables proactive visibility of driver weaknesses and guides timely remediation to reduce risk.1

Justification

Drivers run at Ring 0 (kernel privilege) — a driver vulnerability grants an attacker the highest possible system privilege, bypasses all user-mode security controls, can disable AV/EDR agents, and persists across reboots. Unlike application vulnerabilities, driver exploits are used to:

Fortnightly scanning ensures that newly disclosed driver CVEs (both vendor-supplied and open-source drivers bundled with hardware) are detected within a window that still allows remediation before the 48-hour or 2-week patching deadline. Microsoft Defender Vulnerability Management surfaces driver-specific CVEs in the Inventories view filtered by component type.

Design Decision

[!NOTE] The onboarding to Microsoft Defender for Endpoint will be performed to onboard devices. The Microsoft Defender security portal report under Exposure management > Vulnerabilities will be used to monitor vulnerabilities.

Prerequisites

Implementation Steps

Onboard devices to Microsoft Defender for Endpoint

  1. Create a new Windows Configuration Profile with a type of Template > Microsoft Defender for Endpoint (desktop devices running Windows 10 or later).1
  2. Set Expedite telemetry reporting frequency to Enable.1
  3. Assign the profile to a group containing all applicable Windows devices.1

Review vulnerabilities in Defender for Endpoint portal

  1. After onboarding, open the Microsoft Security Portal and navigate to Vulnerability Management > Inventories to view software products identified across endpoints onboarded to Defender for Endpoint.1
  2. To inspect details for a specific device, go to the Device Inventory page, select the device, and view the Software inventory flyout for information such as installed software, CVEs, and remediation guidance.1
HOME ← ISM-1702
ISM-1704 →