Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1703 |
| Revision | 2 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | System patching |
| Topic | Scanning for unmitigated vulnerabilities |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Onboard devices to Microsoft Defender for Endpoint and use the Microsoft Defender security portal report under Exposure management > Vulnerabilities to identify missing patches or vulnerabilities in drivers on a fortnightly basis. This cadence enables proactive visibility of driver weaknesses and guides timely remediation to reduce risk.1
Drivers run at Ring 0 (kernel privilege) — a driver vulnerability grants an attacker the highest possible system privilege, bypasses all user-mode security controls, can disable AV/EDR agents, and persists across reboots. Unlike application vulnerabilities, driver exploits are used to:
Fortnightly scanning ensures that newly disclosed driver CVEs (both vendor-supplied and open-source drivers bundled with hardware) are detected within a window that still allows remediation before the 48-hour or 2-week patching deadline. Microsoft Defender Vulnerability Management surfaces driver-specific CVEs in the Inventories view filtered by component type.
[!NOTE] The onboarding to Microsoft Defender for Endpoint will be performed to onboard devices. The Microsoft Defender security portal report under Exposure management > Vulnerabilities will be used to monitor vulnerabilities.
ASD Blueprint for Patch operating systems outlines essential eight controls for patch management and Defender for Endpoint onboarding ASD Blueprint: Patch operating systems
Microsoft Defender Vulnerability Management provides asset visibility, vulnerability assessments, and built-in remediation workflows across devices Microsoft Defender Vulnerability Management
Defender for Cloud vulnerability scanning enables continuous assessment of machines, containers, and databases for vulnerabilities Enable vulnerability scanning
Integrated vulnerability scanning in Defender for Cloud uses a built-in VM scanner to identify weaknesses and support remediation planning Deploy integrated vulnerability scanner
The Windows Virtual Machines security baseline PV-5 highlights vulnerability assessments and Defender for Cloud embedded capabilities for VM scanning Azure security baseline for Virtual Machines - Windows Virtual Machines