🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1824
ISM-1860 →

Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.

Property Value
ISM Control ISM-1859
Revision 2
Updated Dec-23
Guideline Not provided
Section User application hardening
Topic Hardening user application configurations
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

ISM-1859 requires applying ACSC Office hardening policies via Intune configuration profiles to harden Office productivity suites. Implementation consolidates ACSC Office Hardening Guidelines in Intune and enforces the most restrictive guidance when conflicts occur.12

Justification

Hardening Office productivity suites directly reduces the initial access and execution capabilities available to attackers who deliver malicious documents via phishing — the most common initial access vector against Australian government and corporate targets according to ACSC Annual Cyber Threat Reports.

The ACSC Office Hardening Guidelines are derived from the vendor (Microsoft) security baseline for Microsoft 365 Apps for Enterprise plus ACSC-specific additions. Applying the most restrictive guidance when conflicts occur means the ACSC posture takes precedence over vendor-default settings that may be optimised for usability rather than security.

Key categories of Office hardening settings and their attack-surface impact:

Hardening category Key settings Attack vector blocked
Macro execution VBAWarnings, TrustBar, Trusted Publishers Code execution via malicious macros
Protected View Force Protected View for Internet/email content Exploitation of Office parser via untrusted docs
ActiveX controls Block ActiveX initialisation Drive-by execution via embedded controls
DDE / external content Disable automatic DDE updates Lateral execution via Excel/Word DDE
OLE packages Block OLE package activation (PS script) Dropper delivery via OLE embedded objects
Flash content Block all Flash activation Flash parser RCE (CVE-2018-15982 class)
Add-in trust Only allow digitally signed add-ins Persistence via malicious COM add-ins

The policy-set approach (Stage 3) ensures the ACSC hardening profile and the Microsoft 365 Apps deployment are linked in a single Intune Policy Set — simplifying assignment, reducing configuration drift, and providing a single compliance artefact for IRAP assessment.

Design Decision

[!NOTE] The ACSC Office Hardening policy will be applied via Intune configuration profiles to enforce the ACSC Office Hardening Guidelines across Office apps. The ACSC Office Hardening Guidelines.json policy file will be imported and deployed as the configuration profile.

Prerequisites

Implementation Steps

ACSC Office Hardening via Intune configuration profiles

  1. Stage 1 – Prepare targeted policy and Office apps
  1. Stage 2 – Import ACSC Office Hardening policy and OLE prevention script
  1. Stage 3 – Create a configuration policy set combining Microsoft 365 Apps and ACSC Hardening
HOME ← ISM-1824
ISM-1860 →