Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1859 |
| Revision | 2 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | User application hardening |
| Topic | Hardening user application configurations |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
ISM-1859 requires applying ACSC Office hardening policies via Intune configuration profiles to harden Office productivity suites. Implementation consolidates ACSC Office Hardening Guidelines in Intune and enforces the most restrictive guidance when conflicts occur.12
Hardening Office productivity suites directly reduces the initial access and execution capabilities available to attackers who deliver malicious documents via phishing — the most common initial access vector against Australian government and corporate targets according to ACSC Annual Cyber Threat Reports.
The ACSC Office Hardening Guidelines are derived from the vendor (Microsoft) security baseline for Microsoft 365 Apps for Enterprise plus ACSC-specific additions. Applying the most restrictive guidance when conflicts occur means the ACSC posture takes precedence over vendor-default settings that may be optimised for usability rather than security.
Key categories of Office hardening settings and their attack-surface impact:
| Hardening category | Key settings | Attack vector blocked |
|---|---|---|
| Macro execution | VBAWarnings, TrustBar, Trusted Publishers | Code execution via malicious macros |
| Protected View | Force Protected View for Internet/email content | Exploitation of Office parser via untrusted docs |
| ActiveX controls | Block ActiveX initialisation | Drive-by execution via embedded controls |
| DDE / external content | Disable automatic DDE updates | Lateral execution via Excel/Word DDE |
| OLE packages | Block OLE package activation (PS script) | Dropper delivery via OLE embedded objects |
| Flash content | Block all Flash activation | Flash parser RCE (CVE-2018-15982 class) |
| Add-in trust | Only allow digitally signed add-ins | Persistence via malicious COM add-ins |
The policy-set approach (Stage 3) ensures the ACSC hardening profile and the Microsoft 365 Apps deployment are linked in a single Intune Policy Set — simplifying assignment, reducing configuration drift, and providing a single compliance artefact for IRAP assessment.
[!NOTE] The ACSC Office Hardening policy will be applied via Intune configuration profiles to enforce the ACSC Office Hardening Guidelines across Office apps. The ACSC Office Hardening Guidelines.json policy file will be imported and deployed as the configuration profile.
In the Intune console, import a policy under Devices > Windows > Configuration profiles > Create > Import Policy. Name the policy, select Browse for files under Policy file, and Save. [^3]
ASD Blueprint resources for user application hardening provide practical controls and considerations for applying Essential Eight to Office apps and macros ASD Blueprint: User application hardening
System hardening guidance for Windows user apps and macros is documented in ASD’s blueprint system-hardening-user-apps, aligning with ACSC policies ASD Blueprint: System hardening user apps
Microsoft 365 Apps for mobile management with Intune describes app protection and configuration policy best practices for Office apps on iOS and Android Manage Collaboration Experiences in Microsoft 365 (Office) for iOS and Android With Microsoft Intune
Essential Eight patch applications guidance describes patch cadences and deployment approaches using Defender Vulnerability Management and Intune Essential Eight patch applications
Essential Eight user application hardening ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8
Essential Eight configure Microsoft Office macro settings ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8 ↩9
Step 2 - Add, Configure, and Protect Apps with Intune ↩ ↩2 ↩3
Attack surface reduction policy settings for endpoint security in Intune ↩
Block macros from running in Office files from the Internet ↩