🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1872
ISM-1896 →

Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.

Property Value
ISM Control ISM-1876
Revision 0
Updated Sep-23
Guideline Not provided
Section System patching
Topic Mitigating known vulnerabilities
Essential Eight ML1, ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. This implementation pushes critical OS patches within 48 hours using expedited updates managed by Intune and Windows Autopatch.12

Justification

Online services (SaaS, cloud infrastructure, web-facing applications) present a distinct patching challenge compared to endpoint OS patching: they are continuously internet-exposed, often managing large volumes of sensitive data, and critical vulnerabilities in these services are frequently targeted within hours of public disclosure.

The 48-hour window for critical/exploited vulnerabilities is specifically calibrated to the observed exploitation timeline. CISA KEV (Known Exploited Vulnerabilities Catalog) data shows that the median time-to-exploitation for actively exploited vulnerabilities dropped from 30+ days (2010s) to under 48 hours for many CVEs in 2022–2024. For online services, the attack surface is globally accessible — any delay beyond 48 hours significantly increases the probability of compromise.

Windows Autopatch Hotpatch (available for Windows 11 24H2+, Server 2025, and Azure Arc-enabled VMs) enables kernel-level patches to be applied without a restart on eligible Patch Tuesday months, enabling near-zero downtime patching for critical OS-level vulnerabilities in online service hosts. This is particularly valuable for internet-facing Windows Server workloads where maintenance windows are constrained.

Patching scenario Mechanism Target timeline
Critical CVE (CVSS ≥9.0) Intune Expedited Quality Update 0-day deadline, 1-hr restart grace
Actively exploited CVE (CISA KEV) Intune Expedited Quality Update 0-day deadline, 1-hr restart grace
Standard Patch Tuesday Autopatch deployment rings Fast ring: T+1 day, Broad: T+7 days
Server/Azure VM (Hotpatch eligible) Hotpatch (no restart required) T+0 (same-day Patch Tuesday)

For non-Windows online services (e.g., network appliances, Linux VMs, third-party SaaS), the 48-hour requirement is met through vendor-specific update mechanisms combined with Azure Update Manager (for Azure/Arc VMs) or manual emergency change procedures governed by the organisation’s change management framework.

Design Decision

[!NOTE] The Quality updates for Windows 10 and later policy will be deployed via Intune to expedite critical OS patches within 48 hours using Windows Autopatch. It will leverage expedited update capabilities to ensure timely patch installation on applicable devices. This will meet the ISM-1876 requirement for rapid patching of critical vulnerabilities.

Prerequisites

Licensing

Dependencies

Implementation Steps

Expedite OS patches via Quality Updates (Intune)

  1. Create a Quality updates for Windows 10 and later (Preview) profile under Devices > Windows > Quality updates for Windows 10 and later (Preview).1
  2. Provide a name. It’s suggested that the name of the policy aligns to the quality update version being expedited for ease of reference.1
  3. Define the quality updates that Windows Update for Business expedites the installation of if the device Operating System version is less than.1
  4. Define the number of days until a restart of the device is enforced.1
  5. Assign the profile to a group containing all applicable Windows devices.1

Note: If the number of days to wait before a restart is enforced is set to 0, the device will immediately restart upon receiving the update. The user won’t receive the option to delay the reboot.1

Enroll devices to receive Hotpatch updates

  1. Go to the Intune admin center.2
  2. Select Devices from the left navigation menu.2
  3. Under the Manage updates section, select Windows updates.2
  4. Go to the Quality updates tab.2
  5. Select Create, and select Windows quality update policy.2
  6. Under the Basics section, enter a name for your new policy and select Next.2
  7. Under the Settings section, ensure that the option “When available, apply without restarting the device ("Hotpatch")” is set to Allow. Then, select Next.2
  8. Select the appropriate Scope tags or leave as Default. Then, select Next.2
  9. Assign the devices to the policy and select Next.2
  10. Review the policy and select Create.2
  11. You can also Edit the existing Windows quality update policy and set the “When available, apply without restarting the device ("Hotpatch")” to Allow.2

Note: Turning on Hotpatch updates doesn’t change the existing deadline-driven or scheduled install configurations on your managed devices. Deferral and active hour settings still apply.2

HOME ← ISM-1872
ISM-1896 →