Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1876 |
| Revision | 0 |
| Updated | Sep-23 |
| Guideline | Not provided |
| Section | System patching |
| Topic | Mitigating known vulnerabilities |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. This implementation pushes critical OS patches within 48 hours using expedited updates managed by Intune and Windows Autopatch.12
Online services (SaaS, cloud infrastructure, web-facing applications) present a distinct patching challenge compared to endpoint OS patching: they are continuously internet-exposed, often managing large volumes of sensitive data, and critical vulnerabilities in these services are frequently targeted within hours of public disclosure.
The 48-hour window for critical/exploited vulnerabilities is specifically calibrated to the observed exploitation timeline. CISA KEV (Known Exploited Vulnerabilities Catalog) data shows that the median time-to-exploitation for actively exploited vulnerabilities dropped from 30+ days (2010s) to under 48 hours for many CVEs in 2022–2024. For online services, the attack surface is globally accessible — any delay beyond 48 hours significantly increases the probability of compromise.
Windows Autopatch Hotpatch (available for Windows 11 24H2+, Server 2025, and Azure Arc-enabled VMs) enables kernel-level patches to be applied without a restart on eligible Patch Tuesday months, enabling near-zero downtime patching for critical OS-level vulnerabilities in online service hosts. This is particularly valuable for internet-facing Windows Server workloads where maintenance windows are constrained.
| Patching scenario | Mechanism | Target timeline |
|---|---|---|
| Critical CVE (CVSS ≥9.0) | Intune Expedited Quality Update | 0-day deadline, 1-hr restart grace |
| Actively exploited CVE (CISA KEV) | Intune Expedited Quality Update | 0-day deadline, 1-hr restart grace |
| Standard Patch Tuesday | Autopatch deployment rings | Fast ring: T+1 day, Broad: T+7 days |
| Server/Azure VM (Hotpatch eligible) | Hotpatch (no restart required) | T+0 (same-day Patch Tuesday) |
For non-Windows online services (e.g., network appliances, Linux VMs, third-party SaaS), the 48-hour requirement is met through vendor-specific update mechanisms combined with Azure Update Manager (for Azure/Arc VMs) or manual emergency change procedures governed by the organisation’s change management framework.
[!NOTE] The Quality updates for Windows 10 and later policy will be deployed via Intune to expedite critical OS patches within 48 hours using Windows Autopatch. It will leverage expedited update capabilities to ensure timely patch installation on applicable devices. This will meet the ISM-1876 requirement for rapid patching of critical vulnerabilities.
Note: If the number of days to wait before a restart is enforced is set to 0, the device will immediately restart upon receiving the update. The user won’t receive the option to delay the reboot.1
Note: Turning on Hotpatch updates doesn’t change the existing deadline-driven or scheduled install configurations on your managed devices. Deferral and active hour settings still apply.2
ASD Blueprint for Windows update and patching describes best practices for patching in cloud and on-premises environments ASD Blueprint: Windows update and patching
Windows updates API overview explains how Windows Update for Business and the Graph API support patch management Windows updates API overview
Windows Autopatch Frequently Asked Questions provides prerequisites and capabilities for using Autopatch to manage patches Windows Autopatch FAQ
Hotpatch for Windows Server describes patching options and server support for hotpatch deployments Hotpatch for Windows Server
Azure Update Manager offers automated patching guidance for Azure VMs and non-Azure resources Azure Update Manager
Windows 11 release information outlines hotpatch and baseline update scheduling by OS version Windows 11 release information