🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1900
ISM-1902 →

Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF applications, and security products are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.

Property Value
ISM Control ISM-1901
Revision 1
Updated Jun-25
Guideline Not provided
Section System patching
Topic Mitigating known vulnerabilities
Essential Eight ML3
PSPF Levels NC, OS, P, S, TS

Summary

ISM-1901 addresses timely patching by applying vendor mitigations for vulnerabilities in operating systems, office productivity suites, web browsers, and security products within two weeks of release when vulnerabilities are non-critical and no working exploits exist.1

Implementation aligns with ASD Blueprint guidance, mandating patches within two weeks of release or within 48 hours if an exploit exists.2

Justification

Priority applications — office productivity suites, web browsers, email clients, PDF applications, and security products — have the highest exposure to document-based and browser-based initial access vectors. Non-critical vulnerabilities in these applications (CVSS Medium/High, no working exploit) still represent a meaningful risk: the gap between “no public exploit” and “working exploit” is often measured in days to weeks, particularly for widely-deployed software.

A two-week remediation window for non-critical vulnerabilities is calibrated to balance operational change management constraints with the observed exploitation timeline. Microsoft’s Autopatch deployment rings (Test → First → Fast → Broad) deliver patches progressively over 7–21 days for standard quality updates, which aligns with the two-week requirement when the Broad ring deadline is set to 14 days.

For third-party priority applications (Adobe Reader, 7-Zip, VLC, etc.), the Intune Enterprise App Catalogue provides direct Microsoft-managed packaging for common applications — removing the re-packaging overhead and accelerating the two-week remediation timeline. For bespoke applications, the Win32 Content Prep Tool (.intunewin) remains the standard deployment path.

Application category Two-week patching mechanism Verification method
Microsoft 365 Apps Intune Monthly Enterprise Channel Defender VM software inventory
Microsoft Edge Intune Edge update policy (Stable channel) Defender VM browser CVE report
Adobe Reader/Acrobat Enterprise App Catalogue or Win32 Defender VM – software vulnerabilities
Windows Defender Automatic intelligence updates Defender VM – security product version
Third-party security products Vendor update mechanism + Intune Win32 Defender VM – software vulnerabilities

Design Decision

[!NOTE] The Windows Autopatch will be configured and enabled for all workstations via the Intune admin portal. For third-party applications, new versions will be deployed via Intune Enterprise Application Catalogue, otherwise re-package and redeploy all applications that required security updates within the timeline required. For the Edge web browser configure all devices to “Target Channel” or “Stable”

Prerequisites

Implementation Steps

Enable Windows Autopatch and patch management via Intune

  1. Register for Windows Autopatch in the Intune admin center (Tenant administration > Windows Autopatch). Complete the prerequisites check and activate the service for the tenant.2

  2. Assign devices to the Windows Autopatch device registration group (Windows Autopatch Device Registration). Devices are automatically distributed across Test, First, Fast, and Broad deployment rings.2

  3. Configure the Broad ring deadline to ensure all non-critical patches are installed within 14 days of release. In the Intune admin center, navigate to Windows updates > Update rings and verify the Quality update deferral for the Broad ring is set to 7 days with a deadline of 7 additional days (14 days total from release).1

  4. For Microsoft 365 Apps, configure the update channel to Monthly Enterprise Channel via Intune Settings Catalog (Microsoft Office > Update channel = Monthly Enterprise Channel). This ensures priority application patches are available within 4 weeks of Patch Tuesday at most, meeting the two-week requirement for most releases.1

  5. For Edge browser, configure the update policy in Intune Settings Catalog (Microsoft Edge Update > Update policy) to Always allow updates on the Stable channel. Verify via Defender Vulnerability Management that deployed Edge versions match the current stable release.1

  6. For third-party priority applications (Adobe, security products): use the Intune Enterprise App Catalogue for supported apps, or package updates using the Win32 Content Prep Tool (.intunewin) and deploy as required applications with a deadline of 14 days from CVE publication date.1

  7. Use Defender Vulnerability Management (Defender portal > Exposure management > Vulnerability management > Vulnerabilities) filtered by severity = Medium/High and component = priority apps to verify patch coverage fortnightly and confirm compliance with the two-week requirement.

Apply vendor mitigations for Adobe Acrobat using custom ADMX via Intune

The ISM-1901 requirement covers “patches, updates or other vendor mitigations” — meaning that when a patch has not yet been applied (e.g., is still progressing through deployment rings) configuration-based vendor mitigations can satisfy the intent for lower-severity vulnerabilities. Adobe’s FeatureLockDown security settings represent exactly this class of vendor mitigation: they eliminate entire vulnerability categories (JavaScript engine exploits, sandbox escapes, external resource injection) independently of whether a specific CVE patch has landed.

Configuring these settings via Adobe’s ADMX templates imported into Intune provides a policy-managed, auditable mitigation layer that complements patch deployment rather than replacing it.34

Adobe FeatureLockDown settings as vendor mitigations for known PDF vulnerability classes:

Vulnerability class Corresponding Adobe vendor mitigation ADMX setting Value
JavaScript-based code execution (e.g., CVE-type: pdf-js) Disable the Acrobat JavaScript engine entirely Allow JavaScript (bEnableJS) 0
Parser sandbox escape Enforce Protected Mode (low-privilege sandbox process) Protected Mode (bProtectedMode) 1
Untrusted-document script execution Protected View for all files Protected View (iProtectedView) 2
UNC path / temp file traversal Enhanced Security standalone Enhanced Security standalone (bEnhancedSecurityStandalone) 1
In-browser PDF exploit bypass Enhanced Security browser mode Enhanced Security browser (bEnhancedSecurityInBrowser) 1
DNS rebinding / SSRF via embedded URL Block all hyperlink internet access Hyperlink Internet access (bDisableHyperlink) 1
Unmanaged feature additions between patches Disable in-app Adobe update mechanism Adobe Reader Product Updates Disabled

[!NOTE] These mitigations do not replace patching. They reduce the exploitability of yet-to-be-patched vulnerabilities by eliminating the attack primitives those vulnerabilities typically rely on. Under ISM-1901, both the patch (applied within two weeks) and the interim mitigation (applied immediately) are relevant controls.

Step 1 — Download and import the Adobe ADMX template into Intune:

  1. Download the ADMX template package from the Adobe Acrobat Enterprise Toolkit.
  2. In the Microsoft Intune admin center, navigate to Devices > Manage devices > Configuration > Import ADMX tab.
  3. Select Import, upload AcrobatReaderDC.admx (or AcrobatDC.admx for Acrobat Pro), then upload the matching AcrobatReaderDC.adml language file.
  4. Confirm the import status shows Available before creating a policy.3

[!NOTE] Reader DC writes policies to HKLM\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown. Acrobat Pro DC uses HKLM\SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown. Deploy the ADMX matching the installed product.

Step 2 — Create a vendor mitigation policy:

  1. Navigate to Devices > Manage devices > Configuration > + Create policy.
  2. Set Platform to Windows 10 and later and Profile type to Imported Administrative Templates (Preview).
  3. Name the profile (e.g., Adobe Acrobat DC — Vendor Mitigations) and configure each setting from the table above.
  4. Assign to all device groups that have Adobe Reader or Acrobat Pro deployed.3

Alternative: Direct registry OMA-URI for any setting not exposed in the ADMX UI:

Setting OMA-URI (Reader DC) Data type Value
Disable JavaScript ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bEnableJS Integer 0
Enable Protected Mode ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bProtectedMode Integer 1
Protected View — All files ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/iProtectedView Integer 2
Enhanced Security (standalone) ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bEnhancedSecurityStandalone Integer 1
Enhanced Security (browser) ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bEnhancedSecurityInBrowser Integer 1
Block hyperlink internet access ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bDisableHyperlink Integer 1

[!IMPORTANT] Replace Acrobat Reader/DC with Adobe Acrobat/DC in each path when targeting Acrobat Pro DC. Verify applied values on a test device under HKLM\SOFTWARE\Policies\Adobe\...\FeatureLockDown using Registry Editor.4

Apply vendor mitigations for the Edge built-in PDF viewer via Intune Settings Catalog

For organisations using Microsoft Edge as the primary PDF viewer, equivalent vendor mitigations are applied through Edge’s native ADMX policies in the Intune Settings Catalog — no template import required. These settings reduce the attack surface exposed by PDF-related vulnerabilities in Edge’s built-in viewer between Stable channel update cycles.

Edge PDF policy Vulnerability class mitigated Recommended value Settings Catalog path
PDFSecureMode Sandbox escape; unsigned content execution; cert forgery Enabled Microsoft Edge > PDF Reader > Secure mode
NewPDFReaderEnabled Adds Adobe Acrobat rendering engine sandbox layer Enabled Microsoft Edge > PDF Reader > New PDF reader
AlwaysOpenPdfExternally Keeps PDFs in sandboxed browser viewer rather than unmanaged external process Disabled Microsoft Edge > PDF Reader > Always open externally
PDFXFAEnabled Disables XFA (legacy forms attack surface rarely used in Australian Government) Disabled Microsoft Edge > PDF Reader > XFA support

To configure in Intune:

  1. Navigate to Devices > Manage devices > Configuration > + Create policy.
  2. Set Platform to Windows 10 and later and Profile type to Settings Catalog.
  3. In the settings picker, search Microsoft Edge and filter by PDF Reader.
  4. Add and configure each policy from the table above.
  5. Assign to the same device groups as your Edge baseline policy.5
HOME ← ISM-1900
ISM-1902 →