Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1901 |
| Revision | 1 |
| Updated | Jun-25 |
| Guideline | Not provided |
| Section | System patching |
| Topic | Mitigating known vulnerabilities |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
ISM-1901 addresses timely patching by applying vendor mitigations for vulnerabilities in operating systems, office productivity suites, web browsers, and security products within two weeks of release when vulnerabilities are non-critical and no working exploits exist.1
Implementation aligns with ASD Blueprint guidance, mandating patches within two weeks of release or within 48 hours if an exploit exists.2
Priority applications — office productivity suites, web browsers, email clients, PDF applications, and security products — have the highest exposure to document-based and browser-based initial access vectors. Non-critical vulnerabilities in these applications (CVSS Medium/High, no working exploit) still represent a meaningful risk: the gap between “no public exploit” and “working exploit” is often measured in days to weeks, particularly for widely-deployed software.
A two-week remediation window for non-critical vulnerabilities is calibrated to balance operational change management constraints with the observed exploitation timeline. Microsoft’s Autopatch deployment rings (Test → First → Fast → Broad) deliver patches progressively over 7–21 days for standard quality updates, which aligns with the two-week requirement when the Broad ring deadline is set to 14 days.
For third-party priority applications (Adobe Reader, 7-Zip, VLC, etc.), the Intune Enterprise App Catalogue provides direct Microsoft-managed packaging for common applications — removing the re-packaging overhead and accelerating the two-week remediation timeline. For bespoke applications, the Win32 Content Prep Tool (.intunewin) remains the standard deployment path.
| Application category | Two-week patching mechanism | Verification method |
|---|---|---|
| Microsoft 365 Apps | Intune Monthly Enterprise Channel | Defender VM software inventory |
| Microsoft Edge | Intune Edge update policy (Stable channel) | Defender VM browser CVE report |
| Adobe Reader/Acrobat | Enterprise App Catalogue or Win32 | Defender VM – software vulnerabilities |
| Windows Defender | Automatic intelligence updates | Defender VM – security product version |
| Third-party security products | Vendor update mechanism + Intune Win32 | Defender VM – software vulnerabilities |
[!NOTE] The Windows Autopatch will be configured and enabled for all workstations via the Intune admin portal. For third-party applications, new versions will be deployed via Intune Enterprise Application Catalogue, otherwise re-package and redeploy all applications that required security updates within the timeline required. For the Edge web browser configure all devices to “Target Channel” or “Stable”
Licensing: Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, or E5) for Windows Autopatch. Microsoft Intune Plan 1 for Intune-managed app deployment.1
Permissions/Roles: Intune administrator access to create and assign update ring policies and application deployments. Windows Autopatch Manager role for Autopatch configuration.2
Dependencies:
Register for Windows Autopatch in the Intune admin center (Tenant administration > Windows Autopatch). Complete the prerequisites check and activate the service for the tenant.2
Assign devices to the Windows Autopatch device registration group (Windows Autopatch Device Registration). Devices are automatically distributed across Test, First, Fast, and Broad deployment rings.2
Configure the Broad ring deadline to ensure all non-critical patches are installed within 14 days of release. In the Intune admin center, navigate to Windows updates > Update rings and verify the Quality update deferral for the Broad ring is set to 7 days with a deadline of 7 additional days (14 days total from release).1
For Microsoft 365 Apps, configure the update channel to Monthly Enterprise Channel via Intune Settings Catalog (Microsoft Office > Update channel = Monthly Enterprise Channel). This ensures priority application patches are available within 4 weeks of Patch Tuesday at most, meeting the two-week requirement for most releases.1
For Edge browser, configure the update policy in Intune Settings Catalog (Microsoft Edge Update > Update policy) to Always allow updates on the Stable channel. Verify via Defender Vulnerability Management that deployed Edge versions match the current stable release.1
For third-party priority applications (Adobe, security products): use the Intune Enterprise App Catalogue for supported apps, or package updates using the Win32 Content Prep Tool (.intunewin) and deploy as required applications with a deadline of 14 days from CVE publication date.1
Use Defender Vulnerability Management (Defender portal > Exposure management > Vulnerability management > Vulnerabilities) filtered by severity = Medium/High and component = priority apps to verify patch coverage fortnightly and confirm compliance with the two-week requirement.
The ISM-1901 requirement covers “patches, updates or other vendor mitigations” — meaning that when a patch has not yet been applied (e.g., is still progressing through deployment rings) configuration-based vendor mitigations can satisfy the intent for lower-severity vulnerabilities. Adobe’s FeatureLockDown security settings represent exactly this class of vendor mitigation: they eliminate entire vulnerability categories (JavaScript engine exploits, sandbox escapes, external resource injection) independently of whether a specific CVE patch has landed.
Configuring these settings via Adobe’s ADMX templates imported into Intune provides a policy-managed, auditable mitigation layer that complements patch deployment rather than replacing it.34
Adobe FeatureLockDown settings as vendor mitigations for known PDF vulnerability classes:
| Vulnerability class | Corresponding Adobe vendor mitigation | ADMX setting | Value |
|---|---|---|---|
| JavaScript-based code execution (e.g., CVE-type: pdf-js) | Disable the Acrobat JavaScript engine entirely | Allow JavaScript (bEnableJS) |
0 |
| Parser sandbox escape | Enforce Protected Mode (low-privilege sandbox process) | Protected Mode (bProtectedMode) |
1 |
| Untrusted-document script execution | Protected View for all files | Protected View (iProtectedView) |
2 |
| UNC path / temp file traversal | Enhanced Security standalone | Enhanced Security standalone (bEnhancedSecurityStandalone) |
1 |
| In-browser PDF exploit bypass | Enhanced Security browser mode | Enhanced Security browser (bEnhancedSecurityInBrowser) |
1 |
| DNS rebinding / SSRF via embedded URL | Block all hyperlink internet access | Hyperlink Internet access (bDisableHyperlink) |
1 |
| Unmanaged feature additions between patches | Disable in-app Adobe update mechanism | Adobe Reader Product Updates | Disabled |
[!NOTE] These mitigations do not replace patching. They reduce the exploitability of yet-to-be-patched vulnerabilities by eliminating the attack primitives those vulnerabilities typically rely on. Under ISM-1901, both the patch (applied within two weeks) and the interim mitigation (applied immediately) are relevant controls.
Step 1 — Download and import the Adobe ADMX template into Intune:
AcrobatReaderDC.admx (or AcrobatDC.admx for Acrobat Pro), then upload the matching AcrobatReaderDC.adml language file.[!NOTE] Reader DC writes policies to
HKLM\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown. Acrobat Pro DC usesHKLM\SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown. Deploy the ADMX matching the installed product.
Step 2 — Create a vendor mitigation policy:
Adobe Acrobat DC — Vendor Mitigations) and configure each setting from the table above.Alternative: Direct registry OMA-URI for any setting not exposed in the ADMX UI:
| Setting | OMA-URI (Reader DC) | Data type | Value |
|---|---|---|---|
| Disable JavaScript | ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bEnableJS |
Integer | 0 |
| Enable Protected Mode | ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bProtectedMode |
Integer | 1 |
| Protected View — All files | ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/iProtectedView |
Integer | 2 |
| Enhanced Security (standalone) | ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bEnhancedSecurityStandalone |
Integer | 1 |
| Enhanced Security (browser) | ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bEnhancedSecurityInBrowser |
Integer | 1 |
| Block hyperlink internet access | ./Device/Vendor/MSFT/Registry/HKLM/SOFTWARE/Policies/Adobe/Acrobat Reader/DC/FeatureLockDown/bDisableHyperlink |
Integer | 1 |
[!IMPORTANT] Replace
Acrobat Reader/DCwithAdobe Acrobat/DCin each path when targeting Acrobat Pro DC. Verify applied values on a test device underHKLM\SOFTWARE\Policies\Adobe\...\FeatureLockDownusing Registry Editor.4
For organisations using Microsoft Edge as the primary PDF viewer, equivalent vendor mitigations are applied through Edge’s native ADMX policies in the Intune Settings Catalog — no template import required. These settings reduce the attack surface exposed by PDF-related vulnerabilities in Edge’s built-in viewer between Stable channel update cycles.
| Edge PDF policy | Vulnerability class mitigated | Recommended value | Settings Catalog path |
|---|---|---|---|
PDFSecureMode |
Sandbox escape; unsigned content execution; cert forgery | Enabled | Microsoft Edge > PDF Reader > Secure mode |
NewPDFReaderEnabled |
Adds Adobe Acrobat rendering engine sandbox layer | Enabled | Microsoft Edge > PDF Reader > New PDF reader |
AlwaysOpenPdfExternally |
Keeps PDFs in sandboxed browser viewer rather than unmanaged external process | Disabled | Microsoft Edge > PDF Reader > Always open externally |
PDFXFAEnabled |
Disables XFA (legacy forms attack surface rarely used in Australian Government) | Disabled | Microsoft Edge > PDF Reader > XFA support |
To configure in Intune:
Essential Eight patch applications provides recommended patch cadences and deployment methods for vulnerabilities across Office, web browsers, and security products Essential Eight patch applications
Import custom ADMX templates in Microsoft Intune explains how to upload Adobe Acrobat ADMX and ADML files into Intune to create Imported Administrative Templates policies that apply vendor FeatureLockDown mitigations without requiring re-packaging Import custom ADMX templates
Adobe Acrobat Enterprise Toolkit (Group Policy and Registry Reference) provides the official ADMX templates and full registry key reference for all Acrobat DC and Reader DC FeatureLockDown settings representing Adobe’s vendor-recommended security mitigations Adobe Acrobat Enterprise Toolkit
PDFSecureMode, AlwaysOpenPdfExternally, NewPDFReaderEnabled, and PDFXFAEnabled — the Edge policies that apply vendor mitigations to the built-in PDF viewer via Settings Catalog Microsoft Edge PDF Reader policies