Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1902 |
| Revision | 0 |
| Updated | Dec-23 |
| Guideline | Not provided |
| Section | System patching |
| Topic | Mitigating known vulnerabilities |
| Essential Eight | ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Enforces a monthly cadence for applying non-critical operating system updates on Intune-enrolled workstations (Windows 10/11) and eligible Windows Server 2025 devices by deploying patches through Intune Windows AutoPatch, ensuring timely mitigation within one month of release when no exploits exist.12
[!NOTE] Windows Autopatch applies to Intune-enrolled Windows 10/11 Enterprise/Education workstations and Windows Server 2025 (Intune-managed) only. For non-internet-facing Windows Servers (2016/2019/2022), use WSUS + Group Policy (on-premises) or Azure Update Manager (Azure VMs / Arc-connected servers) to meet the one-month non-critical patching cadence. Network devices follow vendor-specific update procedures.
Non-internet-facing workstations, servers, and network devices present a lower immediate exploitation risk than internet-facing systems, but they remain critical targets for lateral movement once an attacker has established initial access. A one-month remediation window for non-critical vulnerabilities provides sufficient operational flexibility for organisations to test patches in lower environments (Test/First rings) and manage restart scheduling for business-critical systems.
Windows Autopatch’s four-ring deployment model (Test → First → Fast → Broad) was explicitly designed to spread patch risk across the device fleet while ensuring the Broad ring (representing the majority of devices) receives patches within the one-month window. The Broad ring default deadline of 21 days from release comfortably satisfies the one-month requirement.
Hotpatch (available for Windows 11 24H2+ and Windows Server 2025 on Intune-managed devices) enables kernel-level security patches to be applied without a device restart on eligible months, dramatically reducing the operational disruption of monthly patching for server workloads — removing the traditional barrier to timely patch application for non-internet-facing servers.
| Device category | Autopatch ring | Deferral | Effective patch date |
|---|---|---|---|
| Test VMs / pilot devices | Test ring | 0 days | Patch Tuesday + 1 day |
| IT staff devices | First ring | 1 day | Patch Tuesday + 2 days |
| Standard workstations | Fast ring | 6 days | Patch Tuesday + 7 days |
| PAW / service accounts | Broad ring | 9 days + 7d deadline | Patch Tuesday + ~21 days |
[!NOTE] Windows Server (2016/2019/2022) is not supported by Windows Autopatch. For these servers, configure equivalent patch deadline rings using WSUS Automatic Approval Rules (on-premises) or Azure Update Manager Maintenance Configurations (Azure/Arc). Target the same cadence: patch within 21–30 days of Patch Tuesday. Windows Server 2025 enrolled in Intune is eligible for Autopatch and Hotpatch — place these in the Broad ring or a dedicated server group.
For non-internet-facing network devices (routers, switches, firewalls) not managed by Intune, the one-month requirement is met through the organisation’s network device change management process, using vendor-specific update mechanisms and verified against Defender Vulnerability Management’s network device discovery inventory.
[!NOTE] The Intune Windows AutoPatch approach will be used to maintain a monthly patch cadence for non-critical OS updates on Intune-enrolled workstations (Windows 10/11 Enterprise/Education) and Windows Server 2025 devices enrolled in Intune.
For non-internet-facing Windows Servers (2016/2019/2022), apply non-critical OS patches within one month using one of the following tools:
- WSUS + Group Policy — configure an Automatic Approval Rule for Security/Critical update classifications with a deadline of 21 days
- Azure Update Manager — configure a Maintenance Configuration with a monthly schedule window and an end-time before the one-month deadline
For non-internet-facing network devices, apply vendor firmware updates within one month of release using the vendor-specific update process, verified against the Defender Vulnerability Management network device inventory.
[!NOTE] Turning on Hotpatch updates doesn’t change the existing deadline-driven or scheduled install configurations on your managed devices. Deferral and active hour settings still apply. See the referenced guidance for details.1
For on-premises domain-joined servers not eligible for Intune/Autopatch management, use WSUS with Group Policy to enforce a maximum 21-day install deadline:
Monthly Non-Critical — Servers.Computer Configuration → Administrative Templates → Windows Components → Windows Update:
4 – Auto download and schedule the installDisabled (allow forced restart for servers with no interactive sessions, or set a maintenance window).gpupdate /force on a test server to confirm policy application, then verify compliance in the WSUS reports view.IfRequired to allow restarts during the maintenance window.Hotpatch updates guide explains how to enroll devices and enable hotpatch deployment via Intune Windows Autopatch to maintain monthly update cadence Hotpatch updates
Deploy a hotpatch quality update using Windows Autopatch describes how to query the hotpatch catalog and deploy updates to devices Deploy a hotpatch quality update using Windows Autopatch
Essential Eight patch operating systems provides guidance on patch cadence and tooling for non-internet-facing systems including Intune and Azure Update Manager Essential Eight patch operating systems
Windows updates API overview describes how Windows Autopatch manages content approvals scheduling and safeguards for deployments Windows updates API overview
ASD Blueprint - Windows update and patching outlines design decisions for patching Windows endpoints in cloud and hybrid environments using Intune and related update rings ASD Blueprint - Windows update and patching
Azure Update Manager overview explains how to manage updates at scale for Azure VMs and Arc-enabled servers, including maintenance configurations and compliance reporting Azure Update Manager documentation
Configure Windows Server Update Services (WSUS) describes how to set up WSUS server synchronisation, automatic approval rules, and GPO-based deployment for domain-joined servers not managed by Intune Windows Server Update Services (WSUS)