News & Services
Unlocking Value: How Microsoft 365 Business Premium Powers Essential 8 Cybersecurity – Patch Applications

The Australian Cyber Security Centre’s (ACSC) Essential 8 framework is a set of cybersecurity mitigation strategies designed to help organizations protect themselves from cyber threats.  This is the first in a set of blog series that discusses how organizations licensed for Microsoft 365 Business Premium can leverage its suite of tools to meet these requirements effectively, and also discuss recommendations for solutions to fully meet Essential-8 requirements, that are also used as part of databl’s DISP and Essential 8-aligned Managed Service offerings.

To kick things off, the first section in the framework is Patch Applications, which emphasises timely updates and patch management for applications to mitigate vulnerabilities.

Patch Applications Requirements Under Essential 8

Key Controls:

  1. Automated Asset Discovery (ISM-1807): Regular identification of assets to ensure all applications are known and managed.
  2. Vulnerability Scanning (ISM-1808): Use an up-to-date vulnerability scanner for applications.
  3. Critical Vulnerabilities Patching (ISM-1876): Apply patches for critical vulnerabilities within 48 hours of release.
  4. Non-Critical Vulnerabilities Patching (ISM-1690): Apply patches for non-critical vulnerabilities within two weeks.
  5. Unsupported Applications Removal (ISM-1905): Remove applications no longer supported by vendors.
  6. Automated Validation of Patch Success (ISM-1809): Ensure that patches are deployed successfully.

Summary Table: E8 Controls Mapped to ISM Controls – Patch Applications

(Refer to the ISM Guidelines for detailed information.)

E8 Levels ISM Control Description
1, 2, 3 ISM-1807 An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.
1, 2, 3 ISM-1808 A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.
1, 2, 3 ISM-1698 A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services.
1, 2, 3 ISM-1699 A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.
1, 2, 3 ISM-1876 Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.
1, 2, 3 ISM-1690 Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.
1, 2, 3 ISM-1691 Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release.
1, 2, 3 ISM-1905 Online services that are no longer supported by vendors are removed.
1, 2, 3 ISM-1704 Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed.
2, 3 ISM-1906 Office productivity suites, web browsers and their extensions are configured to restrict non-secure protocols.
3 ISM-1907 Office productivity suites and web browsers validate digital signatures before executing code.
3 ISM-1809 Automated validation of patches ensures successful deployments within the environment.

How Microsoft 365 Business Premium Addresses These Controls

1. Automated Asset Discovery (ISM-1807)

Microsoft 365 Business Premium includes tools to help organizations maintain visibility into their assets:

2. Vulnerability Scanning (ISM-1808)

Microsoft 365 includes capabilities for identifying vulnerabilities across applications:

3. Critical Vulnerabilities Patching (ISM-1876)

Microsoft 365 enables fast-tracked deployment of critical patches:

4. Non-Critical Vulnerabilities Patching (ISM-1690)

For non-critical vulnerabilities, Microsoft 365 ensures compliance within the two-week timeframe:

5. Unsupported Applications Removal (ISM-1905)

To address unsupported applications:

6. Automated Validation of Patch Success (ISM-1809)

Ensuring patches are applied successfully is critical:

Addressing Gaps with Microsoft 365 Business Premium

While Microsoft 365 Business Premium provides robust capabilities for managing patch applications, there are certain gaps that organizations should address:

  1. Third-Party Applications:
    • Microsoft tools focus on patching Microsoft products. Non-Microsoft applications may require additional solutions (e.g., Qualys, Tenable, or ManageEngine).
    • Databl Recommendation: As a Tenable partner, Databl recommends leveraging Tenable.sc for comprehensive third party application scanning.
  2. Legacy Devices:
    • Unsupported operating systems (e.g., Windows 7) may not be fully managed by Microsoft 365.
    • Solution: Replace legacy systems or use supplemental tools like CrowdStrike EDR.
  3. Unmanaged Devices:
    • Devices not enrolled in Intune or Defender for Endpoint remain unaccounted for.
    • Solution: Implement Network Access Control (NAC) tools (e.g., Cisco ISE) or enforce Conditional Access to block non-compliant devices.
  4. IoT and OT Devices:
    • IoT and Operational Technology (OT) devices are often outside the scope of Microsoft 365 tools.
    • Solution: Use specialised solutions like Claroty or Nozomi Networks for IoT/OT visibility and patching.
  5. Browser Plugin Vulnerabilities:

    • Microsoft Defender for Business (included in Business Premium) does not detect vulnerabilities in browser extensions/plugins. Advanced vulnerability management, including browser plugin detection, requires an add-on like Microsoft Defender for Endpoint Plan 2.
    • Solution: Upgrade to Defender for Endpoint Plan 2 or use tools such as Tenable.io or Qualys VMDR for comprehensive scanning and detection.

     

  6. Network Vulnerability Scanning:
    • Microsoft 365 Business Premium does not include tools for scanning vulnerabilities in network assets (e.g., switches, routers, firewalls).
    • Solution: Deploy a dedicated network-based vulnerability scanner such as Tenable.sc, Qualys VMDR, or Rapid7 InsightVM to ensure network assets are also protected.
    • Databl Recommendation: As a Tenable partner, Databl recommends leveraging Tenable.sc for comprehensive network vulnerability scanning and compliance.
  7. Advanced Reporting:
    • Built-in reporting may not meet complex compliance requirements.
    • Solution: Use Power BI or Microsoft Sentinel for more advanced analytics and reporting.
    • Databl Recommendation: As a SIEM experts, specialising in both Microsoft Sentinel and Splunk, Databl recommends implementing a SIEM solution.

Maximizing Microsoft 365 Business Premium for Patch Applications

To fully leverage Microsoft 365 Business Premium for Essential 8 compliance:

  1. Enable Microsoft Intune: Use Intune to manage devices, enforce update policies, and track compliance.
  2. Adopt Microsoft Defender for Endpoint: Gain detailed insights into vulnerabilities and patching status.
  3. Leverage Windows Autopatch: Automate update deployment for Microsoft products.
  4. Integrate Third-Party Tools: Extend patch management to non-Microsoft applications and devices.
  5. Deploy Network Scanning Tools: Use Tenable.sc or other network-based scanners for comprehensive coverage.
  6. Use Conditional Access: Block access for devices that do not meet compliance standards.
  7. Implement Advanced Reporting: Use Power BI or Sentinel to monitor and validate patching activities.

Additional resources

https://blueprint.asd.gov.au/security-and-governance/essential-eight/patch-applications/

https://learn.microsoft.com/en-us/compliance/anz/e8-patch-app

Conclusion

Microsoft 365 Business Premium offers powerful tools to meet the Essential 8 requirements for patch applications. By leveraging its capabilities—and addressing potential gaps with supplementary solutions—organizations can create a comprehensive patch management strategy that protects against vulnerabilities and enhances their overall cybersecurity posture.

Are you ready to take your Essential 8 compliance to the next level? Reach out to learn more about how Microsoft 365 Business Premium can help secure your business.

SIMILAR ARTICLES