The table below illustrates how Endpoint Central's capabilities align with the maturity levels of the Essential Eight framework. Additionally, we have included the ISM Controls sourced directly from the ASD website. While the ASD clearly distinguishes ISM Controls and the Essential Eight as separate cybersecurity frameworks, it emphasizes that the Essential Eight serves as a baseline framework. This mapping aims to streamline and simplify the practical application of both frameworks.
This mapping outlines the requirements and controls that Endpoint Central fulfills. While most of the Essential Eight requirements can be addressed directly through Endpoint Central, certain needs, such as event logging, can be met using SIEM tools. Endpoint Central seamlessly integrates with popular SIEM tools like ManageEngine EventLog Analyzer, ManageEngine Log 360, Rapid7, Splunk, and others.
Mitigation Strategy |
Essential Eight Requirement |
ISM Control |
How Endpoint Central helps? |
Patch applications |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
ISM-1807 |
Endpoint Central uses its agents to fetch the complete details of the inventory present in your IT.
Endpoint Central's comprehensive patching solution helps you to achieve high patch compliance. |
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
ISM-1808 |
||
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services. |
ISM-1698 |
||
A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products. |
ISM-1699 |
||
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1876 |
||
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1690 |
||
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release. |
ISM-1691 |
||
Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed. |
ISM-1704 |
||
Patch operating systems |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
ISM-1807 |
Endpoint Central uses its agents to fetch the complete details of the inventory present in your IT.
Endpoint Central's comprehensive patching solution helps you to achieve high patch compliance. |
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
ISM-1808 |
||
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices. |
ISM-1701 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices. |
ISM-1702 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1877 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1694 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release. |
ISM-1695 |
||
Operating systems that are no longer supported by vendors are replaced. |
ISM-1501 |
||
Restrict administrative privileges |
Requests for privileged access to systems, applications and data repositories are validated when first requested. |
ISM-1507 |
In the case of blocklisted or greylisted applications, Endpoint Central can admins provide temporary, on-demand access to users. Hence the end-users requestes are validated |
Privileged users are assigned a dedicated privileged user account to be used solely for duties requiring privileged access. |
ISM-0445 |
||
Privileged user accounts (excluding those explicitly authorised to access online services) are prevented from accessing the internet, email and web services. |
ISM-1175 |
||
Privileged user accounts explicitly authorised to access online services are strictly limited to only what is required for users and services to undertake their duties. |
ISM-1883 |
||
Privileged users use separate privileged and unprivileged operating environments. |
ISM-1380 |
||
Unprivileged user accounts cannot logon to privileged operating environments. |
ISM-1688 |
||
Privileged user accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments. |
ISM-1689 |
||
Application control |
Application control is implemented on workstations. |
ISM-0843 |
Endpoint Central leverages the principle of least privilege and has a robust endpoint privilege management capability, providing for application specific privilege management and just-in-time access to the end users. |
Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients. |
ISM-1870 |
||
Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set. |
ISM-1657 |
||
Restrict Microsoft Office macros |
Microsoft Office macros are disabled for users that do not have a demonstrated business requirement. |
ISM-1671 |
Endpont Central leverages custom script configuration feature to ensure that macros are disabled for users who do not have business requirement. |
Microsoft Office macros in files originating from the internet are blocked. |
ISM-1488 |
||
Microsoft Office macro antivirus scanning is enabled. |
ISM-1672 |
||
Microsoft Office macro security settings cannot be changed by users. |
ISM-1489 |
||
User application hardening |
Internet Explorer 11 is disabled or removed. |
ISM-1654 |
Endpoint Central's Browser Restriction policy can enable admins restrict the end-users fro using Internet Explorer. |
Web browsers do not process Java from the internet. |
ISM-1486 |
||
Web browsers do not process web advertisements from the internet. |
ISM-1485 |
||
Web browser security settings cannot be changed by users. |
ISM-1585 |
||
Regular backups |
Backups of data, applications and settings are performed and retained in accordance with business criticality and business continuity requirements. |
ISM-1511 |
Endpoint Central also provides instant, non-erasable backup of the files in your network every three hours by leveraging Microsoft's volume shadow copy service. |
Backups of data, applications and settings are synchronised to enable restoration to a common point in time. |
ISM-1810 |
||
Backups of data, applications and settings are retained in a secure and resilient manner. |
ISM-1811 |
||
Restoration of data, applications and settings from backups to a common point in time is tested as part of disaster recovery exercises. |
ISM-1515 |
Mitigation Strategy |
Essential Eight Requirement |
ISM Control |
How Endpoint Central helps |
Patch applications |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
ISM-1807 |
Endpoint Central uses its agents to fetch the complete details of the inventory present in your IT. Endpoint Central integrates with Tenable for extensive vulnerability detection.
|
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
ISM-1808 |
||
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services. |
ISM-1698 |
||
A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products. |
ISM-1699 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products. |
ISM-1700 |
||
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1876 |
||
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1690 |
||
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release. |
ISM-1691 |
||
Patches, updates or other vendor mitigations for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within one month of release. |
ISM-1693 |
||
Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed. |
ISM-1704 |
||
Patch operating systems |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
ISM-1807 |
Endpoint Central uses its agents to fetch the complete details of the inventory present in your IT.
Endpoint Central's comprehensive patching solution helps you to achieve high patch compliance. Endpoint Central also provides a comprehensive view listing the computer hardware which are incompatible with Windows 11. |
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
ISM-1808 |
||
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices. |
ISM-1701 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices. |
ISM-1702 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1877 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1694 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release. |
ISM-1695 |
||
Operating systems that are no longer supported by vendors are replaced. |
ISM-1501 |
||
Multi-factor authentication |
Multi-factor authentication is used to authenticate privileged users of systems. |
ISM-1173 |
Endpoint Central helps in leveraging Windows' Hello for Windows devices. Admins can also configure Two- Factor authentication for Windows end- users. |
Restrict administrative privileges |
Requests for privileged access to systems, applications and data repositories are validated when first requested. |
ISM-1507 |
In the case of blocklisted or greylisted applications, Endpoint Central can admins provide temporary, on-demand access to users. Hence the end-users requestes are validated. |
Privileged access to systems, applications and data repositories is disabled after 12 months unless revalidated. |
ISM-1647 |
||
Privileged access to systems and applications is disabled after 45 days of inactivity. |
ISM-1648 |
||
Privileged users are assigned a dedicated privileged user account to be used solely for duties requiring privileged access. |
ISM-0445 |
||
Privileged user accounts (excluding those explicitly authorised to access online services) are prevented from accessing the internet, email and web services. |
ISM-1175 |
||
Privileged user accounts explicitly authorised to access online services are strictly limited to only what is required for users and services to undertake their duties. |
ISM-1883 |
||
Privileged users use separate privileged and unprivileged operating environments. |
ISM-1380 |
||
Privileged operating environments are not virtualised within unprivileged operating environments. |
ISM-1687 |
||
Unprivileged user accounts cannot logon to privileged operating environments. |
ISM-1688 |
||
Privileged user accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments. |
ISM-1689 |
||
Administrative activities are conducted through jump servers. |
ISM-1387 |
||
Application control |
Application control is implemented on workstations. |
ISM-0843 |
Endpoint Central leverages the principle of least privilege and has a robust endpoint privilege management capability, providing for application specific privilege management and just-in-time access to the end users. |
Application control is implemented on internet-facing servers. |
ISM-1490 |
||
Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients. |
ISM-1870 |
||
Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients. |
ISM-1871 |
||
Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set. |
ISM-1657 |
||
Microsoft’s recommended application blocklist is implemented. |
ISM-1544 |
||
Application control rulesets are validated on an annual or more frequent basis. |
ISM-1582 |
||
Restrict Microsoft Office macros |
Microsoft Office macros are disabled for users that do not have a demonstrated business requirement. |
ISM-1671 |
Endpont Central leverages custom script configuration feature to ensure that macros are disabled for users who do not have business requirement. |
Microsoft Office macros in files originating from the internet are blocked. |
ISM-1488 |
||
Microsoft Office macro antivirus scanning is enabled. |
ISM-1672 |
||
Microsoft Office macro security settings cannot be changed by users. |
ISM-1489 |
||
User application hardening |
Internet Explorer 11 is disabled or removed. |
ISM-1654 |
Endpoint Central's Browser Restriction policy can enable admins restrict the end-users fro using Internet Explorer. |
Web browsers do not process Java from the internet. |
ISM-1486 |
||
Web browsers do not process web advertisements from the internet. |
ISM-1485 |
||
Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur. |
ISM-1412 |
||
Web browser security settings cannot be changed by users. |
ISM-1585 |
||
Microsoft Office is blocked from creating child processes. |
ISM-1667 |
||
Microsoft Office is blocked from creating executable content. |
ISM-1668 |
||
Microsoft Office is blocked from injecting code into other processes. |
ISM-1669 |
||
Microsoft Office is configured to prevent activation of Object Linking and Embedding packages. |
ISM-1542 |
||
Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur. |
ISM-1859 |
||
Office productivity suite security settings cannot be changed by users. |
ISM-1823 |
||
PDF software is blocked from creating child processes. |
ISM-1670 |
||
PDF software is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur. |
ISM-1860 |
||
PDF software security settings cannot be changed by users. |
ISM-1824 |
||
Regular backups |
Backups of data, applications and settings are performed and retained in accordance with business criticality and business continuity requirements. |
ISM-1511 |
Endpoint Central also provides instant, non-erasable backup of the files in your network every three hours by leveraging Microsoft's volume shadow copy service. |
Backups of data, applications and settings are synchronised to enable restoration to a common point in time. |
ISM-1810 |
||
Backups of data, applications and settings are retained in a secure and resilient manner. |
ISM-1811 |
||
Restoration of data, applications and settings from backups to a common point in time is tested as part of disaster recovery exercises. |
ISM-1515 |
Mitigation Strategy |
Essential Eight Requirement |
ISM Control |
How Endpoint Central helps |
Patch applications |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
ISM-1807 |
Endpoint Central uses its agents to fetch the complete details of the inventory present in your IT.
Endpoint Central's comprehensive patching solution helps you to achieve high patch compliance. |
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
ISM-1808 |
||
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services. |
ISM-1698 |
||
A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products. |
ISM-1699 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products. |
ISM-1700 |
||
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1876 |
||
Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1690 |
||
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1692 |
||
Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1901 |
||
Patches, updates or other vendor mitigations for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within one month of release. |
ISM-1693 |
||
Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed. |
ISM-1704 |
||
Applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed. |
ISM-0304 |
||
Patch operating systems |
An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities. |
ISM-1807 |
Endpoint Central uses its agents to fetch the complete details of the inventory present in your IT.
Endpoint Central's comprehensive patching solution helps you to achieve high patch compliance. |
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities. |
ISM-1808 |
||
A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices. |
ISM-1701 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices. |
ISM-1702 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in drivers. |
ISM-1703 |
||
A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in firmware. |
ISM-1900 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1877 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1694 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1696 |
||
Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1902 |
||
Patches, updates or other vendor mitigations for vulnerabilities in drivers are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1879 |
||
Patches, updates or other vendor mitigations for vulnerabilities in drivers are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1697 |
||
Patches, updates or other vendor mitigations for vulnerabilities in firmware are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist. |
ISM-1903 |
||
Patches, updates or other vendor mitigations for vulnerabilities in firmware are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist. |
ISM-1904 |
||
The latest release, or the previous release, of operating systems are used. |
ISM-1407 |
||
Operating systems that are no longer supported by vendors are replaced. |
ISM-1501 |
||
Multi Factor Authentication |
Multi-factor authentication is used to authenticate privileged users of systems. |
ISM-1173 |
Endpoint Central helps in leveraging Windows' Hello for Windows devices. Admins can also configure Two- Factor authentication for Windows end- users. |
Restrict administrative privileges |
Requests for privileged access to systems, applications and data repositories are validated when first requested. |
ISM-1507 |
In the case of blocklisted or greylisted applications, Endpoint Central can admins provide temporary, on-demand access to users. Hence the end-users requestes are validated. |
Privileged access to systems, applications and data repositories is disabled after 12 months unless revalidated. |
ISM-1647 |
||
Privileged access to systems and applications is disabled after 45 days of inactivity. |
ISM-1648 |
||
Privileged users are assigned a dedicated privileged user account to be used solely for duties requiring privileged access. |
ISM-0445 |
||
Privileged access to systems, applications and data repositories is limited to only what is required for users and services to undertake their duties. |
ISM-1508 |
||
Privileged user accounts (excluding those explicitly authorised to access online services) are prevented from accessing the internet, email and web services. |
ISM-1175 |
||
Privileged user accounts explicitly authorised to access online services are strictly limited to only what is required for users and services to undertake their duties. |
ISM-1883 |
||
Secure Admin Workstations are used in the performance of administrative activities. |
ISM-1898 |
||
Privileged users use separate privileged and unprivileged operating environments. |
ISM-1380 |
||
Privileged operating environments are not virtualised within unprivileged operating environments. |
ISM-1687 |
||
Unprivileged user accounts cannot logon to privileged operating environments. |
ISM-1688 |
||
Privileged user accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments. |
ISM-1689 |
||
Just-in-time administration is used for administering systems and applications. |
ISM-1649 |
||
Administrative activities are conducted through jump servers. |
ISM-1387 |
||
Application control |
Application control is implemented on workstations. |
ISM-0843 |
Endpoint Central leverages the principle of least privilege and has a robust endpoint privilege management capability, providing for application specific privilege management and just-in-time access to the end users. |
Application control is implemented on internet-facing servers. |
ISM-1490 |
||
Application control is implemented on non-internet-facing servers. |
ISM-1656 |
||
Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients. |
ISM-1870 |
||
Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients. |
ISM-1871 |
||
Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set. |
ISM-1657 |
||
Application control restricts the execution of drivers to an organisation-approved set. |
ISM-1658 |
||
Microsoft’s recommended application blocklist is implemented. |
ISM-1544 |
||
Microsoft’s vulnerable driver blocklist is implemented. |
ISM-1659 |
||
Application control rulesets are validated on an annual or more frequent basis. |
ISM-1582 |
||
Restrict Microsoft Office macros |
Microsoft Office macros are disabled for users that do not have a demonstrated business requirement. |
ISM-1671 |
Endpont Central leverages custom script configuration feature to ensure that macros are disabled for users who do not have business requirement. |
Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute. |
ISM-1674 |
||
Microsoft Office macros are checked to ensure they are free of malicious code before being digitally signed or placed within Trusted Locations. |
ISM-1890 |
||
Only privileged users responsible for checking that Microsoft Office macros are free of malicious code can write to and modify content within Trusted Locations. |
ISM-1487 |
||
Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View. |
ISM-1675 |
||
Microsoft Office macros digitally signed by signatures other than V3 signatures cannot be enabled via the Message Bar or Backstage View. |
ISM-1891 |
||
Microsoft Office’s list of trusted publishers is validated on an annual or more frequent basis. |
ISM-1676 |
||
Microsoft Office macros in files originating from the internet are blocked. |
ISM-1488 |
||
Microsoft Office macro antivirus scanning is enabled. |
ISM-1672 |
||
Microsoft Office macros are blocked from making Win32 API calls. |
ISM-1673 |
||
Microsoft Office macro security settings cannot be changed by users. |
ISM-1489 |
||
User application hardening |
Internet Explorer 11 is disabled or removed. |
ISM-1654 |
Endpoint Central's Browser Restriction policy can enable admins restrict the end-users fro using Internet Explorer. |
Web browsers do not process Java from the internet. |
ISM-1486 |
||
Web browsers do not process web advertisements from the internet. |
ISM-1485 |
||
Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur. |
ISM-1412 |
||
Web browser security settings cannot be changed by users. |
ISM-1585 |
||
Microsoft Office is blocked from creating child processes. |
ISM-1667 |
||
Microsoft Office is blocked from creating executable content. |
ISM-1668 |
||
Microsoft Office is blocked from injecting code into other processes. |
ISM-1669 |
||
Microsoft Office is configured to prevent activation of Object Linking and Embedding packages. |
ISM-1542 |
||
Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur. |
ISM-1859 |
||
Office productivity suite security settings cannot be changed by users. |
ISM-1823 |
||
PDF software is blocked from creating child processes. |
ISM-1670 |
||
PDF software is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur. |
ISM-1860 |
||
PDF software security settings cannot be changed by users. |
ISM-1824 |
||
.NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed. |
ISM-1655 |
||
Windows PowerShell 2.0 is disabled or removed. |
ISM-1621 |
||
Regular backups |
Backups of data, applications and settings are performed and retained in accordance with business criticality and business continuity requirements. |
ISM-1511 |
Endpoint Central also provides instant, non-erasable backup of the files in your network every three hours by leveraging Microsoft's volume shadow copy service. |
Backups of data, applications and settings are synchronised to enable restoration to a common point in time. |
ISM-1810 |
||
Backups of data, applications and settings are retained in a secure and resilient manner. |
ISM-1811 |
||
Restoration of data, applications and settings from backups to a common point in time is tested as part of disaster recovery exercises. |
ISM-1515 |
Thank you for your feedback!
Sorry about that!