Skip to content
arrow_back
search
E8-AC-ML2.5 bolt ASD Essential Eight

Allowed and blocked application control events are centrally logged

Ensure all application control events are logged in a central location for monitoring.

record_voice_over

Plain language

Imagine your computer as a secure building. This control acts like a guard keeping track of everyone allowed in or stopped at the door. By logging these events centrally, you can quickly spot if intruders are trying to get in or if something unusual is happening. Without this, dangerous software could sneak in unnoticed, putting your data and operations at risk.

Framework

ASD Essential Eight

Control effect

Detective

E8 mitigation strategy

Application control

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Allowed and blocked application control events are centrally logged.
bolt ASD Essential Eight E8-AC-ML2.5
priority_high

Why it matters

Without central logging of application control events, suspicious activity could go unnoticed, leaving the organisation vulnerable to stealthy cyber attacks.

settings

Operational notes

Configure application control to forward allowed/blocked events from all endpoints to a central log platform for alerting and investigation.

Mapping detail

Mapping

Direction

Controls