Skip to content
arrow_back
search
ISM-1491 policy ASD Information Security Manual (ISM)

Prevent Script Execution by Unprivileged Users

Prevent users without admin rights from running scripts or commands that could pose security risks.

record_voice_over

Plain language

This control is about stopping regular users from running scripts or commands on their computers that could be harmful. Imagine a situation where an employee accidentally runs a malicious script that steals company data or locks files for ransom. By ensuring that only trusted staff can run these types of scripts, you reduce the chance of such security breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Unprivileged users are prevented from running script execution engines, including: - Windows Script Host (cscript.exe and wscript.exe) - PowerShell (powershell.exe, powershell_ise.exe and pwsh.exe) - Command Prompt (cmd.exe) - Windows Management Instrumentation (wmic.exe) - Microsoft Hypertext Markup Language (HTML) Application Host (mshta.exe).
policy ASD Information Security Manual (ISM) ISM-1491
priority_high

Why it matters

Allowing unprivileged users to run script execution engines could lead to accidental execution of harmful scripts, risking data breaches or ransomware attacks.

settings

Operational notes

Regularly audit and monitor use of script engines (PowerShell, cmd, WSH, wmic, mshta) and application control rules to ensure unprivileged users cannot bypass restrictions.

Mapping detail

Mapping

Direction

Controls