Skip to content
arrow_back
search
ISM-1544 policy ASD Information Security Manual (ISM)

Implement Microsoft's Application Blocklist

Organisations must use Microsoft's blocklist to stop unauthorised applications from running.

record_voice_over

Plain language

If your organisation doesn't use Microsoft's blocklist, unauthorised applications might run on your computers. These rogue apps could mess with your sensitive data or even let hackers into your system. By using the blocklist, you're essentially putting guardrails up, stopping anything you haven't explicitly approved from causing havoc.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Microsoft's recommended application blocklist is implemented.
policy ASD Information Security Manual (ISM) ISM-1544
priority_high

Why it matters

Without Microsoft’s recommended application blocklist, known malicious or unwanted apps may run on endpoints, increasing malware execution and unauthorised access risk.

settings

Operational notes

Regularly update Microsoft’s recommended blocklist and validate WDAC/AppLocker rules so newly identified malicious apps are blocked across all managed endpoints.

Mapping detail

Mapping

Direction

Controls