Skip to content
arrow_back
search
ISM-1601 policy ASD Information Security Manual (ISM)

Implement Microsoft Attack Surface Reduction Rules

Apply Microsoft's rules to reduce potential weaknesses in user applications.

record_voice_over

Plain language

This control is about applying Microsoft's security rules to make your computer systems safer. These rules help by closing off paths that hackers could use to attack your applications. If these paths aren't reduced, it makes it easier for hackers to break into your systems, steal information, or cause disruptions to your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Microsoft's attack surface reduction rules are implemented.
policy ASD Information Security Manual (ISM) ISM-1601
priority_high

Why it matters

Without Microsoft Attack Surface Reduction (ASR) rules, Windows endpoints are more exposed to commodity malware and ransomware via Office/macros and scripting.

settings

Operational notes

Manage ASR rules via Intune/GPO; review audit/block events in Defender, tune exclusions, and retest after Office or app updates.

Mapping detail

Mapping

Direction

Controls