Skip to content
arrow_back
search
ISM-1871 policy ASD Information Security Manual (ISM)

Implement Application Control Exclusions for System Areas

Application control is set up to avoid certain system areas like user profiles and temporary folders.

record_voice_over

Plain language

This control means you need to set up your software so it doesn't check certain parts of your computer where your personal settings and temporary files are stored. It matters because if the software goes snooping in these areas, it could cause annoying problems like slowing down your computer or interfering with other programs. By keeping these areas off limits, you ensure your system runs smoothly and other important areas are securely monitored.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients.
policy ASD Information Security Manual (ISM) ISM-1871
priority_high

Why it matters

Without this control, application control may be bypassed by running code from user profiles or OS/browser/email temporary folders, increasing malware execution risk.

settings

Operational notes

Apply application control to system and program locations; only exclude user profiles and OS/browser/email client temporary folders, and review exclusions regularly.

Mapping detail

Mapping

Direction

Controls