Skip to content
  • There are no suggestions because the search field is empty.

E8 Guide | Introduction

Use this guide to understand how to implement the ACSC Essential Eight mitigation strategies with Devicie. 

Next: Expected user impacts and FAQs

What is the Essential Eight?

The Essential Eight is is a set of 8 security strategies for Windows devices, recommended by the Australian Signals Directorate (ASD) as a cybersecurity baseline for all organisations. These strategies are designed to protect internet-connected IT networks and were most recently updated in November 2023 (learn more).

Unlike formal compliance frameworks such as CIS or NIST, the Essential Eight is more subjective. It consists of 152 controls spread across three maturity levels:
  • Maturity Level 1 (ML1)
  • Maturity Level 2 (ML2)
  • Maturity Level 3 (ML3)

At Devicie, we support the implementation of all controls relevant to endpoints—which account for approximately 60% of the total controls. These are deployed and managed via Microsoft Intune using Devicie’s pre-configured policy catalogue. For the remaining 40%, Devicie provides guidance and practical resources to support implementation.

How to use this guide

This guide is designed to step you through the process for implementing the Essential Eight endpoint controls with Devicie's proven configuration templates and testing recommendations. There are a series of articles designed to take you through the overall process as well as an article dedicated to each mitigation strategy and how our policies cover the controls for each. 

If you have any questions throughout the process of implementing the Essential Eight policies in your organisation, please feel free to raise a ticket with Customer Support.

To understand which controls are covered by Devicie:

For detailed information on each policy:

For detailed technical information on each policy, you can visit the Configuration Templates > Windows section of the Devicie knowledge base. You will also find embedded links to the relevant policies within the portal when you are using the policy deployment wizard

Essential Eight Guide Contents

Get Started

  • Introduction
  • Expected user impacts & FAQs
  • Using the Devicie E8 dashboard

Implementation Process

  • Setting up groups
  • Deploy policies
  • Testing guidelines
  • App control and macros

Mitigation Strategies

  1. Patch applications
  2. Regular backups
  3. Multi-factor authentication
  4. Application control
  5. Restrict administrative privileges
  6. User application hardening
  7. Patch operating systems
  8. Restrict Microsoft Office macros

 

Next: Expected user impacts and FAQs