Discover your organisation's Essential 8 compliance level in 5 minutes. Answer 24 questions across the 8 mitigation strategies.
Do you have an application allowlist/whitelist implemented?
Are execution prevention rules configured for user profiles?
Is application control validated and audited regularly?
Are security updates for applications applied within 48 hours for extreme vulnerabilities?
Do you have an automated vulnerability scanning process?
Is there a documented patching policy with defined timeframes?
Are macros disabled for files from the internet?
Are macro security settings centrally managed via GPO/Intune?
Is there logging/monitoring of macro execution attempts?
Please answer all questions in this section to continue