Skip to content
IT Leader Company Logo
  • Services

    Overview

    Find every technology solution your organisation needs under one roof – with simplified, per-user pricing for all managed services.

    Learn More
    • IT Support
    • Managed Backup Solutions
    • Managed Firewall
    • Cloud
    • Cloud Migration
    • MS 365 Solutions
    • MS 365 Signature Management
    • MS 365 Migrations
    • Cyber Security
    • Cyber Security Audit
    • Cyber Awareness Training
    • Email Security
    • Endpoint Security
    • Essential Eight
    • UC / Voice
    • PBX
    • MS 365 Teams
    • Internet
    • NBN
    • IT Consulting
  • Industries

    Overview

    IT isn’t one-size-fits-all. Learn how our industry-specific expertise can help deliver the right outcomes for your organisation.

    Learn More
    • Manufacturing
    • Professional Services
    • Transportation
  • Resources
    • Blog
    • Knowledge Centre
  • About
    • About Us
    • Technical Capability Summary
    • Careers
  • Support
    • Support Options
    • Remote Support
    • New User Form
    • Exit User Form
  • Get In Touch
Get In Touch

Home - Cyber Security - How to Implement E8 ML1: Patch Applications

How to Implement E8 ML1: Patch Applications

  • Last Updated: 21 April 2026
ITL Logo Icon

Written By

IT Leaders

duncan-profile-image

Written By

Duncan Croker

Loading...
Loading...
lorelle-tonna-headshot_0003_IOnlineITLeadersHeadshots-17

Reviewed By

Stephen Burgess

Table of contents

Table of contents

The Essential Eight should be the foundation of your cyber security – necessary but not sufficient for a strong defensive posture. The first strategy in the group, ‘Patch applications’, focuses on keeping software up to date.

Here’s what you, an SMB leader, need to know if you’ve asked your IT provider to implement it.

This article is part of a series on implementing the Essential Eight to Maturity Level 1. Read other articles in the series here.

Automated Asset Discovery

Control: An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.

Your IT environment isn’t just the computers your staff work at. It’s a combination of hardware and software that includes networking gear, endpoints like laptops, servers, and even IoT devices.

Finding out exactly what assets you have can be a challenge. A typical SMB environment likely comprises hundreds – and that number can fluctuate quickly as your headcount and infrastructure change. Manual discovery is almost impossible, which is exactly why Maturity Level 1 specifies ‘automated method’. You need a tool that does the hard work for you.

Your IT provider will use a program like Lansweeper to find any asset connected to your network. That includes things like containers and virtual machines sitting in your cloud infrastructure. (And, if you’ve never heard of ‘containers’ or ‘VMs’ before, you probably don’t need to worry.) All those assets will show up in a dedicated inventory – which can then be scanned for vulnerabilities.

Make sure your IT provider uses an asset discovery program that can scan your whole network, not just parts of it. For example, some programs will only ‘see’ endpoints that have that program installed on it – they can’t find other network-connected devices (like smart fridges, for example).

Vulnerability Scanning

Controls:

A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.

A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services.

A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.

Discovering your assets is the first step. The next: regularly checking them for vulnerabilities.

A vulnerability is anything that an adversary can exploit to disrupt or access your environment. Think of it like a window that someone can slide open in an otherwise locked house. In the context of Maturity Level 1, those weaknesses are normally the result of bad code in an app you use – which then needs to be corrected with a ‘patch’ (a download that fixes the bad code).

Vulnerability scanners work by checking your asset inventory against a database of known vulnerabilities (normally either CVE or, in Europe, EUVD). If a vulnerability emerges that matches the version and patch level of an asset in your inventory, the scanner will flag it.

Your IT provider can then prioritise the resulting vulnerabilities based on their severity score (CVSS) and exploit status (whether the vulnerability has actually been used in real-world attacks). Keep in mind that, if you’ve never scanned your assets before, the list of weaknesses will probably be long. Successfully remediating them all may take weeks – especially if you’re dealing with legacy applications.

Patching and Updating

Controls:

Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.

Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 2 weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.

Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within 2 weeks of release.

Once you have a vulnerability scanner in place, meeting the Maturity Level 1 controls is easy – in theory. Your IT provider will have a clear list of weaknesses, prioritised by CVSS and exploit status. All they need to do is monitor their scanner for new patch or version releases, then roll out those updates via Microsoft Intune (or, better, an RMM like NinjaOne).

‘In theory’ is the operative phrase, though. If your team uses laptops, patches will need to be rolled out during working hours – which, with the 48-hour window for critical vulnerabilities and known exploits, can be tricky. The best thing you can do to help is communicate the criticality of the patch to all staff, and make sure they follow any directives from your IT provider.

Patches should also be deployed in rings. Start with a test environment, then move to a small group of assets, then the broader organisation. Updates can sometimes cause problems themselves – so testing the waters first is best practice.

Unsupported Product Removal

Controls:

Online services that are no longer supported by vendors are removed.

Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed.

An asset becomes unsupported when its developers stop providing updates and patches. Over time, that asset will become less and less usable, often conflicting with other, more modern software.

Internet Explorer is one of the most obvious examples. Microsoft stop supporting in 2022, and its lack of modern security features means it’s regularly targeted by threat actors. (Removing IE is actually a requirement for a separate Essential Eight control under the ‘User Application Hardening’ strategy.)

There’s almost never a good reason to keep internet-connected legacy software around. Switching to a newer version or removing the app entirely are both ways you can comply with Maturity Level 1.

If you think your organisation might be one of the very rare exceptions to the rule, talk to your IT provider about compensating controls. The Essential Eight assessment process does have scope for formal exceptions, particularly if the main objective of the control has still been accomplished (such as isolating legacy CNC software on a non-internet-connected endpoint).

Need help reaching Essential Eight Maturity Level 1? We help Australian SMBs strengthen their security postures – without affecting business productivity.

Book a free 60-minute consultation

Written by

Loading...

Written by

duncan-profile-image
duncan-profile-image

Duncan Croker

Content Strategist

Linkedin

Duncan Croker specialises in taking technical products and services to market. He has covered the IT space since 2021, focusing on cyber security and Teams telephony.

Linkedin

Reviewed by

Loading...
lorelle-tonna-headshot_0003_IOnlineITLeadersHeadshots-17
lorelle-tonna-headshot_0003_IOnlineITLeadersHeadshots-17

Stephen Burgess

Technical Project Lead

Linkedin

Stephen Burgess is IT Leaders’ chief problem-solver. He specialises in untangling complex challenges in client environments.

View profile
Linkedin

Related Articles

View All Posts
Loading...
Managed Services
laptop screen showing software updates

Windows 10 Countdown: Why It’s Time to Upgrade Your PC Today

Windows 10 has been a reliable companion, but its days are numbered. Come October 14, 2025, Microsoft will end support...
Managed Services
web-optimised-microsoft-header

Microsoft Server 2008 End of Support

Microsoft has been gradually phasing out its support of  Microsoft Server 2008 since 2015. However, 2020 will bring us perhaps...
Cyber Security
someone using a laptop looking at an email

Six Signs of Business Email Compromise to Watch For

Business email compromise (BEC) is the most common cyber threat to businesses. Here’s how to spot it.

Make the Switch

Talk to us to find out how changing IT providers could give your business the competitive edge it needs.
IT Leader Company Logo
  • service@itleaders.com.au
  • 1300 596 560
  • 07 5628 3260
  • 3/42 Lawrence Drive, Nerang QLD 4211
  • 8:30 am to 5 pm AEST, Monday to Friday
Linkedin-in Facebook-f

Services

  • Managed IT Services
  • Cloud Solutions and Infrastructure
  • Cyber Security and Compliance
  • Unified Communications and VoIP
  • Business Internet and Network Services
  • IT Consulting and Digital Transformation

Industries

  • Manufacturing
  • Professional Services
  • Transportation

Our Company

  • About Us
  • Technical Capability Summary
  • Careers
  • Contact Us

Resources

  • Blog
  • Knowledge Centre

Support

  • Remote Support
  • New User Form
  • Exit User Form
  • Support Options
  • © 2026 IT Leaders
  • Privacy Policy
  • Terms of Service
  • Terms of Use