Score each of the ACSC's eight strategies against your current reality. Pick a target Maturity Level. Get the Microsoft 365 tooling that closes the gap — Intune, Defender, Entra ID, Purview, the lot. Export to PDF for your next board pack.
Score each of the 8 strategies
Where are you on the Essential Eight — honestly?
Eight strategies. Four levels each. Pick the statement closest to your reality today. We'll map it to the Microsoft 365 tooling that closes the gap.
What's your target Maturity Level?
Maturity Level 2 — most orgs' pragmatic target
01
Application control
Only approved applications can execute on workstations and servers.
02
Patch applications
Internet-facing apps, browsers, Office, PDF readers patched promptly.
03
Microsoft Office macros
Macros disabled unless from trusted locations and signed by a trusted publisher.
04
User application hardening
Web browsers and productivity apps hardened against the most common attacks.
05
Restrict administrative privileges
Admin accounts limited, separated and reviewed — the crown jewels of the tenant.
06
Patch operating systems
Operating system patches applied on a schedule that matches the risk.
07
Multi-factor authentication
MFA everywhere that matters — privileged accounts, remote access, important data.
08
Regular backups
Backups of important data, configuration and software — and restores you have actually tested.