What DefenderCore Includes
DefenderCore builds on DefenderBasic by hardening applications, email and privileged access while providing formal proof of Essential Eight Maturity Level 1 progress and Cyber Security Act readiness.
Application Allow Listing
Only software you’ve approved can run, blocking ransomware and unauthorised tools from executing
Email Phishing Defence
SPF, DKIM, DMARC and smart filtering keep spoofed or malicious messages out of inboxes
Privileged Access Control
Employees use standard accounts; separate, logged admin accounts are used only when needed
Geo-Restricted Sign-In
Conditional-access rules block log-ins from outside approved regions, shutting down common attack paths
Macro & Browser Hardening
Internet-sourced Office macros and legacy plug-ins (IE, Java, Flash) are disabled by policy
Essential Eight Report
Ready-to-share report records every control, giving auditors clear proof of Essential Eight progress