# NCA Compliance - ManageEngine Endpoint Central ## Achieve Essential Eight Compliance with Endpoint Central The Essential Eight, introduced by the Australian Cyber Security Centre (ACSC) in 2017, serves as a fundamental cybersecurity framework within the broader Strategies to Mitigate Cyber Security Incidents. While it is mandatory for Australian government agencies, the Australian Signals Directorate (ASD)—part of the Ministry of Defence—strongly advocates its adoption across all organizations. By proactively implementing the Essential Eight, businesses can significantly reduce their exposure to cyber threats. The cost of prevention is far less than the financial and reputational damage caused by a major cybersecurity breach. ### The Essential Eight: 1. Patch Application 2. Patch Operating Systems 3. Multi-Factor Authentication (MFA) 4. Restrict Administrative Privileges 5. Application Control 6. Configure Microsoft Office Macro Settings 7. User application hardening 8. Regular Backups ### The Essential Eight Maturity Model: Your Cybersecurity Growth Roadmap The Essential Eight Maturity Model is designed to guide organizations in implementing Essential Eight controls in a phased manner. It focuses on Techniques, Tactics, and Procedures of the cybercriminals (TTPs) to address evolving cyber threats. Each maturity level reflects the organization's cybersecurity resilience, from basic defenses to advanced protections. The latest version of the Essential Eight Maturity Model, released in [November 2023](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-changes), offers updated insights into evolving cybersecurity practices. ### Why Endpoint Central is Your Ideal Partner for Essential Eight Compliance ### Robust Vulnerability assessment and patching capabilities Endpoint Central ensures seamless patching and vulnerability scanning across Windows, Linux, macOS, and Windows Server environments. Beyond endpoints, it detects vulnerabilities across network devices, strengthening the organization's overall security posture. Effective patch management is pivotal for Essential Eight compliance, closing the door on known exploits before they become entry points. ### Application Control: Security Meets Productivity Endpoint Central reduces attack surfaces by enabling application allow-listing and block-listing. It enables administrators to enforce the principle of least privilege, eliminate unnecessary local admin accounts, and provide Just-in-Time (JIT) access. This ensures that organizations strike the perfect balance between strong security and operational efficiency. ### Browser Security Elevated: Safeguard the Digital Gateway Endpoint Central's browser security capabilities allow organizations to restrict outdated browsers like Internet Explorer 11 while configuring modern browsers to mitigate browser-based threats and prevent data leaks. This enhances the organization's defense against malicious web-based attacks. We have created separate mappings for the [Essential Eight Maturity Model and Endpoint Central's features](https://www.manageengine.com/products/desktop-central/how-endpoint-central-helps-with-essential-eight.html), along with a dedicated [Essential Eight - ISM Mapping](https://www.manageengine.com/products/desktop-central/ism-essential-eight-maturity-mapping.html) provided by ASD. Together, these mappings offer a comprehensive guide for aligning Endpoint Central's capabilities with both frameworks, enabling organizations to strengthen their cybersecurity posture effectively. **Recommended reads/ links:** 1. [ISO compliance made easy with Endpoint Central](https://www.manageengine.com/products/desktop-central/iso-27001-compliance.html) 2. [Meeting PCI DSS requirements is no longer a challenge for financial institutions.](https://www.manageengine.com/products/desktop-central/pci-dss-compliance.html) ## Unified Endpoint Management and Security Solution ### Patch Management - [Patch Management Process](https://www.manageengine.com/products/desktop-central/patch-management.html) - [Windows Patch Management](https://www.manageengine.com/products/desktop-central/windows-patch-management.html) - [Mac Patch Management](https://www.manageengine.com/products/desktop-central/mac-patch-management.html) - [Linux Patch Management](https://www.manageengine.com/products/desktop-central/automate-linux-patch-management.html) - [Patch Deployment](https://www.manageengine.com/products/desktop-central/patch-deployment.html) - [Deploying Non-Microsoft Patches](https://www.manageengine.com/products/desktop-central/non-microsoft-patches.html) - [AntiVirus Update](https://www.manageengine.com/products/desktop-central/antivirus-updates.html) - [Third Party Patch Management](https://www.manageengine.com/products/desktop-central/non-microsoft-patches.html) - [Windows Updates](https://www.manageengine.com/products/desktop-central/windows-updates.html) - [Service Pack Deployment](https://www.manageengine.com/products/desktop-central/windows-service-pack-deployment.html) - [Patch Management Reports](https://www.manageengine.com/products/desktop-central/patch-management-reports.html) ### Software Deployment - [Software Repository](https://www.manageengine.com/products/desktop-central/software-repository.html) - [Software Installation](https://www.manageengine.com/products/desktop-central/software-deployment.html) - [Windows Software Deployment](https://www.manageengine.com/products/desktop-central/windows-software-installation.html) - [Mac Software Deployment](https://www.manageengine.com/products/desktop-central/mac-software-deployment.html) - [Self Service Portal](https://www.manageengine.com/products/desktop-central/self-service-portal-software.html) ### Endpoint Security - [Vulnerability management & Threat mitigation](https://www.manageengine.com/vulnerability-management/features.html?dc_end) - [Browser security](https://www.manageengine.com/browser-security/features.html?dc_end) - [Device control](https://www.manageengine.com/device-control/features.html?dc_end) - [Application control](https://www.manageengine.com/application-control/features.html?dc_end) - [BitLocker management](https://www.manageengine.com/products/desktop-central/bitlocker-management.html?dc_end) ### OS Deployment - [Advanced, Automated Deployment Methods](https://www.manageengine.com/products/os-deployer/os-deployment.html) - [Hardware Independent Deployment](https://www.manageengine.com/products/os-deployer/hardware-independent-deployment.html) - [Modern Disc Imagining](https://www.manageengine.com/products/os-deployer/disk-imaging.html) - [Windows 10 Migration](https://www.manageengine.com/products/desktop-central/deploy-windows-10-how-to.html) - [Remote OS Deployment](https://www.manageengine.com/products/os-deployer/deploy-os-anywhere.html) - [Customize OS Deployment](https://www.manageengine.com/products/os-deployer/customized-deployment-templates.html) ### Asset Management - [IT Asset Management process](https://www.manageengine.com/products/desktop-central/it-asset-management.html) - [Asset Tracking](https://www.manageengine.com/products/desktop-central/it-asset-tracking-software.html) - [Software Metering](https://www.manageengine.com/products/desktop-central/software-metering.html) - [Warranty Management](https://www.manageengine.com/products/desktop-central/software-warranty-management.html) - [Software License Compliance](https://www.manageengine.com/products/desktop-central/software-license-management.html) - [Prohibited Software](https://www.manageengine.com/products/desktop-central/prohibited-software.html) - [Block Application](https://www.manageengine.com/products/desktop-central/block-exe-application.html) - [Software Assets](https://www.manageengine.com/products/desktop-central/software-inventory.html) - [Hardware Assets](https://www.manageengine.com/products/desktop-central/hardware-inventory.html) ### Mobile Device Mgmt - [Mobile Device Management for iOS devices](https://www.manageengine.com/products/desktop-central/mobile-device-management-ios.html) - [Mobile Device Management for Android](https://www.manageengine.com/products/desktop-central/mobile-device-management-android.html) - [Mobile Device Management for Windows](https://www.manageengine.com/products/desktop-central/mobile-device-management-windows.html) - [Mobile Application Management (MAM)](https://www.manageengine.com/products/desktop-central/mobile-application-management-mam.html) - [Bring Your Own Device (BYOD)](https://www.manageengine.com/products/desktop-central/bring-your-own-device-byod.html) ### Tools & Configurations - [Remote Desktop Sharing](https://www.manageengine.com/products/desktop-central/remote-desktop-sharing.html) - [Shutdown & Wake On tool](https://www.manageengine.com/products/desktop-central/windows-system-tools.html#Wake-On-LAN) - [Chat Tool](https://www.manageengine.com/products/desktop-central/chat-tool.html) - [Check Disk & Clean Disk](https://www.manageengine.com/products/desktop-central/windows-system-tools.html#Check-Disk) - [Check Disk & Clean Disk](https://www.manageengine.com/products/desktop-central/disk-defragmenter.html) - [Custom Script](https://www.manageengine.com/products/desktop-central/custom-scripts.html) - [USB Device Mgmt](https://www.manageengine.com/products/desktop-central/control-usb-devices.html) - [Power Mgmt](https://www.manageengine.com/products/desktop-central/desktop-power-management.html)