Knowledge Base Assessment Help

Assessment Help

Detailed guidance on using the assessment wizard, understanding compliance options, and getting the most out of your Essential Eight assessment.

The CyberSmart360 assessment wizard guides you through the Essential Eight framework one domain at a time — 8 steps total.

Step Indicator

A progress bar at the top shows which step you’re on (e.g., “Step 3 of 8: Configure Microsoft Office Macro Settings”).

Control Cards

Each control is shown as a card with:

  • Plain-language description tailored to your industry
  • “See technical description” to expand official ACSC wording
  • Compliance radio buttons — Yes / Partly / No / N/A
  • Notes field — expand and add context

Navigation

“Save & Continue →” moves forward, “← Previous” goes back. Progress is saved automatically.

Submitting

On the final step, click “Submit Assessment for Analysis.” Once submitted, responses cannot be edited.

For each control, choose one of four compliance statuses:

✅ Yes, We Do This (Compliant)

Fully implemented across all relevant systems and users.

⚠️ We Partly Do This (Partially Compliant)

Implemented for some systems or users, but not comprehensively.

❌ No (Non-Compliant)

Not implemented at all, or you’re unsure.

N/A (Not Applicable)

The control genuinely does not apply to your business (rare).

Tip: When in doubt, choose “Partly” rather than “Yes.” An honest assessment leads to a more useful remediation plan.

The Essential Eight is organised into 8 domains:

1. Application Control — Restricting which software can run on your computers.

2. Patch Applications — Keeping software (browsers, email, PDF readers) up to date.

3. Configure Microsoft Office Macro Settings — Controlling whether macros can run (common malware delivery method).

4. User Application Hardening — Disabling unnecessary features like Flash and Java.

5. Restrict Administrative Privileges — Limiting who has admin access.

6. Patch Operating Systems — Keeping Windows/macOS up to date.

7. Multi-Factor Authentication (MFA) — Requiring a second verification when logging in.

8. Regular Backups — Maintaining regular, tested backups. Your last line of defence against ransomware.

CyberSmart360 translates technical cybersecurity language into terms that make sense for your industry.

How It Works

Each control description is tailored to your industry. “Regular Backups” appears differently for accountants versus plumbers.

Technical Description Always Available

Click “See technical description” on any control card to see the official ACSC wording.

Changing Your Industry

Go to Settings → Organisation Details. Your next assessment will use the new translations. Previous assessments keep their original language.

CyberSmart360 automatically saves your progress as you work.

Auto-Save

Responses save every time you move fields or every 30 seconds. Status indicators: ✅ “All changes saved” / 🔄 “Saving…” / ⚠️ “Unsaved changes”

Resuming

Go to Dashboard → find your assessment (status “In Progress”) → click “Continue.”

Submitting

  1. Complete all 8 steps
  2. Click “Submit Assessment for Analysis”
  3. Confirm in the dialog

Important: Once submitted, an assessment cannot be edited. Start a new assessment to make changes. AI analysis typically takes a few minutes.

Can't Find What You Need?

Our support team is here to help. Email us at support@cybersmart360.com.au and we’ll get back to you within 24 hours (Standard subscribers) or 48 hours (Trial users).