Microsoft Edge Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- EDGE-00-000001
- Vuln IDs
-
- EDGE-00-000001
- Rule IDs
-
- EDGE-00-000001_rule
Checks: C-EDGE-00-000001_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Proxy server/ProxyMode must be set to one of the following options: "direct", "auto_detect", "pac_script", "fixed_servers", "system". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for ProxyMode is not set to one of the above selections, this is a finding.
Fix: F-EDGE-00-000001_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Proxy server/ProxyMode must be set to "direct", "auto_detect", "pac_script", "fixed_servers", "system".
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- EDGE-00-000002
- Vuln IDs
-
- EDGE-00-000002
- Rule IDs
-
- EDGE-00-000002_rule
Checks: C-EDGE-00-000002_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/PreventSmartScreenPromptOverride must be set to "enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for PreventSmartScreenPromptOverride is not set to "enabled", this is a finding.
Fix: F-EDGE-00-000002_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/PreventSmartScreenPromptOverride to "enabled".
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- EDGE-00-000003
- Vuln IDs
-
- EDGE-00-000003
- Rule IDs
-
- EDGE-00-000003_rule
Checks: C-EDGE-00-000003_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/PreventSmartScreenPromptOverrideForFiles must be set to "enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for PreventSmartScreenPromptOverrideForFiles is not set to "enabled", this is a finding.
Fix: F-EDGE-00-000003_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/PreventSmartScreenPromptOverrideForFiles must to "enabled".
- RMF Control
- MA-3
- Severity
- L
- CCI
- CCI-000870
- Version
- EDGE-00-000004
- Vuln IDs
-
- EDGE-00-000004
- Rule IDs
-
- EDGE-00-000004_rule
Checks: C-EDGE-00-000004_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/SmartScreenAllowListDomains may be set to "allow" for whitelisted domains. Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. SmartScreenAllowListDomains may be set as follows: SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\1 = mydomain.com SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\2 = myagency.mil. Criteria: The value for SmartScreenAllowListDomains is not required; this is optional.
Fix: F-EDGE-00-000004_fix
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/SmartScreenAllowListDomains may be set to "allow" for whitelisted domains.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- EDGE-00-000005
- Vuln IDs
-
- EDGE-00-000005
- Rule IDs
-
- EDGE-00-000005_rule
Checks: C-EDGE-00-000005_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/InPrivateModeAvailability must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for InPrivateModeAvailability is not set to "REG_DWORD = 1", this is a finding.
Fix: F-EDGE-00-000005_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/InPrivateModeAvailability to "1".
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- EDGE-00-000033
- Vuln IDs
-
- EDGE-00-000033
- Rule IDs
-
- EDGE-00-000033_rule
Checks: C-EDGE-00-000033_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AllowDeletingBrowserHistory must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for AllowDeletingBrowserHistory is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000033_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AllowDeletingBrowserHistory to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000006
- Vuln IDs
-
- EDGE-00-000006
- Rule IDs
-
- EDGE-00-000006_rule
Checks: C-EDGE-00-000006_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/BackgroundModeEnabled must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for BackgroundModeEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000006_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/BackgroundModeEnabled to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000007
- Vuln IDs
-
- EDGE-00-000007
- Rule IDs
-
- EDGE-00-000007_rule
Checks: C-EDGE-00-000007_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultNotificationsSetting must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DefaultNotificationsSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000007_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultNotificationsSetting to "2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000008
- Vuln IDs
-
- EDGE-00-000008
- Rule IDs
-
- EDGE-00-000008_rule
Checks: C-EDGE-00-000008_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultPopupsSetting must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. riteria: If the value for DefaultPopupsSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000008_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultPopupsSetting to "2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000009
- Vuln IDs
-
- EDGE-00-000009
- Rule IDs
-
- EDGE-00-000009_rule
Checks: C-EDGE-00-000009_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ManagedSearchEngines must be configured. Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Example REG_SZ value text: SOFTWARE\Policies\Microsoft\Edge\ManagedSearchEngines = [ { "allow_search_engine_discovery": true }, { "is_default": true, "keyword": "example1.com", "name": "Example1", "search_url": "https://www.example1.com/search?q={searchTerms}", "suggest_url": "https://www.example1.com/qbox?query={searchTerms}" }, Criteria: If any of the search URLs in the list do not begin with "https", this is a finding.
Fix: F-EDGE-00-000009_fix
Configure the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ManagedSearchEngines.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000010
- Vuln IDs
-
- EDGE-00-000010
- Rule IDs
-
- EDGE-00-000010_rule
Checks: C-EDGE-00-000010_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SyncDisabled must be set to "enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for SyncDisabled is not set to "REG_DWORD = 1", this is a finding.
Fix: F-EDGE-00-000010_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SyncDisabled to "1".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000011
- Vuln IDs
-
- EDGE-00-000011
- Rule IDs
-
- EDGE-00-000011_rule
Checks: C-EDGE-00-000011_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/NetworkPredictionOptions must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for NetworkPredictionOptions is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000011_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/NetworkPredictionOptions to "2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000012
- Vuln IDs
-
- EDGE-00-000012
- Rule IDs
-
- EDGE-00-000012_rule
Checks: C-EDGE-00-000012_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SearchSuggestEnabled must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for SearchSuggestEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000012_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SearchSuggestEnabled to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000013
- Vuln IDs
-
- EDGE-00-000013
- Rule IDs
-
- EDGE-00-000013_rule
Checks: C-EDGE-00-000013_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportAutofillFormData must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportAutofillFormData is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000013_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportAutofillFormData to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000014
- Vuln IDs
-
- EDGE-00-000014
- Rule IDs
-
- EDGE-00-000014_rule
Checks: C-EDGE-00-000014_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportBrowserSettings must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportBrowserSettings is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000014_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportBrowserSettings to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000015
- Vuln IDs
-
- EDGE-00-000015
- Rule IDs
-
- EDGE-00-000015_rule
Checks: C-EDGE-00-000015_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportCookies must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportCookies is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000015_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportCookies to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000016
- Vuln IDs
-
- EDGE-00-000016
- Rule IDs
-
- EDGE-00-000016_rule
Checks: C-EDGE-00-000016_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportExtensions must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportExtensions is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000016_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportExtensions to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000017
- Vuln IDs
-
- EDGE-00-000017
- Rule IDs
-
- EDGE-00-000017_rule
Checks: C-EDGE-00-000017_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportHistory must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportHistory is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000017_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportHistory to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000018
- Vuln IDs
-
- EDGE-00-000018
- Rule IDs
-
- EDGE-00-000018_rule
Checks: C-EDGE-00-000018_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportHomepage must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportHomepage is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000018_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportHomepage to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000019
- Vuln IDs
-
- EDGE-00-000019
- Rule IDs
-
- EDGE-00-000019_rule
Checks: C-EDGE-00-000019_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportOpenTabs must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportOpenTabs is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000019_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportOpenTabs to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000020
- Vuln IDs
-
- EDGE-00-000020
- Rule IDs
-
- EDGE-00-000020_rule
Checks: C-EDGE-00-000020_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportPaymentInfo must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportPaymentInfo is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000020_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportPaymentInfo to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000021
- Vuln IDs
-
- EDGE-00-000021
- Rule IDs
-
- EDGE-00-000021_rule
Checks: C-EDGE-00-000021_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportSavedPasswords must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportSavedPasswords is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000021_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportSavedPasswords to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000022
- Vuln IDs
-
- EDGE-00-000022
- Rule IDs
-
- EDGE-00-000022_rule
Checks: C-EDGE-00-000022_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportSearchEngine must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportSearchEngine is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000022_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportSearchEngine to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000023
- Vuln IDs
-
- EDGE-00-000023
- Rule IDs
-
- EDGE-00-000023_rule
Checks: C-EDGE-00-000023_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportShortcuts must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge\Recommended. Criteria: If the value for ImportShortcuts is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000023_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/ImportShortcuts to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000024
- Vuln IDs
-
- EDGE-00-000024
- Rule IDs
-
- EDGE-00-000024_rule
Checks: C-EDGE-00-000024_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AutoplayAllowed must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for AutoplayAllowed is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000024_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AutoplayAllowed to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000025
- Vuln IDs
-
- EDGE-00-000025
- Rule IDs
-
- EDGE-00-000025_rule
Checks: C-EDGE-00-000025_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultWebUsbGuardSetting must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DefaultWebUsbGuardSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000025_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultWebUsbGuardSetting to "2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000026
- Vuln IDs
-
- EDGE-00-000026
- Rule IDs
-
- EDGE-00-000026_rule
Checks: C-EDGE-00-000026_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Cast/EnableMediaRouter must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for EnableMediaRouter is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000026_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Cast/EnableMediaRouter to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000027
- Vuln IDs
-
- EDGE-00-000027
- Rule IDs
-
- EDGE-00-000027_rule
Checks: C-EDGE-00-000027_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultWebBluetoothGuardSetting must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DefaultWebBluetoothGuardSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000027_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultWebBluetoothGuardSetting to "2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000028
- Vuln IDs
-
- EDGE-00-000028
- Rule IDs
-
- EDGE-00-000028_rule
Checks: C-EDGE-00-000028_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AutofillCreditCardEnabled must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for AutofillCreditCardEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000028_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AutofillCreditCardEnabled to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000029
- Vuln IDs
-
- EDGE-00-000029
- Rule IDs
-
- EDGE-00-000029_rule
Checks: C-EDGE-00-000029_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AutofillAddressEnabled must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for AutofillAddressEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000029_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/AutofillAddressEnabled to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000031
- Vuln IDs
-
- EDGE-00-000031
- Rule IDs
-
- EDGE-00-000031_rule
Checks: C-EDGE-00-000031_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/PersonalizationReportingEnabled must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for PersonalizationReportingEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000031_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/PersonalizationReportingEnabled to "0".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000032
- Vuln IDs
-
- EDGE-00-000032
- Rule IDs
-
- EDGE-00-000032_rule
Checks: C-EDGE-00-000032_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultGeolocationSetting must be set to "enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DefaultGeolocationSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000032_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultGeolocationSetting to "2".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000034
- Vuln IDs
-
- EDGE-00-000034
- Rule IDs
-
- EDGE-00-000034_rule
Checks: C-EDGE-00-000034_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/DeveloperToolsAvailability must be set to "DeveloperToolsDisallowed". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DeveloperToolsAvailability is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000034_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/DeveloperToolsAvailability to "2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000035
- Vuln IDs
-
- EDGE-00-000035
- Rule IDs
-
- EDGE-00-000035_rule
Checks: C-EDGE-00-000035_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultPluginsSetting must be set to "BlockPlugins". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DefaultPluginsSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000035_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/DefaultPluginsSetting to "2".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000036
- Vuln IDs
-
- EDGE-00-000036
- Rule IDs
-
- EDGE-00-000036_rule
Checks: C-EDGE-00-000036_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/DownloadRestrictions must be set to "BlockPotentiallyDangerousDownloads". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for DownloadRestrictions is not set to "REG_DWORD = 2", this is a finding.
Fix: F-EDGE-00-000036_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/DownloadRestrictions to "2".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- EDGE-00-000030
- Vuln IDs
-
- EDGE-00-000030
- Rule IDs
-
- EDGE-00-000030_rule
Checks: C-EDGE-00-000030_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/RequireOnlineRevocationChecksForLocalAnchors must be set to "enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for RequireOnlineRevocationChecksForLocalAnchors is not set to "REG_DWORD = 1", this is a finding.
Fix: F-EDGE-00-000030_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/RequireOnlineRevocationChecksForLocalAnchors to "1".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- EDGE-00-000039
- Vuln IDs
-
- EDGE-00-000039
- Rule IDs
-
- EDGE-00-000039_rule
Checks: C-EDGE-00-000039_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/PopupsAllowedForUrls must be set to allow for whitelisted URLs. Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge PopupsAllowedForUrls must be set as follows: SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\1 = mydomain.com SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\2 = myagency.mil Criteria: If the value for PopupsAllowedForUrls is not set, this is a finding. If no URLs in the agency require whitelisting for plugin use, this is not applicable.
Fix: F-EDGE-00-000039_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/PopupsAllowedForUrls to allow for whitelisted URLs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001767
- Version
- EDGE-00-000041
- Vuln IDs
-
- EDGE-00-000041
- Rule IDs
-
- EDGE-00-000041_rule
Checks: C-EDGE-00-000041_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/ExtensionInstallBlocklist must be set to block all extensions that are not explicitly listed in the allow list. Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for ExtensionInstallBlocklist is not set to "REG_SZ = *", this is a finding.
Fix: F-EDGE-00-000041_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/ExtensionInstallBlocklist/DownloadRestrictions to "*".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- EDGE-00-000042
- Vuln IDs
-
- EDGE-00-000042
- Rule IDs
-
- EDGE-00-000042_rule
Checks: C-EDGE-00-000042_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/ExtensionInstallAllowlist must be set to "allow" for whitelisted URLs. Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. ExtensionInstallAllowlist must be set as follows: SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\1 = "extension_id1" SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\2 = "extension_id2" Criteria: If the value for ExtensionInstallAllowlist is not set, this is a finding. If no Extensions in the agency require whitelisting for use, this is not applicable.
Fix: F-EDGE-00-000042_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/ExtensionInstallAllowlist to "allow" for whitelisted URLs.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- EDGE-00-000043
- Vuln IDs
-
- EDGE-00-000043
- Rule IDs
-
- EDGE-00-000043_rule
Checks: C-EDGE-00-000043_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Password manager and protection/PasswordManagerEnabled must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for PasswordManagerEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000043_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/Password manager and protection/PasswordManagerEnabled to "0".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- EDGE-00-000044
- Vuln IDs
-
- EDGE-00-000044
- Rule IDs
-
- EDGE-00-000044_rule
Checks: C-EDGE-00-000044_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SSLErrorOverrideAllowed must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for SSLErrorOverrideAllowed is not set to "REG_DWORD = 0", this is a finding.
Fix: F-EDGE-00-000044_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SSLErrorOverrideAllowed to "0".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- EDGE-00-000045
- Vuln IDs
-
- EDGE-00-000045
- Rule IDs
-
- EDGE-00-000045_rule
Checks: C-EDGE-00-000045_chk
Cross-reference the build information displayed with the Microsoft Edge site to identify, at minimum, the oldest supported build available. If the installed version of Edge is not supported by Microsoft, this is a finding.
Fix: F-EDGE-00-000045_fix
Install a supported version of Edge.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- EDGE-00-000046
- Vuln IDs
-
- EDGE-00-000046
- Rule IDs
-
- EDGE-00-000046_rule
Checks: C-EDGE-00-000046_chk
The policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SSLVersionMin must be set to "TLS 1.2". Procedure: Use the Windows Registry Editor to navigate to the following key: SOFTWARE\Policies\Microsoft\Edge. Criteria: If the value for SSLVersionMin is not set to "REG_SZ = tls1.2", this is a finding.
Fix: F-EDGE-00-000046_fix
Set the policy value for Computer Configuration/Administrative Templates/Microsoft Edge/SSLVersionMin to "tls1.2".