Microsoft Edge Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001414
- Version
- EDGE-00-000001
- Vuln IDs
-
- V-235719
- Rule IDs
-
- SV-235719r917469_rule
Checks: C-38938r862944_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Proxy server/Proxy Settings" must be set to one of the following options: "ProxyMode", "ProxyPacUrl", "ProxyServer", or "ProxyBypassList". If "ProxyMode" is used, one of the following must be set: "direct", "system", "auto_detect", "fixed_servers", or "pac_script". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the REG_SZ value for "ProxySettings" is not set to one of the above selections, this is a finding.
Fix: F-38901r917468_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Proxy server/Proxy Settings" to "ProxyMode", "ProxyPacUrl", "ProxyServer", or "ProxyBypassList". If "ProxyMode" is selected, one of the following must also be set: "direct", "system", "auto_detect", "fixed_servers", or "pac_script". Example policy text: SOFTWARE\Policies\Microsoft\Edge\ProxySettings = { "ProxyBypassList": "https://www.example1.com,https://www.example2.com,https://internalsite/", "ProxyMode": "pac_script", "ProxyPacMandatory": false, "ProxyPacUrl": "https://internal.site/example.pac", "ProxyServer": "123.123.123.123:8080" }
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- EDGE-00-000002
- Vuln IDs
-
- V-235720
- Rule IDs
-
- SV-235720r879550_rule
Checks: C-38939r766830_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverride" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable.
Fix: F-38902r766831_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" to "Enabled".
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- EDGE-00-000003
- Vuln IDs
-
- V-235721
- Rule IDs
-
- SV-235721r879550_rule
Checks: C-38940r766833_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverrideForFiles" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable.
Fix: F-38903r766834_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must to "Enabled".
- RMF Control
- MA-3
- Severity
- L
- CCI
- CCI-000870
- Version
- EDGE-00-000004
- Vuln IDs
-
- V-235722
- Rule IDs
-
- SV-235722r879550_rule
Checks: C-38941r863222_chk
If this machine is on SIPRNet, this is Not Applicable. This requirement for "SmartScreenAllowListDomains" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure the list of domains for which Microsoft Defender SmartScreen won't trigger warnings" may be set to "allow" for allowlisted domains. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge SmartScreenAllowListDomains may be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\1 = mydomain.com HKLM\SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\2 = myagency.mil If configured, the list of domains for which Microsoft Defender SmartScreen will not trigger warnings may be allowlisted.
Fix: F-38904r863223_fix
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure the list of domains for which Microsoft Defender SmartScreen will not trigger warnings" may be set to "allow" for allowlisted domains.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- EDGE-00-000005
- Vuln IDs
-
- V-235723
- Rule IDs
-
- SV-235723r879554_rule
Checks: C-38942r626365_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" must be set to "enabled" with the option value set to "InPrivate mode disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "InPrivateModeAvailability" is not set to "REG_DWORD = 1", this is a finding.
Fix: F-38905r626366_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" to "enabled" and select "InPrivate mode disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000006
- Vuln IDs
-
- V-235724
- Rule IDs
-
- SV-235724r879587_rule
Checks: C-38943r766836_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BackgroundModeEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38906r766837_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000008
- Vuln IDs
-
- V-235725
- Rule IDs
-
- SV-235725r879587_rule
Checks: C-38944r626371_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" must be set to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for DefaultPopupsSetting is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38907r626372_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" to "Enabled" with the option value set to "Do not allow any site to show pop-ups".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000009
- Vuln IDs
-
- V-235726
- Rule IDs
-
- SV-235726r879587_rule
Checks: C-38945r766839_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines" must be configured. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge Example REG_SZ value text for "ManagedSearchEngines": [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] If any of the search URLs in the list do not begin with "https", this is a finding.
Fix: F-38908r626375_fix
Configure the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000010
- Vuln IDs
-
- V-235727
- Rule IDs
-
- SV-235727r879587_rule
Checks: C-38946r766841_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Disable synchronization of data using Microsoft sync services" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SyncDisabled" is not set to "REG_DWORD = 1", this is a finding.
Fix: F-38909r766842_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Disable synchronization of data using Microsoft sync services" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000011
- Vuln IDs
-
- V-235728
- Rule IDs
-
- SV-235728r879587_rule
Checks: C-38947r766844_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" must be set to "Enabled" with the option value set to "Don't predict network actions on any network connection". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for NetworkPredictionOptions is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38910r626381_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" to "Enabled" with the option value set to "Don't predict network actions on any network connection".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000012
- Vuln IDs
-
- V-235729
- Rule IDs
-
- SV-235729r879587_rule
Checks: C-38948r766846_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SearchSuggestEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38911r766847_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000013
- Vuln IDs
-
- V-235730
- Rule IDs
-
- SV-235730r879587_rule
Checks: C-38949r626386_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportAutofillFormData" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38912r626387_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" to "disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000014
- Vuln IDs
-
- V-235731
- Rule IDs
-
- SV-235731r879587_rule
Checks: C-38950r626389_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browser settings" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportBrowserSettings" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38913r626390_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browser settings" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000015
- Vuln IDs
-
- V-235732
- Rule IDs
-
- SV-235732r879587_rule
Checks: C-38951r626392_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportCookies" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38914r626393_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000016
- Vuln IDs
-
- V-235733
- Rule IDs
-
- SV-235733r879587_rule
Checks: C-38952r626395_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportExtensions" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38915r626396_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000017
- Vuln IDs
-
- V-235734
- Rule IDs
-
- SV-235734r879587_rule
Checks: C-38953r626538_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browsing history" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportHistory" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38916r626539_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browsing history" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000018
- Vuln IDs
-
- V-235735
- Rule IDs
-
- SV-235735r879587_rule
Checks: C-38954r626401_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of home page settings" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportHomepage" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38917r626402_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of home page settings" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000019
- Vuln IDs
-
- V-235736
- Rule IDs
-
- SV-235736r879587_rule
Checks: C-38955r626404_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of open tabs" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportOpenTabs" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38918r626405_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of open tabs" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000020
- Vuln IDs
-
- V-235737
- Rule IDs
-
- SV-235737r879587_rule
Checks: C-38956r626407_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of payment info" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportPaymentInfo" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38919r626408_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of payment info" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000021
- Vuln IDs
-
- V-235738
- Rule IDs
-
- SV-235738r879587_rule
Checks: C-38957r626410_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of saved passwords" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportSavedPasswords" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38920r626411_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of saved passwords" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000022
- Vuln IDs
-
- V-235739
- Rule IDs
-
- SV-235739r879587_rule
Checks: C-38958r626413_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of search engine settings" must be set to "disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportSearchEngine" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38921r626414_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of search engine settings" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000023
- Vuln IDs
-
- V-235740
- Rule IDs
-
- SV-235740r879587_rule
Checks: C-38959r626416_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of shortcuts" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportShortcuts" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38922r626417_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of shortcuts" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000024
- Vuln IDs
-
- V-235741
- Rule IDs
-
- SV-235741r879587_rule
Checks: C-38960r626419_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow media autoplay for websites" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "AutoplayAllowed" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38923r626420_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow media autoplay for websites" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000025
- Vuln IDs
-
- V-235742
- Rule IDs
-
- SV-235742r879587_rule
Checks: C-38961r626422_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Control use of the WebUSB API" must be set to "enabled" with the option value set to "Do not allow any site to request access to USB devices via the WebUSB API". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DefaultWebUsbGuardSetting" is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38924r626423_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Control use of the WebUSB API" to enabled" and select "Do not allow any site to request access to USB devices via the WebUSB API".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000026
- Vuln IDs
-
- V-235743
- Rule IDs
-
- SV-235743r879587_rule
Checks: C-38962r626425_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Cast/Enable Google Cast" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "EnableMediaRouter" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38925r626426_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Cast/Enable Google Cast" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000027
- Vuln IDs
-
- V-235744
- Rule IDs
-
- SV-235744r879587_rule
Checks: C-38963r626428_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Control use of the Web Bluetooth API" must be set to "enabled" with the option value set to "Do not allow any site to request access to Bluetooth devices via the Web Bluetooth API". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DefaultWebBluetoothGuardSetting" is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38926r626521_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Control use of the Web Bluetooth API" to "enabled" with the option value set to "Do not allow any site to request access to Bluetooth devices via the Web Bluetooth API.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000028
- Vuln IDs
-
- V-235745
- Rule IDs
-
- SV-235745r879587_rule
Checks: C-38964r626431_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable AutoFill for credit cards" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "AutofillCreditCardEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38927r626432_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable AutoFill for credit cards" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000029
- Vuln IDs
-
- V-235746
- Rule IDs
-
- SV-235746r879587_rule
Checks: C-38965r626434_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable AutoFill for addresses" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "AutofillAddressEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38928r626435_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable AutoFill for addresses" to "disabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- EDGE-00-000030
- Vuln IDs
-
- V-235747
- Rule IDs
-
- SV-235747r879612_rule
Checks: C-38966r766849_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable online OCSP/CRL checks" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "EnableOnlineRevocationChecks" is not set to "REG_DWORD = 1", this is a finding.
Fix: F-38929r766850_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable online OCSP/CRL checks" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000031
- Vuln IDs
-
- V-235748
- Rule IDs
-
- SV-235748r879587_rule
Checks: C-38967r626440_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow personalization of ads, search and news by sending browsing history to Microsoft" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PersonalizationReportingEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38930r626441_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow personalization of ads, search and news by sending browsing history to Microsoft" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000032
- Vuln IDs
-
- V-235749
- Rule IDs
-
- SV-235749r879587_rule
Checks: C-38968r626443_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default geolocation setting" must be set to "enabled" with the option value set to "Don't allow any site to track users' physical location". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DefaultGeolocationSetting" is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38931r626444_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default geolocation setting" to "enabled" and select "Don't allow any site to track users' physical location".
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- EDGE-00-000033
- Vuln IDs
-
- V-235750
- Rule IDs
-
- SV-235750r879554_rule
Checks: C-38969r626446_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable deleting browser and download history" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "AllowDeletingBrowserHistory" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38932r626447_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable deleting browser and download history" to "disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000034
- Vuln IDs
-
- V-235751
- Rule IDs
-
- SV-235751r879587_rule
Checks: C-38970r626449_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used" with the option value set to "Don't allow using the developer tools". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DeveloperToolsAvailability" is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38933r626450_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used" to "enabled" and select "Don't allow using the developer tools".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000036
- Vuln IDs
-
- V-235752
- Rule IDs
-
- SV-235752r879587_rule
Checks: C-38971r862949_chk
If this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads" or "Block potentially dangerous or unwanted downloads". The more restrictive option, "Block all downloads" is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", or "REG_DWORD = 4", this is a finding.
Fix: F-38934r766853_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select "BlockDangerousDownloads" or "Block potentially dangerous or unwanted downloads".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- EDGE-00-000039
- Vuln IDs
-
- V-235753
- Rule IDs
-
- SV-235753r879751_rule
Checks: C-38972r862951_chk
This requirement for "Allow pop-up windows on specific sites" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Allow pop-up windows on specific sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge "PopupsAllowedForUrls" must be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\1 = mydomain.com HKLM\SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\2 = myagency.mil If configured, the list of domains for which Microsoft Edge allows pop-ups may be allowlisted.
Fix: F-38935r766856_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Allow pop-up windows on specific sites" to "Enabled". A list of allowlisted URLs may be specified here.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000041
- Vuln IDs
-
- V-235754
- Rule IDs
-
- SV-235754r879587_rule
Checks: C-38973r799954_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/Control which extensions cannot be installed" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallBlocklist\1 If the value for "1" is not set to "REG_SZ = *", this is a finding.
Fix: F-38936r766859_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/Control which extensions cannot be installed" to "Enabled". A list of blocklisted extensions may then be specified.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-001774
- Version
- EDGE-00-000042
- Vuln IDs
-
- V-235755
- Rule IDs
-
- SV-235755r879759_rule
Checks: C-38974r862953_chk
This requirement for "Allow specific extensions to be installed" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/Allow specific extensions to be installed" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge "ExtensionInstallAllowlist" must be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\1 = "extension_id1" HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\2 = "extension_id2" If configured, the list of extensions for which Microsoft Edge allows to be installed may be allowlisted.
Fix: F-38937r766862_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/Allow specific extensions to be installed" to "Enabled". A list of allowlisted extensions may then be specified.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- EDGE-00-000043
- Vuln IDs
-
- V-235756
- Rule IDs
-
- SV-235756r879773_rule
Checks: C-38975r626464_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Password manager and protection/Enable saving passwords to the password manager" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PasswordManagerEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38938r626465_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Password manager and protection/Enable saving passwords to the password manager" to "disabled".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- EDGE-00-000045
- Vuln IDs
-
- V-235758
- Rule IDs
-
- SV-235758r879827_rule
Checks: C-38977r626470_chk
Cross-reference the build information displayed with the Microsoft Edge site to identify, at minimum, the oldest supported build available. If the installed version of Edge is not supported by Microsoft, this is a finding.
Fix: F-38940r626471_fix
Install a supported version of Edge.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-001453
- Version
- EDGE-00-000046
- Vuln IDs
-
- V-235759
- Rule IDs
-
- SV-235759r879889_rule
Checks: C-38978r626473_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Minimum TLS version enabled" must be set to "TLS 1.2". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for SSLVersionMin is not set to "REG_SZ = tls1.2", this is a finding.
Fix: F-38941r626474_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Minimum TLS version enabled" to "TLS 1.2".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000047
- Vuln IDs
-
- V-235760
- Rule IDs
-
- SV-235760r879587_rule
Checks: C-38979r626476_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable site isolation for every site" must be set to "enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SitePerProcess" is not set to "REG_DWORD = 1", this is a finding.
Fix: F-38942r626477_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable site isolation for every site" to "enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- EDGE-00-000048
- Vuln IDs
-
- V-235761
- Rule IDs
-
- SV-235761r879588_rule
Checks: C-38980r766864_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/HTTP authentication/Supported authentication schemes" must be set to "ntlm,negotiate". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "AuthSchemes" is not set to "REG_SZ = ntlm,negotiate", this is a finding.
Fix: F-38943r626480_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/HTTP authentication/Supported authentication schemes" to "ntlm,negotiate".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000050
- Vuln IDs
-
- V-235763
- Rule IDs
-
- SV-235763r879587_rule
Checks: C-38982r766866_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SmartScreenEnabled" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable.
Fix: F-38945r766867_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000051
- Vuln IDs
-
- V-235764
- Rule IDs
-
- SV-235764r879587_rule
Checks: C-38983r766869_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen to block potentially unwanted apps" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for SmartScreenPuaEnabled is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable.
Fix: F-38946r766870_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen to block potentially unwanted apps" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000052
- Vuln IDs
-
- V-235765
- Rule IDs
-
- SV-235765r879587_rule
Checks: C-38984r626491_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Ask where to save downloaded files" must be set to "enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PromptForDownloadLocation" is not set to "REG_DWORD = 1", this is a finding.
Fix: F-38947r626492_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Ask where to save downloaded files" to "enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000388
- Version
- EDGE-00-000054
- Vuln IDs
-
- V-235766
- Rule IDs
-
- SV-235766r879589_rule
Checks: C-38985r766872_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Block tracking of users' web-browsing activity" must be set to "Enabled" with the option value set to "Balanced" or "Strict". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "TrackingPrevention" is not set to "REG_DWORD = 2" or "REG_DWORD = 3", this is a finding.
Fix: F-38948r766873_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Block tracking of users' web-browsing activity" to "Balanced" or "Strict".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000055
- Vuln IDs
-
- V-235767
- Rule IDs
-
- SV-235767r951014_rule
Checks: C-38986r626497_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow websites to query for available payment methods" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for PaymentMethodQueryEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38949r626498_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow websites to query for available payment methods" to "disabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- EDGE-00-000056
- Vuln IDs
-
- V-235768
- Rule IDs
-
- SV-235768r879592_rule
Checks: C-38987r766875_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Suggest similar pages when a webpage can't be found" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for AlternateErrorPagesEnabled is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38950r766876_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Suggest similar pages when a webpage can't be found" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000057
- Vuln IDs
-
- V-235769
- Rule IDs
-
- SV-235769r951015_rule
Checks: C-38988r626503_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow user feedback" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for UserFeedbackAllowed is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38951r626504_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow user feedback" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000058
- Vuln IDs
-
- V-235770
- Rule IDs
-
- SV-235770r879594_rule
Checks: C-38989r766878_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable the Collections feature" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "EdgeCollectionsEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38952r766879_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable the Collections feature" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000059
- Vuln IDs
-
- V-235771
- Rule IDs
-
- SV-235771r879587_rule
Checks: C-38990r626509_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure the Share experience" must be set to "enabled" with the option value set to "Don't allow using the Share experience". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ConfigureShare" is not set to "REG_DWORD = 1", this is a finding.
Fix: F-38953r626510_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure the Share experience" to "Don't allow using the Share experience".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000060
- Vuln IDs
-
- V-235772
- Rule IDs
-
- SV-235772r879587_rule
Checks: C-38991r626512_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable guest mode" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BrowserGuestModeEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38954r626513_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable guest mode" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000061
- Vuln IDs
-
- V-235773
- Rule IDs
-
- SV-235773r951016_rule
Checks: C-38992r766881_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Notify a user that a browser restart is recommended or required for pending updates" must be set to "Enabled" with the option value set to "Required". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "RelaunchNotification" is not set to "REG_DWORD = 2", this is a finding.
Fix: F-38955r626516_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Notify a user that a browser restart is recommended or required for pending updates" web-browsing activity to "Required".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- EDGE-00-000062
- Vuln IDs
-
- V-235774
- Rule IDs
-
- SV-235774r879598_rule
Checks: C-38993r626518_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Use built-in DNS client" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BuiltInDnsClientEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-38956r626519_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Use built-in DNS client" to "disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000063
- Vuln IDs
-
- V-246736
- Rule IDs
-
- SV-246736r879587_rule
Checks: C-50168r766827_chk
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow QUIC protocol" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "QuicAllowed" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-50122r766828_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow QUIC protocol" to "Disabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- EDGE-00-000064
- Vuln IDs
-
- V-251694
- Rule IDs
-
- SV-251694r879587_rule
Checks: C-55131r863220_chk
If this machine is on SIPRNet, this is Not Applicable. This requirement for "AutoplayAllowlist" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow media autoplay on specific sites" may be set to "allow" for allowlisted domains. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge AutoplayAllowlist may be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\AutoplayAllowlist\1 = mydomain.com HKLM\SOFTWARE\Policies\Microsoft\Edge\AutoplayAllowlist\2 = myagency.mil If configured, the list of domains for which autoplay is allowed may be allowlisted.
Fix: F-55085r808527_fix
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow media autoplay on specific sites" may be set to "allow" for allowlisted domains.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000065
- Vuln IDs
-
- V-260465
- Rule IDs
-
- SV-260465r951019_rule
Checks: C-64194r951017_chk
Verify the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Visual search enabled" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "VisualSearchEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-64102r951018_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Visual search enabled" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- EDGE-00-000066
- Vuln IDs
-
- V-260466
- Rule IDs
-
- SV-260466r951022_rule
Checks: C-64195r951020_chk
Verify the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Show Hubs Sidebar" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "HubsSidebarEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix: F-64103r951021_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Show Hubs Sidebar" to "Disabled".
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- EDGE-00-000067
- Vuln IDs
-
- V-260467
- Rule IDs
-
- SV-260467r951025_rule
Checks: C-64196r951023_chk
Verify the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Configure cookies" is set to "Enabled" with the option value set to "Keep cookies for the duration of the session, except ones listed in 'SaveCookiesOnExit'". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for “DefaultCookiesSetting” is not set to "REG_DWORD = 4", this is a finding.
Fix: F-64104r951024_fix
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Configure cookies" to "Enabled" with the option value set to "Keep cookies for the duration of the session, except ones listed in 'SaveCookiesOnExit'".