CIS_Microsoft_Edge_Benchmark_v3.0.0
CIS_Microsoft_Edge_Benchmark_v3.0.0
CIS_Microsoft_Edge_Benchmark_v3.0.0
Benchmark
v3.0.0 - 07-19-2024
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
Page 1
Table of Contents
Terms of Use ................................................................................................................. 1
Table of Contents .......................................................................................................... 2
Overview ........................................................................................................................ 8
Intended Audience................................................................................................................. 8
Consensus Guidance ............................................................................................................ 9
Typographical Conventions .................................................................................................10
Recommendation Definitions ..................................................................................... 11
Title ........................................................................................................................................11
Assessment Status...............................................................................................................11
Automated ............................................................................................................................................ 11
Manual ................................................................................................................................................... 11
Profile ....................................................................................................................................11
Description ............................................................................................................................11
Rationale Statement .............................................................................................................11
Impact Statement ..................................................................................................................12
Audit Procedure ....................................................................................................................12
Remediation Procedure........................................................................................................12
Default Value .........................................................................................................................12
References ............................................................................................................................12
CIS Critical Security Controls® (CIS Controls®) ..................................................................12
Additional Information..........................................................................................................12
Profile Definitions .................................................................................................................13
Acknowledgements ..............................................................................................................14
Recommendations ...................................................................................................... 15
1 Microsoft Edge ...................................................................................................................15
1.1 Application Guard settings ........................................................................................................... 15
1.2 Cast ................................................................................................................................................. 15
1.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled' (Automated) ................................ 16
1.3 Content Settings ............................................................................................................................ 18
1.3.1 (L2) Ensure 'Allow read access via the File System API on these sites' is set to
'Disabled' (Automated) .............................................................................................................. 19
1.3.2 (L1) Ensure 'Control use of insecure content exceptions' is set to 'Enabled: Do not allow
any site to load mixed content' (Automated) ............................................................................. 21
1.3.3 (L2) Ensure 'Control use of JavaScript JIT' is set to 'Enabled: Do not allow any site to run
JavaScript JIT' (Automated) ...................................................................................................... 23
Page 2
1.3.4 (L2) Ensure 'Control use of the File System API for reading' is set to 'Enabled: Don't
allow any site to request read access to files and directories via the File System API'
(Automated) .............................................................................................................................. 25
1.3.5 (L1) Ensure 'Control use of the File System API for writing' is set to 'Enabled: Don't allow
any site to request write access to files and directories' (Automated) ...................................... 27
1.3.6 (L2) Ensure 'Control use of the Web Bluetooth API' is set to 'Enabled: Do not allow any
site to request access to Bluetooth devices via the Web Bluetooth API' (Automated)............. 29
1.3.7 (L2) Ensure 'Control use of the WebHID API' is set to 'Enabled: Do not allow any site to
request access to HID devices via the WebHID API' (Automated) .......................................... 31
1.3.8 (L1) Ensure 'Default automatic downloads setting' is set to 'Enabled: Don´t allow any
website to perform automatic downloads' (Automated) ............................................................ 33
1.3.9 (L1) Ensure 'Default geolocation setting' is set to 'Enabled: Don't allow any site to track
users' physical location' (Automated) ....................................................................................... 35
1.3.10 (L2) Ensure 'Default setting for third-party storage partitioning' is set to 'Enabled: Block
third-party storage partitioning from being enabled.' (Automated) ........................................... 37
1.4 Default search provider ................................................................................................................. 39
1.5 Edge Website Typo Protection settings ...................................................................................... 39
1.5.1 (L1) Ensure 'Configure Edge Website Typo Protection' is set to 'Enabled' (Automated) 40
1.6 Edge Workspaces settings ........................................................................................................... 42
1.7 Experimentation ............................................................................................................................. 42
1.7.1 (L1) Ensure 'Configure users ability to override feature flags' is set to 'Enabled: Prevent
users from overriding feature flags' (Automated) ...................................................................... 43
1.8 Extensions ...................................................................................................................................... 45
1.8.1 (L1) Ensure 'Blocks external extensions from being installed' is set to 'Enabled'
(Automated) .............................................................................................................................. 46
1.8.2 (L2) Ensure 'Configure extension management settings' is set to 'Enabled: *'
(Automated) .............................................................................................................................. 48
1.9 Games settings .............................................................................................................................. 50
1.9.1 Ensure 'Enable Gamer Mode' is set to 'Disabled' (Automated) ....................................... 51
1.10 HTTP authentication .................................................................................................................... 53
1.10.1 (L1) Ensure 'Allow Basic authentication for HTTP' is set to 'Disabled' (Automated) ..... 54
1.10.2 (L1) Ensure 'Allow cross-origin HTTP Authentication prompts' is set to 'Disabled'
(Automated) .............................................................................................................................. 56
1.10.3 (L2) Ensure 'Supported authentication schemes' is set to 'Enabled: ntlm, negotiate'
(Automated) .............................................................................................................................. 58
1.11 Identity and sign-in ...................................................................................................................... 60
1.11.1 (L1) Ensure 'Enable the linked account feature' is set to 'Disabled' (Automated) ......... 61
1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled' (Automated) ......................... 63
1.12 Immersive Reader settings ......................................................................................................... 65
1.13 Kiosk Mode settings .................................................................................................................... 65
1.14 Manageability ............................................................................................................................... 65
1.15 Native Messaging......................................................................................................................... 65
1.16 Network settings .......................................................................................................................... 65
1.17 Password manager and protection ............................................................................................ 65
1.17.1 (L1) Ensure 'Enable saving passwords to the password manager' is set to 'Disabled'
(Automated) .............................................................................................................................. 66
1.18 Performance ................................................................................................................................. 68
1.18.1 (L1) Ensure 'Enable startup boost' is set to 'Disabled' (Automated) .............................. 69
1.19 Permit or deny screen capture ................................................................................................... 71
1.20 Printing ......................................................................................................................................... 71
1.21 Private Network Request Settings ............................................................................................. 71
1.21.1 (L1) Ensure 'Specifies whether to allow websites to make requests to more-private
network endpoints' is set to 'Disabled' (Automated) ................................................................. 72
1.22 Proxy server ................................................................................................................................. 74
1.23 Related Website Sets Settings ................................................................................................... 74
1.24 Sleeping tabs settings ................................................................................................................. 74
Page 3
1.25 SmartScreen settings .................................................................................................................. 74
1.25.1 (L1) Ensure 'Configure Microsoft Defender SmartScreen' is set to 'Enabled'
(Automated) .............................................................................................................................. 75
1.25.2 (L1) Ensure 'Configure Microsoft Defender SmartScreen to block potentially unwanted
apps' is set to 'Enabled' (Automated) ....................................................................................... 77
1.25.3 (L1) Ensure 'Enable Microsoft Defender SmartScreen DNS requests' is set to 'Disabled'
(Automated) .............................................................................................................................. 79
1.25.4 (L1) Ensure 'Force Microsoft Defender SmartScreen checks on downloads from trusted
sources' is set to 'Enabled' (Automated) ................................................................................... 81
1.25.5 (L1) Ensure 'Prevent bypassing Microsoft Defender SmartScreen prompts for sites' is
set to 'Enabled' (Automated) ..................................................................................................... 83
1.25.6 (L1) Ensure 'Prevent bypassing of Microsoft Defender SmartScreen warnings about
downloads' is set to 'Enabled' (Automated) .............................................................................. 85
1.26 Startup, home page and new tab page ...................................................................................... 87
1.26.1 (L1) Ensure 'Disable Bing chat entry-points on Microsoft Edge Enterprise new tab page'
is set to 'Disabled' (Automated) ................................................................................................ 88
1.27 (L1) Ensure 'Ads setting for sites with intrusive ads' is set to 'Enabled: Block ads on sites
with intrusive ads.' (Automated) ................................................................................................ 90
1.28 (L1) Ensure 'Allow download restrictions' is set to 'Enabled: Block malicious downloads'
(Automated) .............................................................................................................................. 92
1.29 (L2) Ensure 'Allow features to download assets from the Asset Delivery Service' is set to
'Disabled' (Automated) .............................................................................................................. 94
1.30 (L2) Ensure 'Allow file selection dialogs' is set to 'Disabled' (Automated) ........................ 96
1.31 (L1) Ensure 'Allow Google Cast to connect to Cast devices on all IP addresses' is set to
'Disabled' (Automated) .............................................................................................................. 98
1.32 (L1) Ensure 'Allow import of data from other browsers on each Microsoft Edge launch' is
set to 'Disabled' (Automated) .................................................................................................. 100
1.33 (L1) Ensure 'Allow importing of autofill form data' is set to 'Disabled' (Automated)........ 102
1.34 (L1) Ensure 'Allow importing of browser settings' is set to 'Disabled' (Automated) ........ 104
1.35 (L1) Ensure 'Allow importing of home page settings' is set to 'Disabled' (Automated) ... 106
1.36 (L1) Ensure 'Allow importing of payment info' is set to 'Disabled' (Automated).............. 108
1.37 (L1) Ensure 'Allow importing of saved passwords' is set to 'Disabled' (Automated) ...... 110
1.38 (L1) Ensure 'Allow importing of search engine settings' is set to 'Disabled' (Automated)
................................................................................................................................................ 112
1.39 (L1) Ensure 'Allow managed extensions to use the Enterprise Hardware Platform API' is
set to 'Disabled' (Automated) .................................................................................................. 114
1.40 (L2) Ensure 'Allow or block audio capture' is set to 'Disabled' (Automated) ................... 116
1.41 (L2) Ensure 'Allow or block video capture' is set to 'Disabled' (Automated) ................... 118
1.42 (L2) Ensure 'Allow or deny screen capture' is set to 'Disabled' (Automated) ................. 120
1.43 (L1) Ensure 'Allow personalization of ads, Microsoft Edge, search, news and other
Microsoft services by sending browsing history, favorites and collections, usage and other
browsing data to Microsoft' is set to 'Disabled' (Automated) .................................................. 122
1.44 (L1) Ensure 'Allow queries to a Browser Network Time service' is set to 'Enabled'
(Automated) ............................................................................................................................ 124
1.45 (L1) Ensure 'Allow remote debugging' is set to 'Disabled' (Automated) ......................... 126
1.46 (L1) Ensure 'Allow the audio sandbox to run' is set to 'Enabled' (Automated) ............... 128
1.47 (L2) Ensure 'Allow unconfigured sites to be reloaded in Internet Explorer mode' is set to
'Disabled' (Automated) ............................................................................................................ 130
1.48 (L1) Ensure 'Allow user feedback' is set to 'Disabled' (Automated) ............................... 132
1.49 (L2) Ensure 'Allow users to open files using the ClickOnce protocol' is set to 'Disabled'
(Automated) ............................................................................................................................ 134
1.50 (L2) Ensure 'Allow users to open files using the DirectInvoke protocol' is set to 'Disabled'
(Automated) ............................................................................................................................ 136
1.51 (L2) Ensure 'Allow users to proceed from the HTTPS warning page' is set to 'Disabled'
(Automated) ............................................................................................................................ 138
Page 4
1.52 (L1) Ensure 'Allow websites to query for available payment methods' is set to 'Disabled'
(Automated) ............................................................................................................................ 140
1.53 (L2) Ensure 'AutoLaunch Protocols Component Enabled' is set to 'Disabled' (Automated)
................................................................................................................................................ 142
1.54 (L1) Ensure 'Automatically import another browser's data and settings at first run' is set to
'Enabled: Disables automatic import, and the import section of the first-run experience is
skipped' (Automated) .............................................................................................................. 144
1.55 (L1) Ensure 'Automatically open downloaded MHT or MHTML files from the web in
Internet Explorer mode' is set to 'Disabled' (Automated) ........................................................ 146
1.56 (L2) Ensure 'Block third party cookies' is set to 'Enabled' (Automated) ......................... 148
1.57 (L1) Ensure 'Block tracking of users' web-browsing activity' is set to 'Enabled: Balanced
(Blocks harmful trackers and trackers from sites user has not visited; content and ads will be
less personalized)' or higher (Automated) .............................................................................. 150
1.58 (L2) Ensure 'Browser sign-in settings' is set to 'Enabled: Disable browser sign-in'
(Automated) ............................................................................................................................ 152
1.59 (L1) Ensure 'Clear browsing data when Microsoft Edge closes' is set to 'Disabled'
(Automated) ............................................................................................................................ 154
1.60 (L1) Ensure 'Clear cached images and files when Microsoft Edge closes' is set to
'Disabled' (Automated) ............................................................................................................ 156
1.61 (L1) Ensure 'Clear history for IE and IE mode every time you exit' is set to 'Disabled'
(Automated) ............................................................................................................................ 158
1.62 (L1) Ensure 'Compose is enabled for writing on the web' is set to 'Disabled' (Automated)
................................................................................................................................................ 160
1.63 (L1) Ensure 'Configure browser process code integrity guard setting' is set to 'Enabled:
Enable code integrity guard enforcement in the browser process.' (Automated) ................... 162
1.64 (L1) Ensure 'Configure InPrivate mode availability' is set to 'Enabled: InPrivate mode
disabled' (Automated) ............................................................................................................. 164
1.65 (L2) Ensure 'Configure Online Text To Speech' is set to 'Disabled' (Automated) .......... 166
1.66 (L1) Ensure 'Configure Related Matches in Find on Page' is set to 'Disabled' (Automated)
................................................................................................................................................ 168
1.67 (L2) Ensure 'Configure Speech Recognition' is set to 'Disabled' (Automated) ............... 170
1.68 (L1) Ensure 'Configure the list of names that will bypass the HSTS policy check' is set to
'Disabled' (Automated) ............................................................................................................ 172
1.69 (L1) Ensure 'Configure the list of types that are excluded from synchronization' is set to
'Enabled' (Automated)............................................................................................................. 174
1.70 (L1) Ensure 'Configure the Share experience' is set to 'Enabled: Don't allow using the
Share experience' (Automated) .............................................................................................. 176
1.71 (L1) Ensure 'Configure whether form data and HTTP headers will be sent when entering
or exiting Internet Explorer mode' is set to 'Enabled: Do not send form data or headers'
(Automated) ............................................................................................................................ 178
1.72 (L1) Ensure 'Continue running background apps after Microsoft Edge closes' is set to
'Disabled' (Automated) ............................................................................................................ 180
1.73 (L1) Ensure 'Control communication with the Experimentation and Configuration Service'
is set to 'Enabled: Disable communication with the Experimentation and Configuration Service'
(Automated) ............................................................................................................................ 182
1.74 (L2) Ensure 'Control use of the Headless Mode' is set to 'Disabled' (Automated) ......... 184
1.75 (L2) Ensure 'Control use of the Serial API' is set to 'Enable: Do not allow any site to
request access to serial ports via the Serial API' (Automated) ............................................... 186
1.76 (L2) Ensure 'Control where security restrictions on insecure origins apply' is set to
'Disabled' (Automated) ............................................................................................................ 188
1.77 (L2) Ensure 'Default sensors setting' is set to 'Enabled: Do not allow any site to access
sensors' (Automated) .............................................................................................................. 190
1.78 (L1) Ensure 'Delete old browser data on migration' is set to 'Disabled' (Automated) ..... 192
1.79 (L1) Ensure 'Disable saving browser history' is set to 'Disabled' (Automated) ............... 194
1.80 (L1) Ensure 'Disable synchronization of data using Microsoft sync services' is set to
'Enabled' (Automated)............................................................................................................. 196
Page 5
1.81 (L1) Ensure 'DNS interception checks enabled' is set to 'Enabled' (Automated) ........... 198
1.82 (L1) Ensure 'Edge 3P SERP Telemetry Enabled' is set to 'Disabled' (Automated) ........ 200
1.83 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to 'Disabled' (Automated) .................. 202
1.84 (L1) Ensure 'Enable AutoFill for addresses' is set to 'Disabled' (Automated) ................. 204
1.85 (L1) Ensure 'Enable AutoFill for payment instructions' is set to 'Disabled' (Automated) 206
1.86 (L1) Ensure 'Enable browser legacy extension point blocking' is set to 'Enabled'
(Automated) ............................................................................................................................ 208
1.87 (L1) Ensure 'Enable component updates in Microsoft Edge' is set to 'Enabled'
(Automated) ............................................................................................................................ 210
1.88 (L1) Ensure 'Enable CryptoWallet feature' is set to 'Disabled' (Automated) ................... 212
1.89 (L1) Ensure 'Enable deleting browser and download history' is set to 'Disabled'
(Automated) ............................................................................................................................ 214
1.90 (L1) Ensure 'Enable Discover access to page contents for AAD profiles' is set to
'Disabled' (Automated) ............................................................................................................ 216
1.91 (L2) Ensure 'Enable Drop feature in Microsoft Edge' is set to 'Disabled' (Automated) .. 218
1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is set to 'Disabled' (Automated) 220
1.93 (L1) Ensure 'Enable globally scoped HTTP auth cache' is set to 'Disabled' (Automated)
................................................................................................................................................ 222
1.94 (L2) Ensure 'Enable guest mode' is set to 'Disabled' (Automated) ................................. 224
1.95 (L1) Ensure 'Enable network prediction' is set to 'Enabled: Don't predict network actions
on any network connection' (Automated) ............................................................................... 226
1.96 (L1) Ensure 'Enable profile creation from the Identity flyout menu or the Settings page' is
set to 'Disabled' (Automated) .................................................................................................. 228
1.97 (L1) Ensure 'Enable resolution of navigation errors using a web service' is set to
'Disabled' (Automated) ............................................................................................................ 230
1.98 (L2) Ensure 'Enable search suggestions' is set to 'Disabled' (Automated) .................... 232
1.99 (L1) Ensure 'Enable security warnings for command-line flags' is set to 'Enabled'
(Automated) ............................................................................................................................ 234
1.100 (L1) Ensure 'Enable site isolation for every site' is set to 'Enabled' (Automated) ......... 236
1.101 (L1) Ensure 'Enable tab organization suggestions' is set to 'Disabled' (Automated) ... 238
1.102 (L1) Ensure 'Enable the Search bar' is set to 'Disabled' (Automated) .......................... 240
1.103 (L2) Ensure 'Enable Translate' is set to 'Disabled' (Automated) .................................. 242
1.104 (L1) Ensure 'Enable upload files from mobile in Microsoft Edge desktop' is set to
'Disabled' (Automated) ............................................................................................................ 244
1.105 (L1) Ensure 'Enable use of ephemeral profiles' is set to 'Disabled' (Automated) ......... 246
1.106 (L1) Ensure 'Enable warnings for insecure forms' is set to 'Enabled' (Automated) ...... 248
1.107 (L1) Ensure 'Enables DALL-E themes generation' is set to 'Disabled' (Automated) .... 250
1.108 (L2) Ensure 'Enforce Bing SafeSearch' is set to 'Enabled: Configure moderate search
restrictions in Bing' (Automated) ............................................................................................. 252
1.109 (L2) Ensure 'Enforce Google SafeSearch' is set to 'Enabled' (Automated).................. 254
1.110 (L1) Ensure 'Enhance the security state in Microsoft Edge' is set to 'Enabled: Balanced
mode' or higher (Automated) .................................................................................................. 256
1.111 (L2) Ensure 'Enhanced Security Mode configuration for Intranet zone sites' is set to
'Disabled' (Automated) ............................................................................................................ 258
1.112 (L1) Ensure 'Hide the First-run experience and splash screen' is set to 'Enabled'
(Automated) ............................................................................................................................ 260
1.113 (L1) Ensure 'In-app support Enabled' is set to 'Disabled' (Automated) ........................ 262
1.114 (L2) Ensure 'Let users snip a Math problem and get the solution with a step-by-step
explanation in Microsoft Edge' is set to 'Disabled' (Automated) ............................................. 264
1.115 (L2) Ensure 'Live captions allowed' is set to 'Disabled' (Automated) ........................... 266
1.116 (L1) Ensure 'Manage exposure of local IP addresses by WebRTC' is set to 'Disabled'
(Automated) ............................................................................................................................ 268
1.117 (L1) Ensure 'Notify a user that a browser restart is recommended or required for
pending updates' is set to 'Enabled: Required - Show a recurring prompt to the user indicating
that a restart is required' (Automated) .................................................................................... 270
Page 6
1.118 (L1) Ensure 'Restrict exposure of local IP address by WebRTC' is set to 'Enabled: Allow
public interface over http default route. This doesn't expose the local IP address' (Automated)
................................................................................................................................................ 272
1.119 (L1) Ensure 'Set disk cache size, in bytes' is set to 'Enabled: 250609664' (Automated)
................................................................................................................................................ 274
1.120 (L1) Ensure 'Set the time period for update notifications' is set to 'Enabled: 86400000'
(Automated) ............................................................................................................................ 276
1.121 (L1) Ensure 'Shopping in Microsoft Edge Enabled' is set to 'Disabled' (Automated) ... 278
1.122 (L2) Ensure 'Show an "Always open" checkbox in external protocol dialog' is set to
'Disabled' (Automated) ............................................................................................................ 280
1.123 (L1) Ensure 'Show Microsoft Rewards experiences' is set to 'Disabled' (Automated) . 282
1.124 (L1) Ensure 'Show the Reload in Internet Explorer mode button in the toolbar' is set to
'Disabled' (Automated) ............................................................................................................ 284
1.125 (L1) Ensure 'Specifies whether SharedArrayBuffers can be used in a non cross-origin-
isolated context' is set to 'Disabled' (Automated) ................................................................... 286
1.126 (L2) Ensure 'Specify if online OCSP/CRL checks are required for local trust anchors' is
set to 'Enabled' (Automated) ................................................................................................... 288
1.127 (L2) Ensure 'Spell checking provided by Microsoft Editor' is set to 'Disabled'
(Automated) ............................................................................................................................ 290
1.128 (L1) Ensure 'Standalone Sidebar Enabled' is set to 'Disabled' (Automated) ................ 292
1.129 (L1) Ensure 'Suggest similar pages when a webpage can’t be found' is set to 'Disabled'
(Automated) ............................................................................................................................ 294
1.130 (L1) Ensure 'Suppress the unsupported OS warning' is set to 'Disabled' (Automated) 296
1.131 (L2) Ensure 'Tab Services enabled' is set to 'Disabled' (Automated) ........................... 298
1.132 (L2) Ensure 'Text prediction enabled by default' is set to 'Disabled' (Automated) ....... 300
1.133 (L1) Ensure 'Wait for Internet Explorer mode tabs to completely unload before ending
the browser session' is set to 'Disabled' (Automated) ............................................................ 302
1.134 (L1) Ensure 'Wallet Donation Enabled' is set to 'Disabled' (Automated) ...................... 304
1.135 (L2) Ensure 'Enable QR Code Generator' is set to 'Disabled' (Automated) ................. 306
2 Microsoft Edge - Default Settings (users can override) ................................................308
3 Microsoft Edge Update ....................................................................................................308
3.1 Applications ................................................................................................................................. 308
3.1.1 (L1) Ensure 'Update policy override default' is set to 'Enabled: Always allow updates
(recommended)' (Automated) ................................................................................................. 309
3.2 Microsoft Edge WebView2 Runtime ........................................................................................... 311
3.3 Preferences .................................................................................................................................. 311
3.3.1 (L1) Ensure 'Auto-update check period override' is set to any value except '0'
(Automated) ............................................................................................................................ 312
4 Microsoft Edge WebView2 ..............................................................................................314
Appendix: Summary Table ....................................................................................... 315
Appendix: Change History ....................................................................................... 329
Page 7
Overview
All CIS Benchmarks™ focus on technical configuration settings used to maintain and/or
increase the security of the addressed technology, and they should be used in
conjunction with other essential cyber hygiene tasks like:
• Monitoring the base operating system for vulnerabilities and quickly updating with
the latest security patches.
• Monitoring applications and libraries for vulnerabilities and quickly updating with
the latest security patches.
In the end, the CIS Benchmarks are designed as a key component of a comprehensive
cybersecurity program.
This document provides prescriptive guidance for establishing a secure configuration
posture for the Microsoft Edge Browser, also known as Microsoft Edge for Business.
This guide was tested against Microsoft Edge v125 on Windows 10 (Release 22H2)
operating system.
To obtain the latest version of this guide, please visit http://benchmarks.cisecurity.org. If
you have questions, comments, or have identified ways to improve this guide, please
write us at feedback@cisecurity.org.
Intended Audience
The CIS Microsoft Edge Benchmarks are written for Microsoft Windows Active Directory
domain-joined systems using Group Policy, not standalone/workgroup systems.
Adjustments/tailoring to some recommendations will be needed to maintain functionality
if attempting to implement CIS hardening on standalone systems.
Page 8
Consensus Guidance
This CIS Benchmark™ was created using a consensus review process comprised of a
global community of subject matter experts. The process combines real world
experience with data-based information to create technology specific guidance to assist
users to secure their environments. Consensus participants provide perspective from a
diverse set of backgrounds including consulting, software development, audit and
compliance, security research, operations, government, and legal.
Each CIS Benchmark undergoes two phases of consensus review. The first phase
occurs during initial Benchmark development. During this phase, subject matter experts
convene to discuss, create, and test working drafts of the Benchmark. This discussion
occurs until consensus has been reached on Benchmark recommendations. The
second phase begins after the Benchmark has been published. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the Benchmark. If you are interested in participating in the consensus
process, please visit https://workbench.cisecurity.org/.
Page 9
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Page 10
Recommendation Definitions
The following defines the various components included in a CIS recommendation as
applicable. If any of the components are not applicable it will be noted or the
component will not be included in the recommendation.
Title
Concise description for the recommendation's intended configuration.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual
steps to implement. Both statuses are equally important and are determined and
supported as defined below:
Automated
Represents recommendations for which assessment of a technical control can be fully
automated and validated to a pass/fail state. Recommendations will include the
necessary information to implement automation.
Manual
Represents recommendations for which assessment of a technical control cannot be
fully automated and requires all or some manual steps to validate that the configured
state is set as expected. The expected state can vary depending on the environment.
Profile
A collection of recommendations for securing a technology or a supporting platform.
Most benchmarks include at least a Level 1 and Level 2 Profile. Level 2 extends Level 1
recommendations and is not a standalone profile. The Profile Definitions section in the
benchmark provides the definitions as they pertain to the recommendations included for
the technology.
Description
Detailed information pertaining to the setting with which the recommendation is
concerned. In some cases, the description will include the recommended value.
Rationale Statement
Detailed reasoning for the recommendation to provide the user a clear and concise
understanding on the importance of the recommendation.
Page 11
Impact Statement
Any security, functionality, or operational consequences that can result from following
the recommendation.
Audit Procedure
Systematic instructions for determining if the target system complies with the
recommendation.
Remediation Procedure
Systematic instructions for applying recommendations to the target system to bring it
into compliance according to the recommendation.
Default Value
Default value for the given setting in this recommendation, if known. If not known, either
not configured or not defined will be applied.
References
Additional documentation relative to the recommendation.
Additional Information
Supplementary information that does not correspond to any other field but may be
useful to the user.
Page 12
Profile Definitions
The following configuration profiles are defined by this Benchmark:
This profile extends the "Level 1 (L1)" profile. Items in this profile exhibit one or
more of the following characteristics:
o are intended for environments or use cases where security is more critical
than manageability and usability;
o may negatively inhibit the utility or performance of the technology; and
o limit the ability of remote management/access.
Note: Implementation of Level 2 requires that both Level 1 and Level 2 settings
are applied.
Page 13
Acknowledgements
This Benchmark exemplifies the great things a community of users, vendors, and
subject matter experts can accomplish through consensus collaboration. The CIS
community thanks the entire consensus team with special recognition to the following
individuals who contributed greatly to the creation of this guide:
Editor
Jennifer Jarose
Matthew Woods
Contributor
Haemish Edgerton
Caleb Eifert
William Ferguson
Uzoma Ifeakanwa
Daniel Jasiak
Patrick Stoeckle
Page 14
Recommendations
1 Microsoft Edge
This section contains recommendations for Microsoft Edge.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
1.2 Cast
Page 15
1.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
(Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Cast\Enable Google Cast
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 16
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-policies#enable-
google-cast
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 17
1.3 Content Settings
Page 18
1.3.1 (L2) Ensure 'Allow read access via the File System API on
these sites' is set to 'Disabled' (Automated)
Profile Applicability:
Page 19
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge:FileSystemReadAskForUrls
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Allow read access via the File System API on these
sites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured. (´DefaultFileSystemReadGuardSetting´ (Control use of the File System
API for reading) applies for all sites, if it´s set. If not, users´ personal settings apply.)
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#filesystemreadaskforurls
2. https://web.dev/file-system-access/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 20
1.3.2 (L1) Ensure 'Control use of insecure content exceptions' is
set to 'Enabled: Do not allow any site to load mixed content'
(Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to load mixed content:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Content Settings\Control use of insecure content exceptions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 21
Default Value:
Enabled. (Users will be allowed to add exceptions to allow blockable mixed content and
disable autoupgrades for optionally blockable mixed content.)
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 22
1.3.3 (L2) Ensure 'Control use of JavaScript JIT' is set to
'Enabled: Do not allow any site to run JavaScript JIT' (Automated)
Profile Applicability:
Rationale:
Microsoft's research has revealed that attackers usually target the JavaScript engine
called “Just-In-Time (JIT) compilation” to hack web browsers. Disabling the JavaScript
just-in-time (JIT) compiler prevents attackers from hacking into systems that Microsoft
Edge uses.
Impact:
Disabling the JavaScript JIT will mean that Microsoft Edge may render web content
more slowly, and may also disable parts of JavaScript including WebAssembly. Users
may experience slower rendering of web content.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultJavaScriptJitSetting
Page 23
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to run JavaScript JIT:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content Settings\Control use of JavaScript JIT
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
References:
1. https://www.onmsft.com/news/microsoft-edges-super-duper-secure-mode-
addresses-javascript-vulnerabilities-in-a-brand-new-way
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 24
1.3.4 (L2) Ensure 'Control use of the File System API for reading'
is set to 'Enabled: Don't allow any site to request read access to
files and directories via the File System API' (Automated)
Profile Applicability:
Rationale:
There is a large category of attack vectors that are opened up by allowing web
applications access to files. By setting this policy to Enabled: Don't allow any site
to request read access to files and directories implements additional
protections to safeguard against accidental sharing of sensitive information contained in
locals files.
Impact:
Users with creative roles that require the File System API access permission to read
files for photo, video, and text editors or for creating integrated development
environments will need additional permissions granted based on their role.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultFileSystemReadGuardSetting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow any site to request read access to files and
directories via the File System API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the File System API for reading
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 25
Default Value:
AskFileSystemRead (3) = Allow sites to ask the user to grant read access to files and
directories via the File System API. (Websites can ask for access. Users can change
this setting.)
References:
1. https://docs.microsoft.com/en-us/microsoft-edge/progressive-web-apps-
chromium/how-to/handle-files
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 26
1.3.5 (L1) Ensure 'Control use of the File System API for writing'
is set to 'Enabled: Don't allow any site to request write access to
files and directories' (Automated)
Profile Applicability:
Rationale:
There is a large category of attack vectors that are opened up by allowing web
applications access to files. By setting this policy to Enabled: Don't allow any site
to request write access to files and directories implements additional
protection to safeguard against accidental sharing of sensitive information contained in
local files.
Impact:
Users with creative roles that require the File System API access permission to write
files for photo, video, and text editors or for creating integrated development
environments will need additional permissions granted based on their role.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge:DefaultFileSystemWriteGua
rdSetting
Page 27
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow any site to request write access to files and
directories:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the File System API for writing
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
AskFileSystemWrite (3) = Allow sites to ask the user to grant write access to files
and directories
References:
1. https://docs.microsoft.com/en-us/microsoft-edge/progressive-web-apps-
chromium/how-to/handle-files
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 28
1.3.6 (L2) Ensure 'Control use of the Web Bluetooth API' is set to
'Enabled: Do not allow any site to request access to Bluetooth
devices via the Web Bluetooth API' (Automated)
Profile Applicability:
Rationale:
Web Bluetooth could potentially be used for attacks that may bypass other controls
regarding connected Bluetooth hardware including microphones, cameras, and other
devices which information could be gathered from or inappropriately utilzed.
Impact:
Websites will be unable to utilize connected Bluetooth devices via the API, this includes
web cameras, microphones, and other USB devices.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultWebBluetoothGuardSetting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to request access to Bluetooth devices
via the Web Bluetooth API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the Web Bluetooth API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled - Users will be asked whether websites can access any Bluetooth device.
Users may change this setting.
Page 29
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#defaultwebbluetoothguardsetting
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 30
1.3.7 (L2) Ensure 'Control use of the WebHID API' is set to
'Enabled: Do not allow any site to request access to HID devices
via the WebHID API' (Automated)
Profile Applicability:
Rationale:
Disabling the WebHID API prevents HID peripherals from exposing powerful
functionality that should not be made accessible to the page without explicit consent.
For instance, a HID peripheral may have sensors that allow it to collect information
about its surroundings; a device may store private information that should not be
revealed or overwritten. Operating systems typically do not restrict access to HID
devices from applications, and this access can occasionally be abused to damage the
device or corrupt the data stored on it.
Impact:
WebHID describes a wide array of devices that could be supported through HID,
including virtual reality controls, flight simulators, medical equipment, and more.
Disabling WebHID would require additional drivers or modification to enable support for
approved devices.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultWebHidGuardSetting
Page 31
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to request access to HID devices via
the WebHID API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the WebHID API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Allow site to ask the user to grant access to a HID device.
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#defaultwebhidguardsetting
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 32
1.3.8 (L1) Ensure 'Default automatic downloads setting' is set to
'Enabled: Don´t allow any website to perform automatic
downloads' (Automated)
Profile Applicability:
Rationale:
Unintentional malicious content could be downloaded without user interaction if
websites are allowed to perform automatic downloads.
Impact:
Websites will not be able to perform automatic downloads.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultAutomaticDownloadsSetting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don´t allow any website to perform automatic downloads:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Default automatic downloads setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Multiple automatic downloads can be performed in all sites, and the user can
change this setting.)
Page 33
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#defaultautomaticDownloadsSetting
CIS Controls:
Page 34
1.3.9 (L1) Ensure 'Default geolocation setting' is set to 'Enabled:
Don't allow any site to track users' physical location' (Automated)
Profile Applicability:
Rationale:
Geolocation should not be shared with websites to ensure protection of the user's
privacy regarding location. Additionally, location information could lead to clues
regarding the user's network infrastructure surrounding the device they are utilizing.
Impact:
Location information will not be shared with websites in Microsoft Edge. This could have
an effect on websites that utilize this information for customized content.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultGeolocationSetting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow any site to track users' physical location:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Default geolocation setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Ask whenever a site wants to track users physical location.)
Page 35
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#defaultgeolocationsetting
CIS Controls:
Page 36
1.3.10 (L2) Ensure 'Default setting for third-party storage
partitioning' is set to 'Enabled: Block third-party storage
partitioning from being enabled.' (Automated)
Profile Applicability:
Rationale:
Third-party storage partitioning can prevent certain types of side-channel cross-site
tracking.
Impact:
This setting may cause users to experience issues with sites they regularly visit that
already grant access to third-parties.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultThirdPartyStoragePartitioningSet
ting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Block third-party storage partitioning from being enabled.:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Cast\Default setting for third-party storage partitioning
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 37
Default Value:
Enabled: Allow. (Third-party storage partitioning is on by default for some users starting
with Microsoft Edge version 115.)
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#defaultthirdpartystoragepartitioningsetting
CIS Controls:
Page 38
1.4 Default search provider
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section contains recommendations for Edge Website Typo Protection settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v96 Administrative Templates (or newer).
Note: In older versions of the ADMX/ADML templates, this section was named _
TyposquattingChecker settings_.
Page 39
1.5.1 (L1) Ensure 'Configure Edge Website Typo Protection' is set
to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Edge TyposquattingChecker will provide a warning message and can help protect users
from potential typo squatting by alerting the user to the potential of accessing a
malicious site.
Impact:
Users will receive a warning message if they attempt to access a site deemed (by
Microsoft) a typosquatting site.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TyposquattingCheckerEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Edge
Website Typo Protection settings\Configure Edge Website Typo Protection
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 40
Default Value:
Enabled. (Users can choose whether to use Edge TyposquattingChecker.)
References:
1. https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#typosquattingcheckerenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 41
1.6 Edge Workspaces settings
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v96 Administrative Templates (or newer).
1.7 Experimentation
Page 42
1.7.1 (L1) Ensure 'Configure users ability to override feature flags'
is set to 'Enabled: Prevent users from overriding feature flags'
(Automated)
Profile Applicability:
Rationale:
the user's ability to enter commands and to override programs should be limited at the
CLI in order to prevent users from altering systems configurations. Additionally, Feature
flags are not necessary for users, as they are used by the DevOps team during the
development and experimental process.
Impact:
It can be risky for experimental features to be allowed in an enterprise managed
environment because this can introduce bugs and security holes into systems, making it
easier for an attacker to gain access. It is generally preferred to only use production-
ready features.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:FeatureFlagoverridesControl
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Prevent users from overriding feature flags:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Experimentation\Configure users ability to override feature flags
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 43
Default Value:
Allow users to override feature flags.
References:
1. https://docs.microsoft.com/en-us/devops/operate/progressive-experimentation-
feature-flags
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 44
1.8 Extensions
Page 45
1.8.1 (L1) Ensure 'Blocks external extensions from being installed'
is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Allowing users to install extensions from other locations (not the Chrome Web Store)
can lead to malicious extensions being installed.
Impact:
User will only be allowed to install extension for the Chrome web store.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge:BlockExternalExtensions
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Extensions\Blocks external extensions from being installed
Default Value:
Disabled. (Users can change the setting.)
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#blockexternalextensions
Page 46
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 47
1.8.2 (L2) Ensure 'Configure extension management settings' is
set to 'Enabled: *' (Automated)
Profile Applicability:
Page 48
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of *.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ExtensionSettings
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: *:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Extensions\Configure extension management settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured.
References:
1. https://go.microsoft.com/fwlink/?linkid=2161555
Additional Information:
Note: For Windows instances not joined to a Microsoft Active Directory domain and
macOS instances not managed via MDM or joined to a domain via MCX, forced
installation is limited to apps and extensions listed in the Microsoft Edge Add-ons
website.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 49
1.9 Games settings
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v117 Administrative Templates (or newer).
Page 50
1.9.1 Ensure 'Enable Gamer Mode' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Allowing users the ability to use the gamer mode feature in Microsoft Edge could lead to
data leakage or intellectual property being exposed.
Impact:
The gamer mode feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:GamerModeEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Games
settings\Enable gamer mode in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the gamer mode feature in Microsoft Edge.)
Page 51
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#gamermodeenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 52
1.10 HTTP authentication
Page 53
1.10.1 (L1) Ensure 'Allow Basic authentication for HTTP' is set to
'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\HTTP
authentication\Allow Basic authentication for HTTP
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 54
Default Value:
Enabled. (Basic authentication challenges received over non-secure HTTP will be
allowed.)
References:
1. https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-
baseline-for-microsoft-edge-version-88/ba-
p/2094443#:~:text=A%20new%20Microsoft%20Edge%20security,from%20the%
20Security%20Compliance%20Toolkit.&text=HTTP%20Basic%20Authentication
%20is%20a,server%20in%20plaintext%20(base64).
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 55
1.10.2 (L1) Ensure 'Allow cross-origin HTTP Authentication
prompts' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
This setting is typically disabled to help combat phishing attempts.
Impact:
Disabling this setting should have minimal impact to the user as it is typically disabled
by default and third-party sub-content can't open a HTTP Basic Auth dialog box.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AllowCrossOriginAuthPrompt
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\HTTP
authentication\Allow cross-origin HTTP Authentication prompts
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#allowcrossoriginauthprompt
Page 56
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 57
1.10.3 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate' (Automated)
Profile Applicability:
Rationale:
Basic and Digest authentication do not provide sufficient security and can lead to
submission of user's password in plaintext or minimal protection (Integrated
Authentication is supported for negotiate and ntlm challenges only).
Impact:
Any sites that utilize Basic or Digest Authentication will be impacted. Sites will need to
be reconfigured to support a more secure form of authentication.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of ntlm, negotiate.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AuthSchemes
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: ntlm, negotiate:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\HTTP
authentication\Supported authentication schemes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The following schemes will be used: basic, digest, ntlm, and negotiate.)
Page 58
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#authschemes
2. https://www.chromium.org/developers/design-documents/http-authentication
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 59
1.11 Identity and sign-in
This section contains recommendations for Microsoft Edge Identity and sign-in Settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v93 Administrative Templates (or newer).
Page 60
1.11.1 (L1) Ensure 'Enable the linked account feature' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Linking personal Microsoft Accounts to a company device could inadvertently lead to
data being transferred from the environment to a personal device.
Impact:
Linked account information will not be shown on a flyout and when the Azure AD profile
doesn´t have a linked account it will not show the "Add account" button.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:LinkedAccountEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Identity and sign-in\Enable the linked account feature
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Linked account information will be shown on a flyout. When the Azure AD
profile doesn´t have a linked account, it will show "Add account")
Page 61
References:
1. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-
policies#linkedaccountenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 62
1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Linking personal Microsoft Accounts to a company device could inadvertently lead to
data being transferred from the environment to a personal device.
Impact:
Users won't be prompted to switch to another account when there´s a profile and link
mismatch.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:GuidedSwitchEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Identity and sign-in\Guided Switch Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Guided switch is turned on by default. A user can override this value in the
browser settings.)
Page 63
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#guidedswitchEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 64
1.12 Immersive Reader settings
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v110 Administrative Templates (or newer).
This section contains recommendations for Microsoft Edge Kiosk Mode settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v87 Administrative Templates (or newer).
1.14 Manageability
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section contains recommendations for Microsoft Edge Password manager and
protection settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
Page 65
1.17.1 (L1) Ensure 'Enable saving passwords to the password
manager' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Saving passwords in Edge could lead to a user's web passwords being breached if an
attacker were to gain access to their web browser especially in the case of an
unattended and unlocked workstation.
Impact:
Users will be unable to utilize the Microsoft Edge built-in password manager.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PasswordManagerEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Password manager and protection\Enable saving passwords to the password
manager
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change this setting.)
Page 66
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#passwordmanagerenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 67
1.18 Performance
Page 68
1.18.1 (L1) Ensure 'Enable startup boost' is set to 'Disabled'
(Automated)
Profile Applicability:
Page 69
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Performance\Enable startup boost
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured. (Start boost may initially be off or on.)
References:
1. https://support.microsoft.com/en-us/topic/get-help-with-startup-boost-ebef73ed-
5c72-462f-8726-512782c5e442
2. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#startupboostenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 70
1.19 Permit or deny screen capture
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v97 Administrative Templates (or newer).
1.20 Printing
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section contains recommendations for Microsoft Edge Private Network Request
Settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v92 Administrative Templates (or newer).
Page 71
1.21.1 (L1) Ensure 'Specifies whether to allow websites to make
requests to more-private network endpoints' is set to 'Disabled'
(Automated)
Profile Applicability:
In the future, depending on spec evolution, this policy might apply to all cross-origin
requests directed at private IPs or localhost.
A website is deemed secure if it meets the definition of a secure context in
https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts. Otherwise, it
will be treated as an insecure context.
The recommended state for this setting is: Disabled.
Note: This policy relates to the Private Network Access specification. See
https://wicg.github.io/private-network-access/ for more details.
Note #2: If this policy is not configured or set to Disabled, the default behavior for
requests from insecure contexts to more-private network endpoints will depend on the
user´s personal configuration for the BlockInsecurePrivateNetworkRequests feature,
which may be set by a field trial or on the command line.
Rationale:
Allowing public internet sites to “peek” behind your firewall by using the user’s browser
to mix intranet resources into internet-delivered pages represents a dangerous attack
surface. The baseline requires enforcement of the new browser restriction that any such
intranet requests are blocked if the internet page was delivered over insecure HTTP.
Note: If for some reason you need to permit insecure cross-network requests for legacy
sites, you can configure temporary exceptions in Allow the listed sites to make requests
to more-private network endpoints from insecure contexts.
Page 72
Impact:
Users will be unable to allow non-secure public contexts to request resources from
private addresses.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InsecurePrivateNetworkRequestsAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Private Network Request Settings\Specifies whether to allow websites to
make requests to more-private network endpoints
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured. (The default behavior for requests from insecure contexts to more-
private network endpoints will depend on the user's personal configuration for the
BlockInsecurePrivateNetworkRequests feature.)
References:
1. https://wicg.github.io/private-network-access/
2. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#insecureprivatenetworkrequestsallowed
CIS Controls:
Page 73
1.22 Proxy server
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v121 Administrative Templates (or newer).
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v88 Administrative Templates (or newer).
Page 74
1.25.1 (L1) Ensure 'Configure Microsoft Defender SmartScreen' is
set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Windows Defender SmartScreen can provide messages and warnings to users to help
thwart phishing attempts and malicious software.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change this setting.)
Page 75
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#smartscreenenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 76
1.25.2 (L1) Ensure 'Configure Microsoft Defender SmartScreen to
block potentially unwanted apps' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Windows Defender SmartScreen can block unwanted apps that will help inform and
protect users from vulnerabilities related to adware and low-reputation apps.
Impact:
Microsoft Defender SmartScreen will block potentially dangerous apps. This could stop
the user from installing an app that could be potentially harmful to the system.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenPuaEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen to block
potentially unwanted apps
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (The user can change this setting.)
Page 77
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#smartscreenpuaenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 78
1.25.3 (L1) Ensure 'Enable Microsoft Defender SmartScreen DNS
requests' is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Enable Microsoft Defender SmartScreen DNS requests
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 79
Default Value:
Enabled. (Microsoft Defender SmartScreen will make DNS requests.)
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#smartscreendnsrequestsenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 80
1.25.4 (L1) Ensure 'Force Microsoft Defender SmartScreen
checks on downloads from trusted sources' is set to 'Enabled'
(Automated)
Profile Applicability:
Rationale:
Windows Defender SmartScreen can verify that downloads are from a trusted source
can greatly reduce the chances of a user downloading an infected package to their
machine.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenForTrustedDownloadsEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Force Microsoft Defender SmartScreen checks on
downloads from trusted sources
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change this setting.)
Page 81
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#smartscreenfortrusteddownloadsenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 82
1.25.5 (L1) Ensure 'Prevent bypassing Microsoft Defender
SmartScreen prompts for sites' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Windows Defender SmartScreen can provide messages and warnings to users to help
thwart phishing and malicious software. However, by default, users may bypass these
warnings.
Impact:
SmartScreen will not allow a user to bypass the warning message.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PreventSmartScreenPromptOverride
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Prevent bypassing Microsoft Defender SmartScreen
prompts for sites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 83
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#preventsmartscreenpromptoverride
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 84
1.25.6 (L1) Ensure 'Prevent bypassing of Microsoft Defender
SmartScreen warnings about downloads' is set to 'Enabled'
(Automated)
Profile Applicability:
Rationale:
Smartscreen checks downloads and verifies whether they are deemed safe or not. Only
allowing verified downloads greatly reduces risk of a download containing a virus,
spyware, or other unwanted software.
Impact:
User will not be able to download software that has not been verified by SmartScreen.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PreventSmartScreenPromptOverrideForFile
s
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Prevent bypassing of Microsoft Defender SmartScreen
warnings about downloads
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 85
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#preventsmartscreenpromptoverrideforfiles
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 86
1.26 Startup, home page and new tab page
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
Page 87
1.26.1 (L1) Ensure 'Disable Bing chat entry-points on Microsoft
Edge Enterprise new tab page' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing the use of the Bing chat entry-points feature in Microsoft Edge could lead to
sensitive data being exposed.
Impact:
The Bing chat entry-points will not appear on the new tab page.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:NewTabPageBingChatEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Startup, home page and new tab page in Microsoft Edge.
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (There is no change on the Microsoft Edge Enterprise new tab page and the
Bing chat entry-points are there for users in Microsoft Edge.)
Page 88
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#newtabpagebingchatenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 89
1.27 (L1) Ensure 'Ads setting for sites with intrusive ads' is set to
'Enabled: Block ads on sites with intrusive ads.' (Automated)
Profile Applicability:
Rationale:
Intrusive ads are ads found on websites that are invasive or unwelcome. These ads can
contain malicious files or can fool an unknowing user into giving away their username
and/or password.
Impact:
Ads that may be non-intrusive could be blocked.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AdsSettingForIntrusiveAdsSites
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Block ads on sites with intrusive ads.:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Ads
setting for sites with intrusive ads
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Block ads on sites with intrusive ads.)
Page 90
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 91
1.28 (L1) Ensure 'Allow download restrictions' is set to 'Enabled:
Block malicious downloads' (Automated)
Profile Applicability:
Page 92
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Block malicious downloads:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
download restrictions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (No special restrictions. The downloads will go through the usual security
restrictions based on Microsoft Defender SmartScreen analysis results.)
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 93
1.29 (L2) Ensure 'Allow features to download assets from the
Asset Delivery Service' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
To reduce the attack surface of the system, downloads such as those described in this
recommendation should not be allowed to automatically download without the approval
of an Administrator.
Impact:
Microsoft Edge features will not be able to download assets needed for them to run
correctly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeAssetDeliveryServiceEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
features to download assets from the Asset Delivery Service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Features can download assets from the Asset Delivery Service.)
Page 94
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#edgeassetdeliveryserviceenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 95
1.30 (L2) Ensure 'Allow file selection dialogs' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Allowing users to import favorites, uploading files, and savings links could pose potential
security risks by allowing data to be uploaded to external sites or by downloading
malicious files. By not allowing the file selection dialog the end-user will not be
prompted for uploads/downloads, preventing data exfiltration and possible system
infection by malware.
Impact:
Users will no longer be prompted when performing actions which would trigger a file
selection dialog. Instead, the file selection dialog box assumes the user clicked
"Cancel". Being as this is not the default behavior, impact to the user will be noticeable,
and the user will not be able to upload and download files.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AllowFileSelectionDialogs
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
file selection dialogs
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 96
Default Value:
Enabled.
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#allowfileselectiondialogs
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 97
1.31 (L1) Ensure 'Allow Google Cast to connect to Cast devices
on all IP addresses' is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
Google Cast to connect to Cast devices on all IP addresses
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Google Cast connects to Cast devices on RFC1918/RFC4193 private
addresses only, unless you enable the CastAllowAllIPs feature.)
Page 98
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#mediaroutercastallowallips
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 99
1.32 (L1) Ensure 'Allow import of data from other browsers on
each Microsoft Edge launch' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing users to import data from another browser into Microsoft Edge could allow for
sensitive data to be imported into Edge.
Impact:
Users will not get a prompt to import their data from other browsers after each Microsoft
Edge launch.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportOnEachLaunch
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
import of data from other browsers on each Microsoft Edge launch
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Users can activate this feature from a Microsoft Edge prompt or from the Settings page.
Page 100
References:
1. https://support.microsoft.com/en-us/microsoft-edge/what-s-imported-to-microsoft-
edge-ab7d9fa1-4586-23ce-8116-
e46f44987ac2#:~:text=to%20Microsoft%20Edge.-
,In%20Microsoft%20Edge%2C%20go%20to%20Settings%20and%20more%20
%3E%20Settings%20%3E,Select%20Import.
2. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#importoneachlaunch
CIS Controls:
Page 101
1.33 (L1) Ensure 'Allow importing of autofill form data' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing autofill data to be imported could potentially allow sensitive data such as
personally identifiable information (PII) from a non-secured source into Microsoft Edge.
Storage of sensitive data should be handled with care.
Impact:
Users will be unable to perform an import of autofill data during Microsoft Edge first run.
This will also prevent users from importing data after Microsoft Edge has been set up.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportAutofillFormData
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of autofill form data
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Autofill data is imported at first run, and users can choose whether to import
this data manually during later browsing sessions.)
Page 102
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importautofillformdata
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 103
1.34 (L1) Ensure 'Allow importing of browser settings' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Having settings automatically imported or allowing users to import settings from another
browser into Microsoft Edge could potentially allow for non-recommended settings to be
applied temporarily creating a potential security risk.
Impact:
Users will be unable to perform an import of other browser settings into Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportBrowserSettings
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of browser settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Browser settings are imported at first run, and users can choose whether to
import them manually during later browsing sessions.)
Page 104
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importbrowsersettings
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 105
1.35 (L1) Ensure 'Allow importing of home page settings' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Having settings automatically imported or allowing users to import settings from another
browser into Microsoft Edge could potentially allow for non-recommended settings to be
applied temporarily creating a potential security risk.
Impact:
Users will be unable to import homepage settings from other browsers into Microsoft
Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportHomepage
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of home page settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Home page setting is imported at first run, and users can choose whether to
import this data manually during later browsing sessions.)
Page 106
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#importhomepage
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 107
1.36 (L1) Ensure 'Allow importing of payment info' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Having payment information automatically imported or allowing users to import payment
data from another browser into Microsoft Edge could allow for sensitive data to be
imported into Edge.
Impact:
Users will be unable to perform a payment information import from other browsers into
Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportPaymentInfo
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of payment info
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Payment info is imported at first run, and users can choose whether to import it
manually during later browsing sessions.
Page 108
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importpaymentinfo
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 109
1.37 (L1) Ensure 'Allow importing of saved passwords' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Having saved passwords automatically imported or allowing users to import password
data from another browser into Microsoft Edge allows for sensitive data to be imported
into Edge.
Impact:
Users will be unable to import saved passwords from other browsers into Microsoft
Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportSavedPasswords
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of saved passwords
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Passwords are imported at first run, and users can choose whether to import
them manually during later browsing sessions.)
Page 110
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importsavedpasswords
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 111
1.38 (L1) Ensure 'Allow importing of search engine settings' is set
to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Having search engine settings automatically imported or allowing users to import the
settings from another browser into Microsoft Edge could allow for a malicious search
engine to be set.
Impact:
Users will be unable to perform an import of their search engine settings from other
browsers into Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportSearchEngine
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of search engine settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Search engine settings are imported at first run, and users can choose whether to
import this data manually during later browsing sessions.
Page 112
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importsearchengine
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 113
1.39 (L1) Ensure 'Allow managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Allowing extensions to access the Enterprise Hardware Platform API could lead to the
system being compromised. It is recommended that this setting is disabled unless
otherwise directed by Enterprise policies.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnterpriseHardwarePlatformAPIEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
managed extensions to use the Enterprise Hardware Platform API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 114
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#enterprisehardwareplatformapienabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 115
1.40 (L2) Ensure 'Allow or block audio capture' is set to 'Disabled'
(Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
or block audio capture
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 116
Default Value:
Enabled. (Users are prompted for audio capture access except from the URLs in the
AudioCaptureAllowedUrls list. These listed URLs are granted access without
prompting.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#audiocaptureallowed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 117
1.41 (L2) Ensure 'Allow or block video capture' is set to 'Disabled'
(Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
or block video capture
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 118
Default Value:
Enabled. (Users are prompted for audio capture access except from the URLs in the
AudioCaptureAllowedUrls list. These listed URLs are granted access without
prompting.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#videocaptureallowed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 119
1.42 (L2) Ensure 'Allow or deny screen capture' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing screen-share APIs within Microsoft Edge could potentially allow for sensitive
data to be shared via screen captures.
Impact:
Users will not be able to utilize APIs which support web-based meetings, video, and
screen capture. This could potentially disrupt users who may have utilized these abilities
in the past.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ScreenCaptureAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
or deny screen capture
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 120
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#screencaptureallowed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 121
1.43 (L1) Ensure 'Allow personalization of ads, Microsoft Edge,
search, news and other Microsoft services by sending browsing
history, favorites and collections, usage and other browsing data
to Microsoft' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Sharing a user's browsing and search history could inadvertently expose data which
could be sensitive.
Impact:
Users' data will not be shared with Microsoft and the personalization of searches, news,
etc. will not be available.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PersonalizationReportingEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
personalization of ads, Microsoft Edge, search, news and other Microsoft
services by sending browsing history, favorites and collections, usage and
other browsing data to Microsoft
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 122
Default Value:
Enabled.
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#personalizationreportingenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 123
1.44 (L1) Ensure 'Allow queries to a Browser Network Time
service' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Microsoft Edge uses a network time service to randomly track times from a trusted
external service. This allows Microsoft Edge the ability for verification of a certificate's
validity and is important for certificate validation.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserNetworkTimeQueriesEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
queries to a Browser Network Time service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 124
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#browsernetworktimequeriesenabled
2. https://docs.microsoft.com/en-us/microsoft-edge/privacy-whitepaper
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 125
1.45 (L1) Ensure 'Allow remote debugging' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Disabling remote debugging enhances security and protects applications from
unauthorized access. Some attack tools can exploit this feature to extract information,
or to insert malicious code.
Impact:
Users will not be able access the remote debugging feature in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RemoteDebuggingAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
remote debugging
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users may use remote debugging by specifying --remote-debug-port and --
remote-debugging-pipe command line switches.)
Page 126
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 127
1.46 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
the audio sandbox to run
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured - The default configuration for the audio sandbox will be used, which
might differ based on the platform.
Page 128
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#audiosandboxenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 129
1.47 (L2) Ensure 'Allow unconfigured sites to be reloaded in
Internet Explorer mode' is set to 'Disabled' (Automated)
Profile Applicability:
Page 130
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationReloadInIEMo
deAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
unconfigured sites to be reloaded in Internet Explorer mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured.
References:
1. https://docs.microsoft.com/en-us/deployedge/edge-ie-mode-local-site-list
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 131
1.48 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Data should not be shared with third-party vendors in an enterprise managed
environment.
Impact:
Users will not be able to send feedback to Microsoft.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:UserFeedbackAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
user feedback
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#userfeedbackallowed
Page 132
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 133
1.49 (L2) Ensure 'Allow users to open files using the ClickOnce
protocol' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing users to configure ClickOnce could potentially allow malicious files to be
automatically opened within Microsoft Edge. By not allowing this, the end-user will need
to download file allowing it to be scanned before opening.
Impact:
Users will have to download files to their system and will be unable to open them
directly in Microsoft Edge. Disabling ClickOnce will also prevent ClickOnce applications
(.application files) from working properly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ClickOnceEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
users to open files using the ClickOnce protocol
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 134
Default Value:
Disabled. (Users will have the option to enable the use of the ClickOnce protocol with
the edge://flags/ page.)
References:
1. https://docs.microsoft.com/en-us/visualstudio/deployment/clickonce-security-and-
deployment?view=vs-2019
2. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#clickonceenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 135
1.50 (L2) Ensure 'Allow users to open files using the DirectInvoke
protocol' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing users to configure DirectInvoke could potentially allow malicious files to be
automatically opened within Microsoft Edge. By not allowing this the end-user will need
to download files allowing for the file to be scanned before opening.
Impact:
Users will have to download files to their device and will be unable to open them directly
in Microsoft Edge. Disabling DirectInvoke could also prevent some SharePoint functions
from working properly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DirectInvokeEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
users to open files using the DirectInvoke protocol
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 136
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#directinvokeenabled
2. https://go.microsoft.com/fwlink/?linkid=2103872
3. https://go.microsoft.com/fwlink/?linkid=2099871
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 137
1.51 (L2) Ensure 'Allow users to proceed from the HTTPS
warning page' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Sites protected by SSL should always be recognized as valid in the web browser.
Allowing a user to make the decision as to whether what appears to be an invalid
certificate could open an organization up to users visiting a site that is otherwise not
secure and or malicious in nature.
Impact:
Users will not be able to click past the invalid certificate error to view the website.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SSLErrorOverrideAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
users to proceed from the HTTPS warning page
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 138
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#sslerroroverrideallowed
CIS Controls:
Page 139
1.52 (L1) Ensure 'Allow websites to query for available payment
methods' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Saving payment information in Microsoft Edge could lead to the sensitive data being
leaked and used for non-legitimate purposes.
Impact:
Websites will be unable to query whether payment information within Microsoft Edge is
available.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PaymentMethodQueryEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
websites to query for available payment methods
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 140
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#paymentmethodqueryenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 141
1.53 (L2) Ensure 'AutoLaunch Protocols Component Enabled' is
set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing applications to AutoLaunch without prompting users for websites in Microsoft
Edge, could open an organization up to malicious sites that may capture proprietary
information through the browser app.
Impact:
Disabling this setting will prompt users whether to allow or deny Microsoft Edge to open
certain links in their associated application, no protocols can launch without prompt.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutoLaunchProtocolsComponentEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Administrative Templates\Microsoft Edge\AutoLaunch
Protocols Component Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The AutoLaunch Protocols component is enabled.)
Page 142
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#autolaunchprotocolscomponentenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 143
1.54 (L1) Ensure 'Automatically import another browser's data
and settings at first run' is set to 'Enabled: Disables automatic
import, and the import section of the first-run experience is
skipped' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Disables automatic import, and the import section of the
first-run experience is skipped:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Automatically import another browser's data and settings at first run
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 144
Default Value:
Enabled. (Automatically imports all supported datatypes and settings from the default
browser.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#autoimportatfirstrun
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 145
1.55 (L1) Ensure 'Automatically open downloaded MHT or
MHTML files from the web in Internet Explorer mode' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Internet Explorer is officially retired and unsupported. Opening files in an unsupported
browser that does not have modern protections could lead to an attack that exploits a
vulnerability in the legacy software.
Impact:
MHT or MHTML files will not open in Internet Explorer mode.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationZoneIdentifi
erMhtFileAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Automatically open downloaded MHT or MHTML files from the web in
Internet Explorer mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Page 146
Default Value:
Disabled. (MHT or MHTML files that are downloaded from the web won´t automatically
open in Internet Explorer mode)
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 147
1.56 (L2) Ensure 'Block third party cookies' is set to 'Enabled'
(Automated)
Profile Applicability:
Rationale:
Allowing third-party cookies could potentially allow tracking of your web activities by
third-party entities which may expose information that could be used for an attack on the
end-user.
Impact:
Disabling third-party cookies could cause some websites to not function as expected
(e.g., Microsoft 365 or Salesforce).
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BlockThirdPartyCookies
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Block
third party cookies
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can change this setting.)
Page 148
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#blockthirdpartycookies
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 149
1.57 (L1) Ensure 'Block tracking of users' web-browsing activity' is
set to 'Enabled: Balanced (Blocks harmful trackers and trackers
from sites user has not visited; content and ads will be less
personalized)' or higher (Automated)
Profile Applicability:
Page 150
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Balanced (Blocks harmful trackers and trackers from sites
user has not visited; content and ads will be less personalized):
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Block
tracking of users' web-browsing activity
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can set their own level of tracking prevention.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#trackingprevention
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 151
1.58 (L2) Ensure 'Browser sign-in settings' is set to 'Enabled:
Disable browser sign-in' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled: Disable browser sign-in:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Browser sign-in settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 152
Default Value:
Not Configured - Users can decide if they want to enable the browser sign-in option and
use it as they see fit.
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#browsersignin
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 153
1.59 (L1) Ensure 'Clear browsing data when Microsoft Edge
closes' is set to 'Disabled' (Automated)
Profile Applicability:
Page 154
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Clear
browsing data when Microsoft Edge closes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can configure the Clear browsing data option in Settings.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#clearbrowsingdataonexit
CIS Controls:
Page 155
1.60 (L1) Ensure 'Clear cached images and files when Microsoft
Edge closes' is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Clear
cached images and files when Microsoft Edge closes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 156
Default Value:
Not Configured. (Users can choose whether cached images and files are cleared on
exit.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#clearcachedimagesandfilesonexit
CIS Controls:
Page 157
1.61 (L1) Ensure 'Clear history for IE and IE mode every time you
exit' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Deleting browser data will delete information that may be important for a computer
investigation. Investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
History will not be cleared for IE and IE mode every time a user exits the browser.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerModeclearDataOnExitEnab
led
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Clear
history for IE and IE mode every time you exit
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Internet Explorer browsing history will not be cleared on browser exit.)
Page 158
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#InternetExplorerModeclearDataOnExitEnabled
CIS Controls:
Page 159
1.62 (L1) Ensure 'Compose is enabled for writing on the web' is
set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Compose is enabled for writing on the web
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Page 160
Default Value:
Enabled. (Compose can provide text generation for eligible fields, which are text
editable and don´t have an autocomplete attribute.)
References:
1. https://www.microsoft.com/en-us/edge/features/compose?form=MA13FJ
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 161
1.63 (L1) Ensure 'Configure browser process code integrity guard
setting' is set to 'Enabled: Enable code integrity guard
enforcement in the browser process.' (Automated)
Profile Applicability:
Rationale:
Code Integrity Guard ensures Microsoft's digital signature is present when loading
binaries into a process. Binaries without Microsoft's digital signature are blocked to
protect the system from unknown binaries and prevent the injection of untrustworthy
binaries into a process.
Impact:
Binaries without Microsoft's digital signature are blocked from being loaded into a
process.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:browserCodeIntegritySetting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Enable code integrity guard enforcement in the browser
process.:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure browser process code integrity guard setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 162
Default Value:
Disabled. (Prevents the browser from enabling code integrity guard in the browser
process.)
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#browserCodeIntegritySetting
2. https://www.cloudficient.com/blog/why-microsoft-edge-is-more-secure-now-than-
ever
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 163
1.64 (L1) Ensure 'Configure InPrivate mode availability' is set to
'Enabled: InPrivate mode disabled' (Automated)
Profile Applicability:
Rationale:
Disabling InPrivate mode for Microsoft Edge will ensure that browsing data is logged on
the system which may be important for forensics.
Impact:
Users will not be able to initiate the InPrivate browsing mode for Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InPrivateModeAvailability
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: InPrivate mode disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure InPrivate mode availability
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (InPrivate mode available.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#inprivatemodeavailability
Page 164
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 165
1.65 (L2) Ensure 'Configure Online Text To Speech' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling Online Text to Speech could allow data to be transmitted to a third-party,
which could lead to sensitive data being exposed.
Impact:
Users will be unable to utilize Online Text to Speech.
Note: This setting will prevent the Online Text to Speech feature which can be used by
users with visual or learning disabilities to read the text of documents out loud. Please
make sure this feature is not needed within the environment before disabling this
feature.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ConfigureOnlineTextToSpeech
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure Online Text To Speech
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 166
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#configureonlinetexttospeech
2. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#configureonlinetexttospeech
3. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#configureonlinetexttospeech
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 167
1.66 (L1) Ensure 'Configure Related Matches in Find on Page' is
set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure Related Matches in Find on Page
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can receive Related Matches in Find on Page on all sites. The results
are processed in a cloud service.)
Page 168
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#relatedmatchescloudserviceenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 169
1.67 (L2) Ensure 'Configure Speech Recognition' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing speech recognition to use the Web speech API in Azure Cognitive permits
voice data to leave the machine, potentially allowing sensitive data to be collected from
a non-secured third-party source.
Impact:
Users will be unable to use speech recognition for voice typing. Users that use speech
recognition for accessibility will need other tools implemented for voice typing.
Note: An exception to this recommendation might be needed as this is an accessibility
feature that is legitimately needed by some users. Take this into consideration when
applying this setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SpeechRecognitionEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure Speech Recognition
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 170
Default Value:
Enabled. (Web-based applications that use the Web speech API can use speech
recognition.)
References:
1. https://blogs.windows.com/msedgedev/2016/06/01/introducing-speech-synthesis-
api/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 171
1.68 (L1) Ensure 'Configure the list of names that will bypass the
HSTS policy check' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing hostnames to be exempt from HSTS policy checks could allow for protocol
downgrade attacks and cookie hijackings.
Impact:
There should be no adverse effect to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge:HSTSPolicyBypassList
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled.
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure the list of names that will bypass the HSTS policy check
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured.
Page 172
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#hstspolicybypasslist
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 173
1.69 (L1) Ensure 'Configure the list of types that are excluded
from synchronization' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Storing and sharing information could potentially expose sensitive information including
but not limited to user passwords and login information. Allowing this synchronization
could also potentially allow an end user to pull corporate data that was synchronized
into the cloud to a personal machine.
Impact:
Password data will not be synchronized with the Azure AD Tenant.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of passwords.
HKLM\SOFTWARE\Policies\Microsoft\Edge\SyncTypesListDisabled:1
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled with the following CASE SENSITIVE datatype passwords:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure the list of types that are excluded from synchronization
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 174
Default Value:
Not Configured.
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#synctypeslistdisabled
CIS Controls:
Page 175
1.70 (L1) Ensure 'Configure the Share experience' is set to
'Enabled: Don't allow using the Share experience' (Automated)
Profile Applicability:
Rationale:
Having this setting enabled could allow malicious content from Microsoft Edge to be
exposed to other parts of the operating system.
Impact:
Users will not be able to view or use the Share button in the toolbar as it will be hidden.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ConfigureShare
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow using the Share experience:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure the Share experience
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft here.
Default Value:
Enabled. (Allow using the Share experiences.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#configureshare
Page 176
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 177
1.71 (L1) Ensure 'Configure whether form data and HTTP
headers will be sent when entering or exiting Internet Explorer
mode' is set to 'Enabled: Do not send form data or headers'
(Automated)
Profile Applicability:
Rationale:
Allowing autofill data to be imported could potentially allow sensitive data, such as
personally identifiable information (PII) to be exposed. Storage of sensitive data should
be handled with care and not stored within the browser.
Impact:
When entering or exiting IE mode, form data and headers will not be shared between
Internet Explorer mode and Microsoft Edge and vice versa.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationComplexNavDa
taTypes
Page 178
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not send form data or headers:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure whether form data and HTTP headers will be sent when entering
or exiting Internet Explorer mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Microsoft Edge will use the new behavior of including form data in
navigations that change modes.)
References:
1. https://docs.microsoft.com/en-us/deployedge/edge-ie-mode-faq
CIS Controls:
Page 179
1.72 (L1) Ensure 'Continue running background apps after
Microsoft Edge closes' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing processes from the browser to run in the background could allow a malicious
script or code to continue running even once the browser windows has been closed.
Impact:
The browser will close its processes and will not continue running as a background
process.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BackgroundModeEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Continue running background apps after Microsoft Edge closes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (The user can configure its behavior in edge://settings/system.)
Page 180
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#backgroundmodeenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 181
1.73 (L1) Ensure 'Control communication with the
Experimentation and Configuration Service' is set to 'Enabled:
Disable communication with the Experimentation and
Configuration Service' (Automated)
Profile Applicability:
Rationale:
This setting allows feedback (data) to be sent back to a third-party for testing of
development features for Microsoft Edge, and can also deliver a payload that contains a
list of actions to take on certain domains for compatibility reasons.
Impact:
Data will not be sent back to a third-party and payloads will not be delivered.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ExperimentationAndConfigurationServiceC
ontrol
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Disable communication with the Experimentation and
Configuration Service:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control communication with the Experimentation and Configuration Service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 182
Default Value:
Enabled. (Retrieve configurations only.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#experimentationandconfigurationservicecontrol
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 183
1.74 (L2) Ensure 'Control use of the Headless Mode' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Although this feature can be very useful to developers, an attacker could
programmatically scrape website content and install malicious scripts on devices
running the browser’s headless interface.
Impact:
Users will not be able to access headless mode in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:HeadlessModeEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control use of the Headless Mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Microsoft Edge allows use of the headless mode.)
Page 184
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#headlessmodeenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 185
1.75 (L2) Ensure 'Control use of the Serial API' is set to 'Enable:
Do not allow any site to request access to serial ports via the
Serial API' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enable: Do not allow any site to request access to serial ports via
the Serial API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control use of the Serial API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 186
Default Value:
Enabled. (AskSerial (3) = Allow sites to ask for user permission to access a serial
port (Websites can ask users whether they can access a serial port, and users can
change this setting.))
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-policies#control-
use-of-the-serial-api
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 187
1.76 (L2) Ensure 'Control where security restrictions on insecure
origins apply' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Insecure contexts should always be labeled as insecure.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge:OverrideSecurityRestrictionsOnInsecureO
riginDesc
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control where security restrictions on insecure origins apply
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 188
References:
1. https://chromeenterprise.google/policies/#OverrideSecurityRestrictionsOnInsecur
eOrigin
CIS Controls:
Page 189
1.77 (L2) Ensure 'Default sensors setting' is set to 'Enabled: Do
not allow any site to access sensors' (Automated)
Profile Applicability:
Rationale:
Sensor APIs may expose data to sites and services and may even give sites control
over functionality. Due to privacy concerns, sensors should never be accessed by
websites or third-party vendors.
Impact:
Access to sensors, such as motion and light, will not be accessible by websites.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultSensorsSetting
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to access sensors:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Default sensors setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Allow sites to access sensors.)
Page 190
CIS Controls:
Page 191
1.78 (L1) Ensure 'Delete old browser data on migration' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Deleting browser data will delete information that may be important for a computer
investigation and investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
Browsing data will not be deleted during migration.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DeleteDataOnMigration
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Delete old browser data on migration
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 192
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#deletedataonmigration
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 193
1.79 (L1) Ensure 'Disable saving browser history' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Deleting browser data will delete information that may be important for a computer
investigation and investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
None - this is the default behavior.
Note: This setting will preserve browsing history that could contain a user's personal
browsing history. Ensure this setting is in compliance with organizational policies.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SavingBrowserHistoryDisabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Disable saving browser history
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 194
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#savingbrowserhistorydisabled
CIS Controls:
Page 195
1.80 (L1) Ensure 'Disable synchronization of data using Microsoft
sync services' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Data should not be shared with third-party vendors in an enterprise-managed
environment.
Impact:
Users will be unable to sync data with Microsoft, the prompt for sync consent will also
be hidden from the user.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SyncDisabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Disable synchronization of data using Microsoft sync services
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured - Users will be able to turn sync on or off.
Page 196
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#syncdisabled
CIS Controls:
Page 197
1.81 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\DNS
interception checks enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (DNS interception checks are performed.)
Page 198
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#dnsinterceptionchecksenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 199
1.82 (L1) Ensure 'Edge 3P SERP Telemetry Enabled' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling this feature sends data to a third-party service, which could lead to sensitive
data being exposed.
Impact:
Data will not be sent to a third-party.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:Edge3PSerpTelemetryEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Edge
3P SERP Telemetry Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Disabled. (Edge 3P SERP Telemetry feature will be enabled.)
Page 200
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 201
1.83 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Allowing a third-party to track users while browsing the internet in Microsoft Edge,
Weather from Microsoft Start, or Microsoft Wallet can lead to privacy and possible data
loss issues.
Impact:
The Edge Wallet E-Tree feature will not be available to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeWalletEtreeEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Edge
Wallet E-Tree Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the Edge Wallet E-Tree feature.)
Page 202
References:
1. https://support.microsoft.com/en-us/topic/faq-for-e-tree-on-microsoft-edge-
microsoft-weather-and-microsoft-wallet-d6fde56e-b61d-4990-bd69-
7a503ed64895#:~:text=Want%20to%20do%20what%20you,be%20planted%20o
n%20your%20behalf.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 203
1.84 (L1) Ensure 'Enable AutoFill for addresses' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing autofill data to be saved in Microsoft Edge could potentially allow storage of
sensitive data such as personally identifiable information (PII). Considering that storage
of sensitive data should be handled with care disabling this setting is recommended.
Impact:
Users will be unable to store autofill address information in Microsoft Edge and they will
also not be prompted to use such information on webforms. Disabling this setting also
stops any past activity of autofill.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutofillAddressEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable AutoFill for addresses
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can control AutoFill for addresses in the user interface.)
Page 204
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#autofilladdressenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 205
1.85 (L1) Ensure 'Enable AutoFill for payment instructions' is set
to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Having payment information stored and auto filled in Microsoft Edge could allow for an
attacker to gain access to this sensitive data.
Impact:
Users will be unable to use and store AutoFill data for credit and debit card information
in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutofillCreditCardEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable AutoFill for payment instructions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Note #2: In older Microsoft Windows Administrative Templates, this setting was initially
named AutoFill for credit cards, but it was renamed to Enable AutoFill for payment
instructions.
Default Value:
Enabled. (Users can control AutoFill for payment instruments.)
Page 206
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#autofillcreditcardenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 207
1.86 (L1) Ensure 'Enable browser legacy extension point blocking'
is set to 'Enabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable browser legacy extension point blocking
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (ProcessExtensionPointDisablePolicy is applied to block legacy extension
points in the browser process.)
Page 208
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 209
1.87 (L1) Ensure 'Enable component updates in Microsoft Edge'
is set to 'Enabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable component updates in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft here.
Default Value:
Enabled.
Page 210
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 211
1.88 (L1) Ensure 'Enable CryptoWallet feature' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
In an enterprise organization, users should not be able to manage, buy or sell assets
such as Bitcoin, Ethereum, and other cryptocurrencies.
Impact:
The CryptoWallet feature will not be accessible to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:CryptoWalletEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable CryptoWallet feature
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use CryptoWallet feature which allows users to securely store,
manage and transact digital assets such as Bitcoin, Ethereum and other
cryptocurrencies.)
Page 212
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#cryptowalletenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 213
1.89 (L1) Ensure 'Enable deleting browser and download history'
is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable deleting browser and download history
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 214
Default Value:
Enabled. (Users can delete the browsing and download history.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#allowdeletingbrowserhistory
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 215
1.90 (L1) Ensure 'Enable Discover access to page contents for
AAD profiles' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling this policy setting allows data to be transmitted to a third-party (BING), which
could lead to sensitive data being exposed.
Impact:
Discover will not be able to access page contents and therefore Bing Chat will not be
able to summarize pages and interact with text selections.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DiscoverPageContextenabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Discover access to page contents for AAD profiles
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Discover will have access to page contents.)
Page 216
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#discoverpagecontextenabled
CIS Controls:
Page 217
1.91 (L2) Ensure 'Enable Drop feature in Microsoft Edge' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling the Microsoft Edge Drop feature could allow sensitive data to be transmitted to
a device that is not authorized or a third-party, which could lead to that data being
exposed.
Impact:
Users can't use the drop feature in Microsoft Edge to share files and messages between
phones and desktop devices.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeEdropenabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Drop feature in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the Drop feature in Microsoft Edge.)
Page 218
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#EdgeEdropenabled
2. https://www.microsoft.com/en-us/edge/features/drop?form=MT00D8
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 219
1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is set
to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling this feature will create a personalized feed in Edge’s Collections section. In
order to create a personalized feed, data will be collected from the browser. Due to
privacy concerns, data should never be sent to any third-party.
Impact:
Users will not be able to follow an influencer, site, or topic in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeFollowEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Follow service in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Follow in Microsoft Edge can be applied.)
Page 220
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 221
1.93 (L1) Ensure 'Enable globally scoped HTTP auth cache' is set
to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable globally scoped HTTP auth cache
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 222
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#globallyscopehttpauthcacheenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 223
1.94 (L2) Ensure 'Enable guest mode' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
In a guest profile, the browser doesn't import browsing data from existing profiles, and it
deletes browsing data when all guest profiles are closed.
Deleting browser data will delete information that may be important for a computer
investigation and investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
Users will not be able to initiate Guest mode for Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserGuestModeEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable guest mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Microsoft Edge lets users browse in guest profiles.)
Page 224
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#browserguestmodeenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 225
1.95 (L1) Ensure 'Enable network prediction' is set to 'Enabled:
Don't predict network actions on any network connection'
(Automated)
Profile Applicability:
Rationale:
Opening connections to resources that may not be used could allow un-needed
connections increasing attack surface and, in some cases, could lead to opening
connections to resources which the user did not intend to utilize.
Impact:
None - this is the default behavior, apart from users being able to change the default.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:NetworkPredictionOptions
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't predict network actions on any network connection:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable network prediction
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change the policy.)
Page 226
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#networkpredictionoptions
CIS Controls:
Page 227
1.96 (L1) Ensure 'Enable profile creation from the Identity flyout
menu or the Settings page' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing users to create new profiles could allow for such profiles to be removed or
switched which may end up in a situation that hides or even removes data which may
be important for computer investigation and investigators such as Computer Forensics
Analysts may not be able to retrieve pertinent information to the investigation.
Impact:
Users will be unable to utilize the Add profile option in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserAddProfileEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable profile creation from the Identity flyout menu or the Settings
page
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Microsoft Edge allows users to use Add profile on the Identity flyout menu or
the Settings page to create new profiles.)
Page 228
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#browseraddprofileenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 229
1.97 (L1) Ensure 'Enable resolution of navigation errors using a
web service' is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable resolution of navigation errors using a web service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (Microsoft Edge respects the user preference that´s set under Services
at edge://settings/privacy.)
Page 230
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#resolvenavigationerrorsusewebservice
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 231
1.98 (L2) Ensure 'Enable search suggestions' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Characters that are typed by the user are sent to a search engine before the Enter key
is pressed therefore, it is possible for unintended data to be sent.
Impact:
Users will not get customized web suggestions for search results, instead they will still
receive local suggestions.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SearchSuggestEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable search suggestions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can change the setting.)
Page 232
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#searchsuggestenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 233
1.99 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
If Microsoft Edge is being launched with potentially dangerous flags this information
should be exposed to the user as a warning, if not the user may unintentionally be using
non-secure settings and be exposed to security flaws.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:CommandLineFlagSecurityWarningsEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable security warnings for command-line flags
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Page 234
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#commandlineflagsecuritywarningsenabled
CIS Controls:
Page 235
1.100 (L1) Ensure 'Enable site isolation for every site' is set to
'Enabled' (Automated)
Profile Applicability:
Rationale:
Enabling site isolation can help stop sites from inadvertently sharing data with other
running sites. This will help protect data from untrusted sources.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SitePerProcess
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable site isolation for every site
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Note: If this policy is disabled or not configured, a user can opt out of site isolation. (For
example, by using "Disable site isolation" entry in edge://flags.) Disabling the policy or
not configuring the policy doesn't turn off Site Isolation.
Page 236
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#siteperprocess
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 237
1.101 (L1) Ensure 'Enable tab organization suggestions' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Sending Microsoft Edge tab data (URLs, page titles, and existing group information) to
the tab organization service could led to privacy concerns or sensitive data being
exposed to a third-party.
Impact:
Suggestions for tab groups will not be available to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TabServicesEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable tab organization suggestions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (When a user creates a tab group or activates certain "Group Similar Tabs"
features Microsoft Edge sends tab data to its tab organization service.)
Page 238
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 239
1.102 (L1) Ensure 'Enable the Search bar' is set to 'Disabled'
(Automated)
Profile Applicability:
Page 240
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable the Search bar
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (The search bar will be automatically enabled for all profiles.)
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 241
1.103 (L2) Ensure 'Enable Translate' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Data should not be shared with third-party vendors in an enterprise managed
environment. Enabling this service could potentially allow sensitive information to be
sent to a third-party for translation.
Impact:
The translate feature will not be available for users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TranslateEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Translate
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (Users can choose whether to use the translation functionality or not.)
Page 242
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#translateenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 243
1.104 (L1) Ensure 'Enable upload files from mobile in Microsoft
Edge desktop' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing users the ability to use the file upload from mobile feature in Microsoft Edge
could lead to data leakage or intellectual property being exposed.
Impact:
The file upload from mobile feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:UploadFromPhoneEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable upload files from mobile in Microsoft Edge desktop
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can upload files via the upload from mobile feature in Microsoft Edge.)
Page 244
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 245
1.105 (L1) Ensure 'Enable use of ephemeral profiles' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing use of ephemeral profiles allows a user to use Microsoft Edge with no data
being logged to the system. Deleting browser data will delete information that may be
important for a computer investigation and investigators such as Computer Forensics
Analysts may not be able to retrieve pertinent information to the investigation.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ForceEphemeralProfiles
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable use of ephemeral profiles
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 246
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#forceephemeralprofiles
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 247
1.106 (L1) Ensure 'Enable warnings for insecure forms' is set to
'Enabled' (Automated)
Profile Applicability:
Rationale:
The default setting of enabled warnings for insecure forms enforces secure connections
when domains are capable of HTTPS and prevents auto-filling of data imported from a
non-secure source.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InsecureFormsWarningsEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable warnings for insecure forms
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 248
Default Value:
Enabled. (A full-page warning will be shown when an insecure form is submitted.
Additionally, a warning bubble will be shown next to the form fields when they are
focused, and autofill will be disabled for those forms.)
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#insecureformswarningsenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 249
1.107 (L1) Ensure 'Enables DALL-E themes generation' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
The rush to bring GenAI to market has brought to light concerns about the training data
rapidly ingested by these large language models (LLMs). Content creators have
complained copyright infringement on the content generated by these products. This
has resulted in lawsuits against major corporations the results of which may shape
future laws and regulations about the use of certain products and/or the content created
by them.
Due to this, there is an unknown element of risk involved in utilizing content generated
by DALL-E in an enterprise environment and it is therefore recommended to disable this
setting to mitigate that future risk around intellectual property.
Impact:
Users will not be able to generate browser themes using DALL-E.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AIGenThemesEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enables DALL-E themes generation
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 250
Default Value:
Enabled. (Users can generate AI themes.)
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 251
1.108 (L2) Ensure 'Enforce Bing SafeSearch' is set to 'Enabled:
Configure moderate search restrictions in Bing' (Automated)
Profile Applicability:
Rationale:
Allowing search results to present sites that may have malicious content should be
prohibited to help ensure users do not accidentally visit sites that are prone to malicious
content including spyware, adware, and viruses.
Impact:
Users search results will be filtered and content such as adult text, videos and images
will not be shown.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ForceBingSafeSearch
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Configure moderate search restrictions in Bing:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enforce Bing SafeSearch
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can configure this policy.)
Page 252
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#forcebingsafesearch
CIS Controls:
Page 253
1.109 (L2) Ensure 'Enforce Google SafeSearch' is set to 'Enabled'
(Automated)
Profile Applicability:
Rationale:
Allowing search results to present sites that may have malicious content should be
prohibited to help ensure users do not accidentally visit sites that are more prone to
malicious content including spyware, adware, and viruses.
Impact:
Users search results will be filtered and content such as adult text, videos and images
will not be shown.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ForceGoogleSafeSearch
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enforce Google SafeSearch
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can set the value.)
Page 254
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#forcegooglesafesearch
CIS Controls:
Page 255
1.110 (L1) Ensure 'Enhance the security state in Microsoft Edge'
is set to 'Enabled: Balanced mode' or higher (Automated)
Profile Applicability:
Rationale:
Balance mode will help reduce the risk of an attack by automatically applying stricter
security settings on unfamiliar sites while adapting to browsing habits over time.
Impact:
Users will no longer be able to bypass protection for previously visited unfamiliar sites.
Edge will apply added security protections to sites that are not visited often or are
unknown. Websites that are browsed frequently will be left out.
Note: Most sites will work as expected.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1 or 3.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnhanceSecurityMode
Page 256
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Balanced mode or Enabled: Strict mode:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enhance the security state in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
References:
1. https://support.microsoft.com/en-us/microsoft-edge/enhance-your-security-on-
the-web-with-microsoft-edge-b8199f13-b21b-4a08-a806-daed31a1929d
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 257
1.111 (L2) Ensure 'Enhanced Security Mode configuration for
Intranet zone sites' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Enhanced security mode provides 'defense-in-depth' protection that makes it more
difficult for a malicious site to use an unpatched vulnerability to write to executable
memory.
Impact:
Disabling this setting could lead to Intranet zone sites acting in an unexpected manner.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnhanceSecurityModeBypassIntranet
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enhanced Security Mode configuration for Intranet zone sites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Microsoft Edge will apply enhanced Security Mode on Intranet zone sites.)
Page 258
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#EnhanceSecurityModeBypassIntranet
2. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-security-browse-
safer#defense-in-depth
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 259
1.112 (L1) Ensure 'Hide the First-run experience and splash
screen' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Allowing the First-run experience and configuration options could potentially allow the
user to perform actions that are prohibited such as importing autofill, credit card, and
other sensitive data.
Impact:
Users will not be prompted with the First-run experience screens.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:HideFirstRunExperience
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Hide
the First-run experience and splash screen
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 260
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#hidefirstrunexperience
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 261
1.113 (L1) Ensure 'In-app support Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
In-app support shares a user's browsing and search history, which could inadvertently
expose and share sensitive data with Microsoft.
Impact:
Users will not be able to use or turn on the in-app support feature in the Microsoft Edge
browser.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InAppSupportEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\In-
app support Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can invoke in-app support.)
Page 262
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 263
1.114 (L2) Ensure 'Let users snip a Math problem and get the
solution with a step-by-step explanation in Microsoft Edge' is set
to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Math Solver shares a user's browsing and search history to provide additional learning
resources, which could inadvertently expose and share sensitive data with a third-party.
Impact:
Users will be unable to solve math problems in Microsoft Edge browsers.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:MathSolverEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Let
users snip a Math problem and get the solution with a step-by-step
explanation in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can take a snip of the Math problem and get the solution including a
step-by-step explanation of the solution in a Microsoft Edge side pane.)
Page 264
References:
1. https://www.onmsft.com/news/enable-math-solver-edge
2. https://techcommunity.microsoft.com/t5/articles/learn-how-to-solve-math-
problems-with-math-solver-in-microsoft/m-p/2195689
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 265
1.115 (L2) Ensure 'Live captions allowed' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Enabling live captions could allow data to be transmitted to a third-party, which could
lead to sensitive data being exposed.
Impact:
Users won't be able to turn live captions on. In addition, if speech recognition files have
been downloaded previously, they will be deleted from the device in 30 days.
Note: An exception to this recommendation might be needed as this is an accessibility
feature that is legitimately needed by some users. Take this into consideration when
applying this setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:LiveCaptionsAllowed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Live
captions allowed
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can turn this feature on or off.)
Page 266
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#liveCaptionsAllowed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 267
1.116 (L1) Ensure 'Manage exposure of local IP addresses by
WebRTC' is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Manage exposure of local IP addressess by WebRTC
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 268
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#webrtclocalipsallowedurls
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 269
1.117 (L1) Ensure 'Notify a user that a browser restart is
recommended or required for pending updates' is set to 'Enabled:
Required - Show a recurring prompt to the user indicating that a
restart is required' (Automated)
Profile Applicability:
Page 270
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Required - Show a recurring prompt to the user indicating
that a restart is required:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Notify a user that a browser restart is recommended or required for
pending updates
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (An icon is shown in the browser informing the user to restart Microsoft
Edge.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#relaunchnotification
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 271
1.118 (L1) Ensure 'Restrict exposure of local IP address by
WebRTC' is set to 'Enabled: Allow public interface over http
default route. This doesn't expose the local IP address'
(Automated)
Profile Applicability:
Rationale:
Allowing the exposure of IP addresses allows the attacker to gather information on the
internal network that could potentially be utilized to breach and traverse the network.
Impact:
The local IP address will not be exposed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of default_public_interface_only.
HKLM\SOFTWARE\Policies\Microsoft\Edge:WebRtcLocalhostIpHandling
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Allow public interface over http default route. This doesn't
expose the local IP address:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Restrict exposure of local IP address by WebRTC
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (WebRTC exposes the local IP address.)
Page 272
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#webrtclocalhostiphandling
CIS Controls:
Page 273
1.119 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: 250609664:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Set
disk cache size, in bytes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Default size is used.)
Page 274
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#diskcachesize
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 275
1.120 (L1) Ensure 'Set the time period for update notifications' is
set to 'Enabled: 86400000' (Automated)
Profile Applicability:
Rationale:
This setting is a notification for the end-user informing them that an update has been
applied and that the browser must be restarted in order for the update to be completed.
Once updates have been pushed by the organization it is pertinent that said update
takes effect as soon as possible. Enabling this notification will ensure users restart the
browser in a timely fashion.
Impact:
When updates are applied by an organization the end-user will receive a notification
after 24 hours that they must restart the browser for updates to complete.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 86400000.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RelaunchNotificationPeriod
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: 86400000:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Set
the time period for update notifications
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (One week.)
Page 276
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#relaunchnotificationperiod
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 277
1.121 (L1) Ensure 'Shopping in Microsoft Edge Enabled' is set to
'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Shopping in Microsoft Edge Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 278
Default Value:
Enabled. (Shopping features such as price comparison, coupons, rebates and express
checkout will be automatically applied for retail domains. Coupons for the current
retailer and prices from other retailers will be fetched from a server.)
References:
1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#edgeshoppingassistantenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 279
1.122 (L2) Ensure 'Show an "Always open" checkbox in external
protocol dialog' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing a protocol to automatically "always open for webpages" could allow a malicious
website to open programs on a device leaving it open to attacks.
Impact:
The end user will be prompted each time they click a link that opens an external
protocol, even if they have utilized it before.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ExternalProtocolDialogShowAlwaysOpenChe
ckbox
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Show
an "Always open" checkbox in external protocol dialog
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (v84 or greater)
Page 280
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#externalprotocoldialogshowalwaysopencheckbox
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 281
1.123 (L1) Ensure 'Show Microsoft Rewards experiences' is set to
'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Show
Microsoft Rewards experiences
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 282
Default Value:
Enabled. (In the search and earn markets users will see the Microsoft Rewards
experience in their Microsoft Edge user profile.)
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 283
1.124 (L1) Ensure 'Show the Reload in Internet Explorer mode
button in the toolbar' is set to 'Disabled' (Automated)
Profile Applicability:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Show
the Reload in Internet Explorer mode button in the toolbar
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 284
Default Value:
Enabled. (Reload in Internet mode button is pinned to the toolbar.)
References:
1. https://docs.microsoft.com/en-us/deployedge/edge-ie-mode
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 285
1.125 (L1) Ensure 'Specifies whether SharedArrayBuffers can be
used in a non cross-origin-isolated context' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Disabling this policy prevents attackers from being able to exploit memory access
vulnerabilities found in popular CPUs.
Impact:
Users may experience slightly slower loading of webpages.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SharedArrayBufferUnrestrictedAccessAllo
wed
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Specifies whether SharedArrayBuffers can be used in a non cross-origin-
isolated context
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Sites are allowed to use SharedArrayBuffers.)
Page 286
References:
1. https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-
mitigations-microsoft-edge-internet-explorer/
2. https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#sharedarraybufferunrestrictedaccessallowed
CIS Controls:
Page 287
1.126 (L2) Ensure 'Specify if online OCSP/CRL checks are
required for local trust anchors' is set to 'Enabled' (Automated)
Profile Applicability:
Rationale:
Certificates should always be validated, not doing so could potentially allow a revoked
certificate to be used to give a false sense of a secure connection.
Impact:
If Microsoft Edge is not able to obtain a revocation status, the certificate will be treated
as though it is revoked, therefore the website will not be loaded.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RequireOnlineRevocationChecksForLocalAn
chors
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Specify if online OCSP/CRL checks are required for local trust anchors
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
Page 288
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#requireonlinerevocationchecksforlocalanchors
CIS Controls:
Page 289
1.127 (L2) Ensure 'Spell checking provided by Microsoft Editor' is
set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Microsoft Editor is an AI-powered service that that sends data to a third-party cloud
service. Sending this data to the cloud could lead to sensitive data being exposed.
Impact:
Spell check can only be provided by local engines that use platform or Hunspell
services. The results from these engines might be less informative than the results
Microsoft Editor can provide.
Note: If the spellcheckEnabled (Enable spellcheck) policy is set to Disabled, or the
user disables spell checking in the settings page, this policy will have no effect.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:MicrosoftEditorProofingEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Spell
checking provided by Microsoft Editor
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Microsoft Editor spell check can be used for eligible text fields.)
Page 290
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#MicrosoftEditorProofingEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 291
1.128 (L1) Ensure 'Standalone Sidebar Enabled' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Microsoft Edge determines what data to send to Bing AI based on the user's query and
their consent to share data with Microsoft. This could allow data to be transmitted to a
third-party cloud service. This could lead to sensitive data being exposed.
Bing AI offers various features, such as summarizing financial reports, comparing
financials of different companies, and aiding users in creating and editing content which
could also lead to sensitive data being exposed.
Impact:
Users will not be able to access the HubsSidebarEnabled (Show Hubs Sidebar) and it
will also prevent them from accessing standalone sidebar and using the Bing AI feature.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:StandaloneHubsSidebarEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Standalone Sidebar Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 292
Default Value:
Enabled. (Users will have the ability to activate the standalone sidebar.)
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#standaloneHubsSidebarEnabled
2. https://learn.microsoft.com/en-us/microsoft-edge/privacy-whitepaper/#bing-chat-
in-microsoft-edge-sidebar
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 293
1.129 (L1) Ensure 'Suggest similar pages when a webpage can’t
be found' is set to 'Disabled' (Automated)
Profile Applicability:
Rationale:
This setting could potentially lead to a leak of information regarding the types of
websites being visited, it may also open users up to redirection to a malicious site in the
event that the service generating information becomes compromised.
Impact:
Users will still be presented with an error if a website cannot be reached however, the
message may be more generic than the user would get in the instance of this service
being enabled.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AlternateErrorPagesEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Suggest similar pages when a webpage can’t be found
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 294
Default Value:
Not Configured. (Users will have the option to enable this setting with the
edge://settings/privacy page.)
References:
1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#alternateerrorpagesenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 295
1.130 (L1) Ensure 'Suppress the unsupported OS warning' is set
to 'Disabled' (Automated)
Profile Applicability:
Rationale:
Users will be notified if the Operating System software is no longer supported.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SuppressUnsupportedOSWarning
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Suppress the unsupported OS warning
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Warnings will appear on such unsupported computers or operating systems.)
Page 296
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 297
1.131 (L2) Ensure 'Tab Services enabled' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Enabling tab services sends tab data to a third-party cloud service, which could lead to
sensitive data being exposed.
Impact:
The Microsoft Edge browser will not be able to help users with tab organization.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TabservicesEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Tab
Services enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Tab information will be sent to the service to gather suggestions to help with
tab organization.)
Page 298
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#tabservicesEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 299
1.132 (L2) Ensure 'Text prediction enabled by default' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling text predictions could allow data to be transmitted to a third-party cloud
service, which could lead to sensitive data being exposed.
Impact:
Text predictions will not be provided in eligible text fields. Sites may still provide their
own text predictions.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TextPredictionEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Text
prediction enabled by default
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Text predictions will be provided for eligible text fields.)
Page 300
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#textpredictionEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 301
1.133 (L1) Ensure 'Wait for Internet Explorer mode tabs to
completely unload before ending the browser session' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Enabling this policy can cause stability and performance issues, and Microsoft Edge
processes may remain active in the background with no visible windows if the webpage
or plugin prevents Internet Explorer from unloading. This policy should only be used if
your organization depends on a plugin that requires this behavior.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationAlwayswaitFo
rUnload
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Wait
for Internet Explorer mode tabs to completely unload before ending the
browser session
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Page 302
Default Value:
Disabled. (Microsoft Edge will not always wait for Internet Explorer mode tabs to fully
unload before ending the browser session.)
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#InternetExplorerIntegrationAlwayswaitForUnload
CIS Controls:
Page 303
1.134 (L1) Ensure 'Wallet Donation Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:
Rationale:
Allowing users the ability to use the wallet donation feature in Microsoft Edge could lead
to sensitive data being exposed.
Impact:
The wallet donation feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:WalletDonationEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable wallet donation in Microsoft Edge.
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the wallet donation feature in Microsoft Edge.)
Page 304
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#walletdonationenabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 305
1.135 (L2) Ensure 'Enable QR Code Generator' is set to
'Disabled' (Automated)
Profile Applicability:
Rationale:
Allowing users the ability to use the QR code generator feature in Microsoft Edge could
lead to sensitive data being exposed.
Impact:
The QR code generator feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:QRCodeGeneratorEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable QR Code Generator
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the QR code generator feature in Microsoft Edge.)
References:
1. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-
policies#qrcodegeneratorenabled
Page 306
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 307
2 Microsoft Edge - Default Settings (users can override)
This section is intentionally blank and exists to ensure the structure of Microsoft Edge
benchmark is consistent.
These policy settings may be overridden by the user therefore no policy configurations
are recommended for this section.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
3.1 Applications
Page 308
3.1.1 (L1) Ensure 'Update policy override default' is set to
'Enabled: Always allow updates (recommended)' (Automated)
Profile Applicability:
Page 309
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Always allow updates (recommended) or Enabled: Automatic
silent updates only:
Computer Configuration\Polices\Administrative Templates\Microsoft Edge
Update\Applications\Update policy override default
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Microsoft Edge Update handles available updates as specified by the Update policy
override policy.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 310
3.2 Microsoft Edge WebView2 Runtime
This section contains recommendations for Microsoft Edge Microsoft Edge WebView2
Runtime.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
3.3 Preferences
This section contains recommendations for Microsoft Edge Microsoft Edge Preferences.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).
Page 311
3.3.1 (L1) Ensure 'Auto-update check period override' is set to
any value except '0' (Automated)
Profile Applicability:
Rationale:
Automatic updates can help ensure that the computers in the environment will always
have the most recent critical updates and can decrease the amount of time the system
will remain vulnerable between updates and patches.
Impact:
If using a third-party for patching, an exception to this recommendation will be needed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD any value except 0.
HKLM\SOFTWARE\Policies\Microsoft\EdgeUpdate:AutoUpdateCheckPeriodMinutes
Remediation:
To establish the recommended configuration via GP, set the following UI path to any
value except 0:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge
Update\Preferences\Auto-update check period override
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
1400 (10 hours)
Page 312
References:
1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#CryptoWalletEnabled
CIS Controls:
Page 313
4 Microsoft Edge WebView2
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template
MSEdgeWebView2.admx/adml that is included with the Microsoft Edge v87
Administrative Templates (or newer).
Page 314
Appendix: Summary Table
CIS Benchmark Recommendation Set
Correctly
Yes No
1 Microsoft Edge
1.2 Cast
1.3.1 (L2) Ensure 'Allow read access via the File System API
on these sites' is set to 'Disabled' (Automated)
1.3.4 (L2) Ensure 'Control use of the File System API for
reading' is set to 'Enabled: Don't allow any site to request
read access to files and directories via the File System
API' (Automated)
1.3.5 (L1) Ensure 'Control use of the File System API for
writing' is set to 'Enabled: Don't allow any site to request
write access to files and directories' (Automated)
1.3.6 (L2) Ensure 'Control use of the Web Bluetooth API' is set
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
(Automated)
Page 315
CIS Benchmark Recommendation Set
Correctly
Yes No
1.7 Experimentation
1.8 Extensions
Page 316
CIS Benchmark Recommendation Set
Correctly
Yes No
1.14 Manageability
1.18 Performance
Page 317
CIS Benchmark Recommendation Set
Correctly
Yes No
1.20 Printing
Page 318
CIS Benchmark Recommendation Set
Correctly
Yes No
1.27 (L1) Ensure 'Ads setting for sites with intrusive ads' is set
to 'Enabled: Block ads on sites with intrusive ads.'
(Automated)
Page 319
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 320
CIS Benchmark Recommendation Set
Correctly
Yes No
1.61 (L1) Ensure 'Clear history for IE and IE mode every time
you exit' is set to 'Disabled' (Automated)
Page 321
CIS Benchmark Recommendation Set
Correctly
Yes No
1.68 (L1) Ensure 'Configure the list of names that will bypass
the HSTS policy check' is set to 'Disabled' (Automated)
1.69 (L1) Ensure 'Configure the list of types that are excluded
from synchronization' is set to 'Enabled' (Automated)
Page 322
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 323
CIS Benchmark Recommendation Set
Correctly
Yes No
1.100 (L1) Ensure 'Enable site isolation for every site' is set to
'Enabled' (Automated)
Page 324
CIS Benchmark Recommendation Set
Correctly
Yes No
1.114 (L2) Ensure 'Let users snip a Math problem and get the
solution with a step-by-step explanation in Microsoft
Edge' is set to 'Disabled' (Automated)
Page 325
CIS Benchmark Recommendation Set
Correctly
Yes No
1.120 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000' (Automated)
Page 326
CIS Benchmark Recommendation Set
Correctly
Yes No
3.1 Applications
3.3 Preferences
Page 327
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 328
Appendix: Change History
Date Version Changes for this version
Page 329
Date Version Changes for this version
09/19/2022 1.1.0 REMOVE - (L2) Ensure 'Default Adobe Flash setting' is set to
'Enabled: Block the Adobe Flash plug-in'
Ticket #15953
09/19/2022 1.1.0 ADD - (L2) Ensure 'Control use of the Headless Mode' is set
to 'Disabled'
Ticket #15955
09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enable browser legacy extension point
blocking' is set to 'Enabled'
Ticket #15987
Page 330
Date Version Changes for this version
09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Configure whether form data and HTTP
headers will be sent when entering or exiting Internet
Explorer mode' is set to 'Enabled: Do not send form data or
headers'
Ticket #16203
09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enable warnings for insecure forms' is
set to 'Enabled'
Ticket #16205
09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enhance the security state in Microsoft
Edge' is set to 'Enabled: Balanced mode'
Ticket #16206
09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Let users snip a Math problem and get
the solution with a step-by-step explanation in Microsoft
Edge' is set to 'Disabled'
Ticket #16208"
Page 331
Date Version Changes for this version
09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Show the Reload in Internet Explorer
mode button in the toolbar' is set to 'Disabled'
Ticket #16211
09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Allow read access via the File System
API on these sites' is set to 'Disabled'
Ticket #16213
09/19/2022 1.1.0 ADD - 1.3 (L1) Ensure 'Choose whether users can receive
customized background images and text, suggestions,
notifications, and tips for Microsoft services' is set to
'Disabled'
Ticket #16214
09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Control use of JavaScript JIT' is set to
'Disabled'
Ticket #16215
09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Control use of the File System API for
reading' is set to 'Enabled: Don't allow any site to request
read access to files and directories'
Ticket #16216
09/19/2022 1.1.0 ADD - 1.3 (L1) Ensure 'Control use of the File System API for
writing' is set to 'Enabled: Don't allow any site to request write
access to files and directories'
Ticket #16217
09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Control use of the WebHID API' is set
to 'Enabled: Do not allow any site to request access to HID
devices via the WebHID API'
Ticket #16218
Page 332
Date Version Changes for this version
09/19/2022 1.1.0 ADD - 1.5 (L1) Ensure 'Configure users ability to override
feature flags' is set to 'Enabled: Prevent users from
overriding feature flags'
Ticket #16220
09/19/2022 1.1.0 ADD - 1.7 (L1) Ensure 'Allow Basic authentication for HTTP'
is set to 'Disabled'
Ticket #16221
09/19/2022 1.1.0 ADD - 1.14 (L1) Ensure 'Enable startup boost' is set to
'Disabled'
Ticket #16222
09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Allow features to download assets from
the Asset Delivery Service' is set to 'Disabled'
Ticket #16223
Page 333
Date Version Changes for this version
09/19/2022 1.1.0 ADD - 1.3 (L1) Ensure 'Control use of insecure content
exceptions' is set to 'Enabled: Do not allow any site to load
mixed content'
Ticket #16280
09/19/2022 1.1.0 ADD - 3.1 (L1) Ensure 'Update policy override default' is set
to 'Enabled: Always allow updates (recommended)'
Ticket #16286
09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Control use of the Serial API' is set to
'Enable: Do not allow any site to request access to serial
ports via the Serial API'
Ticket #16350
09/21/2023 2.0.0 UPDATE - 1.3.4 (L2) Ensure 'Control use of JavaScript JIT' is
set to 'Disabled'
Ticket #19626
Page 334
Date Version Changes for this version
09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Enable the linked account feature' is set
to 'Disabled'
Ticket #19528
09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Wait for Internet Explorer mode tabs to
completely unload before ending the browser session' is set
to 'Disabled'
Ticket #19526
Page 335
Date Version Changes for this version
09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Enable Drop feature in Microsoft Edge'
is set to 'Disabled'
Ticket #19507
09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Clear history for IE and IE mode every
time you exit' is set to 'Disabled'
Ticket #19502
Page 336
Date Version Changes for this version
09/21/2023 2.0.0 ADD – (L1) Ensure 'Allow import of data from other browsers
on each Microsoft Edge launch' is set to 'Disabled'
Ticket #19493
09/21/2023 2.0.0 UPDATE - 1.3 (L1) Ensure 'Control use of insecure content
exceptions' is set to 'Enabled: Do not allow any site to load
mixed content'
Ticket #19292
Page 337
Date Version Changes for this version
07/19/2024 3.0.0 UPDATE - 1.3 (L2) Ensure 'Control use of the File System
API for reading' is set to 'Enabled: Don't allow any site to
request read access to files and directories' TO 'Enabled:
Don't allow any site to request read access to files and
directories via the File
Ticket #20081
07/19/2024 3.0.0 UPDATE - 1.3 (L2) Ensure 'Control use of the Web Bluetooth
API' is set to 'Enabled: Do not allow any site to request
access to Bluetooth' TO 'Enabled: Do not allow any site to
request access to Bluetooth devices via the Web Bluetooth
API'
Ticket #20082
07/19/2024 3.0.0 RENAME - 1.7 (L1) Allow cross-origin HTTP Basic Auth
prompts TO Allow cross-origin HTTP Authentication prompts
Ticket #20095
07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Compose is enabled for writing on the
web' is set to 'Disabled'
Ticket #21511
Page 338
Date Version Changes for this version
07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to
'Disabled'
Ticket #21517
07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Enable the Search bar' is set to
'Disabled'
Ticket #21520
07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Enable upload files from mobile in
Microsoft Edge desktop' is set to 'Disabled'
Ticket #21521
07/19/2024 3.0.0 REMOVE - 1.3 (L1) Ensure 'Choose whether users can
receive customized background images and text,
suggestions, notifications, and tips for Microsoft services' is
set to 'Disabled'
Ticket #21525
Page 339
Date Version Changes for this version
07/19/2024 3.0.0 ADD - 1.3 (L1) Ensure 'Default setting for third-party storage
partitioning' is set to 'Enabled: Block third-party storage
partitioning from being enabled.'
Ticket #21595
07/19/2024 3.0.0 ADD - 1.9 (L1) Ensure 'Enable Gamer Mode' is set to
'Disabled'
Ticket #21597
07/19/2024 3.0.0 UPDATE - 3.1 (L1) Ensure 'Update policy override default' is
set to 'Enabled: Always allow updates' TO or Higher
Ticket #21974
07/19/2024 3.0.0 ADD - 1.8 (L1) Ensure 'Blocks external extensions from being
installed' is set to 'Enabled'
Ticket #22029
07/19/2024 3.0.0 ADD - 1.26 (L1) Ensure 'Disable Bing chat entry-points on
Microsoft Edge Enterprise new tab page' is set to 'Disabled'
Ticket #22146
Page 340