CIS_Microsoft_Edge_Benchmark_v3.0.0

Download as pdf or txt
Download as pdf or txt
You are on page 1of 341

CIS Microsoft Edge

Benchmark
v3.0.0 - 07-19-2024
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/

Page 1
Table of Contents
Terms of Use ................................................................................................................. 1
Table of Contents .......................................................................................................... 2
Overview ........................................................................................................................ 8
Intended Audience................................................................................................................. 8
Consensus Guidance ............................................................................................................ 9
Typographical Conventions .................................................................................................10
Recommendation Definitions ..................................................................................... 11
Title ........................................................................................................................................11
Assessment Status...............................................................................................................11
Automated ............................................................................................................................................ 11
Manual ................................................................................................................................................... 11
Profile ....................................................................................................................................11
Description ............................................................................................................................11
Rationale Statement .............................................................................................................11
Impact Statement ..................................................................................................................12
Audit Procedure ....................................................................................................................12
Remediation Procedure........................................................................................................12
Default Value .........................................................................................................................12
References ............................................................................................................................12
CIS Critical Security Controls® (CIS Controls®) ..................................................................12
Additional Information..........................................................................................................12
Profile Definitions .................................................................................................................13
Acknowledgements ..............................................................................................................14
Recommendations ...................................................................................................... 15
1 Microsoft Edge ...................................................................................................................15
1.1 Application Guard settings ........................................................................................................... 15
1.2 Cast ................................................................................................................................................. 15
1.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled' (Automated) ................................ 16
1.3 Content Settings ............................................................................................................................ 18
1.3.1 (L2) Ensure 'Allow read access via the File System API on these sites' is set to
'Disabled' (Automated) .............................................................................................................. 19
1.3.2 (L1) Ensure 'Control use of insecure content exceptions' is set to 'Enabled: Do not allow
any site to load mixed content' (Automated) ............................................................................. 21
1.3.3 (L2) Ensure 'Control use of JavaScript JIT' is set to 'Enabled: Do not allow any site to run
JavaScript JIT' (Automated) ...................................................................................................... 23

Page 2
1.3.4 (L2) Ensure 'Control use of the File System API for reading' is set to 'Enabled: Don't
allow any site to request read access to files and directories via the File System API'
(Automated) .............................................................................................................................. 25
1.3.5 (L1) Ensure 'Control use of the File System API for writing' is set to 'Enabled: Don't allow
any site to request write access to files and directories' (Automated) ...................................... 27
1.3.6 (L2) Ensure 'Control use of the Web Bluetooth API' is set to 'Enabled: Do not allow any
site to request access to Bluetooth devices via the Web Bluetooth API' (Automated)............. 29
1.3.7 (L2) Ensure 'Control use of the WebHID API' is set to 'Enabled: Do not allow any site to
request access to HID devices via the WebHID API' (Automated) .......................................... 31
1.3.8 (L1) Ensure 'Default automatic downloads setting' is set to 'Enabled: Don´t allow any
website to perform automatic downloads' (Automated) ............................................................ 33
1.3.9 (L1) Ensure 'Default geolocation setting' is set to 'Enabled: Don't allow any site to track
users' physical location' (Automated) ....................................................................................... 35
1.3.10 (L2) Ensure 'Default setting for third-party storage partitioning' is set to 'Enabled: Block
third-party storage partitioning from being enabled.' (Automated) ........................................... 37
1.4 Default search provider ................................................................................................................. 39
1.5 Edge Website Typo Protection settings ...................................................................................... 39
1.5.1 (L1) Ensure 'Configure Edge Website Typo Protection' is set to 'Enabled' (Automated) 40
1.6 Edge Workspaces settings ........................................................................................................... 42
1.7 Experimentation ............................................................................................................................. 42
1.7.1 (L1) Ensure 'Configure users ability to override feature flags' is set to 'Enabled: Prevent
users from overriding feature flags' (Automated) ...................................................................... 43
1.8 Extensions ...................................................................................................................................... 45
1.8.1 (L1) Ensure 'Blocks external extensions from being installed' is set to 'Enabled'
(Automated) .............................................................................................................................. 46
1.8.2 (L2) Ensure 'Configure extension management settings' is set to 'Enabled: *'
(Automated) .............................................................................................................................. 48
1.9 Games settings .............................................................................................................................. 50
1.9.1 Ensure 'Enable Gamer Mode' is set to 'Disabled' (Automated) ....................................... 51
1.10 HTTP authentication .................................................................................................................... 53
1.10.1 (L1) Ensure 'Allow Basic authentication for HTTP' is set to 'Disabled' (Automated) ..... 54
1.10.2 (L1) Ensure 'Allow cross-origin HTTP Authentication prompts' is set to 'Disabled'
(Automated) .............................................................................................................................. 56
1.10.3 (L2) Ensure 'Supported authentication schemes' is set to 'Enabled: ntlm, negotiate'
(Automated) .............................................................................................................................. 58
1.11 Identity and sign-in ...................................................................................................................... 60
1.11.1 (L1) Ensure 'Enable the linked account feature' is set to 'Disabled' (Automated) ......... 61
1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled' (Automated) ......................... 63
1.12 Immersive Reader settings ......................................................................................................... 65
1.13 Kiosk Mode settings .................................................................................................................... 65
1.14 Manageability ............................................................................................................................... 65
1.15 Native Messaging......................................................................................................................... 65
1.16 Network settings .......................................................................................................................... 65
1.17 Password manager and protection ............................................................................................ 65
1.17.1 (L1) Ensure 'Enable saving passwords to the password manager' is set to 'Disabled'
(Automated) .............................................................................................................................. 66
1.18 Performance ................................................................................................................................. 68
1.18.1 (L1) Ensure 'Enable startup boost' is set to 'Disabled' (Automated) .............................. 69
1.19 Permit or deny screen capture ................................................................................................... 71
1.20 Printing ......................................................................................................................................... 71
1.21 Private Network Request Settings ............................................................................................. 71
1.21.1 (L1) Ensure 'Specifies whether to allow websites to make requests to more-private
network endpoints' is set to 'Disabled' (Automated) ................................................................. 72
1.22 Proxy server ................................................................................................................................. 74
1.23 Related Website Sets Settings ................................................................................................... 74
1.24 Sleeping tabs settings ................................................................................................................. 74

Page 3
1.25 SmartScreen settings .................................................................................................................. 74
1.25.1 (L1) Ensure 'Configure Microsoft Defender SmartScreen' is set to 'Enabled'
(Automated) .............................................................................................................................. 75
1.25.2 (L1) Ensure 'Configure Microsoft Defender SmartScreen to block potentially unwanted
apps' is set to 'Enabled' (Automated) ....................................................................................... 77
1.25.3 (L1) Ensure 'Enable Microsoft Defender SmartScreen DNS requests' is set to 'Disabled'
(Automated) .............................................................................................................................. 79
1.25.4 (L1) Ensure 'Force Microsoft Defender SmartScreen checks on downloads from trusted
sources' is set to 'Enabled' (Automated) ................................................................................... 81
1.25.5 (L1) Ensure 'Prevent bypassing Microsoft Defender SmartScreen prompts for sites' is
set to 'Enabled' (Automated) ..................................................................................................... 83
1.25.6 (L1) Ensure 'Prevent bypassing of Microsoft Defender SmartScreen warnings about
downloads' is set to 'Enabled' (Automated) .............................................................................. 85
1.26 Startup, home page and new tab page ...................................................................................... 87
1.26.1 (L1) Ensure 'Disable Bing chat entry-points on Microsoft Edge Enterprise new tab page'
is set to 'Disabled' (Automated) ................................................................................................ 88
1.27 (L1) Ensure 'Ads setting for sites with intrusive ads' is set to 'Enabled: Block ads on sites
with intrusive ads.' (Automated) ................................................................................................ 90
1.28 (L1) Ensure 'Allow download restrictions' is set to 'Enabled: Block malicious downloads'
(Automated) .............................................................................................................................. 92
1.29 (L2) Ensure 'Allow features to download assets from the Asset Delivery Service' is set to
'Disabled' (Automated) .............................................................................................................. 94
1.30 (L2) Ensure 'Allow file selection dialogs' is set to 'Disabled' (Automated) ........................ 96
1.31 (L1) Ensure 'Allow Google Cast to connect to Cast devices on all IP addresses' is set to
'Disabled' (Automated) .............................................................................................................. 98
1.32 (L1) Ensure 'Allow import of data from other browsers on each Microsoft Edge launch' is
set to 'Disabled' (Automated) .................................................................................................. 100
1.33 (L1) Ensure 'Allow importing of autofill form data' is set to 'Disabled' (Automated)........ 102
1.34 (L1) Ensure 'Allow importing of browser settings' is set to 'Disabled' (Automated) ........ 104
1.35 (L1) Ensure 'Allow importing of home page settings' is set to 'Disabled' (Automated) ... 106
1.36 (L1) Ensure 'Allow importing of payment info' is set to 'Disabled' (Automated).............. 108
1.37 (L1) Ensure 'Allow importing of saved passwords' is set to 'Disabled' (Automated) ...... 110
1.38 (L1) Ensure 'Allow importing of search engine settings' is set to 'Disabled' (Automated)
................................................................................................................................................ 112
1.39 (L1) Ensure 'Allow managed extensions to use the Enterprise Hardware Platform API' is
set to 'Disabled' (Automated) .................................................................................................. 114
1.40 (L2) Ensure 'Allow or block audio capture' is set to 'Disabled' (Automated) ................... 116
1.41 (L2) Ensure 'Allow or block video capture' is set to 'Disabled' (Automated) ................... 118
1.42 (L2) Ensure 'Allow or deny screen capture' is set to 'Disabled' (Automated) ................. 120
1.43 (L1) Ensure 'Allow personalization of ads, Microsoft Edge, search, news and other
Microsoft services by sending browsing history, favorites and collections, usage and other
browsing data to Microsoft' is set to 'Disabled' (Automated) .................................................. 122
1.44 (L1) Ensure 'Allow queries to a Browser Network Time service' is set to 'Enabled'
(Automated) ............................................................................................................................ 124
1.45 (L1) Ensure 'Allow remote debugging' is set to 'Disabled' (Automated) ......................... 126
1.46 (L1) Ensure 'Allow the audio sandbox to run' is set to 'Enabled' (Automated) ............... 128
1.47 (L2) Ensure 'Allow unconfigured sites to be reloaded in Internet Explorer mode' is set to
'Disabled' (Automated) ............................................................................................................ 130
1.48 (L1) Ensure 'Allow user feedback' is set to 'Disabled' (Automated) ............................... 132
1.49 (L2) Ensure 'Allow users to open files using the ClickOnce protocol' is set to 'Disabled'
(Automated) ............................................................................................................................ 134
1.50 (L2) Ensure 'Allow users to open files using the DirectInvoke protocol' is set to 'Disabled'
(Automated) ............................................................................................................................ 136
1.51 (L2) Ensure 'Allow users to proceed from the HTTPS warning page' is set to 'Disabled'
(Automated) ............................................................................................................................ 138

Page 4
1.52 (L1) Ensure 'Allow websites to query for available payment methods' is set to 'Disabled'
(Automated) ............................................................................................................................ 140
1.53 (L2) Ensure 'AutoLaunch Protocols Component Enabled' is set to 'Disabled' (Automated)
................................................................................................................................................ 142
1.54 (L1) Ensure 'Automatically import another browser's data and settings at first run' is set to
'Enabled: Disables automatic import, and the import section of the first-run experience is
skipped' (Automated) .............................................................................................................. 144
1.55 (L1) Ensure 'Automatically open downloaded MHT or MHTML files from the web in
Internet Explorer mode' is set to 'Disabled' (Automated) ........................................................ 146
1.56 (L2) Ensure 'Block third party cookies' is set to 'Enabled' (Automated) ......................... 148
1.57 (L1) Ensure 'Block tracking of users' web-browsing activity' is set to 'Enabled: Balanced
(Blocks harmful trackers and trackers from sites user has not visited; content and ads will be
less personalized)' or higher (Automated) .............................................................................. 150
1.58 (L2) Ensure 'Browser sign-in settings' is set to 'Enabled: Disable browser sign-in'
(Automated) ............................................................................................................................ 152
1.59 (L1) Ensure 'Clear browsing data when Microsoft Edge closes' is set to 'Disabled'
(Automated) ............................................................................................................................ 154
1.60 (L1) Ensure 'Clear cached images and files when Microsoft Edge closes' is set to
'Disabled' (Automated) ............................................................................................................ 156
1.61 (L1) Ensure 'Clear history for IE and IE mode every time you exit' is set to 'Disabled'
(Automated) ............................................................................................................................ 158
1.62 (L1) Ensure 'Compose is enabled for writing on the web' is set to 'Disabled' (Automated)
................................................................................................................................................ 160
1.63 (L1) Ensure 'Configure browser process code integrity guard setting' is set to 'Enabled:
Enable code integrity guard enforcement in the browser process.' (Automated) ................... 162
1.64 (L1) Ensure 'Configure InPrivate mode availability' is set to 'Enabled: InPrivate mode
disabled' (Automated) ............................................................................................................. 164
1.65 (L2) Ensure 'Configure Online Text To Speech' is set to 'Disabled' (Automated) .......... 166
1.66 (L1) Ensure 'Configure Related Matches in Find on Page' is set to 'Disabled' (Automated)
................................................................................................................................................ 168
1.67 (L2) Ensure 'Configure Speech Recognition' is set to 'Disabled' (Automated) ............... 170
1.68 (L1) Ensure 'Configure the list of names that will bypass the HSTS policy check' is set to
'Disabled' (Automated) ............................................................................................................ 172
1.69 (L1) Ensure 'Configure the list of types that are excluded from synchronization' is set to
'Enabled' (Automated)............................................................................................................. 174
1.70 (L1) Ensure 'Configure the Share experience' is set to 'Enabled: Don't allow using the
Share experience' (Automated) .............................................................................................. 176
1.71 (L1) Ensure 'Configure whether form data and HTTP headers will be sent when entering
or exiting Internet Explorer mode' is set to 'Enabled: Do not send form data or headers'
(Automated) ............................................................................................................................ 178
1.72 (L1) Ensure 'Continue running background apps after Microsoft Edge closes' is set to
'Disabled' (Automated) ............................................................................................................ 180
1.73 (L1) Ensure 'Control communication with the Experimentation and Configuration Service'
is set to 'Enabled: Disable communication with the Experimentation and Configuration Service'
(Automated) ............................................................................................................................ 182
1.74 (L2) Ensure 'Control use of the Headless Mode' is set to 'Disabled' (Automated) ......... 184
1.75 (L2) Ensure 'Control use of the Serial API' is set to 'Enable: Do not allow any site to
request access to serial ports via the Serial API' (Automated) ............................................... 186
1.76 (L2) Ensure 'Control where security restrictions on insecure origins apply' is set to
'Disabled' (Automated) ............................................................................................................ 188
1.77 (L2) Ensure 'Default sensors setting' is set to 'Enabled: Do not allow any site to access
sensors' (Automated) .............................................................................................................. 190
1.78 (L1) Ensure 'Delete old browser data on migration' is set to 'Disabled' (Automated) ..... 192
1.79 (L1) Ensure 'Disable saving browser history' is set to 'Disabled' (Automated) ............... 194
1.80 (L1) Ensure 'Disable synchronization of data using Microsoft sync services' is set to
'Enabled' (Automated)............................................................................................................. 196

Page 5
1.81 (L1) Ensure 'DNS interception checks enabled' is set to 'Enabled' (Automated) ........... 198
1.82 (L1) Ensure 'Edge 3P SERP Telemetry Enabled' is set to 'Disabled' (Automated) ........ 200
1.83 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to 'Disabled' (Automated) .................. 202
1.84 (L1) Ensure 'Enable AutoFill for addresses' is set to 'Disabled' (Automated) ................. 204
1.85 (L1) Ensure 'Enable AutoFill for payment instructions' is set to 'Disabled' (Automated) 206
1.86 (L1) Ensure 'Enable browser legacy extension point blocking' is set to 'Enabled'
(Automated) ............................................................................................................................ 208
1.87 (L1) Ensure 'Enable component updates in Microsoft Edge' is set to 'Enabled'
(Automated) ............................................................................................................................ 210
1.88 (L1) Ensure 'Enable CryptoWallet feature' is set to 'Disabled' (Automated) ................... 212
1.89 (L1) Ensure 'Enable deleting browser and download history' is set to 'Disabled'
(Automated) ............................................................................................................................ 214
1.90 (L1) Ensure 'Enable Discover access to page contents for AAD profiles' is set to
'Disabled' (Automated) ............................................................................................................ 216
1.91 (L2) Ensure 'Enable Drop feature in Microsoft Edge' is set to 'Disabled' (Automated) .. 218
1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is set to 'Disabled' (Automated) 220
1.93 (L1) Ensure 'Enable globally scoped HTTP auth cache' is set to 'Disabled' (Automated)
................................................................................................................................................ 222
1.94 (L2) Ensure 'Enable guest mode' is set to 'Disabled' (Automated) ................................. 224
1.95 (L1) Ensure 'Enable network prediction' is set to 'Enabled: Don't predict network actions
on any network connection' (Automated) ............................................................................... 226
1.96 (L1) Ensure 'Enable profile creation from the Identity flyout menu or the Settings page' is
set to 'Disabled' (Automated) .................................................................................................. 228
1.97 (L1) Ensure 'Enable resolution of navigation errors using a web service' is set to
'Disabled' (Automated) ............................................................................................................ 230
1.98 (L2) Ensure 'Enable search suggestions' is set to 'Disabled' (Automated) .................... 232
1.99 (L1) Ensure 'Enable security warnings for command-line flags' is set to 'Enabled'
(Automated) ............................................................................................................................ 234
1.100 (L1) Ensure 'Enable site isolation for every site' is set to 'Enabled' (Automated) ......... 236
1.101 (L1) Ensure 'Enable tab organization suggestions' is set to 'Disabled' (Automated) ... 238
1.102 (L1) Ensure 'Enable the Search bar' is set to 'Disabled' (Automated) .......................... 240
1.103 (L2) Ensure 'Enable Translate' is set to 'Disabled' (Automated) .................................. 242
1.104 (L1) Ensure 'Enable upload files from mobile in Microsoft Edge desktop' is set to
'Disabled' (Automated) ............................................................................................................ 244
1.105 (L1) Ensure 'Enable use of ephemeral profiles' is set to 'Disabled' (Automated) ......... 246
1.106 (L1) Ensure 'Enable warnings for insecure forms' is set to 'Enabled' (Automated) ...... 248
1.107 (L1) Ensure 'Enables DALL-E themes generation' is set to 'Disabled' (Automated) .... 250
1.108 (L2) Ensure 'Enforce Bing SafeSearch' is set to 'Enabled: Configure moderate search
restrictions in Bing' (Automated) ............................................................................................. 252
1.109 (L2) Ensure 'Enforce Google SafeSearch' is set to 'Enabled' (Automated).................. 254
1.110 (L1) Ensure 'Enhance the security state in Microsoft Edge' is set to 'Enabled: Balanced
mode' or higher (Automated) .................................................................................................. 256
1.111 (L2) Ensure 'Enhanced Security Mode configuration for Intranet zone sites' is set to
'Disabled' (Automated) ............................................................................................................ 258
1.112 (L1) Ensure 'Hide the First-run experience and splash screen' is set to 'Enabled'
(Automated) ............................................................................................................................ 260
1.113 (L1) Ensure 'In-app support Enabled' is set to 'Disabled' (Automated) ........................ 262
1.114 (L2) Ensure 'Let users snip a Math problem and get the solution with a step-by-step
explanation in Microsoft Edge' is set to 'Disabled' (Automated) ............................................. 264
1.115 (L2) Ensure 'Live captions allowed' is set to 'Disabled' (Automated) ........................... 266
1.116 (L1) Ensure 'Manage exposure of local IP addresses by WebRTC' is set to 'Disabled'
(Automated) ............................................................................................................................ 268
1.117 (L1) Ensure 'Notify a user that a browser restart is recommended or required for
pending updates' is set to 'Enabled: Required - Show a recurring prompt to the user indicating
that a restart is required' (Automated) .................................................................................... 270

Page 6
1.118 (L1) Ensure 'Restrict exposure of local IP address by WebRTC' is set to 'Enabled: Allow
public interface over http default route. This doesn't expose the local IP address' (Automated)
................................................................................................................................................ 272
1.119 (L1) Ensure 'Set disk cache size, in bytes' is set to 'Enabled: 250609664' (Automated)
................................................................................................................................................ 274
1.120 (L1) Ensure 'Set the time period for update notifications' is set to 'Enabled: 86400000'
(Automated) ............................................................................................................................ 276
1.121 (L1) Ensure 'Shopping in Microsoft Edge Enabled' is set to 'Disabled' (Automated) ... 278
1.122 (L2) Ensure 'Show an "Always open" checkbox in external protocol dialog' is set to
'Disabled' (Automated) ............................................................................................................ 280
1.123 (L1) Ensure 'Show Microsoft Rewards experiences' is set to 'Disabled' (Automated) . 282
1.124 (L1) Ensure 'Show the Reload in Internet Explorer mode button in the toolbar' is set to
'Disabled' (Automated) ............................................................................................................ 284
1.125 (L1) Ensure 'Specifies whether SharedArrayBuffers can be used in a non cross-origin-
isolated context' is set to 'Disabled' (Automated) ................................................................... 286
1.126 (L2) Ensure 'Specify if online OCSP/CRL checks are required for local trust anchors' is
set to 'Enabled' (Automated) ................................................................................................... 288
1.127 (L2) Ensure 'Spell checking provided by Microsoft Editor' is set to 'Disabled'
(Automated) ............................................................................................................................ 290
1.128 (L1) Ensure 'Standalone Sidebar Enabled' is set to 'Disabled' (Automated) ................ 292
1.129 (L1) Ensure 'Suggest similar pages when a webpage can’t be found' is set to 'Disabled'
(Automated) ............................................................................................................................ 294
1.130 (L1) Ensure 'Suppress the unsupported OS warning' is set to 'Disabled' (Automated) 296
1.131 (L2) Ensure 'Tab Services enabled' is set to 'Disabled' (Automated) ........................... 298
1.132 (L2) Ensure 'Text prediction enabled by default' is set to 'Disabled' (Automated) ....... 300
1.133 (L1) Ensure 'Wait for Internet Explorer mode tabs to completely unload before ending
the browser session' is set to 'Disabled' (Automated) ............................................................ 302
1.134 (L1) Ensure 'Wallet Donation Enabled' is set to 'Disabled' (Automated) ...................... 304
1.135 (L2) Ensure 'Enable QR Code Generator' is set to 'Disabled' (Automated) ................. 306
2 Microsoft Edge - Default Settings (users can override) ................................................308
3 Microsoft Edge Update ....................................................................................................308
3.1 Applications ................................................................................................................................. 308
3.1.1 (L1) Ensure 'Update policy override default' is set to 'Enabled: Always allow updates
(recommended)' (Automated) ................................................................................................. 309
3.2 Microsoft Edge WebView2 Runtime ........................................................................................... 311
3.3 Preferences .................................................................................................................................. 311
3.3.1 (L1) Ensure 'Auto-update check period override' is set to any value except '0'
(Automated) ............................................................................................................................ 312
4 Microsoft Edge WebView2 ..............................................................................................314
Appendix: Summary Table ....................................................................................... 315
Appendix: Change History ....................................................................................... 329

Page 7
Overview
All CIS Benchmarks™ focus on technical configuration settings used to maintain and/or
increase the security of the addressed technology, and they should be used in
conjunction with other essential cyber hygiene tasks like:
• Monitoring the base operating system for vulnerabilities and quickly updating with
the latest security patches.
• Monitoring applications and libraries for vulnerabilities and quickly updating with
the latest security patches.

In the end, the CIS Benchmarks are designed as a key component of a comprehensive
cybersecurity program.
This document provides prescriptive guidance for establishing a secure configuration
posture for the Microsoft Edge Browser, also known as Microsoft Edge for Business.
This guide was tested against Microsoft Edge v125 on Windows 10 (Release 22H2)
operating system.
To obtain the latest version of this guide, please visit http://benchmarks.cisecurity.org. If
you have questions, comments, or have identified ways to improve this guide, please
write us at feedback@cisecurity.org.

Intended Audience
The CIS Microsoft Edge Benchmarks are written for Microsoft Windows Active Directory
domain-joined systems using Group Policy, not standalone/workgroup systems.
Adjustments/tailoring to some recommendations will be needed to maintain functionality
if attempting to implement CIS hardening on standalone systems.

Page 8
Consensus Guidance
This CIS Benchmark™ was created using a consensus review process comprised of a
global community of subject matter experts. The process combines real world
experience with data-based information to create technology specific guidance to assist
users to secure their environments. Consensus participants provide perspective from a
diverse set of backgrounds including consulting, software development, audit and
compliance, security research, operations, government, and legal.
Each CIS Benchmark undergoes two phases of consensus review. The first phase
occurs during initial Benchmark development. During this phase, subject matter experts
convene to discuss, create, and test working drafts of the Benchmark. This discussion
occurs until consensus has been reached on Benchmark recommendations. The
second phase begins after the Benchmark has been published. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the Benchmark. If you are interested in participating in the consensus
process, please visit https://workbench.cisecurity.org/.

Page 9
Typographical Conventions
The following typographical conventions are used throughout this guide:

Convention Meaning

Used for blocks of code, command, and


Stylized Monospace font script examples. Text should be interpreted
exactly as presented.

Used for inline code, commands, UI/Menu


Monospace font selections or examples. Text should be
interpreted exactly as presented.

Text set in angle brackets denote a variable


<Monospace font in brackets>
requiring substitution for a real value.

Used to reference other relevant settings,


CIS Benchmarks and/or Benchmark
Italic font
Communities. Also, used to denote the title
of a book, article, or other publication.

Additional information or caveats things like


Notes, Warnings, or Cautions (usually just
Bold font
the word itself and the rest of the text
normal).

Page 10
Recommendation Definitions
The following defines the various components included in a CIS recommendation as
applicable. If any of the components are not applicable it will be noted or the
component will not be included in the recommendation.

Title
Concise description for the recommendation's intended configuration.

Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual
steps to implement. Both statuses are equally important and are determined and
supported as defined below:

Automated
Represents recommendations for which assessment of a technical control can be fully
automated and validated to a pass/fail state. Recommendations will include the
necessary information to implement automation.

Manual
Represents recommendations for which assessment of a technical control cannot be
fully automated and requires all or some manual steps to validate that the configured
state is set as expected. The expected state can vary depending on the environment.

Profile
A collection of recommendations for securing a technology or a supporting platform.
Most benchmarks include at least a Level 1 and Level 2 Profile. Level 2 extends Level 1
recommendations and is not a standalone profile. The Profile Definitions section in the
benchmark provides the definitions as they pertain to the recommendations included for
the technology.

Description
Detailed information pertaining to the setting with which the recommendation is
concerned. In some cases, the description will include the recommended value.

Rationale Statement
Detailed reasoning for the recommendation to provide the user a clear and concise
understanding on the importance of the recommendation.

Page 11
Impact Statement
Any security, functionality, or operational consequences that can result from following
the recommendation.

Audit Procedure
Systematic instructions for determining if the target system complies with the
recommendation.

Remediation Procedure
Systematic instructions for applying recommendations to the target system to bring it
into compliance according to the recommendation.

Default Value
Default value for the given setting in this recommendation, if known. If not known, either
not configured or not defined will be applied.

References
Additional documentation relative to the recommendation.

CIS Critical Security Controls® (CIS Controls®)


The mapping between a recommendation and the CIS Controls is organized by CIS
Controls version, Safeguard, and Implementation Group (IG). The Benchmark in its
entirety addresses the CIS Controls safeguards of (v7) “5.1 - Establish Secure
Configurations” and (v8) '4.1 - Establish and Maintain a Secure Configuration Process”
so individual recommendations will not be mapped to these safeguards.

Additional Information
Supplementary information that does not correspond to any other field but may be
useful to the user.

Page 12
Profile Definitions
The following configuration profiles are defined by this Benchmark:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)

Items in this profile intend to:

o be the starting baseline for most organizations;


o be practical and prudent;
o provide a clear security benefit; and
o not inhibit the utility of the technology beyond acceptable means.

• Level 2 (L2) - High Security/Sensitive Data Environment (limited


functionality)

This profile extends the "Level 1 (L1)" profile. Items in this profile exhibit one or
more of the following characteristics:

o are intended for environments or use cases where security is more critical
than manageability and usability;
o may negatively inhibit the utility or performance of the technology; and
o limit the ability of remote management/access.

Note: Implementation of Level 2 requires that both Level 1 and Level 2 settings
are applied.

Page 13
Acknowledgements
This Benchmark exemplifies the great things a community of users, vendors, and
subject matter experts can accomplish through consensus collaboration. The CIS
community thanks the entire consensus team with special recognition to the following
individuals who contributed greatly to the creation of this guide:
Editor
Jennifer Jarose
Matthew Woods

Contributor
Haemish Edgerton
Caleb Eifert
William Ferguson
Uzoma Ifeakanwa
Daniel Jasiak
Patrick Stoeckle

Page 14
Recommendations
1 Microsoft Edge
This section contains recommendations for Microsoft Edge.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.1 Application Guard settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.2 Cast

This section contains recommendations for Microsoft Edge Cast settings.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 15
1.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting determines whether Google Cast is available to users.
The recommended state for this setting is: Disabled.
Note: When this setting is set to Disabled the Show the cast icon in the toolbar setting
is ignored as the icon is removed.
Rationale:
The use of Google Cast could allow users to show potentially sensitive information to
non-trusted devices. These devices could be in public areas.
Impact:
Users will not be able to utilize Google Cast and the icon will not be displayed in
Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnableMediaRouter

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Cast\Enable Google Cast
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 16
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-policies#enable-
google-cast

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 17
1.3 Content Settings

This section contains recommendations for Microsoft Edge Content settings.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 18
1.3.1 (L2) Ensure 'Allow read access via the File System API on
these sites' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows organizations to list the URL patterns that specify which sites
can ask users to grant them read access to files or directories in the host operating
system´s file system via the File System API.
The recommended state for this setting is: Disabled.
Note: Leaving this policy not configured allows the
_DefaultFileSystemReadGuardSetting (Control use of the File System API for reading)
to apply for all sites. This setting is configured in the Level 2 profile: Ensure 'Control use
of the File System API for reading' is set to 'Enabled: Don't allow any site to request
read access to files and directories'.
Note #2: URL patterns can´t conflict with _FileSystemReadBlockedForUrls (Block read
access via the File System API on these sites). Neither policy takes precedence if a
URL matches with both.
Rationale:
This API allows web apps to read or save changes directly to files and folders on user
devices. It also allows for the reading and writing files and the File System Access API
provides the ability to open a directory and enumerate its contents.
Allowing web apps the ability to enumerate the contents of a directory by reading or
saving changes directly to files and folders opens the organization to the possibility of
malicious content being saved directly to user devices.
Impact:
Users with creative roles that require read access to files and directories via the File
System API may need additional permissions granted for said roles.

Page 19
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge:FileSystemReadAskForUrls

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Allow read access via the File System API on these
sites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured. (´DefaultFileSystemReadGuardSetting´ (Control use of the File System
API for reading) applies for all sites, if it´s set. If not, users´ personal settings apply.)
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#filesystemreadaskforurls
2. https://web.dev/file-system-access/

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 20
1.3.2 (L1) Ensure 'Control use of insecure content exceptions' is
set to 'Enabled: Do not allow any site to load mixed content'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows for the configuration for users to add exceptions to allow
mixed content for specific sites.
The recommended state for this setting is: Enabled: Do not allow any site to
load mixed content
Note: This policy can be overridden for specific URL patterns using the
insecurecontentAllowedForUrls (Allow insecure content on specified sites) and
insecurecontentBlockedForUrls (Block insecure content on specified sites) policies.
Rationale:
Allowing mixed (secure / insecure) content from a site can lead to malicious content
being loaded. Mixed content occurs if the initial request is secure over HTTPS, but
HTTPS and HTTP content is subsequently loaded to display the web page. HTTPS
content is secure. HTTP content is insecure.
Impact:
Users will not be able to add exceptions for mixed content webpages.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultinsecurecontentSetting

Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to load mixed content:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Content Settings\Control use of insecure content exceptions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 21
Default Value:
Enabled. (Users will be allowed to add exceptions to allow blockable mixed content and
disable autoupgrades for optionally blockable mixed content.)
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.3 Maintain and Enforce Network-Based URL Filters


Enforce and update network-based URL filters to limit an enterprise asset from
v8 connecting to potentially malicious or unapproved websites. Example ● ●
implementations include category-based filtering, reputation-based filtering, or
through the use of block lists. Enforce filters for all enterprise assets.

7.5 Subscribe to URL-Categorization service


v7 Subscribe to URL categorization services to ensure that they are up-to-date with
the most recent website category definitions available. Uncategorized sites shall be
● ●
blocked by default.

Page 22
1.3.3 (L2) Ensure 'Control use of JavaScript JIT' is set to
'Enabled: Do not allow any site to run JavaScript JIT' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting specifies whether Microsoft Edge will run the v8 JavaScript engine
with JIT (Just In Time) compiler. JIT is a complex pipeline of processes used to optimize
JavaScript code for performance.
Note: This policy can be overridden for specific URL patterns using the
JavaScriptJitAllowedForSites (Allow JavaScript to use JIT on these sites) and
JavaScriptJitBlockedForSites (Block JavaScript from using JIT on these sites) policies.
The recommended state for this setting is: Enabled: Do not allow any site to
run JavaScript JIT.

Rationale:
Microsoft's research has revealed that attackers usually target the JavaScript engine
called “Just-In-Time (JIT) compilation” to hack web browsers. Disabling the JavaScript
just-in-time (JIT) compiler prevents attackers from hacking into systems that Microsoft
Edge uses.
Impact:
Disabling the JavaScript JIT will mean that Microsoft Edge may render web content
more slowly, and may also disable parts of JavaScript including WebAssembly. Users
may experience slower rendering of web content.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultJavaScriptJitSetting

Page 23
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to run JavaScript JIT:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content Settings\Control use of JavaScript JIT
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
References:

1. https://www.onmsft.com/news/microsoft-edges-super-duper-secure-mode-
addresses-javascript-vulnerabilities-in-a-brand-new-way

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 24
1.3.4 (L2) Ensure 'Control use of the File System API for reading'
is set to 'Enabled: Don't allow any site to request read access to
files and directories via the File System API' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting determines whether websites can ask for read access to the host
operating system´s file system using the File System API.
The recommended state for this setting is: Enabled: Don't allow any site to
request read access to files and directories via the File System API.

Rationale:
There is a large category of attack vectors that are opened up by allowing web
applications access to files. By setting this policy to Enabled: Don't allow any site
to request read access to files and directories implements additional
protections to safeguard against accidental sharing of sensitive information contained in
locals files.
Impact:
Users with creative roles that require the File System API access permission to read
files for photo, video, and text editors or for creating integrated development
environments will need additional permissions granted based on their role.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultFileSystemReadGuardSetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow any site to request read access to files and
directories via the File System API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the File System API for reading
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 25
Default Value:
AskFileSystemRead (3) = Allow sites to ask the user to grant read access to files and
directories via the File System API. (Websites can ask for access. Users can change
this setting.)
References:

1. https://docs.microsoft.com/en-us/microsoft-edge/progressive-web-apps-
chromium/how-to/handle-files

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 26
1.3.5 (L1) Ensure 'Control use of the File System API for writing'
is set to 'Enabled: Don't allow any site to request write access to
files and directories' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting specifies whether websites can ask for write access to the host
operating system´s filesystem using the File System API. By default, websites can ask
for access. Users can change this setting. By setting this policy to (2), access is denied.
The recommended state for this setting is: Enabled: Don't allow any site to
request write access to files and directories.

Rationale:
There is a large category of attack vectors that are opened up by allowing web
applications access to files. By setting this policy to Enabled: Don't allow any site
to request write access to files and directories implements additional
protection to safeguard against accidental sharing of sensitive information contained in
local files.
Impact:
Users with creative roles that require the File System API access permission to write
files for photo, video, and text editors or for creating integrated development
environments will need additional permissions granted based on their role.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge:DefaultFileSystemWriteGua
rdSetting

Page 27
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow any site to request write access to files and
directories:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the File System API for writing
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
AskFileSystemWrite (3) = Allow sites to ask the user to grant write access to files
and directories
References:

1. https://docs.microsoft.com/en-us/microsoft-edge/progressive-web-apps-
chromium/how-to/handle-files

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 28
1.3.6 (L2) Ensure 'Control use of the Web Bluetooth API' is set to
'Enabled: Do not allow any site to request access to Bluetooth
devices via the Web Bluetooth API' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether websites can access connected Bluetooth devices.
The recommended state for this setting is: Enabled: Do not allow any site to
request access to Bluetooth devices via the Web Bluetooth API.

Rationale:
Web Bluetooth could potentially be used for attacks that may bypass other controls
regarding connected Bluetooth hardware including microphones, cameras, and other
devices which information could be gathered from or inappropriately utilzed.
Impact:
Websites will be unable to utilize connected Bluetooth devices via the API, this includes
web cameras, microphones, and other USB devices.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultWebBluetoothGuardSetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to request access to Bluetooth devices
via the Web Bluetooth API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the Web Bluetooth API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled - Users will be asked whether websites can access any Bluetooth device.
Users may change this setting.

Page 29
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#defaultwebbluetoothguardsetting

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 30
1.3.7 (L2) Ensure 'Control use of the WebHID API' is set to
'Enabled: Do not allow any site to request access to HID devices
via the WebHID API' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting determines whether a website is able to ask for access to use the
WebHID API. The WebHID API allows websites to access alternative auxiliary
keyboards and exotic gamepads.
The recommended state for this setting is: Enabled: Do not allow any site to
request access to HID devices via the WebHID API.

Rationale:
Disabling the WebHID API prevents HID peripherals from exposing powerful
functionality that should not be made accessible to the page without explicit consent.
For instance, a HID peripheral may have sensors that allow it to collect information
about its surroundings; a device may store private information that should not be
revealed or overwritten. Operating systems typically do not restrict access to HID
devices from applications, and this access can occasionally be abused to damage the
device or corrupt the data stored on it.
Impact:
WebHID describes a wide array of devices that could be supported through HID,
including virtual reality controls, flight simulators, medical equipment, and more.
Disabling WebHID would require additional drivers or modification to enable support for
approved devices.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultWebHidGuardSetting

Page 31
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to request access to HID devices via
the WebHID API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Control use of the WebHID API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Allow site to ask the user to grant access to a HID device.
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#defaultwebhidguardsetting

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 32
1.3.8 (L1) Ensure 'Default automatic downloads setting' is set to
'Enabled: Don´t allow any website to perform automatic
downloads' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether websites can perform multiple downloads
successively without user interaction.
The recommended state for this setting is: Enabled: Don´t allow any website to
perform automatic downloads.

Rationale:
Unintentional malicious content could be downloaded without user interaction if
websites are allowed to perform automatic downloads.
Impact:
Websites will not be able to perform automatic downloads.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultAutomaticDownloadsSetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don´t allow any website to perform automatic downloads:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Default automatic downloads setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Multiple automatic downloads can be performed in all sites, and the user can
change this setting.)

Page 33
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#defaultautomaticDownloadsSetting

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 34
1.3.9 (L1) Ensure 'Default geolocation setting' is set to 'Enabled:
Don't allow any site to track users' physical location' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether a users' physical location can be tracked by
websites.
The recommended state for this setting is: Enabled: Don't allow any site to
track users' physical location.

Rationale:
Geolocation should not be shared with websites to ensure protection of the user's
privacy regarding location. Additionally, location information could lead to clues
regarding the user's network infrastructure surrounding the device they are utilizing.
Impact:
Location information will not be shared with websites in Microsoft Edge. This could have
an effect on websites that utilize this information for customized content.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultGeolocationSetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow any site to track users' physical location:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Content settings\Default geolocation setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Ask whenever a site wants to track users physical location.)

Page 35
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#defaultgeolocationsetting

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 36
1.3.10 (L2) Ensure 'Default setting for third-party storage
partitioning' is set to 'Enabled: Block third-party storage
partitioning from being enabled.' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting configures the use of third-party storage partitioning. When using
storage partitioning, a site cannot join data across different sites to track the user across
the web.
The recommended state for this setting is: Enabled: Block third-party storage
partitioning from being enabled..

Rationale:
Third-party storage partitioning can prevent certain types of side-channel cross-site
tracking.
Impact:
This setting may cause users to experience issues with sites they regularly visit that
already grant access to third-parties.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultThirdPartyStoragePartitioningSet
ting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Block third-party storage partitioning from being enabled.:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Cast\Default setting for third-party storage partitioning
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 37
Default Value:
Enabled: Allow. (Third-party storage partitioning is on by default for some users starting
with Microsoft Edge version 115.)
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#defaultthirdpartystoragepartitioningsetting

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 38
1.4 Default search provider

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.5 Edge Website Typo Protection settings

This section contains recommendations for Edge Website Typo Protection settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v96 Administrative Templates (or newer).
Note: In older versions of the ADMX/ADML templates, this section was named _
TyposquattingChecker settings_.

Page 39
1.5.1 (L1) Ensure 'Configure Edge Website Typo Protection' is set
to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures whether to turn on Edge TyposquattingChecker. The Edge
TyposquattingChecker provides warning messages to help protect users from potential
typo squatting sites. Typo squatting is a type of social engineering attack which targets
internet users who incorrectly type a URL into their web browser rather than using a
search engine. Typically, it involves tricking users into visiting malicious websites with
URLs that are common misspellings of legitimate websites.
The recommended state for this setting is: Enabled.

Rationale:
Edge TyposquattingChecker will provide a warning message and can help protect users
from potential typo squatting by alerting the user to the potential of accessing a
malicious site.
Impact:
Users will receive a warning message if they attempt to access a site deemed (by
Microsoft) a typosquatting site.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TyposquattingCheckerEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Edge
Website Typo Protection settings\Configure Edge Website Typo Protection
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 40
Default Value:
Enabled. (Users can choose whether to use Edge TyposquattingChecker.)
References:

1. https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#typosquattingcheckerenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 41
1.6 Edge Workspaces settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v96 Administrative Templates (or newer).

1.7 Experimentation

This section contains recommendations for Microsoft Edge Experimentation settings.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v93 Administrative Templates (or newer).

Page 42
1.7.1 (L1) Ensure 'Configure users ability to override feature flags'
is set to 'Enabled: Prevent users from overriding feature flags'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures users' ability to override state of feature flags. Feature
flags are settings a team can define that indicate whether a given set of features is
visible in the user experience and/or invoked within the functionality.
The recommended state for this setting is: Enabled: Prevent users from
overriding feature flags.

Rationale:
the user's ability to enter commands and to override programs should be limited at the
CLI in order to prevent users from altering systems configurations. Additionally, Feature
flags are not necessary for users, as they are used by the DevOps team during the
development and experimental process.
Impact:
It can be risky for experimental features to be allowed in an enterprise managed
environment because this can introduce bugs and security holes into systems, making it
easier for an attacker to gain access. It is generally preferred to only use production-
ready features.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:FeatureFlagoverridesControl

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Prevent users from overriding feature flags:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Experimentation\Configure users ability to override feature flags
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 43
Default Value:
Allow users to override feature flags.
References:

1. https://docs.microsoft.com/en-us/devops/operate/progressive-experimentation-
feature-flags

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 44
1.8 Extensions

This section contains recommendations for Microsoft Edge Extensions settings.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 45
1.8.1 (L1) Ensure 'Blocks external extensions from being installed'
is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting determines whether external extensions (an extension that is not
installed from the Chrome Web Store) can be installed.
The recommended state for this setting is: Enabled.

Rationale:
Allowing users to install extensions from other locations (not the Chrome Web Store)
can lead to malicious extensions being installed.
Impact:
User will only be allowed to install extension for the Chrome web store.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge:BlockExternalExtensions

Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Extensions\Blocks external extensions from being installed

Default Value:
Disabled. (Users can change the setting.)
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#blockexternalextensions

Page 46
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

2.3 Address Unauthorized Software


v8 Ensure that unauthorized software is either removed from use on enterprise
assets or receives a documented exception. Review monthly, or more
● ● ●
frequently.

Page 47
1.8.2 (L2) Ensure 'Configure extension management settings' is
set to 'Enabled: *' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls extension management settings for Microsoft Edge,
including any controlled by existing extension-related policies. This policy supersedes
any legacy policies that might be set.
The recommended state for this setting is: Enabled: *.
NOTE: This policy maps an extension ID or an update URL to its specific setting only. A
default configuration can be set for the special ID "*", which applies to all extensions
without a custom configuration in this policy. With an update URL, configuration applies
to extensions with the exact update URL stated in the extension manifest. If the
override_update_url flag is set to true, the extension is installed and updated using the
update URL specified in the ExtensionInstallForcelist (Control which extensions are
installed silently) policy or in update_url field in this policy. The flag override_update_url
is ignored if the update_url is the Edge Add-ons website update URL.
Note #2: For more granular control the ExtensionInstallForcelist and
ExtensionInstallAllowlist (Allow specific extensions to be installed) to allow or force
install of specific extensions even if the store is blocked using the JSON in the example.
{"update_url:https://clients2.google.com/service/update2/crx":{"installation_mode":"block
ed"}}
For more details, check out the detailed guide to ExtensionSettings policy available from
Microsoft at Detailed guide to the ExtensionSettings policy | Microsoft Learn.
Rationale:
Blocking extensions that could potentially allow remote control of the system through
the browser is a good security practice. If extensions are needed for securing the
browser, or for enterprise use, these can be enabled by configuring the setting Allow
specific extensions to be installed.
Impact:
Any installed extension will be removed unless it is specified on the extension allowlist,
if an organization is using any approved password managers ensure that the extension
is added to the allowlist.

Page 48
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of *.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ExtensionSettings

Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: *:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Extensions\Configure extension management settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured.
References:

1. https://go.microsoft.com/fwlink/?linkid=2161555

Additional Information:
Note: For Windows instances not joined to a Microsoft Active Directory domain and
macOS instances not managed via MDM or joined to a domain via MCX, forced
installation is limited to apps and extensions listed in the Microsoft Edge Add-ons
website.
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 49
1.9 Games settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v117 Administrative Templates (or newer).

Page 50
1.9.1 Ensure 'Enable Gamer Mode' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
Microsoft Edge Gamer Mode allows the personalize of browsers with gaming themes
and gives the option of enabling Efficiency Mode for PC gaming, the Gaming feed on
new tabs, sidebar apps for gamers, and more.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users the ability to use the gamer mode feature in Microsoft Edge could lead to
data leakage or intellectual property being exposed.
Impact:
The gamer mode feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:GamerModeEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Games
settings\Enable gamer mode in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the gamer mode feature in Microsoft Edge.)

Page 51
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#gamermodeenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 52
1.10 HTTP authentication

This section contains recommendations for Microsoft Edge HTTP authentication


settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 53
1.10.1 (L1) Ensure 'Allow Basic authentication for HTTP' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting determines if Basic authentication receives challenges over non-
secure HTTP. Basic authentication is a non-secure authentication method that relies on
sending the username and password to the server in plaintext.
The recommended state for this setting is: Disabled.
Note: This policy setting is ignored (and Basic is always forbidden) if the AuthSchemes
(Supported authentication schemes) policy is set and does not include Basic.
Rationale:
Basic authentication is less robust than other authentication methods available because
credentials including passwords are transmitted in plain text. An attacker who can
capture these credentials in plain text can gain access to the system.
Impact:
Non-secure HTTP requests from the Basic authentication scheme are blocked, and only
secure HTTPS is allowed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed.
This group policy setting is backed by the following registry location with a REG_DWORD
value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BasicAuthOverHttpEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\HTTP
authentication\Allow Basic authentication for HTTP
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 54
Default Value:
Enabled. (Basic authentication challenges received over non-secure HTTP will be
allowed.)
References:

1. https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-
baseline-for-microsoft-edge-version-88/ba-
p/2094443#:~:text=A%20new%20Microsoft%20Edge%20security,from%20the%
20Security%20Compliance%20Toolkit.&text=HTTP%20Basic%20Authentication
%20is%20a,server%20in%20plaintext%20(base64).

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

3.10 Encrypt Sensitive Data in Transit


v8 Encrypt sensitive data in transit. Example implementations can include: ● ●
Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).

v7 14.4 Encrypt All Sensitive Information in Transit ● ●


Encrypt all sensitive information in transit.

Page 55
1.10.2 (L1) Ensure 'Allow cross-origin HTTP Authentication
prompts' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether third-party sub-content can open a HTTP Basic
Auth dialog and is typically disabled.
The recommended state for this setting is: Disabled.

Rationale:
This setting is typically disabled to help combat phishing attempts.
Impact:
Disabling this setting should have minimal impact to the user as it is typically disabled
by default and third-party sub-content can't open a HTTP Basic Auth dialog box.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AllowCrossOriginAuthPrompt

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\HTTP
authentication\Allow cross-origin HTTP Authentication prompts
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#allowcrossoriginauthprompt

Page 56
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 57
1.10.3 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This setting specifies what HTTP authentication methods are supported by Microsoft
Edge.
The recommended setting is: Enabled: ntlm, negotiate.

Rationale:
Basic and Digest authentication do not provide sufficient security and can lead to
submission of user's password in plaintext or minimal protection (Integrated
Authentication is supported for negotiate and ntlm challenges only).
Impact:
Any sites that utilize Basic or Digest Authentication will be impacted. Sites will need to
be reconfigured to support a more secure form of authentication.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of ntlm, negotiate.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AuthSchemes

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: ntlm, negotiate:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\HTTP
authentication\Supported authentication schemes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The following schemes will be used: basic, digest, ntlm, and negotiate.)

Page 58
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#authschemes
2. https://www.chromium.org/developers/design-documents/http-authentication

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

3.10 Encrypt Sensitive Data in Transit


v8 Encrypt sensitive data in transit. Example implementations can include: ● ●
Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).

v7 14.4 Encrypt All Sensitive Information in Transit ● ●


Encrypt all sensitive information in transit.

Page 59
1.11 Identity and sign-in

This section contains recommendations for Microsoft Edge Identity and sign-in Settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v93 Administrative Templates (or newer).

Page 60
1.11.1 (L1) Ensure 'Enable the linked account feature' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting determines if Microsoft Edge can guide a user to the account
management page where they can link a Microsoft Account (MSA) to an Azure Active
Directory (Azure AD) account.
The recommended state for this setting is: Disabled.

Rationale:
Linking personal Microsoft Accounts to a company device could inadvertently lead to
data being transferred from the environment to a personal device.
Impact:
Linked account information will not be shown on a flyout and when the Azure AD profile
doesn´t have a linked account it will not show the "Add account" button.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:LinkedAccountEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Identity and sign-in\Enable the linked account feature
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Linked account information will be shown on a flyout. When the Azure AD
profile doesn´t have a linked account, it will show "Add account")

Page 61
References:

1. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-
policies#linkedaccountenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 62
1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows Microsoft Edge to prompt the user to switch to the appropriate
profile when Microsoft Edge detects that a link is a personal or work link.
The recommended state for this setting is: Disabled.

Rationale:
Linking personal Microsoft Accounts to a company device could inadvertently lead to
data being transferred from the environment to a personal device.
Impact:
Users won't be prompted to switch to another account when there´s a profile and link
mismatch.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:GuidedSwitchEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Identity and sign-in\Guided Switch Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Guided switch is turned on by default. A user can override this value in the
browser settings.)

Page 63
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#guidedswitchEnabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 64
1.12 Immersive Reader settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v110 Administrative Templates (or newer).

1.13 Kiosk Mode settings

This section contains recommendations for Microsoft Edge Kiosk Mode settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v87 Administrative Templates (or newer).

1.14 Manageability

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.15 Native Messaging

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.16 Network settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.17 Password manager and protection

This section contains recommendations for Microsoft Edge Password manager and
protection settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 65
1.17.1 (L1) Ensure 'Enable saving passwords to the password
manager' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting enables or disables the ability for users to save their passwords in
Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Saving passwords in Edge could lead to a user's web passwords being breached if an
attacker were to gain access to their web browser especially in the case of an
unattended and unlocked workstation.
Impact:
Users will be unable to utilize the Microsoft Edge built-in password manager.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PasswordManagerEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Password manager and protection\Enable saving passwords to the password
manager
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change this setting.)

Page 66
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#passwordmanagerenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 67
1.18 Performance

This section contains recommendations for Microsoft Edge Performance Settings.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v88 Administrative Templates (or newer).

Page 68
1.18.1 (L1) Ensure 'Enable startup boost' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows Microsoft Edge processes to start at OS sign-in and restart in
background after the last browser window is closed.
If Microsoft Edge is running in background mode, the browser might not close when the
last window is closed, and the browser won´t be restarted in background when the
window closes. See the BackgroundModeEnabled (Continue running background apps
after Microsoft Edge closes) policy for information about what happens after configuring
Microsoft Edge background mode behavior.
The recommended state for this setting is: Disabled.
Note: The startup boost policy may initially be configured off or on by the user; the user
can configure its behavior in edge://settings/system.
Rationale:
Allowing processes from the browser to run in the background could allow a malicious
script or code to continue running once the browser windows has been closed.
Impact:
Users will experience normal browser start-up times which may seem slow in
comparison to Startup boost.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:StartupBoostEnabled

Page 69
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Performance\Enable startup boost
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured. (Start boost may initially be off or on.)
References:

1. https://support.microsoft.com/en-us/topic/get-help-with-startup-boost-ebef73ed-
5c72-462f-8726-512782c5e442
2. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#startupboostenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 70
1.19 Permit or deny screen capture

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v97 Administrative Templates (or newer).

1.20 Printing

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.21 Private Network Request Settings

This section contains recommendations for Microsoft Edge Private Network Request
Settings.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v92 Administrative Templates (or newer).

Page 71
1.21.1 (L1) Ensure 'Specifies whether to allow websites to make
requests to more-private network endpoints' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether insecure websites are allowed to make requests to
more private network endpoints.
A network endpoint is more private than another if:

1. Its IP address is localhost and the other is not.


2. Its IP address is private and the other is public.

In the future, depending on spec evolution, this policy might apply to all cross-origin
requests directed at private IPs or localhost.
A website is deemed secure if it meets the definition of a secure context in
https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts. Otherwise, it
will be treated as an insecure context.
The recommended state for this setting is: Disabled.
Note: This policy relates to the Private Network Access specification. See
https://wicg.github.io/private-network-access/ for more details.
Note #2: If this policy is not configured or set to Disabled, the default behavior for
requests from insecure contexts to more-private network endpoints will depend on the
user´s personal configuration for the BlockInsecurePrivateNetworkRequests feature,
which may be set by a field trial or on the command line.
Rationale:
Allowing public internet sites to “peek” behind your firewall by using the user’s browser
to mix intranet resources into internet-delivered pages represents a dangerous attack
surface. The baseline requires enforcement of the new browser restriction that any such
intranet requests are blocked if the internet page was delivered over insecure HTTP.
Note: If for some reason you need to permit insecure cross-network requests for legacy
sites, you can configure temporary exceptions in Allow the listed sites to make requests
to more-private network endpoints from insecure contexts.

Page 72
Impact:
Users will be unable to allow non-secure public contexts to request resources from
private addresses.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InsecurePrivateNetworkRequestsAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Private Network Request Settings\Specifies whether to allow websites to
make requests to more-private network endpoints
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not configured. (The default behavior for requests from insecure contexts to more-
private network endpoints will depend on the user's personal configuration for the
BlockInsecurePrivateNetworkRequests feature.)
References:

1. https://wicg.github.io/private-network-access/
2. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#insecureprivatenetworkrequestsallowed

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 73
1.22 Proxy server

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

1.23 Related Website Sets Settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v121 Administrative Templates (or newer).

1.24 Sleeping tabs settings

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v88 Administrative Templates (or newer).

1.25 SmartScreen settings

This section contains recommendations for Microsoft Edge SmartScreen settings.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 74
1.25.1 (L1) Ensure 'Configure Microsoft Defender SmartScreen' is
set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows configuration of Microsoft Defender SmartScreen. Microsoft
Defender SmartScreen helps to identify phishing and malware websites and to make
informed decisions about downloads.
The recommended state for this setting is: Enabled.

Rationale:
Windows Defender SmartScreen can provide messages and warnings to users to help
thwart phishing attempts and malicious software.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change this setting.)

Page 75
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#smartscreenenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 76
1.25.2 (L1) Ensure 'Configure Microsoft Defender SmartScreen to
block potentially unwanted apps' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows configuration of Microsoft Defender SmartScreen and whether
potentially unwanted apps are blocked.
The recommended state for this setting is: Enabled.

Rationale:
Windows Defender SmartScreen can block unwanted apps that will help inform and
protect users from vulnerabilities related to adware and low-reputation apps.
Impact:
Microsoft Defender SmartScreen will block potentially dangerous apps. This could stop
the user from installing an app that could be potentially harmful to the system.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenPuaEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen to block
potentially unwanted apps
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (The user can change this setting.)

Page 77
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#smartscreenpuaenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 78
1.25.3 (L1) Ensure 'Enable Microsoft Defender SmartScreen DNS
requests' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures DNS requests made by Microsoft Defender SmartScreen.
The recommended state for this setting is: Disabled.
Note: This policy is available only on Windows instances that are joined to a Microsoft
Active Directory domain, Windows 10 Pro or Enterprise instances that enrolled for
device management, or macOS instances that are that are managed via MDM or joined
to a domain via MCX.
Rationale:
Whenever SmartScreen is enabled for Edge browser, SmartScreen tries to check if the
website is a phishing/malicious URL and does a local DNS query. If the DNS server fails
to resolve the website, Web Isolation will not be used to isolate those websites.
Impact:
DNS server might not resolve queries sent to external websites or the website may
have no information stored on its local server or cache.
Warning: Disabling DNS requests will prevent Microsoft Defender SmartScreen from
getting IP addresses, and potentially impact the IP-based protections provided.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenDnsRequestsEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Enable Microsoft Defender SmartScreen DNS requests
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 79
Default Value:
Enabled. (Microsoft Defender SmartScreen will make DNS requests.)
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#smartscreendnsrequestsenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 80
1.25.4 (L1) Ensure 'Force Microsoft Defender SmartScreen
checks on downloads from trusted sources' is set to 'Enabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Defender SmartScreen can check if
downloads have been retrieved from a trusted source.
The recommended state for this setting is: Enabled.

Rationale:
Windows Defender SmartScreen can verify that downloads are from a trusted source
can greatly reduce the chances of a user downloading an infected package to their
machine.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SmartScreenForTrustedDownloadsEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Force Microsoft Defender SmartScreen checks on
downloads from trusted sources
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change this setting.)

Page 81
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#smartscreenfortrusteddownloadsenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 82
1.25.5 (L1) Ensure 'Prevent bypassing Microsoft Defender
SmartScreen prompts for sites' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users may bypass the SmartScreen warning if a site
is deemed unsafe.
The recommended state for this setting is: Enabled.

Rationale:
Windows Defender SmartScreen can provide messages and warnings to users to help
thwart phishing and malicious software. However, by default, users may bypass these
warnings.
Impact:
SmartScreen will not allow a user to bypass the warning message.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PreventSmartScreenPromptOverride

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Prevent bypassing Microsoft Defender SmartScreen
prompts for sites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 83
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#preventsmartscreenpromptoverride

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 84
1.25.6 (L1) Ensure 'Prevent bypassing of Microsoft Defender
SmartScreen warnings about downloads' is set to 'Enabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users may override Microsoft Defender
SmartScreen warnings regarding downloads that are unverified.
The recommended state for this setting is: Enabled.

Rationale:
Smartscreen checks downloads and verifies whether they are deemed safe or not. Only
allowing verified downloads greatly reduces risk of a download containing a virus,
spyware, or other unwanted software.
Impact:
User will not be able to download software that has not been verified by SmartScreen.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PreventSmartScreenPromptOverrideForFile
s

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\SmartScreen settings\Prevent bypassing of Microsoft Defender SmartScreen
warnings about downloads
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 85
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#preventsmartscreenpromptoverrideforfiles

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 86
1.26 Startup, home page and new tab page

This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 87
1.26.1 (L1) Ensure 'Disable Bing chat entry-points on Microsoft
Edge Enterprise new tab page' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
By default, there are two Bing Chat entry-points on the new tab page. One is inside the
new tab page search box, and one is in the Bing Autosuggest drawer on-click.
The recommended state for this setting is: Disabled.

Rationale:
Allowing the use of the Bing chat entry-points feature in Microsoft Edge could lead to
sensitive data being exposed.
Impact:
The Bing chat entry-points will not appear on the new tab page.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:NewTabPageBingChatEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Startup, home page and new tab page in Microsoft Edge.
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (There is no change on the Microsoft Edge Enterprise new tab page and the
Bing chat entry-points are there for users in Microsoft Edge.)

Page 88
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#newtabpagebingchatenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

Page 89
1.27 (L1) Ensure 'Ads setting for sites with intrusive ads' is set to
'Enabled: Block ads on sites with intrusive ads.' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This setting controls whether ads are blocked on sites with intrusive ads. Intrusive ads
are typically ads that push invasive, unwelcomed, and irrelevant ads in front of
consumers. These ads can pop up unexpectedly, block the host page, open new pages
and windows, or play video and audio at inopportune times.
The recommended state for this setting is: Enabled: Block ads on sites with
intrusive ads..

Rationale:
Intrusive ads are ads found on websites that are invasive or unwelcome. These ads can
contain malicious files or can fool an unknowing user into giving away their username
and/or password.
Impact:
Ads that may be non-intrusive could be blocked.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AdsSettingForIntrusiveAdsSites

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Block ads on sites with intrusive ads.:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Ads
setting for sites with intrusive ads
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Block ads on sites with intrusive ads.)

Page 90
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 91
1.28 (L1) Ensure 'Allow download restrictions' is set to 'Enabled:
Block malicious downloads' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Edge blocks certain types of downloads,
and prevents users from bypassing security warnings, depending on the classification of
Safe Browsing.
The recommended state for this setting is: Enabled: Block malicious downloads.
Note: These restrictions only apply to downloads from web page content, as well as the
'download link...' context menu option. These restrictions don't apply to saving or
downloading the currently displayed page, or to the 'Save as PDF' option from the
printing options. For more information on Microsoft Defender SmartScreen, please visit
Microsoft Defender SmartScreen Frequently Asked Questions.
Note #2: Microsoft Edge relies on Internet Explorer zones (Local Machine, Local
Intranet, Trusted, Internet, Restricted) to determine which sites may bypass this policy
setting. Please see Security Zones in Edge – text/plain for more information.
Rationale:
Downloads could contain malware that has the potential to exfiltrate sensitive data or
encrypt critical systems for ransom.
Impact:
Users will be prevented from downloading certain types of files and will not be able to
bypass security warnings.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 4.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DownloadRestrictions

Page 92
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Block malicious downloads:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
download restrictions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (No special restrictions. The downloads will go through the usual security
restrictions based on Microsoft Defender SmartScreen analysis results.)
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 93
1.29 (L2) Ensure 'Allow features to download assets from the
Asset Delivery Service' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting configures the Microsoft Edge Asset Delivery Service. The Edge
Asset Delivery Service is a general pipeline used to deliver assets to the Microsoft Edge
Clients. These assets can be configuration files or Machine Learning models that power
the features that use this service.
The recommended state for this setting is: Disabled.

Rationale:
To reduce the attack surface of the system, downloads such as those described in this
recommendation should not be allowed to automatically download without the approval
of an Administrator.
Impact:
Microsoft Edge features will not be able to download assets needed for them to run
correctly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeAssetDeliveryServiceEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
features to download assets from the Asset Delivery Service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Features can download assets from the Asset Delivery Service.)

Page 94
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#edgeassetdeliveryserviceenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

2.5 Allowlist Authorized Software


v8 Use technical controls, such as application allowlisting, to ensure that only
authorized software can execute or be accessed. Reassess bi-annually, or more
● ●
frequently.

2.7 Utilize Application Whitelisting


v7 Utilize application whitelisting technology on all assets to ensure that only
authorized software executes and all unauthorized software is blocked from

executing on assets.

Page 95
1.30 (L2) Ensure 'Allow file selection dialogs' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows access to local files by allowing file selection dialogs in
Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users to import favorites, uploading files, and savings links could pose potential
security risks by allowing data to be uploaded to external sites or by downloading
malicious files. By not allowing the file selection dialog the end-user will not be
prompted for uploads/downloads, preventing data exfiltration and possible system
infection by malware.
Impact:
Users will no longer be prompted when performing actions which would trigger a file
selection dialog. Instead, the file selection dialog box assumes the user clicked
"Cancel". Being as this is not the default behavior, impact to the user will be noticeable,
and the user will not be able to upload and download files.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AllowFileSelectionDialogs

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
file selection dialogs
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 96
Default Value:
Enabled.
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#allowfileselectiondialogs

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

2.7 Utilize Application Whitelisting


v7 Utilize application whitelisting technology on all assets to ensure that only
authorized software executes and all unauthorized software is blocked from

executing on assets.

Page 97
1.31 (L1) Ensure 'Allow Google Cast to connect to Cast devices
on all IP addresses' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Google Cast is able to connect to all IP Addresses
or only private IP Addresses as defined in RFC1918 (IPv4) and RFC4193 (IPv6).
The recommended state for this setting is: Disabled.
Note: If the EnabledMediaRouter policy is set to Disabled there is no positive or
negative effect for this setting.
Rationale:
Allowing Google Cast to connect to public IP addresses could allow media and other
potentially sensitive data to be exposed to the public. Disabling this setting will ensure
that Google Cast is only able to connect to private (ie: internal) IP addresses.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:MediaRouterCastAllowAllIPs

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
Google Cast to connect to Cast devices on all IP addresses
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Google Cast connects to Cast devices on RFC1918/RFC4193 private
addresses only, unless you enable the CastAllowAllIPs feature.)

Page 98
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#mediaroutercastallowallips

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 99
1.32 (L1) Ensure 'Allow import of data from other browsers on
each Microsoft Edge launch' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls if users will get a prompt following each Microsoft Edge
launch to import their data from other browsers. Microsoft Edge will import data such as
passwords, bookmarks, cookies, browsing history, and payment information depending
on which browser this data is being imported from. At this time, Microsoft Edge can only
import data from Google Chrome, Mozilla Firefox, Internet Explorer, and some third-
party Password Managers.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users to import data from another browser into Microsoft Edge could allow for
sensitive data to be imported into Edge.
Impact:
Users will not get a prompt to import their data from other browsers after each Microsoft
Edge launch.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportOnEachLaunch

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
import of data from other browsers on each Microsoft Edge launch
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Users can activate this feature from a Microsoft Edge prompt or from the Settings page.

Page 100
References:

1. https://support.microsoft.com/en-us/microsoft-edge/what-s-imported-to-microsoft-
edge-ab7d9fa1-4586-23ce-8116-
e46f44987ac2#:~:text=to%20Microsoft%20Edge.-
,In%20Microsoft%20Edge%2C%20go%20to%20Settings%20and%20more%20
%3E%20Settings%20%3E,Select%20Import.
2. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#importoneachlaunch

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 101
1.33 (L1) Ensure 'Allow importing of autofill form data' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls the user's ability to import autofill data from other browsers
into Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Allowing autofill data to be imported could potentially allow sensitive data such as
personally identifiable information (PII) from a non-secured source into Microsoft Edge.
Storage of sensitive data should be handled with care.
Impact:
Users will be unable to perform an import of autofill data during Microsoft Edge first run.
This will also prevent users from importing data after Microsoft Edge has been set up.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportAutofillFormData

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of autofill form data
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Autofill data is imported at first run, and users can choose whether to import
this data manually during later browsing sessions.)

Page 102
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importautofillformdata

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 103
1.34 (L1) Ensure 'Allow importing of browser settings' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users are able to import settings from another
browser into Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Having settings automatically imported or allowing users to import settings from another
browser into Microsoft Edge could potentially allow for non-recommended settings to be
applied temporarily creating a potential security risk.
Impact:
Users will be unable to perform an import of other browser settings into Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportBrowserSettings

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of browser settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Browser settings are imported at first run, and users can choose whether to
import them manually during later browsing sessions.)

Page 104
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importbrowsersettings

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 105
1.35 (L1) Ensure 'Allow importing of home page settings' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users are able to import homepage settings from
another browser into Microsoft Edge as well as whether homepage settings are
imported on first use.
The recommended state for this setting is: Disabled.

Rationale:
Having settings automatically imported or allowing users to import settings from another
browser into Microsoft Edge could potentially allow for non-recommended settings to be
applied temporarily creating a potential security risk.
Impact:
Users will be unable to import homepage settings from other browsers into Microsoft
Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportHomepage

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of home page settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Home page setting is imported at first run, and users can choose whether to
import this data manually during later browsing sessions.)

Page 106
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#importhomepage

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 107
1.36 (L1) Ensure 'Allow importing of payment info' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users are able to import payment information from
another browser into Microsoft Edge as well as whether payment information is
imported on first use.
The recommended state for this setting is: Disabled.

Rationale:
Having payment information automatically imported or allowing users to import payment
data from another browser into Microsoft Edge could allow for sensitive data to be
imported into Edge.
Impact:
Users will be unable to perform a payment information import from other browsers into
Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportPaymentInfo

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of payment info
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Payment info is imported at first run, and users can choose whether to import it
manually during later browsing sessions.

Page 108
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importpaymentinfo

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 109
1.37 (L1) Ensure 'Allow importing of saved passwords' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users are able to import saved passwords from
another browser into Microsoft Edge as well as whether passwords are imported on first
use.
The recommended state for this setting is: Disabled.

Rationale:
Having saved passwords automatically imported or allowing users to import password
data from another browser into Microsoft Edge allows for sensitive data to be imported
into Edge.
Impact:
Users will be unable to import saved passwords from other browsers into Microsoft
Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportSavedPasswords

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of saved passwords
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Passwords are imported at first run, and users can choose whether to import
them manually during later browsing sessions.)

Page 110
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importsavedpasswords

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 111
1.38 (L1) Ensure 'Allow importing of search engine settings' is set
to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users are able to import search engine settings from
another browser into Microsoft Edge as well as whether said setting is imported on first
use.
The recommended state for this setting is: Disabled.

Rationale:
Having search engine settings automatically imported or allowing users to import the
settings from another browser into Microsoft Edge could allow for a malicious search
engine to be set.
Impact:
Users will be unable to perform an import of their search engine settings from other
browsers into Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ImportSearchEngine

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
importing of search engine settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Search engine settings are imported at first run, and users can choose whether to
import this data manually during later browsing sessions.

Page 112
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#importsearchengine

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 113
1.39 (L1) Ensure 'Allow managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows extensions installed by enterprise policies to be allowed to use
the Enterprise Hardware Platform API. This API handles requests from extensions for
the manufacturer and model of the hardware platform where the browser is running.
The recommended state for this setting is: Disabled.

Rationale:
Allowing extensions to access the Enterprise Hardware Platform API could lead to the
system being compromised. It is recommended that this setting is disabled unless
otherwise directed by Enterprise policies.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnterpriseHardwarePlatformAPIEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
managed extensions to use the Enterprise Hardware Platform API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 114
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#enterprisehardwareplatformapienabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 115
1.40 (L2) Ensure 'Allow or block audio capture' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows you to set whether the end-user is prompted for access to
audio capture devices.
The recommended state for this setting is: Disabled.
Note: The AudioCaptureAllowedUrls setting will need to be configured along with this
setting if this feature is needed for specific websites.
Rationale:
With the end-user having the ability to allow or deny audio capture for websites in
Microsoft Edge, could open an organization up to a malicious site that may capture
proprietary information through the browser. By limiting or disallowing this setting, it
removes the end-user's discretion leaving it up to the organization as to the sites
allowed to use this ability.
Impact:
Users will not be prompted for audio devices when using websites which may need this
access, for example a web-based conferencing system. If there are sites which access
will be allowed, this will need to be configured in the AudioCaptureAllowedUrls setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AudioCaptureAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
or block audio capture
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 116
Default Value:
Enabled. (Users are prompted for audio capture access except from the URLs in the
AudioCaptureAllowedUrls list. These listed URLs are granted access without
prompting.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#audiocaptureallowed

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 117
1.41 (L2) Ensure 'Allow or block video capture' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows you to set whether the end-user is prompted for access to
audio capture devices.
The recommended state for this setting is: Disabled.
Note: The VideoCaptureAllowedUrls setting will need to be configured along with this
setting if this feature is needed for specific websites.
Rationale:
With the end-user having the ability to allow or deny video capture for websites in
Microsoft Edge, could open an organization up to a malicious site that may capture
proprietary information through the browser. By limiting or disallowing video capture it
removes the end-user's discretion, leaving it up to the organization as to the sites
allowed to use this ability.
Impact:
If you disable this setting users will not be prompted for audio devices when using
websites which may need this access, for example a web-based conferencing system. If
there are sites which access will be allowed, configuration of the
VideoCaptureAllowedUrls setting will be necessary.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:VideoCaptureAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
or block video capture
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 118
Default Value:
Enabled. (Users are prompted for audio capture access except from the URLs in the
AudioCaptureAllowedUrls list. These listed URLs are granted access without
prompting.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#videocaptureallowed

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 119
1.42 (L2) Ensure 'Allow or deny screen capture' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether Microsoft Edge can use screen-share APIs
including web-based online meetings, video, or screen sharing.
The recommended state for this setting is: Disabled.

Rationale:
Allowing screen-share APIs within Microsoft Edge could potentially allow for sensitive
data to be shared via screen captures.
Impact:
Users will not be able to utilize APIs which support web-based meetings, video, and
screen capture. This could potentially disrupt users who may have utilized these abilities
in the past.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ScreenCaptureAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
or deny screen capture
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 120
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#screencaptureallowed

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 121
1.43 (L1) Ensure 'Allow personalization of ads, Microsoft Edge,
search, news and other Microsoft services by sending browsing
history, favorites and collections, usage and other browsing data
to Microsoft' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft is able to collect a user's browsing history
and searches in Microsoft Edge for the purpose of personalizing searches, news, and
other Microsoft services.
The recommended state for this setting is: Disabled.

Rationale:
Sharing a user's browsing and search history could inadvertently expose data which
could be sensitive.
Impact:
Users' data will not be shared with Microsoft and the personalization of searches, news,
etc. will not be available.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PersonalizationReportingEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
personalization of ads, Microsoft Edge, search, news and other Microsoft
services by sending browsing history, favorites and collections, usage and
other browsing data to Microsoft
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 122
Default Value:
Enabled.
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#personalizationreportingenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 123
1.44 (L1) Ensure 'Allow queries to a Browser Network Time
service' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Edge can send queries to a network time
service for accurate timestamps. This check helps in validation of certificates.
The recommended state for this setting is: Enabled.

Rationale:
Microsoft Edge uses a network time service to randomly track times from a trusted
external service. This allows Microsoft Edge the ability for verification of a certificate's
validity and is important for certificate validation.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserNetworkTimeQueriesEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
queries to a Browser Network Time service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 124
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#browsernetworktimequeriesenabled
2. https://docs.microsoft.com/en-us/microsoft-edge/privacy-whitepaper

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

8.4 Standardize Time Synchronization


v8 Standardize time synchronization. Configure at least two synchronized time ● ●
sources across enterprise assets, where supported.

6.1 Utilize Three Synchronized Time Sources


v7 Use at least three synchronized time sources from which all servers and
network devices retrieve time information on a regular basis so that timestamps
● ●
in logs are consistent.

Page 125
1.45 (L1) Ensure 'Allow remote debugging' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users may use remote debugging. This feature
allows remote debugging of live content on a Windows 10 or later device from a
Windows or macOS computer.
The recommended state for this setting is: Disabled.

Rationale:
Disabling remote debugging enhances security and protects applications from
unauthorized access. Some attack tools can exploit this feature to extract information,
or to insert malicious code.
Impact:
Users will not be able access the remote debugging feature in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RemoteDebuggingAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
remote debugging
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users may use remote debugging by specifying --remote-debug-port and --
remote-debugging-pipe command line switches.)

Page 126
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 127
1.46 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether audio processes in Microsoft Edge run in a
sandbox.
The recommended state for this setting is: Enabled.
Note: Security software setups within your environment might interfere with the
sandbox.
Rationale:
Having audio processes run in a sandbox ensures that if a website misuses audio
processes that data may not be manipulated or exfiltrated from the system.
Impact:
The audio process will not run in the sandbox and the WebRTC audio-processing
module will run in the renderer process.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AudioSandboxEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
the audio sandbox to run
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured - The default configuration for the audio sandbox will be used, which
might differ based on the platform.

Page 128
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#audiosandboxenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 129
1.47 (L2) Ensure 'Allow unconfigured sites to be reloaded in
Internet Explorer mode' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows users to reload unconfigured sites (that are not configured in
the Enterprise mode Site List) in Internet Explorer mode when browsing in Microsoft
Edge for a site that requires Internet Explorer for compatibility.
After a site has been reloaded in Internet Explorer mode, "in-page" navigations will stay
in Internet Explorer mode (for example, a link, script, or form on the page, or a server-
side redirect from another "in-page" navigation). Users can choose to exit from Internet
Explorer mode, or Microsoft Edge will automatically exit from Internet Explorer mode
when a navigation that isn´t "in-page" occurs (for example, using the address bar, the
back button, or a favorite link). Users can also optionally tell Microsoft Edge to use
Internet Explorer mode for the site in the future.
The recommended state for this setting is: Disabled.
Note: Enabling this setting takes precedence over how the
InternetExplorerIntegrationTestingAllowed (Allow internet Explorer mode testing) policy
is configured, and that policy will be disabled.
Rationale:
Internet Explorer is officially retired and unsupported. Allowing browsers to reconfigure
into Internet Explorer mode could open an organization up to a malicious site due to its
lack of support for modern security features.
Impact:
If this setting is Disabled users will not be able to reload unconfigured sites in Internet
Explorer mode for compatibility. When users try to launch shortcuts or file associations
that use Internet Explorer, they will be redirected to open the same file/URL in Microsoft
Edge. When users try to launch Internet Explorer by directly invoking the iexplore.exe
binary, Microsoft Edge will launch instead.

Page 130
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationReloadInIEMo
deAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
unconfigured sites to be reloaded in Internet Explorer mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured.
References:

1. https://docs.microsoft.com/en-us/deployedge/edge-ie-mode-local-site-list

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.3 Maintain and Enforce Network-Based URL Filters


Enforce and update network-based URL filters to limit an enterprise asset from
v8 connecting to potentially malicious or unapproved websites. Example ● ●
implementations include category-based filtering, reputation-based filtering, or
through the use of block lists. Enforce filters for all enterprise assets.

7.1 Ensure Use of Only Fully Supported Browsers and


Email Clients
v7 Ensure that only fully supported web browsers and email clients are allowed to ● ● ●
execute in the organization, ideally only using the latest version of the browsers
and email clients provided by the vendor.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-on
● ●
applications.

Page 131
1.48 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users are able to utilize the Edge Feedback feature
to send feedback, suggestions and surveys to Microsoft as well as issue reports.
The recommended state for this setting is: Disabled.

Rationale:
Data should not be shared with third-party vendors in an enterprise managed
environment.
Impact:
Users will not be able to send feedback to Microsoft.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:UserFeedbackAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
user feedback
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#userfeedbackallowed

Page 132
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 133
1.49 (L2) Ensure 'Allow users to open files using the ClickOnce
protocol' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows users to use the ClickOnce protocol for opening files via
applications inside of Microsoft Edge instead of downloading them to their device. The
ClickOnce protocol allows websites to request that the browser open files from a
specific URL using the ClickOnce file handler on the user's computer or device.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users to configure ClickOnce could potentially allow malicious files to be
automatically opened within Microsoft Edge. By not allowing this, the end-user will need
to download file allowing it to be scanned before opening.
Impact:
Users will have to download files to their system and will be unable to open them
directly in Microsoft Edge. Disabling ClickOnce will also prevent ClickOnce applications
(.application files) from working properly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ClickOnceEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
users to open files using the ClickOnce protocol
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 134
Default Value:
Disabled. (Users will have the option to enable the use of the ClickOnce protocol with
the edge://flags/ page.)
References:

1. https://docs.microsoft.com/en-us/visualstudio/deployment/clickonce-security-and-
deployment?view=vs-2019
2. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#clickonceenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 135
1.50 (L2) Ensure 'Allow users to open files using the DirectInvoke
protocol' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows users to utilize the DirectInvoke protocol for opening files via
applications inside of Microsoft Edge instead of downloading them to their device.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users to configure DirectInvoke could potentially allow malicious files to be
automatically opened within Microsoft Edge. By not allowing this the end-user will need
to download files allowing for the file to be scanned before opening.
Impact:
Users will have to download files to their device and will be unable to open them directly
in Microsoft Edge. Disabling DirectInvoke could also prevent some SharePoint functions
from working properly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DirectInvokeEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
users to open files using the DirectInvoke protocol
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 136
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#directinvokeenabled
2. https://go.microsoft.com/fwlink/?linkid=2103872
3. https://go.microsoft.com/fwlink/?linkid=2099871

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 137
1.51 (L2) Ensure 'Allow users to proceed from the HTTPS
warning page' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether a user is able to proceed to a webpage when an
invalid SSL certificate warning has occurred.
The recommended state for this setting is: Disabled.

Rationale:
Sites protected by SSL should always be recognized as valid in the web browser.
Allowing a user to make the decision as to whether what appears to be an invalid
certificate could open an organization up to users visiting a site that is otherwise not
secure and or malicious in nature.
Impact:
Users will not be able to click past the invalid certificate error to view the website.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SSLErrorOverrideAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
users to proceed from the HTTPS warning page
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 138
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#sslerroroverrideallowed

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 139
1.52 (L1) Ensure 'Allow websites to query for available payment
methods' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows you to set whether a website can check to see if the user has
payment methods saved.
The recommended state for this setting is: Disabled.

Rationale:
Saving payment information in Microsoft Edge could lead to the sensitive data being
leaked and used for non-legitimate purposes.
Impact:
Websites will be unable to query whether payment information within Microsoft Edge is
available.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:PaymentMethodQueryEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Allow
websites to query for available payment methods
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 140
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#paymentmethodqueryenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 141
1.53 (L2) Ensure 'AutoLaunch Protocols Component Enabled' is
set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls the AutoLaunch Protocols Component. This Component
allows Microsoft to provide a list similar to the AutoLaunchProtocolsFromOrigins (Define
a list of Protocols that can launch an external application from listed origins without
prompting the user) policy, which allows certain external Protocols to launch without
prompt or blocking certain Protocols (on specified origins).
The recommended state for this setting is: Disabled.

Rationale:
Allowing applications to AutoLaunch without prompting users for websites in Microsoft
Edge, could open an organization up to malicious sites that may capture proprietary
information through the browser app.
Impact:
Disabling this setting will prompt users whether to allow or deny Microsoft Edge to open
certain links in their associated application, no protocols can launch without prompt.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutoLaunchProtocolsComponentEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Administrative Templates\Microsoft Edge\AutoLaunch
Protocols Component Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The AutoLaunch Protocols component is enabled.)

Page 142
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#autolaunchprotocolscomponentenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 143
1.54 (L1) Ensure 'Automatically import another browser's data
and settings at first run' is set to 'Enabled: Disables automatic
import, and the import section of the first-run experience is
skipped' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether settings are imported from another browser into
Microsoft Edge.
The recommended state for this setting is: Enabled: Disables automatic import,
and the import section of the first-run experience is skipped.
Note: The browser data from Microsoft Edge Legacy will always be silently migrated at
the first run, irrespective of the value of this policy.
Rationale:
Having settings automatically imported from another browser into Microsoft Edge could
potentially allow for non-recommended settings to be applied temporarily creating a
potential security risk.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 4.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutoImportAtFirstRun

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Disables automatic import, and the import section of the
first-run experience is skipped:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Automatically import another browser's data and settings at first run
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 144
Default Value:
Enabled. (Automatically imports all supported datatypes and settings from the default
browser.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#autoimportatfirstrun

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 145
1.55 (L1) Ensure 'Automatically open downloaded MHT or
MHTML files from the web in Internet Explorer mode' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether MHT or MHTML files that are downloaded from the
web are automatically opened in Internet Explorer mode. MHTML files are archives of
HTML code and companion files such as images and audio.
The recommended state for this setting is: Disabled.

Rationale:
Internet Explorer is officially retired and unsupported. Opening files in an unsupported
browser that does not have modern protections could lead to an attack that exploits a
vulnerability in the legacy software.
Impact:
MHT or MHTML files will not open in Internet Explorer mode.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationZoneIdentifi
erMhtFileAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Automatically open downloaded MHT or MHTML files from the web in
Internet Explorer mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.

Page 146
Default Value:
Disabled. (MHT or MHTML files that are downloaded from the web won´t automatically
open in Internet Explorer mode)
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 147
1.56 (L2) Ensure 'Block third party cookies' is set to 'Enabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy controls whether web page elements from a domain other than that in the
address bar can set cookies.
The recommended state for this setting is: Enabled.

Rationale:
Allowing third-party cookies could potentially allow tracking of your web activities by
third-party entities which may expose information that could be used for an attack on the
end-user.
Impact:
Disabling third-party cookies could cause some websites to not function as expected
(e.g., Microsoft 365 or Salesforce).
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BlockThirdPartyCookies

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Block
third party cookies
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can change this setting.)

Page 148
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#blockthirdpartycookies

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 149
1.57 (L1) Ensure 'Block tracking of users' web-browsing activity' is
set to 'Enabled: Balanced (Blocks harmful trackers and trackers
from sites user has not visited; content and ads will be less
personalized)' or higher (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether websites may track user's web-browsing activity.
The recommended state for this setting is: Enabled: Balanced (Blocks harmful
trackers and trackers from sites user has not visited; content and ads
will be less personalized).
Configuring this setting to Enabled: Strict (blocks harmful trackers and
majority of trackers from all sites; content and ads will have minimal
personalization. Some parts of sites might not work) also conforms to the
benchmark.
Rationale:
Allowing websites to track user web-browsing activity allows for sites to gather
information which could be potentially harmful and used to target users and businesses.
Impact:
Content and ads will have minimal personalization and the website may not function
properly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2 or 3.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TrackingPrevention

Page 150
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Balanced (Blocks harmful trackers and trackers from sites
user has not visited; content and ads will be less personalized):
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Block
tracking of users' web-browsing activity
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can set their own level of tracking prevention.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#trackingprevention

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 151
1.58 (L2) Ensure 'Browser sign-in settings' is set to 'Enabled:
Disable browser sign-in' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether a user can sign into Microsoft Edge with an account
to use services such as sync and single sign on.
The recommended state for this setting is: Disabled: Disable browser sign-in.
Note: To control the availability of sync, use the SyncDisabled (Disable synchronization
of data using Microsoft sync services) policy.
Note #2: This setting works in conjunction with the NonRemovableProfileEnabled
setting which will need to be set to Disabled because the setting
NonRemovableProfileEnabled disables the creation of an automatically signed in
browser profile.
Rationale:
Users will not be able to sign into Microsoft Edge with an account. Signing into Edge
does not automatically sync users' data, to control the availability of sync, use the
SyncDisabled (Disable synchronization of data using Microsoft sync services) policy.
Impact:
Users will not be able to sign into the Microsoft Edge browser.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserSignin

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled: Disable browser sign-in:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Browser sign-in settings
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 152
Default Value:
Not Configured - Users can decide if they want to enable the browser sign-in option and
use it as they see fit.
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#browsersignin

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 153
1.59 (L1) Ensure 'Clear browsing data when Microsoft Edge
closes' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy controls whether web browser data, such as forms, passwords and visited
sites is deleted each time Microsoft Edge is closed.
The Recommended state for this setting is: Disabled.
Note: If this policy is enabled, the AllowDeletingBrowserHistory policy, will take
precedence over the ClearBrowsingDataOnExit policy and all data will be deleted when
Microsoft Edge closes, regardless of how AllowDeletingBrowserHistory is configured.
The AllowDeletingBrowserHistory policy is set to Disabled as a safeguard incase this
policy is changed.
Rationale:
Deleting browser data on close will delete information that may be important for a
computer investigation and investigators such as Computer Forensics Analysts may not
be able to retrieve pertinent information to the investigation.
Impact:
Browsing data will not be deleted on closing and the user will not be able to change this
setting.
Note: This setting will preserve browsing history that could contain a user's personal
browsing history. Ensure this setting is in compliance with organizational policies.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ClearBrowsingDataOnExit

Page 154
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Clear
browsing data when Microsoft Edge closes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can configure the Clear browsing data option in Settings.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#clearbrowsingdataonexit

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 155
1.60 (L1) Ensure 'Clear cached images and files when Microsoft
Edge closes' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy controls whether cached images and files are deleted each time Microsoft
Edge closes.
The recommended state for this setting is: Disabled.
Note: If this policy is disabled, do not enable the ClearBrowsingDataOnExit policy,
because it will take precedence over the ClearCachedImagesAndFilesOnExit policy and
will delete all browsing data when Microsoft Edge closes, regardless of how the
ClearCachedImagesAndFilesOnExit policy is configured.
Rationale:
Deleting browser data on close will delete information that may be important for a
computer investigation and investigators such as Computer Forensics Analysts may not
be able to retrieve pertinent information to the investigation.
Impact:
Cached images and files will not be deleted on closing and the user will be unable to
change this setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ClearCachedImagesAndFilesOnExit

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Clear
cached images and files when Microsoft Edge closes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 156
Default Value:
Not Configured. (Users can choose whether cached images and files are cleared on
exit.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#clearcachedimagesandfilesonexit

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 157
1.61 (L1) Ensure 'Clear history for IE and IE mode every time you
exit' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls if history will be cleared for Internet Explorer (IE) and IE
mode every time a user exits the browser.
The recommended state for this setting is: Disabled.

Rationale:
Deleting browser data will delete information that may be important for a computer
investigation. Investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
History will not be cleared for IE and IE mode every time a user exits the browser.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerModeclearDataOnExitEnab
led

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Clear
history for IE and IE mode every time you exit
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Internet Explorer browsing history will not be cleared on browser exit.)

Page 158
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#InternetExplorerModeclearDataOnExitEnabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 159
1.62 (L1) Ensure 'Compose is enabled for writing on the web' is
set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows the configuration of Compose in Microsoft Edge. Compose
provides help for writing with AI-generated text, which lets the user get ideas for writing.
This includes elaborating on text, re-writing, changing tone, formatting the text, and
more.
The recommended state for this setting is: Disabled.
Note: Even with this setting Disabled, compose will still be available for prompt-based
text generation through the sidebar and must be managed with either
´EdgeDiscoverEnabled´ (Discover feature In Microsoft Edge) policy or
´HubsSidebarEnabled´ (Show Hubs Sidebar) policy. The ´HubsSidebarEnabled´ is
disabled with recommendation (L1) Ensure 'Standalone Sidebar Enabled' is set to
'Disabled'.
Rationale:
Allowing compose in Microsoft Edge could lead to data being transmitted to a third-party
cloud service, which could lead to sensitive data or intellectual property being exposed.
Impact:
Compose in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ComposeInlineEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Compose is enabled for writing on the web
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.

Page 160
Default Value:
Enabled. (Compose can provide text generation for eligible fields, which are text
editable and don´t have an autocomplete attribute.)
References:

1. https://www.microsoft.com/en-us/edge/features/compose?form=MA13FJ

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 161
1.63 (L1) Ensure 'Configure browser process code integrity guard
setting' is set to 'Enabled: Enable code integrity guard
enforcement in the browser process.' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls the use of code integrity guard in the browser process, which
only allows Microsoft signed binaries to load.
The recommended state for this setting is: Enabled: Enable code integrity guard
enforcement in the browser process..

Rationale:
Code Integrity Guard ensures Microsoft's digital signature is present when loading
binaries into a process. Binaries without Microsoft's digital signature are blocked to
protect the system from unknown binaries and prevent the injection of untrustworthy
binaries into a process.
Impact:
Binaries without Microsoft's digital signature are blocked from being loaded into a
process.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:browserCodeIntegritySetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Enable code integrity guard enforcement in the browser
process.:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure browser process code integrity guard setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 162
Default Value:
Disabled. (Prevents the browser from enabling code integrity guard in the browser
process.)
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#browserCodeIntegritySetting
2. https://www.cloudficient.com/blog/why-microsoft-edge-is-more-secure-now-than-
ever

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 163
1.64 (L1) Ensure 'Configure InPrivate mode availability' is set to
'Enabled: InPrivate mode disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Edge InPrivate mode is available or even forced for
the user.
The recommended state for this setting is: Enabled: InPrivate mode disabled.

Rationale:
Disabling InPrivate mode for Microsoft Edge will ensure that browsing data is logged on
the system which may be important for forensics.
Impact:
Users will not be able to initiate the InPrivate browsing mode for Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InPrivateModeAvailability

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: InPrivate mode disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure InPrivate mode availability
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (InPrivate mode available.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#inprivatemodeavailability

Page 164
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 165
1.65 (L2) Ensure 'Configure Online Text To Speech' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting determines whether Online Text to Speech voice fonts which is part
of Azure Cognitive Services, are available to users. These voice fonts are higher quality
than the pre-installed system voice fonts.
The recommended state for this setting is: Disabled.

Rationale:
Enabling Online Text to Speech could allow data to be transmitted to a third-party,
which could lead to sensitive data being exposed.
Impact:
Users will be unable to utilize Online Text to Speech.
Note: This setting will prevent the Online Text to Speech feature which can be used by
users with visual or learning disabilities to read the text of documents out loud. Please
make sure this feature is not needed within the environment before disabling this
feature.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ConfigureOnlineTextToSpeech

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure Online Text To Speech
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 166
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#configureonlinetexttospeech
2. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#configureonlinetexttospeech
3. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#configureonlinetexttospeech

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 167
1.66 (L1) Ensure 'Configure Related Matches in Find on Page' is
set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting specifies how the user receives Related Matches in Find on Page,
which provides spellcheck, synonyms, and Q&A results in Microsoft Edge.
The recommended setting for this policy is: Disabled.
Note: Disabling this setting still allows users to receive related matches in Find on Page
on limited sites. The results are processed on the user´s device instead of a cloud
service.
Rationale:
Sharing a user's browsing and search history to a cloud service could inadvertently
expose data. Due to privacy concerns, data should never be sent to any third-party.
Impact:
Users will not see all suggestions for better matches found on page, only from limited
sites.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RelatedMatchesCloudServiceEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure Related Matches in Find on Page
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can receive Related Matches in Find on Page on all sites. The results
are processed in a cloud service.)

Page 168
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#relatedmatchescloudserviceenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 169
1.67 (L2) Ensure 'Configure Speech Recognition' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting specifies whether websites can use the W3C Web speech API to
recognize speech from the user. The Microsoft Edge implementation of the Web speech
API uses Azure Cognitive Services, so voice data will leave the machine.
The recommended state for this setting is: Disabled.

Rationale:
Allowing speech recognition to use the Web speech API in Azure Cognitive permits
voice data to leave the machine, potentially allowing sensitive data to be collected from
a non-secured third-party source.
Impact:
Users will be unable to use speech recognition for voice typing. Users that use speech
recognition for accessibility will need other tools implemented for voice typing.
Note: An exception to this recommendation might be needed as this is an accessibility
feature that is legitimately needed by some users. Take this into consideration when
applying this setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SpeechRecognitionEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure Speech Recognition
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 170
Default Value:
Enabled. (Web-based applications that use the Web speech API can use speech
recognition.)
References:

1. https://blogs.windows.com/msedgedev/2016/06/01/introducing-speech-synthesis-
api/

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 171
1.68 (L1) Ensure 'Configure the list of names that will bypass the
HSTS policy check' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows a list of names to be specified that will be exempt from HTTP
Strict Transport Security (HSTS) policy checks then potentially upgraded from http:// to
https://.
The recommended state for this setting is: Disabled.

Rationale:
Allowing hostnames to be exempt from HSTS policy checks could allow for protocol
downgrade attacks and cookie hijackings.
Impact:
There should be no adverse effect to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge:HSTSPolicyBypassList

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled.
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure the list of names that will bypass the HSTS policy check
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured.

Page 172
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#hstspolicybypasslist

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 173
1.69 (L1) Ensure 'Configure the list of types that are excluded
from synchronization' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows you to specify data types that will be limited/excluded from
uploading data to the Microsoft Edge synchronization service.
The recommended state for this setting is: Enabled with the following CASE
SENSITIVE datatype passwords.
Note: In a High Security/Sensitive Data Environment (L2), this setting should also
include the following options: settings, favorites, addressesAndMore, extensions
and collections.

Rationale:
Storing and sharing information could potentially expose sensitive information including
but not limited to user passwords and login information. Allowing this synchronization
could also potentially allow an end user to pull corporate data that was synchronized
into the cloud to a personal machine.
Impact:
Password data will not be synchronized with the Azure AD Tenant.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of passwords.
HKLM\SOFTWARE\Policies\Microsoft\Edge\SyncTypesListDisabled:1

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled with the following CASE SENSITIVE datatype passwords:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure the list of types that are excluded from synchronization
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 174
Default Value:
Not Configured.
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#synctypeslistdisabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 175
1.70 (L1) Ensure 'Configure the Share experience' is set to
'Enabled: Don't allow using the Share experience' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows users to be able to access the Share experience from the
Settings and More menu in Microsoft Edge, which can allow information to be shared
with other apps on the system.
The recommended state for this setting is: Enabled: Don't allow using the Share
experience.

Rationale:
Having this setting enabled could allow malicious content from Microsoft Edge to be
exposed to other parts of the operating system.
Impact:
Users will not be able to view or use the Share button in the toolbar as it will be hidden.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ConfigureShare

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't allow using the Share experience:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure the Share experience
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft here.

Default Value:
Enabled. (Allow using the Share experiences.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#configureshare

Page 176
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 177
1.71 (L1) Ensure 'Configure whether form data and HTTP
headers will be sent when entering or exiting Internet Explorer
mode' is set to 'Enabled: Do not send form data or headers'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures navigations that switch between Internet Explorer mode
and Microsoft Edge will include form data. IE Mode in Microsoft Edge allows
organizations that still need Internet Explorer 11, (which is not supported) for backward
compatibility with existing websites.
The recommended state for this setting is: Enabled: Do not send form data or
headers.

Rationale:
Allowing autofill data to be imported could potentially allow sensitive data, such as
personally identifiable information (PII) to be exposed. Storage of sensitive data should
be handled with care and not stored within the browser.
Impact:
When entering or exiting IE mode, form data and headers will not be shared between
Internet Explorer mode and Microsoft Edge and vice versa.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationComplexNavDa
taTypes

Page 178
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not send form data or headers:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Configure whether form data and HTTP headers will be sent when entering
or exiting Internet Explorer mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Microsoft Edge will use the new behavior of including form data in
navigations that change modes.)
References:

1. https://docs.microsoft.com/en-us/deployedge/edge-ie-mode-faq

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 179
1.72 (L1) Ensure 'Continue running background apps after
Microsoft Edge closes' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting determines whether processes from Microsoft Edge may start at
Operating System sign-in and continue running once an Edge browser window is
closed. This allows background apps and the current browsing session to remain active,
including any session cookies. An open background process displays an icon in the
system tray and can always be closed from there.
The recommended state for this setting is: Disabled.

Rationale:
Allowing processes from the browser to run in the background could allow a malicious
script or code to continue running even once the browser windows has been closed.
Impact:
The browser will close its processes and will not continue running as a background
process.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BackgroundModeEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Continue running background apps after Microsoft Edge closes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (The user can configure its behavior in edge://settings/system.)

Page 180
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#backgroundmodeenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 181
1.73 (L1) Ensure 'Control communication with the
Experimentation and Configuration Service' is set to 'Enabled:
Disable communication with the Experimentation and
Configuration Service' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Edge uses the Experimentation and
Configuration Service to deploy the Experimentation and Configuration payload which
consists of a list of early in development features that Microsoft is enabling for testing
and feedback.
The recommended state for this setting is: Enabled: Disable communication with
the Experimentation and Configuration Service.

Rationale:
This setting allows feedback (data) to be sent back to a third-party for testing of
development features for Microsoft Edge, and can also deliver a payload that contains a
list of actions to take on certain domains for compatibility reasons.
Impact:
Data will not be sent back to a third-party and payloads will not be delivered.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ExperimentationAndConfigurationServiceC
ontrol

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Disable communication with the Experimentation and
Configuration Service:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control communication with the Experimentation and Configuration Service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 182
Default Value:
Enabled. (Retrieve configurations only.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#experimentationandconfigurationservicecontrol

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

2.5 Allowlist Authorized Software


v8 Use technical controls, such as application allowlisting, to ensure that only
authorized software can execute or be accessed. Reassess bi-annually, or more
● ●
frequently.

2.7 Utilize Application Whitelisting


v7 Utilize application whitelisting technology on all assets to ensure that only
authorized software executes and all unauthorized software is blocked from

executing on assets.

Page 183
1.74 (L2) Ensure 'Control use of the Headless Mode' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether users can launch Microsoft Edge in headless mode.
A headless browser is a browser that is not configured with a Graphical User Interface
(GUI) and is executed via command-line or using network communication.
The recommended state for this setting is: Disabled.

Rationale:
Although this feature can be very useful to developers, an attacker could
programmatically scrape website content and install malicious scripts on devices
running the browser’s headless interface.
Impact:
Users will not be able to access headless mode in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:HeadlessModeEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control use of the Headless Mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Microsoft Edge allows use of the headless mode.)

Page 184
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#headlessmodeenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 185
1.75 (L2) Ensure 'Control use of the Serial API' is set to 'Enable:
Do not allow any site to request access to serial ports via the
Serial API' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting configures whether websites can access the systems serial ports.
The recommended state for this setting is: Enable: Do not allow any site to
request access to serial ports via the Serial API.
Note: If more granular control is needed (per website) then this setting can be used in
combination with the SerialAllowAllPortsForUrls (Allow the Serial API on specific sites),
SerialAskForUrls and SerialBlockedForUrls (Block the Serial API on specific sites)
settings. For example, SerialAllowAllPortsForUrls can be used to allow serial port
access to specific sites. Please see the references below for more information.
Rationale:
Preventing access to system serial ports may prevent malicious sites from using these
ports and accessing attached devices.
Impact:
Legitimate websites that need access to the Serial API will be denied access.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultSerialGuardSetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enable: Do not allow any site to request access to serial ports via
the Serial API:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control use of the Serial API
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 186
Default Value:
Enabled. (AskSerial (3) = Allow sites to ask for user permission to access a serial
port (Websites can ask users whether they can access a serial port, and users can
change this setting.))
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-policies#control-
use-of-the-serial-api

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 187
1.76 (L2) Ensure 'Control where security restrictions on insecure
origins apply' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows for a specified list of origins (URLs) or hostname patterns (like
"*.contoso.com") for which security restrictions on insecure origins don´t apply.
Allowed origins for legacy applications that can´t deploy TLS or set up a staging server
for internal web development so that developers can test features requiring secure
contexts without having to deploy TLS on the staging server. This policy also prevents
the origin from being labeled Not Secure in the omnibox.
The recommended state for this setting is: Disabled.

Rationale:
Insecure contexts should always be labeled as insecure.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge:OverrideSecurityRestrictionsOnInsecureO
riginDesc

Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Control where security restrictions on insecure origins apply
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 188
References:

1. https://chromeenterprise.google/policies/#OverrideSecurityRestrictionsOnInsecur
eOrigin

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 189
1.77 (L2) Ensure 'Default sensors setting' is set to 'Enabled: Do
not allow any site to access sensors' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting configures whether websites can access and use sensors such as
motion and light.
The recommended state for this setting is: Enabled: Do not allow any site to
access sensors.

Rationale:
Sensor APIs may expose data to sites and services and may even give sites control
over functionality. Due to privacy concerns, sensors should never be accessed by
websites or third-party vendors.
Impact:
Access to sensors, such as motion and light, will not be accessible by websites.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DefaultSensorsSetting

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Do not allow any site to access sensors:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Default sensors setting
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Allow sites to access sensors.)

Page 190
CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 191
1.78 (L1) Ensure 'Delete old browser data on migration' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy controls whether web browser data is deleted after migration to Microsoft
Edge, this data includes forms, passwords, and visited sites.
The recommended state for this setting is: Disabled.

Rationale:
Deleting browser data will delete information that may be important for a computer
investigation and investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
Browsing data will not be deleted during migration.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DeleteDataOnMigration

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Delete old browser data on migration
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 192
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#deletedataonmigration

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 193
1.79 (L1) Ensure 'Disable saving browser history' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy controls whether browser history is saved and prevents users from changing
the policy.
The recommended state for this setting is: Disabled.

Rationale:
Deleting browser data will delete information that may be important for a computer
investigation and investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
None - this is the default behavior.
Note: This setting will preserve browsing history that could contain a user's personal
browsing history. Ensure this setting is in compliance with organizational policies.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SavingBrowserHistoryDisabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Disable saving browser history
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 194
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#savingbrowserhistorydisabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 195
1.80 (L1) Ensure 'Disable synchronization of data using Microsoft
sync services' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether data synchronization with Microsoft sync services is
allowed as well as whether the sync consent prompt appears to users. Examples of
synced data include, but are not limited to, history and favorites.
The recommended state for this setting is: Enabled.

Rationale:
Data should not be shared with third-party vendors in an enterprise-managed
environment.
Impact:
Users will be unable to sync data with Microsoft, the prompt for sync consent will also
be hidden from the user.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SyncDisabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Disable synchronization of data using Microsoft sync services
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured - Users will be able to turn sync on or off.

Page 196
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#syncdisabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 197
1.81 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting determines whether a local switch is configured for DNS interception
checks. These checks attempt to discover if the browser is behind a proxy that redirects
unknown host names.
The recommended state for this setting is: Enabled.
Note: This detection might not be necessary in an enterprise environment where the
network configuration is known. It can be disabled to avoid additional DNS and HTTP
traffic on start-up and each DNS configuration change.
Rationale:
Disabling these checks could potentially allow DNS hijacking and poisoning.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DNSInterceptionChecksEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\DNS
interception checks enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (DNS interception checks are performed.)

Page 198
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#dnsinterceptionchecksenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.2 Use DNS Filtering Services


v8 Use DNS filtering services on all enterprise assets to block access to ● ● ●
known malicious domains.

7.7 Use of DNS Filtering Services


v7 Use DNS filtering services to help block access to known malicious ● ● ●
domains.

Page 199
1.82 (L1) Ensure 'Edge 3P SERP Telemetry Enabled' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls Edge3P Telemetry in Microsoft Edge. Edge3P Telemetry
captures the searches a user does on third-party search providers without identifying
the person or the device.
The recommended state for this setting is: Disabled.

Rationale:
Enabling this feature sends data to a third-party service, which could lead to sensitive
data being exposed.
Impact:
Data will not be sent to a third-party.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:Edge3PSerpTelemetryEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Edge
3P SERP Telemetry Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Disabled. (Edge 3P SERP Telemetry feature will be enabled.)

Page 200
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 201
1.83 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy settings configures the use of the Wallet E-Tree feature in Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Allowing a third-party to track users while browsing the internet in Microsoft Edge,
Weather from Microsoft Start, or Microsoft Wallet can lead to privacy and possible data
loss issues.
Impact:
The Edge Wallet E-Tree feature will not be available to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeWalletEtreeEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Edge
Wallet E-Tree Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the Edge Wallet E-Tree feature.)

Page 202
References:

1. https://support.microsoft.com/en-us/topic/faq-for-e-tree-on-microsoft-edge-
microsoft-weather-and-microsoft-wallet-d6fde56e-b61d-4990-bd69-
7a503ed64895#:~:text=Want%20to%20do%20what%20you,be%20planted%20o
n%20your%20behalf.

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 203
1.84 (L1) Ensure 'Enable AutoFill for addresses' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy controls whether the AutoFill feature of Microsoft Edge is enabled for the
auto-complete feature for addresses and other information in web forms.
The recommended state for this setting is: Disabled.

Rationale:
Allowing autofill data to be saved in Microsoft Edge could potentially allow storage of
sensitive data such as personally identifiable information (PII). Considering that storage
of sensitive data should be handled with care disabling this setting is recommended.
Impact:
Users will be unable to store autofill address information in Microsoft Edge and they will
also not be prompted to use such information on webforms. Disabling this setting also
stops any past activity of autofill.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutofillAddressEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable AutoFill for addresses
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can control AutoFill for addresses in the user interface.)

Page 204
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#autofilladdressenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 205
1.85 (L1) Ensure 'Enable AutoFill for payment instructions' is set
to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users can utilize payment information, such as
credit or debit cards in web forms using previously stored information.
The recommended state for this setting is: Disabled.

Rationale:
Having payment information stored and auto filled in Microsoft Edge could allow for an
attacker to gain access to this sensitive data.
Impact:
Users will be unable to use and store AutoFill data for credit and debit card information
in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AutofillCreditCardEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable AutoFill for payment instructions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Note #2: In older Microsoft Windows Administrative Templates, this setting was initially
named AutoFill for credit cards, but it was renamed to Enable AutoFill for payment
instructions.
Default Value:
Enabled. (Users can control AutoFill for payment instruments.)

Page 206
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#autofillcreditcardenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 207
1.86 (L1) Ensure 'Enable browser legacy extension point blocking'
is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting sets the ProcessExtensionPointDisablePolicy on Microsoft Edge´s
browser process to block code injection from legacy third party applications.
The recommended state for this setting is: Enabled.
Note: Per Microsoft, only turn off the policy if there are compatibility issues with third-
party software that must run inside Microsoft Edge´s browser process.
Rationale:
If this policy is set to Disabled, it may have a detrimental effect on Microsoft Edge´s
security and stability as unknown and potentially hostile code can load inside Microsoft
Edge´s browser process.
Impact:
Compatibility issues with third-party software can occur.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserLegacyExtensionPointsBlockingEna
bled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable browser legacy extension point blocking
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (ProcessExtensionPointDisablePolicy is applied to block legacy extension
points in the browser process.)

Page 208
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 209
1.87 (L1) Ensure 'Enable component updates in Microsoft Edge'
is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy determines whether updates for Microsoft Edge components are enabled in
Microsoft Edge.
The recommendation state for this setting is: Enabled.
Note: Updates that are deemed "critical for security" are still applied even if you disable
this policy as well as any component that doesn't contain executable code, that doesn't
significantly alter the behavior of the browser.
Rationale:
Component updates should always be up to date to ensure the latest security patches
and capabilities are applied.
Impact:
Updates will be automatically downloaded.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ComponentUpdatesEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable component updates in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft here.

Default Value:
Enabled.

Page 210
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

7.4 Perform Automated Application Patch Management


v8 Perform application updates on enterprise assets through automated patch ● ● ●
management on a monthly, or more frequent, basis.

3.5 Deploy Automated Software Patch Management


Tools
v7 Deploy automated software update tools in order to ensure that third-party ● ● ●
software on all systems is running the most recent security updates provided by
the software vendor.

Page 211
1.88 (L1) Ensure 'Enable CryptoWallet feature' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
The CryptoWallet feature allows users to securely store, manage, and transact digital
assets such as Bitcoin, Ethereum, and other cryptocurrencies.
The recommended state for this setting is: Disabled.

Rationale:
In an enterprise organization, users should not be able to manage, buy or sell assets
such as Bitcoin, Ethereum, and other cryptocurrencies.
Impact:
The CryptoWallet feature will not be accessible to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:CryptoWalletEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable CryptoWallet feature
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use CryptoWallet feature which allows users to securely store,
manage and transact digital assets such as Bitcoin, Ethereum and other
cryptocurrencies.)

Page 212
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#cryptowalletenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 213
1.89 (L1) Ensure 'Enable deleting browser and download history'
is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy controls whether users can delete browser and download history for
Microsoft Edge.
The recommended state for this setting is: Disabled.
Note: Even when this policy is Disabled, the browsing and download history isn't
guaranteed to be retained. Users can edit or delete the history database files directly,
and the browser itself may remove (based on expiration period) or archive any or all
history items at any time.
Rationale:
Deleting browser data will delete information that may be important for a computer
investigation. Investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
Browser data deletion by users will be prohibited.
Note: This setting will preserve browsing history that could contain a user's personal
browsing history. Ensure this setting is in compliance with organizational policies.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AllowDeletingBrowserHistory

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable deleting browser and download history
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 214
Default Value:
Enabled. (Users can delete the browsing and download history.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#allowdeletingbrowserhistory

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 215
1.90 (L1) Ensure 'Enable Discover access to page contents for
AAD profiles' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls discover access to page contents for AAD profiles. Discover
is an extension that hosts Bing Chat and in order to summarize pages and interact with
text selections, it needs to be able to access the page contents. When enabled, page
contents will be sent to Bing.
The recommended state for this setting is: Disabled.

Rationale:
Enabling this policy setting allows data to be transmitted to a third-party (BING), which
could lead to sensitive data being exposed.
Impact:
Discover will not be able to access page contents and therefore Bing Chat will not be
able to summarize pages and interact with text selections.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DiscoverPageContextenabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Discover access to page contents for AAD profiles
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Discover will have access to page contents.)

Page 216
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#discoverpagecontextenabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 217
1.91 (L2) Ensure 'Enable Drop feature in Microsoft Edge' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting configures the drop feature in Microsoft Edge. The drop feature lets
users send messages or files to themselves.
The recommended state for this setting is: Disabled.

Rationale:
Enabling the Microsoft Edge Drop feature could allow sensitive data to be transmitted to
a device that is not authorized or a third-party, which could lead to that data being
exposed.
Impact:
Users can't use the drop feature in Microsoft Edge to share files and messages between
phones and desktop devices.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeEdropenabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Drop feature in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the Drop feature in Microsoft Edge.)

Page 218
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#EdgeEdropenabled
2. https://www.microsoft.com/en-us/edge/features/drop?form=MT00D8

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 219
1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is set
to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows the Microsoft Edge browser to enable the follow service which
allows users to follow an influencer, site, or topic in Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Enabling this feature will create a personalized feed in Edge’s Collections section. In
order to create a personalized feed, data will be collected from the browser. Due to
privacy concerns, data should never be sent to any third-party.
Impact:
Users will not be able to follow an influencer, site, or topic in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeFollowEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Follow service in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Follow in Microsoft Edge can be applied.)

Page 220
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 221
1.93 (L1) Ensure 'Enable globally scoped HTTP auth cache' is set
to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether HTTP auth credentials may be automatically used in
the context of another web site visited in Microsoft Edge.
The recommended state for this setting is: Disabled.
Note: This policy is intended to give enterprises depending on the legacy behavior a
chance to update their login procedures and will be removed in the future.
Rationale:
Allowing HTTP auth credentials to be shared without the user's consent could lead to a
user sharing sensitive information without their knowledge. Enabling this setting could
also lead to some types of cross-site attacks, that would allow users to be tracked
across sites without the use of cookies.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:GloballyScopeHTTPAuthCacheEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable globally scoped HTTP auth cache
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 222
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#globallyscopehttpauthcacheenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 223
1.94 (L2) Ensure 'Enable guest mode' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether a user may utilize guest profiles in Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
In a guest profile, the browser doesn't import browsing data from existing profiles, and it
deletes browsing data when all guest profiles are closed.
Deleting browser data will delete information that may be important for a computer
investigation and investigators such as Computer Forensics Analysts may not be able to
retrieve pertinent information to the investigation.
Impact:
Users will not be able to initiate Guest mode for Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserGuestModeEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable guest mode
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Microsoft Edge lets users browse in guest profiles.)

Page 224
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#browserguestmodeenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 225
1.95 (L1) Ensure 'Enable network prediction' is set to 'Enabled:
Don't predict network actions on any network connection'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls the network prediction feature which controls DNS
prefetching, TCP and SSL pre-connection and pre-rendering of web pages.
The recommended state for this setting is: Enabled: Don't predict network
actions on any network connection.

Rationale:
Opening connections to resources that may not be used could allow un-needed
connections increasing attack surface and, in some cases, could lead to opening
connections to resources which the user did not intend to utilize.
Impact:
None - this is the default behavior, apart from users being able to change the default.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:NetworkPredictionOptions

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Don't predict network actions on any network connection:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable network prediction
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (The user can change the policy.)

Page 226
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#networkpredictionoptions

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 227
1.96 (L1) Ensure 'Enable profile creation from the Identity flyout
menu or the Settings page' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether user profiles can create new profiles in Microsoft
Edge.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users to create new profiles could allow for such profiles to be removed or
switched which may end up in a situation that hides or even removes data which may
be important for computer investigation and investigators such as Computer Forensics
Analysts may not be able to retrieve pertinent information to the investigation.
Impact:
Users will be unable to utilize the Add profile option in Microsoft Edge.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:BrowserAddProfileEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable profile creation from the Identity flyout menu or the Settings
page
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Microsoft Edge allows users to use Add profile on the Identity flyout menu or
the Settings page to create new profiles.)

Page 228
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#browseraddprofileenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

5.1 Establish and Maintain an Inventory of Accounts


Establish and maintain an inventory of all accounts managed in the enterprise.
v8 The inventory must include both user and administrator accounts. The inventory, at
a minimum, should contain the person’s name, username, start/stop dates, and
● ● ●
department. Validate that all active accounts are authorized, on a recurring
schedule at a minimum quarterly, or more frequently.

v7 16.6 Maintain an Inventory of Accounts ● ●


Maintain an inventory of all accounts organized by authentication system.

Page 229
1.97 (L1) Ensure 'Enable resolution of navigation errors using a
web service' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Edge can issue a dataless connection to a
web service to probe networks, (ex: Hotel and Airport Wi-Fi) for connectivity issues.
The recommended state for this setting is: Disabled.
Note: Except on Windows 8 and later versions of Windows, Microsoft Edge always
uses native APIs to resolve connectivity issues.
Rationale:
This setting could potentially allow information about the user's network to be disclosed.
Impact:
Microsoft Edge will use native APIs for potential resolution of network connectivity and
navigation issues.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ResolveNavigationErrorsUseWebService

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable resolution of navigation errors using a web service
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (Microsoft Edge respects the user preference that´s set under Services
at edge://settings/privacy.)

Page 230
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#resolvenavigationerrorsusewebservice

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 231
1.98 (L2) Ensure 'Enable search suggestions' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting determines whether web search suggestions are used in Microsoft
Edge Address bar and Auto-Suggest lists.
The recommended state for this setting is: Disabled.

Rationale:
Characters that are typed by the user are sent to a search engine before the Enter key
is pressed therefore, it is possible for unintended data to be sent.
Impact:
Users will not get customized web suggestions for search results, instead they will still
receive local suggestions.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SearchSuggestEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable search suggestions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can change the setting.)

Page 232
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#searchsuggestenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 233
1.99 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting prevents Microsoft Edge from showing security warnings that
potentially dangerous command-line flags are in use at its' launch.
The recommended state of this setting is: Enabled.

Rationale:
If Microsoft Edge is being launched with potentially dangerous flags this information
should be exposed to the user as a warning, if not the user may unintentionally be using
non-secure settings and be exposed to security flaws.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:CommandLineFlagSecurityWarningsEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable security warnings for command-line flags
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.

Page 234
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#commandlineflagsecuritywarningsenabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 235
1.100 (L1) Ensure 'Enable site isolation for every site' is set to
'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting ensures that each website runs in its own process so that a site will
not be able to utilize or take data from another running site.
The recommended state for this setting is: Enabled.

Rationale:
Enabling site isolation can help stop sites from inadvertently sharing data with other
running sites. This will help protect data from untrusted sources.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SitePerProcess

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable site isolation for every site
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled.
Note: If this policy is disabled or not configured, a user can opt out of site isolation. (For
example, by using "Disable site isolation" entry in edge://flags.) Disabling the policy or
not configuring the policy doesn't turn off Site Isolation.

Page 236
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#siteperprocess

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 237
1.101 (L1) Ensure 'Enable tab organization suggestions' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Edge can use its tab organization service
to help name or suggest tab groups.
The recommended state for this setting is: Disabled.

Rationale:
Sending Microsoft Edge tab data (URLs, page titles, and existing group information) to
the tab organization service could led to privacy concerns or sensitive data being
exposed to a third-party.
Impact:
Suggestions for tab groups will not be available to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TabServicesEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable tab organization suggestions
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (When a user creates a tab group or activates certain "Group Similar Tabs"
features Microsoft Edge sends tab data to its tab organization service.)

Page 238
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 239
1.102 (L1) Ensure 'Enable the Search bar' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures the use of the search bar. The search bar is used to
search the web from a user's desktop or from an application. The search bar provides a
search box, powered by Edge default search engine, that shows web suggestions and
opens all web searches in Microsoft Edge.
The search bar can be launched from the "More tools" menu or jump list in Microsoft
Edge.
The recommended state for this setting is: Disabled.
Note: The option to enable the search bar at startup will be toggled on if the
´SearchbarIsEnabledOnStartup´ (Allow the Search bar at Windows startup) policy is
Enabled. If the ´SearchbarIsEnabledOnStartup´ is Disabled or not configured, the
option to enable the search bar at startup will be toggled off.
Rationale:
Allowing users to have the ability to search from their desktop or an application could
lead to the user unintentionally pasting sensitive information in the search bar.
Impact:
User's will not be able to use the search featured powered by Edge default search
engine from a desktop or an application.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SearchbarAllowed

Page 240
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable the Search bar
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (The search bar will be automatically enabled for all profiles.)
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 241
1.103 (L2) Ensure 'Enable Translate' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting enables Microsoft translation services on Microsoft Edge. Microsoft
Edge offers translation functionality to the user by showing an integrated translate flyout
when appropriate, and a translate option on the right-click context menu.
The recommended setting is: Disabled.

Rationale:
Data should not be shared with third-party vendors in an enterprise managed
environment. Enabling this service could potentially allow sensitive information to be
sent to a third-party for translation.
Impact:
The translate feature will not be available for users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TranslateEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable Translate
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (Users can choose whether to use the translation functionality or not.)

Page 242
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#translateenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 243
1.104 (L1) Ensure 'Enable upload files from mobile in Microsoft
Edge desktop' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy settings allows the configuration of the Edge "Upload from mobile" feature.
The "Upload from mobile" feature allows users to select file(s) from a mobile device and
upload to a via a webpage in Microsoft Edge.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users the ability to use the file upload from mobile feature in Microsoft Edge
could lead to data leakage or intellectual property being exposed.
Impact:
The file upload from mobile feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:UploadFromPhoneEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable upload files from mobile in Microsoft Edge desktop
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can upload files via the upload from mobile feature in Microsoft Edge.)

Page 244
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.4 Restrict Unnecessary or Unauthorized Browser and


Email Client Extensions
v8 Restrict, either through uninstalling or disabling, any unauthorized or ● ●
unnecessary browser or email client plugins, extensions, and add-on
applications.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-
● ●
on applications.

Page 245
1.105 (L1) Ensure 'Enable use of ephemeral profiles' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether user profiles are switched to ephemeral mode. In
ephemeral mode, profile data is saved on disk for the length of the session and then the
data is deleted after the session is over. Therefore, no data is saved to the device.
The recommended state for this setting is: Disabled.

Rationale:
Allowing use of ephemeral profiles allows a user to use Microsoft Edge with no data
being logged to the system. Deleting browser data will delete information that may be
important for a computer investigation and investigators such as Computer Forensics
Analysts may not be able to retrieve pertinent information to the investigation.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ForceEphemeralProfiles

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable use of ephemeral profiles
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 246
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#forceephemeralprofiles

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 247
1.106 (L1) Ensure 'Enable warnings for insecure forms' is set to
'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls the handling of insecure forms (forms submitted over HTTP)
embedded in secure (HTTPS) sites in the browser.
When enabled, a full-page warning will be shown, and autofill will be disabled for those
forms. When disabled, warnings will not be shown for insecure forms, and autofill will
work normally.
The recommended state for this setting is: Enabled.

Rationale:
The default setting of enabled warnings for insecure forms enforces secure connections
when domains are capable of HTTPS and prevents auto-filling of data imported from a
non-secure source.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InsecureFormsWarningsEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable warnings for insecure forms
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 248
Default Value:
Enabled. (A full-page warning will be shown when an insecure form is submitted.
Additionally, a warning bubble will be shown next to the form fields when they are
focused, and autofill will be disabled for those forms.)
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#insecureformswarningsenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 249
1.107 (L1) Ensure 'Enables DALL-E themes generation' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures the use of generated browser themes using DALL-E and
apply them to Microsoft Edge. DALL-E is an open Artificial Intelligence (AI) system that
creates realistic images and art from text descriptions (prompts).
The recommended state for this setting is: Disabled.

Rationale:
The rush to bring GenAI to market has brought to light concerns about the training data
rapidly ingested by these large language models (LLMs). Content creators have
complained copyright infringement on the content generated by these products. This
has resulted in lawsuits against major corporations the results of which may shape
future laws and regulations about the use of certain products and/or the content created
by them.
Due to this, there is an unknown element of risk involved in utilizing content generated
by DALL-E in an enterprise environment and it is therefore recommended to disable this
setting to mitigate that future risk around intellectual property.
Impact:
Users will not be able to generate browser themes using DALL-E.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AIGenThemesEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enables DALL-E themes generation
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 250
Default Value:
Enabled. (Users can generate AI themes.)
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 251
1.108 (L2) Ensure 'Enforce Bing SafeSearch' is set to 'Enabled:
Configure moderate search restrictions in Bing' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting ensures that web search results with Bing are presented with the
SafeSearch settings that can be specified in this setting.
The recommended state for this setting is: Enabled: Configure moderate search
restrictions in Bing.

Rationale:
Allowing search results to present sites that may have malicious content should be
prohibited to help ensure users do not accidentally visit sites that are prone to malicious
content including spyware, adware, and viruses.
Impact:
Users search results will be filtered and content such as adult text, videos and images
will not be shown.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ForceBingSafeSearch

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Configure moderate search restrictions in Bing:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enforce Bing SafeSearch
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can configure this policy.)

Page 252
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#forcebingsafesearch

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 253
1.109 (L2) Ensure 'Enforce Google SafeSearch' is set to 'Enabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting ensures that web search results with Google are performed with
SafeSearch set to active.
The recommended state for this setting is: Enabled.

Rationale:
Allowing search results to present sites that may have malicious content should be
prohibited to help ensure users do not accidentally visit sites that are more prone to
malicious content including spyware, adware, and viruses.
Impact:
Users search results will be filtered and content such as adult text, videos and images
will not be shown.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ForceGoogleSafeSearch

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enforce Google SafeSearch
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Users can set the value.)

Page 254
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#forcegooglesafesearch

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 255
1.110 (L1) Ensure 'Enhance the security state in Microsoft Edge'
is set to 'Enabled: Balanced mode' or higher (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures "enhance the security state" in Microsoft Edge. Enhanced
security in Microsoft Edge helps safeguard against memory-related vulnerabilities by
disabling just-in-time (JIT) JavaScript compilation and enabling additional operating
system protections for the browser. These protections include Hardware-enforced Stack
Protection and Arbitrary Code Guard (ACG).
Enhanced security provides two levels of browsing security: Balanced and Strict.
Balanced mode is an adaptive mode that builds on a user’s behavior on a particular
device. Strict mode applies added security protections for all the sites a user visits.
Users may report some challenges accomplishing their usual tasks when in strict mode.
The recommended state for this setting is: Enabled: Balanced mode. Configuring this
setting to Enabled: Strict mode also conforms to the benchmark.

Rationale:
Balance mode will help reduce the risk of an attack by automatically applying stricter
security settings on unfamiliar sites while adapting to browsing habits over time.
Impact:
Users will no longer be able to bypass protection for previously visited unfamiliar sites.
Edge will apply added security protections to sites that are not visited often or are
unknown. Websites that are browsed frequently will be left out.
Note: Most sites will work as expected.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1 or 3.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnhanceSecurityMode

Page 256
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Balanced mode or Enabled: Strict mode:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enhance the security state in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.
References:

1. https://support.microsoft.com/en-us/microsoft-edge/enhance-your-security-on-
the-web-with-microsoft-edge-b8199f13-b21b-4a08-a806-daed31a1929d

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 257
1.111 (L2) Ensure 'Enhanced Security Mode configuration for
Intranet zone sites' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether Microsoft Edge will apply enhanced security mode
on Intranet zone sites. Enhanced security mode in Microsoft Edge mitigates memory-
related vulnerabilities by disabling just-in-time (JIT) JavaScript compilation and enabling
additional operating system protections for the browser.
The recommended state for this setting is: Disabled.

Rationale:
Enhanced security mode provides 'defense-in-depth' protection that makes it more
difficult for a malicious site to use an unpatched vulnerability to write to executable
memory.
Impact:
Disabling this setting could lead to Intranet zone sites acting in an unexpected manner.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EnhanceSecurityModeBypassIntranet

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enhanced Security Mode configuration for Intranet zone sites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Microsoft Edge will apply enhanced Security Mode on Intranet zone sites.)

Page 258
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#EnhanceSecurityModeBypassIntranet
2. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-security-browse-
safer#defense-in-depth

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

10.5 Enable Anti-Exploitation Features


Enable anti-exploitation features on enterprise assets and software, where
v8 possible, such as Microsoft® Data Execution Prevention (DEP), Windows® ● ●
Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and
Gatekeeper™.

8.3 Enable Operating System Anti-Exploitation Features/


Deploy Anti-Exploit Technologies
v7 Enable anti-exploitation features such as Data Execution Prevention (DEP) or
Address Space Layout Randomization (ASLR) that are available in an operating
● ●
system or deploy appropriate toolkits that can be configured to apply protection to a
broader set of applications and executables.

Page 259
1.112 (L1) Ensure 'Hide the First-run experience and splash
screen' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether the First-run experience and splash screen is
presented to the user the first time Microsoft Edge is opened. Some of the options
presented to the user include the ability to import data from other web browsers on the
system.
The recommended state for this setting is: Enabled.

Rationale:
Allowing the First-run experience and configuration options could potentially allow the
user to perform actions that are prohibited such as importing autofill, credit card, and
other sensitive data.
Impact:
Users will not be prompted with the First-run experience screens.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:HideFirstRunExperience

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Hide
the First-run experience and splash screen
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 260
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#hidefirstrunexperience

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 261
1.113 (L1) Ensure 'In-app support Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows users to contact in-app Microsoft support agents directly from
the Microsoft Edge browser.
The recommended state for this setting is: Disabled.

Rationale:
In-app support shares a user's browsing and search history, which could inadvertently
expose and share sensitive data with Microsoft.
Impact:
Users will not be able to use or turn on the in-app support feature in the Microsoft Edge
browser.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InAppSupportEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\In-
app support Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can invoke in-app support.)

Page 262
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 263
1.114 (L2) Ensure 'Let users snip a Math problem and get the
solution with a step-by-step explanation in Microsoft Edge' is set
to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting manages whether users can use the Math Solver tool in Microsoft
Edge. Math Solver tool allows users to take a picture of a math problem – be it
handwritten or printed – and then provides an instant solution with step-by-step
instructions.
The recommended state for this setting is: Disabled.

Rationale:
Math Solver shares a user's browsing and search history to provide additional learning
resources, which could inadvertently expose and share sensitive data with a third-party.
Impact:
Users will be unable to solve math problems in Microsoft Edge browsers.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:MathSolverEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Let
users snip a Math problem and get the solution with a step-by-step
explanation in Microsoft Edge
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Users can take a snip of the Math problem and get the solution including a
step-by-step explanation of the solution in a Microsoft Edge side pane.)

Page 264
References:

1. https://www.onmsft.com/news/enable-math-solver-edge
2. https://techcommunity.microsoft.com/t5/articles/learn-how-to-solve-math-
problems-with-math-solver-in-microsoft/m-p/2195689

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 265
1.115 (L2) Ensure 'Live captions allowed' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows users to turn live captions on or off. Live captions are an
accessibility feature that converts speech from the audio that plays in Microsoft Edge to
text and shows this text in a separate window.
The recommended state for this setting is: Disabled.

Rationale:
Enabling live captions could allow data to be transmitted to a third-party, which could
lead to sensitive data being exposed.
Impact:
Users won't be able to turn live captions on. In addition, if speech recognition files have
been downloaded previously, they will be deleted from the device in 30 days.
Note: An exception to this recommendation might be needed as this is an accessibility
feature that is legitimately needed by some users. Take this into consideration when
applying this setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:LiveCaptionsAllowed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Live
captions allowed
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can turn this feature on or off.)

Page 266
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#liveCaptionsAllowed

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 267
1.116 (L1) Ensure 'Manage exposure of local IP addresses by
WebRTC' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting specifies a list of URLs or patterns which local IP address will be
exposed by WebRTC.
The recommended state for this setting is: Disabled.
Note: If this policy is enabled, disabled, or not configured, and edge://flags/#enable-
webrtc-hide-local-ips-with-mdns is Disabled, WebRTC will expose local IP addresses.
Rationale:
Enabling this setting and allowing exposure of IP addresses can allow an attacker to
gather information about the internal network that could potentially be utilized to breach
and traverse a network.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is in effect when the following registry value does
not exist.
HKLM\SOFTWARE\Policies\Microsoft\Edge\WebRtcLocalIpsAllowedUrls:Default

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Manage exposure of local IP addressess by WebRTC
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 268
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#webrtclocalipsallowedurls

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 269
1.117 (L1) Ensure 'Notify a user that a browser restart is
recommended or required for pending updates' is set to 'Enabled:
Required - Show a recurring prompt to the user indicating that a
restart is required' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This setting determines whether a notification to restart Microsoft Edge due to an
update is recommended or required.
The recommended state for this setting is: Enabled: Required - Show a recurring
prompt to the user indicating that a restart is required.
Note: If this setting is set to Enabled: Required - Show a recurring prompt to
the user indicating that a restart is required the browser will be
automatically restarted based on the RelaunchNotificationPeriod setting which is
recommended to be 24 hours.
Rationale:
The end-user will receive a notification informing them that an update has been applied
and that the browser must be restarted for the update to be completed. Once updates
have been pushed by the organization it is pertinent that the update is applied as soon
as possible. Enabling this notification will ensure that users restart their browser in a
timely fashion.
Impact:
When updates are applied by an organization the end-user will receive a notification
after 24 hours that they must restart the browser for updates to complete, after 24 hours
the browser will be automatically restarted.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 2.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RelaunchNotification

Page 270
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Required - Show a recurring prompt to the user indicating
that a restart is required:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Notify a user that a browser restart is recommended or required for
pending updates
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Not Configured. (An icon is shown in the browser informing the user to restart Microsoft
Edge.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#relaunchnotification

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

7.4 Perform Automated Application Patch Management


v8 Perform application updates on enterprise assets through automated patch ● ● ●
management on a monthly, or more frequent, basis.

3.5 Deploy Automated Software Patch Management


Tools
v7 Deploy automated software update tools in order to ensure that third-party ● ● ●
software on all systems is running the most recent security updates provided by
the software vendor.

Page 271
1.118 (L1) Ensure 'Restrict exposure of local IP address by
WebRTC' is set to 'Enabled: Allow public interface over http
default route. This doesn't expose the local IP address'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting specifies whether the local IP address will be exposed by WebRTC.
The recommended state for this setting is: Enabled: Allow public interface over
http default route. This doesn't expose the local IP address.

Rationale:
Allowing the exposure of IP addresses allows the attacker to gather information on the
internal network that could potentially be utilized to breach and traverse the network.
Impact:
The local IP address will not be exposed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_SZ value of default_public_interface_only.
HKLM\SOFTWARE\Policies\Microsoft\Edge:WebRtcLocalhostIpHandling

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: Allow public interface over http default route. This doesn't
expose the local IP address:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Restrict exposure of local IP address by WebRTC
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (WebRTC exposes the local IP address.)

Page 272
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#webrtclocalhostiphandling

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 273
1.119 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This setting controls the size of the cache, in bytes, used to store files on the disk.
The recommended state for this setting is: Enabled: 250609664.
Note: The value specified in this policy isn't a hard boundary but rather a suggestion to
the caching system; any value below a few megabytes is too small and will be rounded
up to a reasonable minimum.
Note #2: The recommended disk size for cache is 50 - 250MB, according to Microsoft.
Rationale:
Having enough disk space for browser cache is important for a computer investigation
and investigators such as Computer Forensics Analysts to be able to retrieve pertinent
information to the investigation.
Impact:
Browser cache will take up to 250MB in disk space.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 250609664.
HKLM\SOFTWARE\Policies\Microsoft\Edge:DiskCacheSize

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: 250609664:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Set
disk cache size, in bytes
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Default size is used.)

Page 274
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#diskcachesize

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

8.3 Ensure Adequate Audit Log Storage


v8 Ensure that logging destinations maintain adequate storage to comply with ● ● ●
the enterprise’s audit log management process.

6.4 Ensure adequate storage for logs


v7 Ensure that all systems that store logs have adequate storage space for the ● ●
logs generated.

Page 275
1.120 (L1) Ensure 'Set the time period for update notifications' is
set to 'Enabled: 86400000' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This setting does not determine if updates are applied, the policy setting allows setting a
time period in which users are notified that Microsoft Edge has been updated and must
be closed and re-opened.
The recommended state for this setting is: Enabled: 86400000.

Rationale:
This setting is a notification for the end-user informing them that an update has been
applied and that the browser must be restarted in order for the update to be completed.
Once updates have been pushed by the organization it is pertinent that said update
takes effect as soon as possible. Enabling this notification will ensure users restart the
browser in a timely fashion.
Impact:
When updates are applied by an organization the end-user will receive a notification
after 24 hours that they must restart the browser for updates to complete.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 86400000.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RelaunchNotificationPeriod

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled: 86400000:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Set
the time period for update notifications
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (One week.)

Page 276
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#relaunchnotificationperiod

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

7.4 Perform Automated Application Patch Management


v8 Perform application updates on enterprise assets through automated patch ● ● ●
management on a monthly, or more frequent, basis.

3.5 Deploy Automated Software Patch Management


Tools
v7 Deploy automated software update tools in order to ensure that third-party ● ● ●
software on all systems is running the most recent security updates provided by
the software vendor.

Page 277
1.121 (L1) Ensure 'Shopping in Microsoft Edge Enabled' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting allows users to compare the prices of products, get coupons or
rebates from the website, auto-apply coupons, and help checkout faster using autofill
data. Coupons for the current retailer and prices from other retailers will be fetched from
a server.
The recommended state for this setting is: Disabled.
Note: Starting in Microsoft Edge version 90.0.818.56, the behavior of the messaging
letting users know that there is a coupon, rebate, price comparison or price history
available on shopping domains is also done through a horizontal banner below the
address bar.
Rationale:
Shopping in Microsoft Edge shares a user's browsing and search history to provide
price comparison and coupons, which could inadvertently expose and share sensitive
data with a third-party.
Impact:
Users with roles that require this feature will have to perform price comparisons on their
own unless exempted from this setting.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:EdgeShoppingAssistantEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Shopping in Microsoft Edge Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 278
Default Value:
Enabled. (Shopping features such as price comparison, coupons, rebates and express
checkout will be automatically applied for retail domains. Coupons for the current
retailer and prices from other retailers will be fetched from a server.)
References:

1. https://docs.microsoft.com/en-us/deployedge/microsoft-edge-
policies#edgeshoppingassistantenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 279
1.122 (L2) Ensure 'Show an "Always open" checkbox in external
protocol dialog' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls if the user is prompted with an "Always open" check box
when an external protocol prompt is shown.
The recommended state for this setting is: Disabled.

Rationale:
Allowing a protocol to automatically "always open for webpages" could allow a malicious
website to open programs on a device leaving it open to attacks.
Impact:
The end user will be prompted each time they click a link that opens an external
protocol, even if they have utilized it before.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ExternalProtocolDialogShowAlwaysOpenChe
ckbox

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Show
an "Always open" checkbox in external protocol dialog
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (v84 or greater)

Page 280
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#externalprotocoldialogshowalwaysopencheckbox

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 281
1.123 (L1) Ensure 'Show Microsoft Rewards experiences' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether the Microsoft Reward experience is available to
users and if notifications are received. The Microsoft Rewards experience is a free
program that allows the user to earn points when searching on Bing.com. With these
points, the users can buy merchandise from the Microsoft Store online and in Windows
10.
The recommended state for this setting is: Disabled.
Note: The Bing Rewards experience was merged with the Microsoft Reward experience
in 2016.
Rationale:
Due to privacy concerns, data should never be sent to or tracked by any third-party
since this data could contain sensitive information.
Impact:
The Microsoft Rewards experience will not show in the Microsoft Edge user profile.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:ShowMicrosoftRewards

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Show
Microsoft Rewards experiences
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 282
Default Value:
Enabled. (In the search and earn markets users will see the Microsoft Rewards
experience in their Microsoft Edge user profile.)
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 283
1.124 (L1) Ensure 'Show the Reload in Internet Explorer mode
button in the toolbar' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting shows the Reload in Internet Explorer mode button in the toolbar. IE
Mode in Microsoft Edge allows organizations that still need Internet Explorer 11, (which
is not supported) for backward compatibility with existing websites.
The recommended state for this setting is: Disabled.
Note: The button will only be shown on the toolbar when the Allow unconfigured sites to
be reloaded in Internet Explorer mode policy is Enabled (which is set to Disabled in the
benchmark).
Rationale:
Internet Explorer is officially retired and unsupported. Allowing browsers to reconfigure
into Internet Explorer mode could open an organization up to malicious sites due to its
lack of support for modern security features.
Impact:
Users will not be able to see or use the Internet Explorer Mode toolbar.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerModeToolbarButtonEnable
d

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Show
the Reload in Internet Explorer mode button in the toolbar
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 284
Default Value:
Enabled. (Reload in Internet mode button is pinned to the toolbar.)
References:

1. https://docs.microsoft.com/en-us/deployedge/edge-ie-mode

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

9.1 Ensure Use of Only Fully Supported Browsers and


Email Clients
v8 Ensure only fully supported browsers and email clients are allowed to execute ● ● ●
in the enterprise, only using the latest version of browsers and email clients
provided through the vendor.

9.4 Restrict Unnecessary or Unauthorized Browser and


v8 Email Client Extensions
Restrict, either through uninstalling or disabling, any unauthorized or
● ●
unnecessary browser or email client plugins, extensions, and add-on applications.

7.1 Ensure Use of Only Fully Supported Browsers and


Email Clients
v7 Ensure that only fully supported web browsers and email clients are allowed to ● ● ●
execute in the organization, ideally only using the latest version of the browsers
and email clients provided by the vendor.

7.2 Disable Unnecessary or Unauthorized Browser or


v7 Email Client Plugins
Uninstall or disable any unauthorized browser or email client plugins or add-on
● ●
applications.

Page 285
1.125 (L1) Ensure 'Specifies whether SharedArrayBuffers can be
used in a non cross-origin-isolated context' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting specifies whether SharedArrayBuffers can be used in a non-cross-
origin-isolated context. A SharedArrayBuffer is a binary data buffer that can be used to
create views on shared memory. SharedArrayBuffers have a memory access
vulnerability in several popular CPUs.
The recommended state for this setting is: Disabled.

Rationale:
Disabling this policy prevents attackers from being able to exploit memory access
vulnerabilities found in popular CPUs.
Impact:
Users may experience slightly slower loading of webpages.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SharedArrayBufferUnrestrictedAccessAllo
wed

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Specifies whether SharedArrayBuffers can be used in a non cross-origin-
isolated context
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Sites are allowed to use SharedArrayBuffers.)

Page 286
References:

1. https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-
mitigations-microsoft-edge-internet-explorer/
2. https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#sharedarraybufferunrestrictedaccessallowed

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 287
1.126 (L2) Ensure 'Specify if online OCSP/CRL checks are
required for local trust anchors' is set to 'Enabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether online certificate revocation checks (OCSP/CRL)
are required and if a check online is not possible the certificate will be treated as though
it is revoked.
The recommended state for this is: Enabled.

Rationale:
Certificates should always be validated, not doing so could potentially allow a revoked
certificate to be used to give a false sense of a secure connection.
Impact:
If Microsoft Edge is not able to obtain a revocation status, the certificate will be treated
as though it is revoked, therefore the website will not be loaded.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\Edge:RequireOnlineRevocationChecksForLocalAn
chors

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Specify if online OCSP/CRL checks are required for local trust anchors
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled.

Page 288
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#requireonlinerevocationchecksforlocalanchors

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 289
1.127 (L2) Ensure 'Spell checking provided by Microsoft Editor' is
set to 'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether the Microsoft Editor service provides enhanced spell
and grammar checking for eligible text fields.
The recommended state for this setting is: Disabled.

Rationale:
Microsoft Editor is an AI-powered service that that sends data to a third-party cloud
service. Sending this data to the cloud could lead to sensitive data being exposed.
Impact:
Spell check can only be provided by local engines that use platform or Hunspell
services. The results from these engines might be less informative than the results
Microsoft Editor can provide.
Note: If the spellcheckEnabled (Enable spellcheck) policy is set to Disabled, or the
user disables spell checking in the settings page, this policy will have no effect.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:MicrosoftEditorProofingEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Spell
checking provided by Microsoft Editor
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Microsoft Editor spell check can be used for eligible text fields.)

Page 290
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#MicrosoftEditorProofingEnabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 291
1.128 (L1) Ensure 'Standalone Sidebar Enabled' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether users will have the ability to activate the standalone
sidebar. The standalone sidebar is an optional mode for the sidebar in Microsoft Edge
and uses Bing AI. When this mode is activated by a user, the sidebar appears in a fixed
position on the Microsoft Windows desktop and is hidden from the browser application
frame.
The recommended state for this setting is: Disabled.

Rationale:
Microsoft Edge determines what data to send to Bing AI based on the user's query and
their consent to share data with Microsoft. This could allow data to be transmitted to a
third-party cloud service. This could lead to sensitive data being exposed.
Bing AI offers various features, such as summarizing financial reports, comparing
financials of different companies, and aiding users in creating and editing content which
could also lead to sensitive data being exposed.
Impact:
Users will not be able to access the HubsSidebarEnabled (Show Hubs Sidebar) and it
will also prevent them from accessing standalone sidebar and using the Bing AI feature.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:StandaloneHubsSidebarEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Standalone Sidebar Enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 292
Default Value:
Enabled. (Users will have the ability to activate the standalone sidebar.)
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#standaloneHubsSidebarEnabled
2. https://learn.microsoft.com/en-us/microsoft-edge/privacy-whitepaper/#bing-chat-
in-microsoft-edge-sidebar

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 293
1.129 (L1) Ensure 'Suggest similar pages when a webpage can’t
be found' is set to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting controls whether Microsoft Edge may connect to a web service to
generate URLs and search suggestions for website connectivity issues. If disabled
standard errors will be issued, if enabled errors will be customized with URL
suggestions.
The recommended state for this setting is: Disabled.

Rationale:
This setting could potentially lead to a leak of information regarding the types of
websites being visited, it may also open users up to redirection to a malicious site in the
event that the service generating information becomes compromised.
Impact:
Users will still be presented with an error if a website cannot be reached however, the
message may be more generic than the user would get in the instance of this service
being enabled.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:AlternateErrorPagesEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Suggest similar pages when a webpage can’t be found
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 294
Default Value:
Not Configured. (Users will have the option to enable this setting with the
edge://settings/privacy page.)
References:

1. https://docs.microsoft.com/DeployEdge/microsoft-edge-
policies#alternateerrorpagesenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 295
1.130 (L1) Ensure 'Suppress the unsupported OS warning' is set
to 'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting suppresses the warning that appears when Microsoft Edge is running
on a computer or operating system that is no longer supported. If this policy is disabled
or unset, the warnings will appear on such unsupported computers or operating
systems.
The recommended state for this setting is: Disabled.

Rationale:
Users will be notified if the Operating System software is no longer supported.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:SuppressUnsupportedOSWarning

Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Microsoft
Edge\Suppress the unsupported OS warning
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Disabled. (Warnings will appear on such unsupported computers or operating systems.)

Page 296
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

2.2 Ensure Authorized Software is Currently Supported


Ensure that only currently supported software is designated as authorized in the
software inventory for enterprise assets. If software is unsupported, yet necessary
v8 for the fulfillment of the enterprise’s mission, document an exception detailing ● ● ●
mitigating controls and residual risk acceptance. For any unsupported software
without an exception documentation, designate as unauthorized. Review the
software list to verify software support at least monthly, or more frequently.

2.2 Ensure Software is Supported by Vendor


Ensure that only software applications or operating systems currently supported
v7 by the software's vendor are added to the organization's authorized software ● ● ●
inventory. Unsupported software should be tagged as unsupported in the inventory
system.

Page 297
1.131 (L2) Ensure 'Tab Services enabled' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting allows the Microsoft Edge browser to suggest tab and tab group
functionality based on the current tab content.
The recommended state for this setting is: Disabled.

Rationale:
Enabling tab services sends tab data to a third-party cloud service, which could lead to
sensitive data being exposed.
Impact:
The Microsoft Edge browser will not be able to help users with tab organization.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TabservicesEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Tab
Services enabled
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Tab information will be sent to the service to gather suggestions to help with
tab organization.)

Page 298
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#tabservicesEnabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 299
1.132 (L2) Ensure 'Text prediction enabled by default' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
This policy setting controls whether text predictions will be provided for eligible text
fields. The Microsoft Turing service uses natural language processing to generate
predictions for long-form editable text fields on web pages.
The recommended state for this setting is: Disabled.

Rationale:
Enabling text predictions could allow data to be transmitted to a third-party cloud
service, which could lead to sensitive data being exposed.
Impact:
Text predictions will not be provided in eligible text fields. Sites may still provide their
own text predictions.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:TextPredictionEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Text
prediction enabled by default
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Enabled. (Text predictions will be provided for eligible text fields.)

Page 300
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#textpredictionEnabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 301
1.133 (L1) Ensure 'Wait for Internet Explorer mode tabs to
completely unload before ending the browser session' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting causes Microsoft Edge to continue running until all Internet Explorer
tabs have completely finished unloading. This allows Internet Explorer plugins like
ActiveX controls to perform additional critical work even after the browser has been
closed.
The recommended state for this setting is: Disabled.

Rationale:
Enabling this policy can cause stability and performance issues, and Microsoft Edge
processes may remain active in the background with no visible windows if the webpage
or plugin prevents Internet Explorer from unloading. This policy should only be used if
your organization depends on a plugin that requires this behavior.
Impact:
None - this is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:InternetExplorerIntegrationAlwayswaitFo
rUnload

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge\Wait
for Internet Explorer mode tabs to completely unload before ending the
browser session
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.

Page 302
Default Value:
Disabled. (Microsoft Edge will not always wait for Internet Explorer mode tabs to fully
unload before ending the browser session.)
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#InternetExplorerIntegrationAlwayswaitForUnload

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 303
1.134 (L1) Ensure 'Wallet Donation Enabled' is set to 'Disabled'
(Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
The Wallet Donation feature in Microsoft Edge allows users to view their donation
summary, explore Nonprofit organizations (NPOs), donate to an NPO, manage their
monthly donations, and view their donation history.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users the ability to use the wallet donation feature in Microsoft Edge could lead
to sensitive data being exposed.
Impact:
The wallet donation feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:WalletDonationEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable wallet donation in Microsoft Edge.
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the wallet donation feature in Microsoft Edge.)

Page 304
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#walletdonationenabled

CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

9.2 Ensure Only Approved Ports, Protocols and Services


v7 Are Running
Ensure that only network ports, protocols, and services listening on a system
● ●
with validated business needs, are running on each system.

Page 305
1.135 (L2) Ensure 'Enable QR Code Generator' is set to
'Disabled' (Automated)
Profile Applicability:

• Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)


Description:
The QR Code Generator feature in Microsoft Edge allows users the ability to generate
QR codes to internal and external sites.
The recommended state for this setting is: Disabled.

Rationale:
Allowing users the ability to use the QR code generator feature in Microsoft Edge could
lead to sensitive data being exposed.
Impact:
The QR code generator feature in Microsoft Edge will not function.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 0.
HKLM\SOFTWARE\Policies\Microsoft\Edge:QRCodeGeneratorEnabled

Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Computer Configuration\Policies\Administrative Templates\Microsoft
Edge\Enable QR Code Generator
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from Microsoft from Download
Edge for Business.
Default Value:
Enabled. (Users can use the QR code generator feature in Microsoft Edge.)
References:

1. https://learn.microsoft.com/en-us/deployedge/microsoft-edge-
policies#qrcodegeneratorenabled

Page 306
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

4.8 Uninstall or Disable Unnecessary Services on


Enterprise Assets and Software
v8 Uninstall or disable unnecessary services on enterprise assets and software, ● ●
such as an unused file sharing service, web application module, or service
function.

Page 307
2 Microsoft Edge - Default Settings (users can override)
This section is intentionally blank and exists to ensure the structure of Microsoft Edge
benchmark is consistent.
These policy settings may be overridden by the user therefore no policy configurations
are recommended for this section.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

3 Microsoft Edge Update


This section contains recommendations for Microsoft Edge Update.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

3.1 Applications

This section contains recommendations for Applications.


This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 308
3.1.1 (L1) Ensure 'Update policy override default' is set to
'Enabled: Always allow updates (recommended)' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy settings sets the default behavior for all channels concerning the way
Microsoft Edge Update handles available updates for Microsoft Edge.
The recommended state for this setting is: Enabled: Always allow updates
(recommended).
Note: This setting can be overridden for individual channels by specifying the Update
policy override policy for those specific channels.
Note #2: This policy is available only on Windows instances that are joined to a
Microsoft® Active Directory® domain.
Rationale:
Applying software updates as soon as they become available can ensure that systems
will always have the most recent critical updates installed.
Impact:
The latest Microsoft Edge updates are automatically installed. Enterprises that use other
means of patching systems will need to exclude this recommendation from the
benchmark.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD value of 1.
HKLM\SOFTWARE\Policies\Microsoft\EdgeUpdate:UpdateDefault

Page 309
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Always allow updates (recommended) or Enabled: Automatic
silent updates only:
Computer Configuration\Polices\Administrative Templates\Microsoft Edge
Update\Applications\Update policy override default
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
Microsoft Edge Update handles available updates as specified by the Update policy
override policy.
CIS Controls:

Controls
Control IG 1 IG 2 IG 3
Version

7.4 Perform Automated Application Patch Management


v8 Perform application updates on enterprise assets through automated patch ● ● ●
management on a monthly, or more frequent, basis.

3.5 Deploy Automated Software Patch Management


Tools
v7 Deploy automated software update tools in order to ensure that third-party ● ● ●
software on all systems is running the most recent security updates provided by
the software vendor.

Page 310
3.2 Microsoft Edge WebView2 Runtime

This section contains recommendations for Microsoft Edge Microsoft Edge WebView2
Runtime.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

3.3 Preferences

This section contains recommendations for Microsoft Edge Microsoft Edge Preferences.
This Group Policy section is provided by the Group Policy template MSEdge.admx/adml
that is included with the Microsoft Edge v85 Administrative Templates (or newer).

Page 311
3.3.1 (L1) Ensure 'Auto-update check period override' is set to
any value except '0' (Automated)
Profile Applicability:

• Level 1 (L1) - Corporate/Enterprise Environment (general use)


Description:
This policy setting configures the minimum number of minutes between automatic
update checks.
The recommended state for this setting is: any value except 0.

Rationale:
Automatic updates can help ensure that the computers in the environment will always
have the most recent critical updates and can decrease the amount of time the system
will remain vulnerable between updates and patches.
Impact:
If using a third-party for patching, an exception to this recommendation will be needed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location with a
REG_DWORD any value except 0.
HKLM\SOFTWARE\Policies\Microsoft\EdgeUpdate:AutoUpdateCheckPeriodMinutes

Remediation:
To establish the recommended configuration via GP, set the following UI path to any
value except 0:
Computer Configuration\Policies\Administrative Templates\Microsoft Edge
Update\Preferences\Auto-update check period override
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template MSEdge.admx/adml that can be downloaded from: Download Microsoft Edge
for Business - Microsoft.
Default Value:
1400 (10 hours)

Page 312
References:

1. https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-
policies#CryptoWalletEnabled

CIS Controls:

Controls Version Control IG 1 IG 2 IG 3

v8 0.0 Explicitly Not Mapped


Explicitly Not Mapped

v7 0.0 Explicitly Not Mapped


Explicitly Not Mapped

Page 313
4 Microsoft Edge WebView2
This section is intentionally blank and exists to ensure the structure of the Microsoft
Edge benchmarks is consistent.
This Group Policy section is provided by the Group Policy template
MSEdgeWebView2.admx/adml that is included with the Microsoft Edge v87
Administrative Templates (or newer).

Page 314
Appendix: Summary Table
CIS Benchmark Recommendation Set
Correctly

Yes No

1 Microsoft Edge

1.1 Application Guard settings

1.2 Cast

1.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'  


(Automated)

1.3 Content Settings

1.3.1 (L2) Ensure 'Allow read access via the File System API  
on these sites' is set to 'Disabled' (Automated)

1.3.2 (L1) Ensure 'Control use of insecure content exceptions'  


is set to 'Enabled: Do not allow any site to load mixed
content' (Automated)

1.3.3 (L2) Ensure 'Control use of JavaScript JIT' is set to  


'Enabled: Do not allow any site to run JavaScript JIT'
(Automated)

1.3.4 (L2) Ensure 'Control use of the File System API for  
reading' is set to 'Enabled: Don't allow any site to request
read access to files and directories via the File System
API' (Automated)

1.3.5 (L1) Ensure 'Control use of the File System API for  
writing' is set to 'Enabled: Don't allow any site to request
write access to files and directories' (Automated)

1.3.6 (L2) Ensure 'Control use of the Web Bluetooth API' is set  
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
(Automated)

Page 315
CIS Benchmark Recommendation Set
Correctly

Yes No

1.3.7 (L2) Ensure 'Control use of the WebHID API' is set to  


'Enabled: Do not allow any site to request access to HID
devices via the WebHID API' (Automated)

1.3.8 (L1) Ensure 'Default automatic downloads setting' is set  


to 'Enabled: Don´t allow any website to perform
automatic downloads' (Automated)

1.3.9 (L1) Ensure 'Default geolocation setting' is set to  


'Enabled: Don't allow any site to track users' physical
location' (Automated)

1.3.10 (L2) Ensure 'Default setting for third-party storage  


partitioning' is set to 'Enabled: Block third-party storage
partitioning from being enabled.' (Automated)

1.4 Default search provider

1.5 Edge Website Typo Protection settings

1.5.1 (L1) Ensure 'Configure Edge Website Typo Protection' is  


set to 'Enabled' (Automated)

1.6 Edge Workspaces settings

1.7 Experimentation

1.7.1 (L1) Ensure 'Configure users ability to override feature  


flags' is set to 'Enabled: Prevent users from overriding
feature flags' (Automated)

1.8 Extensions

1.8.1 (L1) Ensure 'Blocks external extensions from being  


installed' is set to 'Enabled' (Automated)

1.8.2 (L2) Ensure 'Configure extension management settings'  


is set to 'Enabled: *' (Automated)

1.9 Games settings

Page 316
CIS Benchmark Recommendation Set
Correctly

Yes No

1.9.1 Ensure 'Enable Gamer Mode' is set to 'Disabled'  


(Automated)

1.10 HTTP authentication

1.10.1 (L1) Ensure 'Allow Basic authentication for HTTP' is set  


to 'Disabled' (Automated)

1.10.2 (L1) Ensure 'Allow cross-origin HTTP Authentication  


prompts' is set to 'Disabled' (Automated)

1.10.3 (L2) Ensure 'Supported authentication schemes' is set to  


'Enabled: ntlm, negotiate' (Automated)

1.11 Identity and sign-in

1.11.1 (L1) Ensure 'Enable the linked account feature' is set to  


'Disabled' (Automated)

1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled'  


(Automated)

1.12 Immersive Reader settings

1.13 Kiosk Mode settings

1.14 Manageability

1.15 Native Messaging

1.16 Network settings

1.17 Password manager and protection

1.17.1 (L1) Ensure 'Enable saving passwords to the password  


manager' is set to 'Disabled' (Automated)

1.18 Performance

1.18.1 (L1) Ensure 'Enable startup boost' is set to 'Disabled'  


(Automated)

Page 317
CIS Benchmark Recommendation Set
Correctly

Yes No

1.19 Permit or deny screen capture

1.20 Printing

1.21 Private Network Request Settings

1.21.1 (L1) Ensure 'Specifies whether to allow websites to  


make requests to more-private network endpoints' is set
to 'Disabled' (Automated)

1.22 Proxy server

1.23 Related Website Sets Settings

1.24 Sleeping tabs settings

1.25 SmartScreen settings

1.25.1 (L1) Ensure 'Configure Microsoft Defender SmartScreen'  


is set to 'Enabled' (Automated)

1.25.2 (L1) Ensure 'Configure Microsoft Defender SmartScreen  


to block potentially unwanted apps' is set to 'Enabled'
(Automated)

1.25.3 (L1) Ensure 'Enable Microsoft Defender SmartScreen  


DNS requests' is set to 'Disabled' (Automated)

1.25.4 (L1) Ensure 'Force Microsoft Defender SmartScreen  


checks on downloads from trusted sources' is set to
'Enabled' (Automated)

1.25.5 (L1) Ensure 'Prevent bypassing Microsoft Defender  


SmartScreen prompts for sites' is set to 'Enabled'
(Automated)

1.25.6 (L1) Ensure 'Prevent bypassing of Microsoft Defender  


SmartScreen warnings about downloads' is set to
'Enabled' (Automated)

1.26 Startup, home page and new tab page

Page 318
CIS Benchmark Recommendation Set
Correctly

Yes No

1.26.1 (L1) Ensure 'Disable Bing chat entry-points on Microsoft  


Edge Enterprise new tab page' is set to 'Disabled'
(Automated)

1.27 (L1) Ensure 'Ads setting for sites with intrusive ads' is set  
to 'Enabled: Block ads on sites with intrusive ads.'
(Automated)

1.28 (L1) Ensure 'Allow download restrictions' is set to  


'Enabled: Block malicious downloads' (Automated)

1.29 (L2) Ensure 'Allow features to download assets from the  


Asset Delivery Service' is set to 'Disabled' (Automated)

1.30 (L2) Ensure 'Allow file selection dialogs' is set to  


'Disabled' (Automated)

1.31 (L1) Ensure 'Allow Google Cast to connect to Cast  


devices on all IP addresses' is set to 'Disabled'
(Automated)

1.32 (L1) Ensure 'Allow import of data from other browsers on  


each Microsoft Edge launch' is set to 'Disabled'
(Automated)

1.33 (L1) Ensure 'Allow importing of autofill form data' is set to  


'Disabled' (Automated)

1.34 (L1) Ensure 'Allow importing of browser settings' is set to  


'Disabled' (Automated)

1.35 (L1) Ensure 'Allow importing of home page settings' is  


set to 'Disabled' (Automated)

1.36 (L1) Ensure 'Allow importing of payment info' is set to  


'Disabled' (Automated)

1.37 (L1) Ensure 'Allow importing of saved passwords' is set  


to 'Disabled' (Automated)

1.38 (L1) Ensure 'Allow importing of search engine settings' is  


set to 'Disabled' (Automated)

Page 319
CIS Benchmark Recommendation Set
Correctly

Yes No

1.39 (L1) Ensure 'Allow managed extensions to use the  


Enterprise Hardware Platform API' is set to 'Disabled'
(Automated)

1.40 (L2) Ensure 'Allow or block audio capture' is set to  


'Disabled' (Automated)

1.41 (L2) Ensure 'Allow or block video capture' is set to  


'Disabled' (Automated)

1.42 (L2) Ensure 'Allow or deny screen capture' is set to  


'Disabled' (Automated)

1.43 (L1) Ensure 'Allow personalization of ads, Microsoft  


Edge, search, news and other Microsoft services by
sending browsing history, favorites and collections,
usage and other browsing data to Microsoft' is set to
'Disabled' (Automated)

1.44 (L1) Ensure 'Allow queries to a Browser Network Time  


service' is set to 'Enabled' (Automated)

1.45 (L1) Ensure 'Allow remote debugging' is set to 'Disabled'  


(Automated)

1.46 (L1) Ensure 'Allow the audio sandbox to run' is set to  


'Enabled' (Automated)

1.47 (L2) Ensure 'Allow unconfigured sites to be reloaded in  


Internet Explorer mode' is set to 'Disabled' (Automated)

1.48 (L1) Ensure 'Allow user feedback' is set to 'Disabled'  


(Automated)

1.49 (L2) Ensure 'Allow users to open files using the  


ClickOnce protocol' is set to 'Disabled' (Automated)

1.50 (L2) Ensure 'Allow users to open files using the  


DirectInvoke protocol' is set to 'Disabled' (Automated)

1.51 (L2) Ensure 'Allow users to proceed from the HTTPS  


warning page' is set to 'Disabled' (Automated)

Page 320
CIS Benchmark Recommendation Set
Correctly

Yes No

1.52 (L1) Ensure 'Allow websites to query for available  


payment methods' is set to 'Disabled' (Automated)

1.53 (L2) Ensure 'AutoLaunch Protocols Component Enabled'  


is set to 'Disabled' (Automated)

1.54 (L1) Ensure 'Automatically import another browser's data  


and settings at first run' is set to 'Enabled: Disables
automatic import, and the import section of the first-run
experience is skipped' (Automated)

1.55 (L1) Ensure 'Automatically open downloaded MHT or  


MHTML files from the web in Internet Explorer mode' is
set to 'Disabled' (Automated)

1.56 (L2) Ensure 'Block third party cookies' is set to 'Enabled'  


(Automated)

1.57 (L1) Ensure 'Block tracking of users' web-browsing  


activity' is set to 'Enabled: Balanced (Blocks harmful
trackers and trackers from sites user has not visited;
content and ads will be less personalized)' or higher
(Automated)

1.58 (L2) Ensure 'Browser sign-in settings' is set to 'Enabled:  


Disable browser sign-in' (Automated)

1.59 (L1) Ensure 'Clear browsing data when Microsoft Edge  


closes' is set to 'Disabled' (Automated)

1.60 (L1) Ensure 'Clear cached images and files when  


Microsoft Edge closes' is set to 'Disabled' (Automated)

1.61 (L1) Ensure 'Clear history for IE and IE mode every time  
you exit' is set to 'Disabled' (Automated)

1.62 (L1) Ensure 'Compose is enabled for writing on the web'  


is set to 'Disabled' (Automated)

1.63 (L1) Ensure 'Configure browser process code integrity  


guard setting' is set to 'Enabled: Enable code integrity
guard enforcement in the browser process.' (Automated)

Page 321
CIS Benchmark Recommendation Set
Correctly

Yes No

1.64 (L1) Ensure 'Configure InPrivate mode availability' is set  


to 'Enabled: InPrivate mode disabled' (Automated)

1.65 (L2) Ensure 'Configure Online Text To Speech' is set to  


'Disabled' (Automated)

1.66 (L1) Ensure 'Configure Related Matches in Find on  


Page' is set to 'Disabled' (Automated)

1.67 (L2) Ensure 'Configure Speech Recognition' is set to  


'Disabled' (Automated)

1.68 (L1) Ensure 'Configure the list of names that will bypass  
the HSTS policy check' is set to 'Disabled' (Automated)

1.69 (L1) Ensure 'Configure the list of types that are excluded  
from synchronization' is set to 'Enabled' (Automated)

1.70 (L1) Ensure 'Configure the Share experience' is set to  


'Enabled: Don't allow using the Share experience'
(Automated)

1.71 (L1) Ensure 'Configure whether form data and HTTP  


headers will be sent when entering or exiting Internet
Explorer mode' is set to 'Enabled: Do not send form data
or headers' (Automated)

1.72 (L1) Ensure 'Continue running background apps after  


Microsoft Edge closes' is set to 'Disabled' (Automated)

1.73 (L1) Ensure 'Control communication with the  


Experimentation and Configuration Service' is set to
'Enabled: Disable communication with the
Experimentation and Configuration Service' (Automated)

1.74 (L2) Ensure 'Control use of the Headless Mode' is set to  


'Disabled' (Automated)

1.75 (L2) Ensure 'Control use of the Serial API' is set to  


'Enable: Do not allow any site to request access to serial
ports via the Serial API' (Automated)

Page 322
CIS Benchmark Recommendation Set
Correctly

Yes No

1.76 (L2) Ensure 'Control where security restrictions on  


insecure origins apply' is set to 'Disabled' (Automated)

1.77 (L2) Ensure 'Default sensors setting' is set to 'Enabled:  


Do not allow any site to access sensors' (Automated)

1.78 (L1) Ensure 'Delete old browser data on migration' is set  


to 'Disabled' (Automated)

1.79 (L1) Ensure 'Disable saving browser history' is set to  


'Disabled' (Automated)

1.80 (L1) Ensure 'Disable synchronization of data using  


Microsoft sync services' is set to 'Enabled' (Automated)

1.81 (L1) Ensure 'DNS interception checks enabled' is set to  


'Enabled' (Automated)

1.82 (L1) Ensure 'Edge 3P SERP Telemetry Enabled' is set to  


'Disabled' (Automated)

1.83 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to  


'Disabled' (Automated)

1.84 (L1) Ensure 'Enable AutoFill for addresses' is set to  


'Disabled' (Automated)

1.85 (L1) Ensure 'Enable AutoFill for payment instructions' is  


set to 'Disabled' (Automated)

1.86 (L1) Ensure 'Enable browser legacy extension point  


blocking' is set to 'Enabled' (Automated)

1.87 (L1) Ensure 'Enable component updates in Microsoft  


Edge' is set to 'Enabled' (Automated)

1.88 (L1) Ensure 'Enable CryptoWallet feature' is set to  


'Disabled' (Automated)

1.89 (L1) Ensure 'Enable deleting browser and download  


history' is set to 'Disabled' (Automated)

Page 323
CIS Benchmark Recommendation Set
Correctly

Yes No

1.90 (L1) Ensure 'Enable Discover access to page contents  


for AAD profiles' is set to 'Disabled' (Automated)

1.91 (L2) Ensure 'Enable Drop feature in Microsoft Edge' is  


set to 'Disabled' (Automated)

1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is  


set to 'Disabled' (Automated)

1.93 (L1) Ensure 'Enable globally scoped HTTP auth cache' is  


set to 'Disabled' (Automated)

1.94 (L2) Ensure 'Enable guest mode' is set to 'Disabled'  


(Automated)

1.95 (L1) Ensure 'Enable network prediction' is set to  


'Enabled: Don't predict network actions on any network
connection' (Automated)

1.96 (L1) Ensure 'Enable profile creation from the Identity  


flyout menu or the Settings page' is set to 'Disabled'
(Automated)

1.97 (L1) Ensure 'Enable resolution of navigation errors using  


a web service' is set to 'Disabled' (Automated)

1.98 (L2) Ensure 'Enable search suggestions' is set to  


'Disabled' (Automated)

1.99 (L1) Ensure 'Enable security warnings for command-line  


flags' is set to 'Enabled' (Automated)

1.100 (L1) Ensure 'Enable site isolation for every site' is set to  
'Enabled' (Automated)

1.101 (L1) Ensure 'Enable tab organization suggestions' is set  


to 'Disabled' (Automated)

1.102 (L1) Ensure 'Enable the Search bar' is set to 'Disabled'  


(Automated)

Page 324
CIS Benchmark Recommendation Set
Correctly

Yes No

1.103 (L2) Ensure 'Enable Translate' is set to 'Disabled'  


(Automated)

1.104 (L1) Ensure 'Enable upload files from mobile in Microsoft  


Edge desktop' is set to 'Disabled' (Automated)

1.105 (L1) Ensure 'Enable use of ephemeral profiles' is set to  


'Disabled' (Automated)

1.106 (L1) Ensure 'Enable warnings for insecure forms' is set  


to 'Enabled' (Automated)

1.107 (L1) Ensure 'Enables DALL-E themes generation' is set  


to 'Disabled' (Automated)

1.108 (L2) Ensure 'Enforce Bing SafeSearch' is set to 'Enabled:  


Configure moderate search restrictions in Bing'
(Automated)

1.109 (L2) Ensure 'Enforce Google SafeSearch' is set to  


'Enabled' (Automated)

1.110 (L1) Ensure 'Enhance the security state in Microsoft  


Edge' is set to 'Enabled: Balanced mode' or higher
(Automated)

1.111 (L2) Ensure 'Enhanced Security Mode configuration for  


Intranet zone sites' is set to 'Disabled' (Automated)

1.112 (L1) Ensure 'Hide the First-run experience and splash  


screen' is set to 'Enabled' (Automated)

1.113 (L1) Ensure 'In-app support Enabled' is set to 'Disabled'  


(Automated)

1.114 (L2) Ensure 'Let users snip a Math problem and get the  
solution with a step-by-step explanation in Microsoft
Edge' is set to 'Disabled' (Automated)

1.115 (L2) Ensure 'Live captions allowed' is set to 'Disabled'  


(Automated)

Page 325
CIS Benchmark Recommendation Set
Correctly

Yes No

1.116 (L1) Ensure 'Manage exposure of local IP addresses by  


WebRTC' is set to 'Disabled' (Automated)

1.117 (L1) Ensure 'Notify a user that a browser restart is  


recommended or required for pending updates' is set to
'Enabled: Required - Show a recurring prompt to the
user indicating that a restart is required' (Automated)

1.118 (L1) Ensure 'Restrict exposure of local IP address by  


WebRTC' is set to 'Enabled: Allow public interface over
http default route. This doesn't expose the local IP
address' (Automated)

1.119 (L1) Ensure 'Set disk cache size, in bytes' is set to  


'Enabled: 250609664' (Automated)

1.120 (L1) Ensure 'Set the time period for update notifications'  
is set to 'Enabled: 86400000' (Automated)

1.121 (L1) Ensure 'Shopping in Microsoft Edge Enabled' is set  


to 'Disabled' (Automated)

1.122 (L2) Ensure 'Show an "Always open" checkbox in  


external protocol dialog' is set to 'Disabled' (Automated)

1.123 (L1) Ensure 'Show Microsoft Rewards experiences' is set  


to 'Disabled' (Automated)

1.124 (L1) Ensure 'Show the Reload in Internet Explorer mode  


button in the toolbar' is set to 'Disabled' (Automated)

1.125 (L1) Ensure 'Specifies whether SharedArrayBuffers can  


be used in a non cross-origin-isolated context' is set to
'Disabled' (Automated)

1.126 (L2) Ensure 'Specify if online OCSP/CRL checks are  


required for local trust anchors' is set to 'Enabled'
(Automated)

1.127 (L2) Ensure 'Spell checking provided by Microsoft Editor'  


is set to 'Disabled' (Automated)

Page 326
CIS Benchmark Recommendation Set
Correctly

Yes No

1.128 (L1) Ensure 'Standalone Sidebar Enabled' is set to  


'Disabled' (Automated)

1.129 (L1) Ensure 'Suggest similar pages when a webpage  


can’t be found' is set to 'Disabled' (Automated)

1.130 (L1) Ensure 'Suppress the unsupported OS warning' is  


set to 'Disabled' (Automated)

1.131 (L2) Ensure 'Tab Services enabled' is set to 'Disabled'  


(Automated)

1.132 (L2) Ensure 'Text prediction enabled by default' is set to  


'Disabled' (Automated)

1.133 (L1) Ensure 'Wait for Internet Explorer mode tabs to  


completely unload before ending the browser session' is
set to 'Disabled' (Automated)

1.134 (L1) Ensure 'Wallet Donation Enabled' is set to 'Disabled'  


(Automated)

1.135 (L2) Ensure 'Enable QR Code Generator' is set to  


'Disabled' (Automated)

2 Microsoft Edge - Default Settings (users can override)

3 Microsoft Edge Update

3.1 Applications

3.1.1 (L1) Ensure 'Update policy override default' is set to  


'Enabled: Always allow updates (recommended)'
(Automated)

3.2 Microsoft Edge WebView2 Runtime

3.3 Preferences

3.3.1 (L1) Ensure 'Auto-update check period override' is set to  


any value except '0' (Automated)

Page 327
CIS Benchmark Recommendation Set
Correctly

Yes No

4 Microsoft Edge WebView2

Page 328
Appendix: Change History
Date Version Changes for this version

10/27/2020 1.0.0 Initial Release

05/18/2022 1.0.1 UPDATE - 1.1 (L1) Ensure 'Manage exposure of local IP


addresses by WebRTC' is set to 'Disabled'
Ticket# 15471

09/19/2022 1.1.0 REMOVE - Ensure 'Re-enable deprecated web platform


features for a limited time' is set to 'Disabled'
Ticket #11614

09/19/2022 1.1.0 REMOVE - 1 (L2) Ensure 'Enable online OCSP/CRL checks'


is set to 'Enabled'
Ticket #13392

09/19/2022 1.1.0 UPDATE - Section Changes


Ticket #15934

09/19/2022 1.1.0 REMOVE - 1 (L1) Ensure 'Allows a page to show popups


during its unloading' is set to 'Disabled'
Ticket #15935

09/19/2022 1.1.0 RENAME - 1 (L1) Enable 'AutoFill for credit cards' TO


'Enable AutoFill for payment instruments'
Ticket #15936

09/19/2022 1.1.0 REMOVE - 1 (L1) Ensure 'Enable Proactive Authentication' is


set to 'Disabled'
Ticket #15938

09/19/2022 1.1.0 REMOVE - 1 (L1) Ensure 'Enable usage and crash-related


data reporting' is set to 'Disabled'
Ticket #15939

09/19/2022 1.1.0 REMOVE - 1 (L2) Ensure 'Extend Adobe Flash content


setting to all content' is set to 'Disabled'
Ticket #15940

Page 329
Date Version Changes for this version

09/19/2022 1.1.0 REMOVE - 1 (L1) Ensure 'Send site information to improve


Microsoft services' is set to 'Disabled'
Ticket #15941

09/19/2022 1.1.0 REMOVE - (L2) Ensure 'Default Adobe Flash setting' is set to
'Enabled: Block the Adobe Flash plug-in'
Ticket #15953

09/19/2022 1.1.0 ADD - (L1) Ensure 'Allow remote debugging' is set to


'Disabled'
Ticket #15954

09/19/2022 1.1.0 ADD - (L2) Ensure 'Control use of the Headless Mode' is set
to 'Disabled'
Ticket #15955

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Default sensors setting' is set to


'Enabled: Do not allow any site to access sensors'
Ticket #15964

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enable browser legacy extension point
blocking' is set to 'Enabled'
Ticket #15987

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enable Follow service in Microsoft


Edge' is set to 'Disabled'
Ticket #15989

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Allow unconfigured sites to be reloaded


in Internet Explorer mode' is set to 'Disabled'
Ticket #16198

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'AutoLaunch Protocols Component


Enabled' is set to 'Disabled'
Ticket #16199

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Configure Related Matches in Find on


Page' is set to 'Disabled'
Ticket #16201

Page 330
Date Version Changes for this version

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Configure Speech Recognition' is set to


'Disabled'
Ticket #16202

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Configure whether form data and HTTP
headers will be sent when entering or exiting Internet
Explorer mode' is set to 'Enabled: Do not send form data or
headers'
Ticket #16203

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enable travel assistance' is set to


'Disabled'
Ticket #16204

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enable warnings for insecure forms' is
set to 'Enabled'
Ticket #16205

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Enhance the security state in Microsoft
Edge' is set to 'Enabled: Balanced mode'
Ticket #16206

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'In-app support Enabled' is set to


'Disabled'
Ticket #16207

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Let users snip a Math problem and get
the solution with a step-by-step explanation in Microsoft
Edge' is set to 'Disabled'
Ticket #16208"

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Shopping in Microsoft Edge Enabled' is


set to 'Disabled'
Ticket #16209

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Show Microsoft Rewards experiences'


is set to 'Disabled'
Ticket #16210

Page 331
Date Version Changes for this version

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Show the Reload in Internet Explorer
mode button in the toolbar' is set to 'Disabled'
Ticket #16211

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Specifies whether SharedArrayBuffers


can be used in a non cross-origin-isolated context' is set to
'Disabled'
Ticket #16212

09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Allow read access via the File System
API on these sites' is set to 'Disabled'
Ticket #16213

09/19/2022 1.1.0 ADD - 1.3 (L1) Ensure 'Choose whether users can receive
customized background images and text, suggestions,
notifications, and tips for Microsoft services' is set to
'Disabled'
Ticket #16214

09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Control use of JavaScript JIT' is set to
'Disabled'
Ticket #16215

09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Control use of the File System API for
reading' is set to 'Enabled: Don't allow any site to request
read access to files and directories'
Ticket #16216

09/19/2022 1.1.0 ADD - 1.3 (L1) Ensure 'Control use of the File System API for
writing' is set to 'Enabled: Don't allow any site to request write
access to files and directories'
Ticket #16217

09/19/2022 1.1.0 ADD - 1.3 (L2) Ensure 'Control use of the WebHID API' is set
to 'Enabled: Do not allow any site to request access to HID
devices via the WebHID API'
Ticket #16218

Page 332
Date Version Changes for this version

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Specifies whether to allow insecure


websites to make requests to more-private network
endpoints' is set to 'Disabled'
Ticket #16219

09/19/2022 1.1.0 ADD - 1.5 (L1) Ensure 'Configure users ability to override
feature flags' is set to 'Enabled: Prevent users from
overriding feature flags'
Ticket #16220

09/19/2022 1.1.0 ADD - 1.7 (L1) Ensure 'Allow Basic authentication for HTTP'
is set to 'Disabled'
Ticket #16221

09/19/2022 1.1.0 ADD - 1.14 (L1) Ensure 'Enable startup boost' is set to
'Disabled'
Ticket #16222

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Allow features to download assets from
the Asset Delivery Service' is set to 'Disabled'
Ticket #16223

09/19/2022 1.1.0 CHANGE - 1 (L2) Ensure 'Enforce Google SafeSearch' is set


to 'Disabled' TO 'Enabled'
Ticket #16244

09/19/2022 1.1.0 CHANGE - 1.7 (L2) Ensure 'Supported authentication


schemes' is set to 'Enabled: digest, ntlm, negotiate' TO
'Enabled: ntlm, negotiate'
Ticket #16245

09/19/2022 1.1.0 REMOVE - 1 (L2) Ensure 'Ask where to save downloaded


files' is set to 'Disabled'
Ticket #16246

09/19/2022 1.1.0 ADD - 1.22 (L1) Ensure 'Configure Edge


TyposquattingChecker' is set to 'Enabled'
Ticket #16259

Page 333
Date Version Changes for this version

09/19/2022 1.1.0 ADD - (L2) Ensure 'Control where security restrictions on


insecure origins apply' is set to 'Disabled'
Ticket #16278

09/19/2022 1.1.0 ADD - 1 (L1) Ensure 'Suppress the unsupported OS warning'


is set to 'Disabled'
Ticket #16279

09/19/2022 1.1.0 ADD - 1.3 (L1) Ensure 'Control use of insecure content
exceptions' is set to 'Enabled: Do not allow any site to load
mixed content'
Ticket #16280

09/19/2022 1.1.0 ADD - 1.6 (L2) Ensure 'Configure extension management


settings' is set to 'Enabled: *'
Ticket #16285

09/19/2022 1.1.0 ADD - 3.1 (L1) Ensure 'Update policy override default' is set
to 'Enabled: Always allow updates (recommended)'
Ticket #16286

09/19/2022 1.1.0 ADD - 1.20 (L1) Ensure 'Enable Microsoft Defender


SmartScreen DNS requests' is set to 'Disabled'
Ticket #16349

09/19/2022 1.1.0 ADD - 1 (L2) Ensure 'Control use of the Serial API' is set to
'Enable: Do not allow any site to request access to serial
ports via the Serial API'
Ticket #16350

09/21/2023 2.0.0 UPDATE - 1.3.4 (L2) Ensure 'Control use of JavaScript JIT' is
set to 'Disabled'
Ticket #19626

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Auto-update check period override' is


set to any value except '0'
Ticket #19530

Page 334
Date Version Changes for this version

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Guided Switch Enabled' is set to


'Disabled'
Ticket #19529

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Enable the linked account feature' is set
to 'Disabled'
Ticket #19528

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Default automatic downloads setting' is


set to 'Enabled: Don´t allow any website to perform automatic
downloads'
Ticket #19527

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Wait for Internet Explorer mode tabs to
completely unload before ending the browser session' is set
to 'Disabled'
Ticket #19526

09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Text prediction enabled by default' is


set to 'Disabled'
Ticket #19525

09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Tab Services enabled' is set to


'Disabled'
Ticket #19524

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Standalone Sidebar Enabled' is set to


'Disabled'
Ticket #19523

09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Spell checking provided by Microsoft


Editor' is set to 'Disabled'
Ticket #19522

09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Live captions allowed' is set to


'Disabled'
Ticket #19521

Page 335
Date Version Changes for this version

09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Enhanced Security Mode configuration


for Intranet zone sites' is set to 'Disabled'
Ticket #19508

09/21/2023 2.0.0 ADD - 1 (L2) Ensure 'Enable Drop feature in Microsoft Edge'
is set to 'Disabled'
Ticket #19507

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Enable Discover access to page


contents for AAD profiles' is set to 'Disabled'
Ticket #19506

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Enable CryptoWallet feature' is set to


'Disabled'
Ticket #19504

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Configure browser process code


integrity guard setting' is set to 'Enabled: Enable code
integrity guard enforcement in the browser process'
Ticket #19503

09/21/2023 2.0.0 ADD - 1 (L1) Ensure 'Clear history for IE and IE mode every
time you exit' is set to 'Disabled'
Ticket #19502

09/21/2023 2.0.0 UPDATE - (L2) Ensure 'Show Microsoft Rewards


experiences' is set to 'Disabled' TO L1
Ticket #19501

09/21/2023 2.0.0 UPDATE – (L2) Ensure 'Shopping in Microsoft Edge


Enabled' is set to 'Disabled' TO L1
Ticket #19500

09/21/2023 2.0.0 UPDATE – (L2) 'Configure Related Matches in Find on Page'


is set to 'Disabled' TO L1
Ticket #19499

Page 336
Date Version Changes for this version

09/21/2023 2.0.0 REMOVE – (L2) 'Allow suggestions from local providers' is


set to 'Disabled'
Ticket #19498

09/21/2023 2.0.0 ADD – (L1) Ensure 'Allow import of data from other browsers
on each Microsoft Edge launch' is set to 'Disabled'
Ticket #19493

09/21/2023 2.0.0 UPDATE - (L1) Ensure 'Specifies whether to allow insecure


websites to make requests to more-private network
endpoints' TO Specifies whether to allow websites to make
requests to more-private network endpoints
Ticket #19298

09/21/2023 2.0.0 REMOVE - 1 (L1) Ensure 'Enable travel assistance' is set to


'Disabled'
Ticket #19297

09/21/2023 2.0.0 UPDATE - 1.3 (L1) Ensure 'Control use of insecure content
exceptions' is set to 'Enabled: Do not allow any site to load
mixed content'
Ticket #19292

09/21/2023 2.0.0 UPDATE - 1 (L1) Allow personalization of ads Microsoft


Edge, search, news and other Microsoft services by sending
browsing history, favorites and collections, usage and other
browsing data to Microsoft
Ticket #16502

09/21/2023 2.0.0 UPDATE - 1 (L1) Ensure 'Allow download restrictions' is set


to 'Enabled: Block potentially dangerous downloads' TO
'Enabled: Block malicious downloads'
Ticket #19736

07/19/2024 3.0.0 ADD - Section Changes


Ticket #21418

Page 337
Date Version Changes for this version

07/19/2024 3.0.0 UPDATE - 1.3 (L2) Ensure 'Control use of the File System
API for reading' is set to 'Enabled: Don't allow any site to
request read access to files and directories' TO 'Enabled:
Don't allow any site to request read access to files and
directories via the File
Ticket #20081

07/19/2024 3.0.0 UPDATE - 1.3 (L2) Ensure 'Control use of the Web Bluetooth
API' is set to 'Enabled: Do not allow any site to request
access to Bluetooth' TO 'Enabled: Do not allow any site to
request access to Bluetooth devices via the Web Bluetooth
API'
Ticket #20082

07/19/2024 3.0.0 RENAME - 1.7 (L1) Allow cross-origin HTTP Basic Auth
prompts TO Allow cross-origin HTTP Authentication prompts
Ticket #20095

07/19/2024 3.0.0 REMOVE - 1 (L1) Ensure 'Enable renderer code integrity' is


set to 'Enabled'
Ticket #20288

07/19/2024 3.0.0 MOVE and RENAME - (L1) Ensure 'Configure Edge


TyposquattingChecker' is set to 'Enabled' TO 'Configure
Edge Website Typo Protection'
Ticket #21419

07/19/2024 3.0.0 RENAME - Section TyposquattingChecker settings TO Edge


Website Typo Protection settings
Ticket #21420

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Automatically open downloaded MHT


or MHTML files from the web in Internet Explorer mode' is set
to 'Disabled'
Ticket #21509

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Compose is enabled for writing on the
web' is set to 'Disabled'
Ticket #21511

Page 338
Date Version Changes for this version

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Edge 3P SERP Telemetry Enabled' is


set to 'Disabled'
Ticket #21516

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Edge Wallet E-Tree Enabled' is set to
'Disabled'
Ticket #21517

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Enable tab organization suggestions' is


set to 'Disabled'
Ticket #21519

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Enable the Search bar' is set to
'Disabled'
Ticket #21520

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Enable upload files from mobile in
Microsoft Edge desktop' is set to 'Disabled'
Ticket #21521

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Enables DALL-E themes generation' is


set to 'Disabled'
Ticket #21523

07/19/2024 3.0.0 REMOVE - 1.3 (L1) Ensure 'Choose whether users can
receive customized background images and text,
suggestions, notifications, and tips for Microsoft services' is
set to 'Disabled'
Ticket #21525

07/19/2024 3.0.0 UPDATE - 1 (L1) Ensure 'Block tracking of users' web-


browsing activity' is set to 'Enabled: Balanced (Blocks
harmful trackers and trackers from sites user has not visited;
content and ads will be less personalized)' TO or higher
Ticket #21530

Page 339
Date Version Changes for this version

07/19/2024 3.0.0 UPDATE - 1 (L1) Ensure 'Enhance the security state in


Microsoft Edge' is set to 'Enabled: Balanced mode' TO or
higher
Ticket #21543

07/19/2024 3.0.0 ADD - 1 (L2) Ensure 'Enable QR Code Generator' is set to


'Disabled'
Ticket #21954

07/19/2024 3.0.0 ADD - 1 (L1) Ensure 'Wallet Donation Enabled' is set to


'Disabled'
Ticket #21592

07/19/2024 3.0.0 ADD - 1.3 (L1) Ensure 'Default setting for third-party storage
partitioning' is set to 'Enabled: Block third-party storage
partitioning from being enabled.'
Ticket #21595

07/19/2024 3.0.0 ADD - 1.9 (L1) Ensure 'Enable Gamer Mode' is set to
'Disabled'
Ticket #21597

07/19/2024 3.0.0 UPDATE - 3.1 (L1) Ensure 'Update policy override default' is
set to 'Enabled: Always allow updates' TO or Higher
Ticket #21974

07/19/2024 3.0.0 ADD - 1.8 (L1) Ensure 'Blocks external extensions from being
installed' is set to 'Enabled'
Ticket #22029

07/19/2024 3.0.0 ADD - 1.26 (L1) Ensure 'Disable Bing chat entry-points on
Microsoft Edge Enterprise new tab page' is set to 'Disabled'
Ticket #22146

Page 340

You might also like