MSCT Edge v117 v1.0.0

Audit Details

Name: MSCT Edge v117 v1.0.0

Updated: 10/20/2023

Authority: MSCT

Plugin: Windows

Revision: 1.0

Estimated Item Count: 20

File Details

Filename: MSCT_Microsoft_Edge_Version_117_v1.0.0.audit

Size: 35.6 kB

MD5: 900a78e1e3b040e86fd172278c4dc2ba
SHA256: 69bda8490ab7534b7156ebbe50cc83db824f540adfa5a5fef8f6418504e83466

Audit Items

DescriptionCategories
Allow Basic authentication for HTTP

IDENTIFICATION AND AUTHENTICATION

Allow unconfigured sites to be reloaded in Internet Explorer mode

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)

CONFIGURATION MANAGEMENT

Allow users to proceed from the HTTPS warning page

SYSTEM AND COMMUNICATIONS PROTECTION

Automatically open downloaded MHT or MHTML files from the web in Internet Explorer mode
Configure Edge TyposquattingChecker

CONFIGURATION MANAGEMENT

Configure Microsoft Defender SmartScreen

SYSTEM AND INFORMATION INTEGRITY

Configure Microsoft Defender SmartScreen to block potentially unwanted apps

SYSTEM AND INFORMATION INTEGRITY

Control which extensions cannot be installed

CONFIGURATION MANAGEMENT

Enable browser legacy extension point blocking

CONFIGURATION MANAGEMENT

Enable site isolation for every site

CONFIGURATION MANAGEMENT

Enhance images enabled

CONFIGURATION MANAGEMENT

Force WebSQL to be enabled

CONFIGURATION MANAGEMENT

MSCT_Microsoft_Edge_Version_117_v1.0.0.audit from MSCT Microsoft Edge Version 117 Security Baseline
Prevent bypassing Microsoft Defender SmartScreen prompts for sites

SYSTEM AND INFORMATION INTEGRITY

Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads

SYSTEM AND INFORMATION INTEGRITY

Show the Reload in Internet Explorer mode button in the toolbar

CONFIGURATION MANAGEMENT

Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context

CONFIGURATION MANAGEMENT

Specifies whether to allow websites to make requests to more-private network endpoints

CONFIGURATION MANAGEMENT

Supported authentication schemes

IDENTIFICATION AND AUTHENTICATION