MSCT Edge v127 v1.0.0

Audit Details

Name: MSCT Edge v127 v1.0.0

Updated: 1/6/2025

Authority: MSCT

Plugin: Windows

Revision: 1.1

Estimated Item Count: 20

File Details

Filename: MSCT_Microsoft_Edge_Version_127_v1.0.0.audit

Size: 36.1 kB

MD5: dda68629ba593eb78b2c5d28972971a7
SHA256: 09ee71cbc1b96701cd89bc0b1fe6499d87e6a1a8fb7abb0db69548fa8ed3c36c

Audit Items

DescriptionCategories
Allow Basic authentication for HTTP

IDENTIFICATION AND AUTHENTICATION

Allow unconfigured sites to be reloaded in Internet Explorer mode

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)

CONFIGURATION MANAGEMENT

Allow users to proceed from the HTTPS warning page

SYSTEM AND COMMUNICATIONS PROTECTION

Automatically open downloaded MHT or MHTML files from the web in Internet Explorer mode
Configure Edge TyposquattingChecker

CONFIGURATION MANAGEMENT

Configure Microsoft Defender SmartScreen

SYSTEM AND INFORMATION INTEGRITY

Configure Microsoft Defender SmartScreen to block potentially unwanted apps

SYSTEM AND INFORMATION INTEGRITY

Control which extensions cannot be installed

CONFIGURATION MANAGEMENT

Enable browser legacy extension point blocking

CONFIGURATION MANAGEMENT

Enable site isolation for every site

CONFIGURATION MANAGEMENT

Enhance images enabled

CONFIGURATION MANAGEMENT

Force WebSQL to be enabled

CONFIGURATION MANAGEMENT

MSCT_Microsoft_Edge_Version_127_v1.0.0.audit from MSCT Microsoft Edge Version 127 Security Baseline
Prevent bypassing Microsoft Defender SmartScreen prompts for sites

SYSTEM AND INFORMATION INTEGRITY

Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads

SYSTEM AND INFORMATION INTEGRITY

Show the Reload in Internet Explorer mode button in the toolbar

CONFIGURATION MANAGEMENT

Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context

CONFIGURATION MANAGEMENT

Specifies whether to allow websites to make requests to more-private network endpoints

CONFIGURATION MANAGEMENT

Supported authentication schemes

IDENTIFICATION AND AUTHENTICATION