Allow Basic authentication for HTTP | IDENTIFICATION AND AUTHENTICATION |
Allow unconfigured sites to be reloaded in Internet Explorer mode | CONFIGURATION MANAGEMENT |
Allow user-level native messaging hosts (installed without admin permissions) | CONFIGURATION MANAGEMENT |
Allow users to proceed from the HTTPS warning page | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow using the deprecated U2F Security Key API (obsolete) | IDENTIFICATION AND AUTHENTICATION |
Configure Edge TyposquattingChecker | CONFIGURATION MANAGEMENT |
Configure Microsoft Defender SmartScreen | SYSTEM AND INFORMATION INTEGRITY |
Configure Microsoft Defender SmartScreen to block potentially unwanted apps | SYSTEM AND INFORMATION INTEGRITY |
Control which extensions cannot be installed | CONFIGURATION MANAGEMENT |
Enable 3DES cipher suites in TLS | CONFIGURATION MANAGEMENT |
Enable browser legacy extension point blocking | CONFIGURATION MANAGEMENT |
Enable saving passwords to the password manager | IDENTIFICATION AND AUTHENTICATION |
Enable site isolation for every site | CONFIGURATION MANAGEMENT |
Enhance images enabled | CONFIGURATION MANAGEMENT |
Force WebSQL to be enabled | CONFIGURATION MANAGEMENT |
Minimum TLS version enabled | SYSTEM AND COMMUNICATIONS PROTECTION |
MSCT_Microsoft_Edge_Version_107_v1.0.0.audit from MSCT Microsoft Edge Version 107 Security Baseline | |
Prevent bypassing Microsoft Defender SmartScreen prompts for sites | SYSTEM AND INFORMATION INTEGRITY |
Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads | SYSTEM AND INFORMATION INTEGRITY |
Show the Reload in Internet Explorer mode button in the toolbar | CONFIGURATION MANAGEMENT |
Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context | CONFIGURATION MANAGEMENT |
Specifies whether the display-capture permissions-policy is checked or skipped | CONFIGURATION MANAGEMENT |
Specifies whether to allow insecure websites to make requests to more-private network endpoints | CONFIGURATION MANAGEMENT |
Supported authentication schemes | IDENTIFICATION AND AUTHENTICATION |