MSCT Edge v127 v1.0.0

Audit Details

Name: MSCT Edge v127 v1.0.0

Updated: 12/9/2024

Authority: MSCT

Plugin: Windows

Revision: 1.0

Estimated Item Count: 20

File Details

Filename: MSCT_Microsoft_Edge_Version_127_v1.0.0.audit

Size: 36.1 kB

MD5: 915032949597a85a9f784bc9e9c3d2cd
SHA256: 9a1514856878c704a76bf27bfb6bf3d7f4e988a2825701f2e66027aa47437bf6

Audit Items

DescriptionCategories
Allow Basic authentication for HTTP

IDENTIFICATION AND AUTHENTICATION

Allow unconfigured sites to be reloaded in Internet Explorer mode

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)

CONFIGURATION MANAGEMENT

Allow users to proceed from the HTTPS warning page

SYSTEM AND COMMUNICATIONS PROTECTION

Automatically open downloaded MHT or MHTML files from the web in Internet Explorer mode
Configure Edge TyposquattingChecker

CONFIGURATION MANAGEMENT

Configure Microsoft Defender SmartScreen

SYSTEM AND INFORMATION INTEGRITY

Configure Microsoft Defender SmartScreen to block potentially unwanted apps

SYSTEM AND INFORMATION INTEGRITY

Control which extensions cannot be installed

CONFIGURATION MANAGEMENT

Enable browser legacy extension point blocking

CONFIGURATION MANAGEMENT

Enable site isolation for every site

CONFIGURATION MANAGEMENT

Enhance images enabled

CONFIGURATION MANAGEMENT

Force WebSQL to be enabled

CONFIGURATION MANAGEMENT

MSCT_Microsoft_Edge_Version_127_v1.0.0.audit from MSCT Microsoft Edge Version 127 Security Baseline
Prevent bypassing Microsoft Defender SmartScreen prompts for sites

SYSTEM AND INFORMATION INTEGRITY

Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads

SYSTEM AND INFORMATION INTEGRITY

Show the Reload in Internet Explorer mode button in the toolbar

CONFIGURATION MANAGEMENT

Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context

CONFIGURATION MANAGEMENT

Specifies whether to allow websites to make requests to more-private network endpoints

CONFIGURATION MANAGEMENT

Supported authentication schemes

IDENTIFICATION AND AUTHENTICATION