Security Baseline Review for Microsoft Edge version 138 now available



 Microsoft Security Baselines Blog:

We have reviewed the new settings in Microsoft Edge version 138 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 128 security baseline, which can be downloaded from the Microsoft Security Compliance Toolkit, continues to be our recommended configuration.

Microsoft Edge version 138 introduces 6 new Computer and User settings and we have included a spreadsheet listing the new settings.

There are two settings we would like to highlight for consideration as they enabling previewing behavior that will be enabled by default in a future release.

Control whether TLS 1.3 Early Data is enabled in Microsoft Edge

This setting allows enterprises to control whether the browser uses TLS 1.3 Early Data, a performance feature that sends HTTPS requests in parallel with the TLS handshake. This setting allows for faster use of secure connections. Enterprise customers are encouraged to test to identify any compatibility issues prior to the enablement.

Specifies whether to block requests from public websites to devices on a user's local network

This setting helps prevent malicious websites from probing or interacting with internal resources (i.e. printers, routers, or internal APIs), reducing the risk of lateral movement or data exposure. Enterprise customers are encouraged to test for any intentional requests from public to local devices.

One thing to note on this policy setting is you may see a deprecation claim in the setting title. This was in error and will be corrected in a subsequent release.

As a friendly reminder, all available settings for Microsoft Edge are documented here, and all available settings for Microsoft Edge Update are documented here.

Please continue to give us feedback through the Security Baselines Discussion site or this post.


 Source:

 

Latest Support Threads

Back
Top Bottom