Nov 16 2022 10:03 AM - edited Nov 17 2022 12:36 PM
Edit: I added Fixed unable to open local files when an instance of the browser is already running under changed behavior and updated the post to reflect the new build number.
Hello Insiders! Today, we are releasing build 109.0.1495.2 to the Dev channel. Here are the highlights of this build below.
We want your input and thoughts on the Microsoft Edge Insider Program with a short (2 – 3 minutes) Semiannual Edge Insider Survey: November 2022. All our surveys are anonymous, voluntary, and secure.
Added features:
Improved reliability:
Changed behavior:
Thanks again for sending us feedback and helping us improve our Insider builds.
Update (11/16): The Dev build is taking longer than expected to roll out. I will let everyone knows when it's out.
Update (11/17): We added a fix to the Dev build and released 109.0.1495.2 instead of 109.0.1495.1.
Nov 16 2022 11:15 AM
Nov 17 2022 12:38 PM
Nov 17 2022 10:38 PM
In the Top Feedback page, posted on August 16th, this was mentioned:
It is now mid-November... Any news on this? Thank you.
Nov 18 2022 01:58 AM
@Eric_E After the Update to 109.0.1495.2 the "What is new" Page (https://www.microsoftedgeinsider.com/en-us/whats-new) crashes reliably after 2 seconds. The reported error ist: Error code: STATUS_ACCESS_VIOLATION
This also happens after restart and in private mode without extensions.
Nov 19 2022 07:44 AM
@Eric_E I installed the latest version to see a message saying something like "We are synching your devices". I've persistently responded "no" when offered this service - because I want a different environment on all my devices.
The result of the synch is that my tabs got re-sequenced (how does a synch do that as I don't have those tabs on my other devices?) and I've lost a whole load of links - shouldn't I be seeing a superset of what I had before? I've unchecked all the options on the synch settings but it's too late to prevent data loss.
Andy
Nov 21 2022 01:28 PM
Nov 21 2022 01:35 PM
Nov 21 2022 01:52 PM
Nov 23 2022 04:14 AM
@Eric_E Hi!
I'm also getting it on some other subpages of support.microsoft.com
But I've not encountered it on any other domains so far.
Nov 23 2022 10:57 AM
Nov 23 2022 11:05 AM
Nov 30 2022 02:57 AM - edited Nov 30 2022 03:00 AM
where can I find Information about how to add own Enterprise CAs, SubCAs to MicrosoftRootStore of Edge when the MicrosoftRootStoreEnabled Feature is turned on?
I currently have to add several CAs to the Windows 10 Certificate Store, as I understand in future Versions of Edge I would have to add them to the internal Edge MicrosoftRootStore too. How to do this automated during deployment? Where can I find documentation about this? On this page I can only find the timeline of Edge v109 to Edge v111 and the Policy itself but no link to details.
Dec 01 2022 02:34 PM
I don't know when they will update the documentation for this policy, but once they do, it will have the necessary information you are looking for.
Dec 01 2022 10:14 PM
Thanks @Eric_E for your reply.
but what's missing is not the Policy-Documentation (this is a simple on/off policy - so the documentation is fine) but the Information about how to add own Enterprise CAs, SubCAs to MicrosoftRootStore of Edge. In this announcement Microsoft tells us:
Microsoft recommends that enterprises that have break-and-inspect proxies or other scenarios involving TLS server certificates issued by roots not in the Microsoft CTL to proactively test with the policy enabled in Microsoft Edge 109 and report any compatibility issues to Microsoft.
OK. So where to report? We cannot start the test because Information on how to configure this is missing. Please update / add Information to the announcement and provide documentation.
Jan 27 2023 04:56 AM
Jan 27 2023 05:06 AM
@AndresPae yes, I think you understand it wrong.
And I think the article is written misleading.
There is this small sentence which should get your attention:
In addition to trusting the built-in roots that ship with Microsoft Edge, the browser will also query the underlying platform for—and trust—locally installed roots that users and/or enterprises installed.
so in fact nothing seems to change for Enterprise-CAs deployed to Windows-OS-CertStore.
See this Blog-Post here, which is written much clearer than the official documentation:
https://textslashplain.com/2022/12/06/tls-certificate-verification-changes-in-edge/
This blog is written by https://twitter.com/ericlaw who is working at MSFT/Edge
Jan 27 2023 05:44 AM