Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1111863%22%20slang%3D%22en-US%22%3ESecurity%20baseline%20(FINAL)%20for%20Chromium-based%20Microsoft%20Edge%2C%20version%2079%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1111863%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20is%20pleased%20to%20announce%20the%20enterprise-ready%20release%20of%20the%20recommended%20security%20configuration%20baseline%20settings%20for%20the%20next%20version%20of%20Microsoft%20Edge%20based%20on%20Chromium%2C%20version%2079.%20The%20settings%20recommended%20in%20this%20baseline%20are%20identical%20to%20the%20ones%20we%20recommended%20in%20the%20version%2079%20draft%2C%20minus%20one%20setting%20that%20we%20have%20removed%20and%20that%20we%20discuss%20below.%20We%20continue%20to%20welcome%20feedback%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Security-Baselines%2Fbd-p%2FSecurity-Baselines%22%20target%3D%22_blank%22%3EBaselines%20Discussion%20site%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20baseline%20package%20is%20now%20available%20as%20part%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fdownload%2Fdetails.aspx%3Fid%3D55319%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20Compliance%20Toolkit%3C%2FA%3E.%20Like%20all%20our%20baseline%20packages%2C%20the%20downloadable%20baseline%20package%20includes%20importable%20GPOs%2C%20a%20script%20to%20apply%20the%20GPOs%20to%20local%20policy%2C%20a%20script%20to%20import%20the%20GPOs%20into%20Active%20Directory%20Group%20Policy%2C%20and%20all%20the%20recommended%20settings%20in%20spreadsheet%20form%2C%20as%20Policy%20Analyzer%20rules%2C%20and%20as%20GP%20Reports.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Edge%20is%20being%20%3CA%20href%3D%22https%3A%2F%2Fblogs.windows.com%2Fwindowsexperience%2F2018%2F12%2F06%2Fmicrosoft-edge-making-the-web-better-through-more-open-source-collaboration%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Erebuilt%20with%20the%20open-source%20Chromium%20project%3C%2FA%3E%2C%20and%20many%20of%20its%20security%20configuration%20options%20are%20inherited%20from%20that%20project.%20These%20Group%20Policy%20settings%20are%20entirely%20distinct%20from%20those%20for%20the%20original%20version%20of%20Microsoft%20Edge%20built%20into%20Windows%2010%3A%20they%20are%20in%20different%20folders%20in%20the%20Group%20Policy%20editor%20and%20they%20reference%20different%20registry%20keys.%20The%20Group%20Policy%20settings%20that%20control%20the%20new%20version%20of%20Microsoft%20Edge%20are%20located%20under%20%E2%80%9CAdministrative%20Templates%5CMicrosoft%20Edge%2C%E2%80%9D%20while%20those%20that%20control%20the%20current%20version%20of%20Microsoft%20Edge%20remain%20located%20under%20%E2%80%9CAdministrative%20Templates%5CWindows%20Components%5CMicrosoft%20Edge.%E2%80%9D%20You%20can%20download%20the%20latest%20policy%20templates%20for%20the%20new%20version%20of%20Microsoft%20Edge%20from%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FEdgeEnterprise%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Edge%20Enterprise%20landing%20page%3C%2FA%3E.%20To%20learn%20more%20about%20managing%20the%20new%20version%20of%20Microsoft%20Edge%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fdeployedge%2Fconfigure-microsoft-edge%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigure%20Microsoft%20Edge%20for%20Windows%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20with%20our%20current%20Windows%20and%20Office%20security%20baselines%2C%20our%20recommendations%20for%20Microsoft%20Edge%20configuration%20follow%20a%20streamlined%20and%20efficient%20approach%20to%20baseline%20definition%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fsecguide%2F2015%2F11%2F18%2Fchanges-from-the-windows-8-1-baseline-to-the-windows-10-th11507-baseline%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewhen%20compared%20with%20the%20baselines%20we%20published%20before%20Windows%2010%3C%2FA%3E.%20The%20foundation%20of%20that%20approach%20is%20essentially%20this%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20baselines%20are%20designed%20for%20well-managed%2C%20security-conscious%20organizations%20in%20which%20standard%20end%20users%20do%20not%20have%20administrative%20rights.%3C%2FLI%3E%0A%3CLI%3EA%20baseline%20enforces%20a%20setting%20only%20if%20it%20mitigates%20a%20contemporary%20security%20threat%20%3CEM%3Eand%3C%2FEM%3E%20does%20not%20cause%20operational%20issues%20that%20are%20worse%20than%20the%20risks%20they%20mitigate.%3C%2FLI%3E%0A%3CLI%3EA%20baseline%20enforces%20a%20default%20only%20if%20it%20is%20otherwise%20likely%20to%20be%20set%20to%20an%20insecure%20state%20by%20an%20authorized%20user%3A%3CUL%3E%0A%3CLI%3EIf%20a%20non-administrator%20can%20set%20an%20insecure%20state%2C%20enforce%20the%20default.%3C%2FLI%3E%0A%3CLI%3EIf%20setting%20an%20insecure%20state%20requires%20administrative%20rights%2C%20enforce%20the%20default%20only%20if%20it%20is%20%3CEM%3Elikely%3C%2FEM%3E%20that%20a%20misinformed%20administrator%20will%20otherwise%20choose%20poorly.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E(For%20further%20explanation%2C%20see%20the%20%E2%80%9CWhy%20aren%E2%80%99t%20we%20enforcing%20more%20defaults%3F%E2%80%9D%20section%20in%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fsecguide%2F2015%2F11%2F18%2Fchanges-from-the-windows-8-1-baseline-to-the-windows-10-th11507-baseline%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethis%20blog%20post%3C%2FA%3E.)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EVersion%2079%20of%20the%20Chromium-based%20version%20of%20Microsoft%20Edge%20has%20216%20enforceable%20Computer%20Configuration%20policy%20settings%20and%20another%20200%20User%20Configuration%20policy%20settings.%20Following%20our%20streamlined%20approach%2C%20our%20recommended%20baseline%20configures%20a%20grand%20total%20of%20%3CEM%3Eeleven%3C%2FEM%3E%20Group%20Policy%20settings.%20You%20can%20find%20full%20documentation%20in%20the%20download%20package%E2%80%99s%20Documentation%20subdirectory.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20one%20difference%20between%20this%20baseline%20and%20the%20version%2079%20draft%20is%20that%20we%20have%20removed%20the%20recommendation%20to%20disable%20%E2%80%9CForce%20Microsoft%20Defender%20SmartScreen%20checks%20on%20downloads%20from%20trusted%20sources.%E2%80%9D%20By%20default%2C%20SmartScreen%20will%20perform%20these%20checks.%20While%20performing%20checks%20on%20files%20from%20trusted%20sources%20increases%20the%20likelihood%20of%20false%20positives%20%E2%80%93%20particularly%20from%20intranet%20sources%20that%20host%20files%20that%20are%20seldom%20if%20ever%20seen%20in%20the%20outside%20world%20%E2%80%93%20we%20have%20decided%20not%20to%20apply%20that%20decision%20to%20all%20customers%20adopting%20our%20baseline.%20Depending%20on%20who%20can%20store%20files%20in%20locations%20that%20are%20considered%20%E2%80%9Ctrusted%20sources%E2%80%9D%20and%20the%20rigor%20they%20apply%20to%20restricting%20what%20gets%20stored%20there%2C%20internal%20sites%20might%20in%20fact%20end%20up%20hosting%20untrustworthy%20content%20that%20should%20be%20checked.%20Our%20baseline%20therefore%20neither%20enables%20nor%20disables%20the%20setting.%20Organizations%20choosing%20to%20disable%20this%20setting%20can%20therefore%20do%20so%20without%20contradicting%20our%20baseline%20recommendations.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1111863%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%20margin%3A%200px%3B%22%3EThe%26nbsp%3B%3CEM%20style%3D%22box-sizing%3A%20border-box%3B%22%3Efinal%26nbsp%3B%3C%2FEM%3Erelease%20of%20the%20recommended%20security%20configuration%20baseline%20settings%20for%20the%20next%20version%20of%20Microsoft%20Edge%20based%20on%20Chromium%2C%20version%2079.%20T%3CSPAN%20style%3D%22background-color%3A%20%23ffffff%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20display%3A%20inline%3B%20float%3A%20none%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3Ehe%20baseline%20package%20-%20in%20the%20Security%20Compliance%20Toolkit%20-%20includes%20importable%20GPOs%2C%20a%20script%20to%20apply%20the%20GPOs%20to%20local%20policy%2C%20a%20script%20to%20import%20the%20GPOs%20into%20Active%20Directory%20Group%20Policy%2C%20and%20all%20the%20recommended%20settings%20in%20spreadsheet%20form%2C%20as%20Policy%20Analyzer%20rules%2C%20and%20as%20GP%20Reports.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1111863%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Esecurity%20baselines%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1157967%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Chromium-based%20Microsoft%20Edge%2C%20version%2079%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1157967%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F171536%22%20target%3D%22_blank%22%3E%40Aaron%20Margosis%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHoping%20you%20can%20answer%20a%20question.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20is%20the%20thinking%20behind%20setting%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EEnable%20saving%20passwords%20to%20the%20password%20manager%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20Disabled%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20part%20of%20the%20baseline%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20are%20considering%20whether%20to%20override%20this%20setting%20and%20would%20appreciate%20your%20thoughts.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMany%20thanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1164045%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Chromium-based%20Microsoft%20Edge%2C%20version%2079%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1164045%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EHi%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F171536%22%20target%3D%22_blank%22%3E%40Aaron%20Margosis%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20are%20setting%20Allow%20Microsoft%20Edge%20Side%20by%20Side%20browser%20experience%20to%20Enabled%20before%20installing%20the%20stable%20version%20of%20Edge%20Chromium%20so%20we%20can%20run%20old%20and%20new%20Edge%20side%20by%20side.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20any%20reason%20why%20we%20shouldn't%20apply%20all%20the%20settings%20prior%20to%20installing%20Edge%20Chromium%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMany%20thanks%20in%20advance.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1165654%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Chromium-based%20Microsoft%20Edge%2C%20version%2079%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1165654%22%20slang%3D%22en-US%22%3E%3CP%3EThere%20are%20tradeoffs%20with%20password%20managers%20as%20they%20are%20currently%20implemented.%20They%20can%20make%20stronger%20passwords%20more%20practical%20for%20users%2C%20but%20on%20the%20other%20hand%2C%20they%20also%20make%20it%20possible%20for%20anything%20running%20as%20the%20user%20(including%20malware)%20to%20retrieve%20all%20the%20user's%20saved%20passwords.%20Our%20baselines%20for%20Internet%20Explorer%20and%20the%20original%20Windows%2010%20Edge%20browser%20always%20disabled%20password%20managers%20for%20this%20reason.%20We%20have%20opted%20to%20remain%20consistent%20in%20the%20new%20baseline.%20However%2C%20it's%20perfectly%20understandable%20that%20some%20customers%20might%20take%20a%20different%20risk%20assessment.%20It's%20one%20of%20those%20settings%20that's%20not%20entirely%20black-and-white.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1167346%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Chromium-based%20Microsoft%20Edge%2C%20version%2079%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1167346%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F171536%22%20target%3D%22_blank%22%3E%40Aaron%20Margosis%3C%2FA%3E-%20thank%20you%20very%20much%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Microsoft is pleased to announce the enterprise-ready release of the recommended security configuration baseline settings for the next version of Microsoft Edge based on Chromium, version 79. The settings recommended in this baseline are identical to the ones we recommended in the version 79 draft, minus one setting that we have removed and that we discuss below. We continue to welcome feedback through the Baselines Discussion site.

 

The baseline package is now available as part of the Security Compliance Toolkit. Like all our baseline packages, the downloadable baseline package includes importable GPOs, a script to apply the GPOs to local policy, a script to import the GPOs into Active Directory Group Policy, and all the recommended settings in spreadsheet form, as Policy Analyzer rules, and as GP Reports.

 

Microsoft Edge is being rebuilt with the open-source Chromium project, and many of its security configuration options are inherited from that project. These Group Policy settings are entirely distinct from those for the original version of Microsoft Edge built into Windows 10: they are in different folders in the Group Policy editor and they reference different registry keys. The Group Policy settings that control the new version of Microsoft Edge are located under “Administrative Templates\Microsoft Edge,” while those that control the current version of Microsoft Edge remain located under “Administrative Templates\Windows Components\Microsoft Edge.” You can download the latest policy templates for the new version of Microsoft Edge from the Microsoft Edge Enterprise landing page. To learn more about managing the new version of Microsoft Edge, see Configure Microsoft Edge for Windows.

 

As with our current Windows and Office security baselines, our recommendations for Microsoft Edge configuration follow a streamlined and efficient approach to baseline definition when compared with the baselines we published before Windows 10. The foundation of that approach is essentially this:

  • The baselines are designed for well-managed, security-conscious organizations in which standard end users do not have administrative rights.
  • A baseline enforces a setting only if it mitigates a contemporary security threat and does not cause operational issues that are worse than the risks they mitigate.
  • A baseline enforces a default only if it is otherwise likely to be set to an insecure state by an authorized user:
    • If a non-administrator can set an insecure state, enforce the default.
    • If setting an insecure state requires administrative rights, enforce the default only if it is likely that a misinformed administrator will otherwise choose poorly.

(For further explanation, see the “Why aren’t we enforcing more defaults?” section in this blog post.)

 

Version 79 of the Chromium-based version of Microsoft Edge has 216 enforceable Computer Configuration policy settings and another 200 User Configuration policy settings. Following our streamlined approach, our recommended baseline configures a grand total of eleven Group Policy settings. You can find full documentation in the download package’s Documentation subdirectory.

 

The one difference between this baseline and the version 79 draft is that we have removed the recommendation to disable “Force Microsoft Defender SmartScreen checks on downloads from trusted sources.” By default, SmartScreen will perform these checks. While performing checks on files from trusted sources increases the likelihood of false positives – particularly from intranet sources that host files that are seldom if ever seen in the outside world – we have decided not to apply that decision to all customers adopting our baseline. Depending on who can store files in locations that are considered “trusted sources” and the rigor they apply to restricting what gets stored there, internal sites might in fact end up hosting untrustworthy content that should be checked. Our baseline therefore neither enables nor disables the setting. Organizations choosing to disable this setting can therefore do so without contradicting our baseline recommendations.

4 Comments
Senior Member

Hi @Aaron Margosis 

 

Hoping you can answer a question.

 

What is the thinking behind setting:

 

Enable saving passwords to the password manager

 

To Disabled

 

As part of the baseline?

 

We are considering whether to override this setting and would appreciate your thoughts.

 

Many thanks

Senior Member

Hi @Aaron Margosis 

 

We are setting Allow Microsoft Edge Side by Side browser experience to Enabled before installing the stable version of Edge Chromium so we can run old and new Edge side by side.

 

Is there any reason why we shouldn't apply all the settings prior to installing Edge Chromium?

 

Many thanks in advance.

Microsoft

There are tradeoffs with password managers as they are currently implemented. They can make stronger passwords more practical for users, but on the other hand, they also make it possible for anything running as the user (including malware) to retrieve all the user's saved passwords. Our baselines for Internet Explorer and the original Windows 10 Edge browser always disabled password managers for this reason. We have opted to remain consistent in the new baseline. However, it's perfectly understandable that some customers might take a different risk assessment. It's one of those settings that's not entirely black-and-white.

Senior Member

@Aaron Margosis- thank you very much