%3CLINGO-SUB%20id%3D%22lingo-sub-1233532%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%20v80%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1233532%22%20slang%3D%22en-US%22%3E%3CP%3EVery%20interesting%2C%20Thank%20you%20very%20much%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F272514%22%20target%3D%22_blank%22%3E%40rmunck%3C%2FA%3E%3C%2FP%3E%3CP%20class%3D%22lia-indent-padding-left-480px%22%3EFive%20Stars!!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1234030%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%20v80%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1234030%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%2C%20thank%20you.%20i%20hope%20in%20the%20near%20future%2C%20new%20Edge%20browser's%20group%20policies%20will%20be%20embedded%20by%20default%20in%20Windows%2010%20and%20be%20updated%20through%20Windows%20update%20automatically.%20just%20like%20Edge%20classic.%20will%20make%20life%20easier%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1235140%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%20v80%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1235140%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F310193%22%20target%3D%22_blank%22%3E%40HotCakeX%3C%2FA%3E%26nbsp%3Bthanks%20for%20the%20feedback%2C%20let%20me%20take%20that%20back%20to%20our%20team%20and%20see%20if%20we%20can%20get%20any%20traction%20with%20that.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1235206%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20for%20Microsoft%20Edge%20v80%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1235206%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F272514%22%20target%3D%22_blank%22%3E%40rmunck%3C%2FA%3EThank%20you%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1233193%22%20slang%3D%22en-US%22%3ESecurity%20baseline%20for%20Microsoft%20Edge%20v80%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1233193%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20is%20pleased%20to%20announce%20the%20enterprise-ready%20release%20of%20the%20recommended%20security%20configuration%20baseline%20settings%20for%20the%20next%20version%20of%20Microsoft%20Edge%20based%20on%20Chromium%2C%20version%2080.%20The%20settings%20recommended%20in%20this%20baseline%20are%20the%20same%20as%20the%20ones%20we%20recommended%20in%20version%2079%2C%20with%20the%20additional%20of%20one%20new%20setting%20that%20we%20have%20added%20and%20that%20will%20discuss.%20We%20continue%20to%20welcome%20feedback%20through%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Security-Baselines%2Fbd-p%2FSecurity-Baselines%22%20target%3D%22_blank%22%3EBaselines%20Discussion%20site%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20one%20addition%20to%20this%20baseline%20since%20version%2079%20is%20that%20we%20have%20added%20the%20recommendation%20to%20enforce%20a%20new%20setting%20%E2%80%9CConfigure%20Microsoft%20Defender%20SmartScreen%20to%20block%20potentially%20unwanted%20apps%E2%80%9D.%20%26nbsp%3BPotentially%20Unwanted%20Apps%20(PUA)%20was%20first%20introduced%20with%20our%20Microsoft%20Defender%20Antivirus%20(MDAV)%20baseline%20as%20part%20of%20Windows%2010.%26nbsp%3B%20PUA%20are%20not%20considered%20viruses%2C%20malware%2C%20or%20other%20types%20of%20threats%2C%20but%20they%20might%20perform%20actions%20on%20endpoints%20which%20adversely%20affect%20endpoint%20performance%20or%20use%20(such%20as%20adware%20or%20other%20low-reputation%20applications%2C%20you%20can%20see%20more%20PUA%20criteria%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fintelligence%2Fcriteria%23potentially-unwanted-application-pua%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehere%3C%2FA%3E).%26nbsp%3B%20Starting%20with%20Microsoft%20Edge%2080%2C%20you%20can%20now%20block%20PUA%20downloads%20and%20associated%20resource%20URLs.%26nbsp%3B%20By%20default%2C%20PUA%20is%20an%20opt-in%20setting%2C%20meaning%20a%20user%20must%20deliberately%20configure%20this.%26nbsp%3B%20Well-managed%20enterprises%20should%20ensure%20positive%20control%20of%20necessary%20security%20settings%2C%20and%20therefore%20we%20have%20enabled%20this%20setting%20as%20part%20of%20the%20baseline%20(as%20we%20have%20with%20the%20MDAV%20recommendation).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EVersion%2080%20of%20the%20Chromium-based%20version%20of%20Microsoft%20Edge%20has%20270%20enforceable%20Computer%20Configuration%20policy%20settings%20and%20another%20254%20User%20Configuration%20policy%20settings.%20Following%20our%20streamlined%20approach%2C%20our%20recommended%20baseline%20configures%20a%20grand%20total%20of%20twelve%20Group%20Policy%20settings.%20You%20can%20find%20full%20documentation%20in%20the%20download%20package%E2%80%99s%20Documentation%20subdirectory.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20baseline%20package%20is%20now%20available%20as%20part%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fdownload%2Fdetails.aspx%3Fid%3D55319%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ESecurity%20Compliance%20Toolkit%3C%2FA%3E.%20Like%20all%20our%20baseline%20packages%2C%20the%20downloadable%20baseline%20package%20includes%20importable%20GPOs%2C%20a%20script%20to%20apply%20the%20GPOs%20to%20local%20policy%2C%20a%20script%20to%20import%20the%20GPOs%20into%20Active%20Directory%20Group%20Policy%2C%20and%20all%20the%20recommended%20settings%20in%20spreadsheet%20form%2C%20as%20Policy%20Analyzer%20rules%2C%20and%20as%20GP%20Reports.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1233193%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20is%20pleased%20to%20announce%20the%20enterprise-ready%20release%20of%20the%20security%20configuration%20baseline%20for%20the%20next%20version%20of%20Microsoft%20Edge%2C%20version%2080.%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Microsoft is pleased to announce the enterprise-ready release of the recommended security configuration baseline settings for the next version of Microsoft Edge based on Chromium, version 80. The settings recommended in this baseline are the same as the ones we recommended in version 79, with the additional of one new setting that we have added and that will discuss. We continue to welcome feedback through the Baselines Discussion site.

 

The one addition to this baseline since version 79 is that we have added the recommendation to enforce a new setting “Configure Microsoft Defender SmartScreen to block potentially unwanted apps”.  Potentially Unwanted Apps (PUA) was first introduced with our Microsoft Defender Antivirus (MDAV) baseline as part of Windows 10.  PUA are not considered viruses, malware, or other types of threats, but they might perform actions on endpoints which adversely affect endpoint performance or use (such as adware or other low-reputation applications, you can see more PUA criteria here).  Starting with Microsoft Edge 80, you can now block PUA downloads and associated resource URLs.  By default, PUA is an opt-in setting, meaning a user must deliberately configure this.  Well-managed enterprises should ensure positive control of necessary security settings, and therefore we have enabled this setting as part of the baseline (as we have with the MDAV recommendation).

 

Version 80 of the Chromium-based version of Microsoft Edge has 270 enforceable Computer Configuration policy settings and another 254 User Configuration policy settings. Following our streamlined approach, our recommended baseline configures a grand total of twelve Group Policy settings. You can find full documentation in the download package’s Documentation subdirectory.

 

The baseline package is now available as part of the Security Compliance Toolkit. Like all our baseline packages, the downloadable baseline package includes importable GPOs, a script to apply the GPOs to local policy, a script to import the GPOs into Active Directory Group Policy, and all the recommended settings in spreadsheet form, as Policy Analyzer rules, and as GP Reports.

4 Comments
New Contributor

Very interesting, Thank you very much @Rick_Munck

Five Stars!! 

Honored Contributor

Great, thank you. i hope in the near future, new Edge browser's group policies will be embedded by default in Windows 10 and be updated through Windows update automatically. just like Edge classic. will make life easier :)

Microsoft

@HotCakeX thanks for the feedback, let me take that back to our team and see if we can get any traction with that.

Honored Contributor

@Rick_MunckThank you :)