Edge Browser Security Latest Best Practices Released by Microsoft

Let’s discuss the Edge Browser Security Latest Best Practices Released by Microsoft. Microsoft introduced an updated version of the Edge Security Baseline, version 128, available on the Microsoft Intune Console.

The new security baseline includes security settings, improvements, and optimizations to help organizations better secure their Windows devices. Moreover, Microsoft introduced 2 new HoloLens Baselines. You can check this on the Console.

To secure and Protect your users’ devices, you can rapidly deploy a recommended security posture to your managed Windows devices for Windows security baselines. The security Baselines of Intune help you with this.

Many organizations seek guidance to navigate the many controls over their security configurations. Intune Security Baseline is a guide that allows users to increase their control. In this blog, I will help you learn more about Security Baselines in Microsoft Intune.

Patch My PC
Edge Browser Security Latest Best Practices Released by Microsoft - Fig.1
Edge Browser Security Latest Best Practices Released by Microsoft – Fig.1

Edge Browser Security Latest Best Practices Released by Microsoft

Microsoft has some changes in Microsoft Edge version 128. 2 settings are added, and 2 settings are removed on the Edge Security Baseline version 128. You can customize each deployment baseline to enforce only the required settings and values.

Edge Browser Security Latest Best Practices Released by Microsoft - Fig.2
Edge Browser Security Latest Best Practices Released by Microsoft – Fig.2

Edge Security Baseline Version 128

Microsoft Edge baseline version 128 includes many features and will be available starting January 2025. Although the 128 version baseline may not be available through Intune, you can download the Microsoft Security Compliance Toolkit from the Microsoft Download Center.

Features in Security BaselineDetails
Allow unconfigured sites to be reloaded in Internet Explorer modeBy default, it is Disabled
Allow users to proceed from the HTTPS warning pageBy default, it is Disabled
Automatically open downloaded MHT or MHTML files from the web in Internet Explorer modeBy default, it is Disabled
Dynamic Code SettingsBy default, it is Disabled
Enable Application Bound EncryptionBy default it, is Enabled
Enable browser legacy extension point blockingBy default, it is Enabled
Enable site isolation for every siteBy default, it is Enabled
Show the Reload in Internet Explorer mode button in the toolbarDisabled by default
Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated contextDisabled by Default
Edge Browser Security Latest Best Practices Released by Microsoft – Table.1
Edge Browser Security Latest Best Practices Released by Microsoft - Fig.3
Edge Browser Security Latest Best Practices Released by Microsoft – Fig.3

Other Security Baseline in Edge Version 128

Microsoft Edge Version 128 also offers some other security baselines, including Extensions, HTTP authentication, Native Messaging, Private Network Request Settings, SmartScreen settings, and Typosquatting Checker settings. The table below provides more details.

New FeaturesAvailable SettingDetails
ExtensionsControl which extensions cannot be installedEnabled by default
Extension IDs the user should be prevented from installing (or * for all) (Device)By Default, *
HTTP authenticationAllow Basic authentication for HTTPDisabled by Default
Supported authentication schemesEnabled by Default
Supported authentication schemes (Device)By default, ntlm,negotiate
Native MessagingAllow user-level native messaging hosts (installed without admin permissions)By default, Disabled
Private Network Request SettingsSpecifies whether to allow insecure websites to make requests to more-private network endpointsDisabled by Default
SmartScreen settingsConfigure Microsoft Defender SmartScreenBy default it is enabled
Configure Microsoft Defender SmartScreen to block potentially unwanted appsBy default it is enabled
Prevent bypassing Microsoft Defender SmartScreen prompts for sitesBy default it is enabled
Prevent bypassing of Microsoft Defender SmartScreen warnings about downloadsBy default it is enabled
Typosquatting Checker settingsConfigure Edge Typo ProtectionBy default it is enabled
Edge Browser Security Latest Best Practices Released by Microsoft – Table.2
Edge Browser Security Latest Best Practices Released by Microsoft - Fig.4
Edge Browser Security Latest Best Practices Released by Microsoft – Fig.4

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.   

Resource

Use security baselines to help secure Windows devices you manage with Microsoft Intune

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM, Windows, Cloud PC, Windows, Entra, Microsoft Security, Career, etc. 

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.