| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: EB5A0A0DAE1A60492E5AE5BFF4A4B83F57C94096 ~~~~~ 'Configure the list of domains for which Microsoft Defender SmartScreen won't trigger warnings' is Configured Allowed domains: =========================== msc.navy.mil navy.mil Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: EB5A0A0DAE1A60492E5AE5BFF4A4B83F57C94096 ~~~~~ 'Configure the list of domains for which Microsoft Defender SmartScreen won't trigger warnings' is Configured Allowed domains: =========================== msc.navy.mil navy.mil Comments |
|||||
Check Text
If this machine is on SIPRNet, this is Not Applicable. This requirement for "SmartScreenAllowListDomains" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure the list of domains for which Microsoft Defender SmartScreen won't trigger warnings" may be set to "allow" for allowlisted domains. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge SmartScreenAllowListDomains may be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\1 = mydomain.com HKLM\SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\2 = myagency.mil If configured, the list of domains for which Microsoft Defender SmartScreen will not trigger warnings may be allowlisted.
Fix Text
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure the list of domains for which Microsoft Defender SmartScreen will not trigger warnings" may be set to "allow" for allowlisted domains.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 8FC1BA97C73E26DF2F4FFBFA42EEF58E3174020A ~~~~~ 'Disable synchronization of data using Microsoft sync services' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 8FC1BA97C73E26DF2F4FFBFA42EEF58E3174020A ~~~~~ 'Disable synchronization of data using Microsoft sync services' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 8FC1BA97C73E26DF2F4FFBFA42EEF58E3174020A ~~~~~ 'Disable synchronization of data using Microsoft sync services' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 8FC1BA97C73E26DF2F4FFBFA42EEF58E3174020A ~~~~~ 'Disable synchronization of data using Microsoft sync services' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SyncDisabled Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Disable synchronization of data using Microsoft sync services" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SyncDisabled" is not set to "REG_DWORD = 1", this is a finding.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Disable synchronization of data using Microsoft sync services" to "Enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 9C262364743C3FB68606CA959D2E3A2DCA16CB69 ~~~~~ 'Allow importing of browser settings' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportBrowserSettings Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 9C262364743C3FB68606CA959D2E3A2DCA16CB69 ~~~~~ 'Allow importing of browser settings' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportBrowserSettings Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 9C262364743C3FB68606CA959D2E3A2DCA16CB69 ~~~~~ 'Allow importing of browser settings' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportBrowserSettings Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 9C262364743C3FB68606CA959D2E3A2DCA16CB69 ~~~~~ 'Allow importing of browser settings' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportBrowserSettings Value: 0x00000000 (0) Type: REG_DWORD Comments |
|||||
Check Text
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browser settings" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportBrowserSettings" is not set to "REG_DWORD = 0", this is a finding.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browser settings" to "disabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: D0C011C3620DE26B3AC5D2A94FE6AC62E823B8E6 ~~~~~ 'Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used' is Enabled with 'Don't allow using the developer tools' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DeveloperToolsAvailability Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: D0C011C3620DE26B3AC5D2A94FE6AC62E823B8E6 ~~~~~ 'Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used' is Enabled with 'Don't allow using the developer tools' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DeveloperToolsAvailability Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: D0C011C3620DE26B3AC5D2A94FE6AC62E823B8E6 ~~~~~ 'Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used' is Enabled with 'Don't allow using the developer tools' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DeveloperToolsAvailability Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: D0C011C3620DE26B3AC5D2A94FE6AC62E823B8E6 ~~~~~ 'Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used' is Enabled with 'Don't allow using the developer tools' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DeveloperToolsAvailability Value: 0x00000002 (2) Type: REG_DWORD Comments |
|||||
Check Text
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used" with the option value set to "Don't allow using the developer tools". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DeveloperToolsAvailability" is not set to "REG_DWORD = 2", this is a finding.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used" to "enabled" and select "Don't allow using the developer tools".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: BE3D82589FDCADE0CBAA20C00C665847239339B7 ~~~~~ 'Allow download restrictions' is Enabled with (1)'BlockDangerousDownloads' or (2)'Block potentially dangerous or unwanted downloads' or (3)'Block all downloads' or (4) 'Block malicious downloads' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DownloadRestrictions Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: BE3D82589FDCADE0CBAA20C00C665847239339B7 ~~~~~ 'Allow download restrictions' is Enabled with (1)'BlockDangerousDownloads' or (2)'Block potentially dangerous or unwanted downloads' or (3)'Block all downloads' or (4) 'Block malicious downloads' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DownloadRestrictions Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
If this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", or "BlockMaliciousDownloads". The more restrictive option, "Block all downloads", is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", this is a finding.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select one of the following: "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", "BlockAllDownloads", or "BlockMaliciousDownloads".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: ResultHash: 2B22006EAC2C6E378F6B50C1F8B1771A4F182111 ~~~~~ 'Allow pop-up windows on specific sites' is Configured Allowed popups: =========================== 1 = msc.navy.mil 2 = navy.mil Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: ResultHash: 2B22006EAC2C6E378F6B50C1F8B1771A4F182111 ~~~~~ 'Allow pop-up windows on specific sites' is Configured Allowed popups: =========================== 1 = msc.navy.mil 2 = navy.mil Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 2B22006EAC2C6E378F6B50C1F8B1771A4F182111 ~~~~~ 'Allow pop-up windows on specific sites' is Configured Allowed popups: =========================== 1 = msc.navy.mil 2 = navy.mil Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 2B22006EAC2C6E378F6B50C1F8B1771A4F182111 ~~~~~ 'Allow pop-up windows on specific sites' is Configured Allowed popups: =========================== 1 = msc.navy.mil 2 = navy.mil Comments |
|||||
Check Text
This requirement for "Allow pop-up windows on specific sites" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Allow pop-up windows on specific sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge "PopupsAllowedForUrls" must be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\1 = mydomain.com HKLM\SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\2 = myagency.mil If configured, the list of domains for which Microsoft Edge allows pop-ups may be allowlisted.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Allow pop-up windows on specific sites" to "Enabled". A list of allowlisted URLs may be specified here.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: ResultHash: 0856B1E57ECD35CB5C1F82D3CBE464834A5BD5E4 ~~~~~ 'Allow specific extensions to be installed' is Configured Allowed extentions: =========================== 1 = "extension_id1" 2 = "extension_id2" Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: ResultHash: 0856B1E57ECD35CB5C1F82D3CBE464834A5BD5E4 ~~~~~ 'Allow specific extensions to be installed' is Configured Allowed extentions: =========================== 1 = "extension_id1" 2 = "extension_id2" Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 97C6AD77B80837E67669FA3E2033C3AB690CBA35 ~~~~~ 'Allow specific extensions to be installed' is Configured Allowed extentions: =========================== ========== Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 97C6AD77B80837E67669FA3E2033C3AB690CBA35 ~~~~~ 'Allow specific extensions to be installed' is Configured Allowed extentions: =========================== ========== Comments |
|||||
Check Text
This requirement for "Allow specific extensions to be installed" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/Allow specific extensions to be installed" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge "ExtensionInstallAllowlist" must be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\1 = "extension_id1" HKLM\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\2 = "extension_id2" If configured, the list of extensions for which Microsoft Edge allows to be installed may be allowlisted.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Extensions/Allow specific extensions to be installed" to "Enabled". A list of allowlisted extensions may then be specified.
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 83E6551EBCA0DB90D3E94FCB2E45DB4FB4E84AAB ~~~~~ 'Ask where to save downloaded files' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PromptForDownloadLocation Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 83E6551EBCA0DB90D3E94FCB2E45DB4FB4E84AAB ~~~~~ 'Ask where to save downloaded files' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PromptForDownloadLocation Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 83E6551EBCA0DB90D3E94FCB2E45DB4FB4E84AAB ~~~~~ 'Ask where to save downloaded files' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PromptForDownloadLocation Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 83E6551EBCA0DB90D3E94FCB2E45DB4FB4E84AAB ~~~~~ 'Ask where to save downloaded files' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PromptForDownloadLocation Value: 0x00000001 (1) Type: REG_DWORD Comments |
|||||
Check Text
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Ask where to save downloaded files" must be set to "enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PromptForDownloadLocation" is not set to "REG_DWORD = 1", this is a finding.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Ask where to save downloaded files" to "enabled".
| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-SW-89108 | 22.19.120.22 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA. Comments |
|||||
| MONT-SW-89134 | 22.19.120.21 | 2026-03-04 | |||
Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA. Comments |
|||||
| MONT-WS-92010 | 164.231.187.45 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 53EFE8294F1A016100A439E68BDC4A955D8F191C ~~~~~ 'Allow media autoplay on specific sites' is Configured Allowed sites: =========================== Comments |
|||||
| MONT-WS-92040 | 164.231.187.72 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 53EFE8294F1A016100A439E68BDC4A955D8F191C ~~~~~ 'Allow media autoplay on specific sites' is Configured Allowed sites: =========================== Comments |
|||||
Check Text
If this machine is on SIPRNet, this is Not Applicable. This requirement for "AutoplayAllowlist" is not required; this is optional. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow media autoplay on specific sites" may be set to "allow" for allowlisted domains. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge AutoplayAllowlist may be set as follows: HKLM\SOFTWARE\Policies\Microsoft\Edge\AutoplayAllowlist\1 = mydomain.com HKLM\SOFTWARE\Policies\Microsoft\Edge\AutoplayAllowlist\2 = myagency.mil If configured, the list of domains for which autoplay is allowed may be allowlisted.
Fix Text
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow media autoplay on specific sites" may be set to "allow" for allowlisted domains.