| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-235752 | CAT III | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Download restrictions must be configured. | - | |||
Check TextIf this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", or "BlockMaliciousDownloads". The more restrictive option, "Block all downloads", is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select one of the following: "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", "BlockAllDownloads", or "BlockMaliciousDownloads". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: BE3D82589FDCADE0CBAA20C00C665847239339B7 ~~~~~ 'Allow download restrictions' is Enabled with (1)'BlockDangerousDownloads' or (2)'Block potentially dangerous or unwanted downloads' or (3)'Block all downloads' or (4) 'Block malicious downloads' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DownloadRestrictions Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235752 | CAT III | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Download restrictions must be configured. | - | |||
Check TextIf this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", or "BlockMaliciousDownloads". The more restrictive option, "Block all downloads", is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select one of the following: "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", "BlockAllDownloads", or "BlockMaliciousDownloads". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: BE3D82589FDCADE0CBAA20C00C665847239339B7 ~~~~~ 'Allow download restrictions' is Enabled with (1)'BlockDangerousDownloads' or (2)'Block potentially dangerous or unwanted downloads' or (3)'Block all downloads' or (4) 'Block malicious downloads' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DownloadRestrictions Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235752 | CAT III | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Download restrictions must be configured. | - | |||
Check TextIf this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", or "BlockMaliciousDownloads". The more restrictive option, "Block all downloads", is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select one of the following: "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", "BlockAllDownloads", or "BlockMaliciousDownloads". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235752 | CAT III | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Download restrictions must be configured. | - | |||
Check TextIf this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", or "BlockMaliciousDownloads". The more restrictive option, "Block all downloads", is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select one of the following: "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", "BlockAllDownloads", or "BlockMaliciousDownloads". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||