| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-235758 | CAT I | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | The version of Microsoft Edge running on the syste... | - | |||
Check TextCross-reference the build information displayed with the Microsoft Edge site to identify, at minimum, the oldest supported build available. If the installed version of Edge is not supported by Microsoft, this is a finding. Fix TextInstall a supported version of Edge. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 8D7A9508CCCA163538DA4C12B9C2AF032E8F3662 ~~~~~ Microsoft Edge Version: 141.0.3537.71
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235758 | CAT I | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | The version of Microsoft Edge running on the syste... | - | |||
Check TextCross-reference the build information displayed with the Microsoft Edge site to identify, at minimum, the oldest supported build available. If the installed version of Edge is not supported by Microsoft, this is a finding. Fix TextInstall a supported version of Edge. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 8D7A9508CCCA163538DA4C12B9C2AF032E8F3662 ~~~~~ Microsoft Edge Version: 141.0.3537.71
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235758 | CAT I | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | The version of Microsoft Edge running on the syste... | - | |||
Check TextCross-reference the build information displayed with the Microsoft Edge site to identify, at minimum, the oldest supported build available. If the installed version of Edge is not supported by Microsoft, this is a finding. Fix TextInstall a supported version of Edge. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: ResultHash: FDE928504EFDED0862CBBB4DB83E218D9AAFA993 ~~~~~ Microsoft Edge Version: 143.0.3650.80
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235758 | CAT I | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | The version of Microsoft Edge running on the syste... | - | |||
Check TextCross-reference the build information displayed with the Microsoft Edge site to identify, at minimum, the oldest supported build available. If the installed version of Edge is not supported by Microsoft, this is a finding. Fix TextInstall a supported version of Edge. Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) was unable to determine a Status but found the below configuration on 12/17/2025: ResultHash: FDE928504EFDED0862CBBB4DB83E218D9AAFA993 ~~~~~ Microsoft Edge Version: 143.0.3650.80
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235720 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Bypassing Microsoft Defender SmartScreen prompts f... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverride" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C33E388254DDCB5B7A5AA275DCEC3789FA6C6D8C ~~~~~ 'Prevent bypassing Microsoft Defender SmartScreen prompts for sites' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PreventSmartScreenPromptOverride Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235720 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Bypassing Microsoft Defender SmartScreen prompts f... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverride" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C33E388254DDCB5B7A5AA275DCEC3789FA6C6D8C ~~~~~ 'Prevent bypassing Microsoft Defender SmartScreen prompts for sites' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PreventSmartScreenPromptOverride Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235720 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Bypassing Microsoft Defender SmartScreen prompts f... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverride" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235720 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Bypassing Microsoft Defender SmartScreen prompts f... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverride" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing Microsoft Defender SmartScreen prompts for sites" to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235721 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Bypassing of Microsoft Defender SmartScreen warnin... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverrideForFiles" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 00754A8B44AD87CBB6D5FBC53E664288E16117B4 ~~~~~ 'Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PreventSmartScreenPromptOverrideForFiles Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235721 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Bypassing of Microsoft Defender SmartScreen warnin... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverrideForFiles" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must to "Enabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 00754A8B44AD87CBB6D5FBC53E664288E16117B4 ~~~~~ 'Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: PreventSmartScreenPromptOverrideForFiles Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235721 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Bypassing of Microsoft Defender SmartScreen warnin... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverrideForFiles" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235721 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Bypassing of Microsoft Defender SmartScreen warnin... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "PreventSmartScreenPromptOverrideForFiles" is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads" must to "Enabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT APPLICABLE on 12/17/2025 ResultHash: 598456BDC5F5C048C1ADDB7E41012F3DE1B9A927 ~~~~~ This is a classified system so this requirement is NA.
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235723 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | InPrivate mode must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" must be set to "enabled" with the option value set to "InPrivate mode disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "InPrivateModeAvailability" is not set to "REG_DWORD = 1", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" to "enabled" and select "InPrivate mode disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 6A26062584CE53C883FDC08AC7C990D375CD472F ~~~~~ 'Configure InPrivate mode availability' is Enabled with 'InPrivate mode disabled' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: InPrivateModeAvailability Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235723 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | InPrivate mode must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" must be set to "enabled" with the option value set to "InPrivate mode disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "InPrivateModeAvailability" is not set to "REG_DWORD = 1", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" to "enabled" and select "InPrivate mode disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 6A26062584CE53C883FDC08AC7C990D375CD472F ~~~~~ 'Configure InPrivate mode availability' is Enabled with 'InPrivate mode disabled' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: InPrivateModeAvailability Value: 0x00000001 (1) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235723 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | InPrivate mode must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" must be set to "enabled" with the option value set to "InPrivate mode disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "InPrivateModeAvailability" is not set to "REG_DWORD = 1", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" to "enabled" and select "InPrivate mode disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 6A26062584CE53C883FDC08AC7C990D375CD472F ~~~~~ 'Configure InPrivate mode availability' is Enabled with 'InPrivate mode disabled' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: InPrivateModeAvailability Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235723 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | InPrivate mode must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" must be set to "enabled" with the option value set to "InPrivate mode disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "InPrivateModeAvailability" is not set to "REG_DWORD = 1", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Configure InPrivate mode availability" to "enabled" and select "InPrivate mode disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 6A26062584CE53C883FDC08AC7C990D375CD472F ~~~~~ 'Configure InPrivate mode availability' is Enabled with 'InPrivate mode disabled' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: InPrivateModeAvailability Value: 0x00000001 (1) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235724 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Background processing must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BackgroundModeEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: A95AA40B6F30C779A0CE892F14BD0215ED60B0AA ~~~~~ 'Continue running background apps after Microsoft Edge closes' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235724 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Background processing must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BackgroundModeEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: A95AA40B6F30C779A0CE892F14BD0215ED60B0AA ~~~~~ 'Continue running background apps after Microsoft Edge closes' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235724 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Background processing must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BackgroundModeEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" to "Disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: A95AA40B6F30C779A0CE892F14BD0215ED60B0AA ~~~~~ 'Continue running background apps after Microsoft Edge closes' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235724 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Background processing must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BackgroundModeEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Continue running background apps after Microsoft Edge closes" to "Disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: A95AA40B6F30C779A0CE892F14BD0215ED60B0AA ~~~~~ 'Continue running background apps after Microsoft Edge closes' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: BackgroundModeEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235725 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | The ability of sites to show pop-ups must be disab... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" must be set to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for DefaultPopupsSetting is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: A3DBEC9663EEDC90775D105ED8029C5BC806A409 ~~~~~ 'Default pop-up window setting' is Enabled with 'Do not allow any site to show pop-ups' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235725 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | The ability of sites to show pop-ups must be disab... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" must be set to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for DefaultPopupsSetting is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: A3DBEC9663EEDC90775D105ED8029C5BC806A409 ~~~~~ 'Default pop-up window setting' is Enabled with 'Do not allow any site to show pop-ups' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235725 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | The ability of sites to show pop-ups must be disab... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" must be set to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for DefaultPopupsSetting is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: A3DBEC9663EEDC90775D105ED8029C5BC806A409 ~~~~~ 'Default pop-up window setting' is Enabled with 'Do not allow any site to show pop-ups' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235725 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | The ability of sites to show pop-ups must be disab... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" must be set to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for DefaultPopupsSetting is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default pop-up window setting" to "Enabled" with the option value set to "Do not allow any site to show pop-ups". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: A3DBEC9663EEDC90775D105ED8029C5BC806A409 ~~~~~ 'Default pop-up window setting' is Enabled with 'Do not allow any site to show pop-ups' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: DefaultPopupsSetting Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235726 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | The default search provider must be set to use an ... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines" must be configured. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge Example REG_SZ value text for "ManagedSearchEngines": [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] If any of the search URLs in the list do not begin with "https", this is a finding. Fix TextConfigure the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 859E1524C5E43114ADA3981FB6DFA4354BB11E7A ~~~~~ Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ManagedSearchEngines Value: [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] Type: REG_SZ Search URLs ======================= https://www.bing.com/search?q={searchTerms} https://www.google.com/search?q={searchTerms}
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235726 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | The default search provider must be set to use an ... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines" must be configured. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge Example REG_SZ value text for "ManagedSearchEngines": [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] If any of the search URLs in the list do not begin with "https", this is a finding. Fix TextConfigure the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 859E1524C5E43114ADA3981FB6DFA4354BB11E7A ~~~~~ Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ManagedSearchEngines Value: [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] Type: REG_SZ Search URLs ======================= https://www.bing.com/search?q={searchTerms} https://www.google.com/search?q={searchTerms}
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235726 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | The default search provider must be set to use an ... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines" must be configured. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge Example REG_SZ value text for "ManagedSearchEngines": [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] If any of the search URLs in the list do not begin with "https", this is a finding. Fix TextConfigure the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 859E1524C5E43114ADA3981FB6DFA4354BB11E7A ~~~~~ Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ManagedSearchEngines Value: [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] Type: REG_SZ Search URLs ======================= https://www.bing.com/search?q={searchTerms} https://www.google.com/search?q={searchTerms}
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235726 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | The default search provider must be set to use an ... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines" must be configured. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge Example REG_SZ value text for "ManagedSearchEngines": [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] If any of the search URLs in the list do not begin with "https", this is a finding. Fix TextConfigure the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Manage Search Engines". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 859E1524C5E43114ADA3981FB6DFA4354BB11E7A ~~~~~ Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ManagedSearchEngines Value: [{"allow_search_engine_discovery": false},{"is_default": true,"name": "Microsoft Bing","keyword": "bing","search_url": "https://www.bing.com/search?q={searchTerms}"},{"name": "Google","keyword": "google","search_url": "https://www.google.com/search?q={searchTerms}"}] Type: REG_SZ Search URLs ======================= https://www.bing.com/search?q={searchTerms} https://www.google.com/search?q={searchTerms}
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235728 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Network prediction must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" must be set to "Enabled" with the option value set to "Don't predict network actions on any network connection". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for NetworkPredictionOptions is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" to "Enabled" with the option value set to "Don't predict network actions on any network connection". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C3B61B9619246C488256EF969782678101E04209 ~~~~~ 'Enable network prediction' is Enabled with 'Don't predict network actions on any network connection' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: NetworkPredictionOptions Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235728 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Network prediction must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" must be set to "Enabled" with the option value set to "Don't predict network actions on any network connection". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for NetworkPredictionOptions is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" to "Enabled" with the option value set to "Don't predict network actions on any network connection". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C3B61B9619246C488256EF969782678101E04209 ~~~~~ 'Enable network prediction' is Enabled with 'Don't predict network actions on any network connection' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: NetworkPredictionOptions Value: 0x00000002 (2) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235728 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Network prediction must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" must be set to "Enabled" with the option value set to "Don't predict network actions on any network connection". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for NetworkPredictionOptions is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" to "Enabled" with the option value set to "Don't predict network actions on any network connection". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: C3B61B9619246C488256EF969782678101E04209 ~~~~~ 'Enable network prediction' is Enabled with 'Don't predict network actions on any network connection' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: NetworkPredictionOptions Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235728 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Network prediction must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" must be set to "Enabled" with the option value set to "Don't predict network actions on any network connection". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for NetworkPredictionOptions is not set to "REG_DWORD = 2", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable network prediction" to "Enabled" with the option value set to "Don't predict network actions on any network connection". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: C3B61B9619246C488256EF969782678101E04209 ~~~~~ 'Enable network prediction' is Enabled with 'Don't predict network actions on any network connection' Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: NetworkPredictionOptions Value: 0x00000002 (2) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235729 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Search suggestions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SearchSuggestEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: E3CAF58DF9DE07E23A04EE57FFC5F9C8460C6537 ~~~~~ 'Enable search suggestions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SearchSuggestEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235729 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Search suggestions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SearchSuggestEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" to "Disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: E3CAF58DF9DE07E23A04EE57FFC5F9C8460C6537 ~~~~~ 'Enable search suggestions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SearchSuggestEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235729 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Search suggestions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SearchSuggestEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" to "Disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: E3CAF58DF9DE07E23A04EE57FFC5F9C8460C6537 ~~~~~ 'Enable search suggestions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SearchSuggestEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235729 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Search suggestions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" must be set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "SearchSuggestEnabled" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Enable search suggestions" to "Disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: E3CAF58DF9DE07E23A04EE57FFC5F9C8460C6537 ~~~~~ 'Enable search suggestions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SearchSuggestEnabled Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235730 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Importing of autofill form data must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportAutofillFormData" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: F08C62B7F2ABE15A36FB514AA57C9D82DC746279 ~~~~~ 'Allow importing of autofill form data' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportAutofillFormData Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235730 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Importing of autofill form data must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportAutofillFormData" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: F08C62B7F2ABE15A36FB514AA57C9D82DC746279 ~~~~~ 'Allow importing of autofill form data' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportAutofillFormData Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235730 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Importing of autofill form data must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportAutofillFormData" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" to "disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: F08C62B7F2ABE15A36FB514AA57C9D82DC746279 ~~~~~ 'Allow importing of autofill form data' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportAutofillFormData Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235730 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Importing of autofill form data must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportAutofillFormData" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of autofill form data" to "disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: F08C62B7F2ABE15A36FB514AA57C9D82DC746279 ~~~~~ 'Allow importing of autofill form data' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportAutofillFormData Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235732 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Importing of cookies must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportCookies" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 16BF98FC3F0EBB1565C797CB6FFC1D57C15A20D6 ~~~~~ 'Allow importing of cookies' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportCookies Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235732 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Importing of cookies must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportCookies" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 16BF98FC3F0EBB1565C797CB6FFC1D57C15A20D6 ~~~~~ 'Allow importing of cookies' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportCookies Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235732 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Importing of cookies must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportCookies" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" to "disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 16BF98FC3F0EBB1565C797CB6FFC1D57C15A20D6 ~~~~~ 'Allow importing of cookies' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportCookies Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235732 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Importing of cookies must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportCookies" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of cookies" to "disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 16BF98FC3F0EBB1565C797CB6FFC1D57C15A20D6 ~~~~~ 'Allow importing of cookies' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportCookies Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235733 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Importing of extensions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportExtensions" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 63C9813DC2198C4155927B003A768D2286A93864 ~~~~~ 'Allow importing of extensions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportExtensions Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235733 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Importing of extensions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportExtensions" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 63C9813DC2198C4155927B003A768D2286A93864 ~~~~~ 'Allow importing of extensions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportExtensions Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||
| V-235733 | CAT II | MONT-SW-89108 | Microsoft Edge Security Technical Implem... | Importing of extensions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportExtensions" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" to "disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 63C9813DC2198C4155927B003A768D2286A93864 ~~~~~ 'Allow importing of extensions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportExtensions Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Scan Date: 2026-03-04T15:25:16.059827
Technology Area: Windows Operating System
|
||||||||
| V-235733 | CAT II | MONT-SW-89134 | Microsoft Edge Security Technical Implem... | Importing of extensions must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportExtensions" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of extensions" to "disabled". Finding DetailsEvaluate-STIG 1.2510.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 12/17/2025 ResultHash: 63C9813DC2198C4155927B003A768D2286A93864 ~~~~~ 'Allow importing of extensions' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportExtensions Value: 0x00000000 (0) Type: REG_DWORD
Source: MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Scan Date: 2026-03-04T15:25:42.078580
Technology Area: Windows Operating System
|
||||||||
| V-235734 | CAT II | MONT-WS-92040 | Microsoft Edge Security Technical Implem... | Importing of browsing history must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browsing history" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportHistory" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browsing history" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 5A369FE00E668F3D5C55ABC808997BA81CD6BF1E ~~~~~ 'Allow importing of browsing history' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportHistory Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Scan Date: 2026-01-14T12:57:25.750497
Technology Area: Windows Operating System
|
||||||||
| V-235734 | CAT II | MONT-WS-92010 | Microsoft Edge Security Technical Implem... | Importing of browsing history must be disabled. | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browsing history" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "ImportHistory" is not set to "REG_DWORD = 0", this is a finding. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow importing of browsing history" to "disabled". Finding DetailsEvaluate-STIG 1.2507.5 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: 5A369FE00E668F3D5C55ABC808997BA81CD6BF1E ~~~~~ 'Allow importing of browsing history' is Disabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: ImportHistory Value: 0x00000000 (0) Type: REG_DWORD
Source: _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Scan Date: 2026-01-14T12:57:28.003629
Technology Area: Windows Operating System
|
||||||||