| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-235764 | CAT II | SCHR-P3-DP-001 | Microsoft Edge Security Technical Implem... | Microsoft Defender SmartScreen must be configured ... | - | |||
Check TextThe policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen to block potentially unwanted apps" must be set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for SmartScreenPuaEnabled is not set to "REG_DWORD = 1", this is a finding. If this machine is on SIPRNet, this is Not Applicable. Fix TextSet the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen to block potentially unwanted apps" to "Enabled". Finding DetailsEvaluate-STIG 1.2601.0 (Scan-MicrosoftEdge_Checks) found this to be NOT A FINDING on 03/05/2026 ResultHash: AF7BFAF51876CD911EA583D31A1AB2F474242704 ~~~~~ 'Configure Microsoft Defender SmartScreen to block potentially unwanted apps' is Enabled Registry Path: HKLM:\SOFTWARE\Policies\Microsoft\Edge Value Name: SmartScreenPuaEnabled Value: 0x00000001 (1) Type: REG_DWORD
Source: SCHR-P3-DP-001_MSEdge_V2R4_20260305-132826.cklb
Scan Date: 2026-03-12T15:38:14.495854
Technology Area: Windows Operating System
|
||||||||