Skip to main content
CUI

Vulnerability V-235752

Back

V-235752

CAT III

Download restrictions must be configured.

Ships Affected
2
Total Findings
5
Open
0
Closed
3

Check Text

If this machine is on SIPRNet, this is Not Applicable. The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", or "BlockMaliciousDownloads". The more restrictive option, "Block all downloads", is also acceptable. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "DownloadRestrictions" is set to "REG_DWORD = 0", this is a finding.

Fix Text

Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select one of the following: "BlockDangerousDownloads", "Block potentially dangerous or unwanted downloads", "BlockAllDownloads", or "BlockMaliciousDownloads".

STIG Reference

STIG
Microsoft Edge Security Technical Implementation Guide
Version
2
Release
5
Rule ID
SV-235752r1156563_rule

All Occurrences

This vulnerability appears on 2 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
LAB BASELINES BASELINE SCHR-P3-DP-001_MSEdge_V2R4_20260305-132826.cklb
Unassigned 2026-03-12T15:38:14.495854 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89134_MSEdge_V2R3_20251217-201011.ckl
Unassigned 2026-03-04T15:25:42.078580 View in Context
USNS MONTFORD POINT T-ESD-1 MONT-SW-89108_MSEdge_V2R3_20251217-202829.ckl
Unassigned 2026-03-04T15:25:16.059827 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92010/Checklist/MONT-WS-92010_MSEdge_V2R3_20251023-141013.ckl
Unassigned 2026-01-14T12:57:28.003629 View in Context
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-WS-92040/Checklist/MONT-WS-92040_MSEdge_V2R3_20251023-142313.ckl
Unassigned 2026-01-14T12:57:25.750497 View in Context
CUI