| title | Settings list for the Microsoft Edge security baseline in Intune | ||
|---|---|---|---|
| description | View a list of the settings in the Microsoft Intune security baseline for Microsoft Edge browser. This list includes the default values for settings as found in the default configuration of the baseline. | ||
| ms.date | 01/09/2025 | ||
| ms.topic | reference | ||
| ms.reviewer | aanavath | ||
| ms.collection |
|
||
| zone_pivot_groups | edge-baseline-versions |
This article is a reference for the settings that are available in the Microsoft Edge security baseline for Microsoft Intune.
In May 2023, the settings for the Microsoft Edge baselines updated to a new format. This article provides a reference for Microsoft Edge baselines version 85 and earlier. To view the settings reference for newer baselines, see Microsoft Edge security baseline settings reference for Microsoft Intune.
Each security baseline is a group of preconfigured Windows settings that help you apply and enforce granular security settings that the relevant security teams recommend. You can also customize each baseline you deploy to enforce only those settings and values you require. When you create a security baseline profile in Intune, you're creating a template that consists of multiple device configuration settings.
The details that display in this article are based on baseline version you select at the top of the article. For each version, this article displays:
- A list of each setting with its configuration as found in the default instance of that baseline version.
- When available, a link to the underlying configuration service provider (CSP) documentation or other related content from the relevant product group that provides context and possibly additional details for a settings use.
When a new version of a baseline becomes available, it replaces the previous version. Profile instances that you’ve created prior to the availability of a new version:
- Become read-only. You can continue to use those profiles but can't edit them to change their configuration.
- Can be updated to the current version. After you update a profile to the current baseline version, you can edit the profile to modify settings.
To learn more about using security baselines, see:
::: zone pivot="edge-sept-2020"
::: zone-end ::: zone pivot="edge-april-2020"
::: zone-end ::: zone pivot="edge-october-2019"
Note
The Microsoft Edge baseline for October 2019 is a Public Preview. ::: zone-end
::: zone pivot="edge-sept-2020,edge-april-2020"
-
Supported authentication schemes
Baseline default: Enabled
Learn more- Supported authentication schemes
Baseline defaults: Two items: NTLM and Negotiate
- Supported authentication schemes
-
Default Adobe Flash setting
Baseline default: Enabled
Learn more- Default Adobe Flash setting
Baseline default: Block the Adobe Flash plugin
Learn more
- Default Adobe Flash setting
-
Control which extensions cannot be installed
Baseline default: Enabled- Extension IDs the user should be prevented from installing (or * for all)
Baseline default: Not configured by default. Manually add one or more Extension IDs
- Extension IDs the user should be prevented from installing (or * for all)
-
Allow user-level native messaging hosts (installed without admin permissions)
Baseline default: Disabled -
Enable saving passwords to the password manager
Baseline default: Disabled
Learn more -
Prevent bypassing Microsoft Defender SmartScreen prompts for sites
Baseline default: Enabled
Learn more -
Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads
Baseline default: Enabled
Learn more -
Enable site isolation for every site
Baseline default: EnabledMicrosoft Edge also supports IsolateOrigins policy that can isolate additional, finer-grained origins. Intune doesn't support configuring the IsolateOrigins policy.
-
Configure Microsoft Defender SmartScreen
Baseline default: Enabled
Learn moreThis policy is available only on Windows instances that are joined to a Microsoft Active Director domain, or on Windows Pro or Enterprise instances that are enrolled for device management.
-
Configure Microsoft Defender SmartScreen to block potentially unwanted apps
Baseline default: EnabledThis policy is available only on Windows instances that are joined to a Microsoft Active Director domain, or on Windows Pro or Enterprise instances that are enrolled for device management.
-
Allow users to proceed from the SSL warning page
Baseline default: Disabled
Learn more -
Minimum SSL version enabled
Baseline default: Enabled- Minimum SSL version enabled
Baseline default: TLS 1.2
- Minimum SSL version enabled
::: zone-end ::: zone pivot="edge-october-2019"
-
Prevent bypassing Microsoft Defender SmartScreen prompts for sites
Baseline default: Enabled
Learn more -
Minimum SSL version enabled
Baseline default: Enabled- Minimum SSL version enabled
Baseline default: TLS 1.2
- Minimum SSL version enabled
-
Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads
Baseline default: Enabled
Learn more -
Allow users to proceed from the SSL warning page
Baseline default: Disabled
Learn more -
Default Adobe Flash setting
Baseline default: Enabled
Learn more- Default Adobe Flash setting
Baseline default: Block the Adobe Flash plugin
Learn more
- Default Adobe Flash setting
-
Enable site isolation for every site
Baseline default: EnabledMicrosoft Edge also supports IsolateOrigins policy that can isolate additional, finer-grained origins. Intune doesn't support configuring the IsolateOrigins policy.
-
Supported authentication schemes
Baseline default: Enabled
Learn more- Supported authentication schemes
Baseline defaults: Two items: NTLM and Negotiate
- Supported authentication schemes
-
Enable saving passwords to the password manager
Baseline default: Disabled
Learn more -
Control which extensions cannot be installed
Baseline default: Enabled- Extension IDs the user should be prevented from installing (or * for all)
Baseline default: Not configured by default. Manually add one or more Extension IDs
- Extension IDs the user should be prevented from installing (or * for all)
-
Configure Microsoft Defender SmartScreen
Baseline default: Enabled
Learn moreThis policy is available only on Windows instances that are joined to a Microsoft Active Director domain, or on Windows Pro or Enterprise instances that are enrolled for device management.
-
Allow user-level native messaging hosts (installed without admin permissions)
Baseline default: Disabled
::: zone-end ::: zone pivot="edge-sept-2020"
-
Allow certificates signed using SHA-1 when issued by local trust anchors (deprecated)
Baseline default: Disabled[!IMPORTANT] This setting is deprecated. It is currently supported but will become obsolete in a future release.
::: zone-end