UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Download restrictions must be configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-235752 EDGE-00-000036 SV-235752r766854_rule Low
Description
Configures the type of downloads that Microsoft Edge completely blocks, without letting users override the security decision. Set "BlockDangerousDownloads" to allow all downloads except for those that carry Microsoft Defender SmartScreen warnings. Set "BlockPotentiallyDangerousDownloads" to allow all downloads except for those that carry Microsoft Defender SmartScreen warnings of potentially dangerous or unwanted downloads. Set "BlockAllDownloads" to block all downloads. If this policy is not configured or the 'DefaultDownloadSecurity' option set, downloads go through the usual security restrictions based on Microsoft Defender SmartScreen analysis results. Note that these restrictions apply to downloads from web page content, as well as the "download link..." context menu option. These restrictions do not apply to saving or downloading the currently displayed page, nor do they apply to the "Save as PDF" option from the printing options. See https://go.microsoft.com/fwlink/?linkid=2094934 for more information on Microsoft Defender SmartScreen. Policy options mapping: - DefaultDownloadSecurity (0) = No special restrictions. - BlockDangerousDownloads (1) = Block dangerous downloads. - BlockPotentiallyDangerousDownloads (2) = Block potentially dangerous or unwanted downloads. - BlockAllDownloads (3) = Block all downloads.
STIG Date
Microsoft Edge Security Technical Implementation Guide 2021-11-19

Details

Check Text ( C-38971r766852_chk )
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" must be set to "Enabled" with the option value set to "BlockDangerousDownloads" or "Block potentially dangerous or unwanted downloads".

Use the Windows Registry Editor to navigate to the following key:
HKLM\SOFTWARE\Policies\Microsoft\Edge

If the value for "DownloadRestrictions" is not set to "REG_DWORD = 1", or "REG_DWORD = 2", this is a finding.
Fix Text (F-38934r766853_fix)
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Allow download restrictions" to "Enabled" and select "BlockDangerousDownloads" or "Block potentially dangerous or unwanted downloads".