1. Home
  2. Security Hardening
  3. DISA STIG Edge V1R4
  4. EDGE-00-000050 – Microsoft Defender SmartScreen must be enabled.

EDGE-00-000050 – Microsoft Defender SmartScreen must be enabled.

Details

This policy setting configures Microsoft Defender SmartScreen, which provides warning messages to help protect users from potential phishing scams and malicious software. By default, Microsoft Defender SmartScreen is turned on.

If this setting is enabled, Microsoft Defender SmartScreen is turned on.

If this setting is disabled, Microsoft Defender SmartScreen is turned off.

If this setting is not configured, users can choose whether to use Microsoft Defender SmartScreen.

This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS instances that are that are managed via MDM or joined to a domain via MCX.

Solution

Set the policy value for ‘Computer Configuration/Administrative Templates/Microsoft Edge/SmartScreen settings/Configure Microsoft Defender SmartScreen’ to ‘Enabled’.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles