STIGQter STIGQter: STIG Summary: Windows 10 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.

DISA Rule

SV-220844r569187_rule

Vulnerability Number

V-220844

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN10-CC-000250

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Edge >> "Configure Windows Defender SmartScreen" to "Enabled".

Windows 10 includes duplicate policies for this setting. It can also be configured under Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender SmartScreen >> Microsoft Edge.

Check Contents

This is applicable to unclassified systems, for other systems this is NA.

Windows 10 LTSC\B versions do not include Microsoft Edge, this is NA for those systems.

If the following registry value does not exist or is not configured as specified, this is a finding.

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter\

Value Name: EnabledV9

Type: REG_DWORD
Value: 0x00000001 (1)

Vulnerability Number

V-220844

Documentable

False

Rule Version

WN10-CC-000250

Severity Override Guidance

This is applicable to unclassified systems, for other systems this is NA.

Windows 10 LTSC\B versions do not include Microsoft Edge, this is NA for those systems.

If the following registry value does not exist or is not configured as specified, this is a finding.

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter\

Value Name: EnabledV9

Type: REG_DWORD
Value: 0x00000001 (1)

Check Content Reference

M

Target Key

4072

Comments