Automating Data Vault processes on Microsoft Fabric with VaultSpeed
June 27, 2025Optimizing Resource Allocation with Microsoft Defender CSPM
June 27, 2025We have reviewed the new settings in Microsoft Edge version 138 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 128 security baseline, which can be downloaded from the Microsoft Security Compliance Toolkit, continues to be our recommended configuration.
Microsoft Edge version 138 introduces 6 new Computer and User settings and we have included a spreadsheet listing the new settings.
There are two settings we would like to highlight for consideration as they enabling previewing behavior that will be enabled by default in a future release.
Control whether TLS 1.3 Early Data is enabled in Microsoft Edge
This setting allows enterprises to control whether the browser uses TLS 1.3 Early Data, a performance feature that sends HTTPS requests in parallel with the TLS handshake. This setting allows for faster use of secure connections. Enterprise customers are encouraged to test to identify any compatibility issues prior to the enablement.
Specifies whether to block requests from public websites to devices on a user’s local network
This setting helps prevent malicious websites from probing or interacting with internal resources (i.e. printers, routers, or internal APIs), reducing the risk of lateral movement or data exposure. Enterprise customers are encouraged to test for any intentional requests from public to local devices.
One thing to note on this policy setting is you may see a deprecation claim in the setting title. This was in error and will be corrected in a subsequent release.
As a friendly reminder, all available settings for Microsoft Edge are documented here, and all available settings for Microsoft Edge Update are documented here.
Please continue to give us feedback through the Security Baselines Discussion site or this post.