STIGQter STIGQter: STIG Summary: Microsoft Edge Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Jan 2021:

Site tracking of a user’s location must be disabled.

DISA Rule

SV-235749r626523_rule

Vulnerability Number

V-235749

Group Title

SRG-APP-000141

Rule Version

EDGE-00-000032

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default geolocation setting" to "enabled" and select "Don't allow any site to track users' physical location".

Check Contents

The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default geolocation setting" must be set to "enabled" with the option value set to "Don't allow any site to track users' physical location".

Use the Windows Registry Editor to navigate to the following key:
HKLM\SOFTWARE\Policies\Microsoft\Edge

If the value for "DefaultGeolocationSetting" is not set to "REG_DWORD = 2", this is a finding.

Vulnerability Number

V-235749

Documentable

False

Rule Version

EDGE-00-000032

Severity Override Guidance

The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Content settings/Default geolocation setting" must be set to "enabled" with the option value set to "Don't allow any site to track users' physical location".

Use the Windows Registry Editor to navigate to the following key:
HKLM\SOFTWARE\Policies\Microsoft\Edge

If the value for "DefaultGeolocationSetting" is not set to "REG_DWORD = 2", this is a finding.

Check Content Reference

M

Target Key

5280

Comments