Senteon Blog

Hardening Microsoft Edge and Winning the Security Battle One Setting at a Time

Written by Henry Zhang | Oct 21, 2024 12:00:00 PM

Microsoft Edge—sure, it’s sleek and fast, but is it as secure as it could be? The answer may surprise you. During the latest webinar hosted by Senteon, featuring cybersecurity expert Tarah Wheeler from Red Queen Dynamics, the focus was clear: privacy controls and data protection aren’t just nice-to-haves—they’re the difference between a secure organization and one vulnerable to attack.

Senteon’s Rich and Zach kicked things off with a quick overview of CIS Benchmarks, the industry’s best practices for browser security hardening, but the star of the show was the in-depth discussion of how to properly configure Microsoft Edge for maximum security. The task? To dive deep into 14 different settings that can make or break your security posture.

The Perils of Browser Settings: Not All Defaults Are Friendly

Right off the bat, Tarah dove into the first of many settings: default sensor access. It’s not something most people think about—after all, when was the last time you were asked to give permission for your browser to access your sensors? But lurking behind those websites are scripts designed to track your every move.

By enabling the setting to disable sensor access, you’re creating a wall between your device and sites that are eager to grab data without your knowledge. “It’s not just about stopping annoyances—it’s about protecting privacy,” Tarah explained. It’s a small step, but one that can make a huge difference in proactive threat mitigation.

Takeaway: Locking down browser sensors prevents passive data collection, putting control back in the user’s hands.

The Story Behind a Perfectly Timed Decision

Tarah shared an insightful story from her own life as a private pilot in training, drawing an unexpected connection between aviation checklists and cybersecurity. Imagine this: You’re about to take a flight and you discover a minor issue with a critical system. Do you take off and hope for the best? No way. You fix the problem. The same applies to cybersecurity.

Just like in aviation, checklists in security aren’t just for show. “A checklist is there to make sure you don’t miss something critical,” Tarah explained. This mindset is crucial when configuring security settings like deleting old browser data on migration. It might seem like an innocuous setting, but failing to disable it can leave valuable breadcrumbs for attackers. After all, old data is just as valuable to bad actors as new data.

Takeaway: Just like in flying, it’s better to be safe than sorry. A well-configured setting today can prevent major headaches tomorrow.

Complementary Controls: The Power of Layering Security

As the discussion shifted towards synchronization settings, Tarah emphasized the importance of disabling data sync services. Why? Because syncing across devices creates more entry points for attackers.

But here’s the twist: turning off a single setting won’t guarantee full protection. Complementary controls are key. When it comes to browser history, for example, you can’t just stop at one setting. You need to disable the ability to delete browser history, ensure that autofill settings for payment and address details are off, and finally, prevent users from overriding these decisions.

Defense in depth isn’t just a buzzword,” Tarah added. “It’s how you stop attackers from finding workarounds.” In other words, each setting strengthens the others, creating layers of protection.

Takeaway: Security isn’t about locking one door—it’s about locking all the doors and checking the windows too.

The Automation Secret: Let the System Do the Work

Tarah, Rich, and Zach made one thing clear throughout the webinar: Automation is the key to reducing security configuration drift. Senteon’s platform doesn’t just alert you to the fact that a setting is misconfigured—it actually fixes the problem for you. This eliminates human error, making it possible to harden systems across your organization without lifting a finger.

As Tarah explained, “It’s a race—attackers versus defenders. The quicker you patch the vulnerability, the better. And with automation, you’re already several steps ahead.”

Takeaway: Let automation handle routine security tasks. It ensures consistency and reduces the risk of leaving gaps open for attackers.

Conclusion: Fortify Microsoft Edge One Setting at a Time

The first webinar in Senteon’s CIS Benchmark series was packed with insights and practical advice, all aimed at making Microsoft Edge a secure, fortified browser for your organization. With the right configuration, you’re not just checking boxes—you’re actively mitigating risks.

As Tarah wrapped up, it was clear: securing Microsoft Edge isn’t just about privacy or convenience—it’s about taking a proactive, comprehensive approach to IT security compliance and proactive threat mitigation.

Call to Action (CTA):
Want to watch the full episode with Tarah Wheeler? Click here to dive deeper into these essential settings.

Don’t miss out on the upcoming webinars—register here to stay ahead in securing your systems.

For a free internal and external report on how your systems stack up, reach out to Senteon with the comment “settings webinar” here.