Building a Stronger Microsoft Edge Defense
In the latest episode of the Senteon webinar series, cybersecurity expert Henry Timm from Phantom Technology Solutions continues the discussion on...
3 min read
Henry Zhang
:
Oct 9, 2024 9:00:00 AM
In this episode of the Senteon webinar series, Henry Timm of Phantom Technology Solutions digs deeper into CIS Benchmarks and their role in hardening Microsoft Edge. This time, the conversation zeroed in on some often-overlooked settings that can make or break your browser’s security. From ensuring your browsing history remains intact for audits to enforcing code integrity, this episode highlighted critical techniques for making Edge safer and more reliable.
In an age where privacy is king, many users are quick to clear their browsing history to maintain anonymity. However, as Henry pointed out, there are security benefits to preserving that history, especially for businesses. One of the CIS recommendations is to disable automatic history clearing when the browser closes, a setting that’s often misunderstood.
Henry explained that keeping browser history intact can help IT teams investigate incidents after they happen. For example, if a security breach occurs, having a complete log of the sites visited and actions taken within the browser can be critical for forensic analysis. Without that information, it becomes incredibly difficult to track down the source of the problem.
For businesses, this is crucial: it’s not just about privacy but auditability. By keeping a record of user activity, IT teams have the tools they need to trace and respond to incidents quickly.
Another critical setting discussed in this episode was the Code Integrity Guard feature in Microsoft Edge. This setting ensures that only trusted code—verified by digital signatures—can run within the browser. According to Henry, this safeguard prevents supply chain attacks, where malicious code is slipped into a seemingly legitimate process and then executed without detection.
To put it simply, Code Integrity Guard acts like a bouncer at a club, only allowing in software that’s been verified. Without this setting enabled, the browser could run potentially harmful code, including malware that uses the browser as a gateway to compromise the entire system.
Henry made it clear that CIS Benchmarks recommend enabling this setting for good reason. In today’s threat landscape, attacks are becoming more sophisticated, and businesses need to take every step to ensure their systems are running only what’s trusted and verified.
Another key recommendation discussed was the disabling of In-Private Browsing (also known as Incognito Mode). While In-Private Browsing might seem like a privacy-focused feature, Henry explained why CIS recommends disabling this mode for business environments.
When users browse in private mode, no history or cookies are saved, which sounds great for the individual but creates a huge blind spot for IT teams. Without the ability to track browsing activity, it becomes impossible to perform thorough audits or investigate security incidents.
Henry likened this to “turning off the lights” when you’re trying to monitor what’s happening. Disabling In-Private Browsing ensures that audit trails remain intact and nothing slips under the radar. It’s a small inconvenience for users, but the security benefits make it well worth the change.
One of the recurring themes in Henry’s talk was the balance between privacy and security. Many users assume the two go hand-in-hand, but Henry was quick to remind the audience that too much privacy can actually hamper security efforts. This is particularly true in a business environment, where auditability is just as important as keeping user data private.
By following CIS Benchmarks, businesses can find the right balance. For example, disabling third-party cookies protects users from tracking while still allowing IT teams to monitor what’s happening on their networks. Similarly, keeping browser history intact ensures a solid audit trail without compromising day-to-day privacy.
In this episode, Henry emphasized that securing a browser like Microsoft Edge is all about layered security. It’s not just about one setting or one configuration—it’s about combining multiple best practices, from disabling In-Private Browsing to enforcing Code Integrity Guard, to create a solid defense.
The lesson here is that CIS Benchmarks are more than just technical guidelines—they’re a framework for ensuring that every aspect of your browser is locked down, and every potential vulnerability is mitigated. Whether you’re an IT professional or a business owner, these small configuration changes can have a massive impact on your overall security posture.
Call to Action:
Interested in seeing the full conversation? Watch the full webinar episode here. You can also register for upcoming episodes in the Senteon webinar series here. And don’t forget, Senteon is offering free internal and external reports to help you assess your browser’s security. Reach out with the comment “settings webinar” here to get started!
In the latest episode of the Senteon webinar series, cybersecurity expert Henry Timm from Phantom Technology Solutions continues the discussion on...
In the latest episode of Senteon’s webinar series, Henry Timm from Phantom Technology Solutions returned to wrap up a deep dive into CIS Benchmarks...
In the third installment of Senteon’s browser hardening series, cybersecurity expert Brad Powell continues his exploration into the powerful privacy...