Microsoft made the big transition to a Chromium-based version of Edge earlier this year. We are taking a look at how it performs against Google’s own Chrome browser to see which is the best. There’s a new Edge in town. The Microsoft developers in charge of Windows’ default web browser got tired of chasing compatibility issues resulting from site developers’ only targeting Chrome for. How to Make a Web Note in Microsoft Edge. The steps are given below. Open the Microsoft Edge browser on your PC. And open a web page from where you want to make a web note. Now open the Web Capture tool. Click on the three horizontal dots (Settings and more menu) from the top right of the window. Microsoft Edge is a cross-platform web browser developed by Microsoft. It was first released for Windows 10 and Xbox One in 2015, then for Android and iOS in 2017, 7 8 for macOS in 2019, 9 and as a preview for Linux in October 2020. MIcrosoft Edge is a Microsoft web browser made to replace the older Internet Explorer with faster speeds and more features.
-->Note
You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the Microsoft Edge documentation landing page.
Microsoft Edge is designed with improved security in mind, helping to defend people from increasingly sophisticated and prevalent web-based attacks against Windows. Because Microsoft Edge is designed like a Universal Windows app, changing the browser to an app, it fundamentally changes the process model so that both the outer manager process and the different content processes all live within app container sandboxes.
Microsoft Edge runs in 64-bit not just by default, but anytime it’s running on a 64-bit operating system. Because Microsoft Edge doesn’t support legacy ActiveX controls or 3rd-party binary extensions, there’s no longer a reason to run 32-bit processes on a 64-bit system.
The value of running 64-bit all the time is that it strengthens Windows Address Space Layout Randomization (ASLR), randomizing the memory layout of the browser processes, making it much harder for attackers to hit precise memory locations. In turn, 64-bit processes make ASLR much more effective by making the address space exponentially larger and, therefore, more difficult for attackers to find sensitive memory components.
For more details on the security features in Microsoft Edge, see Help protect against web-based security threats below.
You can find the Microsoft Edge Group Policy settings in the following location of the Group Policy Editor unless otherwise noted in the policy:
Computer ConfigurationAdministrative TemplatesWindows ComponentsMicrosoft Edge
Configure cookies
Supported versions: Microsoft Edge on Windows 10
Default setting: Disabled or not configured (Allow all cookies from all sites)
Microsoft Edge allows all cookies from all websites by default. With this policy, you can configure Microsoft to block only 3rd-party cookies or block all cookies.
Supported values
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Enabled | 0 | 0 | Block all cookies from all sites. | |
Enabled | 1 | 1 | Block only cookies from third party websites. | |
Disabled or not configured (default) | 2 | 2 | Allow all cookies from all sites. |
ADMX info and settings
ADMX info
- GP English name: Configure cookies
- GP name: Cookies
- GP element: CookiesListBox
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/AllowCookies
- Supported devices: Desktop and Mobile
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/AllowCookies
- Data type: Integer
Registry settings
- Path: HKLMSoftwarePoliciesMicrosoftMicrosoftEdgeMain
- Value name: Cookies
- Value type: REG_DWORD
Configure Password Manager
Supported versions: Microsoft Edge on Windows 10
Default setting: Enabled (Allowed/users can change the setting)
By default, Microsoft Edge uses Password Manager automatically, allowing users to manager passwords locally. Disabling this policy restricts Microsoft Edge from using Password Manager. Don’t configure this policy if you want to let users choose to save and manage passwords locally using Password Manager.
Supported values
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Not configured | Blank | Blank | Users can choose to save and manage passwords locally. | |
Disabled | 0 | no | Not allowed. | |
Enabled (default) | 1 | yes | Allowed. |
Verify not allowed/disabled settings:
- Click or tap More (…) and select Settings > View Advanced settings.
- Verify the settings Save Password is toggled off or on and is greyed out.
ADMX info and settings
ADMX info
- GP English name: Configure Password Manager
- GP name: AllowPasswordManager
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/AllowPasswordManager
- Supported devices: Desktop and Mobile
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/AllowPasswordManager
- Data type: Integer
Registry settings
- Path: HKLMSoftwarePoliciesMicrosoftMicrosoftEdgeMain
- Value name: FormSuggest Passwords
- Value type: REG_SZ
Configure Windows Defender SmartScreen
Supported versions: Microsoft Edge on Windows 10
Default setting: Enabled (Turned on)
Microsoft Edge uses Windows Defender SmartScreen (turned on) to protect users from potential phishing scams and malicious software by default. Also, by default, users cannot disable (turn off) Windows Defender SmartScreen. Enabling this policy turns on Windows Defender SmartScreen and prevent users from turning it off. Don’t configure this policy to let users choose to turn Windows defender SmartScreen on or off.
Supported values
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Not configured | Blank | Blank | Users can choose to use Windows Defender SmartScreen. | |
Disabled | 0 | 0 | Turned off. Do not protect users from potential threats and prevent users from turning it on. | |
Enabled | 1 | 1 | Turned on. Protect users from potential threats and prevent users from turning it off. |
To verify Windows Defender SmartScreen is turned off (disabled):
- Click or tap More (…) and select Settings > View Advanced settings.
- Verify the setting Help protect me from malicious sites and download with Windows Defender SmartScreen is disabled.
ADMX info and settings
ADMX info
- GP English name: Configure Windows Defender SmartScreen
- GP name: AllowSmartScreen
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/AllowSmartScreen
- Supported devices: Desktop and Mobile
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
- Data type: Integer
Registry settings
- Path: HKLMSOFTWAREPoliciesMicrosoftMicrosoftEdgePhishingFilter
- Value name: EnabledV9
- Value type: REG_DWORD
Prevent bypassing Windows Defender SmartScreen prompts for files
Supported versions: Microsoft Edge on Windows 10, version 1511 or later
Default setting: Disabled or not configured (Allowed/turned off)
By default, Microsoft Edge allows users to bypass (ignore) the Windows Defender SmartScreen warnings about potentially malicious files, allowing them to continue downloading the unverified file(s). Enabling this policy prevents users from bypassing the warnings, blocking them from downloading of the unverified file(s).
Supported values
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Disabled or not configured (default) | 0 | 0 | Allowed/turned off. Users can ignore the warning and continue to download the unverified file(s). | |
Enabled | 1 | 1 | Prevented/turned on. |
ADMX info and settings
ADMX info

- GP English name: Prevent bypassing Windows Defender SmartScreen prompts for files
- GP name: PreventSmartScreenPromptOverrideForFiles
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/PreventSmartScreenPromptOverrideForFiles
- Supported devices: Desktop and Mobile
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles
- Data type: Integer
Registry settings
- Path: HKLMSOFTWAREPoliciesMicrosoftMicrosoftEdgePhishingFilter
- Value name: PreventOverrideAppRepUnknown
- Value type: REG_DWORD
Prevent bypassing Windows Defender SmartScreen prompts for sites
Supported versions: Microsoft Edge on Windows 10, version 1511 or later
Default setting: Disabled or not configured (Allowed/turned off)
By default, Microsoft Edge allows users to bypass (ignore) the Windows Defender SmartScreen warnings about potentially malicious sites, allowing them to continue to the site. With this policy though, you can configure Microsoft Edge to prevent users from bypassing the warnings, blocking them from continuing to the site.
Supported values
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Disabled or not configured (default) | 0 | 0 | Allowed/turned off. Users can ignore the warning and continue to the site. | |
Enabled | 1 | 1 | Prevented/turned on. |
ADMX info and settings
ADMX info
- GP English name: Prevent bypassing Windows Defender SmartScreen prompts for sites
- GP name: PreventSmartscreenPromptOverride
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/PreventSmartscreenPromptOverride
- Supported devices: Desktop and Mobile
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride
- Data type: Integer
Registry settings
- Path: HKLMSOFTWAREPoliciesMicrosoftMicrosoftEdgePhishingFilter
- Value name: PreventOverride
- Value type: REG_DWORD
Prevent certificate error overrides
Supported versions: Microsoft Edge on Windows 10, version 1809
Default setting: Disabled or not configured (Allowed/turned off)
Microsoft Edge, by default, allows overriding of the security warnings to sites that have SSL errors, bypassing or ignoring certificate errors. Enabling this policy prevents overriding of the security warnings.
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Disabled or not configured (default) | 0 | 0 | Allowed/turned on. Override the security warning to sites that have SSL errors. | |
Enabled | 1 | 1 | Prevented/turned on. |
ADMX info and settings
ADMX info
- GP English name: Prevent certificate error overrides
- GP name: PreventCertErrorOverrides
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/PreventCertErrorOverrides
- Supported devices: Desktop and Mobile
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/PreventCertErrorOverrides
- Data type: Integer
Registry settings
- Path: HKLMSoftwarePoliciesMicrosoftMicrosoftEdgeInternet Setting
- Value name: PreventCertErrorOverrides
- Value type: REG_DWORD
Prevent using Localhost IP address for WebRTC

Supported versions: Microsoft Edge on Windows 10, version 1511 or later
Default setting: Disabled or not configured (Allowed/show localhost IP addresses)
By default, Microsoft Edge shows localhost IP address while making calls using the WebRTC protocol. Enabling this policy hides the localhost IP addresses.
Supported values
Group Policy | MDM | Registry | Description | Most restricted |
---|---|---|---|---|
Disabled or not configured (default) | 0 | 0 | Allowed. Show localhost IP addresses. | |
Enabled | 1 | 1 | Prevented. |
ADMX info and settings
ADMX info
- GP English name: Prevent using Localhost IP address for WebRTC
- GP name: HideLocalHostIPAddress
- GP path: Windows Components/Microsoft Edge
- GP ADMX file name: MicrosoftEdge.admx
MDM settings
- MDM name: Browser/PreventUsingLocalHostIPAddressForWebRTC
- Supported devices: Desktop
- URI full path: ./Vendor/MSFT/Policy/Config/Browser/PreventUsingLocalHostIPAddressForWebRTC
- Data type: Integer
Registry settings
- Path: HKLMSOFTWAREPoliciesMicrosoftMicrosoftEdgeMain
- Value name: HideLocalHostIPAddress
- Value type: REG_DWORD
Help protect against web-based security threats
While most websites are safe, some sites have been intentionally designed to steal sensitive and private information or gain access to your system’s resources. You can help protect against threats by using strong security protocols to ensure against such threats.
Microsoft Edge Is A Web Browser That Looks
Thieves use things like phishing attacks to convince someone to enter personal information, such as a banking password, into a website that looks like a legitimate bank but isn't. Attempts to identify legitimate websites through the HTTPS lock symbol and the EV Cert green bar have met with only limited success since attackers are too good at faking legitimate experiences for many people to notice the difference.
Another method thieves often use hacking to attack a system through malformed content that exploits subtle flaws in the browser or various browser extensions. This exploit lets an attacker run code on a device, taking over a browsing session, and perhaps the entire device.
Microsoft Edge addresses these threats to help make browsing the web a safer experience.
Feature | Description |
---|---|
Windows Hello | Microsoft Edge is the first browser to natively support Windows Hello to authenticate the user and the website with asymmetric cryptography technology, powered by early implementation of the Web Authentication (formerly FIDO 2.0 Web API) specification. |
Microsoft SmartScreen | Defends against phishing by performing reputation checks on sites visited and blocking any sites that are thought to be a phishing site. SmartScreen also helps to defend against installing malicious software, drive-by attacks, or file downloads, even from trusted sites. Drive-by attacks are malicious web-based attacks that compromise your system by targeting security vulnerabilities in commonly used software and may be hosted on trusted sites. |
Certificate Reputation system | Collects data about certificates in use, detecting new certificates and flagging fraudulent certificates automatically, and sends the data to Microsoft. The systems and tools in place include
|
Microsoft EdgeHTML and modern web standards | Microsoft Edge uses Microsoft EdgeHTML as the rendering engine. This engine focuses on modern standards letting web developers build and maintain a consistent site across all modern browsers. It also helps to defend against hacking through these security standards features:
NOTE: Both Microsoft Edge and Internet Explorer 11 support HSTS. |
Code integrity and image loading restrictions | Microsoft Edge content processes support code integrity and image load restrictions, helping to prevent malicious DLLs from loading or injecting into the content processes. Only properly signed images are allowed to load into Microsoft Edge. Binaries on remote devices (such as UNC or WebDAV) can’t load. |
Memory corruption mitigations | Memory corruption attacks frequently happen to apps written in C or C++ don’t provide safety or buffer overflow protection. When an attacker provides malformed input to a program, the program’s memory becomes corrupt allowing the attacker to take control of the program. Although attackers have adapted and invented new ways to attack, we’ve responded with memory safety defenses, mitigating the most common forms of attack, including and especially use-after-free (UAF) vulnerabilities. |
Memory Garbage Collector (MemGC) mitigation | MemGC replaces Memory Protector and helps to protect the browser from UAF vulnerabilities. MemGC frees up memory from the programmer and automating it. Only freeing memory when the automation detects no references left pointing to a given block of memory. |
Control Flow Guard | Attackers use memory corruption attacks to gain control of the CPU program counter to jump to any code location they want. Control Flow Guard, a Microsoft Visual Studio technology, compiles checks around code that performs indirect jumps based on a pointer. Those jumps get restricted to function entry points with known addresses only making attacker take-overs must more difficult constraining where an attack jumps. |
All web content runs in an app container sandbox | Microsoft Edge takes the sandbox even farther, running its content processes in containers not just by default, but all of the time. Microsoft Edge doesn’t support 3rd party binary extensions, so there is no reason for it to run outside of the container, making Microsoft Edge more secure. |
Extension model and HTML5 support | Microsoft Edge does not support binary extensions because they can bring code and data into the browser’s processes without any protection. So if anything goes wrong, the entire browser itself can be compromised or go down. We encourage everyone to use our scripted HTML5-based extension model. For more info about the new extensions, see the Microsoft Edge Developer Center. |
Reduced attack surfaces | Microsoft Edge does not support VBScript, JScript, VML, Browser Helper Objects, Toolbars, ActiveX controls, and document modes. Many IE browser vulnerabilities only appear in legacy document modes, so removing support reduced attack surface making the browser more secure. It also means that it’s not as backward compatible. With this reduced backward compatibility, Microsoft Edge automatically falls back to Internet Explorer 11 for any apps that need backward compatibility. This fall back happens when you use the Enterprise Mode Site List. |
Summary
Microsoft has released a new Chromium-based version of Microsoft Edge. This new version provides best in class compatibility with extensions and websites. Additionally, this new version provides great support for the latest rendering capabilities, modern web applications, and powerful developer tools across all supported OS platforms.
To learn more about the new Microsoft Edge, see the following resources:
Improvements and fixes
This update includes the following quality improvements:
Start menu pins, tiles, and shortcuts for the current version of Microsoft Edge will migrate to the new Microsoft Edge.
Taskbar pins and shortcuts for the current version of Microsoft Edge will migrate to the new Microsoft Edge.
The new Microsoft Edge will be pinned to the taskbar. If the current version of Microsoft Edge is already pinned, it will be replaced.
The new Microsoft Edge will add a shortcut to the desktop. If the current version of Microsoft Edge already has a shortcut, it will be replaced.
By default, most protocols that Microsoft Edge handles will be migrated to the new Microsoft Edge.
The current version of Microsoft Edge will be hidden from UX surfaces in the OS. This includes settings, applications, and any file or protocol support dialog boxes.
Attempts to start the current version of Microsoft Edge will redirect to the new Microsoft Edge.
The First Run Experience (FRE) will auto-launch the first time that a device restarts after the new Microsoft Edge is installed.
Data from earlier versions of Microsoft Edge (such as passwords, favorites, open tabs) will be available in the new Microsoft Edge.
This new Microsoft Edge does not support uninstalling of this update.
To view supported features, please see the Microsoft Edge Platform Status.
Known issues in this update
Download Microsoft Edge
We are currently not aware of any issues with this update.
How to get this update
Manual download
If you want to download the new Microsoft Edge, go to https://www.microsoft.com/edge.
Prerequisites
For Windows 10, version 1909:
No additional updates are required.
For Windows 10, version 1903:
You must have one of the following updates or a later update installed to apply this update:
Recommended: October 8, 2019—KB4517389 (OS Build 18362.418)
Optional: September 26, 2019—KB4517211 (OS Build 18362.387)
File information
File attributes
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
File verification
Microsoft Edge Web Browser Review
File hash information
File name | SHA1 hash | SHA256 hash |
---|---|---|
Windows10.0-KB4541302-x86.msu | F4C0F8BFB1CDB9031C68AD92EF4550EB29BC4EB0 | ED7205807F35B020D6A02419FC586C7666CF0848FEA187D12EE029F1B558A5CC |
Windows10.0-KB4541302-x64.msu | 5AB99737C6E98AF331B2F27C749BCD464E50D0DC | 74F8AA021627A1B961E6C19985A8D1004149AF3171DEE720BB4ECD3B354A524D |
For all supported x86-based versions
File name | File version | File size | Date | Time |
Microsoftedgestandaloneinstaller.exe | 1.3.119.43 | 74,428,112 | 14-Feb-2020 | 02:54 |
For all supported x64-based versions
File name | File version | File size | Date | Time |
Microsoftedgestandaloneinstaller.exe | 1.3.119.43 | 76,864,208 | 14-Feb-2020 | 02:54 |
References
Learn about the terminology that Microsoft uses to describe software updates.
