Check: EDGE-00-000062
Microsoft Edge STIG:
EDGE-00-000062
(in versions v1 r8 through v1 r1)
Title
The built-in DNS client must be disabled. (Cat II impact)
Discussion
This setting controls whether to use the built-in DNS client. This does not affect which DNS servers are used; it only controls the software stack that is used to communicate with them. For example, if the operating system is configured to use an enterprise DNS server, that same server would be used by the built-in DNS client. However, it is however possible that the built-in DNS client will address servers in different ways by using more modern DNS-related protocols such as DNS-over-TLS. If this policy is enabled, the built-in DNS client is used if it is available. If this policy is disabled, the client is never used.
Check Content
The policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Use built-in DNS client" must be set to "disabled". Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Policies\Microsoft\Edge If the value for "BuiltInDnsClientEnabled" is not set to "REG_DWORD = 0", this is a finding.
Fix Text
Set the policy value for "Computer Configuration/Administrative Templates/Microsoft Edge/Use built-in DNS client" to "disabled".
Additional Identifiers
Rule ID: SV-235774r879598_rule
Vulnerability ID: V-235774
Group Title: SRG-APP-000157
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001942 |
The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts. |
Controls
Number | Title |
---|---|
IA-2 (9) |
Network Access To Non-Privileged Accounts - Replay Resistant |