Microsoft Edge was developed through the Chromium open-source project, offering a similarly well-tested security architecture and design. The Microsoft Edge security evolution includes potent built-in defenses to combat phishing and malware schemes. It also supports Windows hardware isolation, meaning additional software is not required to achieve security. Microsoft Edge also delivers powerful security features that help protect against data loss, including external and internal threats.
Corporate Security Against External and Internal Threats
Microsoft Defender SmartScreen is built into Edge and delivers real-time reputation checks of downloads and sites as end-users work on the internet and is part of the Microsoft Intelligent Security Graph. By executing checks against up-to-date rosters of dangerous sites and downloads, Microsoft Edge helps to identify and block threats against corporate security.
In addition to protecting businesses against external threats, IT professionals also must defend against internal dangers and risks. Protecting important and sensitive corporate data—proficiently and at scale—is a high-level priority for IT admins, especially as employees have decentralized after the pandemic. Microsoft Edge has native support for Azure AD Conditional Access, Windows Information Protection, and the new Microsoft Endpoint Data Loss Prevention (DLP) – and offers that support without requiring additional software.
Microsoft Edge natively supports Conditional Access. Microsoft Edge’s support for conditional Access facilitates the utilization of identity signals as part of a corporation’s access control decisions. Conditional Access is the tool Azure Active Directory uses to gather signals, arrive at conclusions, and enforce corporate policies. Conditional Access is the core of the new identity-driven control plane, but additional plug-ins are required. Microsoft 365 E3 (or higher) or a Microsoft 365 Business Premium subscription are both required for Azure AD Conditional Access.
Microsoft Edge natively supports Windows Information Protection (WIP), which delivers protection to business data to avoid unintentional leaks by Windows device users. Microsoft Edge support for WIP can be configured to permit specific IT-mandated apps to gain Access to sensitive data. It also offers leak controls—such as clipboard protection, encrypting files on download, and preventing file uploads to unauthorized parties— with a streamlined experience for the user. Windows Information Protection (WIP) configuration requires the corporate licensing of Microsoft Intune or Microsoft Endpoint Configuration Manager. Companies may also utilize a 3rd party mobile device management (MDM) solution, which could involve additional licensing requirements.
Microsoft Endpoint data loss prevention (Endpoint DLP) is supported natively in Microsoft Edge. Endpoint DLP is incorporated with Microsoft Security Center, delivering information protection to Microsoft Edge. This can alert users to non-compliant activity as users work online, thus preventing data loss. It identifies and names sensitive data inside the enterprise that correlates with certain criteria specified by the admins, such as credit card numbers, social security numbers, or personal financial information. Microsoft Information Protection policies can be deployed to Microsoft Endpoint DLP without any required reconfiguration, including sensitive content identifiers and policies that IT personnel have previously customized. This is an efficient deployment of information protection for IT admins.
While these products offer advanced protection and corporate security for Sarasota companies, it can be difficult to understand how to best utilize these capabilities for your business. Alliance IT offers expert advice and consultation on all things Microsoft and data protection – and can help your organization shore up your security landscape. Call Alliance IT today to set up a tech assessment. We can help you understand your current situation and explain your options to protect your organization’s data and revenue most effectively.