win: add disabling Edge/WebView2 auto-updates #309

This commit adds scripts to block automatic updates for Microsoft Edge
and WebView2 on Windows, aimed at enhancing user privacy as per the
issue #309.

Changes:

- Create a new category for scripts targeting Edge and WebView2 updates.
- Add scripts for disabling automatic update services, scheduled tasks,
  and executable blocking, along with registry configurations.

Other supporting changes:

- Remove comments in code that indicates reusing of small text parts.
  This approach does not encourage creating unique content.
This commit is contained in:
undergroundwires
2024-06-25 12:23:55 +02:00
parent f286f92b1f
commit ed7e69c07e

View File

@@ -6463,7 +6463,7 @@ actions:
- -
name: Disable Edge diagnostic data sending name: Disable Edge diagnostic data sending
recommend: standard recommend: standard
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • "This enhances your privacy" docs: |- # refactor-with-variables: • Chromium Policy Caution • "This enhances your privacy"
This script disables the sending of diagnostic data in Edge. This script disables the sending of diagnostic data in Edge.
This script blocks all diagnostic data about your browser usage [1] [2]. This script blocks all diagnostic data about your browser usage [1] [2].
@@ -6491,7 +6491,7 @@ actions:
- -
name: Disable outdated Edge metrics data sending name: Disable outdated Edge metrics data sending
recommend: standard recommend: standard
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • "This enhances your privacy" docs: |- # refactor-with-variables: • Chromium Policy Caution • "This enhances your privacy"
This script stops Edge from reporting metrics data. This script stops Edge from reporting metrics data.
This script stops the reporting of usage and crash-related data [1] [2]. This script stops the reporting of usage and crash-related data [1] [2].
@@ -6522,7 +6522,7 @@ actions:
- -
name: Disable outdated Edge site information sending name: Disable outdated Edge site information sending
recommend: standard recommend: standard
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • "This enhances your privacy" docs: |- # refactor-with-variables: • Chromium Policy Caution • "This enhances your privacy"
This script prevents Edge from sending site-related information. This script prevents Edge from sending site-related information.
This prevents the browser from sending site information used to improve Microsoft services [1] [2]. This prevents the browser from sending site information used to improve Microsoft services [1] [2].
@@ -6548,37 +6548,475 @@ actions:
- -
function: ShowEdgeRestartSuggestion function: ShowEdgeRestartSuggestion
- -
name: Disable automatic installation of Edge category: Disable Edge and WebView2 automatic updates
docs: |- docs: |- # refactor-with-variable: Same • Edge Update Caution
This script prevents the automatic installation of Edge (Chromium) via Windows Update. This category encompasses scripts that disable automatic updates for Microsoft Edge and its WebView2 component.
Microsoft Edge (Chromium), designed to replace Edge (Legacy), is automatically distributed
to devices running Windows 10 version 1803 or newer [1] [2] [3].
This script does not impact Windows 10, version 20H2 and later [3].
Windows 10 version 20H2 and later already include Edge (Chromium) by default [4].
This script only blocks the automatic installation of Edge (Chromium) through Windows Update, Disabling updates for Edge and WebView2 prevents automatic download and installation of new versions and patches.
without affecting other installation methods [2] [3] or system updates [2]. Both Edge and WebView2 share the same mechanisms for updates [1] [2].
This mechanism is a way Microsoft collects user data [1].
As Microsoft has ceased support for Edge (Legacy), including security updates [1], this script
enables you to manage the installation timing and method for Edge (Chromium),
aligning the updates with your preferences.
This script modifies the `HKLM\SOFTWARE\Microsoft\EdgeUpdate!DoNotUpdateToEdgeWithChromium` [2] [3] registry
key to to configure this setting.
[1]: https://web.archive.org/web/20240517223534/https://techcommunity.microsoft.com/t5/microsoft-365-blog/new-microsoft-edge-to-replace-microsoft-edge-legacy-with-april-s/ba-p/2114224 "New Microsoft Edge to replace Microsoft Edge Legacy with Aprils Windows 10 Update Tuesday release - Microsoft Community Hub | techcommunity.microsoft.com" WebView2 uses Edge technologies to render web content within applications [3].
[2]: https://web.archive.org/web/20240517225010/https://admx.help/?Category=EdgeChromium_Blocker&Policy=Microsoft.Policies.EdgeUpdate::NoUpdate "Do not allow delivery of Microsoft Edge (Chromium-Based) through Automatic Updates | admx.help" It's widely integrated across various software products.
[3]: https://web.archive.org/web/20210118230052/https://docs.microsoft.com/en-us/deployedge/microsoft-edge-blocker-toolkit "Blocker Toolkit to disable automatic delivery of Microsoft Edge | Microsoft Docs | docs.microsoft.com" This widespread integration exposes users to significant privacy risks associated with web browsing and data
[4]: https://web.archive.org/web/20240517225921/https://blogs.windows.com/windowsexperience/2020/06/16/whats-next-for-windows-10-updates/ "Whats next for Windows 10 updates | Windows Experience Blog | blogs.windows.com" collection [4].
call:
function: SetRegistryValue Both Edge and WebView2 collect extensive user data, including browsing and download history [5] [6].
parameters: Disabling updates blocks tracking features from being introduced, thus significantly enhancing your control
keyPath: HKLM\SOFTWARE\Microsoft\EdgeUpdate over personal data privacy.
valueName: DoNotUpdateToEdgeWithChromium
dataType: REG_DWORD Disabling updates increases privacy by reducing data shared with update servers.
data: "1" However, this could leave your system vulnerable to security risks if attackers exploit unpatched vulnerabilities in
deleteOnRevert: 'true' # Missing by default since Windows 10 Pro (≥ 22H2) and Windows 11 Pro (≥ 23H2) older versions.
Disabling updates is beneficial if you do not rely on Edge or WebView2 daily, as it reduces unnecessary data
transmission and unwanted system changes.
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://archive.ph/2024.06.21-133037/https://github.com/undergroundwires/privacy.sexy/issues/309 "[BUG]: Microsoft Edge still alive after removal · Issue #309 · undergroundwires/privacy.sexy"
[2]: https://web.archive.org/web/20240621150615/https://joji.me/en-us/blog/understanding-the-edge-and-edge-webview2-update-logs/ "Understanding the Edge and Edge WebView2 Update Logs | joji.me"
[3]: https://web.archive.org/web/20240623112820/https://learn.microsoft.com/en-us/microsoft-edge/webview2/ "Introduction to Microsoft Edge WebView2 - Microsoft Edge Developer documentation | Microsoft Learn | learn.microsoft.com"
[4]: https://archive.today/2022.12.15-232158/https://learn.microsoft.com/en-us/microsoft-edge/webview2/concepts/distribution%23evergreen-distribution-mode "Distribute your app and the WebView2 Runtime - Microsoft Edge Development | Microsoft Learn | learn.microsoft.com"
[5]: https://web.archive.org/web/20240623112758/https://learn.microsoft.com/en-us/microsoft-edge/webview2/concepts/data-privacy?tabs=dotnetcsharp "Data and privacy in WebView2 - Microsoft Edge Developer documentation | Microsoft Learn | learn.microsoft.com"
[6]: https://web.archive.org/web/20240623112809/https://support.microsoft.com/en-us/windows/microsoft-edge-browsing-data-and-privacy-bb8174ba-9d73-dcf2-9b4a-c582b4e640dd "Microsoft Edge, browsing data, and privacy - Microsoft Support | support.microsoft.com"
children:
-
name: Disable Edge automatic update services
recommend: standard # Safe-to-disable as they're stopped by default
docs: |- # refactor-with-variable: Same • Edge Update Caution
This script disables services responsible for automatically updating Microsoft Edge.
It disables the `edgeupdate` [1] [2] [3] and `edgeupdatem` [1] [2] [4] services.
These services keep your Microsoft software up to date [1] [3] [4].
Disabling these services:
- Enhances privacy by stopping automatic data transmission, preventing background data collection.
- Improves system performance by reducing background processes.
- Allows more control over which updates are installed.
Keep in mind:
- Security vulnerabilities and issues in Edge won't be fixed if updates are disabled [1] [3] [4].
- Manual updates are still possible as these services start automatically for manual updates.
### Overview of default service statuses
Microsoft Edge Update Service (`edgeupdate`) (tested on version Edge 126.0.2592.68):
| OS Version | Status | Start type |
| ---------- | -------| ---------- |
| Windows 10 (≥ 21H1) | 🔴 Stopped | Automatic |
| Windows 11 (≥ 22H2) | 🔴 Stopped | Automatic |
Microsoft Edge Update Service (`edgeupdatem`) (tested on version Edge 126.0.2592.68):
| OS Version | Status | Start type |
| ---------- | -------| ---------- |
| Windows 10 (≥ 21H1) | 🔴 Stopped | Manual |
| Windows 11 (≥ 22H2) | 🔴 Stopped | Manual |
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://web.archive.org/web/20230905120815/https://learn.microsoft.com/en-us/windows/iot/iot-enterprise/optimize/services "Guidance on disabling system services on Windows IoT Enterprise | Microsoft Learn"
[2]: https://archive.ph/2024.06.21-133037/https://github.com/undergroundwires/privacy.sexy/issues/309 "[BUG]: Microsoft Edge still alive after removal · Issue #309 · undergroundwires/privacy.sexy"
[3]: https://web.archive.org/web/20240621143823/https://revertservice.com/10/edgeupdate/ "Microsoft Edge Update Service (edgeupdate) Defaults in Windows 10 | revertservice.com"
[4]: https://web.archive.org/web/20240621143835/https://revertservice.com/10/edgeupdatem/ "Microsoft Edge Update Service (edgeupdatem) Defaults in Windows 10 | revertservice.com"
call:
-
function: DisableService
parameters:
serviceName: edgeupdate # Check: (Get-Service -Name edgeupdate).StartType
defaultStartupMode: Automatic # Allowed values: Automatic | Manual
-
function: DisableService
parameters:
serviceName: edgeupdatem # Check: (Get-Service -Name edgeupdatem).StartType
defaultStartupMode: Manual # Allowed values: Automatic | Manual
-
name: Disable Edge automatic update scheduled tasks
recommend: strict
docs: |- # refactor-with-variable: Same • Edge Update Caution
This script stops Microsoft Edge from updating automatically by disabling specific scheduled tasks.
Specifically, it targets two tasks:
- `MicrosoftEdgeUpdateTaskMachineCore` [1] [2] [3]
- `MicrosoftEdgeUpdateTaskMachineUA` [3]
These tasks:
- Start Edge at logon [1]
- Run updates at least every hour [3]
- Update Edge and its WebView2 components [3]
Disabling these tasks:
- Enhances privacy by preventing automatic data transmission for updates.
- Improves system performance by reducing background tasks.
- Reduces your attack surface, as these tasks can be targeted by malware [4].
However, remember that disabling updates means security vulnerabilities in Edge won't be fixed automatically;
manual updates will be necessary.
> **Caution:** Disabling updates may lead to decreased security if you rely on Edge and its components (WebView2).
### Overview of default task statuses
`\MicrosoftEdgeUpdateTaskMachineCore{RandomString}` (tested since Edge version 126):
| OS Version | Default status |
| ---------------- | -------------- |
| Windows 10 22H2 | 🟢 Ready |
| Windows 11 22H2 | 🟢 Ready |
`\MicrosoftEdgeUpdateTaskMachineUA{RandomString}` (tested since Edge version 126):
| OS Version | Default status |
| ---------------- | -------------- |
| Windows 10 22H2 | 🟢 Ready |
| Windows 11 22H2 | 🟢 Ready |
[1]: https://web.archive.org/web/20220112180622/https://techcommunity.microsoft.com/t5/discussions/edge-97-starting-automatically-at-logon/m-p/3057166 "Edge 97 starting automatically at logon - Microsoft Community Hub | techcommunity.microsoft.com"
[2]: https://web.archive.org/web/20240621141001/https://www.file.net/process/microsoftedgeupdate.exe.html "MicrosoftEdgeUpdate.exe Windows process - What is it? | www.file.net"
[3]: https://web.archive.org/web/20240621150615/https://joji.me/en-us/blog/understanding-the-edge-and-edge-webview2-update-logs/ "Understanding the Edge and Edge WebView2 Update Logs | joji.me"
[4]: https://archive.today/2024.06.21-151340/https://vms.drweb.com/virus/?i=25158791 "Trojan.Siggen17.58258 — Dr.Web Malware description library | vms.drweb.com"
call:
-
function: DisableScheduledTask
parameters:
# Check: Get-ScheduledTask -TaskPath '\' -TaskName 'MicrosoftEdgeUpdateTaskMachineCore{*}'
taskPathPattern: \
taskNamePattern: MicrosoftEdgeUpdateTaskMachineCore{*}
-
function: DisableScheduledTask
parameters:
# Check: Get-ScheduledTask -TaskPath '\' -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{*}'
taskPathPattern: \
taskNamePattern: MicrosoftEdgeUpdateTaskMachineUA{*}
-
name: Disable Edge update executable
recommend: strict
docs: |- # refactor-with-variable: Same • Edge Update Caution
This script disables the Microsoft Edge Update executable to enhance your privacy and control over system updates.
`MicrosoftEdgeUpdate.exe` is responsible for updating Microsoft Edge as part of the Microsoft Edge Update system [1] [2] [3].
It's also responsible for updating Edge WebView2 [3].
Blocking this executable:
- Enhances privacy by preventing communication with the update server [4] [5].
- Increases security by giving you control over software installations.
- Boosts system performance by reducing background processes.
- May decrease security if you rely on Edge or WebView2, as missing updates can lead to security vulnerabilities.
Executable locations:
- `%PROGRAMFILES(x86)%\Microsoft\EdgeUpdate\<version>\MicrosoftEdgeUpdate.exe` [4]
- `%PROGRAMFILES(x86)%\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe` [1] [2] [4] [5] [6].
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://web.archive.org/web/20240621140833/https://learn.microsoft.com/en-us/deployedge/deploy-edge-with-windows-10-updates "Deploy Microsoft Edge with Windows 10 updates | Microsoft Learn | learn.microsoft.com"
[2]: https://web.archive.org/web/20240621141001/https://www.file.net/process/microsoftedgeupdate.exe.html "MicrosoftEdgeUpdate.exe Windows process - What is it? | www.file.net"
[3]: https://web.archive.org/web/20240621150615/https://joji.me/en-us/blog/understanding-the-edge-and-edge-webview2-update-logs/ "Understanding the Edge and Edge WebView2 Update Logs | joji.me"
[4]: https://web.archive.org/web/20240621141128/https://support.microsoft.com/en-us/microsoft-edge/troubleshooting-tips-for-installing-and-updating-microsoft-edge-a5eceb94-c2b1-dfab-6569-e79d0250317b "Troubleshooting tips for installing and updating Microsoft Edge - Microsoft Support | support.microsoft.com"
[5]: https://archive.ph/2024.06.21-133037/https://github.com/undergroundwires/privacy.sexy/issues/309 "[BUG]: Microsoft Edge still alive after removal · Issue #309 · undergroundwires/privacy.sexy"
[6]: https://web.archive.org/web/20240621141031/https://strontic.github.io/xcyclopedia/library/MicrosoftEdgeUpdate.exe-0F11E6717C1FE6DD20AE2D12F63AF3F7.html "MicrosoftEdgeUpdate.exe | Microsoft Edge Update | STRONTIC | strontic.github.io"
call:
-
function: TerminateAndBlockExecution
parameters:
executableNameWithExtension: MicrosoftEdgeUpdate.exe
-
function: SoftDeleteFiles
parameters:
fileGlob: '%PROGRAMFILES(x86)%\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe'
-
function: SoftDeleteFiles
parameters:
fileGlob: '%PROGRAMFILES(x86)%\Microsoft\EdgeUpdate\*\MicrosoftEdgeUpdate.exe'
# Version specific e.g. C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.181.5\MicrosoftEdgeUpdate.exe
-
name: Disable Edge automatic updates across all channels
recommend: strict
docs: |- # refactor-with-variable: Same • Edge Update Caution • Active Directory only • Edge Channels
This script prevents Microsoft Edge from automatically updating across all channels.
Microsoft Edge offers four update channels—Stable, Beta, Dev, and Canary—each designed with different stability
levels and update frequencies [1].
This script disables updates for all of these channels.
This script applies only to Windows devices within a Microsoft Active Directory domain or managed in similar way [2] [3].
It is effective only on computers under organizational management, such as those in workplaces or schools.
It's not applicable to personal computers that are not managed by an organization.
Disabling automatic updates enhances privacy by controlling data sharing during updates and improves
system performance by reducing background activities.
If you use Edge, manually check for and distribute updates after using this script to maintain security [2] [3] [4].
This script configures update policies for different Edge channels:
- `UpdateDefault` to configure all channels [3].
- `56EB18F8-B008-4CBD-B6D2-8C97FE7E9062` for Edge (Stable) [2] [4] [5].
- `2CD8A007-E189-409D-A2C8-9AF4EF3C72AA` to Edge (Beta) [2] [4] [6].
- `65C35B14-6C1D-4122-AC46-7148CC9D6497` to Edge (Canary) [2] [4] [7].
- `0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10` to Edge (Dev) [2] [4] [8].
- `F3C4FE00-EFD5-403B-9569-398A20F1BA4A` to Edge Insider [9].
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://web.archive.org/web/20240624181311/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-channels "Microsoft Edge channel overview | Microsoft Learn | learn.microsoft.com"
[2]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#update "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
[3]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#updatedefault "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
[4]: https://web.archive.org/web/20240623111327/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_DefaultUpdatePolicy "Update policy override default | admx.help"
[5]: https://web.archive.org/web/20240623111917/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_UpdatePolicyMicrosoftEdge "Update policy override | admx.help"
[6]: https://web.archive.org/web/20240623111334/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_UpdatePolicyMicrosoftEdgeBeta "Update policy override | admx.help"
[7]: https://web.archive.org/web/20240623111327/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_UpdatePolicyMicrosoftEdgeCanary "Update policy override | admx.help"
[8]: https://web.archive.org/web/20240623111849/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_UpdatePolicyMicrosoftEdgeDev "Update policy override | admx.help"
[9]: https://web.archive.org/web/20240623111904/https://www.bleepingcomputer.com/news/microsoft/what-we-know-about-microsoft-s-chromium-based-edge-browser/ "What We Know About Microsofts Chromium-Based Edge Browser | bleepingcomputer.com"
call:
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: UpdateDefault # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Update{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Update{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA} # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Update{65C35B14-6C1D-4122-AC46-7148CC9D6497} # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Update{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10} # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Update{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
dwordData: '0'
-
name: Disable Edge WebView and WebView2 updates
recommend: strict
docs: |- # refactor-with-variable: Same • Edge Update Caution
This script disables automatic updates for Microsoft Edge WebView components.
Microsoft Edge WebView and WebView2 Runtime are components that enable applications to display web content [1] [2].
By default, these components receive updates automatically [1] [2].
Running this script will prevent automatic downloading and application of updates for both older WebView [1] and newer WebView2 [2].
This action might lead to compatibility issues with applications relying on the latest features of WebView [1] [2].
This script configures `Update{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}` Edge Policy [1] [2].
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://web.archive.org/web/20240622124745/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_UpdatePolicyMicrosoftEdgeWebView "Update policy override | admx.help"
[2]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#update-webview "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
call:
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Update{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5} # Microsoft Edge Update ≥ 1.3.127.1
dwordData: '0'
-
name: Disable Edge automatic update checks
recommend: strict
docs: |- # refactor-with-variable: Same • Edge Update Caution
This script stops the Microsoft Edge Update agent from automatically checking for updates.
This script prevents the Microsoft Edge Update agent from performing any automatic update checks [1].
This includes updates for all Edge applications [2], including WebView2.
Disabling these updates enhances privacy by eliminating the regular network activity initiated
by Microsoft Edge Update [2]. It can also improve performance due to the reduction of background
network operations.
If you choose not to run this script, Microsoft Edge will continue to check for updates every 10 hours [1].
Although disabling updates can enhance privacy, it may compromise security, particularly if you rely
on Edge and its components like WebView2.
Automatic updates help ensure that the browser and its components receive stability and security updates promptly [1].
This script configures `AutoUpdateCheckPeriodMinutes` [1] [2] Edge policy.
Setting to `0` disables all periodic network traffic by Microsoft Edge Update [1] [2].
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://web.archive.org/web/20240622121922/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_AutoUpdateCheckPeriod "Auto-update check period override | admx.help"
[2]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#autoupdatecheckperiodminutes "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
call:
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: AutoUpdateCheckPeriodMinutes # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
name: Maximize Edge update suppression duration
recommend: strict
docs: |- # refactor-with-variable: Same • Edge Update Caution
This script suppresses automatic updates for Microsoft Edge for the longest possible duration.
If you do not run this script, Microsoft Edge checks for updates periodically throughout the day by default [1] [2].
This script limits update checks to the least frequent interval permitted by policy settings.
This reduces network traffic and decreases system load, thereby enhancing both privacy and performance.
However, this delay in updates can expose you to security risks, especially if you depend on Edge for critical tasks.
Keep in mind, automatic updates play a crucial role in protecting your system against emerging security threats.
The script configures the `UpdatesSuppressedDurationMin`, `UpdatesSuppressedStartHour`, and `UpdatesSuppressedStartMin`
Edge policies [1] [2].
> **Caution:** Disabling updates may reduce security if you use Edge and its components (WebView2).
[1]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#updatessuppressed "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
[2]: https://web.archive.org/web/20240622123413/https://admx.help/?Category=EdgeChromium&Policy=Microsoft.Policies.Update::Pol_UpdateCheckSuppressedPeriod "Time period in each day to suppress auto-update check | admx.help"
call:
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: UpdatesSuppressedDurationMin # Microsoft Edge Update ≥ 1.3.33.5
dwordData: '1440' # Total number of minutes in a day = 24×60 minutes = 1440 minutes.
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: UpdatesSuppressedStartHour # Microsoft Edge Update ≥ 1.3.33.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: UpdatesSuppressedStartMin # Microsoft Edge Update ≥ 1.3.33.5
dwordData: '0'
-
category: Disable automatic installation of Edge and WebView
docs: |-
This category contains scripts that prevent the automatic installation of Microsoft Edge, allowing users
to maintain control over software installations on their systems.
These scripts help ensure that Edge and its components like WebView and WebView2 are only installed when explicitly
approved by the user, which can significantly enhance privacy and security.
Automatic installations can potentially introduce unwanted features or security vulnerabilities, and by preventing
these installations, users can manage their system's exposure to such risks.
Overall, these scripts help to:
- Prevent unsolicited installations of Microsoft Edge.
- Enable users to decide when and if Edge WebView should be installed, aligning with best practices for security and privacy.
- Provide users with tools to manage software deployment in a controlled manner.
children:
-
name: Disable automatic installation of Edge
recommend: standard # Preventing automatic installation helps control unwanted software without impacting system stability or security
docs: |-
This script prevents the automatic installation of Edge (Chromium) via Windows Update.
Microsoft Edge (Chromium), designed to replace Edge (Legacy), is automatically distributed
to devices running Windows 10 version 1803 or newer [1] [2] [3].
This script does not impact Windows 10, version 20H2 and later [3].
Windows 10 version 20H2 and later already include Edge (Chromium) by default [4].
This script only blocks the automatic installation of Edge (Chromium) through Windows Update,
without affecting other installation methods [2] [3] or system updates [2].
As Microsoft has ceased support for Edge (Legacy), including security updates [1], this script
enables you to manage the installation timing and method for Edge (Chromium),
aligning the updates with your preferences.
This script modifies the `HKLM\SOFTWARE\Microsoft\EdgeUpdate!DoNotUpdateToEdgeWithChromium` [2] [3] registry
key to to configure this setting.
[1]: https://web.archive.org/web/20240517223534/https://techcommunity.microsoft.com/t5/microsoft-365-blog/new-microsoft-edge-to-replace-microsoft-edge-legacy-with-april-s/ba-p/2114224 "New Microsoft Edge to replace Microsoft Edge Legacy with Aprils Windows 10 Update Tuesday release - Microsoft Community Hub | techcommunity.microsoft.com"
[2]: https://web.archive.org/web/20240517225010/https://admx.help/?Category=EdgeChromium_Blocker&Policy=Microsoft.Policies.EdgeUpdate::NoUpdate "Do not allow delivery of Microsoft Edge (Chromium-Based) through Automatic Updates | admx.help"
[3]: https://web.archive.org/web/20210118230052/https://docs.microsoft.com/en-us/deployedge/microsoft-edge-blocker-toolkit "Blocker Toolkit to disable automatic delivery of Microsoft Edge | Microsoft Docs | docs.microsoft.com"
[4]: https://web.archive.org/web/20240517225921/https://blogs.windows.com/windowsexperience/2020/06/16/whats-next-for-windows-10-updates/ "Whats next for Windows 10 updates | Windows Experience Blog | blogs.windows.com"
call:
function: SetRegistryValue
parameters:
keyPath: HKLM\SOFTWARE\Microsoft\EdgeUpdate
valueName: DoNotUpdateToEdgeWithChromium
dataType: REG_DWORD
data: "1"
deleteOnRevert: 'true' # Missing by default since Windows 10 Pro (≥ 22H2) and Windows 11 Pro (≥ 23H2)
-
name: Disable automatic installation of Edge across all channels
recommend: standard # Preventing automatic installation helps control unwanted software without impacting system stability or security
docs: |- # refactor-with-variables: Same • Active Directory only • Edge Channels
This script disables the automatic installation of Microsoft Edge across all update channels, enhancing
user control over their systems and privacy.
Microsoft Edge offers four update channels—Stable, Beta, Dev, and Canary—each designed with different stability
levels and update frequencies [1].
This script blocks automatic installations for all these channels [2] [3].
This allows users to manually manage their updates and potentially reduce exposure to unstable or privacy-intrusive software.
This script applies only to Windows devices within a Microsoft Active Directory domain or managed in similar way [2] [3].
It is effective only on computers under organizational management, such as those in workplaces or schools.
It's not applicable to personal computers that are not managed by an organization.
This script configures update policies for different Edge channels:
- `InstallDefault` to configure all channels [3].
- `56EB18F8-B008-4CBD-B6D2-8C97FE7E9062` for Edge (Stable) [2].
- `2CD8A007-E189-409D-A2C8-9AF4EF3C72AA` to Edge (Beta) [2].
- `65C35B14-6C1D-4122-AC46-7148CC9D6497` to Edge (Canary) [2].
- `0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10` to Edge (Dev) [2].
[1]: https://web.archive.org/web/20240624181311/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-channels "Microsoft Edge channel overview | Microsoft Learn | learn.microsoft.com"
[2]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#install "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
[3]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#installdefault "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
call:
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: InstallDefault # Microsoft Edge Update ≥ 1.2.145.5
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Install{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} # Microsoft Edge Update ≥ 1.3.155.43
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Install{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA} # Microsoft Edge Update ≥ 1.3.155.43
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Install{65C35B14-6C1D-4122-AC46-7148CC9D6497} # Microsoft Edge Update ≥ 1.3.155.43
dwordData: '0'
-
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Install{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10} # Microsoft Edge Update ≥ 1.3.155.43
dwordData: '0'
-
name: Disable automatic installation of WebView and WebView2
recommend: standard # Preventing automatic installation helps control unwanted software without impacting system stability or security
docs: |-
This script prevents the automatic installation of Microsoft Edge WebView and WebView2 components.
By default, the WebView2 Runtime is installed automatically through Microsoft Edge Update [1].
After applying this script, automatic installation of the WebView2 Runtime via Microsoft Edge Update is blocked [1].
This improves your privacy and control over installed software on your system.
This script configures the `Install{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}` policy [1].
[1]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies#install-webview "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
call:
function: SetEdgeUpdatePolicyViaRegistry
parameters:
valueName: Install{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5} # Microsoft Edge Update ≥ 1.3.155.43
dwordData: '0'
- -
category: Configure Edge (Legacy) category: Configure Edge (Legacy)
docs: |- docs: |-
@@ -6594,7 +7032,7 @@ actions:
- -
name: Disable Edge (Legacy) Live Tile data collection name: Disable Edge (Legacy) Live Tile data collection
recommend: standard recommend: standard
docs: |- # refactor-with-variables: Same • live tiles • Policy "This script configures" • Performance + Privacy • Edge (Legacy) only docs: |- # refactor-with-variables: Same • live tiles • Performance + Privacy • Edge (Legacy) only
This script disables Live Tile data collection in Edge (Legacy). This script disables Live Tile data collection in Edge (Legacy).
**Live Tiles**, a feature within UWP apps, automatically collect and display updated information **Live Tiles**, a feature within UWP apps, automatically collect and display updated information
@@ -6628,7 +7066,7 @@ actions:
- -
name: Disable Edge (Legacy) search suggestions name: Disable Edge (Legacy) search suggestions
recommend: standard recommend: standard
docs: |- # refactor-with-variables: Same • Policy "This script configures" • Performance + Privacy • Edge (Legacy) only docs: |- # refactor-with-variables: Same • Performance + Privacy • Edge (Legacy) only
This script disables the search suggestions feature in the Address bar of Edge (Legacy). This script disables the search suggestions feature in the Address bar of Edge (Legacy).
By default, typing in the Address bar of Edge (Legacy) displays search suggestions [1] [2] [3], By default, typing in the Address bar of Edge (Legacy) displays search suggestions [1] [2] [3],
@@ -6804,7 +7242,7 @@ actions:
- -
name: Disable sharing scanned software data with Google name: Disable sharing scanned software data with Google
recommend: standard # DISA recommends recommend: standard # DISA recommends
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • Authorities • Performance + Privacy • Active Directory only docs: |- # refactor-with-variables: • Chromium Policy Caution • Authorities • Performance + Privacy • Active Directory only
This script stops the Chrome Cleanup Tool from sending scan data to Google, enhancing privacy. This script stops the Chrome Cleanup Tool from sending scan data to Google, enhancing privacy.
By default, when the Chrome Cleanup Tool detects unwanted software, it reports metadata about the scan and the software to Google [1] [2]. By default, when the Chrome Cleanup Tool detects unwanted software, it reports metadata about the scan and the software to Google [1] [2].
@@ -6839,7 +7277,7 @@ actions:
- -
name: Disable Chrome system cleanup scans name: Disable Chrome system cleanup scans
recommend: standard # DISA recommends recommend: standard # DISA recommends
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • Authorities • Performance + Privacy • Active Directory only docs: |- # refactor-with-variables: • Chromium Policy Caution • Authorities • Performance + Privacy • Active Directory only
This script disables Chrome system cleanup scans to enhance user privacy and improve system performance. This script disables Chrome system cleanup scans to enhance user privacy and improve system performance.
By default, Chrome Cleanup Tool periodically scans the system for unwanted software and prompts the user for removal [1] [2]. By default, Chrome Cleanup Tool periodically scans the system for unwanted software and prompts the user for removal [1] [2].
@@ -6880,7 +7318,7 @@ actions:
- -
name: Disable Chrome metrics reporting name: Disable Chrome metrics reporting
recommend: standard # DISA recommends recommend: standard # DISA recommends
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • Authorities • Performance + Privacy • Active Directory only docs: |- # refactor-with-variables: • Chromium Policy Caution • Authorities • Performance + Privacy • Active Directory only
This script disables Chrome's metrics reporting, enhancing user privacy and system performance. This script disables Chrome's metrics reporting, enhancing user privacy and system performance.
By default, Chrome may send anonymous usage and crash-related data to Google [1] [2]. By default, Chrome may send anonymous usage and crash-related data to Google [1] [2].
@@ -7033,7 +7471,7 @@ actions:
# - https://github.com/google/omaha: The open-source version of Google Update # - https://github.com/google/omaha: The open-source version of Google Update
- -
name: Disable "Google Update Service" services name: Disable "Google Update Service" services
recommend: standard recommend: standard # Safe-to-disable as they're stopped by default
docs: |- docs: |-
This script disables the "Google Update Service" services This script disables the "Google Update Service" services
These services are identified as `gupdate` and `gupdatem` [1] [2] [3]. These services are identified as `gupdate` and `gupdatem` [1] [2] [3].
@@ -13245,7 +13683,7 @@ actions:
children: children:
- -
name: Disable Edge SmartScreen name: Disable Edge SmartScreen
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • Active Directory only • Performance + Privacy docs: |- # refactor-with-variables: • Chromium Policy Caution • Active Directory only • Performance + Privacy
This script disables the SmartScreen feature in Edge. This script disables the SmartScreen feature in Edge.
SmartScreen provides warning messages to help protect users from potential phishing scams and malicious software [1] [2]. SmartScreen provides warning messages to help protect users from potential phishing scams and malicious software [1] [2].
@@ -13280,7 +13718,7 @@ actions:
dwordData: '0' dwordData: '0'
- -
name: Disable Edge SmartScreen for potentially unwanted apps name: Disable Edge SmartScreen for potentially unwanted apps
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • Active Directory only • Performance + Privacy docs: |- # refactor-with-variables: • Chromium Policy Caution • Active Directory only • Performance + Privacy
This script disables the SmartScreen feature in Edge that specifically targets potentially unwanted applications (PUAs). This script disables the SmartScreen feature in Edge that specifically targets potentially unwanted applications (PUAs).
Microsoft Edge's SmartScreen PUA feature protects against adware, coin miners, bundleware, and other low-reputation software [1] [2]. Microsoft Edge's SmartScreen PUA feature protects against adware, coin miners, bundleware, and other low-reputation software [1] [2].
@@ -13312,7 +13750,7 @@ actions:
dwordData: '0' dwordData: '0'
- -
name: Enable Edge SmartScreen bypass name: Enable Edge SmartScreen bypass
docs: |- # refactor-with-variables: • Chromium Policy Caution • Chromium Policy Restart • Policy "This script configures" • Active Directory only • Performance + Privacy docs: |- # refactor-with-variables: • Chromium Policy Caution • Active Directory only • Performance + Privacy
This script allows users to bypass Edge SmartScreen warnings. This script allows users to bypass Edge SmartScreen warnings.
SmartScreen in Edge displays warnings about potentially malicious websites [1] [2]. SmartScreen in Edge displays warnings about potentially malicious websites [1] [2].
@@ -13346,7 +13784,7 @@ actions:
dwordData: '0' dwordData: '0'
- -
name: Disable Edge (Legacy) SmartScreen name: Disable Edge (Legacy) SmartScreen
docs: |- # refactor-with-variables: Same • Policy "This script configures" • Edge (Legacy) only docs: |- # refactor-with-variables: Same • Edge (Legacy) only
This script disables the SmartScreen feature in Edge (Legacy). This script disables the SmartScreen feature in Edge (Legacy).
Edge (Legacy) uses the Windows Defender SmartScreen by default to protect users from phishing scams and malicious software [1] [2]. Edge (Legacy) uses the Windows Defender SmartScreen by default to protect users from phishing scams and malicious software [1] [2].
@@ -13374,7 +13812,7 @@ actions:
dwordData: "0" dwordData: "0"
- -
name: Enable Edge (Legacy) SmartScreen bypass name: Enable Edge (Legacy) SmartScreen bypass
docs: |- # refactor-with-variables: Same • Policy "This script configures" • Performance + Privacy • Edge (Legacy) only docs: |- # refactor-with-variables: Same • Performance + Privacy • Edge (Legacy) only
This script allows users to bypass SmartScreen warnings in Edge (Legacy). This script allows users to bypass SmartScreen warnings in Edge (Legacy).
Edge (Legacy) features a SmartScreen filter that warns users about potentially malicious websites and file downloads [1]. Edge (Legacy) features a SmartScreen filter that warns users about potentially malicious websites and file downloads [1].
@@ -24900,3 +25338,28 @@ functions:
dataType: REG_DWORD dataType: REG_DWORD
data: "{{ $dwordData }}" data: "{{ $dwordData }}"
deleteOnRevert: 'true' # Exists by default on Windows 10 Pro (≥ 19H1), since Windows 10 Pro (≥ 21H2) and Windows 11 Pro (≥ 23H2) deleteOnRevert: 'true' # Exists by default on Windows 10 Pro (≥ 19H1), since Windows 10 Pro (≥ 21H2) and Windows 11 Pro (≥ 23H2)
-
name: SetEdgeUpdatePolicyViaRegistry
parameters:
- name: valueName
- name: dwordData
docs: |-
This function configures update policies for the Microsoft Edge update mechanism via the Windows Registry.
The function affects both Edge and the Microsoft Edge WebView2 Runtime [1].
It modifies settings within the `HKLM\SOFTWARE\Policies\Microsoft\EdgeUpdate` registry key [1].
These settings are applicable to Microsoft Edge version 77 or later [1].
By default, no policies are configured under this registry path.
This has been tested on Windows 10 from version 22H2 onwards and Windows 11 from version 23H2 onwards,
with Microsoft Edge updates starting from version 1.3.187.41.
[1]: https://web.archive.org/web/20240622121924/https://learn.microsoft.com/en-us/deployedge/microsoft-edge-update-policies "Microsoft Edge Update Policy Documentation | Microsoft Learn | learn.microsoft.com"
call:
function: SetRegistryValue
parameters:
keyPath: HKLM\SOFTWARE\Policies\Microsoft\EdgeUpdate
valueName: "{{ $valueName }}"
dataType: REG_DWORD
data: "{{ $dwordData }}"
deleteOnRevert: 'true' # Missing by default since Windows 10 Pro (≥ 22H2) and Windows 11 Pro (≥ 23H2) | Tested since EdgeUpdate ≥ 1.3.187.41