Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Microsoft Boosts PUA Protections in Edge

Microsoft this week announced new features in its Edge browser to prevent the download of potentially unwanted applications (PUA).

Microsoft this week announced new features in its Edge browser to prevent the download of potentially unwanted applications (PUA).

PUAs may refer to applications that create extra advertisements, mine for crypto-currencies, or display offers for other pieces of software that have a poor reputation. Such software can hurt user experience, lower productivity and machine performance, and degrade the overall Windows experience.

Beginning with version 80.0.338.0, Microsoft Edge will include a new feature designed to block downloads that may contain PUAs, preventing those apps from reaching the user’s computer.

The feature, however, will be disabled by default, although users will be able to enable it in just three steps, by clicking on “…” on the top right corner, going to Settings, then Privacy and services, and turning on the “Block potentially unwanted apps” option under Services.

PUA blocking, Microsoft says, requires Microsoft Defender SmartScreen to be enabled.

For apps that have been labeled as PUA by mistake, Edge will offer the option to keep the app. For that, users will have to tap “…” in the bottom bar, select Keep, and then choose Keep anyway in the dialog that appears.

Users can also go to edge://downloads/ to report apps as reputable. This will redirect them to Microsoft’s feedback site, where they can provide details on why an app might have been mistakenly marked as PUA.

The idea behind the new feature, the tech giant says, is to help users get the applications they want, while still providing them with control over their devices and experiences.

Advertisement. Scroll to continue reading.

Microsoft has published security documentation detailing how it identifies malware, unwanted software, and PUA. The company also published information on how administrators can enable the feature for their users.

“We encourage users to always try to download software from a trusted location, such as the publisher’s website or a reputable app store, and to check reviews of the app and the reputation of the publisher before downloading,” noted Juli Hooper and Michael Johnson of the Microsoft Defender ATP team.

Related: Microsoft Offers Up to $30,000 for Flaws in Chromium-Based Edge

Related: Microsoft Threat Protection Now Generally Available

Related: Microsoft Pulls UEFI-Related Windows Update After Users Report Problems

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.