Earlier this year I reset some settings and it seems I never got back to using Edge Exploit tweaks. I had planned to employ the other tweaks from this post
Maximum Anti-Exploit protection settings for your program but for some reason powershell .xml script failed. Anyway, just trialling some of them manually. At any rate, re-instated the Edge exploit tweaks below
Edge Exploit settings:
Exploit Protection settings for browsers (thanks to @Umbra
@oldschool ). These have broken anything yet, e.g. extensions crashing.
- for Brave, Edge and Firefox:
Block low integrity images - ON
Block remote images - ON
Block untrusted fonts - ON
Control flow guard (CFG) - ON
Data execution prevention (DEP) - ON + Enable thunk emulation - CHECKED
Disable extension points - ON
Force randomization for images (Mandatory ASLR) - ON + Do not allow stripped images - CHECKED
Randomize memory allocations (Bottom-up ASLR) - ON
Validate exception chains (SEHOP) - ON
Validate handle usage - ON
Validate heap integrity - ON
Validate image dependency integrity - ON
ADD for Edge Chromium only: Code integrity guard - ON (with or without Also allow images signed by M$ Store CHECKED)