/
/

How to Enable or Disable Enhanced Security Mode in Microsoft Edge

by Angelo Salandanan, IT Technical Writer
How to Enable or Disable Enhanced Security Mode in Microsoft Edge blog banner image

Instant Summary

This NinjaOne blog post offers a comprehensive basic CMD commands list and deep dive into Windows commands with over 70 essential cmd commands for both beginners and advanced users. It explains practical command prompt commands for file management, directory navigation, network troubleshooting, disk operations, and automation with real examples to improve productivity. Whether you’re learning foundational cmd commands or mastering advanced Windows CLI tools, this guide helps you use the Command Prompt more effectively.

Key Points

  • You can enable Microsoft Edge’s enhanced security mode through the browser settings or by enforcing policies.
  • Select Balanced or Strict mode based on your tolerance for site breakage and required security posture.
  • Add and document per-site exceptions only when necessary, and confirm enforcement through edge://policy.

The Microsoft Edge enhanced security mode is one of the most straightforward ways to optimize browser security and performance. This guide demonstrates how to enable or turn off this feature to align with the user or environment’s security and usability needs.

Setting up enhanced security mode

To start, confirm your preparedness by going over this quick deployment checklist:

  • A Windows 11 device with Microsoft Edge installed and up to date.
  • Local administrator access to review and change Edge security settings.
  • Microsoft Intune, an RMM like NinjaOne, or Group Policy templates for deploying settings across multiple devices.

Then choose between the two methods below based on the scale of coverage.

Method 1: Set up enhanced browser security via Edge settings

Microsoft’s default browser provides a quick way to adjust settings for individual users or test configurations.

  1. Open edge://settings/privacy.
  2. In Security, turn Enhance your security on the web on or off.
  3. Select Balanced or Strict to set the protection level.
  4. Test a few business-critical sites to confirm compatibility.

Privacy, search, and services settings

If you need broader control or want to enforce consistency across multiple devices, you can apply the same setting through policy, which we’ll cover next.

Method 2: Deploy enhanced security mode via Group Policy

For handling multiple endpoints, policy enforcement ensures consistent behavior and reduced configuration drift.

  1. Open the Microsoft Edge administrative templates in Group Policy.
  2. Navigate to Computer Configuration (or User Configuration) → Administrative TemplatesMicrosoft Edge.
  3. Locate and double-click the policy named “Enhance the security state in Microsoft Edge” (or EnhanceSecurityMode).
  4. Select Enabled and set the default value 0 to 1 (Balanced) or 2 (Strict).
  5. Click Apply, then OK.

Restart Edge, then navigate to edge://policy to confirm the setting is active. You can also force a policy refresh using gpupdate /force.

Additional steps and troubleshooting

Policies typically override individual browser settings. With that in mind, below are some ways to align the enhanced browser setting with other security processes or protections.

Adding per-site exceptions

If certain business sites break while enhanced security mode is active, you can allow them individually without disabling security for the entire browser.

While on the affected site, open the lock icon or site permissions and allowlist the address. You can also manage entries from the exceptions list at Enhance your security on the web Site preferences for enhanced security.

Aligning enhanced security mode with related protections

Enhanced security mode in Edge is even better when paired with a consistent security posture across the browser and OS. However, conflicts may occasionally arise between related settings and policies.

To ensure there are no issues, review your SmartScreen, Application Guard, and browser configurations. Then, ensure User Account Control (UAC) and other system controls do not interfere with the expected behavior.

Record your chosen baseline to maintain consistency across teams and device groups.

Using a PowerShell script and deploying via RMM

As an alternative to Group Policy, IT teams can enforce the enhanced security mode in Microsoft Edge using a custom PowerShell script that writes the required policy value to the Windows registry, and then deploy it to the client computers.

In general terms, the script targets the Microsoft Edge policy path, creates the key if it does not exist, and sets the EnhanceSecurityMode value to the desired level, such as Balanced or Strict.

This approach allows to enforce Enhanced Security Mode in Microsoft Edge at scale. .

Reviewing and documenting the new settings

After the initial setup, open edge://policy to confirm that the changes are actually being enforced. Then, before pushing the configuration to everyone, test it with a small group and make sure your key business applications behave as expected.

For auditing and troubleshooting later, keep a record of policy identifiers, version details, and test results in your centralized documentation system.

Centralized script management for IT teams

The enhanced security mode in Microsoft Edge provides a straightforward way to streamline organizational policies and meet compliance baselines. When enforced centrally, it eliminates per-device configuration and ensures the setting is applied uniformly across all managed endpoints.

In large or complex environments, NinjaOne users can simplify rollouts with their own or community-created PowerShell scripts across Windows-based environments. This approach minimizes configuration drift, enables remote script deployment, and supports scalable and granular automation that meets business needs and drives growth.

Related topics:

FAQs

Balanced mode applies additional security protections only to unfamiliar or less frequently visited sites, reducing the chance of breakage while still limiting exposure.

On the other hand, Strict mode applies those protections to all sites, offering a stronger security baseline but increasing the likelihood that certain sites or applications may not behave as expected.

This usually means a policy is enforcing the setting, so changes must be made through Group Policy rather than the local browser.

Observe and document the specific site behavior or interaction with other applications, validate the impact in a test environment, and apply a narrowly scoped exception only when absolutely necessary.

Some extensions may behave differently if they rely on scripts or site behaviors restricted by enhanced security mode, so test any critical extensions during your pilot.

No. Enhanced security mode works in conjunction with these features, so it is recommended that you maintain your broader protections for comprehensive coverage.

You might also like

Ready to simplify the hardest parts of IT?