Edge Copilot Mode: The Agentic AI Browser Redefining Web Workflows

  • Thread Author
Microsoft’s push to make Edge an “AI browser” took a decisive step this year with an update that gives Copilot the ability to act on users’ behalf inside the browser — opening and navigating tabs, running searches, and executing multi-step tasks like bookings and form-filling when explicitly authorized. This shift from passive assistance to agentic AI in the browser promises big productivity gains but also widens the attack surface for privacy and security risks — a trade-off Microsoft and IT teams must manage closely as the feature rolls toward broader availability.

Desktop monitor shows a dark UI design tool with a central form layout.Background​

What Microsoft announced and when​

In late July 2025 Microsoft publicly introduced Copilot Mode for Microsoft Edge: an experimental, opt-in browsing mode that centers a single unified input for chat, search, and navigation and gives Copilot contextual awareness across open tabs and the current browsing session. The company framed Copilot Mode as a way to “pilot the web” by letting an AI summarize content, compare sites, and — with user permission — perform actions that previously required manual clicking and copying. Independent coverage from mainstream tech outlets documented the initial rollout and early impressions.

Why this matters now​

Browsers are the primary interface for most work and many personal tasks. Embedding an agent capable of multi-tab reasoning and action execution inside a browser transforms that interface from a passive window into a potentially proactive assistant. Microsoft’s broader Copilot investments — including bringing state-of-the-art models like GPT-5 into its Copilot ecosystem — make the timing logical: the company is tying advanced LLM capabilities to everyday workflows inside Edge and Microsoft 365. Those product-level moves make Copilot Mode more than an experiment; they’re a strategic bet that the browser will become the next battleground for AI-driven productivity.

How Copilot’s new “control” features work​

The mechanics in plain terms​

  • When Copilot Mode is enabled, Edge presents a streamlined new-tab experience with a single chat/search/navigation prompt. Copilot can read page content and — with explicit user consent — use the context of open tabs, browsing history, and stored credentials to perform multi-step tasks. Examples Microsoft showed include researching travel options across several sites, comparing product pages, drafting emails using web-sourced content, and filling booking forms using saved credentials.
  • Input modes include typed prompts and voice commands, enabling hands-free workflows. Copilot can also appear in a dynamic pane alongside any page to provide on-page summaries, unit conversions, or step-by-step task guidance without disrupting the view.

Agentic actions vs. assistant suggestions​

There are two distinct behavioural modes to understand:
  • Suggest-and-wait: Copilot analyzes content and proposes actions for the user to start (safe, low-risk).
  • Act-on-your-behalf (agentic): Copilot takes the steps required to complete a task — opening tabs, completing a multi-page form, initiating a booking — after the user grants permission for the session or specific action. The latter is what raises both excitement and caution in equal measure.

Underlying models and integrations​

Microsoft’s Copilot in Edge uses cloud-backed LLMs and leverages the broader Copilot platform. Microsoft has integrated GPT‑5 into Copilot Studio and Copilot Chat functionality earlier in 2025, enabling higher-throughput and deeper-reasoning model routing depending on task complexity. That model-level upgrade increases Copilot’s capacity to reason across multiple web pages and orchestrate multi-step flows.

Verified, concrete claims and cross-references​

  • Copilot Mode public rollout (experimental, opt-in) announced July 28, 2025 on the Microsoft Edge blog; independent coverage corroborated by multiple outlets.
  • Microsoft added GPT‑5 routing options to Copilot (“Try GPT‑5” in Copilot Chat) and made GPT‑5 accessible in Copilot Studio earlier in August 2025; Microsoft documentation and Copilot release notes confirm the integration.
  • Microsoft states Copilot Mode requires user permission to access browser content and will surface visual indicators and consent dialogs before agentic actions; Edge product pages and Learn documentation describe these controls. Independent outlets reporting on hands-on tests echo that permission prompts are part of the flow.
Where possible these assertions are corroborated by at least two independent sources: official Microsoft posts and reputable tech journalism (e.g., Microsoft blog plus TechCrunch/GHacks), fulfilling a basic cross-verification standard for the most load-bearing claims.

Productivity upside: concrete scenarios​

Immediate benefits for individual users​

  • Faster research: Copilot can synthesize content across multiple tabs into a short brief or comparison table, cutting hours of manual browsing to minutes.
  • Drafting and contextual composition: Copilot can collect facts from open pages and produce an email draft or report scaffold that references the exact pages it used.
  • Accessibility and hands-free use: Voice-driven, context-aware navigation aids users who benefit from speech input or reduced manual interaction.

Enterprise gains and workflow automation​

For organizations that already use Microsoft 365, Copilot in Edge can orchestrate cross-app automation: pulling calendar context from Outlook, drafting documents in Word, or pulling corpora from SharePoint when constructing research briefs. Microsoft has also introduced administrative controls and Copilot governance tooling aimed at IT (e.g., Copilot Control System, SharePoint advanced management) to help manage agents at scale. Those enterprise controls are a critical differentiator for corporate adoption.

Example use-cases​

  • Competitive intelligence: a market analyst asks Copilot to compile pricing and feature information across five product pages and export the results into a spreadsheet.
  • Sales enablement: Copilot scans a prospective customer’s public web footprint and drafts an outreach email tailored to the findings, using approved corporate templates.
  • Research assistants: Copilot aggregates and summarizes relevant academic papers into a one‑page pros/cons brief, citing the specific tabs it used.

Risks, vulnerabilities, and privacy trade-offs​

Data access is broad by design​

To enable multi-tab synthesis and action, Copilot requires access to page content, open tabs, and — in agentic mode — browsing history and stored credentials. Microsoft emphasizes consent-based access and visual indicators, but granting permission still expands the amount of data the assistant can read and act upon. That expansion is the core privacy trade-off: more automation requires deeper context.

Proven security concerns and new threat classes​

The integration of LLM-based assistants into workflow systems has already surfaced real, technical vulnerabilities. Recent academic disclosure described a prompt-injection / cross-component exploit (EchoLeak) affecting Copilot-style systems, demonstrating that crafted content and chained bypasses can enable data exfiltration across trust boundaries. While attack specifics and mitigations vary, the research underscores that agentic systems introduce new exploitation vectors that traditional web defenses don’t fully address. Any organization deploying agentic Copilot features should treat adversarial testing as mandatory.

Regulatory and compliance exposure​

Access to browsing history, credentials, and personal data raises regulatory questions in strict jurisdictions (GDPR, sectoral rules for finance and healthcare). Enterprises will need to map Copilot actions to internal data protection policies and ensure that agents operate under least privilege and auditable flows. Microsoft’s enterprise governance controls help, but they do not eliminate the need for policy review and possibly contractual adjustments with cloud providers.

Usability and trust risks​

  • Accuracy failures: multi-step agentic actions magnify the impact of hallucinations or misinterpretations — booking the wrong flight or sending an email with incorrect data becomes costlier.
  • Overreliance: habitual delegation of simple tasks to agents risks user skill erosion and brittle workflows when the agent errs or is unavailable.
  • Consent fatigue: repeated permission prompts for diverse tasks may lead users to accept requests reflexively, undermining the consent model that underpins the design.

How Microsoft is responding (and where the gaps remain)​

Built-in mitigation steps Microsoft highlights​

  • Opt-in model and visual indicators for active Copilot sessions.
  • Explicit consent triggers when Copilot needs access to additional browser context such as history or credentials.
  • Enterprise-grade controls (Copilot Control System, admin dashboards) intended to let IT scope agent access and monitor agent lifecycle.

Gaps and open engineering problems​

  • Provenance and accountability: current interfaces surface which pages an agent accessed, but more rigorous, machine-verifiable provenance and end-to-end audit trails are needed for high-risk workflows.
  • Adversarial robustness: academic research shows prompt injection and cross-component chaining are realistic attack paths; sustained adversarial testing and patching are mandatory.
  • Locality and data residency: cloud-dependent model execution may conflict with regional data requirements; Microsoft’s cloud architecture offers options but does not automatically solve every regulatory need.

Competition and market dynamics​

Where Edge sits in the AI browser race​

Google, Apple, and several start-ups are racing to embed agentic AI into browsing experiences. Google’s work with Gemini agent features and AI-backed omnibox search are the most direct competitive pressure, and other players are experimenting with agentic flows as well. Microsoft’s advantage lies in tight integration with Microsoft 365 and an enterprise governance story that is more mature than many smaller rivals. That said, market adoption depends on trust and perceived reliability as much as capability.

Enterprise vendor landscape and model diversity​

Microsoft has recently diversified Copilot’s model sources (for example adding Anthropic models to the Copilot mix for Microsoft 365 in late 2025), which is relevant because model provenance, capabilities, and contractual requirements differ by vendor; offering choice helps customers with specific risk or performance profiles. Model diversity may also help mitigate single-vendor failures.

Implementation guidance: a practical checklist for IT and power users​

For IT leaders (priority sequence)​

  • Inventory use cases: identify which workflows would benefit most from agentic automation and classify them by sensitivity.
  • Pilot under governance: enable Copilot Mode in a scoped pilot with defined auditing, logging, and rollback plans.
  • Deploy least-privilege policies: restrict agent access to only the browser contexts required for a given task and enable admin oversight via Microsoft’s Copilot management tooling.
  • Run adversarial tests: include prompt-injection and cross-system chaining tests as part of pen testing.
  • Update contracts and DPA clauses: ensure model providers and cloud regions meet data residency and security requirements for regulated workloads.

For consumers and power users​

  • Use opt-in controls deliberately: enable Copilot Mode only for tasks that produce clear time savings.
  • Limit credential exposure: avoid storing critical credentials in the browser when planning to use agentic features for financial or high-stakes actions.
  • Verify before confirm: when Copilot proposes an action that triggers an external effect (booking, purchase, email send), read the confirmation summary before accepting.

Long-term outlook: regulation, user expectations, and the future of browsing​

Likely regulatory focus​

Regulators will likely scrutinize:
  • Transparency around automated actions (clear labeling when an agent performed or proposed actions).
  • Data flows between browser, cloud, and enterprise systems (auditable logs and proven non-exfiltration guarantees).
  • Safety standards for agentic actions that can affect finances, contracts, or personal data. Expect audits and potentially new guidance specific to agentic AI.

User expectations reshaping product design​

If agentic assistants become reliable and trustworthy, users will increasingly expect browsers to do more than display content — they will expect pre-built workflows, reclamation of time from repetitive web tasks, and better cross-application automation. Conversely, if misuse or high-profile failures occur, adoption could stall and stricter default opt-out postures will reappear. Microsoft’s future success depends on measurable reliability gains and clear, user-first privacy defaults.

Conclusion​

Microsoft’s Edge Copilot update represents a bold, credible move toward an agentic, action-capable browser that can materially speed research, drafting, and routine online tasks by operating across tabs and integrating with Microsoft 365. The company’s simultaneous rollout of higher-capacity models (GPT‑5 routing in Copilot) and enterprise governance tooling shows the strategy is deliberate: power the agent with stronger reasoning while giving businesses the controls they need to adopt it.
At the same time, agentic browsing amplifies privacy and security concerns — from increased data access to new adversarial attack surfaces demonstrated in recent research — and raises regulatory and human-centered design questions that won’t be solved by capability alone. The net value of Copilot Mode will be determined not by novelty, but by whether Microsoft, enterprises, and the wider ecosystem can operationalize safe, auditable, and privacy-respecting patterns for agentic automation.
For Windows and Edge users, the responsible path forward is cautious experimentation paired with strict governance: pilot the productivity wins, measure and harden the risks, and only broaden adoption once robustness and transparency meet the bar required by the tasks being delegated. The browser is changing — whether it becomes a trusted partner or a new source of systemic risk depends on the engineering, policy, and human decisions made over the next months as Copilot Mode moves from experimental to mainstream.

Source: WebProNews Microsoft Edge Copilot Update: Autonomous AI for Browsing and Tasks by 2025
 

Microsoft Edge is set to get a new layer of defense against malicious sideloaded extensions, a move that could materially reduce a long-standing browser attack surface — but the timing and scope announced in some reports remain only partially verifiable against Microsoft’s public roadmaps and documentation. Reports say Edge will be able to detect, revoke and remove sideloaded extensions judged to be malicious, with a rollout targeted for November 2025; Microsoft’s extension platform already includes several protections and enterprise controls that make such a capability a natural evolution.
This feature — if implemented as described — changes the playing field for both defenders and attackers. It raises immediate questions about detection methods, telemetry and user control, enterprise manageability, and the risk of false positives. Below is a detailed, verifiable briefing: what Microsoft has published, what reputable reporting and security research reveal, how the new protection would fit into Edge’s existing extension model, practical implications for users and IT, and where claims remain unconfirmed.

A glowing blue shield symbolizes cybersecurity, with assorted security icons around it.Background: why sideloaded extensions are a real problem​

Browser extensions are powerful: they can modify pages, intercept web requests, inject scripts, and access sensitive page content. That power also makes extensions a favored channel for abuse.
  • Sideloading refers to installing an extension outside the browser’s vetted add‑ons marketplace. Sideloaded extensions may bypass store review and thereby carry higher risk.
  • Threat actors use sideloading to deliver adware, trackers, credential stealers, and persistent nasties that resist removal by normal UI flows.
  • Some malicious extensions persist via background processes, auto-reinstall mechanisms, or by hijacking settings (search engine, new-tab, homepage) and updates.
Microsoft has long provided enterprise policies and runtime protections to limit these risks, including a Group Policy/MDM setting (AllowSideloadingOfExtensions) that can disallow unverified sideloaded installs, and ExtensionSettings and ExtensionInstallBlocklist policies for fine-grained management. Those policies exist because sideloaded or unvetted extensions are recognized as a significant attack vector.

What’s being announced (the claim)​

Several reports state that Microsoft Edge will gain the ability to detect and revoke malicious sideloaded extensions automatically. The core capabilities attributed to the announcement are:
  • Automatic detection of sideloaded extensions that exhibit malicious behavior or which have been flagged through telemetry and analysis.
  • Automatic revocation, disabling and removal of such extensions from affected browsers to stop active exploitation and prevent further harm.
  • A rollout scheduled or projected for November 2025, listed as “in development” on a Microsoft roadmap entry cited by reporting outlets.
These changes are described as expanding Edge’s current protections (which already include auto-disable behaviors for extensions that try to hijack key settings and a performance detector for slow or problematic extensions) to take direct remediation action against extensions determined to be malicious.

What Microsoft’s official resources say today​

Microsoft’s public developer and product documentation confirm several adjacent facts while not fully detailing the exact “revoke sideloaded extension” behavior as described in secondary reporting.
  • Microsoft documents an ecosystem of extension governance: Partner Center, the Edge add‑ons store, developer policies, and a Publish API intended to harden the publishing/update process for extensions. These controls aim to reduce supply‑chain risk and secure developer credentials.
  • Edge’s extensions roadmap and released-features pages show active work to secure the publishing pipeline and to transition the platform (Manifest V2→V3), but do not include a public, detailed specification for an automatic revocation mechanism for sideloaded extensions on the same pages examined for this story. Microsoft’s roadmap pages and extension docs reference extension lifecycle controls, enterprise policies and ongoing platform hardening.
  • The browser policy configuration (AllowSideloadingOfExtensions) is explicitly documented for managed environments, reinforcing that administrative controls exist at the device and user policy level to block unverified sideloading. That policy remains an important complementary control for organizations.
Because Microsoft publishes many discrete resources (Edge developer docs, Microsoft 365 Roadmap entries, and the Edge blog), a specific, singular “revoke malicious sideloaded extensions” page in Microsoft’s public documentation could be added or updated as the feature develops. At time of publication, the extension governance and store hardening changes are documented; a public, full specification for automatic revocation tied to a November 2025 delivery was not found in a single Microsoft doc that names the feature with the precise language quoted in some reports. That timing therefore should be treated as reported but not independently confirmed in Microsoft’s public documentation.

How this would fit into Edge’s current extension security model​

Microsoft Edge currently uses a layered approach to extension safety:
  • Store vetting: Extensions published to the Microsoft Edge Add‑ons store go through developer policy checks intended to find malware, privacy abuses, and disallowed behaviors. The Partner Center and the Publish API changes strengthen this vetting and publishing pipeline.
  • Auto‑disable protections: Edge already disables extensions that attempt to forcibly change critical browser settings (search, new-tab, homepage) or that are flagged for misbehavior by local heuristics. Users can re-enable extensions after confirming their intent, and Microsoft documents these behaviors.
  • Enterprise policy controls: Administrators can prevent sideloading or block all external extensions, force-install approved extensions, and control runtime host access via ExtensionSettings policies. These remain the recommended hardening controls for managed fleets.
  • Runtime reputation and telemetry: Cloud-backed services such as Microsoft Defender SmartScreen and store reputation services are used to flag malicious sites and potentially untrusted content; an extension reputation model would logically reuse such telemetry for revocation decisions if Microsoft implements automatic removal.
A revocation capability aimed specifically at sideloaded extensions would therefore be a logical extension of Edge’s existing defenses — combining local detection heuristics, store/reputation telemetry and enterprise policy state to determine whether an extension should be disabled and removed automatically.

Practical detection levers Microsoft might use​

The likely signals and heuristics for detecting malicious sideloaded extensions include:
  • Permission abuse: sudden use of broad host permissions (read/change data on all sites) or suspicious new permissions requests after updates.
  • Behavior patterns: unexpected background network activity, hidden UI injection, credential harvesting behaviors or script injection on sites that contain sensitive input forms.
  • Update metadata: suspicious update URLs or update patterns that match known abuse techniques (e.g., rapid repackaging, obfuscated updates).
  • Reputation telemetry: correlation with known malicious developer accounts or indicators aggregated from Defender SmartScreen and threat telemetry.
  • User reports and heuristics: spikes in user complaints about popups, redirects, or unexplained settings changes.
These levers already underpin store review and runtime protections; a revocation flow would combine them with an enforcement mechanism that can disable and remove the extension programmatically.

Benefits: what a revocation feature would deliver​

  • Faster mitigation: Automatic revocation could stop malicious extensions in minutes rather than days, preventing further exposure and exfiltration.
  • Reduced user friction: Less reliance on users to notice and remove persistent unwanted extensions that often use stealthy persistence.
  • Lower operational load: For enterprise security teams, automatic mitigation reduces incident triage time and containment overhead.
  • Supply‑chain immunity improvements: Strengthening the update and publishing pipeline reduces the chance that a legitimate extension’s update can be weaponized.

Risks, limitations and unanswered questions​

The defensive upside is real, but automatic revocation also introduces new operational, privacy and reliability risks that require clear answers:
  • False positives and user control: Automatic removal of an extension risks disabling legitimate tools. How will Microsoft minimize false positives and provide transparent remediation paths? Will users be able to restore false-positively removed extensions easily?
  • Enterprise exceptions and manageability: Organizations often rely on specialized, in-house or legacy extensions. Robust policy controls must allow admins to opt out or whitelist enterprise extensions to avoid breaking workflows.
  • Visibility and audit trails: Security teams need logs, telemetry access, and an appeals process. Will Microsoft provide admin dashboards and notification channels describing why an extension was revoked?
  • Privacy and telemetry: Detection might rely on telemetry that sends metadata to Microsoft. The privacy posture must be documented — what data is collected, and how long is it retained?
  • Potential for abuse: A remote revocation mechanism can become an attack surface itself if poorly secured. Strong authentication and tamper‑proof signing for revocation commands are essential.
  • Scope: Will revocation apply only to sideloaded extensions, or also to store-installed extensions that become malicious after acquisition (supply-chain takeover)? The latter has deep implications for both users and enterprises.
Because the verification of the exact revocation mechanism and its governance model was not possible from a single public specification at press time, these remain important points to clarify before broad rollout is relied upon by administrators.

How to prepare: guidance for consumers and enterprises​

Short-term actions for everyday users:
  • Audit installed extensions: Open Edge → Settings and more → Extensions → Manage extensions and remove anything unfamiliar or unused.
  • Prefer vetted stores: Install extensions from the Microsoft Edge Add‑ons store when possible and avoid sideloading unless necessary.
  • Limit site access: Change each extension’s site access to On specific sites rather than On all sites where feasible.
  • Use profiles: Separate work and personal browsing profiles so risky extensions don’t mix credentials or cookies.
Enterprise steps for IT teams:
  • Harden policies:
  • Disable sideloading using the AllowSideloadingOfExtensions policy (or enforce via MDM/GPO where appropriate).
  • Build an allowlist for required extensions and a blocklist for known risky IDs using ExtensionSettings, ExtensionInstallBlocklist and ExtensionInstallForcelist policies.
  • Test before broad deployment:
  • Pilot any new revocation behavior in a segment to evaluate false positive rates and compatibility with critical workflows.
  • Logging and monitoring:
  • Integrate Edge telemetry and extension events with SIEM/EDR pipelines so security teams can correlate extension behavior with other suspicious indicators.
  • Update workflows and IR:
  • Update incident response playbooks to include extension revocation, rollback, and user communication templates.
  • User education:
  • Train users to identify rogue extensions and to report unexpected browser behavior rather than re‑enabling removed extensions without guidance.
Edge’s enterprise documentation and policy settings provide the control surface to implement most of these measures today; adding a revocation feature should augment administrators’ ability to automatically protect managed fleets if the feature is delivered with enterprise‑grade controls and auditability.

Security context: why vendors are moving here​

The industry is moving toward active, telemetry-driven mitigation for endpoint and browser threats because prevention-only models fail when attackers get creative with trusted artifacts such as extensions, add-ins and plugins. Recent research and disclosed vulnerabilities have shown practical paths attackers use to install malicious extensions or weaponize legitimate APIs.
  • Researchers disclosed a privileged API attack that could allow background installation under limited conditions (tracked as CVE‑2024‑21388); this kind of chain illustrates why runtime revocation and store hardening matter. Coverage of that research and Microsoft’s subsequent patching underscores the urgency of platform-level mitigations.
  • Platform improvements such as the Publish API, elevated verification of developer accounts and dynamic API key models are concrete hardening steps Microsoft has already published for Edge extension developers. Those changes reduce the chances of account takeover and malicious updates.
Together, publish‑time hardening and runtime revocation provide a two-pronged defense: make it harder to push malicious code into the ecosystem and make it safer to remove it if it appears.

Verification, caveats and open items​

  • Confirmed: Microsoft has been actively improving the extension ecosystem — Publish API changes, store developer policies, Manifest V2→V3 migration and enterprise policy controls are documented in Microsoft’s developer and product pages.
  • Reported but not independently verifiable on a single Microsoft public page at time of publication: the exact Microsoft 365 Roadmap entry text that specifies “Adding protection against malicious sideloaded extensions” with a firm November 2025 rollout. That claim appears in reporting and summaries, and is plausible given Microsoft’s extension security trajectory, but readers and administrators should treat the November 2025 date as reported and subject to change pending an explicit Microsoft product announcement or a public Microsoft 365 Roadmap entry naming the feature.
  • Unanswered technical questions that require Microsoft clarification:
  • Exact detection signals and telemetry that will drive revocation decisions.
  • The revocation workflow (disable vs remove vs quarantine) and how users/admins are notified.
  • Administrative override and enterprise bypass/whitelisting mechanics.
  • Privacy disclosures for any telemetry used.
These caveats are material: a powerful protection without clear governance, audit trails and enterprise controls risks unintended disruption.

Bottom line: a positive but cautious step​

Automatic detection and revocation of malicious sideloaded extensions would be a meaningful addition to Edge’s security posture — particularly for consumers and smaller organizations that lack sophisticated monitoring. It complements existing store vetting and enterprise policy controls, and addresses the reality that sideloaded add‑ons are a frequent vehicle for persistent unwanted software and data theft.
At the same time, the devil is in the details. Implementation must be transparent, auditable and manageable, with explicit enterprise controls and an appeals mechanism for falsely flagged extensions. Until Microsoft publishes a complete specification — and until administrators test the behavior in controlled environments — organizations should continue to rely on existing policies (disabling sideloading where appropriate), vet extension sources, and monitor extension behavior with their normal security tooling.
Edge’s move toward automated, telemetry-driven remediation reflects the broader industry trend of shifting from passive defenses to active, adaptive protection. When executed carefully — with attention to false positives, admin control, and user privacy — it will reduce a harmful attack surface that has troubled browsers for years.

Quick checklist: immediate actions for readers​

  • Consumers:
  • Review Extensions → Manage extensions and remove unknown items.
  • Prefer Microsoft Edge Add‑ons store and restrict extension site access.
  • IT administrators:
  • Harden policies: set AllowSideloadingOfExtensions to disabled for general users where possible.
  • Create allowlists and blocklists using ExtensionSettings and ExtensionInstallBlocklist.
  • Integrate Edge telemetry with SIEM and create alerts for unusual extension update URLs or outbound traffic from extension processes.
  • Pilot any new Edge feature in a test group before broad rollout.
Microsoft’s ongoing enhancements to extension publishing, store policies and browser protections are encouraging; this next step toward automatic revocation of malicious sideloaded extensions would, if delivered with appropriate controls, give both consumers and enterprises an important new lever to fight extension-based abuse.

Source: Windows Report Microsoft Edge Will Block Dangerous Sideloaded Extensions, But Not Just Yet
 

Back
Top