From 31bcf46b0c72fb49d7fb1c13cf12d5cd34d91eec Mon Sep 17 00:00:00 2001 From: NexusOne23 Date: Tue, 9 Dec 2025 07:07:15 +0100 Subject: [PATCH] Fix: Edge 24 policies, AntiAI 15 features in module manifests --- Modules/AntiAI/AntiAI.psd1 | 2 +- Modules/EdgeHardening/EdgeHardening.psd1 | 2 +- Modules/EdgeHardening/Private/Set-EdgePolicies.ps1 | 2 +- Modules/EdgeHardening/Public/Invoke-EdgeHardening.ps1 | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Modules/AntiAI/AntiAI.psd1 b/Modules/AntiAI/AntiAI.psd1 index a3c5f6d..976d8b4 100644 --- a/Modules/AntiAI/AntiAI.psd1 +++ b/Modules/AntiAI/AntiAI.psd1 @@ -5,7 +5,7 @@ Author = 'NexusOne23' CompanyName = 'Open Source Project' Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.' - Description = 'Comprehensive Windows 11 AI deactivation - Disables all 8+ AI features using official Microsoft policies (Recall, Copilot, Paint AI, Notepad AI, Click to Do, Settings Agent). Maximum compliance mode with enterprise-grade Recall protection.' + Description = 'Comprehensive Windows 11 AI deactivation - Disables all 15 AI features using official Microsoft policies (Recall, Copilot, Paint AI, Notepad AI, Click to Do, Settings Agent, etc.). Maximum compliance mode with enterprise-grade Recall protection.' PowerShellVersion = '5.1' FunctionsToExport = @( diff --git a/Modules/EdgeHardening/EdgeHardening.psd1 b/Modules/EdgeHardening/EdgeHardening.psd1 index d452df5..445ea89 100644 --- a/Modules/EdgeHardening/EdgeHardening.psd1 +++ b/Modules/EdgeHardening/EdgeHardening.psd1 @@ -18,7 +18,7 @@ Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.' # Description of the functionality provided by this module - Description = 'Microsoft Edge Security Hardening based on MS Edge v139 Security Baseline. Applies 20 security policies to harden Microsoft Edge browser using native PowerShell (no LGPO.exe dependency). Includes SmartScreen enforcement, site isolation, SSL/TLS hardening, extension blocking, and IE mode restrictions.' + Description = 'Microsoft Edge Security Hardening based on MS Edge v139 Security Baseline. Applies 24 security policies to harden Microsoft Edge browser using native PowerShell (no LGPO.exe dependency). Includes SmartScreen enforcement, site isolation, SSL/TLS hardening, extension blocking, and IE mode restrictions.' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' diff --git a/Modules/EdgeHardening/Private/Set-EdgePolicies.ps1 b/Modules/EdgeHardening/Private/Set-EdgePolicies.ps1 index 0548327..e26f2b6 100644 --- a/Modules/EdgeHardening/Private/Set-EdgePolicies.ps1 +++ b/Modules/EdgeHardening/Private/Set-EdgePolicies.ps1 @@ -4,7 +4,7 @@ .DESCRIPTION Native PowerShell implementation - no LGPO.exe dependency. - Applies 20 Microsoft Edge v139 Security Baseline policies directly to registry. + Applies 24 Microsoft Edge v139 Security Baseline policies directly to registry. Policies include: - SmartScreen enforcement (no override) diff --git a/Modules/EdgeHardening/Public/Invoke-EdgeHardening.ps1 b/Modules/EdgeHardening/Public/Invoke-EdgeHardening.ps1 index e049409..3b694cd 100644 --- a/Modules/EdgeHardening/Public/Invoke-EdgeHardening.ps1 +++ b/Modules/EdgeHardening/Public/Invoke-EdgeHardening.ps1 @@ -3,7 +3,7 @@ Apply Microsoft Edge v139 Security Baseline .DESCRIPTION - Applies all 20 Microsoft Edge Security Baseline policies using native PowerShell: + Applies all 24 Microsoft Edge Security Baseline policies using native PowerShell: - SmartScreen enforcement (no override allowed) - Site isolation (SitePerProcess) for process-per-site security - SSL/TLS error override blocking