In early 2025, Microsoft introduced a scareware blocker feature to its Edge browser, albeit with the setting disabled by default. However, the latest update has activated this functionality for all eligible devices without user intervention. While many users will appreciate the added layer of security, there are important considerations regarding privacy and system performance. Below, we delve into the workings of the scareware blocker and how you can manage its settings effectively.
Understanding Microsoft Edge Scareware Blocker
Many users have encountered sudden, alarming pop-ups demanding that they download software to resolve supposed issues, such as viruses or illegal activities detected on their system. These deceptive prompts are categorized as scareware, designed to frighten users into performing harmful actions or downloading malicious software.
The Microsoft Edge scareware blocker is designed to automatically identify and thwart such scareware attempts by utilizing various detection methods. When a potential scareware site is accessed, users are given the choice to either close the webpage or continue navigating. This feature is compatible with devices that have a minimum of 2GB RAM and a 4-core CPU, commonly found in machines manufactured over the past decade.
Mechanism of Scareware Detection
The scareware blocker employs an on-device machine learning model to monitor for both behavioral and visual indicators typical of scareware websites. Key signs include full-screen pop-ups, enforced audio playback, visual alerts, and restrictions on closing browser tabs. The software assesses these signals against a vast database of known scareware scams, assigning a score based on the detected behavior. If this score surpasses a predefined threshold, Microsoft Edge will disable all interactive elements on the page, effectively blocking access.
Importantly, this operation takes place entirely on the user’s device, ensuring that no data is sent to Microsoft unless the user opts to share information through Microsoft Defender SmartScreen. By consenting to share, the user helps enhance the security ecosystem by providing URL data and attack signatures that can safeguard others from similar threats.
Is It Necessary to Disable the Scareware Blocker?
Generally, it is advisable to keep the scareware blocker activated, given the minimal downsides it presents. Even if you consider yourself adept at recognizing scareware attempts, this feature aids in curbing the frustrating aspects associated with such attacks, such as disruptive noise or tab closure restrictions.
The scareware blocker operates locally on your device, mitigating any significant privacy risks, with data sharing contingent on user approval. A potential downside is the performance hit, as the blocker runs on devices meeting certain hardware specifications. This could impact system performance, which is a valid concern for users optimizing their machines for intensive tasks like gaming.
While instances are rare, the blocker may interfere with specific full-screen applications, such as remote support tools or kiosk software. For users who encounter frequent disruptions, whitelisting these applications or disabling the feature may be worthwhile.
If you choose to disable the blocker, navigate to Microsoft Edge’s Settings through the three-dot menu in the upper right corner. Proceed to Privacy, search, and services followed by Security, and toggle off the Scareware blocker option.

How to Report Scareware Attacks and Address False Positives
Despite the scareware blocker being activated by default, the data sharing feature with Microsoft Defender remains disabled initially. Users looking to contribute to the collective security of Edge can enable this option. By doing so, Microsoft Edge will share the URL and attack data of detected scareware sites, aiding in fortifying defenses for all users.
To allow sharing, return to Privacy, search, and services → Security in Edge’s Settings and toggle on the Share detected scam sites with Microsoft Defender SmartScreen option. This setting allows automatic sharing of URLs when a scareware attack is recognized.

In cases of false positives, users can press the Continue button on the warning prompt to access the site. For frequent visits to a site that Edge mistakenly flags, whitelisting is advisable. To whitelist, go to Privacy, search, and services → Site permissions → All permissions → Scareware Blocker and click Add site to include the URL in the safe list.

Furthermore, users can utilize the scareware warning page’s report feature to alert Microsoft to both scams and false positives. Submission of details, such as screenshots, assists in refining prevention measures. Beyond scareware, it is vital to remain vigilant against various online threats that could jeopardize device security.
Leave a Reply