Overview
Download templates
Upload templates
Configure templates
Deploy templates to devices/users/groups
Adding Policy Files to Intune
Downloading Policy Templates
Microsoft Policy Template
Download and run this file
After finished installing policies, navigate to the Intune Configuration profile upload page and click the
Import ADMX
tab.Click the
+ Import
buttonIn the selection window navigate to
C:\Windows\Policy Definitions\
Locate the
Windows.admx
file and select it.Add the
Windows.adml
file located atC:\Windows\Policy Definitions\en-US\
Click the blue
Next
button.Verify the displayed info is correct and then click the blue
Create
button.
Edge Policy Template
Navigate to Microsoft Edge for Business
Scroll down and locate the archetype of windows your systems are on and click the blue text that should read
Download Windows XX-bit Policy
whereXX
is64
,32
, orARM64
NOTE
Most people will choose the64
option if you're unsure which you should get.
Locate the file you downloaded, it should have a name similar to
MicrosoftEdgePolicyTemplates.cab
Extract the
MicrosoftEdgePolicyTemplates.zip
fileExtract the
MicrosoftEdgePolicyTemplates
folder
Uploading Policy Templates to Intune
Open your browser of choice and navigate to Intune Admin Center webpage and login as an administrator
On the left side click
Devices
On the new side bar that appears scroll down to the
Policy
section and clickConfiguration profiles
Click the
Import ADMX
tab and then clickImport
In the field labeled
ADMX file
click the blue folder icon to the right of itNavigate to where you exported that folder in step 5 and then go to the following:
Windows
->ADMX
->msedge.admx
Click the
Open
button to confirm the file.In the field labeled
ADML file
click the blue folder icon to the right of itNavigate to where you exported the folder in step 5 and then go to the following subfolder:
Windows
->ADMX
->en-US
->msedge.adml
Click the
Open
button to confirm the file.Click the blue
Next
buttonCheck that you have the two correct files added, it should read
ADMX file
:msedge.admx
andADML file for the default langeuage
:msedge.adml
If everything looks correct, click
Create
Wait for the profile to upload, typically takes a few minutes.
NOTE
You cannot close or refresh the tab that you started the upload on or it will fail. Please leave the tab open until the status showsCompleted
. You may need to click theRefresh
button on top of the table for it to update to show completed.
Setting up the Edge/Chrome Policy in Intune
NOTE
: You must have completed the Adding Policy Files to Intune
steps before you proceed. If you don't see the settings mentioned in the next steps make sure you've completed the Adding Policy Files to Intune steps.
Edge Force Install
Navigate to Intune Device Configuration Profiles
Click the
+ Create profile
buttonSet the
Platform
drop down toWindows 10 and later
Set the
Profile type
drop down toSettings catalog
Click the blue
Create
button.Give your profile a name such as
Edge Force Install Extension
Give the profile a description if you wish
Click the blue
Next
buttonClick the blue text that read
+ Add settings
In the field labeled
Search for a setting
inputMicrosoft Edge
Scroll through the list until you locate
Microsoft Edge\Extensions
and click itThen scroll through the bottom list and look for the option named
Control which extensions are intalled silently
Click the checkbox on the leftDo another search from step 10 and input
Microsoft Edge
and look for an option calledMicrosoft Edge
Look for the option
Allow managed extensions to use the Enterprise Hardware Platform API
and click the checkboxLook for the option
Browser sign-in settings
and click the checkboxLook for the option
Configure automatic sign in with an Active Directory domain account when there is no Azure AD domain account
Look for the option
Configure InPrivate mode availability
Click the X in the top right of the
Settings Picker
menu.Enable all of the policies and configure the following:
Browser sign-in settings
: "Force users to sign-in to use the browser"Configure automatic sign in with an Active Directory domain account when there is no Azure AD domain account
: "Sign in and make domain account non-removable"Configure InPrivate mode availability
: "InPrivate Mode Disabled"Enter in the app name into "Control which extensions are installed silently" :
npnkndcccppmijoadmlaacmfbolcfppp;https://storage.googleapis.com/mm-cf-download.managedmethodsdev.com/main/updates.xml
Click the blue
Next
button at the bottomSet any
Scope Tags
if you have any you'd like to setClick the blue
Next
button at the bottomSet which users, groups or devices you'd like to have this policy enforced on by clicking the
Add Groups
,Add All Users
orAdd All Devices
.Alternatively you can add all users or devices and then add groups to the exclude list.
Click the blue
Next
buttonReview all the options and ensure they look correct and then click the blue
Create
button at the bottom to create the policy
Chrome Force Install (Windows OS)
NOTE
: This will only apply to Chrome
on Windows OS
and not Chrome OS
or Mac OS
Navigate to Intune Device Configuration Profiles
Click the
+ Create profile
buttonSet the
Platform
drop down toWindows 10 and later
Set the
Profile type
drop down toSettings catalog
Click the blue
Create
button.Give your profile a name such as
Edge Force Install Extension
Give the profile a description if you wish
Click the blue
Next
buttonClick the blue text that read
+ Add settings
In the field labeled
Search for a setting
inputMicrosoft Edge
Do a search for
Chrome
Locate the field called
Google Google Chrome Extensions
and click itIn the table below locate the
Configure the list of force-installed apps and extensions
option and check the box next to it.In the search field from step 11, do another search for
Chrome
and click the row calledGoogle Google Chrome
Look for an option called
Browser sign-in settings
and click the checkboxLook for an option called
Enables managed extensions to use the Enterprise Hardware Platform API
and click the checkboxLook for an option called
Incognito mode availability
and click the checkboxLook for an option called
Add restrictions on managed accounts
and click the checkboxClick the X in the top right of the
Settings Picker
menuLook for the section labeled
Google Chrome > Extensions
and check the toggle to enable that policy.Input the following into the field that should have appeared
npnkndcccppmijoadmlaacmfbolcfppp;https://storage.googleapis.com/mm-cf-download.managedmethodsdev.com/main/updates.xml
Click the toggle for each option to enable it and configure the following settings after:
Add restrictions on managed accounts
: "A Managed Account Must be a primary account"Browser sign in settings
: "Force-users to sign-in to use the browser"Incognito mode availability
: "Incognito Mode Disabled"
Click the blue
Next
button at the bottomSet any
Scope Tags
if you have any you'd like to setClick the blue
Next
button at the bottomSet which users, group or devices you'd like to have this policy enforced on by clicking the
Add Groups
,Add All Users
orAdd All Devices
.Alternatively you can add all users or devices and then add groups to the exclude list.
Click the blue
Next
buttonReview all the options and ensure they look correct and then click the blue
Create
button at the bottom to create the policy