Overview
- Download templates
- Upload templates
- Configure templates
- Deploy templates to devices/users/groups
Adding Policy Files to Intune
Downloading Policy Templates
Microsoft Policy Template
- Download and run this file
- After finished installing policies, navigate to the Intune Configuration profile upload page and click the
Import ADMXtab. - Click the
+ Importbutton - In the selection window navigate to
C:\Windows\Policy Definitions\ - Locate the
Windows.admxfile and select it. - Add the
Windows.admlfile located atC:\Windows\Policy Definitions\en-US\ - Click the blue
Nextbutton. - Verify the displayed info is correct and then click the blue
Createbutton.
Edge Policy Template
- Navigate to Microsoft Edge for Business
- Scroll down and locate the archetype of windows your systems are on and click the blue text that should read
Download Windows XX-bit PolicywhereXXis64,32, orARM64NOTEMost people will choose the64option if you're unsure which you should get.
- Locate the file you downloaded, it should have a name similar to
MicrosoftEdgePolicyTemplates.cab - Extract the
MicrosoftEdgePolicyTemplates.zipfile - Extract the
MicrosoftEdgePolicyTemplatesfolder
Uploading Policy Templates to Intune
- Open your browser of choice and navigate to Intune Admin Center webpage and login as an administrator
- On the left side click
Devices - On the new side bar that appears scroll down to the
Policysection and clickConfiguration profiles - Click the
Import ADMXtab and then clickImport - In the field labeled
ADMX fileclick the blue folder icon to the right of it - Navigate to where you exported that folder in step 5 and then go to the following:
Windows->ADMX->msedge.admx - Click the
Openbutton to confirm the file. - In the field labeled
ADML fileclick the blue folder icon to the right of it - Navigate to where you exported the folder in step 5 and then go to the following subfolder:
Windows->ADMX->en-US->msedge.adml - Click the
Openbutton to confirm the file. - Click the blue
Nextbutton - Check that you have the two correct files added, it should read
ADMX file:msedge.admxandADML file for the default langeuage:msedge.adml - If everything looks correct, click
Create - Wait for the profile to upload, typically takes a few minutes.
NOTEYou cannot close or refresh the tab that you started the upload on or it will fail. Please leave the tab open until the status showsCompleted. You may need to click theRefreshbutton on top of the table for it to update to show completed.
Setting up the Edge/Chrome Policy in Intune
NOTE: You must have completed the Adding Policy Files to Intune steps before you proceed. If you don't see the settings mentioned in the next steps make sure you've completed the Adding Policy Files to Intune steps.
Edge Force Install
- Navigate to Intune Device Configuration Profiles
- Click the
+ Create profilebutton - Set the
Platformdrop down toWindows 10 and later - Set the
Profile typedrop down toSettings catalog - Click the blue
Createbutton. - Give your profile a name such as
Edge Force Install Extension - Give the profile a description if you wish
- Click the blue
Nextbutton - Click the blue text that read
+ Add settings - In the field labeled
Search for a settinginputMicrosoft Edge - Scroll through the list until you locate
Microsoft Edge\Extensionsand click it - Then scroll through the bottom list and look for the option named
Control which extensions are intalled silentlyClick the checkbox on the left - Do another search from step 10 and input
Microsoft Edgeand look for an option calledMicrosoft Edge - Look for the option
Allow managed extensions to use the Enterprise Hardware Platform APIand click the checkbox - Look for the option
Browser sign-in settingsand click the checkbox - Look for the option
Configure automatic sign in with an Active Directory domain account when there is no Azure AD domain account - Look for the option
Configure InPrivate mode availability - Click the X in the top right of the
Settings Pickermenu. - Enable all of the policies and configure the following:
Browser sign-in settings: "Force users to sign-in to use the browser"Configure automatic sign in with an Active Directory domain account when there is no Azure AD domain account: "Sign in and make domain account non-removable"Configure InPrivate mode availability: "InPrivate Mode Disabled"- Enter in the app name into "Control which extensions are installed silently" :
npnkndcccppmijoadmlaacmfbolcfppp;https://storage.googleapis.com/mm-cf-download.managedmethodsdev.com/main/updates.xml
- Click the blue
Nextbutton at the bottom - Set any
Scope Tagsif you have any you'd like to set - Click the blue
Nextbutton at the bottom - Set which users, groups or devices you'd like to have this policy enforced on by clicking the
Add Groups,Add All UsersorAdd All Devices. - Alternatively you can add all users or devices and then add groups to the exclude list.
- Click the blue
Nextbutton - Review all the options and ensure they look correct and then click the blue
Createbutton at the bottom to create the policy
Chrome Force Install (Windows OS)
NOTE: This will only apply to Chrome on Windows OS and not Chrome OS or Mac OS
- Navigate to Intune Device Configuration Profiles
- Click the
+ Create profilebutton - Set the
Platformdrop down toWindows 10 and later - Set the
Profile typedrop down toSettings catalog - Click the blue
Createbutton. - Give your profile a name such as
Edge Force Install Extension - Give the profile a description if you wish
- Click the blue
Nextbutton - Click the blue text that read
+ Add settings - In the field labeled
Search for a settinginputMicrosoft Edge - Do a search for
Chrome - Locate the field called
Google Google Chrome Extensionsand click it - In the table below locate the
Configure the list of force-installed apps and extensionsoption and check the box next to it. - In the search field from step 11, do another search for
Chromeand click the row calledGoogle Google Chrome - Look for an option called
Browser sign-in settingsand click the checkbox - Look for an option called
Enables managed extensions to use the Enterprise Hardware Platform APIand click the checkbox - Look for an option called
Incognito mode availabilityand click the checkbox - Look for an option called
Add restrictions on managed accountsand click the checkbox - Click the X in the top right of the
Settings Pickermenu - Look for the section labeled
Google Chrome > Extensionsand check the toggle to enable that policy. - Input the following into the field that should have appeared
npnkndcccppmijoadmlaacmfbolcfppp;https://storage.googleapis.com/mm-cf-download.managedmethodsdev.com/main/updates.xml
- Click the toggle for each option to enable it and configure the following settings after:
Add restrictions on managed accounts: "A Managed Account Must be a primary account"Browser sign in settings: "Force-users to sign-in to use the browser"Incognito mode availability: "Incognito Mode Disabled"
- Click the blue
Nextbutton at the bottom - Set any
Scope Tagsif you have any you'd like to set - Click the blue
Nextbutton at the bottom - Set which users, group or devices you'd like to have this policy enforced on by clicking the
Add Groups,Add All UsersorAdd All Devices. - Alternatively you can add all users or devices and then add groups to the exclude list.
- Click the blue
Nextbutton - Review all the options and ensure they look correct and then click the blue
Createbutton at the bottom to create the policy
Comments
0 comments
Article is closed for comments.