policy
15 TopicsChrome extension managed storage policy
Hi there, I've developed a chrome extension and now we want to deploy it using Intune. Force install of extension works great but I can't pass managed data to the extension. Here is the scheme: { "type": "object", "properties": { "apiKey": { "title": "API Key", "description": "An API key to communicate with server.", "type": "string" } } } This is the policy that I created in Intune: OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Chrome~Policy~googlechrome~3rdparty~extensions~eagefwefpbjpewefliifpgfgoewfknnmk~policy Data type: String Value: {"apiKey":"mykey123"} But it doesn't appear in chrome://policy and when I get policies in my code with: const result = await chrome.storage.managed.get(null); The result is empty! What is the problem here? And how to fix it?35Views0likes0CommentsInsecurePrivateNetworkRequestsAllowed
In Dev version 138.0.3338.1 I noticed the following policies are showing as "error/not found" and was wondering if these policies are scheduled to be depreciated: InsecurePrivateNetworkRequestsAllowed InsecurePrivateNetworkRequestsAllowedForUrls These policies are still functional on stable 137.0.3296.58. Thanks!Solved233Views0likes4CommentsThere needs to be a policy to enable Edge Secure Network
As soon a single policy is set for Microsoft Edge, either through group policy or registry, the Edge Secure Network becomes unavailable. There needs to be a policy to enable it again. Using a registry key or local policy to control Edge doesn't mean it's controlled by an organization or personal Microsoft accounts are not used.2.1KViews3likes4CommentsOfficial Download links for Microsoft Edge Stable Enterprise
I'm not 100% sure it's final but anyone who wishes/wants can test it. Microsoft Edge Stable Enterprise X64.msi http://go.microsoft.com/fwlink/?LinkID=2093437 X86.msi http://go.microsoft.com/fwlink/?LinkID=2093505 MicrosoftEdgePolicyTemplates.cab http://go.microsoft.com/fwlink/?LinkID=2099616 MicrosoftEdgeIntunePolicyTemplate.cab http://go.microsoft.com/fwlink/?LinkID=2099617 macOS.pkg http://go.microsoft.com/fwlink/?LinkID=2093438 Blocker Toolkit to disable automatic delivery of Microsoft Edge https://docs.microsoft.com/en-us/deployedge/microsoft-edge-blocker-toolkit87KViews3likes20CommentsEdge New Tab Location Recommended Policy Delivery Date
I'm using Edge stable 107. I'd like to be able to set a recommended value for the new tab page location but as per here even if set in the recommended policy section it acts like a mandatory policy. Is there a date to deliver the recommended policy capability? Quote from link: The recommended version of this policy does not currently work and functions exactly like the mandatory version.Solved1.1KViews0likes2CommentsEdge extension policy
In our extension we want to use one of our micro-frontend application so we will load it inside an iframe in the some part of the our extension, does the extension policy allow this? This application can send events via “post message”, and also we have authentication through auth0. Does this mean that if we will load our micro-frontend application we are violating the policy?502Views0likes0CommentsEdge Stable 103.0.1264.37 breaks group policy management of the browser - Critical
Going from version 102.0.1245.44 (June 16) to 103.0.1264.37 (June 23), we started experiencing the following issue. Our AD Domain Joined machines running Edge and being managed via Group Policy, unload their policy set on every gpupdate (foreground or background). To reproduce this, just go to edge:\\policy and see your policies. Then, do a gpupdate and once it completes, visit that page again. It will show an empty set of policies (Although the policies are there in the registry). The only way to re-apply the policies is to: 1. Wait for the browser itself to do it (Reload Policy), could take any number of minutes 2. Click the Reload Policy button on Edge:\\policy This results in all Externsions being re-installed, the centralized boomarks re-applied etc and it is both a problem raised by our end users because they see their extensions being re-installed on every gpupdate and we no longer are sure that our endpoint browsers are managed.Solved24KViews3likes34CommentsEdge does not use the configured policys
Hi together, We currently have this very strange problem: We've downloaded the Edge Enterprise MSI (97.0.1072.69) including the Windows 64-bit Policys from here: https://www.microsoft.com/en-us/edge/business/download and successfully deployed them to all our Clients. The new ADMX Templates were also copied to the SYSVOL Store of the Main DC, which is a WS 2012 R2 one. We've created a new GPO and "gpreport -H report.html" reports that it was successfully applied to one of our Test-Clients (W10 Pro 21H1): However, the "edge://policy/" Link shows that no single Policy was applied: Can someone explain to me why it doesn't apply the Edge-GPO?Solved3KViews0likes3CommentsHaving issues getting Chromium Edge to accept policy changes
I'm running onto some issues trying to change a few settings on a new Chromium Edge install using policy edits through the registry. These computers are not domain managed, so the only method available for me to do this is by using a powershell script to edit the registry files to get these settings changed. I'm trying to set the browser to restore 2 pages each time it starts up, everything I have found indicates that the settings should be set in the HKCU:\Software\Policies\Microsoft\Edge I have the registry files set so they write the settings that I believe should be correct, but after setting them and opening edge the policies don't seem to apply. The script I'm using for the registry edits is attached below. #Disable Edge "First Run" #Create registry key "HideFirstRunExperience" new-item –Path "HKCU:\SOFTWARE\Policies\Microsoft\" –Name "Edge" New-ItemProperty -Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge" -Name "HideFirstRunExperience" -Value ”1” -PropertyType "DWORD" #Set multiple pages to open on startup #Set restore on startup New-ItemProperty -Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge" -Name "RestoreOnStartup" -Value ”0x00000004” -PropertyType "DWORD" -Force #Create "Recommended" and "Mandatory" new-item –Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge" –Name "Recommended" new-item –Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge" –Name "Mandatory" new-item –Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge\Mandatory" –Name "RestoreOnStartupURLs" #G2A FastSupport New-ItemProperty -Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge\Mandatory\RestoreOnStartupURLs" -Name "1" -Value ”www.fastsupport.com” -PropertyType "String" #Password Self Serve New-ItemProperty -Path "HKCU:\SOFTWARE\Policies\Microsoft\Edge\Mandatory\RestoreOnStartupURLs" -Name "2" -Value ”https://https://passwordreset.microsoftonline.com/” -PropertyType "String" I'm extremely new to this sort of thing, and especially using powershell, so It very well may be something I'm overlooking, but If anybody can provide assistance I'd appreciate it.1.1KViews0likes0Comments