Microsoft Edge - Policies
The latest version of Microsoft Edge includes the following policies. You can use these policies to configure how Microsoft Edge runs in your organization.
For information about an additional set of policies used to control how and when Microsoft Edge is updated, check out Microsoft Edge update policy reference.
You can download the Microsoft Security Compliance Toolkit for the recommended security configuration baseline settings for Microsoft Edge. For more information see the Microsoft Security Baselines Blog.
NOTE
This article applies to Microsoft Edge version 77 or later.
Available policies
These tables list all of the browser-related group policies available in this release of Microsoft Edge. Use the links in the table to get more details about specific policies.
Application Guard settings
Cast
HTTP-autentisering
Innebygde meldinger
Innholdsinnstillinger
Password manager and protection
Proxytjener
SmartScreen settings
Standard søkeleverandør
Startup, home page and new tab page
Utskrift
Utvidelser
Additional
Application Guard settings policies
Tilbake til toppen
ApplicationGuardContainerProxy
Application Guard Container Proxy
Supported versions:
- On Windows since 84 or later
Beskrivelse
Configures the proxy settings for Microsoft Edge Application Guard.
If you enable this policy, Microsoft Edge Application Guard ignores other sources of proxy configurations.
If you don't configure this policy, Microsoft Edge Application Guard uses the proxy configuration of the host.
This policy does not affect the proxy configuration of Microsoft Edge outside of Application Guard (on the host).
The ProxyMode field lets you specify the proxy server used by Microsoft Edge Application Guard.
The ProxyPacUrl field is a URL to a proxy .pac file.
The ProxyServer field is a URL for the proxy server.
If you choose the 'direct' value as 'ProxyMode', all other fields are ignored.
If you choose the 'auto_detect' value as 'ProxyMode', all other fields are ignored.
If you choose the 'fixed_servers' value as 'ProxyMode', the 'ProxyServer' field is used.
If you choose the 'pac_script' value as 'ProxyMode', the 'ProxyPacUrl' field is used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ApplicationGuardContainerProxy
- GP name: Application Guard Container Proxy
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Application Guard settings
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ApplicationGuardContainerProxy
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ApplicationGuardContainerProxy = {
"ProxyMode": "direct",
"ProxyPacUrl": "https://internal.site/example.pac",
"ProxyServer": "123.123.123.123:8080"
}
Tilbake til toppen
Cast policies
Tilbake til toppen
EnableMediaRouter
Enable Google Cast
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enable this policy to enable Google Cast. Users will be able to launch it from the app menu, page context menus, media controls on Cast-enabled websites, and (if shown) the Cast toolbar icon.
Disable this policy to disable Google Cast.
By default, Google Cast is enabled.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EnableMediaRouter
- GP name: Enable Google Cast
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Cast
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EnableMediaRouter
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: EnableMediaRouter
- Eksempelverdi:
<true/>
Tilbake til toppen
ShowCastIconInToolbar
Show the cast icon in the toolbar
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set this policy to true to show the Cast toolbar icon on the toolbar or the overflow menu. Users won't be able to remove it.
If you don't configure this policy or if you disable it, users can pin or remove the icon by using its contextual menu.
If you've also set the EnableMediaRouter policy to false, then this policy is ignored, and the toolbar icon isn't shown.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ShowCastIconInToolbar
- GP name: Show the cast icon in the toolbar
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Cast
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ShowCastIconInToolbar
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ShowCastIconInToolbar
- Eksempelverdi:
<false/>
Tilbake til toppen
HTTP-autentisering policies
Tilbake til toppen
AllowCrossOriginAuthPrompt
Allow cross-origin HTTP Basic Auth prompts
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Controls whether third-party sub-content on a page can open an HTTP Basic Auth dialog box.
Typically, this is disabled as a phishing defense. If you don't configure this policy, it's disabled and third-party sub-content can't open a HTTP Basic Auth dialog box.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowCrossOriginAuthPrompt
- GP name: Allow cross-origin HTTP Basic Auth prompts
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/HTTP-autentisering
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AllowCrossOriginAuthPrompt
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AllowCrossOriginAuthPrompt
- Eksempelverdi:
<false/>
Tilbake til toppen
AuthNegotiateDelegateAllowlist
Specifies a list of servers that Microsoft Edge can delegate user credentials to
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configure the list of servers that Microsoft Edge can delegate to.
Separate multiple server names with commas. Wildcards (*) are allowed.
If you don't configure this policy Microsoft Edge won't delegate user credentials even if a server is detected as Intranet.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AuthNegotiateDelegateAllowlist
- GP name: Specifies a list of servers that Microsoft Edge can delegate user credentials to
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/HTTP-autentisering
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AuthNegotiateDelegateAllowlist
- Value Type:
REG_SZ
Eksempelverdi:
contoso.com
Mac information and settings
- Preference Key Name: AuthNegotiateDelegateAllowlist
- Eksempelverdi:
<string>contoso.com</string>
Tilbake til toppen
AuthSchemes
Støttede autentiseringssystemer
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies which HTTP authentication schemes are supported.
You can configure the policy by using these values: 'basic', 'digest', 'ntlm', and 'negotiate'. Separate multiple values with commas.
If you don't configure this policy, all four schemes are used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AuthSchemes
- GP name: Støttede autentiseringssystemer
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/HTTP-autentisering
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AuthSchemes
- Value Type:
REG_SZ
Eksempelverdi:
basic,digest,ntlm,negotiate
Mac information and settings
- Preference Key Name: AuthSchemes
- Eksempelverdi:
<string>basic,digest,ntlm,negotiate</string>
Tilbake til toppen
AuthServerAllowlist
Configure list of allowed authentication servers
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies which servers to enable for integrated authentication. Integrated authentication is only enabled when Microsoft Edge receives an authentication challenge from a proxy or from a server in this list.
Separate multiple server names with commas. Wildcards (*) are allowed.
If you don't configure this policy, Microsoft Edge tries to detect if a server is on the intranet - only then will it respond to IWA requests. If the server is on the internet, IWA requests from it are ignored by Microsoft Edge.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AuthServerAllowlist
- GP name: Configure list of allowed authentication servers
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/HTTP-autentisering
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AuthServerAllowlist
- Value Type:
REG_SZ
Eksempelverdi:
*contoso.com,contoso.com
Mac information and settings
- Preference Key Name: AuthServerAllowlist
- Eksempelverdi:
<string>*contoso.com,contoso.com</string>
Tilbake til toppen
DisableAuthNegotiateCnameLookup
Deaktiver CNAME-oppslag under forhandling om Kerberos-godkjenning
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Determines whether the generated Kerberos SPN is based on the canonical DNS name (CNAME) or on the original name entered.
If you enable this policy, CNAME lookup is skipped and the server name (as entered) is used.
If you disable this policy or don't configure it, the canonical name of the server is used. This is determined through CNAME lookup.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DisableAuthNegotiateCnameLookup
- GP name: Deaktiver CNAME-oppslag under forhandling om Kerberos-godkjenning
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/HTTP-autentisering
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DisableAuthNegotiateCnameLookup
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: DisableAuthNegotiateCnameLookup
- Eksempelverdi:
<false/>
Tilbake til toppen
EnableAuthNegotiatePort
Inkluder ikke-standardisert port i SPN for Kerberos
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies whether the generated Kerberos SPN should include a non-standard port.
If you enable this policy, and a user includes a non-standard port (a port other than 80 or 443) in a URL, that port is included in the generated Kerberos SPN.
If you don't configure or disable this policy, the generated Kerberos SPN won't include a port in any case.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EnableAuthNegotiatePort
- GP name: Inkluder ikke-standardisert port i SPN for Kerberos
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/HTTP-autentisering
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EnableAuthNegotiatePort
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: EnableAuthNegotiatePort
- Eksempelverdi:
<false/>
Tilbake til toppen
NtlmV2Enabled
Control whether NTLMv2 authentication is enabled
Supported versions:
- On macOS since 77 or later
Beskrivelse
Controls whether NTLMv2 is enabled.
All recent versions of Samba and Windows servers support NTLMv2. You should only disable NTLMv2 to address issues with backwards compatibility as it reduces the security of authentication.
If you don't configure this policy, NTLMv2 is enabled by default.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Mac information and settings
- Preference Key Name: NtlmV2Enabled
- Eksempelverdi:
<true/>
Tilbake til toppen
Innebygde meldinger policies
Tilbake til toppen
NativeMessagingAllowlist
Control which native messaging hosts users can use
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
List specific native messaging hosts that users can use in Microsoft Edge.
By default, all native messaging hosts are allowed. If you set the NativeMessagingBlocklist policy to *, all native messaging hosts are blocked, and only native messaging hosts listed in here are loaded.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NativeMessagingAllowlist
- GP name: Control which native messaging hosts users can use
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innebygde meldinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist\1 = com.native.messaging.host.name1
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist\2 = com.native.messaging.host.name2
Mac information and settings
- Preference Key Name: NativeMessagingAllowlist
- Eksempelverdi:
<array>
<string>com.native.messaging.host.name1</string>
<string>com.native.messaging.host.name2</string>
</array>
Tilbake til toppen
NativeMessagingBlocklist
Configure native messaging block list
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies which native messaging hosts that shouldn't be used.
Use '*' to block all native messaging hosts unless they are explicitly listed in the allow list.
If you don't configure this policy, Microsoft Edge will load all installed native messaging hosts.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NativeMessagingBlocklist
- GP name: Configure native messaging block list
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innebygde meldinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingBlocklist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingBlocklist\1 = com.native.messaging.host.name1
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingBlocklist\2 = com.native.messaging.host.name2
Mac information and settings
- Preference Key Name: NativeMessagingBlocklist
- Eksempelverdi:
<array>
<string>com.native.messaging.host.name1</string>
<string>com.native.messaging.host.name2</string>
</array>
Tilbake til toppen
NativeMessagingUserLevelHosts
Allow user-level native messaging hosts (installed without admin permissions)
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables user-level installation of native messaging hosts.
If you disable this policy, Microsoft Edge will only use native messaging hosts installed on the system level.
By default, if you don't configure this policy, Microsoft Edge will allow usage of user-level native messaging hosts.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NativeMessagingUserLevelHosts
- GP name: Allow user-level native messaging hosts (installed without admin permissions)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innebygde meldinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
NativeMessagingUserLevelHosts
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: NativeMessagingUserLevelHosts
- Eksempelverdi:
<false/>
Tilbake til toppen
Innholdsinnstillinger policies
Tilbake til toppen
AutoSelectCertificateForUrls
Automatisk valg av klientsertifikater for disse nettstedene
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify a list of sites, based on URL patterns, for which Microsoft Edge should automatically select a client certificate, if the site requests one.
The value must be an array of stringified JSON dictionaries. Each dictionary must have the form { "pattern": "$URL_PATTERN", "filter" : $FILTER }, where $URL_PATTERN is a content setting pattern. $FILTER restricts from which client certificates the browser will automatically select. Independent of the filter, only certificates will be selected that match the server's certificate request. For example, if $FILTER has the form { "ISSUER": { "CN": "$ISSUER_CN" } }, additionally only client certificates are selected that are issued by a certificate with the CommonName $ISSUER_CN. If $FILTER contains an "ISSUER" and a "SUBJECT" section, a client certificate must satisfy both conditions to be selected. If $FILTER specifies an organization ("O"), a certificate must have at least one organization which matches the specified value to be selected. If $FILTER specifies an organization unit ("OU"), a certificate must have at least one organization unit which matches the specified value to be selected. If $FILTER is the empty dictionary {}, the selection of client certificates is not additionally restricted.
If you don't configure this policy, auto-selection isn't done for any site.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AutoSelectCertificateForUrls
- GP name: Automatisk valg av klientsertifikater for disse nettstedene
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\AutoSelectCertificateForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\AutoSelectCertificateForUrls\1 = {"pattern":"https://www.contoso.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}
Mac information and settings
- Preference Key Name: AutoSelectCertificateForUrls
- Eksempelverdi:
<array>
<string>{"pattern":"https://www.contoso.com","filter":{"ISSUER":{"CN":"certificate issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU": "certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L": "certificate subject location", "O": "certificate subject org", "OU": "certificate subject org unit"}}}</string>
</array>
Tilbake til toppen
CookiesAllowedForUrls
Allow cookies on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that are allowed to set cookies.
If you don't configure this policy, the global default value from the DefaultCookiesSetting policy (if set) or the user's personal configuration is used for all sites.
See the CookiesBlockedForUrls and CookiesSessionOnlyForUrls policies for more information.
Note there cannot be conflicting URL patterns set between these three policies:
- CookiesBlockedForUrls
- CookiesAllowedForUrls
- CookiesSessionOnlyForUrls
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CookiesAllowedForUrls
- GP name: Allow cookies on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: CookiesAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
CookiesBlockedForUrls
Block cookies on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that can't set cookies.
If you don't configure this policy, the global default value from the DefaultCookiesSetting policy (if set) or the user's personal configuration is used for all sites.
See the CookiesAllowedForUrls and CookiesSessionOnlyForUrls policies for more information.
Note there cannot be conflicting URL patterns set between these three policies:
- CookiesBlockedForUrls
- CookiesAllowedForUrls
- CookiesSessionOnlyForUrls
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CookiesBlockedForUrls
- GP name: Block cookies on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CookiesBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\CookiesBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\CookiesBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: CookiesBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
CookiesSessionOnlyForUrls
Limit cookies from specific websites to the current session
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Cookies created by websites that match a URL pattern you define are deleted when the session ends (when the window closes).
Cookies created by websites that don't match the pattern are controlled by the DefaultCookiesSetting policy (if set) or by the user's personal configuration. This is also the default behavior if you don't configure this policy.
If Microsoft Edge is running in background mode, the session might not close when the last window is closed, meaning the cookies won't be cleared when the window closes. See the BackgroundModeEnabled policy for information about configuring what happens when Microsoft Edge runs in background mode.
You can also use the CookiesAllowedForUrls and CookiesBlockedForUrls policies to control which websites can create cookies.
Note there cannot be conflicting URL patterns set between these three policies:
- CookiesBlockedForUrls
- CookiesAllowedForUrls
- CookiesSessionOnlyForUrls
If you set the RestoreOnStartup policy to restore URLs from previous sessions, this policy is ignored, and cookies are stored permanently for those sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CookiesSessionOnlyForUrls
- GP name: Limit cookies from specific websites to the current session
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CookiesSessionOnlyForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\CookiesSessionOnlyForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\CookiesSessionOnlyForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: CookiesSessionOnlyForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
DefaultCookiesSetting
Configure cookies
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Control whether websites can create cookies on the user's device. This policy is all or nothing - you can let all websites create cookies, or no websites create cookies. You can't use this policy to enable cookies from specific websites.
Set the policy to 'SessionOnly' (4) to clear cookies when the session closes. If Microsoft Edge is running in background mode, the session might not close when the last window is closed, meaning the cookies won't be cleared when the window closes. See BackgroundModeEnabled policy for information about configuring what happens when Microsoft Edge runs in background mode.
If you don't configure this policy, the default 'AllowCookies' (1) is used, and users can change this setting in Microsoft Edge Settings. (If you don't want users to be able to change this setting, set the policy.)
* 1 = Let all sites create cookies
* 2 = Don't let any site create cookies
* 4 = Keep cookies for the duration of the session
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultCookiesSetting
- GP name: Configure cookies
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultCookiesSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultCookiesSetting
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
DefaultGeolocationSetting
Standardinnstilling for geoposisjonering
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether websites can track users' physical locations. You can allow tracking by default (1), deny it by default (2), or ask the user each time a website requests their location (3).
If you don't configure this policy, 'AskGeolocation' policy is used and the user can change it.
* 1 = Allow sites to track users' physical location
* 2 = Don't allow any site to track users' physical location
* 3 = Ask whenever a site wants to track users' physical location
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultGeolocationSetting
- GP name: Standardinnstilling for geoposisjonering
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultGeolocationSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultGeolocationSetting
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
DefaultImagesSetting
Standardinnstilling for bilder
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether websites can display images. You can allow images on all sites (1) or block them on all sites (2).
If you don't configure this policy, images are allowed by default, and the user can change this setting.
* 1 = Allow all sites to show all images
* 2 = Don't allow any site to show images
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultImagesSetting
- GP name: Standardinnstilling for bilder
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultImagesSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultImagesSetting
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
DefaultInsecureContentSetting
Control use of insecure content exceptions
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Allows you to set whether users can add exceptions to allow mixed content for specific sites.
This policy can be overridden for specific URL patterns using the InsecureContentAllowedForUrls and InsecureContentBlockedForUrls policies.
If this policy isn't set, users will be allowed to add exceptions to allow blockable mixed content and disable autoupgrades for optionally blockable mixed content.
* 2 = Do not allow any site to load blockable mixed content
* 3 = Allow users to add exceptions to allow blockable mixed content
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultInsecureContentSetting
- GP name: Control use of insecure content exceptions
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultInsecureContentSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DefaultInsecureContentSetting
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
DefaultJavaScriptSetting
Standard JavaScript-innstilling
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether websites can run JavaScript. You can allow it for all sites (1) or block it for all sites (2).
If you don't configure this policy, all sites can run JavaScript by default, and the user can change this setting.
* 1 = Allow all sites to run JavaScript
* 2 = Don't allow any site to run JavaScript
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultJavaScriptSetting
- GP name: Standard JavaScript-innstilling
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultJavaScriptSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultJavaScriptSetting
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
DefaultNotificationsSetting
Standardinnstilling for varslinger
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether websites can display desktop notifications. You can allow them by default (1), deny them by default (2), or have the user be asked each time a website wants to show a notification (3).
If you don't configure this policy, notifications are allowed by default, and the user can change this setting.
* 1 = Allow sites to show desktop notifications
* 2 = Don't allow any site to show desktop notifications
* 3 = Ask every time a site wants to show desktop notifications
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultNotificationsSetting
- GP name: Standardinnstilling for varslinger
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultNotificationsSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DefaultNotificationsSetting
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
DefaultPluginsSetting
Standard Adobe Flash-innstilling
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Determines whether websites that aren't covered by PluginsAllowedForUrls or PluginsBlockedForUrls can automatically run the Adobe Flash plug-in. You can select 'BlockPlugins' (2) to block Adobe Flash on all sites, or you can select 'ClickToPlay' (3) to let Adobe Flash run but require the user to click the placeholder to start it. In any case, the PluginsAllowedForUrls and PluginsBlockedForUrls policies take precedence over 'DefaultPluginsSetting'.
Automatic playback is only allowed for domains explicitly listed in the PluginsAllowedForUrls policy. If you want to enable automatic playback for all sites, consider adding http://* and https://* to this list.
If you don't configure this policy, the user can change this setting manually.
* 2 = Block the Adobe Flash plug-in
* 3 = Click to play
The former '1' option set allow-all, but this functionality is now only handled by the PluginsAllowedForUrls policy. Existing policies using '1' will operate in Click-to-play mode.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultPluginsSetting
- GP name: Standard Adobe Flash-innstilling
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultPluginsSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DefaultPluginsSetting
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
DefaultPopupsSetting
Default pop-up window setting
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether websites can show pop-up windows. You can allow them on all websites (1) or block them on all sites (2).
If you don't configure this policy, pop-up windows are blocked by default, and users can change this setting.
* 1 = Allow all sites to show pop-ups
* 2 = Don't allow any site to show pop-up windows
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultPopupsSetting
- GP name: Default pop-up window setting
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultPopupsSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultPopupsSetting
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
DefaultWebBluetoothGuardSetting
Kontrollér bruken av Web Bluetooth API
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Control whether websites can access nearby Bluetooth devices. You can completely block access or require the site to ask the user each time it wants to access a Bluetooth device.
If you don't configure this policy, the default value (3, meaning users are asked each time) is used and users can change it.
* 2 = Don't allow any site to request access to Bluetooth devices by using the Web Bluetooth API
* 3 = Allow sites to ask the user to grant access to a nearby Bluetooth device
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultWebBluetoothGuardSetting
- GP name: Kontrollér bruken av Web Bluetooth API
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultWebBluetoothGuardSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DefaultWebBluetoothGuardSetting
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
DefaultWebUsbGuardSetting
Kontrollér bruken av WebUSB API
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether websites can access connected USB devices. You can completely block access or ask the user each time a website wants to get access to connected USB devices.
You can override this policy for specific URL patterns by using the WebUsbAskForUrls and WebUsbBlockedForUrls policies.
If you don't configure this policy, sites can ask users whether they can access the connected USB devices (3) by default, and users can change this setting.
* 2 = Don't allow any site to request access to USB devices via the WebUSB API
* 3 = Allow sites to ask the user to grant access to a connected USB device
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultWebUsbGuardSetting
- GP name: Kontrollér bruken av WebUSB API
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultWebUsbGuardSetting
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DefaultWebUsbGuardSetting
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
ImagesAllowedForUrls
Tillat bilder på disse nettstedene
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that can display images.
If you don't configure this policy, the global default value is used for all sites either from the DefaultImagesSetting policy (if set) or the user's personal configuration.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImagesAllowedForUrls
- GP name: Tillat bilder på disse nettstedene
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ImagesAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ImagesAllowedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\ImagesAllowedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: ImagesAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
ImagesBlockedForUrls
Block images on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that aren't allowed to display images.
If you don't configure this policy, the global default value from the DefaultImagesSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImagesBlockedForUrls
- GP name: Block images on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ImagesBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ImagesBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\ImagesBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: ImagesBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
InsecureContentAllowedForUrls
Allow insecure content on specified sites
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Create a list of URL patterns to specify sites that can display insecure mixed content (that is, HTTP content on HTTPS sites).
If you don't configure this policy, blockable mixed content will be blocked and optionally blockable mixed content will be upgraded. However, users will be allowed to set exceptions to allow insecure mixed content for specific sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InsecureContentAllowedForUrls
- GP name: Allow insecure content on specified sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\InsecureContentAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\InsecureContentAllowedForUrls\1 = https://www.example.com
SOFTWARE\Policies\Microsoft\Edge\InsecureContentAllowedForUrls\2 = [*.]example.edu
Mac information and settings
- Preference Key Name: InsecureContentAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Tilbake til toppen
InsecureContentBlockedForUrls
Block insecure content on specified sites
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Create a list of URL patterns to specify sites that aren't allowed to display blockable (i.e. active) mixed content (that is, HTTP content on HTTPS sites) and for which optionally blockable mixed content upgrades will be disabled.
If you don't configure this policy, blockable mixed content will be blocked and optionally blockable mixed content will be upgraded. However, users will be allowed to set exceptions to allow insecure mixed content for specific sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InsecureContentBlockedForUrls
- GP name: Block insecure content on specified sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\InsecureContentBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\InsecureContentBlockedForUrls\1 = https://www.example.com
SOFTWARE\Policies\Microsoft\Edge\InsecureContentBlockedForUrls\2 = [*.]example.edu
Mac information and settings
- Preference Key Name: InsecureContentBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Tilbake til toppen
JavaScriptAllowedForUrls
Allow JavaScript on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that are allowed to run JavaScript.
If you don't configure this policy, the global default value from the DefaultJavaScriptSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: JavaScriptAllowedForUrls
- GP name: Allow JavaScript on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\JavaScriptAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\JavaScriptAllowedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\JavaScriptAllowedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: JavaScriptAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
JavaScriptBlockedForUrls
Block JavaScript on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that aren't allowed to run JavaScript.
If you don't configure this policy, the global default value from the DefaultJavaScriptSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: JavaScriptBlockedForUrls
- GP name: Block JavaScript on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\JavaScriptBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\JavaScriptBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\JavaScriptBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: JavaScriptBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
LegacySameSiteCookieBehaviorEnabled
Enable default legacy SameSite cookie behavior setting
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Lets you revert all cookies to legacy SameSite behavior. Reverting to legacy behavior causes cookies that don't specify a SameSite attribute to be treated as if they were "SameSite=None", and removes the requirement for "SameSite=None" cookies to carry the "Secure" attribute.
You can set the following values for this policy:
* 1 = Revert to legacy SameSite behavior for cookies on all sites
* 2 = Use SameSite-by-default behavior for cookies on all sites
If you don't set this policy, the default behavior for cookies that don't specify a SameSite attribute will depend on other configuration sources for the SameSite-by-default feature. This feature might be set by a field trial or by enabling the same-site-by-default-cookies flag in edge://flags.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: LegacySameSiteCookieBehaviorEnabled
- GP name: Enable default legacy SameSite cookie behavior setting
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
LegacySameSiteCookieBehaviorEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: LegacySameSiteCookieBehaviorEnabled
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
LegacySameSiteCookieBehaviorEnabledForDomainList
Revert to legacy SameSite behavior for cookies on specified sites
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Cookies set for domains match specified patterns will revert to legacy SameSite behavior.
Reverting to legacy behavior causes cookies that don't specify a SameSite attribute to be treated as if they were "SameSite=None", and removes the requirement for "SameSite=None" cookies to carry the "Secure" attribute.
If you don't set this policy, the global default value will be used. The global default will also be used for cookies on domains not covered by the patterns you specify.
The global default value can be configured using the LegacySameSiteCookieBehaviorEnabled policy. If LegacySameSiteCookieBehaviorEnabled is unset, the global default value falls back to other configuration sources.
Note that patterns you list in this policy are treated as domains, not URLs, so you should not specify a scheme or port.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: LegacySameSiteCookieBehaviorEnabledForDomainList
- GP name: Revert to legacy SameSite behavior for cookies on specified sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\LegacySameSiteCookieBehaviorEnabledForDomainList
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = www.example.com
SOFTWARE\Policies\Microsoft\Edge\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = [*.]example.edu
Mac information and settings
- Preference Key Name: LegacySameSiteCookieBehaviorEnabledForDomainList
- Eksempelverdi:
<array>
<string>www.example.com</string>
<string>[*.]example.edu</string>
</array>
Tilbake til toppen
NotificationsAllowedForUrls
Allow notifications on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to create a list of url patterns to specify sites that are allowed to display notifications.
If you don’t set this policy, the global default value will be used for all sites. This default value will be from the DefaultNotificationsSetting policy if it’s set, or from the user's personal configuration. For detailed information on valid url patterns, see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NotificationsAllowedForUrls
- GP name: Allow notifications on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\NotificationsAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\NotificationsAllowedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\NotificationsAllowedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: NotificationsAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
NotificationsBlockedForUrls
Block notifications on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to create a list of url patterns to specify sites that are not allowed to display notifications.
If you don’t set this policy, the global default value will be used for all sites. This default value will be from the DefaultNotificationsSetting policy if it’s set, or from the user's personal configuration. For detailed information on valid url patterns, see https://cloud.google.com/docs/chrome-enterprise/policies/url-patterns.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NotificationsBlockedForUrls
- GP name: Block notifications on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\NotificationsBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\NotificationsBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\NotificationsBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: NotificationsBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
PluginsAllowedForUrls
Allow the Adobe Flash plug-in on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that can run the Adobe Flash plug-in.
If you don't configure this policy, the global default value from the DefaultPluginsSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PluginsAllowedForUrls
- GP name: Allow the Adobe Flash plug-in on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\PluginsAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\PluginsAllowedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\PluginsAllowedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: PluginsAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
PluginsBlockedForUrls
Block the Adobe Flash plug-in on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that are blocked from running Adobe Flash.
If you don't configure this policy, the global default value from the DefaultPluginsSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PluginsBlockedForUrls
- GP name: Block the Adobe Flash plug-in on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\PluginsBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\PluginsBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\PluginsBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: PluginsBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
PopupsAllowedForUrls
Allow pop-up windows on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that can open pop-up windows.
If you don't configure this policy, the global default value from the DefaultPopupsSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PopupsAllowedForUrls
- GP name: Allow pop-up windows on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: PopupsAllowedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
PopupsBlockedForUrls
Block pop-up windows on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that are blocked from opening pop-up windows.
If you don't configure this policy, the global default value from the DefaultPopupsSetting policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PopupsBlockedForUrls
- GP name: Block pop-up windows on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\PopupsBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\PopupsBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\PopupsBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: PopupsBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
RegisteredProtocolHandlers
Registrer protokollbehandlere
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Register a list of protocol handlers. Set the protocol property to the scheme (like 'mailto') and the url property to the URL pattern of the application that handles the scheme. The pattern can include a '%s', which will be replaced by the handled URL.
You can recommend a specific value for this policy, but you can't require that your users use it.
The protocol handlers registered by policy are merged with any handlers registered by the user, and both are available for use. The user can override the protocol handlers installed by policy by installing a new default handler, but they can't remove a protocol handler registered by policy.
Støttede funksjoner:
-
Can be mandatory:
Nei
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RegisteredProtocolHandlers
- GP name: Registrer protokollbehandlere
- GP path (Mandatory):
N/A
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Innholdsinnstillinger
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
N/A
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
RegisteredProtocolHandlers
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\RegisteredProtocolHandlers = [
{
"default": true,
"protocol": "mailto",
"url": "https://mail.contoso.com/mail/?extsrc=mailto&url=%s"
}
]
Mac information and settings
- Preference Key Name: RegisteredProtocolHandlers
- Eksempelverdi:
<key>RegisteredProtocolHandlers</key>
<array>
<dict>
<key>default</key>
<true/>
<key>protocol</key>
<string>mailto</string>
<key>url</key>
<string>https://mail.contoso.com/mail/?extsrc=mailto&url=%s</string>
</dict>
</array>
Tilbake til toppen
WebUsbAllowDevicesForUrls
Grant access to specific sites to connect to specific USB devices
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to set a list of urls that specify which sites will automatically be granted permission to access a USB device with the given vendor and product IDs. Each item in the list must contain both devices and urls in order for the policy to be valid. Each item in devices can contain a vendor ID and product ID field. Any ID that is omitted is treated as a wildcard with one exception, and that exception is that a product ID cannot be specified without a vendor ID also being specified. Otherwise, the policy will not be valid and will be ignored.
The USB permission model uses the URL of the requesting site ("requesting URL") and the URL of the top-level frame site ("embedding URL") to grant permission to the requesting URL to access the USB device. The requesting URL may be different than the embedding URL when the requesting site is loaded in an iframe. Therefore, the "urls" field can contain up to two URL strings delimited by a comma to specify the requesting and embedding URL respectively. If only one URL is specified, then access to the corresponding USB devices will be granted when the requesting site's URL matches this URL regardless of embedding status. The URLs in "urls" must be valid URLs, otherwise the policy will be ignored.
If this policy is left not set, the global default value will be used for all sites either from the DefaultWebUsbGuardSetting policy if it is set, or the user's personal configuration otherwise.
URL patterns in this policy should not clash with the ones configured via WebUsbBlockedForUrls. If there is a clash, this policy will take precedence over WebUsbBlockedForUrls and WebUsbAskForUrls.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebUsbAllowDevicesForUrls
- GP name: Grant access to specific sites to connect to specific USB devices
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WebUsbAllowDevicesForUrls
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\WebUsbAllowDevicesForUrls = [
{
"devices": [
{
"product_id": 5678,
"vendor_id": 1234
}
],
"urls": [
"https://contoso.com",
"https://fabrikam.com"
]
}
]
Mac information and settings
- Preference Key Name: WebUsbAllowDevicesForUrls
- Eksempelverdi:
<key>WebUsbAllowDevicesForUrls</key>
<array>
<dict>
<key>devices</key>
<array>
<dict>
<key>product_id</key>
<integer>5678</integer>
<key>vendor_id</key>
<integer>1234</integer>
</dict>
</array>
<key>urls</key>
<array>
<string>https://contoso.com</string>
<string>https://fabrikam.com</string>
</array>
</dict>
</array>
Tilbake til toppen
WebUsbAskForUrls
Allow WebUSB on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that can ask the user for access to a USB device.
If you don't configure this policy, the global default value from the DefaultWebUsbGuardSetting policy (if set) or the user's personal configuration is used for all sites.
The URL patterns defined in this policy can't conflict with those configured in the WebUsbBlockedForUrls policy - you can't both allow and block a URL.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebUsbAskForUrls
- GP name: Allow WebUSB on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\WebUsbAskForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\WebUsbAskForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\WebUsbAskForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: WebUsbAskForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
WebUsbBlockedForUrls
Block WebUSB on specific sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that can't ask the user to grant them access to a USB device.
If you don't configure this policy, the global default value from the DefaultWebUsbGuardSetting policy (if set) or the user's personal configuration is used for all sites.
URL patterns in this policy can't conflict with those configured in the WebUsbAskForUrls policy. You can't both allow and block a URL.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebUsbBlockedForUrls
- GP name: Block WebUSB on specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Innholdsinnstillinger
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\WebUsbBlockedForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\WebUsbBlockedForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\WebUsbBlockedForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: WebUsbBlockedForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
Password manager and protection policies
Tilbake til toppen
PasswordManagerEnabled
Slå på lagring av passord i passordlagringsfunksjonen
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enable Microsoft Edge to save user passwords.
If you enable this policy, users can save their passwords in Microsoft Edge. The next time they visit the site, Microsoft Edge will enter the password automatically.
If you disable this policy, users can't save new passwords, but they can still use previously saved passwords.
If you enable or disable this policy, users can't change or override it in Microsoft Edge. If you don't configure it, users can save passwords, as well as turn this feature off.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PasswordManagerEnabled
- GP name: Slå på lagring av passord i passordlagringsfunksjonen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Password manager and protection
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Password manager and protection
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
PasswordManagerEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PasswordManagerEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
PasswordProtectionChangePasswordURL
Configure the change password URL
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the change password URL (HTTP and HTTPS schemes only).
Password protection service will send users to this URL to change their password after seeing a warning in the browser.
If you enable this policy, then password protection service sends users to this URL to change their password.
If you disable this policy or don't configure it, then password protection service will not redirect users to a change password URL.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PasswordProtectionChangePasswordURL
- GP name: Configure the change password URL
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Password manager and protection
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PasswordProtectionChangePasswordURL
- Value Type:
REG_SZ
Eksempelverdi:
https://contoso.com/change_password.html
Mac information and settings
- Preference Key Name: PasswordProtectionChangePasswordURL
- Eksempelverdi:
<string>https://contoso.com/change_password.html</string>
Tilbake til toppen
PasswordProtectionLoginURLs
Configure the list of enterprise login URLs where the password protection service should capture salted hashes of a password
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configure the list of enterprise login URLs (HTTP and HTTPS schemes only) where Microsoft Edge should capture the salted hashes of passwords and use it for password reuse detection.
If you enable this policy, the password protection service captures fingerprints of passwords on the defined URLs.
If you disable this policy or don't configure it, no password fingerprints are captured.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PasswordProtectionLoginURLs
- GP name: Configure the list of enterprise login URLs where the password protection service should capture salted hashes of a password
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Password manager and protection
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\PasswordProtectionLoginURLs
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\PasswordProtectionLoginURLs\1 = https://contoso.com/login.html
SOFTWARE\Policies\Microsoft\Edge\PasswordProtectionLoginURLs\2 = https://login.contoso.com
Mac information and settings
- Preference Key Name: PasswordProtectionLoginURLs
- Eksempelverdi:
<array>
<string>https://contoso.com/login.html</string>
<string>https://login.contoso.com</string>
</array>
Tilbake til toppen
PasswordProtectionWarningTrigger
Configure password protection warning trigger
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to control when to trigger password protection warning. Password protection alerts users when they reuse their protected password on potentially suspicious sites.
You can use the PasswordProtectionLoginURLs and PasswordProtectionChangePasswordURL policies to configure which passwords to protect.
Exemptions: Passwords for the sites listed in PasswordProtectionLoginURLs and PasswordProtectionChangePasswordURL, as well as for the sites listed in SmartScreenAllowListDomains, will not trigger a password-protection warning.
Set to 'PasswordProtectionWarningOff' (0) to not show password protection warningss.
Set to 'PasswordProtectionWarningOnPasswordReuse' (1) to show password protection warnings when the user reuses their protected password on a non-allowlisted site.
If you disable or don't configure this policy, then the warning trigger is not shown.
* 0 = Password protection warning is off.
* 1 = Password protection warning is triggered by password reuse.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PasswordProtectionWarningTrigger
- GP name: Configure password protection warning trigger
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Password manager and protection
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PasswordProtectionWarningTrigger
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PasswordProtectionWarningTrigger
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
Proxytjener policies
Tilbake til toppen
ProxyBypassList
Configure proxy bypass rules
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Defines a list of hosts for which Microsoft Edge bypasses any proxy.
This policy is applied only if you have selected 'Use fixed proxy servers' in the ProxyMode policy. If you selected any other mode for configuring proxy policies, don't enable or configure this policy.
If you enable this policy, you can create a list of hosts for which Microsoft Edge doesn't use a proxy.
If you don't configure this policy, no list of hosts is created for which Microsoft Edge bypasses a proxy. Leave this policy unconfigured if you've specified any other method for setting proxy policies.
For more detailed examples go to https://go.microsoft.com/fwlink/?linkid=2094936.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ProxyBypassList
- GP name: Configure proxy bypass rules
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Proxytjener
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ProxyBypassList
- Value Type:
REG_SZ
Eksempelverdi:
https://www.contoso.com, https://www.fabrikam.com
Mac information and settings
- Preference Key Name: ProxyBypassList
- Eksempelverdi:
<string>https://www.contoso.com, https://www.fabrikam.com</string>
Tilbake til toppen
ProxyMode
Configure proxy server settings
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify the proxy server settings used by Microsoft Edge. If you enable this policy, users can't change the proxy settings.
If you choose to never use a proxy server and to always connect directly, all other options are ignored.
If you choose to use system proxy settings, all other options are ignored.
If you choose to auto detect the proxy server, all other options are ignored.
If you choose fixed server proxy mode, you can specify further options in ProxyServer and 'Comma-separated list of proxy bypass rules'.
If you choose to use a .pac proxy script, you must specify the URL to the script in 'URL to a proxy .pac file'.
For detailed examples, go to https://go.microsoft.com/fwlink/?linkid=2094936.
If you enable this policy, Microsoft Edge will ignore all proxy-related options specified from the command line.
If you don't configure this policy users can choose their own proxy settings.
* "direct" = Never use a proxy
* "auto_detect" = Auto detect proxy settings
* "pac_script" = Use a .pac proxy script
* "fixed_servers" = Use fixed proxy servers
* "system" = Use system proxy settings
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ProxyMode
- GP name: Configure proxy server settings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Proxytjener
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ProxyMode
- Value Type:
REG_SZ
Eksempelverdi:
direct
Mac information and settings
- Preference Key Name: ProxyMode
- Eksempelverdi:
<string>direct</string>
Tilbake til toppen
ProxyPacUrl
Set the proxy .pac file URL
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the URL for a proxy auto-config (PAC) file.
This policy is applied only if you selected 'Use a .pac proxy script' in the ProxyMode policy. If you selected any other mode for configuring proxy policies, don't enable or configure this policy.
If you enable this policy, you can specify the URL for a PAC file, which defines how the browser automatically chooses the appropriate proxy server for fetching a particular website.
If you disable or don't configure this policy, no PAC file is specified. Leave this policy unconfigured if you've specified any other method for setting proxy policies.
For detailed examples, see https://go.microsoft.com/fwlink/?linkid=2094936.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ProxyPacUrl
- GP name: Set the proxy .pac file URL
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Proxytjener
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ProxyPacUrl
- Value Type:
REG_SZ
Eksempelverdi:
https://internal.contoso.com/example.pac
Mac information and settings
- Preference Key Name: ProxyPacUrl
- Eksempelverdi:
<string>https://internal.contoso.com/example.pac</string>
Tilbake til toppen
ProxyServer
Configure address or URL of proxy server
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the URL of the proxy server.
This policy is applied only if you have selected 'Use fixed proxy servers' in the ProxyMode policy. If you selected any other mode for configuring proxy policies, don't enable or configure this policy.
If you enable this policy, the proxy server configured by this policy will be used for all URLs.
If you disable or don't configure this policy, users can choose their own proxy settings while in this proxy mode. Leave this policy unconfigured if you've specified any other method for setting proxy policies.
For more options and detailed examples, see https://go.microsoft.com/fwlink/?linkid=2094936.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ProxyServer
- GP name: Configure address or URL of proxy server
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Proxytjener
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ProxyServer
- Value Type:
REG_SZ
Eksempelverdi:
123.123.123.123:8080
Mac information and settings
- Preference Key Name: ProxyServer
- Eksempelverdi:
<string>123.123.123.123:8080</string>
Tilbake til toppen
ProxySettings
Innstillinger for proxy-tjener
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the proxy settings for Microsoft Edge.
If you enable this policy, Microsoft Edge ignores all proxy-related options specified from the command line.
If you don't configure this policy, users can choose their own proxy settings.
This policy overrides the following individual policies:
ProxyMode
ProxyPacUrl
ProxyServer
ProxyBypassList
The ProxyMode field lets you specify the proxy server used by Microsoft Edge and prevents users from changing proxy settings.
The ProxyPacUrl field is a URL to a proxy .pac file.
The ProxyServer field is a URL for the proxy server.
The ProxyBypassList field is a list of proxy hosts that Microsoft Edge bypasses.
If you choose the 'direct' value as 'ProxyMode', a proxy is never used and all other fields are ignored.
If you choose the 'system' value as 'ProxyMode', the systems's proxy is used and all other fields are ignored.
If you choose the 'auto_detect' value as 'ProxyMode', all other fields are ignored.
If you choose the 'fixed_server' value as 'ProxyMode', the 'ProxyServer' and 'ProxyBypassList' fields are used.
If you choose the 'pac_script' value as 'ProxyMode', the 'ProxyPacUrl' and 'ProxyBypassList' fields are used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ProxySettings
- GP name: Innstillinger for proxy-tjener
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Proxytjener
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ProxySettings
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ProxySettings = {
"ProxyBypassList": "https://www.example1.com,https://www.example2.com,https://internalsite/",
"ProxyMode": "direct",
"ProxyPacUrl": "https://internal.site/example.pac",
"ProxyServer": "123.123.123.123:8080"
}
Mac information and settings
- Preference Key Name: ProxySettings
- Eksempelverdi:
<key>ProxySettings</key>
<dict>
<key>ProxyBypassList</key>
<string>https://www.example1.com,https://www.example2.com,https://internalsite/</string>
<key>ProxyMode</key>
<string>direct</string>
<key>ProxyPacUrl</key>
<string>https://internal.site/example.pac</string>
<key>ProxyServer</key>
<string>123.123.123.123:8080</string>
</dict>
Tilbake til toppen
SmartScreen settings policies
Tilbake til toppen
PreventSmartScreenPromptOverride
Prevent bypassing Microsoft Defender SmartScreen prompts for sites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
This policy setting lets you decide whether users can override the Microsoft Defender SmartScreen warnings about potentially malicious websites.
If you enable this setting, users can't ignore Microsoft Defender SmartScreen warnings and they are blocked from continuing to the site.
If you disable or don't configure this setting, users can ignore Microsoft Defender SmartScreen warnings and continue to the site.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain; or on Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PreventSmartScreenPromptOverride
- GP name: Prevent bypassing Microsoft Defender SmartScreen prompts for sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/SmartScreen settings
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PreventSmartScreenPromptOverride
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PreventSmartScreenPromptOverride
- Eksempelverdi:
<true/>
Tilbake til toppen
PreventSmartScreenPromptOverrideForFiles
Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads
Supported versions:
- On Windows since 77 or later
- On macOS since 79 or later
Beskrivelse
This policy lets you determine whether users can override Microsoft Defender SmartScreen warnings about unverified downloads.
If you enable this policy, users in your organization can't ignore Microsoft Defender SmartScreen warnings, and they're prevented from completing the unverified downloads.
If you disable or don't configure this policy, users can ignore Microsoft Defender SmartScreen warnings and complete unverified downloads.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain; or on Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PreventSmartScreenPromptOverrideForFiles
- GP name: Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/SmartScreen settings
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PreventSmartScreenPromptOverrideForFiles
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PreventSmartScreenPromptOverrideForFiles
- Eksempelverdi:
<true/>
Tilbake til toppen
SmartScreenAllowListDomains
Configure the list of domains for which Microsoft Defender SmartScreen won't trigger warnings
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configure the list of Microsoft Defender SmartScreen trusted domains. This means:
Microsoft Defender SmartScreen won't check for potentially malicious resources like phishing software and other malware if the source URLs match these domains.
The Microsoft Defender SmartScreen download protection service won't check downloads hosted on these domains.
If you enable this policy, Microsoft Defender SmartScreen trusts these domains.
If you disable or don't set this policy, default Microsoft Defender SmartScreen protection is applied to all resources.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain; or on Windows 10 Pro or Enterprise instances that are enrolled for device management.
Also note that this policy does not apply if your organization has enabled Microsoft Defender Advanced Threat Protection. You must configure your allow and block lists in Microsoft Defender Security Center instead.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SmartScreenAllowListDomains
- GP name: Configure the list of domains for which Microsoft Defender SmartScreen won't trigger warnings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/SmartScreen settings
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\1 = mydomain.com
SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\2 = myuniversity.edu
Mac information and settings
- Preference Key Name: SmartScreenAllowListDomains
- Eksempelverdi:
<array>
<string>mydomain.com</string>
<string>myuniversity.edu</string>
</array>
Tilbake til toppen
SmartScreenEnabled
Configure Microsoft Defender SmartScreen
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
This policy setting lets you configure whether to turn on Microsoft Defender SmartScreen. Microsoft Defender SmartScreen provides warning messages to help protect your users from potential phishing scams and malicious software. By default, Microsoft Defender SmartScreen is turned on.
If you enable this setting, Microsoft Defender SmartScreen is turned on.
If you disable this setting, Microsoft Defender SmartScreen is turned off.
If you don't configure this setting, users can choose whether to use Microsoft Defender SmartScreen.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain; or on Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SmartScreenEnabled
- GP name: Configure Microsoft Defender SmartScreen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/SmartScreen settings
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/SmartScreen settings
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
SmartScreenEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SmartScreenEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
SmartScreenForTrustedDownloadsEnabled
Force Microsoft Defender SmartScreen checks on downloads from trusted sources
Supported versions:
- On Windows since 78 or later
Beskrivelse
This policy setting lets you configure whether Microsoft Defender SmartScreen checks download reputation from a trusted source.
If you enable or don't configure this setting, Microsoft Defender SmartScreen checks the download’s reputation regardless of source.
If you disable this setting, Microsoft Defender SmartScreen doesn’t check the download’s reputation when downloading from a trusted source.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain; or on Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SmartScreenForTrustedDownloadsEnabled
- GP name: Force Microsoft Defender SmartScreen checks on downloads from trusted sources
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/SmartScreen settings
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/SmartScreen settings
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
SmartScreenForTrustedDownloadsEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
SmartScreenPuaEnabled
Configure Microsoft Defender SmartScreen to block potentially unwanted apps
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
This policy setting lets you configure whether to turn on blocking for potentially unwanted apps with Microsoft Defender SmartScreen. Potentially unwanted app blocking with Microsoft Defender SmartScreen provides warning messages to help protect users from adware, coin miners, bundleware, and other low-reputation apps that are hosted by websites. Potentially unwanted app blocking with Microsoft Defender SmartScreen is turned off by default.
If you enable this setting, potentially unwanted app blocking with Microsoft Defender SmartScreen is turned on.
If you disable this setting, potentially unwanted app blocking with Microsoft Defender SmartScreen is turned off.
If you don't configure this setting, users can choose whether to use potentially unwanted app blocking with Microsoft Defender SmartScreen.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain; or on Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SmartScreenPuaEnabled
- GP name: Configure Microsoft Defender SmartScreen to block potentially unwanted apps
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/SmartScreen settings
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/SmartScreen settings
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
SmartScreenPuaEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SmartScreenPuaEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
Standard søkeleverandør policies
Tilbake til toppen
DefaultSearchProviderEnabled
Aktiver standard søkeleverandør
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables the ability to use a default search provider.
If you enable this policy, a user can search for a term by typing in the address bar (as long as what they type isn't a URL).
You can specify the default search provider to use by enabling the rest of the default search policies. If these are left empty (not configured) or configured incorrectly, the user can choose the default provider.
If you disable this policy, the user can't search from the address bar.
If you enable or disable this policy, users can't change or override it.
If you don't configure this policy, the default search provider is enabled, and the user can choose the default search provider and set the search provider list.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderEnabled
- GP name: Aktiver standard søkeleverandør
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultSearchProviderEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
DefaultSearchProviderEncodings
Kodinger av standard søkeleverandør
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify the character encodings supported by the search provider. Encodings are code page names like UTF-8, GB2312, and ISO-8859-1. They are tried in the order provided.
This policy is optional. If not configured, the default, UTF-8, is used.
This policy is applied only if you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderEncodings
- GP name: Kodinger av standard søkeleverandør
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended\DefaultSearchProviderEncodings
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\1 = UTF-8
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\2 = UTF-16
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\3 = GB2312
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\4 = ISO-8859-1
Mac information and settings
- Preference Key Name: DefaultSearchProviderEncodings
- Eksempelverdi:
<array>
<string>UTF-8</string>
<string>UTF-16</string>
<string>GB2312</string>
<string>ISO-8859-1</string>
</array>
Tilbake til toppen
DefaultSearchProviderImageURL
Specifies the search-by-image feature for the default search provider
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the URL to the search engine used for image search. Search requests are sent using the GET method.
This policy is optional. If you don't configure it, image search isn't available.
Specify Bing's Image Search URL as:
'{bing:baseURL}images/detail/search?iss=sbiupload&FORM=ANCMS1#enterInsights'.
Specify Google's Image Search URL as: '{google:baseURL}searchbyimage/upload'.
See DefaultSearchProviderImageURLPostParams policy to finish configuring image search.
This policy is applied only if you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderImageURL
- GP name: Specifies the search-by-image feature for the default search provider
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderImageURL
- Value Type:
REG_SZ
Eksempelverdi:
https://search.contoso.com/searchbyimage/upload
Mac information and settings
- Preference Key Name: DefaultSearchProviderImageURL
- Eksempelverdi:
<string>https://search.contoso.com/searchbyimage/upload</string>
Tilbake til toppen
DefaultSearchProviderImageURLPostParams
Parameters for an image URL that uses POST
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
If you enable this policy, it specifies the parameters used when an image search that uses POST is performed. The policy consists of comma-separated name/value pairs. If a value is a template parameter, like {imageThumbnail} in the preceding example, it’s replaced with real image thumbnail data. This policy is applied only if you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Specify Bing's Image Search URL Post Params as:
'imageBin={google:imageThumbnailBase64}'.
Specify Google's Image Search URL Post Params as:
'encoded_image={google:imageThumbnail},image_url={google:imageURL},sbisrc={google:imageSearchSource},original_width={google:imageOriginalWidth},original_height={google:imageOriginalHeight}'.
If you don’t set this policy, image search requests are sent using the GET method.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderImageURLPostParams
- GP name: Parameters for an image URL that uses POST
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderImageURLPostParams
- Value Type:
REG_SZ
Eksempelverdi:
content={imageThumbnail},url={imageURL},sbisrc={SearchSource}
Mac information and settings
- Preference Key Name: DefaultSearchProviderImageURLPostParams
- Eksempelverdi:
<string>content={imageThumbnail},url={imageURL},sbisrc={SearchSource}</string>
Tilbake til toppen
DefaultSearchProviderKeyword
Søkeord for standard søkeleverandør
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the keyword, which is the shortcut used in the Address Bar to trigger the search for this provider.
This policy is optional. If you don't configure it, no keyword activates the search provider.
This policy is applied only if you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderKeyword
- GP name: Søkeord for standard søkeleverandør
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderKeyword
- Value Type:
REG_SZ
Eksempelverdi:
mis
Mac information and settings
- Preference Key Name: DefaultSearchProviderKeyword
- Eksempelverdi:
<string>mis</string>
Tilbake til toppen
DefaultSearchProviderName
Navn for standard søkeleverandør
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the name of the default search provider.
If you enable this policy, you set the name of the default search provider.
If you don't enable this policy or if you leave it empty, the host name specified by the search URL is used.
'DefaultSearchProviderName' should be set to an organization-approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008. This policy is applied only if you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderName
- GP name: Navn for standard søkeleverandør
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderName
- Value Type:
REG_SZ
Eksempelverdi:
My Intranet Search
Mac information and settings
- Preference Key Name: DefaultSearchProviderName
- Eksempelverdi:
<string>My Intranet Search</string>
Tilbake til toppen
DefaultSearchProviderSearchURL
Nettadresse for søk for standard søkeleverandør
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the URL of the search engine used for a default search. The URL contains the string '{searchTerms}', which is replaced at query time by the terms the user is searching for.
Specify Bing's search URL as:
'{bing:baseURL}search?q={searchTerms}'.
Specify Google's search URL as: '{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:searchClient}{google:sourceId}ie={inputEncoding}'.
This policy is required when you enable the DefaultSearchProviderEnabled policy; if you don't enable the latter policy, this policy is ignored.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderSearchURL
- GP name: Nettadresse for søk for standard søkeleverandør
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderSearchURL
- Value Type:
REG_SZ
Eksempelverdi:
https://search.contoso.com/search?q={searchTerms}
Mac information and settings
- Preference Key Name: DefaultSearchProviderSearchURL
- Eksempelverdi:
<string>https://search.contoso.com/search?q={searchTerms}</string>
Tilbake til toppen
DefaultSearchProviderSuggestURL
Default search provider URL for suggestions
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the URL for the search engine used to provide search suggestions. The URL contains the string '{searchTerms}', which is replaced at query time by the text the user has entered so far.
This policy is optional. If you don't configure it, users won't see search suggestions; they will see suggestions from their browsing history and favorites.
Bing's suggest URL can be specified as:
'{bing:baseURL}qbox?query={searchTerms}'.
Google's suggest URL can be specified as: '{google:baseURL}complete/search?output=chrome&q={searchTerms}'.
This policy is applied only if you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultSearchProviderSuggestURL
- GP name: Default search provider URL for suggestions
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Standard søkeleverandør
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Standard søkeleverandør
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DefaultSearchProviderSuggestURL
- Value Type:
REG_SZ
Eksempelverdi:
https://search.contoso.com/suggest?q={searchTerms}
Mac information and settings
- Preference Key Name: DefaultSearchProviderSuggestURL
- Eksempelverdi:
<string>https://search.contoso.com/suggest?q={searchTerms}</string>
Tilbake til toppen
Startup, home page and new tab page policies
Tilbake til toppen
HomepageIsNewTabPage
Set the new tab page as the home page
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the default home page in Microsoft Edge. You can set the home page to a URL you specify or to the new tab page.
If you enable this policy, the new tab page is always used for the home page, and the home page URL location is ignored.
If you disable this policy, the user's home page can't be the new tab page, unless the URL is set to 'edge://newtab'.
If not configured users can choose whether the new tab page is their home page.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: HomepageIsNewTabPage
- GP name: Set the new tab page as the home page
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
HomepageIsNewTabPage
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: HomepageIsNewTabPage
- Eksempelverdi:
<true/>
Tilbake til toppen
HomepageLocation
Konfigurer nettadresse for startsiden
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the default home page URL in Microsoft Edge.
The home page is the page opened by the Home button. The pages that open on startup are controlled by the RestoreOnStartup policies.
You can either set a URL here or set the home page to open the new tab page. If you select to open the new tab page, then this policy doesn't take effect.
If you enable this policy, users can't change their home page URL, but they can choose to use the new tab page as their home page.
If you disable or don't configure this policy, users can choose their own home page, as long as the HomepageIsNewTabPage policy isn't enabled.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: HomepageLocation
- GP name: Konfigurer nettadresse for startsiden
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
HomepageLocation
- Value Type:
REG_SZ
Eksempelverdi:
https://www.contoso.com
Mac information and settings
- Preference Key Name: HomepageLocation
- Eksempelverdi:
<string>https://www.contoso.com</string>
Tilbake til toppen
NewTabPageCompanyLogo
Set new tab page company logo
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
We are deprecating this policy because it doesn't work as expected and recommend that it not be used.
Specifies the company logo to use on the new tab page in Microsoft Edge.
The policy should be configured as a string that expresses the logo(s) in JSON format. For example: { "default_logo": { "url": "https://www.contoso.com/logo.png", "hash": "cd0aa9856147b6c5b4ff2b7dfee5da20aa38253099ef1b4a64aced233c9afe29" }, "light_logo": { "url": "https://www.contoso.com/light_logo.png", "hash": "517d286edb416bb2625ccfcba9de78296e90da8e32330d4c9c8275c4c1c33737" } }
You configure this policy by specifying the URL from which Microsoft Edge can download the logo and its cryptographic hash (SHA-256), which is used to verify the integrity of the download. The logo must be in PNG or SVG format, and its file size must not exceed 16 MB. The logo is downloaded and cached, and it will be redownloaded whenever the URL or the hash changes. The URL must be accessible without any authentication.
The 'default_logo' is required and will be used when there's no background image. If 'light_logo' is provided, it will be used when the user's new tab page has a background image. We recommend a horizontal logo with a transparent background that is left-aligned and vertically centered. The logo should have a minimum height of 32 pixels and an aspect ratio from 1:1 to 4:1. The 'default_logo' should have proper contrast against a white/black background while the 'light_logo' should have proper contrast against a background image.
If you enable this policy, Microsoft Edge downloads and shows the specified logo(s) on the new tab page. Users can't override or hide the logo(s).
If you disable or don't configure this policy, Microsoft Edge will show no company logo or a Microsoft logo on the new tab page.
For help with determining the SHA-256 hash, see https://docs.microsoft.com/powershell/module/microsoft.powershell.utility/get-filehash.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NewTabPageCompanyLogo
- GP name: Set new tab page company logo (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
NewTabPageCompanyLogo
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\NewTabPageCompanyLogo = {
"default_logo": {
"hash": "cd0aa9856147b6c5b4ff2b7dfee5da20aa38253099ef1b4a64aced233c9afe29",
"url": "https://www.contoso.com/logo.png"
},
"light_logo": {
"hash": "517d286edb416bb2625ccfcba9de78296e90da8e32330d4c9c8275c4c1c33737",
"url": "https://www.contoso.com/light_logo.png"
}
}
Mac information and settings
- Preference Key Name: NewTabPageCompanyLogo
- Eksempelverdi:
<key>NewTabPageCompanyLogo</key>
<dict>
<key>default_logo</key>
<dict>
<key>hash</key>
<string>cd0aa9856147b6c5b4ff2b7dfee5da20aa38253099ef1b4a64aced233c9afe29</string>
<key>url</key>
<string>https://www.contoso.com/logo.png</string>
</dict>
<key>light_logo</key>
<dict>
<key>hash</key>
<string>517d286edb416bb2625ccfcba9de78296e90da8e32330d4c9c8275c4c1c33737</string>
<key>url</key>
<string>https://www.contoso.com/light_logo.png</string>
</dict>
</dict>
Tilbake til toppen
NewTabPageHideDefaultTopSites
Hide the default top sites from the new tab page
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Hides the default top sites from the new tab page in Microsoft Edge.
If you set this policy to true, the default top site tiles are hidden.
If you set this policy to false or don't configure it, the default top site tiles remain visible.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NewTabPageHideDefaultTopSites
- GP name: Hide the default top sites from the new tab page
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
NewTabPageHideDefaultTopSites
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: NewTabPageHideDefaultTopSites
- Eksempelverdi:
<true/>
Tilbake til toppen
NewTabPageLocation
Configure the new tab page URL
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the default URL for the new tab page.
This policy determines the page that's opened when new tabs are created (including when new windows are opened). It also affects the startup page if that's set to open to the new tab page.
This policy doesn't determine which page opens on startup; that's controlled by the RestoreOnStartup policy. It also doesn’t affect the home page if that’s set to open to the new tab page.
If you don't configure this policy, the default new tab page is used.
If you configure this policy *and* the NewTabPageSetFeedType policy, this policy has precedence.
If an invalid URL is provided, new tabs will open about://blank.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NewTabPageLocation
- GP name: Configure the new tab page URL
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
NewTabPageLocation
- Value Type:
REG_SZ
Eksempelverdi:
https://www.fabrikam.com
Mac information and settings
- Preference Key Name: NewTabPageLocation
- Eksempelverdi:
<string>https://www.fabrikam.com</string>
Tilbake til toppen
NewTabPageManagedQuickLinks
Set new tab page quick links
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
By default, Microsoft Edge displays quick links on the new tab page from user-added shortcuts and top sites based on browsing history. With this policy, you can configure up to three quick link tiles on the new tab page, expressed as a JSON object:
[ { "url": "https://www.contoso.com", "title": "Contoso Portal", "pinned": true/false }, ... ]
The 'url' field is required; 'title' and 'pinned' are optional. If 'title' is not provided, the URL is used as the default title. If 'pinned' is not provided, the default value is false.
Microsoft Edge presents these in the order listed, from left to right, with all pinned tiles displayed ahead of non-pinned tiles.
If the policy is set as mandatory, the 'pinned' field will be ignored and all tiles will be pinned. The tiles can't be deleted by the user and will always appear at the front of the quick links list.
If the policy is set as recommended, pinned tiles will remain in the list but the user has the ability to edit and delete them. Quick link tiles that aren't pinned behave like default top sites and are pushed off the list if other websites are visited more frequently. When applying non-pinned links via this policy to an existing browser profile, the links may not appear at all, depending on how they rank compared to the user's browsing history.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NewTabPageManagedQuickLinks
- GP name: Set new tab page quick links
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
NewTabPageManagedQuickLinks
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\NewTabPageManagedQuickLinks = [
{
"pinned": true,
"title": "Contoso Portal",
"url": "https://contoso.com"
},
{
"title": "Fabrikam",
"url": "https://fabrikam.com"
}
]
Mac information and settings
- Preference Key Name: NewTabPageManagedQuickLinks
- Eksempelverdi:
<key>NewTabPageManagedQuickLinks</key>
<array>
<dict>
<key>pinned</key>
<true/>
<key>title</key>
<string>Contoso Portal</string>
<key>url</key>
<string>https://contoso.com</string>
</dict>
<dict>
<key>title</key>
<string>Fabrikam</string>
<key>url</key>
<string>https://fabrikam.com</string>
</dict>
</array>
Tilbake til toppen
NewTabPageSetFeedType
Configure the Microsoft Edge new tab page experience
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
Lets you choose either the Microsoft News or Office 365 feed experience for the new tab page.
When you set this policy to Microsoft News feed experience (0), users will see the Microsoft News feed experience on the new tab page.
When you set this policy to Office 365 feed experience (1), users with an Azure Active Directory browser sign-in will see the Office 365 feed experience on the new tab page.
If you disable or don't configure this policy:
- Users with an Azure Active Directory browser sign-in are offered the Office 365 new tab page feed experience, as well as the standard new tab page feed experience.
- Users without an Azure Active Directory browser sign-in will see the standard new tab page experience.
If you configure this policy *and* the NewTabPageLocation policy, NewTabPageLocation has precedence.
Default setting: Disabled or not configured.
* 0 = Microsoft News feed experience
* 1 = Office 365 feed experience
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NewTabPageSetFeedType
- GP name: Configure the Microsoft Edge new tab page experience
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
NewTabPageSetFeedType
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: NewTabPageSetFeedType
- Eksempelverdi:
<integer>0</integer>
Tilbake til toppen
RestoreOnStartup
Action to take on startup
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify how Microsoft Edge behaves when it starts.
If you want a new tab to always open on startup, choose 'Open new tab' (5).
If you want to reopen URLs that were open the last time Microsoft Edge closed, choose 'Restore the last session' (1). The browsing session will be restored as it was. Note that this option disables some settings that rely on sessions or that perform actions on exit (such as Clear browsing data on exit or session-only cookies).
If you want to open a specific set of URLs, choose 'Open a list of URLs' (4).
Disabling this setting is equivalent to leaving it not configured. Users will be able to change it in Microsoft Edge.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances enrolled for device management.
* 1 = Restore the last session
* 4 = Open a list of URLs
* 5 = Open a new tab
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RestoreOnStartup
- GP name: Action to take on startup
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
RestoreOnStartup
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000004
Mac information and settings
- Preference Key Name: RestoreOnStartup
- Eksempelverdi:
<integer>4</integer>
Tilbake til toppen
RestoreOnStartupURLs
Sites to open when the browser starts
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify a list of websites to open automatically when the browser starts. If you don't configure this policy, no site is opened on startup.
This policy only works if you also set the RestoreOnStartup policy to 'Open a list of URLs' (4).
This policy is only available on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RestoreOnStartupURLs
- GP name: Sites to open when the browser starts
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\RestoreOnStartupURLs
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended\RestoreOnStartupURLs
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\RestoreOnStartupURLs\1 = https://contoso.com
SOFTWARE\Policies\Microsoft\Edge\RestoreOnStartupURLs\2 = https://www.fabrikam.com
Mac information and settings
- Preference Key Name: RestoreOnStartupURLs
- Eksempelverdi:
<array>
<string>https://contoso.com</string>
<string>https://www.fabrikam.com</string>
</array>
Tilbake til toppen
ShowHomeButton
Vis startsideknappen på verktøylinjen
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Shows the Home button on Microsoft Edge's toolbar.
Enable this policy to always show the Home button. Disable it to never show the button.
If you don't configure the policy, users can choose whether to show the home button.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ShowHomeButton
- GP name: Vis startsideknappen på verktøylinjen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Startup, home page and new tab page
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Startup, home page and new tab page
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ShowHomeButton
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ShowHomeButton
- Eksempelverdi:
<true/>
Tilbake til toppen
Utskrift policies
Tilbake til toppen
DefaultPrinterSelection
Regler for valg av standardskriver
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Overrides Microsoft Edge default printer selection rules. This policy determines the rules for selecting the default printer in Microsoft Edge, which happens the first time a user tries to print a page.
When this policy is set, Microsoft Edge tries to find a printer that matches all of the specified attributes and uses it as default printer. If there are multiple printers that meet the criteria, the first printer that matches is used.
If you don't configure this policy or no matching printers are found within the timeout, the printer defaults to the built-in PDF printer or no printer, if the PDF printer isn't available.
The value is parsed as a JSON object, conforming to the following schema: { "type": "object", "properties": { "idPattern": { "description": "Regular expression to match printer id.", "type": "string" }, "namePattern": { "description": "Regular expression to match printer display name.", "type": "string" } } }
Omitting a field means all values match; for example, if you don't specify connectivity Print Preview starts discovering all kinds of local printers. Regular expression patterns must follow the JavaScript RegExp syntax and matches are case sensitive.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultPrinterSelection
- GP name: Regler for valg av standardskriver
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utskrift
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultPrinterSelection
- Value Type:
REG_SZ
Eksempelverdi:
{ "idPattern": ".*public", "namePattern": ".*Color" }
Mac information and settings
- Preference Key Name: DefaultPrinterSelection
- Eksempelverdi:
<string>{ "idPattern": ".*public", "namePattern": ".*Color" }</string>
Tilbake til toppen
PrintHeaderFooter
Print headers and footers
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Force 'headers and footers' to be on or off in the printing dialog.
If you don't configure this policy, users can decide whether to print headers and footers.
If you disable this policy, users can't print headers and footers.
If you enable this policy, users always print headers and footers.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PrintHeaderFooter
- GP name: Print headers and footers
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utskrift
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Utskrift
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
PrintHeaderFooter
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: PrintHeaderFooter
- Eksempelverdi:
<false/>
Tilbake til toppen
PrintPreviewUseSystemDefaultPrinter
Set the system default printer as the default printer
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Tells Microsoft Edge to use the system default printer as the default choice in Print Preview instead of the most recently used printer.
If you disable this policy or don't configure it, Print Preview uses the most recently used printer as the default destination choice.
If you enable this policy, Print Preview uses the OS system default printer as the default destination choice.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PrintPreviewUseSystemDefaultPrinter
- GP name: Set the system default printer as the default printer
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utskrift
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/Utskrift
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
PrintPreviewUseSystemDefaultPrinter
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: PrintPreviewUseSystemDefaultPrinter
- Eksempelverdi:
<false/>
Tilbake til toppen
PrintingEnabled
Aktiver utskrift
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables printing in Microsoft Edge and prevents users from changing this setting.
If you enable this policy or don't configure it, users can print.
If you disable this policy, users can't print from Microsoft Edge. Printing is disabled in the wrench menu, extensions, JavaScript applications, and so on. Users can still print from plug-ins that bypass Microsoft Edge while printing. For example, certain Adobe Flash applications have the print option in their context menu, which isn't covered by this policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PrintingEnabled
- GP name: Aktiver utskrift
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utskrift
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PrintingEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PrintingEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
UseSystemPrintDialog
Print using system print dialog
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Shows the system print dialog instead of print preview.
If you enable this policy, Microsoft Edge opens the system print dialog instead of the built-in print preview when a user prints a page.
If you don't configure or disable this policy, print commands trigger the Microsoft Edge print preview screen.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: UseSystemPrintDialog
- GP name: Print using system print dialog
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utskrift
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
UseSystemPrintDialog
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: UseSystemPrintDialog
- Eksempelverdi:
<false/>
Tilbake til toppen
Utvidelser policies
Tilbake til toppen
ExtensionAllowedTypes
Configure allowed extension types
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Controls which extension types can be installed and limits runtime access.
This setting defines the allowed types of extensions and which hosts they can interact with. The value is a list of strings, each of which should be one of the following: "extension", "theme", "user_script", and "hosted_app". See the Microsoft Edge extensions documentation for more information on these types.
Note that this policy also affects extensions to be force-installed by using ExtensionInstallForcelist policy.
If you enable this policy, only extensions that match a type in the list are installed.
If you don't configure this policy, no restrictions on the acceptable extension types are enforced.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExtensionAllowedTypes
- GP name: Configure allowed extension types
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utvidelser
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ExtensionAllowedTypes
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ExtensionAllowedTypes\1 = hosted_app
Mac information and settings
- Preference Key Name: ExtensionAllowedTypes
- Eksempelverdi:
<array>
<string>hosted_app</string>
</array>
Tilbake til toppen
ExtensionInstallAllowlist
Allow specific extensions to be installed
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
By default, all extensions are allowed. However, if you block all extensions by setting the 'ExtensionInstallBlockList' policy to "*," users can only install extensions defined in this policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExtensionInstallAllowlist
- GP name: Allow specific extensions to be installed
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utvidelser
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\1 = extension_id1
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\2 = extension_id2
Mac information and settings
- Preference Key Name: ExtensionInstallAllowlist
- Eksempelverdi:
<array>
<string>extension_id1</string>
<string>extension_id2</string>
</array>
Tilbake til toppen
ExtensionInstallBlocklist
Control which extensions cannot be installed
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
List specific extensions that users can NOT install in Microsoft Edge. When you deploy this policy, any extensions on this list that were previously installed will be disabled, and the user won't be able to enable them. If you remove an item from the list of blocked extensions, that extension is automatically re-enabled anywhere it was previously installed.
Use "*" to block all extensions that aren't explicitly listed in the allow list.
If you don't configure this policy, users can install any extension in Microsoft Edge.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExtensionInstallBlocklist
- GP name: Control which extensions cannot be installed
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utvidelser
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallBlocklist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallBlocklist\1 = extension_id1
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallBlocklist\2 = extension_id2
Mac information and settings
- Preference Key Name: ExtensionInstallBlocklist
- Eksempelverdi:
<array>
<string>extension_id1</string>
<string>extension_id2</string>
</array>
Tilbake til toppen
ExtensionInstallForcelist
Control which extensions are installed silently
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies extensions that are installed silently, without user interaction, and that the users can't uninstall or disable ("force-installed"). All permissions requested by the extensions are granted implicitly, without user interaction, including any additional permissions requested by future versions of the extension. Furthermore, permissions are granted for the enterprise.deviceAttributes and enterprise.platformKeys extension APIs. (These two APIs are only available to extensions that are force-installed.)
This policy takes precedence over a potentially conflicting ExtensionInstallBlocklist policy. When you take an extension off of the force-installed list it's automatically uninstalled by Microsoft Edge.
For Windows devices that aren't joined to a Microsoft Active Directory domain, forced installation is limited to extensions available in the Microsoft Store.
Note that users can modify the source code of any extension by using Developer Tools, potentially rendering the extension dysfunctional. If this is a concern, set the DeveloperToolsAvailability policy.
Use the following format to add an extension to the list:
[extensionID];[updateURL]
- extensionID - the 32-letter string found on edge://extensions when in developer mode.
- updateURL (optional) is the address of the Update Manifest XML document for the app or extension, as described at https://go.microsoft.com/fwlink/?linkid=2095043. If you want to install an extension from the Chrome Web Store, provide the Chrome Web Store update URL, https://clients2.google.com/service/update2/crx. Note that the update URL set in this policy is only used for the initial installation; subsequent updates of the extension use the update URL indicated in the extension's manifest. If you don't set the updateURL, the extension is assumed to be hosted in Microsoft Store and the following update URL is used (https://edge.microsoft.com/extensionwebstorebase/v1/crx).
For example, gggmmkjegpiggikcnhidnjjhmicpibll;https://edge.microsoft.com/extensionwebstorebase/v1/crx installs the Microsoft Online app from the Microsoft Store "update" URL. For more information about hosting extensions, see: https://go.microsoft.com/fwlink/?linkid=2095044.
If you don't configure this policy, no extensions are installed automatically, and users can uninstall any extension in Microsoft Edge.
Note that this policy doesn't apply to InPrivate mode.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExtensionInstallForcelist
- GP name: Control which extensions are installed silently
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utvidelser
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist\1 = gbchcmhmhahfdphkhkmpfmihenigjmpp;https://edge.microsoft.com/extensionwebstorebase/v1/crx
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist\2 = abcdefghijklmnopabcdefghijklmnop
Mac information and settings
- Preference Key Name: ExtensionInstallForcelist
- Eksempelverdi:
<array>
<string>gbchcmhmhahfdphkhkmpfmihenigjmpp;https://edge.microsoft.com/extensionwebstorebase/v1/crx</string>
<string>abcdefghijklmnopabcdefghijklmnop</string>
</array>
Tilbake til toppen
ExtensionInstallSources
Configure extension and user script install sources
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define URLs that can install extensions and themes.
By default, users have to download a *.crx file for each extension or script they want to install, and then drag it onto the Microsoft Edge settings page. This policy lets specific URLs use install the extension or script for the user.
Each item in this list is an extension-style match pattern (see https://go.microsoft.com/fwlink/?linkid=2095039). Users can easily install items from any URL that matches an item in this list. Both the location of the *.crx file and the page where the download is started from (in other words, the referrer) must be allowed by these patterns.
The ExtensionInstallBlocklist policy takes precedence over this policy. Any extensions that's on the block list won't be installed, even if it comes from a site on this list.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExtensionInstallSources
- GP name: Configure extension and user script install sources
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utvidelser
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallSources
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallSources\1 = https://corp.contoso.com/*
Mac information and settings
- Preference Key Name: ExtensionInstallSources
- Eksempelverdi:
<array>
<string>https://corp.contoso.com/*</string>
</array>
Tilbake til toppen
ExtensionSettings
Configure extension management settings
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures extension management settings for Microsoft Edge.
This policy controls multiple settings, including settings controlled by any existing extension-related policies. This policy overrides any legacy policies if both are set.
This policy maps an extension ID or an update URL to its configuration. With an extension ID, the configuration is applied only to the specified extension. Set a default configuration for the special ID "*", to apply to all extensions that aren't specifically listed in this policy. With an update URL, the configuration is applied to all extensions with the exact update URL stated in manifest of this extension, as described at https://go.microsoft.com/fwlink/?linkid=2095043.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExtensionSettings
- GP name: Configure extension management settings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/Utvidelser
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ExtensionSettings
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ExtensionSettings = {
"*": {
"allowed_types": [
"hosted_app"
],
"blocked_install_message": "Custom error message.",
"blocked_permissions": [
"downloads",
"bookmarks"
],
"install_sources": [
"https://company-intranet/apps"
],
"installation_mode": "blocked",
"runtime_allowed_hosts": [
"*://good.contoso.com"
],
"runtime_blocked_hosts": [
"*://*.contoso.com"
]
},
"abcdefghijklmnopabcdefghijklmnop": {
"blocked_permissions": [
"history"
],
"installation_mode": "allowed",
"minimum_version_required": "1.0.1"
},
"bcdefghijklmnopabcdefghijklmnopa": {
"allowed_permissions": [
"downloads"
],
"installation_mode": "force_installed",
"runtime_allowed_hosts": [
"*://good.contoso.com"
],
"runtime_blocked_hosts": [
"*://*.contoso.com"
],
"update_url": "https://contoso.com/update_url"
},
"cdefghijklmnopabcdefghijklmnopab": {
"blocked_install_message": "Custom error message.",
"installation_mode": "blocked"
},
"defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd": {
"blocked_install_message": "Custom error message.",
"installation_mode": "blocked"
},
"fghijklmnopabcdefghijklmnopabcde": {
"blocked_install_message": "Custom removal message.",
"installation_mode": "removed"
},
"update_url:https://www.contoso.com/update.xml": {
"allowed_permissions": [
"downloads"
],
"blocked_permissions": [
"wallpaper"
],
"installation_mode": "allowed"
}
}
Mac information and settings
- Preference Key Name: ExtensionSettings
- Eksempelverdi:
<key>ExtensionSettings</key>
<dict>
<key>*</key>
<dict>
<key>allowed_types</key>
<array>
<string>hosted_app</string>
</array>
<key>blocked_install_message</key>
<string>Custom error message.</string>
<key>blocked_permissions</key>
<array>
<string>downloads</string>
<string>bookmarks</string>
</array>
<key>install_sources</key>
<array>
<string>https://company-intranet/apps</string>
</array>
<key>installation_mode</key>
<string>blocked</string>
<key>runtime_allowed_hosts</key>
<array>
<string>*://good.contoso.com</string>
</array>
<key>runtime_blocked_hosts</key>
<array>
<string>*://*.contoso.com</string>
</array>
</dict>
<key>abcdefghijklmnopabcdefghijklmnop</key>
<dict>
<key>blocked_permissions</key>
<array>
<string>history</string>
</array>
<key>installation_mode</key>
<string>allowed</string>
<key>minimum_version_required</key>
<string>1.0.1</string>
</dict>
<key>bcdefghijklmnopabcdefghijklmnopa</key>
<dict>
<key>allowed_permissions</key>
<array>
<string>downloads</string>
</array>
<key>installation_mode</key>
<string>force_installed</string>
<key>runtime_allowed_hosts</key>
<array>
<string>*://good.contoso.com</string>
</array>
<key>runtime_blocked_hosts</key>
<array>
<string>*://*.contoso.com</string>
</array>
<key>update_url</key>
<string>https://contoso.com/update_url</string>
</dict>
<key>cdefghijklmnopabcdefghijklmnopab</key>
<dict>
<key>blocked_install_message</key>
<string>Custom error message.</string>
<key>installation_mode</key>
<string>blocked</string>
</dict>
<key>defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd</key>
<dict>
<key>blocked_install_message</key>
<string>Custom error message.</string>
<key>installation_mode</key>
<string>blocked</string>
</dict>
<key>fghijklmnopabcdefghijklmnopabcde</key>
<dict>
<key>blocked_install_message</key>
<string>Custom removal message.</string>
<key>installation_mode</key>
<string>removed</string>
</dict>
<key>update_url:https://www.contoso.com/update.xml</key>
<dict>
<key>allowed_permissions</key>
<array>
<string>downloads</string>
</array>
<key>blocked_permissions</key>
<array>
<string>wallpaper</string>
</array>
<key>installation_mode</key>
<string>allowed</string>
</dict>
</dict>
Tilbake til toppen
Additional policies
Tilbake til toppen
AddressBarMicrosoftSearchInBingProviderEnabled
Enable Microsoft Search in Bing suggestions in the address bar
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
Enables the display of relevant Microsoft Search in Bing suggestions in the address bar's suggestion list when the user types a search string in the address bar. If you enable or don't configure this policy, users can see internal results powered by Microsoft Search in Bing in the Microsoft Edge address bar suggestion list. To see the Microsoft Search in Bing results, the user must be signed into Microsoft Edge with their Azure AD account for that organization.
If you disable this policy, users can't see internal results in the Microsoft Edge address bar suggestion list.
If you have enabled the set of policies which forces a default search provider (DefaultSearchProviderEnabled, DefaultSearchProviderName and DefaultSearchProviderSearchURL), and the search provider specified is not Bing, then this policy is not applicable and there will be no Microsoft Search in Bing suggestions in the address bar's suggestion list.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AddressBarMicrosoftSearchInBingProviderEnabled
- GP name: Enable Microsoft Search in Bing suggestions in the address bar
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AddressBarMicrosoftSearchInBingProviderEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AddressBarMicrosoftSearchInBingProviderEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
AdsSettingForIntrusiveAdsSites
Annonseinnstillinger for nettsteder med forstyrrende annonser
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Controls whether ads are blocked on sites with intrusive ads. You can set this policy to one of the following options:
* 1 = Allow ads on all sites.
* 2 = Block ads on sites with intrusive ads (Default value).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AdsSettingForIntrusiveAdsSites
- GP name: Annonseinnstillinger for nettsteder med forstyrrende annonser
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AdsSettingForIntrusiveAdsSites
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AdsSettingForIntrusiveAdsSites
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
AllowDeletingBrowserHistory
Gjør det mulig å slette nettleser- og nedlastingslogg
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables deleting browser history and download history and prevents users from changing this setting.
Note that even with this policy is disabled, the browsing and download history aren't guaranteed to be retained: users can edit or delete the history database files directly, and the browser itself may remove (based on expiration period) or archive any or all history items at any time.
If you enable this policy or don't configure it, users can delete the browsing and download history.
If you disable this policy, users can't delete browsing and download history.
If you enable this policy, don't enable the ClearBrowsingDataOnExit policy, because they both deal with deleting data. If you enable both, the ClearBrowsingDataOnExit policy takes precedence and deletes all data when Microsoft Edge closes, regardless of how this policy is configured.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowDeletingBrowserHistory
- GP name: Gjør det mulig å slette nettleser- og nedlastingslogg
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AllowDeletingBrowserHistory
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AllowDeletingBrowserHistory
- Eksempelverdi:
<true/>
Tilbake til toppen
AllowFileSelectionDialogs
Allow file selection dialogs
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allow access to local files by letting Microsoft Edge display file selection dialogs.
If you enable or don't configure this policy, users can open file selection dialogs as normal.
If you disable this policy, whenever the user performs an action that triggers a file selection dialog (like importing favorites, uploading files, or saving links), a message is displayed instead, and the user is assumed to have clicked Cancel on the file selection dialog.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowFileSelectionDialogs
- GP name: Allow file selection dialogs
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AllowFileSelectionDialogs
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AllowFileSelectionDialogs
- Eksempelverdi:
<true/>
Tilbake til toppen
AllowPopupsDuringPageUnload
Tillater sider å vise forgrunnsvinduer mens de lastes ut
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
This policy allows an admin to specify that a page can show popups during its unloading.
When the policy is set to enabled, pages are allowed to show popups while they're being unloaded.
When the policy is set to disabled or unset, pages aren't allowed to show popups while they're being unloaded. This is as per the spec: (https://html.spec.whatwg.org/#apis-for-creating-and-navigating-browsing-contexts-by-name).
This policy will be removed in the future.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowPopupsDuringPageUnload
- GP name: Tillater sider å vise forgrunnsvinduer mens de lastes ut
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AllowPopupsDuringPageUnload
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AllowPopupsDuringPageUnload
- Eksempelverdi:
<false/>
Tilbake til toppen
AllowSurfGame
Allow surf game
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
If you disable this policy, users won't be able to play the surf game when the device is offline or if the user navigates to edge://surf.
If you enable or don't configure this policy, users can play the surf game.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowSurfGame
- GP name: Allow surf game
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AllowSurfGame
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AllowSurfGame
- Eksempelverdi:
<false/>
Tilbake til toppen
AllowSyncXHRInPageDismissal
Allow pages to send synchronous XHR requests during page dismissal
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
This policy is deprecated because it's only intended to be a short-term mechanism to give enterprises more time to update their web content if and when it's found to be incompatible with the change to disallow synchronous XHR requests during page dismissal. It won't work in Microsoft Edge as soon as version 88.
This policy lets you specify that a page can send synchronous XHR requests during page dismissal.
If you enable this policy, pages can send synchronous XHR requests during page dismissal.
If you disable this policy or don't configure this policy, pages aren't allowed to send synchronous XHR requests during page dismissal.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowSyncXHRInPageDismissal
- GP name: Allow pages to send synchronous XHR requests during page dismissal (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AllowSyncXHRInPageDismissal
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AllowSyncXHRInPageDismissal
- Eksempelverdi:
<false/>
Tilbake til toppen
AllowTokenBindingForUrls
Configure the list of sites for which Microsoft Edge will attempt to establish a Token Binding with.
Supported versions:
- On Windows since 83 or later
Beskrivelse
Configure the list of URL patterns for sites that the browser will attempt to perform the Token Binding protocol with.
For the domains on this list, the browser will send the Token Binding ClientHello in the TLS handshake (See https://tools.ietf.org/html/rfc8472).
If the server responds with a valid ServerHello response, the browser will create and send Token Binding messages on subsequent https requests. See https://tools.ietf.org/html/rfc8471 for more info.
If this list is empty, Token Binding will be disabled.
This policy is only available on Windows 10 devices with Virtual Secure Mode capability.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowTokenBindingForUrls
- GP name: Configure the list of sites for which Microsoft Edge will attempt to establish a Token Binding with.
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls\1 = mydomain.com
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls\2 = [*.]mydomain2.com
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls\3 = [*.].mydomain2.com
Tilbake til toppen
AllowTrackingForUrls
Configure tracking prevention exceptions for specific sites
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Configure the list of URL patterns that are excluded from tracking prevention.
If you configure this policy, the list of configured URL patterns is excluded from tracking prevention.
If you don't configure this policy, the global default value from the "Block tracking of users' web-browsing activity" policy (if set) or the user's personal configuration is used for all sites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AllowTrackingForUrls
- GP name: Configure tracking prevention exceptions for specific sites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\AllowTrackingForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\AllowTrackingForUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\AllowTrackingForUrls\2 = [*.]contoso.edu
Mac information and settings
- Preference Key Name: AllowTrackingForUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Tilbake til toppen
AlternateErrorPagesEnabled
Suggest similar pages when a webpage can’t be found
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Allow Microsoft Edge to issue a connection to a web service to generate URL and search suggestions for connectivity issues such as DNS errors.
If you enable this policy, a web service is used to generate url and search suggestions for network errors.
If you disable this policy, no calls to the web service are made and a standard error page is shown.
If you don't configure this policy, Microsoft Edge respects the user preference that's set under Services at edge://settings/privacy.
Specifically, there's a **Suggest similar pages when a webpage can’t be found** toggle, which the user can switch on or off. Note that if you have enable this policy (AlternateErrorPagesEnabled), the Suggest similar pages when a webpage can’t be found setting is turned on, but the user can't change the setting by using the toggle. If you disable this policy, the Suggest similar pages when a webpage can’t be found setting is turned off, and the user can't change the setting by using the toggle.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AlternateErrorPagesEnabled
- GP name: Suggest similar pages when a webpage can’t be found
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
AlternateErrorPagesEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AlternateErrorPagesEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
AlwaysOpenPdfExternally
Always open PDF files externally
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Disables the internal PDF viewer in Microsoft Edge.
If you enable this policy Microsoft Edge treats PDF files as downloads and lets users open them with the default application.
If you don't configure this policy or disable it, Microsoft Edge will open PDF files (unless the user disables it).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AlwaysOpenPdfExternally
- GP name: Always open PDF files externally
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AlwaysOpenPdfExternally
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AlwaysOpenPdfExternally
- Eksempelverdi:
<true/>
Tilbake til toppen
AmbientAuthenticationInPrivateModesEnabled
Enable Ambient Authentication for InPrivate and Guest profiles
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
Configure this policy to allow/disallow ambient authentication for InPrivate and Guest profiles in Microsoft Edge.
Ambient Authentication is http authentication with default credentials when explicit credentials aren't provided via NTLM/Kerberos/Negotiate challenge/response schemes.
If you set the policy to RegularOnly (value 0), it allows ambient authentication for Regular sessions only. InPrivate and Guest sessions won't be allowed to ambiently authenticate.
If you set the policy to InPrivateAndRegular (value 1), it allows ambient authentication for InPrivate and Regular sessions. Guest sessions won't be allowed to ambiently authenticate.
If you set the policy to GuestAndRegular (value 2), it allows ambient authentication for Guest and Regular sessions. InPrivate sessions won't be allowed to ambiently authenticate
If you set the policy to All (value 3), it allows ambient authentication for all sessions.
Note that ambient authentication is always allowed on regular profiles.
In Microsoft Edge version 81 and later, if the policy is left not set, ambient authentication will be enabled in regular sessions only.
* 0 = Enable ambient authentication in regular sessions only
* 1 = Enable ambient authentication in InPrivate and regular sessions
* 2 = Enable ambient authentication in guest and regular sessions
* 3 = Enable ambient authentication in regular, InPrivate and guest sessions
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AmbientAuthenticationInPrivateModesEnabled
- GP name: Enable Ambient Authentication for InPrivate and Guest profiles
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AmbientAuthenticationInPrivateModesEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AmbientAuthenticationInPrivateModesEnabled
- Eksempelverdi:
<integer>0</integer>
Tilbake til toppen
AppCacheForceEnabled
Allows the AppCache feature to be re-enabled, even if it's turned off by default
Supported versions:
- On Windows and macOS since 84 or later
Beskrivelse
If you set this policy to true, the AppCache is enabled, even when AppCache in Microsoft Edge is not available by default.
If you set this policy to false, or don't set it, AppCache will follow Microsoft Edge's defaults.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AppCacheForceEnabled
- GP name: Allows the AppCache feature to be re-enabled, even if it's turned off by default
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AppCacheForceEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AppCacheForceEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
ApplicationLocaleValue
Set application locale
Supported versions:
- On Windows since 77 or later
Beskrivelse
Configures the application locale in Microsoft Edge and prevents users from changing the locale.
If you enable this policy, Microsoft Edge uses the specified locale. If the configured locale isn't supported, 'en-US' is used instead.
If you disable or don't configure this setting, Microsoft Edge uses either the user-specified preferred locale (if configured) or the fallback locale 'en-US'.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ApplicationLocaleValue
- GP name: Set application locale
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ApplicationLocaleValue
- Value Type:
REG_SZ
Eksempelverdi:
en
Tilbake til toppen
AudioCaptureAllowed
Allow or block audio capture
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to set whether a user is prompted to grant a website access to their audio capture device. This policy applies to all URLs except for those configured in the AudioCaptureAllowedUrls list.
If you enable this policy or don't configure it (the default setting), the user is prompted for audio capture access except from the URLs in the AudioCaptureAllowedUrls list. These listed URLs are granted access without prompting.
If you disable this policy, the user is not prompted, and audio capture is accessible only to the URLs configured in AudioCaptureAllowedUrls.
This policy affects all types of audio inputs, not only the built-in microphone.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AudioCaptureAllowed
- GP name: Allow or block audio capture
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AudioCaptureAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AudioCaptureAllowed
- Eksempelverdi:
<false/>
Tilbake til toppen
AudioCaptureAllowedUrls
Sites that can access audio capture devices without requesting permission
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify websites, based on URL patterns, that can use audio capture devices without asking the user for permission. Patterns in this list are matched against the security origin of the requesting URL. If they match, the site is automatically granted access to audio capture devices.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AudioCaptureAllowedUrls
- GP name: Sites that can access audio capture devices without requesting permission
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\AudioCaptureAllowedUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\AudioCaptureAllowedUrls\1 = https://www.contoso.com/
SOFTWARE\Policies\Microsoft\Edge\AudioCaptureAllowedUrls\2 = https://[*.]contoso.edu/
Mac information and settings
- Preference Key Name: AudioCaptureAllowedUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com/</string>
<string>https://[*.]contoso.edu/</string>
</array>
Tilbake til toppen
AudioSandboxEnabled
Allow the audio sandbox to run
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
This policy controls the audio process sandbox.
If you enable this policy, the audio process will run sandboxed.
If you disable this policy, the audio process will run unsandboxed and the WebRTC audio-processing module will run in the renderer process.
This leaves users open to security risks related to running the audio subsystem unsandboxed.
If you don't configure this policy, the default configuration for the audio sandbox will be used, which might differ based on the platform.
This policy is intended to give enterprises flexibility to disable the audio sandbox if they use security software setups that interfere with the sandbox.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AudioSandboxEnabled
- GP name: Allow the audio sandbox to run
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AudioSandboxEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AudioSandboxEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
AutoImportAtFirstRun
Automatically import another browser's data and settings at first run
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
If you enable this policy, all supported datatypes and settings from the specified browser will be silently and automatically imported at first run. During the First Run Experience, the import section will also be skipped.
The browser data from Microsoft Edge Legacy will always be silently migrated at the first run, irrespective of the value of this policy. You can use the following values for this policy:
* 0 = Automatically imports all supported datatypes and settings from the default browser
* 1 = Automatically imports all supported datatypes and settings from Internet Explorer
* 2 = Automatically imports all supported datatypes and settings from Google Chrome
* 3 = Automatically imports all supported datatypes and settings from Safari
* 4 = Disables automatic import, and the import section of the first-run experience is skipped
* 5 = Automatically imports all supported datatypes and settings from Mozilla Firefox
If this policy is set to the default value (0), then the datatypes corresponding to the default browser on the managed device will be imported.
If the browser specified as the value of this policy is not present in the managed device, Microsoft Edge will simply skip the import without any notification to the user.
If you set this policy to 'DisabledAutoImport' (4), the import section of the first-run experience is skipped entirely and Microsoft Edge doesn't import browser data and settings automatically.
If this policy is set to the value of Internet Explorer (1), the following datatypes will be imported from Internet Explorer:
1. Favorites or bookmarks
2. Saved passwords
3. Search engines
4. Browsing history
5. Home page
If this policy is set to the value of Google Chrome (2), the following datatypes will be imported from Google Chrome:
1. Favorites
2. Saved passwords
3. Addresses and more
4. Payment info
5. Browsing history
6. Settings
7. Pinned and Open tabs
8. Extensions
9. Cookies
Note: For more details on what is imported from Google Chrome, please see https://go.microsoft.com/fwlink/?linkid=2120835
If this policy is set to the value of Safari (3), the following datatypes will be imported from Safari:
1. Favorites or bookmarks
2. Browsing history
Starting with Microsoft Edge version 83, if this policy is set to the value of Mozilla Firefox (5), the following datatypes will be imported from Mozilla Firefox:
1. Favorites or bookmarks
2. Saved passwords
3. Addresses and more
4. Browsing History
If you want to restrict specific datatypes from getting imported on the managed devices, you can use this policy with other policies such as ImportAutofillFormData, ImportBrowserSettings, ImportFavorites, and etc.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AutoImportAtFirstRun
- GP name: Automatically import another browser's data and settings at first run
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AutoImportAtFirstRun
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: AutoImportAtFirstRun
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
AutofillAddressEnabled
Slå på autofyll for adresser
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables the AutoFill feature and allows users to auto-complete address information in web forms using previously stored information.
If you disable this policy, AutoFill never suggests or fills in address information, nor does it save additional address information that the user might submit while browsing the web.
If you enable this policy or don't configure it, users can control AutoFill for addresses in the user interface.
Note that if you disable this policy you also stop all activity for all web forms, except payment and password forms. No further entries are saved, and Microsoft Edge won't suggest or AutoFill any previous entries.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AutofillAddressEnabled
- GP name: Slå på autofyll for adresser
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
AutofillAddressEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AutofillAddressEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
AutofillCreditCardEnabled
Slå på autofyll for kredittkort
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables Microsoft Edge's AutoFill feature and lets users auto complete credit card information in web forms using previously stored information.
If you disable this policy, AutoFill never suggests or fills credit card information, nor will it save additional credit card information that users might submit while browsing the web.
If you enable this policy or don't configure it, users can control AutoFill for credit cards.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AutofillCreditCardEnabled
- GP name: Slå på autofyll for kredittkort
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
AutofillCreditCardEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: AutofillCreditCardEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
AutoplayAllowed
Allow media autoplay for websites
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
This policy sets the media autoplay policy for websites.
The default setting, "Not configured" respects the current media autoplay settings and lets users configure their autoplay settings.
Setting to "Enabled" sets media autoplay to "Allow". All websites are allowed to autoplay media. Users can’t override this policy.
Setting to "Disabled" sets media autoplay to "Block". No websites are allowed to autoplay media. Users can’t override this policy.
A tab will need to be closed and re-opened for this policy to take effect.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: AutoplayAllowed
- GP name: Allow media autoplay for websites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
AutoplayAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: AutoplayAllowed
- Eksempelverdi:
<true/>
Tilbake til toppen
BackgroundModeEnabled
Continue running background apps after Microsoft Edge closes
Supported versions:
- On Windows since 77 or later
Beskrivelse
Allows Microsoft Edge processes to start at OS sign-in and keep running after the last browser window is closed. In this scenario, background apps and the current browsing session remain active, including any session cookies. An open background process displays an icon in the system tray and can always be closed from there.
If you enable this policy, background mode is turned on.
If you disable this policy, background mode is turned off.
If you don't configure this policy, background mode is initially turned off, and the user can configure its behavior in edge://settings/system.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BackgroundModeEnabled
- GP name: Continue running background apps after Microsoft Edge closes
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
BackgroundModeEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
BackgroundTemplateListUpdatesEnabled
Enables background updates to the list of available templates for Collections and other features that use templates
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
Lets you enable or disable background updates to the list of available templates for Collections and other features that use templates. Templates are used to extract rich metadata from a webpage when the page is saved to a collection.
If you enable this setting or the setting is unconfigured, the list of available templates will be downloaded in the background from a Microsoft service every 24 hours.
If you disable this setting the list of available templates will be downloaded on demand. This type of download might result in small performance penalties for Collections and other features.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BackgroundTemplateListUpdatesEnabled
- GP name: Enables background updates to the list of available templates for Collections and other features that use templates
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BackgroundTemplateListUpdatesEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: BackgroundTemplateListUpdatesEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
BingAdsSuppression
Block all ads on Bing search results
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
Enables an ad-free search experience on Bing.com
If you enable this policy, then a user can search on bing.com and have an ad-free search experience. At the same time, the SafeSearch setting will be set to 'Strict' and can't be changed by the user.
If you don't configure this policy, then the default experience will have ads in the search results on bing.com. SafeSearch will be set to 'Moderate' by default and can be changed by the user.
This policy is only available for K-12 SKUs that are identified as EDU tenants by Microsoft.
Please refer to https://go.microsoft.com/fwlink/?linkid=2119711 to learn more about this policy or if the following scenarios apply to you:
* You have an EDU tenant, but the policy doesn't work.
* You had your IP whitelisted for having an ad free search experience.
* You were experiencing an ad-free search experience on Microsoft Edge Legacy and want to upgrade to the new version of Microsoft Edge.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BingAdsSuppression
- GP name: Block all ads on Bing search results
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BingAdsSuppression
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: BingAdsSuppression
- Eksempelverdi:
<true/>
Tilbake til toppen
BlockThirdPartyCookies
Blokkér tredjeparts informasjonskapsler
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Block web page elements that aren't from the domain that's in the address bar from setting cookies.
If you enable this policy, web page elements that are not from the domain that is in the address bar can't set cookies
If you disable this policy, web page elements from domains other than in the address bar can set cookies.
If you don't configure this policy, third-party cookies are enabled but users can change this setting.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BlockThirdPartyCookies
- GP name: Blokkér tredjeparts informasjonskapsler
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
BlockThirdPartyCookies
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: BlockThirdPartyCookies
- Eksempelverdi:
<false/>
Tilbake til toppen
BrowserAddProfileEnabled
Enable profile creation from the Identity flyout menu or the Settings page
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to create new profiles, using the **Add profile** option.
If you enable this policy or don't configure it, Microsoft Edge allows users to use **Add profile** on the Identity flyout menu or the Settings page to create new profiles.
If you disable this policy, users cannot add new profiles from the Identity flyout menu or the Settings page.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BrowserAddProfileEnabled
- GP name: Enable profile creation from the Identity flyout menu or the Settings page
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BrowserAddProfileEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: BrowserAddProfileEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
BrowserGuestModeEnabled
Aktiver gjestemodus
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enable the option to allow the use of guest profiles in Microsoft Edge. In a guest profile, the browser doesn't import browsing data from existing profiles, and it deletes browsing data when all guest profiles are closed.
If you enable this policy or don't configure it, Microsoft Edge lets users browse in guest profiles.
If you disable this policy, Microsoft Edge doesn't let users browse in guest profiles.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BrowserGuestModeEnabled
- GP name: Aktiver gjestemodus
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BrowserGuestModeEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: BrowserGuestModeEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
BrowserNetworkTimeQueriesEnabled
Allow queries to a Browser Network Time service
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Prevents Microsoft Edge from occasionally sending queries to a browser network time service to retrieve an accurate timestamp.
If you disable this policy, Microsoft Edge will stop sending queries to a browser network time service.
If you enable this policy or don't configure it, Microsoft Edge will occasionally send queries to a browser network time service.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BrowserNetworkTimeQueriesEnabled
- GP name: Allow queries to a Browser Network Time service
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BrowserNetworkTimeQueriesEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: BrowserNetworkTimeQueriesEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
BrowserSignin
Browser sign-in settings
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify whether a user can sign into Microsoft Edge with their account and use account-related services like sync and single sign on. To control the availability of sync, use the SyncDisabled policy instead.
If you set this policy to 'Disable browser sign-in', make sure that you also set the NonRemovableProfileEnabled policy to disabled because NonRemovableProfileEnabled disables the creation of an automatically signed in browser profile. If both policies are set, Microsoft Edge will use the 'Disable browser sign-in' policy and behave as if NonRemovableProfileEnabled is set to disabled.
If you set this policy to 'Enable browser sign-in' (1), users can sign into the browser. Signing into the browser doesn't mean that sync is turned on by default; the user must separately opt-in to use this feature.
If you set this policy to 'Force browser sign-in' (2) users must sign into a profile to use the browser. By default, this will allow the user to choose whether they want to sync to their account, unless sync is disabled by the domain admin or with the SyncDisabled policy. The default value of BrowserGuestModeEnabled policy is set to false.
If you don't configure this policy users can decide if they want to enable the browser sign-in option and use it as they see fit.
* 0 = Disable browser sign-in
* 1 = Enable browser sign-in
* 2 = Force users to sign-in to use the browser
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BrowserSignin
- GP name: Browser sign-in settings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BrowserSignin
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: BrowserSignin
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
BuiltInDnsClientEnabled
Bruk innebygd DNS-klient
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Controls whether to use the built-in DNS client.
This does not affect which DNS servers are used; just the software stack which is used to communicate with them. For example if the operating system is configured to use an enterprise DNS server, that same server would be used by the built-in DNS client. It is however possible that the built-in DNS client will address servers in different ways by using more modern DNS-related protocols such as DNS-over-TLS.
If you enable this policy, the built-in DNS client is used, if it's available.
If you disable this policy, the client is never used.
If you don't configure this policy, the built-in DNS client is enabled by default on MacOS, and users can change whether to use the built-in DNS client by editing edge://flags or by specifying a command-line flag.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: BuiltInDnsClientEnabled
- GP name: Bruk innebygd DNS-klient
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
BuiltInDnsClientEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: BuiltInDnsClientEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
BuiltinCertificateVerifierEnabled
Determines whether the built-in certificate verifier will be used to verify server certificates
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On macOS since 83 or later
Beskrivelse
This policy is deprecated because it's intended to serve only as a short-term mechanism to give enterprises more time to update their environments and report issues if they are found to be incompatible with the built-in certificate verifier.
This policy is scheduled to be removed in Microsoft Edge for Mac OS X version 87, when support for the legacy certificate verifier on Mac OS X is planned to be removed.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Mac information and settings
- Preference Key Name: BuiltinCertificateVerifierEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
CertificateTransparencyEnforcementDisabledForCas
Deaktiver tvungen sertifikatåpenhet for en liste med subjectPublicKeyInfo-hasher
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Disables enforcement of Certificate Transparency requirements for a list of subjectPublicKeyInfo hashes.
This policy lets you disable Certificate Transparency disclosure requirements for certificate chains that contain certificates with one of the specified subjectPublicKeyInfo hashes. This allows certificates that would otherwise be untrusted because they were not properly publicly disclosed to still be used for Enterprise hosts.
To disable Certificate Transparency enforcement when this policy is set, one of the following sets of conditions must be met:
1. The hash is of the server certificate's subjectPublicKeyInfo.
2. The hash is of a subjectPublicKeyInfo that appears in a CA certificate in the certificate chain, that CA certificate is constrained via the X.509v3 nameConstraints extension, one or more directoryName nameConstraints are present in the permittedSubtrees, and the directoryName contains an organizationName attribute.
3. The hash is of a subjectPublicKeyInfo that appears in a CA certificate in the certificate chain, the CA certificate has one or more organizationName attributes in the certificate Subject, and the server's certificate contains the same number of organizationName attributes, in the same order, and with byte-for-byte identical values.
A subjectPublicKeyInfo hash is specified by concatenating the hash algorithm name, the "/" character, and the Base64 encoding of that hash algorithm applied to the DER-encoded subjectPublicKeyInfo of the specified certificate. This Base64 encoding is the same format as an SPKI Fingerprint, as defined in RFC 7469, Section 2.4. Unrecognized hash algorithms are ignored. The only supported hash algorithm at this time is "sha256".
If you disable this policy or don't configure it, any certificate that's required to be disclosed via Certificate Transparency will be treated as untrusted if it's not disclosed according to the Certificate Transparency policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CertificateTransparencyEnforcementDisabledForCas
- GP name: Deaktiver tvungen sertifikatåpenhet for en liste med subjectPublicKeyInfo-hasher
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForCas
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForCas\1 = sha256/AAAAAAAAAAAAAAAAAAAAAA==
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForCas\2 = sha256//////////////////////w==
Mac information and settings
- Preference Key Name: CertificateTransparencyEnforcementDisabledForCas
- Eksempelverdi:
<array>
<string>sha256/AAAAAAAAAAAAAAAAAAAAAA==</string>
<string>sha256//////////////////////w==</string>
</array>
Tilbake til toppen
CertificateTransparencyEnforcementDisabledForLegacyCas
Disable Certificate Transparency enforcement for a list of legacy certificate authorities
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Disables enforcing Certificate Transparency requirements for a list of legacy certificate authorities (Cas).
This policy lets you disable Certificate Transparency disclosure requirements for certificate chains that contain certificates with one of the specified subjectPublicKeyInfo hashes. This allows certificates that would otherwise be untrusted because they were not properly publicly disclosed, continue to be used for enterprise hosts.
In order for Certificate Transparency enforcement to be disabled, you must set the hash to a subjectPublicKeyInfo appearing in a CA certificate that is recognized as a legacy certificate authority (CA). A legacy CA is a CA that has been publicly trusted by default by one or more operating systems supported by Microsoft Edge.
You specify a subjectPublicKeyInfo hash by concatenating the hash algorithm name, the "/" character, and the Base64 encoding of that hash algorithm applied to the DER-encoded subjectPublicKeyInfo of the specified certificate. This Base64 encoding is the same format as an SPKI Fingerprint, as defined in RFC 7469, Section 2.4. Unrecognized hash algorithms are ignored. The only supported hash algorithm at this time is "sha256".
If you don't configure this policy, any certificate that's required to be disclosed via Certificate Transparency will be treated as untrusted if it isn't disclosed according to the Certificate Transparency policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CertificateTransparencyEnforcementDisabledForLegacyCas
- GP name: Disable Certificate Transparency enforcement for a list of legacy certificate authorities
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForLegacyCas
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForLegacyCas\1 = sha256/AAAAAAAAAAAAAAAAAAAAAA==
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForLegacyCas\2 = sha256//////////////////////w==
Mac information and settings
- Preference Key Name: CertificateTransparencyEnforcementDisabledForLegacyCas
- Eksempelverdi:
<array>
<string>sha256/AAAAAAAAAAAAAAAAAAAAAA==</string>
<string>sha256//////////////////////w==</string>
</array>
Tilbake til toppen
CertificateTransparencyEnforcementDisabledForUrls
Disable Certificate Transparency enforcement for specific URLs
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Disables enforcing Certificate Transparency requirements for the listed URLs.
This policy lets you not disclose certificates for the hostnames in the specified URLs via Certificate Transparency. This lets you use certificates that would otherwise be untrusted, because they weren't properly publicly disclosed, but it makes it harder to detect mis-issued certificates for those hosts.
Form your URL pattern according to https://go.microsoft.com/fwlink/?linkid=2095322. Because certificates are valid for a given hostname, independent of the scheme, port, or path, only the hostname part of the URL is considered. Wildcard hosts are not supported.
If you don't configure this policy, any certificate that should be disclosed via Certificate Transparency is treated as untrusted if it's not disclosed.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CertificateTransparencyEnforcementDisabledForUrls
- GP name: Disable Certificate Transparency enforcement for specific URLs
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForUrls\1 = contoso.com
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForUrls\2 = .contoso.com
Mac information and settings
- Preference Key Name: CertificateTransparencyEnforcementDisabledForUrls
- Eksempelverdi:
<array>
<string>contoso.com</string>
<string>.contoso.com</string>
</array>
Tilbake til toppen
ClearBrowsingDataOnExit
Clear browsing data when Microsoft Edge closes
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Microsoft Edge doesn't clear the browsing data by default when it closes. Browsing data includes information entered in forms, passwords, and even the websites visited.
If you enable this policy, all browsing data is deleted each time Microsoft Edge closes. Note that if you enable this policy, it takes precedence over how you configured DefaultCookiesSetting
If you disable or don't configure this policy, users can configure the Clear browsing data option in Settings.
If you enable this policy, don't configure the AllowDeletingBrowserHistory or the ClearCachedImagesAndFilesOnExit policy, because they all deal with deleting browsing data. If you configure the preceding policies and this policy, all browsing data is deleted when Microsoft Edge closes, regardless of how you configured AllowDeletingBrowserHistory or ClearCachedImagesAndFilesOnExit.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ClearBrowsingDataOnExit
- GP name: Clear browsing data when Microsoft Edge closes
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ClearBrowsingDataOnExit
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ClearBrowsingDataOnExit
- Eksempelverdi:
<true/>
Tilbake til toppen
ClearCachedImagesAndFilesOnExit
Clear cached images and files when Microsoft Edge closes
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
Microsoft Edge doesn't clear cached images and files by default when it closes.
If you enable this policy, cached images and files will be deleted each time Microsoft Edge closes.
If you disable this policy, users cannot configure the cached images and files option in edge://settings/clearBrowsingDataOnClose.
If you don't configure this policy, users can choose whether cached images and files are cleared on exit.
If you disable this policy, don't enable the ClearBrowsingDataOnExit policy, because they both deal with deleting data. If you configure both, the ClearBrowsingDataOnExit policy takes precedence and deletes all data when Microsoft Edge closes, regardless of how you configured ClearCachedImagesAndFilesOnExit.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ClearCachedImagesAndFilesOnExit
- GP name: Clear cached images and files when Microsoft Edge closes
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ClearCachedImagesAndFilesOnExit
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ClearCachedImagesAndFilesOnExit
- Eksempelverdi:
<true/>
Tilbake til toppen
ClickOnceEnabled
Allow users to open files using the ClickOnce protocol
Supported versions:
- On Windows since 78 or later
Beskrivelse
Allow users to open files using the ClickOnce protocol. The ClickOnce protocol allows websites to request that the browser open files from a specific URL using the ClickOnce file handler on the user's computer or device.
If you enable this policy, users can open files using the ClickOnce protocol. This policy overrides the user's ClickOnce setting in the edge://flags/ page.
If you disable this policy, users can't open files using the ClickOnce protocol. Instead, the file will be saved to the file system using the browser. This policy overrides the user's ClickOnce setting in the edge://flags/ page.
If you don't configure this policy, users can't open files using the ClickOnce protocol. Users have the option to enable the use of the ClickOnce protocol with the edge://flags/ page.
Disabling ClickOnce may prevent ClickOnce applications (.application files) from launching properly.
For more information about ClickOnce, see https://go.microsoft.com/fwlink/?linkid=2103872 and https://go.microsoft.com/fwlink/?linkid=2099880.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ClickOnceEnabled
- GP name: Allow users to open files using the ClickOnce protocol
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ClickOnceEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
CommandLineFlagSecurityWarningsEnabled
Slå på sikkerhetsadvarsler for kommandolinjeflagg
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
If disabled, this policy prevents security warnings from appearing when Microsoft Edge is launched with potentially dangerous command-line flags.
If enabled or unset, security warnings are displayed when these command-line flags are used to launch Microsoft Edge.
For example, the --disable-gpu-sandbox flag generates this warning: You're using an unsupported command-line flag: --disable-gpu-sandbox. This poses stability and security risks.
On Windows, this policy is only available on instances that are joined to a Microsoft Active Directory domain, or Windows 10 Pro (or Enterprise) instances that are enrolled for device management.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CommandLineFlagSecurityWarningsEnabled
- GP name: Slå på sikkerhetsadvarsler for kommandolinjeflagg
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
CommandLineFlagSecurityWarningsEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: CommandLineFlagSecurityWarningsEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
ComponentUpdatesEnabled
Aktivér komponentoppdateringer i Microsoft Edge
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
If you enable or don't configure this policy, component updates are enabled in Microsoft Edge.
If you disable this policy or set it to false, component updates are disabled for all components in Microsoft Edge.
However, some components are exempt from this policy. This includes any component that doesn't contain executable code, that doesn't significantly alter the behavior of the browser, or that's critical for security. That is, updates that are deemed "critical for security" are still applied even if you disable this policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ComponentUpdatesEnabled
- GP name: Aktivér komponentoppdateringer i Microsoft Edge
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ComponentUpdatesEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ComponentUpdatesEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
ConfigureDoNotTrack
Configure Do Not Track
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify whether to send Do Not Track requests to websites that ask for tracking info. Do Not Track requests let the websites you visit know that you don't want your browsing activity to be tracked. By default, Microsoft Edge doesn't send Do Not Track requests, but users can turn on this feature to send them.
If you enable this policy, Do Not Track requests are always sent to websites asking for tracking info.
If you disable this policy, requests are never sent.
If you don't configure this policy, users can choose whether to send these requests.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ConfigureDoNotTrack
- GP name: Configure Do Not Track
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ConfigureDoNotTrack
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ConfigureDoNotTrack
- Eksempelverdi:
<false/>
Tilbake til toppen
ConfigureOnPremisesAccountAutoSignIn
Configure automatic sign in with an Active Directory domain account when there is no Azure AD domain account
Supported versions:
- On Windows since 81 or later
Beskrivelse
Enable the use of Active Directory accounts for automatic sign in if your users' machines are Domain Joined and your environment is not hybrid joined. If you want users automatically signed in with their Azure Active Directory accounts instead, please Azure AD join (See https://go.microsoft.com/fwlink/?linkid=2118197 for more information) or hybrid join (See https://go.microsoft.com/fwlink/?linkid=2118365 for more information) your environment.
If you have configured the BrowserSignin policy to disabled, this policy will not take any effect.
If you enable this policy and set it to "Sign in and make domain account non-removable", Microsoft Edge will automatically sign in users that are on domain joined machines using their Active Directory accounts.
If you set this policy to "Disabled" or don't set it, Microsoft Edge will not automatically sign in users that are on domain joined machines with Active Directory accounts.
* 0 = Disabled
* 1 = Sign in and make domain account non-removable
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ConfigureOnPremisesAccountAutoSignIn
- GP name: Configure automatic sign in with an Active Directory domain account when there is no Azure AD domain account
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ConfigureOnPremisesAccountAutoSignIn
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
ConfigureOnlineTextToSpeech
Configure Online Text To Speech
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether the browser can leverage Online Text to Speech voice fonts, part of Azure Cognitive Services. These voice fonts are higher quality than the pre-installed system voice fonts.
If you enable or don't configure this policy, web-based applications that use the SpeechSynthesis API can use Online Text to Speech voice fonts.
If you disable this policy, the voice fonts aren't available.
Read more about this feature here:
SpeechSynthesis API: https://go.microsoft.com/fwlink/?linkid=2110038
Cognitive Services: https://go.microsoft.com/fwlink/?linkid=2110141
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ConfigureOnlineTextToSpeech
- GP name: Configure Online Text To Speech
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ConfigureOnlineTextToSpeech
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ConfigureOnlineTextToSpeech
- Eksempelverdi:
<true/>
Tilbake til toppen
ConfigureShare
Configure the Share experience
Supported versions:
- On Windows since 83 or later
Beskrivelse
If you set this policy to 'ShareAllowed' (0, the default), users will be able to access the Windows 10 Share experience from the Settings and More Menu in Microsoft Edge to share with other apps on the system.
If you set this policy to 'ShareDisallowed' (1), users won't be able to access the Windows 10 Share experience. If the Share button is on the toolbar, it will also be hidden.
* 0 = Allow using the Share experience
* 1 = Don't allow using the Share experience
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ConfigureShare
- GP name: Configure the Share experience
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ConfigureShare
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
CustomHelpLink
Specify custom help link
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
Specify a link for the Help menu or the F1 key.
If you enable this policy, an admin can specify a link for the Help menu or the F1 key.
If you disable or don't configure this policy, the default link for the Help menu or the F1 key is used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: CustomHelpLink
- GP name: Specify custom help link
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
CustomHelpLink
- Value Type:
REG_SZ
Eksempelverdi:
https://go.microsoft.com/fwlink/?linkid=2080734
Mac information and settings
- Preference Key Name: CustomHelpLink
- Eksempelverdi:
<string>https://go.microsoft.com/fwlink/?linkid=2080734</string>
Tilbake til toppen
DNSInterceptionChecksEnabled
DNS interception checks enabled
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
This policy configures a local switch that can be used to disable DNS interception checks. These checks attempt to discover whether the browser is behind a proxy that redirects unknown host names.
This detection might not be necessary in an enterprise environment where the network configuration is known. It can be disabled to avoid additional DNS and HTTP traffic on start-up and each DNS configuration change.
If you enable or don’t set this policy, the DNS interception checks are performed.
If you disable this policy, DNS interception checks aren’t performed.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DNSInterceptionChecksEnabled
- GP name: DNS interception checks enabled
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DNSInterceptionChecksEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DNSInterceptionChecksEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
DefaultBrowserSettingEnabled
Set Microsoft Edge as default browser
Supported versions:
- On Windows 7 and macOS since 77 or later
Beskrivelse
Configures the default browser checks in Microsoft Edge and prevents users from changing them.
If you enable this policy, Microsoft Edge always checks on startup whether it is the default browser and automatically registers itself, if possible.
If you disable this policy, Microsoft Edge never checks and disables user controls for setting this option.
If you don't configure this policy, Microsoft Edge lets the user control whether it's the default browser and whether to show user notifications when it isn't.
Note for Windows administrators: This policy only works for PCs running Windows 7. For later versions of Windows, you have to deploy a "default application associations" file that makes Microsoft Edge the handler for the https and http protocols (and, optionally, the ftp protocol and file formats such as .html, .htm, .pdf, .svg, .webp). See https://go.microsoft.com/fwlink/?linkid=2094932 for more information.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DefaultBrowserSettingEnabled
- GP name: Set Microsoft Edge as default browser
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DefaultBrowserSettingEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DefaultBrowserSettingEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
DelayNavigationsForInitialSiteListDownload
Require that the Enterprise Mode Site List is available before tab navigation
Supported versions:
- On Windows since 84 or later
Beskrivelse
Lets you specify whether Microsoft Edge tabs wait to navigate until the browser has downloaded the initial Enterprise Mode Site List. This setting is intended for the scenario where the browser home page should load in Internet Explorer mode, and it is important that is does so on browser first run after IE mode is enabled. If this scenario does not exist, we recommend not enabling this setting because it can negatively impact the performance of loading the home page. The setting only applies when Microsoft Edge does not have a cached Enterprise Mode Site List, such as on browser first run after IE mode is enabled.
This setting works in conjunction with:
InternetExplorerIntegrationLevel is set to "Internet Explorer mode" (1)
and
InternetExplorerIntegrationSiteList policy where the list has at least one entry.
The timeout behavior of this policy can be configured with the NavigationDelayForInitialSiteListDownloadTimeout policy.
If you set this policy to 1, when Microsoft Edge does not have a cached version of the Enterprise Mode Site List, tabs delay navigating until the browser has downloaded the site list. Sites configured to open in Internet Explorer mode by the site list will load in Internet Explorer mode, even during the initial navigation of the browser. Sites that cannot possibly be configured to open in Internet Explorer, such as any site with a scheme other than http:, https:, file:, or ftp: do not delay navigating and load immediately in Edge mode.
If you set this policy to 0 or don't configure it, when Microsoft Edge does not have a cached version of the Enterprise Mode Site List, tabs will navigate immediately, and not wait for the browser to download the Enterprise Mode Site List. Sites configured to open in Internet Explorer mode by the site list will open in Microsoft Edge mode until the browser has finished downloading the Enterprise Mode Site List.
* 0 = None
* 1 = All eligible navigations
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DelayNavigationsForInitialSiteListDownload
- GP name: Require that the Enterprise Mode Site List is available before tab navigation
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DelayNavigationsForInitialSiteListDownload
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
DeleteDataOnMigration
Delete old browser data on migration
Supported versions:
- On Windows since 83 or later
Beskrivelse
This policy determines whether user browsing data from Microsoft Edge Legacy will be deleted after migrating to the Microsoft Edge version 81 or later.
If you set this policy to "Enabled", all browsing data from Microsoft Edge Legacy after migrating to the Microsoft Edge version 81 or later will be deleted. This policy must be set before migrating to the Microsoft Edge version 81 or later to have any effect on existing browsing data.
If you set this policy to "Disabled", or the policy is not configured, user browsing data isn't deleted after migrating to the Microsoft Edge version 83 or later.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DeleteDataOnMigration
- GP name: Delete old browser data on migration
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DeleteDataOnMigration
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
DeveloperToolsAvailability
Control where developer tools can be used
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Control where developer tools can be used.
If you set this policy to 'DeveloperToolsDisallowedForForceInstalledExtensions' (0, the default), users can access the developer tools and the JavaScript console in general, but not in the context of extensions installed by enterprise policy.
If you set this policy to 'DeveloperToolsAllowed' (1), users can access the developer tools and the JavaScript console in all contexts, including extensions installed by enterprise policy.
If you set this policy to 'DeveloperToolsDisallowed' (2), users can't access the developer tools or inspect website elements. Keyboard shortcuts and menu or context menu entries that open the developer tools or the JavaScript Console are disabled.
* 0 = Block the developer tools on extensions installed by enterprise policy, allow in other contexts
* 1 = Allow using the developer tools
* 2 = Don't allow using the developer tools
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DeveloperToolsAvailability
- GP name: Control where developer tools can be used
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DeveloperToolsAvailability
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DeveloperToolsAvailability
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
DirectInvokeEnabled
Allow users to open files using the DirectInvoke protocol
Supported versions:
- On Windows since 78 or later
Beskrivelse
Allow users to open files using the DirectInvoke protocol. The DirectInvoke protocol allows websites to request that the browser open files from a specific URL using a specific file handler on the user's computer or device.
If you enable or don't configure this policy, users can open files using the DirectInvoke protocol.
If you disable this policy, users can't open files using the DirectInvoke protocol. Instead, the file will be saved to the file system.
Note: Disabling DirectInvoke may prevent certain Microsoft SharePoint Online features from working as expected.
For more information about DirectInvoke, see https://go.microsoft.com/fwlink/?linkid=2103872 and https://go.microsoft.com/fwlink/?linkid=2099871.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DirectInvokeEnabled
- GP name: Allow users to open files using the DirectInvoke protocol
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DirectInvokeEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
Disable3DAPIs
Deaktiver støtte for programmeringsgrensesnitt for 3D-grafikk
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Prevent web pages from accessing the graphics processing unit (GPU). Specifically, web pages can't access the WebGL API and plug-ins can't use the Pepper 3D API.
If you don't configure or disable this policy, it potentially allows web pages to use the WebGL API and plug-ins to use the Pepper 3D API. Microsoft Edge might, by default, still require command line arguments to be passed in order to use these APIs.
If HardwareAccelerationModeEnabled policy is set to false, the setting for 'Disable3DAPIs' policy is ignored - it's the equivalent of setting 'Disable3DAPIs' policy to true.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: Disable3DAPIs
- GP name: Deaktiver støtte for programmeringsgrensesnitt for 3D-grafikk
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
Disable3DAPIs
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: Disable3DAPIs
- Eksempelverdi:
<false/>
Tilbake til toppen
DisableScreenshots
Deaktiver mulighet til å ta skjermdumper
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Controls if users can take screenshots of the browser page.
If enabled, user can't take screenshots by using keyboard shortcuts or extension APIs.
If disabled or don't configure this policy, users can take screenshots.
Please note this policy controls screenshots taken from within the browser itself. Even if you enable this policy, users might still be able to take screenshots using some method outside of the browser (like using an operating system feature or another application).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DisableScreenshots
- GP name: Deaktiver mulighet til å ta skjermdumper
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DisableScreenshots
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: DisableScreenshots
- Eksempelverdi:
<true/>
Tilbake til toppen
DiskCacheDir
Angi katalog for diskbufring
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the directory to use to store cached files.
If you enable this policy, Microsoft Edge uses the provided directory regardless of whether the user has specified the '--disk-cache-dir' flag. To avoid data loss or other unexpected errors, don't configure this policy to a volume's root directory or to a directory used for other purposes, because Microsoft Edge manages its contents.
See https://go.microsoft.com/fwlink/?linkid=2095041 for a list of variables you can use when specifying directories and paths.
If you don't configure this policy, the default cache directory is used, and users can override that default with the '--disk-cache-dir' command line flag.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DiskCacheDir
- GP name: Angi katalog for diskbufring
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DiskCacheDir
- Value Type:
REG_SZ
Eksempelverdi:
${user_home}/Edge_cache
Mac information and settings
- Preference Key Name: DiskCacheDir
- Eksempelverdi:
<string>${user_home}/Edge_cache</string>
Tilbake til toppen
DiskCacheSize
Set disk cache size, in bytes
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the size of the cache, in bytes, used to store files on the disk.
If you enable this policy, Microsoft Edge uses the provided cache size regardless of whether the user has specified the '--disk-cache-size' flag. The value specified in this policy isn't a hard boundary but rather a suggestion to the caching system; any value below a few megabytes is too small and will be rounded up to a reasonable minimum.
If you set the value of this policy to 0, the default cache size is used, and users can't change it.
If you don't configure this policy, the default size is used, but users can override it with the '--disk-cache-size' flag.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DiskCacheSize
- GP name: Set disk cache size, in bytes
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DiskCacheSize
- Value Type:
REG_DWORD
Eksempelverdi:
0x06400000
Mac information and settings
- Preference Key Name: DiskCacheSize
- Eksempelverdi:
<integer>104857600</integer>
Tilbake til toppen
DnsOverHttpsMode
Control the mode of DNS-over-HTTPS
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
Control the mode of the DNS-over-HTTPS resolver. Note that this policy will only set the default mode for each query. The mode can be overridden for special types of queries such as requests to resolve a DNS-over-HTTPS server hostname.
The "off" mode will disable DNS-over-HTTPS.
The "automatic" mode will send DNS-over-HTTPS queries first if a DNS-over-HTTPS server is available and may fallback to sending insecure queries on error.
The "secure" mode will only send DNS-over-HTTPS queries and will fail to resolve on error.
If you don't configure this policy, the browser might send DNS-over-HTTPS requests to a resolver associated with the user's configured system resolver.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DnsOverHttpsMode
- GP name: Control the mode of DNS-over-HTTPS
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DnsOverHttpsMode
- Value Type:
REG_SZ
Eksempelverdi:
off
Mac information and settings
- Preference Key Name: DnsOverHttpsMode
- Eksempelverdi:
<string>off</string>
Tilbake til toppen
DnsOverHttpsTemplates
Specify URI template of desired DNS-over-HTTPS resolver
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
The URI template of the desired DNS-over-HTTPS resolver. To specify multiple DNS-over-HTTPS resolvers, separate the corresponding URI templates with spaces.
If you set DnsOverHttpsMode to "secure" then this policy must be set and cannot be empty.
If you set DnsOverHttpsMode to "automatic" and this policy is set then the URI templates specified will be used. If you don't set this policy, then hardcoded mappings will be used to attempt to upgrade the user's current DNS resolver to a DoH resolver operated by the same provider.
If the URI template contains a dns variable, requests to the resolver will use GET; otherwise requests will use POST.
Incorrectly formatted templates will be ignored.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DnsOverHttpsTemplates
- GP name: Specify URI template of desired DNS-over-HTTPS resolver
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
DnsOverHttpsTemplates
- Value Type:
REG_SZ
Eksempelverdi:
https://dns.example.net/dns-query{?dns}
Mac information and settings
- Preference Key Name: DnsOverHttpsTemplates
- Eksempelverdi:
<string>https://dns.example.net/dns-query{?dns}</string>
Tilbake til toppen
DownloadDirectory
Angi nedlastingskatalog
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the directory to use when downloading files.
If you enable this policy, Microsoft Edge uses the provided directory regardless of whether the user has specified one or chosen to be prompted for download location every time. See https://go.microsoft.com/fwlink/?linkid=2095041 for a list of variables that can be used.
If you disable or don't configure this policy, the default download directory is used, and the user can change it.
If you set an invalid path, Microsoft Edge will default to the user's default download directory.
If the folder specified by the path doesn't exist, the download will trigger a prompt that asks the user where they want to save their download.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DownloadDirectory
- GP name: Angi nedlastingskatalog
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DownloadDirectory
- Value Type:
REG_SZ
Eksempelverdi:
Linux-based OSes (including Mac): /home/${user_name}/Downloads
Windows: C:\Users\${user_name}\Downloads
Mac information and settings
- Preference Key Name: DownloadDirectory
- Eksempelverdi:
<string>
Linux-based OSes (including Mac): /home/${user_name}/Downloads
Windows: C:\Users\${user_name}\Downloads</string>
Tilbake til toppen
DownloadRestrictions
Tillat begrensninger for nedlastinger
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures the type of downloads that Microsoft Edge completely blocks, without letting users override the security decision.
Set 'Block dangerous downloads' (1) to allow all downloads except for those that carry Microsoft Defender SmartScreen warnings.
Set 'Block potentially dangerous or unwanted downloads' (2) to allow all downloads except for those that carry Microsoft Defender SmartScreen warnings of potentially dangerous or unwanted downloads.
Set 'Block all downloads' (3) to block all downloads.
If you don't configure this policy or set the 'No special restrictions' (0) option, the downloads go through the usual security restrictions based on Microsoft Defender SmartScreen analysis results.
Note that these restrictions apply to downloads from web page content, as well as the 'download link...' context menu option. These restrictions don't apply to saving or downloading the currently displayed page, nor do they apply to the Save as PDF option from the printing options.
See https://go.microsoft.com/fwlink/?linkid=2094934 for more info on Microsoft Defender SmartScreen.
* 0 = No special restrictions
* 1 = Block dangerous downloads
* 2 = Block potentially dangerous downloads
* 3 = Block all downloads
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: DownloadRestrictions
- GP name: Tillat begrensninger for nedlastinger
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
DownloadRestrictions
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: DownloadRestrictions
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
EdgeCollectionsEnabled
Enable the Collections feature
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Lets you allow users to access the Collections feature, where they can collect, organize, share, and export content more efficiently and with Office integration.
If you enable or don't configure this policy, users can access and use the Collections feature in Microsoft Edge.
If you disable this policy, users can't access and use Collections in Microsoft Edge.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EdgeCollectionsEnabled
- GP name: Enable the Collections feature
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EdgeCollectionsEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: EdgeCollectionsEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
EditFavoritesEnabled
Allows users to edit favorites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enable this policy to let users add, remove, and modify favorites. This is the default behavior if you don't configure the policy.
Disable this policy to stop users from adding, removing, or modifying favorites. They can still use existing favorites.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EditFavoritesEnabled
- GP name: Allows users to edit favorites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EditFavoritesEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: EditFavoritesEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
EnableDeprecatedWebPlatformFeatures
Re-enable deprecated web platform features for a limited time
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify a list of deprecated web platform features to temporarily re-enable.
This policy lets you re-enable deprecated web platform features for a limited time. Features are identified by a string tag.
If you don't configure this policy, if the list is empty, or if a feature doesn't match one of the supported string tags, all deprecated web platform features remain disabled.
While the policy itself is supported on the above platforms, the feature it's enabling might not be available on all of those platforms. Not all deprecated Web Platform features can be re-enabled. Only those explicitly listed below can be re-enabled, and only for a limited period of time, which differs per feature. You can review the intent behind the Web Platform feature changes at https://bit.ly/blinkintents.
The general format of the string tag is [DeprecatedFeatureName]_EffectiveUntil[yyyymmdd].
* "ExampleDeprecatedFeature_EffectiveUntil20080902" = Enable ExampleDeprecatedFeature API through 2008/09/02
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EnableDeprecatedWebPlatformFeatures
- GP name: Re-enable deprecated web platform features for a limited time
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\EnableDeprecatedWebPlatformFeatures
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\EnableDeprecatedWebPlatformFeatures\1 = ExampleDeprecatedFeature_EffectiveUntil20080902
Mac information and settings
- Preference Key Name: EnableDeprecatedWebPlatformFeatures
- Eksempelverdi:
<array>
<string>ExampleDeprecatedFeature_EffectiveUntil20080902</string>
</array>
Tilbake til toppen
EnableDomainActionsDownload
Enable Domain Actions Download from Microsoft
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Although this policy is used to enable/disable download of the domain actions list, it doesn't always achieve the desired state. The Experimentation and Configuration Service, which handles the download, has its own group policy to configure what is downloaded from the service. To avoid conflicting states, this policy is being deprecated and will be obsolete in milestone 85 onward. Please use the ExperimentationAndConfigurationServiceControl policy instead.
In Microsoft Edge, Domain Actions represent a series of compatibility features that help the browser work correctly on the web.
Microsoft keeps a list of actions to take on certain domains for compatibility reasons. For example, the browser may override the User Agent string on a website if that website is broken due to the new User Agent string on Microsoft Edge. Each of these actions is intended to be temporary while Microsoft tries to resolve the issue with the site owner.
When the browser starts up and then periodically afterwards, the browser will contact the Experimentation and Configuration Service that contains the most up to date list of compatibility actions to perform. This list is saved locally after it is first retrieved so that subsequent requests will only update the list if the server's copy has changed.
If you enable this policy, the list of Domain Actions will continue to be downloaded from the Experimentation and Configuration Service.
If you disable this policy, the list of Domain Actions will no longer be downloaded from the Experimentation and Configuration Service.
If you don't configure this policy, the list of Domain Actions will continue to be downloaded from the Experimentation and Configuration Service.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EnableDomainActionsDownload
- GP name: Enable Domain Actions Download from Microsoft (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EnableDomainActionsDownload
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: EnableDomainActionsDownload
- Eksempelverdi:
<true/>
Tilbake til toppen
EnableOnlineRevocationChecks
Slå på OCSP/CRL-kontroller på nettet
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Online revocation checks don't provide a significant security benefit and are disabled by default.
If you enable this policy, Microsoft Edge will perform soft-fail, online OCSP/CRL checks. "Soft fail" means that if the revocation server can't be reached, the certificate will be considered valid.
If you disable the policy or don't configure it, Microsoft Edge won't perform online revocation checks.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EnableOnlineRevocationChecks
- GP name: Slå på OCSP/CRL-kontroller på nettet
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EnableOnlineRevocationChecks
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: EnableOnlineRevocationChecks
- Eksempelverdi:
<false/>
Tilbake til toppen
EnterpriseHardwarePlatformAPIEnabled
Allow managed extensions to use the Enterprise Hardware Platform API
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
When this policy is set to enabled, extensions installed by enterprise policy are allowed to use the Enterprise Hardware Platform API.
When this policy is set to disabled or isn't set, no extensions are allowed to use the Enterprise Hardware Platform API.
This policy also applies to component extensions.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: EnterpriseHardwarePlatformAPIEnabled
- GP name: Allow managed extensions to use the Enterprise Hardware Platform API
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
EnterpriseHardwarePlatformAPIEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: EnterpriseHardwarePlatformAPIEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
ExperimentationAndConfigurationServiceControl
Control communication with the Experimentation and Configuration Service
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
In Microsoft Edge, the Experimentation and Configuration Service is used to deploy Experimentation and Configuration payload.
Experimentation payload consists of a list of early in development features that Microsoft is enabling for testing and feedback.
Configuration payload consists of a list of settings that Microsoft wants to deploy to Microsoft Edge to optimize user experience. For example, configuration payload may specify how often Microsoft Edge sends requests to the Experimentation and Configuration Service to retrieve the newest payload.
Additionaly, configuration payload may also contain a list of actions to take on certain domains for compatibility reasons. For example, the browser may override the User Agent string on a website if that website is broken due to the new User Agent string on Microsoft Edge. Each of these actions is intended to be temporary while Microsoft tries to resolve the issue with the site owner.
If you set this policy to "Retrieve configurations and experiments" mode, the full payload is downloaded from the Experimentation and Configuration Service. This includes both the experimentation and configuration payloads.
If you set this policy to "Retrieve configurations only" mode, only the configuration payload is delivered.
If you set this policy to "Disable communication with the Experimentation and Configuration Service" mode, the communication with the Experimentation and Configuration Service is stopped completely.
If you don't configure this policy, on a managed device on Stable and Beta channels the behavior is the same as the "Retrieve configurations only" mode.
If you don't configure this policy, on an unmanaged device the behavior is the same as the "Retrieve configurations and experiments" mode.
* 0 = Disable communication with the Experimentation and Configuration Service
* 1 = Retrieve configurations only
* 2 = Retrieve configurations and experiments
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExperimentationAndConfigurationServiceControl
- GP name: Control communication with the Experimentation and Configuration Service
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ExperimentationAndConfigurationServiceControl
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: ExperimentationAndConfigurationServiceControl
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
ExternalProtocolDialogShowAlwaysOpenCheckbox
Show an "Always open" checkbox in external protocol dialog
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
This policy controls whether the "Always allow this site to open links of this type" checkbox is shown on external protocol launch confirmation prompts.
If you enable this policy, when an external protocol confirmation prompt is shown, the user can select "Always allow" to skip all future confirmation prompts for the protocol on this site.
If you disable this policy, the "Always allow" checkbox isn't displayed. The user will be prompted for confirmation every time an external protocol is invoked.
Prior to Microsoft Edge 83, if you don't configure this policy, the "Always allow" checkbox isn't displayed. The user will be prompted for confirmation every time an external protocol is invoked.
On Microsoft Edge 83, if you don't configure this policy, the checkbox visibility is controlled by the "Enable remembering protocol launch prompting preferences" flag in edge://flags
As of Microsoft Edge 84, if you don't configure this policy, when an external protocol confirmation prompt is shown, the user can select "Always allow" to skip all future confirmation prompts for the protocol on this site.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ExternalProtocolDialogShowAlwaysOpenCheckbox
- GP name: Show an "Always open" checkbox in external protocol dialog
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ExternalProtocolDialogShowAlwaysOpenCheckbox
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ExternalProtocolDialogShowAlwaysOpenCheckbox
- Eksempelverdi:
<true/>
Tilbake til toppen
FamilySafetySettingsEnabled
Allow users to configure Family safety
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
This policy disables and completely hides the Family safety page in Settings. Navigation to edge://settings/familysafety will also be blocked. The Family safety page describes what features are available for family groups and how to join a family group. Learn more about family safety here: (https://go.microsoft.com/fwlink/?linkid=2098432).
If you enable this policy or don't configure it, the Family safety page will be shown.
If you disable this policy, the Family safety page will not be shown.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: FamilySafetySettingsEnabled
- GP name: Allow users to configure Family safety
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
FamilySafetySettingsEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: FamilySafetySettingsEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
FavoritesBarEnabled
Enable favorites bar
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables or disables the favorites bar.
If you enable this policy, users will see the favorites bar.
If you disable this policy, users won't see the favorites bar.
If this policy is not configured, then the user can decide to use the favorites bar or not.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: FavoritesBarEnabled
- GP name: Enable favorites bar
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
FavoritesBarEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: FavoritesBarEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
ForceBingSafeSearch
Enforce Bing SafeSearch
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Ensure that queries in Bing web search are done with SafeSearch set to the value specified. Users can't change this setting.
If you configure this policy to "Off", SafeSearch in Bing search falls back to the bing.com value.
If you configure this policy to "Moderate", the moderate setting is used in SafeSearch. The moderate setting filters adult videos and images but not text from search results.
If you configure this policy to "Strict", the strict setting in SafeSearch is used. The strict setting filters adult text, images, and videos.
If you disable this policy or don't configure it, SafeSearch in Bing search isn't enforced, and users can set the value they want on bing.com.
* 0 = Don't configure search restrictions in Bing
* 1 = Configure moderate search restrictions in Bing
* 2 = Configure strict search restrictions in Bing
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceBingSafeSearch
- GP name: Enforce Bing SafeSearch
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceBingSafeSearch
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ForceBingSafeSearch
- Eksempelverdi:
<integer>0</integer>
Tilbake til toppen
ForceCertificatePromptsOnMultipleMatches
Configure whether Microsoft Edge should automatically select a certificate when there are multiple certificate matches for a site configured with "AutoSelectCertificateForUrls"
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
Toggles whether users are prompted to select a certificate if there are multiple certificates available and a site is configured with AutoSelectCertificateForUrls. If you don't configure AutoSelectCertificateForUrls for a site, the user will always be prompted to select a certificate.
If you set this policy to True, Microsoft Edge will prompt a user to select a certificate for sites on the list defined in AutoSelectCertificateForUrls if and only if there is more than one certificate.
If you set this policy to False or don't configure it, Microsoft Edge will automatically select a certificate even if there are multiple matches for a certificate. The user will not be prompted to select a certificate for sites on the list defined in AutoSelectCertificateForUrls.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceCertificatePromptsOnMultipleMatches
- GP name: Configure whether Microsoft Edge should automatically select a certificate when there are multiple certificate matches for a site configured with "AutoSelectCertificateForUrls"
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceCertificatePromptsOnMultipleMatches
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ForceCertificatePromptsOnMultipleMatches
- Eksempelverdi:
<true/>
Tilbake til toppen
ForceEphemeralProfiles
Enable use of ephemeral profiles
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Controls whether user profiles are switched to ephemeral mode. An ephemeral profile is created when a session begins, is deleted when the session ends, and is associated with the user's original profile.
If you enable this policy, profiles run in ephemeral mode. This lets users work from their own devices without saving browsing data to those devices. If you enable this policy as an OS policy (by using GPO on Windows, for example), it applies to every profile on the system.
If you disable this policy or don't configure it, users get their regular profiles when they sign in to the browser.
In ephemeral mode, profile data is saved on disk only for the length of the user session. Features like browser history, extensions and their data, web data like cookies, and web databases aren't saved after the browser is closed. This doesn't prevent a user from manually downloading any data to disk, or from saving pages or printing them. If the user has enabled sync, all data is preserved in their sync accounts just like with regular profiles. Users can also use InPrivate browsing in ephemeral mode unless you explicitly disable this.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceEphemeralProfiles
- GP name: Enable use of ephemeral profiles
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceEphemeralProfiles
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ForceEphemeralProfiles
- Eksempelverdi:
<true/>
Tilbake til toppen
ForceGoogleSafeSearch
Enforce Google SafeSearch
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Forces queries in Google Web Search to be performed with SafeSearch set to active, and prevents users from changing this setting.
If you enable this policy, SafeSearch in Google Search is always active.
If you disable this policy or don't configure it, SafeSearch in Google Search isn't enforced.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceGoogleSafeSearch
- GP name: Enforce Google SafeSearch
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceGoogleSafeSearch
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ForceGoogleSafeSearch
- Eksempelverdi:
<false/>
Tilbake til toppen
ForceLegacyDefaultReferrerPolicy
Use a default referrer policy of no-referrer-when-downgrade.
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
This policy is deprecated because it's only intended to be a short-term mechanism to give enterprises more time to update their web content if and when it's found to be incompatible with the current default referrer policy. It won't work in Microsoft Edge as soon as version 86.
Microsoft Edge's default referrer policy is being strengthened from its current value of no-referrer-when-downgrade to the more secure strict-origin-when-cross-origin through a gradual rollout.
Before the rollout, this enterprise policy will have no effect. After the rollout, when this enterprise policy is enabled, Microsoft Edge's default referrer policy will be set to its old value of no-referrer-when-downgrade.
This enterprise policy is disabled by default.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceLegacyDefaultReferrerPolicy
- GP name: Use a default referrer policy of no-referrer-when-downgrade. (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceLegacyDefaultReferrerPolicy
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ForceLegacyDefaultReferrerPolicy
- Eksempelverdi:
<false/>
Tilbake til toppen
ForceNetworkInProcess
Tving nettverkskode til å kjøre i nettleserprosessen
Supported versions:
- On Windows since 78, until 83
Beskrivelse
This policy doesn't work because it was only intended to be a short-term mechanism to give enterprises more time to migrate to 3rd party software that doesn't depend on hooking networking APIs. Proxy servers are recommended over LSPs and Win32 API patching.
This policy forces networking code to run in the browser process.
This policy is disabled by default. If enabled, users are open to security issues when the networking process is sandboxed.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceNetworkInProcess
- GP name: Tving nettverkskode til å kjøre i nettleserprosessen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceNetworkInProcess
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
ForceYouTubeRestrict
Fremtvinger bruk av et minimumsnivå for Begrenset innhold-modusen på YouTube
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enforces a minimum Restricted Mode on YouTube and prevents users from picking a less restricted mode.
Set to Strict (2) to enforce Strict Restricted Mode on YouTube.
Set to Moderate (1) to enforce the user to only use Moderate Restricted Mode and Strict Restricted Mode on YouTube. They can't disable Restricted Mode.
Set to Off (0) or don't configure this policy to not enforce Restricted Mode on YouTube. External policies such as YouTube policies might still enforce Restricted Mode.
* 0 = Do not enforce Restricted Mode on YouTube
* 1 = Enforce at least Moderate Restricted Mode on YouTube
* 2 = Enforce Strict Restricted Mode for YouTube
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ForceYouTubeRestrict
- GP name: Fremtvinger bruk av et minimumsnivå for Begrenset innhold-modusen på YouTube
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ForceYouTubeRestrict
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ForceYouTubeRestrict
- Eksempelverdi:
<integer>0</integer>
Tilbake til toppen
FullscreenAllowed
Allow full screen mode
Supported versions:
- On Windows since 77 or later
Beskrivelse
Set the availability of full screen mode - all Microsoft Edge UI is hidden and only web content is visible.
If you enable this policy or don't configure it, the user, apps, and extensions with appropriate permissions can enter full screen mode.
If you disable this policy, users, apps, and extensions can't enter full screen mode.
Opening Microsoft Edge in kiosk mode using the command line is unavailable when full screen mode is disabled.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: FullscreenAllowed
- GP name: Allow full screen mode
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
FullscreenAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
GloballyScopeHTTPAuthCacheEnabled
Enable globally scoped HTTP auth cache
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
This policy configures a single global per profile cache with HTTP server authentication credentials.
If you disable or don’t set this policy, the browser will use the default behavior of cross-site auth, which as of version 80, will be to scope HTTP server authentication credentials by top-level site. So, if two sites use resources from the same authenticating domain, credentials will need to be provided independently in the context of both sites. Cached proxy credentials will be reused across sites.
If you enable this policy HTTP auth credentials entered in the context of one site will automatically be used in the context of another site.
Enabling this policy leaves sites open to some types of cross-site attacks, and allows users to be tracked across sites even without cookies by adding entries to the HTTP auth cache using credentials embedded in URLs.
This policy is intended to give enterprises depending on the legacy behavior a chance to update their login procedures and will be removed in the future.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: GloballyScopeHTTPAuthCacheEnabled
- GP name: Enable globally scoped HTTP auth cache
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
GloballyScopeHTTPAuthCacheEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: GloballyScopeHTTPAuthCacheEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
GoToIntranetSiteForSingleWordEntryInAddressBar
Force direct intranet site navigation instead of searching on single word entries in the Address Bar
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
If you enable this policy, the top auto-suggest result in the address bar suggestion list will navigate to intranet sites if the text entered in the address bar is a single word without punctuation.
Default navigation when typing a single word without punctuation will conduct a navigation to an intranet site matching the entered text.
If you enable this policy, the second auto-suggest result in the address bar suggestion list will conduct a web search exactly as it was entered, provided that this text is a single word without punctuation. The default search provider will be used unless a policy to prevent web search is also enabled.
Two effects of enabling this policy are:
Navigation to sites in response to single word queries that would typically resolve to a history item will no longer happen. Instead, the browser will attempt navigate to internal sites that may not exist in an organization’s intranet. This will result in a 404 error.
Popular, single-word search terms will require manual selection of search suggestions to properly conduct a search.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: GoToIntranetSiteForSingleWordEntryInAddressBar
- GP name: Force direct intranet site navigation instead of searching on single word entries in the Address Bar
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
GoToIntranetSiteForSingleWordEntryInAddressBar
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: GoToIntranetSiteForSingleWordEntryInAddressBar
- Eksempelverdi:
<false/>
Tilbake til toppen
HSTSPolicyBypassList
Configure the list of names that will bypass the HSTS policy check
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
Hostnames specified in this list will be exempt from the HSTS policy check that could potentially upgrade requests from "http://" to "https://". Only single-label hostnames are allowed in this policy. Hostnames must be canonicalized. Any IDNs must be converted to their A-label format, and all ASCII letters must be lowercase. This policy only applies to the specific hostnames specified; it doesn't apply to subdomains of the names in the list.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: HSTSPolicyBypassList
- GP name: Configure the list of names that will bypass the HSTS policy check
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\HSTSPolicyBypassList
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\HSTSPolicyBypassList\1 = meet
Mac information and settings
- Preference Key Name: HSTSPolicyBypassList
- Eksempelverdi:
<array>
<string>meet</string>
</array>
Tilbake til toppen
HardwareAccelerationModeEnabled
Bruk maskinvareakselerasjon når det er tilgjengelig
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify to use hardware acceleration, if it's available. If you enable this policy or don't configure it, hardware acceleration is enabled unless a GPU feature is explicitly blocked.
If you disable this policy, hardware acceleration is disabled.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: HardwareAccelerationModeEnabled
- GP name: Bruk maskinvareakselerasjon når det er tilgjengelig
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
HardwareAccelerationModeEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: HardwareAccelerationModeEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
HideFirstRunExperience
Hide the First-run experience and splash screen
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
If you enable this policy, the First-run experience and the splash screen will not be shown to users when they run Microsoft Edge for the first time.
For the configuration options shown in the First Run Experience, the browser will default to the following:
-On the New Tab Page, the feed type will be set to MSN News and the layout to Inspirational.
-The user will still be automatically signed into Microsoft Edge if the Windows account is of Azure AD or MSA type.
-Sync will not be enabled by default and users will be able to turn on sync from the sync settings.
If you disable or don't configure this policy, the First-run experience and the Splash screen will be shown.
Note: The specific configuration options shown to the user in the First Run Experience, can also be managed by using other specific policies. You can use the HideFirstRunExperience policy in combination with these policies to configure a specific browser experience on your managed devices. Some of these other policies are:
-AutoImportAtFirstRun
-NewTabPageLocation
-NewTabPageSetFeedType
-SyncDisabled
-BrowserSignin
-NonRemovableProfileEnabled
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: HideFirstRunExperience
- GP name: Hide the First-run experience and splash screen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
HideFirstRunExperience
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: HideFirstRunExperience
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportAutofillFormData
Allow importing of autofill form data
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import autofill form data from another browser into Microsoft Edge.
If you enable this policy, the option to manually import autofill data is automatically selected.
If you disable this policy, autofill form data isn't imported at first run, and users can't import it manually.
If you don't configure this policy, autofill data is imported at first run, and users can choose whether to import this data manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge will import autofill data on first run, but users can select or clear **autofill data** option during manual import.
**Note**: This policy currently manages importing from Google Chrome (on Windows 7, 8, and 10 and on macOS) and Mozilla Firefox (on Windows 7, 8, and 10 and on macOS) browsers.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportAutofillFormData
- GP name: Allow importing of autofill form data
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportAutofillFormData
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportAutofillFormData
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportBrowserSettings
Allow importing of browser settings
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Allows users to import browser settings from another browser into Microsoft Edge.
If you enable this policy, the **Browser settings** check box is automatically selected in the **Import browser data** dialog box.
If you disable this policy, browser settings aren't imported at first run, and users can’t import them manually.
If you don’t configure this policy, browser settings are imported at first run, and users can choose whether to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports the settings on first run, but users can select or clear the **browser settings** option during manual import.
**Note**: This policy currently manages importing Google Chrome (on Windows 7, 8, and 10 and on macOS).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportBrowserSettings
- GP name: Allow importing of browser settings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportBrowserSettings
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportBrowserSettings
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportCookies
Allow importing of Cookies
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
Allows users to import Cookies from another browser into Microsoft Edge.
If you disable this policy, Cookies aren't imported on first run.
If you don’t configure this policy, Cookies are imported on first run.
You can also set this policy as a recommendation. This means that Microsoft Edge imports Cookies on first run.
**Note**: This policy currently manages importing Google Chrome (on Windows 7, 8, and 10 and on macOS).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportCookies
- GP name: Allow importing of Cookies
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportCookies
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportCookies
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportExtensions
Allow importing of extensions
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
Allows users to import extensions from another browser into Microsoft Edge.
If you enable this policy, the **Extensions** check box is automatically selected in the **Import browser data** dialog box.
If you disable this policy, extensions aren't imported at first run, and users can't import them manually.
If you don't configure this policy, extensions are imported at first run, and users can choose whether to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports extensions on first run, but users can select or clear the **favorites** option during manual import.
**Note**: This policy currently only supports importing from Google Chrome (on Windows 7, 8, and 10 and on macOS).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportExtensions
- GP name: Allow importing of extensions
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportExtensions
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportExtensions
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportFavorites
Allow importing of favorites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import favorites from another browser into Microsoft Edge.
If you enable this policy, the **Favorites** check box is automatically selected in the **Import browser data** dialog box.
If you disable this policy, favorites aren't imported at first run, and users can’t import them manually.
If you don’t configure this policy, favorites are imported at first run, and users can choose whether to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports favorites on first run, but users can select or clear the **favorites** option during manual import.
**Note**: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10), Google Chrome (on Windows 7, 8, and 10 and on macOS), Mozilla Firefox (on Windows 7, 8, and 10 and on macOS), and Apple Safari (on macOS) browsers.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportFavorites
- GP name: Allow importing of favorites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportFavorites
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportFavorites
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportHistory
Allow importing of browsing history
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import their browsing history from another browser into Microsoft Edge.
If you enable this policy, the **Browsing history** check box is automatically selected in the **Import browser data** dialog box.
If you disable this policy, browsing history data isn't imported at first run, and users can’t import this data manually.
If you don’t configure this policy, browsing history data is imported at first run, and users can choose whether to import it manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports browsing history on first run, but users can select or clear the **history** option during manual import.
**Note**: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10), Google Chrome (on Windows 7, 8, and 10 and on macOS), Mozilla Firefox (on Windows 7, 8, and 10 and on macOS), and Apple Safari (macOS) browsers.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportHistory
- GP name: Allow importing of browsing history
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportHistory
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportHistory
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportHomepage
Allow importing of home page settings
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import their home page setting from another browser into Microsoft Edge.
If you enable this policy, the option to manually import the home page setting is automatically selected.
If you disable this policy, the home page setting isn’t imported at first run, and users can’t import it manually.
If you don’t configure this policy, the home page setting is imported at first run, and users can choose whether to import this data manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge imports the home page setting on first run, but users can select or clear the **home page** option during manual import.
**Note**: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportHomepage
- GP name: Allow importing of home page settings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ImportHomepage
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportHomepage
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportOpenTabs
Allow importing of open tabs
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
Allows users to import open and pinned tabs from another browser into Microsoft Edge.
If you enable this policy, the **Open tabs** check box is automatically selected in the **Import browser data** dialog box.
If you disable this policy, open tabs aren't imported at first run, and users can't import them manually.
If you don't configure this policy, open tabs are imported at first run, and users can choose whether to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports open tabs on first run, but users can select or clear the **Open tabs** option during manual import.
**Note**: This policy currently only supports importing from Google Chrome (on Windows 7, 8, and 10 and on macOS).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportOpenTabs
- GP name: Allow importing of open tabs
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportOpenTabs
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportOpenTabs
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportPaymentInfo
Allow importing of payment info
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import payment info from another browser into Microsoft Edge.
If you enable this policy, the **payment info** check box is automatically selected in the **Import browser data** dialog box.
If you disable this policy, payment info isn’t imported at first run, and users can’t import it manually.
If you don’t configure this policy, payment info is imported at first run, and users can choose whether to import it manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports payment info on first run, but users can select or clear the **payment info** option during manual import.
**Note:** This policy currently manages importing from Google Chrome (on Windows 7, 8, and 10 and on macOS).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportPaymentInfo
- GP name: Allow importing of payment info
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportPaymentInfo
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportPaymentInfo
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportSavedPasswords
Allow importing of saved passwords
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import saved passwords from another browser into Microsoft Edge.
If you enable this policy, the option to manually import saved passwords is automatically selected.
If you disable this policy, saved passwords aren't imported on first run, and users can't import them manually.
If you don't configure this policy, passwords are imported at first run, and users can choose whether to import them manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge imports passwords on first run, but users can select or clear the **passwords** option during manual import.
**Note**: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10), Google Chrome (on Windows 7, 8, and 10 and on macOS), and Mozilla Firefox (on Windows 7, 8, and 10 and on macOS) browsers.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportSavedPasswords
- GP name: Allow importing of saved passwords
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportSavedPasswords
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportSavedPasswords
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportSearchEngine
Allow importing of search engine settings
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows users to import search engine settings from another browser into Microsoft Edge.
If you enable, this policy, the option to import search engine settings is automatically selected.
If you disable this policy, search engine settings aren't imported at first run, and users can’t import them manually.
If you don’t configure this policy, search engine settings are imported at first run, and users can choose whether to import this data manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge imports search engine settings on first run, but users can select or clear the **search engine** option during manual import.
**Note**: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportSearchEngine
- GP name: Allow importing of search engine settings
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportSearchEngine
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportSearchEngine
- Eksempelverdi:
<true/>
Tilbake til toppen
ImportShortcuts
Allow importing of shortcuts
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
Allows users to import Shortcuts from another browser into Microsoft Edge.
If you disable this policy, Shortcuts aren't imported on first run.
If you don’t configure this policy, Shortcuts are imported on first run.
You can also set this policy as a recommendation. This means that Microsoft Edge imports Shortcuts on first run.
**Note**: This policy currently manages importing from Google Chrome (on Windows 7, 8, and 10 and on macOS).
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ImportShortcuts
- GP name: Allow importing of shortcuts
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ImportShortcuts
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ImportShortcuts
- Eksempelverdi:
<true/>
Tilbake til toppen
InPrivateModeAvailability
Configure InPrivate mode availability
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies whether the user can open pages in InPrivate mode in Microsoft Edge.
If you don't configure this policy or set it to 'Enabled' (0), users can open pages in InPrivate mode.
Set this policy to 'Disable' (1) to stop users from using InPrivate mode.
Set this policy to 'Forced' (2) to always use InPrivate mode.
* 0 = InPrivate mode available
* 1 = InPrivate mode disabled
* 2 = InPrivate mode forced
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InPrivateModeAvailability
- GP name: Configure InPrivate mode availability
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
InPrivateModeAvailability
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: InPrivateModeAvailability
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
InternetExplorerIntegrationEnhancedHangDetection
Configure enhanced hang detection for Internet Explorer mode
Supported versions:
- On Windows since 84 or later
Beskrivelse
Enhanced hang detection is a more granular approach to detecting hung webpages in Internet Explorer mode than what standalone Internet Explorer uses. When a hung webpage is detected, the browser will apply a mitigation to prevent the rest of the browser from hanging.
This setting allows you to configure the use of enhanced hang detection in case you run into incompatible issues with any of your websites. We recommend disabling this policy only if you see notifications such as "(website) is not responding" in Internet Explorer mode but not in standalone Internet Explorer.
This setting works in conjunction with:
InternetExplorerIntegrationLevel is set to "Internet Explorer mode" (1)
and
InternetExplorerIntegrationSiteList policy where the list has at least one entry.
If you set this policy to 'Enabled' (1) or don’t configure it, websites running in Internet Explorer mode will use enhanced hang detection.
If you set this policy to 'Disabled' (0), enhanced hang detection is disabled, and users will get the basic Internet Explorer hang detection behavior.
* 0 = Enhanced hang detection disabled
* 1 = Enhanced hang detection enabled
To learn more about Internet Explorer mode, see https://go.microsoft.com/fwlink/?linkid=2094210
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InternetExplorerIntegrationEnhancedHangDetection
- GP name: Configure enhanced hang detection for Internet Explorer mode
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
InternetExplorerIntegrationEnhancedHangDetection
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
InternetExplorerIntegrationLevel
Configure Internet Explorer integration
Supported versions:
- On Windows since 77 or later
Beskrivelse
For guidance about configuring the optimal experience for Internet Explorer mode see https://go.microsoft.com/fwlink/?linkid=2094210
* 0 = None
* 1 = Internet Explorer mode
* 2 = Internet Explorer 11
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InternetExplorerIntegrationLevel
- GP name: Configure Internet Explorer integration
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
InternetExplorerIntegrationLevel
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
InternetExplorerIntegrationSiteList
Configure the Enterprise Mode Site List
Supported versions:
- On Windows since 78 or later
Beskrivelse
For guidance about configuring the optimal experience for Internet Explorer mode see https://go.microsoft.com/fwlink/?linkid=2094210
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InternetExplorerIntegrationSiteList
- GP name: Configure the Enterprise Mode Site List
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
InternetExplorerIntegrationSiteList
- Value Type:
REG_SZ
Eksempelverdi:
https://internal.contoso.com/sitelist.xml
Tilbake til toppen
InternetExplorerIntegrationSiteRedirect
Specify how "in-page" navigations to unconfigured sites behave when started from Internet Explorer mode pages
Supported versions:
- On Windows since 81 or later
Beskrivelse
An "in-page" navigation is started from a link, a script, or a form on the current page. It can also be a server-side redirect of a previous "in-page" navigation attempt. Conversely, a user can start a navigation that isn't "in-page" that's independent of the current page in several ways by using the browser controls. For example, using the address bar, the back button, or a favorite link.
This setting lets you specify whether navigations from pages loaded in Internet Explorer mode to unconfigured sites (that are not configured in the Enterprise Mode Site List) switch back to Microsoft Edge or remain in Internet Explorer mode.
This setting works in conjunction with:
InternetExplorerIntegrationLevel is set to "Internet Explorer mode" (1)
and
InternetExplorerIntegrationSiteList policy where the list has at least one entry.
If you disable or don’t configure this policy, only sites configured to open in Internet Explorer mode will open in that mode. Any site not configured to open in Internet Explorer mode will be redirected back to Microsoft Edge.
If you set this policy to Default (value 0), only sites configured to open in Internet Explorer mode will open in that mode. Any site not configured to open in Internet Explorer mode will be redirected back to Microsoft Edge.
If you set this policy to AutomaticNavigationsOnly (value 1), you get the default experience except that all automatic navigations (such as 302 redirects) to unconfigured sites will be kept in Internet Explorer mode.
If you set this policy to AllInPageNavigations (value 2), all navigations from pages loaded in IE mode to unconfigured sites are kept in Internet Explorer mode (Least Recommended).
If you enable this policy, you can choose one of the following navigation options:
* 0 = Default
* 1 = Keep only automatic navigations in Internet Explorer mode
* 2 = Keep all in-page navigations in Internet Explorer mode
To learn more about Internet Explorer mode, see https://go.microsoft.com/fwlink/?linkid=2105106
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: InternetExplorerIntegrationSiteRedirect
- GP name: Specify how "in-page" navigations to unconfigured sites behave when started from Internet Explorer mode pages
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
InternetExplorerIntegrationSiteRedirect
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
IsolateOrigins
Enable site isolation for specific origins
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify origins to run in isolation, in their own process.
This policy also isolates origins named by subdomains - for example, specifying https://contoso.com/ will cause https://foo.contoso.com/ to be isolated as part of the https://contoso.com/ site.
If the policy is enabled, each of the named origins in a comma-separated list will run in its own process.
If you disable this policy, then both the 'IsolateOrigins' and 'SitePerProcess' features are disabled. Users can still enable 'IsolateOrigins' policy manually, via command line flags.
If you don't configure the policy, the user can change this setting.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: IsolateOrigins
- GP name: Enable site isolation for specific origins
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
IsolateOrigins
- Value Type:
REG_SZ
Eksempelverdi:
https://contoso.com/,https://fabrikam.com/
Mac information and settings
- Preference Key Name: IsolateOrigins
- Eksempelverdi:
<string>https://contoso.com/,https://fabrikam.com/</string>
Tilbake til toppen
LocalProvidersEnabled
Allow suggestions from local providers
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
Allow suggestions from suggestion providers on the device (local providers), for example, Favorites and Browsing History, in Microsoft Edge's Address Bar and Auto-Suggest List.
If you enable this policy, suggestions from local providers are used.
If you disable this policy, suggestions from local providers are never used. Local history and local favorites suggestions will not appear.
If you do not configure this policy, suggestions from local providers are allowed but the user can change that using the settings toggle.
Note that some features may not be available if a policy to disable this feature has been applied. For example, Browsing History suggestions will not be available if you enable the SavingBrowserHistoryDisabled policy.
This policy requires a browser restart to finish applying.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: LocalProvidersEnabled
- GP name: Allow suggestions from local providers
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
LocalProvidersEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: LocalProvidersEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
ManagedFavorites
Configure favorites
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Configures a list of managed favorites.
The policy creates a list of favorites. Each favorite contains the keys "name" and "url," which hold the favorite's name and its target. You can configure a subfolder by defining a favorites without an "url" key but with an additional "children" key that contains a list of favorites as defined above (some of which may be folders again). Microsoft Edge amends incomplete URLs as if they were submitted via the Address Bar, for example "microsoft.com" becomes "https://microsoft.com/".
These favorites are placed in a folder that can't be modified by the user (but the user can choose to hide it from the favorites bar). By default the folder name is "Managed favorites" but you can change it by adding to the list of favorites a dictionary containing the key "toplevel_name" with the desired folder name as the value.
Managed favorites are not synced to the user account and can't be modified by extensions.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ManagedFavorites
- GP name: Configure favorites
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ManagedFavorites
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ManagedFavorites = [
{
"toplevel_name": "My managed favorites folder"
},
{
"name": "Microsoft",
"url": "microsoft.com"
},
{
"name": "Bing",
"url": "bing.com"
},
{
"children": [
{
"name": "Microsoft Edge Insiders",
"url": "www.microsoftedgeinsider.com"
},
{
"name": "Microsoft Edge",
"url": "www.microsoft.com/windows/microsoft-edge"
}
],
"name": "Microsoft Edge links"
}
]
Mac information and settings
- Preference Key Name: ManagedFavorites
- Eksempelverdi:
<key>ManagedFavorites</key>
<array>
<dict>
<key>toplevel_name</key>
<string>My managed favorites folder</string>
</dict>
<dict>
<key>name</key>
<string>Microsoft</string>
<key>url</key>
<string>microsoft.com</string>
</dict>
<dict>
<key>name</key>
<string>Bing</string>
<key>url</key>
<string>bing.com</string>
</dict>
<dict>
<key>children</key>
<array>
<dict>
<key>name</key>
<string>Microsoft Edge Insiders</string>
<key>url</key>
<string>www.microsoftedgeinsider.com</string>
</dict>
<dict>
<key>name</key>
<string>Microsoft Edge</string>
<key>url</key>
<string>www.microsoft.com/windows/microsoft-edge</string>
</dict>
</array>
<key>name</key>
<string>Microsoft Edge links</string>
</dict>
</array>
Tilbake til toppen
ManagedSearchEngines
Manage Search Engines
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Lets you configure a list of up to 10 search engines, one of which must be marked as the default search engine.
You do not need to specify the encoding. Starting in Microsoft Edge 80, the suggest_url and image_search_url parameters are optional. The optional parameter, image_search_post_params (consists of comma-separated name/value pairs), is available starting in Microsoft Edge 80.
Starting in Microsoft Edge 83, you can enable search engine discovery with the allow_search_engine_discovery optional parameter. This parameter must be the first item in the list. If allow_search_engine_discovery is not specified, search engine discovery will be disabled by default. Starting in Microsoft Edge 84, you can set this policy as a recommended policy to allow search provider discovery. You do not need to add the allow_search_engine_discovery optional parameter.
If you enable this policy, users can't add, remove, or change any search engine in the list. Users can set their default search engine to any search engine in the list.
If you disable or don't configure this policy, users can modify the search engines list as desired.
If the DefaultSearchProviderSearchURL policy is set, this policy (ManagedSearchEngines) is ignored. The user must restart their browser to finish applying this policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ManagedSearchEngines
- GP name: Manage Search Engines
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ManagedSearchEngines
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\ManagedSearchEngines = [
{
"allow_search_engine_discovery": true
},
{
"is_default": true,
"keyword": "example1.com",
"name": "Example1",
"search_url": "https://www.example1.com/search?q={searchTerms}",
"suggest_url": "https://www.example1.com/qbox?query={searchTerms}"
},
{
"image_search_post_params": "content={imageThumbnail},url={imageURL},sbisrc={SearchSource}",
"image_search_url": "https://www.example2.com/images/detail/search?iss=sbiupload",
"keyword": "example2.com",
"name": "Example2",
"search_url": "https://www.example2.com/search?q={searchTerms}",
"suggest_url": "https://www.example2.com/qbox?query={searchTerms}"
},
{
"encoding": "UTF-8",
"image_search_url": "https://www.example3.com/images/detail/search?iss=sbiupload",
"keyword": "example3.com",
"name": "Example3",
"search_url": "https://www.example3.com/search?q={searchTerms}",
"suggest_url": "https://www.example3.com/qbox?query={searchTerms}"
},
{
"keyword": "example4.com",
"name": "Example4",
"search_url": "https://www.example4.com/search?q={searchTerms}"
}
]
Mac information and settings
- Preference Key Name: ManagedSearchEngines
- Eksempelverdi:
<key>ManagedSearchEngines</key>
<array>
<dict>
<key>allow_search_engine_discovery</key>
<true/>
</dict>
<dict>
<key>is_default</key>
<true/>
<key>keyword</key>
<string>example1.com</string>
<key>name</key>
<string>Example1</string>
<key>search_url</key>
<string>https://www.example1.com/search?q={searchTerms}</string>
<key>suggest_url</key>
<string>https://www.example1.com/qbox?query={searchTerms}</string>
</dict>
<dict>
<key>image_search_post_params</key>
<string>content={imageThumbnail},url={imageURL},sbisrc={SearchSource}</string>
<key>image_search_url</key>
<string>https://www.example2.com/images/detail/search?iss=sbiupload</string>
<key>keyword</key>
<string>example2.com</string>
<key>name</key>
<string>Example2</string>
<key>search_url</key>
<string>https://www.example2.com/search?q={searchTerms}</string>
<key>suggest_url</key>
<string>https://www.example2.com/qbox?query={searchTerms}</string>
</dict>
<dict>
<key>encoding</key>
<string>UTF-8</string>
<key>image_search_url</key>
<string>https://www.example3.com/images/detail/search?iss=sbiupload</string>
<key>keyword</key>
<string>example3.com</string>
<key>name</key>
<string>Example3</string>
<key>search_url</key>
<string>https://www.example3.com/search?q={searchTerms}</string>
<key>suggest_url</key>
<string>https://www.example3.com/qbox?query={searchTerms}</string>
</dict>
<dict>
<key>keyword</key>
<string>example4.com</string>
<key>name</key>
<string>Example4</string>
<key>search_url</key>
<string>https://www.example4.com/search?q={searchTerms}</string>
</dict>
</array>
Tilbake til toppen
MaxConnectionsPerProxy
Maximum number of concurrent connections to the proxy server
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies the maximum number of simultaneous connections to the proxy server.
Some proxy servers can't handle a high number of concurrent connections per client - you can solve this by setting this policy to a lower value.
The value of this policy should be lower than 100 and higher than 6. The default value is 32.
Some web apps are known to consume many connections with hanging GETs - lowering the maximum connections below 32 may lead to browser networking hangs if too many of these kind of web apps are open.
If you don't configure this policy, the default value (32) is used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: MaxConnectionsPerProxy
- GP name: Maximum number of concurrent connections to the proxy server
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
MaxConnectionsPerProxy
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000020
Mac information and settings
- Preference Key Name: MaxConnectionsPerProxy
- Eksempelverdi:
<integer>32</integer>
Tilbake til toppen
MediaRouterCastAllowAllIPs
Allow Google Cast to connect to Cast devices on all IP addresses
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enable this policy to let Google Cast connect to Cast devices on all IP addresses, not just RFC1918/RFC4193 private addresses.
Disable this policy to restrict Google Cast to Cast devices on RFC1918/RFC4193 private addresses.
If you don't configure this policy, Google Cast connects to Cast devices on RFC1918/RFC4193 private addresses only, unless you enable the CastAllowAllIPs feature.
If the EnableMediaRouter policy is disabled, then this policy has no effect.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: MediaRouterCastAllowAllIPs
- GP name: Allow Google Cast to connect to Cast devices on all IP addresses
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
MediaRouterCastAllowAllIPs
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: MediaRouterCastAllowAllIPs
- Eksempelverdi:
<false/>
Tilbake til toppen
MetricsReportingEnabled
Enable usage and crash-related data reporting
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
This policy enables reporting of usage and crash-related data about Microsoft Edge to Microsoft.
Enable this policy to send reporting of usage and crash-related data to Microsoft. Disable this policy to not send the data to Microsoft. In both cases, users can't change or override the setting.
On Windows 10, if you don't configure this policy, Microsoft Edge will default to the Windows diagnostic data setting. If you enable this policy, Microsoft Edge will only send usage data if the Windows Diagnostic data setting is set to Enhanced or Full. If you disable this policy, Microsoft Edge will not send usage data. Crash-related data is sent based on the Windows Diagnostic data setting. Learn more about Windows Diagnostic data settings at https://go.microsoft.com/fwlink/?linkid=2099569
On Windows 7, 8, and macOS, this policy controls sending usage and crash-related data. If you don't configure this policy, Microsoft Edge will default to the user's preference.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: MetricsReportingEnabled
- GP name: Enable usage and crash-related data reporting
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
MetricsReportingEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: MetricsReportingEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
NativeWindowOcclusionEnabled
Enable Hiding of Native Windows
Supported versions:
- On Windows since 84 or later
Beskrivelse
Enables hiding of native windows in Microsoft Edge.
If you enable this setting, to reduce CPU and power consumption Microsoft Edge will detect when a window is covered by other windows, and will suspend work painting pixels.
If you disable this setting Microsoft Edge will not detect when a window is covered by other windows.
If this policy is left not set, window hiding detection will be enabled.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NativeWindowOcclusionEnabled
- GP name: Enable Hiding of Native Windows
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
NativeWindowOcclusionEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
NavigationDelayForInitialSiteListDownloadTimeout
Set a timeout for delay of tab navigation for the Enterprise Mode Site List
Supported versions:
- On Windows since 84 or later
Beskrivelse
Allows you to set a timeout, in seconds, for Microsoft Edge tabs waiting to navigate until the browser has downloaded the initial Enterprise Mode Site List.
This setting works in conjunction with:
InternetExplorerIntegrationLevel is set to "Internet Explorer mode" (1)
and
InternetExplorerIntegrationSiteList policy where the list has at least one entry
and
DelayNavigationsForInitialSiteListDownload is set to "All eligible navigations" (1).
Tabs will not wait longer than this timeout for the Enterprise Mode Site List to download. If the browser has not finished downloading the Enterprise Mode Site List when the timeout expires, Microsoft Edge tabs will continue navigating anyway. The value of the timeout should be no greater than 20 seconds and no fewer than 1 second.
If you set the timeout in this policy to a value greater than the default of 2 seconds, an information bar is shown to the user after 2 seconds. The information bar contains a button that allows the user to quit waiting for the Enterprise Mode Site List download to complete.
If you don't configure this policy, the default timeout of 2 seconds is used. This default is subject to change in the future.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NavigationDelayForInitialSiteListDownloadTimeout
- GP name: Set a timeout for delay of tab navigation for the Enterprise Mode Site List
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
NavigationDelayForInitialSiteListDownloadTimeout
- Value Type:
REG_DWORD
Eksempelverdi:
0x0000000a
Tilbake til toppen
NetworkPredictionOptions
Slå på nettverksforutsigelse
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables network prediction and prevents users from changing this setting.
This controls DNS prefetching, TCP and SSL preconnection, and prerendering of web pages.
If you don't configure this policy, network prediction is enabled but the user can change it.
* 0 = Predict network actions on any network connection
* 1 = Not supported, if this value is used it will be treated as if 'Predict network actions on any network connection' (0) was set
* 2 = Don't predict network actions on any network connection
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NetworkPredictionOptions
- GP name: Slå på nettverksforutsigelse
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
NetworkPredictionOptions
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: NetworkPredictionOptions
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
NonRemovableProfileEnabled
Configure whether a user always has a default profile automatically signed in with their work or school account
Supported versions:
- On Windows since 78 or later
Beskrivelse
This policy determines if a user can remove the Microsoft Edge profile automatically signed in with a user's work or school account.
If you enable this policy, a non-removable profile will be created with the user's work or school account on Windows. This profile can't be signed out or removed.
If you disable or don't configure this policy, the profile automatically signed in with a user's work or school account on Windows can be signed out or removed by the user.
If you want to configure browser sign in, use the BrowserSignin policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: NonRemovableProfileEnabled
- GP name: Configure whether a user always has a default profile automatically signed in with their work or school account
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
NonRemovableProfileEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
OverrideSecurityRestrictionsOnInsecureOrigin
Control where security restrictions on insecure origins apply
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies a list of origins (URLs) or hostname patterns (like "*.contoso.com") for which security restrictions on insecure origins don't apply.
This policy lets you specify allowed origins for legacy applications that can't deploy TLS or set up a staging server for internal web development so that developers can test out features requiring secure contexts without having to deploy TLS on the staging server. This policy also prevents the origin from being labeled "Not Secure" in the omnibox.
Setting a list of URLs in this policy has the same effect as setting the command-line flag '--unsafely-treat-insecure-origin-as-secure' to a comma-separated list of the same URLs. If you enable this policy, it overrides the command-line flag.
For more information on secure contexts, see https://www.w3.org/TR/secure-contexts/.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: OverrideSecurityRestrictionsOnInsecureOrigin
- GP name: Control where security restrictions on insecure origins apply
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\OverrideSecurityRestrictionsOnInsecureOrigin
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\OverrideSecurityRestrictionsOnInsecureOrigin\1 = http://testserver.contoso.com/
SOFTWARE\Policies\Microsoft\Edge\OverrideSecurityRestrictionsOnInsecureOrigin\2 = *.contoso.com
Mac information and settings
- Preference Key Name: OverrideSecurityRestrictionsOnInsecureOrigin
- Eksempelverdi:
<array>
<string>http://testserver.contoso.com/</string>
<string>*.contoso.com</string>
</array>
Tilbake til toppen
PaymentMethodQueryEnabled
Allow websites to query for available payment methods
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Allows you to set whether websites can check if the user has payment methods saved.
If you disable this policy, websites that use PaymentRequest.canMakePayment or PaymentRequest.hasEnrolledInstrument API will be informed that no payment methods are available.
If you enable this policy or don't set this policy, websites can check if the user has payment methods saved.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PaymentMethodQueryEnabled
- GP name: Allow websites to query for available payment methods
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PaymentMethodQueryEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PaymentMethodQueryEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
PersonalizationReportingEnabled
Allow personalization of ads, search and news by sending browsing history to Microsoft
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
This policy prevents Microsoft from collecting a user's Microsoft Edge browsing history to be used for personalizing advertising, search, news and other Microsoft services.
This setting is only available for users with a Microsoft account. This setting is not available for child accounts or enterprise accounts.
If you disable this policy, users can't change or override the setting. If this policy is enabled or not configured, Microsoft Edge will default to the user’s preference.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PersonalizationReportingEnabled
- GP name: Allow personalization of ads, search and news by sending browsing history to Microsoft
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PersonalizationReportingEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: PersonalizationReportingEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
PinningWizardAllowed
Allow Pin to taskbar wizard
Supported versions:
- On Windows since 80 or later
Beskrivelse
Microsoft Edge uses the Pin to taskbar wizard to help users pin suggested sites to the taskbar. The Pin to taskbar wizard feature is enabled by default and accessible to the user through the Settings and more menu.
If you enable this policy or don't configure it, users can call the Pin to taskbar wizard from the Settings and More menu. The wizard can also be called via a protocol launch.
If you disable this policy, the Pin to taskbar wizard is disabled in the menu and cannot be called via a protocol launch.
User settings to enable or disable the Pin to taskbar wizard aren't available.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PinningWizardAllowed
- GP name: Allow Pin to taskbar wizard
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PinningWizardAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
ProactiveAuthEnabled
Enable Proactive Authentication
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Lets you configure whether to turn on Proactive Authentication.
If you enable this policy, Microsoft Edge tries to proactively authenticate the signed-in user with Microsoft services. At regular intervals, Microsoft Edge checks with an online service for an updated manifest that contains the configuration that governs how to do this.
If you disable this policy, Microsoft Edge doesn't try to proactively authenticate the signed-in user with Microsoft services. Microsoft Edge no longer checks with an online service for an updated manifest that contains the configuration for doing this.
If you don't configure this policy, Proactive Authentication is turned on.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ProactiveAuthEnabled
- GP name: Enable Proactive Authentication
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ProactiveAuthEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ProactiveAuthEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
PromotionalTabsEnabled
Enable full-tab promotional content
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Control the presentation of full-tab promotional or educational content. This setting controls the presentation of welcome pages that help users sign into Microsoft Edge, choose their default browser, or learn about product features.
If you enable this policy (set it true) or don't configure it, Microsoft Edge can show full-tab content to users to provide product information.
If you disable (set to false) this policy, Microsoft Edge can't show full-tab content to users.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PromotionalTabsEnabled
- GP name: Enable full-tab promotional content
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PromotionalTabsEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: PromotionalTabsEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
PromptForDownloadLocation
Ask where to save downloaded files
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set whether to ask where to save a file before downloading it.
If you enable this policy, the user is asked where to save each file before downloading; if you don't configure it, files are saved automatically to the default location, without asking the user.
If you don't configure this policy, the user will be able to change this setting.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: PromptForDownloadLocation
- GP name: Ask where to save downloaded files
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
PromptForDownloadLocation
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: PromptForDownloadLocation
- Eksempelverdi:
<false/>
Tilbake til toppen
QuicAllowed
Tillat QUIC-protokollen
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows use of the QUIC protocol in Microsoft Edge.
If you enable this policy or don't configure it, the QUIC protocol is allowed.
If you disable this policy, the QUIC protocol is blocked.
QUIC is a transport layer network protocol that can improve performance of web applications that currently use TCP.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: QuicAllowed
- GP name: Tillat QUIC-protokollen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
QuicAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: QuicAllowed
- Eksempelverdi:
<true/>
Tilbake til toppen
RelaunchNotification
Notify a user that a browser restart is recommended or required for pending updates
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Notify users that they need to restart Microsoft Edge to apply a pending update.
If you don't configure this policy, Microsoft Edge adds a recycle icon at the far right of the top menu bar to prompt users to restart the browser to apply the update.
If you enable this policy and set it to 'Recommended' (1), a recurring warning prompts users that a restart is recommended. Users can dismiss this warning and defer the restart.
If you set the policy to 'Required' (2), a recurring warning prompts users that the browser will be restarted automatically as soon as a notification period passes. The default period is seven days. You can configure this period with the RelaunchNotificationPeriod policy.
The user's session is restored when the browser restarts.
* 1 = Recommended - Show a recurring prompt to the user indicating that a restart is recommended
* 2 = Required - Show a recurring prompt to the user indicating that a restart is required
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RelaunchNotification
- GP name: Notify a user that a browser restart is recommended or required for pending updates
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
RelaunchNotification
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: RelaunchNotification
- Eksempelverdi:
<integer>1</integer>
Tilbake til toppen
RelaunchNotificationPeriod
Angi tidsperioden for oppdateringsvarsler
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to set the time period, in milliseconds, over which users are notified that Microsoft Edge must be relaunched to apply a pending update.
Over this time period, the user will be repeatedly informed of the need for an update. In Microsoft Edge the app menu changes to indicate that a relaunch is needed once one third of the notification period passes. This notification changes color once two thirds of the notification period passes, and again once the full notification period has passed. The additional notifications enabled by the RelaunchNotification policy follow this same schedule.
If not set, the default period of 604800000 milliseconds (one week) is used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RelaunchNotificationPeriod
- GP name: Angi tidsperioden for oppdateringsvarsler
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
RelaunchNotificationPeriod
- Value Type:
REG_DWORD
Eksempelverdi:
0x240c8400
Mac information and settings
- Preference Key Name: RelaunchNotificationPeriod
- Eksempelverdi:
<integer>604800000</integer>
Tilbake til toppen
RendererCodeIntegrityEnabled
Enable renderer code integrity
Supported versions:
- On Windows since 78 or later
Beskrivelse
If this policy is enabled or left unset, then Renderer Code Integrity is enabled. This policy should only be disabled if compatibility issues are encountered with third party software that must run inside Microsoft Edge's renderer processes.
Disabling this policy has a detrimental effect on Microsoft Edge's security and stability because unknown and potentially hostile code will be allowed to load inside Microsoft Edge's renderer processes.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RendererCodeIntegrityEnabled
- GP name: Enable renderer code integrity
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
RendererCodeIntegrityEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
RequireOnlineRevocationChecksForLocalAnchors
Specify if online OCSP/CRL checks are required for local trust anchors
Supported versions:
- On Windows since 77 or later
Beskrivelse
Control whether online revocation checks (OCSP/CRL checks) are required. If Microsoft Edge can't get revocation status information, these certificates are treated as revoked ("hard-fail").
If you enable this policy, Microsoft Edge always performs revocation checking for server certificates that successfully validate and are signed by locally-installed CA certificates.
If you don't configure or disable this policy, then Microsoft Edge uses the existing online revocation checking settings.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RequireOnlineRevocationChecksForLocalAnchors
- GP name: Specify if online OCSP/CRL checks are required for local trust anchors
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
RequireOnlineRevocationChecksForLocalAnchors
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Tilbake til toppen
ResolveNavigationErrorsUseWebService
Enable resolution of navigation errors using a web service
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allow Microsoft Edge to issue a dataless connection to a web service to probe networks for connectivity in cases like hotel and airport Wi-Fi.
If you enable this policy, a web service is used for network connectivity tests.
If you disable this policy, Microsoft Edge uses native APIs to try to resolve network connectivity and navigation issues.
**Note**: Except on Windows 8 and later versions of Windows, Microsoft Edge *always* uses native APIs to resolve connectivity issues.
If you don't configure this policy, Microsoft Edge respects the user preference that's set under Services at edge://settings/privacy.
Specifically, there's a **Use a web service to help resolve navigation errors** toggle, which the user can switch on or off. Be aware that if you have enabled this policy (ResolveNavigationErrorsUseWebService), the **Use a web service to help resolve navigation errors** setting is turned on, but the user can't change the setting by using the toggle. If you have disabled this policy, the **Use a web service to help resolve navigation errors** setting is turned off, and the user can't change the setting by using the toggle.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ResolveNavigationErrorsUseWebService
- GP name: Enable resolution of navigation errors using a web service
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
ResolveNavigationErrorsUseWebService
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: ResolveNavigationErrorsUseWebService
- Eksempelverdi:
<true/>
Tilbake til toppen
RestrictSigninToPattern
Restrict which accounts can be used as Microsoft Edge primary accounts
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Determines which accounts can be set as browser primary accounts in Microsoft Edge (the account that is chosen during the Sync opt-in flow).
If a user tries to set a browser primary account with a username that doesn't match this pattern, they are blocked and see an appropriate error message.
If you don't configure this policy or leave it blank, users can set any account as a browser primary account in Microsoft Edge.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RestrictSigninToPattern
- GP name: Restrict which accounts can be used as Microsoft Edge primary accounts
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
RestrictSigninToPattern
- Value Type:
REG_SZ
Eksempelverdi:
.*@contoso.com
Mac information and settings
- Preference Key Name: RestrictSigninToPattern
- Eksempelverdi:
<string>.*@contoso.com</string>
Tilbake til toppen
RunAllFlashInAllowMode
Extend Adobe Flash content setting to all content
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
If you enable this policy, all Adobe Flash content embedded in websites that are set to allow Adobe Flash in the content settings -- either by the user or by enterprise policy -- will run. This includes content from other origins and/or small content.
To control which websites are allowed to run Adobe Flash, see the specifications in the DefaultPluginsSetting, PluginsAllowedForUrls, and PluginsBlockedForUrls policies.
If you disable this policy or don't configure it, Adobe Flash content from other origins (from sites that aren't specified in the three policies mentioned immediately above) or small content might be blocked.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: RunAllFlashInAllowMode
- GP name: Extend Adobe Flash content setting to all content
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
RunAllFlashInAllowMode
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: RunAllFlashInAllowMode
- Eksempelverdi:
<true/>
Tilbake til toppen
SSLErrorOverrideAllowed
Allow users to proceed from the HTTPS warning page
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Microsoft Edge shows a warning page when users visit sites that have SSL errors.
If you enable or don't configure (default) this policy, users can click through these warning pages.
If you disable this policy, users are blocked from clicking through any warning page.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SSLErrorOverrideAllowed
- GP name: Allow users to proceed from the HTTPS warning page
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SSLErrorOverrideAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SSLErrorOverrideAllowed
- Eksempelverdi:
<true/>
Tilbake til toppen
SSLVersionMin
Minimum TLS version enabled
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Sets the minimum supported version of SSL. If you don't configure this policy, Microsoft Edge uses a default minimum version, TLS 1.0.
If you enable this policy, you can set the minimum version to one of the following values: "tls1", "tls1.1" or "tls1.2". When set, Microsoft Edge won't use any version of SSL/TLS lower than the specified version. Any unrecognized value is ignored.
* "tls1" = TLS 1.0
* "tls1.1" = TLS 1.1
* "tls1.2" = TLS 1.2
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SSLVersionMin
- GP name: Minimum TLS version enabled
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SSLVersionMin
- Value Type:
REG_SZ
Eksempelverdi:
tls1
Mac information and settings
- Preference Key Name: SSLVersionMin
- Eksempelverdi:
<string>tls1</string>
Tilbake til toppen
SavingBrowserHistoryDisabled
Deaktiver lagring av nettleserlogg
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Disables saving browser history and prevents users from changing this setting.
If you enable this policy, browsing history isn't saved. This also disables tab syncing.
If you disable this policy or don't configure it, browsing history is saved.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SavingBrowserHistoryDisabled
- GP name: Deaktiver lagring av nettleserlogg
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SavingBrowserHistoryDisabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SavingBrowserHistoryDisabled
- Eksempelverdi:
<true/>
Tilbake til toppen
ScreenCaptureAllowed
Allow or deny screen capture
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
If you enable this policy, or don't configure this policy, a web page can use screen-share APIs (for example, getDisplayMedia() or the Desktop Capture extension API) for a screen capture.
If you disable this policy, calls to screen-share APIs will fail. For example, if you're using a web-based online meeting, video or screen sharing will not work.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ScreenCaptureAllowed
- GP name: Allow or deny screen capture
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ScreenCaptureAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ScreenCaptureAllowed
- Eksempelverdi:
<false/>
Tilbake til toppen
ScrollToTextFragmentEnabled
Enable scrolling to text specified in URL fragments
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
This feature lets hyperlink and address bar URL navigations target specific text on a web page, which will be scrolled to after the web page finishes loading.
If you enable or don't configure this policy, web page scrolling to specific text fragments via a URL will be enabled.
If you disable this policy, web page scrolling to specific text fragments via a URL will be disabled.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ScrollToTextFragmentEnabled
- GP name: Enable scrolling to text specified in URL fragments
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ScrollToTextFragmentEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ScrollToTextFragmentEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
SearchSuggestEnabled
Aktiver søkeforslag
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables web search suggestions in Microsoft Edge's Address Bar and Auto-Suggest List and prevents users from changing this policy.
If you enable this policy, web search suggestions are used.
If you disable this policy, web search suggestions are never used, however local history and local favorites suggestions still appear. If you disable this policy, neither the typed characters, nor the URLs visited will be included in telemetry to Microsoft.
If this policy is left not set, search suggestions are enabled but the user can change that.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SearchSuggestEnabled
- GP name: Aktiver søkeforslag
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
SearchSuggestEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SearchSuggestEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
SecurityKeyPermitAttestation
Websites or domains that don't need permission to use direct Security Key attestation
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies websites and domains that don't need explicit user permission when attestation certificates from security keys are requested. Additionally, a signal is sent to the security key indicating that it can use individual attestation. Without this, users are prompted each time a site requests attestation of security keys.
Sites (like https://contoso.com/some/path) only match as U2F appIDs. Domains (like contoso.com) only match as webauthn RP IDs. To cover both U2F and webauthn APIs for a given site, you need to list both the appID URL and domain.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SecurityKeyPermitAttestation
- GP name: Websites or domains that don't need permission to use direct Security Key attestation
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\SecurityKeyPermitAttestation
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\SecurityKeyPermitAttestation\1 = https://contoso.com
Mac information and settings
- Preference Key Name: SecurityKeyPermitAttestation
- Eksempelverdi:
<array>
<string>https://contoso.com</string>
</array>
Tilbake til toppen
SendIntranetToInternetExplorer
Send all intranet sites to Internet Explorer
Supported versions:
- On Windows since 77 or later
Beskrivelse
For guidance about configuring the optimal experience for Internet Explorer mode see https://go.microsoft.com/fwlink/?linkid=2094210
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SendIntranetToInternetExplorer
- GP name: Send all intranet sites to Internet Explorer
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SendIntranetToInternetExplorer
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
SendSiteInfoToImproveServices
Send site information to improve Microsoft services
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
This policy enables sending info about websites visited in Microsoft Edge to Microsoft to improve services like search.
Enable this policy to send info about websites visited in Microsoft Edge to Microsoft. Disable this policy to not send info about websites visited in Microsoft Edge to Microsoft. In both cases, users can't change or override the setting.
On Windows 10, if you don't configure this policy, Microsoft Edge will default to the Windows diagnostic data setting. If this policy is enabled Microsoft Edge will only send info about websites visited in Microsoft Edge if the Windows Diagnostic data setting is set to Full. If this policy is disabled Microsoft Edge will not send info about websites visited. Learn more about Windows Diagnostic data settings: https://go.microsoft.com/fwlink/?linkid=2099569
On Windows 7, 8, and Mac this policy controls sending info about websites visited. If you don't configure this policy, Microsoft Edge will default to the user's preference.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SendSiteInfoToImproveServices
- GP name: Send site information to improve Microsoft services
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SendSiteInfoToImproveServices
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: SendSiteInfoToImproveServices
- Eksempelverdi:
<false/>
Tilbake til toppen
ShowOfficeShortcutInFavoritesBar
Show Microsoft Office shortcut in favorites bar
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specifies whether to include a shortcut to Office.com in the favorites bar. For users signed into Microsoft Edge the shortcut takes users to their Microsoft Office apps and docs.
If this policy is enabled or not configure, users can choose whether to see the shortcut by changing the toggle in the favorites bar context menu.
If the policy is disabled, the shortcut won't be shown.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: ShowOfficeShortcutInFavoritesBar
- GP name: Show Microsoft Office shortcut in favorites bar
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
ShowOfficeShortcutInFavoritesBar
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: ShowOfficeShortcutInFavoritesBar
- Eksempelverdi:
<false/>
Tilbake til toppen
SignedHTTPExchangeEnabled
Slå på støtte for signerte HTTP-utvekslinger (SXG)
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Enable support for Signed HTTP Exchange (SXG).
If this policy isn't set or enabled, Microsoft Edge will accept web contents served as Signed HTTP Exchanges.
If this policy is set to disabled, Signed HTTP Exchanges can't be loaded.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SignedHTTPExchangeEnabled
- GP name: Slå på støtte for signerte HTTP-utvekslinger (SXG)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SignedHTTPExchangeEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SignedHTTPExchangeEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
SitePerProcess
Enable site isolation for every site
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
The 'SitePerProcess' policy can be used to prevent users from opting out of the default behavior of isolating all sites. Note that you can also use the IsolateOrigins policy to isolate additional, finer-grained origins.
If you enable this policy, users can't opt out of the default behavior where each site runs in its own process.
If you disable or don’t configure this policy, a user can opt out of site isolation. (For example, by using "Disable site isolation" entry in edge://flags.) Disabling the policy or not configuring the policy doesn't turn off Site Isolation.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SitePerProcess
- GP name: Enable site isolation for every site
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SitePerProcess
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SitePerProcess
- Eksempelverdi:
<true/>
Tilbake til toppen
SpellcheckEnabled
Aktiver stavekontrollen
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
If you enable or don't configure this policy, the user can use spellcheck.
If you disable this policy, the user can't use spellcheck and the SpellcheckLanguage and SpellcheckLanguageBlocklist policies are also disabled.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SpellcheckEnabled
- GP name: Aktiver stavekontrollen
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SpellcheckEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: SpellcheckEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
SpellcheckLanguage
Enable specific spellcheck languages
Supported versions:
- On Windows since 77 or later
Beskrivelse
Enables different languages for spellcheck. Any language that you specify that isn't recognized is ignored.
If you enable this policy, spellcheck is enabled for the languages specified, as well as any languages the user has enabled.
If you don't configure or disable this policy, there's no change to the user's spellcheck preferences.
If the SpellcheckEnabled policy is disabled, this policy will have no effect.
If a language is included in both the 'SpellcheckLanguage' and the SpellcheckLanguageBlocklist policy, the spellcheck language is enabled.
The supported languages are: af, bg, ca, cs, cy, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SpellcheckLanguage
- GP name: Enable specific spellcheck languages
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguage
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguage\1 = fr
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguage\2 = es
Tilbake til toppen
SpellcheckLanguageBlocklist
Tving deaktivering av stavekontroll for bestemte språk
Supported versions:
- On Windows since 78 or later
Beskrivelse
Force-disables spellcheck languages. Unrecognized languages in that list will be ignored.
If you enable this policy, spellcheck will be disabled for the languages specified. The user can still enable or disable spellcheck for languages not in the list.
If you do not set this policy, or disable it, there will be no change to the user's spellcheck preferences.
If the SpellcheckEnabled policy is set to disabled, this policy will have no effect.
If a language is included in both the SpellcheckLanguage and the 'SpellcheckLanguageBlocklist' policy, the spellcheck language is enabled.
The currently supported languages are: af, bg, ca, cs, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SpellcheckLanguageBlocklist
- GP name: Tving deaktivering av stavekontroll for bestemte språk
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguageBlocklist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguageBlocklist\1 = fr
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguageBlocklist\2 = es
Tilbake til toppen
StricterMixedContentTreatmentEnabled
Enable stricter treatment for mixed content
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
This policy is deprecated because it's only intended to be a short-term mechanism to give enterprises more time to update their web content if and when it's found to be incompatible with stricter mixed content treatment. It won't work in Microsoft Edge as soon as version 84.
This policy controls the treatment for mixed content (HTTP content in HTTPS sites) in the browser.
If you set this policy to true or not set, audio and video mixed content will be automatically upgraded to HTTPS (that is, the URL will be rewritten as HTTPS, without a fallback if the resource isn’t available over HTTPS) and a 'Not Secure' warning will be shown in the URL bar for image mixed content.
If you set the policy to false, auto upgrades will be disabled for audio and video, and no warning will be shown for images.
This policy does not affect other types of mixed content other than audio, video, and images.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: StricterMixedContentTreatmentEnabled
- GP name: Enable stricter treatment for mixed content (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
StricterMixedContentTreatmentEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: StricterMixedContentTreatmentEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
SuppressUnsupportedOSWarning
Ignorer advarselen om at operativsystemet ikke støttes
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Suppresses the warning that appears when Microsoft Edge is running on a computer or operating system that is no longer supported.
If this policy is false or unset, the warnings will appear on such unsupported computers or operating systems.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SuppressUnsupportedOSWarning
- GP name: Ignorer advarselen om at operativsystemet ikke støttes
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
SuppressUnsupportedOSWarning
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SuppressUnsupportedOSWarning
- Eksempelverdi:
<true/>
Tilbake til toppen
SyncDisabled
Disable synchronization of data using Microsoft sync services
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Disables data synchronization in Microsoft Edge. This policy also prevents the sync consent prompt from appearing.
If you don't set this policy or apply it as recommended, users will be able to turn sync on or off. If you apply this policy as mandatory, users will not be able to turn sync on.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SyncDisabled
- GP name: Disable synchronization of data using Microsoft sync services
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
SyncDisabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: SyncDisabled
- Eksempelverdi:
<true/>
Tilbake til toppen
SyncTypesListDisabled
Configure the list of types that are excluded from synchronization
Supported versions:
- On Windows and macOS since 83 or later
Beskrivelse
If you enable this policy all the specified data types will be excluded from synchronization. This policy can be used to limit the type of data uploaded to the Microsoft Edge synchronization service.
You can provide one of the following data types for this policy: "favorites", "settings", "passwords", "addressesAndMore", "extensions", and “collections”. Note that these data type names are case sensitive.
Users will not be able to override the disabled data types.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: SyncTypesListDisabled
- GP name: Configure the list of types that are excluded from synchronization
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\SyncTypesListDisabled
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\SyncTypesListDisabled\1 = favorites
Mac information and settings
- Preference Key Name: SyncTypesListDisabled
- Eksempelverdi:
<array>
<string>favorites</string>
</array>
Tilbake til toppen
TLS13HardeningForLocalAnchorsEnabled
Enable a TLS 1.3 security feature for local trust anchors.
Supported versions:
- On Windows and macOS since 81 or later
Beskrivelse
This policy controls a security feature in TLS 1.3 that protects connections against downgrade attacks. It is backwards-compatible and will not affect connections to compliant TLS 1.2 servers or proxies. However, older versions of some TLS-intercepting proxies have an implementation flaw which causes them to be incompatible.
If you enable this policy or don't set it, Microsoft Edge will enable these security protections for all connections.
If you disable this policy, Microsoft Edge will disable these security protections for connections authenticated with locally-installed CA certificates. These protections are always enabled for connections authenticated with publicly-trusted CA certificates.
This policy may be used to test for any affected proxies and upgrade them. Affected proxies are expected to fail connections with an error code of ERR_TLS13_DOWNGRADE_DETECTED. A later version of Microsoft Edge will enable this option by default.
After it is enabled by default, administrators who need more time to upgrade affected proxies may use this policy to temporarily disable this security feature. This policy will be removed after version 85.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: TLS13HardeningForLocalAnchorsEnabled
- GP name: Enable a TLS 1.3 security feature for local trust anchors.
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
TLS13HardeningForLocalAnchorsEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: TLS13HardeningForLocalAnchorsEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
TabFreezingEnabled
Allow freezing of background tabs
Supported versions:
- On Windows and macOS since 79 or later
Beskrivelse
Controls whether Microsoft Edge can freeze tabs that are in the background for at least 5 minutes.
Tab freezing reduces CPU, battery, and memory usage. Microsoft Edge uses heuristics to avoid freezing tabs that do useful work in the background, such as display notifications, play sound, and stream video.
If you enable or don't configure this policy, tabs that have been in the background for at least 5 minutes might be frozen.
If you disable this policy, no tabs will be frozen.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: TabFreezingEnabled
- GP name: Allow freezing of background tabs
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
TabFreezingEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: TabFreezingEnabled
- Eksempelverdi:
<false/>
Tilbake til toppen
TaskManagerEndProcessEnabled
Enable ending processes in the Browser task manager
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
If you enable or don't configure this policy, users can end processes in the Browser task manager. If you disable it, users can't end processes, and the End process button is disabled in the Browser task manager.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: TaskManagerEndProcessEnabled
- GP name: Enable ending processes in the Browser task manager
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
TaskManagerEndProcessEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: TaskManagerEndProcessEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
TotalMemoryLimitMb
Set limit on megabytes of memory a single Microsoft Edge instance can use.
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Configures the amount of memory that a single Microsoft Edge instance can use before tabs start getting discarded to save memory. The memory used by the tab will be freed and the tab will have to be reloaded when switched to.
If you enable this policy, the browser will start to discard tabs to save memory once the limitation is exceeded. However, there is no guarantee that the browser is always running under the limit. Any value under 1024 will be rounded up to 1024.
If you don't set this policy, the browser will only attempt to save memory when it has detected that the amount of physical memory on its machine is low.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: TotalMemoryLimitMb
- GP name: Set limit on megabytes of memory a single Microsoft Edge instance can use.
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
TotalMemoryLimitMb
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000800
Mac information and settings
- Preference Key Name: TotalMemoryLimitMb
- Eksempelverdi:
<integer>2048</integer>
Tilbake til toppen
TrackingPrevention
Block tracking of users' web-browsing activity
Supported versions:
- On Windows and macOS since 78 or later
Beskrivelse
Lets you decide whether to block websites from tracking users' web-browsing activity.
If you enable this policy, you have the following options for setting the level of tracking prevention:
* 0 = Off (no tracking prevention)
* 1 = Basic (blocks harmful trackers, content and ads will be personalized)
* 2 = Balanced (blocks harmful trackers and trackers from sites user has not visited; content and ads will be less personalized)
* 3 = Strict (blocks harmful trackers and majority of trackers from all sites; content and ads will have minimal personalization. Some parts of sites might not work)
If you disable this policy or don't configure it, users can set their own level of tracking prevention.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: TrackingPrevention
- GP name: Block tracking of users' web-browsing activity
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
TrackingPrevention
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000002
Mac information and settings
- Preference Key Name: TrackingPrevention
- Eksempelverdi:
<integer>2</integer>
Tilbake til toppen
TranslateEnabled
Aktiver oversettelse
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Enables the integrated Microsoft translation service on Microsoft Edge.
If you enable this policy, Microsoft Edge offers translation functionality to the user by showing an integrated translate flyout when appropriate, and a translate option on the right-click context menu.
Disable this policy to disable all built-in translate features.
If you don't configure the policy, users can choose whether to use the translation functionality or not.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Ja
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: TranslateEnabled
- GP name: Aktiver oversettelse
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
Administrative Templates/Microsoft Edge - Standardinnstillinger (kan overstyres av brukere)/
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
SOFTWARE\Policies\Microsoft\Edge\Recommended
- Value Name:
TranslateEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: TranslateEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
URLAllowlist
Define a list of allowed URLs
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allow access to the listed URLs, as exceptions to the URL block list.
Format the URL pattern according to https://go.microsoft.com/fwlink/?linkid=2095322.
You can use this policy to open exceptions to restrictive block lists. For example, you can include '*' in the block list to block all requests, and then use this policy to allow access to a limited list of URLs. You can use this policy to open exceptions to certain schemes, subdomains of other domains, ports, or specific paths.
The most specific filter determines if a URL is blocked or allowed. The allowed list takes precedence over the block list.
This policy is limited to 1000 entries; subsequent entries are ignored.
If you don't configure this policy, there are no exceptions to the block list in the URLBlocklist policy.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: URLAllowlist
- GP name: Define a list of allowed URLs
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\1 = contoso.com
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\2 = https://ssl.server.com
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\3 = hosting.com/good_path
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\4 = https://server:8080/path
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\5 = .exact.hostname.com
Mac information and settings
- Preference Key Name: URLAllowlist
- Eksempelverdi:
<array>
<string>contoso.com</string>
<string>https://ssl.server.com</string>
<string>hosting.com/good_path</string>
<string>https://server:8080/path</string>
<string>.exact.hostname.com</string>
</array>
Tilbake til toppen
URLBlocklist
Blokker tilgang til en liste over nettadresser
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Define a list of sites, based on URL patterns, that are blocked (your users can't load them).
Format the URL pattern according to https://go.microsoft.com/fwlink/?linkid=2095322.
You can define exceptions in the URLAllowlist policy. These policies are limited to 1000 entries; subsequent entries are ignored.
Note that blocking internal 'edge://*' URLs isn't recommended - this may lead to unexpected errors.
This policy doesn't prevent the page from updating dynamically through JavaScript. For example, if you block 'contoso.com/abc', users might still be able to visit 'contoso.com' and click on a link to visit 'contoso.com/abc', as long as the page doesn't refresh.
If you don't configure this policy, no URLs are blocked.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: URLBlocklist
- GP name: Blokker tilgang til en liste over nettadresser
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\1 = contoso.com
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\2 = https://ssl.server.com
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\3 = hosting.com/bad_path
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\4 = https://server:8080/path
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\5 = .exact.hostname.com
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\6 = file://*
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\7 = custom_scheme:*
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\8 = *
Mac information and settings
- Preference Key Name: URLBlocklist
- Eksempelverdi:
<array>
<string>contoso.com</string>
<string>https://ssl.server.com</string>
<string>hosting.com/bad_path</string>
<string>https://server:8080/path</string>
<string>.exact.hostname.com</string>
<string>file://*</string>
<string>custom_scheme:*</string>
<string>*</string>
</array>
Tilbake til toppen
UserDataDir
Set the user data directory
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Set the directory to use for storing user data.
If you enable this policy, Microsoft Edge uses the specified directory regardless of whether the user has set the '--user-data-dir' command-line flag.
If you don't enable this policy, the default profile path is used, but the user can override it by using the '--user-data-dir' flag. Users can find the directory for the profile at edge://version/ under profile path.
To avoid data loss or other errors, don't configure this policy to a volume's root directory or to a directory that's used for other purposes, because Microsoft Edge manages its contents.
See https://go.microsoft.com/fwlink/?linkid=2095041 for a list of variables that can be used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: UserDataDir
- GP name: Set the user data directory
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
UserDataDir
- Value Type:
REG_SZ
Eksempelverdi:
${users}/${user_name}/Edge
Mac information and settings
- Preference Key Name: UserDataDir
- Eksempelverdi:
<string>${users}/${user_name}/Edge</string>
Tilbake til toppen
UserFeedbackAllowed
Tillat brukertilbakemeldinger
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Microsoft Edge uses the Edge Feedback feature (enabled by default) to allow users to send feedback, suggestions or customer surveys and to report any issues with the browser. Also, by default, users can't disable (turn off) the Edge Feedback feature.
If you enable this policy or don't configure it, users can invoke Edge Feedback.
If you disable this policy, users can't invoke Edge Feedback.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: UserFeedbackAllowed
- GP name: Tillat brukertilbakemeldinger
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
UserFeedbackAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: UserFeedbackAllowed
- Eksempelverdi:
<true/>
Tilbake til toppen
VideoCaptureAllowed
Allow or block video capture
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Control whether sites can capture video.
If enabled or not configured (default), the user will be asked about video capture access for all sites except those with URLs configured in the VideoCaptureAllowedUrls policy list, which will be granted access without prompting.
If you disable this policy, the user isn't prompted, and video capture is only available to URLs configured in VideoCaptureAllowedUrls policy.
This policy affects all types of video inputs, not only the built-in camera.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: VideoCaptureAllowed
- GP name: Allow or block video capture
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
VideoCaptureAllowed
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000000
Mac information and settings
- Preference Key Name: VideoCaptureAllowed
- Eksempelverdi:
<false/>
Tilbake til toppen
VideoCaptureAllowedUrls
Sites that can access video capture devices without requesting permission
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Specify websites, based on URL patterns, that can use video capture devices without asking the user for permission. Patterns in this list are matched against the security origin of the requesting URL. If they match, the site is automatically granted access to video capture devices.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: VideoCaptureAllowedUrls
- GP name: Sites that can access video capture devices without requesting permission
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\VideoCaptureAllowedUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\VideoCaptureAllowedUrls\1 = https://www.contoso.com/
SOFTWARE\Policies\Microsoft\Edge\VideoCaptureAllowedUrls\2 = https://[*.]contoso.edu/
Mac information and settings
- Preference Key Name: VideoCaptureAllowedUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com/</string>
<string>https://[*.]contoso.edu/</string>
</array>
Tilbake til toppen
WPADQuickCheckEnabled
Set WPAD optimization
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to turn off WPAD (Web Proxy Auto-Discovery) optimization in Microsoft Edge.
If you disable this policy, WPAD optimization is disabled, which makes the browser wait longer for DNS-based WPAD servers.
If you enable or don't configure the policy, WPAD optimization is enabled.
Independent of whether or how this policy is enabled, the WPAD optimization setting cannot be changed by users.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WPADQuickCheckEnabled
- GP name: Set WPAD optimization
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WPADQuickCheckEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: WPADQuickCheckEnabled
- Eksempelverdi:
<true/>
Tilbake til toppen
WebAppInstallForceList
Konfigurer en liste over administratorinstallerte nettprogrammer
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Specifies a list of websites that are installed silently, without user interaction, and which can't be uninstalled or disabled by the user.
Each list item of the policy is an object with the following members:
- "url", which is mandatory. "url" should be the URL of the web app to install.
Values for the optional members are:
- "launch_container" should be either "window" or "tab" to indicate how the Web App will be opened after it's installed.
- "create_desktop_shortcut" should be true if a desktop shortcut should be created on Windows.
If "default_launch_container" is omitted, the app will open in a tab by default. Regardless of the value of "default_launch_container", users can change which container the app will open in. If "create_desktop_shortcuts" is omitted, no desktop shortcuts will be created.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Ja
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebAppInstallForceList
- GP name: Konfigurer en liste over administratorinstallerte nettprogrammer
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WebAppInstallForceList
- Value Type:
REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\WebAppInstallForceList = [
{
"create_desktop_shortcut": true,
"default_launch_container": "window",
"url": "https://www.contoso.com/maps"
},
{
"default_launch_container": "tab",
"url": "https://app.contoso.edu"
}
]
Mac information and settings
- Preference Key Name: WebAppInstallForceList
- Eksempelverdi:
<key>WebAppInstallForceList</key>
<array>
<dict>
<key>create_desktop_shortcut</key>
<true/>
<key>default_launch_container</key>
<string>window</string>
<key>url</key>
<string>https://www.contoso.com/maps</string>
</dict>
<dict>
<key>default_launch_container</key>
<string>tab</string>
<key>url</key>
<string>https://app.contoso.edu</string>
</dict>
</array>
Tilbake til toppen
WebComponentsV0Enabled
Re-enable Web Components v0 API until M84.
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
The Web Components v0 APIs (Shadow DOM v0, Custom Elements v0, and HTML Imports) were deprecated in 2018, and have been disabled by default starting in M80. This policy allows these features to be selectively re-enabled until M84.
If you set this policy is set to True, the Web Components v0 features will be enabled for all sites.
If you set this policy to False or don't set this policy, the Web Components v0 features will be disabled by default, starting in M80.
This policy will be removed after Microsoft Edge 84.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebComponentsV0Enabled
- GP name: Re-enable Web Components v0 API until M84. (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WebComponentsV0Enabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: WebComponentsV0Enabled
- Eksempelverdi:
<true/>
Tilbake til toppen
WebDriverOverridesIncompatiblePolicies
Tillat at WebDriver overstyrer inkompatible regler
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows and macOS since 77, until 84
Beskrivelse
This policy will be obsolete in Microsoft Edge version 84 because WebDriver is now compatible with all existing policies.
This policy allows users of the WebDriver feature to override
policies which can interfere with its operation.
Currently this policy disables SitePerProcess and IsolateOrigins policies.
If the policy is enabled, WebDriver will be able to override incomaptible
policies.
If the policy is disabled or not configured, WebDriver will not be allowed
to override incompatible policies.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebDriverOverridesIncompatiblePolicies
- GP name: Tillat at WebDriver overstyrer inkompatible regler (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WebDriverOverridesIncompatiblePolicies
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Mac information and settings
- Preference Key Name: WebDriverOverridesIncompatiblePolicies
- Eksempelverdi:
<true/>
Tilbake til toppen
WebRtcLocalIpsAllowedUrls
Manage exposure of local IP addressess by WebRTC
Supported versions:
- On Windows and macOS since 80 or later
Beskrivelse
Specifies a list of origins (URLs) or hostname patterns (like "*contoso.com*") for which local IP address should be exposed by WebRTC.
If you enable this policy and set a list of origins (URLs) or hostname patterns, when edge://flags/#enable-webrtc-hide-local-ips-with-mdns is Enabled, WebRTC will expose the local IP address for cases that match patterns in the list.
If you disable or don't configure this policy, and edge://flags/#enable-webrtc-hide-local-ips-with-mdns is Enabled, WebRTC will not expose local IP addresses. The local IP address is concealed with an mDNS hostname.
If you enable, disable, or don't configure this policy, and edge://flags/#enable-webrtc-hide-local-ips-with-mdns is Disabled, WebRTC will expose local IP addresses.
Please note that this policy weakens the protection of local IP addresses that might be needed by administrators.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebRtcLocalIpsAllowedUrls
- GP name: Manage exposure of local IP addressess by WebRTC
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\WebRtcLocalIpsAllowedUrls
- Path (Recommended):
N/A
- Value Name:
1, 2, 3, ...
- Value Type:
list of REG_SZ
Eksempelverdi:
SOFTWARE\Policies\Microsoft\Edge\WebRtcLocalIpsAllowedUrls\1 = https://www.contoso.com
SOFTWARE\Policies\Microsoft\Edge\WebRtcLocalIpsAllowedUrls\2 = *contoso.com*
Mac information and settings
- Preference Key Name: WebRtcLocalIpsAllowedUrls
- Eksempelverdi:
<array>
<string>https://www.contoso.com</string>
<string>*contoso.com*</string>
</array>
Tilbake til toppen
WebRtcLocalhostIpHandling
Restrict exposure of local IP address by WebRTC
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Allows you to set whether or not WebRTC exposes the user's local IP address.
If you set this policy to "AllowAllInterfaces" ('default') or "AllowPublicAndPrivateInterfaces" ('default_public_and_private_interfaces'), WebRTC exposes the local IP address.
If you set this policy to "AllowPublicInterfaceOnly" ('default_public_interface_only') or "DisableNonProxiedUdp" ('disable_non_proxied_udp'), WebRTC doesn't expose the local IP address.
If you don't set this policy, or if you disable it, WebRTC exposes the local IP address.
* 'default' = Allow all interfaces. This exposes the local IP address.
* 'default_public_and_private_interfaces' = Allow public and private interfaces over http default route. This exposes the local IP address.
* 'default_public_interface_only' = Allow public interface over http default route. This doesn't expose the local IP address.
* 'disable_non_proxied_udp' = Use TCP unless proxy server supports UDP. This doesn't expose the local IP address.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebRtcLocalhostIpHandling
- GP name: Restrict exposure of local IP address by WebRTC
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WebRtcLocalhostIpHandling
- Value Type:
REG_SZ
Eksempelverdi:
default
Mac information and settings
- Preference Key Name: WebRtcLocalhostIpHandling
- Eksempelverdi:
<string>default</string>
Tilbake til toppen
WebRtcUdpPortRange
Begrens området for lokale UDP-porter som brukes av WebRTC
Supported versions:
- On Windows and macOS since 77 or later
Beskrivelse
Restricts the UDP port range used by WebRTC to a specified port interval (endpoints included).
By configuring this policy, you specify the range of local UDP ports that WebRTC can use.
If you don't configure this policy, or if you set it to an empty string or invalid port range, WebRTC can use any available local UDP port.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WebRtcUdpPortRange
- GP name: Begrens området for lokale UDP-porter som brukes av WebRTC
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WebRtcUdpPortRange
- Value Type:
REG_SZ
Eksempelverdi:
10000-11999
Mac information and settings
- Preference Key Name: WebRtcUdpPortRange
- Eksempelverdi:
<string>10000-11999</string>
Tilbake til toppen
WinHttpProxyResolverEnabled
Use Windows proxy resolver
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a future release.
Supported versions:
- On Windows since 84 or later
Beskrivelse
Use Windows to resolve proxies for all browser networking instead of the proxy resolver built into Microsoft Edge. The Windows proxy resolver enables Windows proxy features such as DirectAccess/NRPT.
This policy comes with the problems described by https://crbug.com/644030. It causes PAC files to be fetched and executed by Windows code, including PAC files set via the ProxyPacUrl policy. Since Network Fetches for the PAC file happen via Windows instead of Microsoft Edge code, network policies such as DnsOverHttpsMode will not apply to network fetches for a PAC file.
This policy is deprecated. It will be superseded by a similar feature in a future release, see https://crbug.com/1032820.
If you enable this policy, the Windows proxy resolver will be used.
If you disable or don't configure this policy, the Microsoft Edge proxy resolver will be used.
Støttede funksjoner:
-
Can be mandatory:
Ja
-
Can be recommended:
Nei
-
Dynamisk oppdatering av retningslinje:
Nei - Requires browser restart
Data Type:
Windows information and settings
Group Policy (ADMX) info
- GP unique name: WinHttpProxyResolverEnabled
- GP name: Use Windows proxy resolver (deprecated)
- GP path (Mandatory):
Administrative Templates/Microsoft Edge/
- GP path (Recommended):
N/A
- GP ADMX file name: MSEdge.admx
Windows Registry Settings
- Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended):
N/A
- Value Name:
WinHttpProxyResolverEnabled
- Value Type:
REG_DWORD
Eksempelverdi:
0x00000001
Tilbake til toppen
See also