Microsoft Edge Enterprise Guide
Microsoft Edge Enterprise Guide
e OVERVIEW
q VIDEO
` DEPLOY
Deploy to Windows
Deploy to macOS
c HOW-TO GUIDE
p CONCEPT
Security
Privacy
Policy reference
i REFERENCE
b GET STARTED
d TRAINING
One of the benefits of the next version of Microsoft Edge is that Microsoft can provide
new features regularly. However, as the admin who deploys Microsoft Edge to users in
your organization, you might want more control over how often your users get these
new features. Microsoft provides four options, called channels, to control how often
Microsoft Edge is updated with new features. Here's an overview of the four options.
For more information on support for each channel, read: Microsoft Edge Lifecycle
7 Note
Channel overview
Channel Primary purpose How often updated Supported?
with new features
The update channel you decide to deploy depends on several factors. For example, the
number of line-of-business applications in use will affect your testing requirements
every time there's a Microsoft Edge update. To help you make this decision, review the
following information about the four update channels that are available for Microsoft
Edge.
Stable Channel
The Stable Channel is intended for broad deployment in your organization, and it's the
channel that most users should be on. It's the most stable of the channels and is the
result of the stabilization of the feature set available in the prior Beta Channel release.
New features ship about every 4 weeks. Security and quality updates ship as needed. A
release from the Stable Channel is serviced until the next release from the channel is
available.
Beta Channel
The Beta Channel is intended for production deployment to a representative sample set
of users. It's a supported release, and each release from Beta is serviced until the next
release is available. This channel provides a great opportunity to validate that things
work as expected in your environment. If you find an issue, it can be remediated before
the release is published to the Stable Channel. New features ship about every 4 weeks.
Security and quality updates ship as needed.
Dev Channel
The Dev Channel is intended to help you plan and develop with the latest capabilities of
Microsoft Edge, but with higher quality than the Canary Channel. This channel is your
opportunity to get an early look at what is coming next and prepare for the next Beta
release.
Canary Channel
The Canary Channel ships daily and is the most bleeding edge of all the channels. If you
want access to the newest investments, they'll appear here first. Because of the nature of
this cadence, problems will arise over time. You may want another channel installed side
by side if you're using the Canary releases.
If you automatically update Microsoft Edge, you can use group policy objects to opt in
to the Extended Stable Release Cadence. Follow this guide for more information on
downloading and installing the latest Microsoft Edge Group Policy administrative
templates.
When the next update to the Extended Stable channel is released that has a version
number higher than what your device currently has installed, Microsoft Edge will
automatically update onto the Extended Stable channel. The version string on
edge://settings/help will indicate that you're running a different channel.
7 Note
Opting-in to Extended Stable will take effect when there is a new update on the
Extended Stable channel with a larger version number (major or minor) than what is
currently installed on your device. If you are running the latest version of Microsoft
Edge Stable and opt-in to Extended Stable, it will take effect with the next patch or
update of Microsoft Edge.
By default, Microsoft Edge will not downgrade itself. If you are currently running an
odd-numbered version of Microsoft Edge Stable, opting-in to Extended Stable will
mean that you will receive NO updates until the next even-numbered Microsoft
Edge release.
If you want to ensure that all of your devices start with a specific version of
Extended Stable, you can deploy that specific version of Edge Stable as an MSI with
rollback enabled. For example, if you want to start with Extended Stable 94 but
some devices have already updated to Stable 95, you can deploy an MSI of Edge 94
with rollback enabled. For more information on how to deploy Edge MSIs with
rollback enabled, see our rollback guide.
Microsoft Edge Administrative Templates can be managed similarly to local Group Policy
Objects from the Microsoft Endpoint Manager admin center. Follow our guide on
configuring Microsoft Edge with Intune.
The “Target Channel override” setting can be found under the “Microsoft Edge Update
>Applications>Microsoft Edge” subfolders. It should be set to “Extended Stable”
When the next update to the Extended Stable channel is released that has a version
number larger than what your device currently has installed, Microsoft Edge will
automatically update onto the Extended Stable channel. The version string on
edge://settings/help will indicate that you're running a different channel.
Extended Stable updates are distributed in the software library under the “Microsoft
Edge” product category, similar to existing updates for the Stable, Beta, and Dev
channels. However, unlike Beta and Dev, which apply to their own browser applications,
the Extended Stable updates apply to Microsoft Edge Stable application. Therefore, for
your Windows Update client to determine whether to apply Stable or Extended Stable
updates, it checks the status of the “Target Channel override” group policy. If the policy
isn't configured or is set to “Stable,” Stable updates will apply. If it's set to “Extended
Stable,” then Extended Stable updates will apply. Follow the instructions above for
opting in to Extended Stable with Automatic Updates for instructions on how to
properly set the Group Policy.
7 Note
7 Note
Since build on the “Beta” and “Dev” channels of Microsoft Edge have major version
numbers larger than that of “Stable,” if you take an update to the “Beta” or “Dev”
channel and wish to revert back to Stable, Microsoft Edge’s rollback feature will be
required. Simply setting “Target Channel override” back to Stable will mean you will
receive NO updates until the latest Stable release has a greater version number
than the version of Microsoft Edge you are presently running on your device.
See also
Microsoft Edge Enterprise landing page
Channel downloads
Customer adoption materials for
Microsoft Edge
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
To support the deployment and adoption of Microsoft Edge, see the following collected
materials and resources. A zip file of these materials and resources is provided for you to
download.
The adoption kit is available in English and several other languages, including French,
German, and Japanese. Select your preferred language at the Microsoft Edge Customer
Adoption Kit download center .
Internet Explorer (IE) Retirement Resources
Find valuable resources and expert guidance to help your organization safely and
quickly move from IE to Microsoft Edge.
IT Deployment Guide
Use this guide to begin planning deployment and learn how to get started deploying
Microsoft Edge in your environment.
How to Get Started User Guide
Use this guide to educate users about Microsoft Edge. The guide includes overviews of
the UI, menus, and features. We've also included tips to help users get started.
Adoption Email Templates
Use email to achieve a smooth transition as you rollout Microsoft Edge to end users.
We've packaged a set of emails for you to use as an internal campaign. They provide
tips and articulate how Microsoft Edge can save time and simplify their workday. The
following screenshot shows an example of these templates.
Digital Signage
Use the following digital signage to inform users about Microsoft Edge:
One-pagers
Send or post these one-pagers to help your employees learn about Microsoft Edge and
set up the browser for use at work.
Other learning resources
If you're interested in learning more about the benefits of Microsoft Edge, visit our
webpage .
See also
Microsoft Edge setup guide
Microsoft Edge Enterprise landing page
Microsoft Edge hands-on deployment
lab
Article • 06/03/2022
The Microsoft Edge team partnered with the Windows and Office Deployment Lab to
create an area for you to test Microsoft Edge in a virtual environment. This lab
automates the configuration of a virtual M365 desktop/management environment that
lets you provision Microsoft Edge in a Microsoft Endpoint Configuration Manager
instance.
For more information, see the Windows and Office Deployment Lab Kit.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge frequently asked
questions
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article contains frequently asked questions (FAQ) about Microsoft Edge in the
enterprise.
7 Note
7 Note
See also
Microsoft Edge documentation landing page
Microsoft Edge Enterprise landing page
Microsoft Edge Enterprise Roadmap
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
Roadmap
Microsoft Edge has been added to the M365 Roadmap . Over time, you'll see the
Microsoft Edge roadmap fill with more features and you can filter by selecting Microsoft
Edge from the Products section. We are working to continuously improve the experience
and we welcome your feedback. Take a look at what we currently have planned for the
upcoming Microsoft Edge releases.
Visit the Site compatibility-impacting changes coming to Microsoft Edge site to see the
high-impact changes that the Microsoft Edge team is currently tracking. Check back
often; the Microsoft Edge team updates this page as timelines solidify and new changes
are announced.
See also
Microsoft Edge Enterprise landing page
Platform support for Microsoft Edge
features
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
7 Note
Android and iOS are currently not represented in the support tables however we're
continuing to work on this information and will update accordingly.
Browser to Web Single Yes Yes Yes Yes Yes Browser-Web SSO
Sign On (SSO)
Enterprise New Tab Yes Yes Yes Yes Yes New Tab Page
Page
Microsoft Search in Yes Yes Yes Yes Yes Intelligent Search in Bing
Bing
See also
Microsoft Edge Enterprise landing page
Plan your deployment of Microsoft Edge
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes the recommended practices for deploying Microsoft Edge in an
enterprise environment.
7 Note
Article content
The following sections provide specific guidance for planning your Microsoft Edge
deployment.
After you understand the current state, you can determine the desired goals for your
browser deployment, taking into account the following:
You should also understand the prerequisites for features you're interested in, such as:
With these answers in mind, you're ready to planning your Microsoft Edge deployment.
Do site discovery
If you have a dependency on legacy web applications, and plan to use Internet Explorer
mode (which most customers do), then you probably need to do some additional site
discovery.
Neutral sites are typically sites that provide Single Sign-On (SSO). If you navigate to a
neutral site from Microsoft Edge, then you want to stay in Microsoft Edge to
authenticate. If navigate to a neutral site in Internet Explorer mode, then you want to
stay in Internet Explorer mode to authenticate.
Identify any SSO (or other neutral) sites that you use and add these to your Enterprise
Site List.
Tip
Use the Enterprise Site Discovery tools to discover the sites that might need
Internet Explorer mode. You can collect collect data on computers running
Windows Internet Explorer 8 through Internet Explorer 11 on Windows 10,
Windows 8.1, or Windows 7.
2. Define the boundaries of an "app" to configure for Internet Explorer mode. You
want to include all the sites and web controls that define the app. But you don't
want to include any extra sites and controls by defining the app too broadly. Some
sites may be as simple as "http://contoso.com/app1" while others may require you
to define multiple sites and pages.
3. Test the app to verify that it doesn't work natively. Many sites will offer modern
content when they detect a modern browser, and only offer legacy content when
they detect Internet Explorer.
7 Note
As a best practice, group all of the sites that comprise an app. If the sites all
need to be used to accomplish one task, and if they tend to be updated
together, that is a good indication that they should be grouped. This way,
when you upgrade an app, it's easier to remove the entire site from Internet
Explorer mode and start using a modern browser for that app.
7 Note
The Stable Channel is what you will want to deploy to most devices. However, you
should consider a deployment strategy that includes multiple devices and multiple
channels.
You might also want to make the Dev Channel (or even the Canary Channel) available to
some roles, such as web developers. Consider whether you would like to target some
devices with more fluid and rapidly changing channels, or simply make these channels
available for users to opt to install.
Because it's possible to install multiple channels on a device, you can mitigate the risk of
testing for users who have opted to install a pre-release channel. For example, if you
have a user who's using the Beta Channel, and there's a problem, they can switch to the
Stable Channel and continue working. This unblocks them until the issue can be fixed.
7 Note
If the user enabled Sync, then their configuration will sync across channels, making
it even easier to transition between channels.
Define and configure policies
After you've created your Enterprise Site List, we recommend identifying and
configuring the policies that you intend to deploy with Microsoft Edge. This ensures that
these policies are applied when you perform your testing.
First, consider the first-run experience you want your users to have. If you want to
automatically import settings from the current browser, configure the policy for
AutoImportAtFirstRun.
For security policies, we recommend starting with the Microsoft Edge Security Baseline.
The Security Baseline can be applied using the Microsoft Security Baselines Blog or by
using Microsoft Intune.
For other policies, we recommend reviewing the policy configurations for Microsoft
Edge and Microsoft Edge Updates.
Allow Microsoft Edge to update itself (default). If you choose to allow automatic
updates of Microsoft Edge, then Microsoft Edge will automatically update itself at
the pace determined by the channel(s) you deployed.
Update Microsoft Edge at your own pace. If you prefer to have explicit control
over when updates are deployed, you can disable automatic updates and deploy it
yourself (see the Update Policy reference.) After you disable automatic updates you
can deploy updates for each channel using one of the following tools:
Intune
Configuration Manager
Microsoft Edge support will only apply to the most recent version of Microsoft
Edge in each channel
1. If it works on Microsoft Edge version 45 and earlier, it will work on Microsoft Edge
version 77 and later.
2. If it works on Internet Explorer, it will work on Microsoft Edge in Internet Explorer
mode.
3. If it works on Google Chrome, it will work on Microsoft Edge.
If you have an application where we don't meet our compatibility promise, then we
stand behind the promise to fix it with Microsoft App Assure .
Choose the method that is most appropriate for each app, to manage risk without over-
investing in compatibility testing.
Capture feedback on compatibility. Identify sites that belong on the Enterprise Site
List that weren't identified during site discovery.
Capture feedback on the policy configuration. Ensure that users can use key
features and do their work while following security guidelines.
Capture feedback on ease of use and new features. Identify any areas where
training should be developed and delivered based on user questions.
See also
Microsoft Edge Enterprise landing page
Video - Deploy Microsoft Edge
Microsoft Edge in your environment
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how to prepare to deploy Microsoft Edge when Microsoft Edge
Legacy reaches its end of service.
As per the Microsoft Edge Product Team's blog post , support for the Microsoft Edge
Legacy desktop application will end on March 9, 2021. When you apply the Update
Tuesday (or "B") release in April, it will remove Microsoft Edge Legacy from devices
running Windows 10 RS4 through 20H1 and replace it with Microsoft Edge.
How to Prepare
To prepare for Microsoft Edge being installed on Windows 10 RS4 through 20H1 devices
with the Update Tuesday release in April, we recommend reading Plan your deployment
of Microsoft Edge.
After you plan your deployment, use one of the following approaches to prepare to
deploy Microsoft Edge.
Install group policies to customize your Microsoft Edge update approach. For
more information, see Configure Microsoft Edge policy settings on Windows, and
pay special attention to the Update Policy reference material. If you install group
policies to manage your updates before installing April's Update Tuesday release,
Microsoft Edge will immediately start respecting your policy. If there isn't any
installed group policy, Microsoft Edge will automatically update itself.
Remove the Microsoft Edge Legacy desktop application before its end of service
date of March 9, 2021 and deploy Microsoft Edge. For Windows 10 RS4 through
20H1, you can do this by using Windows Updates. For more information, see
Deploy Microsoft Edge with Windows 10 updates.
See also
Microsoft Edge Enterprise landing page
Plan your deployment of Microsoft Edge
Microsoft browser usage report
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
In the Microsoft 365 Admin Center, activity reports help you to see how users are using
different Microsoft 365 services. See Activity Reports in the Microsoft 365 admin center.
See also
Microsoft Edge Enterprise landing page
Ready for Microsoft Edge
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn more about the new, dedicated work experience with
native enterprise grade security, productivity, manageability, and AI built in.
The article provides information for the IT Administrator who's planning a Microsoft Edge deployment and needs information about
application compatibility and support.
If you are a web app provider and would like your support statement included for customer reference, please mail the following
information to isvoutreach@microsoft.com.
Product name
Version Supported (if applicable)
Provider Name
Public Support Statement URL
Application list
Microsoft doesn't test or certify these applications in Microsoft Edge. The list was compiled based on publicly available resources. Always
refer to the provider's current support statement. Some applications may require the use of IE Mode as indicated by the support statement.
The following table lists provider support statements for Microsoft Edge.
Management
See also
Microsoft Edge Enterprise landing page
Plan your deployment of Microsoft Edge
Install Microsoft Edge for mobile
platforms in China
Article • 12/09/2022
You can install the iOS and Android versions of Microsoft Edge in China from the
following app stores.
See also
Release notes for Microsoft Edge Mobile Stable Channel
Microsoft Edge Enterprise landing page
Release notes for Microsoft Edge Mobile
Stable Channel
Article • 08/22/2023
These release notes provide information about new features that are available to work
or school accounts, and non-security updates that are included in the Microsoft Edge for
Mobile Stable Channel.
To understand Microsoft Edge channels, see the Overview of the Microsoft Edge
channels.
All the Stable channel security updates are listed in Release notes for Microsoft Edge
Security Updates.
7 Note
For the Stable Channel, updates roll out progressively over one or more days. To
learn more, see Progressive rollouts for Microsoft Edge updates. There might be a
delay before the new release is populated to the App Store (iOS) and Google Play
(Android).
Feature updates
Bing Chat Enterprise is available on Edge mobile by default, and can be managed
by Intune MAM policy com.microsoft.intune.mam.managedbrowser.Chat=true/false .
The Open in Microsoft Edge option is available for saving files to OneDrive
(Android).
Brand info (logo) of New Tab Page (NTP) is now pulled from MS Graph. If you only
configure brand logo in the Intune portal, you must also configure it in the Azure
portal. For more information, see Add company branding - Basics.
This release contains several security fixes for Android. For more information, see the
Security Update Guide .
Policy update
iOS Website data store access. Currently, the persistent data store is only statically
used by personal accounts. Because work or school accounts can't use this data
store, browsing data rather than cookies are lost when their sessions end. This new
policy lets organizations access the data store dynamically, which persists browsing
data for work or school accounts, giving users a better browsing experience. For
more information, see this policy in Manage Microsoft Edge on iOS and Android
with Intune.
This release contains several security fixes for Android. For more information, see the
Security Update Guide .
See also
Microsoft Edge Enterprise landing page
Archived - release notes for Microsoft
Edge Mobile Stable Channel
Article • 08/23/2023
These release notes provide information about new features and non-security updates
that are included in the Microsoft Mobile Edge Stable Channel. All the security updates
are listed here.
Feature updates
Open in Microsoft Edge option (iOS only). This option is available for saving files
to OneDrive.
Net-export supports open-in (iOS only). This option now supports open-in
instead of using the native mail app.
Shared Device Mode (SDM) for Edge mobile. Generally available for Android.
This release contains several security fixes for Android. For more information, see the
Security Update Guide .
Feature updates
Translator, Read Aloud, Drop and developer tools (Android only). These tools can
be managed by Mobile Application Management (MAM) disabledFeatures and the
Mobile Device Management (MDM) policy, EdgeDisabledFeatures.
Feature updates
Support saving files to OneDrive for Business. Save files securely with the Intune
App Protection Policy. For more information, see App protection policies overview.
Edge-specific policies are supported in the MDM channel. These policies are now
supported in version 111. For more information, see Edge Specific.
Feature updates
Microsoft Edge for iOS supports Microsoft Tunnel for MAM solution. For more
information, see Learn about using Microsoft Tunnel with Mobile Application
Management.
This release contains several security fixes for iOS and Android. For more information,
see the Security Update Guide .
7 Note
Release version 109 supports more than 30 policies. For more information, see
Microsoft Edge Mobile - Policies.
Feature updates
Support Shared Device Mode (Android only). Starting with Microsoft Edge 108
for Android, shared device mode will be supported as public preview. For more
information, see Microsoft applications that support shared device mode.
) Important
This update contains a fix for CVE-2022-2856 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Support for disabling of inPrivate browsing and Password feature (iOS and
Android). Before Microsoft Edge 104, Edge for iOS and Android disabled InPrivate
browsing and Password (prompts to save passwords for the user) by default when
only allow Work or School Accounts is configured.
Starting with Microsoft Edge 104, you have more flexibility because InPrivate and
Password won't be disabled by default when only allow Work or School Accounts is
configured. Instead, you can decide whether to disable InPrivate browsing or
Password by configuring the
com.microsoft.intune.mam.managedbrowser.disabledFeatures key. For more
information, see Disable specific features.
Feature updates
Support switching network stack between Chromium and iOS (iOS only). The
NetworkStackPref policy lets you choose the network preference for Microsoft
Edge for iOS.
Policy updates
New policies
NetworkStackPref - Choose the network preference for Microsoft Edge for iOS
Feature updates
Read Aloud: background play and play in silent mode (iOS and Android)
When playing in the background, users can control Read Aloud (pause, resume,
play forwards, or play backwards) via the notification panel and lock screen.
When a user switches tabs in Microsoft Edge while using Read Aloud, they can
use a floating control bar to pause, resume, or close Read Aloud.
When a device's silent toggle is on, it doesn't affect Read Aloud playback as
long as media volume is turned up.
Release notes for Microsoft Edge Stable
Channel
Article • 08/25/2023
These release notes provide information about new features and non-security updates
that are included in the Microsoft Edge Stable Channel.
All the security updates are listed in Release notes for Microsoft Edge Security
Updates.
Archived release notes for Microsoft Edge Stable Channel are located in Archived
release notes for Microsoft Edge Stable Channel.
To understand Microsoft Edge channels, see the Overview of the Microsoft Edge
channels.
7 Note
For the Stable Channel, updates will roll out progressively over one or more days.
To learn more, see Progressive rollouts for Microsoft Edge updates.
Feature update
Microsoft Edge for Business. With native enterprise grade security, productivity,
manageability, and AI built in, Edge for Business enables organizations to maximize
productivity and security, and offers the ability to create separation between work
and personal browsing with automatic switching between the lightly managed
personal browser window (MSA profile) and the work browser window (Microsoft
Entra ID). All users signing in with their Entra ID (formerly Azure Active Directory)
will automatically receive Edge for Business and see an updated Edge icon with a
briefcase to designate they're in the work browser window. For more information,
read our FAQ .
Option to attach the Edge sidebar to the Windows desktop. Users of the
Microsoft Edge sidebar will be able to access their apps and sites directly from
their Windows 10 desktop. As an opt-in experience in Windows 10, users can
attach the sidebar to their Windows desktop by clicking a "popout" icon near the
base of the sidebar in the browser. This enables a side-by-side experience that
works with any Windows app — including Microsoft Edge itself. Users enjoy
streamlined access to the same set of powerful AI tools and web-based services,
including Bing Chat, without launching a browser window, enhancing productivity
regardless of where they are in Windows. Additional features and options are
planned in future versions of Microsoft Edge. Administrators can control the
availability of this feature using the StandaloneHubsSidebarEnabled policy.
Policy updates
New policies
ThrottleNonVisibleCrossOriginIframesAllowed - Allows enabling throttling of non-
visible, cross-origin iframes
Obsoleted policy
Feature update
New policy for Browser essentials. Browser essentials help you gain additional
insights about the health of your browser. It lets you stay informed about your
browser's performance and security with a single, intuitive view that provides
helpful suggestions for performance optimization and browser protection. The
PinBrowserEssentialsToolbarButton policy lets Admins configure whether to pin the
Browser essentials button on the toolbar.
Feature update
Microsoft Edge management service. Microsoft Edge management service is an
area in the Microsoft 365 admin center where admins can manage the Microsoft
Edge browser. It's a simple and easy-to-manage experience. Admins are able to
configure all Microsoft Edge browser policies for their organization in a
configuration profile and set-up the browser to use these settings. For more
information, see Microsoft Edge management service. Note: We'll start rolling out
this experience on July 20 and expect to finish the rollout by next week.
Policy updates
New policies
Google Docs Offline extension for Microsoft Edge. Google Docs Offline is an
extension provided by Google to allow users to work on Google Docs, Sheets,
Slides and Drive without internet access. This extension also provides advanced
cut, copy, and paste functionalities across Google Editors. The Google Docs Offline
extension will be pre-installed and will be disabled by default for Microsoft Edge
users. When a user navigates to Google Docs, the extension will be auto-enabled.
Administrators can use the ExtensionSettings and ExtensionInstallBlocklist policies
to block the auto-installation of the Google Docs Offline extension. Note: This
feature is a controlled feature rollout. If you don't see this feature, check back as
we continue our rollout.
Feature update
Web Select is now a part of Web Capture. Users can access Web Select through
Web Capture feature or press Ctrl + Shift + X shortcut directly for quick access.
Policy updates
7 Note
This update was done for our M109 Windows down-level extended support. We're
shipping 109 to Win 7, 8, and 8.1 (including Server 2012 R2 which is based on Win
8.1).
) Important
This update to Stable contains a fix for CVE-2023-3079 , which has been reported
by the Chromium team as having an exploit in the wild. For more information, see
the Security Update Guide .
Feature update
Microsoft Edge Workspaces. Edge Workspaces provides a way for customers to
organize their browsing tasks into dedicated windows. Edge Workspaces lets users
share a set of browser tabs so working groups can view the same websites and
latest working files in one place and stay on the same page. Each Edge Workspace
contains its own set of tabs and favorites, all created and curated by the user and
their collaborators. Edge Workspaces are automatically saved and kept up to date.
For more information, see Microsoft Edge Workspaces.
Policy updates
New policies
Obsoleted policy
MicrosoftRootStoreEnabled - Determines whether the Microsoft Root Store and
built-in certificate verifier will be used to verify server certificates
Feature update
Microsoft recommended browser settings. This new prompt in Microsoft Edge
lets users benefit from the Microsoft recommended settings. This feature gives
users the option to set Microsoft Edge as the default browser and/or set Microsoft
Bing as the default search engine, if they aren't already selected. If a user accepts
the prompt, their default browser is updated to Microsoft Edge, and their default
search engine will be updated to Microsoft Bing. Administrators can control the
availability of the default browser settings campaign using the
DefaultBrowserSettingsCampaignEnabled policy.
See also
Microsoft Edge Enterprise landing page
Archived release notes for Microsoft
Edge Stable Channel
Article • 08/21/2023
These release notes provide information about new features and non-security updates
that are included in the Microsoft Edge Stable Channel. All the security updates are
listed here.
Feature update
Improvements to downloads security. Microsoft Edge now has the capability to
scan archives (.zip, .rar, .7z) for any malwares using Microsoft Defender
SmartScreen. This functionality is currently available on Windows only and
provides extra protection where known malwares were being distributed within
these archives.
New policy for PDF View Settings. The RestorePdfView policy lets Admins control
PDF View Recovery in Microsoft Edge. When enabled or if the policy isn't
configured, Microsoft Edge will recover the last state of PDF view and land users
on the section where they ended reading in the last session.
Updated Microsoft Root Store policy. The MicrosoftRootStoreEnabled policy will
now be supported in Microsoft Edge version 113 and 114. It will be removed in
Microsoft Edge version 115. For more information, see Changes to Microsoft Edge
browser TLS server certificate verification.
Policy updates
New policies
7 Note
This update was done for our M109 Windows down-level extended support. We're
shipping 109 to Win 7, 8, and 8.1 (including Server 2012 R2 which is based on Win
8.1).
) Important
This update to Extended Stable contains a fix for CVE-2023-2033 , which has been
reported by the Chromium team as having an exploit in the wild. For more
information, see the Security Update Guide .
Feature update
Enhanced security mode improvements. Enhanced security mode now supports
WebAssembly for ARM64. Cross-platform support is now available for x64
Windows, x64 macOS, x64 Linux and ARM64 systems. For more information, see
Browse more safely with Microsoft Edge.
Added features for web app policy. The WebAppInstallForceList policy lets
administrators configure a list of web apps that install silently, without user
interaction, and which users can't uninstall or turn off. This policy now supports
custom_name, which permanently overrides the app name of installed apps and
custom_icon, which permanently overrides the app icon of installed apps.
In-browser JSON viewer. Improvements to how JSON files are displayed in the
browser, which includes a color-coded tree view with line numbers and the ability
to collapse and expand the data. This functionality will trigger automatically when
the browser navigates to a JSON file on the web or the user opens a local one.
Additional features and enhancements will roll out as available. For more
information, see View formatted JSON - Microsoft Edge Development. Note: This is
a controlled feature rollout. If you don't see this feature, check back as we continue
our rollout or you can navigate to edge://flags and search for JSON Viewer to
manually enable.
Edit and save web images in Microsoft Edge. You can right click on the desired
web image and without leaving your browser window, crop, adjust lighting and
color, and add filters. From there, you can save the edited image for later use. You
can also start editing simply by hovering over an image and selecting edit image
from the menu.
Policy updates
New policies
CryptoWalletEnabled - Enable CryptoWallet feature
Feature update
New Microsoft Edge PDF experience policy. As part of the Adobe and Microsoft
collaboration to re-envision the future workplace and your digital experiences, we
are natively embedding the Adobe Acrobat PDF engine into the Microsoft Edge
built-in PDF reader, with a release scheduled in March 2023. Administrators can
start testing the new Microsoft Edge PDF reader which is powered by the Adobe
Acrobat PDF engine by enabling the NewPDFReaderEnabled policy. For more
information, see Microsoft Edge and Adobe partner to improve the PDF
experience .
Microsoft Edge Sidebar Improvements. The Microsoft Edge sidebar lets users
access productivity tools side-by-side with their browsing window. In this release,
the sidebar has been enhanced to increase productivity and improve user
experience. As communicated in our last release (Microsoft Edge release notes for
Stable Channel), the sidebar now includes a toolbar button by default to access the
experience. If admins enable the Discover app, hovering and clicking the toolbar
button will invoke both the sidebar tower, and the new discover experience.
With this release, admins now have the ability to disable the Discover app and still
keep the Sidebar. In this situation, the Sidebar tower will always be shown. If an
Admin chooses to enable the Sidebar but disable the Discover experience, the
Sidebar can only be always shown or completely hidden. This default visibility can
be changed in the Sidebar settings (edge://settings/sidebar).
When an admin enables the Sidebar and the Discover experience, enterprise users
can choose to 'always show' or 'auto hide'. More customization options for the
sidebar toolbar button are planned in future versions of Microsoft Edge. For more
information, see Manage the sidebar in Microsoft Edge.
7 Note
This update was done for our M109 Windows down-level extended support. We're
shipping 109 to Win 7, 8, and 8.1 (including Server 2012 R2 which is based on Win
8.1).
Policy updates
New policies
ShowAcrobatSubscriptionButton - Shows button on native PDF viewer in Microsoft
Edge that allows users to sign up for Adobe Acrobat subscription
NewPDFReaderEnabled - Microsoft Edge built-in PDF reader powered by Adobe
Acrobat enabled
Feature update
A New Microsoft Edge Sidebar. In this release, the Sidebar introduces several new
features and improvements aimed at enhancing productivity, convenience, and the
user experience. Here are some of the highlights:
The New Discover: Edge Copilot is a powerful tool that helps users boost their
productivity and efficiency. It provides intelligent suggestions and insights
based on the context of the web page and the user's goals. As the new Bing
icon in the Toolbar, Edge Copilot helps users compose better emails, search the
web faster, learn new skills, all done more conveniently.
Enhanced Sidebar Visibility: With the new Auto-Hide functionality, a user can
maximize the productivity and convenience of the sidebar without sacrificing
valuable screen space. The Edge Sidebar can be hidden when a user isn't using
it and it only reappears when a user needs it.
Evolved Sidebar Interaction: The new Hover functionality lets users open the
Sidebar by hovering on the Bing icon in the Toolbar. This enhances user
productivity and convenience by providing a seamless and intuitive way to
access their most used tools.
Admins retain the ability to control and customize the Sidebar and its experiences,
as needed by using the following settings:
If admins enable the Sidebar, users will have access to the Sidebar and Edge
Copilot experience. The Sidebar will show at all times in the browser frame.
Clicking on the Bing icon in the Toolbar will invoke the new Discover experience.
If admins choose the 'not configured' setting, users will have access to the
Sidebar and Edge Copilot experience. Unlike when the Sidebar is 'enabled', their
users will have the ability to always-show or auto-hide the Sidebar.
If admins disable the Sidebar, Discover and the Sidebar will be inaccessible for
their users. Note: In this release, Admins do not have the ability to disable
Discover and keep the Sidebar.
Additional customization options for the sidebar toolbar button are planned in
future versions of Microsoft Edge.
For more information, see Manage the sidebar in Microsoft Edge and Microsoft
Privacy Statement (Search, Microsoft Edge, and artificial intelligence) .
Microsoft Feed on Microsoft 365 Edge New Tab Page. We're rolling out a new
experience to the Microsoft 365 tab of the Edge Enterprise New Tab Page. This
experience will feature a new layout that centers on a larger version of the
Microsoft Feed, featuring more productivity content, and moves the productivity
cards including Important Emails, Recent SharePoint sites, Upcoming events, and
To Do to the right-hand side of the Microsoft 365 tab.
Policy updates
New policies
Feature updates
New Immersive Reader policies. Immersive Reader in Microsoft Edge simplifies
web page layouts, removes clutter, and helps you customize your reading
experience. Using these new policies (ImmersiveReaderGrammarToolsEnabled and
ImmersiveReaderPictureDictionaryEnabled), administrators can control the
availability of Grammar Tools and Picture Dictionary features within Immersive
Reader.
Enabling sync for Azure Active Directory signed in customers. Microsoft Edge
sync roams data across all signed in instances of Microsoft Edge. This data includes
favorites, passwords, browsing history, open tabs, settings, apps, collections, and
extensions. For Azure Active Directory users who have sync turned off, after the
browser is launched they'll see a notification prompt and have sync turned on for
all signed in instances of Microsoft Edge. This sync enablement includes other
devices where they're signed in. Additionally, if a user's other devices don't have
history and open tabs sync on, those two toggles will be turned on. Organizations
using the SyncDisabled policy won't be affected by this change.
Drop. Microsoft Edge now offers a simple way to send files and notes across all
your signed in mobile and desktop devices. Using the desktop version of Microsoft
Edge, Drop can be managed through the sidebar (edge://settings/sidebar).
Administrators can control the availability of Drop using the EdgeEDropEnabled
policy.
Policy updates
New policies
AutofillMembershipsEnabled - Save and fill memberships
ImmersiveReaderGrammarToolsEnabled - Enable Grammar Tools feature within
Immersive Reader in Microsoft Edge
ImmersiveReaderPictureDictionaryEnabled - Enable Picture Dictionary feature
within Immersive Reader in Microsoft Edge
PrintPreviewStickySettings - Configure the sticky print preview settings
SearchInSidebarEnabled - Search in Sidebar enabled
WorkspacesNavigationSettings - Configure navigation settings per groups of URLs
in Microsoft Edge Workspaces
Obsoleted policies
DisplayCapturePermissionsPolicyEnabled - Specifies whether the display-capture
permissions-policy is checked or skipped
ExemptDomainFileTypePairsFromFileTypeDownloadWarnings - Disable download
file type extension-based warnings for specified file types on domains
SetTimeoutWithout1MsClampEnabled - Control Javascript setTimeout() function
minimum timeout
ShadowStackCrashRollbackBehavior Configure ShadowStack crash rollback
behavior
TLS server certificate verification changes. In Microsoft Edge version 111, the
certificate trust list and the certificate verifier will be decoupled from the host
operating system's root store. Instead, the default certificate trust list and the
certificate verifier will be provided by and shipped with the browser. The
MicrosoftRootStoreEnabled policy is now available for testing to control when the
built-in root store and certificate verifier are used. Support for the policy is planned
to be removed in Microsoft Edge version 113. For more information, see Changes
to Microsoft Edge browser TLS server certificate verification | Microsoft Learn.
Note: This is a controlled feature rollout in Microsoft Edge version 109. If you don't
see this feature, check back as we continue our rollout.
Text prediction. To help you write faster and with fewer mistakes, Microsoft Edge
provides word and sentence predictions for long-form editable text fields on web
pages. Administrators can control the availability of text predictions using the
TextPredictionEnabled policy. Text prediction is currently only available in English
within the US, India, and Australia. We will continue to add new languages and
regions in future versions of Microsoft Edge.
Policy updates
New policies
WebHidAllowAllDevicesForUrls - Allow listed sites to connect to any HID device
WebHidAllowDevicesForUrls - Allow listed sites connect to specific HID devices
WebHidAllowDevicesWithHidUsagesForUrls - Automatically grant permission to
these sites to connect to HID devices containing top-level collections with the
given HID usage
MicrosoftRootStoreEnabled - Determines whether the Microsoft Root Store and
built-in certificate verifier will be used to verify server certificates
DefaultClipboardSetting - Default clipboard site permission
ClipboardAllowedForUrls - Allow clipboard use on specific sites
ClipboardBlockedForUrls - Block clipboard use on specific sites
SearchFiltersEnabled - Search Filters Enabled
Deprecated policies
Fixed various bugs and performance issues for Stable and Extended Stable release.
) Important
This update to Extended Stable contains a fix for CVE-2022-4262 , which has been
reported by the Chromium team as having an exploit in the wild. For more
information, see the Security Update Guide .
Feature updates
Graph APIs for Cloud Site List Management. New Graph APIs that allow IT admins
in organizations to create, manage, and publish their site lists for IE mode in the
cloud. For more information, see Use the Edge API in Microsoft Graph.
More reliable web defense. Browse the web with more reliable protection thanks
to the rewritten Microsoft Defender SmartScreen library for Microsoft Edge on
Windows, Mac, and Linux. The new SmartScreen library was first made available on
Windows and Mac, and now makes its debut on Linux with Microsoft Edge version
108. Microsoft Edge version 108 also brings new product optimizations (that is,
better proxy handling) and bug fixes by having the SmartScreen library leverage
Microsoft Edge's built-in network stack.
Policy updates
New policies
EncryptedClientHelloEnabled - TLS Encrypted ClientHello Enabled
NewTabPageAppLauncherEnabled - Hide App Launcher on Microsoft Edge new tab
page
Obsoleted policy
) Important
This update contains a fix for CVE-2022-4135 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
) Important
This update to Extended Stable contains a fix for CVE-2022-4135 , which has been
reported by the Chromium team as having an exploit in the wild. For more
information, see the Security Update Guide .
) Important
This update contains a fix for CVE-2022-3723 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
This update to Extended Stable contains a fix for CVE-2022-3723 , which has been
reported by the Chromium team as having an exploit in the wild. For more
information, see the Security Update Guide .
Feature updates
Microsoft Edge sidebar. The Microsoft Edge sidebar lets users access productivity
tools side-by-side with their browsing window. For enterprise customers, the
following experiences are currently turned on by default: Search, Discover,
Office.com, and Outlook. Administrators can control the availability and configure
the Microsoft Edge sidebar using the HubsSidebarEnabled,
ExtensionInstallBlockList, and ExtensionInstallForceList policies. The extension ID
for each sidebar app can be found at edge://sidebar-internals. For more
information, see Manage the sidebar in Microsoft Edge.
Policy updates
New policies
Deprecated policy
MicrosoftOfficeMenuEnabled - Allow users to access the Microsoft Office menu
Obsoleted policy
BuiltinCertificateVerifierEnabled - Determines whether the built-in certificate
verifier will be used to verify server certificates
Feature updates
More reliable web defense. Browse the web with more reliable protection thanks
to the rewritten Microsoft Defender SmartScreen library for Microsoft Edge on
Windows and macOS. The new SmartScreen library was first made available on
Windows with Microsoft Edge version 103, and now makes its debut on macOS
with Microsoft Edge version 106. The NewSmartScreenLibraryEnabled policy is now
deprecated in Microsoft Edge version 106 and will be obsolete in Microsoft Edge
version 108.
Increased Work Results in the Microsoft Edge address bar. We've increased the
maximum number of work results that display in the address bar from 2 to 4,
which offers greater visibility into the work content available to you as you search.
This feature requires the AddressBarMicrosoftSearchInBingProviderEnabled policy
enabled to work.
Policy updates
New policies
Deprecated policies
Obsoleted policies
OutlookHubMenuEnabled - Allow users to access the Outlook menu
EdgeDiscoverEnabled - Discover feature In Microsoft Edge
Version 105.0.1343.53: September 26, 2022
Fixed various bugs and performance issues.
) Important
This update to Extended Stable contains a fix for CVE-2022-3075 , which has been
reported by the Chromium team as having an exploit in the wild. For more
information, see the Security Update Guide .
) Important
This update contains a fix for CVE-2022-3075 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Stable channel security updates are listed here.
Feature updates
Enhanced security mode improvements. Enhanced security mode now supports
WebAssembly for x64 Windows. Additional cross-platform support is expected in
the future. For more information, see Browse more safely with Microsoft Edge.
Improvements to the Cloud Site List Management experience for IE mode now
available in GCC. GCC customers can now utilize the full Microsoft Edge site list
experience in the Microsoft 365 Admin Center.
Policy updates
New policies
ExemptFileTypeDownloadWarnings - Disable download file type extension-based
warnings for specified file types on domains
InternetExplorerIntegrationAlwaysWaitForUnload - Wait for Internet Explorer mode
tabs to completely unload before ending the browser session
MicrosoftEditorProofingEnabled - Spell checking provided by Microsoft Editor
MicrosoftEditorSynonymsEnabled - Synonyms are provided when using Microsoft
Editor spell checker
PrintPdfAsImageDefault - Print PDF as Image Default
UnthrottledNestedTimeoutEnabled - JavaScript setTimeout will not be clamped
until a higher nesting threshold is set
Deprecated policies
ExemptDomainFileTypePairsFromFileTypeDownloadWarnings - Disable download
file type extension-based warnings for specified file types on domains
) Important
This update contains a fix for CVE-2022-2856 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Search in the Microsoft Edge sidebar. Easily access an updated sidebar search via
Microsoft Edge sidebar, including easy access to Microsoft Search in Bing for
organizations. Note: This is a controlled feature rollout. If you don't see this
feature, check back as we continue our rollout.
Gaming for the Microsoft Edge sidebar. Play popular casual games for free.
Administrators can control the availability of the Games menu in the Microsoft
Edge sidebar. Note: This is a controlled feature rollout. If you don't see this feature,
check back as we continue our rollout.
Discover in the Microsoft Edge sidebar. Discover content relevant to the page
you're browsing including summaries, source information, and more. Note: This is
a controlled feature rollout. If you don't see this feature, check back as we continue
our rollout.
Get your favorite tools in the Microsoft Edge sidebar. Easily access commonly
used tools while you browse the web, including Calculator, Internet speed test, and
Unit converter. Note: This is a controlled feature rollout. If you don't see this
feature, check back as we continue our rollout.
Outlook in the Microsoft Edge sidebar. Quickly and easily access Outlook Mail
and Calendar. Note: This is a controlled feature rollout. If you don't see this feature,
check back as we continue our rollout.
Office in the Microsoft Edge sidebar. Quickly and easily access Microsoft Office
documents and apps. Administrators can control the Microsoft Office menu in the
Microsoft Edge sidebar. Note: This is a controlled feature rollout. If you don't see
this feature, check back as we continue our rollout.
Feature updates
Enhance your security on the web. Improvements to Enhance your security on
the web in edge://settings/privacy now include Basic as the new default option.
With this option, Microsoft Edge will apply added security protection to the less
visited sites. This feature preserves the user experience for the most popular sites
on the web. For more information, see Browse more safely with Microsoft Edge.
Import Chrome data without Chrome during First Run Experience. This feature
lets a user bring in their Chrome data by logging in to their Google account during
Microsoft Edge's First Run Experience. This feature can be turned off by disabling
First Run Experience with the HideFirstRunExperience policy, or by setting
AutoImportAtFirstRun to 'DisabledAutoImport'.
Policy updates
New policies
AllowedDomainsForApps - Define domains allowed to access Google Workspace
AskBeforeCloseEnabled - Get user confirmation before closing a browser window
with multiple tabs
BrowserCodeIntegritySetting - Configure browser process code integrity guard
setting
DoubleClickCloseTabEnabled - Double Click feature in Microsoft Edge enabled
(only available in China)
ImportOnEachLaunch - Allow import of data from other browsers on each
Microsoft Edge launch
QuickSearchShowMiniMenu - Enables Microsoft Edge mini menu
PasswordManagerRestrictLengthEnabled - Restrict the length of passwords that
can be saved in the Password Manager
PDFXFAEnabled - XFA support in native PDF reader enabled
TextPredictionEnabled - Text prediction enabled by default
Obsoleted policy
Known issue
Microsoft Edge on 32-bit (x86) Windows 10 Version 1809 may experience startup issues
with the upcoming July Non-Security Windows Updates (KB5015880 - 17763.3224). This
is fixed with the latest Microsoft Edge Stable channel release, version 103.0.1264.62.
Enterprise users encountering this issue on Microsoft Edge Extended Stable channel
version 102 need to disable the NewSmartScreenLibraryEnabled policy.
) Important
This update contains a fix for CVE-2022-2294 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Client Certificate Switcher. This feature will offer a way for users to clear the
remembered certificate and resurface the certificate picker when visiting a site
requiring http certificate authentication. Switching can be done without manually
quitting Microsoft Edge.
More reliable web defense. Browse the web with more reliable protection thanks
to the rewritten Microsoft Defender SmartScreen library for Microsoft Edge on
Windows. The NewSmartScreenLibraryEnabled policy will allow enterprise
customers to continue using the legacy version of the library until it's deprecated
in Microsoft Edge version 105.
Work Search Banner in the Microsoft Edge address bar. This banner helps you
stay in the flow of your work by narrowing your search focus to work-only results.
To see work focused results from your organization, select the banner at the
beginning of your search. To be directed to your organization's workplace search
results page, select the banner at any point of your search. Use the
AddressBarMicrosoftSearchInBingProviderEnabled policy to turn this feature on or
off.
Policy updates
New policies
SleepingTabsTimeout - Set the background tab inactivity timeout for sleeping tabs.
Note: A timeout of 30 seconds of inactivity was added to this policy.
Version 102.0.1245.44: June 16
Fixed various bugs and performance issues for Stable and Extended Stable release.
Policy updates
New policies
Feature updates
Ability to set the default profile. The EdgeDefaultProfileEnabled policy will let you
set a default profile to use when opening the browser instead of the last profile
that was used. This policy won't be applicable if the --profile-directory
parameter has been specified.
Launch Progressive Web Apps (PWAs) from the favorites bar. Improvements to
the PWA launch experience will start appearing with an Apps icon that can be
added to the toolbar.
Manage the "Allow extensions from other stores" setting. Now you can use the
ControlDefaultStateOfAllowExtensionFromOtherStoresSettingEnabled policy to set
the default state of the "Allow extensions from other stores" setting.
Improvements to the Enterprise Site List Manager. Now you can configure shared
cookies between Microsoft Edge and Internet Explorer on your enterprise site list.
You can access the Enterprise Site List Manager at edge://compat/SiteListManager.
Policy updates
New policies
ConfigureKeyboardShortcuts - Configure the list of commands for which to disable
keyboard shortcuts
ControlDefaultStateOfAllowExtensionFromOtherStoresSettingEnabled - Configure
default state of Allow extensions from other stores setting
EdgeAssetDeliveryServiceEnabled - Allow features to download assets from the
Asset Delivery Service
EdgeDefaultProfileEnabled - Default Profile Setting Enabled
InternetExplorerModeEnableSavePageAs - Allow Save page as in Internet Explorer
mode
KioskSwipeGesturesEnabled - Swipe gestures in Microsoft Edge kiosk mode
enabled
MicrosoftOfficeMenuEnabled - Allow users to access the Microsoft Office menu
SiteSafetyServicesEnabled - Allow users to configure Site safety services
Deprecated policies
ForceCertificatePromptsOnMultipleMatches - Configure whether Microsoft Edge
should automatically select a certificate when there are multiple certificate matches
for a site configured with "AutoSelectCertificateForUrls"
Obsoleted policies
WebSQLInThirdPartyContextEnabled - Force WebSQL in third-party contexts to be
re-enabled
) Important
This update contains a fix for CVE-2022-1364 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Three-digit version number in the User-agent string. Microsoft Edge will now
send a three-digit version number, such as Edg/100 in the User-Agent header. This
may confuse scripts or server-side analytics that use a buggy parser to determine
the User-Agent string version number. You can use the
ForceMajorVersionToMinorPositionInUserAgent policy to control whether the User-
Agent string major version should be frozen at 99. Also, the #force-major-version-
to-minor flag is available in edge://flags to freeze the major version in the User-
Agent string to 99.
Preview PDF files in Microsoft Outlook and File Explorer. Users can view a PDF file
in a lightweight and rich read-only preview. This feature is available for Outlook
Desktop PDF attachments or for local PDF files using File Explorer.
Open Digitally Signed PDF files. Digital signatures are used extensively to validate
the authenticity of a document and changes made in a document. You can use the
PDFSecureMode policy to enable digital signature validation for PDF files, directly
from the browser, without the need for any add-ins.
Policy updates
New policies
Deprecated policy
Obsoleted policy
AllowSyncXHRInPageDismissal - Allow pages to send synchronous XHR requests
during page dismissal
) Important
This update contains a fix for CVE-2022-1096 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Upcoming three-digit version number in user agent string. Starting with version
100, Microsoft Edge will send a three-digit version number in the User-Agent
header, for example "Edg/100". Starting with Microsoft Edge 97, site owners can
test this upcoming agent string by enabling the #force-major-version-to-100
experiment flag in edge://flags to ensure their User-Agent parsing logic is robust
and works as expected.
Personalize multi-profile experiences with profile preferences for sites. Users can
personalize their multi-profile experience with the ability to create a customized
list of sites for automatic profile switching in Microsoft Edge.
Navigate PDF documents using page thumbnails. You'll now be able to navigate
through your PDF document using thumbnails that represent the pages. These
thumbnails will appear in the pane on the left side of the PDF reader.
Configure the list of domains for which the password manager User Interface
(UI) for Save and Fill will be disabled. Use the PasswordManagerBlocklist policy to
configure the list of domains (HTTP/HTTPS schemas and hostnames only) where
Microsoft Edge should disable the password manager. This means that Save and
Fill workflows will be disabled, which ensures that passwords for those websites
can't be saved or auto filled into web forms.
Custom primary password. The browser already has the capability where users can
add an authentication step before saved passwords are auto filled in web forms.
This adds another layer of privacy and helps prevent unauthorized users from
using saved passwords to log on websites. Custom primary password is an
evolution of that same feature, where users will now be able to use a custom string
of their choice as their primary password. After it's enabled, users will enter this
password to authenticate themselves and have their saved passwords auto filled
into web forms.
Policy updates
New Policies
DoNotSilentlyBlockProtocolsFromOrigins - Define a list of protocols that can not
be silently blocked by anti-flood protection
ForceMajorVersionToMinorPositionInUserAgent - Enable or disable freezing the
User-Agent string at major version 99
HubsSidebarEnabled - Show Hubs Sidebar
InternetExplorerIntegrationCloudNeutralSitesReporting - Configure reporting of
potentially misconfigured neutral site URLs to the M365 Admin Center Site Lists
app
InternetExplorerIntegrationCloudUserSitesReporting - Configure reporting of IE
Mode user list entries to the M365 Admin Center Site Lists app
PasswordManagerBlocklist - Configure the list of domains for which the password
manager UI (Save and Fill) will be disabled
RelatedMatchesCloudServiceEnabled - Configure Related Matches in Find on Page
SignInCtaOnNtpEnabled - Enable sign in click to action dialog
UserAgentReduction - Enable or disable the User-Agent Reduction
) Important
This update contains a fix for CVE-2022-0609 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Enhance your security on the web. This is a browsing mode in Microsoft Edge
where browser security takes priority, giving users an extra layer of protection
when browsing the web. Administrators can apply group policies to end-user
desktops (Windows, macOS, and Linux) to help protect against in-the-wild exploits
(also referred to 0-days). The following group policies support this browsing mode:
EnhanceSecurityMode
EnhanceSecurityModeBypassListDomains
EnhanceSecurityModeEnforceListDomains
Upcoming three-digit version number in user agent string. Starting with version
100, Microsoft Edge will send a three-digit version number in the User-Agent
header, for example "Edg/100". Starting with Microsoft Edge 97, site owners can
test this upcoming user agent string by enabling the #force-major-version-to-100
experiment flag in edge://flags to ensure their User-Agent parsing logic is robust
and works as expected.
Overlay scrollbars added to Microsoft Edge. We've updated our scrollbars with an
overlay-based design. Users can turn this feature on in edge://flags.
Policy updates
New Policies
Feature updates
Upcoming three-digit version number in user agent string. Starting with version
100, Microsoft Edge will send a three-digit version number in the User-Agent
header, for example "Edg/100". Starting with Microsoft Edge 97, site owners can
test this upcoming user agent string by enabling the #force-major-version-to-100
experiment flag in edge://flags to ensure their User-Agent parsing logic is robust
and works as expected.
Feature updates
Use the current profile to sign into websites when multiple work or school
accounts are signed in on a device. When multiple work or school accounts are
signed in on a device, users will be asked to choose an account from the account
picker to continue their visits to websites. In this release, users will be prompted to
let Microsoft Edge sign in to the websites automatically with the work or school
account that's signed into the current profile. Users can turn this feature on and off
in Settings > Profile preferences.
Add support for Microsoft Endpoint Data Loss Prevention (DLP) on macOS.
Microsoft Endpoint DLP policy enforcement will be available natively on macOS.
Block WebSQL in 3rd-party contexts. Use of the legacy WebSQL feature will be
blocked from 3rd-party frames. The WebSQLInThirdPartyContextEnabled policy is
available as an opt-out option until Microsoft Edge version 101. This change is
happening in the Chromium project that Microsoft Edge is based on. For more
information, see this Chrome Platform Status entry.
Control Flow Guard (CFG). Microsoft Edge will start supporting more fine-grained
protection by combating memory corruption vulnerabilities and by protecting
indirect calls. CFG is only supported with Windows 8 and later. For more
information, see Control Flow Guard.
7 Note
This is an evolving technology, please share your feedback to help us
strengthen its support.
Policy updates
New Policies
) Important
This update contains a fix for CVE-2021-4102 , which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Cloud Site List Management for IE mode in Public Preview. Cloud Site List
Management lets you manage your site lists for IE mode in the cloud without
needing an on-premises infrastructure to host your organization's site list. You can
access the Cloud Site List Management feature using the Microsoft Edge Site Lists
experience in the Microsoft 365 Admin Center. To learn more, see the Cloud Site
List Management for IE mode (Public Preview) article.
Improved handoff between IE mode and the modern browser. Starting with this
version of Microsoft Edge, navigations between Microsoft Edge and Internet
Explorer mode will include form data and additional HTTP headers. Referrer
headers, post data, forms data, and request methods will be forwarded correctly
across the two experiences. You can specify which data types should be included
using the InternetExplorerIntegrationComplexNavDataTypes policy. For more
information, see this FAQ: My application requires transferring POST data between
IE mode and Microsoft Edge. Is this supported?
Update Microsoft Edge WebView2 using WSUS. IT Admins using Windows Server
Update Services (WSUS) to update Microsoft Edge will also be able to update
Microsoft Edge WebView2 using WSUS. This capability gives admins an easier
servicing process for offline devices.
WSUS updates for Server. WSUS and Catalog updates for Microsoft Edge channels
(Stable, Beta, and Dev) will now apply to Windows Server SKUs that have Microsoft
Edge installed, including Windows Server 2022. For more information on how to
configure WSUS updates for Microsoft Edge, see Update Microsoft Edge.
Launch Progressive Web App (PWA) directly via protocol links. Let installed PWAs
handle links that use a specific protocol for a more integrated experience.
Quickly view Office files in the browser. Users can now view Office files including
documents, spreadsheets, and presentations that they come across while browsing
on Microsoft Edge right in the browser without needing to download the file and
then open it in a different application. There will be no changes in the file open
experience for Office files that are hosted on OneDrive or SharePoint.
New warning dialog for typosquatting sites. The browser will show a warning on
some sites with URLs that look very similar to other sites. This UI uses client-side
heuristics to warn users about sites that might be spoofing popular web sites. For
more information, see What is typosquatting? .
Learn how to solve math problems with Math Solver. We're excited to announce
that you can use Math Solver in Microsoft Edge to get help with a wide range of
mathematical concepts. These concepts range from elementary arithmetic and
quadratic equations to trigonometry and calculus. Math Solver lets you take a
picture of a handwritten or printed math problem and then provides an instant
solution with step-by-step instructions to help you learn how to reach the solution
without help. Math Solver also comes with a mathematical keyboard that you can
use to easily type math problems. This keyboard eliminates the need to search
around a traditional keyboard to find the math characters you need. After solving
your problem, Math Solver provides options to continue learning with quizzes,
worksheets, and video tutorials.
Split tunnel VPN support for WebRTC. Allows enterprise customers to gain the
benefit of VPN split tunneling for peer-to-peer traffic on Microsoft Edge. You can
enable this feature using the WebRtcRespectOsRoutingTableEnabled policy.
Policy updates
New Policies
) Important
Feature updates
View in File Explorer support for SharePoint Online libraries in Microsoft Edge.
Now you can enable the View in File Explorer capability on SharePoint Online
Modern Document Libraries. For this experience to be visible and work for your
users, you need to enable the Microsoft Edge policy Configure the View in File
Explorer feature for SharePoint pages in Microsoft Edge and update your
SharePoint Online tenant configuration. Learn more: View SharePoint files with File
Explorer in Microsoft Edge.
Intranet zone file URL links will open in Windows File Explorer. You can allow file
URL links to intranet zone files originating from intranet zone HTTPS websites to
open Windows File Explorer for that file or directory. You can enable this
experience using the IntranetFileLinksEnabled policy.
Pick up where you left off on PDF documents. You will now be able to resume
reading from where you last closed your PDF document.
Efficiency mode extends battery life when your laptop enters battery saver
mode. Efficiency mode will become active when your laptop enters battery saver
mode to allow the browser to manage resource usage to extend the battery life of
your machine. You will have four options when efficiency mode becomes active:
Unplugged and low battery, Unplugged, Always, and Never. Note: This feature is a
Controlled Feature Rollout. If you don't see this feature, check back shortly as we
continue our rollout.
Free form text boxes added to PDF documents. We now support adding free form
text boxes to PDF documents. You can use these boxes to fill in forms and add
visible notes.
Update your passwords faster and with fewer clicks. The browser will now take
you directly to the Change Password page for a given website. This action saves
you time and clicks by removing the need to navigate to the page manually. After
you're on this page, the browser will also autofill your existing password and
suggest a strong, unique new password. Note: Currently this feature is only
available on a limited number of sites.
Policy updates
New Policies
BrowserLegacyExtensionPointsBlockingEnabled Enable browser legacy extension
point blocking
CrossOriginWebAssemblyModuleSharingEnabled Specifies whether WebAssembly
modules can be sent cross-origin
DisplayCapturePermissionsPolicyEnabled Specifies whether the display-capture
permissions-policy is checked or skipped
InternetExplorerIntegrationWindowOpenHeightAdjustment Configure the pixel
adjustment between window.open heights sourced from IE mode pages vs. Edge
mode pages
InternetExplorerIntegrationWindowOpenWidthAdjustment Configure the pixel
adjustment between window.open widths sourced from IE mode pages vs. Edge
mode pages
IntranetFileLinksEnabled Allow intranet zone file URL links from Microsoft Edge to
open in Windows File Explorer
NewSmartScreenLibraryEnabled Enable new SmartScreen library
ShadowStackCrashRollbackBehavior Configure ShadowStack crash rollback
behavior
VisualSearchEnabled Visual search enabled
Obsoleted Policies
InternetExplorerIntegrationTestingAllowed Allow Internet Explorer mode testing
LegacySameSiteCookieBehaviorEnabled Enable default legacy SameSite cookie
behavior setting
) Important
) Important
This update contains a fix for CVE-2021-37973 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
New Extended stable option being offered. We are offering a new Extended
Stable option to our managed Enterprise customers. The Extended Stable option
will stay on even numbered revisions and update every 8 weeks. There will be a
biweekly security update. Additional information here:
https://blogs.windows.com/msedgedev/2021/07/15/opt-in-extended-stable-
release-cycle/
Block mixed content downloads. Secure pages will only download files hosted on
other secure pages, and downloads hosted on non-secure (non-HTTPS) pages will
be blocked if initiated from a secure page. This change is happening in the
Chromium project, on which Microsoft Edge is based. For more information,
navigate to the Google security blog entry .
New Policies
Obsoleted Policy
) Important
This update contains a fix for CVE-2021-30633 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
) Important
This update contains a fix for CVE-2021-30632 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Initial Preferences in Microsoft Edge. Microsoft Edge now supports a limited
number of Initial Preferences (formerly Master Preferences). IT admins can deploy
these settings as default before the browser is run for the first time by their users.
Additional information here: Configure Microsoft Edge using Initial Preferences
settings for the first run.
New policy to stop implicit sign in. The ImplicitSignInEnabled policy allows system
administrators to disable implicit sign-in on Microsoft Edge browsers.
Tab Groups. We are turning on tab grouping which provides the ability to
categorize tabs into user-defined groups and helps you more effectively find,
switch and manage tabs across multiple workstreams.
Hide the title bar while using Vertical Tabs. Get the extra few pixels back by hiding
the browser's title bar, while in Vertical Tabs. Now you can go to
edge://settings/appearance and under the Customize Toolbar section select the
option to hide the title bar while in Vertical Tab mode.
Video Picture in Picture (PiP) from hover toolbar. When you hover over a
supported video, a toolbar will appear that allows you to view that video in a PiP
window. Please note: this is currently available for Microsoft Edge users on macOS.
New Policies
Deprecated Policy
Obsoleted Policy
Additional Change
Modified Policy
AutoplayAllowed – Setting to "Disabled" now sets media autoplay to "Limit"
Feature updates
Users can easily get to Internet Explorer mode on Microsoft Edge. Starting with
Microsoft Edge version 92, users can reload a site in Internet Explorer mode on
Microsoft Edge instead of relying on the standalone IE 11 application while waiting
for a site to be configured in the Enterprise Mode Site List. Users will be prompted
to add the site to their local site list such that navigating to the same page in
Microsoft Edge will automatically render in IE mode for the next 30 days. You can
use the InternetExplorerIntegrationReloadInIEModeAllowed policy to configure this
experience and allow access to the IE mode entry points as well as the ability to
add sites to the local site list. You can use the
InternetExplorerIntegrationLocalSiteListExpirationDays policy to adjust the number
of days to keep sites on the local site list. Note that KB5003698 or later is required
for Windows 10, version 1909; or KB5003690 or later is required for Windows 10,
version 2004, Windows 10, version 20H2, or Windows 10, version 21H1 for the
end-to-end experience. For more information, see Local site list in IE mode.
Manage your extensions right from the toolbar. The all-new extensions menu on
the toolbar will allow you to hide/pin extensions easily. The quick links to manage
extensions and find new extensions will make it easy for you to find new
extensions and manage your existing ones.
Default for autoplay will be set to Limit. To help you maintain your focus online,
we have changed the default for autoplaying media to Limit from Allow, beginning
with Microsoft Edge version 92.
Payment instruments are now synced across devices. Beginning with Microsoft
Edge version 92, you have the option to synchronize your payment information
across your signed in devices. Please note: this is a Controlled Feature Rollout. If
you don't see this feature, please check back shortly as we continue our rollout.
Currently this feature is available only in the US and only for MSA users (not AAD)
Toolbar button features like Favorites and Collections will remember the user's
choice to pin them to the side of the window. Now enabled by default, if the user
chooses to pin a toolbar button, it will always open in the pinned state until they
decide to unpin. a
Users can now manage the 'Allow single sign-on for work or school sites using
this profile' option via group policy. 'Allow single sign-on for work or school sites
using this profile' allows non-AAD profiles to be able to use single sign-on for
work or school sites using work or school credentials present on the machine. This
option shows up for end-users as a toggle in Settings -> Profiles -> Profile
Preferences for non-AAD profiles only. You can use the
AADWebSiteSSOUsingThisProfileEnabled policy to configure the behavior.
Password health. It's important to use strong, unique passwords across different
accounts to stay safe online. However, that's easier said than done and most users
exhibit poor password habits like using weak passwords that are easy to guess, or
reuse the same strong passwords across accounts.
With this latest version of Microsoft Edge, your task of using strong and unique
passwords becomes a little bit easier! Microsoft Edge will now tell you whether
saved passwords are strong enough and also indicate whether they've been used
across multiple sites, helping you stay safer online. You can find your password
health information in your list of saved passwords in the edge://settings/passwords
page.
Added privacy for your saved passwords. If you are using a device you share with
others or have left your computer unlocked for whatever reason, you can now opt
for a second verification using your device password to avoid others getting access
to your website passwords. Simple!
Outlook extension. Stay on top of your Microsoft Outlook inbox, calendar, tasks
and more without having to open a new browser window. You can get the new
Outlook extension here: Microsoft Outlook - Microsoft Edge Addons
New Policies
AADWebSiteSSOUsingThisProfileEnabled Single sign-on for work or school sites
using this profile enabled
AutomaticHttpsDefault Configure Automatic HTTPS
HeadlessModeEnabled Control use of the Headless Mode
InsecurePrivateNetworkRequestsAllowed Specifies whether to allow insecure
websites to make requests to more-private network endpoints
InsecurePrivateNetworkRequestsAllowedForUrls Allow the listed sites to make
requests to more-private network endpoints from insecure contexts
InternetExplorerIntegrationLocalSiteListExpirationDays Specify the number of days
that a site remains on the local IE mode site list
InternetExplorerIntegrationReloadInIEModeAllowed Allow unconfigured sites to be
reloaded in Internet Explorer mode
SharedArrayBufferUnrestrictedAccessAllowed Specifies whether
SharedArrayBuffers can be used in a non cross-origin-isolated context
Deprecated Policy
InternetExplorerIntegrationTestingAllowed Allow Internet Explorer mode testing
Obsoleted Policy
EnableSha1ForLocalAnchors Allow certificates signed using SHA-1 when issued by
local trust anchors
) Important
This update contains a fix for CVE-2021-30563 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
) Important
This update contains a fix for CVE-2021-30554 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
) Important
This update contains a fix for CVE-2021-30551 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Feature updates
Identify network traffic originating from Microsoft Defender Application Guard
containers at the proxy level. Starting with Microsoft Edge version 91, there's built
in support to tag network traffic originating from Application Guard containers,
allowing enterprises to identify them and apply specific policies.
Support option to allow synchronizing Favorites from the host to the Edge
Application Guard container. Starting with Microsoft Edge version 91, users have
the option to configure Application Guard to synchronize their favorites from the
host to the container. This ensures new favorites appear on the container as well.
Starting with Microsoft Edge version 91 the browser will automatically interrupt
downloads of types which could harm your computer if those downloads are
started without a user interaction and are not supported by SmartScreen
Application Reputation check. Users may override and continue to download by
right clicking and choosing "Keep" on the download item. Enterprise
administrators may opt out of this behavior by configuring the following policy:
ExemptDomainFileTypePairsFromFileTypeDownloadWarnings - Disable
download file type extension-based warnings for specified file types on domains
Support for Speech Recognition APIs. Starting with Microsoft Edge version 91, API
support for speech recognition commands on Google.com and similar sites will be
added. This feature is limited to a randomly selected group of users who have
enabled experimentation. These users are giving feedback to the feature team.
Personalize your browser with new theme colors. Make Microsoft Edge your own
with one of the fourteen new theme colors on the Settings -> Appearance page.
You can also install custom themes from the Microsoft Edge Add-on site. Learn
more
Policy updates
New policies
Six new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added:
Obsoleted Policy
ProactiveAuthEnabled - Enable Proactive Authentication
) Important
This update contains a fix for CVE-2021-21224 which has been reported by the
Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
Kiosk mode. Starting with Microsoft Edge version 90, we have locked down the UI
print settings to only allow the configured printers and "Print to PDF" options. We
have also done improvements within the assigned access single app kiosk mode to
restrict the launch of other applications from the browser. For more information
about the kiosk mode features please go here.
Interrupt Downloads Starting with Microsoft Edge version 91 the browser will
automatically interrupt downloads of types which could harm your computer if
those downloads are started without a user interaction and are not supported by
SmartScreen Application Reputation check. Users may override and continue to
download by right clicking and choosing "Keep" on the download item. Enterprise
administrators may opt out of this behavior one of these two policies:
Printing:
Additional page scaling options for printing. Users are now able to customize
scaling while printing webpages and PDF documents using additional options.
The "Fit to Page" option ensures that the webpage or document is fit into the
space available in the selected "Paper size" for printing. The "Actual size" option
ensures that there are no changes in the size of the contents being printed
regardless of the selected "Paper size".
Productivity:
Autofill suggestions are extended to include address fields content from
clipboard. Clipboard content is parsed when you click on a profile/address field
(for example, phone, email, zip code, city, state, etc.) to show as autofill
suggestions.
Users can search for autofill suggestions even if a form or field isn't detected.
Today if you have your information saved on Microsoft Edge, autofill
suggestions pop up automatically and help you save time while filling out
forms. In cases where autofill misses a form, or if you want to fetch data in
forms that don't typically have autofill (like temporary forms), you can search for
your information use autofill.
Access downloads from a flyout in the menu bar. Downloads will appear in the
top-right corner with all the active downloads in one place. This menu is easily
dismissible so users can continue browsing uninterrupted, and they can monitor
overall download progress right from the toolbar. Learn more .
Kids mode. We have updated the policy so that when the policy is enabled, it will
disable the Kid Mode feature in addition to family safety. More about Kids Mode
here
Policy updates
New policies
Eight new policies were added. Download the updated Administrative Templates from
the Microsoft Edge Enterprise landing page . The following new policies were added:
Deprecated policies
ProactiveAuthEnabled Enable Proactive Authentication
NativeWindowOcclusionEnabled - Enable Native Window Occlusion
SSLVersionMin- Minimum TLS version enabled
) Important
This update contains a fix for CVE-2021-21206 and CVE-2021-21220 which has
been reported by the Chromium team as having an exploit in the wild. For more
information, see the Security Update Guide .
) Important
This update contains CVE-2021-21193 which has been reported by the Chromium
team as having an exploit in the wild. For more information, see the Security
Update Guide .
Version
) Important
This update contains CVE-2021-21166 which has been reported by the Chromium
team as having an exploit in the wild. For more information, see the Security
Update Guide .
Feature updates
Kiosk mode enables additional lockdown capabilities. Starting with Microsoft
Edge version 89, we have added additional lockdown capabilities within kiosk
mode to enable customers to get the job done in a productive and more secure
experience. Learn more.
The Enterprise Mode Site List Manager tool will be available in the browser
through the edge://compat page. You can use this tool to create, edit and export
your site list XML for Internet Explorer mode on Microsoft Edge. You can enable
access to this tool as needed through group policy. Learn More.
Reset your Microsoft Edge sync data in the cloud manually. We are introducing a
way to reset your Microsoft Edge sync data from within the product. This ensures
that your data is cleared from Microsoft services, as well as resolving certain
product issues that previously required a support ticket.
Intelligent enablement of Single sign-on (SSO) for all Windows Azure Active
Directory (Azure AD) accounts for users with a single non-Azure AD Microsoft
Edge profile. Automatically turn this setting on for users that might benefit the
most from this feature. If a user has only one Microsoft Edge profile (and it's not
Azure AD or Kids Mode), the setting will be automatically turned on when
Microsoft Edge launches. This auto-toggle will also automatically turn off if a user
later chooses to sign into a different Microsoft Edge profile with an Azure AD
account. Users can manually update their preferences for this feature in Settings >
Profiles >Profile Preferences > Allow single sign-on for work or school sites
using this profile.
Date of birth field now supported in autofill. Today Microsoft Edge helps you save
time and effort while filling out forms and creating accounts online by auto filling
your data like addresses, names, phone numbers, etc. Starting with Microsoft Edge
version 89, we are adding support for another field that you can have saved and
auto-filled - date of birth. You can view, edit and delete this information anytime in
your profile settings.
Policy updates
New policies
Seven new policies were added. Download the updated Administrative Templates from
the Microsoft Edge Enterprise landing page . The following new policies were added.
Obsoleted policies
The following policies are obsoleted.
) Important
This update contains CVE-2021-21148 which has been reported by the Chromium
team as having an exploit in the wild.
Feature updates
Deprecations:
Deprecate support for FTP protocol. Support for the legacy FTP protocol has
been removed from Microsoft Edge. Attempting to navigate to an FTP link will
result in the browser directing the Operating System to open an external
application to handle the FTP link. Alternatively, IT administrators can configure
Microsoft Edge to use IE Mode for sites that rely on the FTP protocol.
Adobe Flash support will be removed. Starting with Microsoft Edge Beta version
88, Adobe Flash capability and support will be removed. Learn more: Update on
Adobe Flash Player End of Support - Microsoft Edge Blog (windows.com)
Authentication:
Single Sign On (SSO) now available for Azure Active Directory (Azure AD)
accounts and Microsoft Account (MSA) on down-level Windows. A user signed
in on Microsoft Edge on down-level Microsoft Windows (7, 8.1) will now get
automatically signed into websites that are configured to allow single sign on
with Work and Microsoft accounts (e.g., bing.com, office.com, msn.com,
outlook.com).
Note: A user may have to sign out and then sign back in if they'd signed into
Microsoft Edge in a version prior to Microsoft Edge 88 to leverage this feature.
Single sign-on (SSO) to work sites using any Windows Azure Active Directory
(Azure AD) accounts on system in non-Azure AD Microsoft Edge profiles. This
feature can be enabled for any profile that isn't signed-in with a work/school
account and is not guest or in-private and allows the use of any signed-in
work/school account on operating system with that profile. This feature can be
configured in Settings > Profiles > Profile Preferences > Allow single sign-on
for work or school sites using this profile.
7 Note
"Single sign-on (SSO) for all Windows accounts using the Microsoft Edge
profile" is an update to the January 21 release notes.
Kiosk mode option to end session. The "End session" button is now available in a
kiosk mode public browsing experience. This feature ensures that browser data
and settings are deleted when Microsoft Edge is closed. Learn more about kiosk
mode features and roadmap, Configure Microsoft Edge kiosk mode.
Passwords:
Password Generator. Microsoft Edge offers a built-in strong password generator
that you can use when signing up for a new account or when changing an
existing password. Just look for the browser-suggested password drop down in
the password field and when selected, it will automatically save to the browser
and sync across devices for easy future use.
Password Monitor. When any of your passwords saved to the browser matches
with those seen in the list of leaked credentials, Microsoft Edge will notify you
and prompt you to update your password. Password Monitor scans for matches
on your behalf and is on by default.
Edit Password. You can now edit your saved passwords directly in Microsoft
Edge Settings. Any time a password has been updated outside of Microsoft
Edge, it's easy to replace the saved older password with the new one by editing
the saved entry in Settings.
Improve Microsoft Edge startup speed with startup boost. To improve Microsoft
Edge startup speed, we've developed a feature named startup boost. Startup boost
makes Microsoft Edge launch faster by enabling Microsoft Edge to run in the
background. Note: This feature is limited to a randomly selected group of users
who have enabled experimentation. These users are giving feedback to the feature
team.
Productivity:
Improve productivity and multi-tasking with vertical tabs. As the number of
horizontal tabs grows, site titles start to get cut off and tab controls are lost as
each tab shrinks. This interrupts user workflow as they spend more time finding,
switching, and managing their tabs and less time on the task at hand. Vertical
tabs let users move their tabs to the side, where vertically aligned icons and
longer site titles make it easier to quickly scan, identify and switch to the tab
they want to open.
Auto filling the date of birth field. Microsoft Edge already helps save time and
effort while filling out forms and creating accounts online by auto filling user
data such as addresses, names, phone numbers, etc. Microsoft Edge now
supports the date of birth field which users can save and auto fill. A user can
view, edit and delete this information anytime in their profile settings.
Improvements to Recently closed in History. Recently closed now keeps the last
25 tabs and windows from any past browsing session rather than just the
previous session. Users can select Recently closed in the new History experience
to see all the tabs that were open.
"Your day at a glance" feature enabled by default. Starting with Microsoft Edge
version 88, information workers can benefit from intelligent productivity
features on their New tab page (NTP). Microsoft Edge 87 users will also
experience these features within 2 weeks after Microsoft Edge 88 release. We
offer users signed in with their work or school account personalized and
relevant content powered by their M365 Graph. Users can quickly scan their
"Your day at a glance" modules to easily track their meetings and recent work as
well as quickly launch the applications they want to use.
History and open tabs sync. History and open tabs sync is now available for users
to enjoy. Enabling these features will help users pick up where they left off by
making their browsing history and open tabs available on all their syncing devices.
We've updated sync and browser history policies, so now users are connected and
productive across any devices by using Microsoft Edge. Learn more .
PDF:
PDF document display in book view (two page). Starting with Microsoft Edge
version 88, users can view PDF documents in a single page or in the two page
book view. To change the view, click the Page View button in the toolbar.
Anchored text notes support for PDF files. Starting with Microsoft Edge version
87, users can add typed text notes on any piece of text in PDF files.
Fonts:
Browser icons are updated to the Fluent design system. As part of our
continued work around Fluent Design in the browser, we've made changes to
closer align icons to the new Microsoft icon system. These changes will impact
many of our high-touch user interfaces, including tabs, address bar, as well as
navigational and wayfinding icons found in our various menus.
Improved font rendering. Text rendering is improved for better clarity and to
reduce blurriness.
Policy updates
New policies
Eighteen new policies were added. Download the updated Administrative Templates
from the Microsoft Edge Enterprise landing page . The following new policies were
added.
Deprecated Policies
ProactiveAuthEnabled - Enable Proactive Authentication.
ProxyBypassList - Configure proxy bypass rules.
ProxyMode - Configure proxy server settings.
ProxyPacUrl - Set the proxy .pac file URL.
ProxyServer - Configure address or URL of proxy server.
WebDriverOverridesIncompatiblePolicies - Allow WebDriver to Override
Incompatible Policies.
Obsoleted Policies
AllowPopupsDuringPageUnload - Allows a page to show popups during its
unloading.
DefaultPluginsSetting - Default Adobe Flash setting.
PluginsAllowedForUrls - Allow the Adobe Flash plug-in on specific sites.
PluginsBlockedForUrls - Block the Adobe Flash plug-in on specific sites.
RunAllFlashInAllowMode - Extend Adobe Flash content setting to all content.
Feature updates
Automatic redirection for incompatible sites from Internet Explorer to Microsoft
Edge. Starting with the Microsoft Edge 87 Stable update, public websites that show
an incompatibility message on Internet Explorer will be automatically redirected to
Microsoft Edge. To learn more and to configure this experience, see Redirecting
incompatible sites.
Kiosk mode privacy features enabled. Starting with Microsoft Edge version 87,
kiosk mode features that will help enterprises around the privacy of user data will
be enabled. These features will enable experiences such as clear the user data on
exit, delete downloaded files and to reset the configured start experience after a
specified amount of idle time. Learn more about how to Configure Microsoft Edge
kiosk mode
The enterprise new tab page (NTP) integrates productivity with customizable,
work-relevant feed content. The enterprise NTP blends the Office 365 productivity
page we offer to users signed in with their work or school account with
personalized, work-relevant company and industry feeds that are organized in a
single page. Users will be able to recognize the familiar Office 365 content and
Microsoft Search for Business powered by Bing. In addition, they can easily
customize "My Feed" by choosing the most relevant content to them from the
available content and modules for their organization. IT Administrators can control
the News feed settings for their organization, including the selected industry for
the Edge new tab page by going to Microsoft 365 admin center. Learn more
Keyboard support for highlighter on PDF files. Users can use their keyboard keys
to highlight any text on a PDF.
Printing:
Choose which side to flip on when printing on both sides. Users can choose to
flip on the long side or the short side of a sheet when printing on both sides.
Choose print rasterization mode for the enterprise. Control how Microsoft Edge
prints to a non-PostScript printer on Windows. Sometimes print jobs on non-
PostScript printers need to be rasterized to print correctly. The print options are
"Full" and "Fast".
Policy updates
New policies
Ten new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated Policy
Obsoleted Policy
) Important
This update contains CVE-2020-16009 , that has been reported by the Chromium
team as having an exploit in the wild.
Feature updates
Roll back to previous Microsoft Edge version. The rollback feature lets
administrators revert to a known good version of Microsoft Edge if there's an issue
in the latest version of Microsoft Edge. Note: Stable version 86.0.622.38 is the first
version you can roll back to, which means that Stable version 87 is the first version
ready to rollback from. Learn more.
Enforce enabling Sync by default across the enterprise. Administrators can enable
synchronization for Azure Active Directory (Azure AD) accounts by default with the
ForceSync policy.
Remove the HTML5 Application Cache API. Beginning with Microsoft Edge
version 86, the legacy Application Cache API that enables offline use of web pages
is being removed from Microsoft Edge. Web Developers should review the
WebDev documentation for information on replacing the Application Cache API
with Service Workers. Important: You can request an AppCache OriginTrial Token
that allows sites to continue to use the deprecated Application Cache API until
Microsoft Edge version 90.
Internet Explorer mode: Let users use the Microsoft Edge User Interface (UI) to
test sites in Internet Explorer mode. Beginning with Microsoft Edge version 86,
administrators can enable a UI option for their users to load a tab in Internet
Explorer mode for testing purposes or as a stopgap until sites are added to the site
list XML.
PDF updates:
Table of contents for PDF Documents. Beginning with version 86, Microsoft
Edge has added support for table of contents that lets users easily navigate
through PDF documents.
Access all PDF functionalities on small form factor screens. Access all the
capabilities of the Microsoft Edge PDF reader on devices with small screen sizes.
Pen support for highlighter on PDF files. With this update, users can use their
digital pen to directly highlight text on PDF files, in the same way they would
with a physical highlighter and paper.
Improved PDF scrolling. You will now be able to experience stutter free scrolling
while navigating through long PDF documents.
Users will see auto complete suggestions when they start typing a search query
on the Microsoft Edge Add-ons website. Auto complete will help users quickly
complete their search query without having to type the entire string. This will be
helpful because users won't have to remember correct spellings and they can
choose from the available options that are displayed.
Add a custom image to the New Tab Page (NTP) using a group policy. Beginning
with Microsoft Edge version 86 the NTP has an option to replace the default image
with a custom user-supplied image. The ability to manage the properties of this
image is also supported by the group policy.
Delete downloads from disk using download manager. Users are now able to
delete their downloaded files from their disk without leaving the browser. The new
Delete downloads functionality exists within the context menu of downloads shelf
or the downloads page.
Policy updates
New policies
Twenty-three new policies were added. Download the updated Administrative Templates
from the Microsoft Edge Enterprise landing page . The following new policies were
added.
Deprecated Policies
Obsoleted Policy
TLS13HardeningForLocalAnchorsEnabled - Enable a TLS 1.3 security feature for local
trust anchors.
Feature updates
On-premises synchronization of Favorites and Settings. Now you can synchronize
browser favorites and settings between Active Directory profiles within your own
environment without the need for cloud sync.
Microsoft Edge group policy support for trusting site + app combos to launch
without a confirmation prompt.. Group policy support added that lets
administrators add site + app combos that are trusted to launch without the
confirmation prompt. This adds the ability for administrators to configure trusted
protocol/origin combinations (such as Microsoft 365 apps) for their end-users to
suppress the confirmation prompt when navigating to a URL that contains an app
protocol.
PDF Highlighter tool. This tool can be added to the toolbar for PDFs to easily
highlight important text.
The Storage Access API is available. The Storage Access API allows access to first-
party storage in a third-party context when a user has provided a direct intent to
allow storage that would otherwise be blocked by the browser's current
configuration. For more information, see Storage Access API .
DevTools updates. For details about the following updates, see What's New In
DevTools (Microsoft Edge 85).
Microsoft Edge DevTools supports Surface Duo emulation. The Microsoft Edge
DevTools can emulate the Surface Duo so you can test how your web content
will look on dual-screen devices. To turn on this experiment in DevTools, enter
Device Mode by pressing Ctrl+Shift+M on Windows or Command+Shift+M on
macOS, and then select Surface Duo from the device drop-down list.
Microsoft Edge DevTools lets you match keyboard shortcuts to VS Code. The
Microsoft Edge DevTools supports customizing keyboard shortcuts in the
DevTools to match your editor/IDE. In Microsoft Edge 85, we are adding the
ability to match DevTools keyboard shortcuts to VS Code. This change will help
increase productively across VS Code and DevTools.
Policy updates
New policies
Thirteen new policies were added. Download the updated Administrative Templates
from the Microsoft Edge Enterprise landing page . The following new policies were
added.
Obsoleted policies
Feature updates
This version of Microsoft Edge provides improved site list download times for
Internet Explorer mode. We've reduced download delay for the Internet Explorer
mode site list to 0 seconds (down from a 60-second wait) in the absence of a
cached site list. We've also added group policy support for cases when Internet
Explorer mode home page navigations need to be delayed until the site list is
downloaded. For more information, see the
DelayNavigationsForInitialSiteListDownload policy.
Microsoft Edge now allows users to sign-into the browser when it's "run as
administrator" on Windows 10. This will help customers running Microsoft Edge on
Windows server or in remote-desktop and sandbox scenarios.
Microsoft Edge now provides full mouse support when in full screen mode. Now
you can use your mouse to access tabs, the address bar, and other items without
having to exit full screen mode.
TLS/1.0 and TLS/1.1 are disabled by default. The SSLVersionMin policy permits re-
enabling of TLS/1.0 and TLS/1.1. This policy will remain available until at least
Microsoft Edge version 88. For more information, see Site compatibility-impacting
changes coming to Microsoft Edge.
Collections improvements:
A note capability is added that lets you add a note or comment to an item in a
collection. Notes are grouped together and stay attached to an item even if you
sort the items in a collection. To try this new feature, right-click on an item and
select "Add note".
You can change the background color of notes in collections. You can use color
coding to help you organize information and increase productivity.
There are noticeable performance improvements, which lets you export your
collections to Excel in less time than in previous versions of Microsoft Edge.
The Storage Access API is enabled for experimentation. This feature is enabled
for home users and Enterprise users with the
ExperimentationAndConfigurationServiceControl policy set to "Full". This feature
will be enabled by default for all users in Microsoft Edge Stable Channel version
85.
The Native File System API, which means you can give sites permissions to edit
files or folders via the Native File System API.
PDF improvements:
Read Aloud for PDF lets users listen to PDF content while carrying out other
tasks that may be important for them. It also helps audio visual learners focus
on reading the content, making learning easier.
PDF file editing is improved. Now you can save an edit made to a PDF back to
the file instead of saving a copy each time you edit the PDF.
Microsoft Edge now enables Translation in the Immersive Reader. When a user
opens the Immersive Reader view, they get the option to translate the page to
their desired language.
Several DevTools updates, including support for customizing keyboard shortcuts to
match VS Code and viewing the DevTools in high contrast. For more details, see
What's New In DevTools (Microsoft Edge 84).
Policy updates
New policies
Seven new policies were added. Download the updated Administrative Templates from
the Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated policies
AllowSyncXHRInPageDismissal - Allow pages to send synchronous XHR requests
during page dismissal.
BuiltinCertificateVerifierEnabled - Determines whether the built-in certificate
verifier will be used to verify server certificates.
StricterMixedContentTreatmentEnabled - Enable stricter treatment for mixed
content.
Obsoleted policy
ForceNetworkInProcess - Force networking code to run in the browser process.
Feature updates
Microsoft Edge updates will now roll out gradually. Going forward, updates for
Microsoft Edge will be rolled out to our users over a period of a few days. This
enables us to protect more of you from accidental buggy updates, which improves
your update experience. As a user you will continue to get seamless auto-updates.
If your organization isn't enrolled for auto-updates you won't be affected by this
change. To learn more, see the progressive rollouts article.
In response to user feedback, users can now exempt certain cookies from
automatically clearing when the browser closes. This option is helpful if there's a
site that users don't want to be signed out of, but still want to have all the other
cookies cleared when the browser closes. To use this feature, go to
edge://settings/clearBrowsingDataOnClose and enable the "Cookies and other site
data" toggle.
Automatic Profile Switching is now available to help you get to your work content
more easily across profiles. If you use multiple profiles at work, you can check it
out by navigating to a site requiring authentication from your work or school
account while on your personal profile. When we detect this, you will receive a
prompt to switch to your work profile to access that site without having to
authenticate to it. When you choose the work profile you want to switch to, the
website will simply open in your work profile. This profile switching capability will
help you keep your work and personal data separate and help you get to your
work content more effortlessly. If you don't want the feature to prompt you to
switch profiles, you can choose the don't ask me again option and it will get out of
your way.
Extension sync is now available. You can now sync your extensions across all your
devices! Extensions from both the Microsoft and Chrome Stores will sync with
Microsoft Edge. To use this feature: Click the ellipses (…) on the menu bar, select
Settings. Under Your profile, click Sync to see the Sync options. Under
Profiles/Sync use the toggle to enable Extensions. You can use the
SyncTypesListDisabled group policy to disable syncing of extensions.
Link doctor provides host correction and a search query to the users when they
mistype a URL. For example:
A user mistypes "powerbi as "powerbbi".com. Link doctor will suggest
"powerbi".com as a correction and create a link to search for "powerbbi" in case
the user is looking for something different.
Allow users to save their decision to launch an external protocol for a specific site.
Users can configure the ExternalProtocolDialogShowAlwaysOpenCheckbox policy
to enable or disable this feature.
Users can set Microsoft Edge as their default browser directly from Microsoft Edge
Settings. This makes it easier for users to change their default browser, within the
context of the browser itself, instead of having to search through the operating
system settings. To use this feature, go to edge://settings/defaultBrowser and click
Make default.
Policy updates
New policies
15 new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated policy
The following policy will continue to work in this release. It will become "obsolete" in a
future release.
Feature updates
Added support for Windows Information Protection (WIP), which helps enterprises
protect sensitive data from unauthorized disclosure. Learn More.
Collections is now available. To get started, click the Collections icon next to the
address bar. This action opens the Collections pane where you can create, edit, and
view Collections. We designed Collections based on what you do on the web. If
you're a shopper, a traveler, a teacher, or a student, Collections can help. Learn
more .
Allow the removal (Hide from toolbar) of the Collections button from the Microsoft
Edge toolbar for consistency.
Added a message to inform users that Internet Explorer isn't installed when they
navigate to a page that's configured to open in Internet Explorer mode.
Updated the 3D View tool in Microsoft Edge DevTools with a new feature to help
debug z-index stacking context. 3D View shows a representation of the DOM
(Document Object Model) depth using color and stacking, and the z-Index view
helps you isolate the different stacking contexts of your page. Learn more .
The F12 Dev tools are localized in 10 new languages, so they will match the
language used in the rest of the browser. Learn more .
Microsoft Edge can now identify and remove duplicate favorites and merge folders
with the same name. To access the tool, click the star on the browser's toolbar and
select "Remove duplicate favorites". You can that confirm changes and any updates
to your favorites will be synced across devices.
Added a warning that alerts users who sign into a browser profile with an account
after being previously signed in with another account. This warning will help
prevent unintentional data merging.
If you have payment cards saved in your Microsoft account, you can use them in
Microsoft Edge while filling out payment forms. The cards in your Microsoft
account will sync across desktop devices and the full details will be shared with the
website after two-factor authentication (CVC code and your Microsoft identity.) For
further convenience, you can choose to securely save a copy of the card on the
device during authentication.
Line Focus is designed for users who like to focus on a limited part of the content
as they read. It lets users keep the focus on one, three, or five lines at a time and
dims out the rest of the page to let users read without distraction. Users can scroll
using touch or arrow keys and the focus shifts accordingly.
Microsoft Edge is now integrated with Windows Speller on Windows platforms 8.1
and above. This integration provides greater language support, with access to
more language dictionaries and the ability to use Windows custom dictionaries.
There's no further action needed from the users when a language has been added
in the OS language settings. Also, a language spellcheck toggle is enabled in
Microsoft Edge settings.
When PDF documents are opened using Microsoft Edge, users will now be able to
create highlights, change color, and delete highlights. This feature helps in
referencing important parts of the document later, and for collaboration.
When loading long PDF documents that have been optimized for web, the pages
being viewed by the user will be loaded faster, parallelly, while the rest of the
document is loading.
Now it's easier to start the Immersive Reader for a website by just pressing the F9
key.
Now it's easier to start Read Aloud by using a keyboard shortcut (Ctrl + Shift + U).
Added an MSI command line parameter that lets you suppress Desktop icon
creation when you install Microsoft Edge. The following example shows how to use
this new parameter:
MicrosoftEdgeEnterpriseX64.msi DONOTCREATEDESKTOPSHORTCUT=true
New policies
11 new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated policies
The following policies continue to work in this release. They will become "obsolete" in a
future release.
Feature updates
Added SmartScreen protection from downloading potentially unwanted apps.
Learn more
Added support for Dolby Vision playback.
Enabled users of Windows Mixed Reality to view 360° videos on VR headsets.
Added an option to Reading View to increase text spacing.
Added support for erasing link using the Surface Pen eraser.
Added support for using the arrow keys and spacebar to draw on feedback
screenshots in editor mode.
Improved the reliability of screenshots so they stop appearing all black when
submitting feedback.
Added dark theme support to the local new tab page that is shown when the
device isn't connected to the internet.
Added the ability for websites that are installed as apps to be restored when a
browser session is restored after an update, crash, and so on.
Added dark theme support to PDF UI when the browser is managed by Group
Policy.
Updated Adobe Flash to version 32.0.0.321. Learn more
Policy updates
New policies
16 new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
AlternateErrorPagesEnabled - Suggest similar pages when a webpage can't be
found.
DefaultInsecureContentSetting - Control use of insecure content exceptions.
DNSInterceptionChecksEnabled - DNS interception checks enabled.
HideFirstRunExperience - Hide the First-run experience and splash screen.
InsecureContentAllowedForUrls - Allow insecure content on specified sites.
InsecureContentBlockedForUrls - Block insecure content on specified sites.
LegacySameSiteCookieBehaviorEnabled - Enable default legacy SameSite cookie
behavior setting.
LegacySameSiteCookieBehaviorEnabledForDomainList - Revert to legacy SameSite
behavior for cookies on specified sites.
PaymentMethodQueryEnabled - Allow websites to query for available payment
methods.
PersonalizationReportingEnabled - Allow personalization of ads, search, and news
by sending browsing history to Microsoft.
PinningWizardAllowed - Allow Pin to taskbar wizard.
SmartScreenPuaEnabled - Configure Microsoft Defender SmartScreen to block
potentially unwanted apps.
TotalMemoryLimitMb - Set limit on megabytes of memory a single Microsoft Edge
instance can use.
WebAppInstallForceList - Configure list of force-installed Web Apps.
WebComponentsV0Enabled - Re-enable Web Components v0 API until M84.
WebRtcLocalIpsAllowedUrls - Manage exposure of local IP addresses by WebRTC.
Deprecated policies
The following policy was deprecated.
Resolved issues
Fixed an issue where audio isn't working in Citrix environment.
Fixed an issue where Microsoft Edge and legacy Microsoft Edge side-by-side
experience results in broken legacy links and crashes.
See also
Microsoft Edge Enterprise landing page
Release notes for Microsoft Edge Beta
Channel
Article • 08/29/2023
These release notes provide information about new features and non-security updates
that are included in the Microsoft Edge Beta Channel. Archived versions of these release
notes are available at Archived release notes for Microsoft Edge Beta Channel.
7 Note
Feature updates
Microsoft Edge for Business update. Microsoft Edge for Business is a dedicated
Microsoft Edge experience built for work that enables admins in organizations to
give their users a productive and secure work browser across managed and
unmanaged devices. The Automatic Switching mechanism is designed to keep
work and personal browsing separate for the end users. This mechanism currently
switches users from personal to work browsing on applicable logins. The new
update will start automatically switching users from work to personal browsing on
applicable logins. For more information, see Microsoft Edge for Business.
Smart Find. Searching for a word or phrase on a webpage has become easier with
AI. Even if you misspell a word in your search query, related matches and words are
suggested, making it effortless to find what you're looking for. When you search,
select the suggested link to quickly locate the desired word or phrase.
Administrators can control the availability using the
RelatedMatchesCloudServiceEnabled policy. For more information, see Smart Find.
E-tree in Wallet. Users signed into Microsoft Edge with a personal Microsoft
Account (MSA) can grow a virtual seed into a tree with Wallet. Once it's grown, a
real mangrove is planted. Administrators can control the availability using the
EdgeWalletEtreeEnabled policy. Note: This feature is a controlled feature rollout. If
you don't see this feature, check back as we continue our rollout.
Deprecation of features. To improve end user experience and simplify the More
tools menu, the following features are being deprecated: Math Solver, Picture
Dictionary, Citations, Grammar Tools, and Kids Mode.
Policy updates
New policies
AllowSystemNotifications - Allows system notifications
EdgeWalletEtreeEnabled - Edge Wallet E-Tree Enabled
GamerModeEnabled - Enable Gamer Mode
SearchbarAllowed - Enable the Search bar
SearchbarIsEnabledOnStartup -Allow the Search bar at Windows startup
ShowHistoryThumbnails - Show thumbnail images for browsing history
UploadFromPhoneEnabled - Enable upload files from phone in Microsoft Edge
desktop
Obsoleted policy
See also
Microsoft Edge Enterprise landing page
Archived release notes for Microsoft
Edge Beta Channel
Article • 08/25/2023
These release notes provide information about new features and non-security updates
that are included in the Microsoft Edge Beta Channel. To understand Microsoft Edge
channels, see the Overview of the Microsoft Edge channels. All the security updates are
listed here.
Feature update
Microsoft Edge for Business. In addition to rich set of enterprise controls, security,
and productivity features that you're already familiar with, Microsoft Edge for
Business offers new refreshed look and feel, automatic switching to keep your
work and personal browsing separate including fixes from private preview
feedback, lightly managed Enterprise Personal Browser (MSA profile), and support
for Unmanaged BYOPC. Microsoft Edge for Business is now turned on by default.
For more information, see Microsoft Edge for Business.
Locked Tabs in Edge Workspaces. This feature lets you keep tabs where you put
them in an Edge workspace. A locked tab can't be closed, dragged or otherwise
moved out of a workspace window. To lock a tab, right-click the tab and choose
"Lock Tab" from the context menu. Click the lock icon on a tab to unlock it. Only
the workspace creator and the user who locked the tab are permitted to unlock
the tab. For more information, see Microsoft Edge Workspaces. Note: This feature
is a controlled feature rollout. If you don't see this feature, check back as we
continue our rollout.
Policy updates
New policies
Feature update
Autofill Autocomplete. This feature helps you fill form fields faster on the web.
When you start typing in a form field, Microsoft Edge suggests possible in-line
completions when there's an exact match with your saved data in the browser. For
example, if you type the first few characters of your address, autocomplete will
suggest the rest of address - you can choose the autocomplete suggestion or
continue typing as usual. Autofill options can be found in Settings
( edge://settings/personalinfo ). Note: This feature is a controlled feature rollout. If
you don't see this feature, check back as we continue our rollout.
Feature update
Microsoft Edge for Business. In addition to rich set of enterprise controls, security,
and productivity features that you're already familiar with, Microsoft Edge for
Business offers new refreshed look and feel, automatic switching to keep your
work and personal browsing separate, lightly managed Enterprise Personal Browser
(MSA profile), support for Unmanaged BYOPC, and Company Branding (coming
soon).
To enable preview on a device, enter the following URLs in the Microsoft Edge
address bar and set each flag to "Enabled".
edge://flags/#edge-project-kodiak
edge://flags/#edge-project-kodiak-look-and-feel
edge://flags/#edge-project-kodiak-policy-filter
edge://flags/#edge-automatic-profile-switching
For more information, see Microsoft Edge for Business (Early Preview).
Feature update
Enhanced security mode improvements. Enhanced security mode provides an
extra layer of protection when browsing the web and visiting less familiar sites.
Enhanced security mode is turned on by default to Balanced mode for x64
Windows, x64 macOS, x64 Linux, and ARM64 systems. Note: This feature is a
controlled feature rollout in Microsoft Edge Beta 115. If you don't see this feature,
check back as we continue our rollout.
Also, administrators have two new policies to manage the Enhanced security mode
user experience: EnhanceSecurityModeIndicatorUIEnabled and
EnhanceSecurityModeOptOutUXEnabled. For more information, see Browse more
safely with Microsoft Edge.
Policy updates
New policies
WalletDonationEnabled - Wallet Donation Enabled
EnhanceSecurityModeIndicatorUIEnabled - Manage the indicator UI of the
Enhanced Security Mode (ESM) feature in Microsoft Edge
EnhanceSecurityModeOptOutUXEnabled - Manage opt-out user experience for
Enhanced Security Mode (ESM) in Microsoft Edge
ComposeInlineEnabled - Compose is enabled for writing on the web
SearchForImageEnabled - Search for image enabled
Feature update
Microsoft Edge Sync Favorites Recovery. The Microsoft Edge Sync Favorites
Recovery feature lets sync users restore any favorites that they lost or deleted
within the last 14 days. Users can access this feature from either the Microsoft
Edge favorites hub or the edge://favorites page. Note: This feature is a controlled
feature rollout. If you don't see this feature, check back as we continue our rollout.
Feature update
(Preview) Microsoft Edge Workspaces. Edge Workspaces gives customers a way to
organize their browsing tasks into dedicated windows. Edge Workspaces lets users
share a set of browser tabs so working groups can view the same websites and
latest working files in one place and stay on the same page. Each Edge Workspace
contains its own sets of tabs and favorites, created and curated by the user and
their collaborators. Edge Workspaces are automatically saved and kept up to date.
For more information about this public preview, see Microsoft Edge Workspaces.
Option to attach the Edge sidebar to the Windows desktop. Users of the
Microsoft Edge sidebar will be able to access their apps and sites directly from
their Windows desktop. As an opt-in experience, users can attach the sidebar to
their Windows desktop by clicking a "popout" icon near the base of the sidebar in
the browser. This enables a side-by-side experience that works with any Windows
app—including Microsoft Edge itself. Users enjoy streamlined access to the same
set of powerful AI tools and web-based services, including Bing Chat, without
launching a browser window, enhancing productivity regardless of where they are
in Windows. Administrators can control the availability using the
StandaloneHubsSidebarEnabled.
Policy updates
New policies
Feature update
Microsoft Edge PDF Share. Users now have an easy option to share PDF
documents as a link or attachment directly from the PDF toolbar. Note: This
feature is a controlled feature rollout. If you don't see this feature, check back as
we continue our rollout.
Policy updates
New policies
RestorePdfView - Restore PDF view
ReadAloudEnabled - Enable Read Aloud feature in Microsoft Edge
ShowDownloadsToolbarButton - Show Downloads button on the toolbar
TabServicesEnabled - Tab Services enabled
Feature update
Enhanced security mode improvements. Enhanced security mode now supports
WebAssembly for ARM64. Cross-platform support is now available for x64
Windows, x64 macOS, x64 Linux and ARM64 systems. For more information, see
Browse more safely with Microsoft Edge.
Added features for web app policy. The WebAppInstallForceList policy lets
administrators configure a list of web apps that install silently, without user
interaction, and which users can't uninstall or turn off. This policy now supports
custom_name , which permanently overrides the app name of installed apps and
Policy updates
New policies
Feature update
Enhanced security mode improvements. Enhanced security mode now supports
WebAssembly for macOS x64 and Linux x64. More cross-platform (ARM64) support
is expected in the future. For more information, see Browse more safely with
Microsoft Edge.
New policy to clear IE mode data on browser exit. The
InternetExplorerModeClearDataOnExitEnabled policy controls whether browsing
history is deleted from Internet Explorer and Internet Explorer mode every time
Microsoft Edge is closed. Users can also configure this setting in the 'Clear
browsing data for Internet Explorer' option in the Privacy, search, and services
menu of Settings (edge://settings/privacy).
Policy updates
New policies
Feature update
New Immersive Reader policies. Immersive Reader in Microsoft Edge simplifies
web page layouts, removes clutter, and helps you customize your reading
experience. Administrators can use these new policies
(ImmersiveReaderGrammarToolsEnabled and
ImmersiveReaderPictureDictionaryEnabled), to control the availability of Grammar
Tools and Picture Dictionary features within Immersive Reader.
Enabling sync for Azure Active Directory signed in customers. Microsoft Edge
sync roams data across all signed in instances of Microsoft Edge. This data includes
favorites, passwords, browsing history, open tabs, settings, apps, collections, and
extensions. For Azure Active Directory users who have sync turned off, after the
browser is launched they'll see a notification prompt and have sync turned on for
all signed in instances of Microsoft Edge. This sync enablement includes other
devices where they're signed in. Additionally, if a user's other devices don't have
history and open tabs sync on, those two toggles are turned on. Organizations
using the SyncDisabled policy aren't affected by this change.
In-browser JSON viewer. Improvements to how JSON files are displayed in the
browser include a color-coded tree view with line numbers and the ability to
collapse and expand the data. This functionality triggers automatically when the
browser navigates to a JSON file on the web or the user opens a local file.
Additional features and enhancements will roll out when they're available. For
more information and to provide feedback, visit DevTools: In-browser JSON
viewer .
Split Screen. This feature lets you browse faster with side by side tabs. Boost your
productivity with two tabs side-by-side in one browser window. With split screen
you can multitask without losing focus. Users can access Split Screen by clicking
the toolbar icon or by selecting "Open link in split window" in the context menu.
Note: This feature is a controlled feature rollout. If you don't see this feature, check
back as we continue our rollout.
Policy updates
New policies
Obsoleted policies
Feature update
MSA-AAD Account Linking. Microsoft is enabling users who have a personal
Microsoft account (an MSA) and a Microsoft user account through their work or
school (an Azure Active Directory account) to "link" the two types of accounts
together. "Linked accounts" means that users are able to see some of the content
from their personal account alongside the tailored content from their work or
school account. They're also able to earn Microsoft Rewards points in their
personal account from their activities while using their work or school account.
More blended experiences may be made available. For more information, see the
Account Linking FAQ and the Account Linking IT Admins FAQ . Tenant admins
can learn how to control this feature in the Message Center section of the
Microsoft 365 Admin Center. Also, this feature can be controlled by using the
LinkedAccountEnabled policy.
TLS server certificate verification changes. In Microsoft Edge version 110, the
certificate trust list and the certificate verifier is decoupled from the host operating
system's root store. Instead, the default certificate trust list and the certificate
verifier is provided by and shipped with the browser. The
MicrosoftRootStoreEnabled policy is now available for testing to control when the
built-in root store and certificate verifier are used. Support for the policy is planned
for removal in Microsoft Edge version 111. For more information, see Changes to
Microsoft Edge browser TLS server certificate verification. Note: This feature is a
controlled feature rollout in Microsoft Edge version 109. If you don't see this
feature, check back as we continue our rollout.
Policy updates
New policies
Deprecated policies
SetTimeoutWithout1MsClampEnabled - Control JavaScript setTimeout() function
minimum timeout
ExemptDomainFileTypePairsFromFileTypeDownloadWarnings - Disable download
file type extension-based warnings for specified file types on domains
Feature update
Graph APIs for Cloud Site List Management. New Graph APIs that allow IT admins
in organizations to create, manage, and publish their site lists for IE mode in the
cloud. For more information, see Use the Edge API in Microsoft Graph.
More reliable web defense. Browse the web with more reliable protection thanks
to the rewritten Microsoft Defender SmartScreen library for Microsoft Edge on
Windows, Mac, and Linux. The new SmartScreen library was first made available on
Windows and Mac, and now makes its debut on Linux with Microsoft Edge version
108. Microsoft Edge version 108 also brings new product optimizations (that is
better proxy handling) and bug fixes by having the SmartScreen library leverage
Microsoft Edge's built-in network stack.
Policy updates
New policies
Obsoleted policy
Policy updates
New policies
EdgeWorkspacesEnabled - Enable Workspaces
EnhanceSecurityModeBypassIntranet - Enhanced Security Mode configuraton for
Intranet zone sites
EventPathEnabled - Re-enable the Event.path API until Microsoft Edge version 115
InternetExplorerIntegrationLocalMhtFileAllowed - Allow local MHTML files to open
automatically in Internet Explorer mode
LinkedAccountEnabled - Enable the linked account feature
PerformanceDetectorEnabled - Performance Detector Enabled
RestoreOnStartupUserURLsEnabled - Allow users to add and remove their own
sites during startup when the RestoreOnStartupURLs policy is configured
DefaultShareAdditionalOSRegionSetting - Set the default "share additional
operating system region" setting
WebSelectEnabled - Web Select Enabled
WebSQLAccess - Force WebSQL to be enabled
WebSQLNonSecureContextEnabled - Force WebSQL in non-secure contexts to be
enabled
Deprecated policy
MicrosoftOfficeMenuEnabled - Allow users to access the Microsoft Office menu
Obsoleted policy
BuiltinCertificateVerifierEnabled - Determines whether the built-in certificate
verifier will be used to verify server certificates
Feature updates
More reliable web defense. Browse the web with more reliable protection thanks
to the rewritten Microsoft Defender SmartScreen library for Microsoft Edge on
Windows and macOS. The new SmartScreen library was first made available on
Windows with Microsoft Edge version 103, and now makes its debut on macOS
with Microsoft Edge version 106. The NewSmartScreenLibraryEnabled policy is now
deprecated in Microsoft Edge version 106 and will be obsolete in Microsoft Edge
version 107.
Policy updates
New policies
Deprecated policies
Obsoleted policies
Improvements to the Cloud Site List Management experience for IE mode now
available in GCC. GCC customers can now utilize the full Microsoft Edge site list
experience in the Microsoft 365 Admin Center.
Policy updates
New policies
Deprecated policy
ExemptDomainFileTypePairsFromFileTypeDownloadWarnings - Disable download
file type extension-based warnings for specified file types on domains
Additional change
GuidedSwitchEnabled - Add Linux platform support
Feature updates
Enhance your security on the web. Improvements to Enhance your security on
the web in edge://settings/privacy now include Basic as the new default option.
With this option, Microsoft Edge applies added security protection to the less
visited sites. This preserves the user experience for the most popular sites on the
web. For more information, see Browse more safely with Microsoft Edge.
Feature updates
Import Chrome data without Chrome during First Run Experience. This feature
lets a user bring in their Chrome data by logging in to their Google account during
Microsoft Edge's First Run Experience. This feature can be turned off by disabling
First Run Experience with the HideFirstRunExperience policy, or by setting
AutoImportAtFirstRun to 'DisabledAutoImport'.
Policy updates
New policies
Obsoleted policy
Feature updates
Ability to control automatic profile switching. The GuidedSwitchEnabled policy
lets Microsoft Edge prompt the user to switch to the appropriate profile when
Microsoft Edge detects that a link is a personal or work link.
Client Certificate Switcher. This feature offers a way for users to clear the
remembered certificate and resurface the certificate picker when visiting a site
requiring http certificate authentication. Switching can be done without manually
quitting Microsoft Edge.
More reliable web defense. Browse the web with more reliable protection thanks
to the rewritten Microsoft Defender SmartScreen library for Microsoft Edge on
Windows. The NewSmartScreenLibraryEnabled policy allows enterprise customers
to continue using the legacy version of the library until it's deprecated in Microsoft
Edge version 105.
Policy updates
New policies
Policy updates
New policies
AllHttpAuthSchemesAllowedForOrigins - List of origins that allow all HTTP
authentication
OutlookHubMenuEnabled - Allow users to access the Outlook menu
NetworkServiceSandboxEnabled - Enable the network service sandbox
UserAgentClientHintsGREASEUpdateEnabled - Control the User-Agent Client Hints
GREASE Update feature
Feature updates
Improvements to the Enterprise Site List Manager. Now you can configure shared
cookies between Microsoft Edge and Internet Explorer on your enterprise site list.
You can access the Enterprise Site List Manager at edge://compat/SiteListManager.
Feature updates
Ability to set default profile. The EdgeDefaultProfileEnabled policy lets you set a
default profile to be used when opening the browser rather than the last profile
used. This policy won't be applicable if the --profile-directory parameter has
been specified.
Launch Progressive Web Apps (PWAs) from Favorites Bar. Improvements to the
PWA launch experience will begin to show up starting with an Apps icon that can
be added to the toolbar.
Manage the "Allow extensions from other stores" setting. Use the
ControlDefaultStateOfAllowExtensionFromOtherStoresSettingEnabled policy to
control the default state of the "Allow extensions from other stores" setting.
Policy updates
New policies
ConfigureKeyboardShortcuts - Configure the list of commands for which to disable
keyboard shortcuts
ControlDefaultStateOfAllowExtensionFromOtherStoresSettingEnabled - Configure
default state of Allow extensions from other stores setting
EdgeAssetDeliveryServiceEnabled - Allow features to download assets from the
Asset Delivery Service
EdgeDefaultProfileEnabled - Default Profile Setting Enabled
InternetExplorerModeEnableSavePageAs - Allow Save page as in Internet Explorer
mode
KioskSwipeGesturesEnabled - Swipe gestures in Microsoft Edge kiosk mode
enabled
MicrosoftOfficeMenuEnabled - Allow users to access the Microsoft Office menu
SiteSafetyServicesEnabled - Allow users to configure Site safety services
Deprecated policy
ForceCertificatePromptsOnMultipleMatches - Configure whether Microsoft Edge
should automatically select a certificate when there are multiple certificate matches
for a site configured with "AutoSelectCertificateForUrls"
Obsoleted policy
WebSQLInThirdPartyContextEnabled - Force WebSQL in third-party contexts to be
re-enabled
Feature updates
Streamlining Microsoft 365 Application Protocol Activations. Microsoft 365
Application Protocol Activations on trusted Microsoft cloud storage services will
now launch certain Microsoft 365 applications directly, including SharePoint
subdomains and Microsoft OneDrive URLs. You can use the policies
AutoLaunchProtocolsComponentEnabled and AutoLaunchProtocolsFromOrigins to
enable the application protocol activation prompts if desired, and to define other
applications and services where warnings are enabled or disabled.
Feature updates
Improvements to the Cloud Site List Management experience for IE Mode. You
can configure session cookie sharing between Microsoft Edge and Internet
Explorer for IE Mode on your site list in the Microsoft 365 Admin Center. Note: This
is a controlled feature rollout. If you don't see this feature, check back as we
continue our rollout
Preview PDF files in Microsoft Outlook and File Explorer. Users can view a PDF file
in a lightweight and rich read-only preview. Available for Outlook Desktop PDF
attachments or for local PDF files using File Explorer.
Policy updates
New policies
AdsTransparencyEnabled - Configure if the ads transparency feature is enabled
DefaultWebHidGuardSetting - Control use of the WebHID API
HideRestoreDialogEnabled - Hide restore pages dialog after browser crash
PDFSecureMode - Secure mode and Certificate-based Digital Signature validation
in native PDF reader
PromptOnMultipleMatchingCertificates - Prompt the user to select a certificate
when multiple certificates match
WebHidAskForUrls - Allow the WebHID API on these sites
WebHidBlockedForUrls - Block the WebHID API on these sites
Deprecated policy
BackgroundTemplateListUpdatesEnabled - Enables background updates to the list
of available templates for Collections and other features that use templates
Obsoleted policy
Feature updates
Improvements to the Cloud Site List Management experience for IE Mode.
Identify gaps in your enterprise site list by configuring reporting of site feedback
with the InternetExplorerIntegrationCloudUserSitesReporting and
InternetExplorerIntegrationCloudNeutralSitesReporting policies. You can view local
site list URLs from users and potentially misconfigured neutral site URLs in the
Microsoft Edge site lists experience in the Microsoft 365 Admin Center. To learn
more, see View site feedback on the Microsoft 365 Admin Center. Note: This is a
controlled feature rollout. If you don't see this feature, check back as we continue
our rollout.
Feature updates
Upcoming three-digit version number in user agent string. Starting with version
100, Microsoft Edge will send a three-digit version number in the User-Agent
header, for example "Edg/100". Starting with Microsoft Edge 97, site owners can
test this upcoming agent string by enabling the #force-major-version-to-100
experiment flag in edge://flags to ensure their User-Agent parsing logic is robust
and works as expected.
Personalize multi-profile experiences with profile preferences for sites. Users can
personalize their multi-profile experience with the ability to create a customized
list of sites for automatic profile switching in Microsoft Edge.
Bidirectional Cookie Sharing for IE mode. This feature expands on the cookie
sharing capability already available and lets users sync specific session cookies
from Internet Explorer/IE mode to Microsoft Edge. For more information, see
Cookie sharing between Microsoft Edge and Internet Explorer.
Navigate PDF documents using page thumbnails. You will now be able to
navigate through your PDF document using thumbnails that represent the pages.
These thumbnails will appear in the pane on the left side of the PDF reader.
Configure the list of domains for which the password manager User Interface
(UI) for Save and Fill will be disabled. Use the PasswordManagerBlocklist policy to
configure the list of domains (HTTP/HTTPS schemas and hostnames only) where
Microsoft Edge should disable the password manager. This means that Save and
Fill workflows will be disabled, which ensures that passwords for those websites
can't be saved or auto filled into web forms.
Update extensions to the Microsoft Edge Add-ons store using API's (in public
preview). You can integrate these API's directly into your build pipeline, and
publish package updates to the Microsoft Edge Add-on website. To learn more,
see Using the Microsoft Edge Add-ons API (in private preview)
Policy updates
New policies
Feature updates
Enhance your security on the web. A browsing mode in Microsoft Edge where the
security of your browser takes priority, giving you an extra layer of protection when
browsing the web. Administrators can apply the following Group Policies to end-
user desktops (Windows, macOS, and Linux) to help protect against zero days.
These policies also make that important sites and line of business applications
continue to work as expected. This feature is a huge step forward because it lets us
mitigate unforeseen active zero days (based on historical trends). When turned on,
this feature brings Hardware-enforced Stack Protection, Arbitrary Code Guard
(ACG), and Content Flow Guard (CFG) as supporting security mitigations to
increase users' security on the web. Group Policies:
EnhanceSecurityMode
EnhanceSecurityModeBypassListDomains
EnhanceSecurityModeEnforceListDomains
Custom primary password. The browser already has the capability where users can
add an authentication step before saved passwords are auto-filled in web forms.
This adds another layer of privacy and helps prevent unauthorized users from
using saved passwords to log on websites. Custom primary password is an
evolution of that same feature, where users will now be able to use a custom string
of their choice as their primary password. After it's enabled, users will enter this
password to authenticate themselves and have their saved passwords auto filled
into web forms.
Overlay scrollbars added to Microsoft Edge. We've updated our scrollbars with an
overlay-based design. Users can turn this feature on in edge://flags.
Policy updates
New Policies
AddressBarEditingEnabled - Configure address bar editing.
EdgeFollowEnabled - Enable Follow service in Microsoft Edge.
EnhanceSecurityMode - Enhance the security state in Microsoft Edge.
EnhanceSecurityModeBypassListDomains - Configure the list of domains for which
enhance security mode will not be enforced.
EnhanceSecurityModeEnforceListDomains - Configure the list of domains for which
enhance security mode will always be enforced.
InAppSupportEnabled - In-app support Enabled.
MicrosoftEdgeInsiderPromotionEnabled - Microsoft Edge Insider Promotion
Enabled.
PrintStickySettings - Print preview sticky settings.
SandboxExternalProtocolBlocked - Allow Microsoft Edge to block navigations to
external protocols in a sandboxed iframe.
U2fSecurityKeyApiEnabled - Allow using the deprecated U2F Security Key API.
Add support for Microsoft Endpoint Data Loss Prevention (DLP) on macOS.
Microsoft Endpoint DLP policy enforcement is available natively on macOS.
Open digitally signed PDF files. Digital signatures are used extensively to validate
the authenticity of, and changes to, a document. Users can validate the signatures
for PDF files directly from the browser, without the need for any add-ins.
Policy updates
New Policies
AccessibilityImageLabelsEnabled - Get Image Descriptions from Microsoft Enabled
CORSNonWildcardRequestHeadersSupport - CORS non-wildcard request header
support enabled
EdgeDiscoverEnabled - Discover feature In Microsoft Edge
EdgeEnhanceImagesEnabled - Enhance images enabled
InternetExplorerModeTabInEdgeModeAllowed - Allow sites configured for Internet
Explorer mode to open in Microsoft Edge
SameOriginTabCaptureAllowedByOrigins - Allow Same Origin Tab capture by these
origins
ScreenCaptureAllowedByOrigins - Allow Desktop, Window, and Tab capture by
these origins
SerialAllowAllPortsForUrls - Automatically grant sites permission to connect all
serial ports
SerialAllowUsbDevicesForUrls - Automatically grant sites permission to connect to
USB serial devices
SmartScreenDnsRequestsEnabled - Enable Microsoft Defender SmartScreen DNS
requests
TabCaptureAllowedByOrigins - Allow Tab capture by these origins
WebSQLInThirdPartyContextEnabled - Force WebSQL in third-party contexts to be
re-enabled
WindowCaptureAllowedByOrigins - Allow Window and Tab capture by these
origins
Obsoleted Policies
AppCacheForceEnabled - Allows the AppCache feature to be re-enabled, even if
it's turned off by default.
Feature updates
Launch Progressive Web App (PWA) directly via protocol links. Let installed PWAs
handle links that use a specific protocol for a more integrated experience.
Learn how to solve math problems with Math Solver. We're excited to announce
that you can use Math Solver in Microsoft Edge to get help with a wide range of
mathematical concepts. These concepts range from elementary arithmetic and
quadratic equations to trigonometry and calculus. Math Solver lets you take a
picture of a handwritten or printed math problem and then provides an instant
solution with step-by-step instructions to help you learn how to reach the solution
without help. Math Solver also comes with a mathematical keyboard that you can
use to easily type math problems. This keyboard eliminates the need to search
around a traditional keyboard to find the math characters you need. After solving
your problem, Math Solver provides options to continue learning with quizzes,
worksheets, and video tutorials.
New warning dialog for typosquatting sites. The browser will now show a
warning on some sites with URLs that look similar to other sites. This UI uses client-
side heuristics to warn users about sites that might be spoofing popular web sites.
For more information, see What is typosquatting? .
Improved handoff between IE mode and the modern browser. Starting with this
version of Microsoft Edge, navigations between Microsoft Edge and Internet
Explorer mode will include form data and additional HTTP headers. Referrer
headers, post data, forms data, and request methods will be forwarded correctly
across the two experiences. You can specify which data types should be included
using the InternetExplorerIntegrationComplexNavDataTypes policy. For more
information, see this FAQ: My application requires transferring POST data between
IE mode and Microsoft Edge.
Cloud Site List Management for IE mode in Public Preview. Cloud Site List
Management lets you manage your site lists for IE mode in the cloud without
needing an on-premises infrastructure to host your organization's site list. You can
access the Cloud Site List Management feature using the Microsoft Edge Site Lists
experience in the Microsoft 365 Admin Center. To learn more, see the Cloud Site
List Management for IE mode (Public Preview) article.
WSUS updates for Server. WSUS and Catalog updates for Microsoft Edge channels
(Stable, Beta, Dev) will now apply to Windows Server SKUs that have Microsoft
Edge installed, including Windows Server 2022. For more information on how to
configure WSUS updates for Microsoft Edge, see Update Microsoft Edge.
Policy updates
New Policies
ApplicationGuardUploadBlockingEnabled - Prevents files from being uploaded
while in Application Guard.
AudioProcessHighPriorityEnabled - Allow the audio process to run with priority
above normal on Windows.
AutoLaunchProtocolsComponentEnabled - AutoLaunch Protocols Component
Enabled.
EfficiencyMode - Configure when efficiency mode should become active.
ForceSyncTypes - Configure the list of types that are included for synchronization.
InternetExplorerIntegrationComplexNavDataTypes - Configure whether form data
and HTTP headers will be sent when entering or exiting Internet Explorer mode.
InternetExplorerModeToolbarButtonEnabled - Show the Reload in Internet Explorer
mode button in the toolbar.
PrintPostScriptMode - Print in PostScript Mode.
PrintRasterizePdfDpi - Print in Rasterize PDF DPI.
RendererAppContainerEnabled - Enable renderer in app container.
SharedLinksEnabled - Show links shared from Microsoft 365 apps in History.
TyposquattingCheckerEnabled - Configure Edge TyposquattingChecker.
Feature updates
View in File Explorer support for SharePoint Online libraries in Microsoft Edge.
Now you can enable the View in File Explorer capability for SharePoint Online
Modern Document Libraries. For this experience to be visible and work for your
users, you will need to enable the Microsoft Edge "Configure the View in File
Explorer feature for SharePoint pages in Microsoft Edge" policy and update your
SharePoint Online tenant configuration. Learn more: View SharePoint files with File
Explorer in Microsoft Edge - SharePoint in Microsoft 365 | Microsoft Docs.
Intranet zone file URL links will open in Windows File Explorer. You can allow file
URL links to intranet zone files originating from intranet zone HTTPS websites to
open Windows File Explorer for that file or directory. You can enable this
experience using the IntranetFileLinksEnabled policy.
Pick up where you left off on PDF documents. You can resume reading from the
location where you last closed your PDF document.
Efficiency mode extends battery life when your laptop enters battery saver
mode. Efficiency mode will become active when your laptop enters battery saver
mode to allow the browser to manage resource usage to extend the battery life of
your machine. You will have four options for when efficiency mode becomes active,
Unplugged and low battery, Unplugged, Always, and Never. Note: This is a
Controlled Feature Rollout. Devices with a battery should have the feature turned
on.
New Policies
Obsoleted Policies
Feature updates
Microsoft Edge moving to a 4-week cadence for updates in Beta and Stable
channels. We will adopt a new, 4-week release cycle for major versions. You can
read more about the decision here:
https://blogs.windows.com/msedgedev/2021/03/12/new-release-cycles-microsoft-
edge-extended-stable/
New Extended stable option being offered. We are offering a new Extended
Stable option to our managed Enterprise customers. The Extended Stable option
will stay on even numbered revisions and update every 8 weeks. There will be a
biweekly security update. Additional information here:
https://blogs.windows.com/msedgedev/2021/07/15/opt-in-extended-stable-
release-cycle/
Block mixed content downloads. Secure pages will only download files hosted on
other secure pages, and downloads hosted on non-secure (non-HTTPS) pages will
be blocked if initiated from a secure page. This change is happening in the
Chromium project, on which Microsoft Edge is based. For more information,
navigate to the Google security blog entry .
Free form text boxes added to PDF documents. We now support adding free form
text boxes to PDF documents that you can use to fill in forms and add visible
notes.
Update your passwords with ease. The browser will now take you directly to the
Change Password page for a given website saving you time and clicks by avoiding
the need to navigate to the page manually. Once you're on this page the browser
will also autofill your existing password and suggest a strong, unique new
password. Please note: currently this feature is available on a limited number of
sites.
New Policies
Obsoleted Policy
Feature updates
Initial Preferences in Microsoft Edge. Starting with Microsoft Edge version 93,
deploying Microsoft Edge to your enterprise will become easier with the addition
of Initial Preferences.
Tab Groups. The ability to categorize tabs into user-defined groups helps you
more effectively find, switch, and manage tabs across multiple workstreams. To
enable this, we are turning on tab grouping beginning with Microsoft Edge version
93.
Hide the title bar while using Vertical Tabs. Get the extra few pixels back by hiding
the browser's title bar, while in Vertical Tabs. Starting with Microsoft Edge version
93, you can go to edge://settings/appearance and under the Customize Toolbar
section select the option to hide the title bar while in Vertical Tab mode.
Video Picture in Picture (PiP) from hover toolbar. Starting with Microsoft Edge
version 93, it will become even easier to enter Picture in Picture (PiP) mode. When
you hover over a supported video, a toolbar will appear that allows you to view
that video in a PiP window. Note: this is currently available for Microsoft Edge
users on macOS. Check back shortly as we continue our rollout to Windows users.
Removal of 3DES in TLS. Starting with Microsoft Edge version 93, support for the
TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher suite will be removed. This change is
happening in the Chromium project, on which Microsoft Edge is based. For more
information, navigate to the Chrome Platform Status entry . Additionally, in
Microsoft Edge version 93, the TripleDESEnabled policy will be available to support
scenarios that need to preserve compatibility with outdated servers. This
compatibility policy will become obsolete and stop working in Microsoft Edge
version 95. Ensure that you update affected servers before then.
New Policies
AutoplayAllowlist Allow media autoplay on specific sites
CECPQ2Enabled CECPQ2 post-quantum key-agreement enabled for TLS
ConfigureViewInFileExplorer Configure the View in File Explorer feature for
SharePoint pages in Microsoft Edge
DefaultJavaScriptJitSetting Control use of JavaScript JIT
ShowPDFDefaultRecommendationsEnabled Allow notifications to set Microsoft
Edge as default PDF reader
FeatureFlagOverridesControl Configure users ability to override feature flags
ImplicitSignInEnabled Enable implicit sign-in
InternetExplorerIntegrationCloudSiteList Configure the Enterprise Mode Cloud Site
List
InternetExplorerIntegrationSiteListRefreshInterval Configure how frequently the
Enterprise Mode Site List is refreshed
JavaScriptJitAllowedForSites Allow JavaScript to use JIT on these sites
JavaScriptJitBlockedForSites Block JavaScript from using JIT on these sites
LocalBrowserDataShareEnabled Enable Windows to search local Microsoft Edge
browsing data
MAUEnabled Always use Microsoft AutoUpdate as the updater for Microsoft Edge
MSAWebSiteSSOUsingThisProfileAllowed Allow single sign-on for Microsoft sites
using this profile
OneAuthAuthenticationEnforced OneAuth Authentication Flow Enforced for signin
PasswordGeneratorEnabled Allow users to get a strong password suggestion
whenever they are creating an account online
PrimaryPasswordSetting Configures a setting that asks users to enter their device
password while using password autofill
PrintingWebpageLayout Sets layout for printing
RemoteDebuggingAllowed Allow remote debugging
RelaunchWindow Set the time interval for relaunch
TravelAssistanceEnabled Enable travel assistance
TripleDESEnabled Enable 3DES cipher suites in TLS
Deprecated Policy
Obsoleted Policy
NewTabPageSetFeedType Configure the Microsoft Edge new tab page experience
Additional Change
ConfigureShare Add mac platform support
Feature updates
Natural language search for browser history on the address bar. Finding the
article/website you are looking for is now easier thanks to natural language search
right from the address bar. You can find search results based on page
content/description/timing (such as "cake recipe from last week") in addition to
titles/URL keyword matches alone. Please note: this is a Controlled Feature Rollout.
If you don't see this feature, please check back shortly as we continue our rollout.
Users can easily get to Internet Explorer mode on Microsoft Edge. Starting with
Microsoft Edge version 92, users can reload a site in Internet Explorer mode on
Microsoft Edge instead of relying on the standalone IE 11 application while waiting
for a site to be configured in the Enterprise Mode Site List. Users will be prompted
to add the site to their local site list such that navigating to the same page in
Microsoft Edge will automatically render in IE mode for the next 30 days. You can
use the InternetExplorerIntegrationReloadInIEModeAllowed policy to configure this
experience and allow access to the IE mode entry points as well as the ability to
add sites to the local site list. You can use the
InternetExplorerIntegrationLocalSiteListExpirationDays policy to adjust the number
of days to keep sites on the local site list. Note that KB5003698 or later is required
for Windows 10, version 1909; or KB5003690 or later is required for Windows 10,
version 2004, Windows 10, version 20H2, or Windows 10, version 21H1 for the
end-to-end experience.
Payment instruments are now synced across devices. Beginning with Microsoft
Edge version 92, you have the option to synchronize your payment information
across your signed in devices. Please note: this is a Controlled Feature Rollout. If
you don't see this feature, check back shortly as we continue our rollout.
"Disable developer mode extensions" warning can be permanently dismissed.
Beginning with Microsoft Edge version 92, you can turn off the warning "Disable
developer mode extensions" by clicking on the 'Don't show this again' option.
Please note: this is a Controlled Feature Rollout. If you don't see this feature, check
back shortly as we continue our rollout.
Manage your extensions right from the toolbar. The all-new extensions menu on
the toolbar will allow you to hide/pin extensions easily. The quick links to manage
extensions and find new extensions will make it easy for you to find new
extensions and manage your existing ones. Please note: this is a Controlled Feature
Rollout. If you don't see this feature, check back shortly as we continue our rollout.
Automatic HTTPS. Users will have the option to upgrade navigation from HTTP to
HTTPS on domains likely to support this more secure protocol. This support can
also be configured to attempt delivery over HTTPS for all domains. Please note: we
are experimenting with this feature and this behavior won't be seen if you have
opted out of experiments.
Policy updates
New policies
Eight new policies were added. Download the updated Administrative Templates from
the Microsoft Edge Enterprise landing page . The following new policies were added:
Obsoleted Policy
EnableSha1ForLocalAnchors Allow certificates signed using SHA-1 when issued by
local trust anchors.
Feature updates
Identify network traffic originating from Microsoft Defender Application Guard
containers at the proxy level. Starting with Microsoft Edge version 91, there's built
in support to tag network traffic originating from Application Guard containers,
allowing enterprises to identify them and apply specific policies.
Support option to allow synchronizing Favorites from the host to the Edge
Application Guard container. Starting with Microsoft Edge version 91, users have
the option to configure Application Guard to synchronize their favorites from the
host to the container. This ensures new favorites appear on the container as well.
Support for Speech Recognition APIs. Starting with Microsoft Edge version 91, API
support for speech recognition commands on Google.com and similar sites will be
added. This feature is limited to a randomly selected group of users who have
enabled experimentation. These users are giving feedback to the feature team.
Personalize your browser with new theme colors. Make Microsoft Edge your own
with one of the fourteen new theme colors on the Settings -> Appearance page.
You can also install custom themes from the Microsoft Edge Add-on site. Learn
more
Interrupt Downloads Starting with Microsoft Edge version 91 the browser will
automatically interrupt downloads of types which could harm your computer if
those downloads are started without a user interaction and are not supported by
SmartScreen Application Reputation check. Users may override and continue to
download by right clicking and choosing "Keep" on the download item.
Policy updates
New policies
Six new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added:
Obsoleted Policy
Feature updates
Single Sign On (SSO) is now available for Azure Active Directory (Azure AD)
accounts and Microsoft Account (MSA) on macOS. A user signed in on Microsoft
Edge on macOS will now get automatically signed into websites that are
configured to allow single sign on with Work and Microsoft accounts (for example,
bing.com, office.com, msn.com, and outlook.com).
Kiosk mode. Starting with Microsoft Edge version 90, we have locked down the UI
print settings to only allow the configured printers and "Print to PDF" options. We
have also done improvements within the assigned access single app kiosk mode to
restrict the launch of other applications from the browser. For more information
about the kiosk mode features please go here.
Printing:
Additional page scaling options for printing. Users are now able to customize
scaling while printing webpages and PDF documents using additional options.
The "Fit to Page" option ensures that the webpage or document is fit into the
space available in the selected "Paper size" for printing. The "Actual size" option
ensures that there are no changes in the size of the contents being printed
regardless of the selected "Paper size".
Productivity:
Users can search for autofill suggestions even if a form or field isn't detected.
Today if you have your information saved on Microsoft Edge, autofill
suggestions pop up automatically and help you save time while filling out
forms. In cases where autofill misses a form, or if you want to fetch data in
forms that don't typically have autofill (like temporary forms), you can search for
your information using autofill.
Access downloads from a flyout in the menu bar. Downloads will appear in the
top-right corner with all the active downloads in one place. This menu is easily
dismissible so users can continue browsing uninterrupted, and they can monitor
overall download progress right from the toolbar. Learn more .
Policy updates
New policies
Seven new policies were added. Download the updated Administrative Templates from
the Microsoft Edge Enterprise landing page . The following new policies were added:
Deprecated policies
Feature updates
Kiosk mode enables additional lockdown capabilities. Starting with Microsoft
Edge version 89, we have added additional lockdown capabilities within kiosk
mode to enable customers to get the job done in a productive and more secure
experience. Learn more.
The Enterprise Mode Site List Manager tool will be available in the browser
through the edge://compat page. You can use this tool to create, edit and export
your site list XML for Internet Explorer mode on Microsoft Edge. You can enable
access to this tool as needed through group policy. Learn More.
7 Note
Reset your Microsoft Edge sync data in the cloud manually. We are introducing a
way to reset your Microsoft Edge sync data from within the product. This ensures
that your data is cleared from Microsoft services, as well as resolving certain
product issues that previously required a support ticket.
Date of birth field now supported in autofill. Today Microsoft Edge helps you save
time and effort while filling out forms and creating accounts online by auto filling
your data like addresses, names, phone numbers, etc. Starting with Microsoft Edge
version 89, we are adding support for another field that you can have saved and
auto-filled - date of birth. You can view, edit and delete this information anytime in
your profile settings.
Support for natural language search on the address bar, history search page,
and the history hub. Starting with Microsoft Edge version 89, finding an
article/website will be easier with the natural language search on the address bar,
history page, and history hub. Users can search for previously viewed page
content/description/timing (such as "cake recipe from last week") in addition to
titles/URL keyword matches. This feature is limited to a randomly selected group of
users who have enabled experimentation. These users are giving feedback to the
feature team.
Policy updates
New policies
BrowsingDataLifetime - Browsing Data Lifetime Settings
MAMEnabled - Mobile App Management Enabled
DefinePreferredLanguages - Define an ordered list of preferred languages that
websites should display in if the site supports the language
ShowRecommendationsEnabled - Allow recommendations and promotional
notifications from Microsoft Edge
PrintingAllowedBackgroundGraphicsModes - Restrict background graphics
printing mode
PrintingBackgroundGraphicsDefault- Default background graphics printing mode
SmartActionsBlockList- Block smart actions for a list of services
Obsoleted policies
Feature updates
Deprecations:
Deprecate support for FTP protocol. Support for the legacy FTP protocol has
been removed from Microsoft Edge. Attempting to navigate to an FTP link will
result in the browser directing the Operating System to open an external
application to handle the FTP link. Alternatively, IT administrators can configure
Microsoft Edge to use IE Mode for sites that rely on the FTP protocol.
Adobe Flash support will be removed. Starting with Microsoft Edge Beta version
88, Adobe Flash capability and support will be removed. Learn more: Update on
Adobe Flash Player End of Support - Microsoft Edge Blog (windows.com)
Authentication:
Single Sign On (SSO) now available for Azure Active Directory (Azure AD)
accounts and Microsoft Account (MSA) on macOS and down-level Windows. A
user signed in on Microsoft Edge on either macOS or down-level Microsoft
Windows (7, 8.1) will now get automatically signed into websites that are
configured to allow single sign on with Work and Microsoft accounts (e.g.,
bing.com, office.com, msn.com, outlook.com).
Note: A user may have to sign out and then sign back in if they'd signed into
Microsoft Edge in a version prior to Microsoft Edge 88 to leverage this feature.
Automatically switch users on macOS to their work profile for sites that
authenticate with their work account. Starting with Microsoft Edge version 88,
we provide the ability to switch sites that authenticate with a user's work profile
on macOS.
Note: A user may have to sign out and then sign back in if they'd signed into
Microsoft Edge in a version prior to Microsoft Edge 88 to leverage this feature.
Kiosk mode option to end session. The "End session" button is now available in a
kiosk mode public browsing experience. This feature ensures that browser data
and settings are deleted when Microsoft Edge is closed. Learn more about kiosk
mode features and roadmap, Configure Microsoft Edge kiosk mode.
Performance:
Improve browser performance with sleeping tabs. Sleeping tabs improves
browser performance by putting inactive tabs to sleep to free up system
resources like memory and CPU so active tabs or other applications can use
them. Users can prevent sites from going to sleep and configure the length of
time before an inactive tab goes to sleep. To keep users in their flow, there are
also heuristics to prevent certain sites from going to sleep, such as intranet sites.
This feature is limited to a randomly selected group of users who have enabled
experimentation. We are planning to have the sleeping tabs feature enabled by
default with Microsoft Edge version 89. This feature can be managed with group
policies.
Improve Microsoft Edge startup speed with startup boost. To improve Microsoft
Edge startup speed, we've developed a feature named startup boost. Startup
boost makes Microsoft Edge launch faster by enabling Microsoft Edge to run in
the background. Note: This feature is limited to a randomly selected group of
users who have enabled experimentation. These users are giving feedback to
the feature team.
Productivity:
Improve productivity and multi-tasking with vertical tabs. As the number of
horizontal tabs grows, site titles start to get cut off and tab controls are lost as
each tab shrinks. This interrupts user workflow as they spend more time finding,
switching, and managing their tabs and less time on the task at hand. Vertical
tabs let users move their tabs to the side, where vertically aligned icons and
longer site titles make it easier to quickly scan, identify and switch to the tab
they want to open.
Auto filling the date of birth field. Microsoft Edge already helps save time and
effort while filling out forms and creating accounts online by auto filling user
data such as addresses, names, phone numbers, etc. Microsoft Edge now
supports the date of birth field which users can save and auto fill. A user can
view, edit and delete this information anytime in their profile settings.
Improvements to Recently closed in History. Recently closed now keeps the last
25 tabs and windows from any past browsing session rather than just the
previous session. Users can select Recently closed in the new History experience
to see all the tabs that were open.
"Your day at a glance" feature enabled by default. Starting with Microsoft Edge
version 88, information workers can benefit from intelligent productivity
features on their New tab page (NTP). We offer users signed in with their work
or school account personalized and relevant content powered by their M365
Graph. Users can quickly scan their "Your day at a glance" modules to easily
track their meetings and recent work as well as quickly launch the applications
they want to use.
PDF:
PDF document display in book view (two page). Starting with Microsoft Edge
version 88, users can view PDF documents in a single page or in the two page
book view. To change the view, click the Page View button in the toolbar.
Anchored text notes support for PDF files. Starting with Microsoft Edge version
87, users can add typed text notes on any piece of text in PDF files.
Smoother text selection experience in PDF documents. Users will get a
smoother and consistent text selection experience across PDF documents
opened in Microsoft Edge.
View webpages saved as PDF files in the Downloads bar. Users can now view
the PDF files generated by setting "Save as PDF" as the printer destination for
webpages in the Downloads bar.
Fonts:
Browser icons are updated to the Fluent design system. As part of our
continued work around Fluent Design in the browser, we've made changes to
closer align icons to the new Microsoft icon system. These changes will impact
many of our high-touch user interfaces, including tabs, address bar, as well as
navigational and wayfinding icons found in our various menus.
Improved font rendering. Text rendering is improved for better clarity and to
reduce blurriness.
Policy updates
New policies
Sixteen new policies were added. Download the updated Administrative Templates from
the Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated policies
The following policies are deprecated.
Obsoleted policies
The following policies are obsoleted.
Feature updates
Kiosk mode privacy features enabled. Starting with Microsoft Edge version 87
kiosk mode features that will help enterprises around the privacy of user data will
be enabled. These features will enable experiences such as clear the user data on
exit, delete downloaded files and to reset the configured start experience after a
specified amount of idle time. Learn more about how to Configure Microsoft Edge
kiosk mode
The enterprise new tab page (NTP) integrates productivity with customizable,
work-relevant feed content. The enterprise NTP blends the Office 365 productivity
page we offer to users signed in with their work or school account with
personalized, work-relevant company and industry feeds that are organized in a
single page. Users will be able to recognize the familiar Office 365 content and
Microsoft Search for Business powered by Bing. In addition, they can easily flip to a
customizable "My Feed" with content and modules that are relevant to the user,
their company, or their industry, as well as a selection of other feeds that the
organization has made available. Learn more.
Privacy and Security:
Support TLS Token Binding for policy-configured sites. TLS Token binding helps
prevent token theft attacks to ensure that cookies can't be reused from a device
other than the device upon which they were initially set. The use of TLS token
binding requires setting the AllowTokenBindingForUrls policy and requires that
the sites listed support this feature.
Keyboard support for highlighter on PDF files. Users can use their keyboard keys
to highlight any text on a PDF.
Printing:
Choose which side to flip on when printing on both sides. Users can choose to
flip on the long side or the short side of a sheet when printing on both sides.
Choose print rasterization mode for the enterprise. Control how Microsoft Edge
prints to a non-PostScript printer on Windows. Sometimes print jobs on non-
PostScript printers need to be rasterized to print correctly. The print options are
"Full" and "Fast".
Policy updates
New policies
Ten new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
Obsoleted Policy
Feature updates
Internet Explorer mode:
Let users use the Microsoft Edge User Interface (UI) to test sites in Internet
Explorer mode. Beginning with Microsoft Edge version 86, administrators can
enable a UI option for their users to load a tab in Internet Explorer mode for
testing purposes or as a stopgap until sites are added to the site list XML.
Delete downloads from disk using download manager. Users are now able to
delete their downloaded files from their disk without leaving the browser. The new
Delete downloads functionality exists within the context menu of downloads shelf
or the downloads page.
Roll back to previous Microsoft Edge version. The rollback feature lets
administrators revert to a known good version of Microsoft Edge if there's an issue
in the latest version of Microsoft Edge. Learn more.
Enforce enabling Sync by default across the enterprise. Administrators can enable
synchronization for Azure Active Directory (Azure AD) accounts by default with the
ForceSync policy.
PDF updates:
Table of contents for PDF Documents. Beginning with version 86, Microsoft
Edge has added support for table of contents that lets users easily navigate
through PDF documents.
Access all PDF functionalities on small form factor screens. Access all the
capabilities of the Microsoft Edge PDF reader on devices with small screen sizes.
Pen support for highlighter on PDF files. With this update, users can use their
digital pen to directly highlight text on PDF files, in the same way they would
with a physical highlighter and paper.
Improved PDF scrolling. You will now be able to experience stutter free scrolling
while navigating through long PDF documents.
Users will see auto complete suggestions when they start typing a search query
on the Microsoft Edge Add-ons website. Auto complete will help users quickly
complete their search query without having to type the entire string. This will be
helpful because users won't have to remember correct spellings and they can
choose from the available options that are displayed.
Remove the HTML5 Application Cache API. Beginning with Microsoft Edge
version 86, the legacy Application Cache API that enables offline use of web pages
is being removed from Microsoft Edge. Web Developers should review the
WebDev documentation for information on replacing the Application Cache API
with Service Workers. Important: You can request an AppCache OriginTrial Token
that allows sites to continue to use the deprecated Application Cache API until
Microsoft Edge version 90.
Security:
Secure DNS (DNS-over-HTTPS) Support. Beginning with Microsoft Edge version
86, settings to control Secure DNS on un-managed devices is available. These
settings aren't accessible to users on managed devices, but IT admins can
enable or disable Secure DNS using the dnsoverhttpsmode group policy.
Add a custom image to the New Tab Page (NTP) using a group policy. Beginning
with Microsoft Edge version 86 the NTP has an option to replace the default image
with a custom user-supplied image. The ability to manage the properties of this
image is also supported by the group policy.
Policy updates
New policies
Nineteen new policies were added. Download the updated Administrative Templates
from the Microsoft Edge Enterprise landing page . The following new policies were
added.
Deprecated Policies
Obsoleted Policy
AdsSettingForIntrusiveAdsSites
AllowTokenBindingForUrls
AmbientAuthenticationInPrivateModesEnabled
ApplicationGuardContainerProxy
AutoImportAtFirstRun
AutoOpenFileTypes
BrowserSignin
ClearBrowsingDataOnExit
ClickOnceEnabled
CommandLineFlagSecurityWarningsEnabled
ConfigureOnPremisesAccountAutoSignIn
ConfigureShare
CookiesAllowedForUrls
CustomHelpLink
DefaultCookiesSetting
DefaultGeolocationSetting
DefaultImagesSetting
DefaultInsecureContentSetting
DefaultJavaScriptSetting
DefaultNotificationsSetting
DefaultPluginsSetting
DefaultPopupsSetting
DefaultSearchProviderEnabled
DefaultWebBluetoothGuardSetting
DefaultWebUsbGuardSetting
DelayNavigationsForInitialSiteListDownload
DeveloperToolsAvailability
EnableSha1ForLocalAnchors
DownloadRestrictions
EnableDeprecatedWebPlatformFeatures
WinHttpProxyResolverEnabled
ExperimentationAndConfigurationServiceControl
ExternalProtocolDialogShowAlwaysOpenCheckbox
ExtensionInstallForcelist
ForceBingSafeSearch
ForceYouTubeRestrict
HomepageIsNewTabPage
HomepageLocation
InPrivateModeAvailability
InternetExplorerIntegrationEnhancedHangDetection
InternetExplorerIntegrationLevel
InternetExplorerIntegrationSiteRedirect
LegacySameSiteCookieBehaviorEnabled
NativeWindowOcclusionEnabled
NavigationDelayForInitialSiteListDownloadTimeout
NetworkPredictionOptions
NewTabPageLocation
NewTabPageSearchBox
NewTabPageSetFeedType
NonRemovableProfileEnabled
PasswordProtectionWarningTrigger
PasswordProtectionLoginURLs
PasswordProtectionChangePasswordURL
PluginsAllowedForUrls
PluginsBlockedForUrls
PreventSmartScreenPromptOverride
PreventSmartScreenPromptOverrideForFiles
ProxyMode
RegisteredProtocolHandlers
RelaunchNotification
RestoreOnStartup
RestoreOnStartupURLs
RestrictSigninToPattern
SSLVersionMin
SmartScreenAllowListDomains
SmartScreenEnabled
SmartScreenForTrustedDownloadsEnabled
SmartScreenPuaEnabled
SyncTypesListDisabled
TrackingPrevention
WebRtcLocalhostIpHandling
Feature updates
On-premises synchronization of Favorites and Settings. Now you can synchronize
browser favorites and settings between Active Directory profiles within your own
environment without the need for cloud sync.
Microsoft Edge group policy support for trusting site + app combos to launch
without a confirmation prompt. Group policy support added that lets
administrators add site + app combos that are trusted to launch without the
confirmation prompt. This adds the ability for administrators to configure trusted
protocol/origin combinations (such as Microsoft 365 apps) for their end-users to
suppress the confirmation prompt when navigating to a URL that contains an app
protocol.
PDF Highlighter tool. This tool can be added to the toolbar for PDFs to easily
highlight important text.
The Storage Access API is available. The Storage Access API allows access to first-
party storage in a third-party context when a user has provided a direct intent to
allow storage that would otherwise be blocked by the browser's current
configuration. For more information, see Storage Access API .
Send to OneNote is available for Microsoft Edge Collections. Everyone's excited
to be able to send the information they've gathered in Collections to OneNote,
where they can append it to a larger project and collaborate with others! And even
more importantly, in Microsoft Edge 85, you'll be able send content to Office for
Mac products (Word, Excel, and OneNote) for both Microsoft account and Azure
Active Directory.
DevTools updates. For details about the following updates, see What's New In
DevTools (Microsoft Edge 85).
Microsoft Edge DevTools supports Surface Duo emulation. The Microsoft Edge
DevTools can emulate the Surface Duo so you can test how your web content
will look on dual-screen devices. To turn on this experiment in DevTools, enter
Device Mode by pressing Ctrl+Shift+M on Windows or Command+Shift+M on
macOS, and then select Surface Duo from the device drop-down list.
Microsoft Edge DevTools lets you match keyboard shortcuts to VS Code. The
Microsoft Edge DevTools supports customizing keyboard shortcuts in the
DevTools to match your editor/IDE. In Microsoft Edge 85, we are adding the
ability to match DevTools keyboard shortcuts to VS Code. This change will help
increase productively across VS Code and DevTools.
Policy updates
New policies
Thirteen new policies were added. Download the updated Administrative Templates
from the Microsoft Edge Enterprise landing page . The following new policies were
added.
Obsoleted policies
Microsoft Edge now allows users to sign-into the browser when it's "run as
administrator" on Windows 10. This will help customers running Microsoft Edge on
Windows server or in remote-desktop and sandbox scenarios.
Microsoft Edge now provides full mouse support when in full screen mode. Now
you can use your mouse to access tabs, the address bar, and other items without
having to exit full screen mode.
TLS/1.0 and TLS/1.1 are disabled by default. To help discover impacted sites, you
can set the edge://flags/#display-legacy-tls-warnings flag to cause Microsoft Edge
to display a non-blocking "Not Secure" notice when loading pages that require
legacy TLS protocols. The SSLVersionMin policy permits re-enabling of TLS/1.0 and
TLS/1.1. This policy will remain available until at least Microsoft Edge version 88.
For more information, see Site compatibility-impacting changes coming to
Microsoft Edge.
Collections improvements:
A note capability is added that lets you add a note or comment to an item in a
collection. Notes are grouped together and stay attached to an item even if you
sort the items in a collection. To try this new feature, right-click on an item and
select "Add note".
You can change the background color of notes in collections. You can use color
coding to help you organize information and increase productivity.
There are noticeable performance improvements, which lets you export your
collections to Excel in less time than in previous versions of Microsoft Edge.
The Native File System API, which means you can give sites permissions to edit
files or folders via the Native File System API.
PDF improvements:
Read Aloud for PDF lets users listen to PDF content while carrying out other
tasks that may be important for them. It also helps audio visual learners focus
on reading the content, making learning easier.
PDF file editing is improved. Now you can save an edit made to a PDF back to
the file instead of saving a copy each time you edit the PDF.
Microsoft Edge now enables Translation in the Immersive Reader. When a user
opens the Immersive Reader view, they get the option to translate the page to
their desired language.
Policy updates
New policies
Five new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated policies
Obsoleted policy
Feature updates
Microsoft Defender SmartScreen improvements: Made several improvements to
the Microsoft Defender SmartScreen service, such as improved protection from
malicious sites that redirect when loading, and top-level frame blocking, which
completely replaces malicious sites with the Microsoft Defender SmartScreen
safety page. The top-level frame blocking prevents audio and other media from
the malicious site from playing which gives an easier and less confusing
experience.
In response to user feedback, users can now exempt certain cookies from
automatically clearing when the browser closes. This option is helpful if there's a
site that users don't want to be signed out of, but still want to have all the other
cookies cleared when the browser closes. To use this feature, go to
edge://settings/clearBrowsingDataOnClose and enable the "Cookies and other site
data" toggle.
Automatic Profile Switching is now available to help you get to your work content
more easily across profiles. If you use multiple profiles at work, you can check it
out by navigating to a site requiring authentication from your work or school
account while on your personal profile. When we detect a change, you will receive
a prompt to switch to your work profile to access that site without having to
authenticate to it. When you choose the work profile you want to switch to, the
website will open in your work profile. This profile switching capability will help you
keep your work and personal data separate and help you get to your work content
more effortlessly. If you don't want the feature to prompt you to switch profiles,
you can choose the don't ask me again option and it will get out of your way.
Extension sync is now available. You can now sync your extensions across all your
devices! Extensions from both the Microsoft and Chrome Stores will sync with
Microsoft Edge. To use this feature: Click the ellipses (…) on the menu bar, select
Settings. Under Your profile, click Sync to see the Sync options. Under
Profiles/Sync use the toggle to enable Extensions. You can use the
SyncTypesListDisabled group policy to disable syncing of extensions.
Link doctor provides host correction and a search query to the users when they
mistype a URL. For example:
A user mistypes "powerbi as "powerbbi".com. Link doctor will suggest
"powerbi".com as a correction and create a link to search for "powerbbi" in case
the user is looking for something different.
Allow users to save their decision to launch an external protocol for a specific site.
Users can configure the ExternalProtocolDialogShowAlwaysOpenCheckbox policy
to enable or disable this feature.
Users can set Microsoft Edge as their default browser directly from Microsoft Edge
Settings. This capability makes it easier for users to change their default browser,
within the context of the browser itself, instead of having to search through the
operating system settings. To use this feature, go to edge://settings/defaultBrowser
and click Make default.
New policies
15 new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
Deprecated policy
The following policy will continue to work in this release. It will become "obsolete" in a
future release.
Feature updates
Collections is now available. You can get started by clicking the Collections icon
next to the address bar. This action opens the Collections pane where you can
create, edit, and view Collections. We designed Collections based on what you do
on the web. If you're a shopper, a traveler, a teacher, or a student, Collections can
help. Learn more .
Allow the removal (Hide from toolbar) of the Collections button from the Microsoft
Edge toolbar for consistency.
Added a message to inform users that Internet Explorer isn't installed when they
navigate to a page that is configured to open in Internet Explorer mode.
Updated the 3D View tool in Microsoft Edge DevTools with a new feature to help
debug z-index stacking context. 3D View shows a representation of the DOM
(Document Object Model) depth using color and stacking, and the z-Index view
helps you isolate the different stacking contexts of your page. Learn more .
Localized the F12 Dev tools in 10 new languages, so they will match the language
used in the rest of the browser. Learn more .
Microsoft Edge can now identify and remove duplicate favorites and merge folders
with the same name. To access the tool, click the star on the browser's toolbar and
select "Remove duplicate favorites". You will be able to confirm changes and any
updates to your favorites will be synced across devices.
Open external links in the correct browser profile. Select a default profile for links
opened for external apps to open in from edge://settings/multiProfileSettings.
Added a warning to alert users who sign into a browser profile with an account
after being previously signed in with another account. This will help prevent
unintentional data merging.
If you have payment cards saved in your Microsoft account, you can use them in
Microsoft Edge while filling out payment forms. The cards in your Microsoft
account will sync across desktop devices and the full details will be shared with the
website after two-factor authentication (CVC code and your Microsoft identity.) For
further convenience, you can choose to securely save a copy of the card on the
device during authentication.
Line Focus is designed for users who like to focus on a limited part of the content
as they read. It lets users keep the focus on 1, 3 or 5 lines at a time and dims out
the rest of the page to let users read without distraction. Users can scroll using
touch or arrow keys and the focus shifts accordingly.
Microsoft Edge is now integrated with Windows Speller on Windows platforms 8.1
and above. This integration provides greater language support, with access to
more language dictionaries and the ability to use Windows custom dictionaries.
There is no further action needed from the users when a language has been added
in the OS language settings and a language spellcheck toggle is enabled in
Microsoft Edge settings.
When PDF documents are opened using Microsoft Edge, users will now be able to
create highlights, change color, and delete highlights. This helps in referencing
important parts of the document later, and for collaboration.
When loading long PDF documents that have been optimized for web, the pages
being viewed by the user will be loaded faster, parallelly, while the rest of the
document is loading.
Now it's easier to start the Immersive Reader for a website by just pressing the F9
key.
Now it's easier to start Read Aloud by using a keyboard shortcut (Ctrl + Shift + U).
Policy updates
New policies
12 new policies were added. Download the updated Administrative Templates from the
Microsoft Edge Enterprise landing page . The following new policies were added.
AmbientAuthenticationInPrivateModesEnabled - Enable Ambient Authentication
for InPrivate and Guest profiles.
AudioSandboxEnabled - Allow the audio sandbox to run.
ForceLegacyDefaultReferrerPolicy - Use a default referrer policy of no-referrer-
when-downgrade.
GloballyScopeHTTPAuthCacheEnabled - Enable globally scoped HTTP auth cache.
ImportExtensions - Allow importing of extensions.
ImportCookies - Allow importing of Cookies.
ImportShortcuts - Allow importing of shortcuts.
InternetExplorerIntegrationSiteRedirect - Specify how "in-page" navigations to
unconfigured sites behave when started from Internet Explorer mode pages.
OmniboxMSBProviderEnabled - Enable Microsoft Search for Business provider in
omnibox.
StricterMixedContentTreatmentEnabled - Enable stricter treatment for mixed
content.
TLS13HardeningForLocalAnchorsEnabled - Enable a TLS 1.3 security feature for
local trust anchors.
ConfigureOnPremisesAccountAutoSignIn - Configure automatic sign in with an
Active Directory domain account when there is no Azure AD domain account.
Deprecated policies
The following policies continue to work in this release. They will become "obsolete" in a
future release.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge release schedule
Article • 08/25/2023
This article describes the release cadence and anticipated release schedule for Microsoft
Edge.
Release cadence
Microsoft provides four options, called channels, to manage how often Microsoft Edge
is updated with new features. For more information about our channels, their release
cycle, and support levels, see the Channel overview.
Starting with Stable channel version 94, Microsoft Edge is moving to a 4-week major
release cycle cadence. However, we recognize that enterprise customers who manage
complex environments need more time to plan and test Microsoft Edge updates. To help
our enterprise customers who need an extended timeline to manage updates, Microsoft
Edge will offer an Extended Stable option aligned to a longer, 8-week major release
cycle. This option will only be available for customers with managed environments. For
more information, see How to opt-in to the Extended Stable release cycle option
beginning with Microsoft Edge 94
Release schedule
The following table lists the planned and actual release dates for major releases in the
Beta, Stable, and Extended Stable channels.
7 Note
Release dates are approximate and might vary based on build status.
Release process
The trigger for Beta and Stable major releases is an equivalent Chromium release.
Progressive rollouts
The date reference (Released/Release week) for the Stable channel references the
beginning of the progressive rollout.
We use a progressive rollout model, which means that new release availability for any
given device could be staggered over upcoming days. For more information, see
Progressive rollouts for Microsoft Edge Stable Channel.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge channels
Channel downloads
Release notes for Microsoft Edge
Security Updates
Article • 08/31/2023
These release notes provide information about security fixes that are included in
updates to Microsoft Edge Stable channel.
CVE-2023-36741
CVE-2023-38158
CVE-2023-36787
August 7, 2023
Microsoft has released the latest Microsoft Edge Stable Channel (Version
115.0.1901.200) and Microsoft Edge Extended Stable Channel (Version 114.0.1823.106),
which incorporate the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2023-38157
CVE-2023-38187
CVE-2023-38173
CVE-2023-35392
CVE-2023-36883
CVE-2023-36887
CVE-2023-36888
CVE-2023-33145
June 6, 2023
Microsoft has a fix for CVE-2023-3079 to Microsoft Edge Stable Channel (Version
114.0.1823.41), which has been reported by the Chromium team as having an exploit in
the wild. For more information, see the Security Update Guide .
7 Note
It's worth highlighting that Microsoft Edge's enhanced security mode feature
mitigates this vulnerability. You can opt-in into this security feature and have peace
of mind that Microsoft Edge is protecting you against this exploit.
June 2, 2023
Microsoft has released the latest Microsoft Edge Extended Stable Channel (Version
114.0.1823.37) which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2023-29345
CVE-2023-33143
Microsoft has released the latest Microsoft Edge Extended Stable Channel (Version
Version 112.0.1722.84) which incorporates the latest Security Updates of the Chromium
project. For more information, see the Security Update Guide .
May 5, 2023
Microsoft has released the latest Microsoft Edge Stable Channel (Version 113.0.1774.35)
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2023-29350
CVE-2023-29354
May 4, 2023
Microsoft has released the latest Microsoft Edge Extended Stable Channel (Version
112.0.1722.71) which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2023-29350
CVE-2023-29354
CVE-2023-29334
7 Note
This fix (CVE-2023-2136) only impacted the Linux, macOS, and Android operating
systems.
CVE-2023-29334
7 Note
It's worth highlighting that Microsoft Edge's enhanced security mode feature
mitigates this vulnerability. You can opt-in into this security feature and have peace
of mind that Microsoft Edge is protecting you against this exploit.
April 6, 2023
Microsoft has released the latest Microsoft Edge Stable Channel (Version 112.0.1722.34)
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2023-28284
CVE-2023-24935
CVE-2023-28301
CVE-2023-28286
CVE-2023-28261
Microsoft has released the latest Microsoft Edge Extended Stable Channel (Version
110.0.1587.78) which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2023-28286
CVE-2023-28261
February 9, 2023
Microsoft has released the latest Microsoft Edge Stable Channel (Version 110.0.1587.41)
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2023-21794
CVE-2023-23374
February 2, 2023
Microsoft has released the latest Microsoft Edge Stable Channel (Version 109.0.1518.78)
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2023-21720
CVE-2023-21719
CVE-2023-21795
CVE-2023-21775
CVE-2023-21796
December 5, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
108.0.1462.42). This update contains a fix for CVE-2022-4262 , which has been
reported by the Chromium team as having an exploit in the wild. For more information,
see the Security Update Guide .
CVE-2022-41115
CVE-2022-44688
CVE-2022-44708
Microsoft has also updated Microsoft Edge Extended Stable Channel (Version
106.0.1370.61), which contains the fix to CVE-2022-3723.
7 Note
It's worth highlighting that Microsoft Edge's enhanced security mode feature
mitigates this vulnerability. You can opt-in into this security feature and have peace
of mind that Microsoft Edge is protecting you against this exploit.
October 3, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
106.0.1370.34), which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2022-41035
September 2, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
105.0.1343.27). This update contains a fix for CVE-2022-3075 , which has been
reported by the Chromium team as having an exploit in the wild. For more information,
see the Security Update Guide .
Microsoft has also updated Microsoft Edge Extended Stable Channel (104.0.1293.81),
which contains the fix to CVE-2022-3075.
September 1, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
105.0.1343.25), which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide
CVE-2022-38012
August 5, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
104.0.1293.47). For more information, see the Security Update Guide .
CVE-2022-33636
CVE-2022-33649
CVE-2022-35796
July 6, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
103.0.1264.49), which incorporates the latest Security Updates of the Chromium project.
This update contains a fix for CVE-2022-2294 , that has been reported by the
Chromium team as having an exploit in the wild. For more information, see the Security
Update Guide .
CVE-2022-33680
CVE-2022-30192
CVE-2022-33638
CVE-2022-33639
June 9, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
102.0.1245.39), which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2022-22021
May 31, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
102.0.1245.30), which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2022-30128
CVE-2022-30127
CVE-2022-26905
CVE-2022-29146
CVE-2022-29147
CVE-2022-29144
April 7, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
100.0.1185.36), which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
April 1, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version
100.0.1185.29), which incorporates the latest Security Updates of the Chromium project.
For more information, see the Security Update Guide .
CVE-2022-24523
CVE-2022-24475
CVE-2022-26891
CVE-2022-26895
CVE-2022-26894
CVE-2022-26900
CVE-2022-26908
CVE-2022-26909
CVE-2022-26912
CVE-2022-26899
March 3, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version 99.0.1150.30),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2022-23264
February 3, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version 98.0.1108.43),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2022-23261
CVE-2022-23262
CVE-2022-23263
January 6, 2022
Microsoft has released the latest Microsoft Edge Stable Channel (Version 97.0.1072.55),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2022-21954
CVE-2022-21929
CVE-2022-21930
CVE-2022-21931
CVE-2022-21970
CVE-2021-43220
CVE-2021-42308
CVE-2021-43221
October 29, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 95.0.1020.40),
which incorporates the latest Security Updates of the Chromium project. This update
contains a fix for CVE-2021-38000 and CVE-2021-38003 which have been reported
by the Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
October 1, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 94.0.992.38),
which incorporates the latest Security Updates of the Chromium project. This update
contains a fix for CVE-2021-37975 and CVE-2021-37976 which have been reported
by the Chromium team as having an exploit in the wild. For more information, see the
Security Update Guide .
September 9, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 93.0.961.44)
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide
CVE-2021-38669
September 2, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 93.0.961.38),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide
CVE-2021-36930
CVE-2021-26436
CVE-2021-26439
CVE-2021-38641
CVE-2021-38642
CVE-2021-36928
CVE-2021-36929
CVE-2021-36931
CVE-2021-34506
CVE-2021-34475
CVE-2021-33741
CVE-2021-31982
CVE-2021-31937
April 1, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 89.0.774.68 ),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
March 4, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 89.0.774.45),
which incorporates the latest Security Updates of the Chromium project. This update
contains a fix for CVE-2021-21166 which has been reported by the Chromium team as
having an exploit in the wild. For more information, see the Security Update Guide .
February 5, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 88.0.705.63),
which incorporates the latest Security Updates of the Chromium project. This update
contains a fix for CVE-2021-21148 which has been reported by the Chromium team as
having an exploit in the wild. For more information, see the Security Update Guide .
February 4, 2021
Microsoft has released the latest Microsoft Edge Stable Channel (Version 88.0.705.62),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2021-24113
December 7, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 87.0.664.57),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
November 4, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 86.0.622.63),
which incorporates the latest Security Updates of the Chromium project. This update
contains a fix for CVE-2020-16009 , that has been reported by the Chromium team as
having an exploit in the wild. For more information, see the Security Update Guide .
October 22, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 86.0.622.51),
which incorporates the latest Security Updates of the Chromium project. This update
contains a fix for CVE-2020-15999 , that has been reported by the Chromium team as
having an exploit in the wild. For more information, see the Security Update Guide .
October 9, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 86.0.622.38),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
September 9, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 85.0.564.51),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2020-1341
June 4, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 83.0.478.45),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
CVE-2020-1195
May 7, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 81.0.416.72),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
April 1, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 80.0.361.109),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
March 4, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 80.0.361.66),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
February 7, 2020
Microsoft has released the latest Microsoft Edge Stable Channel (Version 80.0.361.48),
which incorporates the latest Security Updates of the Chromium project. For more
information, see the Security Update Guide .
See also
Microsoft Edge Enterprise landing page
Microsoft Edge supported Operating
Systems
Article • 08/29/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes the supported operating systems that apply to Microsoft Edge.
7 Note
This article applies to the Microsoft Edge versions 77 and higher for the desktop.
7 Note
Product functionality and feature availability may vary on older operating systems.
To ensure that Microsoft Edge installs correctly, use the latest version of any
operating system specified below. This guidance includes the latest cumulative
update, as applicable.
Microsoft Edge follows the Modern Lifecycle Policy and is supported on the following
operating systems.
Windows Client
Windows 7
With Windows 7 Extended Security Update (ESU) end of support on January
10th, 2023, Microsoft Edge version 109 will be the last browser version to
support this operating system. Microsoft Edge version 109 is scheduled for
release the week of January 12th, 2023 (to learn more, see our release schedule).
Windows 8.1
With Windows 8/8.1 end of support on January 10th, 2023, Microsoft Edge
version 109 will be the last browser version to support this operating system.
Microsoft Edge version 109 is scheduled for release the week of January 12th,
2023 (to learn more, see our release schedule).
Windows 11
Windows Server
Windows Server 2008 R2
Microsoft Edge version 109 will be the last browser version to support this
operating system. Microsoft Edge version 109 is scheduled for release the week
of January 12th, 2023 (to learn more, see our release schedule).
Windows Server 2012 and Windows Server 2012 R2
Microsoft Edge version 109 will be the last version supported on Windows
Server 2012 and Windows 2012 R2. Microsoft Edge version 109 will receive
critical security fixes and fixes for known exploit bugs until October 10, 2023, on
these platforms.
Windows Server 2016 (LTSC)
Windows Server 2019 (LTSC)
Windows Server 2022 (LTSC)
Windows Server (SAC)
) Important
** For Windows 10 SAC releases that are out of support but Microsoft Edge is
supported it is recommended to upgrade to a supported Win10 SAC release as
soon as possible to remain secure. Microsoft Edge being supported in this state
should be considered a temporary bridge to getting to a supported OS state.
**** The Microsoft Edge OPK is available on MOO for IoT OEMs to preinstall and
distribute as part of their Windows 10 IoT Enterprise based solution.
macOS
High Sierra (10.13) and later
iOS
Microsoft Edge for iPad® and iPhone® requires iOS 14.0 or later. Microsoft Edge for
iPad Pro™ requires iOS 14.0 or later. Microsoft Edge is supported on the two most
recent versions of iOS. When a new version of iOS is released, the Microsoft Edge
Operating System requirement becomes the then-current two most recent major
versions: the new version of iOS and the previous version.
Android
Microsoft Edge for Android can be installed on tablets and phones that meet the
following criteria: devices running Android KitKat 4.4 or later with an ARM-based
processor.
Linux
Microsoft Edge is supported on Linux.
Chromebooks
Microsoft Edge does not support Chromebooks.
Recent changes
12/17/2020 - Microsoft Edge support on Windows 7 and Windows Server 2008 R2
extended to January 15, 2022.
01/28/2021 - Microsoft Edge support for Apple Silicon Macs.
11/05/2021 - Microsoft Edge support on Windows 7 and Windows Server 2008 R2
extended through January 15, 2023 for critical security and stability updates.
See also
Microsoft Edge Enterprise landing page
Microsoft Modern Lifecycle Policy
Extended Security Updates for Windows 7
Microsoft Edge Lifecycle Policy
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes the lifecycle policy that applies to Microsoft Edge.
7 Note
7 Note
Starting with Stable channel version 94, Microsoft Edge moved to a 4-week major
release cycle cadence. However, we recognize that enterprise customers who
manage complex environments need more time to plan and test Microsoft Edge
updates. To help our enterprise customers who need an extended timeline to
manage updates, Microsoft Edge offers an Extended Stable option aligned to a
longer, 8-week major release cycle. This release option is only available for
customers with managed environments. Refer to our announcement blog post
We recognize that enterprise customers who manage complex environments need more
time to plan and test Microsoft Edge updates. To help our enterprise customers who
need an extended timeline to manage updates, Microsoft Edge offers an Extended
Stable option aligned to a longer, 8-week major release cycle. Assisted Support is
available for the most recent two Extended Stable channel releases. The effective
assisted support duration for an Extended Stable channel release is approximately 16
weeks. The following table summarizes the support options for different Microsoft Edge
releases.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge documentation
Microsoft Modern Lifecycle Policy
Microsoft Edge Supported Operating Systems
Microsoft Edge language support
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article shows how you can use Microsoft Edge settings to add a supported
language to the browser. Microsoft Edge supports 84 display languages on Windows
and 81 display languages on macOS.
7 Note
1. On the browser menu bar, click the Settings and more icon (...) or type Alt + F to
open the "Settings and more" menu.
2. Under Settings, click Languages.
3. Under Languages, click Add languages to see the list of languages you can add.
4. In the Add languages list, you can search for a language (Search languages) or
use the scroll bar to find the language you want to add.
5. When you find the language, select the checkbox for the language, and then click
Add. The language you added appears at the bottom of the list of Preferred
languages that are already set for Microsoft Edge. Websites you visit appear in the
first language in the list that they support.
7 Note
You can also set up spellcheck options (Check Spelling) based on your preferred
language settings.
7 Note
If the translator extension doesn't work after installation, restart Microsoft Edge. If
the extension still doesn't work, provide feedback through the Feedback Hub.
7 Note
Albanian Albania sq
Amharic Ethiopia am
Assamese India as
Basque Basque eu
Bulgarian Bulgaria bg
Catalan Catalan ca
Croatian Croatia hr
Danish Denmark da
Dutch Netherlands nl
United States en
Estonian Estonia et
Finnish Finland fi
France fr
Galician Galician gl
Georgian Georgia ka
Language Country/region Code
German Germany de
Greek Greece el
Gujarati India gu
Hebrew Israel he
Hindi India hi
Hungarian Hungary hu
Icelandic Iceland is
Indonesian Indonesia id
Irish Ireland ga
Italian Italy it
Japanese Japan ja
Kannada India kn
Kazakh Kazakhstan kk
Khmer Cambodia km
Korean Korea ko
Latvian Latvia lv
Lithuanian Lithuania lt
Luxembourgish Luxembourg lb
Malay Malaysia ms
Malayalam India ml
Maltese Malta mt
Marathi India mr
Language Country/region Code
Nepali Nepal ne
Norway, Nynorsk nn
Odia India or
Persian Iran fa
Polish Poland pl
Portugal pt-PT
Punjabi India pa
Romanian Romania ro
Russian Russia ru
Slovak Slovakia sk
Slovenian Slovenia sl
Swedish Sweden sv
Tamil India ta
Tatar Russia tt
Telugu India te
Thai Thailand th
Turkish Türkiye tr
Language Country/region Code
Ukrainian Ukraine uk
Uyghur PRC ug
Vietnamese Vietnam vi
See also
Microsoft Edge documentation
Microsoft Edge Enterprise landing page
Windows updates to support the next
version of Microsoft Edge
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Windows will be updated to support the next version of
Microsoft Edge
) Important
Refer to the Microsoft Edge product team blog post about Microsoft Edge
Legacy end of service.
7 Note
When all the updates are applied AND the Stable channel of the next version of
Microsoft Edge is installed at the system-level, the following changes will take effect on
the system:
All start menu pins, tiles, and shortcuts for the current version of Microsoft Edge
will migrate to the next version of Microsoft Edge.
All taskbar pins and shortcuts for the current version of Microsoft Edge will migrate
to the next version of Microsoft Edge.
The next version of Microsoft Edge will be pinned to the taskbar. If the current
version of Microsoft Edge is already pinned, it will be replaced.
The next version of Microsoft Edge will add a shortcut to the desktop. If the
current version of Microsoft Edge already has a shortcut, it will be replaced.
Most protocols that Microsoft Edge handles by default will be migrated to the next
version of Microsoft Edge.
Current Microsoft Edge will be hidden from all UX surfaces in the OS, including
settings, all apps, and any file or protocol support dialogs.
All attempts to launch the current version of Microsoft Edge will redirect to the
next version of Microsoft Edge.
7 Note
Along with the previous changes, there are changes that will happen regardless of
whether the Stable channel of the next version of Microsoft Edge is installed.
Microsoft Edge will de-register for the books and XML protocols that the next
version of Microsoft Edge doesn't support. Users attempting to open these
protocols will get a dialog that prompts them to choose a default app. Visit the
Microsoft Store to see our recommendations for ebook readers.
7 Note
For Windows 10 RS4-20H1, deploy a Windows LCU from May 2021 or newer to get
Microsoft Edge. For more information, see Windows 10 update history
) Important
If you need updates not listed here, please run Windows Update or contact your
administrator.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge documentation
Deploy Microsoft Edge with Windows 10
updates
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
The article provides information for users who are deploying Microsoft Edge by using
Windows 10 updates.
8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=True"
If using Windows Autopilot, it's possible to wrap this script as an .intunewin file using
the Microsoft Win32 content prep tool. It can then be set as a required app for the
Enrollment Status Page (ESP) if desired.
7 Note
If you currently leverage policies such as Target Channel override or Target Version
override to remain on an older version of Microsoft Edge, be aware that the above
script will not take any policies into account, and will simply update to the latest
version. By default, Microsoft Edge does not downgrade itself, including once such
policies are later received.
See also
Microsoft Edge Enterprise landing page
Plan your deployment of Microsoft Edge
Microsoft Edge Management
Article • 10/04/2022
The all-new Microsoft Edge is ready for business. You can deploy Microsoft Edge,
version 77 and later to your users. A PowerShell script is used to install the Microsoft
Edge build selected. The script also turns off automatic updates for Microsoft Edge so
they can be managed with Configuration Manager.
The Microsoft Edge installer, Attack Surface Reduction rules engine for tenant
attach, and CMPivot are currently signed with the Microsoft Code Signing PCA
2011 certificate. If you set PowerShell execution policy to AllSigned, then you need
to make sure that devices trust this signing certificate. You can export the
certificate from a computer where you've installed the Configuration Manager
console. View the certificate on "C:\Program Files (x86)\Microsoft Endpoint
Manager\AdminConsole\bin\CMPivot.exe" , and then export the code signing
certificate from the certification path. Then import it to the machine's Trusted
Publishers store on managed devices. You can use the process in the following
blog, but make sure to export the code signing certificate from the certification
path: Adding a Certificate to Trusted Publishers using Intune .
The device running the Configuration Manager console needs access to the following
endpoints for deploying Microsoft Edge:
Location Use
Location Use
Create a deployment
Create a Microsoft Edge application using the built-in application experience, which
makes Microsoft Edge easier to manage:
1. In the console, under Software Library, there's a new node called Microsoft Edge
Management.
2. Select Create Microsoft Edge Application from either the ribbon, or by right-
clicking on the Microsoft Edge Management node.
3. On the Application Settings page of the wizard, specify a name, description, and
location for the content for the app. Ensure the content location folder you specify
is empty.
5. On the Deployment page, decide if you want to deploy the application. If you
select Yes, you can specify your deployment settings for the application. For more
information about deployment settings, see Deploy applications.
6. In Software Center on the client device, the user can see and install the
application.
Log files for deployment
Site server SMSProv.log Shows details if the creation of the app or deployment fails.
1. To get updates for Microsoft Edge, ensure you have the Updates classification and
the Microsoft Edge product selected for synchronization.
2. In the Software Library workspace, expand Microsoft Edge Management and click
on the All Microsoft Edge Updates node.
3. If needed, click Synchronize Software Updates in the ribbon to start a
synchronization. For more information, see Synchronize software updates.
4. Manage and deploy Microsoft Edge updates like any other update, such as adding
them to your automatic deployment rule. Some of the common updates tasks you
can do from the All Microsoft Edge Updates node include:
Enable the following properties in the below hardware inventory classes for the
Microsoft Edge Management dashboard:
Tip
The Power BI sample reports for Configuration Manager includes a report called
Edge Status. This report can also help with monitoring Edge deployment.
Known issues
text
Mitigation: To work around this issue, disable the collection of the Browser Usage
(SMS_BrowerUsage) hardware inventory class.
Next steps
Monitor applications
Before you can deploy, configure, monitor, or protect apps, you must add them to
Intune. One of the available app types is Microsoft Edge version 77 and later. By
selecting this app type in Intune, you can assign and install Microsoft Edge version 77
and later to devices you manage that run Windows 10.
) Important
This app type offers stable, beta, and dev channels for Windows 10. The
deployment is in English (EN) only, however end users can change the display
language in the browser under Settings > Languages. Microsoft Edge is a Win32
app installed in system context and on like architectures (x86 app on x86 OS, and
x64 app on x64 OS). Intune will detect any preexisting Microsoft Edge installations.
If it is installed in user context, a system installation will overwrite it. If it is installed
in system context, installation success is reported. In addition, automatic updates of
Microsoft Edge are On by default.
7 Note
You cannot use the built-in application deployment of Microsoft Edge for
workplace join computers. Built-in application deployment requires the Intune
management extension, which only exists for AAD joined devices. You can still
deploy Microsoft Edge version 77 and later using an .msi uploaded to Apps, see
Add a Windows line-of-business app to Microsoft Intune.
Prerequisites
Windows 10 version 1709 or later.
Any pre-installed versions of Microsoft Edge version 77 and later for all channels in
user context will be overwritten with Edge installed in system context.
Name: Enter the name of the app as it will be displayed in the company
portal. Make sure that all names are unique. If the same app name exists
twice, only one of the apps is displayed to users in the company portal.
Description: Enter a description for the app. For example, you could list the
targeted users in the description.
Publisher: Microsoft appears as the publisher.
Category: Optionally, select one or more of the built-in app categories or a
category that you created. This setting makes it easier for users to find the
app when they browse the company portal.
Display this as a featured app in the Company Portal: Select this option to
display the app prominently on the main page of the company portal when
users browse for apps.
Information URL: Optionally, enter the URL of a website that contains
information about this app. The URL is displayed to users in the company
portal.
Privacy URL: Optionally, enter the URL of a website that contains privacy
information for this app. The URL is displayed to users in the company portal.
Developer: Microsoft appears as the developer.
Owner: Microsoft appears as the owner.
Notes: Optionally, enter any notes that you want to associate with this app.
3. Select OK.
2. In the App settings pane, select either Stable, Beta or Dev from the Channel list to
determine which Edge Channel you will deploy the app from. For more
information, see Microsoft Edge release schedule.
7 Note
The Microsoft Edge browser logo is displayed with the app when users
browse the company portal.
3. Select OK.
7 Note
Currently, if you unassign the deployment of Microsoft Edge, it will remain on the
device.
2. Select Apps > All apps > Microsoft Edge app > Assignments > Add group.
7 Note
The app is uninstalled from devices in the selected groups if Intune has
previously installed the application onto the device via an Available for
enrolled devices or Required assignment using the same deployment.
4. Select Included Groups to select the groups of users that are affected by this app
assignment.
5. Select the groups that you want to apply the uninstall assignment.
8. If you want to exclude any groups of users from being affected by this app
assignment, select Exclude Groups.
9. If you have chosen to exclude any groups, in Select groups, select Select.
) Important
To uninstall the app successfully, make sure to remove the members or group
assignment for install before assigning them to be uninstalled. If a group is
assigned to both install an app and uninstall an app, the app will remain and not be
removed.
Troubleshooting
Microsoft Edge version 77 and later for Windows 10:
Intune uses the Intune management extension to download and deploy the Microsoft
Edge installer to assigned Windows 10 devices, then communicates the deployment
settings to the Microsoft Edge installer, which downloads and installs the Microsoft Edge
browser directly from the CDN. Reference the prerequisites for the Intune management
extension, and the best practices outlined in accessing Azure Update Service and the
CDN to ensure that your network configuration permits Windows 10 devices to access
these locations. In addition, to allow access to installation files from a CDN to install the
browser, you need to allow access to Windows Update endpoints. For more information,
see Manage connection endpoints for Windows 10, version 1809 – Windows Update
and Network endpoints for Microsoft Intune.
Next steps
Assign apps to groups
Deploy to macOS with Jamf
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how to deploy Microsoft Edge for macOS using Jamf.
7 Note
Prerequisites
Before you deploy Microsoft Edge, make sure you meet the following prerequisites:
5. On the New Package page, enter the details about the package and then click
Save. (For example, DISPLAY NAME, INFO, or NOTES.)
6. Select Computers on the menu bar, and then select Policies in the navigation bar.
Under DISPLAY NAME, enter the display name for the policy.
Under Trigger, select the event that will trigger the policy. (In the following
example, the event is Startup.)
9. On the Options tab, click Packages.
12. On the New Policy page, uUse the drop-down lists to select the DISTRIBUTION
POINT and ACTION to take for the policy. Click Save. The following screenshot
uses "Each computer's default distribution point" and "Install" as an example.
13. On the New Policy page, select the Scope tab. You can manage the scope of the
deployment based on computers or users. For this example, select All Computers
from the TARGET COMPUTERS drop-down list and then click Save.
14. At this point you can review the Microsoft Edge deployment policy. If the
deployment options meet your requirements, click Done.
7 Note
Congratulations! You've just finished configuring Jamf to deploy Microsoft Edge for
macOS. When the trigger condition you defined is true, the package will get deployed
to the computers you specified.
See also
Microsoft Edge Enterprise landing page
Jamf.com
Integrate Jamf with Microsoft Intune
Add Microsoft Edge to macOS devices
using Microsoft Intune
Article • 05/01/2023
Before you can deploy, configure, monitor, or protect apps, you must add them to
Intune. One of the available app types is Microsoft Edge version 77 and later. By
selecting this app type in Intune, you can assign and install Microsoft Edge version 77
and later to devices you manage that run macOS. This app type makes it easy for you to
assign Microsoft Edge to macOS devices without requiring you to use the macOS app
wrapping tool. To help keep the apps more secure and up to date, the app comes with
Microsoft AutoUpdate (MAU).
) Important
This app type offers developer and beta channels for macOS. The deployment is in
English (EN) only, however end users can change the display language in the
browser under Settings > Languages.
7 Note
Prerequisites
The macOS device must be running macOS 10.14 or later before installing
Microsoft Edge.
Name: Enter the name of the app as it will be displayed in the company
portal. Make sure that all names are unique. If the same app name exists
twice, only one of the apps is displayed to users in the company portal.
Description: Enter a description for the app. For example, you could list the
targeted users in the description.
Publisher: Microsoft appears as the publisher.
Category: Optionally, select one or more of the built-in app categories or a
category that you created. This setting makes it easier for users to find the
app when they browse the company portal.
Display this as a featured app in the Company Portal: Select this option to
display the app prominently on the main page of the company portal when
users browse for apps.
Information URL: Optionally, enter the URL of a website that contains
information about this app. The URL is displayed to users in the company
portal.
Privacy URL: Optionally, enter the URL of a website that contains privacy
information for this app. The URL is displayed to users in the company portal.
Developer: Microsoft appears as the developer.
Owner: Microsoft appears as the owner.
Notes: Optionally, enter any notes that you want to associate with this app.
3. Select OK.
2. In the App settings pane, select either Stable, Beta or Dev from the Channel list to
determine which Edge Channel you will deploy the app from. For more
information, see Microsoft Edge release schedule.
Stable channel is the recommended channel for deploying broadly in
Enterprise environments. It updates every four weeks, each release
incorporating improvements from the Beta channel.
Beta channel is the most stable Microsoft Edge preview experience and the
best choice for a full pilot within your organization. With major updates every
four weeks, each release incorporates the learnings and improvements from
the Dev channel.
Dev channel is ready for enterprise feedback on Windows, Windows Server
and macOS. It updates every week and contains the latest improvements and
fixes.
7 Note
The Microsoft Edge browser logo is displayed with the app when users
browse the company portal.
3. Select OK.
The app you've created is displayed in the apps list, where you can assign it to the
groups that you select.
Next steps
To learn how to configure Microsoft Edge on macOS devices, see Configure
Microsoft Edge on macOS devices.
To learn about including and excluding app assignments from groups of users, see
Include and exclude app assignments.
Assign apps to groups
Configure Microsoft Edge policy
settings on Windows devices
Article • 07/20/2023
Use this article as guide to configure Microsoft Edge policy settings on Windows
devices. If you haven't set up Microsoft Edge, see the Microsoft Edge setup guide .
7 Note
7 Note
Windows devices that are joined to a Microsoft Active Directory (AD) domain
Windows 10 Pro or Enterprise instances enrolled for device management in
Microsoft Intune
To configure Microsoft Edge with group policy objects, install administrative templates
that add rules and settings for Microsoft Edge to the group policy Central Store in your
Active Directory domain. Alternatively, add these rules and settings to the Policy
Definition template folder on individual computers and then configure the specific
policies you want to set.
You can use Active Directory group policy to configure Microsoft Edge policy settings if
you prefer to manage policy at the domain level. This approach lets you manage policy
settings globally. You can target different policy settings to specific OUs, or use WMI
filters to apply settings only to users or computers returned by a particular query. To
configure policies on individual computers, you can use Local Group Policy Editor on the
target computer. This approach lets you apply policy settings that only affect the local
device.
Tip
You can use Microsoft Intune to configure Microsoft Edge policy settings. For more
information, see Configure Microsoft Edge using Microsoft Intune.
There are two administrative templates for Microsoft Edge, both can be applied with
common group policy management tools such as Local Group Policy Editor for
application on an individual computer or the Group Policy Management Console for
Microsoft Windows domain networks. These templates are:
The following steps describe how to install, configure, and test the Microsoft Edge
templates.
When you add the administrative template files to the appropriate location, Microsoft
Edge policy settings are immediately available in the Group Policy Editor.
Go to the Microsoft Edge Enterprise landing page to download the Microsoft Edge
policy templates file and extract the contents.
4. In the admx folder, open the appropriate language folder. For example, if you're in
the U.S., open the en-US folder.
5. Copy the msedge.adml file to the matching language folder in the PolicyDefinition
folder. Create the folder if it doesn't already exist. (Example:
%systemroot%\sysvol\domain\policies\PolicyDefinitions\EN-US)
6. If your domain has more than one domain controller, the new ADMX files will be
replicated to them at the next domain replication interval.
7. To confirm the files loaded correctly, open the Group Policy Management Editor
from Windows Administrative Tools and expand Computer Configuration >
Policies > Administrative Templates > Microsoft Edge. You should see one or
more Microsoft Edge nodes as shown below.
PowerShell
gpupdate /force
You might need to close and reopen Microsoft Edge before the new policies appear.
You can also use REGEDIT.exe on a target computer to view the registry settings that
store group policy settings. These policy settings are located at this registry path:
HKLM\SOFTWARE\Policies\Microsoft\Edge.
See also
Microsoft Edge Enterprise landing page
Configure for Windows with Intune
Configure for macOS
Browse Microsoft Edge Enterprise Policies
Configure Microsoft Edge policy
settings in Microsoft Intune
Article • 02/22/2023
Using Administrative Templates in Microsoft Intune, you can create and manage
Microsoft Edge policy settings on your Windows client devices. Administrative
Templates use the ADMX templates for Microsoft Edge.
You can configure specific Microsoft Edge settings, such as adding download
restrictions, using autofill, showing the favorites bar, and more. These settings are
created in an Intune policy, and then deployed to Windows client devices in your
organization.
Windows 11
Windows 10
For Microsoft Edge version 45 and earlier, see Microsoft Edge Browser device
restrictions.
7 Note
Additional ADMX settings for Edge 96 and Edge updater have been added to
Administrative Templates. This includes support for "Target Channel override" which
allows customers to opt into the Extended Stable release cycle option at any
point using Group Policy or through Intune.
When you use Intune to manage and enforce policies, it's similar to using Active
Directory group policy, or configuring local Group Policy Object (GPO) settings on user
devices. But, Intune is 100% cloud.
This article shows you how to configure Microsoft Edge policy settings using
administrative templates in Microsoft Intune.
Tip
For information on adding the Microsoft Edge version 77+ app on Windows
client, see Add Edge app on Windows client devices.
For information on adding and configuring Microsoft Edge version 77+ app
on macOS, see Add Edge app, and Configure Edge app using plist.
For a list of the Microsoft Edge updates, including new policies, see the
Release notes for Microsoft Edge.
Prerequisites
Windows 11
4. Select Create.
Name: Enter a descriptive name for the profile. Name your profiles so you
can easily identify them later. For example, a good profile name is ADMX:
Configure Edge on Windows 10/11 devices.
Description: Enter a description for the profile. This setting is optional, but
recommended.
8. Select Computer Configuration > Microsoft Edge > Allow download restrictions.
The policy description and values are shown:
7 Note
See Microsoft Edge – Policies and Microsoft Edge – Update policies for the
list of the available settings.
9. Close the policy description. Use search to find a specific setting you want to
configure. For example, search for "home page":
10. Select Configure the home page URL > Enabled, and set its value to
https://www.bing.com :
11. Select OK. The State now shows Enabled:
12. Select Next. In Scope tags, select Next.
Scope tags are optional, and this example doesn't use them. To learn more about
scope tags, and what they do, see Use role-based access control (RBAC) and scope
tags for distributed IT.
Assignments are optional, and this example doesn't use them. In production, select
Add groups. Select an Azure Active Directory (Azure AD) group that includes users
or devices that should receive this policy. For information and guidance on
assigning policies, see Assign user and device profiles in Intune.
14. In Review + create, see the summary of your changes. Select Create.
When you create the profile, your policy is automatically assigned to the users or
groups you chose. If you didn't choose any users or groups, then your policy is
created, but it's not deployed.
Next steps
Microsoft Edge Enterprise landing page
Manage web access by using Microsoft Edge with Microsoft Intune
Use Windows 10/11 templates to configure group policy settings in Microsoft
Intune
Deploy Microsoft Edge using Microsoft Intune
Configure Microsoft Edge using Initial
Preferences settings for the first run
Article • 06/21/2022
Use the information in this article to configure Microsoft Edge Initial Preferences
settings on your Windows devices.
7 Note
When deployed, Initial Preferences act as the default browser settings on managed
devices. These preferences are the settings preferred by admins to be used as default
browser settings for the first run.
7 Note
Initial preferences can be changed by users and aren't available for some devices
because they aren't joined to an Active Directory® domain.
Preferences are only copied once from the initial_preferences file, changes made to this
file after configuration won't be respected. If a setting is managed by a Microsoft Edge
policy and configured in the initial_preferences file, the policy always takes precedence.
Preference settings
The following table shows the settings that are currently supported by Microsoft Edge.
Preferences Category Setting
Bookmark_bar show_apps_shortcut
show_managed_bookmarks
show_on_all_tabs
Bookmarks editing_enabled
browsing_history_basic"
cache
cache_basic
cookies
download_history
form_data
passwords
History browsing_history
cache
cookies
download_history
form_data
hosted_apps_data
passwords
site_settings
Browser first_run_tabs
dark_theme
show_toolbar_bookmarks_button
show_toolbar_collections_butto
show_toolbar_downloads_button
show_home_button
show_prompt_before_closing_tabs
show_toolbar_history_button
Fullscreen Allowed
homepage Homepage_url
homepage_is_newtabpage homepage_is_newtabpage
Session restore_on_startup
startup_urls
Channel Location
7 Note
macOS
Channel Location
See also
Policy download location
Per-site configuration by policy
Article • 05/02/2023
This article describes the per-site configurations by policy and how the browser handles
page loads from a site.
A user setting
The URL of the page for which the decision is made
In the Internet Explorer web platform, each of these decisions was called a URLAction.
For more information, see URL Action Flags. The URLAction, Enterprise Group Policy, and
user settings in the Internet Control Panel controlled how the browser would handle
each decision.
In Microsoft Edge, most per-site permissions are controlled by settings and policies
expressed using a simple syntax with limited wild-card support. Windows Security Zones
are still used for a few configuration decisions.
When making a page load decision, the browser maps the website to a Zone, then
consults the setting for the URLAction for that Zone to decide what to do. Reasonable
defaults like "Automatically satisfy authentication challenges from my Intranet" means
that most users never need to change any default settings.
Users can use the Internet Control Panel to assign specific sites to Zones and to
configure the permission results for each zone. In managed environments,
administrators can use Group Policy to assign specific sites to Zones (via "Site to Zone
Assignment List" policy) and specify the settings for URLActions on a per-zone basis.
Beyond manual administrative or user assignment of sites to Zones, other heuristics
could assign sites to the Local Intranet Zone. In particular, dotless host names (for
example, http://payroll ) were assigned to the Intranet Zone. If a Proxy Configuration
script was used, any sites configured to bypass the proxy would be mapped to the
Intranet Zone.
EdgeHTML, used in WebView1 controls and Microsoft Edge Legacy, inherited the Zones
architecture from its Internet Explorer predecessor with a few simplifying changes:
Windows' five built-in Zones were collapsed to three: Internet (Internet), Trusted
(Intranet+Trusted), and Local Computer. The Restricted Sites Zone was removed.
Zone to URLAction mappings were hardcoded into the browser, ignoring Group
Policies and settings in the Internet Control Panel.
various permissions. Users rarely use the Settings page directly, instead they make
choices while browsing and using various widgets and toggles in the page
info dropdown. This list appears when you select the lock icon in the address bar. You
can also use the various prompts or buttons at the right-edge of the address bar. The
next screenshot shows an example of page information.
Enterprises can use Group Policy to set up site lists for individual policies that control the
browser's behavior. To find these policies, open the Microsoft Edge Group Policy
documentation and search for "ForUrls" to find the policies that allow and block behavior
based on the loaded site's URL. Most of the relevant settings are listed in the Group
Policy for Content Settings section.
There are also many policies (whose names contain "Default") that control the default
behavior for a given setting.
Many of the settings are obscure (WebSerial, WebMIDI) and there's often no reason to
change a setting from the default.
File downloads
Evidence about the origins of a file download (also known as "Mark of the Web " is
recorded for files downloaded from the Internet Zone. Other applications, such as the
Windows Shell, and Microsoft Office may take this origin evidence into account when
deciding how to handle a file.
IE mode
IE mode can be configured to open all Intranet sites in IE mode. When using this
configuration, Microsoft Edge evaluates the Zone of a URL when deciding whether or
not it should open in IE mode. Beyond this initial decision, IE mode tabs
are really running Internet Explorer, and as a result they evaluate Zones settings for every
policy decision just as Internet Explorer did.
Summary
In most cases, Microsoft Edge settings can be left at their defaults. Administrators who
wish to change the defaults for all sites or specific sites can use the appropriate Group
Policies to specify Site Lists or default behaviors. In a handful of cases, such as credential
release, file download, and IE mode, admins will continue to control behavior by
configuring Windows Security Zones settings.
If you were forward-thinking enough to structure your intranet such that your host
names are of the following form, then you've implemented a best practice.
https://payroll.contoso-intranet.com
https://timecard.contoso-intranet.com
https://sharepoint.contoso-intranet.com
In the preceding scenario, you can configure each policy with a *.contoso-
intranet.com entry and your entire intranet will be opted in.
See also
Microsoft Edge documentation
Microsoft Edge Enterprise landing page
Configure Microsoft Edge using Mobile Device Management
Article • 11/17/2021
This article explains how to configure Microsoft Edge on Windows 10 using Mobile Device Management (MDM) with ADMX Ingestion. This
article also describes:
How to create Open Mobile Alliance Uniform Resource Identifier (OMA-URI) for Microsoft Edge policies.
How to configure Microsoft Edge in Intune using ADMX ingestion and custom OMA-URI.
7 Note
Prerequisites
Windows 10, with the following minimum system requirements:
Overview
You can configure Microsoft Edge on Windows 10 using MDM with your preferred Enterprise Mobility Management (EMM) or MDM
provider that supports ADMX Ingestion.
1. Ingesting the Microsoft Edge ADMX file into your EMM or MDM provider. See your provider for instructions on how to ingest an
ADMX file.
7 Note
For Microsoft Intune, see Configure Microsoft Edge in Intune using ADMX ingestion.
Before you get started, download the Microsoft Edge policy templates file (MicrosoftEdgePolicyTemplates.cab) from the Microsoft Edge
Enterprise landing page and extract the contents.
./Device/Vendor/MSFT/Policy/Config/<ADMXIngestName>~Policy~<ADMXNamespace>~<ADMXCategory>/<PolicyName>
Parameter Description
Parameter Description
<ADMXIngestName> Use "Edge" or what you defined when ingesting the administrative template. For example, if you used
"./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/MicrosoftEdge/Policy/EdgeAdmx", then use "MicrosoftEdge".
The <ADMXIngestionName> must match what was used when you ingested the ADMX file.
<ADMXNamespace> Either "microsoft_edge" or "microsoft_edge_recommended" depending on whether you're setting a mandatory or recommended
policy.
<ADMXCategory> The "parentCategory" of the policy is defined in the ADMX file. Omit the <ADMXCategory> if the policy isn't grouped (No
"parentCategory" defined).
<PolicyName> The policy name can be found in the Browser policy reference article.
For this example, assume the <ADMXIngestName> node was named “Edge" and you're setting a mandatory policy. The URI path would be:
./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~<ADMXCategory>/<PolicyName>
If the policy isn't in a group (for example, DiskCacheSize) remove " ~<ADMXCategory> ". Replace <PolicyName> with the name of the policy,
DiskCacheSize. The URI path would be:
./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/DiskCacheSize
/Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Extensions/ExtensionInstallForcelist
7 Note
For non-Boolean data types, the value always starts with <enabled/> .
To find the value name and decimal value for a new tab page, use the following steps:
The value always needs to start with the <enabled/> element followed by <data id="[listID]" value="[string 1];[string 2];[string
3]"/> .
7 Note
The "id=" attribute name isn't the policy name, even though in most cases it matches the policy name. It's the <list> node id attribute
value, which is found in the ADMX file.
To find the listID and define the value to block a URL, follow these steps:
To find the textID and define the value set the locale, follow these steps:
Dictionary data types are treated as large strings but normally need string escaping to get the value into the correct form.
For example, to set the ManagedFavorites policy the value would be:
XML
To look up the <ADMXCategory> , search for the policy you want to set. When searching append "_recommended" to the policy
name. For example, a search for "RegisteredProtocolHandlers_recommended” has the following result:
XML
<parentCategory ref="ContentSettings_recommended"/>
<supportedOn ref="SUPPORTED_WIN7_V77"/>
<elements>
</elements>
</policy>
Copy the value of the ref attribute from the <parentCategory> element. For "ContentSettings", copy
"ContentSettings_recommended" from <parentCategory ref=" ContentSettings_recommended"/> .
Replace <ADMXCategory> with the ref attribute value to construct the URI path in the URI path formula.
4. The <PolicyName> is the name of the policy with "_recommended" appended to it.
Policy OMA-URI
RegisteredProtocolHandlers ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~ContentSettings_recommended/RegisteredProtocolHandlers
PasswordManagerEnabled ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~PasswordManager_recommended/PasswordManagerEnabled_rec
PrintHeaderFooter ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~Printing_recommended/PrintHeaderFooter_recommended
SmartScreenEnabled ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~SmartScreen_recommended/SmartScreenEnabled_recommended
HomePageLocation ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~Startup_recommended/HomepageLocation_recommended
ShowHomeButton ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~Startup_recommended/ShowHomeButton_recommended
FavoritesBarEnabled ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~/FavoritesBarEnabled_recommended
OMA-URI examples
OMA-URI examples with their URI path, type, and an example value.
ShowHomeButton:
Field Value
OMA-URI ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Startup/ShowHomeButton
Type String
Value <enabled/>
DefaultSearchProviderEnabled:
Field Value
OMA-URI ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~DefaultSearchProvider/DefaultSearchProviderEnabled
Field Value
Type String
Value <disable/>
Field Value
OMA-URI ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/AutoImportAtFirstRun
Type String
DefaultImagesSetting:
Field Value
OMA-URI ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~ContentSettings/DefaultImagesSetting
Type String
DiskCacheSize:
Field Value
OMA-URI ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/DiskCacheSize
Type String
RestoreOnStartupURLS:
Field Value
OMA- ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Startup/RestoreOnStartupURLs
URI
Type String
ExtensionInstallForcelist:
Field Value
OMA- ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Extensions/ExtensionInstallForcelist
URI
Type String
Field Value
ProxyMode:
Field Value
OMA-URI ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~ProxyMode/ProxyMode
Type String
ManagedFavorites:
Field Value
OMA- ./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/ManagedFavorites
URI
Type String
Value <enabled/> <data id="ManagedFavorites" value="[{"toplevel_name": "My managed favorites folder"}, {"name":
"Microsoft", "url": "microsoft.com"}, {"name": "Bing", "url":
"bing.com"}, {"children": [{"name": "Microsoft Edge Insiders", "url":
"www.microsoftedgeinsider.com"}, {"name": "Microsoft Edge", "url":
"www.microsoft.com/windows/microsoft-edge"}], "name": "Microsoft Edge links"}]"/>
) Important
As a best practice, don’t use a custom OMA-URI profile and an Administration templates profile to configure the same Microsoft Edge
setting in Intune. If you deploy the same policy using both a custom OMA-URI and an Administrative template profile, but with
different values, users will get unpredictable results. We strongly recommend removing your OMA-URI profile before using an
Administration templates profile.
2 Warning
3. Select Intune from All Services, or search for Intune in the portal search box.
Name: Enter a descriptive name. For this example, "Microsoft Edge ADMX ingested configuration".
Description: Enter an optional description for the profile.
Platform: Select "Windows 10 and later"
Profile type: Select "Custom"
Name: Enter a descriptive name. For this example, use "Microsoft Edge ADMX ingestion".
Value: This input area appears after you select the Data type. Open the msedge.admx file from the Microsoft Edge policy
templates file you extracted in step 1. Copy ALL the text from the msedge.admx file and paste it in the Value text area shown in
the following screenshot.
Click OK.
10. On Create profile, click Create. The next screenshot shows information about the newly created profile.
7 Note
Before using the steps in this section you must complete the steps described in Ingest the Microsoft Edge ADMX file into Intune.
2. Select Intune from All Services, or search for Intune in the portal search box.
3. Go to Intune>Device configuration>Profiles.
4. Select the "Microsoft Edge ADMX ingested configuration" profile or the name you used for the profile.
5. To add Microsoft Edge policy settings, you have to open Custom OMA-URI Settings. Under Manage, click Properties, and then click
Settings.
6. On Custom OMA-URI Settings, click Add.
Name: Enter a descriptive name. We suggest using the policy name you want to configure. For this example, use
"ShowHomeButton".
OMA-URI: Enter the OMA-URI for the policy. Using the for "ShowHomeButton" policy as an example, use this string:
"./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Startup/ShowHomeButton"
Data type: Select the policy settings data type. For the "ShowHomeButton" policy, use "String"
Value: Enter the setting that you want to configure for the policy. For "ShowHomeButton" example, enter "<enabled/>". The
following screenshot shows the settings for configuring a policy.
Click OK.
9. On the "Microsoft Edge ADMX ingested configuration - Properties" profile (or the name you used), click Save.
After the profile is created and the properties set, you have to assign the profile in Microsoft Intune.
If a Microsoft Edge policy isn’t taking effect, try the following steps:
Open the edge://policy page on the target device (a device you assigned the profile to in Microsoft Intune) and search for the policy. If the
policy isn’t on the edge://policy page, try the following:
Check that the policy is in the registry and is correct. On the target device open the Windows 10 Registry Editor (Windows key + r,
enter “regedit” and then press Enter.) Check that the policy is correctly defined in the \Software\Policies\ Microsoft\Edge path. If you
don’t find the policy in the expected path, then the policy wasn’t pushed to the device correctly.
Check that the OMA-URI path is correct, and the value is a valid XML string. If either of these are incorrect the policy won’t be pushed
to the target device.
For more trouble shooting tips, see Set up Microsoft Intune and Sync devices.
See also
Microsoft Edge Enterprise landing page
Configure Microsoft Edge policy settings with Microsoft Intune
Mobile device management
Use custom settings for Windows 10 devices in Intune
Win32 and Desktop Bridge app policy configuration
Understanding ADMX-backed policies
Configure Microsoft Edge policy
settings for macOS using a property list
Article • 02/21/2023
This article describes how to configure Microsoft Edge on macOS using a property list
(.plist) file. You'll learn how to create this file and then deploy it to Microsoft Intune.
For more information, see About Information Property List Files (Apple's website) and
Custom payload settings .
7 Note
For a list of supported policies and their preference key names, see Microsoft Edge
browser policies reference. In the policy templates file, which can be downloaded from
the Microsoft Edge Enterprise landing page , there's a plist example
(itadminexample.plist) in the examples folder. This file contains all supported data types
that you can customize to define your policy settings.
After you create the contents of your plist, name the plist using the Microsoft Edge
preference domain, which is "com.microsoft.Edge". This name is case-sensitive and
shouldn't include the channel you're targeting because it applies to all Microsoft Edge
channels. The plist file name must be com.microsoft.Edge.plist.
) Important
Starting with build 78.0.249.2, all Microsoft Edge channels on macOS read from the
com.microsoft.Edge preference domain. All prior releases read from a channel
specific domain, such as com.microsoft.Edge.Dev for Dev channel.
The last step is to deploy your plist to your users' Mac devices using your preferred
MDM provider, such as Microsoft Intune. For instructions see Deploy your plist.
After converting the file verify that your policy data is correct and contains the settings,
you want for your configuration profile.
7 Note
Only key value pairs should be in the contents of the plist or xml file. Prior to
uploading your file into Intune remove all the <plist> and <dict> values, and xml
headers from your file. The file should only contain key value pairs.
See also
Microsoft Edge Enterprise landing page
Configure for macOS with Jamf
Configure for Windows
Configure for Windows with Intune
Configure Microsoft Edge policy
settings on macOS with Jamf
Article • 06/29/2021
This article describes how to configure policy settings on macOS using a Microsoft Edge
policy manifest file on Jamf Pro 10.19.
You can also configure Microsoft Edge policy settings on macOS by using a property list
(.plist) file. For more information, see Configure for macOS using a .plist
Prerequisites
The following software is required:
In Jamf Pro 10.19, a user can upload a JSON manifest as a "custom schema" to target
any preference domain, and the graphical user interface will be generated from this
manifest. The custom schema that's created follows the JSON Schema specification.
For more information, see Computer Configuration Profiles in the Jamf Pro
Administrator's Guide.
7 Note
Currently, the policy templates bundle is signed as a CAB file. You'll need to
use a 3rd party tool, such as The Unarchiver to open the file on macOS.
After you unpack the CAB file, unpack the ZIP file and navigate to the "mac" top level
directory. The manifest, which is named "policy_manifest.json", is in this directory.
This manifest will be published in every policy bundle starting with build 81.0.416.3. If
you want to test policies in the Dev channel, you can take the manifest associated with
each Dev release and test it in Jamf Pro.
1. Sign in to Jamf.
7. In the Application & Custom Settings section, set the values shown in the
following screen shot.
9. After you save the General section, Jamf shows the "Microsoft Edge Beta Channel"
configuration profile set up for our example. In the next screen shot, note that you
can keep working the profile by clicking Edit or if you're finished, click Done.
7 Note
You can edit this profile after it's been saved and in another Jamf session. For
example, you might decide to change the Distribution Method to Make
Available in Self Service.
To do a follow up edit on the Microsoft Edge Stable Channel, or delete it, select the
profile name, shown in the following Configuration Profiles screen shot.
After you create the new configuration profile you still have to configure the Scope for
the profile.
See also
Microsoft Edge Enterprise landing page
Configure for macOS with Intune
Configure for Windows
Configure for Windows with Intune
Microsoft Edge for Business
Article • 08/23/2023
This article describes the benefits Microsoft Edge for Business brings to your users and
how to enable this experience for your organization.
7 Note
Microsoft Edge for Business will start rolling out this new enterprise browsing
experience in Edge stable release version 116.
The Microsoft Edge for Business company branding will not be available in
this release.
IT admin management capabilities will be available soon.
Introduction
Microsoft Edge for Business is a new, dedicated Microsoft Edge experience built for
work that enables admins in organizations to give their users a productive and secure
work browser across managed and unmanaged devices. It has the same rich set of
enterprise controls, security, and productivity features that you're already familiar with in
Microsoft Edge, but it's built to help meet the evolving needs of businesses.
Microsoft Edge for Business aims to address the needs of both end users and IT Pros as
the browser that automatically separates work and personal browsing into dedicated
browser windows with their own favorites, separate caches and storage locations. This
separation ensures that work related content doesn't get intermingled with personal
browsing, preventing cognitive overload or end users from accidentally sharing sensitive
information with unintended audiences. Microsoft Edge for Business is going to be the
standard browser experience for organizations, activated by a Microsoft Entra ID
(formerly known as Azure Active Directory or Azure AD) login, upon general availability.
Check out our build announcement . Microsoft Edge for Business will be generally
available on managed PCs starting in Stable release version 116, and available in public
preview on unmanaged devices.
Microsoft Edge for Business encompasses the experiences summarized in the following
table.
Visually distinct Natively built-in rich enterprise controls for secure data Available
work browsing access and leak prevention powered by Microsoft Entra ID
experience (Azure AD) with refreshed visual treatment.
MAM for Secure and compliant access to work resources on Public Preview
Windows personal computers with DLP controls. (See following
onboarding
instructions)
Company Increase familiarity and trust with company branding in Coming soon
branding the work browser window.
7 Note
All existing Microsoft Entra profile settings stay the same, including favorites,
history, and saved passwords.
The Microsoft Edge for Business icon replaces the existing Microsoft Edge icon in the
taskbar and other shortcuts:
Inside the browser, you see the new profile pill label, profile flyout visual treatment, and
flyout band annotation.
7 Note
Applies when device has at least one Microsoft Entra (Azure AD) profile and one
MSA profile (existing or new).
Enterprise personal browsing is designed to keep work and personal browsing separate
for the end users via the new automatic switching mechanism. When the device has an
existing MSA profile or creates a new one, it enables automatic switching to enforce the
browsing context separation. We continue to update our automatic switching logic to
support more sites.
Microsoft Edge for Business is available now, and the personal browser profile is lightly
managed, without requiring more configuration. The personal browser profile
automatically inherits only the following policy categories:
Security Policies (for example, Application Guard, Enhanced Security Mode, and
others)
Data Compliance Policies (for example, Microsoft Purview DLP, Microsoft Insider
Risk Management)
Microsoft Edge Update Policies (for example, Enforcing Microsoft Edge Update
Rules)
For more information about the Enterprise personal browser and the policies that only
apply to the work browser profile, see policies.
Company Branding
Another Microsoft Edge for Business feature that will be coming soon is support for
Company Branding. The first version of this feature will automatically apply branding
assets available in the company's tenant, for example, Name, Logo and Color.
As we continue to develop this, we plan to enable more admin customization where
new assets can be provided for Microsoft Edge for Business.
Microsoft Edge for Business is enabled by logging into the browser using your Microsoft
Entra (Azure AD) account. This login ensures that all your Microsoft 365 services are
accessible in your work browser window.
Included in this release are some visual treatments for the work browser window, a
lightly managed personal browser window, and automatic switching between personal
and work browser windows for a growing number of websites.
7 Note
To enable protected remote or home access to org data from Microsoft Edge for
Business on personal Windows devices using:
Participation requirements:
) Important
Production use of the public preview on personal devices isn't supported. Migration
of public preview data to later releases is not supported. If you'd like to participate
in the preview, register at https://forms.office.com/r/UmKN68a7yN
Provide feedback
Your feedback while using Microsoft Edge for Business is valuable and it helps us
improve the product!
For feedback about enterprise personal browser policy or any of the other Microsoft
Edge for Business features, you can press alt + shift + I in the browser to open the Send
feedback dialog where you can share your thoughts. You can also leave feedback in our
TechCommunity forum .
Select the switching icon, pictured below, to switch back to the preferred browser
window. This action makes the browser remember your choice for that URL.
Go to edge://settings/profiles/multiProfileSettings and select Profile
preferences for sites to add/edit/delete automatic profile switching websites, or
select a preferred profile for the applicable site.
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
The Microsoft Edge management service is an area in the Microsoft 365 admin center
where admins can configure Microsoft Edge browser settings for their organization.
These configurations are stored in the cloud and you can apply these settings to the
browser using group assignment or group policy. Users must be logged into Microsoft
Edge to retrieve these settings.
Prerequisites
You must have Microsoft Edge 115.0.1901.7 or greater installed.
You must be a Microsoft Edge Administrator or a Global Administrator to access
the experience in Microsoft 365 Admin Center.
You must be using one of the following supported operating systems: Windows
10+ or Windows Server 2016+. See Microsoft Edge Supported Operating Systems
for specifics.
Each configuration profile can be assigned to multiple Microsoft Entra groups, and a
group can be assigned to multiple configuration profiles. When a group is assigned to
multiple configuration profiles, the settings will merge if there are no conflicting
settings. If a user is a member of multiple Microsoft Entra groups with conflicting policy
settings, then the profile priority is used to determine which policy setting is applied.
The highest priority is applied, with "0" being the highest priority that you can assign.
After confirmation, you'll be able to go to the profile and configure the policies and
extensions you want to use.
1. Select the profile that you want to import your previously exported profile to.
2. Select Import.
3. Browse for the profile's JSON file and select Import.
1. Under the Configuration profiles pivot, select the profile you want to make a copy.
2. Select Copy profile.
3. Under Copy configuration profile, enter a profile name and description and then
select Add.
After confirmation, the new profile is created with the same configurations as the profile
you copied.
1. Under the Configuration profiles pivot, select the profile you want to change and
select Reorder priority.
2. Under Reorder profile priority, pick a priority number from the dropdown list.
3. Select Save after you finish making your changes.
1. Under the Configuration profiles pivot, select the profile you want to configure a
policy for.
2. Under the Policies pivot, select Select policy.
3. Under Configure a policy, search for the policy you want to configure for this
profile. Set the configuration settings/values for the policy you select.
4. Select Save.
1. Under the Configuration profiles pivot, select the profile you want to assign.
2. Under the Group assignment pivot, select Select group.
3. Under Select a security group, select the group to assign the profile to.
4. Select Select. The profile will now be applied to all users in the selected group.
Manage extensions
To manage extension settings for a profile, go Microsoft Edge management, select the
profile you want to work with and then select the Extensions pivot. You can configure
profile settings that apply to all extensions. Any extensions you add to be managed will
appear in the profile. You can add an extension to the allow list, block list, or forced-
installed list by setting the installation policy. If you configure specific settings on an
individual extension, then those settings will override the profile settings.
1. Select the profile you want to import extension settings to and go to the
Extensions pivot.
2. Select Import JSON.
3. Under Import JSON, browse for the JSON file that contains your extension settings
and then select Import. Importing might overwrite any previous configurations.
Note that it may take some time to complete the import if the file is large.
After confirmation, your profile will be populated with the imported settings.
1. Select the profile you want to export extension settings from and go to the
Extensions pivot.
2. Select Export JSON and the export will start downloading.
After the download is finished you can apply the JSON as a value to the
ExtensionSettings group policy.
2. Select Manage extensions to configure any of the settings in the following table.
Setting Description
Block all extensions Users can't install any extensions (unless the extension is on the
allow list).
Allowed types of apps Specify what types of app or extensions users are allowed to
and extensions install.
Setting Description
Install sources Specify which URLs are allowed to install extensions. For URL
pattern examples, see the Defining match patterns.
Message for users Set a custom message that displays if users try to install a blocked
when extension is extension.
blocked
Block extensions that Prevent users from installing/running extensions that need the
require these permissions you select.
permissions
Add an extension
Follow these steps to add an extension:
Manage an extension
After selecting an extension, you can configure settings for a specific extension. These
settings will only apply to the extension that you select and will override any profile
settings.
2. Select Manage installation policy and choose one of the following options from
the dropdown list:
Allow: Users can install the extension. This is the default setting.
Block: Users can't install the extension. You could remove the extension if
users previously installed it. Also, you can write a message that displays when
users try to install the extension.
Force: The extension is automatically installed. Users can't remove it. You can
optionally specify an update URL for the initial extension installation and use
it for subsequent updates.
Normal: The extension is automatically installed. Users can disable it. You can
optionally specify an update URL for the initial extension installation and use
it for subsequent updates.
3. Select Save.
Manage hosts
Control what websites extensions can access. Prevent extensions from altering web
pages by specifying which URLs should block extensions from making changes or
reading data from. Allow extensions to interact with or modify websites, even if they're
defined in blocked hosts. The host pattern format is similar to match patterns except you
can't define the path. Follow these steps to configure this setting:
1. Select an extension.
2. Select Manage hosts. In the Hosts window, specify blocked and allowed host URLs.
3. Select Save.
Manage permissions
Prevent users from installing and using the extension if it requires certain permissions
that your organization doesn't allow. Follow these steps to configure this setting:
1. Select an extension.
2. Select Manage permissions. You can choose to use the default permissions that
were defined in the profile settings or change these permissions. Use the
Permissions window to allow all permissions, or customize permissions by
choosing certain permissions that aren't allowed.
3. Select Save.
Edit minimum version
Specify the minimum version required for the extension. The extension will be disabled
if it's a version older than what's specified, even if its installation policy is forced. The
format of the version string is the same as the one used in the extension manifest.
Follow these steps to configure this setting:
1. Select an extension.
2. Select Edit minimum version. In the Minimum version required window, enter the
minimum version in the textbox.
3. Select Save.
Choose how an extension is displayed in the toolbar. Follow these steps to configure
this setting:
1. Select an extension.
3. Select Save.
7 Note
The Extension Feedback feature is available in Edge Stable 116 and later. This will
start rolling out after Microsoft Edge Stable 116 is available, which means you'll see
the feature on 08/30/2023.
If you blocked all extensions for your organization, you can see the extensions that your
users are attempting to install. To view these extensions, go to a configuration profile
and go to Requests in the Extensions pivot. You can then change the installation policy
for these extensions to let users install it. To allow requests, use the
EdgeManagementExtensionsFeedbackEnabled policy to enable reporting.
1. Select an extension.
2. Select Manage installation policy and choose one of the following options from
the dropdown list:
Allow: Users can install the extension. This is the default setting.
Block: Users can't install the extension. You can remove the extension if a user
previously installed it. Also, you can write a message that displays when users
try to install the extension.
Force: The extension is automatically installed. Users can't remove it. You can
optionally specify an update URL for the initial extension installation and use
it for subsequent updates.
Normal: The extension is automatically installed. Users can disable it. You can
optionally specify an update URL for the initial extension installation and use
it for subsequent updates.
3. Select Save.
After selecting a sidebar app, you can configure its installation policy to Allow, Block, or
Force.
7 Note
Any policies you apply with Microsoft Edge management service will be overridden
if they conflict with an existing Group Policy Object (GPO) or Mobile Device
Management (MDM) policy that's set on the device.
Microsoft Edge management service is enabled by default. Work profiles signed in with
Microsoft Entra accounts will check with the Edge management service for any policies
assigned to them. If an enrollment token is configured through device management,
that token will be used. To disable the checking in with the Edge management service
you can set the EdgeManagementEnabled policy to 0 or disabled.
If you don't want to assign the profile using group assignment in the Microsoft 365
Admin Center, then you can assign it through group policy. Each profile has a unique
profile ID which is the value you can use for the EdgeManagementEnrollmentToken
policy to assign the profile. After assignment, the users will receive the profile and the
settings will be applied when they're signed into the Edge browser. These policies will be
applied in addition to any from group assignment in the Microsoft 365 Admin Center.
1. Sign in to the Microsoft 365 Admin Center. Go to Settings > Microsoft Edge.
Under the Configuration profiles pivot, select the profile you want to assign and
then select Copy token ID.
2. Set the EdgeManagementEnrollmentToken policy value to the token ID.
3. If Microsoft Edge is open, restart it.
Control policy source precedence
As stated previously, if policy is set in MDM or GPM, that value will override any value
provided by Microsoft Edge management service. If you want the Microsoft Edge
management service policy to override MDM/GPM policy you can set the override in the
CloudPolicyOverridesPlatformPolicy policy. This is a private policy and must be set via
the registry.
) Important
This policy is highly experimental and will probably change in both name and
functionality at any time. Don't take any dependencies on it and only use it for
testing.
create it. In the following command line example, remember to use your token ID and
restart Microsoft Edge if it's open.
Microsoft Edge policy has the concept of the audience that the policy is meant to apply
to, this can be either "User" or "Device". In Microsoft Edge management service, the
policy applied via Group Assignment is applied as User Policy, while policy pulled down
via [EdgeManagementEnrollmentToken] is applied as Device Policy.
If there's a conflict with policy that User and Device are both trying to set, Device Policy
takes precedence over User Policy. If you want to give User Policy precendence you can
change precedence in [CloudUserPolicyOverridesCloudMachinePolicy] policy.
) Important
This policy is highly experimental and will probably change in both name and
functionality at any time. Don't take any dependencies on it and only use it for
testing.
1. You can set precedence via the registry by setting the value of
"CloudUserPolicyOverridesCloudMachinePolicy" under the key
SOFTWARE\Policies\Microsoft\Edge in either HKLM or HKCU . If the key isn't there,
create it.
2. Add the reg key using the following command line example as a guide.
(Remember to use your profile ID.)
The Click-to-Run service used by Microsoft Edge management service checks with Cloud
Policy regularly to see if there are any configuration profiles that pertain to the user. If
there are, then the appropriate policy settings are applied and take effect the next time
the user opens Microsoft Edge.
When a user signs into Microsoft Edge on a device for the first time, a check is
immediately made to see if there's a configuration profile that pertains to the user.
If the user isn't a member of an Microsoft Entra group that's assigned a
configuration profile, then another check is made again in 24 hours.
If the user is a member of an Microsoft Entra group that's assigned a configuration
profile, then the appropriate policy settings are applied. A check is made again in
90 minutes.
If there are any changes to the configuration profile since the last check, then the
appropriate policy settings are applied and another check is made again in 90
minutes.
If there aren't any changes to the configuration profile since the last check, another
check is made again in 24 hours.
If there's an error, a check is made when the user opens Microsoft Edge.
If Microsoft Edge isn't running when the next check is scheduled, then the check
will be made the next time the user opens Microsoft Edge.
7 Note
Policies from Cloud Policy are only applied when Microsoft Edge is restarted.
The behavior is the same as with Group Policy. For Windows devices, policies
are enforced based on the primary user that is signed into Microsoft Edge. If
there are multiple accounts signed in, only policies for the primary account
are applied. If the primary account is switched, most of the policies assigned
to that account will not apply until Microsoft Edge is restarted. Some policies
related to privacy controls will apply without restarting Microsoft Edge.
If users are located in nested groups and the parent group is targeted for
policies, the users in the nested groups will receive the policies. The nested
groups and the users in those nested groups must be created in or
synchronized to Microsoft Entra ID.
If the user is a member of multiple Microsoft Entra groups with conflicting
policy settings, priority is used to determine which policy setting is applied.
The highest priority is applied, with "0" being the highest priority that you can
assign. You can set the priority by choosing Reorder priority on the
Configuration profiles page.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge Workspaces
Article • 08/21/2023
7 Note
Microsoft Edge for Business, the new, dedicated work experience for Microsoft
Edge, is in preview today! Try Microsoft Edge for Business, including the switching
between work and personal browsing, and let us know what you think.
This article describes the productivity benefits Edge Workspaces will bring to your users
and how you can enable this feature and its functions in your organization.
7 Note
Edge Workspaces for personal use is currently in preview. To learn more about how
to join, see Edge Workspaces preview for consumer accounts now available .
Overview
Edge Workspaces provides an incredible way for customers to organize their browsing
tasks into dedicated windows. Each Edge Workspace contains its own sets of tabs and
favorites, all created and curated by the user and their collaborators. Edge Workspaces
are automatically saved and kept up to date. Workspaces are accessible anywhere
customers use Microsoft Edge with their Microsoft Entra accounts.
https://www.youtube-nocookie.com/embed/bNRY9Zm1QY8
Prerequisites
Users must have an Microsoft Entra tenant and Microsoft Edge version 114 or
greater installed.
To manage via group policy, Admins must have Microsoft Edge version 114 or
greater installed and version 114 of the policy files.
Users must have access to a OneDrive for Business license to create an Edge
Workspace.
) Important
Remember that each user in a shared Edge Workspace brings their own identity,
authentication, and cookies to the open websites. A user might have access to a
specific workspace, but might not have access to all the websites loaded in the
workspace.
To learn more about how to get your users started with Edge Workspaces, visit: Discover
your edge at work .
Workspaces sharing
A workspace shares the following information:
The workspace's browser tabs, favorites, and history with your team in real time.
The active tab for each group member that has the workspace open.
These basic rules produce consistent behavior for users sharing tabs in a workspace.
However, sometimes additional customization can further optimize the shared
navigation experience of Workspaces users.
url_patterns : The format used for the url_patterns property is described in Filter
Navigation options
You can associate any or all of the following options with a set of URL patterns.
Providing feedback
Your feedback while using Edge Workspaces is valuable to help us improve the product!
You can leave feedback by clicking the Like or Dislike button at the bottom of the Edge
Workspace menu. These buttons are next to the question: "Are you satisfied with
Workspaces?".
7 Note
The Locked Tabs feature is available starting with Edge stable version 116.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge for Virtual desktop
infrastructure (VDI)
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes the requirements and limitations for using Microsoft Edge in a
virtual environment.
What is VDI?
Virtual desktop infrastructure (VDI) is a desktop virtualization technology that hosts an
operating system and applications on a centralized server in a data center. This
technology enables a fully personalized desktop experience for users on a secure and
compliant centralized source.
Microsoft Edge can be used in a virtual environment in much the same way as it's used
on a local device. A virtual desktop takes advantage of a secure and controlled server
environment. Depending on the VDI solution you choose, it might also be possible to
give your users seamless access to intranet applications and sites.
Most Microsoft Edge features are supported in VDI environments without any special
configuration. However, to ensure an optimal experience we recommend that you
review the following guidance.
Although other VDI solutions haven't been certified by the Microsoft Edge team yet, it's
expected that the most common workflows in Microsoft Edge should be supported. The
following guidance may or may not be applicable to your chosen solution.
Performance considerations for Microsoft Edge
on VDI
When designing your VDI environment you should carefully consider the workflows and
needs of your users to achieve optimal performance, and understand the limits of your
server configuration.
The following minimum requirements are recommended for deploying Microsoft Edge
on a VDI environment:
Large and complex web applications and extensions will need more memory and
processing capability, which must be considered when configuring your virtual
environment.
When using a non-persisted environment, one usually creates a "golden image" that has
the required apps and configurations that will be deployed on each device. Use the
following recommendations as a guide for preparing a golden image.
1. Download the Microsoft Edge MSI package that matches your VDI VM operating
system from:
2. Run the following command to install the MSI to the VDI virtual machine (VM):
msiexec /i <path_to_msi> /qn /norestart /l*v <install_logfile_name>
For more information about disabling automatic updates, see the following policies:
Profile management
On non-persisted setups, it's important to consider that VMs may not maintain user
state between sessions or users may be assigned a VM they've never used before. In this
scenario, the VM doesn't have any of the user's data.
Microsoft Edge supports several methods for syncing user data so it's available
regardless of how they are accessing Microsoft Edge. Two methods are Microsoft Entra
sync and on-premises sync for Micrsoft Entra ID users.
For more information about requirements and configuration, see On-premises sync for
Active Directory (AD) users
It some cases, unnecessary folders should be excluded from the backed-up user folder
to reduce initial loading times when a user's logging on to a machine and their profile is
being migrated. If so, we recommend the following folders be excluded from your
backup to reduce size.
%LocalAppData%\Microsoft\Edge\User Data\Default\Cache
%LocalAppData%\Microsoft\Edge\User Data\Default\Code Cache
%LocalAppData%\Microsoft\Edge\User Data\Default\JumpListIconsTopSites
%LocalAppData%\Microsoft\Edge\User Data\Default\JumpListIconsRecentClosed
Known issues
For more information, see Mobile experience policy settings (citrix.com) for more
information. Disabling these policies should mitigate the issue.
Use Microsoft Edge via a Remote Desktop to the Citrix Host instead of a seamless
remote application.
Use Azure Virtual Desktop remote apps instead, which has mitigations for this
issue.
See also
Microsoft Edge Enterprise landing page
Azure Virtual Desktop
Microsoft Edge configurations and
experimentation
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes the interaction between Microsoft Edge and the Experimentation
and Configuration Service (ECS). Microsoft Edge communicates with this service to
request and receive different kinds of payloads. These payloads include configurations,
feature rollouts, and experiments.
) Important
7 Note
Configurations
Configurations are the payload meant to ensure product health, security, and privacy
compliance, and are intended to have the same value for all the users (based on
platforms and channels.) This could be to enable a feature flag for a domain action, and
can also be used to disable a feature flag in the event of a bug.
Experiments
Microsoft Edge builds have features and functionality that are still in development or are
experimental. Experiments are like CFR, but the size of the user group is much smaller
for testing the new concept. These features are hidden by default until the feature's
rolled out or the experiment's finished. Experiment flags are used to enable and disable
these features.
U Caution
If you disable communications with the service, this will affect Microsoft's
ability to respond to a severe bug in a timely manner.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge documentation landing page
Microsoft Edge Enterprise new tab page
Article • 08/22/2023
7 Note
Microsoft Edge for Business, the new, dedicated work experience for Microsoft
Edge, is in preview today! Try Microsoft Edge for Business, including the switching
between work and personal browsing, and let us know what you think.
The Enterprise new tab page is a direct response to a new challenge that workers face
daily: frequent context switching. Our research shows that in addition to managing
schedules, workers juggle roughly three projects a day—and on average, switch
between them two to three times a day. Combine that switching with a torrent of emails,
pings, and calls (which, when combined, can easily number in the triple digits) and
they're constantly switching contexts throughout their day. Finally, add on the challenge
of hybrid workplaces and it's no wonder they want to work smarter not harder.
We're continuously looking to improve the browser experience so we want to get your
feedback, which you can provide by pressing alt + shift + I to open the Send feedback
dialog where you can share your thoughts.
Microsoft Feed
Microsoft Feed helps you discover and learn about people and interests relevant at
work. The feed shows you a mix of content and activity from across Microsoft 365 to
help you stay connected to your colleagues and informed about what's happening
around you.
You might, for example, see updates to documents you're working on with others, links
shared with you in Teams chats, suggested tasks to follow up, highlights about
colleagues, and much more.
You will only see documents or other content directly shared with you or that you have
access to in any case. This can be documents that are stored in a shared folder in
OneDrive or on a SharePoint site that you have access to, or a link that someone sent
you in an email conversation or a Teams chat.
Documents are not stored in Microsoft Feed. If you want to change permissions on any
of your documents, you can do this from where the documents are stored, such as
OneDrive or SharePoint. Microsoft Feed always respects the permissions that are set on
documents, and will not show your documents to people who don't have access to
them.
For tenant admins, if you’d like to have your organization automatically set Work feed as
the default tab, follow these steps:
See also
Microsoft Edge Enterprise landing page
Microsoft Edge identity support and
configuration
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Microsoft Edge uses identity to support features such as sync
and single sign-on (SSO). Microsoft Edge supports signing in with Active Directory
Domain Services (AD DS), Microsoft Entra ID, and Microsoft accounts (MSA). Currently,
Microsoft Edge only supports Microsoft Entra accounts belonging to the global cloud or
the GCC sovereign cloud. We're working on adding support for other sovereign clouds.
7 Note
Automatic sign-in
Microsoft Edge uses the OS default account to auto sign into the browser. Depending
on how a device is configured, users can get auto signed into Microsoft Edge using one
of the following approaches.
Manual sign-in
If the user doesn't get automatically signed into Microsoft Edge, they can manually sign
into Microsoft Edge during the first run experience, browser settings, or by opening the
identity flyout.
Ensure that users always have a work profile on Microsoft Edge. See
NonRemovableProfileEnabled
Restrict sign-in to a trusted set of accounts. See RestrictSigninToPattern
Disable or force browser sign-in. See BrowserSignin
Browser to Web Single Sign-On (SSO)
On some platforms, you can configure Microsoft Edge to automatically sign into
websites for your users. This option saves them the trouble of reentering their
credentials to access their work websites and increases their productivity.
A Primary Refresh Token (PRT) is an Microsoft Entra ID key that's used for authentication
on Windows 10, iOS, and Android devices. It enables single sign-on (SSO) across the
applications used on those devices. For more information, see What is a Primary Refresh
Token?.
Seamless SSO
Just like PRT SSO, Microsoft Edge has native Seamless SSO support without needing an
extension. On Windows 10 RS3 and above, if a user is signed into their browser profile,
they get SSO with the PRT mechanism to websites that support PRT-based SSO.
Seamless Single Sign-On automatically signs users in when they're on corporate devices
connected to a corporate network. When enabled, users don't need to type in their
passwords to sign in to Microsoft Entra ID. Typically they don't even have to type in their
usernames. For more information, see Active Directory Seamless Single Sign-On.
To support WIA-based SSO on Microsoft Edge (version 77 and later), you might also
have to do some server-side configuration. You'll probably have to configure the Active
Directory Federation Services (AD FS) property WiaSupportedUserAgents to add
support for the new Microsoft Edge user agent string. For instructions on how to do this,
see View WIASupportedUserAgent settings and Change WIASupportedUserAgent
settings. An example of the Microsoft Edge user agent string on Windows 10 is shown
below, and you can learn more about the Microsoft Edge UA string here.
The following example of a UA string is for the latest Dev Channel build when this article
was published:
"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
For services that require delegating Negotiate credentials, Microsoft Edge supports
Constrained Delegation using the AuthNegotiateDelegateAllowlist policy.
Proactive Authentication
Proactive authentication is an optimization over browser to website SSO that front loads
authentication to certain first party websites. This improves address bar performance if
the user is using Bing as the search engine. This gives users personalized and Microsoft
Search for Business (MSB) search results. It also enables allowing authentication to key
services such as the Office New Tab Page.
7 Note
If you want to configure browser sign in after version 90, use the BrowserSignin
policy. For Microsoft Edge version 90 or lower, you can control this service using
the ProactiveAuthEnabled policy.
See also
Microsoft Edge Enterprise landing page
Video: Microsoft Edge and Identity
Identity and access management
Identity platform
Four steps to a strong identity foundation with Microsoft Entra ID
Microsoft Edge and Enterprise State
Roaming
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains how Microsoft Edge participation in the Enterprise State Roaming
(ESR) offering is changing to better support sync across platforms and devices.
7 Note
This article applies to Microsoft Edge version 77 or later unless otherwise noted.
Introduction
With Windows 10, Microsoft Entra ID users gained the ability to securely synchronize
their user settings and application settings data to the cloud. Enterprise State Roaming
(ESR) provides users with a unified experience across their Windows devices and reduces
the time needed for configuring a new device.
As a result of Microsoft Edge adopting the Chromium platform, its sync solution is now
disconnected from Windows sync framework. This disconnect affects the relationship of
Microsoft Edge to the ESR offering.
) Important
ESR is framed as a Windows product offering with promises about how data from
Windows devices is handled, but Microsoft Edge sync will extend this functionality
beyond Windows devices. Because the data roams across these devices, it makes it
difficult to define the Microsoft Edge sync offering in the context of ESR. To simplify how
sync works and is managed, and to accommodate the changes that are highlighted, a
decision was made to pull Microsoft Edge out of the ESR offering.
After a user has explicitly consented to turn on sync in Microsoft Edge, the browser will
sync all the browser data, such as favorites, passwords, and history. Sync ensures a
unified experience across devices and reduces the time needed to personalize the
browser.
Enhanced security
Data is automatically encrypted before leaving the user's Windows 10 device by using
Azure Information Protection, and data stays encrypted at rest in the cloud. All content
stays encrypted at rest in the cloud, except for the namespaces, like settings names.
Monitoring
We'll provide control and visibility over who syncs settings in your organization and on
which devices through integration with the Microsoft Entra portal. This capability will be
enabled in a future release.
Management
Admins will be able to control which members in your organization can enable sync. See
Use Azure Information Protection to configure Microsoft Edge sync and Sync group
policies. Additionally, users can turn sync on/off for each of their devices and toggle
each data attribute individually for sync.
Key management
The synchronization feature uses Azure Information Protection (AIP) to protect the
synchronized data for only the user and the enterprise admins. AIP supports Microsoft
managed keys (default) and bring your own key for cloud-key management. The cloud-
key management strategy your organization uses is transparent to Microsoft Edge and
has no impact on the synchronization feature.
) Important
Hold your own key (HYOK) and the Active Directory Rights Management Service
aren't supported.
Favorites
Passwords
Addresses and more (form-fill)
Collections
Settings
Extensions
Open tabs (available in Microsoft Edge version 88 or later)
History (available in Microsoft Edge version 88 or later)
The preceding list of attributes is different than the attributes that could be synced in
Microsoft Edge Legacy. (For details about Microsoft Edge Legacy settings, see Windows
10 roaming settings.) Users can selectively enable/disable these attributes using
Microsoft Edge settings. Given the difference in attributes between the two versions (for
example, history), users might be asked to give sync consent again.
7 Note
Unlike Microsoft Edge Legacy, Microsoft Edge doesn't use Windows credential
Manager for passwords and as a result, won't sync passwords with Internet Explorer
or other apps that use Windows Credential manager.
Terms of service
Terms of service for Microsoft Edge sync fall under the Microsoft software license
viewable in Microsoft Edge at edge://terms.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge Sync
Plan your kiosk mode transition
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article provides guidance on how to transition your kiosk from Microsoft Edge
Legacy to Microsoft Edge.
7 Note
This article applies to Microsoft Edge Stable, Beta and Dev Channels, version 87 or
later.
) Important
When support ends for Microsoft Edge Legacy on March 9, 2021, it will be removed
and replaced with Microsoft Edge on Chromium as part of the Windows Update in
April. For details, go to this blog post . To continue to use your browser-based
kiosk scenarios, you need to install Microsoft Edge on Chromium and set up kiosk
mode prior to April's Windows Update release to your device.
Step 1: Evaluate your needs against released (and upcoming) kiosk mode
functionality. The following table lists the features supported by kiosk mode in
Microsoft Edge on Chromium and Microsoft Edge Legacy. Use this table as a guide to
transitioning to Microsoft Edge by comparing how these features are supported in both
releases of Microsoft Edge.
Feature Digital\Interactive Public Available with Available
Signage browsing Microsoft with
Edge version Microsoft
(and higher) Edge Legacy
InPrivate Navigation Y Y 89 Y
Reset on inactivity Y Y 89 Y
options
7 Note
For information about the Microsoft Edge release schedule, see Microsoft Edge
release schedule.
Step2: Test the new kiosk in Microsoft Edge. We recommend that you test setting up
kiosk mode in Microsoft Edge. A quick and easy way to test kiosk mode is to configure
an assigned access single app using Windows Settings as described next.
1. The minimum system updates for the operating systems listed in the next table.
2. To test the latest features, you can download the latest Microsoft Edge Stable
channel , version 89 or higher.
) Important
3. On the kiosk computer, open Windows Settings, and type "kiosk" in the search
field. Select Set up a kiosk (assigned access), shown in the next screenshot to
open the dialog for creating the kiosk.
4. On the Set up a kiosk page, click Get started.
5. Type a name to create a new kiosk account or choose an existing account from the
populated dropdown list and then click Next.
6. On the Choose a kiosk app page, select Microsoft Edge and then click Next.
7. Select one of the following options for how Microsoft Edge displays when running
in kiosk mode:
Digital/Interactive signage - Displays a specific site in full-screen mode,
running Microsoft Edge.
Public browser - Runs a limited multi-tab version of Microsoft Edge.
8. Select Next.
11. Click Next.
12. Close the Settings window to save and apply your choices.
13. Sign out from the kiosk device and sign in with the local kiosk account to validate
the configuration.
Step 3: Develop a transition plan. Based on your testing and organizational needs, we
recommend developing a transition plan and moving to Microsoft Edge on Chromium
before support ends for Microsoft Edge Legacy on March 9, 2021.
See also
Microsoft Edge Enterprise landing page
New Microsoft Edge to replace Microsoft Edge Legacy with April's Windows 10
Update Tuesday release
Configure Microsoft Edge kiosk mode
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how to configure Microsoft Edge kiosk mode options that you can
pilot. There's also a roadmap of features we're targeting.
7 Note
) Important
Invoke Microsoft Edge kiosk mode features on Windows 10 using the command
line arguments provided in Use kiosk mode features.
Overview
Microsoft Edge kiosk mode offers two lockdown experiences of the browser so
organizations can create, manage, and provide the best experience for their customers.
The following lockdown experiences are available:
Both experiences are running a Microsoft Edge InPrivate session, which protects user
data.
InPrivate Navigation Y Y 89 Y
Reset on inactivity Y Y 89 Y
7 Note
Features followed by "*" are only enabled in an assigned access single app scenario.
--kiosk-idle-timeout-minutes=: Change the time (in minutes) from the last user
activity before Microsoft Edge kiosk mode resets the user's session by closing the
browser. Note: this flag will not restart Microsoft Edge after it's closed. A separate
technology, such as Assigned Access or Shell Launch is required to automatically
restart Edge after the idle timeout. Replace "value" in the next example with the
number of minutes.
--kiosk-idle-timeout-minutes=value
7 Note
Policy configuration isn't limited to the policies listed in the following table,
however additional policies should be tested to ensure that kiosk mode
functionality isn't negatively affected.
Printing Y Y
HomePageLocation N Y
ShowHomeButton N Y
NewTabPageLocation N Y
FavoritesBarEnabled N Y
URLAllowlist Y Y
URLBlocklist Y Y
ManagedSearchEngines N Y
UserFeedbackAllowed N Y
VerticalTabsAllowed N Y
Group policy Digital\Interactive signage Public browsing single-app
SmartScreen settings Y Y
EdgeCollectionsEnabled Y Y
ConfigureKeyboardShortcuts Y Y
DownloadDirectory Y Y
) Important
You can manage Microsoft Edge kiosk mode assigned access single app via Windows
Settings and Intune.
Multi-app kiosk
Microsoft Edge can be run with multi-app assigned access on Windows 10, which is the
equivalent of Microsoft Edge Legacy "Normal browsing" kiosk mode type. To configure
Microsoft Edge with multi-app assigned access, follow the instructions on how to Set up
a multi-app kiosk. (The AUMID for the Microsoft Edge Stable channel is
Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe!MSEDGE).
When using Microsoft Edge with multi-app assigned access, you can configure
Microsoft Edge kiosk to use the Microsoft Edge browser policies to configure the
browsing experience to meet your unique requirements.
1. The minimum system updates for the operating systems listed in the next table.
2. To test the latest features, you can download the latest Microsoft Edge Stable
channel , version 89 or higher.
3. On the kiosk computer, open Windows Settings, and type "kiosk" in the search
field. Select Set up a kiosk (assigned access), shown in the next screenshot to
open the dialog for creating the kiosk.
4. On the Set up a kiosk page, select Get started.
5. Type a name to create a new kiosk account or choose an existing account from the
populated dropdown list and then select Next.
6. On the Choose a kiosk app page, select Microsoft Edge, and then select Next.
7 Note
This only applies to Microsoft Edge Dev, Beta, and Stable channels.
7. Pick one of the following options for how Microsoft Edge displays when running in
kiosk mode:
11. Select Next.
Functional limitations
With the release of this preview version of kiosk mode we're continuing work on
improving the product and adding new features.
We currently don't support the following features, they don't work with kiosk mode.
) Important
InPrivateModeAvailability
IsolateOrigins
ManagedFavorites
EdgeShoppingAssistantEnabled
EdgeCollectionsEnabled
UserFeedbackAllowed
DefaultPopupsSetting
StartupBoostEnabled
Extensions
BackgroundModeEnabled
See also
Microsoft Edge Enterprise landing page
Plan your deployment of Microsoft Edge
Configure kiosks and digital signs on Windows desktop editions
Plan your kiosk mode transition
Manage Microsoft Edge extensions in
the enterprise
Article • 07/20/2023
This article provides best practice guidance for admins who are managing Microsoft
Edge extensions in their organizations. You can use the information in this article to
develop a strategy for managing extensions in your organization.
7 Note
7 Note
Introduction
Organizations want to protect corporate and user data and evaluate browser extensions
to ensure that they're safe and relevant to their enterprise. Admins want to:
This article is the first in a series that that helps admins manage extensions to provide a
safe and productive experience for their users. This series walks through the different
options and helps you pick the best method for managing extensions. The series
consists of the following articles:
As you answer these questions, you can use the granular policies that Microsoft Edge
provides to:
The traditional model for managing extensions uses the allowlist and blocklist approach
for specific extensions. However, Microsoft Edge also lets you manage the permissions
requested by extensions. Using this model, you can decide which rights and permissions
you want to allow extensions to use on your computers and devices, and then
implement a global policy that allows or block extensions based on your requirements.
Host permissions require the extension to list webpages it may view or modify.
Device permissions are the rights needed by an extension on the device where it's
running.
Some examples of these permissions are: access to a USB port, storage or viewing
screen, and communicating with native programs.
Get ready to manage extensions
The configuration steps in this article are for Windows, for the corresponding
implementation in MAC/Linux, see the Microsoft Edge browser policy reference.
Using this approach saves time because you only need to set these once. And with the
run-time hosts policy, your most important sites will be protected.There are other
options as well such as:
Use the following steps as a guide to decide which extensions to allow in your
organization.
1. Create a list of which extensions employees need on their computers. Test the
extensions in a test environment to diagnose any compatibility issues with internal
apps.
2. Choose which sites need to be more secure.
Find out which sensitive internal websites or domains you need to block
extensions from making changes to or reading data from.
Prevent access to these sites by blocking the API calls when the extension is
run. This includes blocking web requests, reading cookies, JavaScript
injection, XHR, and so on.
3. Determine which permissions are required for these extensions to run. Identify
which permissions pose potential risks to your users.
Audit the extensions your users have installed and see what permissions they
need. You can look at the web app manifest JSON file in the code of the
extension. Take the following steps to see what rights the extension needs:
Install the extension from the Microsoft Edge Add-ons website or the
Chrome Web Store .
Test the extension and understand how it works in your organization.
Review the permissions that the extension requires by navigating to
edge://extensions. For example, the Microsoft Office extension shown in
the next screenshot requests the permissions "Read your browsing history"
and "Display notifications". Weigh the usefulness of this extension against
the level of permissions it requests. After you approve an extension for
your organization, manage it using the following tools.
You can also validate the extensions requested by users in your organization
before approving them in the organization. Some of the permissions that
extensions use can be vague. For business-critical apps, you can reach out to
the app developer or vendor directly to get more information about the
extension or look at the source code. They should be able to detail the
changes that the extension can make on devices and websites.
Review the Declare Permissions list, which lists all permissions an extension
can use. From this list, you can decide which permissions you want to allow in
your organization.
4. Create a master list from the data you collected.This list will include the following
information:
5. Present your list to your stakeholders and the IT team to get buy in.
6. Test out the new policy in your lab or with a small pilot in your organization.
7. Roll out these new sets of policies to employees in phases. For more information,
see Use group policies to manage Microsoft Edge extensions.
With your baseline of allowed permissions enforced and sensitive corporate sites
protected, you can provide your enterprise with more security while providing a better
experience for users. Staff might install extensions that they couldn't before, but not run
them on sensitive business sites.
See also
Use group policies to manage Microsoft Edge extensions
Create a web store to host Microsoft Edge extensions
Reference guide for the ExtensionSettings policy
FAQ for Microsoft Edge Extensions
Microsoft Edge Enterprise landing page
Manage the sidebar in Microsoft Edge
Article • 07/20/2023
This article describes the sidebar in Microsoft Edge and provides information about the
procedures that admins can use to manage this feature in their organization.
7 Note
7 Note
1. Open the group policy editor and go to Administrative Templates > Microsoft
Edge and then select Show Hubs Sidebar.
2. To block the sidebar and all sidebar apps, select Disabled.
3. To allow the sidebar, select Enabled.
Note that blocking the sidebar removes access to the new Discover app that appears in
the toolbar (Microsoft Edge 111 or later).
1. Open the group policy management editor and go to Administrative Templates >
Microsoft Edge > Extensions and then select Control which extensions cannot be
installed.
2. Select Enabled.
3. Click Show.
4. Enter the extension ID of the sidebar app that you want to block.
You can find Extension IDs for sidebar apps by going edge://sidebar-
internals .
The Sidebar Internals JSON file includes a manifest for all sidebar apps,
including an extension_id parameter for each app. You can use these values
to configure the policy.
When adding multiple IDs, use a separate row for each ID.
5. To block all sidebar apps, refer to Allow or block the sidebar in group policy.
Disabling the HubsSidebarEnabled policy blocks all sidebar apps by default.
Allow specific sidebar apps
You can use the ExtensionInstallBlocklist and ExtensionInstallAllowlist policies to allow
specific sidebar apps while blocking the rest of the sidebar apps. Use the following steps
as a guide to exempt a specific sidebar app from the blocklist.
1. Open the group policy management editor and go to Administrative Templates >
Microsoft Edge > Extensions and then select "Control which extensions cannot be
enabled".
2. Select Enabled.
3. Click Show.
4. Enter *.
6. Enter the Extension ID of the sidebar app that you want to allow.
a. You can find Extension IDs for sidebar apps by going to edge://sidebar-
internals from the omnibox in Microsoft Edge.
b. The resulting manifest (which can be exported to JSON file) lists all the sidebar
apps including an extension_id parameter for each app. You can use these
values to configure the policy.
c. When adding multiple IDs, use a separate row for each ID.
7. The user can then choose to enable/disable the allowed sidebar app. To force
enable a sidebar app, refer to the next section, which has information about the
ExtensionInstallForcelist policy.
1. In the Group Policy Editor, go to Administrative Templates > Microsoft Edge >
Extensions and then select Control which extensions are installed silently.
2. Select Enabled.
3. Click Show.
4. Enter the extension ID(s) for the sidebar apps you want to force enable.
The sidebar app is enabled silently without needing any user interaction. The user won't
be able to remove this app from the sidebar. This setting overwrites any blocklist policy
that's enabled.
See also
Microsoft Edge Enterprise landing page
Use group policies to manage Microsoft
Edge extensions
Article • 07/20/2023
This article describes the options and steps for managing extensions by using group
policies. These options assume that you already have Microsoft Edge managed for your
users. If you haven't already set up Microsoft Edge to be managed for your users follow
the link below to do so now.
7 Note
7 Note
7 Note
The blocked permissions setting can only be set within the extension settings
policy.
1. Open the group policy management editor and go to Administrative Templates >
Microsoft Edge > Extensions and then select Configure extension management
settings.
2. Enable the policy, then enter the permissions that you want allowed or blocked, by
using a JSON string that gets compressed. The next screenshot shows how to
block an extension that uses the permission "usb".
The following example shows the JSON to block any extension that needs the use of
permission "usb" and its compressed string.
JSON example
JSON
{
"*": {
"blocked_permissions": ["usb"]
}
}
JSON
{"*":{"blocked_permissions":["usb"]}}
7 Note
To block all extensions that use the permission, use an asterisk for the extension ID,
as shown in the previous example. If you specify one extension ID, the policy will
only apply to that extension. You can block more than one, but they need to be
separate entries.
7 Note
The Runtime allowed/blocked hosts setting can only be set within the extension
settings policy.
You can configure the following settings in the ExtensionSettings policy to prevent (or
allow) alterations of websites or domains:
JSON
[http|https|ftp|*]://[subdomain|*].[hostname|*].[eTLD|*]
[http|https|ftp|*],
7 Note
[hostname|*], and [eTLD|*] sections are required, but [subdomain|*] section
is optional.
The following table shows examples of valid host patterns and matching patterns.
Use the following steps as a guide to block or allow extensions to access a website or
domain.
1. Open the group policy management editor and go to Administrative Templates >
Microsoft Edge > Extensions, and then select Configure extension management
settings.
2. Enable the policy, then enter the permissions that you want allowed or blocked,
compressing the permissions to a single JSON string.
The following examples show how to block extensions on a hostname and how to block
extensions on the same domain.
JSON
{
"*":{
"runtime_blocked_hosts":["www.microsoft.com"]
}
}
JSON
{"*":{"runtime_blocked_hosts":["www.microsoft.com"]}}
7 Note
To block all extensions from accessing a webpage, use an asterisk for the extension
ID, as shown in the previous example. If you specify one extension ID instead of an
asterisk, the policy will only apply to that extension. You can block more than one
extension, but they need to be separate entries.
JSON
{
"aapbdbdomjkkjkaonfhkkikfgjllcleb": {
"runtime_blocked_hosts": ["*://*.importantwebsite"]
},
"bfbmjmiodbnnpllbbbfblcplfjjepjdn": {
"runtime_blocked_hosts": ["*://*.importantwebsite"]
}
}
JSON
{"aapbdbdomjkkjkaonfhkkikfgjllcleb": {"runtime_blocked_hosts":
["*://,*.importantwebsite"]},"bfbmjmiodbnnpllbbbfblcplfjjepjdn":
{"runtime_blocked_hosts": ["*://*.importantwebsite"]}}
1. Open the group policy management editor and go to Administrative Templates >
Microsoft Edge > Extensions > and then select Control which extensions cannot
be installed.
2. Select Enabled.
3. Click Show.
4. Enter the app ID of the extensions that you want to block. When adding multiple
app IDs, use a separate row for each ID.
5. To block all extensions, type * into the policy to prevent any extensions from being
installed. You can use this command with the "Allow specific extensions to be
installed" policy to only allow certain extensions to be installed. The next
screenshot shows an extension that will be blocked based on the app ID that's
provided.
Tip
If you can't find the app ID of an extension, look at the extension in the
Microsoft Edge Add-ons website. Find the specific extension and you will see
the app ID at the end of the URL in the omnibox.
7 Note
You can add an extension to the blocklist that's already installed on a user's
computer. This will disable the extension and prevent the user from re-enabling it.
It won't be uninstalled, just disabled.
Force-install an extension
Use the ExtensionInstallForcelist policy to control which extensions are blocked or
allowed. Use the following steps as a guide to force-install an extension.
The extension is installed silently without user interaction. Also, the user won't be able to
uninstall or disable the extension. This setting overwrites over any blocklist policy that's
enabled.
7 Note
For extensions hosted in the Chrome web store use a string such as:
pckdojakecnhhplcgfflhndiffaohfah;https://clients2.google.com/service/update2/c
rx . For self-hosted extensions use the pattern extension_id;update_url where
update_url points to the location of the update manifest XML file. For example,
mfjlfjaknfckffgjgmdfeheeealceoak;https://file_location.azurewebsites.net/pictu
re_of_the_day.xml .
Use the following steps as a guide to block extensions from an particular store or URL.
1. Open the group policy management editor and go to Administrative Templates >
Microsoft Edge > Extensions > and then select Configure extension management
settings.
2. Enable the policy, then enter the permissions that you want allowed or blocked,
compressing it to a single JSON string.
The next example shows the JSON and compressed JSON string to block from the
Chrome Web Store using its update URL
( https://clients2.google.com/service/update2/crx ).
{
"update_url:https://clients2.google.com/service/update2/crx":{
"
installation_mode":"blocked"
}
}
JSON
{"update_url:https://clients2.google.com/service/update2/crx":
{"installation_mode":"blocked"}}
7 Note
See also
Manage Microsoft Edge extensions in the enterprise
Create a web store to host Microsoft Edge extensions
Reference guide for the ExtensionSettings policy
FAQ for Microsoft Edge Extensions
Microsoft Edge Enterprise landing page
Self-host Microsoft Edge extensions
Article • 08/29/2023
This article provides basic guidance for packaging an extension to host on your own
webstore. It also includes instructions on how to deploy extensions to devices and users
in your organization.
7 Note
Prerequisites
To self-host your own extensions, you need to provide your own web hosting services
for the extensions and their manifest files.
To install a self-hosted extension that's not listed in the Microsoft Edge Add-ons
website, Windows instances must be joined to a Microsoft Active Directory domain. Self-
hosted extensions won't work for Microsoft Entra ID joined devices unless they're
Microsoft Entra hybrid joined.
The following steps assume that you've already created your extension, have some
experience with XML files, have a working knowledge of configuring group policy, and
know how to use the Windows registry.
Publish an extension
Before you publish an extension, it needs to be packed into a CRX (Chrome extension)
file. Use the following steps as a guide to packing an extension as a CRX file.
2. Under Installed extensions, click Pack Extension to create the CRX file.
3. Use the Pack extension dialog to find the directory that has the source for the
extension. Select the directory and then click Pack extension. This creates your CRX
file, along with a PEM file. Save the PEM file because it's needed for making version
updates to the extension. The next screenshot shows the Pack extension dialog for
locating the root directory of the extension.
) Important
Store the PEM file in a safe location because it's the key for the extension and
it's needed for future updates.
4. Drag the CRX file into your extensions window and make sure that it loads.
5. Test the extension and take note of the ID field (this is the CRX ID) and version
number. You'll need this information later. The next screenshot shows a test
extension with its CRX ID.
6. Upload the the CRX file to the host and note the URL of the location it will be
downloaded from. This information is needed for the XML manifest file.
7. To create a manifest XML file with the app/extension ID, download URL, and
version, define the following fields:
XML
8. Upload the completed XML file to a location where it can be downloaded from,
noting the URL. This URL is needed when you install the extension using a group
policy. See Distribute a privately hosted extension.
) Important
The hosting location for the extension doesn't need authentication. It needs
to be accessible by user devices wherever they might be used.
version='1.1' />
3. Create a CRX file that includes the new changes. Go to edge://extensions and
enable Developer mode.
4. Click Pack extension and go to the directory for the extension source.
) Important
Use the same PEM file that was generated and saved the first time the CRX file
was created. If you don't use the same PEM file, the app ID of the extension
changes and the update will be treated as a new extension.
5. Drag and drop the CRX file into the extensions window and verify that it loads. The
extension is disabled after this operation. To enable it add the CRX ID of the
extension to the ExtensionInstallAllowList policy.
7. Replace the old CRX file and XML file with the new files for the updated extension.
The extension's changes will be picked up during the next policy sync cycle. For more
information about updating extensions, see: Update URL and Update manifest.
You can apply these policies to your selected users, devices, or both. Remember though,
that policy updates aren't instantaneous, and it takes time for the policy settings to take
effect.
See also
Manage Microsoft Edge extensions in the enterprise
Use group policies to manage Microsoft Edge extensions
Detailed guide to the ExtensionSettings policy
FAQ for Microsoft Edge Extensions
Microsoft Edge Enterprise landing page
A detailed guide to configuring
extensions using the ExtensionSettings
policy
Article • 07/20/2023
Microsoft Edge offers multiple ways to manage extensions. A common way is to set
multiple policies in one place with a JSON string in the Windows Group Policy Editor or
in the Windows Registry using the ExtensionSettings policy.
7 Note
7 Note
The ExtensionSettings policy can overwrite other policies that you've set elsewhere in
group policy, including the following policies:
ExtensionAllowedTypes
ExtensionInstallBlocklist
ExtensionInstallForcelist
ExtensionInstallSources
ExtensionInstallAllowlist
blocked_install_message If you block users from installing certain extensions, you can specify
a custom message to display in the browser if users try to install
them.
Append text to the generic error message that is displayed on the
Microsoft Edge Add-ons website. For example, you can tell users
how to contact their IT department or why a particular extension is
unavailable. The message can be up to 1,000 characters long.
blocked_permissions Prevents users from installing and running extensions that request
certain API permissions that your organization doesn't allow. For
example, you can block extensions that access cookies. If an
extension requires a permission that you blocked, the users can't
install it. If users previously installed the extension, it will no longer
load. If an extension contains a blocked permission as an optional
requirement, it installs as usual. Then, while the extension is
running, blocked permissions are automatically declined.
For a list of available permissions, see declare permissions.
installation_mode Controls if and how extensions that you specify are added to
Microsoft Edge. You can set the installation mode to one of the
following options:
- allowed : Users can install the extension. If no installation mode is
defined, this setting is the default.
- blocked : Users can't install the extension.
- force_installed : Automatically install the extension without user
interaction. Users can't remove it. You also need to define the
extension download location using "update_url". Note: You can't
use this setting with * because Microsoft Edge wouldn't know which
extension to automatically install.
- normal_installed : Automatically install the extension without user
interaction. Users can disable it. You also need to define the
extension download location using "update_url". Note: You can't
use this setting with * because Microsoft Edge wouldn't know which
extension to automatically install.
- removed : Users can't install the extension. If users previously
installed the extension, Microsoft Edge removes it.
the *.crx file and the page where the download is started from (the
referrer) must be allowed by these patterns. For URL pattern
examples, see the match patterns.
blocked_permissions
installation_mode - only "blocked" , "allowed" , or "removed" are the valid values in
this scope.
runtime_blocked_hosts
blocked_install_message
allowed_types
runtime_allowed_hosts
install_sources
blocked_permissions
minimum_version_required
blocked_install_message
installation_mode - "blocked" , "allowed" , "removed" , "force_installed" , and
"normal_installed" are the possible values.
runtime_allowed_hosts
update_url
override_update_url
runtime_blocked_hosts
toolbar_state
blocked_permissions
installation_mode - only "blocked" , "allowed" , or "removed" are the valid values in
this scope.
The default scope is identified by the asterisk (*). The next example defines a default
scope and an individual extension scope.
JSON
{
"*": {},
"nckgahadagoaajjgafhacjanaoiihapd": {}
}
An extension will only get its settings from one scope. If there's an individual extension
scope for that extension, those will be the settings that apply to that extension. If no
individual extension scope exists, then the extension will use the default scope.
The next JSON example blocks any extension from running on .example.com and blocks
any extension that requires the permission "USB".
JSON
{
"*": {
"runtime_blocked_hosts": ["*://*.example.com"],
"blocked_permissions": ["usb"]
}
}
Compact JSON
JSON
{"*":{"runtime_blocked_hosts":["*://*.example.com"],"blocked_permissions":
["usb"]}}
exception"]}}
{"nckgahadaanghapdoaajjgafhacjaoii": {"installation_mode":
"force_installed","update_url":
"https://edge.microsoft.com/extensionwebstorebase/v1/crx"}}
If the extension you're downloading is hosted on the Chrome Web Store, use the
location in the following JSON example:
{"nckgiihapdoaajjgafhacjgahadaanao": {"installation_mode":
"force_installed","update_url":
"https://clients2.google.com/service/update2/crx"}}
If you're hosting the extension on your own server, use the URL where Microsoft
Edge can download the packed extension (.crx file). JSON example:
{"nckgahadagoaajjgafhacjanaoiihapd": {"installation_mode":
"force_installed","update_url":
"https://edge.microsoft.com/extensionwebstorebase/v1/crx"}}
Tip
Formatting a JSON string correctly can be tricky. Use a JSON checker before
implementing the policy. Or try the early version of Extension Settings Generator
Tool
HKLM\Software\Policies\Microsoft\Edge\
7 Note
It's possible to use HKCU instead of HKLM. The equivalent path can be configured
with Group Policy Object (GPO).
For Microsoft Edge, all settings will start under this key:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\
The next key that you'll create is either the Extension ID for individual scope or an
asterisk (*) for the Default Scope. For example, you'd use the following location in the
registry for settings that apply to Google Hangouts:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\ExtensionSettings\nckgahadagoaa
jjgafhacjanaoiihapd
For settings that apply to the Default Scope (asterisk), use the following location in the
registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\ExtensionSettings\*
Different settings will require different formats, depending on whether they're a string
or an array of strings. Array values require ["value"]. String values can be entered as is.
The following list shows which settings are arrays or strings:
Installation_mode = String
update_url = String
blocked_permissions = Array of strings
allowed_permissions = Array of Strings
minimum_version_required = String
runtime_blocked_hosts = Array of strings
runtime_allowed_hosts = Array of Strings
blocked_install_message = String
See also
Manage Microsoft Edge extensions in the enterprise
Use group policies to manage Microsoft Edge extensions
FAQ for Microsoft Edge Extensions
Microsoft Edge Enterprise landing page
FAQ for Microsoft Edge extensions
Article • 07/20/2023
7 Note
7 Note
See also
Manage Microsoft Edge extensions in the enterprise
Use group policies to manage Microsoft Edge extensions
Create a web store to host Microsoft Edge extensions
Reference guide for the ExtensionSettings policy
Microsoft Edge Enterprise landing page
Configure Microsoft Edge enterprise
sync
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains how admins can configure Microsoft Edge to sync user favorites,
passwords, and other browser data across all signed-in devices.
7 Note
Introduction
Microsoft Edge sync enables users to access their browsing data across all their signed-
in devices. Users can sync the following data:
Favorites
Passwords
Addresses and more (form-fill)
Collections
Settings
Extensions
Open tabs (available in Microsoft Edge version 88 or later)
History (available in Microsoft Edge version 88 or later)
7 Note
Additional device connectivity and configuration data (such as device name, device
make, and device model) is uploaded to support sync functionality.
7 Note
If a user is experiencing a sync issue, they might need to reset sync in Settings >
Profiles > Sync > Reset sync.
Prerequisites
The following prerequisites apply to Microsoft Edge enterprise sync:
Supported environments
Microsoft Edge sync for Microsoft Entra accounts is available for any of the following
subscriptions:
7 Note
7 Note
U Caution
Activating Azure Information Protection will also allow other applications, such as
Microsoft Word or Microsoft Outlook, to protect content with AIP. Any onboarding
control policy that's used to restrict Microsoft Edge sync will also restrict other
applications from protecting content using AIP.
See also
Diagnose and fix Microsoft Edge sync issues
Microsoft Edge enterprise sync FAQ
Microsoft Edge and Enterprise State Roaming
What is Azure Information Protection?
Microsoft Edge Enterprise landing page
Diagnose and fix Microsoft Edge sync
issues
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article provides troubleshooting guidance for the most common sync issues in an
Microsoft Entra ID environment. It also includes troubleshooting steps and the
recommended tools for gathering the logs needed for troubleshooting a sync issue.
If a user is experiencing an issue syncing browser data across their devices, they can
reset sync in Settings > Profiles > Sync > Reset sync. If the sync reset doesn't work, an
admin or support staff member can use the guidance in this article to fix a sync issue.
7 Note
Before you treat an issue as a sync issue, check to see if the user is signed into the
browser with a valid account.
The next screenshot shows an example of an identity error. The error is Last Token Error,
EDGE_AUTH_ERROR: 3, 54, 3ea, which is found in edge://sync-internals under
Credentials.
Basic troubleshooting steps
Before you start troubleshooting, check the Common sync issues to see if any of these
issues apply to your sync problem.
1. Sign in your Office 365 or Microsoft 365 admin portal and verify that your license is
valid.
2. Sign in your Azure portal and verify that your Azure license is valid.
3. Sign out your account on all Microsoft Edge browsers on all the computers and/or
mobile devices - not just the one you're using.
4. Make sure you're on the latest version of Microsoft Edge that supports all the sync
features (at least 98.0.1108.43 (Official build) (64-bit)).
5. Sign back into your profile on Microsoft Edge. We recommend that you do a sync
reset. For more information, see Perform a reset to fix a synchronization problem.
6. Verify that your account is enabled for syncing. On a new tab, go to: edge://sync-
internals/. The Summary section, shown in the next screenshot shows that sync is
enabled.
7. Verify that the device you're on is getting sync'ed. Go to edge://sync-internals/ and
select the Sync Node Browser tab. Open the Device info folder to see which
devices are in the sync list.
9. Check to see if there are any policies that might prevent syncing. Go to
edge://policy/ to see the Policies page. The next screenshot shows an example of
active policies for a signed in user. This page also shows Policy Precedence and
Microsoft Edge Update Policies.
7 Note
1. Verify that the enterprise tenant has one of the supported subscriptions in
Configure Microsoft Edge enterprise sync. To find out which subscription you have,
see What subscription do I have?. If the tenant doesn't have a supported
subscription, they can either purchase Azure Information Protection separately, or
upgrade to one of the supported subscriptions.
3. If step 2 shows that AIP is active but sync still doesn't work, turn on Enterprise
State Roaming (ESR). If you need to enable ESR, see these instructions: Enable
Enterprise State Roaming in Microsoft Entra ID.
7 Note
ESR doesn't need to stay on. You can turn off ESR if this step fixes the issue.
4. Confirm that Azure Information Protection isn't scoped via an onboarding policy.
You can use the Get-AIPServiceOnboardingControlPolicy PowerShell cmdlet to see
if scoping is enabled. Make sure the aIPService PowerShell monitor is installed. You
can get it here: Install the AIPService PowerShell module for Azure Information
Protection. The next two examples show an unscoped configuration and a
configuration scoped to a specific security group.
PowerShell
PS C:\Work\scripts\PowerShell> Get-AIPServiceOnboardingControlPolicy
PowerShell
PS C:\Work\scripts\PowerShell> Get-AIPServiceOnboardingControlPolicy
If scoping is enabled, the affected user should either be added to the security
group for the scope, or the scope should be removed. Scoping can be removed
with the Set-AIPServiceOnboardingControlPolicy PowerShell applet.
3. Try pinging the server endpoint. The server endpoint for a client is available in
edge://sync-internals. The next screenshot shows endpoint information under
Environment Info.
https://edge.activity.windows.com
"Error:GenerateCryptoErrorsForTypes@../../components/sync/driver/data_type_manager_
Last MIP Result = "Success": This error means server data might be encrypted
with a lost key. A data reset is needed to resume sync.
Last MIP Result = "No permissions": It's possibly caused by an Microsoft Entra
ID change or tenant subscription changes. A data reset is needed to resume
sync.
Other errors may mean there's a server configuration issue.
2. If a data reset is needed, see Reset Microsoft Edge data in the cloud.
See also
Microsoft Edge Enterprise Sync
Microsoft Edge enterprise sync FAQ
Microsoft Edge and Enterprise State Roaming
Microsoft Edge Enterprise landing page
Microsoft Edge enterprise sync FAQ
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article answers frequently asked questions about enterprise sync for Microsoft Edge
version 77 or later.
Applying Sync
Managing Sync
See also
Microsoft Edge Enterprise Sync
Microsoft Edge and Enterprise State Roaming
Microsoft Edge Enterprise landing page
On-premises sync for Microsoft Entra ID
users
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains how Microsoft Entra ID users can roam Microsoft Edge favorites and
settings between computers without connecting to Microsoft cloud services.
7 Note
Introduction
Syncing user data in Microsoft Edge normally requires either a Microsoft Account or an
Microsoft Entra account, and a connection to Microsoft cloud services. With on-
premises sync, Microsoft Edge saves an Active Directory user's favorites and settings to
a file that can be moved between different computers. On-premises sync doesn't
interfere with cloud syncing for those profiles that allow it.
How it works
Microsoft Edge allows profiles to be associated with Microsoft Entra accounts, which
can't be used with cloud sync. When on-premises sync is enabled, the data from the AD
profile is saved to a file named profile.pb. By default, this file is stored in
%APPDATA%/Microsoft/Edge. After this file is written, it can be moved between different
computers, and user data will be read and written on each computer. Microsoft Edge
only reads and writes from this file; it's the admin's responsibility to ensure that the file
is moved as needed.
) Important
For on-premises sync, the only supported scenario is syncing using profile.pb.
Roaming files and folders other than profile.pb is unsupported because they might
result in unexpected behavior.
7 Note
Microsoft Edge locks the profile.pb file when on-premises sync is enabled. If folder
redirection is used to share a single profile.pb file between different computers,
then only one instance of Microsoft Edge that uses the shared file can be started.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge and Enterprise State Roaming
Microsoft Edge Enterprise Sync
PDF reader in Microsoft Edge
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
PDF files make up a large part of our day-to-day lives. They come in the form of
contracts and agreements, newsletters, forms, research articles, resumes, and so on.
These files highlight the need for a reliable, secure, and powerful PDF reader that can be
adopted by Enterprises.
Microsoft Edge comes with a built-in PDF reader that lets you open your local pdf files,
online pdf files, or pdf files embedded in web pages. You can annotate these files with
ink and highlighting. This PDF reader gives users a single application to meet web page
and PDF document needs. The Microsoft Edge PDF reader is a secure and reliable
application that works across the Windows and macOS desktop platforms.
7 Note
View and print local, online, and embedded PDF files 79.0.309.71
Inking 80.0.361.48
Highlight 81.0.416.53
View Microsoft Purview Information Protection protected files in the Windows support in
same business tenant 80.0.361.48
Mac support in
81.0.416.53
Constraints
Note the following constraints for the current PDF reader:
XML Forms Architecture (XFA), is a legacy format of forms that isn't supported in
Microsoft Edge.
Documentation related to Accessibility scenarios that currently aren't supported
can be found on the Microsoft Accessibility Conformance Reports blog.
Features
The PDF reader, built into Microsoft Edge, comes with the basic reading and navigation
features, as Zoom, Rotate, Fit to page/width, jump to page, and search, among others.
They can be accessed through a pin-able toolbar at the top of PDF content. This section
gives an overview of some important functions. The next screenshot shows the PDF
reader toolbar.
Table of contents
Table of contents lets users easily navigate through PDF documents that have a table of
contents. When a user clicks the Table of contents icon, a navigation pane that shows a
list of the labeled sections and subsections in the PDF document is shown. The user can
then click any of the labels in the pane to navigate to that section of the document. The
pane stays open for as long as needed and can be closed when the user wants to go
back to reading the document. The next screenshot shows the navigation pane for an
open document.
Page view
Microsoft Edge supports different views for PDF documents in our Dev and Canary
channels. Users can change the layout of a document from a single page view to two
pages that are displayed side by side. To change how the PDF document is being
viewed, users can click the Page View button in the PDF toolbar and then choose either
view they want to use. The two page view is shown in the next screenshot.
Highlight
PDF reader in Microsoft Edge comes with support for adding and editing highlights. To
create a highlight, the user simply needs to select the text, right-click on it, select
highlights in the menu and choose the desired color. Highlights can also be created
using a pen, or keyboard. The next screenshot shows the highlight options that are
available.
Text notes
While reading a PDF file, text notes can be added to text in the file to jot down thoughts
for easy reference later.
Users can add a note by selecting the piece of text they wish to add a note for and
invoking the right-click context menu. Selecting the Add Comment option in the menu
will open a text box where users can add their comments. They can type the comment
and then click the check mark to save the comment.
After a note is added, the selected text will be highlighted, and a comment icon will
appear to indicate the comment. Users can hover over that icon to preview the
comment or click on it to open and edit the note.
Protected PDFs
Microsoft Purview Information Protection enables users to collaborate with others
securely, while adhering to your organization's compliance policies. After a file is
protected, the actions users can take on it are determined by the permissions assigned
to them.
) Important
A license is required for MIP. For more information, see this Microsoft 365
licensing guidance.
These files can be opened directly in the browser, without the need to download any
other software, or install any add-in. This capability integrates the security provided by
MIP directly into the browser, providing a seamless workflow. You can view MIP
Protected files across business tenants. Viewing files using consumer identities currently
is not supported.
In addition to MIP protected files, PDF files in Information Rights Management (IRM)
protected SharePoint libraries can also be opened natively in the browser.
With Microsoft Edge, users can view MIP protected files saved locally, or in the cloud. If
saved locally, the file can be opened directly in the browser. If the file is opened from a
cloud service as SharePoint, the user may need to use the "Open in browser" option.
If the profile that the user is logged into Microsoft Edge with has at least view
permissions to the file, the file will open in Microsoft Edge.
View and validate certificate-based digital signatures
In this digital world, it becomes important to establish the authenticity and ownership of
the content in the document. Certificate-based digital signatures are commonly used in
PDF documents to ensure that the content in the document is the same as what the
author intended it to be, and has not been changed. With Microsoft Edge, you can view
and validate certificate digital signatures in PDFs.
We're actively working on improving the support to address more scenarios, and are
looking forward for feedback about the same.
Accessibility
The PDF reader comes with support for Keyboard accessibility, High contrast mode, and
screen reader support across Windows and macOS devices.
Keyboard Accessibility
Users can use navigate to different parts of the document that a user can interact with,
such as form fields and highlights, using the keyboard. Users can also use Caret mode to
navigate and interact with the PDF files using the keyboard.
Process isolation. PDFs opened from different web sites are completely process
isolated. The browser doesn't have to communicate with any websites, or PDF files
opened from another source. PDF browsing is secure from any attacks that plan to
use compromised PDFs as an attack surface.
Application Guard. With Application Guard, admins can set a list of sites that are
trusted by their organization. If users open any other sites, they are opened in a
separate Application Guard window that runs in its own container. The container
helps protect the corporate network and any data on user's computer from being
compromised.
This protection also applies to any online PDF files that are viewed. Further, any
PDF files that are downloaded from an Application Guard window are stored, and
when needed, re-opened in the container. This helps keeps your environment
secure not just when the file is downloaded, but through its whole lifecycle. For
more information, see Application Guard.
Reliability
Because Microsoft Edge is Chromium-based, users can expect the same level of
reliability that they're used to seeing in other Chromium-based browsers.
Tip
You can make Microsoft Edge the default PDF reader for your organization. To do
this, follow these steps.
We're actively looking at feedback from you about the features you find important. Feel
free to send us feedback through the Microsoft Edge Insider forum.
See also
Microsoft Edge Enterprise landing page
Microsoft 365 Roadmap
Video: Microsoft Edge enterprise grade PDF reader
Set Microsoft Edge as the default
browser
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains how you can set Microsoft Edge as the default browser on Windows
and macOS.
7 Note
Introduction
You can use the Set a default associations configuration file Group Policy or the
DefaultAssociationsConfiguration Mobile Device Management setting to set Microsoft
Edge as the default browser for your organization.
To set Microsoft Edge Stable as the default browser for html files, http/https links, and
PDF files use the following application association file example:
XML
7 Note
7 Note
The default file associations aren't applied if Microsoft Edge isn't installed on the
target device. In this scenario, users are prompted to select their default application
when they open a link or a htm/html file.
The example in the next screenshot shows an associations file named appassoc.xml on a
network share that is accessible from the target device.
7 Note
If this setting is enabled and the user's device is domain-joined, the associations
configuration file is processed the next time the user signs on.
XML
7 Note
Because of this limitation, there are two main methods for setting Microsoft Edge as the
default browser on a macOS. The first option is to flash the device with an image of
macOS where Microsoft Edge has already been set as the default browser. The other
option is to use the Set Microsoft Edge as default browser policy, which prompts the
user to set Microsoft Edge as the default browser.
When using either of these methods, it is still possible for a user to change the default
browser. This is because for security reasons, the default browser preference can't be
blocked programmatically. For this reason, we recommend that you deploy the Set
Microsoft Edge as default browser policy even if you create an image with Microsoft
Edge as the default browser. If the policy is set and a user changes the default browser
from Microsoft Edge the next time they open Microsoft Edge, they will be prompted to
set it as the default.
See also
Plan your deployment of Microsoft Edge
Microsoft Edge Enterprise landing page
Set Microsoft Edge as default browser (Windows 7 and macOS)
Windows 10 – How to configure file associations for IT Pros?
Export or Import Default Application Associations
DISM Overview
DISM - Deployment Image Servicing and Management
Split tunnel VPN support for WebRTC
(Web Real-Time Communication)
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes Microsoft Edge and split tunnel VPN support for WebRTC. This
support lets enterprise customers get the benefit of VPN split tunneling for peer-to-peer
traffic on Microsoft Edge. VPN split tunneling improves peer-to-peer media streaming
quality for users and reduces VPN server load.
7 Note
We've heard about customers needs for routing peer-to-peer user traffic through their
corporate network or cloud infrastructure over VPN. They were frustrated about
the quality of video conference calls of their users on browsers compared to native
applications. As demonstrated by the native experience, VPN split-tunneling for peer-to-
peer traffic can improve the quality of user video calls by routing it through normal
Internet connections instead of VPN. It also can reduce the overall VPN server load by
routing designated traffic off a VPN. Microsoft Edge now brings this peer-to-peer traffic
improvement to enterprise customers.
See also
Microsoft Edge Enterprise landing page
What is Internet Explorer (IE) mode?
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
We created Internet Explorer (IE) mode in Microsoft Edge for organizations that still
need Internet Explorer 11 for backward compatibility with existing websites but also
need a modern browser. This feature makes it easier for organizations to use one
browser, for legacy web/apps or for a modern web/app. This article provides an
introduction to using Microsoft Edge with IE mode.
For an advanced configuration guide, see Configure IE mode for Microsoft Edge .
7 Note
What is IE mode?
IE mode on Microsoft Edge makes it easy to use all of the sites your organization needs
in a single browser. It uses the integrated Chromium engine for modern sites, and it
uses the Trident MSHTML engine from Internet Explorer 11 (IE11) for legacy sites.
When a site loads in IE mode, the IE logo indicator displays on the left side of navigation
bar. You can click the IE logo indicator to display additional information, as shown:
Only those sites that you specifically configure (via policy) will use IE mode, all other
sites will be rendered as modern web sites. For a site to use IE mode, you need to either:
List the site in the Enterprise Mode Site List XML defined in one of these policies:
Microsoft Edge 78 or later, "Configure the Enterprise Mode Site List"
Internet Explorer, "Use the Enterprise Mode IE website list"
7 Note
We only process one Enterprise Mode Site List. The Microsoft Edge site list
policy takes precedence over the Internet Explorer site list policy.
Configure the Send all intranet sites to Internet Explorer group policy and set it to
Enabled (Microsoft Edge 77 or later.)
Prerequisites
The following prerequisites apply to using Microsoft Edge with IE mode.
) Important
To ensure success, install the latest updates for Windows and Microsoft Edge.
Failure to do so will likely cause IE mode to fail.
1. The minimum system updates for the operating systems listed in the next table.
Windows 11
2. The Microsoft Edge administrative template. For more information, see Configure
Microsoft Edge.
3. Internet Explorer 11 enabled in Windows Features.
See also
Microsoft Edge Enterprise landing page
Additional Enterprise Mode information
Enterprise site configuration strategy
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article describes changes to the Enterprise Mode Site List to support Internet
Explorer mode for Microsoft Edge version 77 and later.
For more information on the schema for the Enterprise Mode Site List XML file, see
Enterprise Mode schema v.2 guidance.
7 Note
Configuration strategy
The following steps are part of a site configuration strategy for IE mode:
A neutral site will use the browser where the navigation started - either Microsoft Edge
or IE mode. Configuring neutral sites ensures that all applications using these
authentication servers, both modern and legacy, continue to work.
You can configure neutral sites by setting the Open In dropdown to 'None' in the
Enterprise Mode Site List Manager tool or by directly updating the site list XML:
XML
<site url="login.contoso.com">
<open-in>None</open-in>
</site>
To identify authentication servers, inspect the network traffic from an application using
the IE11 Developer Tools. If you need more time to identify your authentication servers,
you can configure a policy to keep all in-page navigations in IE mode to allow your
users to continue their workflows uninterrupted. To minimize the use of IE mode when
unnecessary, disable this setting once you've identified and added your authentication
servers to the site list. For more information, see Keep in-page navigation in IE mode.
7 Note
Enterprise Mode schema v.1 isn't supported for IE mode integration. If you are
currently using schema v.1 with Internet Explorer 11, you must upgrade to schema
v.2. For more information, see Enterprise Mode schema v.2 guidance.
See also
Microsoft Edge Enterprise landing page
About IE mode
Additional Enterprise Mode information
Configure IE mode policies
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
7 Note
This article applies to Microsoft Edge Stable, Beta and Dev Channels, version 77 or
later.
7 Note
5. Select Enabled.
7 Note
Setting the policy to Disabled implies IE mode is disabled by policy, but can
be set through edge://flags or command line options.
7 Note
For more information about Enterprise Mode Site Lists, see Use the Enterprise Site List
Manager.
7 Note
The Local Intranet zone contains explicitly added sites, but also assigns sites to this
zone using heuristics. This can include dotless host names (e.g. https://payroll) and
sites that the proxy configuration script configures to bypass the proxy. If an
external party controls DNS or proxy, they could potentially force websites into IE
mode.
3. Double-click Send all sites not included in the Enterprise Mode Site List to
Microsoft Edge.
4. Select Enabled
7. Select Enabled.
8. Under Options, select your top three choices for the channel to use - Internet
Explorer will redirect to the highest ranked choice that the user has installed on
that device:
Tip
To find sites that you need to add to your IE mode site list, see Configure IE
mode for Microsoft Edge guide. If you already have a site list, the tools in
this guide will help you apply it to the right users.
See also
Microsoft Edge Enterprise landing page
About IE mode
Additional Enterprise Mode information
Cloud Site List Management for Internet
Explorer (IE) mode
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains how to configure and use Cloud Site List Management for Internet
Explorer (IE) mode through the Microsoft 365 Admin Center.
7 Note
This user experience is currently only available to worldwide and GCC cloud
instances.
Overview
As you transition your workflows and applications from IE11 to IE mode, Cloud Site List
Management lets you manage your site lists for IE mode in the cloud. You can work with
site lists using the Microsoft Edge Site Lists experience in the Microsoft 365 Admin
Center.
Prerequisites
The following prerequisites apply to this feature.
) Important
7 Note
If you don't see this option on the Org settings page while we are rolling out
to all production instances, you'll need to opt in to Targeted release. If you
don't see the Microsoft Edge site lists option, see this FAQ: I don't see the
"Microsoft Edge site lists" option in the "Org settings" page on Microsoft
365 Admin Center. Why is that?.
1. To configure devices to use a published site list, select the site list you want to
assign to devices.
2. On the resulting page, copy the Site list ID.
3. For the device group you pick, select Enabled and enter the Site list ID in the
Configure the Enterprise Mode Cloud Site List policy.
4. You can run gpupdate/force from the Command Prompt to update the device with
the policy or wait for the group policy to take effect. After the policy is updated,
you can verify that Microsoft Edge is reading the cloud site list by going to
edge://compat/enterprise . You need to be signed into Microsoft Edge.
7 Note
After publishing a site list the first time and updating group policy, you need to
restart Microsoft Edge. Wait 60 seconds or select the Force Update button on
edge://compat/enterprise . When publishing updates to an already associated
site list, there may be an older version of the site list in the cache. This entry will be
refreshed after 60 seconds. For more information, see What happens if users log
out of Microsoft Edge?.
7 Note
Persistent-cookies, which have been created with an Expires-attribute , can't be
shared between Microsoft Edge and Internet Explorer.
If you have hybrid scenarios that require your site list to be hosted on-premises, you can
export your site list from the Microsoft 365 Admin Center. Use the following steps as a
guide for managing site list content.
3. Enter the site address and pick the engine that should be used to open the site.
Add comments as needed and then select Save.
7 Note
The Status column for any entries added to a published site list will show
Addition pending. If you navigate to the list of site lists by selecting Microsoft
Edge site lists at the top of the screen, you'll see that the Published Status
column shows Changes pending publish to indicate that latest updates to the
site list need to be published in order for users to receive them. You can use
the Filter button (next to the Search box) to select Addition pending to see all
the added entries that are pending publication.
1. Pick the site entry that you'd like to delete from the site list. Select Delete site.
3. After you see confirmation that a site entry has been deleted, it will stay on the list
until the site list is published to the cloud location. You can view the list of deleted
sites before publishing by selecting the Filter button and filtering for sites in the
Delete pending state.
7 Note
The Status column for any entries deleted from a published site list will show
Delete pending. If you navigate to the list of site lists by selecting Microsoft
Edge site lists at the top of the screen, you'll see that the Published Status
column shows Changes pending publish to indicate that latest updates to the
site list need to be published in order for users to receive them. You can use
the Filter button (next to the Search box) to select Delete pending to see all
deleted entries that are pending publication.
Select the site entry that you want to see the change history for, and then select
View history.
1. Pick a site entry that you'd like to copy to another list. Select Copy to more lists.
2. Select one or more site lists you'd like to copy to from the dropdown list.
4. After you see confirmation that a site entry has been copied, it will stay on the site
list you copied it from. It will also appear on the site list(s) you copied it to.
7 Note
The Status column for any entries copied to a published site list will show
Addition pending. If you navigate to the list of site lists by selecting Microsoft
Edge site lists at the top of the screen, you'll see that the Published Status
column shows Changes pending publish to indicate that latest updates to the
site list need to be published in order for users to receive them. You can use
the Filter button (next to the Search box) to select Addition pending to see all
the added entries that are pending publication.
Add a shared session cookie to the site list
You can add individual shared session cookies to any site list. After adding shared
cookies to the list, you can use the predefined filters using the Filter button (next to the
Search box) to view updates to the list.
7 Note
The Status column for any entries added to a published site list will show Addition
pending. If you navigate to the list of site lists by selecting Microsoft Edge site lists
at the top of the screen, you'll see that the Published Status column shows
Changes pending publish to indicate that latest updates to the site list need to be
published for users to receive them. You can use the Filter button (next to the
Search box) to select Addition pending to see all the added entries that are
pending publication.
1. Pick the entry that you'd like to delete from the site list. Select Delete shared
cookie.
2. Select Delete in the dialog pop-up.
3. After you see confirmation that an entry has been deleted, it will stay on the list
until the site list is published to the cloud location. You can view the list of deleted
shared cookies before publishing by selecting the Filter button and filtering for
cookies in the Delete pending state.
7 Note
The Status column for any entries deleted from a published site list will show
Delete pending. If you navigate to the list of site lists by selecting Microsoft Edge
site lists at the top of the screen, you'll see that the Published Status column shows
Changes pending publish to indicate that latest updates to the site list need to be
published for users to receive them. You can use the Filter button (next to the
Search box) to select Delete pending to see all deleted entries that are pending
publication.
Select the entry that you want to see the change history for, and then select View
history.
1. Pick an entry that you'd like to copy to another list. Select Copy to more lists.
2. Select one or more site lists you'd like to copy to from the dropdown list.
3. Select Copy cookie at the bottom of the panel.
4. After you see confirmation that a site entry has been copied, it will stay on the site
list you copied it from. It will also appear on the site list(s) you copied it to.
7 Note
The Status column for any entries copied to a published site list will show Addition
pending. If you navigate to the list of site lists by selecting Microsoft Edge site lists
at the top of the screen, you'll see that the Published Status column shows
Changes pending publish to indicate that latest updates to the site list need to be
published in order for users to receive them. You can use the Filter button (next to
the Search box) to select Addition pending to see all the added entries that are
pending publication.
7 Note
Only the last 3 published versions of a site list are saved. When you publish more
than 3 versions, the saved version with the lowest version number will be
permanently deleted, and you will no longer be able to restore that version. If you
want to keep a copy of a site list, you should export it before publishing a new
version.
1. On the Microsoft Edge site lists page, select the list that you'd like to restore to a
previous version.
3. You can view the contents of a previous version of the site list. You can also export
it if you want to save a copy by selecting Export in the message bar.
4. After picking the version you want to restore, select Restore in the message bar.
5. If you have unpublished changes in the current version of the site list, you can
choose to include them by selecting the checkbox in the panel.
7 Note
If you don't include the unpublished changes, they will be lost when you
restore the previous version.
6. Select Restore at the bottom of the panel to restore the previous version.
1. Pick the entry that you want to add. Select Add to site lists.
2. Select one or more site lists to add to from the dropdown. Pick the engine that
should be used to open the site and add comments as needed.
7 Note
The status for this entry will update to Resolved because it was Added. This
site will now appear on the site list(s) you selected.
1. Pick an entry that you want to pause feedback on. Select Pause Feedback.
2. Add comments as needed and select how long you'd like to pause feedback for.
7 Note
The status for this entry will update to Resolved because it was Paused. If you
paused for 30 days, then after 30 days if there's any incoming feedback, the
entry's status will refresh back to Pending for you to act on.
7 Note
Select the entry that you want to see the change history for, and then select
Feedback history in the side panel.
FAQ
See also
About IE mode
Microsoft Edge Enterprise landing page
Configure local site list for Internet
Explorer (IE) mode
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article explains how to configure easy access to Internet Explorer mode (IE mode)
and allow the use of local site lists in your organization.
7 Note
Prerequisites
1. Windows updates
Windows 11
Windows 10, version 2004; Windows 10, version 20H2 and Windows 10,
version 21H - KB5005260 and KB5005101 or later
Overview
IE mode is powered by the configuration of the Enterprise Mode Site List. While you're
identifying and configuring sites on the site list to use IE mode, your users no longer
need to wait or fall back to the standalone IE11 application.
Starting with Microsoft Edge version 92, repeated access to unconfigured IE mode sites
is easier. Users can reload sites in IE mode. They can add these sites to their local site list
to automatically render in IE mode for 30 days, while the organization's site list gets
updated. When IE11 is disabled in your environment, your users are no longer solely
dependent on the organization's site list.
You can configure this experience through group policies for your organization.
7 Note
An unconfigured site is one that requires IE mode but isn't configured to open in IE
mode in the Enterprise Mode Site List.
7 Note
1. If you have enabled IE mode testing through the
InternetExplorerIntegrationTestingAllowed policy, you will see this setting, but it
will be greyed out unless you explicitly enable the
InternetExplorerIntegrationReloadInIEModeAllowed policy.
When this setting is enabled, users can reload a site in IE mode by selecting Settings
and more (the ellipses icon ...) > Reload in Internet Explorer mode. Users can also
select Reload tab in Internet Explorer mode when they right-click on a tab or choose
Open link in new Internet Explorer mode tab when they right-click on a link.
The Reload in Internet Explorer mode icon can be pinned to the toolbar. The toolbar
button allows users to easily enter and exit IE mode and can be managed through the
edge://settings/appearance URL.
7 Note
If the user is on a site that's already in the organization's Enterprise Mode Site List,
options to Reload in (or Exit) Internet Explorer mode will be visible but greyed out.
When the option is selected, the site reloads in IE mode. The IE mode indicator icon is
visible to the left of the address bar. The flyout shows an option that users can toggle to
Open the page in Compatibility view which adds the page to the Internet Explorer
Compatibility view settings list and refreshes the page. Also, there's an option that users
can toggle to Open the page in Internet Explorer mode next time. This adds the
specific page the user is on to the local site list and will automatically open in IE mode
for the next 30 days.
After a site has been reloaded in IE mode, "in-page" navigation will stay in IE mode (for
example, a link, script, a form on the page, or a server-side redirect from another "in-
page" navigation).
While in IE mode, users will see a banner indicating they are in IE mode, the option to
Leave IE mode,, and to pin the IE mode icon to the toolbar (if it isn't pinned already).
Users can choose to exit from IE mode using the Leave button on the banner, the
pinned IE mode icon or Settings and more (the ellipses icon ...) > Exit Internet Explorer
mode, otherwise Microsoft Edge will automatically exit from IE mode when a navigation
that isn't "in-page" occurs (for example, using the address bar, the back button, or a
favorite link).
Entries remain on the local site list for a default period of 30 days. We recommend you
configure legacy sites for your organization in the Enterprise Mode Site List. The local
site list will ensure that users can continue their workflow without being interrupted
while the organization's site list gets updated. On day 31, when users navigate to the
site, they'll see a banner explaining that the site will no longer load in IE mode. Users
can add it back to the local site list if they so choose.
Policy:
InternetExplorerIntegrationReloadInIEModeAllowed
This policy corresponds to the Microsoft Edge setting "Allow sites to be reloaded in
Internet Explorer mode". You can access this setting by going to the
edge://settings/defaultbrowser URL.
If you enable this policy, users can reload a site in IE mode by selecting Settings
and more (the ellipses icon ... > Reload in Internet Explorer mode. Users can also
select Reload tab in Internet Explorer mode when they right-click on a tab, or
choose Open link in new Internet Explorer mode tab when they right click on a
link. Users can optionally tell Microsoft Edge to use IE mode for the site in the
future. This choice will be remembered for a default of 30 days and can be
managed using the policy InternetExplorerIntegrationLocalSiteListExpirationDays.
If you disable this policy, users won't be allowed to reload an unconfigured site in
IE mode.
If you don't configure this policy, we'll show users options to reload unconfigured
sites in IE mode depending on recent Internet Explorer 11 usage.
Note that this policy takes precedence over how you configured the
InternetExplorerIntegrationTestingAllowed policy and that policy will be disabled.
Policy:
InternetExplorerIntegrationLocalSiteListExpirationDays
This policy can be used to adjust the number of days that a site remains on the local site
list for users.
If you disable or don't configure this policy, a default value of 30 days is used.
If you enable the policy, you must enter a value between 0-90 days to keep the site
on a user's local site list.
7 Note
The local site list currently doesn't sync across devices. This improvement is
currently in our backlog and we'll update this feature when it's available.
See Also
Disable Internet Explorer 11 - Disable Internet Explorer 11
Configure IE mode policies - Configure IE mode Policies
Disable Internet Explorer 11
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
Prerequisites
The following Windows updates and Microsoft Edge software are required:
Windows updates
Windows 10, version 21H1 or later
Windows 10, version 2004; Windows Server version 2004; Windows 10, version
20H2; Windows Server version 20H2: KB4598291 or later
Windows 10 version 1909: KB4598298 or later
Windows Server 2019; Windows 10 Enterprise 2019 LTSC: KB4598296 or later
Windows Server 2016; Windows 10 Enterprise 2016 LTSB: KB4601318 or later
Windows 10 Enterprise 2015 LTSB: KB4601331 or later
Windows 8.1; Windows Server 2012 R2: KB4601384 or later
Windows Server 2012: KB4601348 or later
Overview
For organizations that require Internet Explorer 11 (IE11) for legacy compatibility,
Internet Explorer mode (IE mode) on Microsoft Edge provides a seamless, single browser
experience. Users can access legacy applications from within Microsoft Edge without
having to switch back to IE11.
After you configure IE mode, you can disable IE11 as a standalone browser without
affecting IE mode functionality across your organization using group policy.
7 Note
If you need the standalone IE11 app for specific sites, and want to redirect all other
browser traffic to Microsoft Edge, you can configure the Send all sites not included
in the site list to Microsoft Edge policy to redirect sites from IE to Microsoft Edge.
IE11 icons on the Start Menu and on the task bar will be removed.
When users try to launch shortcuts or file associations that use IE11, they will be
redirected to open the same file/URL in Microsoft Edge.
When users try to launch IE11 by directly invoking the iexplore.exe binary,
Microsoft Edge will launch instead.
As part of setting the policy for this experience, you can optionally show a redirect
message for each user who tries to launch IE11. This message can be set to display
"Always" or "Once per user". By default, the redirect message shown in the next
screenshot is never shown.
If your Enterprise Mode Site List contains applications that are configured to open in the
IE11 app and you disable IE11 with this policy, they will open in IE mode on Microsoft
Edge.
7 Note
There was a known issue with the user flow when a site is configured to open in the
IE11 application and the disable IE11 policy is set. The issue has been fixed in
Microsoft Edge versions 91.0.840.0 or later.
1. Ensure you have the pre-requisite operating system updates. This step will update
the ADMX files on your machine directly (specifically inetres.adml and
inetres.admx). Please note that if you want to update your Central Store, you will
need to copy over the .adml and .admx files from a machine that has the pre-
requisite updates or download the latest Windows 10 Admin templates from
here . For more information, see Create and manage Central Store
5. Select Enabled.
See also
Microsoft Edge Enterprise landing page
About IE mode
Additional Enterprise Mode information
Enterprise Site Discovery Step-by-Step
Guide
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article provides a step-by-step guide to using Enterprise Site Discovery with
Microsoft Endpoint Configuration Manager.
Tip
Unless your environment requires using the steps in this guide, we recommend that
you use the Microsoft Edge deployment wizard and the script it generates to
configure Enterprise Site Discovery.
Enterprise Site Discovery can help you configure your Enterprise Mode Site List.
Enterprise Site Discovery will help you:
Discover which sites are using legacy document modes. Unless these sites are
detecting modern browsers and providing different HTML, they probably need to
use IE mode.
Discover which sites are using ActiveX controls. Microsoft Edge doesn't support
ActiveX controls. Unless these sites are detecting modern browsers and providing
different HTML, they probably need to use IE mode.
7 Note
This article applies to Microsoft Edge Stable, Beta and Dev Channels, version 77 or
later.
Prerequisites
This guide assumes you're experienced with using Microsoft Endpoint Configuration
Manager and have the following services and roles installed:
From the Enterprise Site Discovery Setup and Configuration Package, extract the
contents to a folder in your definitive software library file share. Example:
\\DSL\EnterpriseSiteDiscovery.
dos
7 Note
The script supports using command line switches for -ZoneAllowList and -
SiteAllowList . For this step-by-step, we will configure these options via
group policy.
After creating the package, double-click on the package name Enable Site Discovery to
view its properties. For the After running property, select Configuration manager
restarts computer. WMI data collection will start after the devices reboot.
7 Note
You can configure the amount of time a user has to restart the device as described
in the client settings documentation.
To confirm that data collection's working, visit a couple of websites and run the
following PowerShell command to verify that data's being populated in the WMI
namespace.
PowerShell
You can pick the zones where you want to collect site data:
2. Select Enabled.
3. Set the Zone Mask to indicate which of the following zones to enable site
discovery for.
7 Note
Examples: Zone Mask 2: 00010 will collect data for the Local Intranet zone only
Zone Mask 6: 00110 will collect data for Intranet and Trusted site zones only
You can also limit the domains for which to collect site data:
1. In the Configuration Manager console, choose Administration > Client Settings >
Default Client Settings.
2. On the Home tab's Properties group, choose Properties.
3. In the Default Client Settings dialog box, choose Hardware Inventory.
4. In the Device Settings list, choose Set Classes.
5. In the Hardware Inventory Classes dialog box, choose Add.
6. In the Add Hardware Inventory Class dialog box, select Connect.
7. In the Connect to Windows Management Instrumentation (WMI) dialog box,
enter the name of a computer where Enterprise Site Discovery is configured. If
you're connecting to another computer, you'll need credentials with permission to
access WMI.
8. In the WMI Namespace text box, enter root\cimv2\IETelemetry.
9. Choose Connect.
10. In the Add Hardware Inventory Class dialog box, in the Inventory classes list,
select the WMI classes IESystemINfo, IEUrlInfo, and IECountInfo.
11. Select OK to close the Class qualifiers dialog and the other open dialogs.
After the client updates settings from the management point, data will be reported
when the next hardware inventory runs (by default every seven days).
7 Note
Ensure that you select Microsoft SQL Server as the Data Source. Report Builder
defaults to Microsoft SQL Server Analysis Services as the data source.
7. In the Connection Properties window, select Server Name and enter the name of
the Configuration Manager server. Then, in Select or enter a database name select
the name of the Configuration Manager database from the dropdown list.
8. Select OK to close the Connection Properties window.
9. Select Test Connection to test the connection. If the connection's successful, select
OK to close the Data Source Properties window.
10. Repeat Steps 5 through 9 for Data Source 2.
11. Expand Datasets and double-click DataSet1.
12. In the Dataset Properties window, click in the Query: textbox. Copy the query to
Notepad and then find and replace CM_A1B with the database name you selected
in Step 7. Paste the updated query into the Query: textbox.
13. Repeat steps 11 through 12 for DataSet2, DataSet3, and DataSet4.
14. In the Home tab of the ribbon, select the Run button to test the report.
15. Save the report and close Microsoft Report Builder.
16. Rename the report file to Site Discovery.rdl
1. In the Configuration Manager console, choose Monitoring > Reporting > Reports
> Enterprise Site Discovery
2. Double-click on a report to view it.
On the Standard Program page, enter the following command line to disable Site
Discovery on the device:
dos
See also
Microsoft Edge Enterprise landing page
About IE mode
Additional Enterprise Mode information
Additional Enterprise Site Discovery information
Enterprise Site List Manager in
Microsoft Edge
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article explains how to enable access to and use the Enterprise Site List Manager in
Microsoft Edge to create, edit and export your Enterprise Mode Site List for Internet
Explorer (IE) mode.
7 Note
This article applies to Microsoft Edge version 89 or later. The shared cookies
capability is available on Microsoft Edge version 101 or later.
Overview
The Enterprise Site List Manager is an in-browser version of the standalone Enterprise
Mode Site List Manager tool that lets you create, edit, and export your organization's
site list. You can access the in-browser Enterprise Site List Manager at
edge://compat/SiteListManager.
Future improvements to the tool for Internet Explorer mode will be available through
Enterprise Site List Manager (edge://compat/SiteListManager) in Microsoft Edge. The
standalone tool will continue to be available in the Download Center but won't get any
feature updates.
Enabling access to Enterprise Site List Manager
You can configure access to the site list manager tool by using the
EnterpriseModeSiteListManagerAllowed group policy.
If this policy is enabled, your users will see an option named Enterprise Site List Manager
on the left navigation pane in edge://compat. If the policy is disabled, users won't see
the entry point to Enterprise Site List Manager in the left navigation pane, which is the
default behavior.
7 Note
You can only add specific URLs, not Internet or Intranet Zones.
2. Enter the URL for the website you'd like to add, for
example: <domain>.com or <domain>.com/<path> in the URL box.
The path within a domain can require a different compatibility mode from the
domain itself. For example, the domain might look fine in the default IE11 browser,
but the path might have problems and require the use of Enterprise Mode. If you
added the domain previously, your original compatibility choice is still selected.
However, if the domain is new, IE8 Enterprise Mode is automatically selected.
Enterprise Mode takes precedence over document modes, so sites that are already
included in the Enterprise Mode site list won't be affected by this update. These
sites will continue to load in Enterprise Mode. For more specific information about
using document modes, see Fix web compatibility issues using document modes
and the Enterprise Mode site list.
6. Type any comments about the website into the Comment box. Administrators can
only see comments while they're in this tool and these comments are retained in
the site list xml.
2. Enter the domain you'd like to add in the Domain box. Enter the name of the
cookie in the Cookie Name box.
6. Enter any comments about the shared cookie in the Comment box.
7 Note
This file includes all your URLs and shared cookies and should be stored
somewhere safe.
You can save the file locally or to a network share. However, you must make sure you
deploy it to the location specified in your registry key. For more information, see Turn on
Internet Explorer mode and use a site list.
If you want to replace all the contents in the editor, select the ellipsis (…) and then
choose Clear list. After you clear the editor, use the following steps to import the site
list.
Supported formats for Import are .xml, .emie, or .txt containing the v.2 schema for
Enterprise Mode Site List. See Enterprise Mode schema v.2 guidance.
3. Select Load to add the sites or shared cookies from the file to the editor.
You can save the file locally or to a network share. However, you must make sure you
deploy it to the location specified in your registry key. For more information, see Turn on
Internet Explorer mode and use a site list.
1. In the Enterprise Site List Manager, select the ellipsis (…) and choose Edit site for
the URL you want to edit.
2. You can edit any attribute of the site entry except the URL. Select Save after you
finish editing.
7 Note
You can save the file locally or to a network share. However, you must make sure you
deploy it to the location specified in your registry key. For more information, see Turn on
Internet Explorer mode and use a site list.
1. In the Enterprise Site List Manager, select the ellipsis (…) and choose Edit cookie
for the domain you want to edit.
2. You can edit any attribute of the site entry except the Domain. Select Save after
you finish editing.
7 Note
If you want to delete a shared cookie entry, choose Delete shared cookie in step 1.
To search, type part of the URL or domain into the search box in the top right-hand
corner of the editor.
See also
Microsoft Edge Enterprise landing page
About IE mode
Enterprise Mode schema v.2 guidance
Additional Enterprise Mode information
Keep in-page navigation in Internet
Explorer mode
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
You can use this policy as a temporary solution to force all in-page navigation from
Internet Explorer mode (IE mode) sites to stay in IE mode.
An in-page navigation is started from a link, a script, or a form on the current page. It
can also be a server-side redirect of a previous in-page navigation attempt. Conversely,
a user can start a navigation that isn't in-page that's independent of the current page in
several ways by using the browser controls. For example, using the address bar, the back
button, or a favorite link.
7 Note
Prerequisites
The following Windows updates are required for this policy:
Windows 11
Windows 10 version 1909 & 1903, Windows Server version 1909 & 1903
(KB4532695 )
Windows 10 version 1809, Windows Server version 1809, Windows Server 2019
(KB4534321 )
Windows 10 version 1803 (KB4534308 )
Windows 10 version 1709 (KB4534318 )
If you enable this policy, we recommend that you disable it after you've identified all the
authentication servers and added them to the site list as neutral. This action ensures that
your modern sites never inadvertently render in IE mode.
4. Select Enabled
5. Choose one of the following options from the dropdown list:
Default - Only sites configured to open in Internet Explorer mode will open in
that mode. Any site not configured to open in Internet Explorer mode will be
redirected back to Microsoft Edge.
Keep only automatic navigations in Internet Explorer mode - Use this
option if you want the default experience except that all automatic
navigations (such as 302 redirects) to unconfigured sites will be kept in
Internet Explorer mode.
Keep all in-page navigation in Internet Explorer mode (Least
Recommended) - All navigations from pages loaded in IE mode to
unconfigured sites are kept in Internet Explorer mode.
See also
Microsoft Edge Enterprise landing page
Cookie sharing between Microsoft Edge
and Internet Explorer
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article explains how to configure session cookie sharing between a Microsoft Edge
process and an Internet Explorer process, while using Internet Explorer mode.
7 Note
Prerequisites
To share session cookies from Microsoft Edge to Internet Explorer:
Windows updates
Windows 11
Windows 10 version 2004, Windows Server version 2004 - KB4571744 or higher
Windows 10 version 1909, Windows Server version 1909 – KB4566116 or higher
Windows 10 version 1903, Windows Server version 1903 – KB4566116 or higher
Windows 10 version 1809, Windows Server version 1809, and Windows Server
2019 - KB4571748 or higher
Windows 10 version 1803 – KB4577032 or higher
Windows 10 Enterprise 2016 LTSC and Windows Server 2016 - KB4580346 or
higher
Windows 10 Enterprise 2015 LTSB - KB4580327 or higher
Windows 8.1 and Windows Server 2012 R2 - KB4586768 or higher
Windows updates
Windows 11 - KB5010414 or higher
Windows Server 2022 - KB5010421 or higher
Windows 10 version 20H2 - KB5010415 or higher
Windows 10 version 21H1 - KB5010415 or higher
Windows 10 version 21H2- KB5010415 or higher
Windows 10 version 1809, Windows Server version 1809, and Windows Server
2019 - KB5028168 or higher
Overview
A common configuration in large organizations is to have an application that works on a
modern browser link to another application, which might be configured to open in
Internet Explorer mode with Single Sign On (SSO) enabled as part of the workflow.
By default, the Microsoft Edge and Internet Explorer processes don't share session
cookies, and this lack of sharing can be inconvenient in some cases. For example, when
a user has to reauthenticate in Internet Explorer mode or when signing out of a
Microsoft Edge session doesn't sign out of the Internet Explorer mode session. In these
scenarios, you can configure specific cookies set by SSO to be sent from Microsoft Edge
to Internet Explorer so the authentication experience becomes more seamless by
eliminating the need to reauthenticate.
7 Note
Before Microsoft Edge version 99, session cookies can only be shared from
Microsoft Edge to Internet Explorer. Starting with Microsoft Edge version 99,
sharing session cookies in reverse (from Internet Explorer to Microsoft Edge) is
possible.
7 Note
Persistent cookies, which have been created with an Expires-attribute, are not in
scope for this feature and cannot be shared between Microsoft Edge and Internet
Explorer.
The first time an Internet Explorer mode tab is created in a Microsoft Edge session, all
matching cookies are shared to the Internet Explorer session. After that, anytime a
cookie that matches a rule is added, deleted, or modified it's sent as an update to the
Internet Explorer session. The set of shared cookies is also reevaluated when the site list
is updated.
Element Description
OR
<shared-cookie
domain=".contoso.com"
name="cookie1" source-
engine="Both"></shared-cookie>
Sharing example
XML
<site-list version="1">
<shared-cookie domain=".contoso.com" name="cookie1"></shared-cookie>
<shared-cookie host="subdomain.contoso.com" name="cookie2" path="/a/b/c">
</shared-cookie>
<shared-cookie host="subdomain.contoso.com" name="cookie3" source-
engine="MSEdge"></shared-cookie>
</site-list>
See also
About IE mode
Configurable sites information
Additional Enterprise Mode information
Microsoft Edge Enterprise landing page
Learn about Configurable sites in IE
mode
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains the Configurable sites feature of the Enterprise Mode Site List when
using IE mode in Microsoft Edge.
Prerequisites
Windows updates
Windows 11
Windows 10 version 1909, Windows server version 1909 – KB4550945 or higher
Windows 10 version 1903, Windows server version 1903 – KB4550945 or higher
Windows 10 version 1809, Windows Server version 1809, and Windows Server
2019 - KB4550969 or higher
Windows 10 version 1803 – KB4550944 or higher
Windows 10 version 1607, Windows Server 2016 - KB4556826 or higher
Windows 10 initial version, July 2015 - KB4550947 or higher
Windows 8.1 – KB4556798 or higher
Overview
Configuring sites needing IE mode in the Enterprise Mode Site List will work well for
most environments with legacy applications. However, in some cases this approach isn't
the best to configure a subset of sites to open in IE mode without rendering an entire
domain in IE mode. For example, when your environment contains both modern and
legacy applications running on a single server and you would like the flexibility to render
only the legacy applications in IE mode and the remaining applications to render in
Microsoft Edge mode.
The solution is to use the Configurable sites feature of the Enterprise Mode Site List.
When the feature is enabled, Microsoft Edge will allow sites with the "configurable" tag
to participate in IE mode engine determination.
Example:
<site-list version="1">
<site url="app.com">
<open-in>Configurable</open-in>
</site>
</site-list>
When the Configurable sites feature is enabled, the following behavior occurs:
1. When making a request to a Configurable site, Microsoft Edge will send the HTTP
request header " X-InternetExplorerModeConfigurable: 1 ".
2. A Configurable site may send a redirect response (for example, HTTP 302) with the
HTTP response header " X-InternetExplorerMode: 1 " to request that Microsoft
Edge loads the site in IE mode.
3. The target of the redirect (that is, the value of the Location response header) must
also be a Configurable or Neutral site, otherwise the IE mode response header will
be ignored. It's expected that the target of the redirect will usually be the same as
the original URL. However, it doesn't have to be.
7 Note
The redirect response is subject to caching according to Microsoft Edge's
normal HTTP caching behavior for redirects.
1. When making a request to a Configurable site, IE mode tabs will send the HTTP
request header " X-InternetExplorerModeConfigurable: 1 ", the same as Microsoft
Edge tabs.
2. A Configurable site might send a redirect response (for example, HTTP 302) with
the HTTP response header " X-InternetExplorerMode: 0 " to request that the
navigation switch back to Microsoft Edge mode.
3. The target of the redirect (that is, the value of the Location response header) must
also be a Configurable or Neutral site, otherwise the IE mode response header will
be ignored. It's expected that the target of the redirect will usually be the same as
the original URL. However, it doesn't have to be.
7 Note
Tip
See also
About IE mode
Additional Enterprise Mode information
Microsoft Edge Enterprise landing page
Associate file extensions with Internet
Explorer mode
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article explains how to associate Microsoft Edge with Internet Explorer mode with
file extensions for desktop applications.
7 Note
7 Note
You can set specific file extensions to open in Internet Explorer mode by default
using the policy to Set a default associations configuration file. For more
information, see Policy CSP - ApplicationDefaults.
1. Define a new ProgID with the Microsoft Edge channel to use to open with Internet
Explorer mode. The ProgID includes the application name and Icon and the full
path to msedge.exe.
markdown
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\Application]
"ApplicationCompany"="Microsoft Corporation"
"ApplicationName"="Microsoft Edge with IE Mode"
"ApplicationIcon"="C:\\<edge_installation_dir>\\msedge.exe,0"
"AppUserModelId"=""
markdown
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\DefaultIcon]
@="C:\\<edge_installation_dir>\\msedge.exe,4"
2. Configure shell updates to pass the command line needed to open with IE mode.
markdown
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\shell\open\command]
@="\"C:\\<edge_installation_dir>\\msedge.exe\" -ie-mode-file-url -- \"%1\""
3. Finally, associate the .mht file extension with a new ProgID. Add your ProgID as a
value name, with the value type of REG_SZ.
markdown
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileEx
ts\.mht\OpenWithProgids]
"MSEdgeIEModeMHT"=hex(0):
After you set the keys described in the previous example, your users will see another
option on the Open with menu to open an .mht file using Microsoft Edge <channel>
with IE mode.
Registry Example
You can save the following code snippet as a .reg file and import it into the registry.
markdown
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileEx
ts\.mht\OpenWithProgids]
"MSEdgeIEModeMHT"=hex(0):
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT]
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\Application]
"ApplicationCompany"="Microsoft Corporation"
"ApplicationName"="Microsoft Edge with IE Mode"
"ApplicationIcon"="C:\\<edge_installation_dir>\\msedge.exe,0"
"AppUserModelId"=""
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\DefaultIcon]
@="C:\\<edge_installation_dir>\\msedge.exe,4"
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\shell]
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\shell\open]
[HKEY_CURRENT_USER\SOFTWARE\Classes\MSEdgeIEModeMHT\shell\open\command]
@="\"C:\\<edge_installation_dir>\\msedge.exe\" -ie-mode-file-url -- \"%1\""
You can define file types this option should apply to, by specifying file extensions in this
policy Open local files in Internet Explorer mode file extension allow list.
See also
About IE mode
Configurable sites information
Additional Enterprise Mode information
Setting file type associations
Microsoft Edge Enterprise landing page
Internet Explorer (IE) mode
troubleshooting and FAQ
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
7 Note
This article provides troubleshooting tips and FAQ for Microsoft Edge version 77 or later.
7 Note
We also recommend our Microsoft Edge + Internet Explorer mode Getting Started
guide and our IE mode blog series .
There's also the next video, which provides IE mode troubleshooting tips and tricks.
Symptoms
Users will experience the following symptoms:
Sizing and positioning of page elements might be off or they might be missing
Some functionality might be lost or not work as expected. For example, buttons
that worked with Internet Explorer don't do anything or return an error.
The Emulation tab shows two pieces of information to focus on: the Document mode
(1), and the text below the dropdown list (2). This information can help explain why we
are in the 11 (Default) mode for the page or site we're looking at.
There are different messages that can be displayed for the Document mode, and in our
example they are:
The two X-UA-Compatible options indicate that either the webpage or the web server
where the site is hosted is showing the document mode that should be used by the
browser.
We want to honor the document mode in nearly all cases. To do that, we need to select
one of the following modes in the IE mode site list entry for the site:
Default
IE8 Enterprise
IE7 Enterprise
These options respect the webpage or web server directives. Remember that we need to
select an option that includes the specified document mode. In the screenshot example,
because the specified document mode is 11, we'd select "Default" because IE8
Enterprise and IE7 Enterprise don't support IE 11 document mode.
If the Document mode indicates that one of the following compatibility views is needed
for the site, the configuration setting is straightforward.
For more information about the logic that Internet Explorer or IE mode uses to land in
one doc mode over another, see the Deprecated document modes and Internet Explorer
11 article.
The general rule is to use the most current logic-based mode that allows a given site to
work as expected. We'd start with the Default mode, move to IE8 Enterprise mode, and
then to IE7 Enterprise mode if needed. This selection gives child pages the flexibility to
use different Document modes as necessary via the built-in logic for their specific needs.
As a result, all the website pages aren't locked in to one specific Document mode.
The following table lists the available document modes for these settings.
Available Document modes IE11 Doc mode IE8 Doc mode IE7 Doc mode
IE10 Doc mode IE7 Doc mode IE5 Quirks mode
IE9 Doc mode IE5 Quirks mode
IE8 Doc mode
IE7 Doc mode
IE5 Quirks mode
7 Note
Symptoms
A page relies on SSO for authentication, but users are prompted multiple times for
credentials, experience a looping redirect behavior, failed authentication errors, or some
combination of these symptoms.
If, during the SSO authentication process, we see the "e", but it disappears after a
redirect, this behavior points to a missing neutral site. After Microsoft Edge drops into IE
mode, we need to stay there to maintain session and cookie information. If the URL
shows up in the address bar long enough to identify it, add it to the IE mode site list as
a neutral site using the steps described in Configure neutral sites.
Often, the redirect cycle happens so quickly that it's difficult to identify the missing
neutral sites. To help with this analysis, we use a tool that's built into the Chromium
engine: net-export.
Tip
Network traces are inherently noisy. To minimize the noise, close all other browser
instances and tabs that aren't needed for the specific workflow that you're
investigating.
Registry key check. (Displayed only if the check fails.) Checks to see if Internet
Explorer integration is set up correctly in the registry. If not, the user can select Fix
it to resolve the problem.
Internet Explorer mode. Shows the API version that's used, based on the
configuration and OS. If there's a problem, the user may be prompted to install a
Windows Update.
Internet Explorer mode setting. Shows whether Internet Explorer mode is enabled,
and how it's configured.
Command line. Shows the command-line string and switches used to start
Microsoft Edge.
Group policy settings. Shows whether IE mode is configured using group policies,
and the policies that are applied.
If you've already installed all required Windows Updates, you might see this error if:
You're using the Canary channel, which is installed at the user level by default.
You're using the Stable, Beta, or Dev channel, but when prompted for elevation
when installing the elevation was canceled. When you cancel the elevation prompt,
the installation will continue at the user level.
Internet Explorer 11 has been disabled in Windows Features.
Run the installer for any channel at the system level: installer.exe --system-
level .
To check if Microsoft Edge is installed at the systems level, type "edge://version" in the
Microsoft Edge address bar. The Executable path will show a path starting with
C:\Program Files, which indicates a system install. If the Executable path begins with
C:\Users, uninstall and then reinstall Microsoft Edge with administrator privileges.
You may also have to set the compat-mode attribute in Enterprise Mode Site List to
Default. For more information, see Enterprise Mode and the Enterprise Mode Site List.
Tip
Your users can easily view this site list and the compatibility mode by typing
about:compat in Microsoft Edge.
However, rather than use the View in File Explorer option, the recommended approach
to managing files and folders outside of SharePoint is to Sync SharePoint and Teams
files with your computer or Move or copy files in SharePoint .
1. Use Profiles in Microsoft Edge - Each profile maps to a different IE session for IE
mode pages, so it behaves identically to the no-merge option.
2. Use the --user-data-dir=<path> command line, but with a different path for each
session. If needed, you can create a utility for the user to run that launches
Microsoft Edge and changes the path for the session.
If neither of the previous options work for your scenario, starting in Microsoft Edge
version 93, IE mode on Microsoft Edge will support no-merge. For an end user, when a
new browser window is launched from an IE mode application, it will be in a separate
session, like the no-merge behavior in IE11.
For each Microsoft Edge window, the first time an IE mode tab is visited within that
window, if it's a designated "no-merge" site, that window is locked into a different "no-
merge" IE session. This window stays locked from all other Microsoft Edge windows until
the last IE mode tab is closed in the locked window. This follows previous behavior
where users could launch IE with no-merge and launch Microsoft Edge without no-
merge using other mechanisms. All sites opening in a new window (through
window.open) will respect the merge nature of the parent process.
7 Note
Session switching isn't supported. Navigations within the same IE mode tab will use
the same session.
7 Note
Sharing cookies from IE mode to Microsoft Edge mode is not supported in no-
merge IE mode sessions.
You can validate the no-merge behavior in Microsoft Edge version 93 or later by
following these steps:
2. You can configure sites that need to prevent session sharing in the Enterprise
Mode Site List by setting the value of the merge-type attribute to "no-merge". This
attribute is not applicable only when the open-in element is set to Microsoft Edge.
By default, all sites have a merge-type value of merge. (Note: The integrated site
list manager tool available at edge://compat/sitelistmanager includes a No merge
checkbox when you Add or Edit a site.)
<site url="contoso.com">
<open-in merge-type="no-merge">IE11</open-in>
</site>
3. Navigate to any site configured as no-merge. The site should be in its own
unmerged IE session. When you open another Microsoft Edge instance or window
and navigate to the same site, it should be in its own IE session. Note that there
are multiple iexplore.exe processes in Task Manager.
If you have any feedback, reach out through one of our feedback channels: Microsoft
support or the TechCommunity forum.
The ability to save links as web pages requires the following minimum operating system
updates:
Windows 10, version 2004, Windows Server version 2004, Windows 10, version
20H2 : KB4580364
Windows 10, version 1903, Windows 10, version 1909, Windows Server version
1903: KB4580386
Windows 10, version 1809, Windows Server version 1809, Windows Server 2019:
KB4580390
Windows 10, version 1803: KB4586785
Windows 10, version 1607: KB4586830
Windows 10, version 1507: KB4586787
The ability to use Ctrl+S in IE-Mode requires the following minimum operating system
updates:
In addition to the shortcut Ctrl+S, the menuitem Save page as in Edge under Settings
and more (the ellipses icon ...) > More Tools can be enabled in Edge 101 (and newer) via
the following Group Policy: Allow Save page as in Internet Explorer mode located at
Computer Configuration > Administrative Templates > Microsoft Edge. The ability to
use the "Save page as" menuitem requires the following minimum operating system
updates:
Windows 10, version 20H2, Windows 10, version 21H1, Windows 10, version 21H2 :
KB5014666 or later
Windows Server 2022 : KB5014665 or later
Windows 11 : KB5014668 or later
1. Open IEChooser.
Open the Run dialog box. For example, press the Windows logo key + R .
Enter %systemroot%\system32\f12\IEChooser.exe , and then select Ok.
In addition to Microsoft Edge version 96, you need to have the following Windows
updates installed for this experience:
After the favicon cache is created, you won't be asked for a client certificate again unless
you delete the cache. Alternatively, you can set a rule in your server configuration, such
as IIS, not to require a client certificate for the favicon.
Two policy settings were added to Microsoft Edge version 95 that let you specify custom
adjustments to the height and width of pop-up windows that are generated from IE
mode sites via the window.open method. You can use the following policies to adjust
window size:
For this kind of redirected website, you can make use of the allow-redirect="true" in
the site list configuration. For more information, see Updated schema elements.
If you want this functionality, the following two workarounds are available:
You can use the IntranetFileLinksEnabled group policy to permit links from HTTPS
pages to open Intranet Zone file shares in Windows Explorer.
Pages loaded from the Intranet Zone into Microsoft Edge's IE mode feature are
permitted to navigate directly to URLs using the file:// protocol.
See also
Microsoft Edge Enterprise landing page
About IE mode
Additional Enterprise Mode information
Microsoft Edge security for your
business
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
Microsoft Edge is built on top of the Chromium open source project—the same project
that is core to Google Chrome—meaning it shares the same well-engineered and well-
tested security architecture and design at its foundation. The Microsoft Edge security
story doesn't stop there. It has powerful, built-in defenses against phishing and malware
and natively supports hardware isolation on Windows—there's no additional software
required to achieve this secure baseline. Furthermore, when paired with native support
for Microsoft 365 security and compliance services, Microsoft Edge brings additional,
powerful security capabilities and features that help protect against data loss for even
more benefits. For more information, watch Video: Microsoft Edge security,
compatibility, and manageability.
Let's get into the details, starting with external threats and then looking at internal risks
and information protection.
7 Note
Application Guard is available on Windows 10, 1809 and above. Application Guard
isn't available on Windows 10 Home editions.
Microsoft Edge natively supports Conditional Access. Microsoft Edge's support for
conditional access makes it easy for organizations to utilize identity signals as part of
their access control decisions. Conditional Access is the tool used by Microsoft Entra ID
to bring signals together, to make decisions, and enforce organizational policies.
Conditional Access is at the heart of the new identity driven control plane. To get
Conditional Access support on Chrome, an additional plug-in is required.
7 Note
Microsoft Entra Conditional Access requires a Microsoft 365 E3 (or higher) or a
Microsoft 365 Business Premium subscription.
7 Note
To learn more about Endpoint DLP prerequisites and how to set up data loss prevention,
go to Get started with Endpoint data loss prevention.
7 Note
Microsoft Endpoint data loss prevention requires a Microsoft 365 E5, a Microsoft
365 E5 Compliance, or a Microsoft 365 Business Premium subscription.
See also
Microsoft Edge Enterprise landing page
Video: Microsoft Edge security, compatibility, and manageability
Modern security protection for
vulnerable legacy apps
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
As the Internet evolved over the last 20 years, so have user needs and expectations for
the browsers they use. Today, the Internet is foundational to many businesses, and
having a modern browser designed to securely meet business needs is paramount.
Microsoft Edge is a modern browser built to securely access the modern web. This
article shows how Internet Explorer (IE) mode on Microsoft Edge is more secure than
Internet Explorer.
Introduction
Microsoft's internal telemetry shows that the browser is the #1 desktop app. The
centrality of the browser as an everyday productivity tool means that the browser
presents a large surface area exposed to attacks from the Internet. As the Internet and
its applications have become more complex, so have security threats. Over the years, the
threat landscape has evolved and attracted sophisticated threat actors including, but not
limited to, nation states and organized criminal groups looking to profit via phishing,
ransomware, and so on.
Although it's evolved and progressed with iterations up to IE11, IE is still based on
technology that's 25 years old. It's a legacy browser that's architecturally outdated and
unable to meet the security challenges of the modern web.
IE mode is more secure than IE because toolbars aren't supported, which reduces the
surface area for an attack. Toolbars are proven vectors for malware and phishing attacks.
Additionally, the IE desktop app will be disabled after retirement, which will eliminate
users' time using an outdated browser. Users will be able to access to trusted legacy
apps and sites identified in an allowlist for IE mode on Microsoft Edge.
The user will be in a modern environment without needing to adjust their behavior, but
also without losing access to mission-critical legacy apps and sites. Microsoft Edge is the
only browser that enables users to use a single browser to access both legacy and
modern sites.
The next section explains why it's important to minimize the time users spend using the
legacy browser engine.
Minimize legacy browser use
The following sections highlight the reasons why it's important to minimize legacy
browser engine use.
Architectural deficiency
Architectural deficiency in IE stems from the fact that its original architecture didn't
account for the complexity of the modern web or the modern threat landscape. IE
evolved from a single process architecture that resulted in inadequate sandboxing and a
comparatively broad attack surface. Modern browsers like Microsoft Edge are designed
around a threat model based on the current threat landscape. These browsers include
security advances like site isolation and hardware-based security features. For example,
Intel's Control-flow Enforcement Technology (CET), which handles many modern security
threats. These security mitigations are NOT available in IE, making it an easy target for
even simple attacks.
Ease of exploitation
IE is easier to exploit than Microsoft Edge because of its architecture and lack of support
for modern security features. It's easier to find a single vulnerability in IE that could lead
to a Remote Code Execution (RCE) than it is to find a similar weakness in Microsoft Edge,
where several vulnerabilities must be chained together to achieve a similar outcome.
Additionally, ActiveX and Browser Helper Objects have become vulnerabilities and IE's
support for them makes the browser even easier to exploit.
7 Note
1 Web Browsers vs. Phishing, Comparative Test Report (July 2021), CyberRatings.org
2
Web Browsers vs. Malware, Comparative Test Report (July 2021), CyberRatings.org
Microsoft Edge provides full native support for SmartScreen, but IE is only partially
supported because of its outdated architecture.
IE mode on Microsoft Edge is a unique solution that ensures users can access mission-
critical IE legacy sites, while at the same time staying protected from modern threats.
See also
About IE mode
Additional Enterprise Mode information
Security for your business
Microsoft Edge Enterprise landing page
Browse more safely with Microsoft Edge
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Microsoft Edge provides enhanced security on the web.
7 Note
This article applies to Microsoft Edge version 111 or later. Some users might see
enhanced security turned on by default due to ongoing development and testing. If
you want to turn the security feature off, refer to the What's new in Microsoft Edge
security settings in this article.
) Important
Overview
Microsoft Edge is adding enhanced security protections to provide an extra layer of
protection when browsing the web and visiting unfamiliar sites. The web platform is
designed to give you a rich browsing experience using powerful technologies like
JavaScript. On the other hand, that power can translate to more exposure when you visit
a malicious site. With enhanced security mode, Microsoft Edge helps reduce the risk of
an attack by automatically applying more conservative security settings on unfamiliar
sites and adapts over time as you continue to browse.
Defense in depth
Enhanced security mode in Microsoft Edge mitigates memory-related vulnerabilities by
disabling just-in-time (JIT) JavaScript compilation and enabling additional operating
system protections for the browser. These protections include Hardware-enforced Stack
Protection and Arbitrary Code Guard (ACG).
When combined, these changes help provide 'defense in depth' because they make it
more difficult than ever before for a malicious site to use an unpatched vulnerability to
write to executable memory and attack an end user. You can learn more about the
experimentation results from the Microsoft Edge Security team's blog post and
Introducing Enhanced Security for Microsoft Edge .
You may also be interested to learn more about the first line security protections in
Microsoft Edge. Notably, you may want to learn more about how Microsoft Edge
SmartScreen protects users from phishing scams and malware downloads.
7 Note
WebAssembly is now supported in enhanced security mode for x64 Windows, x64
macOS, x64 Linux, and ARM64 systems.
7 Note
Enhanced security on the web runs on unfamiliar sites without the just in time (JIT)
compilation to reduce attack surface, making it difficult for malicious sites to
exploit.
1. In Microsoft Edge, go to Settings and more > Settings > Privacy, search, and
services.
2. Under Security, verify that Enhance your security on the web is enabled.
3. Select the option that's best for your browsing.
The following toggle settings are available:
The following screenshot shows the "Enhance your security on the web" configuration
page, with Balanced security mode enabled and set to provide Balanced security.
1. In Microsoft Edge, select Settings and more > Settings > Privacy, search, and
services.
2. Verify that Enhance your security on the web is turned on.
3. Under Enhance your security on the web, select Manage enhanced security for
sites.
4. Select Add a site, type in the full URL, and then select Add.
7 Note
You can use steps (1 - 3) to view sites in enhanced security sites.. You can Edit a
site, Remove a site, or Remove all exceptions.
The next screenshot shows the settings page for security exceptions.
Enterprise controls
Enterprise Admins can configure this security feature using Group Policy settings,
including creating "Allow" and "Deny" lists to explicitly enhance security for their users
when visiting certain sites, or disable the mode for others. For a complete list of policies,
see the Microsoft Edge browser policy documentation.
7 Note
Setting the EnhanceSecurityMode policy to 'StrictMode' or setting the
DefaultJavaScriptJitSetting policy to BlockJavaScriptJit will have the same effect as
changing the Enhance your security on the web setting in edge://settings/privacy
to 'Strict'.
When you select the banner, you'll see the next flyout. You can select "Enhance security
for this site" to redirect you to a second flyout that shows the security settings for the
current site and gives the user the option to toggle security on or off.
7 Note
"Enhance security for this site" only appears when enhanced security mode is
enabled in Microsoft Edge Settings.
In the flyout shown in the next screenshot, you can manually enable or disable
enhanced security mode for a particular site. If you change the "Use enhanced security
for this site" toggle, Microsoft Edge will proactively add that site to the exception site
list.
7 Note
You can always remove this site by updating the exception site list in Settings >
Privacy, search, and services > Enhanced security exceptions.
Send us feedback
We want to get your feedback on our next iteration to improve "enhanced security
mode". If something doesn't work the way you expect, or if you have feedback to share
on these changes, we want to hear from you. You can reach out to Microsoft Support to
report issues or feedback. You can also leave feedback in our TechCommunity forum .
See also
Video: Secure browsing on Microsoft Edge
Super Duper Secure Mode
Microsoft Edge Enterprise landing page
Changes to Microsoft Edge browser TLS
server certificate verification
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
When Microsoft Edge establishes connections to an HTTPS server, Edge verifies that the
server has presented a certificate issued by an entity trusted by the browser. This trust
relationship is established via a certificate trust list and the component responsible for
performing the checks is called the certificate verifier.
In past versions of Microsoft Edge, both the default certificate trust list and the
certificate verifier logic were provided by underlying operating system (OS) platform.
For managed devices, starting in Microsoft Edge 112 on Windows and macOS, both the
default certificate trust list and the certificate verifier are provided by and shipped with
the browser. This approach decouples the list and verifier from the host operating
system's root store for the default verification behavior. See the rollout timeline and
testing guidance for more detail about the timing of the change.
Even after the change, in addition to trusting the built-in roots that ship with Microsoft
Edge, the browser queries the underlying platform for—and trusts—locally installed
roots that users and/or enterprises installed. As a result, scenarios where a user or
enterprise installed more roots to the host operating system's root store should
continue to work.
This change means that certificate verification logic works consistently in Microsoft Edge
on Windows and macOS. In a future to-be-determined release, the rollout will also apply
to Linux and Android. Due to Apple App Store policies, the Apple-provided root store
and certificate verifier continue to be used on iOS and iPadOS.
On macOS, if a certificate issued by a root certificate that's trusted by the platform but
not by Microsoft's Trusted Root Certificate Program, the certificate is no longer trusted.
This lack of trust isn't expected to be a common situation, since most servers already
ensure the TLS certificates that they use are trusted by Microsoft Windows.
Updates are released on the cadence documented in the release notes for the Microsoft
Trusted Root Program.
Devices that aren't managed by the enterprise started receiving the feature via a
Controlled Feature Rollout (CFR) in Microsoft Edge 109 and reached 100% of non-
managed devices in Edge 111. For more information, see Microsoft Edge configurations
and experimentation, which explains how CFRs in Microsoft Edge work. For enterprise-
managed devices, the existing platform-provided implementation was used through
Microsoft Edge 111.
Starting with Microsoft Edge 112, the default changed for all Windows and macOS
devices, including enterprise-managed ones, to use the verifier implementation and CTL
shipped with the browser. The MicrosoftRootStoreEnabled policy continues to be
available in this release to allow enterprises to revert to the previous behavior if
unexpected issues are found and to report the issues to Microsoft.
1. Algorithm parameters for ECDSA algorithms must be absent. The old verifier would
ignore the parameters while the new one rejects the certificate. For more
information, see Chromium issue 1453441 for more details.
2. Name constraints specifying an IP address must contain eight octets for IPv4
addresses and 32 octets for IPv6 addresses. If your certificate specifies an empty IP
address, you should reissue the certificate and omit the IP address name constraint
entirely.
3. Name constraints with an empty "excluded" list is invalid. The Windows certificate
viewer shows this list as Excluded=None within the Name Constraints details. For
more information, see Chromium issue 1457348 for more details. Instead of
specifying an empty list, omit it entirely.
This extension uses the object identifier (OID) 1.3.6.1.4.1.311.21.10 . If the certificate
includes this extension and marks it as critical, the connection fails with
ERR_CERT_INVALID .
You can use one of the following ways to check if this scenario applies to your
certificate:
2. Open the certificate with the Windows certificate viewer. In the "Show" filter, select
"Critical Extensions Only". Check to see if an "Application Policies" field in present.
3. Run certutil.exe with the -dump switch and review the output to check for a
critical Application Policies extension field.
If your certificate currently uses this extension, make sure that it now works in Microsoft
Edge 115. Alternatively, reissue the certificate and instead rely solely on the enhanced
key usage field (OID 2.5.29.37 ) to specify allowed usages.
Known revocation checking behavior
differences on Windows
In addition to the more stringent RFC 5280 requirements, the new verifier doesn't
support LDAP-based certificate revocation list (CRL) URIs.
Before Microsoft Edge 114, the new Chromium-based verifier enforces "Baseline
Requirement" max ages for CRLs. For leaf revocations, the current maximum age is 7
days and for intermediate revocations, the current maximum age is 366 days. The check
is performed by checking that the current time minus the "This Update" ("Effective
Date") doesn't exceed those maximums. In Microsoft Edge 114, these requirements are
no longer enforced for non-publicly trusted certificates. For more information, see
Chromium issue 971714 .
Since the new verifier downloads revocation information via the browser's networking
stack, HTTP Strict Transport Security (HSTS) upgrades also apply. This upgrade can
create an incompatibility with the requirement that the CRL information is hosted via
HTTP (not HTTPS) if the host has an HSTS pin configured. If this scenario negatively
impacts your environment, we encourage you to share more information about the
impact via Chromium issue 1432246 .
See also
Microsoft Edge security for your business
Microsoft Edge Enterprise landing page
Identify and interrupt downloads of
potentially dangerous files
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
Microsoft Edge's File Type Policies component classifies files by their level of
"dangerousness" to manage file downloads. A harmless file (for example, a .txt file)
can be downloaded freely, while a potentially dangerous file like a .dll is subjected to a
higher degree of vetting. This scrutiny provides a more security-conscious user
experience.
NOT_DANGEROUS means that the file is safe to download, even if the download
request was accidental.
DANGEROUS means that the browser should always warn the user that the
download may harm their device.
The third setting, ALLOW_ON_USER_GESTURE is more subtle. These files are potentially
dangerous, but most likely harmless if the user requests the download. Microsoft Edge
will allow these downloads to continue automatically if two conditions are both met:
There's a user gesture associated with the network request that started the
download. For example, the user clicked a link to the download.
There's a recorded prior visit to the referring origin (the page that links to the
download) before the most recent midnight (that is, yesterday or earlier). This
recorded visit implies that the user has a history of visiting the site.
The download will also continue automatically if the user explicitly starts it by using the
Save link as context menu command, enters the download's URL directly into the
browser's address bar, or if Microsoft Defender SmartScreen indicates that the file is
safe.
7 Note
Starting in version 91, Microsoft Edge will interrupt downloads that lack the
required gesture.
On the edge://downloads page, the user will see the same options. The next screenshot
shows and example of these options.
Enterprise controls for downloads
While users are unlikely to encounter download interruptions for sites they use every
day, they might encounter them for legitimate downloads on sites that they use rarely.
To help streamline the user-experience for Enterprises, a Group Policy is available.
[{"file_extension":"xml","domains":["contoso.com", "woodgrovebank.com"]},
mdt, mdw, mdz, accdb, accde, accdr, accda, ocx, ops, paf, pcd, pif, plg, prf, prg,
pst, cpi, partial, xrm-ms, rels, svg, xml, xsl, xsd, ps1, ps1xml, ps2, ps2xml,
psc1, psc2, js, jse, vb, vbe, vbs, vbscript, ws, wsc, wsf, wsh, msh, msh1, msh2,
mshxml, msh1xml, msh2xml, ad, app, application, appref-ms, asp, asx, bas, bat, chi,
chm, cmd, com, cpl, crt, cer, der, eml, exe, fon, fxp, hlp, htt, inf, ins, inx,
isu, isp, job, lnk, mau, mht, mhtml, mmc, msc, msg, reg, rgs, scr, sct, search-ms,
settingcontent-ms, shb, shs, slk, u3p, vdx, vsx, vtx, vsdx, vssx, vstx, vsdm, vssm,
vstm, vsd, vsmacros, vss, vst, vsw, xnk, cdr, dart, dc42, diskcopy42, dmg, dmgpart,
dvdr, dylib, img, imgpart, ndif, service, smi, sparsebundle, sparseimage, toast,
udif, action, definition, wflow, caction, as, cpgz, command, mpkg, pax, workflow,
pup, rpm, slp, out, run, bash, csh, ksh, sh, shar, tcsh, desktop, dex, apk, rdp
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
Microsoft Edge requires connectivity to the Internet to support its features. This article
identifies the domain URLs that you need to add to the Allow list to ensure
communications through firewalls and other security mechanisms.
7 Note
Update Service
The service that Microsoft Edge uses to check for new updates.
https://msedge.api.cdp.microsoft.com
HTTP
http://msedge.f.tlu.dl.delivery.mp.microsoft.com
http://msedge.f.dl.delivery.mp.microsoft.com
http://msedge.b.tlu.dl.delivery.mp.microsoft.com
http://msedge.b.dl.delivery.mp.microsoft.com
HTTPS
https://msedge.sf.tlu.dl.delivery.mp.microsoft.com
https://msedge.sf.dl.delivery.mp.microsoft.com
https://msedge.sb.tlu.dl.delivery.mp.microsoft.com
https://msedge.sb.dl.delivery.mp.microsoft.com
Tip
To simplify the allow list for download locations a wild card can be used:
*.dl.delivery.mp.microsoft.com
HTTP
http://msedgeextensions.f.tlu.dl.delivery.mp.microsoft.com
http://msedgeextensions.f.dl.delivery.mp.microsoft.com
http://msedgeextensions.b.tlu.dl.delivery.mp.microsoft.com
http://msedgeextensions.b.dl.delivery.mp.microsoft.com
HTTPS
https://msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com
https://msedgeextensions.sf.dl.delivery.mp.microsoft.com
https://msedgeextensions.sb.tlu.dl.delivery.mp.microsoft.com
https://msedgeextensions.sb.dl.delivery.mp.microsoft.com
Tip
To simplify the allow list for download locations a wild card can be used:
*.dl.delivery.mp.microsoft.com
Sync
These endpoints manage the reading and writing of synced data, rights management
for secure data, and notifying the browser when new sync data is available.
https://edge.microsoft.com/
https://edge.microsoft.com/
https://clients.config.office.net
https://*.smartscreen.microsoft.com/
https://*.smartscreen-prod.microsoft.com
https://*.urs.microsoft.com/
http://edge.microsoft.com/
https://edge.microsoft.com/
See also
Microsoft Edge Enterprise landing page
Microsoft Edge documentation landing page
Manage connection endpoints for Windows 10 Enterprise, version 1903
Understand Data Loss Prevention (DLP)
in Microsoft Edge
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Microsoft Edge supports data loss prevention (DLP) with
Endpoint DLP and Windows Information Protection (WIP).
DLP defined
Data loss prevention (DLP) is a system of technologies that identify and safeguard
sensitive enterprise data from unauthorized disclosure. To comply with business
standards and industry regulations, organizations must protect sensitive information
and prevent its unauthorized disclosure. Sensitive information includes financial data or
personal information. Some examples of personal information include credit card
numbers, social security numbers, and health records.
Remote work has increased the emphasis on using DLP. With the growing use of
personal and work activities on devices, enterprises are seeing an increased risk of
unauthorized sharing of corporate data outside the workplace.
This blending of user activities has also spread to devices, where data is moved between
personal and corporate devices over various public and private networks. The net result
is a dramatically increased risk of exposing sensitive data.
Microsoft Edge natively supports two different DLP solutions, Microsoft Endpoint DLP
and Windows Information Protection (WIP).
7 Note
Microsoft Edge enforces admin-configured policies for sensitive files, and records audit
events for non-compliant activities.
Some of the user activities that you can audit and manage on devices running Windows
10 include the following activities:
For more detailed information about user activities you can audit and manage, see
Endpoint activities you can monitor and take action on.
7 Note
Check out Support for Windows Information Protection, which describes how Microsoft
Edge supports Windows Information Protection (WIP). You can learn more about system
requirements, benefits, and supported features in the following sections:
System Requirements
Windows Information Protection Benefits
WIP features supported in Microsoft Edge
See also
Microsoft Edge Enterprise landing page
Video: Data loss prevention - Microsoft Edge
Overview of data loss prevention
Protect your enterprise data using Windows Information Protection
Password Monitor auto-enabled for
users
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how admins can turn on Password Monitor in Microsoft Edge for
select users. The article also gives the steps to control how monitoring is enabled.
7 Note
Benefits
Given the frequency and scope of these online attacks having this kind of protection has
become necessary for everyone. Microsoft Edge has the built-in ability to securely check
a user's saved passwords against passwords that are known to be compromised and
alerts them if a match is found.
Auto-enablement. Users that are signed-in using their work account (Active
Directory or Microsoft Entra ID) and syncing their passwords are auto-enabled for
this feature. They'll see the notification in the next screenshot informing them that
the feature's turned on.
Getting explicit consent. Users that don't have Password Sync turned on are asked
for permission to turn on Password Monitor. They're prompted when the following
actions happen:
Direct activation. Users can go to Settings > Passwords anytime and turn the
feature On or Off.
1 with Sync ON Feature enabled by default and a notice bubble is shown 2 min
Sync on Feature enabled after browser starts.
previously: No - If sync is turned off after that, the feature is disabled.
Response to - Feature turned off before altering sync, sync no longer affects
Consent UI: the feature.
None
2 with Sync ON Feature stays the same as user choice. Notice bubble isn't
Sync on Feature enabled shown and there's no affect of sync change on feature value.
previously: Yes
Response to
Consent UI:
None
3 with Sync Off Sync is off and the feature stays disabled
Sync off Feature enabled - At any point after that if user turns on the sync without
previously: No altering the feature: the feature is enabled and auto-enablement
Response to notification is shown 2 minutes after Sync is turned on.
Consent UI: - If sync is turned off again, the feature is disabled
None - If the feature is changed before turning on sync, sync no
longer affects Password Monitor.
4 with Sync OFF Feature stays the same as user choice, notice bubble isn't
Sync off Feature enabled shown, and there's no effect of sync change on the feature
previously: Yes value.
Response to
Consent UI:
None
In addition, if a user is signed-in using a work account that's restricted via policies for
any of the following, the feature is NOT auto-enabled for them:
7 Note
Password Monitor can work even if Password Sync is disabled, as long as the
user has given explicit consent to turn the feature On or have turned it on
themselves via Settings.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge password manager
security
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
The frequently asked questions in this article describe how Microsoft Edge's built-in
password manager provides security for user passwords.
7 Note
The Microsoft Edge password manager encrypts passwords so they can only be
accessed when a user is logged on to the operating system. Even if an attacker has
admin rights or offline access and can get to the locally stored data, the system is
designed to prevent the attacker from getting the plaintext passwords of a user who
isn't logged in.
The way to decrypt another user's passwords is if that user were logged on and the
attacker had the user's password or has compromised the domain controller.
On Android, there isn't a system level key storage area for the AES128 encrypted
password
All these storage areas encrypt the AES key using a key accessible to some or all
processes running as the user. This attack vector is often featured in blogs as a possible
'exploit' or 'vulnerability', which is an incorrect understanding of the browser threat
model and security posture.
However, physically local attacks and malware are outside the threat model and, under
these conditions, encrypted data would be vulnerable. If your computer's infected with
malware, an attacker can get decrypted access to the browser's storage areas. The
attacker's code, running as your user account, can do anything you can do.
Despite its inability to protect against full-trust malware, Local Data Encryption is useful
in certain scenarios. For example, if an attacker finds a way to steal files from the disk
without the ability to execute code or has stolen a laptop that isn't protected with Full
Disk Encryption, Local Data Encryption will make it harder for the thief to get the stored
data.
Do you recommend storing passwords in
Microsoft Edge?
Users who can rely on the Microsoft Edge's in-built password manager can (and do) use
stronger and unique passwords more because they don't need to remember them all
and type them as often. And because the password manager will only autofill passwords
on the sites to which they belong, users are less likely to fall for a phishing attack.
7 Note
Industry reports show that 80% of online incidents are related to phishing, and
more than 37% of untrained users fail phishing tests.
However, using a password manager that's keyed to the user's operating system login
session also means that an attacker in that session can immediately retrieve all the user's
saved passwords. Without a password manager to steal from, an adversary would need
to track keystrokes or monitor submitted passwords.
The decision of whether to use a password manager comes down to assessing the many
benefits we've described against the possibility of the entire device getting
compromised. For most threat models, using the Microsoft Edge password manager is
the recommended option.
7 Note
A more complete response means having in-depth knowledge of your threat model
because security options and choices vary depending on different threat models. Some
relevant questions to consider when thinking about whether you should enable the
password manager for your organization are:
It's important to factor in the security of user data as it gets synced to various user
devices and the amount of control the organization has on autofill data syncing.
Data security in transit and at rest in the cloud: All synced data is encrypted in
transit over HTTPS when transferred between the browser and Microsoft servers.
The synced data is also stored in an encrypted state on Microsoft servers. Sensitive
data types such as addresses, and passwords are further encrypted on the device
before being synced. If you're using a work or school account, all data types are
further encrypted before being synced using Microsoft Purview Information
Protection.
However, Microsoft Edge provides an extensive set of policies that enable fine control
over installed extensions. Using the policies in the following table is necessary to protect
corporate data.
Policy Caption
Server sync. Some products store passwords in the cloud There's a cloud exposure risk
to sync all your devices. This feature is helpful, but there's because passwords are synced across
a risk if the cloud service gets compromised and your Windows devices that have Microsoft
data is exposed. Remarks: The risk is mitigated by having Edge installed. Remarks: This risk is
passwords encrypted in the cloud and storing the mitigated by the data security steps
encryption key on your device(s) so attackers can't get to covered in this article.
the key and your passwords.
Trust. It's necessary to trust that the third party isn't doing Remarks: Microsoft is a known and
anything malicious, such as sending your passwords to trusted vendor with decades of
another party. Remarks: This risk can be mitigated by history in providing enterprise-grade
reviewing the source code (in the case of open-source security and productivity, with
products), or by believing that the vendor cares about resources designed to protect your
their reputation and revenue. passwords worldwide.
Supply chain security. It's hard to verify that the vendor Remarks: Microsoft has robust
has secure supply chain/build/release processes for the internal processes to ensure minimal
source code. risk to source code.
Compromised client or account. If a client device or user Remarks: Microsoft offers OS-level
account is compromised, an attacker can get the protections like Windows Defender,
passwords. Remarks: This risk is mitigated for some designed to ensure that the device
password managers that require the user to enter a isn't compromised to start with.
Master Password that's not stored locally to decrypt the However, if a client device is
passwords. A Master Password is only partial mitigation compromised, an attacker may be
because an attacker could read keystrokes and get the able to decrypt the passwords.
master password as it's typed or read passwords from
process memory when filling in a form field.
7 Note
A Master Password feature (that authenticates the user before auto-filling their data)
provides a trade-off in convenience for broader threat mitigation. Specifically, it helps to
reduce the window of data exposure against latent malware or physically local attackers.
However, a Master Password is not a panacea, and local attackers and dedicated
malware have various strategies for circumventing the protection of a Master Password.
7 Note
Microsoft Edge now offers the ability to enable authentication before autofill
capability; this provides users an additional layer of privacy and prevents their
stored passwords from being used by anyone but them. For more details, see
Additional privacy for your saved passwords .
There's a known exploit that some advertisers use, which uses stored passwords to
uniquely identify and track users. For more information, see Ad targeters are pulling data
from your browser's password manager . Browsers have taken steps to mitigate
this privacy issue . The PasswordValueGatekeeper class can be used to limit access to
the password field data, even when the browser is configured to autofill when it loads.
This user information harvesting threat can be easily mitigated by enabling the optional
edge://flags/#fill-on-account-select feature. This feature only allows passwords to be
added to a form field after the user explicitly chooses a credential, which ensures that
users stay aware of who is receiving their passwords.
See also
Microsoft Edge Enterprise landing page
How Microsoft Edge is more secure than Chrome for business on Windows 10
Protect against potentially unwanted
applications (PUAs)
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article explains how you can protect against potentially unwanted applications
(PUAs) using Microsoft Edge or by using Windows Defender Antivirus.
7 Note
Overview
Potentially unwanted applications aren't considered to be viruses or malware, but these
apps might perform actions on endpoints that adversely affect endpoint performance or
use. For example, Evasion software actively tries to evade detection by security products.
This kind of software can increase the risk of your network being infected with actual
malware. PUA can also refer to applications that are considered to have poor reputation.
For a description of the criteria used to classify software as a PUA, see Potentially
unwanted application.
You can set up protection by enabling the Block potentially unwanted apps feature in
Microsoft Edge.
7 Note
The Microsoft Edge Team blog post describes this new feature and explains how
to handle a mislabeled app or report an app as unwanted.
4. In the Services section, use the toggle shown in the preceding screenshot to turn
on Block potentially unwanted apps.
Tip
You can safely explore the URL-blocking feature of PUA protection by testing
it out on one of our Windows Defender SmartScreen demo pages .
When Microsoft Edge detects a PUA, you will see a message like the one in the next
screenshot.
To block against PUA-associated URLs
After you turn on PUA protection in Microsoft Edge, Windows Defender SmartScreen
will protect you from PUA-associated URLs.
There are several ways admins can configure how Microsoft Edge and Windows
Defender SmartScreen work together to protect users from PUA-associated URLs. For
more information, see:
Admins can also customize the Microsoft Defender Advanced Threat Protection
(Microsoft Defender ATP) block list. They can use the Microsoft Defender ATP portal to
create and manage indicators for IPs and URLs.
Microsoft Intune
Microsoft Endpoint Configuration Manager
Group Policy
PowerShell cmdlets
When Windows Defender detects a PUA file on an endpoint it quarantines the file and
notifies the user (unless notifications are disabled) in the same format as a normal threat
detection (prefaced with "PUA:".) Detected threats also appear in the quarantine list in
the Windows Security app.
7 Note
Users will see "*.exe has been blocked as a potentially unwanted app by Microsoft
Defender SmartScreen".
Allow-list an app
Like Microsoft Edge, Windows Defender Antivirus provides a way to allow files that are
blocked by mistake or needed to complete a task. If this happens you can allow-list a
file. For more information, see How to Configure Endpoint Protection in Configuration
Manager to learn how to exclude specific files or folders.
See also
Microsoft Edge Enterprise landing page
Threat protection
Configure behavioral, heuristic, and real-time protection
Next-generation protection
Security baseline for Chromium-based Microsoft Edge, version 79
Microsoft Edge and Conditional Access
Article • 08/24/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Microsoft Edge supports Conditional Access (CA) for managed
devices and how you can access CA protected resources with unmanaged devices.
Introduction
When it comes to managing and protecting your cloud resources, identity and access
are both important. In a hybrid computing world, users can access your organization's
resources using various devices and apps from anywhere at anytime. Just focusing on
who can access a resource isn't good enough. You also need to factor in how a resource
is accessed.
Conditional Access (CA) gives you a balance between security and productivity. For
more information, see Plan a Conditional Access deployment, a detailed guide to help
plan and deploy Conditional Access (CA) in Microsoft Entra ID (formerly known as Azure
Active Directory). (For more information about this name change, see New name for
Azure Active Directory.)
Access issues
On a compliant device, the identity accessing the resource should match the identity on
the profile. If it doesn't or the device is unmanaged, access is blocked and you'll see a
message like the one in the following screenshot. In this example, balas@contos.com is
the sign-in account needed to access the resource.
You can also work with profile settings by selecting the account picture in the browser
and using the dropdown menu for the following tasks:
Manage your profiles - Click the gear icon (Manage profile settings) to open Edge
Settings.
Pick an existing profile - Select the profile name.
Create a personal profile - Select Set up a new personal profile.
Create a new work profile - Select Other profiles and then select Set up a new
work profile. The "Other profiles" option also lets you Browse as guest or Browse
in Kids Mode.
See also
What is Conditional Access?
Require an app protection policy on Windows devices
Video: Security, compatibility, and manageability
Microsoft Edge Enterprise landing page
Microsoft Edge support for Microsoft
Defender Application Guard
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Microsoft Edge supports Microsoft Defender Application
Guard (Application Guard).
7 Note
Overview
Security architects in the enterprise must deal with the tension that exists between
productivity and security. It's relatively easy to lock down a browser and only allow a
handful of trusted sites to load. This approach will improve the overall security posture
but is arguably less productive. If you make it less restrictive to improve productivity,
you increase the risk profile. It's a hard balance to strike!
It's even harder to keep up with new emerging threats in this constantly changing threat
landscape. Browsers remain the primary attack surface on client devices because the
browser's basic job is to let users access, download, and open untrusted content from
untrusted sources. Malicious actors are constantly working to social engineer new forms
of attacks against the browser. Security incident prevention or detection/response
strategies can't guarantee 100% safety.
A key security strategy to consider is the Assume Breach Methodology, which means
there's an acceptance that an attack is going to succeed at least once regardless of
efforts to prevent it. This mindset requires building defenses to contain the damage,
which ensures that corporate network and other resources remain protected in this
scenario. Deploying Application Guard for Microsoft Edge fits right into this strategy.
About Application Guard
Designed for Windows 10 and Microsoft Edge, Application Guard uses a hardware
isolation approach. This approach lets untrusted site navigation launch inside a
container. Hardware isolation helps enterprises safeguard their corporate network and
data in case users visit a site that is compromised or is malicious.
The enterprise administrator defines what are trusted sites, cloud resources, and internal
networks. Everything that's not in the trusted sites list is considered untrusted. These
sites are isolated from the corporate network and data on the user's device.
watch our video Microsoft Edge browser isolation using Application Guard
read What is Application Guard and how does it work?
The next screenshot shows an example of Application Guard's message showing that
the user is browsing in a safe space.
What's new
Application Guard support in the new Microsoft Edge browser has functional parity with
Microsoft Edge Legacy and includes several improvements.
Enable Upload Blocking
Starting from Microsoft Edge 96, admins now have the option to block uploads while in
the container, meaning that users cannot upload files from their local device to their
Application Guard instance. This support can be controlled via policy. You can update
the Edge policy ApplicationGuardUploadBlockingEnabled to enable or disable uploads
in the container.
7 Note
This policy ONLY impacts Edge, so navigations from other browsers might get
redirected to the Application Guard Container if you have the corresponding
extensions enabled.
This support can be controlled via policy. You can update the Edge policy
ApplicationGuardFavoritesSyncEnabled to enable or disable favorites sync.
7 Note
For security reasons, favorites sync is only possible from the host to the container
and not the other way around. To ensure a unified list of favorites across the host
and the container, we have disabled favorites management inside the container.
Starting with Microsoft Edge version 91, there's built in support to tag network traffic
originating from Application Guard containers, allowing enterprises to use proxy to filter
out traffic and apply specific policies. You can use the header to identify which traffic is
through the container or the host using ApplicationGuardTrafficIdentificationEnabled.
Extension installs in the container is now supported, starting from Microsoft Edge
version 81. This support can be controlled via policy. The updateURL that gets used in
ExtensionInstallForcelist policy should be added as Neutral Resources in the Network
Isolation policies used by Application Guard.
7 Note
It's also possible to manually install individual extensions inside the container from
the extension store. Manually installed extensions will only persist in the container
when Allow Persistence policy is enabled.
The next screenshot shows a multiple tab diagnostics page to help diagnose user
reported issues on the device.
Microsoft Edge updates in the container
Microsoft Edge Legacy updates in the container are part of the Windows OS update
cycle. Because the new version of Microsoft Edge updates itself independent of the
Windows OS, there is no longer any dependency on container updates. The channel and
version of the host Microsoft Edge is replicated inside the container.
Prerequisites
The following requirements apply to devices using Application Guard with Microsoft
Edge:
7 Note
See also
Microsoft Edge Enterprise landing page
Microsoft Defender Advanced Threat Protection
Video: Microsoft Edge browser isolation using Application Guard
Microsoft Edge support for Microsoft
Defender SmartScreen
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes the benefits of using Microsoft Defender SmartScreen, explains
how it works, and describes how to configure this Microsoft Edge feature.
7 Note
Microsoft Defender SmartScreen is a service that Microsoft Edge uses to keep you safe
while you browse the web. Microsoft Defender SmartScreen provides an early warning
system against websites that might engage in phishing attacks or attempt to distribute
malware through a focused attack. For more information, watch Video: Secure browsing
on Microsoft Edge.
7 Note
Before Windows 10, version 1703, this feature was called the SmartScreen filter
when used within the browser and Microsoft SmartScreen when used outside of
the browser.
Site analysis
Microsoft Defender SmartScreen determines whether a site is potentially malicious by:
Users are given the option of reporting a site as safe or unsafe within the warning
message. For more information, see how to report a site.
File analysis
Microsoft Defender SmartScreen determines whether a downloaded app or app installer
is potentially malicious based on many criteria, such as download traffic, download
history, past anti-virus results, and URL reputation.
Files with a known safe reputation will download without any notification.
Files with a known malicious reputation show a warning to let the user know that
the file is unsafe and has been reported as malicious. The next screenshot is an
example of a warning for a malicious file.
Files that are unknown show a warning to let the user know that the download
doesn't have a known footprint and advise caution. The next screenshot is an
example of a warning for an unknown file.
Not all unknown programs are malicious, and the unknown warning is intended to
provide context and guidance for users who need it, especially if the warning is
unexpected.
However, users can still download and run the application by clicking ... | Keep | Show
More | Keep anyway.
Tip
FYI for Enterprise Customers. By default, Microsoft Defender SmartScreen lets
users bypass warnings. Because this user interaction is potentially risky, we
recommend that you review these recommended group policy settings.
You see how Microsoft Defender SmartScreen responds to different scenarios using our
demo site .
The Microsoft Defender SmartScreen service stores data about reputation checks. As
new sites are identified, the service adds to a dynamic database of known malicious
URLs and files. This data is stored on secure Microsoft servers and is only used for
Microsoft security services. This data will never be used to identify or target users in any
way. Clearing browsing cache clears all locally stored Microsoft Defender SmartScreen
URL data. Clearing download history will remove any locally stored SmartScreen data
about file downloads.
For more information about Microsoft Defender SmartScreen and privacy on Microsoft
Edge, read the Microsoft Edge Privacy Whitepaper.
7 Note
Users can set up Microsoft Defender SmartScreen for an individual device unless
Group Policy or MDM is configured to prevent it. For more information, see set up
and use Microsoft Defender SmartScreen on individual devices.
See also
Microsoft Edge Enterprise landing page
Video: Secure browsing on Microsoft Edge
Microsoft Defender SmartScreen Overview
Threat protection
Protect against potentially unwanted applications
Microsoft Edge support for Windows
Information Protection (WIP)
Article • 08/22/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
This article describes how Microsoft Edge supports Windows Information Protection
(WIP).
7 Note
Overview
Windows Information Protection (WIP) is a Windows 10 feature that helps protect
enterprise data from unauthorized or accidental disclosure. With the rise of remote
work, there's an increased risk of sharing corporate data outside the workplace. This risk
increases when personal activities and work activities occur on corporate devices.
Microsoft Edge supports WIP to help protect content in a web environment where users
often share and distribute content.
System requirements
The follow requirements apply to devices using WIP in the enterprise:
Mode Description
Block WIP looks for inappropriate data sharing practices and stops the employee from
completing the action. This search can include sharing enterprise data to non-
enterprise-protected apps in addition to sharing enterprise data between apps or
attempting to share outside of your organization's network.
Allow WIP looks for inappropriate data sharing, warning employees if they do something
Overrides deemed potentially unsafe. However, this management mode lets the employee
override the policy and share the data, logging the action to your audit log.
Silent WIP runs silently, logging inappropriate data sharing, without stopping anything
that would have been prompted for employee interaction while in Allow Overrides
mode. Unallowed actions, like apps inappropriately trying to access a network
resource or WIP-protected data, are still stopped.
Off WIP is turned off and doesn't help to protect or audit your data. After you turn off
WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached
drives. Your previous decryption and policy info isn't automatically reapplied if you
turn WIP protection back on.
Microsoft Edge gives users the ability to share protected content in an unapproved
website. The next screenshot shows the Microsoft Edge prompt that allows a user to use
protected content in an unapproved website.
7 Note
If your environment isn't hybrid joined, you can hybrid join using these instructions:
Plan your hybrid Microsoft Entra ID join implementation.
If hybrid joining isn't an option, you can use on-prem Microsoft Entra accounts to allow
Microsoft Edge to auto create a special work profile with the users' domain accounts.
Note that on-premises accounts may not receive all of Microsoft Entra ID's features,
such as cloud sync, Office NTP, and so on.
ConfigureOnPremisesAccountAutoSignIn
Microsoft Edge shows this error when the organization has enabled Windows
Information Protection (WIP) to only allow users with approved applications to access
corporate resources. In this case because Microsoft Edge isn't on the approved
applications list, the admin will have to update the WIP policies to grant access to
Microsoft Edge.
The following screenshot shows how the Microsoft Intune is used to add Microsoft Edge
as an allowed app for WIP.
If you're not using Microsoft Intune, download and apply the policy update in the WIP
Enterprise AppLocker Policy file.
See also
Microsoft Edge Enterprise landing page
Protect enterprise data using Windows Information Protection
Configure Microsoft Edge policies to
support enterprise privacy
Article • 08/21/2023
7 Note
Microsoft Edge for Business is now available in Edge stable version 116! Learn
more about the new, dedicated work experience with native enterprise grade
security, productivity, manageability, and AI built in.
Overview
When Microsoft Edge is deployed on Windows 10, the default is to send diagnostic data
based on the users' Windows Diagnostic data setting.
The preceding deprecated policies are replaced by Allow Telemetry on Windows 10, and
DiagnosticData policy for all other platforms.
Required diagnostic data is collected to keep Microsoft Edge secure, up to date and
performing as expected.
Optional diagnostic data includes data about how you use the browser, websites you
visit and crash reports to help keep Microsoft Edge secure, up to date, and performing
as expected and is used to improve Microsoft Edge and other Microsoft products and
services for all users.
7 Note
Off (Not recommended) (0) turns off required and optional diagnostic data
collection.
Required data (1) sends required diagnostic data but turns off optional diagnostic
data collection. Microsoft Edge will send required diagnostic data necessary to
keep Microsoft Edge secure, up to date and performing as expected.
Optional data (2) sends optional diagnostic data includes data about browser
usage, websites that are visited, crash reports sent to Microsoft to help keep
Microsoft Edge secure, up to date, and performing as expected and is used to
improve Microsoft Edge and other Microsoft products and services for all users.
On Windows 7, Windows 8/8.1, and macOS, this policy controls sending required and
optional data to Microsoft.
If you don't configure this policy or disable it Microsoft Edge will default to the user's
preference.
Microsoft Edge collects a set of required data that's necessary to keep the product up to
date, secure, and performing as expected. This data includes basic device connectivity
and configuration information from Microsoft Edge about the current data collection
consent, app version, and installation state about your installation of Microsoft Edge. This
data collection can be turned off by disabling the policy.
Enable this policy to send reporting of usage and crash-related data to Microsoft.
Disable this policy to not send the data to Microsoft. In both cases, users can't change
or override the setting.
If this policy isn't configured, Microsoft Edge will default to the Windows
diagnostic data setting.
If this policy is enabled, Microsoft Edge will only send usage data if the Windows
Diagnostic data setting is set to Enhanced or Full.
If this policy is enabled, Microsoft Edge will only send usage data if
SendSiteInfoToImproveServices is also enabled.
If this policy is disabled, Microsoft Edge will not send usage data. Crash-related
data is sent based on the Windows Diagnostic data setting. Learn more about
Windows Diagnostic data settings.
If this policy isn't configured, Microsoft Edge defaults to the user's preference.
If this policy is enabled, Microsoft Edge will only send usage data if
SendSiteInfoToImproveServices is also enabled.
Enable this policy to send information about websites visited in Microsoft Edge to
Microsoft. Disable this policy to not send information about the websites that are visited
in Microsoft Edge to Microsoft. In both cases, users can't change or override the setting.
If this policy is enabled, Microsoft Edge will only send usage data if
MetricsReportingEnabled is also enabled.
If this policy isn't configured, Microsoft Edge defaults to the user's preference.
Implementation details
For non-Windows 10 devices:
Windows Diagnostic data setting Required diagnostic data Optional diagnostic data
) Important
See also
Microsoft Edge Enterprise landing page
Microsoft Edge policies
Microsoft Edge Privacy Whitepaper
Microsoft Edge Privacy Whitepaper
Article • 08/23/2023
Our browser privacy promise is to provide you with the protection, transparency,
control, and respect you deserve. To uphold commitments to give you transparency into
Microsoft products, the Microsoft Edge team provides this privacy whitepaper. It
explains how Microsoft Edge features and services work and how each may affect your
privacy. The goal of the Microsoft Edge team is to give you a full understanding of how
your data is used, how to control the different features, and how to manage your
collected data. After reading this document, you will have the information needed to
make the right privacy decisions for you.
This document provides links to go to Microsoft Edge settings and other pages. The
shortcuts URLs start with edge:// such as edge://favorites and
edge://settings/privacy . To go to the pages, type the bolded text directly into the
Microsoft Edge address bar. The pages are only viewable in Microsoft Edge.
This whitepaper focuses on the desktop version of Microsoft Edge. Parts of the
document may include features or experiences that aren't available for all users. This
whitepaper also discusses features and services that exist in the product today, but
subject to change in the future. Microsoft practices data collection minimization. Your
data is kept for the minimum amount of time. Retention times vary depending on the
feature or service and may change over time.
To speed up browsing and searching, characters you type into the address bar are sent
to your default search provider. The search provider returns suggested search queries.
The address bar categorizes entries as a URL, search, or unknown. This information,
along with which suggestion you select, position of selection, and other address bar
data is sent to your default search provider.
If your search provider is Bing, a resettable identifier unique to your browser is sent with
the data. It helps Bing understand the search query and query session. Other
autosuggest service identifiers are sent to your default search engine to complete the
search suggestions. Your IP address and cookies are sent to your default search provider
to increase the relevance of the search results.
When you select the address bar, a signal is sent to your default search provider. The
signal tells the provider to prepare suggestions. The typed characters and search queries
aren't sent to Microsoft unless your search provider is Bing. To enable sending data to
your default search provider, go to edge://settings/privacy . In Services, select Address
bar and turn on the Show me search and site suggestions using my typed characters
setting. If you turn off the setting, your typed characters are no longer sent to your
default search provider. Your search queries are still sent to your default search provider
to provide search results.
If Microsoft Edge detects typing in the address bar that might contain sensitive
information, it does not send the typed text. Sensitive information includes
authentication credentials, local file names, or URL data that is normally encrypted.
You can configure Microsoft Edge to collect diagnostic data about the address bar.
Collected data includes the number of offered queries for all search providers. Go to
edge://settings/privacy . In Personalize your web experience turn on the Improve
your web experience by allowing Microsoft to use your browsing history from this
account for personalizing advertising, search, news, and other Microsoft services
setting.
Typed characters and the websites you visit are stored locally on the device per profile.
To delete the data, go to edge://settings/clearBrowserData . In the Clear browsing data
window, select the Browsing history checkbox, and select the Clear now button.
If Bing is your default search provider and you are signed in, you may delete your
searches through the Microsoft Privacy dashboard . You can clear your browsing
history and delete websites from appearing as suggestions in the address bar. Go to
edge://history , and select Clear browsing data. You can delete the data Microsoft
collects from the address bar and search suggestions features on Windows 10 and later.
Open Start > Settings > Privacy > Diagnostics & feedback. In Delete diagnostic data,
select Delete. All other data is deleted after 36 months.
Account-specific search functions are available if you are signed in to Microsoft Edge
with a Microsoft work or school account, and Microsoft Search is available. Microsoft
may send an anonymous token with your query, to provide account-specific functions,
such as results specific to your company.
All data is transmitted securely over HTTPS. If Bing is your default search provider, the
searches and typed characters are saved for up to six months.
If you search for a single word in the address box, Microsoft Edge may send the single
word to your DNS server. Sending a single word is a check to see whether it
corresponds to a host on your network. If so, Microsoft Edge may try to connect to the
corresponding host. This option lets you go to the specific host instead of searching. For
example, if your router uses the hostname router and you type router in the address
bar, you can go to https://router , or search for the word router . The feature is not
controlled by the Show me search and site suggestions using my typed characters
setting because it does not involve sending data to your default search engine.
You can control whether or not typed characters are sent to your default search
provider. Go to edge://settings/search . Toggle the Show me search and site
suggestions using my typed characters setting.
You can change your default search engine. Go to edge://settings/search . Select the
Search engine used in the address bar dropdown menu. If you are browsing while
using InPrivate or Guest mode, your autosuggestions are turned off. InPrivate shows
suggestions from your local browsing, such as browsing history and past searches. No
typed characters are sent to your default search engine. Guest mode does not display
any suggestions or send typed characters to your default search engine.
Data collected by other search providers follow the privacy policy of the company.
Autofill
Autofill in Microsoft Edge lets you save form entry data. Form entry data includes
passwords, payment information, addresses, and other data such as birthdays. When
you visit a site and start to fill out a form, Microsoft Edge uses form fill information to
match your saved autofill data to the form. Microsoft Edge offers form entry data you
previously saved when you open similar forms. Passwords and credit card information
are only saved with your explicit permission for each password and card.
Addresses and other form entries are saved by default. To control saving and autofill of
address and other form data, go to edge://settings/profiles . Select Personal info and
toggle the Save and fill personal info setting.
You can prevent Microsoft Edge from prompting you to save passwords. Go to
edge://settings/passwords . Toggle off the Offer to save passwords setting. You can
prevent Microsoft Edge from using autofill for saved passwords and delete saved
passwords. Go to edge://settings/passwords and select Saved passwords. To delete all
autofill data, go to edge://settings/clearBrowserData , select Autofill form data, select
the desired time range, and then select Clear now.
If you are signed in and syncing, your autofill data is synced across all versions of
Microsoft Edge where you are signed in with the same credentials. When syncing, all
autofill data is stored on encrypted Microsoft servers. The autofill data stored on
Microsoft servers is used only for sync purposes. You can turn off syncing of your autofill
data. Go to edge://settings/profiles/sync and turn off the Basic info toggle. If sync is
on for autofill, deleting autofill data from a device while you are signed in to Microsoft
Edge removes the data from all other devices that you are signed in to with the same
credentials.
When you visit a webpage and submit a form, Microsoft Edge sends information about
the form to the Microsoft form fill service. This information includes a hash of the
hostname and autofill entry types. For example, text box 1 expects an email address, text
box 2 expects a password, and so on. No user-entered information or user identifiers are
sent to the service. The information helps Microsoft Edge correctly identify forms across
different webpages. The data is used to help match your saved autofill data to the form.
In Guest mode, autofill is not available and new autofill entries aren't added. For
InPrivate mode, Microsoft Edge offers autofill entries, but new autofill entries aren't
added.
To open Bing Chat in the Microsoft Edge sidebar, click the Bing Chat ( ) icon
(Ctrl+Shift+.) in the upper right of the Microsoft Edge toolbar:
Data and consent used by Bing Chat in the sidebar
Microsoft Edge determines what data to send to Bing Chat based on the user's query
and their consent to share data with Microsoft. For questions that don't need browsing
context, such as "Help me plan a trip to Cannon Beach", Microsoft Edge shares the URL,
page title, user's query, and previous conversation history to help Bing Chat answer their
query effectively.
For questions that need browsing context, such as when the user asks Bing Chat to
summarize a large page of text, Microsoft Edge requests permission from the user to
access page information:
When the user grants permission to share page information, Microsoft Edge sends the
full browsing context in addition to the user's query and previous conversation history
to Bing Chat, to help generate a meaningful response.
The user can modify this permission anytime by going to Microsoft Edge > Settings >
Sidebar > App and notification settings > App specific settings > Bing Chat and then
turning on or off the Allow access to any webpage or PDF toggle.
Conversation history is a history of all queries and responses from Bing Chat.
Conversation history is stored for 90 days. This is independent of whether using
Bing Chat in the Microsoft Edge sidebar or by visiting www.bing.com/chat .
Users can delete a specific conversation or all the conversations from Bing Chat
by going to www.bing.com/chat , and then deleting the specific conversations in
the Recent activity section:
Page content from public pages on the Bing index – Bing Chat uses publicly
available information from the Bing search engine to summarize pages that are
available on the Bing search index. To answer questions from public pages,
Microsoft Edge doesn't need to share this page content with Bing Chat.
Page content from non-Bing index pages – information that's used to summarize
a non-Bing index page is deleted after 6 hours, and it is only used to answer the
query.
Bing Chat has numerous protective measures in place that are constantly evolving. For
details, see The new Bing: Our approach to Responsible AI .
Term Definition
query A question that a user types in the Ask me anything text box in Bing Chat.
Bing index Any website URL that is publicly available on the internet for Bing to search and
page can be reached via a URL that starts with http:// or https:// .
non-Bing Any webpage or local file that is not available publicly for Bing to search, but is
index page open in Microsoft Edge.
grounding Centering the response that's provided to a user's query or prompt on high-
ranking content from the web, and providing links to websites so that users can
learn more. Bing ranks web search content by heavily weighting features such as
relevance, quality, credibility, and freshness.
response The text that Bing Chat outputs in response to a prompt. Synonyms: completion,
generation, answer.
conversation A combination of user query and response in the Bing Chat format.
history
browsing The page URL and page content that's open in the active tab of the Microsoft
context Edge browser. These could be webpages, local PDFs, Microsoft Word documents,
or other local files. For example, the user can ask Summarize this page while they
are browsing a long topic or webpage. Bing Chat uses the page context (such as
the page URL) and the page content to summarize the topic for the user.
page The webpage content, or the content of the document, that's open in the active
information tab of the Microsoft Edge browser.
Cast
Cast in Microsoft Edge lets you display your media to another screen using Google Cast.
To access Cast, open Settings and more (...) > More tools > Cast media to device. Cast
relies on the Media Router extension not automatically installed with Microsoft Edge.
When you first use Cast, Microsoft Edge prompts for permission to install the Media
Router extension.
Select restart to install the Media Router extensions from the Chrome Web Store. On
startup and at regular intervals, Microsoft Edge sends update requests to the Chrome
Web Store. Update requests include basic data about your version of Microsoft Edge.
Regular update requests keep the Media Router extension up to date.
Google may collect some data associated with the Media Router extension. To uninstall
the Media Router extension, go to edge://flags#edge-on-demand-media-router and
change the setting. Uninstalling also stops updates from the Chrome Web Store. The
extension is hidden and does not appear on the Installed extensions list. For the
Installed extensions list, go to edge://extensions .
Collections
The Collections feature in Microsoft Edge allows you to save web pages, text, images,
and videos from the web. You can organize the content based on the projects, events,
and interests that matter to you. You can also save notes in your collections and add
notes to individual items as well. Collections uses the Microsoft Edge Entity Extraction
service to enrich the content that you collect by including thumbnails and metadata,
such as price and star rating. For more information, see Entity extraction below.
Collections storage and feature availability depend on your Microsoft Edge Sign-in and
Sync settings.
If you want to disable Collections for a signed-in profile using a personal account, go to
edge://settings/privacy , scroll down to the Services section, and then turn off the
toggle for Show Collections and follow content creators in Microsoft Edge.
When you sign in with a personal account and Sync for Collections is disabled, all
collections data is stored locally on the device, organized per Microsoft Edge profile.
You cannot access Collections from an InPrivate window while signed in with a personal
account.
If you're signed in with a work or school account and are syncing Collections, your
collections, saved items, notes, and images are synced across devices. If you want to
stop syncing your Collections, you can turn off Sync for Collections from
edge://settings/profiles/sync .
When you sign in with a work or school account and Sync for Collections is disabled, all
collections data is stored locally on the device, organized per Microsoft Edge profile.
You can access Collections from an InPrivate window while signed in with a work or
school account.
Signed-out
When you don't sign in to Microsoft Edge, all collections data is stored locally on the
device, organized per Microsoft Edge profile.
You can access Collections from an InPrivate window when using a signed-out profile.
Compose
In the Bing Chat pane, the Compose tool uses AI to write for you, starting from a short
prompt and Tone, Format, and Length selections. Text that's generated by Compose can
be copied or inserted into the webpage directly.
To access Compose, click the Bing Chat ( ) icon (Ctrl+Shift+.) in the upper right of
Microsoft Edge, and then select Compose. Text and selections that you enter are sent to
an internal Microsoft Large Language Model (LLM).
Requests for Compose are sent over a secure HTTPS connection. Each request contains
the input prompt, formatting selections, and IDs that are associated with your Microsoft
Edge profile and device, to reference for subsequent requests.
Crashes
If optional diagnostic data, including crash reports, are turned on, diagnostic data is
collected when Microsoft Edge crashes or closes unexpectedly. The diagnostic data is
used to diagnose and fix problems with Microsoft Edge and other Microsoft products
and services.
Collected diagnostic data is in the form of crash dumps, which contain device and
software state captured at the time Microsoft Edge crashed or closed. The crash dump
contains information about what was happening at the time of the problem. Information
such as the website you were visiting at the time of the crash or your CPU usage may be
included in the diagnostic data. If crash reporting is turned on, the crash dump is stored
locally on the device and sent to Microsoft using an encrypted link.
Each crash dump contains an identifier unique to the device and a resettable identifier
unique to your browser. It also includes extra diagnostic data such as the URL, CPU
usage, and network usage, to help identify the problem. The extra diagnostic data helps
Microsoft determine how many devices are encountering the problem and the severity.
Crash dumps are stored on secure Microsoft servers for up to 30 days, and then deleted.
You can request to delete the diagnostic data on Windows 10 and later devices. Open
Start > Settings > Privacy > Diagnostics & feedback. In Delete diagnostic data, select
Delete. Collected crash information, such as a count of crash types, are stored for
reporting and product improvement purposes.
You can clear the crash diagnostic data stored locally on a device. Go to edge://crashes
and select the Clear all button.
To turn off crash diagnostic data collection on Windows 10 and later, open Start >
Settings > Privacy and select Diagnostics & feedback. For versions of Microsoft Edge
on all other platforms, go to edge://settings/privacy and turn off the Help improve
Microsoft products by sending optional diagnostic data about how you use the
browser, websites you visit, and crash reports setting. You can manage diagnostic data
collection at the enterprise level. See group policies managed by your organization.
Developer tools
Microsoft Edge Developer Tools help with website debugging and testing. Open
Settings and more (...) > More tools and select Developer tools. When you turn on
certain features in Developer Tools, Microsoft Edge requests modules from Microsoft
servers and downloads them to your device. The request is sent over a secure HTTPS
connection and contains a non-unique identifier representing the version of Microsoft
Edge. Specific experiences that require remote download include 3D View and the
Elements tool Accessibility pane. Webhint integration requires a remote module that is
automatically requested when you open Developer Tools.
Diagnostic data
Microsoft uses diagnostic data to improve products and services. Diagnostic data is also
used to keep products secure, up to date, and performing as expected. Microsoft
believes in and practices information collection minimization. We strive to gather only
the information we need, and to store it for only as long as needed to improve products
and services.
Microsoft Edge collects a set of required diagnostic data needed to keep the product
secure, up to date, and performing properly. The required diagnostic data includes
device connectivity, configuration information, software setup, and inventory. Microsoft
uses this diagnostic data to troubleshoot issues and keep Microsoft products and
services reliable, secure, and operating normally. For more information about diagnostic
data on managed devices, see Configure Windows diagnostic data in your organization
and Microsoft Edge diagnostic data group policy.
You may also choose to share optional diagnostic data. As you use Microsoft Edge
features and services, or other applications that use the Microsoft Edge web platform,
Microsoft Edge sends optional diagnostic data about how you use those features and
the websites you visit. With your permission, this optional diagnostic data is sent to
Microsoft to improve products and services for everyone. This data is not collected or
stored with your Microsoft account.
Optional diagnostic data includes feature usage, performance data, site load times,
memory usage, and websites you visit. For example, if you choose a website as a
favorite, optional diagnostic data is sent. It includes that the favorite button was
selected, and a favorite was successfully added, but not which site was set as a favorite.
Information about websites you visit in Microsoft Edge helps us understand how quickly
sites load and increases the relevance of search results for all users. The data includes
information about the website such as the URL of the page you visit, website metrics,
title of the page, how you accessed the page, information about the content of the
page, and other relevant information about the page navigation.
Diagnostic data is sent using HTTPS and stored on Microsoft servers. On Windows
devices, diagnostic data is sent with an identifier unique to your device. On other
devices, the diagnostic data is associated with a resettable identifier unique to your
browser. The identifier is randomly generated and does not contain your personal
information.
The Microsoft Edge team respects the sensitivity of diagnostic data by restricting data
access or removing personal information. To reset the identifier unique to your browser
on Windows 10 and later devices, select Start > Settings > Privacy > Diagnostics &
feedback, and then select Delete under Delete diagnostic data, or change your setting
under Diagnostic data from Full to Basic or turn off Optional diagnostic data.
On other platforms, to generate a new resettable identifier (ID) that is unique to your
browser, go to edge://settings/privacy and turn off the Help improve Microsoft
products by sending optional diagnostic data about how you use the browser,
websites you visit, and crash reports setting. The reset (ID) functionality may be
different for devices managed with group policies set by your organization.
If you're using Windows 10 version 1803 (April 2018 Update) or later, to view product
data shared with Microsoft in the Diagnostic Data Viewer, select Start > Settings >
Privacy > Diagnostics & feedback, and then select Open Diagnostic Data Viewer under
View diagnostic data.
Microsoft since the last time the viewer was opened, go to edge://data-viewer . To see
what data has been sent to Microsoft for your specific session, refresh the viewer. The
data used to populate edge://data-viewer is stored locally on the device. To clear the
data in the viewer, close the edge://data-viewer tab.
To help us improve Microsoft products and services, diagnostic data is aggregated, with
personal identifiers removed, and stored for up to two years. Because the diagnostic
data is not collected from or stored with your Microsoft account, the diagnostic data
may not be viewed or deleted from your Microsoft privacy dashboard . To delete the
diagnostic data on Windows 10 and later, select Start > Settings > Privacy >
Diagnostics & feedback, and then select Delete under Delete diagnostic data. The
delete diagnostic data functionality is only supported on Windows 10 version 1803 or
later. For more information, see Diagnostics, feedback, and privacy in Windows 10 and
later .
For Microsoft Edge on Windows 10 and later, sending Optional diagnostic data is
determined by your Windows diagnostic data setting. The setting is reflected in
edge://settings/privacy . Change the Windows settings by going to Start > Settings >
Privacy > Diagnostics & feedback. On all other platforms, to control the collection of
diagnostic data, go to edge://settings/privacy and turn on or off Help improve
Microsoft products by sending optional diagnostic data about how you use the
browser, websites you visit, and crash reports. The setting is used for all profiles
associated with the installation of Microsoft Edge on your device. The setting is not
synced across devices. The setting applies to InPrivate browsing and Guest mode.
Information about websites you visit is never sent while browsing InPrivate or in Guest
mode. If your device is managed with group policies set by your organization, it is
described in edge://settings/privacy .
Digital Rights Management and Media Licenses
When a website offers media content that is protected by Digital Rights Management
(DRM), Microsoft Edge uses a secure playback pipeline to make sure the content is not
improperly viewed or copied. As part of the feature, Microsoft Edge may store DRM-
related data on your device, including a unique identifier and media licenses. Microsoft
Edge may also transmit the unique identifier to a media licensing server specified by the
content provider. When you use the website, Microsoft Edge retrieves the DRM
information to make sure you have permission to use the content. The data helps to
validate access to the protected content and ensure a seamless media experience.
Microsoft Edge supports DRM using the Encrypted Media Extensions API (EME API) for
HTML5 sites. The EME API allows websites to communicate with a DRM provider called a
Content Decryption Module (CDM). Different DRM systems, such as Widevine by Google
or PlayReady by Microsoft, may be supported by the CDM implementation of the
developer. Content providers may choose to support one or more potential DRM
systems. Providers may use the function of the EME API to decide which DRM system to
use for a specific client. For more information about EME privacy, see Encrypted Media
Extensions Privacy .
Microsoft Edge supports PlayReady DRM only on Windows 10 and later. PlayReady is a
DRM implementation to deliver media experiences such as 4K video and Dolby Atmos
audio. Microsoft Edge uses the Windows Platform Media Foundation APIs to support
PlayReady. To validate access to protected content, Microsoft Edge uses the Windows 10
or Windows 11 operating system. Windows uses a unique identifier (ID) and
communicates the ID with the PlayReady service. All EME, CDM, and browser data for
PlayReady that persists on the device is stored and maintained on Microsoft Edge. For
more information about PlayReady, see Simple End to End System.
Microsoft Edge supports Widevine by Google DRM and the option is on by default.
Microsoft Edge periodically fetches updates for Widevine from Google servers. The use
of Widevine may include communications to Google. To opt-out of using Widevine in
Microsoft Edge, go to edge://flags/#edge-widevine-drm and turn off the Widevine DRM
setting. Widevine has the capability to create a unique device identifier and transmit it
to Google. For more specific information on Widevine and privacy, see the Google
privacy policy.
Microsoft Edge supports the Flash Access DRM by Adobe, which is used by some sites
instead of HTML5. You are prompted to allow Adobe Flash when a site requests it. When
a site uses the Flash Access DRM by Adobe, Microsoft Edge gives Adobe access to a
unique device identifier. You can clear and reset any locally stored instances of the
identifier. Go to edge://settings/privacy . In Clear browsing data. select Choose what
to clear, select the checkbox for Cookies and other site data, and select Clear now to
remove any stored identifiers. To stop Adobe Flash DRM from ever being used, go to
edge://settings/content/flash .
When you request access to encrypted HTML5 media such as an online movie, Microsoft
Edge creates a license request to decrypt the media. The CDM in use creates the license
request containing a request ID. The request is sent to the license server. No part of the
license request contains any personal data, and the license request is not stored on the
device.
When returning the media license, a media identifier is created which is unique to the
user and the site. The ID is not shared between sites and is different for each site. A
session ID, used to identify a playback session, is sent with the media identifier to
decrypt the media. The media identifier is stored locally on the device and may be
stored with the content provider.
content (recommended) and Allow identifiers for protected content (computer restart
may be required) settings.
The Allow sites to play protected content setting controls playback for CDM-
based DRM systems such as PlayReady and Widevine, but not for non-CDM-based
systems like Flash Access DRM. To manage Flash site permissions, go to
edge://settings/content/flash . Turning off the setting causes media functions to
stop working properly.
Turning off the Allow identifiers for protected content setting prevents the
creation of identifiers for Flash Access DRM and prevents Widevine from
periodically fetching updates from Google. Turning off the setting may cause
media functions on some sites to stop working properly.
Do Not Track
You can enable Do Not Track on Microsoft Edge. Go to edge://settings/privacy . Turn
on the Send "Do Not Track" requests setting. If you enable the Do Not Track feature,
Microsoft Edge sends a DNT:1 HTTP header with your outgoing HTTP, HTTPS, and SPDY
browsing traffic requests. This feature tells websites you visit not to use trackers.
However, enabling the Send "Do Not Track" requests setting does not guarantee that
the websites aren't able to track you. Some sites may honor the request by showing you
ads not based on any previous browsing. Microsoft Edge does not control whether or
not the request is honored. You can help prevent websites from tracking you. Go to
edge://settings/privacy . Change the Tracking prevention setting to Balanced or Strict.
When you use Guest mode, Microsoft Edge does not send Do Not Track requests.
When you use InPrivate browsing, Microsoft Edge only sends Do Not Track requests if
the Send "Do Not Track" requests setting is turned on for the profile you are using.
Downloads
Microsoft Edge lets you download files safely and securely. To choose where files are
downloaded on your device, go to edge://settings/downloads . If SmartScreen is
enabled, information about your file, such as the file name and URL, are sent to
SmartScreen to check the reputation of the file. The reputation check helps you avoid
accidentally downloading known malware that is known to hurt your device. To change
SmartScreen settings, go to edge://settings/privacy and toggle SmartScreen. For more
information about SmartScreen, see the SmartScreen section.
Edge does not remove the files from your device. Deleting downloaded files from your
device does not remove the files from your download history. When you use InPrivate
browsing or Guest mode, the download history from the session is cleared when you
close the InPrivate or Guest windows. The files remain saved on the device.
Feature Article
Windows Information Protection Protect your enterprise data using Windows Information
Protection (WIP)
Microsoft Endpoint Data Loss Learn about Endpoint data loss prevention
Prevention (DLP)
When these enterprise features are on, the browser sends auditing and diagnostic data
to the administrator as per the feature’s requirement to function, manage or diagnose
properly. This data collection is controlled by the enterprise administrator and end user
is not able to opt-out.
Please contact your enterprise administrator to understand your company's policies for
such data collection.
Entity extraction
Microsoft Edge uses entity extraction templates that are specific to a list of supported
websites to identify the name, price, ratings, primary image, and other data about the
item being collected locally. When creating the collection, no user identifiers or other
data are sent to Microsoft services.
Comments and reviews from users are public on the Add-ons website and are also
shared with the developers. If you are signed in to Microsoft Edge, installed extensions
from the Microsoft Edge Add-ons website are associated with your account to provide
extension recommendations. The data is used in aggregate to understand the popularity
of extensions.
You can sync extensions and preferences across all your signed-in syncing versions of
Microsoft Edge. Go to edge://settings/profiles/sync , and select the Sign in to sync
data button.
access. Microsoft Edge asks for your permission before installing the extension. Make
sure an extension is credible and secure before installing it. Review the privacy policy of
the developer for the specific extension.
Extensions are updated using the Microsoft Edge update service. Microsoft Edge sends a
list of installed extensions to the update service to check for updates. If you install an
extension from the Chrome Web Store, requests are sent to the Chrome Web Store at
regular intervals to check for extension updates. The extension identifier, extension
version, and information about Microsoft Edge are included in the request for updates.
You can stop requests to the Chrome Web Store. Go to edge://extensions . Turn off the
From other sources toggle to uninstall extensions.
You can import extensions from other browsers like Google Chrome. If an imported
extension is available in the Microsoft Edge Add-ons website, Microsoft Edge
automatically installs the extension from the Microsoft Edge Add-ons website. If you
previously had the extension turned on, Microsoft Edge automatically turns it on for
you.
If an extension is not available from the Microsoft Edge Add-ons website, Microsoft
Edge locally copies and installs your extension from Google Chrome without turning it
on or connecting to the Chrome Web Store. Microsoft Edge asks for your permission to
turn on the extension and to allow extensions from other stores. If you granted
permission, Microsoft Edge allows installation of extensions from other stores and
updates to your extensions using the Chrome Web Store. You can control the option to
allow extensions from other stores. Go to edge://extensions . Toggle the Allow
extensions from other stores setting.
Family safety
Microsoft offers tools to help families stay connected and keep kids safer on Windows,
Xbox, and Android devices running Microsoft Launcher.
Within a family group, there are family settings that should be enabled for children
while using Microsoft Edge. The family group organizer must enable the settings for
users in the group. The three main features offered to a family group are web filtering,
activity reporting, and safe search.
Web filtering protects children in the family group from going to mature websites or
websites blocked by the family organizer.
Activity reporting records information about the websites children visit. Records also
include searches, screen time, devices used, and attempt to visit blocked sites. The
family group organizer may see the information at family.microsoft.com . The data is
collected, encrypted in transit, sent to Microsoft, and stored on secure Microsoft storage
servers. The data is collected with the child's Microsoft account so it may be properly
managed. Activity reports are stored on family.microsoft.com for up to 30 days and
then deleted after.
Safe search adds a safe keyword to the header request to search engines. Bing reads the
safe keyword and filters search results returned to the child. Other search engines may
return filtered results due to the keyword. All of the child's searches are collected and
made available for the family organizer to view in activity reports or at
family.microsoft.com . The data is collected with the child's Microsoft account so it
may be properly managed.
The child account's health status is also monitored. When a child needs to take action to
log back into their account, such as when a password has changed or expired, their
parent is informed. This data is collected, encrypted in transit, and sent to Microsoft and
stored on secure Microsoft storage servers. The account health status is stored on
family.microsoft.com for up to 30 days and then is deleted afterwards.
The child's browsing data is stored on secure Microsoft servers and made available to
parents for up to 30 days, then immediately deleted. The data may be deleted at any
time from the Microsoft privacy dashboard . To clear browsing data stored locally on a
device, go to edge://settings/clearBrowserData . Choose a Time range, select
checkboxes as needed, then select Clear now.
Collecting child browsing data and sharing it with the family group organizer requires
two things. 1.) The child must be signed in to Windows 10 and later with a Microsoft
account. 2.) The activity reporting setting must be turned on by the family organizer. The
child does not need to be signed in to Microsoft Edge to collect browsing data. If family
safety features aren't available on your version of Windows, update to the most recent
version of Windows.
Guest mode and InPrivate browsing aren't available if web filtering or activity reporting
is turned on.
The family group organizer may stop the data collection from the family safety portal.
For more information about Microsoft family safety features, see What is a Microsoft
family group?
Find on Page
Find on Page allows you to search a web page for important keywords. Open Settings
and more (...) > Find on Page. A search box will appear. Type any keyword or phrase
into this search box and the page will highlight all locations on the page where your
exact search term appears. You can then move through these terms with the Previous
result and Next result buttons.
To help you find exactly what you're looking for, Microsoft Edge uses a Microsoft cloud
service to find additional related matches for your search. This only happens when the
Include related matches toggle in Find on Page is turned on.
If the Include related matches toggle is turned on, Microsoft Edge sends the text of the
webpage, your search terms, and a service token to a Microsoft cloud service over a
secure HTTPS connection. The service token doesn't contain any user-identifiable
information. A Microsoft cloud service then processes the text to find results on the
page that are related to your search. The webpage text and search terms sent to
Microsoft are both deleted immediately after processing occurs. No data is stored for
any period of time.
Geolocation
While you browse the web, websites may request your device's location from Microsoft
Edge. Data about your device's location can be either precise or imprecise. For example,
a precise location is needed to provide driving directions to or from your specific
location. An imprecise location may be used to provide search results, news, and
weather relevant to your general area.
Microsoft Edge supports the Geolocation API , which allows websites to access your
precise location with your permission. Microsoft Edge always asks for your permission
before granting websites access to your precise location. To manage the site-specific
permissions or to always block sites from accessing your precise location, go to
edge://settings/content/location .
Microsoft Edge indicates when your precise location is being shared on the right side of
the address bar.
You can allow Microsoft Edge to provide the requesting site with a precise location on
Windows 10 and Windows 11. Open Start > Settings > Privacy > Location and turn on
the Allow access to location on this device and Allow apps to access your location
settings. These settings enable the Windows location service. When enabled, Microsoft
services may also estimate your imprecise location via the Windows location service to
provide locally relevant browsing experiences.
If you turn off the Allow access to location on this device and Allow apps to access
your location settings, some sites may still estimate your location using other
technologies (such as Bluetooth, WiFi, cellular modem, or IP address) with varying
degrees of accuracy. With Windows location settings disabled, precise location
experiences that you allow in Microsoft Edge may also be inaccurate. For more
information about Windows location settings, see Windows location service and
privacy .
Microsoft Edge doesn't store your geolocation coordinates. When making requests to
the Windows location service, Microsoft Edge generates a new random ID for each
request.
InPrivate browsing uses the precise location permission setting of the profile from
which the InPrivate session was launched. Guest mode always asks you for permission
before granting the site your precise location.
Image descriptions
When browsing the web in Microsoft Edge, screen reader users may encounter images
that are not annotated with alt text. Without alt text to describe these images, they are
effectively invisible to screen reader users. When Image Descriptions is turned on,
Microsoft Edge will detect these images without alt text and send them to Azure
Cognitive Services to generate captions. The generated captions are then announced to
screen reader users. Even when Get image descriptions from Microsoft for screen
readers is turned on, images are only sent to the service when a screen reader (or other
assistive technology) is connected to Microsoft Edge.
Only raw image data is sent to Azure Cognitive Services. Images are sent un-encrypted,
to reduce latency. No user identifiers are included in the requests to the service. Images
aren't stored or saved on Microsoft servers; images are discarded immediately after the
captions are generated.
Image Descriptions can be turned on for the current web page without enabling for all
web pages. While using a screen reader, right-click the webpage, and select Get image
descriptions from Microsoft > Just once. The current web page will be scanned for all
images without alt text and send those to the service for descriptions. The Image
Description feature will remain off for other pages and future browsing.
Image Enhancement
To provide a better browsing experience, Microsoft Edge offers Image Enhancement by
improving color, lighting, contrast, and sharpness of images. When Image Enhancement
is turned on, Microsoft Edge encrypts and transmits image URLs to Microsoft servers to
perform image enhancement. No user identifiers are included in the requests to the
servers. The image URL and enhanced image are cached for 7 days solely to improve
performance.
With your confirmation, Microsoft Edge imports browser data from other browsers such
as Google Chrome, Mozilla Firefox, or Internet Explorer. Microsoft Edge imports data
from your most used browser as defined by your operating system. If you choose to
regularly import your browsing data, browsing data will be imported each time
Microsoft Edge is launched. Importing your data is completed locally on your device,
and is stored locally, and is not sent to Microsoft unless you sign in and sync your
browsing data.
When importing extensions, if the extension is not available on the Microsoft Edge Add-
ons website, Microsoft Edge imports a local copy and asks for permission before
starting. The permissions for some of the extensions may have changed. To review the
extension permissions, go to edge://extensions .
Your browsing data from older versions of Microsoft Edge is automatically imported
when you update Microsoft Edge.
When you install or update Microsoft Edge, device information is sent to Microsoft.
Device information includes your release channel, basic hardware information, update
identifiers, an identifier unique to your device, and a resettable identifier unique to your
browser. The IP address of the device is sent to the updater service, but the last decimal
is scrubbed for added privacy protection. During each browsing session, a new
randomly generated token is created to install updated versions of Microsoft Edge. The
token is not associated with any personal information and is only used for the
installation and update process and to improve the updater service.
Microsoft Edge pings the Microsoft Edge updater service about the progress of
installation and update. If an installation or update fails and crash reporting is turned on,
a log is created and sent to Microsoft. For more information about sending crash
reports to Microsoft, see the Crashes section. Microsoft collects information about how
you downloaded Microsoft Edge, the success of the installation, and any uninstalls to
better understand the success of Microsoft Edge downloads.
Automatic updates are turned on by default for all Microsoft Edge users. On all
platforms, Microsoft Edge checks for updates on startup and periodically while running.
On macOS devices, Microsoft AutoUpdate checks for updates for Microsoft products
periodically as well. More controls and configurations are available for organizations. For
more information about controls and configurations, see Update.
Microsoft Edge downloads the list of sites from a location defined by the administrator
through a policy, and caches the file that determines which sites must be opened in IE
mode. Depending on your Windows or IE 11 settings, Microsoft Edge collects diagnostic
data about the use of IE mode. Collected data includes which sites users visit,
performance data, reliability data, and feature usage data. On Windows 10 and later, the
diagnostic data is collected according to your Windows Diagnostic data setting. On
Windows 8.1, website information is collected if the user has opted into the Flip Ahead
or Suggested Sites feature in IE. IE mode may not follow the same data collection
settings in the Microsoft Edge Privacy settings.
Non-enterprise users on Windows devices may also access IE mode. To turn on IE mode,
go to edge://settings/defaultBrowser and select the Allow sites to be reloaded in
Internet Explorer mode setting. To open tabs in IE mode, open Settings and more (...) >
More tools and select Reload in Internet Explorer mode. After you turn on IE mode,
Microsoft Edge periodically requests a list of unsupported sites from a Microsoft service.
The request is sent over HTTPS and does not contain any identifiers.
Internet Explorer browsing data is stored locally in Microsoft Edge and Internet Explorer.
To delete browsing data while browsing in IE mode, go to edge://settings/privacy and
clear the data from both Clear browsing data and Clear browsing data for Internet
Explorer.
Intrusive ads
To provide a better browsing experience, Microsoft Edge offers to block advertisements
from loading on sites that show intrusive or misleading ads. When Ads Blocking is
turned on, Microsoft Edge periodically downloads from Microsoft servers the most
recent list of sites that show intrusive or misleading ads and stores it locally on your
device. No user identifiers are included in the download request. If you visit a site that is
on the list, Microsoft Edge blocks all ads on the site and you should see the Ads blocked
message. To allow ads for the site, go to edge://settings/content/ads and change the
settings. Other than downloading the list of sites with intrusive ads, the Ads Blocking
feature does not send additional information to Microsoft or request additional
information from Microsoft while you are browsing the web.
Jump list
The jump list in Microsoft Edge lets you easily find your most recently closed sites.
Hover on the Microsoft Edge icon in the task bar and right-click. The last three closed
tabs are stored locally for each profile. To delete sites from the jump list in Windows 10
and later, right-click the site, and then select Remove from this list.
You can clear or change the display of your recently closed tabs in the jump list. Go to
edge://settings/privacy , and select the Choose what to clear every time you close the
browser setting. When using an InPrivate window, Microsoft Edge does not add closed
tab information to the jump list. When using Guest mode, the jump list is not available.
For more information about clearing your browsing data, see View and delete browser
history in Microsoft Edge .
Kids Mode
Kids Mode is a convenient browsing mode designed for kids inside Microsoft Edge. With
the kid-friendly features and safety guardrails in place, Kids Mode is a great place for
children to safely explore the web. Kids Mode includes features like custom browser
themes, kid-friendly content, browsing based on an allowlist, Bing SafeSearch set to
strict, and a password requirement to exit. Kids Mode doesn't require a child account or
profile, therefore you aren't able to sign into Kids Mode.
To enhance the Kids Mode experience, Microsoft Edge adds a safe keyword to the
header request to Microsoft Bing and Microsoft News. The safe keyword helps filter out
inappropriate search results and news. Kids Mode sets preferences for Microsoft Edge
settings such as setting tracking prevention to Strict to block most trackers on websites.
Clear browsing data on close has also been turned on which clears things like Cookies
and other website data when Kids Mode closes. To clear browsing data at any time
within Kids Mode, complete the following actions.
Kids Mode does not collect data for personalization of the news feed or other Microsoft
services. You may not change the privacy settings for Kids Mode. Other settings like
Windows Defender SmartScreen and diagnostic data are configured according to the
profile in which Kids Mode was launched. For more information about diagnostic data
about how you use the browser and Windows Defender SmartScreen, see the Diagnostic
Data and SmartScreen sections.
Microsoft Edge WebDriver, see Use WebDriver to automate Microsoft Edge automation.
Network time
Microsoft Edge uses a Microsoft network time service to track time from an external
source such as a time server. At random intervals or when Microsoft Edge encounters an
expired SSL certificate, Microsoft Edge may send requests to Microsoft to obtain the
time from a trusted source. The requests occur more frequently if Microsoft Edge
detects the system clock is inaccurate. A system clock inaccuracy happens if the user
changes the time on the operating system and that conflicts with the correct time zone.
The Microsoft network time service is used to get the Coordinated Universal Time (UTC).
The requests contain no cookies or user identifiers, and no data is logged.
experience setting.
Microsoft News
To tailor content to your interactions and preferences, the new tab page in Microsoft
Edge stores cookies with randomly generated identifiers on the device. A scrubbed
version of your IP address is also used to tailor the content to your general region. TO
clear the cookies that persist on your device, go to edge://settings/siteData .
To prevent ads from being personalized, see Ad settings on the Microsoft privacy
dashboard . Turn off the See personalized ads in your browser setting. To turn off the
quick link tiles, open customize button > Custom and turn off the Show quick links
setting. Microsoft Edge uses your local browsing history to personalize the quick link
tiles. You can delete or create new tiles. The data is only stored locally on the device, per
profile.
The search box on the new tab page runs a Bing search based on the query you type. To
automatically provide search suggestions and results, Microsoft Edge shares your typed
characters, search query, IP address, and search identifiers with Bing. The search box
may be configured with group policies to provide search results from Microsoft Search.
The results can include information from your organization such as documents and
intranet content. To provide an integrated search experience, Microsoft Edge stores
cookies locally on the device.
If you are signed in to Microsoft Edge with your Microsoft account, you may manage
your browsing activity associated with the new tab page from the Microsoft privacy
dashboard .
Microsoft Edge collects diagnostic data about how you use the new tab page, such as
interactions with the search box and selections on quick link tiles. To enable collection of
diagnostic data about how you use the new tab page, go to edge://settings/privacy
and turn on the Help improve Microsoft products by sending optional diagnostic data
about how you use the browser, websites you visit, and crash reports setting. The
browser sends diagnostic data about how you use the Microsoft News page to
Microsoft to help understand user interactions with news content and improve
Microsoft products. You may turn off Microsoft News content by selecting the
customize button on the new tab page. News data is sent to Microsoft using HTTPS and
stored for up to 13 months, after which it is aggregated and the personal identifiers are
removed.
The new tab page also lets you set a custom image as the background. The image is
stored locally on the device and may be deleted by removing the image or uploading a
new image. No information about the image is sent to Microsoft.
Microsoft 365
If you are signed in to Microsoft Edge with a work or school account, your organization
may turn on Microsoft 365 as an option for page content on the new tab page. The
feature is currently available only for commercial customers under the Microsoft Online
Services Terms (OST) . For more information about privacy for Microsoft 365, see
Overview of privacy controls for Microsoft 365 Apps for enterprise.
InPrivate browsing and Guest mode offer alternative new tab page experiences.
On startup
Microsoft Edge lets you pick up your browsing where you left off. It opens your last
open tabs from your previous browsing session, including session cookies. This feature
remains available on startup to restore tabs from your previous session and keep you
signed in to sites you visited. You can configure Microsoft to edge display the open tabs
from your previous browsing session. Go to edge://settings/onStartup and turn on the
Continue where you left off setting. If you select the Continue where you left off
setting and clear browsing data each time you close the browser, the data you specified
is deleted but the URL persists for the next session.
You may set Microsoft Edge to open specific pages on startup. The pages you specify
are stored locally on your device and are profile-specific. If you turned on sync for
settings, the specified pages are synced across all versions of Microsoft Edge where you
are signed-in. To enable syncing your settings, go to edge://settings/profiles/sync
and turn on Settings.
Password Monitor
Microsoft Edge is committed to keeping you safe on the web. If you are signed in to
Microsoft Edge, Password Monitor alerts you if your credentials have been exposed in a
third-party data breach. If Password Monitor is turned on, your saved credentials are
hashed and encrypted locally on your device.
Saved credentials are sent to Microsoft servers over HTTPS, and compared against an
encrypted list of known breached credentials. Your account identifier is securely sent
along with your hashed and encrypted credentials to the Password Monitor service.
The feature is only available for users signed in to Microsoft Edge. Microsoft Edge asks
for your permission to turn on Password Monitor. To manage Password Monitor, go to
edge://passwords .
Payments
Microsoft Edge helps you be more productive by letting you save your payment info to
your browser profile and offering to automatically fill in payment forms with the info
when you need it while browsing. When you encounter a similar payment form,
Microsoft Edge offers to fill in the form with the saved info. Credit cards and other
payment info is only saved with your explicit permission.
Microsoft Edge asks you if you want to store your payment info if payment autofill is
turned on. The info is encrypted locally on your device. To delete saved payment
information, go to edge://settings/payments . When you delete saved payment info, the
info no longer appears as an autofill suggestion. To not save any payment information,
go to edge://settings/payments and turn off the feature.
Microsoft Edge lets you save your payment information to your browser profile.
Microsoft Edge offers to automatically fill in payment forms when needed. Whenever
you encounter a similar payment form, Microsoft Edge offers to fill in the form. Credit
card and other payment information are only saved with your explicit permission.
Microsoft Edge asks you if you want to store your payment information if payment
autofill is turned on. The information is encrypted locally on your device. To manage
payment information, go to edge://settings/payments . When you delete saved payment
information, it no longer appears as an autofill suggestion.
Microsoft Edge also supports saving your payment information to your Microsoft
account if you are signed in and syncing, which makes the information available across
devices. To save payment information to your Microsoft account, credit card verification
(CVV) may be required, depending on your current region. CVV is only used for
authorization and will not be stored by Microsoft.
Microsoft Edge supports the PaymentRequest API. The API lets you pay for purchases
with payment information you previously saved using autofill. The PaymentRequest API
allows the merchant to request the following information: credit card number, credit
card expiration, full name, billing address, email address, phone number, and shipping
address. The API tells the merchant that you have credit card information saved, but
does not share any information with the merchant unless you allow it. To turn off the
Payments feature, go to edge://settings/privacy .
The feature is only available for users with a non-child Microsoft account. The feature is
not available for users signed into Microsoft Edge with a work or school account.
Personalization
If you allow personalization, the Microsoft Edge team collects and uses your Microsoft
Edge browsing history to personalize experiences and advertising on Bing , Microsoft
News, and other Microsoft services. Personalization provides more relevant and useful
search results, ads, and news content. For example, if the Microsoft Edge team
determines based on your browsing that you prefer a particular store, the ads you see
may be for that store. Similarly, if you frequently look at travel blogs and read travel
articles, your news feed may include news content about traveling.
The personalization feature is only available for users with a non-child Microsoft
account. The feature is not available for users signed in to Microsoft Edge with a work or
school account.
Your browsing history is collected and used for personalization only if all four conditions
are met.
Your browsing history and other data are transferred over HTTPS and attached to your
Microsoft account information. Your browsing history is stored on secure Microsoft
servers. You may view and delete previously shared browsing history by going to the
Microsoft privacy dashboard . Your browsing history is stored on secure Microsoft
servers for up to 180 days. After 180 days, the data is deleted and not used for
personalization.
You may modify your interests or opt-out of personalized ads from the Ad settings on
the Microsoft privacy dashboard .
Opting out of personalized ads on the Microsoft privacy dashboard does not turn off
the collection and use of your browsing history for personalization of search results and
content in your news feed. You can turn off the collection and use of your Microsoft
Edge browsing history for personalized search results and news. Go to
edge://settings/privacy . In Personalize your web experience turn off the Improve
your web experience by allowing Microsoft to use your browsing history from the
account for personalizing advertising, search, news and other Microsoft services
setting. If you stop sharing the data, Microsoft no longer collects and uses your
browsing history to personalize ads, search results, and news. For more information
about personalization in Microsoft Edge, see Microsoft Edge browsing history for
personalized advertising and experiences .
Print
Microsoft Edge lets you print webpages, PDF files, or other content using devices and
applications. When you print to a printer, application, or PDF, Microsoft Edge sends the
commands and file information to the operating system of your device. The information
is not sent to Microsoft. All data sent to the operating system of your device for printing
is deleted immediately after printing is completed or canceled. To change your printing
destination, go to edge://settings/printing .
You may also print webpages and files to a PDF using Microsoft Print to PDF, which does
not send any data about the file back to Microsoft. Any annotations made to the PDF
file are saved locally to the file.
Profiles
Profiles in Microsoft Edge allow you to separate your browsing data into independent
profiles. Data associated with one profile is separate from data associated with other
profiles. Your personal favorites and history, for example, aren't synchronized with your
work account if you set each up in different profiles.
However, users can easily switch between existing profiles in Microsoft Edge without the
need for passwords. If users have access to the same device, users may create another
profile on the same version of Microsoft Edge without the permission of the current
profile owner. Removing the profile from Microsoft Edge settings permanently deletes
browsing data for the specific profile stored on the device, such as browsing history,
favorites, form fill data, and passwords. Data synced to your account may still be stored
in the Microsoft cloud and may be cleared from the Microsoft privacy dashboard .
Guest mode allows you to browse the web without being signed in to other sites
automatically. Microsoft Edge does not send websites any information to indicate that
the user is browsing in Guest mode. When you use Guest mode, permission to collect
diagnostic data about how you use the browser and websites you visit is taken from the
profile of Microsoft Edge from which the Guest mode session was launched. All
browsing data for the specific Guest mode session is cleared after all Guest windows are
closed.
By default, while browsing InPrivate, Microsoft does not collect any information about
websites you visit for product improvement purposes. Your school, workplace, or
internet service provider may still be able to see your browsing activity.
Browsing data for the specific InPrivate session is cleared after all InPrivate windows are
closed. When using the Windows Input Method Editor (IME) keyboard for typing and
inking, data may be collected to improve language recognition and suggestion
capabilities. You can stop inking and typing data from being collected by Microsoft
while using the Windows IME keyboard during InPrivate and normal browsing. Open
Start > Settings > Privacy and turn off Inking & typing personalization. For more
information about InPrivate browsing, see Browse InPrivate in Microsoft Edge .
Read aloud
Microsoft Edge offers Read aloud, which reads the content of a webpage to the user. To
start Read aloud, right-click the webpage or open Settings and more (...) and
select Read aloud. Read aloud offers multiple voices to read the webpage content. If you
are using voices that are installed on Windows 10 and later under the Time &
Language section of Windows Settings and want to clear the local cache for any voices
you previously used, go to edge://settings/clearBrowserData .
When you start Read aloud, Microsoft Edge uses the Web Speech API . Depending on
the voice you select, the contents of the page are converted from text to speech using
either a platform-supplied, client-side library (for example, one specific to your
operating system) or a server-side library powered by Azure Cognitive Services.
More controls and configurations are available for organizations. For more information
about controls and configurations for organizations, see Microsoft Edge configurations
and experimentation.
As a user, you aren't able to turn off the browser updates controlled or configured by
your organization. You can control whether your product usage data is sent to
Microsoft. Go to edge://settings/privacy , and change the Optional diagnostic data
settings.
Microsoft developers need to understand how new functions affect Microsoft Edge and
Microsoft services. Microsoft Edge sends a resettable identifier unique to your browser
and a functions tag that encodes which new functions were enabled for Microsoft Edge
and Microsoft services. New functions help build the best experiences and the best
browser for everyone.
The functions tag is not unique to your installation of Microsoft Edge. The tag is shared
across all Microsoft Edge instances that share the same set of new functions. Microsoft
Edge sends the information via HTTPS to Microsoft services. The browser does not send
the information when you browse InPrivate or in Guest mode. You can prevent the data
from being sent. Go to edge://settings/privacy , and turn off the Help improve
Microsoft products by sending optional diagnostic data about how you use the
browser, websites you visit, and crash reports setting. For more information about how
to reset the identifier unique to your browser, see the Diagnostic data about how you
use the browser section.
Captive portals include a Wi-Fi network at a hotel or airport. If the request is redirected
to another URL, Microsoft Edge opens the URL in a new tab, assuming that it is a sign-in
page. Requests to the captive portal detection page are a stateless service. Requests
aren't logged, and cookies aren't sent or saved. On Windows platforms, Microsoft Edge
uses a Windows captive portal service. Otherwise, the Microsoft Edge captive portal
service is used. You can turn off the service. Go to edge://settings/privacy , and turn off
the Use a web service to help resolve navigation errors setting.
Rewards
Microsoft Rewards (the "Program") enables you to earn redeemable points for activities
such as qualified searches, acquisitions, and other offers from Microsoft. These points
can then be redeemed for gift cards or non-profit donations or automatic contributions
to subscriptions. Microsoft Edge has built-in support for all existing avenues for earning
points, and also introduces new and exclusive means to earn more points. You can track
your points, and you can stay up-to-date with limited period offers to get the most out
of the program.
For non-members, Microsoft Edge presents personalized joining offers based on the
page you're on. Once you engage and choose to enroll, Microsoft Edge uses your
Microsoft account identity to sign you up and start the rewards service. The rewards
service automatically adds points to your account for searching, playing, and shopping
on Microsoft Edge. Microsoft Edge doesn't send your personal information or browsing
data to any third-party services.
Rewards is an opt-in program. To turn off all Rewards experiences and data sharing, go
to edge://settings/profiles/rewards , and turn off the Earn Microsoft Rewards in
Microsoft Edge setting.
How to earn
Microsoft Edge provides the greatest number of avenues to earn rewards points while
browsing the web.
A search is the act of an individual user manually entering text for the good faith
purpose of obtaining Bing search results for the user's own research purposes, and does
not include any query that's entered by a bot, macro, or other automated or fraudulent
means of any kind ("Search").
See also:
Microsoft Edge will scrub and de-identify the data by removing data identifying
the person or device from which it was collected.
The data Microsoft collects is never associated with your account or your device.
The data Microsoft collects may include the search query, the search results that are
displayed to you, and the interaction you have with those search results, such as the
links you click. Microsoft may also collect demographic data.
To manage the collection and use of your search results activity for product
improvement, do the following:
4. Under Search and service improvement, turn on or off the setting for Help
improve Microsoft products by sending the results from searches on the web.
If you stop sharing your data, Microsoft may continue to use previously collected search
results data, but it will still be de-identified and not associated with you or your device.
Secure DNS
When navigating to a website, the browser needs to look up the network address, such
as 93.184.216.34 , to resolve the host name, such as example.com . Secure DNS performs
this lookup using a service over an HTTPS connection to the DNS service provider.
Secure DNS protects the lookups from modification or eavesdropping by attackers on
the network.
By default, your current DNS service provider is used to avoid disruptions to your
browsing. Not all service providers offer secure DNS. To avoid delays in browsing, if the
secure DNS connection fails, Microsoft Edge attempts a DNS lookup with your current
DNS service provider that is not encrypted.
Microsoft Edge allows you to use a specific secure DNS provider. If a secure DNS
provider is selected, then Microsoft Edge does not fall back to regular DNS lookup if the
secure lookup fails. You can control your secure DNS settings in
edge://setting/privacy .
Secure DNS is off by default for managed machines that are part of an organization. It
can be configured using administrative policies. InPrivate browsing uses the secure DNS
setting of the profile from which the InPrivate session was launched. Guest mode will
always use your current service provider.
Shopping
Microsoft Edge helps you find coupons, rebates, and better prices while shopping
online. To help you find coupons or the best price while shopping online, Microsoft
Edge downloads a list of shopping domains locally to the client from the Microsoft
shopping service.
When you go to a website, or save an item to your Collections, Microsoft Edge locally
determines if the website you're on is a shopping domain or product detail webpage. If
the website is identified as a shopping webpage, Microsoft Edge sends the URL with
personal data removed to the Microsoft shopping service.
Microsoft also sends the product price, product image, product name, ratings, and
reviews, along with information about Microsoft Edge and your operating system
version to the service. The data is sent over HTTPS with a randomly generated identifier
and cookies if cookies are allowed.
The Microsoft Edge shopping feature requires sharing of cookie information with Bing.
For example, the cookies may be used for debugging, fraud detection, and analytics.
The Microsoft shopping service returns prices from other retailers, historical price trends,
and any available coupons for that website.
To help you find and keep track of coupons in your inbox, Microsoft Edge may
optionally scan your connected email account for coupons in promotional emails. The
Microsoft shopping service extracts coupons from promotional emails that are sent by
supported retailers. The extracted coupons are stored and managed by the Microsoft
shopping service and are accessible to you. Inbox coupons don't appear when using
Guest mode or InPrivate.
The following steps assume that you have already connected your inbox.
1. In Microsoft Edge, click the Settings and more (...) button, and then select
Shopping. The Shopping sidebar appears.
4. In the Retailers in your inbox section, expand the section for a retailer, and then
turn the toggle on or off:
To turn off Inbox coupons:
When you're applying coupons, cookies are stored on your device to correctly attribute
the coupon provider. Cookies are saved by Microsoft-trusted coupon providers only
after a coupon is successfully applied on the cart. After the coupons are applied,
information about the success of the coupons is sent back to the Microsoft shopping
service to help understand which coupons succeeded or failed.
Data sent to the Microsoft shopping service is sent over HTTPS with a randomly
generated identifier that changes per coupon lookup. Microsoft Edge partners with Bing
Shopping to provide coupons relevant to the user's query. In some instances, Microsoft
may receive revenue for use of the coupons. Whether a revenue share payment may be
received is not factored into the ranking of coupons shown to users.
If you visit a shopping domain and you are an existing Bing Rebates user, Microsoft
Edge sends the domain along with cookies to the Microsoft shopping service to retrieve
your Bing Rebates profile and cash back offers for the domain. If you choose to activate
cash back, Microsoft Edge sends your URL to the Microsoft shopping service to receive
an affiliate URL. Cookies may be stored on your device to correctly attribute the rebates
provider.
The shopping service is turned on by default for all users. To change the shopping
setting in Microsoft Edge, complete the following actions.
1. Go to edge://settings/privacy .
2. Turn off the Save time and money with Shopping in Microsoft Edge setting.
InPrivate browsing uses the shopping setting of the profile that launched the InPrivate
session.
If a new identity is added to the operating system and your Microsoft Edge profile does
not currently have an identity, Microsoft Edge adds the specific identity to your profile. If
you sign into Microsoft Edge with a Microsoft account or a work or school account and
do not have an identity on your Windows profile, the account is added to your Windows
profile unless you choose to not add it to Windows while signing in.
Being signed in to Microsoft Edge enables single sign-on. You are automatically signed
in to certain websites such as Bing, and other identity-powered experiences such as
Sync. If you want to limit automatic sign-in to Microsoft sites such as Bing , you may
sign out of the browser.
To sign into specific sites again using your user name and password or clear your
cookies, go to edge://settings/privacy . For more information about clearing browsing
data, see View and delete browser history in Microsoft Edge .
To prevent any identity from being associated with Microsoft Edge, remove your
Microsoft Edge profile or sign out of Microsoft Edge. To delete all data associated with
your Microsoft Edge profile from your device, you must remove your Microsoft Edge
profile. Deleting all data does not delete previously synced data associated with the
identity.
Your identity in Microsoft Edge on macOS is shared between Microsoft apps. A shared
identity allows you to sign into a Microsoft app without having to separately enter your
credentials if you are signed in to another Microsoft app on the device. On macOS, you
aren't automatically signed in to Microsoft Edge based on your authentication state in
another Microsoft app. When you try to sign into Microsoft Edge, it offers to use the
credentials from another Microsoft app on the device to sign into Microsoft Edge
seamlessly. Similarly, when you are signed in to an account to Microsoft Edge, if you try
to sign into other Microsoft apps, your Microsoft Edge credentials may be used to help
you sign into the other Microsoft app on the device without requiring you to enter your
credentials again.
You aren't able to sign into Microsoft Edge when using Guest mode or InPrivate.
SmartScreen
SmartScreen is designed to help you safely browse the web. When you go to websites
or download files, SmartScreen checks the reputation of the URL or file. If SmartScreen
determines that the site or file is malicious, it blocks you from going to the site or
downloading the file.
As you browse the web, SmartScreen categorizes websites and downloads as top traffic,
dangerous, or unknown. Top traffic is popular sites that SmartScreen has determined are
trustworthy. If you go to a site marked as dangerous, SmartScreen immediately blocks
you from accessing the site. When you go to an unknown site, SmartScreen checks the
reputation to determine if you should access the site.
1. SmartScreen checks the URL of sites you visit against a local list to determine if the
site is part of top traffic or is a known dangerous site. When you visit a top traffic
site, SmartScreen does not send the URL to the SmartScreen service. If the URL is
on the local list of dangerous sites, SmartScreen blocks it, which prevents any
portion of the malicious web content from loading. Microsoft Edge periodically
downloads an updated list of top traffic and dangerous sites to the device.
The SmartScreen service stores data about the reputation checks and builds a database
of known malicious URLs and files. The data is stored on secure Microsoft servers and is
used only for Microsoft security services. The data is never used to identify or target you
in any way. Clearing your browsing cache clears all locally stored SmartScreen URL data.
Clearing your download history removes any locally stored SmartScreen data about file
downloads.
SmartScreen setting. The setting is the same for all profiles associated with the
installation of Microsoft Edge on your device. The setting is not synced across devices.
The setting applies to InPrivate browsing and Guest mode. If your device is managed
with group policies set by your organization, the setting is reflected in Microsoft Edge.
To view the setting, go to edge://settings/privacy . For more information about
SmartScreen, see SmartScreen: FAQ .
Optionally, SmartScreen checks the URLs of files you download to see if any are
categorized as potentially unwanted apps. Blocking potentially unwanted apps helps
deliver more productive, performant, and delightful Windows experiences. The setting is
turned off by default and is only available on Windows 10 and later devices. To enable
the feature, go to edge://settings/privacy and turn on the Block potentially unwanted
apps setting. For more information about how potentially unwanted apps are
categorized, see Potentially unwanted application (PUA). For more information about
how to configure the setting, see Detect and block potentially unwanted applications.
Speech recognition
To convert your speech into text, Microsoft Edge supports the Web Speech API . If a
website includes a web feature that requires capture and translation of your speech to
text and requests access to your microphone, Microsoft Edge sends the captured audio
to a Microsoft service where it is translated into text. The recorded audio is sent with a
randomly generated token over a secure HTTPS connection to the Microsoft Azure
Cognitive Services. The recorded audio content is not stored for any purposes. The text
is sent back to your device and then sent to the website.
To turn off speech translated to text, you may deny microphone access from any site
that prompts for permission. To turn off the Microphone permission for all sites, go to
edge://settings/content/microphone .
Suggest similar sites
To help resolve URL typos in the address bar that result in a website error, Microsoft
Edge may recommend a corrected URL. When a website navigation error occurs,
Microsoft Edge sends the domain of the web address to the Microsoft service to
suggest a corrected URL. Microsoft Edge does not include identifiers or tokens with the
domain. If the service finds a suggestion, it returns the suggested URL. Microsoft stores
the incorrect domain, and suggested domain, to help improve the service. To help you
go to the correct sites, the feature is turned on by default. To turn off the feature, go to
edge://settings/privacy and under the Services turn off the Suggest similar sites
Support nonprofits
Microsoft Edge allows you to support nonprofit organizations using Microsoft Rewards
points or cash while browsing. When you are signed in to Microsoft Edge with your
Microsoft account and navigate to a nonprofit website, the Support nonprofits icon
appears on the right side of the Address bar. You can then click this icon to donate to
the nonprofit organization.
Sync
Signing into Microsoft Edge with a Microsoft account will enable syncing your browsing
data across all signed-in versions of Microsoft Edge. You can sync your browsing history,
favorites, settings, form fill data including addresses and more, passwords, extensions,
open tabs, and collections. Each synced data type may be turned on or off individually.
Favorites include any tabs you previously set aside in previous versions of Microsoft
Edge, which sync along with the rest of your favorites. Deleted or modified favorites or
other data from one signed-in version of Microsoft Edge sync to all other signed-in
versions of Microsoft Edge where sync is turned on. To manage sync configurations, go
to edge://settings/profiles/sync . Your sync settings may be managed by your
organization.
For sync to function, all device connectivity and configuration data needed to provide
the sync experience is sent to Microsoft. Sync data includes the name of your device,
make, and model. To delete sync data, see Microsoft device dashboard . To manage
your synced favorites, go to edge://favorites . To manage all other data types, go to
edge://settings/profiles .
When you sign into Microsoft Edge with your Microsoft account or work or school
account, Microsoft Edge will store your preferences for your data privacy settings in
Microsoft's servers. Microsoft Edge will only use the stored settings to make it easier for
you to migrate your experience when you start using Microsoft Edge on a different
device, or when you sign in to Microsoft Edge.
All synced data is encrypted in transit over HTTPS when transferred between the
browser and Microsoft servers. The synced data is also stored in an encrypted state in
Microsoft servers. Sensitive data types such as addresses and passwords are further
encrypted on the device before being synced. If you are using a work or school account,
all data types are further encrypted before being synced using Microsoft Purview
Information Protection. All other synced data types are stored until you delete the data,
the account is deleted, or the account becomes inactive. An account ID is attached to all
synced data, as the ID is necessary to perform sync across multiple devices.
InPrivate and Guest mode browsing data does not sync to your Microsoft account.
However, favorites created during InPrivate sessions are synced across your signed-in
versions of Microsoft Edge.
Tab organization
Microsoft Edge offers helpful suggestions on how to organize tabs to save you time and
keep you focused on the web content you care about. These suggestions augment the
Tab Grouping feature that's built into Microsoft Edge.
When two or more tabs are grouped together, Microsoft Edge sends information about
the tabs, including the Title and URL, to the Tabs service over HTTPS. This information is
used to generate a relevant name for the Tab Group.
You can also choose to have Microsoft Edge auto-group all of your tabs, by using the
Group Similar Tabs feature from the Tab Action menu. In addition to the Title and URL,
Microsoft Edge also sends information about which tabs opened another tab, and a
timestamp of when a tab was opened. This additional data allows the service to more
accurately suggest Tab Groups, to organize your tabs.
The Microsoft Edge Tab organization behavior is turned on by default. To turn this
behavior off, go to edge://settings/privacy and under Services turn off the Let
Microsoft Edge help keep your tabs organized setting:
When the Tab Organization service is turned off, new Tab groups are given a generic
name such as Group 1, and you can then rename the Tab group to be more descriptive.
The option to automatically Group Similar Tabs within the Tab Action Menu will be
turned off.
See also:
Tab groups
Tracking prevention
Microsoft Edge is designed to detect and block known trackers. Users may choose from
three levels of tracking prevention: Basic, Balanced, and Strict. To protect user privacy,
Balanced is selected by default. Microsoft Edge detects trackers before any are loaded
on the page by using an open-source list of known trackers. The list is downloaded to
the device periodically as the list is updated. The number of trackers blocked and names
of those trackers are stored locally on the device for statistical purposes. To clear the
data, go to edge://settings/privacy/blockedTrackers . The detection and blocking of
trackers occurs locally on the device. To disable tracking prevention, go to
edge://settings/privacy . For more information about Tracking prevention, see Learn
about tracking prevention in Microsoft Edge .
You may turn off list updates using the following group policy, Enable component
updates in Microsoft Edge.
Translate
In Microsoft Edge, you can browse the web and translate webpages into a language of
your choice. Microsoft Edge uses Microsoft Translator to translate web pages. This
feature at first uses a library on your device that samples certain visible portions of a
webpage to detect the original language. If the detected language is not one of your
preferred languages, Microsoft Edge offers to translate the webpage to your preferred
language or another language you choose. You can then translate the page by selecting
Translate. You can autotranslate all pages in that language by choosing the Always
translate the pages from <a language> checkbox.
Microsoft Edge does not translate a webpage without your permission. If you do decide
to translate, Microsoft Edge sends the text of the webpage you want to translate, along
with the to and from language and a service token to Microsoft Translator over a secure
HTTPS connection. The service token doesn't contain any user identifiable information.
Microsoft Translator then processes the text to remove any identifiers (such as email
or phone number) and stores the text for service improvement purposes. The details of
this communication are covered under Microsoft Privacy Statement – Microsoft
privacy .
If you want to stop Microsoft Edge from offering to translate webpages, complete the
following steps.
1. Go to edge://settings/languages .
2. Turn off the Offer to translate pages that aren't in a language you read toggle and
close the webpage.
Travel
When you do online activities related to travelling, Microsoft Edge helps you find
recommendations for travel. To help you find recommendations while planning your
travel online, Microsoft Edge downloads a list of travel domains to the client from the
Microsoft Travel service.
When you visit a website, Microsoft Edge locally determines if the website you're on is a
travel domain. If the website is identified as a Travel-related webpage, Microsoft Edge
sends the domain, flight dates, From and To locations, and passenger count, along with
information about Microsoft Edge and cookies (if cookies are allowed) to the service.
This data does not include any personally identifiable information, and is sent over
HTTPS.
The Microsoft Edge Travel feature requires sharing cookie information with Bing.com.
For example, cookies may be used for debugging, fraud detection, and analytics. When
you visit Bing.com in your browser and update any settings on Bing pages, Bing.com
creates a cookie in your browser and stores information in the cookie. This cookie is
shared across Bing.com pages, and Microsoft Edge sends this cookie to the Microsoft
Travel service to keep your experience consistent.
The Travel service is turned on by default. To change the Travel setting in Microsoft
Edge:
1. Go to edge://settings/privacy .
2. In the Services section at the bottom of the page, turn off the setting Show travel
recommendations in Microsoft Edge.
When you pin a site, it is added to your taskbar or dock. The data is stored locally on
your device. For some sites, information about whether the site has been pinned is
shared with the site, so the site knows not to prompt to pin. You may manage your
pinned sites from the taskbar or dock. Pinned sites open in Microsoft Edge windows and
use the same site permissions and diagnostic data settings as the specific version of
Microsoft Edge.
WebView
Microsoft Edge WebView controls allow app developers to host web content in native
applications on Windows 7, Windows 10, and later; and selected non-Windows
platforms. The applications hosting the WebView2 instance may send diagnostic data
with its own identifier to Microsoft. Diagnostic data can include how you use the
Microsoft Edge, and sites you visit.
optional diagnostic data about how you use the browser, websites you visit, and crash
reports setting. The applications hosting Microsoft Edge WebView may collect other
data that is governed by the data collection management of the developer and relevant
privacy policies.
Workspaces
The Microsoft Edge Workspaces feature allows you to easily organize and share your
browsing tasks with collaborators via customizable, shareable browsing windows. Each
workspace shares favorites, a set of workspace tabs, and history, all created and curated
by you and your collaborators. Workspace data is automatically saved, kept up-to-date,
and stored in OneDrive/SharePoint.
Microsoft Edge Workspaces shares tabs, favorites, and history with collaborators in real-
time. Collaborators' profile pictures are used to indicate which workspace tab they are
using and which workspace tabs they have opened, changed, or closed. Collaborators
cannot see how you interact with a webpage (workspaces don't screen-share).
Collaborators cannot see password-protected content unless they sign in and they have
access via their own credentials. Microsoft Edge Workspaces doesn't store or share
browsing data from non-workspace browsing sessions. If you leave a workspace, the
stored contents remain available for other collaborators. If you delete a workspace, the
stored contents are deleted for all collaborators.
Microsoft Edge Workspaces is only available for enterprise customers who are signed
into Microsoft Edge with a Microsoft Azure Active Directory (AAD) account. Workspaces
aren't available when using Guest mode or InPrivate browsing.
Writing assistance
To help you write faster and with fewer mistakes on the web, Microsoft Edge provides
writing assistance tools, including spell checking, grammar checking, and text prediction.
By default, Microsoft Edge provides spelling and grammar checking using Microsoft
Editor. When using Microsoft Editor, Microsoft Edge sends your typed text and a service
token to a Microsoft cloud service over a secure HTTPS connection. The service token
doesn't contain any user-identifiable information. A Microsoft cloud service then
processes the text to detect spelling and grammar errors in your text. All your typed text
that's sent to Microsoft is deleted immediately after processing occurs. No data is stored
for any period of time.
If you select Basic instead of Microsoft Editor, Microsoft Edge will perform only local
spellchecking on the device, and no data will be sent to the cloud for spellchecking
services.
1. Go to edge://settings/languages .
2. In the Use writing assistance section, select Basic.
To turn off all spelling and grammar capabilities:
1. Go to edge://settings/languages .
2. Turn off the Use writing assistance toggle.
Languages
When you add a new language to Microsoft Edge, the browser downloads the
dictionary for the new language to the device over HTTPS. The dictionary is used for the
basic spellcheck service or for languages that aren't supported by Microsoft Editor
spelling and grammar checking. Deleting the language from your Microsoft Edge
settings deletes the dictionary from the device.
Text prediction
Microsoft Edge automatically provides word and sentence predictions in certain text
boxes on the web. These predictions are only visible to you and are not inserted into the
text box until you press Tab or the Right Arrow key to accept them. Password fields will
not offer text predictions.
1. Go to edge://settings/languages .
If the Use text prediction toggle is turned on, Microsoft Edge sends the text in the text
box, your top language from the browser setting, and a text box identifier to a Microsoft
cloud service over a secure HTTPS connection. The text box identifier is not associated
with your account. The Microsoft cloud service processes the text to generate a relevant
text prediction. Typed characters and text predictions are cached for up to 30 days, for
service quality and performance improvement purposes only.
If you are browsing while using InPrivate or Guest mode, text prediction is turned off.
Text prediction does not run when you are editing a password field.
If your device is managed by using group policies set by your organization, the feature
may be disabled depending on the administrator's policies of your organization.
Thank you!
Microsoft Edge is made possible by the Chromium open-source project and other
open-source software. To view all of the software credits, go to edge://credits . Google
Chrome Privacy Whitepaper was used as a source for gathering related information
about the Chromium open-source project.
If an email is detected from your Microsoft Edge profile, it is pre-populated with the URL
of the current site and relevant diagnostic data. The diagnostic data can include data
about Microsoft Edge features you turned on and your browser use. You may optionally
include a screenshot, files from your device, and recording of your browser may also be
optionally included. If you provide optional content, it can include personal data. The
data is only used for diagnostic and product improvement purposes.
User feedback is securely sent to Microsoft using HTTPS and stored on secure Microsoft
servers. If you include your email address and the Help improve Microsoft products by
sending optional diagnostic data about how you use the browser, websites you visit,
and crash reports setting is turned on in your Microsoft Edge privacy settings, an
identifier unique to your browser installation on your device is associated with your
feedback. If you're signed in to Microsoft Edge with your Microsoft account, your
feedback is associated with your account. All diagnostic data, including diagnostic logs,
recordings, and attachments, are stored for up to 30 days. The remaining feedback data,
including an optional screenshot, is stored for up to 15 months. Make a request to
delete your feedback if you provided an email with your feedback item.
Microsoft Edge - Policies
Article • 08/29/2023
The latest version of Microsoft Edge includes the following policies. You can use these policies to
configure how Microsoft Edge runs in your organization.
For information about an additional set of policies used to control how and when Microsoft Edge is
updated, check out Microsoft Edge update policy reference.
You can download the Microsoft Security Compliance Toolkit for the recommended security
configuration baseline settings for Microsoft Edge. For more information see the Microsoft Security
Baselines Blog .
Starting in Microsoft Edge version 116, certain policies will not be applied to a profile that is signed
in with a Microsoft account. For more information, please check an individual policy for details on
whether it applies to a profile that is signed in with a Microsoft account.
7 Note
New policies
The following table lists the new policies that are in this article update.
Available policies
These tables list all of the browser-related group policies available in this release of Microsoft Edge.
Use the links in the table to get more details about specific policies.
Cast
Content settings
FileSystemReadAskForUrls Allow read access via the File System API on these
sites
FileSystemReadBlockedForUrls Block read access via the File System API on these
sites
IntranetFileLinksEnabled Allow intranet zone file URL links from Microsoft Edge
to open in Windows File Explorer
Experimentation
Policy Name Caption
Extensions
Games settings
HTTP authentication
AuthNegotiateDelegateAllowlist Specifies a list of servers that Microsoft Edge can delegate user
credentials to
KioskAddressBarEditingEnabled Configure address bar editing for kiosk mode public browsing experience
KioskDeleteDownloadsOnExit Delete files downloaded as part of kiosk session when Microsoft Edge closes
Native Messaging
PasswordGeneratorEnabled Allow users to get a strong password suggestion whenever they are
creating an account online
PasswordManagerBlocklist Configure the list of domains for which the password manager UI
(Save and Fill) will be disabled
PasswordManagerRestrictLengthEnabled Restrict the length of passwords that can be saved in the Password
Manager
PasswordProtectionLoginURLs Configure the list of enterprise login URLs where the password
protection service should capture salted hashes of a password
PrimaryPasswordSetting Configures a setting that asks users to enter their device password
while using password autofill
Performance
EfficiencyModeOnPowerEnabled Enable efficiency mode when the device is connected to a power source
Printing
Proxy server
SleepingTabsTimeout Set the background tab inactivity timeout for sleeping tabs
SmartScreen settings
NewTabPageAllowedBackgroundTypes Configure the background types allowed for the new tab page layout
NewTabPageHideDefaultTopSites Hide the default top sites from the new tab page
NewTabPagePrerenderEnabled Enable preload of the new tab page for faster rendering
NewTabPageSetFeedType Configure the Microsoft Edge new tab page experience (obsolete)
RestoreOnStartupUserURLsEnabled Allow users to add and remove their own sites during startup when
the RestoreOnStartupURLs policy is configured
Additional
session
ApplicationGuardContainerProxy
Supported versions:
Description
Configures the proxy settings for Microsoft Edge Application Guard. If you enable this policy,
Microsoft Edge Application Guard ignores other sources of proxy configurations.
If you don't configure this policy, Microsoft Edge Application Guard uses the proxy configuration of
the host.
This policy does not affect the proxy configuration of Microsoft Edge outside of Application Guard
(on the host).
The ProxyMode field lets you specify the proxy server used by Microsoft Edge Application Guard.
If you choose the 'direct' value as 'ProxyMode', all other fields are ignored.
If you choose the 'auto_detect' value as 'ProxyMode', all other fields are ignored.
If you choose the 'fixed_servers' value as 'ProxyMode', the 'ProxyServer' field is used.
If you choose the 'pac_script' value as 'ProxyMode', the 'ProxyPacUrl' field is used.
For more information about identifying Application Guard traffic via dual proxy, visit
https://go.microsoft.com/fwlink/?linkid=2134653 .
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ApplicationGuardContainerProxy = {
"ProxyMode": "direct",
"ProxyPacUrl": "https://internal.site/example.pac",
"ProxyServer": "123.123.123.123:8080"
}
SOFTWARE\Policies\Microsoft\Edge\ApplicationGuardContainerProxy = {"ProxyMode":
"direct", "ProxyPacUrl": "https://internal.site/example.pac", "ProxyServer":
"123.123.123.123:8080"}
Back to top
ApplicationGuardFavoritesSyncEnabled
Description
This policy allows Microsoft Edge computers/devices that have application guard enabled to sync
favorites from the host to the container so the favorites match.
If ManagedFavorites are configured, those favorites will also be synced to the container.
If you enable this policy, editing favorites in the container is disabled. So, the add favorites and add
favorites folder buttons will be blurred out in the UI of the container browser.
If you disable or don't configure this policy, favorites on the host will not be shared to the
container.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
0x00000001
Back to top
ApplicationGuardPassiveModeEnabled
Ignore Application Guard site list configuration and browse Edge normally
Supported versions:
Description
Set whether Edge should ignore the Application Guard site list configuration for trusted and
untrusted sites.
If you enable this policy, all navigations from Edge, including navigations to untrusted sites, will be
accessed normally within Edge without redirecting to the Application Guard container. Note: this
policy ONLY impacts Edge, so navigations from other browsers might get redirected to the
Application Guard Container if you have the corresponding extensions enabled.
If you disable or don't configure this policy, Edge does not ignore the Application Guard site list. If
users try to navigate to an untrusted site in the host, the site will open in the container.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
ApplicationGuardTrafficIdentificationEnabled
Supported versions:
On Windows since 91 or later
Description
If you enable or don't configure this policy, Application Guard will add an extra HTTP header (X-
MS-ApplicationGuard-Initiated) to all outbound HTTP requests made from the Application Guard
container.
If you disable this policy, the extra header is not added to the traffic.
Supported features:
Example value:
0x00000001
Back to top
ApplicationGuardUploadBlockingEnabled
Supported versions:
Description
If you enable this policy, users will not be able to upload files in Application Guard.
If you disable or don't configure this policy, users will be able to upload files while in Application
Guard.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
Cast policies
Back to top
EnableMediaRouter
Description
Enable this policy to enable Google Cast. Users will be able to launch it from the app menu, page
context menus, media controls on Cast-enabled websites, and (if shown) the Cast toolbar icon.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShowCastIconInToolbar
Supported versions:
On Windows and macOS since 77 or later
Description
Set this policy to true to show the Cast toolbar icon on the toolbar or the overflow menu. Users
won't be able to remove it.
If you don't configure this policy or if you disable it, users can pin or remove the icon by using its
contextual menu.
If you've also set the EnableMediaRouter policy to false, then this policy is ignored, and the toolbar
icon isn't shown.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Windows information and settings
Example value:
0x00000000
XML
<false/>
Back to top
AutoSelectCertificateForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Setting the policy lets you make a list of URL patterns that specify sites for which Microsoft Edge
can automatically select a client certificate. The value is an array of stringified JSON dictionaries,
each with the form { "pattern": "$URL_PATTERN", "filter" : $FILTER }, where $URL_PATTERN is a
content setting pattern. $FILTER restricts the client certificates the browser automatically selects
from. Independent of the filter, only certificates that match the server's certificate request are
selected.
When $FILTER is set to { "ISSUER": { "CN": "$ISSUER_CN" } }, only client certificates issued by a
certificate with the CommonName $ISSUER_CN are selected.
When $FILTER contains both the "ISSUER" and the "SUBJECT" sections, only client certificates
that satisfy both conditions are selected.
When $FILTER contains a "SUBJECT" section with the "O" value, a certificate needs at least one
organization matching the specified value to be selected.
When $FILTER contains a "SUBJECT" section with a "OU" value, a certificate needs at least one
organizational unit matching the specified value to be selected.
When $FILTER is set to {}, the selection of client certificates is not additionally restricted. Note
that filters provided by the web server still apply.
If you leave the policy unset, there's no autoselection for any site.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutoSelectCertificateForUrls\1 = "
{\"pattern\":\"https://www.contoso.com\",\"filter\":{\"ISSUER\":{\"CN\":\"certificate
issuer name\", \"L\": \"certificate issuer location\", \"O\": \"certificate issuer
org\", \"OU\": \"certificate issuer org unit\"}, \"SUBJECT\":{\"CN\":\"certificate
subject name\", \"L\": \"certificate subject location\", \"O\": \"certificate subject
org\", \"OU\": \"certificate subject org unit\"}}}"
XML
<array>
<string>{"pattern":"https://www.contoso.com","filter":{"ISSUER":{"CN":"certificate
issuer name", "L": "certificate issuer location", "O": "certificate issuer org", "OU":
"certificate issuer org unit"}, "SUBJECT":{"CN":"certificate subject name", "L":
"certificate subject location", "O": "certificate subject org", "OU": "certificate
subject org unit"}}}</string>
</array>
Back to top
AutomaticDownloadsAllowedForUrls
Supported versions:
On Windows and macOS since 110 or later
Description
Define a list of sites, based on URL patterns, that are allowed to perform multiple successive
automatic downloads. If you don't configure this policy, DefaultAutomaticDownloadsSetting applies
for all sites, if it's set. If it isn't set, then the user's personal setting applies. For more detailed
information about valid URL patterns, see https://go.microsoft.com/fwlink/?linkid=2095322 .
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutomaticDownloadsAllowedForUrls\1 =
"https://contoso.com"
SOFTWARE\Policies\Microsoft\Edge\AutomaticDownloadsAllowedForUrls\2 = "
[*.]contoso.edu"
XML
<array>
<string>https://contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
AutomaticDownloadsBlockedForUrls
Supported versions:
On Windows and macOS since 110 or later
Description
Define a list of sites, based on URL patterns, where multiple successive automatic downloads aren't
allowed. If you don't configure this policy, DefaultAutomaticDownloadsSetting applies for all sites, if
it's set. If it isn't set, then the user's personal setting applies. For more detailed information about
valid URL patterns, see https://go.microsoft.com/fwlink/?linkid=2095322 .
Supported features:
Data Type:
List of strings
Windows information and settings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutomaticDownloadsBlockedForUrls\1 =
"https://contoso.com"
SOFTWARE\Policies\Microsoft\Edge\AutomaticDownloadsBlockedForUrls\2 = "
[*.]contoso.com"
XML
<array>
<string>https://contoso.com</string>
<string>[*.]contoso.com</string>
</array>
Back to top
CookiesAllowedForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Define a list of sites, based on URL patterns, that are allowed to set cookies.
If you don't configure this policy, the global default value from the DefaultCookiesSetting policy (if
set) or the user's personal configuration is used for all sites.
Note there cannot be conflicting URL patterns set between these three policies:
CookiesBlockedForUrls
CookiesAllowedForUrls
CookiesSessionOnlyForUrls
To allow third-party cookies to be set, specify a pair of URL patterns delimited by a comma. The first
value in the pair specifies the third-party site that should be allowed to use cookies. The second
value in the pair specifies the top-level site that the first value should be applied on. The first value
in the pair supports * but the second value does not.
To exclude cookies from being deleted on exit, configure the SaveCookiesOnExit policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls\2 = "[*.]contoso.edu"
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls\3 = "https://loaded-as-third-
party.fabrikam.com,https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\CookiesAllowedForUrls\4 = "*,https://www.contoso.com"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
<string>https://loaded-as-third-party.fabrikam.com,https://www.contoso.com</string>
<string>*,https://www.contoso.com</string>
</array>
Back to top
CookiesBlockedForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can't set cookies.
If you don't configure this policy, the global default value from the DefaultCookiesSetting policy (if
set) or the user's personal configuration is used for all sites.
Note there cannot be conflicting URL patterns set between these three policies:
CookiesBlockedForUrls
CookiesAllowedForUrls
CookiesSessionOnlyForUrls
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
SOFTWARE\Policies\Microsoft\Edge\CookiesBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\CookiesBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
CookiesSessionOnlyForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Cookies created by websites that match a URL pattern you define are deleted when the session
ends (when the window closes).
Cookies created by websites that don't match the pattern are controlled by the
DefaultCookiesSetting policy (if set) or by the user's personal configuration. This is also the default
behavior if you don't configure this policy.
You can also use the CookiesAllowedForUrls and CookiesBlockedForUrls policies to control which
websites can create cookies.
Note there cannot be conflicting URL patterns set between these three policies:
CookiesBlockedForUrls
CookiesAllowedForUrls
CookiesSessionOnlyForUrls
If you set the RestoreOnStartup policy to restore URLs from previous sessions, this policy is ignored,
and cookies are stored permanently for those sites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\CookiesSessionOnlyForUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\CookiesSessionOnlyForUrls\2 = "[*.]contoso.edu"
Mac information and settings
Preference Key Name: CookiesSessionOnlyForUrls
Example value:
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
DefaultAutomaticDownloadsSetting
Supported versions:
On Windows and macOS since 110 or later
Description
Set whether websites can perform multiple downloads successively without user interaction. You
can enable it for all sites (AllowAutomaticDownloads) or block it for all sites
(BlockAutomaticDownloads). If you don't configure this policy, multiple automatic downloads can
be performed in all sites, and the user can change this setting.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultCookiesSetting
Configure cookies
Supported versions:
Set the policy to 'SessionOnly' to clear cookies when the session closes.
If you don't configure this policy, the default 'AllowCookies' is used, and users can change this
setting in Microsoft Edge Settings. (If you don't want users to be able to change this setting, set the
policy.)
SessionOnly (4) = Keep cookies for the duration of the session, except ones listed in
SaveCookiesOnExit
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultFileSystemReadGuardSetting
Supported versions:
Description
If you set this policy to 3, websites can ask for read access to the host operating system's filesystem
using the File System API. If you set this policy to 2, access is denied.
If you don't set this policy, websites can ask for access. Users can change this setting.
BlockFileSystemRead (2) = Don't allow any site to request read access to files and directories
via the File System API
AskFileSystemRead (3) = Allow sites to ask the user to grant read access to files and
directories via the File System API
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DefaultFileSystemWriteGuardSetting
Supported versions:
Description
If you set this policy to 3, websites can ask for write access to the host operating system's filesystem
using the File System API. If you set this policy to 2, access is denied.
If you don't set this policy, websites can ask for access. Users can change this setting.
BlockFileSystemWrite (2) = Don't allow any site to request write access to files and directories
AskFileSystemWrite (3) = Allow sites to ask the user to grant write access to files and
directories
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DefaultGeolocationSetting
Supported versions:
Description
Set whether websites can track users' physical locations. You can allow tracking by default
('AllowGeolocation'), deny it by default ('BlockGeolocation'), or ask the user each time a website
requests their location ('AskGeolocation').
If you don't configure this policy, 'AskGeolocation' is used and the user can change it.
BlockGeolocation (2) = Don't allow any site to track users' physical location
AskGeolocation (3) = Ask whenever a site wants to track users' physical location
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultImagesSetting
Supported versions:
On Windows and macOS since 77 or later
Description
Set whether websites can display images. You can allow images on all sites ('AllowImages') or block
them on all sites ('BlockImages').
If you don't configure this policy, images are allowed by default, and the user can change this
setting.
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultInsecureContentSetting
Supported versions:
On Windows and macOS since 80 or later
Description
Allows you to set whether users can add exceptions to allow mixed content for specific sites.
This policy can be overridden for specific URL patterns using the InsecureContentAllowedForUrls
and InsecureContentBlockedForUrls policies.
If this policy isn't set, users will be allowed to add exceptions to allow blockable mixed content and
disable autoupgrades for optionally blockable mixed content.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000002
Mac information and settings
Preference Key Name: DefaultInsecureContentSetting
Example value:
XML
<integer>2</integer>
Back to top
DefaultJavaScriptJitSetting
Supported versions:
On Windows and macOS since 93 or later
Description
Allows you to set whether Microsoft Edge will run the v8 JavaScript engine with JIT (Just In Time)
compiler enabled or not.
Disabling the JavaScript JIT will mean that Microsoft Edge may render web content more slowly,
and may also disable parts of JavaScript including WebAssembly. Disabling the JavaScript JIT may
allow Microsoft Edge to render web content in a more secure configuration.
This policy can be overridden for specific URL patterns using the JavaScriptJitAllowedForSites and
JavaScriptJitBlockedForSites policies.
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultJavaScriptSetting
Description
Set whether websites can run JavaScript. You can allow it for all sites ('AllowJavaScript') or block it
for all sites ('BlockJavaScript').
If you don't configure this policy, all sites can run JavaScript by default, and the user can change
this setting.
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultNotificationsSetting
Supported versions:
Description
Set whether websites can display desktop notifications. You can allow them by default
('AllowNotifications'), deny them by default ('BlockNotifications'), or have the user be asked each
time a website wants to show a notification ('AskNotifications').
If you don't configure this policy, notifications are allowed by default, and the user can change this
setting.
AskNotifications (3) = Ask every time a site wants to show desktop notifications
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DefaultPluginsSetting
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 87.
Supported versions:
Description
This policy doesn't work because Flash is no longer supported by Microsoft Edge.
PluginsAllowedForUrls and PluginsBlockedForUrls are checked first, then this policy. The options are
'ClickToPlay' and 'BlockPlugins'. If you set this policy to 'BlockPlugins', this plugin is denied for all
websites. 'ClickToPlay' lets the Flash plugin run, but users click the placeholder to start it.
If you don't configure this policy, the user can change this setting manually.
Note: Automatic playback is only for domains explicitly listed in the PluginsAllowedForUrls policy.
To turn automatic playback on for all sites, add http://* and https://* to the allowed list of URLs.
Supported features:
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DefaultPopupsSetting
Supported versions:
Description
Set whether websites can show pop-up windows. You can allow them on all websites
('AllowPopups') or block them on all sites ('BlockPopups').
If you don't configure this policy, pop-up windows are blocked by default, and users can change
this setting.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
Mac information and settings
Preference Key Name: DefaultPopupsSetting
Example value:
XML
<integer>1</integer>
Back to top
DefaultThirdPartyStoragePartitioningSetting
Supported versions:
On Windows and macOS since 115 or later
Description
Third-party storage partitioning is on by default for some users starting with Microsoft Edge version
115, but it can be disabled with edge://flags.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
DefaultWebBluetoothGuardSetting
Supported versions:
If you don't configure this policy, the default value ('AskWebBluetooth', meaning users are asked
each time) is used and users can change it.
BlockWebBluetooth (2) = Do not allow any site to request access to Bluetooth devices via the
Web Bluetooth API
AskWebBluetooth (3) = Allow sites to ask the user to grant access to a nearby Bluetooth
device
Supported features:
Data Type:
Integer
0x00000002
XML
<integer>2</integer>
Back to top
DefaultWebHidGuardSetting
Supported versions:
On Windows and macOS since 100 or later
Description
Setting the policy to 3 lets websites ask for access to HID devices. Setting the policy to 2 denies
access to HID devices.
Leaving it unset lets websites ask for access, but users can change this setting.
This policy can be overridden for specific url patterns using the WebHidAskForUrls and
WebHidBlockedForUrls policies.
BlockWebHid (2) = Do not allow any site to request access to HID devices via the WebHID API
AskWebHid (3) = Allow sites to ask the user to grant access to a HID device
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DefaultWebUsbGuardSetting
Control use of the WebUSB API
Supported versions:
Description
Set whether websites can access connected USB devices. You can completely block access or ask
the user each time a website wants to get access to connected USB devices.
You can override this policy for specific URL patterns by using the WebUsbAskForUrls and
WebUsbBlockedForUrls policies.
If you don't configure this policy, sites can ask users whether they can access the connected USB
devices ('AskWebUsb') by default, and users can change this setting.
BlockWebUsb (2) = Do not allow any site to request access to USB devices via the WebUSB
API
AskWebUsb (3) = Allow sites to ask the user to grant access to a connected USB device
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
FileSystemReadAskForUrls
Allow read access via the File System API on these sites
Supported versions:
Description
Setting the policy lets you list the URL patterns that specify which sites can ask users to grant them
read access to files or directories in the host operating system's file system via the File System API.
Leaving the policy unset means DefaultFileSystemReadGuardSetting applies for all sites, if it's set. If
not, users' personal settings apply.
URL patterns can't conflict with FileSystemReadBlockedForUrls. Neither policy takes precedence if a
URL matches with both.
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\FileSystemReadAskForUrls\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\FileSystemReadAskForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
FileSystemReadBlockedForUrls
Block read access via the File System API on these sites
Supported versions:
On Windows and macOS since 86 or later
Description
If you set this policy, you can list the URL patterns that specify which sites can't ask users to grant
them read access to files or directories in the host operating system's file system via the File System
API.
If you don't set this policy, DefaultFileSystemReadGuardSetting applies for all sites, if it's set. If not,
users' personal settings apply.
URL patterns can't conflict with FileSystemReadAskForUrls. Neither policy takes precedence if a URL
matches with both.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\FileSystemReadBlockedForUrls\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\FileSystemReadBlockedForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
FileSystemWriteAskForUrls
Supported versions:
If you don't set this policy, DefaultFileSystemWriteGuardSetting applies for all sites, if it's set. If not,
users' personal settings apply.
URL patterns can't conflict with FileSystemWriteBlockedForUrls. Neither policy takes precedence if a
URL matches with both.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\FileSystemWriteAskForUrls\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\FileSystemWriteAskForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
FileSystemWriteBlockedForUrls
Supported versions:
On Windows and macOS since 86 or later
Description
If you set this policy, you can list the URL patterns that specify which sites can't ask users to grant
them write access to files or directories in the host operating system's file system.
If you don't set this policy, DefaultFileSystemWriteGuardSetting applies for all sites, if it's set. If not,
users' personal settings apply.
URL patterns can't conflict with FileSystemWriteAskForUrls. Neither policy takes precedence if a URL
matches with both.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\FileSystemWriteBlockedForUrls\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\FileSystemWriteBlockedForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
ImagesAllowedForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can display images.
If you don't configure this policy, the global default value is used for all sites either from the
DefaultImagesSetting policy (if set) or the user's personal configuration.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ImagesAllowedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\ImagesAllowedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
ImagesBlockedForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Define a list of sites, based on URL patterns, that aren't allowed to display images.
If you don't configure this policy, the global default value from the DefaultImagesSetting policy (if
set) or the user's personal configuration is used for all sites.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ImagesBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\ImagesBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
InsecureContentAllowedForUrls
Supported versions:
On Windows and macOS since 80 or later
Description
Create a list of URL patterns to specify sites that can display or, as of version 94, download insecure
mixed content (that is, HTTP content on HTTPS sites).
If you don't configure this policy, blockable mixed content will be blocked and optionally blockable
mixed content will be upgraded. However, users will be allowed to set exceptions to allow insecure
mixed content for specific sites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\InsecureContentAllowedForUrls\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\InsecureContentAllowedForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
InsecureContentBlockedForUrls
Supported versions:
Description
Create a list of URL patterns to specify sites that aren't allowed to display blockable (i.e. active)
mixed content (that is, HTTP content on HTTPS sites) and for which optionally blockable mixed
content upgrades will be disabled.
If you don't configure this policy, blockable mixed content will be blocked and optionally blockable
mixed content will be upgraded. However, users will be allowed to set exceptions to allow insecure
mixed content for specific sites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\InsecureContentBlockedForUrls\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\InsecureContentBlockedForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
IntranetFileLinksEnabled
Allow intranet zone file URL links from Microsoft Edge to open in Windows
File Explorer
Supported versions:
On Windows since 95 or later
Description
This setting allows file URL links to intranet zone files from intranet zone HTTPS websites to open
Windows File Explorer for that file or directory.
If you enable this policy, intranet zone file URL links originating from intranet zone HTTPS pages
will open Windows File Explorer to the parent directory of the file and select the file. Intranet zone
directory URL links originating from intranet zone HTTPS pages will open Windows File Explorer to
the directory with no items in the directory selected.
If you disable or don't configure this policy, file URL links will not open.
Microsoft Edge uses the definition of intranet zone as configured for Internet Explorer. Note that
https://localhost/ is specifically blocked as an exception of allowed intranet zone host, while
loopback addresses (127.0.0.*, [::1]) are considered internet zone by default.
Supported features:
Example value:
0x00000000
Back to top
JavaScriptAllowedForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Define a list of sites, based on URL patterns, that are allowed to run JavaScript.
If you don't configure this policy, DefaultJavaScriptSetting applies for all sites, if it's set. If not, the
user's personal setting applies.
For detailed information on valid url patterns, please see https://go.microsoft.com/fwlink/?
linkid=2095322 . * is not an accepted value for this policy.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\JavaScriptAllowedForUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\JavaScriptAllowedForUrls\2 = "[*.]contoso.edu"
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
JavaScriptBlockedForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Define a list of sites, based on URL patterns, that aren't allowed to run JavaScript.
If you don't configure this policy, DefaultJavaScriptSetting applies for all sites, if it's set. If not, the
user's personal setting applies.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\JavaScriptBlockedForUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\JavaScriptBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
JavaScriptJitAllowedForSites
Supported versions:
On Windows and macOS since 93 or later
Description
Allows you to set a list of site url patterns that specify sites which are allowed to run JavaScript with
JIT (Just In Time) compiler enabled.
For detailed information on valid site url patterns, please see https://go.microsoft.com/fwlink/?
linkid=2095322 . * is not an accepted value for this policy.
JavaScript JIT policy exceptions will only be enforced at a site granularity (eTLD+1). A policy set for
only subdomain.contoso.com will not correctly apply to contoso.com or subdomain.contoso.com
since they both resolve to the same eTLD+1 (contoso.com) for which there is no policy. In this case,
policy must be set on contoso.com to apply correctly for both contoso.com and
subdomain.contoso.com.
This policy applies on a frame-by-frame basis and not based on top level origin url alone, so e.g. if
contoso.com is listed in the JavaScriptJitAllowedForSites policy but contoso.com loads a frame
containing fabrikam.com then contoso.com will have JavaScript JIT enabled, but fabrikam.com will
use the policy from DefaultJavaScriptJitSetting, if set, or default to JavaScript JIT enabled.
If you don't configure this policy for a site then the policy from DefaultJavaScriptJitSetting applies
to the site, if set, otherwise Javascript JIT is enabled for the site.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
SOFTWARE\Policies\Microsoft\Edge\JavaScriptJitAllowedForSites\1 = "[*.]example.edu"
XML
<array>
<string>[*.]example.edu</string>
</array>
Back to top
JavaScriptJitBlockedForSites
Supported versions:
On Windows and macOS since 93 or later
Description
Allows you to set a list of site url patterns that specify sites which are not allowed to run JavaScript
JIT (Just In Time) compiler enabled.
Disabling the JavaScript JIT will mean that Microsoft Edge may render web content more slowly,
and may also disable parts of JavaScript including WebAssembly. Disabling the JavaScript JIT may
allow Microsoft Edge to render web content in a more secure configuration.
JavaScript JIT policy exceptions will only be enforced at a site granularity (eTLD+1). A policy set for
only subdomain.contoso.com will not correctly apply to contoso.com or subdomain.contoso.com
since they both resolve to the same eTLD+1 (contoso.com) for which there is no policy. In this case,
policy must be set on contoso.com to apply correctly for both contoso.com and
subdomain.contoso.com.
This policy applies on a frame-by-frame basis and not based on top level origin url alone, so e.g. if
contoso.com is listed in the JavaScriptJitBlockedForSites policy but contoso.com loads a frame
containing fabrikam.com then contoso.com will have JavaScript JIT disabled, but fabrikam.com will
use the policy from DefaultJavaScriptJitSetting, if set, or default to JavaScript JIT enabled.
If you don't configure this policy for a site then the policy from DefaultJavaScriptJitSetting applies
to the site, if set, otherwise JavaScript JIT is enabled for the site.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\JavaScriptJitBlockedForSites\1 = "[*.]example.edu"
Mac information and settings
Preference Key Name: JavaScriptJitBlockedForSites
Example value:
XML
<array>
<string>[*.]example.edu</string>
</array>
Back to top
LegacySameSiteCookieBehaviorEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 94.
Supported versions:
Description
This policy doesn't work because it was only intended to serve only as a short-term mechanism to
give enterprises more time to update their environments if they were found to be incompatible
with the SameSite behavior change.
Lets you revert all cookies to legacy SameSite behavior. Reverting to legacy behavior causes cookies
that don't specify a SameSite attribute to be treated as if they were "SameSite=None", removes the
requirement for "SameSite=None" cookies to carry the "Secure" attribute, and skips the scheme
comparison when evaluating if two sites are same-site.
If you don't set this policy, the default SameSite behavior for cookies will depend on other
configuration sources for the SameSite-by-default feature, the Cookies-without-SameSite-must-be-
secure feature, and the Schemeful Same-Site feature. These features can also be configured by a
field trial or the same-site-by-default-cookies flag, the cookies-without-same-site-must-be-secure
flag, or the schemeful-same-site flag in edge://flags.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
LegacySameSiteCookieBehaviorEnabledForDomainList
Supported versions:
Description
Cookies set for domains match specified patterns will revert to legacy SameSite behavior.
Reverting to legacy behavior causes cookies that don't specify a SameSite attribute to be treated as
if they were "SameSite=None", removes the requirement for "SameSite=None" cookies to carry the
"Secure" attribute, and skips the scheme comparison when evaluating if two sites are same-site.
If you don't set this policy, the global default value will be used. The global default will also be used
for cookies on domains not covered by the patterns you specify.
Note that patterns you list in this policy are treated as domains, not URLs, so you should not specify
a scheme or port.
Supported features:
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\LegacySameSiteCookieBehaviorEnabledForDomainList
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\LegacySameSiteCookieBehaviorEnabledForDomainList\1 =
"www.example.com"
SOFTWARE\Policies\Microsoft\Edge\LegacySameSiteCookieBehaviorEnabledForDomainList\2 =
"[*.]example.edu"
XML
<array>
<string>www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
NotificationsAllowedForUrls
Supported versions:
Description
Allows you to create a list of url patterns to specify sites that are allowed to display notifications.
If you don't set this policy, the global default value will be used for all sites. This default value will
be from the DefaultNotificationsSetting policy if it's set, or from the user's personal configuration.
For detailed information on valid url patterns, see https://go.microsoft.com/fwlink/?
linkid=2095322 .
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\NotificationsAllowedForUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\NotificationsAllowedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
NotificationsBlockedForUrls
Supported versions:
Description
Allows you to create a list of url patterns to specify sites that are not allowed to display
notifications.
If you don't set this policy, the global default value will be used for all sites. This default value will
be from the DefaultNotificationsSetting policy if it's set, or from the user's personal configuration.
For detailed information on valid url patterns, see https://go.microsoft.com/fwlink/?
linkid=2095322 .
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\NotificationsBlockedForUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\NotificationsBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
PluginsAllowedForUrls
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 87.
Supported versions:
On Windows and macOS since 77, until 87
Description
This policy doesn't work because Flash is no longer supported by Microsoft Edge.
Define a list of sites, based on URL patterns, that can run the Adobe Flash plug-in.
If you don't configure this policy, the global default value from the DefaultPluginsSetting policy (if
set) or the user's personal configuration is used for all sites.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PluginsAllowedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\PluginsAllowedForUrls\2 = "http://contoso.edu:8080"
XML
<array>
<string>https://www.contoso.com</string>
<string>http://contoso.edu:8080</string>
</array>
Back to top
PluginsBlockedForUrls
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 87.
Supported versions:
On Windows and macOS since 77, until 87
Description
This policy doesn't work because Flash is no longer supported by Microsoft Edge.
Define a list of sites, based on URL patterns, that are blocked from running Adobe Flash.
If you don't configure this policy, the global default value from the DefaultPluginsSetting policy (if
set) or the user's personal configuration is used for all sites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PluginsBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\PluginsBlockedForUrls\2 = "http://contoso.edu:8080"
XML
<array>
<string>https://www.contoso.com</string>
<string>http://contoso.edu:8080</string>
</array>
Back to top
PopupsAllowedForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can open pop-up windows. * is not an accepted
value for this policy.
If you don't configure this policy, the global default value from the DefaultPopupsSetting policy (if
set) or the user's personal configuration is used for all sites.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\PopupsAllowedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
PopupsBlockedForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Define a list of sites, based on URL patterns, that are blocked from opening pop-up windows. * is
not an accepted value for this policy.
If you don't configure this policy, the global default value from the DefaultPopupsSetting policy (if
set) or the user's personal configuration is used for all sites.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PopupsBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\PopupsBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
RegisteredProtocolHandlers
Supported versions:
Description
Set this policy (recommended only) to register a list of protocol handlers. This list is merged with
ones registered by the user and both are available to use.
Users can't remove a protocol handler registered by this policy. However, they can install a new
default protocol handler to override the existing protocol handlers.
Supported features:
Can be mandatory: No
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Windows information and settings
Example value:
SOFTWARE\Policies\Microsoft\Edge\RegisteredProtocolHandlers = [
{
"default": true,
"protocol": "mailto",
"url": "https://mail.contoso.com/mail/?extsrc=mailto&url=%s"
}
]
XML
<key>RegisteredProtocolHandlers</key>
<array>
<dict>
<key>default</key>
<true/>
<key>protocol</key>
<string>mailto</string>
<key>url</key>
<string>https://mail.contoso.com/mail/?extsrc=mailto&url=%s</string>
</dict>
</array>
Back to top
SerialAllowAllPortsForUrls
Supported versions:
On Windows and macOS since 97 or later
Description
Setting the policy allows you to list sites which are automatically granted permission to access all
available serial ports.
The URLs must be valid, or the policy is ignored. Only the origin (scheme, host, and port) of the URL
is considered.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SerialAllowAllPortsForUrls\1 =
"https://www.example.com"
XML
<array>
<string>https://www.example.com</string>
</array>
Back to top
SerialAllowUsbDevicesForUrls
Supported versions:
On Windows and macOS since 97 or later
Description
Setting the policy lets you list sites that are automatically granted permission to access USB serial
devices with vendor and product IDs that match the vendor_id and product_id fields.
Optionally you can omit the product_id field. This enables site access to all the vendor's devices.
When you provide a product ID, then you give the site access to a specific device from the vendor
but not all devices.
The URLs must be valid, or the policy is ignored. Only the origin (scheme, host, and port) of the URL
is considered.
This policy only affects access to USB devices through the Web Serial API. To grant access to USB
devices through the WebUSB API see the WebUsbAllowDevicesForUrls policy.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\SerialAllowUsbDevicesForUrls = [
{
"devices": [
{
"product_id": 5678,
"vendor_id": 1234
}
],
"urls": [
"https://specific-device.example.com"
]
},
{
"devices": [
{
"vendor_id": 1234
}
],
"urls": [
"https://all-vendor-devices.example.com"
]
}
]
SOFTWARE\Policies\Microsoft\Edge\SerialAllowUsbDevicesForUrls = [{"devices":
[{"product_id": 5678, "vendor_id": 1234}], "urls": ["https://specific-
device.example.com"]}, {"devices": [{"vendor_id": 1234}], "urls": ["https://all-
vendor-devices.example.com"]}]
XML
<key>SerialAllowUsbDevicesForUrls</key>
<array>
<dict>
<key>devices</key>
<array>
<dict>
<key>product_id</key>
<integer>5678</integer>
<key>vendor_id</key>
<integer>1234</integer>
</dict>
</array>
<key>urls</key>
<array>
<string>https://specific-device.example.com</string>
</array>
</dict>
<dict>
<key>devices</key>
<array>
<dict>
<key>vendor_id</key>
<integer>1234</integer>
</dict>
</array>
<key>urls</key>
<array>
<string>https://all-vendor-devices.example.com</string>
</array>
</dict>
</array>
Back to top
ShowPDFDefaultRecommendationsEnabled
Supported versions:
On Windows and macOS since 93 or later
Description
This policy setting lets you decide whether employees should receive recommendations to set
Microsoft Edge as PDF handler.
If you enable or don't configure this setting, employees receive recommendations from Microsoft
Edge to set itself as the default PDF handler.
If you disable this setting, employees will not receive any notifications from Microsoft Edge to set
itself as the default PDF handler.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SpotlightExperiencesAndRecommendationsEnabled
Choose whether users can receive customized background images and text,
suggestions, notifications, and tips for Microsoft services
Supported versions:
On Windows since 86 or later
Description
Choose whether users can receive customized background images and text, suggestions,
notifications, and tips for Microsoft services.
If you enable or don't configure this setting, spotlight experiences and recommendations are
turned on.
If you disable this setting, spotlight experiences and recommendations are turned off.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
ThirdPartyStoragePartitioningBlockedForOrigins
Supported versions:
On Windows and macOS since 115 or later
Description
Lets you set a list of url patterns that specify top-level origins (the url in the tab's address bar) that
block third-party (cross-origin iframe) storage partitioning.
If this policy isn't set or a top-level origin doesn't match, then the value from
DefaultThirdPartyStoragePartitioningSetting will be used.
Note that the patterns you list are treated as origins, not URLs, so you shouldn't specify a path.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ThirdPartyStoragePartitioningBlockedForOrigins\1 =
"www.example.com"
SOFTWARE\Policies\Microsoft\Edge\ThirdPartyStoragePartitioningBlockedForOrigins\2 = "
[*.]example.edu"
XML
<array>
<string>www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
WebHidAllowAllDevicesForUrls
Supported versions:
On Windows and macOS since 109 or later
Description
This setting allows you to list sites which are automatically granted permission to access all
available devices.
The URLs must be valid or the policy is ignored. Only the origin (scheme, host and port) of the URL
is evaluated.
For detailed information about valid url patterns, see https://go.microsoft.com/fwlink/?
linkid=2095322 . * is not an accepted value for this policy.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebHidAllowAllDevicesForUrls\1 =
"https://microsoft.com"
SOFTWARE\Policies\Microsoft\Edge\WebHidAllowAllDevicesForUrls\2 =
"https://chromium.org"
Mac information and settings
Preference Key Name: WebHidAllowAllDevicesForUrls
Example value:
XML
<array>
<string>https://microsoft.com</string>
<string>https://chromium.org</string>
</array>
Back to top
WebHidAllowDevicesForUrls
Supported versions:
On Windows and macOS since 109 or later
Description
This setting lets you list the URLs that specify which sites are automatically granted permission to
access a HID device with the given vendor and product IDs.
Setting the policy Each item in the list requires both devices and urls fields for the item to be valid,
otherwise the item is ignored.
Each item in the devices field must have a vendor_id and may have a product_id field.
Omitting the product_id field will create a policy matching any device with the specified
vendor ID.
An item which has a product_id field without a vendor_id field is invalid and is ignored.
If you don't set this policy, that means DefaultWebHidGuardSetting applies, if it's set. If not, the
user's personal setting applies.
URLs in this policy shouldn't conflict with those configured through WebHidBlockedForUrls. If they
do, this policy takes precedence over WebHidBlockedForUrls.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebHidAllowDevicesForUrls = [
{
"devices": [
{
"product_id": 5678,
"vendor_id": 1234
}
],
"urls": [
"https://microsoft.com",
"https://chromium.org"
]
}
]
XML
<key>WebHidAllowDevicesForUrls</key>
<array>
<dict>
<key>devices</key>
<array>
<dict>
<key>product_id</key>
<integer>5678</integer>
<key>vendor_id</key>
<integer>1234</integer>
</dict>
</array>
<key>urls</key>
<array>
<string>https://microsoft.com</string>
<string>https://chromium.org</string>
</array>
</dict>
</array>
Back to top
WebHidAllowDevicesWithHidUsagesForUrls
Supported versions:
On Windows and macOS since 109 or later
Description
This setting allows you to list the URLs that specify which sites are automatically granted permission
to access a HID device containing a top-level collection with the given HID usage.
Each item in the list requires both usages and urls fields for the policy to be valid.
Each item in the usages field must have a usage_page and may have a usage field.
Omitting the usage field will create a policy matching any device containing a top-level
collection with a usage from the specified usage page.
An item which has a usage field without a usage_page field is invalid and is ignored.
If you don't set this policy, that means DefaultWebHidGuardSetting applies, if it's set. If not, the
user's personal setting applies.
URLs in this policy shouldn't conflict with those configured through WebHidBlockedForUrls. If they
do, this policy takes precedence over WebHidBlockedForUrls.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
SOFTWARE\Policies\Microsoft\Edge\WebHidAllowDevicesWithHidUsagesForUrls = [
{
"urls": [
"https://microsoft.com",
"https://chromium.org"
],
"usages": [
{
"usage": 5678,
"usage_page": 1234
}
]
}
]
SOFTWARE\Policies\Microsoft\Edge\WebHidAllowDevicesWithHidUsagesForUrls = [{"urls":
["https://microsoft.com", "https://chromium.org"], "usages": [{"usage": 5678,
"usage_page": 1234}]}]
XML
<key>WebHidAllowDevicesWithHidUsagesForUrls</key>
<array>
<dict>
<key>urls</key>
<array>
<string>https://microsoft.com</string>
<string>https://chromium.org</string>
</array>
<key>usages</key>
<array>
<dict>
<key>usage</key>
<integer>5678</integer>
<key>usage_page</key>
<integer>1234</integer>
</dict>
</array>
</dict>
</array>
Back to top
WebHidAskForUrls
Supported versions:
On Windows and macOS since 100 or later
Description
Setting the policy lets you list the URL patterns that specify which sites can ask users to grant them
access to a HID device.
Leaving the policy unset means DefaultWebHidGuardSetting applies for all sites, if it's set. If not,
users' personal settings apply.
For URL patterns that don't match the policy, the following values are applied in order of
precedence:
URL patterns must not conflict with WebHidBlockedForUrls. Neither policy takes precedence if a
URL matches both patterns.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebHidAskForUrls\1 = "https://microsoft.com"
SOFTWARE\Policies\Microsoft\Edge\WebHidAskForUrls\2 = "https://chromium.org"
XML
<array>
<string>https://microsoft.com</string>
<string>https://chromium.org</string>
</array>
Back to top
WebHidBlockedForUrls
Supported versions:
Leaving the policy unset means DefaultWebHidGuardSetting applies for all sites, if it's set. If not,
users' personal settings apply.
For URL patterns that don't match the policy, the following values are applied in order of
precedence:
URL patterns can't conflict with WebHidAskForUrls. Neither policy takes precedence if a URL
matches both patterns.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebHidBlockedForUrls\1 = "https://microsoft.com"
SOFTWARE\Policies\Microsoft\Edge\WebHidBlockedForUrls\2 = "https://chromium.org"
XML
<array>
<string>https://microsoft.com</string>
<string>https://chromium.org</string>
</array>
Back to top
WebUsbAllowDevicesForUrls
Supported versions:
Description
Allows you to set a list of urls that specify which sites will automatically be granted permission to
access a USB device with the given vendor and product IDs. Each item in the list must contain both
devices and urls in order for the policy to be valid. Each item in devices can contain a vendor ID and
product ID field. Any ID that is omitted is treated as a wildcard with one exception, and that
exception is that a product ID cannot be specified without a vendor ID also being specified.
Otherwise, the policy will not be valid and will be ignored.
The USB permission model uses the URL of the requesting site ("requesting URL") and the URL of
the top-level frame site ("embedding URL") to grant permission to the requesting URL to access the
USB device. The requesting URL may be different than the embedding URL when the requesting
site is loaded in an iframe. Therefore, the "urls" field can contain up to two URL strings delimited by
a comma to specify the requesting and embedding URL respectively. If only one URL is specified,
then access to the corresponding USB devices will be granted when the requesting site's URL
matches this URL regardless of embedding status. The URLs in "urls" must be valid URLs, otherwise
the policy will be ignored.
If this policy is left not set, the global default value will be used for all sites either from the
DefaultWebUsbGuardSetting policy if it is set, or the user's personal configuration otherwise.
URL patterns in this policy should not clash with the ones configured via WebUsbBlockedForUrls. If
there is a clash, this policy will take precedence over WebUsbBlockedForUrls and
WebUsbAskForUrls.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebUsbAllowDevicesForUrls = [
{
"devices": [
{
"product_id": 5678,
"vendor_id": 1234
}
],
"urls": [
"https://contoso.com",
"https://fabrikam.com"
]
}
]
SOFTWARE\Policies\Microsoft\Edge\WebUsbAllowDevicesForUrls = [{"devices":
[{"product_id": 5678, "vendor_id": 1234}], "urls": ["https://contoso.com",
"https://fabrikam.com"]}]
XML
<key>WebUsbAllowDevicesForUrls</key>
<array>
<dict>
<key>devices</key>
<array>
<dict>
<key>product_id</key>
<integer>5678</integer>
<key>vendor_id</key>
<integer>1234</integer>
</dict>
</array>
<key>urls</key>
<array>
<string>https://contoso.com</string>
<string>https://fabrikam.com</string>
</array>
</dict>
</array>
Back to top
WebUsbAskForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can ask the user for access to a USB device.
If you don't configure this policy, the global default value from the DefaultWebUsbGuardSetting
policy (if set) or the user's personal configuration is used for all sites.
The URL patterns defined in this policy can't conflict with those configured in the
WebUsbBlockedForUrls policy - you can't both allow and block a URL. For detailed information on
valid url patterns, please see https://go.microsoft.com/fwlink/?linkid=2095322
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebUsbAskForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\WebUsbAskForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
WebUsbBlockedForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can't ask the user to grant them access to a USB
device.
If you don't configure this policy, the global default value from the DefaultWebUsbGuardSetting
policy (if set) or the user's personal configuration is used for all sites.
URL patterns in this policy can't conflict with those configured in the WebUsbAskForUrls policy. You
can't both allow and block a URL. For detailed information on valid url patterns, see
https://go.microsoft.com/fwlink/?linkid=2095322 .
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebUsbBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\WebUsbBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
DefaultSearchProviderEnabled
Supported versions:
Description
If you enable this policy, a user can search for a term by typing in the address bar (as long as what
they type isn't a URL).
You can specify the default search provider to use by enabling the rest of the default search
policies. If these are left empty (not configured) or configured incorrectly, the user can choose the
default provider.
If you disable this policy, the user can't search from the address bar.
If you enable or disable this policy, users can't change or override it.
If you don't configure this policy, the default search provider is enabled, and the user can choose
the default search provider and set the search provider list.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX..
Starting in Microsoft Edge 84, you can set this policy as a recommended policy.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
DefaultSearchProviderEncodings
Default search provider encodings
Supported versions:
Description
Specify the character encodings supported by the search provider. Encodings are code page names
like UTF-8, GB2312, and ISO-8859-1. They are tried in the order provided.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\1 = "UTF-8"
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\2 = "UTF-16"
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\3 = "GB2312"
SOFTWARE\Policies\Microsoft\Edge\DefaultSearchProviderEncodings\4 = "ISO-8859-1"
XML
<array>
<string>UTF-8</string>
<string>UTF-16</string>
<string>GB2312</string>
<string>ISO-8859-1</string>
</array>
Back to top
DefaultSearchProviderImageURL
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies the URL to the search engine used for image search. Search requests are sent using the
GET method.
This policy is optional. If you don't configure it, image search isn't available.
Specify Bing's Image Search URL as: '{bing:baseURL}images/detail/search?
iss=sbiupload&FORM=ANCMS1#enterInsights'.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"https://search.contoso.com/searchbyimage/upload"
XML
<string>https://search.contoso.com/searchbyimage/upload</string>
Back to top
DefaultSearchProviderImageURLPostParams
Supported versions:
On Windows and macOS since 77 or later
Description
If you enable this policy, it specifies the parameters used when an image search that uses POST is
performed. The policy consists of comma-separated name/value pairs. If a value is a template
parameter, like {imageThumbnail} in the preceding example, it's replaced with real image thumbnail
data. This policy is applied only if you enable the DefaultSearchProviderEnabled and
DefaultSearchProviderSearchURL policies.
If you don't set this policy, image search requests are sent using the GET method.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"content={imageThumbnail},url={imageURL},sbisrc={SearchSource}"
XML
<string>content={imageThumbnail},url={imageURL},sbisrc={SearchSource}</string>
Back to top
DefaultSearchProviderKeyword
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies the keyword, which is the shortcut used in the Address Bar to trigger the search for this
provider.
This policy is optional. If you don't configure it, no keyword activates the search provider.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"mis"
XML
<string>mis</string>
Back to top
DefaultSearchProviderName
Supported versions:
On Windows and macOS since 77 or later
Description
If you enable this policy, you set the name of the default search provider.
If you don't enable this policy or if you leave it empty, the host name specified by the search URL is
used.
'DefaultSearchProviderName' should be set to an organization-approved encrypted search provider
that corresponds to the encrypted search provider set in DTBC-0008. This policy is applied only if
you enable the DefaultSearchProviderEnabled and DefaultSearchProviderSearchURL policies.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Data Type:
String
Example value:
XML
Back to top
DefaultSearchProviderSearchURL
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies the URL of the search engine used for a default search. The URL contains the string
'{searchTerms}', which is replaced at query time by the terms the user is searching for.
'{bing:baseURL}search?q={searchTerms}'.
This policy is required when you enable the DefaultSearchProviderEnabled policy; if you don't
enable the latter policy, this policy is ignored.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"https://search.contoso.com/search?q={searchTerms}"
XML
<string>https://search.contoso.com/search?q={searchTerms}</string>
Back to top
DefaultSearchProviderSuggestURL
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies the URL for the search engine used to provide search suggestions. The URL contains the
string '{searchTerms}', which is replaced at query time by the text the user has entered so far.
This policy is optional. If you don't configure it, users won't see search suggestions; they will see
suggestions from their browsing history and favorites.
'{bing:baseURL}qbox?query={searchTerms}'.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy. If the user has
already set a default search provider, the default search provider configured by this recommended
policy will not be added to the list of search providers the user can choose from. If this is the
desired behavior, use the ManagedSearchEngines policy.
Supported features:
Data Type:
String
Example value:
"https://search.contoso.com/suggest?q={searchTerms}"
XML
<string>https://search.contoso.com/suggest?q={searchTerms}</string>
Back to top
NewTabPageSearchBox
Supported versions:
Description
You can configure the new tab page search box to use "Search box (Recommended)" or "Address
bar" to search on new tabs. This policy only works if you set the search engine to a value other than
Bing by setting the following two policies: DefaultSearchProviderEnabled and
DefaultSearchProviderSearchURL.
If the address bar default search engine is Bing, the new tab page uses the search box to
search on new tabs.
If the address bar default search engine is not Bing, users are offered an additional choice (use
"Address bar") when searching on new tabs.
If you enable this policy and set it to:
"Search box (Recommended)" ('bing'), the new tab page uses the search box to search on new
tabs.
"Address bar" ('redirect'), the new tab page search box uses the address bar to search on new
tabs.
Supported features:
Data Type:
String
Example value:
"bing"
XML
<string>bing</string>
Back to top
EdgeWorkspacesEnabled
Enable Workspaces
Supported versions:
On Windows and macOS since 106 or later
Description
Microsoft Edge Workspaces helps improve productivity for users in your organization.
If you enable or don't configure this policy, users will be able to access the Microsoft Edge
Workspaces feature. If you disable this policy, users will not be able to access the Microsoft Edge
Workspaces feature.
Supported features:
Example value:
0x00000001
XML
<true/>
Back to top
WorkspacesNavigationSettings
Supported versions:
On Windows and macOS since 110 or later
Description
This setting lets you to define groups of URLs, and apply specific Microsoft Edge Workspaces
navigation settings to each group.
If this policy is configured, Microsoft Edge Workspaces will use the configured settings when
deciding whether and how to share navigations among collaborators in a Microsoft Edge
Workspace.
If this policy is not configured, Microsoft Edge Workspaces will use only default and internally
configured navigation settings.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\WorkspacesNavigationSettings = [
{
"navigation_options": {
"do_not_send_to": true,
"remove_all_query_parameters": true
},
"url_patterns": [
"https://contoso.com",
"https://www.fabrikam.com",
".exact.hostname.com"
]
},
{
"navigation_options": {
"query_parameters_to_remove": [
"username",
"login_hint"
]
},
"url_patterns": [
"https://adatum.com"
]
},
{
"navigation_options": {
"do_not_send_from": true,
"prefer_initial_url": true
},
"url_regex_patterns": [
"\\Ahttps://.*?tafe\\..*?trs.*?\\.fabrikam.com/Sts"
]
}
]
SOFTWARE\Policies\Microsoft\Edge\WorkspacesNavigationSettings =
[{"navigation_options": {"do_not_send_to": true, "remove_all_query_parameters": true},
"url_patterns": ["https://contoso.com", "https://www.fabrikam.com",
".exact.hostname.com"]}, {"navigation_options": {"query_parameters_to_remove":
["username", "login_hint"]}, "url_patterns": ["https://adatum.com"]},
{"navigation_options": {"do_not_send_from": true, "prefer_initial_url": true},
"url_regex_patterns": ["\\Ahttps://.*?tafe\\..*?trs.*?\\.fabrikam.com/Sts"]}]
Mac information and settings
Preference Key Name: WorkspacesNavigationSettings
Example value:
XML
<key>WorkspacesNavigationSettings</key>
<array>
<dict>
<key>navigation_options</key>
<dict>
<key>do_not_send_to</key>
<true/>
<key>remove_all_query_parameters</key>
<true/>
</dict>
<key>url_patterns</key>
<array>
<string>https://contoso.com</string>
<string>https://www.fabrikam.com</string>
<string>.exact.hostname.com</string>
</array>
</dict>
<dict>
<key>navigation_options</key>
<dict>
<key>query_parameters_to_remove</key>
<array>
<string>username</string>
<string>login_hint</string>
</array>
</dict>
<key>url_patterns</key>
<array>
<string>https://adatum.com</string>
</array>
</dict>
<dict>
<key>navigation_options</key>
<dict>
<key>do_not_send_from</key>
<true/>
<key>prefer_initial_url</key>
<true/>
</dict>
<key>url_regex_patterns</key>
<array>
<string>\Ahttps://.*?tafe\..*?trs.*?\.fabrikam.com/Sts</string>
</array>
</dict>
</array>
Back to top
Experimentation policies
Back to top
FeatureFlagOverridesControl
Supported versions:
On Windows and macOS since 93 or later
Description
Configures users ability to override state of feature flags. If you set this policy to
'CommandLineOverridesEnabled', users can override state of feature flags using command line
arguments but not edge://flags page.
If you set this policy to 'OverridesEnabled', users can override state of feature flags using command
line arguments or edge://flags page.
If you set this policy to 'OverridesDisabled', users can't override state of feature flags using
command line arguments or edge://flags page.
If you don't configure this policy, the behavior is the same as the 'OverridesEnabled'.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Windows information and settings
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
Extensions policies
Back to top
BlockExternalExtensions
Supported versions:
On Windows and macOS since 88 or later
Description
Control the installation of external extensions.
If you enable this setting, external extensions are blocked from being installed.
If you disable this setting or leave it unset, external extensions are allowed to be installed.
External extensions and their installation are documented at Alternate extension distribution
methods.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ControlDefaultStateOfAllowExtensionFromOtherStoresSettingEnabled
Supported versions:
On Windows and macOS since 101 or later
Description
This policy allows you to control the default state of the Allow extensions from other stores setting.
This policy can't be used to stop installation of extensions from other stores such as Chrome Web
Store. To stop installation of extensions from other stores, use the Extension Settings policy:
https://go.microsoft.com/fwlink/?linkid=2187098 .
When enabled, Allow extensions from other stores will be turned on. So, users won't have to turn
on the flag manually while installing extensions from other supported stores such as Chrome Web
Store. However a user can override this setting. If the user has already turned on the setting and
then turned it off, this setting may not work. If the Admin first sets the policy as Enabled, but then
changes it to not configured or disabled, it will have no impact on user settings and the setting will
remain as it is.
When disabled or not configured, the user can manage the Allow extensions from other store
setting.
Supported features:
Can be mandatory: No
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ExtensionAllowedTypes
Description
Setting the policy controls which apps and extensions may be installed in Microsoft Edge, which
hosts they can interact with, and limits runtime access.
If you don't set this policy, there aren't any restrictions on acceptable extension and app types.
Extensions and apps which have a type that's not on the list won't be installed. Each value should
be one of these strings:
"extension"
"theme"
"user_script"
"hosted_app"
See the Microsoft Edge extensions documentation for more information about these types.
Note: This policy also affects extensions and apps to be force-installed using
ExtensionInstallForcelist.
Supported features:
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExtensionAllowedTypes\1 = "hosted_app"
XML
<array>
<string>hosted_app</string>
</array>
Back to top
ExtensionInstallAllowlist
Description
Setting this policy specifies which extensions are not subject to the blocklist.
A blocklist value of * means all extensions are blocked and users can only install extensions listed in
the allow list.
By default, all extensions are allowed. However, if you prohibited extensions by policy, you can use
the list of allowed extensions to change that policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\1 = "extension_id1"
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallAllowlist\2 = "extension_id2"
XML
<array>
<string>extension_id1</string>
<string>extension_id2</string>
</array>
Back to top
ExtensionInstallBlocklist
Supported versions:
On Windows and macOS since 77 or later
Description
Lets you specify which extensions the users CANNOT install. Extensions already installed will be
disabled if blocked, without a way for the user to enable them. After a disabled extension is
removed from the blocklist it will automatically get re-enabled.
A blocklist value of '*' means all extensions are blocked unless they are explicitly listed in the
allowlist.
If this policy isn't set, the user can install any extension in Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallBlocklist\1 = "extension_id1"
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallBlocklist\2 = "extension_id2"
XML
<array>
<string>extension_id1</string>
<string>extension_id2</string>
</array>
Back to top
ExtensionInstallForcelist
Control which extensions are installed silently
Supported versions:
Description
Set this policy to specify a list of apps and extensions that install silently, without user interaction.
Users can't uninstall or turn off this setting. Permissions are granted implicitly, including the
enterprise.deviceAttributes and enterprise.platformKeys extension APIs. Note: These 2 APIs aren't
available to apps and extensions that aren't force-installed.
If you don't set this policy, no apps or extensions are autoinstalled and users can uninstall any app
in Microsoft Edge.
For Windows instances not joined to a Microsoft Active Directory domain, forced installation is
limited to apps and extensions listed in the Microsoft Edge Add-ons website.
On macOS instances, apps and extensions from outside the Microsoft Edge Add-ons website can
only be force installed if the instance is managed via MDM, or joined to a domain via MCX.
The source code of any extension can be altered by users with developer tools, potentially
rendering the extension unfunctional. If this is a concern, configure the DeveloperToolsAvailability
policy.
Each list item of the policy is a string that contains an extension ID and, optionally, an "update" URL
separated by a semicolon (;). The extension ID is the 32-letter string found, for example, on
edge://extensions when in Developer mode. If specified, the "update" URL should point to an
Update Manifest XML document ( https://go.microsoft.com/fwlink/?linkid=2095043 ). By default,
the Microsoft Edge Add-ons website's update URL is used. The "update" URL set in this policy is
only used for the initial installation; subsequent updates of the extension use the update URL in the
extension's manifest.
Note: This policy doesn't apply to InPrivate mode. Read about hosting extensions at Publish and
update extensions in the Microsoft Edge Add-ons website.
Supported features:
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist\1 =
"gbchcmhmhahfdphkhkmpfmihenigjmpp;https://edge.microsoft.com/extensionwebstorebase/v1/
crx"
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist\2 =
"abcdefghijklmnopabcdefghijklmnop"
XML
<array>
<string>gbchcmhmhahfdphkhkmpfmihenigjmpp;https://edge.microsoft.com/extensionwebstoreb
ase/v1/crx</string>
<string>abcdefghijklmnopabcdefghijklmnop</string>
</array>
Back to top
ExtensionInstallSources
Supported versions:
Description
Define URLs that can install extensions and themes directly without having to drag and drop the
packages to the edge://extensions page.
The ExtensionInstallBlocklist policy takes precedence over this policy. Any extensions that's on the
block list won't be installed, even if it comes from a site on this list.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallSources\1 =
"https://corp.contoso.com/*"
XML
<array>
<string>https://corp.contoso.com/*</string>
</array>
Back to top
ExtensionSettings
Supported versions:
Description
Setting this policy controls extension management settings for Microsoft Edge, including any
controlled by existing extension-related policies. This policy supersedes any legacy policies that
might be set.
This policy maps an extension ID or an update URL to its specific setting only. A default
configuration can be set for the special ID "*", which applies to all extensions without a custom
configuration in this policy. With an update URL, configuration applies to extensions with the exact
update URL stated in the extension manifest. If the 'override_update_url' flag is set to true, the
extension is installed and updated using the update URL specified in the ExtensionInstallForcelist
policy or in 'update_url' field in this policy. The flag 'override_update_url' is ignored if the
'update_url' is the Edge Add-ons website update URL. For more details, check out the detailed
guide to ExtensionSettings policy available at https://go.microsoft.com/fwlink/?linkid=2161555 .
To block extensions from a particular third party store, you only need to block the update_url for
that store. For example, if you want to block extensions from Chrome Web Store, you can use the
following JSON.
{"update_url:https://clients2.google.com/service/update2/crx":{"installation_mode":"blocked"}}
Note that you can still use ExtensionInstallForcelist and ExtensionInstallAllowlist to allow / force
install specific extensions even if the store is blocked using the JSON in the previous example.
Note: For Windows instances not joined to a Microsoft Active Directory domain and macOS
instances not managed via MDM or joined to a domain via MCX, forced installation is limited to
apps and extensions listed in the Microsoft Edge Add-ons website.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
SOFTWARE\Policies\Microsoft\Edge\ExtensionSettings = {
"*": {
"allowed_types": [
"hosted_app"
],
"blocked_install_message": "Custom error message.",
"blocked_permissions": [
"downloads",
"bookmarks"
],
"install_sources": [
"https://company-intranet/apps"
],
"installation_mode": "blocked",
"runtime_allowed_hosts": [
"*://good.contoso.com"
],
"runtime_blocked_hosts": [
"*://*.contoso.com"
]
},
"abcdefghijklmnopabcdefghijklmnop": {
"blocked_permissions": [
"history"
],
"installation_mode": "allowed",
"minimum_version_required": "1.0.1"
},
"bcdefghijklmnopabcdefghijklmnopa": {
"allowed_permissions": [
"downloads"
],
"installation_mode": "force_installed",
"override_update_url": true,
"runtime_allowed_hosts": [
"*://good.contoso.com"
],
"runtime_blocked_hosts": [
"*://*.contoso.com"
],
"toolbar_state": "force_shown",
"update_url": "https://contoso.com/update_url"
},
"cdefghijklmnopabcdefghijklmnopab": {
"blocked_install_message": "Custom error message.",
"installation_mode": "blocked"
},
"defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd": {
"blocked_install_message": "Custom error message.",
"installation_mode": "blocked"
},
"fghijklmnopabcdefghijklmnopabcde": {
"blocked_install_message": "Custom removal message.",
"installation_mode": "removed"
},
"update_url:https://www.contoso.com/update.xml": {
"allowed_permissions": [
"downloads"
],
"blocked_permissions": [
"wallpaper"
],
"installation_mode": "allowed"
}
}
XML
<key>ExtensionSettings</key>
<dict>
<key>*</key>
<dict>
<key>allowed_types</key>
<array>
<string>hosted_app</string>
</array>
<key>blocked_install_message</key>
<string>Custom error message.</string>
<key>blocked_permissions</key>
<array>
<string>downloads</string>
<string>bookmarks</string>
</array>
<key>install_sources</key>
<array>
<string>https://company-intranet/apps</string>
</array>
<key>installation_mode</key>
<string>blocked</string>
<key>runtime_allowed_hosts</key>
<array>
<string>*://good.contoso.com</string>
</array>
<key>runtime_blocked_hosts</key>
<array>
<string>*://*.contoso.com</string>
</array>
</dict>
<key>abcdefghijklmnopabcdefghijklmnop</key>
<dict>
<key>blocked_permissions</key>
<array>
<string>history</string>
</array>
<key>installation_mode</key>
<string>allowed</string>
<key>minimum_version_required</key>
<string>1.0.1</string>
</dict>
<key>bcdefghijklmnopabcdefghijklmnopa</key>
<dict>
<key>allowed_permissions</key>
<array>
<string>downloads</string>
</array>
<key>installation_mode</key>
<string>force_installed</string>
<key>override_update_url</key>
<true/>
<key>runtime_allowed_hosts</key>
<array>
<string>*://good.contoso.com</string>
</array>
<key>runtime_blocked_hosts</key>
<array>
<string>*://*.contoso.com</string>
</array>
<key>toolbar_state</key>
<string>force_shown</string>
<key>update_url</key>
<string>https://contoso.com/update_url</string>
</dict>
<key>cdefghijklmnopabcdefghijklmnopab</key>
<dict>
<key>blocked_install_message</key>
<string>Custom error message.</string>
<key>installation_mode</key>
<string>blocked</string>
</dict>
<key>defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd</key>
<dict>
<key>blocked_install_message</key>
<string>Custom error message.</string>
<key>installation_mode</key>
<string>blocked</string>
</dict>
<key>fghijklmnopabcdefghijklmnopabcde</key>
<dict>
<key>blocked_install_message</key>
<string>Custom removal message.</string>
<key>installation_mode</key>
<string>removed</string>
</dict>
<key>update_url:https://www.contoso.com/update.xml</key>
<dict>
<key>allowed_permissions</key>
<array>
<string>downloads</string>
</array>
<key>blocked_permissions</key>
<array>
<string>wallpaper</string>
</array>
<key>installation_mode</key>
<string>allowed</string>
</dict>
</dict>
Back to top
GamerModeEnabled
Supported versions:
On Windows since 117 or later
Description
Microsoft Edge Gamer Mode allows gamers to personalize their browser with gaming themes and
gives them the option of enabling Efficiency Mode for PC gaming, the Gaming feed on new tabs,
sidebar apps for gamers, and more.
If you enable or don't configure this policy, users can opt into Gamer Mode. If you disable this
policy, Gamer Mode will be disabled.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Back to top
AllHttpAuthSchemesAllowedForOrigins
Description
Set this policy to specify which origins allow all the HTTP authentication schemes Microsoft Edge
supports regardless of the AuthSchemes policy.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AllHttpAuthSchemesAllowedForOrigins\1 =
"*.example.com"
XML
<array>
<string>*.example.com</string>
</array>
Back to top
AllowCrossOriginAuthPrompt
Supported versions:
Description
Typically, this is disabled as a phishing defense. If you don't configure this policy, it's disabled and
third-party images can't show an authentication prompt.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Windows information and settings
Example value:
0x00000000
XML
<false/>
Back to top
AuthNegotiateDelegateAllowlist
Specifies a list of servers that Microsoft Edge can delegate user credentials
to
Supported versions:
Description
Configure the list of servers that Microsoft Edge can delegate to.
Separate multiple server names with commas. Wildcards (*) are allowed.
If you don't configure this policy Microsoft Edge won't delegate user credentials even if a server is
detected as Intranet.
Supported features:
Data Type:
String
Example value:
"contoso.com"
XML
<string>contoso.com</string>
Back to top
AuthSchemes
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies which HTTP authentication schemes are supported.
You can configure the policy by using these values: 'basic', 'digest', 'ntlm', and 'negotiate'. Separate
multiple values with commas.
If you don't configure this policy, all four schemes are used.
Supported features:
Data Type:
String
Example value:
"basic,digest,ntlm,negotiate"
XML
<string>basic,digest,ntlm,negotiate</string>
Back to top
AuthServerAllowlist
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies which servers to enable for integrated authentication. Integrated authentication is only
enabled when Microsoft Edge receives an authentication challenge from a proxy or from a server in
this list.
Separate multiple server names with commas. Wildcards (*) are allowed.
If you don't configure this policy, Microsoft Edge tries to detect if a server is on the intranet - only
then will it respond to IWA requests. If the server is on the internet, IWA requests from it are
ignored by Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"*contoso.com,contoso.com"
<string>*contoso.com,contoso.com</string>
Back to top
BasicAuthOverHttpEnabled
Supported versions:
On Windows and macOS since 88 or later
Description
If you enable this policy or leave it unset, Basic authentication challenges received over non-secure
HTTP will be allowed.
If you disable this policy, non-secure HTTP requests from the Basic authentication scheme are
blocked, and only secure HTTPS is allowed.
This policy setting is ignored (and Basic is always forbidden) if the AuthSchemes policy is set and
does not include Basic.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
DisableAuthNegotiateCnameLookup
Supported versions:
Description
Determines whether the generated Kerberos SPN is based on the canonical DNS name (CNAME) or
on the original name entered.
If you enable this policy, CNAME lookup is skipped and the server name (as entered) is used.
If you disable this policy or don't configure it, the canonical name of the server is used. This is
determined through CNAME lookup.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
EnableAuthNegotiatePort
Supported versions:
Description
Specifies whether the generated Kerberos SPN should include a non-standard port.
If you enable this policy, and a user includes a non-standard port (a port other than 80 or 443) in a
URL, that port is included in the generated Kerberos SPN.
If you don't configure or disable this policy, the generated Kerberos SPN won't include a port in any
case.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
NtlmV2Enabled
Supported versions:
On macOS since 77 or later
Description
Controls whether NTLMv2 is enabled.
All recent versions of Samba and Windows servers support NTLMv2. You should only disable
NTLMv2 to address issues with backwards compatibility as it reduces the security of authentication.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
XML
<true/>
Back to top
WindowsHelloForHTTPAuthEnabled
Supported versions:
On Windows since 90 or later
Description
Indicates if Windows Credential UI should be used to respond to NTLM and Negotiate
authentication challenges.
If you disable this policy, a basic username and password prompt will be used to respond to NTLM
and Negotiate challenges. If you enable or don't configure this policy, Windows Credential UI will
be used.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
Back to top
EdgeDefaultProfileEnabled
Supported versions:
On Windows since 101 or later
Description
Configuring this policy will let you set a default profile in Microsoft Edge to be used when opening
the browser rather than the last profile used. This policy won't affect when "--profile-directory"
parameter has been specified. Set the value to "Default" to refer to the default profile. The value is
case sensitive. The value of the policy is the name of the profile (case sensitive) and can be
configured with string that is the name of a specific profile. The value "Edge Kids Mode" and "Guest
Profile" are considered not useful values because they not supposed to be a default profile. This
policy won't impact the following scenarios:
The following statements are under the condition of not specify the "--profile-directory" and
configured value is not "Edge Kids Mode" or "Guest Profile": If you enable this policy and configure
it with a specific profile name and the specified profile can be found, Microsoft Edge will use the
specified profile when launching and the setting of "Default profile for external link" is changed to
the specified profile name and greyed out. If you enable this policy and configure it with a specific
profile name but it can't be found, the policy will behave like it's never been set before. If you
enable this policy, but don't configure or disable it, the policy will behave like it's never been set
before.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
"Default"
Back to top
GuidedSwitchEnabled
Supported versions:
Description
Allows Microsoft Edge to prompt the user to switch to the appropriate profile when Microsoft Edge
detects that a link is a personal or work link.
If you enable this policy, you'll be prompted to switch to another account if the current profile
doesn't work for the requesting link.
If you disable this policy, you won't be prompted to switch to another account when there's a
profile and link mismatch.
If this policy isn't configured, guided switch is turned on by default. A user can override this value in
the browser settings.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ImplicitSignInEnabled
Supported versions:
Description
If you have configured the BrowserSignin policy to 'Disable browser sign-in', this policy will not take
any effect.
If you enable or don't configure this setting, implicit sign-in will be enabled, Edge will attempt to
sign the user into their profile based on what and how they sign in to their OS.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
LinkedAccountEnabled
Enable the linked account feature
Supported versions:
Description
Microsoft Edge guides a user to the account management page where they can link a Microsoft
Account (MSA) to an Azure Active Directory (Azure AD) account.
If you enable or don't configure this policy, linked account information will be shown on a flyout.
When the Azure AD profile doesn't have a linked account it will show "Add account".
If you disable this policy, linked accounts will be turned off and no extra information will be shown.
Supported features:
Data Type:
Boolean
0x00000000
XML
<false/>
Back to top
OneAuthAuthenticationEnforced
Supported versions:
On Windows since 93 or later
Description
This policy allows users to decide whether to use the OneAuth library for sign-in and token fetch in
Microsoft Edge on Windows 10 RS3 and above.
If you disable or don't configure this policy, signin process will use Windows Account Manager.
Microsoft Edge would be able to use accounts you logged in to Windows, Microsoft Office, or other
Microsoft applications for login, without the needing of password. Or you can provide valid account
and password to sign in, which will be stored in Windows Account Manager for future usage. You
will be able to investigate all accounts stored in Windows Account Manager through Windows
Settings -> Accounts -> Email and accounts page.
If you enable this policy, OneAuth authentication flow will be used for account signin. The OneAuth
authentication flow has fewer dependencies and can work without Windows shell. The account you
use would not be stored in the Email and accounts page.
This policy will only take effect on Windows 10 RS3 and above. On Windows 10 below RS3,
OneAuth is used for authentication in Microsoft Edge by default.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
OnlyOnPremisesImplicitSigninEnabled
Supported versions:
If you enable this policy, only on-premises accounts will be enabled for implicit sign-in. Microsoft
Edge won't attempt to implicitly sign in to MSA or AAD accounts. Upgrade from on-premises
accounts to AAD accounts will be stopped as well.
If you disable or don't configure this policy, all accounts will be enabled for implicit sign-in.
This policy will only take effect when policy ConfigureOnPremisesAccountAutoSignIn is enabled
and set to 'SignInAndMakeDomainAccountNonRemovable'.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
SignInCtaOnNtpEnabled
Supported versions:
On Windows and macOS since 99 or later
Description
Configure this policy to show sign in click to action dialog on New tab page.
If you enable or don't configure this policy, sign in click to action dialog is shown on New tab page.
If you disable this policy, sign in click to action dialog isn't shown on the New tab page.
Supported features:
Can be mandatory: No
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WAMAuthBelowWin10RS3Enabled
Supported versions:
Description
Configure this policy to decide whether WAM is used for authentication in Microsoft Edge on
Windows 10 RS1 and RS2.
If you enable this setting, WAM will be used in the authentication flow on Windows 10 RS1 and
RS2.
If you disable or don't configure this setting, OneAuth libraries will be used instead of WAM on
Windows 10 RS1 and RS2.
Note that if this policy is enabled, then previous sign-in sessions (which used OneAuth by default)
cannot be used. Please sign out of those profiles.
This policy will only take effect on Windows 10 RS1 and RS2. On Windows 10 RS3 and above, WAM
is used for authentication in Microsoft Edge by default.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
Supported versions:
Description
Enables the Grammar Tools feature within Immersive Reader in Microsoft Edge. This helps improve
reading comprehension by splitting words into syllables and highlighting nouns, verbs, adverbs,
and adjectives.
If you enable this policy or don't configure it, the Grammar Tools option shows up within Immersive
Reader. If you disable this policy, users can't access the Grammar Tools feature within Immersive
Reader.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImmersiveReaderPictureDictionaryEnabled
Supported versions:
Description
Enables the Picture Dictionary feature within Immersive Reader in Microsoft Edge. This feature helps
in reading comprehension by letting a user to click on any single word and see an illustration
related to the meaning.
If you enable this policy or don't configure it, the Picture Dictionary option shows up within
Immersive Reader. If you disable this policy, users can't access the Picture Dictionary feature within
Immersive Reader.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
Configure address bar editing for kiosk mode public browsing experience
Supported versions:
Description
This policy only applies to Microsoft Edge kiosk mode while using the public browsing experience.
If you enable or don't configure this policy, users can change the URL in the address bar.
If you disable this policy, it prevents users from changing the URL in the address bar.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
KioskDeleteDownloadsOnExit
Supported versions:
On Windows since 87 or later
Description
This policy only applies to Microsoft Edge kiosk mode.
If you enable this policy, files downloaded as part of the kiosk session are deleted each time
Microsoft Edge closes.
If you disable this policy or don't configure it, files downloaded as part of the kiosk session are not
deleted when Microsoft Edge closes.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
Back to top
KioskSwipeGesturesEnabled
Supported versions:
Description
If you enable this policy or don't configure it, swipe gestures will behave as expected.
If you disable this policy, the user will not be able to use swipe gestures (for example navigate
forwards and backwards, refresh page).
Data Type:
Boolean
Example value:
0x00000001
Back to top
Manageability policies
Back to top
EdgeManagementEnabled
Description
Microsoft Edge management service in Microsoft 365 Admin Center lets you set policy and manage
users through a Microsoft Edge focused cloud-based management experience. This policy lets you
control whether Microsoft Edge management is enabled.
If you enable or don't configure this policy, Microsoft Edge will attempt to connect to the Microsoft
Edge management service to download and apply policy assigned to the Azure AD account of the
user.
If you disable this policy, Microsoft Edge will not attempt to connect to the Microsoft Edge
management service.
Supported features:
Data Type:
Boolean
0x00000001
Back to top
EdgeManagementEnrollmentToken
Supported versions:
Description
Microsoft Edge management service in Microsoft 365 Admin Center lets you set policy and manage
users through a Microsoft Edge focused cloud-based management experience. This policy lets you
specify an enrollment token that's used to register with Microsoft Edge management service and
deploy the associated policies. The user must be signed into Microsoft Edge with a valid work or
school account otherwise Microsoft Edge will not download the policy.
If you enable this policy, Microsoft Edge will attempt to use the specified enrollment token to
register with the Microsoft Edge management service and download the published policy.
If you disable or don't configure this policy, Microsoft Edge will not attempt to connect to the
Microsoft Edge management service.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"RgAAAACBbzoQDmUrRfq3WeKUoFeEBwBOqK2QPYsBT5V3lQFoKND-AAAAAAEVAAAOqK2QPYvBT5V4lQFoKMD-
AAADTXvzAAAA0"
Back to top
EdgeManagementExtensionsFeedbackEnabled
Supported versions:
On Windows and macOS since 115 or later
Description
This setting controls whether Microsoft Edge sends data about blocked extensions to the Microsoft
Edge management service.
The 'EdgeManagementEnabled' policy must also be enabled for this setting to take effect.
If you enable this policy, Microsoft Edge will send data to the Microsoft Edge service when a user
tries to install a blocked extension.
If you disable or don't configure this policy, Microsoft Edge won't send any data to the Microsoft
Edge service about blocked extensions.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
MAMEnabled
Supported versions:
Description
Allows the Microsoft Edge browser to retrieve policies from the Intune application management
services and apply them to users' profiles.
If you enable this policy or don't configure it, Mobile App Management (MAM) Policies can be
applied.
If you disable this policy, Microsoft Edge will not communicate with Intune to request MAM
Policies.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
NativeMessagingAllowlist
Supported versions:
On Windows and macOS since 77 or later
Description
Setting the policy specifies which native messaging hosts aren't subject to the deny list. A deny list
value of * means all native messaging hosts are denied unless they're explicitly allowed.
All native messaging hosts are allowed by default. However, if a native messaging host is denied by
policy, the admin can use the allow list to change that policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist\1 =
"com.native.messaging.host.name1"
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist\2 =
"com.native.messaging.host.name2"
XML
<array>
<string>com.native.messaging.host.name1</string>
<string>com.native.messaging.host.name2</string>
</array>
Back to top
NativeMessagingBlocklist
Supported versions:
On Windows and macOS since 77 or later
Description
Setting this policy specifies which native messaging hosts shouldn't be loaded. A deny list value of *
means all native messaging hosts are denied unless they're explicitly allowed.
If you leave this policy unset , Microsoft Edge loads all installed native messaging hosts.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingBlocklist\1 =
"com.native.messaging.host.name1"
SOFTWARE\Policies\Microsoft\Edge\NativeMessagingBlocklist\2 =
"com.native.messaging.host.name2"
XML
<array>
<string>com.native.messaging.host.name1</string>
<string>com.native.messaging.host.name2</string>
</array>
Back to top
NativeMessagingUserLevelHosts
Supported versions:
Description
If you set this policy to Enabled or leave it unset, Microsoft Edge can use native messaging hosts
installed at the user level.
If you set this policy to Disabled, Microsoft Edge can only use these hosts if they're installed at the
system level.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
Password manager and protection policies
Back to top
PasswordDeleteOnBrowserCloseEnabled
Supported versions:
Description
When this policy is enabled, the passwords saved with Edge Password Manager are exempted from
deletion when the browser closes. This policy is only effective when.
The 'Passwords' toggle is configured in Settings/Privacy and services/Clear browsing data on close
or.
If you enable this policy, passwords won't be cleared when the browser closes.
If you disable or don't configure this policy, the user's personal configuration is used.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PasswordGeneratorEnabled
Supported versions:
On Windows and macOS since 93 or later
Description
Configures the Password Generator Settings toggle that enables/disables the feature for users.
If you enable or don't configure this policy, then Password Generator will offer users a strong and
unique password suggestion (via a dropdown) on Signup and Change Password pages.
If you disable this policy, users will no longer see strong password suggestions on Signup or
Change Password pages.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
PasswordManagerBlocklist
Configure the list of domains for which the password manager UI (Save and
Fill) will be disabled
Supported versions:
On Windows and macOS since 99 or later
Description
Configure the list of domains where Microsoft Edge should disable the password manager. This
means that Save and Fill workflows will be disabled, ensuring that passwords for those websites
can't be saved or auto filled into web forms.
If you enable this policy, the password manager will be disabled for the specified set of domains.
If you disable or don't configure this policy, password manager will work as usual for all domains.
If you configure this policy, that is, add domains for which password manager is blocked, users
can't change or override the behavior in Microsoft Edge. In addition, users can't use password
manager for those URLs.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PasswordManagerBlocklist\1 = "https://contoso.com/"
SOFTWARE\Policies\Microsoft\Edge\PasswordManagerBlocklist\2 =
"https://login.contoso.com"
XML
<array>
<string>https://contoso.com/</string>
<string>https://login.contoso.com</string>
</array>
Back to top
PasswordManagerEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Enable Microsoft Edge to save user passwords. The next time a user visits a site with a saved
password, Microsoft Edge will enter the password automatically.
If you enable or don't configure this policy, users can save and add their passwords in Microsoft
Edge.
If you disable this policy, users can't save and add new passwords, but they can still use previously
saved passwords.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PasswordManagerRestrictLengthEnabled
Restrict the length of passwords that can be saved in the Password Manager
Supported versions:
On Windows and macOS since 104 or later
Description
Make Microsoft Edge restrict the length of usernames and/or passwords that can be saved in the
Password Manager.
If you enable this policy, Microsoft Edge will not let the user save credentials with usernames
and/or passwords longer than 256 characters.
If you disable or don't configure this policy, Microsoft Edge will let the user save credentials with
arbitrarily long usernames and/or passwords.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
PasswordMonitorAllowed
Supported versions:
If you enable this policy and a user consents to enabling the policy, the user will get alerted if any
of their passwords stored in Microsoft Edge are found to be unsafe. Microsoft Edge will show an
alert and this information will also be available in Settings > Passwords > Password Monitor.
If you disable this policy, users will not be asked for permission to enable this feature. Their
passwords will not be scanned and they will not be alerted either.
If you enable or don't configure the policy, users can turn this feature on or off.
To learn more about how Microsoft Edge finds unsafe passwords see
https://go.microsoft.com/fwlink/?linkid=2133833
Additional guidance:
This policy can be set as both Recommended as well as Mandatory, however with an important
callout.
Mandatory enabled: Given that individual user consent is a pre-condition to enabling this feature
for a given user, this policy does not have a Mandatory enabled setting. If the policy is set to
Mandatory enabled, the UI in Settings will not change and the following error message will be
displayed in edge://policy
Example Error state message: "This policy value is ignored because Password Monitor requires the
consent of the individual user for it to be turned on. You can ask users in your Organization to go
to Settings > Profile > Password and turn on the feature."
Recommended enabled: If the policy is set to Recommended enabled, the UI in Settings will remain
in 'Off' state, but a briefcase icon will be made visible next to it with this description displayed on
hover - "Your organization recommends a specific value for this setting and you have chosen a
different value"
Mandatory and Recommended disabled: Both these states will work the normal way, with the usual
captions being shown to users.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
PasswordProtectionChangePasswordURL
Supported versions:
On Windows and macOS since 77 or later
Description
Configures the change password URL (HTTP and HTTPS schemes only).
Password protection service will send users to this URL to change their password after seeing a
warning in the browser.
If you enable this policy, then password protection service sends users to this URL to change their
password.
If you disable this policy or don't configure it, then password protection service will not redirect
users to a change password URL.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
String
"https://contoso.com/change_password.html"
XML
<string>https://contoso.com/change_password.html</string>
Back to top
PasswordProtectionLoginURLs
Configure the list of enterprise login URLs where the password protection
service should capture salted hashes of a password
Supported versions:
Description
Configure the list of enterprise login URLs (HTTP and HTTPS schemes only) where Microsoft Edge
should capture the salted hashes of passwords and use it for password reuse detection.
If you enable this policy, the password protection service captures fingerprints of passwords on the
defined URLs.
If you disable this policy or don't configure it, no password fingerprints are captured.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PasswordProtectionLoginURLs\1 =
"https://contoso.com/login.html"
SOFTWARE\Policies\Microsoft\Edge\PasswordProtectionLoginURLs\2 =
"https://login.contoso.com"
XML
<array>
<string>https://contoso.com/login.html</string>
<string>https://login.contoso.com</string>
</array>
Back to top
PasswordProtectionWarningTrigger
Supported versions:
On Windows and macOS since 77 or later
Description
Allows you to control when to trigger password protection warning. Password protection alerts
users when they reuse their protected password on potentially suspicious sites.
If you disable or don't configure this policy, then the warning trigger is not shown.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
PasswordRevealEnabled
Supported versions:
On Windows and macOS since 87 or later
Description
Lets you configure the default display of the browser password reveal button for password input
fields on websites.
If you enable or don't configure this policy, the browser user setting defaults to displaying the
password reveal button.
If you disable this policy, the browser user setting won't display the password reveal button.
For accessibility, users can change the browser setting from the default policy.
This policy only affects the browser password reveal button, it doesn't affect websites' custom
reveal buttons.
Supported features:
Can be mandatory: No
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
PrimaryPasswordSetting
Configures a setting that asks users to enter their device password while
using password autofill
Supported versions:
Description
The feature helps users add an additional layer of privacy to their online accounts by requiring
device authentication (as a way of confirming the user's identity) before the saved password is
auto-filled into a web form. This ensures that non-authorized persons can't use saved passwords
for autofill.
This group policy configures the radio button selector that enables this feature for users. It also has
a frequency control where users can specify how often they would like to be prompted for
authentication.
If you set this policy to 'Automatically', disable this policy, or don't configure this policy, autofill will
not have any authentication flow.
If you set this policy to 'WithDevicePassword', users will have to enter their device password (or
preferred mode of authentication under Windows) to prove their identity before their password is
auto filled. Authentication modes include Windows Hello, PIN, face recognition, or fingerprint. The
frequency for authentication prompt will be set to 'Always' by default. However, users can change it
to the other option, which is 'Once every browsing session'.
If you set this policy to 'WithCustomPrimaryPassword', users will be asked to create their custom
password and then to be redirected to Settings. After the custom password is set, users can
authenticate themselves using the custom password and their passwords will get auto-filled after
successful authentication. The frequency for authentication prompt will be set to 'Always' by
default. However, users can change it to the other option, which is 'Once every browsing session'.
If you set this policy to 'AutofillOff', saved passwords will no longer be suggested for autofill.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
Performance policies
Back to top
EfficiencyMode
Supported versions:
On Windows and macOS since 96 or later
Description
This policy setting lets you configure when efficiency mode will become active. By default, efficiency
mode is set to 'BalancedSavings'. On devices with no battery, the default is for efficiency mode to
never become active.
Individual sites may be blocked from participating in efficiency mode by configuring the policy
SleepingTabsBlockedForUrls.
Set this policy to 'AlwaysActive' and efficiency mode will always be active.
Set this policy to 'NeverActive' and efficiency mode will never become active.
Set this policy to 'ActiveWhenUnplugged' and efficiency mode will become active when the device
is unplugged.
Set this policy to 'ActiveWhenUnpluggedBatteryLow' and efficiency mode will become active when
the device is unplugged and the battery is low.
Set this policy to 'BalancedSavings' and when the device is unplugged, efficiency mode will take
moderate steps to save battery. When the device is unplugged and the battery is low, efficiency
mode will take additional steps to save battery.
Set this policy to 'MaximumSavings' and when the device is unplugged or unplugged and the
battery is low, efficiency mode takes additional steps to save battery.
If the device does not have a battery, efficiency mode will never become active in any mode other
than 'AlwaysActive' unless the setting or EfficiencyModeEnabled policy is enabled.
BalancedSavings (4) = When the device is unplugged, efficiency mode takes moderate steps
to save battery. When the device is unplugged and the battery is low, efficiency mode takes
additional steps to save battery.
MaximumSavings (5) = When the device is unplugged or unplugged and the battery is low,
efficiency mode takes additional steps to save battery.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000003
XML
<integer>3</integer>
Back to top
EfficiencyModeEnabled
Supported versions:
On Windows and macOS since 106 or later
Description
Enables efficiency mode which helps extend battery life by saving computer resources. By default,
efficiency mode is enabled for devices with a battery and disabled otherwise.
If you enable this policy, efficiency mode will become active according to the setting chosen by the
user. You can configure the efficiency mode setting using the EfficiencyMode policy. If the device
does not have a battery, efficiency mode will always be active.
If you disable this policy, efficiency mode will never become active. The EfficiencyMode and
EfficiencyModeOnPowerEnabled policies will have no effect.
If you don't configure this policy, efficiency mode will be enabled for devices with a battery and
disabled otherwise. Users can choose the efficiency mode option they want in
edge://settings/system.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EfficiencyModeOnPowerEnabled
Supported versions:
Description
Allows efficiency mode to become active when the device is connected to a power source. On
devices with no battery, this policy has no effect.
If you enable this policy, efficiency mode will become active when the device is connected to a
power source.
If you disable or don't configure this policy, efficiency mode will never become active when the
device is connected to a power source.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PerformanceDetectorEnabled
Supported versions:
Description
The performance detector detects tab performance issues and recommends actions to fix the
performance issues.
If you enable or don't configure this policy, performance detector is turned on.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PinBrowserEssentialsToolbarButton
Supported versions:
Description
This policy lets you configure whether to pin the Browser essentials button on the toolbar.
When the button isn't pinned, it will only appear when there's an alert. An example of this kind of
alert is the performance detector alert that indicates the browser is using high CPU or memory.
If you enable or don't configure this policy, the Browser essentials button will be pinned on the
toolbar.
If you disable this policy, the Browser essentials button won't be pinned on the toolbar.
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
StartupBoostEnabled
Supported versions:
On Windows since 88 or later
Description
Allows Microsoft Edge processes to start at OS sign-in and restart in background after the last
browser window is closed.
If Microsoft Edge is running in background mode, the browser might not close when the last
window is closed and the browser won't be restarted in background when the window closes. See
the BackgroundModeEnabled policy for information about what happens after configuring
Microsoft Edge background mode behavior.
If you don't configure this policy, startup boost may initially be off or on. The user can configure its
behavior in edge://settings/system.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
SameOriginTabCaptureAllowedByOrigins
Supported versions:
Description
Setting the policy lets you set a list of URL patterns that can capture tabs with their same Origin.
Leaving the policy unset means that sites will not be considered for an override at this scope of
capture.
If a site matches a URL pattern in this policy, the following policies will not be considered:
TabCaptureAllowedByOrigins, WindowCaptureAllowedByOrigins, ScreenCaptureAllowedByOrigins,
ScreenCaptureAllowed.
For detailed information on valid url patterns, please see https://go.microsoft.com/fwlink/?
linkid=2095322 . This policy only matches based on origin, so any path in the URL pattern is
ignored.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\SameOriginTabCaptureAllowedByOrigins
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\SameOriginTabCaptureAllowedByOrigins\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\SameOriginTabCaptureAllowedByOrigins\2 = "
[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
ScreenCaptureAllowedByOrigins
Supported versions:
Description
Setting the policy lets you set a list of URL patterns that can use Desktop, Window, and Tab
Capture.
Leaving the policy unset means that sites will not be considered for an override at this scope of
Capture.
This policy is not considered if a site matches a URL pattern in any of the following policies:
WindowCaptureAllowedByOrigins, TabCaptureAllowedByOrigins,
SameOriginTabCaptureAllowedByOrigins.
If a site matches a URL pattern in this policy, the ScreenCaptureAllowed will not be considered.
Supported features:
Example value:
SOFTWARE\Policies\Microsoft\Edge\ScreenCaptureAllowedByOrigins\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\ScreenCaptureAllowedByOrigins\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
TabCaptureAllowedByOrigins
Allow Tab capture by these origins
Supported versions:
Description
Setting the policy lets you set a list of URL patterns that can use Tab Capture.
Leaving the policy unset means that sites will not be considered for an override at this scope of
capture.
If a site matches a URL pattern in this policy, the following policies will not be considered:
WindowCaptureAllowedByOrigins, ScreenCaptureAllowedByOrigins, ScreenCaptureAllowed.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\TabCaptureAllowedByOrigins\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\TabCaptureAllowedByOrigins\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
WindowCaptureAllowedByOrigins
Supported versions:
Description
Setting the policy lets you set a list of URL patterns that can use Window and Tab Capture.
Leaving the policy unset means that sites will not be considered for an override at this scope of
Capture.
This policy is not considered if a site matches a URL pattern in any of the following policies:
TabCaptureAllowedByOrigins, SameOriginTabCaptureAllowedByOrigins.
If a site matches a URL pattern in this policy, the following policies will not be considered:
ScreenCaptureAllowedByOrigins, ScreenCaptureAllowed.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WindowCaptureAllowedByOrigins\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\WindowCaptureAllowedByOrigins\2 = "[*.]example.edu"
Mac information and settings
Preference Key Name: WindowCaptureAllowedByOrigins
Example value:
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
Printing policies
Back to top
DefaultPrinterSelection
Supported versions:
On Windows and macOS since 77 or later
Description
Overrides Microsoft Edge default printer selection rules. This policy determines the rules for
selecting the default printer in Microsoft Edge, which happens the first time a user tries to print a
page.
When this policy is set, Microsoft Edge tries to find a printer that matches all of the specified
attributes and uses it as default printer. If there are multiple printers that meet the criteria, the first
printer that matches is used.
If you don't configure this policy or no matching printers are found within the timeout, the printer
defaults to the built-in PDF printer or no printer, if the PDF printer isn't available.
The value is parsed as a JSON object, conforming to the following schema: { "type": "object",
"properties": { "idPattern": { "description": "Regular expression to match printer id.", "type": "string"
}, "namePattern": { "description": "Regular expression to match printer display name.", "type":
"string" } } }
Omitting a field means all values match; for example, if you don't specify connectivity Print Preview
starts discovering all kinds of local printers. Regular expression patterns must follow the JavaScript
RegExp syntax and matches are case sensitive.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
XML
Back to top
PrintHeaderFooter
Supported versions:
Description
If you don't configure this policy, users can decide whether to print headers and footers.
If you disable this policy, users can't print headers and footers.
If you enable this policy, users always print headers and footers.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
PrintPdfAsImageDefault
Supported versions:
On Windows and macOS since 106 or later
Description
Controls if Microsoft Edge makes the Print as image option the default when printing PDFs.
If you enable this policy, Microsoft Edge will default to setting the Print as image option in the Print
Preview when printing a PDF.
If you disable or don't configure this policy, Microsoft Edge will not default to setting the Print as
image option in the Print Preview when printing a PDF.
Supported features:
Example value:
0x00000001
XML
<true/>
Back to top
PrintPostScriptMode
Supported versions:
On Windows since 96 or later
Description
Controls how Microsoft Edge prints on Microsoft Windows.
Printing to a PostScript printer on Microsoft Windows different PostScript generation methods can
affect printing performance.
If you set this policy to Default, Microsoft Edge will use a set of default options when generating
PostScript. For text in particular, text will always be rendered using Type 3 fonts.
If you set this policy to Type42, Microsoft Edge will render text using Type 42 fonts if possible. This
should increase printing speed for some PostScript printers.
If you don't configure this policy, Microsoft Edge will be in Default mode.
Supported features:
Data Type:
Integer
Example value:
0x00000001
Back to top
PrintPreviewStickySettings
Supported versions:
On Windows and macOS since 110 or later
Description
Configuring this policy sets the print preview settings as the most recent choice in Print Preview
instead of the default print preview settings.
Layout specifies if the webpage layout should be kept sticky or not in print preview settings. If we
set this to True the webpage layout uses the recent choice otherwise it will set to default value.
Size specifies if the page size should be kept sticky or not in print preview settings. If we set this to
True the page size uses the recent choice otherwise it will set to default value.
Scale Type specifies if the scaling percentage and scale type should be kept sticky or not in print
preview settings. If we set this to True the scale percentage and scale type both uses the recent
choice oherwise it will set to default value.
Margins specifies if the page margin should be kept sticky or not in print preview settings. If we set
this to True the page margins uses the recent choice otherwise it will set to default value.
If you enable this policy, the selected values will use the most recent choice in Print Preview.
If you disable or don't configure this policy, print preview settings will not be impacted.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\PrintPreviewStickySettings = {
"layout": false,
"margins": true,
"scaleType": false,
"size": true
}
XML
<key>PrintPreviewStickySettings</key>
<dict>
<key>layout</key>
<false/>
<key>margins</key>
<true/>
<key>scaleType</key>
<false/>
<key>size</key>
<true/>
</dict>
Back to top
PrintPreviewUseSystemDefaultPrinter
Supported versions:
Description
Tells Microsoft Edge to use the system default printer as the default choice in Print Preview instead
of the most recently used printer.
If you disable this policy or don't configure it, Print Preview uses the most recently used printer as
the default destination choice.
If you enable this policy, Print Preview uses the OS system default printer as the default destination
choice.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
PrintRasterizationMode
Print Rasterization Mode
Supported versions:
Description
Controls how Microsoft Edge prints on Windows.
When printing to a non-PostScript printer on Windows, sometimes print jobs need to be rasterized
to print correctly.
If you set this policy to 'Full' or don't configure it, Microsoft Edge will do full page rasterization if
necessary.
If you set this policy to 'Fast', Microsoft Edge will reduce the amount of rasterization which can help
reduce print job sizes and increase printing speed.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
Back to top
PrintRasterizePdfDpi
Supported versions:
Description
Controls print image resolution when Microsoft Edge prints PDFs with rasterization.
When printing a PDF using the Print to image option, it can be beneficial to specify a print
resolution other than a device's printer setting or the PDF default. A high resolution will significantly
increase the processing and printing time while a low resolution can lead to poor imaging quality.
If you set this policy, it allows a particular resolution to be specified for use when rasterizing PDFs
for printing.
If you set this policy to zero or don't configure it, the system default resolution will be used during
rasterization of page images.
Supported features:
Data Type:
Integer
Example value:
0x0000012c
XML
<integer>300</integer>
Back to top
PrintStickySettings
Description
Specifies whether print preview should apply last used settings for Microsoft Edge PDF and
webpages.
If you set this policy to 'EnableAll' or don't configure it, Microsoft Edge applies the last used print
preview settings for both PDF and webpages.
If you set this policy to 'DisableAll', Microsoft Edge doesn't apply the last used print preview
settings for both PDF and webpages.
If you set this policy to 'DisablePdf', Microsoft Edge doesn't apply the last used print preview
settings for PDF printing and retains it for webpages.
If you set this policy to 'DisableWebpage', Microsoft Edge doesn't apply the last used print preview
settings for webpage printing and retain it for PDF.
This policy is only available if you enable or don't configure the PrintingEnabled policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
PrinterTypeDenyList
Supported versions:
Description
The printer types on the deny list won't be discovered or have their capabilities fetched.
Placing all printer types on the deny list effectively disables printing, because there's no print
destination for documents.
If you don't configure this policy, or the printer list is empty, all printer types are discoverable.
Printer destinations include extension printers and local printers. Extension printers are also known
as print provider destinations, and include any destination that belongs to a Microsoft Edge
extension. Local printers are also known as native printing destinations, and include destinations
available to the local machine and shared network printers.
In Microsoft version 93 or later, if you set this policy to 'pdf' it also disables the 'save as Pdf' option
from the right click context menu.
In Microsoft version 103 or later, if you set this policy to 'onedrive' it also disables the 'save as Pdf
(OneDrive)' option from print preview.
pdf (pdf) = The 'Save as PDF' destination. (93 or later, also disables from context menu)
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\PrinterTypeDenyList\1 = "local"
SOFTWARE\Policies\Microsoft\Edge\PrinterTypeDenyList\2 = "privet"
XML
<array>
<string>local</string>
<string>privet</string>
</array>
Back to top
PrintingAllowedBackgroundGraphicsModes
Supported versions:
Description
Restricts background graphics printing mode. If this policy isn't set there's no restriction on printing
background graphics.
Supported features:
Data Type:
String
Example value:
"enabled"
XML
<string>enabled</string>
Back to top
PrintingBackgroundGraphicsDefault
Supported versions:
Description
Overrides the last used setting for printing background graphics. If you enable this setting,
background graphics printing is enabled. If you disable this setting, background graphics printing is
disabled.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"enabled"
XML
<string>enabled</string>
Back to top
PrintingEnabled
Enable printing
Supported versions:
Description
Enables printing in Microsoft Edge and prevents users from changing this setting.
If you enable this policy or don't configure it, users can print.
If you disable this policy, users can't print from Microsoft Edge. Printing is disabled in the wrench
menu, extensions, JavaScript applications, and so on. Users can still print from plug-ins that bypass
Microsoft Edge while printing. For example, certain Adobe Flash applications have the print option
in their context menu, which isn't covered by this policy.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
<true/>
Back to top
PrintingPaperSizeDefault
Supported versions:
On Windows and macOS since 86 or later
Description
name should contain one of the listed formats or 'custom' if required paper size is not in the list. If
'custom' value is provided custom_size property should be specified. It describes the desired height
and width in micrometers. Otherwise custom_size property shouldn't be specified. Policy that
violates these rules is ignored.
If the page size is unavailable on the printer chosen by the user this policy is ignored.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\PrintingPaperSizeDefault = {
"custom_size": {
"height": 297000,
"width": 210000
},
"name": "custom"
}
XML
<key>PrintingPaperSizeDefault</key>
<dict>
<key>custom_size</key>
<dict>
<key>height</key>
<integer>297000</integer>
<key>width</key>
<integer>210000</integer>
</dict>
<key>name</key>
<string>custom</string>
</dict>
Back to top
PrintingWebpageLayout
Supported versions:
On Windows and macOS since 93 or later
Description
If you disable or don't configure this policy, users can decide whether to print webpages in Portrait
or Landscape layout.
If you enable this policy, the selected option is set as the layout option.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
UseSystemPrintDialog
Supported versions:
On Windows and macOS since 77 or later
Description
If you enable this policy, Microsoft Edge opens the system print dialog instead of the built-in print
preview when a user prints a page.
If you don't configure or disable this policy, print commands trigger the Microsoft Edge print
preview screen.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
Private Network Request Settings policies
Back to top
InsecurePrivateNetworkRequestsAllowed
Supported versions:
On Windows and macOS since 92 or later
Description
Controls whether websites are allowed to make requests to more-private network endpoints.
When this policy is enabled, all Private Network Access checks are disabled for all origins. This may
allow attackers to perform cross-site request forgery (CSRF) attacks on private network servers.
When this policy is disabled or not configured, the default behavior for requests to more-private
network endpoints will depend on the user's personal configuration for the
BlockInsecurePrivateNetworkRequests, PrivateNetworkAccessSendPreflights, and
PrivateNetworkAccessRespectPreflightResults feature flags. These flags may be controlled by
experimentation or set via the command line.
This policy relates to the Private Network Access specification. See https://wicg.github.io/private-
network-access/ for more details.
When this policy enabled, websites are allowed to make requests to any network endpoint, subject
to other cross-origin checks.
Supported features:
Example value:
0x00000000
XML
<false/>
Back to top
InsecurePrivateNetworkRequestsAllowedForUrls
Description
List of URL patterns. Requests initiated from websites served by matching origins are not subject to
Private Network Access checks.
If this policy is not set, this policy behaves as if set to the empty list.
For origins not covered by the patterns specified here, the global default value will be used either
from the InsecurePrivateNetworkRequestsAllowed policy, if it is set, or the user's personal
configuration otherwise.
For detailed information on valid URL patterns, see Filter format for URL list-based policies.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\InsecurePrivateNetworkRequestsAllowedForUrls
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\InsecurePrivateNetworkRequestsAllowedForUrls\1 =
"http://www.example.com:8080"
SOFTWARE\Policies\Microsoft\Edge\InsecurePrivateNetworkRequestsAllowedForUrls\2 = "
[*.]example.edu"
XML
<array>
<string>http://www.example.com:8080</string>
<string>[*.]example.edu</string>
</array>
Back to top
ProxyBypassList
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
This policy is deprecated, use ProxySettings instead. It won't work in Microsoft Edge version 91.
Defines a list of hosts for which Microsoft Edge bypasses any proxy.
This policy is applied only if the ProxySettings policy isn't specified and you have selected either
fixed_servers or pac_script in the ProxyMode policy. If you selected any other mode for configuring
proxy policies, don't enable or configure this policy.
If you enable this policy, you can create a list of hosts for which Microsoft Edge doesn't use a proxy.
If you don't configure this policy, no list of hosts is created for which Microsoft Edge bypasses a
proxy. Leave this policy unconfigured if you've specified any other method for setting proxy
policies.
Supported features:
Data Type:
String
Example value:
"https://www.contoso.com, https://www.fabrikam.com"
XML
<string>https://www.contoso.com, https://www.fabrikam.com</string>
Back to top
ProxyMode
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 77 or later
Description
This policy is deprecated, use ProxySettings instead. It won't work in Microsoft Edge version 91.
If you set this policy to Enabled you can specify the proxy server Microsoft Edge uses and prevents
users from changing proxy settings. Microsoft Edge ignores all proxy-related options specified from
the command line. The policy is only applied if the ProxySettings policy isn't specified.
Other options are ignored if you choose one of the following options:
fixed_servers = Fixed proxy servers. You can specify further options with ProxyServer and
ProxyBypassList.
pac_script = A .pac proxy script. Use ProxyPacUrl to set the URL to a proxy .pac file.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"direct"
XML
<string>direct</string>
Back to top
ProxyPacUrl
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
This policy is deprecated, use ProxySettings instead. It won't work in Microsoft Edge version 91.
This policy is applied only if the ProxySettings policy isn't specified and you have selected
pac_script in the ProxyMode policy. If you selected any other mode for configuring proxy policies,
don't enable or configure this policy.
If you enable this policy, you can specify the URL for a PAC file, which defines how the browser
automatically chooses the appropriate proxy server for fetching a particular website.
If you disable or don't configure this policy, no PAC file is specified. Leave this policy unconfigured
if you've specified any other method for setting proxy policies.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"https://internal.contoso.com/example.pac"
XML
<string>https://internal.contoso.com/example.pac</string>
Back to top
ProxyServer
Configure address or URL of proxy server (deprecated)
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 77 or later
Description
This policy is deprecated, use ProxySettings instead. It won't work in Microsoft Edge version 91.
This policy is applied only if the ProxySettings policy isn't specified and you have selected
fixed_servers in the ProxyMode policy. If you selected any other mode for configuring proxy
policies, don't enable or configure this policy.
If you enable this policy, the proxy server configured by this policy will be used for all URLs.
If you disable or don't configure this policy, users can choose their own proxy settings while in this
proxy mode. Leave this policy unconfigured if you've specified any other method for setting proxy
policies.
Supported features:
Data Type:
String
Example value:
"123.123.123.123:8080"
XML
<string>123.123.123.123:8080</string>
Back to top
ProxySettings
Proxy settings
Supported versions:
Description
If you enable this policy, Microsoft Edge ignores all proxy-related options specified from the
command line.
If you don't configure this policy, users can choose their own proxy settings.
ProxyMode, which lets you specify the proxy server used by Microsoft Edge and prevents
users from changing proxy settings
ProxyPacUrl, a URL to a proxy .pac file
ProxyPacMandatory, a boolean flag which prevents the network stack from falling back to
direct connections with invalid or unavailable PAC script
ProxyServer, a URL for the proxy server
ProxyBypassList, a list of proxy hosts that Microsoft Edge bypasses
direct, a proxy is never used and all other fields are ignored.
system, the systems's proxy is used and all other fields are ignored.
auto_detect, all other fields are ignored.
fixed_servers, the ProxyServer and ProxyBypassList fields are used.
pac_script, the ProxyPacUrl, ProxyPacMandatory and ProxyBypassList fields are used.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ProxySettings = {
"ProxyBypassList":
"https://www.example1.com,https://www.example2.com,https://internalsite/",
"ProxyMode": "pac_script",
"ProxyPacMandatory": false,
"ProxyPacUrl": "https://internal.site/example.pac",
"ProxyServer": "123.123.123.123:8080"
}
SOFTWARE\Policies\Microsoft\Edge\ProxySettings = {"ProxyBypassList":
"https://www.example1.com,https://www.example2.com,https://internalsite/",
"ProxyMode": "pac_script", "ProxyPacMandatory": false, "ProxyPacUrl":
"https://internal.site/example.pac", "ProxyServer": "123.123.123.123:8080"}
XML
<key>ProxySettings</key>
<dict>
<key>ProxyBypassList</key>
<string>https://www.example1.com,https://www.example2.com,https://internalsite/</strin
g>
<key>ProxyMode</key>
<string>pac_script</string>
<key>ProxyPacMandatory</key>
<false/>
<key>ProxyPacUrl</key>
<string>https://internal.site/example.pac</string>
<key>ProxyServer</key>
<string>123.123.123.123:8080</string>
</dict>
Back to top
Sleeping tabs settings policies
Back to top
SleepingTabsBlockedForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that are not allowed to be put to sleep by sleeping
tabs. Sites in this list are also excluded from other performance optimizations like efficiency mode
and tab discard.
If the policy SleepingTabsEnabled is disabled, this list is not used and no sites will be put to sleep
automatically.
If you don't configure this policy, all sites will be eligible to be put to sleep unless the user's
personal configuration blocks them.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SleepingTabsBlockedForUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\SleepingTabsBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
SleepingTabsEnabled
Supported versions:
Description
This policy setting lets you configure whether to turn on sleeping tabs. Sleeping tabs reduces CPU,
battery, and memory usage by putting idle background tabs to sleep. Microsoft Edge uses
heuristics to avoid putting tabs to sleep that do useful work in the background, such as display
notifications, play sound, and stream video. By default, sleeping tabs is turned on.
Individual sites may be blocked from being put to sleep by configuring the policy
SleepingTabsBlockedForUrls.
If you don't configure this setting, users can choose whether to use sleeping tabs.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SleepingTabsTimeout
Supported versions:
Description
This policy setting lets you configure the timeout, in seconds, after which inactive background tabs
will be automatically put to sleep if sleeping tabs is enabled. By default, this timeout is 7,200
seconds (2 hours).
Tabs are only put to sleep automatically when the policy SleepingTabsEnabled is enabled or is not
configured and the user has enabled the sleeping tabs setting.
If you don't configure this policy, users can choose the timeout value.
Supported features:
Data Type:
Integer
Example value:
0x00000384
XML
<integer>900</integer>
Back to top
NewSmartScreenLibraryEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 107.
Supported versions:
Description
This policy doesn't work because it was only intended to be a short-term mechanism to support the
update to a new SmartScreen client.
Allows the Microsoft Edge browser to load the new SmartScreen library (libSmartScreenN) for any
SmartScreen checks on site URLs or application downloads.
If you enable or don't configure this policy, Microsoft Edge will use the new SmartScreen library
(libSmartScreenN).
If you disable this policy, Microsoft Edge will use the old SmartScreen library (libSmartScreen).
Before Microsoft Edge version 103, if you don't configure this policy, Microsoft Edge will use the
old SmartScreen library (libSmartScreen).
This policy is only available on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management. This also
includes macOS instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PreventSmartScreenPromptOverride
Supported versions:
Description
This policy setting lets you decide whether users can override the Microsoft Defender SmartScreen
warnings about potentially malicious websites.
If you enable this setting, users can't ignore Microsoft Defender SmartScreen warnings and they are
blocked from continuing to the site.
If you disable or don't configure this setting, users can ignore Microsoft Defender SmartScreen
warnings and continue to the site.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PreventSmartScreenPromptOverrideForFiles
Supported versions:
On Windows since 77 or later
On macOS since 79 or later
Description
This policy lets you determine whether users can override Microsoft Defender SmartScreen
warnings about unverified downloads.
If you enable this policy, users in your organization can't ignore Microsoft Defender SmartScreen
warnings, and they're prevented from completing the unverified downloads.
If you disable or don't configure this policy, users can ignore Microsoft Defender SmartScreen
warnings and complete unverified downloads.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
<true/>
Back to top
SmartScreenAllowListDomains
Supported versions:
Description
Configure the list of Microsoft Defender SmartScreen trusted domains. This means: Microsoft
Defender SmartScreen won't check for potentially malicious resources like phishing software and
other malware if the source URLs match these domains. The Microsoft Defender SmartScreen
download protection service won't check downloads hosted on these domains.
If you enable this policy, Microsoft Defender SmartScreen trusts these domains. If you disable or
don't set this policy, default Microsoft Defender SmartScreen protection is applied to all resources.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10/11 Pro or Enterprise instances that enrolled for device management, or
macOS instances that are that are managed via MDM or joined to a domain via MCX. Also note that
this policy does not apply if your organization has enabled Microsoft Defender for Endpoint. You
must configure your allow and block lists in Microsoft 365 Defender portal using Indicators
(Settings > Endpoints > Indicators).
Supported features:
Data Type:
List of strings
Windows information and settings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\1 = "mydomain.com"
SOFTWARE\Policies\Microsoft\Edge\SmartScreenAllowListDomains\2 = "myuniversity.edu"
XML
<array>
<string>mydomain.com</string>
<string>myuniversity.edu</string>
</array>
Back to top
SmartScreenDnsRequestsEnabled
Supported versions:
On Windows and macOS since 97 or later
Description
This policy lets you configure whether to enable DNS requests made by Microsoft Defender
SmartScreen. Note: Disabling DNS requests will prevent Microsoft Defender SmartScreen from
getting IP addresses, and potentially impact the IP-based protections provided.
If you enable or don't configure this setting, Microsoft Defender SmartScreen will make DNS
requests.
If you disable this setting, Microsoft Defender SmartScreen will not make any DNS requests.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
SmartScreenEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
This policy setting lets you configure whether to turn on Microsoft Defender SmartScreen.
Microsoft Defender SmartScreen provides warning messages to help protect your users from
potential phishing scams and malicious software. By default, Microsoft Defender SmartScreen is
turned on.
If you don't configure this setting, users can choose whether to use Microsoft Defender
SmartScreen.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SmartScreenForTrustedDownloadsEnabled
Supported versions:
On Windows since 78 or later
Description
This policy setting lets you configure whether Microsoft Defender SmartScreen checks download
reputation from a trusted source.
In Windows, the policy determines a trusted source by checking its Internet zone. If the source
comes from the local system, intranet, or trusted sites zone, then the download is considered
trusted and safe.
If you enable or don't configure this setting, Microsoft Defender SmartScreen checks the
download's reputation regardless of source.
If you disable this setting, Microsoft Defender SmartScreen doesn't check the download's
reputation when downloading from a trusted source.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
SmartScreenPuaEnabled
Supported versions:
Description
This policy setting lets you configure whether to turn on blocking for potentially unwanted apps
with Microsoft Defender SmartScreen. Potentially unwanted app blocking with Microsoft Defender
SmartScreen provides warning messages to help protect users from adware, coin miners,
bundleware, and other low-reputation apps that are hosted by websites. Potentially unwanted app
blocking with Microsoft Defender SmartScreen is turned off by default.
If you enable this setting, potentially unwanted app blocking with Microsoft Defender SmartScreen
is turned on.
If you disable this setting, potentially unwanted app blocking with Microsoft Defender SmartScreen
is turned off.
If you don't configure this setting, users can choose whether to use potentially unwanted app
blocking with Microsoft Defender SmartScreen.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
<true/>
Back to top
HomepageIsNewTabPage
Supported versions:
Description
Configures the default home page in Microsoft Edge. You can set the home page to a URL you
specify or to the new tab page.
If you enable this policy, the Home button is set to the new tab page as configured by the user or
with the policy NewTabPageLocation and the URL set with the policy HomepageLocation is not
taken into consideration.
If you disable this policy, the Home button is the set URL as configured by the user or as configured
in the policy HomepageLocation.
If you don't configure this policy, users can choose whether the set URL or the new tab page is their
home page.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain or Windows 10 Pro or Enterprise instances enrolled for device management.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
HomepageLocation
Supported versions:
On Windows and macOS since 77 or later
Description
Configures the default home page URL in Microsoft Edge.
The home page is the page opened by the Home button. The pages that open on startup are
controlled by the RestoreOnStartup policies.
You can either set a URL here or set the home page to open the new tab page 'edge://newtab'. By
default, the Home button will open the new tab page (as configured by the user or with the policy
NewTabPageLocation), and the user will be able to choose between the URL configured by this
policy and the new tab page.
If you enable this policy, users can't change their home page URL, but they can choose the behavior
for the Home button to open either the set URL or the new tab page. If you wish to enforce the
usage of the set URL you must also configure HomepageIsNewTabPage=Disabled.
If you disable or don't configure this policy, users can choose their own home page, as long as the
HomepageIsNewTabPage policy isn't enabled.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro, or Enterprise instances enrolled for device management.
Supported features:
Data Type:
String
Example value:
"https://www.contoso.com"
XML
<string>https://www.contoso.com</string>
Back to top
NewTabPageAllowedBackgroundTypes
Configure the background types allowed for the new tab page layout
Supported versions:
On Windows and macOS since 86 or later
Description
You can configure which types of background image that are allowed on the new tab page layout
in Microsoft Edge.
If you don't configure this policy, all background image types on the new tab page are enabled.
Supported features:
Data Type:
Integer
Example value:
0x00000002
<integer>2</integer>
Back to top
NewTabPageAppLauncherEnabled
Supported versions:
On Windows and macOS since 108 or later
Description
By default, the App Launcher is shown every time a user opens a new tab page.
If you enable or don't configure this policy, there is no change on the Microsoft Edge new tab page
and App Launcher is there for users.
If you disable this policy, App Launcher doesn't appear and users won't be able to launch M365
apps from Microsoft Edge new tab page via the App Launcher.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
NewTabPageCompanyLogo
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 85.
Supported versions:
Description
This policy didn't work as expected due to changes in operational requirements. Therefore it's
obsolete and should not be used.
Specifies the company logo to use on the new tab page in Microsoft Edge.
The policy should be configured as a string that expresses the logo(s) in JSON format. For example:
{ "default_logo": { "url": "https://www.contoso.com/logo.png", "hash":
"cd0aa9856147b6c5b4ff2b7dfee5da20aa38253099ef1b4a64aced233c9afe29" }, "light_logo": { "url":
"https://www.contoso.com/light_logo.png", "hash":
"517d286edb416bb2625ccfcba9de78296e90da8e32330d4c9c8275c4c1c33737" } }
You configure this policy by specifying the URL from which Microsoft Edge can download the logo
and its cryptographic hash (SHA-256), which is used to verify the integrity of the download. The
logo must be in PNG or SVG format, and its file size must not exceed 16 MB. The logo is
downloaded and cached, and it will be redownloaded whenever the URL or the hash changes. The
URL must be accessible without any authentication.
The 'default_logo' is required and will be used when there's no background image. If 'light_logo' is
provided, it will be used when the user's new tab page has a background image. We recommend a
horizontal logo with a transparent background that is left-aligned and vertically centered. The logo
should have a minimum height of 32 pixels and an aspect ratio from 1:1 to 4:1. The 'default_logo'
should have proper contrast against a white/black background while the 'light_logo' should have
proper contrast against a background image.
If you enable this policy, Microsoft Edge downloads and shows the specified logo(s) on the new tab
page. Users can't override or hide the logo(s).
If you disable or don't configure this policy, Microsoft Edge will show no company logo or a
Microsoft logo on the new tab page.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\NewTabPageCompanyLogo = {
"default_logo": {
"hash": "cd0aa9856147b6c5b4ff2b7dfee5da20aa38253099ef1b4a64aced233c9afe29",
"url": "https://www.contoso.com/logo.png"
},
"light_logo": {
"hash": "517d286edb416bb2625ccfcba9de78296e90da8e32330d4c9c8275c4c1c33737",
"url": "https://www.contoso.com/light_logo.png"
}
}
XML
<key>NewTabPageCompanyLogo</key>
<dict>
<key>default_logo</key>
<dict>
<key>hash</key>
<string>cd0aa9856147b6c5b4ff2b7dfee5da20aa38253099ef1b4a64aced233c9afe29</string>
<key>url</key>
<string>https://www.contoso.com/logo.png</string>
</dict>
<key>light_logo</key>
<dict>
<key>hash</key>
<string>517d286edb416bb2625ccfcba9de78296e90da8e32330d4c9c8275c4c1c33737</string>
<key>url</key>
<string>https://www.contoso.com/light_logo.png</string>
</dict>
</dict>
Back to top
NewTabPageContentEnabled
Supported versions:
On Windows and macOS since 91 or later
Description
If you enable or don't configure this policy, Microsoft Edge displays Microsoft News content on the
new tab page. The user can choose different display options for the content, including but not
limited to Content off, Content visible on scroll, Headings only, and Content visible. Enabling this
policy doesn't force content to be visible - the user can continue to set their own preferred content
position.
If you disable this policy, Microsoft Edge does not display Microsoft News content on the new tab
page, the Content control in the NTP settings flyout is disabled and set to 'Content off'.
This policy only applies for Microsoft Edge local user profiles, profiles signed in using a Microsoft
Account, and profiles signed in using Active Directory. To configure the Enterprise new tab page for
profiles signed in using Azure Active Directory, use the M365 admin portal.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
NewTabPageHideDefaultTopSites
Hide the default top sites from the new tab page
Supported versions:
On Windows and macOS since 77 or later
Description
Hides the default top sites from the new tab page in Microsoft Edge.
If you set this policy to true, the default top site tiles are hidden.
If you set this policy to false or don't configure it, the default top site tiles remain visible.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: NewTabPageHideDefaultTopSites
Example value:
XML
<true/>
Back to top
NewTabPageLocation
Supported versions:
On Windows and macOS since 77 or later
Description
Configures the default URL for the new tab page.
The recommended version of this policy does not currently work and functions exactly like the
mandatory version.
This policy determines the page that's opened when new tabs are created (including when new
windows are opened). It also affects the startup page if that's set to open to the new tab page.
This policy doesn't determine which page opens on startup; that's controlled by the
RestoreOnStartup policy. It also doesn't affect the home page if that's set to open to the new tab
page.
If you don't configure this policy, the default new tab page is used.
If you configure this policy and the NewTabPageSetFeedType policy, this policy has precedence.
If a blank tab is preferred, "about:blank" is the correct URL to use, not "about://blank".
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"https://www.fabrikam.com"
XML
<string>https://www.fabrikam.com</string>
Back to top
NewTabPageManagedQuickLinks
Supported versions:
Description
By default, Microsoft Edge displays quick links on the new tab page from user-added shortcuts and
top sites based on browsing history. With this policy, you can configure up to three quick link tiles
on the new tab page, expressed as a JSON object:
The 'url' field is required; 'title' and 'pinned' are optional. If 'title' is not provided, the URL is used as
the default title. If 'pinned' is not provided, the default value is false.
Microsoft Edge presents these in the order listed, from left to right, with all pinned tiles displayed
ahead of non-pinned tiles.
If the policy is set as mandatory, the 'pinned' field will be ignored and all tiles will be pinned. The
tiles can't be deleted by the user and will always appear at the front of the quick links list.
If the policy is set as recommended, pinned tiles will remain in the list but the user has the ability to
edit and delete them. Quick link tiles that aren't pinned behave like default top sites and are
pushed off the list if other websites are visited more frequently. When applying non-pinned links
via this policy to an existing browser profile, the links may not appear at all, depending on how they
rank compared to the user's browsing history.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\NewTabPageManagedQuickLinks = [
{
"pinned": true,
"title": "Contoso Portal",
"url": "https://contoso.com"
},
{
"title": "Fabrikam",
"url": "https://fabrikam.com"
}
]
XML
<key>NewTabPageManagedQuickLinks</key>
<array>
<dict>
<key>pinned</key>
<true/>
<key>title</key>
<string>Contoso Portal</string>
<key>url</key>
<string>https://contoso.com</string>
</dict>
<dict>
<key>title</key>
<string>Fabrikam</string>
<key>url</key>
<string>https://fabrikam.com</string>
</dict>
</array>
Back to top
NewTabPagePrerenderEnabled
Supported versions:
On Windows and macOS since 85 or later
Description
If you configure this policy, preloading the New tab page is enabled, and users can't change this
setting. If you don't configure this policy, preloading is enabled and a user can change this setting.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
NewTabPageQuickLinksEnabled
Supported versions:
Description
If you enable or don't configure this policy, Microsoft Edge displays quick links on the new tab
page, and the user can interact with the control, turning quick links on and off. Enabling this policy
does not force quick links to be visible - the user can continue to turn quick links on and off.
If you disable this policy, Microsoft Edge hides quick links on the new tab page and disables the
quick links control in the NTP settings flyout.
This policy only applies for Microsoft Edge local user profiles, profiles signed in using a Microsoft
Account, and profiles signed in using Active Directory. To configure the Enterprise new tab page for
profiles signed in using Azure Active Directory, use the M365 admin portal.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
NewTabPageSetFeedType
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 92.
Supported versions:
Description
This policy is obsolete because the new version of the enterprise new tab page no longer requires
choosing between different content types. Instead, the content that is presented to the user can be
controlled via the Microsoft 365 admin center. To get to the Microsoft 365 admin center, sign in at
https://admin.microsoft.com with your admin account.
Lets you choose either the Microsoft News or Office 365 feed experience for the new tab page.
When you set this policy to 'News', users will see the Microsoft News feed experience on the new
tab page.
When you set this policy to 'Office', users with an Azure Active Directory browser sign-in will see
the Office 365 feed experience on the new tab page.
Users with an Azure Active Directory browser sign-in are offered the Office 365 new tab page
feed experience, as well as the standard new tab page feed experience.
Users without an Azure Active Directory browser sign-in will see the standard new tab page
experience.
If you configure this policy and the NewTabPageLocation policy, NewTabPageLocation has
precedence.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
RestoreOnStartup
Supported versions:
On Windows and macOS since 77 or later
Description
Specify how Microsoft Edge behaves when it starts.
If you want to reopen URLs that were open the last time Microsoft Edge closed, choose
'RestoreOnStartupIsLastSession'. The browsing session will be restored as it was. Note that this
option disables some settings that rely on sessions or that perform actions on exit (such as Clear
browsing data on exit or session-only cookies).
Disabling this setting is equivalent to leaving it not configured. Users will be able to change it in
Microsoft Edge.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
Integer
Example value:
0x00000004
XML
<integer>4</integer>
Back to top
RestoreOnStartupURLs
Supported versions:
On Windows and macOS since 77 or later
Description
Specify a list of websites to open automatically when the browser starts. If you don't configure this
policy, no site is opened on startup.
This policy only works if you also set the RestoreOnStartup policy to 'Open a list of URLs' (4).
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\RestoreOnStartupURLs\1 = "https://contoso.com"
SOFTWARE\Policies\Microsoft\Edge\RestoreOnStartupURLs\2 = "https://www.fabrikam.com"
XML
<array>
<string>https://contoso.com</string>
<string>https://www.fabrikam.com</string>
</array>
Back to top
RestoreOnStartupUserURLsEnabled
Allow users to add and remove their own sites during startup when the
RestoreOnStartupURLs policy is configured
Supported versions:
If you disable or don't configure this policy, there is no change to how the RestoreOnStartup and
RestoreOnStartupURLs policies work.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShowHomeButton
Supported versions:
On Windows and macOS since 77 or later
Description
Shows the Home button on Microsoft Edge's toolbar.
Enable this policy to always show the Home button. Disable it to never show the button.
If you don't configure the policy, users can choose whether to show the home button.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
TyposquattingCheckerEnabled
Supported versions:
On Windows and macOS since 96 or later
Description
This policy setting lets you configure whether to turn on Edge TyposquattingChecker. Edge
TyposquattingChecker provides warning messages to help protect your users from potential
typosquatting sites. By default, Edge TyposquattingChecker is turned on.
If you don't configure this policy, Edge TyposquattingChecker is turned on but users can choose
whether to use Edge TyposquattingChecker.
Supported features:
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
Additional policies
Back to top
AADWebSiteSSOUsingThisProfileEnabled
Single sign-on for work or school sites using this profile enabled
Supported versions:
On Windows and macOS since 92 or later
Description
'Allow single sign-on for work or school sites using this profile' option allows non-AAD profiles to
be able to use single sign-on for work or school sites using work or school credentials present on
the machine. This option shows up for end-users as a toggle in Settings -> Profiles -> Profile
Preferences for non-AAD profiles only.
If you enable or disable this policy, 'Intelligent enablement of Single sign-on (SSO) for all Windows
Azure Active Directory (Azure AD) accounts for users with a single non-Azure AD Microsoft Edge
profile' will be turned off.
If you don't configure this policy, users can control whether to use SSO using other credentials
present on the machine in edge://settings/profiles/multiProfileSettings.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AccessibilityImageLabelsEnabled
Supported versions:
Description
Lets screen reader users get descriptions of unlabeled images on the web.
If you enable or don't configure this policy, users have the option of using an anonymous Microsoft
service. This service provides automatic descriptions for unlabeled images users encounter on the
web when they're using a screen reader.
If you disable this policy, users can't enable the Get Image Descriptions from Microsoft feature.
When this feature is enabled, the content of images that need a generated description is sent to
Microsoft servers to generate a description.
No cookies or other user data is sent to Microsoft, and Microsoft doesn't save or log any image
content.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AddressBarEditingEnabled
Supported versions:
Description
If you enable or don't configure this policy, users can change the URL in the address bar.
If you disable this policy, it prevents users from changing the URL in the address bar.
Note: This policy doesn't prevent the browser from navigating to any URL. Users can still navigate
to any URL by using the search option in the default New Tab Page, or using any link that leads to a
web search engine. To ensure that users can only go to sites you expect, consider configuring the
following policies in addition to this policy:
NewTabPageLocation
HomepageLocation
HomepageIsNewTabPage
URLBlocklist and URLAllowlist to scope the pages that browser can navigate to.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AddressBarMicrosoftSearchInBingProviderEnabled
Supported versions:
On Windows and macOS since 81 or later
Description
Enables the display of relevant Microsoft Search in Bing suggestions in the address bar's suggestion
list when the user types a search string in the address bar. If you enable or don't configure this
policy, users can see internal results powered by Microsoft Search in Bing in the Microsoft Edge
address bar suggestion list. To see the Microsoft Search in Bing results, the user must be signed
into Microsoft Edge with their Azure AD account for that organization. If you disable this policy,
users can't see internal results in the Microsoft Edge address bar suggestion list. Starting with
Microsoft Edge version 89, Microsoft Search in Bing suggestions will be available even if Bing isn't
the user's default search provider.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AdsSettingForIntrusiveAdsSites
Supported versions:
On Windows and macOS since 78 or later
Description
Controls whether ads are blocked on sites with intrusive ads.
BlockAds (2) = Block ads on sites with intrusive ads. (Default value)
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
AdsTransparencyEnabled
Supported versions:
Description
Lets you decide whether the ads transparency feature is enabled. This behavior only applies to the
"balanced" mode of tracking prevention, and does not impact "basic" or "strict" modes. Your users'
tracking prevention level can be configured using the TrackingPrevention policy.
AdsTransparencyEnabled will only have an effect if TrackingPrevention is set to
TrackingPreventionBalanced or is not configured.
If you enable or don't configure this policy, transparency metadata provided by ads will be available
to the user when the feature is active.
When the feature is enabled, Tracking Prevention will enable exceptions for the associated ad
providers that have met Microsoft's privacy standards.
If you disable this policy, Tracking Prevention will not adjust its behavior even when transparency
metadata is provided by ads.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AllowDeletingBrowserHistory
Supported versions:
On Windows and macOS since 77 or later
Description
Enables deleting browser history and download history and prevents users from changing this
setting.
Note that even with this policy is disabled, the browsing and download history aren't guaranteed to
be retained: users can edit or delete the history database files directly, and the browser itself may
remove (based on expiration period) or archive any or all history items at any time.
If you enable this policy or don't configure it, users can delete the browsing and download history.
If you disable this policy, users can't delete browsing and download history. Disabling this policy
will disable history sync and open tab sync.
If you enable this policy, don't enable the ClearBrowsingDataOnExit policy, because they both deal
with deleting data. If you enable both, the ClearBrowsingDataOnExit policy takes precedence and
deletes all data when Microsoft Edge closes, regardless of how this policy is configured.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AllowFileSelectionDialogs
Supported versions:
Description
Allow access to local files by letting Microsoft Edge display file selection dialogs.
If you enable or don't configure this policy, users can open file selection dialogs as normal.
If you disable this policy, whenever the user performs an action that triggers a file selection dialog
(like importing favorites, uploading files, or saving links), a message is displayed instead, and the
user is assumed to have clicked Cancel on the file selection dialog.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AllowGamesMenu
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
This policy is deprecated because it can be managed using the HubsSidebarEnabled policy.
If you enable or don't configure this policy, users can access the games menu.
If you disable this policy, users won't be able to access the games menu.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AllowPopupsDuringPageUnload
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 87.
Supported versions:
On Windows and macOS since 78, until 87
Description
This policy allows an admin to specify that a page can show popups during its unloading.
When the policy is set to enabled, pages are allowed to show popups while they're being unloaded.
When the policy is set to disabled or unset, pages aren't allowed to show popups while they're
being unloaded. This is as per the spec: (https://html.spec.whatwg.org/#apis-for-creating-and-
navigating-browsing-contexts-by-name ).
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AllowSurfGame
Supported versions:
On Windows and macOS since 83 or later
Description
If you disable this policy, users won't be able to play the surf game when the device is offline or if
the user navigates to edge://surf.
If you enable or don't configure this policy, users can play the surf game.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AllowSyncXHRInPageDismissal
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 99.
Supported versions:
On Windows and macOS since 79, until 99
Description
This policy is obsolete because it was only intended to be a short-term mechanism to give
enterprises more time to update their web content if and when it was found to be incompatible
with the change to disallow synchronous XHR requests during page dismissal. It doesn't work in
Microsoft Edge after version 99.
This policy lets you specify that a page can send synchronous XHR requests during page dismissal.
If you enable this policy, pages can send synchronous XHR requests during page dismissal.
If you disable this policy or don't configure this policy, pages aren't allowed to send synchronous
XHR requests during page dismissal.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AllowSystemNotifications
Supported versions:
On Windows since 117 or later
Description
Lets you use system notifications instead of Microsoft Edge's embedded Message Center on
Windows and Linux.
If set to True or not set, Microsoft Edge is allowed to use system notifications.
If set to False, Microsoft Edge will not use system notifications. Microsoft Edge's embedded
Message Center will be used as a fallback.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Back to top
AllowTokenBindingForUrls
Configure the list of sites for which Microsoft Edge will attempt to establish
a Token Binding with
Supported versions:
On Windows since 83 or later
Description
Configure the list of URL patterns for sites that the browser will attempt to perform the Token
Binding protocol with. For the domains on this list, the browser will send the Token Binding
ClientHello in the TLS handshake (See https://tools.ietf.org/html/rfc8472 ). If the server responds
with a valid ServerHello response, the browser will create and send Token Binding messages on
subsequent https requests. See https://tools.ietf.org/html/rfc8471 for more info.
This policy is only available on Windows 10 devices with Virtual Secure Mode capability.
Starting in Microsoft Edge 86, this policy no longer supports dynamic refresh.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls\1 = "mydomain.com"
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls\2 = "[*.]mydomain2.com"
SOFTWARE\Policies\Microsoft\Edge\AllowTokenBindingForUrls\3 = "[*.].mydomain2.com"
Back to top
AllowTrackingForUrls
Supported versions:
Description
Configure the list of URL patterns that are excluded from tracking prevention.
If you configure this policy, the list of configured URL patterns is excluded from tracking prevention.
If you don't configure this policy, the global default value from the "Block tracking of users' web-
browsing activity" policy (if set) or the user's personal configuration is used for all sites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AllowTrackingForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\AllowTrackingForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
AllowedDomainsForApps
Supported versions:
On Windows and macOS since 104 or later
Description
Setting the policy on Microsoft Edge turns on the restricted sign-in feature in Google Workspace
and prevents users from changing this setting. Users can only access Google tools using accounts
from the specified domains. To allow gmail or googlemail accounts, add consumer_accounts to the
list of domains. This policy is based on the Chrome policy of the same name.
If you don't provide a domain name or leave this policy unset, users can access Google Workspace
with any account.
Note: This policy causes the X-GoogApps-Allowed-Domains header to be appended to all HTTP
and HTTPS requests to all google.com domains, as described in https://go.microsoft.com/fwlink/?
linkid=2197973 .
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"example.com"
XML
<string>example.com</string>
Back to top
AlternateErrorPagesEnabled
Supported versions:
Description
Allow Microsoft Edge to issue a connection to a web service to generate URL and search
suggestions for connectivity issues such as DNS errors.
If you enable this policy, a web service is used to generate url and search suggestions for network
errors.
If you disable this policy, no calls to the web service are made and a standard error page is shown.
If you don't configure this policy, Microsoft Edge respects the user preference that's set under
Services at edge://settings/privacy. Specifically, there's a Suggest similar pages when a webpage
can't be found toggle, which the user can switch on or off. Note that if you have enable this policy
(AlternateErrorPagesEnabled), the Suggest similar pages when a webpage can't be found setting is
turned on, but the user can't change the setting by using the toggle. If you disable this policy, the
Suggest similar pages when a webpage can't be found setting is turned off, and the user can't
change the setting by using the toggle.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AlwaysOpenPdfExternally
Always open PDF files externally
Supported versions:
Description
Disables the internal PDF viewer in Microsoft Edge.
If you enable this policy Microsoft Edge treats PDF files as downloads and lets users open them
with the default application.
If Microsoft Edge is the default PDF reader, PDF files aren't downloaded and will continue to open
in Microsoft Edge.
If you don't configure this policy or disable it, Microsoft Edge will open PDF files (unless the user
disables it).
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AmbientAuthenticationInPrivateModesEnabled
Supported versions:
On Windows and macOS since 81 or later
Description
Configure this policy to allow/disallow ambient authentication for InPrivate and Guest profiles in
Microsoft Edge.
Ambient Authentication is http authentication with default credentials when explicit credentials
aren't provided via NTLM/Kerberos/Negotiate challenge/response schemes.
If you set the policy to 'RegularOnly', it allows ambient authentication for Regular sessions only.
InPrivate and Guest sessions won't be allowed to ambiently authenticate.
If you set the policy to 'InPrivateAndRegular', it allows ambient authentication for InPrivate and
Regular sessions. Guest sessions won't be allowed to ambiently authenticate.
If you set the policy to 'GuestAndRegular', it allows ambient authentication for Guest and Regular
sessions. InPrivate sessions won't be allowed to ambiently authenticate
If you set the policy to 'All', it allows ambient authentication for all sessions.
Note that ambient authentication is always allowed on regular profiles.
In Microsoft Edge version 81 and later, if the policy is left not set, ambient authentication will be
enabled in regular sessions only.
All (3) = Enable ambient authentication in regular, InPrivate and guest sessions
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
AppCacheForceEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 96.
Supported versions:
On Windows and macOS since 84, until 96
Description
Support for AppCache and this policy was removed from Microsoft Edge starting in version 97.
If you set this policy to true, the AppCache is enabled, even when AppCache in Microsoft Edge is
not available by default.
If you set this policy to false, or don't set it, AppCache will follow Microsoft Edge's defaults.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ApplicationLocaleValue
Supported versions:
On Windows since 77 or later
Description
Configures the application locale in Microsoft Edge and prevents users from changing the locale.
If you enable this policy, Microsoft Edge uses the specified locale. If the configured locale isn't
supported, 'en-US' is used instead.
If you disable or don't configure this setting, Microsoft Edge uses either the user-specified
preferred locale (if configured) or the fallback locale 'en-US'.
Supported features:
Data Type:
String
Example value:
"en"
Back to top
AskBeforeCloseEnabled
Get user confirmation before closing a browser window with multiple tabs
Supported versions:
On Windows and macOS since 104 or later
Description
This policy lets you configure whether users see a confirmation dialog before closing a browser
window with multiple tabs. This dialog asks users to confirm that the browser window can be
closed.
If you enable this policy, users will be presented with a confirmation dialog when closing a browser
window with multiple tabs.
If you disable or don't configure this policy, a browser window with multiple tabs will close
immediately without user confirmation.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AudioCaptureAllowed
Supported versions:
Description
Allows you to set whether a user is prompted to grant a website access to their audio capture
device. This policy applies to all URLs except for those configured in the AudioCaptureAllowedUrls
list.
If you enable this policy or don't configure it (the default setting), the user is prompted for audio
capture access except from the URLs in the AudioCaptureAllowedUrls list. These listed URLs are
granted access without prompting.
If you disable this policy, the user is not prompted, and audio capture is accessible only to the URLs
configured in AudioCaptureAllowedUrls.
This policy affects all types of audio inputs, not only the built-in microphone.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AudioCaptureAllowedUrls
Sites that can access audio capture devices without requesting permission
Supported versions:
Description
Specify websites, based on URL patterns, that can use audio capture devices without asking the
user for permission. Patterns in this list are matched against the security origin of the requesting
URL. If they match, the site is automatically granted access to audio capture devices.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
SOFTWARE\Policies\Microsoft\Edge\AudioCaptureAllowedUrls\1 =
"https://www.contoso.com/"
SOFTWARE\Policies\Microsoft\Edge\AudioCaptureAllowedUrls\2 =
"https://[*.]contoso.edu/"
XML
<array>
<string>https://www.contoso.com/</string>
<string>https://[*.]contoso.edu/</string>
</array>
Back to top
AudioProcessHighPriorityEnabled
Allow the audio process to run with priority above normal on Windows
Supported versions:
On Windows since 96 or later
Description
This policy controls the priority of the audio process on Windows. If this policy is enabled, the audio
process will run with above normal priority. If this policy is disabled, the audio process will run with
normal priority. If this policy is not configured, the default configuration for the audio process will
be used. This policy is intended as a temporary measure to give enterprises the ability to run audio
with higher priority to address certain performance issues with audio capture. This policy will be
removed in the future.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
AudioSandboxEnabled
Supported versions:
Description
If you disable this policy, the audio process will run unsandboxed and the WebRTC audio-
processing module will run in the renderer process. This leaves users open to security risks related
to running the audio subsystem unsandboxed.
If you don't configure this policy, the default configuration for the audio sandbox will be used,
which might differ based on the platform.
This policy is intended to give enterprises flexibility to disable the audio sandbox if they use security
software setups that interfere with the sandbox.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AutoImportAtFirstRun
Supported versions:
On Windows and macOS since 77 or later
Description
If you enable this policy, all supported datatypes and settings from the specified browser will be
silently and automatically imported at first run. During the First Run Experience, the import section
will also be skipped.
The browser data from Microsoft Edge Legacy will always be silently migrated at the first run,
irrespective of the value of this policy.
If this policy is set to 'FromDefaultBrowser', then the datatypes corresponding to the default
browser on the managed device will be imported.
If the browser specified as the value of this policy is not present in the managed device, Microsoft
Edge will simply skip the import without any notification to the user.
If you set this policy to 'DisabledAutoImport', the import section of the first-run experience is
skipped entirely and Microsoft Edge doesn't import browser data and settings automatically.
If this policy is set to the value of 'FromInternetExplorer', the following datatypes will be imported
from Internet Explorer:
1. Favorites or bookmarks
2. Saved passwords
3. Search engines
4. Browsing history
5. Home page
If this policy is set to the value of 'FromGoogleChrome', the following datatypes will be imported
from Google Chrome:
1. Favorites
2. Saved passwords
3. Addresses and more
4. Payment info
5. Browsing history
6. Settings
7. Pinned and Open tabs
8. Extensions
9. Cookies
Note: For more details on what is imported from Google Chrome, please see
https://go.microsoft.com/fwlink/?linkid=2120835
If this policy is set to the value of 'FromSafari', user data is no longer imported into Microsoft Edge.
This is due to the way Full Disk Access works on Mac. On macOS Mojave and above, it's no longer
possible to have automated and unattended import of Safari data into Microsoft Edge.
Starting with Microsoft Edge version 83, if this policy is set to the value of 'FromMozillaFirefox', the
following datatypes will be imported from Mozilla Firefox:
1. Favorites or bookmarks
2. Saved passwords
3. Addresses and more
4. Browsing History
If you want to restrict specific datatypes from getting imported on the managed devices, you can
use this policy with other policies such as ImportAutofillFormData, ImportBrowserSettings,
ImportFavorites, and etc.
FromDefaultBrowser (0) = Automatically imports all supported datatypes and settings from
the default browser
FromInternetExplorer (1) = Automatically imports all supported datatypes and settings from
Internet Explorer
FromGoogleChrome (2) = Automatically imports all supported datatypes and settings from
Google Chrome
FromSafari (3) = Automatically imports all supported datatypes and settings from Safari
DisabledAutoImport (4) = Disables automatic import, and the import section of the first-run
experience is skipped
FromMozillaFirefox (5) = Automatically imports all supported datatypes and settings from
Mozilla Firefox
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
<integer>2</integer>
Back to top
AutoLaunchProtocolsComponentEnabled
Supported versions:
On Windows and macOS since 96 or later
Description
Specifies whether the AutoLaunch Protocols component should be enabled. This component allows
Microsoft to provide a list similar to that of the AutoLaunchProtocolsFromOrigins policy, allowing
certain external protocols to launch without prompt or blocking certain protocols (on specified
origins). By default, this component is enabled.
If you enable or don't configure this policy, the AutoLaunch Protocols component is enabled.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AutoLaunchProtocolsFromOrigins
Define a list of protocols that can launch an external application from listed
origins without prompting the user
Supported versions:
On Windows and macOS since 85 or later
Description
Allows you to set a list of protocols, and for each protocol an associated list of allowed origin
patterns, that can launch an external application without prompting the user. The trailing separator
should not be included when listing the protocol. For example, list "skype" instead of "skype:" or
"skype://".
If you configure this policy, a protocol will only be permitted to launch an external application
without prompting by policy if:
the origin of the site trying to launch the protocol matches one of the origin patterns in that
protocol's allowed_origins list.
If either condition is false, the external protocol launch prompt will not be omitted by policy.
If you don't configure this policy, no protocols can launch without a prompt. Users can opt out of
prompts on a per-protocol/per-site basis unless the
ExternalProtocolDialogShowAlwaysOpenCheckbox policy is set to Disabled. This policy has no
impact on per-protocol/per-site prompt exemptions set by users.
The origin matching patterns use a similar format to those for the URLBlocklist policy, which are
documented at https://go.microsoft.com/fwlink/?linkid=2095322 .
However, origin matching patterns for this policy cannot contain "/path" or "@query" elements.
Any pattern that does contain a "/path" or "@query" element will be ignored.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutoLaunchProtocolsFromOrigins = [
{
"allowed_origins": [
"example.com",
"http://www.example.com:8080"
],
"protocol": "spotify"
},
{
"allowed_origins": [
"https://example.com",
"https://.mail.example.com"
],
"protocol": "msteams"
},
{
"allowed_origins": [
"*"
],
"protocol": "msoutlook"
}
]
SOFTWARE\Policies\Microsoft\Edge\AutoLaunchProtocolsFromOrigins = [{"allowed_origins":
["example.com", "http://www.example.com:8080"], "protocol": "spotify"},
{"allowed_origins": ["https://example.com", "https://.mail.example.com"], "protocol":
"msteams"}, {"allowed_origins": ["*"], "protocol": "msoutlook"}]
XML
<key>AutoLaunchProtocolsFromOrigins</key>
<array>
<dict>
<key>allowed_origins</key>
<array>
<string>example.com</string>
<string>http://www.example.com:8080</string>
</array>
<key>protocol</key>
<string>spotify</string>
</dict>
<dict>
<key>allowed_origins</key>
<array>
<string>https://example.com</string>
<string>https://.mail.example.com</string>
</array>
<key>protocol</key>
<string>msteams</string>
</dict>
<dict>
<key>allowed_origins</key>
<array>
<string>*</string>
</array>
<key>protocol</key>
<string>msoutlook</string>
</dict>
</array>
Back to top
AutoOpenAllowedForURLs
Supported versions:
On Windows and macOS since 85 or later
Description
A list of URLs to which AutoOpenFileTypes will apply to. This policy has no impact on automatically
open values set by users via the download shelf ... > "Always open files of this type" menu entry.
If you set URLs in this policy, files will only automatically open by policy if the URL is part of this set
and the file type is listed in AutoOpenFileTypes. If either condition is false, the download won't
automatically open by policy.
If you don't set this policy, all downloads where the file type is in AutoOpenFileTypes will
automatically open.
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutoOpenAllowedForURLs\1 = "example.com"
SOFTWARE\Policies\Microsoft\Edge\AutoOpenAllowedForURLs\2 = "https://ssl.server.com"
SOFTWARE\Policies\Microsoft\Edge\AutoOpenAllowedForURLs\3 = "hosting.com/good_path"
SOFTWARE\Policies\Microsoft\Edge\AutoOpenAllowedForURLs\4 = "https://server:8080/path"
SOFTWARE\Policies\Microsoft\Edge\AutoOpenAllowedForURLs\5 = ".exact.hostname.com"
XML
<array>
<string>example.com</string>
<string>https://ssl.server.com</string>
<string>hosting.com/good_path</string>
<string>https://server:8080/path</string>
<string>.exact.hostname.com</string>
</array>
Back to top
AutoOpenFileTypes
Supported versions:
On Windows and macOS since 85 or later
Description
This policy sets a list of file types that should be automatically opened on download. Note: The
leading separator should not be included when listing the file type, so list "txt" instead of ".txt".
By default, these file types will be automatically opened on all URLs. You can use the
AutoOpenAllowedForURLs policy to restrict the URLs for which these file types will be automatically
opened on.
Files with types that should be automatically opened will still be subject to the enabled Microsoft
Defender SmartScreen checks and won't be opened if they fail those checks.
File types that a user has already specified to automatically be opened will continue to do so when
downloaded. The user will continue to be able to specify other file types to be automatically
opened.
If you don't set this policy, only file types that a user has already specified to automatically be
opened will do so when downloaded.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutoOpenFileTypes\1 = "exe"
SOFTWARE\Policies\Microsoft\Edge\AutoOpenFileTypes\2 = "txt"
XML
<array>
<string>exe</string>
<string>txt</string>
</array>
Back to top
AutofillAddressEnabled
Supported versions:
Description
Enables the AutoFill feature and allows users to auto-complete address information in web forms
using previously stored information.
If you disable this policy, AutoFill never suggests or fills in address information, nor does it save
additional address information that the user might submit while browsing the web.
If you enable this policy or don't configure it, users can control AutoFill for addresses in the user
interface.
Note that if you disable this policy you also stop all activity for all web forms, except payment and
password forms. No further entries are saved, and Microsoft Edge won't suggest or AutoFill any
previous entries.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AutofillCreditCardEnabled
Supported versions:
Description
Enables Microsoft Edge's AutoFill feature and lets users auto complete payment instruments like
credit or debit cards in web forms using previously stored information. This includes suggesting
new payment instruments like Buy Now Pay Later (BNPL) in web forms and Express Checkout.
If you enable this policy or don't configure it, users can control AutoFill for payment instruments.
If you disable this policy, AutoFill never suggests, fills, or recommends new payment Instruments.
Additionally, it won't save any payment instrument information that users submit while browsing
the web.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
AutofillMembershipsEnabled
Supported versions:
Description
This policy lets you decide whether users can have their membership info (for example, program
name and membership number) automatically saved and used to fill form fields while using
Microsoft Edge. By default, users can choose whether to enable it or not.
If you enable this policy, users can only have their membership info automatically saved and used
to fill form fields while using Microsoft Edge.
If you don't configure this policy, users can choose whether to have their membership info
automatically saved and used to fill form fields while using Microsoft Edge.
If you disable this policy, users can't have their membership info automatically saved and used to
fill form fields while using Microsoft Edge.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
AutomaticHttpsDefault
Supported versions:
Description
This policy lets you manage settings for AutomaticHttpsDefault, which switches connections from
HTTP to HTTPS.
This feature helps protect against man-in-the-middle attacks by enforcing more secure
connections, but users might experience more connection errors.
Starting in Microsoft Edge 111, "UpgradePossibleDomains" is deprecated and is treated the same as
"DisableAutomaticHttps". It won't work in Microsoft Edge version 114.
AlwaysUpgrade (2) = All navigations delivered over HTTP are switched to HTTPS. Connection
errors might occur more often.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
Mac information and settings
Preference Key Name: AutomaticHttpsDefault
Example value:
XML
<integer>2</integer>
Back to top
AutoplayAllowed
Supported versions:
On Windows and macOS since 78 or later
Description
This policy sets the media autoplay policy for websites.
The default setting, "Not configured" respects the current media autoplay settings and lets users
configure their autoplay settings.
Setting to "Enabled" sets media autoplay to "Allow". All websites are allowed to autoplay media.
Users can't override this policy.
Setting to "Disabled" sets media autoplay to "Limit". This limits websites that are allowed to
autoplay media to webpages with high media engagement and active WebRTC streams. Prior to
Microsoft Edge version 92, this would set media autoplay to "Block". Users can't override this policy.
A tab will need to be closed and re-opened for this policy to take effect.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
AutoplayAllowlist
Supported versions:
On Windows and macOS since 93 or later
Description
Define a list of sites, based on URL patterns, that are allowed to autoplay media.
If you don't configure this policy, the global default value from the AutoplayAllowed policy (if set)
or the user's personal configuration is used for all sites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\AutoplayAllowlist\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\AutoplayAllowlist\2 = "[*.]contoso.edu"
Mac information and settings
Preference Key Name: AutoplayAllowlist
Example value:
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
BackgroundModeEnabled
Supported versions:
On Windows since 77 or later
Description
Allows Microsoft Edge processes to start at OS sign-in and keep running after the last browser
window is closed. In this scenario, background apps and the current browsing session remain
active, including any session cookies. An open background process displays an icon in the system
tray and can always be closed from there.
If you don't configure this policy, background mode is initially turned off, and the user can
configure its behavior in edge://settings/system.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
Back to top
BackgroundTemplateListUpdatesEnabled
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 79 or later
Description
This policy is deprecated because we are moving to a new policy. It won't work in Microsoft Edge as
soon as version 104. The new policy to use is EdgeAssetDeliveryServiceEnabled.
Lets you enable or disable background updates to the list of available templates for Collections and
other features that use templates. Templates are used to extract rich metadata from a webpage
when the page is saved to a collection.
If you enable this setting or the setting is unconfigured, the list of available templates will be
downloaded in the background from a Microsoft service every 24 hours.
If you disable this setting the list of available templates will be downloaded on demand. This type
of download might result in small performance penalties for Collections and other features.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: BackgroundTemplateListUpdatesEnabled
Example value:
XML
<true/>
Back to top
BingAdsSuppression
Supported versions:
On Windows and macOS since 83 or later
Description
Enables an ad-free search experience on Bing.com
If you enable this policy, then a user can search on bing.com and have an ad-free search
experience. At the same time, the SafeSearch setting will be set to 'Strict' and can't be changed by
the user.
If you don't configure this policy, then the default experience will have ads in the search results on
bing.com. SafeSearch will be set to 'Moderate' by default and can be changed by the user.
This policy is only available for K-12 SKUs that are identified as EDU tenants by Microsoft.
You were experiencing an ad-free search experience on Microsoft Edge Legacy and want to
upgrade to the new version of Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
BlockThirdPartyCookies
Description
Block web page elements that aren't from the domain that's in the address bar from setting
cookies.
If you enable this policy, web page elements that are not from the domain that is in the address bar
can't set cookies
If you disable this policy, web page elements from domains other than in the address bar can set
cookies.
If you don't configure this policy, third-party cookies are enabled but users can change this setting.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
0x00000000
XML
<false/>
Back to top
BrowserAddProfileEnabled
Enable profile creation from the Identity flyout menu or the Settings page
Supported versions:
On Windows and macOS since 77 or later
Description
Allows users to create new profiles, using the Add profile option. If you enable this policy or don't
configure it, Microsoft Edge allows users to use Add profile on the Identity flyout menu or the
Settings page to create new profiles.
If you disable this policy, users cannot add new profiles from the Identity flyout menu or the
Settings page.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
BrowserCodeIntegritySetting
Supported versions:
On Windows since 104 or later
Description
This policy controls the use of code integrity guard in the browser process, which only allows
Microsoft signed binaries to load.
Setting this policy to Enabled will enable code integrity guard in the browser process.
Setting this policy to Disabled, or if the policy is not set, will prevent the browser from enabling
code integrity guard in the browser process.
The policy value Audit (1) is obsolete as of version 110. Setting this value is equivalent to the
Disabled value.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, or Windows 10 Pro or Enterprise instances that enrolled for device management.
This policy will only take effect on Windows 10 RS2 and above.
Disabled (0) = Do not enable code integrity guard in the browser process.
Audit (1) = Enable code integrity guard audit mode in the browser process.
Enabled (2) = Enable code integrity guard enforcement in the browser process.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000000
Back to top
BrowserGuestModeEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Enable the option to allow the use of guest profiles in Microsoft Edge. In a guest profile, the
browser doesn't import browsing data from existing profiles, and it deletes browsing data when all
guest profiles are closed.
If you enable this policy or don't configure it, Microsoft Edge lets users browse in guest profiles.
If you disable this policy, Microsoft Edge doesn't let users browse in guest profiles.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
BrowserLegacyExtensionPointsBlockingEnabled
Supported versions:
On Windows since 95 or later
Description
Sets the ProcessExtensionPointDisablePolicy on Microsoft Edge's browser process to block code
injection from legacy third party applications.
If you disable this policy, the ProcessExtensionPointDisablePolicy is not applied to block legacy
extension points in the browser process. This has a detrimental effect on Microsoft Edge's security
and stability as unknown and potentially hostile code can load inside Microsoft Edge's browser
process. Only turn off the policy if there are compatibility issues with third-party software that must
run inside Microsoft Edge's browser process.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
BrowserNetworkTimeQueriesEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Prevents Microsoft Edge from occasionally sending queries to a browser network time service to
retrieve an accurate timestamp.
If you disable this policy, Microsoft Edge will stop sending queries to a browser network time
service.
If you enable this policy or don't configure it, Microsoft Edge will occasionally send queries to a
browser network time service.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
BrowserSignin
Supported versions:
On Windows and macOS since 77 or later
Description
Specify whether a user can sign into Microsoft Edge with their account and use account-related
services like sync and single sign on. To control the availability of sync, use the SyncDisabled policy
instead.
If you set this policy to 'Disable', make sure that you also set the NonRemovableProfileEnabled
policy to disabled because NonRemovableProfileEnabled disables the creation of an automatically
signed in browser profile. If both policies are set, Microsoft Edge will use the 'Disable browser sign-
in' policy and behave as if NonRemovableProfileEnabled is set to disabled.
If you set this policy to 'Enable', users can sign into the browser. Signing into the browser doesn't
mean that sync is turned on by default; the user must separately opt-in to use this feature.
If you set this policy to 'Force', users must sign into a profile to use the browser. By default, this will
allow the user to choose whether they want to sync to their account, unless sync is disabled by the
domain admin or with the SyncDisabled policy. The default value of BrowserGuestModeEnabled
policy is set to false.
If you don't configure this policy users can decide if they want to enable the browser sign-in option
and use it as they see fit.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
BrowsingDataLifetime
Supported versions:
On Windows and macOS since 89 or later
Description
Configures browsing data lifetime settings for Microsoft Edge. This policy controls the lifetime of
selected browsing data. This policy has no effect if Sync is enabled. The available data types are the
'browsing_history', 'download_history', 'cookies_and_other_site_data', 'cached_images_and_files',
'password_signin', 'autofill', 'site_settings' and 'hosted_app_data'. Microsoft Edge will regularly
remove data of selected types that is older than 'time_to_live_in_hours'. The deletion of expired
data will happen 15 seconds after the browser starts then every hour while the browser is running.
Supported features:
Example value:
SOFTWARE\Policies\Microsoft\Edge\BrowsingDataLifetime = [
{
"data_types": [
"browsing_history"
],
"time_to_live_in_hours": 24
},
{
"data_types": [
"password_signin",
"autofill"
],
"time_to_live_in_hours": 12
}
]
SOFTWARE\Policies\Microsoft\Edge\BrowsingDataLifetime = [{"data_types":
["browsing_history"], "time_to_live_in_hours": 24}, {"data_types": ["password_signin",
"autofill"], "time_to_live_in_hours": 12}]
Mac information and settings
Preference Key Name: BrowsingDataLifetime
Example value:
XML
<key>BrowsingDataLifetime</key>
<array>
<dict>
<key>data_types</key>
<array>
<string>browsing_history</string>
</array>
<key>time_to_live_in_hours</key>
<integer>24</integer>
</dict>
<dict>
<key>data_types</key>
<array>
<string>password_signin</string>
<string>autofill</string>
</array>
<key>time_to_live_in_hours</key>
<integer>12</integer>
</dict>
</array>
Back to top
BuiltInDnsClientEnabled
Supported versions:
Description
This policy controls which software stack is used to communicate with the DNS server: the
operating system DNS client, or Microsoft Edge's built-in DNS client. This policy does not affect
which DNS servers are used: if, for example, the operating system is configured to use an enterprise
DNS server, that same server would be used by the built-in DNS client. It also does not control if
DNS-over-HTTPS is used; Microsoft Edge always uses the built-in resolver for DNS-over-HTTPS
requests. Please see the DnsOverHttpsMode policy for information on controlling DNS-over-HTTPS.
If you enable this policy, the built-in DNS client is used, if it's available.
If you disable this policy, the built-in DNS client is only used when DNS-over-HTTPS is in use.
If you don't configure this policy, the built-in DNS client is enabled by default on Windows, macOS
and Android (when neither Private DNS nor VPN are enabled).
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
<true/>
Back to top
BuiltinCertificateVerifierEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 106.
Supported versions:
Description
This policy is obsolete because it was a short-term mechanism to give enterprises more time to
update their environments and report issues if they are found to be incompatible with the built-in
certificate verifier.
Supported features:
Data Type:
Boolean
XML
<false/>
Back to top
CECPQ2Enabled
Supported versions:
On Windows and macOS since 93 or later
Description
If this policy is not configured, or is set to enabled, then Microsoft Edge will follow the default
rollout process for CECPQ2, a post-quantum key-agreement algorithm in TLS.
CECPQ2 results in larger TLS messages which, in very rare cases, can trigger bugs in some
networking hardware. This policy can be set to False to disable CECPQ2 while networking issues are
resolved.
This policy is a temporary measure and will be removed in future versions of Microsoft Edge.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
CORSNonWildcardRequestHeadersSupport
Supported versions:
On Windows and macOS since 97 or later
Description
This policy lets you configure support of CORS non-wildcard request headers.
Microsoft Edge version 97 introduces support for CORS non-wildcard request headers. When a
script makes a cross-origin network request via fetch() and XMLHttpRequest with a script-added
Authorization header, the header must be explicitly allowed by the Access-Control-Allow-Headers
header in the CORS preflight response. "Explicitly" here means that the wild card symbol "*" doesn't
cover the Authorization header. See https://go.microsoft.com/fwlink/?linkid=2180022 for more
detail.
If you enable or don't configure the policy, Microsoft Edge will support the CORS non-wildcard
request headers and behave as previously described.
If you disable this policy, Microsoft Edge will allow the wildcard symbol ("*") in the Access-Control-
Allow-Headers header in the CORS preflight response to cover the Authorization header.
This policy is a temporary workaround for the new CORS non-wildcard request header feature. It's
intended to be removed in the future.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: CORSNonWildcardRequestHeadersSupport
Example value:
XML
<true/>
Back to top
CertificateTransparencyEnforcementDisabledForCas
Supported versions:
Description
This policy lets you disable Certificate Transparency disclosure requirements for certificate chains
that contain certificates with one of the specified subjectPublicKeyInfo hashes. This allows
certificates that would otherwise be untrusted because they were not properly publicly disclosed to
still be used for Enterprise hosts.
To disable Certificate Transparency enforcement when this policy is set, one of the following sets of
conditions must be met:
A subjectPublicKeyInfo hash is specified by concatenating the hash algorithm name, the "/"
character, and the Base64 encoding of that hash algorithm applied to the DER-encoded
subjectPublicKeyInfo of the specified certificate. This Base64 encoding is the same format as an
SPKI Fingerprint, as defined in RFC 7469, Section 2.4. Unrecognized hash algorithms are ignored.
The only supported hash algorithm at this time is "sha256".
If you disable this policy or don't configure it, any certificate that's required to be disclosed via
Certificate Transparency will be treated as untrusted if it's not disclosed according to the Certificate
Transparency policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForCas
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForCas\1 =
"sha256/AAAAAAAAAAAAAAAAAAAAAA=="
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForCas\2 =
"sha256//////////////////////w=="
XML
<array>
<string>sha256/AAAAAAAAAAAAAAAAAAAAAA==</string>
<string>sha256//////////////////////w==</string>
</array>
Back to top
CertificateTransparencyEnforcementDisabledForLegacyCas
Supported versions:
Description
Disables enforcing Certificate Transparency requirements for a list of legacy certificate authorities
(Cas).
This policy lets you disable Certificate Transparency disclosure requirements for certificate chains
that contain certificates with one of the specified subjectPublicKeyInfo hashes. This allows
certificates that would otherwise be untrusted because they were not properly publicly disclosed,
continue to be used for enterprise hosts.
In order for Certificate Transparency enforcement to be disabled, you must set the hash to a
subjectPublicKeyInfo appearing in a CA certificate that is recognized as a legacy certificate authority
(CA). A legacy CA is a CA that has been publicly trusted by default by one or more operating
systems supported by Microsoft Edge.
You specify a subjectPublicKeyInfo hash by concatenating the hash algorithm name, the "/"
character, and the Base64 encoding of that hash algorithm applied to the DER-encoded
subjectPublicKeyInfo of the specified certificate. This Base64 encoding is the same format as an
SPKI Fingerprint, as defined in RFC 7469, Section 2.4. Unrecognized hash algorithms are ignored.
The only supported hash algorithm at this time is "sha256".
If you don't configure this policy, any certificate that's required to be disclosed via Certificate
Transparency will be treated as untrusted if it isn't disclosed according to the Certificate
Transparency policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForLegacyCas
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForLegacyCa
s\1 = "sha256/AAAAAAAAAAAAAAAAAAAAAA=="
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForLegacyCa
s\2 = "sha256//////////////////////w=="
Mac information and settings
Preference Key Name: CertificateTransparencyEnforcementDisabledForLegacyCas
Example value:
XML
<array>
<string>sha256/AAAAAAAAAAAAAAAAAAAAAA==</string>
<string>sha256//////////////////////w==</string>
</array>
Back to top
CertificateTransparencyEnforcementDisabledForUrls
Supported versions:
On Windows and macOS since 77 or later
Description
Disables enforcing Certificate Transparency requirements for the listed URLs.
This policy lets you not disclose certificates for the hostnames in the specified URLs via Certificate
Transparency. This lets you use certificates that would otherwise be untrusted, because they weren't
properly publicly disclosed, but it makes it harder to detect mis-issued certificates for those hosts.
If you don't configure this policy, any certificate that should be disclosed via Certificate
Transparency is treated as untrusted if it's not disclosed.
Supported features:
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForUrls
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForUrls\1 =
"contoso.com"
SOFTWARE\Policies\Microsoft\Edge\CertificateTransparencyEnforcementDisabledForUrls\2 =
".contoso.com"
XML
<array>
<string>contoso.com</string>
<string>.contoso.com</string>
</array>
Back to top
ClearBrowsingDataOnExit
Supported versions:
Description
Microsoft Edge doesn't clear the browsing data by default when it closes. Browsing data includes
information entered in forms, passwords, and even the websites visited.
If you enable this policy, all browsing data is deleted each time Microsoft Edge closes. Note that if
you enable this policy, it takes precedence over how you configured DefaultCookiesSetting
If you disable or don't configure this policy, users can configure the Clear browsing data option in
Settings.
To exclude cookies from being deleted on exit, configure the SaveCookiesOnExit policy.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ClearCachedImagesAndFilesOnExit
Supported versions:
On Windows and macOS since 83 or later
Description
Microsoft Edge doesn't clear cached images and files by default when it closes.
If you enable this policy, cached images and files will be deleted each time Microsoft Edge closes.
If you disable this policy, users cannot configure the cached images and files option in
edge://settings/clearBrowsingDataOnClose.
If you don't configure this policy, users can choose whether cached images and files are cleared on
exit.
If you disable this policy, don't enable the ClearBrowsingDataOnExit policy, because they both deal
with deleting data. If you configure both, the ClearBrowsingDataOnExit policy takes precedence
and deletes all data when Microsoft Edge closes, regardless of how you configured
ClearCachedImagesAndFilesOnExit.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: ClearCachedImagesAndFilesOnExit
Example value:
XML
<true/>
Back to top
ClickOnceEnabled
Supported versions:
On Windows since 78 or later
Description
Allow users to open files using the ClickOnce protocol. The ClickOnce protocol allows websites to
request that the browser open files from a specific URL using the ClickOnce file handler on the
user's computer or device.
If you enable this policy, users can open files using the ClickOnce protocol. This policy overrides the
user's ClickOnce setting in the edge://flags/ page.
If you disable this policy, users can't open files using the ClickOnce protocol. Instead, the file will be
saved to the file system using the browser. This policy overrides the user's ClickOnce setting in the
edge://flags/ page.
If you don't configure this policy, users with Microsoft Edge versions before Microsoft Edge 87 can't
open files using the ClickOnce protocol by default. However, they have the option to enable the use
of the ClickOnce protocol with the edge://flags/ page. Users with Microsoft Edge versions 87 and
later can open files using the ClickOnce protocol by default but have the option to disable the
ClickOnce protocol with edge://flags/ page.
Disabling ClickOnce may prevent ClickOnce applications (.application files) from launching properly.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
ClipboardAllowedForUrls
Supported versions:
On Windows and macOS since 109 or later
Description
Configure the list of URL patterns that specify which sites can use the clipboard site permission.
Setting the policy lets you create a list of URL patterns that specify which sites can use the clipboard
site permission. This doesn't include all clipboard operations on origins that match the patterns. For
example, users will still be able to paste using keyboard shortcuts because this isn't controlled by
the clipboard site permission.
Leaving the policy unset means DefaultClipboardSetting applies for all sites if it's set. If it isn't set,
the user's personal setting applies.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ClipboardAllowedForUrls\1 = "https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\ClipboardAllowedForUrls\2 = "[*.]example.edu"
Mac information and settings
Preference Key Name: ClipboardAllowedForUrls
Example value:
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
ClipboardBlockedForUrls
Supported versions:
On Windows and macOS since 109 or later
Description
Configure the list of URL patterns that specify which sites can use the clipboard site permission.
Setting the policy lets you create a list of URL patterns that specify sites that can't use the clipboard
site permission. This doesn't include all clipboard operations on origins that match the patterns. For
example, users will still be able to paste using keyboard shortcuts because this isn't controlled by
the clipboard site permission.
Leaving the policy unset means DefaultClipboardSetting applies for all sites if it's set. If it isn't set,
the user's personal setting applies.
Supported features:
Example value:
SOFTWARE\Policies\Microsoft\Edge\ClipboardBlockedForUrls\1 = "https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\ClipboardBlockedForUrls\2 = "[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
CollectionsServicesAndExportsBlockList
Block access to a specified list of services and export targets in Collections
Supported versions:
Description
List specific services and export targets that users can't access in the Collections feature in
Microsoft Edge. This includes displaying additional data from Bing and exporting collections to
Microsoft products or external partners.
If you enable this policy, services and export targets that match the given list are blocked.
If you don't configure this policy, no restrictions on the acceptable services and export targets are
enforced.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\CollectionsServicesAndExportsBlockList\1 =
"collections_share"
SOFTWARE\Policies\Microsoft\Edge\CollectionsServicesAndExportsBlockList\2 =
"local_pdf"
SOFTWARE\Policies\Microsoft\Edge\CollectionsServicesAndExportsBlockList\3 =
"send_word"
SOFTWARE\Policies\Microsoft\Edge\CollectionsServicesAndExportsBlockList\4 =
"send_excel"
SOFTWARE\Policies\Microsoft\Edge\CollectionsServicesAndExportsBlockList\5 =
"send_onenote"
XML
<array>
<string>collections_share</string>
<string>local_pdf</string>
<string>send_word</string>
<string>send_excel</string>
<string>send_onenote</string>
</array>
Back to top
CommandLineFlagSecurityWarningsEnabled
Enable security warnings for command-line flags
Supported versions:
Description
If disabled, this policy prevents security warnings from appearing when Microsoft Edge is launched
with potentially dangerous command-line flags.
If enabled or unset, security warnings are displayed when these command-line flags are used to
launch Microsoft Edge.
For example, the --disable-gpu-sandbox flag generates this warning: You're using an unsupported
command-line flag: --disable-gpu-sandbox. This poses stability and security risks.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ComponentUpdatesEnabled
Supported versions:
Description
If you enable or don't configure this policy, component updates are enabled in Microsoft Edge.
If you disable this policy or set it to false, component updates are disabled for all components in
Microsoft Edge.
However, some components are exempt from this policy. This includes any component that doesn't
contain executable code, that doesn't significantly alter the behavior of the browser, or that's
critical for security. That is, updates that are deemed "critical for security" are still applied even if
you disable this policy.
Examples of such components include the certificate revocation lists and security lists like tracking
prevention lists.
Please note that disabling this policy can potentially prevent the Microsoft Edge developers from
providing critical security fixes in a timely manner and is thus not recommended.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ComposeInlineEnabled
Supported versions:
On Windows and macOS since 115 or later
Description
This policy lets you configure Compose in Microsoft Edge. Compose provides help for writing with
AI-generated text, which lets the user get ideas for writing. This includes elaborating on text, re-
writing, changing tone, formatting the text, and more.
If you enable or don't configure this policy, Compose can provide text generation for eligible fields,
which are text editable and don't have an autocomplete attribute.
If you disable this policy, Compose will not be able to provide text generation for eligible fields.
Compose will still be available for prompt-based text generation through the sidebar and must be
managed with either EdgeDiscoverEnabled policy or HubsSidebarEnabled policy.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ConfigureDoNotTrack
Supported versions:
On Windows and macOS since 77 or later
Description
Specify whether to send Do Not Track requests to websites that ask for tracking info. Do Not Track
requests let the websites you visit know that you don't want your browsing activity to be tracked.
By default, Microsoft Edge doesn't send Do Not Track requests, but users can turn on this feature to
send them.
If you enable this policy, Do Not Track requests are always sent to websites asking for tracking info.
If you disable this policy, requests are never sent.
If you don't configure this policy, users can choose whether to send these requests.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ConfigureFriendlyURLFormat
Configure the default paste format of URLs copied from Microsoft Edge,
and determine if additional formats will be available to users
Supported versions:
Description
If FriendlyURLs are enabled, Microsoft Edge will compute additional representations of the URL and
place them on the clipboard.
This policy configures what format will be pasted when the user pastes in external applications, or
inside Microsoft Edge without the 'Paste as' context menu item.
If configured, this policy makes a choice on behalf of the user. The options in
edge://settings/shareCopyPaste will be grayed out, and the options in the 'Paste As' context menu
will not be available.
Not configured = The user will be able to choose their preferred paste format. By default, this
is set to the friendly URL format. The 'Paste As' menu will be available in Microsoft Edge.
1 = No additional formats will be stored on the clipboard. There will be no 'Paste as' context
menu item in Microsoft Edge and the only format available to paste will be the plain text URL
format. Effectively, the friendly URL feature will be disabled.
3 = The user will get a friendly URL whenever they paste into surfaces that accept rich text.
The plain URL will still be available for non-rich surfaces. There will be no 'Paste As' menu in
Microsoft Edge.
The richer formats may not be well-supported in some paste destinations and/or websites. In these
scenarios, the plain URL option is recommended when configuring this policy.
TitledHyperlink (3) = Titled Hyperlink: A hyperlink that points to the copied URL, but whose
visible text is the title of the destination page. This is the Friendly URL format.
WebPreview (4) = Coming soon. If set, behaves the same as 'Plain URL'.
Supported features:
Data Type:
Integer
Example value:
0x00000003
XML
<integer>3</integer>
Back to top
ConfigureKeyboardShortcuts
Supported versions:
On Windows since 101 or later
Description
Configure the list of Microsoft Edge commands for which to disable keyboard shortcuts.
If you enable this policy, commands in the 'disabled' list will no longer be activated by keyboard
shortcuts.
Note: Disabling a command will only remove its shortcut mapping. Commands in the 'disabled' list
will still function if accessed via browser UI.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ConfigureKeyboardShortcuts = {
"disabled": [
"new_tab",
"fullscreen"
]
}
Back to top
ConfigureOnPremisesAccountAutoSignIn
Supported versions:
On Windows since 81 or later
Description
Enable the use of Active Directory accounts for automatic sign in if your users' machines are
Domain Joined and your environment is not hybrid joined. If you want users automatically signed in
with their Azure Active Directory accounts instead, please Azure AD join (See
https://go.microsoft.com/fwlink/?linkid=2118197 for more information) or hybrid join (See
https://go.microsoft.com/fwlink/?linkid=2118365 for more information) your environment.
On every launch, Microsoft Edge will try to sign-in using this policy, as long as the first profile being
launched isn't signed-in or an auto sign-in hasn't happened before.
If you have configured the BrowserSignin policy to disabled, this policy will not take any effect.
If you set this policy to 'Disabled' or don't set it, Microsoft Edge will not automatically sign in users
that are on domain joined machines with Active Directory accounts.
From Microsoft Edge 93 onwards, if policy ImplicitSignInEnabled is disabled, this policy will not take
any effect.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000000
Back to top
ConfigureOnlineTextToSpeech
Supported versions:
On Windows and macOS since 77 or later
Description
Set whether the browser can leverage Online Text to Speech voice fonts, part of Azure Cognitive
Services. These voice fonts are higher quality than the pre-installed system voice fonts.
If you enable or don't configure this policy, web-based applications that use the SpeechSynthesis
API can use Online Text to Speech voice fonts.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: ConfigureOnlineTextToSpeech
Example value:
XML
<true/>
Back to top
ConfigureShare
Supported versions:
On Windows since 83 or later
On macOS since 93 or later
Description
If you set this policy to 'ShareAllowed' (the default), users will be able to access the Share
experience from the Settings and More Menu in Microsoft Edge to share with other apps on the
system.
If you set this policy to 'ShareDisallowed', users won't be able to access the Share experience. If the
Share button is on the toolbar, it will also be hidden.
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
ConfigureViewInFileExplorer
Supported versions:
On Windows since 93 or later
Description
This setting allows you to configure the View in File Explorer capability for file management in
SharePoint Online while using Microsoft Edge.
You will need to list the specific domains where this is allowed and list cookies needed for
SharePoint authentication (rtFa and FedAuth).
Behind the scenes, the policy allows URLs with the viewinfileexplorer: scheme to open WebDAV
URLs in Windows File Explorer on pages matching the list of domains and uses the cookies you
specified for WebDAV authentication.
If you enable this policy, you can use the "View in File Explorer" feature on the SharePoint
document libraries you list. You will need to specify the SharePoint domain and authentication
cookies. See example value below.
If you disable or don't configure this policy, you cannot use the "View in File Explorer" feature on
SharePoint document libraries.
Note that while this is an available option through Microsoft Edge, rather than use the View in File
Explorer option, the recommended approach to managing files and folders outside of SharePoint is
to sync your SharePoint files or move or copy files in SharePoint. Sync your SharePoint files:
https://go.microsoft.com/fwlink/p/?linkid=2166983 Move or copy files in SharePoint:
https://go.microsoft.com/fwlink/p/?linkid=2167123
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, or Windows 10 Pro or Enterprise instances enrolled for device management.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ConfigureViewInFileExplorer = [
{
"cookies": [
"rtFa",
"FedAuth"
],
"domain": "contoso.sharepoint.com"
},
{
"cookies": [
"rtFa",
"FedAuth"
],
"domain": "contoso2.sharepoint.com"
}
]
Back to top
CrossOriginWebAssemblyModuleSharingEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 98.
Supported versions:
On Windows and macOS since 95, until 98
Description
Specifies whether WebAssembly modules can be sent to another window or worker cross-origin.
Cross-origin WebAssembly module sharing was deprecated as part of the efforts to deprecate
document.domain, see https://github.com/mikewest/deprecating-document-domain . This policy
allowed re-enabling of cross-origin WebAssembly module sharing. This policy is obsolete because
it was intended to offer a longer transition period in the deprecation process.
If you enable this policy, sites can send WebAssembly modules cross-origin without restrictions.
If you disable or don't configure this policy, sites can only send WebAssembly modules to windows
and workers in the same origin.
Supported features:
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
CryptoWalletEnabled
Supported versions:
On Windows since 112 or later
Description
Enables CryptoWallet feature in Microsoft Edge.
If you enable this policy or don't configure it, users can use CryptoWallet feature which allows users
to securely store, manage and transact digital assets such as Bitcoin, Ethereum and other
cryptocurrencies. Therefore, Microsoft Edge may access Microsoft servers to communicate with the
web3 world during the use of the CryptoWallet feature.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Back to top
CustomHelpLink
Supported versions:
On Windows and macOS since 79 or later
Description
Specify a link for the Help menu or the F1 key.
If you enable this policy, an admin can specify a link for the Help menu or the F1 key.
If you disable or don't configure this policy, the default link for the Help menu or the F1 key is used.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"https://go.microsoft.com/fwlink/?linkid=2080734"
XML
<string>https://go.microsoft.com/fwlink/?linkid=2080734</string>
Back to top
DNSInterceptionChecksEnabled
Supported versions:
On Windows and macOS since 80 or later
Description
This policy configures a local switch that can be used to disable DNS interception checks. These
checks attempt to discover whether the browser is behind a proxy that redirects unknown host
names.
This detection might not be necessary in an enterprise environment where the network
configuration is known. It can be disabled to avoid additional DNS and HTTP traffic on start-up and
each DNS configuration change.
If you enable or don't set this policy, the DNS interception checks are performed.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
DefaultBrowserSettingEnabled
Supported versions:
On Windows 7 and macOS since 77 or later
Description
If you set this policy to True, Microsoft Edge always checks whether it's the default browser on
startup and, if possible, automatically registers itself.
If you set this policy to False, Microsoft Edge is stopped from ever checking if it's the default and
turns user controls off for this option.
If you don't set this policy, Microsoft Edge lets users control whether it's the default and, if not,
whether user notifications should appear.
Note for Windows administrators: This policy only works for PCs running Windows 7. For later
versions of Windows, you have to deploy a "default application associations" file that makes
Microsoft Edge the handler for the https and http protocols (and, optionally, the ftp protocol and
file formats such as .html, .htm, .pdf, .svg, .webp). See https://go.microsoft.com/fwlink/?
linkid=2094932 for more information.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: DefaultBrowserSettingEnabled
Example value:
XML
<true/>
Back to top
DefaultBrowserSettingsCampaignEnabled
Supported versions:
On Windows since 113 or later
Description
This policy enables the default browser settings campaign. If a user clicks to accept the campaign,
their default browser and/or default search engine will be changed to Microsoft Edge and Microsoft
Bing, respectively. If the user dismisses the campaign, the user's browser settings will remain
unchanged.
If you enable or don't configure this policy, users will be prompted to set Microsoft Edge as the
default browser and Microsoft Bing as the default search engine, if they do not have those browser
settings.
If you disable this policy, users will not be prompted to set Microsoft Edge as the default browser,
or to set Microsoft Bing as the default search engine.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
Back to top
DefaultClipboardSetting
Supported versions:
Description
This policy controls the default value for the clipboard site permission.
Setting the policy to 2 blocks sites from using the clipboard site permission.
Setting the policy to 3 or leaving it unset lets the user change the setting and decide if the
clipboard APIs are available when a site wants to use an API.
This policy can be overridden for specific URL patterns using the ClipboardAllowedForUrls and
ClipboardBlockedForUrls policies.
This policy only affects clipboard operations controlled by the clipboard site permission and doesn't
affect sanitized clipboard writes or trusted copy and paste operations.
BlockClipboard (2) = Do not allow any site to use the clipboard site permission
AskClipboard (3) = Allow sites to ask the user to grant the clipboard site permission
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
Mac information and settings
Preference Key Name: DefaultClipboardSetting
Example value:
XML
<integer>2</integer>
Back to top
DefaultSearchProviderContextMenuAccessAllowed
Supported versions:
On Windows and macOS since 85 or later
Description
Enables the use of a default search provider on the context menu.
If you set this policy to disabled the search context menu item that relies on your default search
provider and sidebar search will not be available.
If this policy is set to enabled or not set, the context menu item for your default search provider
and sidebar search will be available.
The policy value is only applied when the DefaultSearchProviderEnabled policy is enabled, and is
not applicable otherwise.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
DefaultSensorsSetting
Supported versions:
Description
Set whether websites can access and use sensors such as motion and light sensors. You can
completely block or allow websites to get access to sensors.
Setting the policy to 1 lets websites access and use sensors. Setting the policy to 2 denies acess to
sensors.
You can override this policy for specific URL patterns by using the SensorsAllowedForUrls and
SensorsBlockedForUrls policies.
If you don't configure this policy, websites can access and use sensors, and users can change this
setting. This is the global default for SensorsAllowedForUrls and SensorsBlockedForUrls.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
0x00000002
XML
<integer>2</integer>
Back to top
DefaultSerialGuardSetting
Supported versions:
On Windows and macOS since 86 or later
Description
Set whether websites can access serial ports. You can completely block access or ask the user each
time a website wants to get access to a serial port.
Setting the policy to 3 lets websites ask for access to serial ports. Setting the policy to 2 denies
access to serial ports.
You can override this policy for specific URL patterns by using the SerialAskForUrls and
SerialBlockedForUrls policies.
If you don't configure this policy, by default, websites can ask users whether they can access a serial
port, and users can change this setting.
BlockSerial (2) = Do not allow any site to request access to serial ports via the Serial API
AskSerial (3) = Allow sites to ask for user permission to access a serial port
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DefaultShareAdditionalOSRegionSetting
Supported versions:
Description
This policy controls the default value for the "share additional operating system region" setting in
Microsoft Edge.
The "share additional operating system region" Microsoft Edge setting controls whether the OS
Regional format setting will be shared with the web through the default JavaScript locale. If shared,
websites will be able to query the OS Regional format using JavaScript code, for example;
"Intl.DateTimeFormat().resolvedOptions().locale". The default value for the setting is "Limited".
If you set this policy to "Limited", the OS Regional format will only be shared if its language part
matches the Microsoft Edge display language.
If you set this policy to "Always", the OS Regional format will always be shared. This value could
cause unexpected website behavior if the OS Regional format language is different from the
Microsoft Edge display language. For example, if a website uses the JavaScript default locale to
format dates, the names of the days and months can be displayed in one language while the
surrounding text is displayed in another language.
If you set this policy to "Never", the OS Regional format will never be shared.
Example 1: In this example the OS Regional format is set to "en-GB" and the browser display
language is set to "en-US". Then the OS Regional format will be shared if the policy is set to
"Limited", or "Always".
Example 2: In this example the OS Regional format is set to "es-MX" and the browser display
language is set to "en-US". Then the OS Regional format will be shared if the policy is set to
"Always" but will not if the policy is set to "Limited".
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
DefinePreferredLanguages
Supported versions:
Description
Configures the language variants that Microsoft Edge sends to websites as part of the Accept-
Language request HTTP header and prevents users from adding, removing, or changing the order
of preferred languages in Microsoft Edge settings. Users who want to change the languages
Microsoft Edge displays in or offers to translate pages to will be limited to the languages
configured in this policy.
If you enable this policy, websites will appear in the first language in the list that they support
unless other site-specific logic is used to determine the display language. The language variants
defined in this policy override the languages configured as part of the SpellcheckLanguage policy.
If you don't configure or disable this policy, Microsoft Edge sends websites the user-specified
preferred languages as part of the Accept-Language request HTTP header.
Supported features:
Data Type:
String
Example value:
"en-US,fr,es"
XML
<string>en-US,fr,es</string>
Back to top
DelayNavigationsForInitialSiteListDownload
Require that the Enterprise Mode Site List is available before tab navigation
Supported versions:
On Windows since 84 or later
Description
Lets you specify whether Microsoft Edge tabs wait to navigate until the browser has downloaded
the initial Enterprise Mode Site List. This setting is intended for the scenario where the browser
home page should load in Internet Explorer mode, and it is important that is does so on browser
first run after IE mode is enabled. If this scenario does not exist, we recommend not enabling this
setting because it can negatively impact the performance of loading the home page. The setting
only applies when Microsoft Edge does not have a cached Enterprise Mode Site List, such as on
browser first run after IE mode is enabled.
This setting works in conjunction with: InternetExplorerIntegrationLevel is set to 'IEMode' and one
of either the InternetExplorerIntegrationSiteList or the InternetExplorerIntegrationCloudSiteList
policy where the list has at least one entry.
If you set this policy to 'All', when Microsoft Edge does not have a cached version of the Enterprise
Mode Site List, tabs delay navigating until the browser has downloaded the site list. Sites
configured to open in Internet Explorer mode by the site list will load in Internet Explorer mode,
even during the initial navigation of the browser. Sites that cannot possibly be configured to open
in Internet Explorer, such as any site with a scheme other than http:, https:, file:, or ftp: do not delay
navigating and load immediately in Edge mode.
If you set this policy to 'None' or don't configure it, when Microsoft Edge does not have a cached
version of the Enterprise Mode Site List, tabs will navigate immediately, and not wait for the
browser to download the Enterprise Mode Site List. Sites configured to open in Internet Explorer
mode by the site list will open in Microsoft Edge mode until the browser has finished downloading
the Enterprise Mode Site List.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
Back to top
DeleteDataOnMigration
Supported versions:
On Windows since 83 or later
Description
This policy determines whether user browsing data from Microsoft Edge Legacy will be deleted
after migrating to the Microsoft Edge version 81 or later.
If you set this policy to "Enabled", all browsing data from Microsoft Edge Legacy after migrating to
the Microsoft Edge version 81 or later will be deleted. This policy must be set before migrating to
the Microsoft Edge version 81 or later to have any effect on existing browsing data.
If you set this policy to "Disabled", or the policy is not configured, user browsing data isn't deleted
after migrating to the Microsoft Edge version 83 or later.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
DeveloperToolsAvailability
Description
If you set this policy to 'DeveloperToolsAllowed', users can access the developer tools and the
JavaScript console in all contexts, including extensions installed by enterprise policy.
If you set this policy to 'DeveloperToolsDisallowed', users can't access the developer tools or
inspect website elements. Keyboard shortcuts and menu or context menu entries that open the
developer tools or the JavaScript Console are disabled.
Supported features:
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DiagnosticData
Supported versions:
On Windows 7 and macOS since 86 or later
Description
This policy controls sending required and optional diagnostic data about browser usage to
Microsoft.
Required diagnostic data is collected keep Microsoft Edge secure, up to date and performing as
expected.
Optional diagnostic data includes data about how you use the browser, websites you visit and crash
reports to Microsoft for product and service improvement.
This policy is not supported on Windows 10 devices. To control this data collection on Windows 10,
IT admins must use the Windows diagnostic data group policy. This policy will either be 'Allow
Telemetry' or 'Allow Diagnostic Data', depending on the version of Windows. Learn more about
Windows 10 diagnostic data collection: https://go.microsoft.com/fwlink/?linkid=2099569
'Off' turns off required and optional diagnostic data collection. This option is not recommended.
'RequiredData' sends required diagnostic data but turns off optional diagnostic data collection.
Microsoft Edge will send required diagnostic data to keep Microsoft Edge secure, up to date and
performing as expected.
'OptionalData' sends optional diagnostic data includes data about browser usage, websites that are
visited, crash reports sent to Microsoft for product and service improvement.
On Windows 7/macOS, this policy controls sending required and optional data to Microsoft.
If you don't configure this policy or disable it, Microsoft Edge will default to the user's preference.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
DirectInvokeEnabled
Supported versions:
Description
Allow users to open files using the DirectInvoke protocol. The DirectInvoke protocol allows websites
to request that the browser open files from a specific URL using a specific file handler on the user's
computer or device.
If you enable or don't configure this policy, users can open files using the DirectInvoke protocol.
If you disable this policy, users can't open files using the DirectInvoke protocol. Instead, the file will
be saved to the file system.
Note: Disabling DirectInvoke may prevent certain Microsoft SharePoint Online features from
working as expected.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
Disable3DAPIs
Supported versions:
On Windows and macOS since 77 or later
Description
Prevent web pages from accessing the graphics processing unit (GPU). Specifically, web pages can't
access the WebGL API and plug-ins can't use the Pepper 3D API.
If you don't configure or disable this policy, it potentially allows web pages to use the WebGL API
and plug-ins to use the Pepper 3D API. Microsoft Edge might, by default, still require command line
arguments to be passed in order to use these APIs.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
DisableScreenshots
Supported versions:
Description
If you enable this policy, users can't take screenshots using keyboard shortcuts or extension APIs.
If you disable or don't configure this policy, users can take screenshots.
Note: Even if you disable screenshots using this policy, users might still be able to take screenshots
using Web Capture within the browser or other methods outside of the browser. For example, using
an operating system feature or another application.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
DiscoverPageContextEnabled
Supported versions:
Description
This policy controls Discover access to page contents for AAD profiles. Discover is an extension that
hosts Bing Chat. In order to summarize pages and interact with text selections, it needs to be able
to access the page contents. When enabled, page contents will be sent to Bing. This policy does not
affect MSA profiles.
If you enable or don't configure this policy, Discover will have access to page contents.
If you disable this policy, Discover will not be able to access page contents.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
DiskCacheDir
Supported versions:
On Windows and macOS since 77 or later
Description
Configures the directory to use to store cached files.
If you enable this policy, Microsoft Edge uses the provided directory regardless of whether the user
has specified the '--disk-cache-dir' flag. To avoid data loss or other unexpected errors, don't
configure this policy to a volume's root directory or to a directory used for other purposes, because
Microsoft Edge manages its contents.
If you don't configure this policy, the default cache directory is used, and users can override that
default with the '--disk-cache-dir' command line flag.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"${user_home}/Edge_cache"
XML
<string>${user_home}/Edge_cache</string>
Back to top
DiskCacheSize
Supported versions:
Description
Configures the size of the cache, in bytes, used to store files on the disk.
If you enable this policy, Microsoft Edge uses the provided cache size regardless of whether the
user has specified the '--disk-cache-size' flag. The value specified in this policy isn't a hard
boundary but rather a suggestion to the caching system; any value below a few megabytes is too
small and will be rounded up to a reasonable minimum.
If you set the value of this policy to 0, the default cache size is used, and users can't change it.
If you don't configure this policy, the default size is used, but users can override it with the '--disk-
cache-size' flag.
Note: The value specified in this policy is used as a hint to various cache subsystems in the browser.
The aggregate disk usage of all caches may therefore be larger than (but within the same order of
magnitude as) the value specified.
Supported features:
Data Type:
Integer
Example value:
0x06400000
XML
<integer>104857600</integer>
Back to top
DisplayCapturePermissionsPolicyEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 109.
Supported versions:
On Windows and macOS since 95, until 109
Description
This policy is obsolete. The policy was a temporary workaround for non-spec-compliant enterprise
applications.
This policy stopped working in Microsoft Edge 107 and was obsoleted in Microsoft Edge 110.
The display-capture permissions-policy gates access to getDisplayMedia(), as per this spec:
https://www.w3.org/TR/screen-capture/#feature-policy-integration However, if this policy is
Disabled, this requirement is not enforced, and getDisplayMedia() is allowed from contexts that
would otherwise be forbidden.
If you enable or don't configure this policy, sites can only call getDisplayMedia() from contexts
which are allowlisted by the display-capture permissions-policy.
If you disable this policy, sites can call getDisplayMedia() even from contexts which are not
allowlisted by the display-capture permissions policy. Note that other restrictions may still apply.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
DnsOverHttpsMode
Supported versions:
On Windows and macOS since 83 or later
Description
Control the mode of the DNS-over-HTTPS resolver. Note that this policy will only set the default
mode for each query. The mode can be overridden for special types of queries such as requests to
resolve a DNS-over-HTTPS server hostname.
The "automatic" mode will send DNS-over-HTTPS queries first if a DNS-over-HTTPS server is
available and may fallback to sending insecure queries on error.
The "secure" mode will only send DNS-over-HTTPS queries and will fail to resolve on error.
If you don't configure this policy, the browser might send DNS-over-HTTPS requests to a resolver
associated with the user's configured system resolver.
Data Type:
String
Example value:
"off"
XML
<string>off</string>
Back to top
DnsOverHttpsTemplates
Supported versions:
Description
The URI template of the desired DNS-over-HTTPS resolver. To specify multiple DNS-over-HTTPS
resolvers, separate the corresponding URI templates with spaces.
If you set DnsOverHttpsMode to "secure" then this policy must be set and cannot be empty.
If you set DnsOverHttpsMode to "automatic" and this policy is set then the URI templates specified
will be used. If you don't set this policy, then hardcoded mappings will be used to attempt to
upgrade the user's current DNS resolver to a DoH resolver operated by the same provider.
If the URI template contains a dns variable, requests to the resolver will use GET; otherwise requests
will use POST.
Supported features:
Data Type:
String
Example value:
"https://dns.example.net/dns-query{?dns}"
XML
<string>https://dns.example.net/dns-query{?dns}</string>
Back to top
DoNotSilentlyBlockProtocolsFromOrigins
Supported versions:
On Windows and macOS since 99 or later
Description
Allows you to create a list of protocols, and for each protocol an associated list of allowed origin
patterns. These origins won't be silently blocked from launching an external application by anti-
flood protection. The trailing separator shouldn't be included when listing the protocol. For
example, list "skype" instead of "skype:" or "skype://".
If you configure this policy, a protocol will only be permitted to bypass being silently blocked by
anti-flood protection if:
If either condition is false, the external protocol launch may be blocked by anti-flood protection.
If you don't configure this policy, no protocols can bypass being silently blocked.
The origin matching patterns use a similar format to those for the URLBlocklist policy, that are
documented at https://go.microsoft.com/fwlink/?linkid=2095322 .
However, origin matching patterns for this policy cannot contain "/path" or "@query" elements.
Any pattern that does contain a "/path" or "@query" element will be ignored.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\DoNotSilentlyBlockProtocolsFromOrigins = [
{
"allowed_origins": [
"example.com",
"http://www.example.com:8080"
],
"protocol": "spotify"
},
{
"allowed_origins": [
"https://example.com",
"https://.mail.example.com"
],
"protocol": "msteams"
},
{
"allowed_origins": [
"*"
],
"protocol": "msoutlook"
}
]
SOFTWARE\Policies\Microsoft\Edge\DoNotSilentlyBlockProtocolsFromOrigins =
[{"allowed_origins": ["example.com", "http://www.example.com:8080"], "protocol":
"spotify"}, {"allowed_origins": ["https://example.com", "https://.mail.example.com"],
"protocol": "msteams"}, {"allowed_origins": ["*"], "protocol": "msoutlook"}]
XML
<key>DoNotSilentlyBlockProtocolsFromOrigins</key>
<array>
<dict>
<key>allowed_origins</key>
<array>
<string>example.com</string>
<string>http://www.example.com:8080</string>
</array>
<key>protocol</key>
<string>spotify</string>
</dict>
<dict>
<key>allowed_origins</key>
<array>
<string>https://example.com</string>
<string>https://.mail.example.com</string>
</array>
<key>protocol</key>
<string>msteams</string>
</dict>
<dict>
<key>allowed_origins</key>
<array>
<string>*</string>
</array>
<key>protocol</key>
<string>msoutlook</string>
</dict>
</array>
Back to top
DoubleClickCloseTabEnabled
Supported versions:
On Windows and macOS since 104 or later
Description
This policy lets you configure the double click feature in Microsoft Edge.
Double Click lets users close a tab by double clicking the left mouse button.
If you enable or don't configure this policy, you can use the double click feature to close a tab on
Microsoft Edge to start using this feature.
If you disable this policy, you can't use the double click feature in Microsoft Edge.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
DownloadDirectory
Supported versions:
On Windows and macOS since 77 or later
Description
Configures the directory to use when downloading files.
If you enable this policy, Microsoft Edge uses the provided directory regardless of whether the user
has specified one or chosen to be prompted for download location every time. See
https://go.microsoft.com/fwlink/?linkid=2095041 for a list of variables that can be used.
If you disable or don't configure this policy, the default download directory is used, and the user
can change it.
If you set an invalid path, Microsoft Edge will default to the user's default download directory.
If the folder specified by the path doesn't exist, the download will trigger a prompt that asks the
user where they want to save their download.
Supported features:
Data Type:
String
Example value:
"\n Linux-based OSes (including Mac): /home/${user_name}/Downloads\n
Windows: C:\\Users\\${user_name}\\Downloads"
XML
<string>
Linux-based OSes (including Mac): /home/${user_name}/Downloads
Windows: C:\Users\${user_name}\Downloads</string>
Back to top
DownloadRestrictions
Supported versions:
Description
Configures the type of downloads that Microsoft Edge completely blocks, without letting users
override the security decision.
Set 'BlockDangerousDownloads' to allow all downloads except for those that carry Microsoft
Defender SmartScreen warnings of known dangerous downloads or that have dangerous file type
extensions.
Set 'BlockPotentiallyDangerousDownloads' to allow all downloads except for those that carry
Microsoft Defender SmartScreen warnings of potentially dangerous or unwanted downloads or that
have dangerous file type extensions.
Set 'BlockMaliciousDownloads' to allow all downloads except for those that carry Microsoft
Defender SmartScreen warnings of known malicious downloads.
If you don't configure this policy or set the 'DefaultDownloadSecurity' option, the downloads go
through the usual security restrictions based on Microsoft Defender SmartScreen analysis results.
Note that these restrictions apply to downloads from web page content, as well as the 'download
link...' context menu option. These restrictions don't apply to saving or downloading the currently
displayed page, nor do they apply to the Save as PDF option from the printing options.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
EdgeAssetDeliveryServiceEnabled
Supported versions:
Description
The Asset Delivery Service is a general pipeline used to deliver assets to the Microsoft Edge Clients.
These assets can be config files or Machine Learning models that power the features that use this
service.
If you enable or don't configure this policy, features can download assets from the Asset Delivery
Service.
If you disable this policy, features won't be able to download assets needed for them to run
correctly.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
EdgeCollectionsEnabled
Supported versions:
Description
Lets you allow users to access the Collections feature, where they can collect, organize, share, and
export content more efficiently and with Office integration.
If you enable or don't configure this policy, users can access and use the Collections feature in
Microsoft Edge.
If you disable this policy, users can't access and use Collections in Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EdgeDiscoverEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 105.
Supported versions:
On Windows and macOS since 97, until 105
Description
This policy doesn't work because Discover is now contained within the Edge Sidebar and can be
managed using the HubsSidebarEnabled policy.
This policy lets you configure the Discover feature in Microsoft Edge.
Working in the background when enabled, this feature sends URLs to Microsoft Bing to search for
related recommendations.
If you enable or don't configure this policy, you can use the Discover button on Microsoft Edge to
start using this feature.
If you disable this policy, you can't use the Discover feature in Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EdgeEDropEnabled
Supported versions:
On Windows and macOS since 104 or later
Description
This policy lets you configure the Drop feature in Microsoft Edge.
If you enable or don't configure this policy, you can use the Drop feature in Microsoft Edge.
If you disable this policy, you can't use the Drop feature in Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EdgeEnhanceImagesEnabled
Supported versions:
On Windows and macOS since 97 or later
Description
Set whether Microsoft Edge can automatically enhance images to show you sharper images with
better color, lighting, and contrast.
If you enable this policy or don't configure the policy, Microsoft Edge will automatically enhance
images on specific web applications.
If you disable this policy, Microsoft Edge will not enhance images.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EdgeFollowEnabled
Description
Allows the Microsoft Edge browser to enable Follow service and apply it to users.
Users can use the Follow an influencer, site, or topic in Microsoft Edge..
If you enable or don't configure this policy, Follow in Microsoft Edge can be applied.
If you disable this policy, Microsoft Edge will not communicate with Follow service to provide the
follow feature.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EdgeShoppingAssistantEnabled
Supported versions:
On Windows and macOS since 87 or later
Description
This policy lets users compare the prices of a product they are looking at, get coupons or rebates
from the website they're on, auto-apply coupons and help checkout faster using autofill data.
If you enable or don't configure this policy, shopping features such as price comparison, coupons,
rebates and express checkout will be automatically applied for retail domains. Coupons for the
current retailer and prices from other retailers will be fetched from a server.
If you disable this policy shopping features such as price comparison, coupons, rebates and express
checkout will not be automatically found for retail domains.
Starting in version 90.0.818.56, the behavior of the messaging letting users know that there is a
coupon, rebate, price comparison or price history available on shopping domains is also done
through a horizontal banner below the address bar. Previously this messaging was done on the
address bar.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EdgeWalletCheckoutEnabled
Enable Wallet Checkout feature
Supported versions:
Description
Enables Wallet Checkout feature in Microsoft Edge.
If you enable or don't configure this policy, users can choose whether to use wallet checkout while
shopping on Microsoft Edge.
If you disable this policy, users can't use wallet checkout while shopping on Microsoft Edge.
Supported features:
Data Type:
Boolean
0x00000001
Back to top
EdgeWalletEtreeEnabled
Supported versions:
Description
The Edge Wallet E-Tree feature in Microsoft Edge allows users to plant a E-Tree for their own.
If you enable or don't configure this policy, users can use the Edge Wallet E-Tree feature.
If you disable this policy, users can't use the Edge Wallet E-Tree feature.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EditFavoritesEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Enable this policy to let users add, remove, and modify favorites. This is the default behavior if you
don't configure the policy.
Disable this policy to stop users from adding, removing, or modifying favorites. They can still use
existing favorites.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
EnableDeprecatedWebPlatformFeatures
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 86.
Supported versions:
Description
This policy is obsolete because dedicated web platform policies are now used to manage individual
web platform feature deprecations.
This policy lets you re-enable deprecated web platform features for a limited time. Features are
identified by a string tag.
If you don't configure this policy, if the list is empty, or if a feature doesn't match one of the
supported string tags, all deprecated web platform features remain disabled.
While the policy itself is supported on the above platforms, the feature it's enabling might not be
available on all of those platforms. Not all deprecated Web Platform features can be re-enabled.
Only those explicitly listed below can be re-enabled, and only for a limited period of time, which
differs per feature. You can review the intent behind the Web Platform feature changes at
https://bit.ly/blinkintents .
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\EnableDeprecatedWebPlatformFeatures
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\EnableDeprecatedWebPlatformFeatures\1 =
"ExampleDeprecatedFeature_EffectiveUntil20080902"
XML
<array>
<string>ExampleDeprecatedFeature_EffectiveUntil20080902</string>
</array>
Back to top
EnableDomainActionsDownload
Supported versions:
On Windows and macOS since 77, until 84
Description
This policy doesn't work because conflicting states should be avoided. This policy was used to
enable/disable download of the domain actions list, but it didn't always achieve the desired state.
The Experimentation and Configuration Service, which handles the download, has its own policy to
configure what is downloaded from the service. Use the
ExperimentationAndConfigurationServiceControl policy instead.
In Microsoft Edge, Domain Actions represent a series of compatibility features that help the
browser work correctly on the web.
Microsoft keeps a list of actions to take on certain domains for compatibility reasons. For example,
the browser may override the User Agent string on a website if that website is broken due to the
new User Agent string on Microsoft Edge. Each of these actions is intended to be temporary while
Microsoft tries to resolve the issue with the site owner.
When the browser starts up and then periodically afterwards, the browser will contact the
Experimentation and Configuration Service that contains the most up to date list of compatibility
actions to perform. This list is saved locally after it is first retrieved so that subsequent requests will
only update the list if the server's copy has changed.
If you enable this policy, the list of Domain Actions will continue to be downloaded from the
Experimentation and Configuration Service.
If you disable this policy, the list of Domain Actions will no longer be downloaded from the
Experimentation and Configuration Service.
If you don't configure this policy, the list of Domain Actions will continue to be downloaded from
the Experimentation and Configuration Service.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
EnableOnlineRevocationChecks
Supported versions:
On Windows and macOS since 77 or later
Description
Online revocation checks don't provide a significant security benefit and are disabled by default.
If you enable this policy, Microsoft Edge will perform soft-fail, online OCSP/CRL checks. "Soft fail"
means that if the revocation server can't be reached, the certificate will be considered valid.
If you disable the policy or don't configure it, Microsoft Edge won't perform online revocation
checks.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
EnableSha1ForLocalAnchors
Allow certificates signed using SHA-1 when issued by local trust anchors
(obsolete)
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 91.
Supported versions:
Description
When this setting is enabled, Microsoft Edge allows connections secured by SHA-1 signed
certificates so long as the the certificate chains to a locally-installed root certificate and is otherwise
valid.
Note that this policy depends on the operating system (OS) certificate verification stack allowing
SHA-1 signatures. If an OS update changes the OS handling of SHA-1 certificates, this policy might
no longer have effect. Further, this policy is intended as a temporary workaround to give
enterprises more time to move away from SHA-1. This policy will be removed in Microsoft Edge 92
releasing in mid 2021.
If you don't set this policy or set it to false, or the SHA-1 certificate chains to a publicly trusted
certificate root, then Microsoft Edge won't allow certificates signed by SHA-1.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
EncryptedClientHelloEnabled
Supported versions:
On Windows and macOS since 108 or later
Description
Encrypted ClientHello (ECH) is an extension to TLS that encrypts the sensitive fields of ClientHello to
improve privacy.
If ECH is enabled, Microsoft Edge might or might not use ECH depending on server support, the
availability of the HTTPS DNS record, or the rollout status.
If you enable or do not configure this policy, Microsoft Edge will follow the default rollout process
for ECH.
As such, this policy is a temporary measure to control the initial experimental implementation. It
will be replaced with final controls as the protocol finalizes.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EnforceLocalAnchorConstraintsEnabled
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
X.509 certificates may encode constraints, such as Name Constraints, in extensions in the certificate.
RFC 5280 specifies that enforcing such constraints on trust anchor certificates is optional.
Starting in Microsoft Edge 112, such constraints in certificates loaded from the platform certificate
store will now be enforced.
This policy exists as a temporary opt-out in case an enterprise encounters issues with the
constraints encoded in their private roots. In that case this policy may be used to temporarily
disable enforcement of the constraints while correcting the certificate issues.
If you enable this policy or don't configure it, Microsoft Edge will enforce constraints encoded into
trust anchors loaded from the platform trust store.
If you disable this policy, Microsoft Edge will not enforce constraints encoded into trust anchors
loaded from the platform trust store.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Mac information and settings
Preference Key Name: EnforceLocalAnchorConstraintsEnabled
Example value:
XML
<false/>
Back to top
EnhanceSecurityMode
Supported versions:
On Windows and macOS since 98 or later
Description
This policy lets you enhance the security state in Microsoft Edge.
If you set this policy to 'StandardMode', the enhanced mode will be turned off and Microsoft Edge
will fallback to its standard security mode.
If you set this policy to 'BalancedMode', the security state will be in balanced mode.
If you set this policy to 'StrictMode', the security state will be in strict mode.
If you set this policy to 'BasicMode', the security state will be in basic mode.
Note: Sites that use WebAssembly (WASM) are not supported on 32-bit systems when
EnhanceSecurityMode is enabled. If you require access to a site that uses WASM, consider adding it
to your exception list as described in https://go.microsoft.com/fwlink/?linkid=2183321 .
Starting in Microsoft Edge 113, 'BasicMode' is deprecated and is treated the same as
'BalancedMode'. It won't work in Microsoft Edge version 116.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
EnhanceSecurityModeBypassIntranet
Supported versions:
On Windows since 107 or later
Description
Microsoft Edge will apply Enhanced Security Mode on Intranet zone sites by default. This may lead
to Intranet zone sites acting in an unexpected manner.
If you enable this policy, Microsoft Edge won't apply Enhanced Security Mode on Intranet zone
sites.
If you disable or don't configure this policy, Microsoft Edge will apply Enhanced Security Mode on
Intranet zone sites.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
EnhanceSecurityModeBypassListDomains
Configure the list of domains for which enhance security mode will not be
enforced
Supported versions:
On Windows and macOS since 98 or later
Description
Configure the list of enhance security trusted domains. This means that enhance security mode will
not be enforced when loading the sites in trusted domains.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Windows information and settings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\EnhanceSecurityModeBypassListDomains
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\EnhanceSecurityModeBypassListDomains\1 =
"mydomain.com"
SOFTWARE\Policies\Microsoft\Edge\EnhanceSecurityModeBypassListDomains\2 =
"myuniversity.edu"
XML
<array>
<string>mydomain.com</string>
<string>myuniversity.edu</string>
</array>
Back to top
EnhanceSecurityModeEnforceListDomains
Configure the list of domains for which enhance security mode will always
be enforced
Supported versions:
On Windows and macOS since 98 or later
Description
Configure the list of enhance security untrusted domains. This means that enhance security mode
will always be enforced when loading the sites in untrusted domains.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\EnhanceSecurityModeEnforceListDomains
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\EnhanceSecurityModeEnforceListDomains\1 =
"mydomain.com"
SOFTWARE\Policies\Microsoft\Edge\EnhanceSecurityModeEnforceListDomains\2 =
"myuniversity.edu"
XML
<array>
<string>mydomain.com</string>
<string>myuniversity.edu</string>
</array>
Back to top
EnhanceSecurityModeIndicatorUIEnabled
Supported versions:
On Windows and macOS since 115 or later
Description
This policy lets you manage whether the indicator User Interface (UI) for enhanced security mode is
shown or not when ESM is turned on.
Note: If this policy is used, only the indicator User Interface experience is supressed - ESM is still
turned on. For more information, see the EnhanceSecurityMode policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EnhanceSecurityModeOptOutUXEnabled
Supported versions:
On Windows and macOS since 115 or later
Description
This policy lets you manage whether the opt-out user experience for enhanced security mode is
presented when ESM is turned on for Microsoft Edge.
If you enable or don't configure this policy, the UI for the opt-out user experience is on.
If you disable this policy, the UI for the opt-out user experience is off.
Note: If this policy is used, only the User Interface for the opt-out experience is supressed - ESM is
still turned on. For more information, see the EnhanceSecurityMode policy.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EnterpriseHardwarePlatformAPIEnabled
Supported versions:
On Windows and macOS since 78 or later
Description
When this policy is set to enabled, extensions installed by enterprise policy are allowed to use the
Enterprise Hardware Platform API. When this policy is set to disabled or isn't set, no extensions are
allowed to use the Enterprise Hardware Platform API. This policy also applies to component
extensions.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
EnterpriseModeSiteListManagerAllowed
Allow access to the Enterprise Mode Site List Manager tool
Supported versions:
Description
Allows you to set whether Enterprise Mode Site List Manager is available to users.
If you enable this policy, users can see the Enterprise Mode Site List Manager nav button on
edge://compat page, navigate to the tool and use it.
If you disable or don't configure this policy, users won't see the Enterprise Mode Site List Manager
nav button and won't be able to use it.
Supported features:
Data Type:
Boolean
0x00000000
Back to top
EventPathEnabled
Re-enable the Event.path API until Microsoft Edge version 115 (obsolete)
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 115.
Supported versions:
On Windows and macOS since 107, until 115
Description
Starting in Microsoft Edge version 109, the non-standard API Event.path will be removed to
improve web compatibility. This policy re-enables the API until version 115.
If this policy is not set, the Event.path API will be in the following default states: available before
version 109, and unavailable in version 109 to version 114.
This policy will be made obsolete after Microsoft Edge version 115.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
Disable download file type extension-based warnings for specified file types
on domains (obsolete)
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 109.
Supported versions:
On Windows and macOS since 85, until 109
Description
This policy has been obsoleted in favor of ExemptFileTypeDownloadWarnings because of a type
mismatch that caused errors in Mac.
You can enable this policy to create a dictionary of file type extensions with a corresponding list of
domains that will be exempted from file type extension-based download warnings. This lets
enterprise administrators block file type extension-based download warnings for files that are
associated with a listed domain. For example, if the "jnlp" extension is associated with
"website1.com", users would not see a warning when downloading "jnlp" files from "website1.com",
but see a download warning when downloading "jnlp" files from "website2.com".
Files with file type extensions specified for domains identified by this policy will still be subject to
non-file type extension-based security warnings such as mixed-content download warnings and
Microsoft Defender SmartScreen warnings.
If you disable this policy or don't configure it, file types that trigger extension-based download
warnings will show warnings to the user.
Example:
The following example value would prevent file type extension-based download warnings on swf,
exe, and jnlp extensions for *.contoso.com domains. It will show the user a file type extension-
based download warning on any other domain for exe and jnlp files, but not for swf files.
Note that while the preceding example shows the suppression of file type extension-based
download warnings for "swf" files for all domains, applying suppression of such warnings for all
domains for any dangerous file type extension is not recommended due to security concerns. It is
shown in the example merely to demonstrate the ability to do so.
Supported features:
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
\1 = {"domains": ["https://contoso.com", "contoso2.com"], "file_extension": "jnlp"}
SOFTWARE\Policies\Microsoft\Edge\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
\2 = {"domains": ["*"], "file_extension": "swf"}
XML
<array>
<string>{'domains': ['https://contoso.com', 'contoso2.com'], 'file_extension':
'jnlp'}</string>
<string>{'domains': ['*'], 'file_extension': 'swf'}</string>
</array>
Back to top
ExemptFileTypeDownloadWarnings
Disable download file type extension-based warnings for specified file types
on domains
Supported versions:
On Windows and macOS since 105 or later
Description
You can enable this policy to create a dictionary of file type extensions with a corresponding list of
domains that will be exempted from file type extension-based download warnings. This lets
enterprise administrators block file type extension-based download warnings for files that are
associated with a listed domain. For example, if the "jnlp" extension is associated with
"website1.com", users would not see a warning when downloading "jnlp" files from "website1.com",
but see a download warning when downloading "jnlp" files from "website2.com".
Files with file type extensions specified for domains identified by this policy will still be subject to
non-file type extension-based security warnings such as mixed-content download warnings and
Microsoft Defender SmartScreen warnings.
If you disable this policy or don't configure it, file types that trigger extension-based download
warnings will show warnings to the user.
Example:
The following example value would prevent file type extension-based download warnings on swf,
exe, and jnlp extensions for *.contoso.com domains. It will show the user a file type extension-
based download warning on any other domain for exe and jnlp files, but not for swf files.
Note that while the preceding example shows the suppression of file type extension-based
download warnings for "swf" files for all domains, applying suppression of such warnings for all
domains for any dangerous file type extension is not recommended due to security concerns. It is
shown in the example merely to demonstrate the ability to do so.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExemptFileTypeDownloadWarnings = [
{
"domains": [
"https://contoso.com",
"contoso2.com"
],
"file_extension": "jnlp"
},
{
"domains": [
"*"
],
"file_extension": "swf"
}
]
SOFTWARE\Policies\Microsoft\Edge\ExemptFileTypeDownloadWarnings = [{"domains":
["https://contoso.com", "contoso2.com"], "file_extension": "jnlp"}, {"domains": ["*"],
"file_extension": "swf"}]
XML
<key>ExemptFileTypeDownloadWarnings</key>
<array>
<dict>
<key>domains</key>
<array>
<string>https://contoso.com</string>
<string>contoso2.com</string>
</array>
<key>file_extension</key>
<string>jnlp</string>
</dict>
<dict>
<key>domains</key>
<array>
<string>*</string>
</array>
<key>file_extension</key>
<string>swf</string>
</dict>
</array>
Back to top
ExperimentationAndConfigurationServiceControl
Supported versions:
Configuration payload consists of a list of recommended settings that Microsoft wants to deploy to
optimize the user experience.
Configuration payload may also contain a list of actions to take on certain domains for
compatibility reasons. For example, the browser may override the User Agent string on a website if
that website is broken. Each of these actions is intended to be temporary while Microsoft tries to
resolve the issue with the site owner.
If you set this policy to 'FullMode', the full payload is downloaded from the Experimentation and
Configuration Service. This includes both the experimentation and configuration payloads.
If you set this policy to 'ConfigurationsOnlyMode', only the configuration payload is downloaded.
If you set this policy to 'RestrictedMode', the communication with the Experimentation and
Configuration Service is stopped completely. Microsoft does not recommend this setting.
If you don't configure this policy on a managed device, the behavior on Beta and Stable channels is
the same as the 'ConfigurationsOnlyMode'. On Canary and Dev channels the behavior is the same
as 'FullMode'.
If you don't configure this policy on an unmanaged device, the behavior is the same as the
'FullMode'.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
ExplicitlyAllowedNetworkPorts
Supported versions:
On Windows and macOS since 91 or later
Description
There is a list of restricted ports built into Microsoft Edge. Connections to these ports will fail. This
policy allows bypassing that list. The set of ports is defined as a comma-separated list that
outgoing connections should be permitted on.
Ports are restricted to prevent Microsoft Edge from being used as a vector to exploit various
network vulnerabilities. Setting this policy may expose your network to attacks. This policy is
intended as a temporary workaround for error code "ERR_UNSAFE_PORT" while migrating a service
running on a blocked port to a standard port (for example port 80 or 443).
Malicious websites can easily detect that this policy is set, and for which ports, then use that
information to target attacks.
Each port listed in this policy is labeled with a date that it can be unblocked until. After that date
the port will be restricted regardless of if it's specified by the value of this policy.
Leaving the value empty or unset means that all restricted ports will be blocked. Invalid port values
set through this policy will be ignored while valid ones will still be applied.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Windows information and settings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ExplicitlyAllowedNetworkPorts\1 = "10080"
XML
<array>
<string>10080</string>
</array>
Back to top
ExternalProtocolDialogShowAlwaysOpenCheckbox
Supported versions:
On Windows and macOS since 79 or later
Description
This policy controls whether the "Always allow this site to open links of this type" checkbox is
shown on external protocol launch confirmation prompts. This policy only applies to https:// links.
If you enable this policy, when an external protocol confirmation prompt is shown, the user can
select "Always allow" to skip all future confirmation prompts for the protocol on this site.
If you disable this policy, the "Always allow" checkbox isn't displayed. The user will be prompted for
confirmation every time an external protocol is invoked.
Prior to Microsoft Edge 83, if you don't configure this policy, the "Always allow" checkbox isn't
displayed. The user will be prompted for confirmation every time an external protocol is invoked.
On Microsoft Edge 83, if you don't configure this policy, the checkbox visibility is controlled by the
"Enable remembering protocol launch prompting preferences" flag in edge://flags
As of Microsoft Edge 84, if you don't configure this policy, when an external protocol confirmation
prompt is shown, the user can select "Always allow" to skip all future confirmation prompts for the
protocol on this site.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
FamilySafetySettingsEnabled
Supported versions:
On Windows and macOS since 83 or later
Description
This policy disables two family safety related features in the browser. This will hide the Family page
inside Settings and navigation to edge://settings/family will be blocked. The family settings page
describes what features are available with family groups with Microsoft Family Safety. Learn more
about Family Safety here: (https://go.microsoft.com/fwlink/?linkid=2098432 ). Starting in
Microsoft Edge 90, this policy also disables Kids Mode, a kid friendly browsing mode with custom
themes and allow list browsing that requires the device password to exit. Learn more about Kids
Mode here: (https://go.microsoft.com/fwlink/?linkid=2146910 )
If you enable this policy or don't configure it, the family page in Settings will be shown and Kids
Mode will be available.
If you disable this policy, the family page will not be shown, and Kids Mode will be hidden.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
FavoritesBarEnabled
Supported versions:
Description
If you enable this policy, users will see the favorites bar.
If you disable this policy, users won't see the favorites bar.
If this policy is not configured, then the user can decide to use the favorites bar or not.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
FetchKeepaliveDurationSecondsOnShutdown
Supported versions:
On Windows and macOS since 90 or later
Description
Controls the duration (in seconds) that keepalive requests are allowed to prevent the browser from
completing its shutdown.
If you configure this policy, the browser will block completing shutdown while it processes any
outstanding keepalive requests (see https://fetch.spec.whatwg.org/#request-keepalive-flag ) up to
the maximum period of time specified by this policy.
If you disable or don't configure this policy, the default value of 0 seconds is used and outstanding
keepalive requests will be immediately cancelled during browser shutdown.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
ForceBingSafeSearch
Description
Ensure that queries in Bing web search are done with SafeSearch set to the value specified. Users
can't change this setting.
If you configure this policy to 'BingSafeSearchStrictMode', the strict setting in SafeSearch is used.
The strict setting filters adult text, images, and videos.
If you disable this policy or don't configure it, SafeSearch in Bing search isn't enforced, and users
can set the value they want on bing.com.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
ForceCertificatePromptsOnMultipleMatches
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 81 or later
Description
This policy is deprecated because we are moving to a new policy. It won't work in Microsoft Edge
version 104. The new policy to use is PromptOnMultipleMatchingCertificates.
Toggles whether users are prompted to select a certificate if there are multiple certificates available
and a site is configured with AutoSelectCertificateForUrls. If you don't configure
AutoSelectCertificateForUrls for a site, the user will always be prompted to select a certificate.
If you set this policy to True, Microsoft Edge will prompt a user to select a certificate for sites on the
list defined in AutoSelectCertificateForUrls if and only if there is more than one certificate.
If you set this policy to False or don't configure it, Microsoft Edge will automatically select a
certificate even if there are multiple matches for a certificate. The user will not be prompted to
select a certificate for sites on the list defined in AutoSelectCertificateForUrls.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
ForceEphemeralProfiles
Supported versions:
On Windows and macOS since 77 or later
Description
Controls whether user profiles are switched to ephemeral mode. An ephemeral profile is created
when a session begins, is deleted when the session ends, and is associated with the user's original
profile.
If you enable this policy, profiles run in ephemeral mode. This lets users work from their own
devices without saving browsing data to those devices. If you enable this policy as an OS policy (by
using GPO on Windows, for example), it applies to every profile on the system.
If you disable this policy or don't configure it, users get their regular profiles when they sign in to
the browser.
In ephemeral mode, profile data is saved on disk only for the length of the user session. Features
like browser history, extensions and their data, web data like cookies, and web databases aren't
saved after the browser is closed. This doesn't prevent a user from manually downloading any data
to disk, or from saving pages or printing them. If the user has enabled sync, all data is preserved in
their sync accounts just like with regular profiles. Users can also use InPrivate browsing in
ephemeral mode unless you explicitly disable this.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ForceGoogleSafeSearch
Supported versions:
Description
Forces queries in Google Web Search to be performed with SafeSearch set to active, and prevents
users from changing this setting.
If you disable this policy or don't configure it, SafeSearch in Google Search isn't enforced.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ForceLegacyDefaultReferrerPolicy
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 88.
Supported versions:
Description
This policy doesn't work because it was only intended to be a short-term mechanism to give
enterprises more time to update their web content if it was found to be incompatible with the new
default referrer policy.
Microsoft Edge's default referrer policy was strengthened from the value of no-referrer-when-
downgrade to the more secure strict-origin-when-cross-origin.
When this enterprise policy is enabled, Microsoft Edge's default referrer policy will be set to its old
value of no-referrer-when-downgrade.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ForceMajorVersionToMinorPositionInUserAgent
Supported versions:
Description
This policy controls whether the User-Agent string major version should be frozen at 99.
The User-Agent request header lets websites identify the application, operating system, vendor,
and/or version of the requesting user agent. Some websites make assumptions about how this
header is formatted and may encounter issues with version strings that include three digits in the
major position (for example, 100.0.0.0).
Setting the policy to 'Default' or leaving it unset will default to browser settings for the User-Agent
string major version. If set to 'ForceEnabled', the User-Agent string will always report the major
version as 99 and include the browser's major version in the minor position. For example, browser
version 101.0.0.0 would send a User-Agent request header that reports version 99.101.0.0. If set to
'ForceDisabled', the User-Agent string will not freeze the major version.
This policy is temporary and will be deprecated in the future. Note that if this policy and User-
Agent Reduction are both enabled, the User-Agent version string will always be 99.0.0.0.
ForceDisabled (1) = The User-Agent string will not freeze the major version.
ForceEnabled (2) = The User-Agent string will freeze the major version as 99 and include the
browser's major version in the minor position.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
ForceNetworkInProcess
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 83.
Supported versions:
On Windows since 78, until 83
Description
This policy doesn't work because it was only intended to be a short-term mechanism to give
enterprises more time to migrate to 3rd party software that doesn't depend on hooking networking
APIs. Proxy servers are recommended over LSPs and Win32 API patching.
This policy is disabled by default. If enabled, users are open to security issues when the networking
process is sandboxed.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
ForceSync
Force synchronization of browser data and do not show the sync consent
prompt
Supported versions:
Description
Forces data synchronization in Microsoft Edge. This policy also prevents the user from turning sync
off.
If you don't configure this policy, users will be able to turn sync on or off. If you enable this policy,
users will not be able to turn sync off.
For this policy to work as intended, BrowserSignin policy must not be configured, or must be set to
enabled. If BrowserSignin is set to disabled, then ForceSync will not take affect.
SyncDisabled must not be configured or must be set to False. If this is set to True, ForceSync will not
take affect. If you wish to ensure specific datatypes sync or do not sync, use the ForceSyncTypes
policy and SyncTypesListDisabled policy.
0 = Do not automatically start sync and show the sync consent (default) 1 = Force sync to be
turned on for Azure AD/Azure AD-Degraded user profile and do not show the sync consent prompt
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ForceSyncTypes
Supported versions:
Description
If you enable this policy all the specified data types will be included for synchronization for Azure
AD/Azure AD-Degraded user profiles. This policy can be used to ensure the type of data uploaded
to the Microsoft Edge synchronization service.
You can provide one of the following data types for this policy: "favorites", "settings", "passwords",
"addressesAndMore", "extensions", "history", "openTabs", "edgeWallet", and "collections". The
"apps" data type will be supported starting in Microsoft Edge version 100. Note that these data
type names are case sensitive.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\ForceSyncTypes\1 = "favorites"
Mac information and settings
Preference Key Name: ForceSyncTypes
Example value:
XML
<array>
<string>favorites</string>
</array>
Back to top
ForceYouTubeRestrict
Supported versions:
On Windows and macOS since 77 or later
Description
Enforces a minimum Restricted Mode on YouTube and prevents users from picking a less restricted
mode.
Set to 'Moderate' to enforce the user to only use Moderate Restricted Mode and Strict Restricted
Mode on YouTube. They can't disable Restricted Mode.
Set to 'Off' or don't configure this policy to not enforce Restricted Mode on YouTube. External
policies such as YouTube policies might still enforce Restricted Mode.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
FullscreenAllowed
Allow full screen mode
Supported versions:
Description
Set the availability of full screen mode - all Microsoft Edge UI is hidden and only web content is
visible.
If you enable this policy or don't configure it, the user, apps, and extensions with appropriate
permissions can enter full screen mode.
If you disable this policy, users, apps, and extensions can't enter full screen mode.
Opening Microsoft Edge in kiosk mode using the command line is unavailable when full screen
mode is disabled.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
GloballyScopeHTTPAuthCacheEnabled
Supported versions:
Description
This policy configures a single global per profile cache with HTTP server authentication credentials.
If you disable or don't set this policy, the browser will use the default behavior of cross-site auth,
which as of version 80, will be to scope HTTP server authentication credentials by top-level site. So,
if two sites use resources from the same authenticating domain, credentials will need to be
provided independently in the context of both sites. Cached proxy credentials will be reused across
sites.
If you enable this policy HTTP auth credentials entered in the context of one site will automatically
be used in the context of another site.
Enabling this policy leaves sites open to some types of cross-site attacks, and allows users to be
tracked across sites even without cookies by adding entries to the HTTP auth cache using
credentials embedded in URLs.
This policy is intended to give enterprises depending on the legacy behavior a chance to update
their login procedures and will be removed in the future.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
GoToIntranetSiteForSingleWordEntryInAddressBar
Supported versions:
On Windows and macOS since 78 or later
Description
If you enable this policy, the top auto-suggest result in the address bar suggestion list will navigate
to intranet sites if the text entered in the address bar is a single word without punctuation.
Default navigation when typing a single word without punctuation will conduct a navigation to an
intranet site matching the entered text.
If you enable this policy, the second auto-suggest result in the address bar suggestion list will
conduct a web search exactly as it was entered, provided that this text is a single word without
punctuation. The default search provider will be used unless a policy to prevent web search is also
enabled.
Navigation to sites in response to single word queries that would typically resolve to a history item
will no longer happen. Instead, the browser will attempt navigate to internal sites that may not exist
in an organization's intranet. This will result in a 404 error.
Popular, single-word search terms will require manual selection of search suggestions to properly
conduct a search.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
HSTSPolicyBypassList
Configure the list of names that will bypass the HSTS policy check
Supported versions:
Description
Setting the policy specifies a list of hostnames that bypass preloaded HSTS upgrades from http to
https.
Only single-label hostnames are allowed in this policy, and this policy only applies to static HSTS-
preloaded entries (for example, "app", "new", "search", "play"). This policy does not prevent HSTS
upgrades for servers that have dynamically requested HSTS upgrades using a Strict-Transport-
Security response header.
Supplied hostnames must be canonicalized: Any IDNs must be converted to their A-label format,
and all ASCII letters must be lowercase. This policy only applies to the specific single-label
hostnames specified, not to subdomains of those names.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\HSTSPolicyBypassList\1 = "meet"
XML
<array>
<string>meet</string>
</array>
Back to top
HardwareAccelerationModeEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies whether to use hardware acceleration if it's available. If you enable this policy or don't
configure it, hardware acceleration is enabled unless a GPU feature is explicitly blocked.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
HeadlessModeEnabled
Supported versions:
On Windows and macOS since 92 or later
Description
This policy setting lets you decide whether users can launch Microsoft Edge in headless mode.
If you enable or don't configure this policy, Microsoft Edge allows use of the headless mode.
If you disable this policy, Microsoft Edge denies use of the headless mode.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
HideFirstRunExperience
Supported versions:
On Windows and macOS since 80 or later
Description
If you enable this policy, the First-run experience and the splash screen will not be shown to users
when they run Microsoft Edge for the first time.
For the configuration options shown in the First Run Experience, the browser will default to the
following:
-On the New Tab Page, the feed type will be set to MSN News and the layout to Inspirational.
-The user will still be automatically signed into Microsoft Edge if the Windows account is of Azure
AD or MSA type.
-Sync will not be enabled by default and users will be prompted to choose whether they'd like to
sync on browser startup. You can use the ForceSync or the SyncDisabled policy to configure sync
and the sync consent prompt.
If you disable or don't configure this policy, the First-run experience and the Splash screen will be
shown.
Note: The specific configuration options shown to the user in the First Run Experience, can also be
managed by using other specific policies. You can use the HideFirstRunExperience policy in
combination with these policies to configure a specific browser experience on your managed
devices. Some of these other policies are:
-AutoImportAtFirstRun
-NewTabPageLocation
-NewTabPageSetFeedType
-ForceSync
-SyncDisabled
-BrowserSignin
-NonRemovableProfileEnabled
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
HideInternetExplorerRedirectUXForIncompatibleSitesEnabled
Hide the one-time redirection dialog and the banner on Microsoft Edge
Supported versions:
On Windows since 87 or later
Description
This policy gives an option to disable one-time redirection dialog and the banner. When this policy
is enabled, users will not see both the one-time dialog and the banner. Users will continue to be
redirected to Microsoft Edge when they encounter an incompatible website on Internet Explorer,
but their browsing data will not be imported.
If you enable this policy the one-time redirection dialog and banner will never be shown to
users. Users' browsing data will not be imported when a redirection happens.
If you disable or don't set this policy, the redirection dialog will be shown on the first
redirection and the persistent redirection banner will be shown to users on sessions that begin
with a redirection. Users' browsing data will be imported every time user encounters such
redirection (ONLY IF user consents to it on the one-time dialog).
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
0x00000001
Back to top
HideRestoreDialogEnabled
Supported versions:
Description
This policy gives an option to hide the "Restore pages" dialog after Microsoft Edge has crashed. The
"Restore pages" dialog gives users the option to restore the pages that were previously open
before Microsoft Edge crashed.
If you enable this policy, the "Restore pages" dialog will not be shown. In the event of a crash,
Microsoft Edge will not restore previous tabs and will start the session with a new tab page.
If you disable or don't set this policy, the "Restore pages" dialog will be shown.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
HubsSidebarEnabled
Supported versions:
Description
If you enable or don't configure this policy, the Sidebar will be shown. If you disable this policy, the
Sidebar will never be shown.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportAutofillFormData
Supported versions:
On Windows and macOS since 77 or later
Description
Allows users to import autofill form data from another browser into Microsoft Edge.
If you enable this policy, the option to manually import autofill data is automatically selected.
If you disable this policy, autofill form data isn't imported at first run, and users can't import it
manually.
If you don't configure this policy, autofill data is imported at first run, and users can choose whether
to import this data manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge will import autofill
data on first run, but users can select or clear autofill data option during manual import.
Note: This policy currently manages importing from Google Chrome (on Windows 7, 8, and 10 and
on macOS) and Mozilla Firefox (on Windows 7, 8, and 10 and on macOS) browsers.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportBrowserSettings
Supported versions:
Description
Allows users to import browser settings from another browser into Microsoft Edge.
If you enable this policy, the Browser settings check box is automatically selected in the Import
browser data dialog box.
If you disable this policy, browser settings aren't imported at first run, and users can't import them
manually.
If you don't configure this policy, browser settings are imported at first run, and users can choose
whether to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports the
settings on first run, but users can select or clear the browser settings option during manual
import.
Note: This policy currently manages importing Google Chrome (on Windows 7, 8, and 10 and on
macOS).
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportCookies
Supported versions:
Description
Allows users to import Cookies from another browser into Microsoft Edge.
If you don't configure this policy, Cookies are imported on first run.
You can also set this policy as a recommendation. This means that Microsoft Edge imports Cookies
on first run.
Note: This policy currently manages importing Google Chrome (on Windows 7, 8, and 10 and on
macOS).
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportExtensions
Supported versions:
On Windows and macOS since 81 or later
Description
Allows users to import extensions from another browser into Microsoft Edge.
If you enable this policy, the Extensions check box is automatically selected in the Import browser
data dialog box.
If you disable this policy, extensions aren't imported at first run, and users can't import them
manually.
If you don't configure this policy, extensions are imported at first run, and users can choose
whether to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports
extensions on first run, but users can select or clear the extensions option during manual import.
Note: This policy currently only supports importing from Google Chrome (on Windows 7, 8, and 10
and on macOS).
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportFavorites
Supported versions:
Description
Allows users to import favorites from another browser into Microsoft Edge.
If you enable this policy, the Favorites check box is automatically selected in the Import browser
data dialog box.
If you disable this policy, favorites aren't imported at first run, and users can't import them
manually.
If you don't configure this policy, favorites are imported at first run, and users can choose whether
to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports favorites
on first run, but users can select or clear the favorites option during manual import.
Note: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10),
Google Chrome (on Windows 7, 8, and 10 and on macOS), Mozilla Firefox (on Windows 7, 8, and 10
and on macOS), and Apple Safari (on macOS) browsers.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportHistory
Supported versions:
On Windows and macOS since 77 or later
Description
Allows users to import their browsing history from another browser into Microsoft Edge.
If you enable this policy, the Browsing history check box is automatically selected in the Import
browser data dialog box.
If you disable this policy, browsing history data isn't imported at first run, and users can't import
this data manually.
If you don't configure this policy, browsing history data is imported at first run, and users can
choose whether to import it manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports
browsing history on first run, but users can select or clear the history option during manual import.
Note: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10),
Google Chrome (on Windows 7, 8, and 10 and on macOS), Mozilla Firefox (on Windows 7, 8, and 10
and on macOS), and Apple Safari (macOS) browsers.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportHomepage
Supported versions:
On Windows and macOS since 77 or later
Description
Allows users to import their home page setting from another browser into Microsoft Edge.
If you enable this policy, the option to manually import the home page setting is automatically
selected.
If you disable this policy, the home page setting isn't imported at first run, and users can't import it
manually.
If you don't configure this policy, the home page setting is imported at first run, and users can
choose whether to import this data manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge imports the home
page setting on first run, but users can select or clear the home page option during manual import.
Note: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10).
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportOnEachLaunch
Allow import of data from other browsers on each Microsoft Edge launch
Supported versions:
On Windows since 104 or later
Description
If you enable this policy, users will see a prompt to import their browsing data from other browsers
on each Microsoft Edge launch.
If you disable this policy, users will never see a prompt to import their browsing data from other
browsers on each Microsoft Edge launch.
If the policy is left unconfigured, users can activate this feature from a Microsoft Edge prompt or
from the Settings page.
Note: A similar policy named AutoImportAtFirstRun exists. This policy should be used if you want to
import supported data from other browsers only once while setting up your device.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Back to top
ImportOpenTabs
Supported versions:
On Windows and macOS since 79 or later
Description
Allows users to import open and pinned tabs from another browser into Microsoft Edge.
If you enable this policy, the Open tabs check box is automatically selected in the Import browser
data dialog box.
If you disable this policy, open tabs aren't imported at first run, and users can't import them
manually.
If you don't configure this policy, open tabs are imported at first run, and users can choose whether
to import them manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports open
tabs on first run, but users can select or clear the Open tabs option during manual import.
Note: This policy currently only supports importing from Google Chrome (on Windows 7, 8, and 10
and on macOS).
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: ImportOpenTabs
Example value:
XML
<true/>
Back to top
ImportPaymentInfo
Supported versions:
On Windows and macOS since 77 or later
Description
Allows users to import payment info from another browser into Microsoft Edge.
If you enable this policy, the payment info check box is automatically selected in the Import
browser data dialog box.
If you disable this policy, payment info isn't imported at first run, and users can't import it manually.
If you don't configure this policy, payment info is imported at first run, and users can choose
whether to import it manually during later browsing sessions.
You can also set this policy as a recommendation. This means that Microsoft Edge imports payment
info on first run, but users can select or clear the payment info option during manual import.
Note: This policy currently manages importing from Google Chrome (on Windows 7, 8, and 10 and
on macOS).
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportSavedPasswords
Supported versions:
On Windows and macOS since 77 or later
Description
Allows users to import saved passwords from another browser into Microsoft Edge.
If you enable this policy, the option to manually import saved passwords is automatically selected.
If you disable this policy, saved passwords aren't imported on first run, and users can't import them
manually.
If you don't configure this policy, passwords are imported at first run, and users can choose
whether to import them manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge imports passwords on
first run, but users can select or clear the passwords option during manual import.
Note: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10),
Google Chrome (on Windows 7, 8, and 10 and on macOS), and Mozilla Firefox (on Windows 7, 8,
and 10 and on macOS) browsers.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportSearchEngine
Supported versions:
Description
Allows users to import search engine settings from another browser into Microsoft Edge.
If you enable, this policy, the option to import search engine settings is automatically selected.
If you disable this policy, search engine settings aren't imported at first run, and users can't import
them manually.
If you don't configure this policy, search engine settings are imported at first run, and users can
choose whether to import this data manually during later browsing sessions.
You can set this policy as a recommendation. This means that Microsoft Edge imports search
engine settings on first run, but users can select or clear the search engine option during manual
import.
Note: This policy currently manages importing from Internet Explorer (on Windows 7, 8, and 10).
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportShortcuts
Supported versions:
On Windows and macOS since 81 or later
Description
Allows users to import Shortcuts from another browser into Microsoft Edge.
If you don't configure this policy, Shortcuts are imported on first run.
You can also set this policy as a recommendation. This means that Microsoft Edge imports
Shortcuts on first run.
Note: This policy currently manages importing from Google Chrome (on Windows 7, 8, and 10 and
on macOS).
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ImportStartupPageSettings
Supported versions:
On Windows since 91 or later
Description
Allows users to import Startup settings from another browser into Microsoft Edge.
If you enable this policy, the Startup settings are always imported.
If you disable this policy, startup settings are not imported at first run or at manual import.
If you don't configure this policy, startup settings are imported at first run, and users can choose
whether to import this data manually by selecting browser settings option during later browsing
sessions.
You can set this policy as a recommendation. This means that Microsoft Edge will import startup
settings on first run, but users can select or clear browser settings option during manual import.
Note: This policy currently manages importing from Microsoft Edge Legacy and Google Chrome
(on Windows 7, 8, and 10) browsers.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
InAppSupportEnabled
Supported versions:
Description
Microsoft Edge uses the in-app support feature (enabled by default) to allow users to contact our
support agents directly from the browser. Also, by default, users can't disable (turn off) the in-app
support feature.
If you enable this policy or don't configure it, users can invoke in-app support.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
InPrivateModeAvailability
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies whether the user can open pages in InPrivate mode in Microsoft Edge.
If you don't configure this policy or set it to 'Enabled', users can open pages in InPrivate mode.
Set this policy to 'Disabled' to stop users from using InPrivate mode.
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
InsecureFormsWarningsEnabled
Supported versions:
Description
This policy controls the handling of insecure forms (forms submitted over HTTP) embedded in
secure (HTTPS) sites in the browser. If you enable this policy or don't set it, a full page warning will
be shown when an insecure form is submitted. Additionally, a warning bubble will be shown next to
the form fields when they are focused, and autofill will be disabled for those forms. If you disable
this policy, warnings will not be shown for insecure forms, and autofill will work normally.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
IntensiveWakeUpThrottlingEnabled
Supported versions:
On Windows and macOS since 85 or later
Description
When enabled the IntensiveWakeUpThrottling feature causes Javascript timers in background tabs
to be aggressively throttled and coalesced, running no more than once per minute after a page has
been backgrounded for 5 minutes or more.
This is a web standards compliant feature, but it may break functionality on some websites by
causing certain actions to be delayed by up to a minute. However, it results in significant CPU and
battery savings when enabled. See https://bit.ly/30b1XR4 for more details.
If you enable this policy, the feature will be force enabled, and users will not be able to override this
setting. If you disable this policy, the feature will be force disabled, and users will not be able to
override this setting. If you don't configure this policy, the feature will be controlled by its own
internal logic. Users can manually configure this setting.
Note that the policy is applied per renderer process, with the most recent value of the policy setting
in force when a renderer process starts. A full restart is required to ensure that all the loaded tabs
receive a consistent policy setting. It is harmless for processes to be running with different values of
this policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
InternetExplorerIntegrationAlwaysUseOSCapture
Always use the OS capture engine to avoid issues with capturing Internet
Explorer mode tabs
Supported versions:
On Windows since 106 or later
Description
Configure this policy to control whether Microsoft Edge will use the "OS capture engine" or the
"Browser capture engine" when capturing browser windows in the same process using the screen-
share APIs.
You should configure this policy if you want to capture the contents of Internet Explorer mode tabs.
However, enabling this policy may negatively impact performance when capturing browser
windows in the same process.
This policy only affects window capture, not tab capture. The contents of Internet Explorer mode
tabs will not be captured when you choose to capture only a single tab, even if you configure this
policy.
If you enable this policy, Microsoft Edge will always use the OS capture engine for window capture.
Internet Explorer mode tabs will have their contents captured.
If you disable or don't configure this policy, Microsoft Edge will use the Browser capture engine for
browser windows in the same process. Internet Explorer mode tabs in these windows will not have
their contents captured.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
InternetExplorerIntegrationAlwaysWaitForUnload
Wait for Internet Explorer mode tabs to completely unload before ending
the browser session
Supported versions:
On Windows since 105 or later
Description
This policy causes Microsoft Edge to continue running until all Internet Explorer tabs have
completely finished unloading. This allows Internet Explorer plugins like ActiveX controls to perform
additional critical work even after the browser has been closed. However, this can cause stability
and performance issues, and Microsoft Edge processes may remain active in the background with
no visible windows if the webpage or plugin prevents Internet Explorer from unloading. This policy
should only be used if your organization depends on a plugin that requires this behavior.
If you enable this policy, Microsoft Edge will always wait for Internet Explorer mode tabs to fully
unload before ending the browser session.
If you disable or don't configure this policy, Microsoft Edge will not always wait for Internet Explorer
mode tabs to fully unload before ending the browser session.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerIntegrationCloudNeutralSitesReporting
Configure reporting of potentially misconfigured neutral site URLs to the
M365 Admin Center Site Lists app
Supported versions:
On Windows since 99 or later
Description
This setting lets you enable reporting of sites that might need to be configured as a neutral site on
the Enterprise Mode Site List. The user must be signed into Microsoft Edge with a valid work or
school account for reports to be sent, and the user's account tenant must match the tenant
specified by the policy.
If you configure this policy, Microsoft Edge will send a report to the M365 Admin Center Site Lists
app when a navigation appears stuck redirecting back and forth between the Microsoft Edge and
Internet Explorer engines several times. This usually indicates that redirection to an authentication
server is switching engines, which repeatedly fails in a loop. The report will show the URL of the site
that is the redirect target, minus any query string or fragment. The user's identity isn't reported.
For this reporting to work correctly, you must have successfully visited the Microsoft Edge Site Lists
app in the M365 Admin Center at least once. This activates a per-tenant storage account used to
store these reports. Microsoft Edge will still attempt to send reports if this step hasn't been
completed. However, the reports will not be stored in the Site Lists app.
When enabling this policy, you must specify your O365 tenant ID. To learn more about finding your
O365 tenant ID, see https://go.microsoft.com/fwlink/?linkid=2185668
If you disable or don't configure this policy, Microsoft Edge will never send reports about
potentially misconfigured neutral sites to the Site Lists app.
Supported features:
Data Type:
String
Example value:
"aba95e58-070f-4784-8dcd-e5fd46c2c6d6"
Back to top
InternetExplorerIntegrationCloudSiteList
Supported versions:
Description
The Microsoft Edge Site Lists setting in the M365 Admin Center allows you to host your site list(s) in
a compliant cloud location and manage the contents of your site list(s) through the built-in
experience. This setting allows you to specify which site list within the M365 Admin Center to
deploy to your users. The user must be signed into Microsoft Edge with a valid work or school
account. Otherwise, Microsoft Edge will not download the site list from the cloud location.
If you configure this policy, Microsoft Edge will use the specified site list. When enabled, you can
enter the identifier of the site list that you created and published to the cloud in M365 Admin
Center.
This setting takes precedence over Microsoft Edge's InternetExplorerIntegrationSiteList policy as
well as Internet Explorer's site list setting (Use the Enterprise mode IE website list). If you disable or
don't configure this policy, Microsoft Edge will use the InternetExplorerIntegrationSiteList policy
instead.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"aba95e58-070f-4784-8dcd-e5fd46c2c6d6"
Back to top
InternetExplorerIntegrationCloudUserSitesReporting
Configure reporting of IE Mode user list entries to the M365 Admin Center
Site Lists app
Supported versions:
On Windows since 99 or later
Description
This setting lets you enable reporting of sites that Microsoft Edge users add to their local IE Mode
site list. The user must be signed into Microsoft Edge with a valid work or school account for
reports to be sent, and the user's account tenant must match the tenant specified by the policy.
If you configure this policy, Microsoft Edge will send a report to the M365 Admin Center Site Lists
app when a user adds a site to their local IE mode site list. The report will show the URL of the site
the user added, minus any query string or fragment. The user's identity isn't reported.
For this reporting to work correctly, you must have successfully visited the Microsoft Edge Site Lists
app in the M365 Admin Center at least once. This activates a per-tenant storage account used to
store these reports. Microsoft Edge will still attempt to send reports if this step hasn't been
completed. However, the reports will not be stored in the Site Lists app.
When enabling this policy, you must specify your O365 tenant ID. To learn more about finding your
O365 tenant ID, see https://go.microsoft.com/fwlink/?linkid=2185668
If you disable or don't configure this policy, Microsoft Edge will never send reports about URLs
added to a user's local site list to the Site Lists app.
Supported features:
Data Type:
String
Example value:
"aba95e58-070f-4784-8dcd-e5fd46c2c6d6"
Back to top
InternetExplorerIntegrationComplexNavDataTypes
Configure whether form data and HTTP headers will be sent when entering
or exiting Internet Explorer mode
Supported versions:
On Windows since 96 or later
Description
Starting with Microsoft Edge version 96, navigations that switch between Internet Explorer mode
and Microsoft Edge will include form data.
If you enable this policy, you can specify which data types should be included in navigations
between Microsoft Edge and Internet Explorer mode.
If you disable or don't configure this policy, Microsoft Edge will use the new behavior of including
form data in navigations that change modes.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000003
Back to top
InternetExplorerIntegrationEnhancedHangDetection
Supported versions:
On Windows since 84 or later
Description
Enhanced hang detection is a more granular approach to detecting hung webpages in Internet
Explorer mode than what standalone Internet Explorer uses. When a hung webpage is detected, the
browser will apply a mitigation to prevent the rest of the browser from hanging.
This setting allows you to configure the use of enhanced hang detection in case you run into
incompatible issues with any of your websites. We recommend disabling this policy only if you see
notifications such as "(website) is not responding" in Internet Explorer mode but not in standalone
Internet Explorer.
If you set this policy to 'Enabled' or don't configure it, websites running in Internet Explorer mode
will use enhanced hang detection.
If you set this policy to 'Disabled', enhanced hang detection is disabled, and users will get the basic
Internet Explorer hang detection behavior.
Supported features:
Data Type:
Integer
Example value:
0x00000001
Back to top
InternetExplorerIntegrationLevel
Supported versions:
Description
For guidance about configuring the optimal experience for Internet Explorer mode see
https://go.microsoft.com/fwlink/?linkid=2094210
Policy options mapping:
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000001
Back to top
InternetExplorerIntegrationLocalFileAllowed
Supported versions:
Description
This policy controls the availability of the --ie-mode-file-url command line argument which is used
to launch Microsoft Edge with a local file specified on the command line into Internet Explorer
mode.
If you set this policy to true, or don't configure it, the user is allowed to use the --ie-mode-file-url
command line argument for launching local files in Internet Explorer mode.
If you set this policy to false, the user isn't allowed to use the --ie-mode-file-url command line
argument for launching local files in Internet Explorer mode.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerIntegrationLocalFileExtensionAllowList
Open local files in Internet Explorer mode file extension allow list
Supported versions:
On Windows since 88 or later
Description
This policy limits which file:// URLs are allowed to be launched into Internet Explorer mode based
on file extension.
When a file:// URL is requested to launch in Internet Explorer mode, the file extension of the URL
must be present in this list in order for the URL to be allowed to launch in Internet Explorer mode. A
URL which is blocked from opening in Internet Explorer mode will instead open in Edge mode.
If you set this policy to the special value "*" or don't configure it, all file extensions are allowed.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\InternetExplorerIntegrationLocalFileExtensionAllowList
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\InternetExplorerIntegrationLocalFileExtensionAllowLis
t\1 = ".mht"
SOFTWARE\Policies\Microsoft\Edge\InternetExplorerIntegrationLocalFileExtensionAllowLis
t\2 = ".pdf"
SOFTWARE\Policies\Microsoft\Edge\InternetExplorerIntegrationLocalFileExtensionAllowLis
t\3 = ".vsdx"
Back to top
InternetExplorerIntegrationLocalFileShowContextMenu
Supported versions:
On Windows since 88 or later
Description
This policy controls the visibility of the 'Open link in new Internet Explorer mode tab' option on the
context menu for file:// links.
If you set this policy to true, the 'Open link in new Internet Explorer mode tab' context menu item
will be available for file:// links.
If you set this policy to false or don't configure it, the context menu item will not be added.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerIntegrationLocalMhtFileAllowed
Supported versions:
On Windows since 107 or later
Description
This policy controls whether local mht or mhtml files launched from the command line can open
automatically in Internet Explorer mode based on the file content without specifying the --ie-
mode-file-url command line.
If you enable or don't configure this policy, local mht or mhtml files can launch in Microsoft Edge or
Internet Explorer mode to best view the file.
If you disable this policy, local mht or mhtml files will launch in Microsoft Edge.
Note that if you use the --ie-mode-file-url command line argument for launching local mht or
mhtml files, it takes precedence over how you configured this policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerIntegrationLocalSiteListExpirationDays
Specify the number of days that a site remains on the local IE mode site list
Supported versions:
Description
If you disable or don't configure this policy, the default value of 30 days is used.
If you enable this policy, you must enter the number of days for which the sites are retained on the
user's local site list in Microsoft Edge. The value can be from 0 to 90 days.
Supported features:
Data Type:
Integer
Example value:
0x0000001e
Back to top
InternetExplorerIntegrationReloadInIEModeAllowed
Supported versions:
On Windows since 92 or later
Description
This policy allows users to reload unconfigured sites (that are not configured in the Enterprise
Mode Site List) in Internet Explorer mode when browsing in Microsoft Edge and a site requires
Internet Explorer for compatibility.
After a site has been reloaded in Internet Explorer mode, "in-page" navigations will stay in Internet
Explorer mode (for example, a link, script, or form on the page, or a server-side redirect from
another "in-page" navigation). Users can choose to exit from Internet Explorer mode, or Microsoft
Edge will automatically exit from Internet Explorer mode when a navigation that isn't "in-page"
occurs (for example, using the address bar, the back button, or a favorite link).
Users can also optionally tell Microsoft Edge to use Internet Explorer mode for the site in the future.
This choice will be remembered for a length of time managed by the
InternetExplorerIntegrationLocalSiteListExpirationDays policy.
If you enable this policy, users are allowed to reload unconfigured sites in Internet Explorer mode.
If you disable this policy, users aren't allowed to reload unconfigured sites in Internet Explorer
mode.
Note that if you enable this policy, it takes precedence over how you configured the
InternetExplorerIntegrationTestingAllowed policy, and that policy will be disabled.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerIntegrationSiteList
Supported versions:
On Windows since 78 or later
Description
For guidance about configuring the optimal experience for Internet Explorer mode see
https://go.microsoft.com/fwlink/?linkid=2094210
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"https://internal.contoso.com/sitelist.xml"
Back to top
InternetExplorerIntegrationSiteListRefreshInterval
Configure how frequently the Enterprise Mode Site List is refreshed
Supported versions:
Description
This setting lets you specify a custom refresh interval for the Enterprise Mode Site List. The refresh
interval is specified in minutes. The minimum refresh interval is 30 minutes.
If you configure this policy, Microsoft Edge will attempt to retrieve an updated version of the
configured Enterprise Mode Site List using the specified refresh interval.
If you disable or don't configure this policy, Microsoft Edge will use a default refresh interval,
currently 120 minutes.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x000000f0
Back to top
InternetExplorerIntegrationSiteRedirect
Supported versions:
Description
An "in-page" navigation is started from a link, a script, or a form on the current page. It can also be
a server-side redirect of a previous "in-page" navigation attempt. Conversely, a user can start a
navigation that isn't "in-page" that's independent of the current page in several ways by using the
browser controls. For example, using the address bar, the back button, or a favorite link.
This setting lets you specify whether navigations from pages loaded in Internet Explorer mode to
unconfigured sites (that are not configured in the Enterprise Mode Site List) switch back to
Microsoft Edge or remain in Internet Explorer mode.
If you disable or don't configure this policy, only sites configured to open in Internet Explorer mode
will open in that mode. Any site not configured to open in Internet Explorer mode will be redirected
back to Microsoft Edge.
If you set this policy to 'Default', only sites configured to open in Internet Explorer mode will open
in that mode. Any site not configured to open in Internet Explorer mode will be redirected back to
Microsoft Edge.
If you set this policy to 'AutomaticNavigationsOnly', you get the default experience except that all
automatic navigations (such as 302 redirects) to unconfigured sites will be kept in Internet Explorer
mode.
If you set this policy to 'AllInPageNavigations', all navigations from pages loaded in IE mode to
unconfigured sites are kept in Internet Explorer mode (Least Recommended).
Supported features:
Data Type:
Integer
Example value:
0x00000000
Back to top
InternetExplorerIntegrationTestingAllowed
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 94.
Supported versions:
Description
This policy is obsolete because it has been superseded by an improved feature. It doesn't work in
Microsoft Edge after version 94. To allow users to open applications in Internet Explorer mode, use
the InternetExplorerIntegrationReloadInIEModeAllowed policy instead. Alternatively, users can still
use the --ie-mode-test flag.
This policy allows users to test applications in Internet Explorer mode by opening an Internet
Explorer mode tab in Microsoft Edge.
Users can do so from within the "More tools" menu by selecting 'Open sites in Internet Explorer
mode'.
Additionally, users can test their applications in a modern browser without removing applications
from the site list using the option 'Open sites in Edge mode'.
If you enable this policy, the option to 'Open sites in Internet Explorer mode' will be visible under
"More tools". Users can view their sites in Internet Explorer mode on this tab. Another option to
'Open sites in Edge mode' will also be visible under "More tools" to help testing sites in a modern
browser without removing them from the site list. Note that if the
InternetExplorerIntegrationReloadInIEModeAllowed policy is enabled, it takes precedence and
these options will not be visible under "More tools".
If you disable or don't configure this policy, users can't see the options 'Open in Internet Explorer
mode' and 'Open in Edge mode' under "More tools" menu. However, users can configure these
options with the --ie-mode-test flag.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
InternetExplorerIntegrationWindowOpenHeightAdjustment
Configure the pixel adjustment between window.open heights sourced from
IE mode pages vs. Edge mode pages
Supported versions:
On Windows since 95 or later
Description
This setting lets you specify a custom adjustment to the height of popup windows generated via
window.open from the Internet Explorer mode site.
If you configure this policy, Microsoft Edge will add the adjustment value to the height, in pixels.
The exact difference depends on the UI configuration of both IE and Edge, but a typical difference
is 5.
If you disable or don't configure this policy, Microsoft Edge will treat IE mode window.open the
same as Edge mode window.open in window height calculations.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000005
Back to top
InternetExplorerIntegrationWindowOpenWidthAdjustment
Supported versions:
Description
This setting lets you specify a custom adjustment to the width of popup windows generated via
window.open from the Internet Explorer mode site.
If you configure this policy, Microsoft Edge will add the adjustment value to the width, in pixels. The
exact difference depends on the UI configuration of both IE and Edge, but a typical difference is 4.
If you disable or don't configure this policy, Microsoft Edge will treat IE mode window.open the
same as Edge mode window.open in window width calculations.
Supported features:
Data Type:
Integer
Windows information and settings
Example value:
0x00000004
Back to top
InternetExplorerIntegrationZoneIdentifierMhtFileAllowed
Supported versions:
Description
This policy controls whether MHT or MHTML files that are downloaded from the web are
automatically opened in Internet Explorer mode.
If you enable this policy, the MHT or MHTML files that are downloaded from the web can be
opened in both Microsoft Edge and Internet Explorer mode to provide the best user experience.
If you disable or don't configure this policy, MHT or MHTML files that are downloaded from the
web won't automatically open in Internet Explorer mode.
To learn more about Internet Explorer mode, see https://go.microsoft.com/fwlink/?linkid=2094210
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerModeClearDataOnExitEnabled
Description
This policy controls whether browsing history is deleted from Internet Explorer and Internet
Explorer mode every time Microsoft Edge is closed.
Users can configure this setting in the 'Clear browsing data for Internet Explorer' option in the
Privacy, search, and services menu of Settings.
If you enable this policy, on browser exit Internet Explorer browsing history will be cleared.
If you disable or do not configure this policy, Internet Explorer browsing history will not be cleared
on browser exit.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
0x00000001
Back to top
InternetExplorerModeEnableSavePageAs
Supported versions:
Description
This policy enables 'Save page as' functionality in Internet Explorer mode. Users can use this option
to save the current page in the browser. When a user re-opens a saved page, it will be loaded in the
default browser.
If you enable this policy, the "Save page as" option will be clickable in "More tools".
If you disable or don't configure this policy, users can't select the "Save page as" option in "More
tools".
Note: To make the "Ctrl+S" shortcut work, users must enable the Internet Explorer policy, 'Enable
extended hot key in Internet Explorer mode'.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
InternetExplorerModeTabInEdgeModeAllowed
Allow sites configured for Internet Explorer mode to open in Microsoft Edge
Supported versions:
On Windows since 97 or later
Description
This policy lets sites configured to open in Internet Explorer mode to be opened by Microsoft Edge
for testing on a modern browser without removing them from the site list.
Users can configure this setting in the "More tools" menu by selecting 'Open sites in Microsoft
Edge'.
If you enable this policy, the option to 'Open sites in Microsoft Edge' will be visible under "More
tools". Users use this option to test IE mode sites on a modern browser.
If you disable or don't configure this policy, users can't see the option 'Open in Microsoft Edge'
under the "More tools" menu. However, users can access this menu option with the --ie-mode-test
flag.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Back to top
InternetExplorerModeToolbarButtonEnabled
Supported versions:
On Windows since 96 or later
Description
Set this policy to show the Reload in Internet Explorer mode button in the toolbar. Users can hide
the button in the toolbar through edge://settings/appearance. The button will only be shown on
the toolbar when the InternetExplorerIntegrationReloadInIEModeAllowed policy is enabled or if the
user has chosen to enable "Allow sites to be reloaded in Internet Explorer mode".
If you enable this policy, the Reload in Internet mode button is pinned to the toolbar.
If you disable or don't configure this policy, the Reload in Internet Explorer mode button isn't
shown in the toolbar by default. Users can toggle the Show Internet Explorer mode button in
edge://settings/appearance.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
InternetExplorerZoomDisplay
Display zoom in IE Mode tabs with DPI Scale included like it is in Internet
Explorer
Supported versions:
On Windows since 103 or later
Description
Lets you display zoom in IE Mode tabs similar to how it was displayed in Internet Explorer, where
the DPI scale of the display is factored in.
For example, if you have a page zoomed to 200% on a 100 DPI scale display and you change the
display to 150 DPI, Microsoft Edge would still display the zoom as 200%. However, Internet Explorer
factors in the DPI scale and displays 300%.
If you enable this policy, zoom values will be displayed with the DPI scale included for IE Mode tabs.
If you disable or don't configure this policy, zoom values will be displayed without DPI scale
included for IE Mode tabs
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
IntranetRedirectBehavior
Supported versions:
On Windows and macOS since 88 or later
Description
This policy configures behavior for intranet redirection via DNS interception checks. The checks
attempt to discover whether the browser is behind a proxy that redirects unknown host names.
If this policy isn't configured, the browser will use the default behavior of DNS interception checks
and intranet redirect suggestions. In M88, they are enabled by default but will be disabled by
default in the future release.
DNSInterceptionChecksEnabled is a related policy that might also disable DNS interception checks.
However, this policy is a more flexible version which might separately control intranet redirection
infobars and might be expanded in the future. If either DNSInterceptionChecksEnabled or this
policy make a request to disable interception checks, the checks will be disabled. If DNS
interception checks are disabled by this policy but
GoToIntranetSiteForSingleWordEntryInAddressBar is enabled, single word queries will still result in
intranet navigations.
Policy options mapping:
Supported features:
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
IsolateOrigins
Supported versions:
On Windows and macOS since 77 or later
Description
Specify origins to run in an isolated process.
By default, Microsoft Edge isolates pages from each Site into its own process. This policy enables
more granular isolation based on Origin rather than Site. For example, specifying
https://subdomain.contoso.com/ will cause pages from https://subdomain.contoso.com/ to be
isolated in a different process than pages from other Origins within the https://contoso.com/
Site.
If you enable this policy, each of the named origins in a comma-separated list will run in its own
process.
If you disable or don't configure this policy, pages will be isolated on a per-Site basis.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"https://contoso.com/,https://fabrikam.com/"
XML
<string>https://contoso.com/,https://fabrikam.com/</string>
Back to top
LiveCaptionsAllowed
Supported versions:
On Windows since 103 or later
Description
Allow users to turn the Live captions feature on or off.
Live captions is an accessibility feature that converts speech from the audio that plays in Microsoft
Edge in to text and shows this text in a separate window. The entire process happens on the device
and no audio or caption text ever leaves the device.
If you enable or don't configure this policy, users can turn this feature on or off at
edge://settings/accessibility.
If you disable this policy, users will not be able to turn this accessibility feature on. If speech
recognition files have been downloaded previously, they will be deleted from the device in 30 days.
We recommend avoiding this option unless it's needed in your environment.
If users choose to turn on Live captions, speech recognition files (approximately 100 megabytes)
will be downloaded to the device on first run and then periodically to improve performance and
accuracy. These files will be deleted after 30 days.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
LocalBrowserDataShareEnabled
Supported versions:
On Windows since 93 or later
Description
Enables Windows to index Microsoft Edge browsing data stored locally on the user's device and
allows users to find and launch previously stored browsing data directly from Windows features
such as the search box on the taskbar in Windows.
If you enable this policy or don't configure it, Microsoft Edge will publish local browsing data to the
Windows Indexer.
If you disable this policy, Microsoft Edge will not share data to the Windows Indexer.
Note that if you disable this policy, Microsoft Edge will remove the data shared with Windows on
the device and stop sharing any new browsing data.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000000
Back to top
LocalProvidersEnabled
Supported versions:
On Windows and macOS since 83 or later
Description
Allow suggestions from suggestion providers on the device (local providers), for example, Favorites
and Browsing History, in Microsoft Edge's Address Bar and Auto-Suggest List.
If you enable this policy, suggestions from local providers are used.
If you disable this policy, suggestions from local providers are never used. Local history and local
favorites suggestions will not appear.
If you do not configure this policy, suggestions from local providers are allowed but the user can
change that using the settings toggle.
Note that some features may not be available if a policy to disable this feature has been applied.
For example, Browsing History suggestions will not be available if you enable the
SavingBrowserHistoryDisabled policy.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
Mac information and settings
Preference Key Name: LocalProvidersEnabled
Example value:
XML
<false/>
Back to top
MAUEnabled
Supported versions:
On macOS since 93 or later
Description
This policy lets you configure the updater that Microsoft Edge uses.
If you enable this policy, Microsoft Edge will only be updated by Microsoft AutoUpdate.
If you disable or don't configure this policy, Microsoft Edge will be updated by Microsoft Edge
Update.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
XML
<true/>
Back to top
MSAWebSiteSSOUsingThisProfileAllowed
Allow single sign-on for Microsoft personal sites using this profile
Supported versions:
On Windows and macOS since 93 or later
Description
'Allow single sign-on for Microsoft personal sites using this profile' option allows non-MSA profiles
to be able to use single sign-on for Microsoft sites using MSA credentials present on the machine.
This option shows up for end-users as a toggle in Settings -> Profiles -> Profile Preferences for
non-MSA profiles only.
If you disable this policy, non-MSA profiles will not be able to use single sign-on for Microsoft sites
using MSA credentials present on the machine.
If you enable this policy or don't configure it, users will be able to use the Settings option to ensure
non-MSA profiles are able to use single sign-on for Microsoft sites using MSA credentials present
on the machine provided only a single MSA account exists on the machine.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ManagedConfigurationPerOrigin
Supported versions:
Description
Setting this policy defines the return value of Managed Configuration API for given origin.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ManagedConfigurationPerOrigin = [
{
"managed_configuration_hash": "asd891jedasd12ue9h",
"managed_configuration_url": "https://static.contoso.com/configuration.json",
"origin": "https://www.contoso.com"
},
{
"managed_configuration_hash": "djio12easd89u12aws",
"managed_configuration_url": "https://static.contoso.com/configuration2.json",
"origin": "https://www.example.com"
}
]
Compact example value:
SOFTWARE\Policies\Microsoft\Edge\ManagedConfigurationPerOrigin =
[{"managed_configuration_hash": "asd891jedasd12ue9h", "managed_configuration_url":
"https://static.contoso.com/configuration.json", "origin": "https://www.contoso.com"},
{"managed_configuration_hash": "djio12easd89u12aws", "managed_configuration_url":
"https://static.contoso.com/configuration2.json", "origin":
"https://www.example.com"}]
XML
<key>ManagedConfigurationPerOrigin</key>
<array>
<dict>
<key>managed_configuration_hash</key>
<string>asd891jedasd12ue9h</string>
<key>managed_configuration_url</key>
<string>https://static.contoso.com/configuration.json</string>
<key>origin</key>
<string>https://www.contoso.com</string>
</dict>
<dict>
<key>managed_configuration_hash</key>
<string>djio12easd89u12aws</string>
<key>managed_configuration_url</key>
<string>https://static.contoso.com/configuration2.json</string>
<key>origin</key>
<string>https://www.example.com</string>
</dict>
</array>
Back to top
ManagedFavorites
Configure favorites
Supported versions:
Description
Configures a list of managed favorites.
The policy creates a list of favorites. Each favorite contains the keys "name" and "url," which hold
the favorite's name and its target. You can configure a subfolder by defining a favorites without an
"url" key but with an additional "children" key that contains a list of favorites as defined above
(some of which may be folders again). Microsoft Edge amends incomplete URLs as if they were
submitted via the Address Bar, for example "microsoft.com" becomes "https://microsoft.com/".
These favorites are placed in a folder that can't be modified by the user (but the user can choose to
hide it from the favorites bar). By default the folder name is "Managed favorites" but you can
change it by adding to the list of favorites a dictionary containing the key "toplevel_name" with the
desired folder name as the value.
Managed favorites are not synced to the user account and can't be modified by extensions.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ManagedFavorites = [
{
"toplevel_name": "My managed favorites folder"
},
{
"name": "Microsoft",
"url": "microsoft.com"
},
{
"name": "Bing",
"url": "bing.com"
},
{
"children": [
{
"name": "Microsoft Edge Insiders",
"url": "www.microsoftedgeinsider.com"
},
{
"name": "Microsoft Edge",
"url": "www.microsoft.com/windows/microsoft-edge"
}
],
"name": "Microsoft Edge links"
}
]
XML
<key>ManagedFavorites</key>
<array>
<dict>
<key>toplevel_name</key>
<string>My managed favorites folder</string>
</dict>
<dict>
<key>name</key>
<string>Microsoft</string>
<key>url</key>
<string>microsoft.com</string>
</dict>
<dict>
<key>name</key>
<string>Bing</string>
<key>url</key>
<string>bing.com</string>
</dict>
<dict>
<key>children</key>
<array>
<dict>
<key>name</key>
<string>Microsoft Edge Insiders</string>
<key>url</key>
<string>www.microsoftedgeinsider.com</string>
</dict>
<dict>
<key>name</key>
<string>Microsoft Edge</string>
<key>url</key>
<string>www.microsoft.com/windows/microsoft-edge</string>
</dict>
</array>
<key>name</key>
<string>Microsoft Edge links</string>
</dict>
</array>
Back to top
ManagedSearchEngines
Supported versions:
On Windows and macOS since 77 or later
Description
Lets you configure a list of up to 10 search engines, one of which must be marked as the default
search engine. Starting in Microsoft Edge version 100, you can configure up to 100 engines.
You do not need to specify the encoding. Starting in Microsoft Edge 80, the suggest_url and
image_search_url parameters are optional. The optional parameter, image_search_post_params
(consists of comma-separated name/value pairs), is available starting in Microsoft Edge 80.
Starting in Microsoft Edge 83, you can enable search engine discovery with the optional
allow_search_engine_discovery parameter. This parameter must be the first item in the list. If
allow_search_engine_discovery isn't specified, search engine discovery will be disabled by default.
Starting in Microsoft Edge 84, you can set this policy as a recommended policy to allow search
provider discovery. You don't need to add the optional allow_search_engine_discovery parameter.
Starting in Microsoft Edge 100, setting this policy as a recommended policy will also allow users to
manually add new search engines from their Microsoft Edge settings.
If you enable this policy, users can't add, remove, or change any search engine in the list. Users can
set their default search engine to any search engine in the list.
If you disable or don't configure this policy, users can modify the search engines list as desired.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\ManagedSearchEngines = [
{
"allow_search_engine_discovery": true
},
{
"is_default": true,
"keyword": "example1.com",
"name": "Example1",
"search_url": "https://www.example1.com/search?q={searchTerms}",
"suggest_url": "https://www.example1.com/qbox?query={searchTerms}"
},
{
"image_search_post_params": "content={imageThumbnail},url={imageURL},sbisrc=
{SearchSource}",
"image_search_url": "https://www.example2.com/images/detail/search?iss=sbiupload",
"keyword": "example2.com",
"name": "Example2",
"search_url": "https://www.example2.com/search?q={searchTerms}",
"suggest_url": "https://www.example2.com/qbox?query={searchTerms}"
},
{
"encoding": "UTF-8",
"image_search_url": "https://www.example3.com/images/detail/search?iss=sbiupload",
"keyword": "example3.com",
"name": "Example3",
"search_url": "https://www.example3.com/search?q={searchTerms}",
"suggest_url": "https://www.example3.com/qbox?query={searchTerms}"
},
{
"keyword": "example4.com",
"name": "Example4",
"search_url": "https://www.example4.com/search?q={searchTerms}"
}
]
SOFTWARE\Policies\Microsoft\Edge\ManagedSearchEngines =
[{"allow_search_engine_discovery": true}, {"is_default": true, "keyword":
"example1.com", "name": "Example1", "search_url": "https://www.example1.com/search?q=
{searchTerms}", "suggest_url": "https://www.example1.com/qbox?query={searchTerms}"},
{"image_search_post_params": "content={imageThumbnail},url={imageURL},sbisrc=
{SearchSource}", "image_search_url": "https://www.example2.com/images/detail/search?
iss=sbiupload", "keyword": "example2.com", "name": "Example2", "search_url":
"https://www.example2.com/search?q={searchTerms}", "suggest_url":
"https://www.example2.com/qbox?query={searchTerms}"}, {"encoding": "UTF-8",
"image_search_url": "https://www.example3.com/images/detail/search?iss=sbiupload",
"keyword": "example3.com", "name": "Example3", "search_url":
"https://www.example3.com/search?q={searchTerms}", "suggest_url":
"https://www.example3.com/qbox?query={searchTerms}"}, {"keyword": "example4.com",
"name": "Example4", "search_url": "https://www.example4.com/search?q={searchTerms}"}]
Mac information and settings
Preference Key Name: ManagedSearchEngines
Example value:
XML
<key>ManagedSearchEngines</key>
<array>
<dict>
<key>allow_search_engine_discovery</key>
<true/>
</dict>
<dict>
<key>is_default</key>
<true/>
<key>keyword</key>
<string>example1.com</string>
<key>name</key>
<string>Example1</string>
<key>search_url</key>
<string>https://www.example1.com/search?q={searchTerms}</string>
<key>suggest_url</key>
<string>https://www.example1.com/qbox?query={searchTerms}</string>
</dict>
<dict>
<key>image_search_post_params</key>
<string>content={imageThumbnail},url={imageURL},sbisrc={SearchSource}</string>
<key>image_search_url</key>
<string>https://www.example2.com/images/detail/search?iss=sbiupload</string>
<key>keyword</key>
<string>example2.com</string>
<key>name</key>
<string>Example2</string>
<key>search_url</key>
<string>https://www.example2.com/search?q={searchTerms}</string>
<key>suggest_url</key>
<string>https://www.example2.com/qbox?query={searchTerms}</string>
</dict>
<dict>
<key>encoding</key>
<string>UTF-8</string>
<key>image_search_url</key>
<string>https://www.example3.com/images/detail/search?iss=sbiupload</string>
<key>keyword</key>
<string>example3.com</string>
<key>name</key>
<string>Example3</string>
<key>search_url</key>
<string>https://www.example3.com/search?q={searchTerms}</string>
<key>suggest_url</key>
<string>https://www.example3.com/qbox?query={searchTerms}</string>
</dict>
<dict>
<key>keyword</key>
<string>example4.com</string>
<key>name</key>
<string>Example4</string>
<key>search_url</key>
<string>https://www.example4.com/search?q={searchTerms}</string>
</dict>
</array>
Back to top
MathSolverEnabled
Let users snip a Math problem and get the solution with a step-by-step
explanation in Microsoft Edge
Supported versions:
Description
This policy lets you manage whether users can use the Math Solver tool in Microsoft Edge or not.
If you enable or don't configure the policy, then a user can take a snip of the Math problem and get
the solution including a step-by-step explanation of the solution in a Microsoft Edge side pane.
If you disable the policy, then the Math Solver tool will be disabled and users will not be able to use
it.
Note: Setting the ComponentUpdatesEnabled policy to disabled will also disable the Math Solver
component.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
MaxConnectionsPerProxy
Supported versions:
Description
Some proxy servers can't handle a high number of concurrent connections per client - you can
solve this by setting this policy to a lower value.
The value of this policy should be lower than 100 and higher than 6. The default value is 32.
Some web apps are known to consume many connections with hanging GETs - lowering the
maximum connections below 32 may lead to browser networking hangs if too many of these kind
of web apps are open.
If you don't configure this policy, the default value (32) is used.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000020
XML
<integer>32</integer>
Back to top
MediaRouterCastAllowAllIPs
Supported versions:
Description
Enable this policy to let Google Cast connect to Cast devices on all IP addresses, not just
RFC1918/RFC4193 private addresses.
Disable this policy to restrict Google Cast to Cast devices on RFC1918/RFC4193 private addresses.
If you don't configure this policy, Google Cast connects to Cast devices on RFC1918/RFC4193
private addresses only, unless you enable the CastAllowAllIPs feature.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
MetricsReportingEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 88.
Supported versions:
On Windows and macOS since 77, until 88
Description
This policy is no longer supported. It is replaced by DiagnosticData (for Windows 7, Windows 8, and
macOS) and Allow Telemetry on Win 10 (https://go.microsoft.com/fwlink/?linkid=2099569 ).
This policy enables reporting of usage and crash-related data about Microsoft Edge to Microsoft.
Enable this policy to send reporting of usage and crash-related data to Microsoft. Disable this
policy to not send the data to Microsoft. In both cases, users can't change or override the setting.
On Windows 10, if you don't configure this policy, Microsoft Edge will default to the Windows
diagnostic data setting. If you enable this policy, Microsoft Edge will only send usage data if the
Windows Diagnostic data setting is set to Enhanced or Full. If you disable this policy, Microsoft
Edge will not send usage data. Crash-related data is sent based on the Windows Diagnostic data
setting. Learn more about Windows Diagnostic data settings at https://go.microsoft.com/fwlink/?
linkid=2099569
On Windows 7, Windows 8, and macOS, this policy controls sending usage and crash-related data.
If you don't configure this policy, Microsoft Edge will default to the user's preference.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management, or macOS
instances that are that are managed via MDM or joined to a domain via MCX.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
MicrosoftEdgeInsiderPromotionEnabled
Supported versions:
Description
Shows content promoting the Microsoft Edge Insider channels on the About Microsoft Edge
settings page.
If you enable or don't configure this policy, the Microsoft Edge Insider promotion content will be
shown on the About Microsoft Edge page.
If you disable this policy, the Microsoft Edge Insider promotion content will not be shown on the
About Microsoft Edge page.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
MicrosoftEditorProofingEnabled
Spell checking provided by Microsoft Editor
Supported versions:
Description
The Microsoft Editor service provides enhanced spell and grammar checking for editable text fields
on web pages.
If you enable or don't configure this policy, Microsoft Editor spell check can be used for eligible text
fields.
If you disable this policy, spell check can only be provided by local engines that use platform or
Hunspell services. The results from these engines might be less informative than the results
Microsoft Editor can provide.
If the SpellcheckEnabled policy is set to disabled, or the user disables spell checking in the settings
page, this policy will have no effect.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
MicrosoftEditorSynonymsEnabled
Supported versions:
Description
The Microsoft Editor service provides enhanced spell and grammar checking for editable text fields
on web pages, and synonyms can be suggested as an integrated feature.
If you enable this policy, Microsoft Editor spell checker will provide synonyms for suggestions for
misspelled words.
If you disable or don't configure this policy, Microsoft Editor spell checker will not provide
synonyms for suggestions for misspelled words.
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
MicrosoftOfficeMenuEnabled
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 100 or later
Description
This policy is deprecated because it's been replaced by the Microsoft Edge sidebar. Microsoft Office
applications are now available in the sidebar, which can be managed by HubsSidebarEnabled
policy.
When users can access the Microsoft Office menu, they can get access to Office applications such
as Microsoft Word and Microsoft Excel.
If you enable or don't configure this policy, users can open the Microsoft Office menu.
If you disable this policy, users won't be able to access the Microsoft Office menu.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
MicrosoftRootStoreEnabled
Determines whether the Microsoft Root Store and built-in certificate verifier
will be used to verify server certificates (deprecated)
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
This policy doesn't work because support for using the platform-supplied certificate verifier and
roots was removed.
When this policy is set to enabled, Microsoft Edge will perform verification of server certificates
using the built-in certificate verifier with the Microsoft Root Store as the source of public trust.
When this policy is set to disabled, Microsoft Edge will use the system certificate verifier and system
root certificates.
When this policy is not set, the Microsoft Root Store or system provided roots may be used.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
MouseGestureEnabled
Supported versions:
On Windows since 112 or later
Description
This policy lets you configure the Mouse Gesture feature in Microsoft Edge.
This feature provides an easy way for users to complete tasks like scroll forward or backward, open
new tab, refresh page, etc. They can finish a task by pressing and holding the mouse right button to
draw certain patterns on a webpage, instead of clicking the buttons or using keyboard shortcuts.
If you enable or don't configure this policy, you can use the Mouse Gesture feature on Microsoft
Edge to start using this feature.
If you disable this policy, you can't use the Mouse Gesture feature in Microsoft Edge.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
NativeWindowOcclusionEnabled
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows since 84 or later
Description
This policy is deprecated, use the 'WindowOcclusionEnabled' policy instead. It won't work in
Microsoft Edge version 92.
If you enable this setting, to reduce CPU and power consumption Microsoft Edge will detect when a
window is covered by other windows, and will suspend work painting pixels.
If you disable this setting Microsoft Edge will not detect when a window is covered by other
windows.
Data Type:
Boolean
Example value:
0x00000001
Back to top
NavigationDelayForInitialSiteListDownloadTimeout
Set a timeout for delay of tab navigation for the Enterprise Mode Site List
Supported versions:
On Windows since 84 or later
Description
Allows you to set a timeout, in seconds, for Microsoft Edge tabs waiting to navigate until the
browser has downloaded the initial Enterprise Mode Site List.
Tabs will not wait longer than this timeout for the Enterprise Mode Site List to download. If the
browser has not finished downloading the Enterprise Mode Site List when the timeout expires,
Microsoft Edge tabs will continue navigating anyway. The value of the timeout should be no greater
than 20 seconds and no fewer than 1 second.
If you set the timeout in this policy to a value greater than the default of 2 seconds, an information
bar is shown to the user after 2 seconds. The information bar contains a button that allows the user
to quit waiting for the Enterprise Mode Site List download to complete.
If you don't configure this policy, the default timeout of 2 seconds is used. This default is subject to
change in the future.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x0000000a
Back to top
NetworkPredictionOptions
Supported versions:
On Windows and macOS since 77 or later
Description
Enables network prediction and prevents users from changing this setting.
This controls DNS prefetching, TCP and SSL preconnection, and prerendering of web pages.
If you don't configure this policy, network prediction is enabled but the user can change it.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
NetworkServiceSandboxEnabled
Supported versions:
On Windows since 102 or later
Description
This policy controls whether or not the network service process runs sandboxed. If this policy is
enabled, the network service process will run sandboxed. If this policy is disabled, the network
service process will run unsandboxed. This leaves users open to additional security risks related to
running the network service unsandboxed. If this policy is not set, the default configuration for the
network sandbox will be used. This may vary depending on Microsoft Edge release, currently
running field trials, and platform. This policy is intended to give enterprises flexibility to disable the
network sandbox if they use third party software that interferes with the network service sandbox.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
NewPDFReaderEnabled
Supported versions:
On Windows and macOS since 111 or later
Description
The policy lets Microsoft Edge launch the new version of the built-in PDF reader that's powered by
Adobe Acrobat's PDF rendering engine. The new PDF reader ensures that there's no loss of
functionality and delivers an enhanced PDF experience. This experience includes richer rendering,
improved performance, strong security for PDF handling, and greater accessibility.
If you enable this policy, Microsoft Edge will use the new Adobe Acrobat powered built-in PDF
reader to open all PDF files.
If you disable or don't configure this policy, Microsoft Edge will use the existing PDF reader to open
all PDF files.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
NonRemovableProfileEnabled
Supported versions:
Description
This policy determines if a user can remove the Microsoft Edge profile automatically signed in with
a user's work or school account.
If you enable this policy, a non-removable profile will be created with the user's work or school
account on Windows. This profile can't be signed out or removed. The profile will be non-
removable only if profile is signed-in with either on-premises account or Azure AD account that
matches OS sign-in account.
If you disable or don't configure this policy, the profile automatically signed in with a user's work or
school account on Windows can be signed out or removed by the user.
If you want to configure browser sign in, use the BrowserSignin policy.
This policy is available only on Windows instances that are joined to a Microsoft Active Directory
domain, Windows 10 Pro or Enterprise instances that enrolled for device management.
From Microsoft Edge 89 onwards, if there is an existing on-premises profile with sync disabled and
machine is hybrid joined, it will auto-upgrade the on-premises profile to Azure AD profile and make
it non-removable instead of creating a new non-removable Azure AD profile.
From Microsoft Edge 93 onwards, if policy ImplicitSignInEnabled is disabled, this policy will not take
any effect.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
OriginAgentClusterDefaultEnabled
Supported versions:
On Windows and macOS since 103 or later
Description
The Origin-Agent-Cluster: HTTP header controls whether a document is isolated in an origin-keyed
agent cluster or in a site-keyed agent cluster. This has security implications because an origin-keyed
agent cluster allows isolating documents by origin. The consequence of this for developers is that
the document.domain accessor can no longer be set when origin-keyed agent clustering is
enabled.
If you enable or don't configure this policy, documents without the Origin-Agent-Cluster: header
will be assigned to origin-keyed agent clustering by default. On these documents, the
document.domain accessor will not be settable.
If you disable this policy, documents without the Origin-Agent-Cluster: header will be assigned to
site-keyed agent clusters by default. On these documents, the document.domain accessor will be
settable.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
OutlookHubMenuEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 105.
Supported versions:
On Windows and macOS since 102, until 105
Description
This policy doesn't work because the Outlook menu is now contained within the Edge Sidebar and
can be managed using the HubsSidebarEnabled policy.
This policy is used to manage access to the Outlook menu from Microsoft Edge.
If you enable or don't configure this policy, users can access the Outlook menu. If you disable this
policy, users can't access the Outlook menu.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
OverrideSecurityRestrictionsOnInsecureOrigin
Supported versions:
On Windows and macOS since 77 or later
Description
Specifies a list of origins (URLs) or hostname patterns (like "*.contoso.com") for which security
restrictions on insecure origins don't apply.
This policy lets you specify allowed origins for legacy applications that can't deploy TLS or set up a
staging server for internal web development so that developers can test out features requiring
secure contexts without having to deploy TLS on the staging server. This policy also prevents the
origin from being labeled "Not Secure" in the omnibox.
Setting a list of URLs in this policy has the same effect as setting the command-line flag '--unsafely-
treat-insecure-origin-as-secure' to a comma-separated list of the same URLs. If you enable this
policy, it overrides the command-line flag.
Supported features:
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\OverrideSecurityRestrictionsOnInsecureOrigin
Path (Recommended): N/A
Value Name: 1, 2, 3, ...
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\OverrideSecurityRestrictionsOnInsecureOrigin\1 =
"http://testserver.contoso.com/"
SOFTWARE\Policies\Microsoft\Edge\OverrideSecurityRestrictionsOnInsecureOrigin\2 =
"*.contoso.com"
XML
<array>
<string>http://testserver.contoso.com/</string>
<string>*.contoso.com</string>
</array>
Back to top
PDFSecureMode
Supported versions:
Description
The policy enables Digital Signature validation for PDF files in a secure environment, which shows
the correct validation status of the signatures.
If you enable this policy, PDF files with Certificate-based digital signatures are opened with an
option to view and verify the validity of the signatures with high security.
If you disable or don't configure this policy, the capability to view and verify the signature will not
be available.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PDFXFAEnabled
Supported versions:
Description
Lets the Microsoft Edge browser enable XFA (XML Forms Architecture) support in the native PDF
reader and allows users to open XFA PDF files in the browser.
If you enable this policy, XFA support in the native PDF reader will be enabled.
If you disable or don't configure this policy, Microsoft Edge will not enable XFA support in the
native PDF reader.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PaymentMethodQueryEnabled
Allow websites to query for available payment methods
Supported versions:
Description
Allows you to set whether websites can check if the user has payment methods saved.
If you enable this policy or don't set this policy, websites can check if the user has payment
methods saved.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
PersonalizationReportingEnabled
Supported versions:
On Windows and macOS since 80 or later
Description
This policy prevents Microsoft from collecting a user's Microsoft Edge browsing history, favorites
and collections, usage, and other browsing data to be used for personalizing advertising, search,
news, Microsoft Edge and other Microsoft services.
If you disable this policy, users can't change or override the setting. If this policy is enabled or not
configured, Microsoft Edge will default to the user's preference.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
PinningWizardAllowed
Description
Microsoft Edge uses the Pin to taskbar wizard to help users pin suggested sites to the taskbar. The
Pin to taskbar wizard feature is enabled by default and accessible to the user through the Settings
and more menu.
If you enable this policy or don't configure it, users can call the Pin to taskbar wizard from the
Settings and More menu. The wizard can also be called via a protocol launch.
If you disable this policy, the Pin to taskbar wizard is disabled in the menu and cannot be called via
a protocol launch.
User settings to enable or disable the Pin to taskbar wizard aren't available.
Supported features:
Data Type:
Boolean
0x00000000
Back to top
ProactiveAuthEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 90.
Supported versions:
On Windows and macOS since 77, until 90
Description
This policy is obsolete because it does not work independently of browser sign in. It does not work
in Microsoft Edge after version 90. If you want to configure browser sign in, use the BrowserSignin
policy.
If you enable this policy, Microsoft Edge tries to seamlessly authenticate to websites and services
using the account which is signed-in to the browser.
If you disable this policy, Microsoft Edge does not try to authenticate with websites or services
using single sign-on (SSO). Authenticated experiences like the Enterprise New Tab Page will not
work (e.g. recent and recommended Office documents will not be available).
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
PromotionalTabsEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Control the presentation of full-tab promotional or educational content. This setting controls the
presentation of welcome pages that help users sign into Microsoft Edge, choose their default
browser, or learn about product features.
If you enable this policy (set it true) or don't configure it, Microsoft Edge can show full-tab content
to users to provide product information.
If you disable (set to false) this policy, Microsoft Edge can't show full-tab content to users.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Mac information and settings
Preference Key Name: PromotionalTabsEnabled
Example value:
XML
<false/>
Back to top
PromptForDownloadLocation
Supported versions:
On Windows and macOS since 77 or later
Description
Set whether to ask where to save a file before downloading it.
If you enable this policy, the user is asked where to save each file before downloading; if you don't
configure it, files are saved automatically to the default location, without asking the user.
If you don't configure this policy, the user will be able to change this setting.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
PromptOnMultipleMatchingCertificates
Supported versions:
On Windows and macOS since 100 or later
Description
This policy controls whether the user is prompted to select a client certificate when more than one
certificate matches AutoSelectCertificateForUrls. If this policy is set to True, the user is prompted to
select a client certificate whenever the auto-selection policy matches multiple certificates. If this
policy is set to False or not set, the user may only be prompted when no certificate matches the
auto-selection.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
QuicAllowed
Supported versions:
Description
If you enable this policy or don't configure it, the QUIC protocol is allowed.
QUIC is a transport layer network protocol that can improve performance of web applications that
currently use TCP.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
QuickSearchShowMiniMenu
Supported versions:
On Windows and macOS since 104 or later
Description
Enables Microsoft Edge mini menu on websites and PDFs. The mini menu is triggered on text
selection and has basic actions like copy and smart actions like definitions.
If you enable or don't config this policy, selecting text on websites and PDFs will show the Microsoft
Edge mini menu.
If you disable this policy, the Microsoft Edge mini menu will not be shown when text on websites
and PDFs is selected.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
QuickViewOfficeFilesEnabled
Description
Allows you to set whether users can view publicly accessible Office files on the web that aren't on
OneDrive or SharePoint. (For example: Word documents, PowerPoint presentations, and Excel
spreadsheets)
If you enable or don't configure this policy, these files can be viewed in Microsoft Edge using Office
Viewer instead of downloading the files.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ReadAloudEnabled
Supported versions:
On Windows and macOS since 113 or later
Description
Enables the Read Aloud feature within Microsoft Edge. Using this feature, users can listen to the
content on the web page. This enables users to multi-task or improve their reading comprehension
by hearing content at their own pace.
If you enable this policy or don't configure it, the Read Aloud option shows up in the address bar,
right click context menu, more menu, on the PDF toolbar, and within Immersive Reader. If you
disable this policy, users can't access the Read Aloud feature from the address bar, right click
context menu, more menu, on the PDF toolbar, and within Immersive Reader.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
RedirectSitesFromInternetExplorerPreventBHOInstall
Supported versions:
On Windows since 87 or later
Description
This setting lets you specify whether to block the install of the Browser Helper Object (BHO) that
enables redirecting incompatible sites from Internet Explorer to Microsoft Edge for sites that
require a modern browser.
If you enable this policy, the BHO will not be installed. If it is already installed it will be uninstalled
on the next Microsoft Edge update.
The BHO is required for incompatible site redirection to occur, however whether redirection occurs
or not is also controlled by RedirectSitesFromInternetExplorerRedirectMode.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
0x00000001
Back to top
RedirectSitesFromInternetExplorerRedirectMode
Supported versions:
Description
This setting lets you specify whether Internet Explorer will redirect navigations to sites that require a
modern browser to Microsoft Edge. If you set this policy to 'Disable' ('Prevent redirection', value 0),
Internet Explorer will not redirect any traffic to Microsoft Edge.
If you set this policy to 'Sitelist', starting with Microsoft Edge major release 87 , Internet Explorer (IE)
will redirect sites that require a modern browser to Microsoft Edge. (Note: The Sitelist setting is
'Redirect sites based on the incompatible sites sitelist', value 1).
When a site is redirected from Internet Explorer to Microsoft Edge, the Internet Explorer tab that
started loading the site is closed if it had no prior content. Otherwise, the user is taken to a
Microsoft help page that explains why the site was redirected to Microsoft Edge. When Microsoft
Edge is launched to load an IE site, an information bar explains that the site works best in a modern
browser.
If you want to redirect all navigations, you can configure the Disable Internet Explorer 11 policy,
which redirects all navigations from IE11 to Microsoft Edge. It also hides the IE11 app icon from the
user after the first launch.
Starting with Microsoft Edge major release 87, you will have the same experience as setting
the policy to 'Sitelist': Internet Explorer will redirect sites that require a modern browser to
Microsoft Edge.
In the future, the default for your organization might change to automatically redirect all
navigations. If you don't want automatic redirection, set this policy to 'Disable' or 'Sitelist'.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000001
Back to top
RelatedMatchesCloudServiceEnabled
Configure Related Matches in Find on Page
Supported versions:
Description
Specifies how the user receives related matches in Find on Page, which provides spellcheck,
synonyms, and Q&A results in Microsoft Edge.
If you enable or don't configure this policy, users can receive related matches in Find on Page on all
sites. The results are processed in a cloud service.
If you disable this policy, users can receive related matches in Find on Page on limited sites. The
results are processed on the user's device.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
RelaunchNotification
Supported versions:
Description
Notify users that they need to restart Microsoft Edge to apply a pending update.
If you don't configure this policy, Microsoft Edge adds a recycle icon at the far right of the top
menu bar to prompt users to restart the browser to apply the update.
If you enable this policy and set it to 'Recommended', a recurring warning prompts users that a
restart is recommended. Users can dismiss this warning and defer the restart.
If you set the policy to 'Required', a recurring warning prompts users that the browser will be
restarted automatically as soon as a notification period passes. The default period is seven days.
You can configure this period with the RelaunchNotificationPeriod policy.
Recommended (1) = Recommended - Show a recurring prompt to the user indicating that a
restart is recommended
Required (2) = Required - Show a recurring prompt to the user indicating that a restart is
required
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000001
XML
<integer>1</integer>
Back to top
RelaunchNotificationPeriod
Supported versions:
On Windows and macOS since 77 or later
Description
Allows you to set the time period, in milliseconds, over which users are notified that Microsoft Edge
must be relaunched to apply a pending update.
Over this time period, the user will be repeatedly informed of the need for an update. In Microsoft
Edge the app menu changes to indicate that a relaunch is needed once one third of the notification
period passes. This notification changes color once two thirds of the notification period passes, and
again once the full notification period has passed. The additional notifications enabled by the
RelaunchNotification policy follow this same schedule.
If not set, the default period of 604800000 milliseconds (one week) is used.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x240c8400
XML
<integer>604800000</integer>
Back to top
RelaunchWindow
Supported versions:
Description
Specifies a target time window for the end of the relaunch notification period.
Users are notified of the need for a browser relaunch or device restart based on the
RelaunchNotification and RelaunchNotificationPeriod policy settings. Browsers and devices are
forcibly restarted at the end of the notification period when the RelaunchNotification policy is set to
'Required'. This RelaunchWindow policy can be used to defer the end of the notification period so
that it falls within a specific time window.
If you don't configure this policy, the default target time window is the whole day (i.e., the end of
the notification period is never deferred).
Note: Though the policy can accept multiple items in entries, all but the first item are ignored.
Warning: Setting this policy may delay application of software updates.
Supported features:
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\RelaunchWindow = {
"entries": [
{
"duration_mins": 240,
"start": {
"hour": 2,
"minute": 15
}
}
]
}
XML
<key>RelaunchWindow</key>
<dict>
<key>entries</key>
<array>
<dict>
<key>duration_mins</key>
<integer>240</integer>
<key>start</key>
<dict>
<key>hour</key>
<integer>2</integer>
<key>minute</key>
<integer>15</integer>
</dict>
</dict>
</array>
</dict>
Back to top
RemoteDebuggingAllowed
Supported versions:
If you enable or don't configure this policy, users may use remote debugging by specifying --
remote-debug-port and --remote-debugging-pipe command line switches.
If you disable this policy, users are not allowed to use remote debugging.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
RendererAppContainerEnabled
Supported versions:
Description
Launches Renderer processes into an App Container for additional security benefits.
If you don't configure this policy, Microsoft Edge will launch the renderer process in an app
container in a future update.
If you enable this policy, Microsoft Edge will launch the renderer process in an app container.
If you disable this policy, Microsoft Edge will not launch the renderer process in an app container.
Only turn off the policy if there are compatibility issues with third-party software that must run
inside Microsoft Edge's renderer processes.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
RendererCodeIntegrityEnabled
Supported versions:
On Windows since 78 or later
Description
Setting the policy to Enabled or leaving it unset turns Renderer Code Integrity on. Setting the policy
to Disabled has a detrimental effect on Microsoft Edge's security and stability as unknown and
potentially hostile code can load inside Microsoft Edge's renderer processes. Only turn off the
policy if there are compatibility issues with third-party software that must run inside Microsoft
Edge's renderer processes.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
RequireOnlineRevocationChecksForLocalAnchors
Specify if online OCSP/CRL checks are required for local trust anchors
Supported versions:
Description
Control whether online revocation checks (OCSP/CRL checks) are required. If Microsoft Edge can't
get revocation status information, these certificates are treated as revoked ("hard-fail").
If you enable this policy, Microsoft Edge always performs revocation checking for server certificates
that successfully validate and are signed by locally-installed CA certificates.
If you don't configure or disable this policy, then Microsoft Edge uses the existing online revocation
checking settings.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Back to top
ResolveNavigationErrorsUseWebService
Enable resolution of navigation errors using a web service
Supported versions:
Description
Allow Microsoft Edge to issue a dataless connection to a web service to probe networks for
connectivity in cases like hotel and airport Wi-Fi.
If you enable this policy, a web service is used for network connectivity tests.
If you disable this policy, Microsoft Edge uses native APIs to try to resolve network connectivity and
navigation issues.
Note: Except on Windows 8 and later versions of Windows, Microsoft Edge always uses native APIs
to resolve connectivity issues.
If you don't configure this policy, Microsoft Edge respects the user preference that's set under
Services at edge://settings/privacy. Specifically, there's a Use a web service to help resolve
navigation errors toggle, which the user can switch on or off. Be aware that if you have enabled
this policy (ResolveNavigationErrorsUseWebService), the Use a web service to help resolve
navigation errors setting is turned on, but the user can't change the setting by using the toggle. If
you have disabled this policy, the Use a web service to help resolve navigation errors setting is
turned off, and the user can't change the setting by using the toggle.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
RestorePdfView
Supported versions:
On Windows and macOS since 113 or later
Description
If you enable or don't configure this policy Microsoft Edge will recover the last state of PDF view
and land users to the section where they ended reading in the last session.
If you disable this policy Microsoft Edge will recover the last state of PDF view and land users at the
start of the PDF file.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
RestrictSigninToPattern
Supported versions:
Description
Determines which accounts can be used to sign in to the Microsoft Edge account that's chosen
during the Sync opt-in flow.
You can configure this policy to match multiple accounts using a Perl style regular expression for
the pattern. If a user tries to sign in to the browser with an account whose username doesn't match
this pattern, they are blocked and will get the appropriate error message. Note that pattern
matches are case sensitive. For more information about the regular expression rules that are used,
refer to https://go.microsoft.com/fwlink/p/?linkid=2133903 .
If you don't configure this policy or leave it blank, users can use any account to sign in to Microsoft
Edge.
Note that signed-in profiles with a username that doesn't match this pattern will be signed out
after this policy is enabled.
Supported features:
Data Type:
String
Example value:
".*@contoso.com"
XML
<string>.*@contoso.com</string>
Back to top
RoamingProfileLocation
Supported versions:
On Windows since 85 or later
Description
Configures the directory to use to store the roaming copy of profiles.
If you enable this policy, Microsoft Edge uses the provided directory to store a roaming copy of the
profiles, as long as you've also enabled the RoamingProfileSupportEnabled policy. If you disable the
RoamingProfileSupportEnabled policy or don't configure it, the value stored in this policy isn't used.
If you don't configure this policy, the default roaming profile path is used.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
Example value:
"${roaming_app_data}\\edge-profile"
Back to top
RoamingProfileSupportEnabled
Supported versions:
On Windows since 85 or later
Description
Enable this policy to use roaming profiles on Windows. The settings stored in Microsoft Edge
profiles (favorites and preferences) are also saved to a file stored in the Roaming user profile folder
(or the location specified by the administrator through the RoamingProfileLocation policy).
If you disable this policy or don't configure it, only the regular local profiles are used.
The SyncDisabled only disables cloud synchronization and has no impact on this policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
RunAllFlashInAllowMode
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 88.
Supported versions:
On Windows and macOS since 77, until 88
Description
This policy doesn't work because Flash is no longer supported by Microsoft Edge.
If you enable this policy, all Adobe Flash content embedded in websites that are set to allow Adobe
Flash in the content settings -- either by the user or by enterprise policy -- will run. This includes
content from other origins and/or small content.
To control which websites are allowed to run Adobe Flash, see the specifications in the
DefaultPluginsSetting, PluginsAllowedForUrls, and PluginsBlockedForUrls policies.
If you disable this policy or don't configure it, Adobe Flash content from other origins (from sites
that aren't specified in the three policies mentioned immediately above) or small content might be
blocked.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SSLErrorOverrideAllowed
Supported versions:
Description
Microsoft Edge shows a warning page when users visit sites that have SSL errors.
If you enable or don't configure (default) this policy, users can click through these warning pages.
If you disable this policy, users are blocked from clicking through any warning page.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SSLErrorOverrideAllowedForOrigins
Allow users to proceed from the HTTPS warning page for specific origins
Supported versions:
Description
Microsoft Edge shows a warning page when users visit sites that have SSL errors.
If you enable or don't configure the SSLErrorOverrideAllowed policy, this policy does nothing.
If you disable the SSLErrorOverrideAllowed policy, configuring this policy lets you configure a list of
origin patterns for sites where users can continue to click through SSL error pages. Users can't click
through SSL error pages on origins that are not on this list.
If you don't configure this policy, the SSLErrorOverrideAllowed policy applies for all sites.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SSLErrorOverrideAllowedForOrigins\1 =
"https://www.example.com"
SOFTWARE\Policies\Microsoft\Edge\SSLErrorOverrideAllowedForOrigins\2 = "
[*.]example.edu"
XML
<array>
<string>https://www.example.com</string>
<string>[*.]example.edu</string>
</array>
Back to top
SSLVersionMin
Supported versions:
Description
If you set this policy to 'tls1.2', Microsoft Edge will show an error for TLS 1.0 and TLS 1.1 and the
user will not be able to bypass the error.
If you don't configure this policy, Microsoft Edge will still show an error for TLS 1.0 and TLS 1.1 but
the user will be able to bypass it.
Support for suppressing the TLS 1.0/1.1 warning was removed from Microsoft Edge starting in
version 91. The 'tls1' and 'tls1.1' values are no longer supported.
Supported features:
Data Type:
String
Example value:
"tls1"
XML
<string>tls1</string>
Back to top
SandboxExternalProtocolBlocked
Supported versions:
Description
Microsoft Edge will block navigations to external protocols inside a sandboxed iframe.
If you enable or don't configure this policy, Microsoft Edge will block those navigations.
If you disable this policy, Microsoft Edge will not block those navigations.
This can be used by administrators who need more time to update their internal website affected
by this new restriction. This Enterprise policy is temporary; it's intended to be removed after
Microsoft Edge version 117.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SaveCookiesOnExit
Supported versions:
On Windows and macOS since 86 or later
Description
When this policy is enabled, the specified set of cookies is exempt from deletion when the browser
closes. This policy is only effective when:
The 'Cookies and other site data' toggle is configured in Settings/Privacy and services/Clear
browsing data on close or
The policy ClearBrowsingDataOnExit is enabled or
The policy DefaultCookiesSetting is set to 'Keep cookies for the duration of the session'.
You can define a list of sites, based on URL patterns, that will have their cookies preserved across
sessions.
Note: Users can still edit the cookie site list to add or remove URLs. However, they can't remove
URLs that have been added by an Admin.
If you enable this policy, the list of cookies won't be cleared when the browser closes.
If you disable or don't configure this policy, the user's personal configuration is used.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SaveCookiesOnExit\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\SaveCookiesOnExit\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
SavingBrowserHistoryDisabled
Supported versions:
Description
Disables saving browser history and prevents users from changing this setting.
If you enable this policy, browsing history isn't saved. This also disables tab syncing.
If you disable this policy or don't configure it, browsing history is saved.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ScreenCaptureAllowed
Description
If you enable this policy, or don't configure this policy, a web page can use screen-share APIs (for
example, getDisplayMedia() or the Desktop Capture extension API) for a screen capture. If you
disable this policy, calls to screen-share APIs will fail. For example, if you're using a web-based
online meeting, video or screen sharing will not work. However, this policy is not considered (and a
site will be allowed to use screen-share APIs) if the site matches an origin pattern in any of the
following policies: ScreenCaptureAllowedByOrigins, WindowCaptureAllowedByOrigins,
TabCaptureAllowedByOrigins, SameOriginTabCaptureAllowedByOrigins.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
ScrollToTextFragmentEnabled
Supported versions:
Description
This feature lets hyperlink and address bar URL navigations target specific text on a web page,
which will be scrolled to after the web page finishes loading.
If you enable or don't configure this policy, web page scrolling to specific text fragments via a URL
will be enabled.
If you disable this policy, web page scrolling to specific text fragments via a URL will be disabled.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Windows information and settings
Example value:
0x00000000
XML
<false/>
Back to top
SearchFiltersEnabled
Supported versions:
On Windows and macOS since 109 or later
Description
Lets you filter your autosuggestions by selecting a filter from the search filters ribbon. For example,
if you select the "Favorites" filter, only favorites suggestions will be shown.
If you enable or don't configure this policy, the autosuggestion dropdown defaults to displaying
the ribbon of available filters.
If you disable this policy, the autosuggestion dropdown won't display the ribbon of available filters.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: SearchFiltersEnabled
Example value:
XML
<true/>
Back to top
SearchForImageEnabled
Supported versions:
On Windows and macOS since 115 or later
Description
This policy lets you configure the Image Search feature in the right-click context menu.
If you enable or don't configure this policy, then the "Search the web for image" option will be
visible in the context menu.
If you disable this policy, then the "Search the web for image" will not be visible in the context
menu.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SearchInSidebarEnabled
Supported versions:
Description
Search in Sidebar allows users to open search result in sidebar (including sidebar search for
Progressive Web Apps).
If you configure this policy to 'EnableSearchInSidebar' or don't configure it, Search in sidebar will be
enabled.
If you configure this policy to 'DisableSearchInSidebar', Search in sidebar will be disabled. Some
methods that would normally invoke sidebar search will invoke a traditional search instead.
Supported features:
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
SearchSuggestEnabled
Supported versions:
Description
Enables web search suggestions in Microsoft Edge's Address Bar and Auto-Suggest List and
prevents users from changing this policy.
If you disable this policy, web search suggestions are never used, however local history and local
favorites suggestions still appear. If you disable this policy, neither the typed characters, nor the
URLs visited will be included in telemetry to Microsoft.
If this policy is left not set, search suggestions are enabled but the user can change that.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SearchbarAllowed
Enable the Search bar
Supported versions:
Description
Enables the search bar. When enabled, users can use the search bar to search the web from their
desktop or from an application. The search bar provides a search box, powered by Edge default
search engine, that shows web suggestions and opens all web searches in Microsoft Edge. The
search bar can be launched from the "More tools" menu or jump list in Microsoft Edge.
If you enable or don't configure this policy: The search bar will be automatically enabled for all
profiles. The option to enable the search bar at startup will be toggled on if the
SearchbarIsEnabledOnStartup policy is enabled. If the SearchbarIsEnabledOnStartup is disabled or
not configured, the option to enable the search bar at startup will be toggled off. Users will see the
menu item to launch the search bar from the Microsoft Edge "More tools" menu. Users can launch
the search bar from "More tools". Users will see the menu item to launch the search bar from the
Microsoft Edge jump list menu. Users can launch the search bar from the Microsoft Edge jump list
menu. The search bar can be turned off by the "Quit" option in the System tray or by closing the
search bar from the 3 dot menu. The search bar will be restarted on system reboot if auto-start is
enabled.
If you disable this policy: The search bar will be disabled for all profiles. The option to launch the
search bar from Microsoft Edge "More tools" menu will be disabled. The option to launch the
search bar from Microsoft Edge jump list menu will be disabled.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
SearchbarIsEnabledOnStartup
Supported versions:
On Windows since 117 or later
Description
Allows the Search bar to start running at Windows startup.
If you enable: The Search bar will start running at Windows startup by default. If the Search bar is
disabled via SearchbarAllowed policy, this policy will not start the Search bar on Windows startup.
If you disable this policy: The Search bar will not start at Windows startup for all profiles. The option
to start the search bar at Windows startup will be disabled and toggled off in search bar settings.
If you don't configure the policy: The Search bar will not start at Windows startup for all profiles.
The option to start the search bar at Windows startup will be toggled off in search bar settings.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
SecurityKeyPermitAttestation
Websites or domains that don't need permission to use direct Security Key
attestation
Supported versions:
Description
Specifies websites and domains that don't need explicit user permission when attestation
certificates from security keys are requested. Additionally, a signal is sent to the security key
indicating that it can use individual attestation. Without this, users are prompted each time a site
requests attestation of security keys.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SecurityKeyPermitAttestation\1 =
"https://contoso.com"
Mac information and settings
Preference Key Name: SecurityKeyPermitAttestation
Example value:
XML
<array>
<string>https://contoso.com</string>
</array>
Back to top
SendIntranetToInternetExplorer
Supported versions:
On Windows since 77 or later
Description
For guidance about configuring the optimal experience for Internet Explorer mode see
https://go.microsoft.com/fwlink/?linkid=2094210
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
SendSiteInfoToImproveServices
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 88.
Supported versions:
Description
This policy is no longer supported. It is replaced by DiagnosticData (for Windows 7, Windows 8, and
macOS) and Allow Telemetry on Win 10 (https://go.microsoft.com/fwlink/?linkid=2099569 ).
This policy enables sending info about websites visited in Microsoft Edge to Microsoft to improve
services like search.
Enable this policy to send info about websites visited in Microsoft Edge to Microsoft. Disable this
policy to not send info about websites visited in Microsoft Edge to Microsoft. In both cases, users
can't change or override the setting.
On Windows 10, if you don't configure this policy, Microsoft Edge will default to the Windows
diagnostic data setting. If this policy is enabled Microsoft Edge will only send info about websites
visited in Microsoft Edge if the Windows Diagnostic data setting is set to Full. If this policy is
disabled Microsoft Edge will not send info about websites visited. Learn more about Windows
Diagnostic data settings: https://go.microsoft.com/fwlink/?linkid=2099569
On Windows 7, windows 8, and macOS this policy controls sending info about websites visited. If
you don't configure this policy, Microsoft Edge will default to the user's preference.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
Mac information and settings
Preference Key Name: SendSiteInfoToImproveServices
Example value:
XML
<false/>
Back to top
SensorsAllowedForUrls
Supported versions:
On Windows and macOS since 86 or later
Description
Define a list of sites, based on URL patterns, that can access and use sensors such as motion and
light sensors.
If you don't configure this policy, the global default value from the DefaultSensorsSetting policy (if
set) or the user's personal configuration is used for all sites.
For URL patterns that don't match this policy, the following order of precedence is used: The
SensorsBlockedForUrls policy (if there is a match), the DefaultSensorsSetting policy (if set), or the
user's personal settings.
The URL patterns defined in this policy can't conflict with those configured in the
SensorsBlockedForUrls policy. You can't allow and block a URL.
For detailed information about valid URL patterns, please see https://go.microsoft.com/fwlink/?
linkid=2095322 .
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SensorsAllowedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\SensorsAllowedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
SensorsBlockedForUrls
Description
Define a list of sites, based on URL patterns, that can't access sensors such as motion and light
sensors.
If you don't configure this policy, the global default value from the DefaultSensorsSetting policy (if
set) or the user's personal configuration is used for all sites.
For URL patterns that don't match this policy, the following order of precedence is used: The
SensorsAllowedForUrls policy (if there is a match), the DefaultSensorsSetting policy (if set), or the
user's personal settings.
The URL patterns defined in this policy can't conflict with those configured in the
SensorsAllowedForUrls policy. You can't allow and block a URL.
For detailed information about valid URL patterns, please see https://go.microsoft.com/fwlink/?
linkid=2095322 .
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SensorsBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\SensorsBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
SerialAskForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can ask the user for access to a serial port.
If you don't configure this policy, the global default value from the DefaultSerialGuardSetting policy
(if set) or the user's personal configuration is used for all sites.
For URL patterns that don't match this policy, the following order of precedence is used: The
SerialBlockedForUrls policy (if there is a match), the DefaultSerialGuardSetting policy (if set), or the
user's personal settings.
The URL patterns defined in this policy can't conflict with those configured in the
SerialBlockedForUrls policy. You can't allow and block a URL.
For detailed information about valid url patterns, please see https://go.microsoft.com/fwlink/?
linkid=2095322 .
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SerialAskForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\SerialAskForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
SerialBlockedForUrls
Supported versions:
Description
Define a list of sites, based on URL patterns, that can't ask the user to grant them access to a serial
port.
If you don't configure this policy, the global default value from the DefaultSerialGuardSetting policy
(if set) or the user's personal configuration is used for all sites.
For URL patterns that don't match this policy, the following order of precedence is used: The
SerialAskForUrls policy (if there is a match), the DefaultSerialGuardSetting policy (if set), or the
user's personal settings.
The URL patterns in this policy can't conflict with those configured in the SerialAskForUrls policy.
You can't allow and block a URL.
Supported features:
Example value:
SOFTWARE\Policies\Microsoft\Edge\SerialBlockedForUrls\1 = "https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\SerialBlockedForUrls\2 = "[*.]contoso.edu"
XML
<array>
<string>https://www.contoso.com</string>
<string>[*.]contoso.edu</string>
</array>
Back to top
SetTimeoutWithout1MsClampEnabled
Control Javascript setTimeout() function minimum timeout (deprecated)
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 101, until 109
Description
This policy is obsolete and doesn't work in Microsoft Edge after version 109. This policy was only
provided temporarily to allow Enterprises to adapt to the new clamping behavior.
When the policy is set to Enabled, the Javascript setTimeout() with a timeout of 0ms will no longer
be fixed to 1ms to schedule timer-based callbacks. When the policy is set to Disabled, the Javascript
setTimeout() with a timeout of 0ms will be fixed to 1ms to schedule timer-based callbacks. When
the policy is unset, use the browser's default behavior for setTimeout() function.
This is a web standards compliancy feature, but it may change task ordering on a web page, leading
to unexpected behavior on sites that are dependent on a certain ordering. It also may affect sites
with a lot of setTimeout()s with a timeout of 0ms usage. For example, increasing CPU load.
For users where this policy is unset, Microsoft Edge Stable will roll out the change gradually on the
stable channel.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShadowStackCrashRollbackBehavior
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 109.
Supported versions:
On Windows since 95, until 109
Description
This policy is deprecated because it's intended to serve only as a short-term mechanism to give
enterprises more time to update their environments and report issues if they are found to be
incompatible with Hardware-enforced Stack Protection. It won't work in Microsoft Edge as soon as
version 109.
Microsoft Edge includes a Hardware-enforced Stack Protection security feature. This feature may
result in the browser crashing unexpectedly in cases that do not represent an attempt to
compromise the browser's security.
Using this policy, you may control the behavior of the Hardware-enforced Stack Protection feature
after a crash triggered by this feature is encountered.
Set this policy to 'DisableUntilUpdate' to disable the feature until Microsoft Edge updates next time.
DisableUntilUpdate (1) = Disable Hardware-enforced Stack Protection until the next Microsoft
Edge update
Supported features:
Data Type:
Integer
Example value:
0x00000000
Back to top
SharedArrayBufferUnrestrictedAccessAllowed
Supported versions:
On Windows and macOS since 92 or later
Description
Specifies whether SharedArrayBuffers can be used in a non cross-origin-isolated context. A
SharedArrayBuffer is a binary data buffer that can be used to create views on shared memory.
SharedArrayBuffers have a memory access vulnerability in several popular CPUs.
If you enable this policy, sites are allowed to use SharedArrayBuffers with no restrictions.
If you disable or don't configure this policy, sites are allowed to use SharedArrayBuffers only when
cross-origin isolated.
Microsoft Edge will require cross-origin isolation when using SharedArrayBuffers from Microsoft
Edge 91 onward for Web Compatibility reasons.
Supported features:
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
SharedLinksEnabled
Supported versions:
Description
Allows Microsoft Edge to display links recently shared by or shared with the user from Microsoft
365 apps in History.
If you enable or don't configure this policy, Microsoft Edge displays links recently shared by or
shared with the user from Microsoft 365 apps in History.
If you disable this policy, Microsoft Edge does not display links recently shared by or shared with
the user from Microsoft 365 apps in History. The control in Microsoft Edge settings is disabled and
set to off.
This policy only applies for Microsoft Edge local user profiles and profiles signed in using Azure
Active Directory.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShowAcrobatSubscriptionButton
Shows button on native PDF viewer in Microsoft Edge that allows users to
sign up for Adobe Acrobat subscription
Supported versions:
Description
This policy lets the native PDF viewer in Microsoft Edge show a button that lets a user looking for
advanced digital document features to discover and subscribe to premium offerings. This is done
via the Acrobat extension.
If you enable or don't configure this policy, the button will show up on the native PDF viewer in
Microsoft Edge. A user will be able to buy Adobe subscription to access their premium offerings.
If you disable this policy, the button won't be visible on the native PDF viewer in Microsoft Edge. A
user won't be able to discover Adobe's advanced PDF tools or buy their subscriptions.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShowDownloadsToolbarButton
Supported versions:
On Windows and macOS since 114 or later
Description
Set this policy to always show the Downloads button on the toolbar.
If you enable this policy, the Downloads button is pinned to the toolbar.
If you disable or don't configure the policy, the Downloads button isn't shown on the toolbar by
default. Users can toggle the Downloads button in edge://settings/appearance.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShowHistoryThumbnails
Supported versions:
Description
This policy lets you configure whether the history thumbnail feature collects and saves images for
the sites you visit. When enabled, this feature makes it easier to identify sites when you hover over
your history results. If you don't configure this policy, the thumbnail feature is turned on after a
user visits the history hub twice in the past 7 days. If you enable this policy, the history thumbnail
collects and saves images for visited sites. If you disable this policy, the history thumbnail doesn't
collect and save images for visited sites. When the feature is disabled, existing images are deleted
on a per user basis, and the feature no longer collects or saves images when a site is visited.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
ShowMicrosoftRewards
Supported versions:
On Windows and macOS since 88 or later
Description
Show Microsoft Rewards experience and notifications. If you enable this policy:
Microsoft account users (excludes Azure AD accounts) in search, new tab page, and earn
markets will see the Microsoft Rewards experience in their Microsoft Edge user profile.
The setting to enable Microsoft Rewards in Microsoft Edge settings will be enabled and
toggled on.
Microsoft account users (excludes Azure AD accounts) in search, new tab page, and earn
markets will not see the Microsoft Rewards experience in their Microsoft Edge user profile.
The setting to enable Microsoft Rewards in Microsoft Edge settings will be disabled and
toggled off.
Microsoft account users (excludes Azure AD accounts) in search, new tab page, and earn
markets will see the Microsoft Rewards experience in their Microsoft Edge user profile.
The setting to enable Microsoft Rewards in Microsoft Edge settings will be enabled and
toggled on.
Supported features:
Data Type:
Boolean
0x00000000
XML
<false/>
Back to top
ShowOfficeShortcutInFavoritesBar
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
This policy didn't work as expected due to changes in operational requirements. Therefore it's
deprecated and should not be used.
Specifies whether to include a shortcut to Office.com in the favorites bar. For users signed into
Microsoft Edge the shortcut takes users to their Microsoft Office apps and docs. If you enable or
don't configure this policy, users can choose whether to see the shortcut by changing the toggle in
the favorites bar context menu. If you disable this policy, the shortcut isn't shown.
Supported features:
Example value:
0x00000000
XML
<false/>
Back to top
ShowRecommendationsEnabled
Supported versions:
On Windows and macOS since 89 or later
Description
This setting controls the in-browser assistance notifications which are intended to help users get
the most out of Microsoft Edge. This is done by recommending features and by helping them use
browser features. These notifications take the form of dialog boxes, flyouts, coach marks and
banners in the browser. An example of an assistance notification would be when a user has many
tabs opened in the browser. In this instance Microsoft Edge may prompt the user to try out the
vertical tabs feature which is designed to give better browser tab management.
Disabling this policy will stop this message from appearing again even if the user has too many
tabs open. Any features that have been disabled by a management policy are not suggested to
users. If you enable or don't configure this setting, users will receive recommendations or
notifications from Microsoft Edge. If you disable this setting, users will not receive any
recommendations or notifications from Microsoft Edge
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SignedHTTPExchangeEnabled
Supported versions:
Description
If this policy isn't set or enabled, Microsoft Edge will accept web contents served as Signed HTTP
Exchanges.
Supported features:
Example value:
0x00000001
XML
<true/>
Back to top
SitePerProcess
Supported versions:
On Windows and macOS since 77 or later
Description
The 'SitePerProcess' policy can be used to prevent users from opting out of the default behavior of
isolating all sites. Note that you can also use the IsolateOrigins policy to isolate additional, finer-
grained origins.
If you enable this policy, users can't opt out of the default behavior where each site runs in its own
process.
If you disable or don't configure this policy, a user can opt out of site isolation. (For example, by
using "Disable site isolation" entry in edge://flags.) Disabling the policy or not configuring the
policy doesn't turn off Site Isolation.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SiteSafetyServicesEnabled
Supported versions:
On Windows and macOS since 101 or later
Description
This policy disables site safety services from showing top site info in the page info dialog.
If you enable this policy or don't configure it, the top site info will be shown.
If you disable this policy, the top site info will not be shown.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SmartActionsBlockList
Supported versions:
On Windows and macOS since 89 or later
Description
List specific services, such as PDFs, that don't show smart actions. (Smart actions are actions like
"define" which are available in full and mini context menus in Microsoft Edge.)
The smart action in the mini and full context menu will be disabled for all profiles for services
that match the given list.
Users will not see the smart action in the mini and full context menu on text selection for
services that match the given list.
In Microsoft Edge settings, the smart action in the mini and full context menu will be disabled
for services that match the given list.
The smart action in the mini and full context menu will be enabled for all profiles.
Users will see the smart action in the mini and full context menu on text selection.
In Microsoft Edge settings, the smart action in the mini and full context menu will be enabled.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SmartActionsBlockList\1 = "smart_actions_pdf"
XML
<array>
<string>smart_actions_pdf</string>
</array>
Back to top
SpeechRecognitionEnabled
Supported versions:
On Windows and macOS since 87 or later
Description
Set whether websites can use the W3C Web Speech API to recognize speech from the user. The
Microsoft Edge implementation of the Web Speech API uses Azure Cognitive Services, so voice data
will leave the machine.
If you enable or don't configure this policy, web-based applications that use the Web Speech API
can use Speech Recognition.
If you disable this policy, Speech Recognition is not available through the Web Speech API.
Read more about this feature here: SpeechRecognition API: https://go.microsoft.com/fwlink/?
linkid=2143388 Cognitive Services: https://go.microsoft.com/fwlink/?linkid=2143680
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SpellcheckEnabled
Enable spellcheck
Supported versions:
On Windows and macOS since 77 or later
Description
If you enable or don't configure this policy, the user can use spellcheck.
If you disable this policy, the user can't use spellcheck and the SpellcheckLanguage and
SpellcheckLanguageBlocklist policies are also disabled.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
SpellcheckLanguage
Supported versions:
Description
Enables different languages for spellcheck. Any language that you specify that isn't recognized is
ignored.
If you enable this policy, spellcheck is enabled for the languages specified, as well as any languages
the user has enabled.
If you don't configure or disable this policy, there's no change to the user's spellcheck preferences.
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguage\1 = "fr"
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguage\2 = "es"
Back to top
SpellcheckLanguageBlocklist
Supported versions:
On Windows since 78 or later
Description
Force-disables spellcheck languages. Unrecognized languages in that list will be ignored.
If you enable this policy, spellcheck will be disabled for the languages specified. The user can still
enable or disable spellcheck for languages not in the list.
If you do not set this policy, or disable it, there will be no change to the user's spellcheck
preferences.
If the SpellcheckEnabled policy is set to disabled, this policy will have no effect.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguageBlocklist\1 = "fr"
SOFTWARE\Policies\Microsoft\Edge\SpellcheckLanguageBlocklist\2 = "es"
Back to top
StandaloneHubsSidebarEnabled
Supported versions:
Description
Standalone Sidebar is an optional mode for the Sidebar in Microsoft Edge. When this mode is
activated by a user, the Sidebar appears in a fixed position on the Microsoft Windows desktop, and
is hidden from the browser application frame.
If you enable or don't configure this policy, users will have the ability to activate the Standalone
Sidebar. If you disable this policy, options to activate Standalone Sidebar will be hidden or made
unavailable. Note that blocking HubsSidebarEnabled will also prevent users from accessing
Standalone Sidebar.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
StricterMixedContentTreatmentEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 84.
Supported versions:
Description
This policy doesn't work because it was only intended to be a short-term mechanism to give
enterprises more time to update their web content if it was found to be incompatible with stricter
mixed content treatment.
This policy controls the treatment for mixed content (HTTP content in HTTPS sites) in the browser.
If you set this policy to true or not set, audio and video mixed content will be automatically
upgraded to HTTPS (that is, the URL will be rewritten as HTTPS, without a fallback if the resource
isn't available over HTTPS) and a 'Not Secure' warning will be shown in the URL bar for image
mixed content.
If you set the policy to false, auto upgrades will be disabled for audio and video, and no warning
will be shown for images.
This policy does not affect other types of mixed content other than audio, video, and images.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
<true/>
Back to top
SuppressUnsupportedOSWarning
Supported versions:
On Windows and macOS since 77 or later
Description
Suppresses the warning that appears when Microsoft Edge is running on a computer or operating
system that is no longer supported.
If this policy is false or unset, the warnings will appear on such unsupported computers or
operating systems.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SyncDisabled
Supported versions:
Description
Disables data synchronization in Microsoft Edge. This policy also prevents the sync consent prompt
from appearing.
This policy disables cloud synchronization only and has no impact on the
RoamingProfileSupportEnabled policy.
If you don't set this policy or apply it as recommended, users will be able to turn sync on or off. If
you apply this policy as mandatory, users will not be able to turn sync on.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
SyncTypesListDisabled
Supported versions:
Description
If you enable this policy all the specified data types will be excluded from synchronization. This
policy can be used to limit the type of data uploaded to the Microsoft Edge synchronization service.
You can provide one of the following data types for this policy: "favorites", "settings", "passwords",
"addressesAndMore", "extensions", "history", "openTabs", "edgeWallet", and "collections". The
"apps" data type will be supported starting in Microsoft Edge version 100. Note that these data
type names are case sensitive.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\SyncTypesListDisabled\1 = "favorites"
XML
<array>
<string>favorites</string>
</array>
Back to top
TLS13HardeningForLocalAnchorsEnabled
Enable a TLS 1.3 security feature for local trust anchors (obsolete)
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 85.
Supported versions:
On Windows and macOS since 81, until 85
Description
This policy doesn't work because it was only intended to be a short-term mechanism to give
enterprises more time to upgrade affected proxies.
This policy controls a security feature in TLS 1.3 that protects connections against downgrade
attacks. It is backwards-compatible and will not affect connections to compliant TLS 1.2 servers or
proxies. However, older versions of some TLS-intercepting proxies have an implementation flaw
which causes them to be incompatible.
If you enable this policy or don't set it, Microsoft Edge will enable these security protections for all
connections.
If you disable this policy, Microsoft Edge will disable these security protections for connections
authenticated with locally-installed CA certificates. These protections are always enabled for
connections authenticated with publicly-trusted CA certificates.
This policy can be used to test for any affected proxies and upgrade them. Affected proxies are
expected to fail connections with an error code of ERR_TLS13_DOWNGRADE_DETECTED.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: TLS13HardeningForLocalAnchorsEnabled
Example value:
XML
<true/>
Back to top
TLSCipherSuiteDenyList
Supported versions:
On Windows and macOS since 85 or later
Description
Configure the list of cipher suites that are disabled for TLS connections.
If you configure this policy, the list of configured cipher suites will not be used when establishing
TLS connections.
If you don't configure this policy, the browser will choose which TLS cipher suites to use.
Cipher suite values to be disabled are specified as 16-bit hexadecimal values. The values are
assigned by the Internet Assigned Numbers Authority (IANA) registry.
The TLS 1.3 cipher suite TLS_AES_128_GCM_SHA256 (0x1301) is required for TLS 1.3 and can't be
disabled by this policy.
This policy does not affect QUIC-based connections. QUIC can be turned off via the QuicAllowed
policy.
Supported features:
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\TLSCipherSuiteDenyList\1 = "0x1303"
SOFTWARE\Policies\Microsoft\Edge\TLSCipherSuiteDenyList\2 = "0xcca8"
SOFTWARE\Policies\Microsoft\Edge\TLSCipherSuiteDenyList\3 = "0xcca9"
XML
<array>
<string>0x1303</string>
<string>0xcca8</string>
<string>0xcca9</string>
</array>
Back to top
TabFreezingEnabled
Supported versions:
On Windows and macOS since 79, until 86
Description
This policy doesn't work, use SleepingTabsEnabled instead.
Controls whether Microsoft Edge can freeze tabs that are in the background for at least 5 minutes.
Tab freezing reduces CPU, battery, and memory usage. Microsoft Edge uses heuristics to avoid
freezing tabs that do useful work in the background, such as display notifications, play sound, and
stream video.
If you enable or don't configure this policy, tabs that have been in the background for at least 5
minutes might be frozen.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
TabServicesEnabled
Supported versions:
On Windows and macOS since 113 or later
Description
This policy controls whether Microsoft Edge can use its tab organization service to help name or
suggest tab groups to increase productivity.
If you enable or don't configure this policy, when a user creates a tab group or activates certain
"Group Similar Tabs" features Microsoft Edge sends tab data to its tab organization service. This
data includes URLs, page titles, and existing group information. The service uses this data to return
suggestions for better groupings and group names.
If you disable this policy, no data will be sent to the tab organization service. Microsoft Edge won't
suggest group names when a group is created and certain "Group Similar Tabs" features that rely
on the service won't be available.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
TargetBlankImpliesNoOpener
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 102.
Supported versions:
Description
If you enable this policy or leave it unset, the window.opener property is set to null unless the
anchor specifies rel="opener".
If you disable this policy, popups that target _blank are permitted to access (via JavaScript) the
page that requested to open the popup.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
TaskManagerEndProcessEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
If you enable or don't configure this policy, users can end processes in the Browser task manager. If
you disable it, users can't end processes, and the End process button is disabled in the Browser task
manager.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
TextPredictionEnabled
Supported versions:
If you enable or don't configure this policy, text predictions will be provided for eligible text fields.
If you disable this policy, text predictions will not be provided in eligible text fields. Sites may still
provide their own text predictions.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
Mac information and settings
Preference Key Name: TextPredictionEnabled
Example value:
XML
<false/>
Back to top
ThrottleNonVisibleCrossOriginIframesAllowed
Supported versions:
On Windows and macOS since 116 or later
Description
Throttling of cross-origin frames that are display:none and non-visible is a feature designed to
make cross-process and same-process cross-origin iframes consistent in their rendering behavior.
For more details on cross-process vs. same-process throttling, refer to
https://go.microsoft.com/fwlink/?linkid=2239564 .
This enterprise policy exists to allow administrators to control whether their users are able to turn
the additional throttling on or not.
If you enable or don't configure this policy, users can opt-in to throttling.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
XML
<true/>
Back to top
TotalMemoryLimitMb
Set limit on megabytes of memory a single Microsoft Edge instance can use
Supported versions:
On Windows and macOS since 80 or later
Description
Configures the amount of memory that a single Microsoft Edge instance can use before tabs start
getting discarded to save memory. The memory used by the tab will be freed and the tab will have
to be reloaded when switched to.
If you enable this policy, the browser will start to discard tabs to save memory once the limitation is
exceeded. However, there is no guarantee that the browser is always running under the limit. Any
value under 1024 will be rounded up to 1024.
If you don't set this policy, the browser will only attempt to save memory when it has detected that
the amount of physical memory on its machine is low.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000800
Mac information and settings
Preference Key Name: TotalMemoryLimitMb
Example value:
XML
<integer>2048</integer>
Back to top
TrackingPrevention
Supported versions:
On Windows and macOS since 78 or later
Description
Lets you decide whether to block websites from tracking users' web-browsing activity.
If you disable this policy or don't configure it, users can set their own level of tracking prevention.
TrackingPreventionBasic (1) = Basic (blocks harmful trackers, content and ads will be
personalized)
TrackingPreventionBalanced (2) = Balanced (blocks harmful trackers and trackers from sites
user has not visited; content and ads will be less personalized)
TrackingPreventionStrict (3) = Strict (blocks harmful trackers and majority of trackers from all
sites; content and ads will have minimal personalization. Some parts of sites might not work)
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000002
XML
<integer>2</integer>
Back to top
TranslateEnabled
Enable Translate
Supported versions:
On Windows and macOS since 77 or later
Description
Enables the integrated Microsoft translation service on Microsoft Edge.
If you enable this policy, Microsoft Edge offers translation functionality to the user by showing an
integrated translate flyout when appropriate, and a translate option on the right-click context
menu.
If you don't configure the policy, users can choose whether to use the translation functionality or
not.
Supported features:
Data Type:
Boolean
0x00000001
XML
<true/>
Back to top
TravelAssistanceEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 105.
Supported versions:
On Windows and macOS since 93, until 105
Description
This policy is obsolete as the feature is now contained within the Edge Sidebar and can be
managed using the HubsSidebarEnabled policy. It doesn't work in Microsoft Edge after version 105.
Configure this policy to allow/disallow travel assistance.
The travel assistance feature gives helpful and relevant information to a user who performs Travel
related task within the browser. This feature provides trusted and validated suggestions /
information to the users from across sources gathered by Microsoft.
If you enable or don't configure this setting, travel assistance will be enabled for the users when
they are performing travel related tasks.
If you disable this setting, travel assistance will be disabled and users will not be able to see any
travel related recommendations.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
TripleDESEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 96.
Supported versions:
Description
'This policy was removed in version 97 after 3DES was removed from Microsoft Edge.
If the policy is set to true, then 3DES cipher suites in TLS will be enabled. If it is set to false, they will
be disabled. If the policy is unset, 3DES cipher suites are disabled by default. This policy may be
used to temporarily retain compatibility with an outdated server. This is a stopgap measure and the
server should be reconfigured.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
U2fSecurityKeyApiEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 103.
Supported versions:
Description
This policy is obsolete because it was intended to be a short-term mechanism to give enterprises
more time to update their web content when it's found to be incompatible with the change to
remove the U2F Security Key API. It doesn't work in Microsoft Edge after version 103.
If you enable this policy, the deprecated U2F Security Key API can be used and the deprecation
reminder prompt shown for U2F API requests is suppressed.
If you disable this policy or don't configure it, the U2F Security Key API is disabled by default and
can only be used by sites that register for and use the U2FSecurityKeyAPI origin trial which ended
after Microsoft Edge version 103.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
URLAllowlist
Supported versions:
Description
Setting the policy provides access to the listed URLs, as exceptions to URLBlocklist.
You can use this policy to open exceptions to restrictive block lists. For example, you can include '*'
in the block list to block all requests, and then use this policy to allow access to a limited list of
URLs. You can use this policy to open exceptions to certain schemes, subdomains of other domains,
ports, or specific paths.
The most specific filter determines if a URL is blocked or allowed. The allowed list takes precedence
over the block list.
This policy also allows the browser to automatically invoke external applications registered as
protocol handlers for protocols like "tel:" or "ssh:".
If you don't configure this policy, there are no exceptions to the block list in the URLBlocklist policy.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\1 = "contoso.com"
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\2 = "https://ssl.server.com"
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\3 = "hosting.com/good_path"
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\4 = "https://server:8080/path"
SOFTWARE\Policies\Microsoft\Edge\URLAllowlist\5 = ".exact.hostname.com"
XML
<array>
<string>contoso.com</string>
<string>https://ssl.server.com</string>
<string>hosting.com/good_path</string>
<string>https://server:8080/path</string>
<string>.exact.hostname.com</string>
</array>
Back to top
URLBlocklist
Supported versions:
On Windows and macOS since 77 or later
Description
Define a list of sites, based on URL patterns, that are blocked (your users can't load them).
You can define exceptions in the URLAllowlist policy. These policies are limited to 1000 entries;
subsequent entries are ignored.
Note that blocking internal 'edge://*' URLs isn't recommended - this may lead to unexpected
errors.
This policy doesn't prevent the page from updating dynamically through JavaScript. For example, if
you block 'contoso.com/abc', users might still be able to visit 'contoso.com' and click on a link to
visit 'contoso.com/abc', as long as the page doesn't refresh.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\1 = "contoso.com"
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\2 = "https://ssl.server.com"
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\3 = "hosting.com/bad_path"
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\4 = "https://server:8080/path"
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\5 = ".exact.hostname.com"
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\6 = "custom_scheme:*"
SOFTWARE\Policies\Microsoft\Edge\URLBlocklist\7 = "*"
XML
<array>
<string>contoso.com</string>
<string>https://ssl.server.com</string>
<string>hosting.com/bad_path</string>
<string>https://server:8080/path</string>
<string>.exact.hostname.com</string>
<string>custom_scheme:*</string>
<string>*</string>
</array>
Back to top
UnthrottledNestedTimeoutEnabled
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
This is a web standards compliancy feature that may change task ordering on a web page, leading
to unexpected behavior on sites that are dependent on a certain ordering. It also may affect sites
with a lot of usage of a timeout of 0ms for setTimeout. For example, increasing CPU load.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
UpdatePolicyOverride
Supported versions:
Description
If you enable this policy, Microsoft Edge Update handles Microsoft Edge updates according to how
you configure the following options:
Automatic silent updates only: Updates are applied only when they're found by the periodic
update check.
Manual updates only: Updates are applied only when the user runs a manual update check.
(Not all apps provide an interface for this option.)
If you select manual updates, make sure you periodically check for updates by using Microsoft
Autoupdate.
If you don't enable and configure this policy, Microsoft Edge Update automatically checks for
updates.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
String
XML
<string>automatic-silent-only</string>
Back to top
UploadFromPhoneEnabled
Supported versions:
On Windows and macOS since 117 or later
Description
This policy lets you configure the "Upload from phone" feature in Microsoft Edge.
Upload from phone lets users select file from mobile devices to desktop when user upload file in a
webpage in Microsoft Edge.
If you enable or don't configure this policy, you can use the Upload from phone feature in
Microsoft Edge.
If you disable this policy, you can't use the Upload from phone feature in Microsoft Edge.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
UserAgentClientHintsEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 93.
Supported versions:
On Windows and macOS since 86, until 93
Description
This policy is obsolete because it was intended for short-term adaptation purposes only. It doesn't
work in Microsoft Edge after version 93.
When enabled the User-Agent Client Hints feature sends granular request headers that provide
information about the user browser (for example, the browser version) and environment (for
example, the system architecture).
This is an additive feature, but the new headers may break some websites that restrict the
characters that requests may contain.
If you enable or don't configure this policy, the User-Agent Client Hints feature is enabled. If you
disable this policy, this feature is unavailable.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
UserAgentClientHintsGREASEUpdateEnabled
Supported versions:
Description
The User-Agent GREASE specification recommends the inclusion of additional GREASE characters
beyond the current semicolon and space, and recommends that the arbitrary version number be
varied over time.
When enabled, the User-Agent Client Hints GREASE Update feature aligns the User-Agent GREASE
algorithm with the latest version from the specification. The updated specification may break some
websites that restrict the characters that requests may contain. For more information, see the
following specification: https://wicg.github.io/ua-client-hints/#grease
If this policy is enabled or not configured, the User-Agent GREASE algorithm from the specification
will be used. If the policy is disabled, the prior User-Agent GREASE algorithm will be used.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: UserAgentClientHintsGREASEUpdateEnabled
Example value:
XML
<true/>
Back to top
UserAgentReduction
Supported versions:
On Windows and macOS since 99 or later
Description
The User-Agent HTTP request header is scheduled to be reduced. To facilitate testing and
compatibility, this policy can enable the reduction feature for all websites, or disable the ability for
origin trials, or field trials to enable the feature.
If you don't configure this policy or set it to Default, User-Agent will be controlled by
experimentation.
Set this policy to 'ForceEnabled' to force the reduced version of the User-Agent request header.
Set this policy to 'ForceDisabled' to force the full version of the User-Agent request header.
https://go.microsoft.com/fwlink/?linkid=2186267
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Integer
Example value:
0x00000000
XML
<integer>0</integer>
Back to top
UserDataDir
Supported versions:
Description
If you enable this policy, Microsoft Edge uses the specified directory regardless of whether the user
has set the '--user-data-dir' command-line flag.
If you don't enable this policy, the default profile path is used, but the user can override it by using
the '--user-data-dir' flag. Users can find the directory for the profile at edge://version/ under profile
path.
To avoid data loss or other errors, don't configure this policy to a volume's root directory or to a
directory that's used for other purposes, because Microsoft Edge manages its contents.
Supported features:
Data Type:
String
Example value:
"${users}/${user_name}/Edge"
XML
<string>${users}/${user_name}/Edge</string>
Back to top
UserDataSnapshotRetentionLimit
Limits the number of user data snapshots retained for use in case of
emergency rollback
Supported versions:
On Windows since 86 or later
Description
Following each major version update, Microsoft Edge will create a snapshot of parts of the user's
browsing data to use in case of a later emergency that requires a temporary version rollback. If a
temporary rollback is performed to a version for which a user has a corresponding snapshot, the
data in the snapshot is restored. This lets users keep settings such as bookmarks and autofill data.
If you don't set this policy, the default value of 3 snapshots is used.
If you set this policy, old snapshots are deleted as needed to respect the limit you set. If you set this
policy to 0, no snapshots are taken.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Integer
Example value:
0x00000003
Back to top
UserFeedbackAllowed
Supported versions:
On Windows and macOS since 77 or later
Description
Microsoft Edge uses the Edge Feedback feature (enabled by default) to allow users to send
feedback, suggestions or customer surveys and to report any issues with the browser. Also, by
default, users can't disable (turn off) the Edge Feedback feature.
Starting in Microsoft Edge 105, if the user is signed into Microsoft Edge with their work or school
account, their feedback is associated with their account and organization.
If you enable this policy or don't configure it, users can invoke Edge Feedback.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
VerticalTabsAllowed
Supported versions:
Description
Configures whether a user can access an alternative layout where tabs are vertically aligned on the
side of the browser instead of at the top. When there are several tabs open, this layout provides
better tab viewing and management. There's better visibility of the site titles, it's easier to scan
aligned icons, and there's more space to manage and close tabs.
If you disable this policy, then the vertical tab layout will not be available as an option for users.
If you enable or don't configure this policy, the tab layout will still be at the top, but a user has the
option to turn on vertical tabs on the side.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
VideoCaptureAllowed
Supported versions:
On Windows and macOS since 77 or later
Description
Control whether sites can capture video.
If enabled or not configured (default), the user will be asked about video capture access for all sites
except those with URLs configured in the VideoCaptureAllowedUrls policy list, which will be granted
access without prompting.
If you disable this policy, the user isn't prompted, and video capture is only available to URLs
configured in VideoCaptureAllowedUrls policy.
This policy affects all types of video inputs, not only the built-in camera.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
VideoCaptureAllowedUrls
Sites that can access video capture devices without requesting permission
Supported versions:
On Windows and macOS since 77 or later
Description
Specify websites, based on URL patterns, that can use video capture devices without asking the user
for permission. Patterns in this list are matched against the security origin of the requesting URL. If
they match, the site is automatically granted access to video capture devices.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\VideoCaptureAllowedUrls\1 =
"https://www.contoso.com/"
SOFTWARE\Policies\Microsoft\Edge\VideoCaptureAllowedUrls\2 =
"https://[*.]contoso.edu/"
XML
<array>
<string>https://www.contoso.com/</string>
<string>https://[*.]contoso.edu/</string>
</array>
Back to top
VisualSearchEnabled
Supported versions:
Description
Visual search lets you quickly explore more related content about entities in an image.
If you enable or don't configure this policy, visual search will be enabled via image hover, context
menu, and search in sidebar.
If you disable this policy, visual search will be disabled and you won't be able to get more info
about images via hover, context menu, and search in sidebar.
Supported features:
Can be mandatory: Yes
Can be recommended: Yes
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
WPADQuickCheckEnabled
Supported versions:
On Windows and macOS since 77 or later
Description
Allows you to turn off WPAD (Web Proxy Auto-Discovery) optimization in Microsoft Edge.
If you disable this policy, WPAD optimization is disabled, which makes the browser wait longer for
DNS-based WPAD servers.
Independent of whether or how this policy is enabled, the WPAD optimization setting cannot be
changed by users.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WalletDonationEnabled
Supported versions:
If you enable or don't configure this policy, users can use the Wallet Donation feature.
If you disable this policy, users can't use the Wallet Donation feature.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Mac information and settings
Preference Key Name: WalletDonationEnabled
Example value:
XML
<true/>
Back to top
WebAppInstallForceList
Supported versions:
On Windows and macOS since 80 or later
Description
Configure this policy to specify a list of web apps that install silently, without user interaction, and
which users can't uninstall or turn off.
Each list item of the policy is an object with a mandatory member: url (the URL of the web app to
install)
default_launch_container (specifies the window mode that the web app opens with-a new tab
is the default.)
create_desktop_shortcut (True if you want to create Linux and Microsoft Windows desktop
shortcuts).
fallback_app_name (Starting with Microsoft Edge version 90, allows you to override the app
name if it is not a Progressive Web App (PWA), or the app name that is temporarily installed if
it is a PWA but authentication is required before the installation can be completed. If both
custom_name and fallback_app_name are provided, the latter will be ignored.)
custom_name (Starting with Microsoft Edge version 112, allows you to override the app name
of installed apps.)
custom_icon (Starting with Microsoft Edge version 112, allows you to override the app icon of
installed apps. The icons have to be square, have a maximum file size of 1 MB, and in one of
the following formats: jpeg, png, gif, webp, ico. The hash value has to be the SHA256 hash of
the icon file.)
install_as_shortcut (Starting with Microsoft Edge version 107). If enabled the given url will be
installed as a shortcut, as if done via the "Create Shortcut..." option in the desktop browser
GUI. Note that when installed as a shortcut it won't be updated if the manifest in url changes.
If disabled or unset, the web app at the given url will be installed normally. Not currently
supported in Microsoft Edge.)
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Dictionary
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebAppInstallForceList = [
{
"create_desktop_shortcut": true,
"default_launch_container": "window",
"url": "https://www.contoso.com/maps"
},
{
"default_launch_container": "tab",
"url": "https://app.contoso.edu"
},
{
"default_launch_container": "window",
"fallback_app_name": "Editor",
"url": "https://app.contoso.edu/editor"
},
{
"custom_name": "Spreadsheets",
"default_launch_container": "window",
"install_as_shortcut": true,
"url": "https://app.contoso.edu/sheets"
},
{
"custom_icon": {
"hash": "c28f469c450e9ab2b86ea47038d2b324c6ad3b1e9a4bd8960da13214afd0ca38",
"url": "https://mydomain.example.com/sunny_icon.png"
},
"url": "https://weather.example.com"
}
]
SOFTWARE\Policies\Microsoft\Edge\WebAppInstallForceList = [{"create_desktop_shortcut":
true, "default_launch_container": "window", "url": "https://www.contoso.com/maps"},
{"default_launch_container": "tab", "url": "https://app.contoso.edu"},
{"default_launch_container": "window", "fallback_app_name": "Editor", "url":
"https://app.contoso.edu/editor"}, {"custom_name": "Spreadsheets",
"default_launch_container": "window", "install_as_shortcut": true, "url":
"https://app.contoso.edu/sheets"}, {"custom_icon": {"hash":
"c28f469c450e9ab2b86ea47038d2b324c6ad3b1e9a4bd8960da13214afd0ca38", "url":
"https://mydomain.example.com/sunny_icon.png"}, "url": "https://weather.example.com"}]
XML
<key>WebAppInstallForceList</key>
<array>
<dict>
<key>create_desktop_shortcut</key>
<true/>
<key>default_launch_container</key>
<string>window</string>
<key>url</key>
<string>https://www.contoso.com/maps</string>
</dict>
<dict>
<key>default_launch_container</key>
<string>tab</string>
<key>url</key>
<string>https://app.contoso.edu</string>
</dict>
<dict>
<key>default_launch_container</key>
<string>window</string>
<key>fallback_app_name</key>
<string>Editor</string>
<key>url</key>
<string>https://app.contoso.edu/editor</string>
</dict>
<dict>
<key>custom_name</key>
<string>Spreadsheets</string>
<key>default_launch_container</key>
<string>window</string>
<key>install_as_shortcut</key>
<true/>
<key>url</key>
<string>https://app.contoso.edu/sheets</string>
</dict>
<dict>
<key>custom_icon</key>
<dict>
<key>hash</key>
<string>c28f469c450e9ab2b86ea47038d2b324c6ad3b1e9a4bd8960da13214afd0ca38</string>
<key>url</key>
<string>https://mydomain.example.com/sunny_icon.png</string>
</dict>
<key>url</key>
<string>https://weather.example.com</string>
</dict>
</array>
Back to top
WebCaptureEnabled
Supported versions:
Description
Enables the web capture feature in Microsoft Edge that allows users to capture web and PDF
content, and annotate the capture using inking tools. Users can also do a visual image search with
the captured content.
If you enable this policy or don't configure it, the Web capture option shows up in the context
menu, Settings and more menu, and by using the keyboard shortcut, CTRL+SHIFT+S and
CTRL+SHIFT+X. If you disable this policy, users can't access the web capture feature in Microsoft
Edge.
Starting with Microsoft Edge version 114, Web Capture includes Web Select, which lets users select
and copy web content while preserving its formatting when pasted in most cases. It also allows
more targeted selection on some web elements, such as copying a single column in a table. Users
can access Web Select directly using keyboard shortcut, CTRL+SHIFT+X.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WebComponentsV0Enabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 84.
Supported versions:
On Windows and macOS since 80, until 84
Description
This policy doesn't work because this policy allowed these features to be selectively re-enabled
until Microsoft Edge version 85. The Web Components v0 APIs (Shadow DOM v0, Custom Elements
v0, and HTML Imports) were deprecated in 2018, and have been disabled by default starting in
Microsoft Edge version 80.
If you set this policy is set to True, the Web Components v0 features will be enabled for all sites.
If you set this policy to False or don't set this policy, the Web Components v0 features will be
disabled by default, starting in Microsoft Edge version 80.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WebDriverOverridesIncompatiblePolicies
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 84.
Supported versions:
Description
This policy doesn't work because WebDriver is now compatible with all existing policies.
This policy allows users of the WebDriver feature to override policies which can interfere with its
operation.
If the policy is enabled, WebDriver will be able to override incomaptible policies. If the policy is
disabled or not configured, WebDriver will not be allowed to override incompatible policies.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WebRtcAllowLegacyTLSProtocols
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
On Windows and macOS since 88 or later
Description
If you enable this policy, WebRTC peer connections can downgrade to obsolete versions of the
TLS/DTLS (DTLS 1.0, TLS 1.0 and TLS 1.1) protocols. If you disable or don't set this policy, these
TLS/DTLS versions are disabled.
This policy is temporary and will be removed in a future version of Microsoft Edge.
Supported features:
Data Type:
Boolean
Example value:
0x00000000
XML
<false/>
Back to top
WebRtcLocalIpsAllowedUrls
Supported versions:
Description
Specifies a list of origins (URLs) or hostname patterns (like "contoso.com") for which local IP address
should be exposed by WebRTC.
If you enable this policy and set a list of origins (URLs) or hostname patterns, when
edge://flags/#enable-webrtc-hide-local-ips-with-mdns is Enabled, WebRTC will expose the local IP
address for cases that match patterns in the list.
Please note that this policy weakens the protection of local IP addresses that might be needed by
administrators.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
List of strings
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebRtcLocalIpsAllowedUrls\1 =
"https://www.contoso.com"
SOFTWARE\Policies\Microsoft\Edge\WebRtcLocalIpsAllowedUrls\2 = "*contoso.com*"
XML
<array>
<string>https://www.contoso.com</string>
<string>*contoso.com*</string>
</array>
Back to top
WebRtcLocalhostIpHandling
Supported versions:
Description
Allows you to set whether or not WebRTC exposes the user's local IP address.
If you don't set this policy, or if you disable it, WebRTC exposes the local IP address.
Note: This policy does not provide an option to exclude specific domains.
AllowAllInterfaces (default) = Allow all interfaces. This exposes the local IP address
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
String
Example value:
"default"
XML
<string>default</string>
Back to top
WebRtcRespectOsRoutingTableEnabled
Enable support for Windows OS routing table rules when making peer to
peer connections via WebRTC
Supported versions:
On Windows since 94 or later
Description
Controls whether WebRTC will respect the Windows OS routing table rules when making peer to
peer connections, thus enabling split tunnel VPNs.
If you disable this policy or don't configure it, WebRTC will not consider the routing table and may
make peer to peer connections over any available network.
If you enable this policy, WebRTC will prefer to make peer to peer connections using the indicated
network interface for the remote address as indicated in the routing table.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
WebRtcUdpPortRange
Supported versions:
Description
Restricts the UDP port range used by WebRTC to a specified port interval (endpoints included).
By configuring this policy, you specify the range of local UDP ports that WebRTC can use.
If you don't configure this policy, or if you set it to an empty string or invalid port range, WebRTC
can use any available local UDP port.
Supported features:
Data Type:
String
Example value:
"10000-11999"
XML
<string>10000-11999</string>
Back to top
WebSQLAccess
Force WebSQL to be enabled
Supported versions:
Description
WebSQL is on by default as of Microsoft Edge version 101, but can be disabled via a Microsoft Edge
flag. If you enable this policy, WebSQL cannot be disabled. If you disable or don't configure this
policy, WebSQL can be disabled.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WebSQLInThirdPartyContextEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 100.
Supported versions:
Description
This policy is obsolete because it was intended to be a short-term mechanism to give enterprises
more time to update their web content when it's found to be incompatible with the change to
disable WebSQL in third-party contexts. It doesn't work in Microsoft Edge after version 100.
WebSQL in third-party contexts (for example, cross-site iframes) is off by default as of Microsoft
Edge version 97 and was fully removed in version 101.
If you disable this policy or don't configure it, WebSQL in third-party contexts will stay off.
Supported features:
Example value:
0x00000001
XML
<true/>
Back to top
WebSQLNonSecureContextEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 112.
Supported versions:
On Windows and macOS since 107, until 112
Description
This policy doesn't work because WebSQL in non-secure contexts is on by default as of Microsoft
Edge 105. If you enable this policy, WebSQL in non-secure contexts will be enabled. If you disable
or don't configure this policy, WebSQL in non-secure contexts will follow the default settings of the
broser.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WebSelectEnabled
OBSOLETE: This policy is obsolete and doesn't work after Microsoft Edge 116.
Supported versions:
Description
This policy is obsoleted because Web Select is part of Web Capture and can be controlled by
WebCaptureEnabled. This policy won't work in Microsoft Edge version 117. If Web Capture is
disabled by WebCaptureEnabled, Web select will not be available in Web Capture.
Web select lets users select and copy web content while preserving its formatting when pasted in
most cases. It also allows more targeted selection on some web elements, such as copying a single
column in a table.
If you enable or don't configure this policy, Web select is available in Web Capture and can be
accessed directly using the CTRL+SHIFT+X keyboard shortcut.
If you disable this policy, Web select will not be available in Web Capture and the CTRL+SHIFT+X
keyboard shortcut will also not work.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: Yes
Applies to a profile that is signed in with a Microsoft account: No
Data Type:
Boolean
Example value:
0x00000001
XML
<true/>
Back to top
WebWidgetAllowed
Supported versions:
Description
Enables the search bar. When enabled, users can use the search bar to search the web from their
desktop or from an application. The search bar provides a search box that shows web suggestions
and opens all web searches in Microsoft Edge. The search box provides search (powered by Bing)
and URL suggestions. The search bar can be launched from the "More tools" menu or jump list in
Microsoft Edge.
If you enable or don't configure this policy: The search bar will be automatically enabled for all
profiles. The option to enable the search bar at startup will be toggled on if the
WebWidgetIsEnabledOnStartup policy is enabled. If the WebWidgetIsEnabledOnStartup is disabled
or not configured, the option to enable the search bar at startup will be toggled off. Users will see
the menu item to launch the search bar from the Microsoft Edge "More tools" menu. Users can
launch the search bar from "More tools". Users will see the menu item to launch the search bar
from the Microsoft Edge jump list menu. Users can launch the search bar from the Microsoft Edge
jump list menu. The search bar can be turned off by the "Quit" option in the System tray or by
closing the search bar from the 3 dot menu. The search bar will be restarted on system reboot if
auto-start is enabled.
If you disable this policy: The search bar will be disabled for all profiles. The option to launch the
search bar from Microsoft Edge "More tools" menu will be disabled. The option to launch the
search bar from Microsoft Edge jump list menu will be disabled.
This policy is deprecated due to the deprecation of the Web widget's vertical layout. This policy will
be made obsolete in 119 release.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Windows information and settings
Example value:
0x00000001
Back to top
WebWidgetIsEnabledOnStartup
DEPRECATED: This policy is deprecated. It is currently supported but will become obsolete in a
future release.
Supported versions:
Description
Allows the Search bar to start running at Windows startup.
If you enable:
The Search bar will start running at Windows startup by default.
If the Search bar is disabled via [WebWidgetAllowed](#webwidgetallowed) policy,
this policy will not start the Search bar on Windows startup.
If you disable this policy:
The Search bar will not start at Windows startup for all profiles.
The option to start the Edge bar at Windows startup will be disabled and toggled
off in Microsoft Edge settings.
This policy is deprecated due to the deprecation of the Web widget's vertical layout. This policy will
be made obsolete in 119 release.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
WinHttpProxyResolverEnabled
Supported versions:
On Windows since 84 or later
Description
This policy will be superseded by a similar feature in a future release. For more information, see
https://crbug.com/1032820 .
Use Windows to resolve proxies for all browser networking instead of the proxy resolver built into
Microsoft Edge. The Windows proxy resolver enables Windows proxy features such as
DirectAccess/NRPT.
This policy comes with the problems described by https://crbug.com/644030 . It causes PAC files
to be fetched and executed by Windows code, including PAC files set via the ProxyPacUrl policy.
Since Network Fetches for the PAC file happen via Windows instead of Microsoft Edge code,
network policies such as DnsOverHttpsMode will not apply to network fetches for a PAC file.
If you enable this policy, the Windows proxy resolver will be used.
If you disable or don't configure this policy, the Microsoft Edge proxy resolver will be used.
Supported features:
Data Type:
Boolean
Example value:
0x00000001
Back to top
WindowOcclusionEnabled
Supported versions:
On Windows since 89 or later
Description
Enables window occlusion in Microsoft Edge.
If you enable this setting, to reduce CPU and power consumption Microsoft Edge will detect when a
window is covered by other windows, and will suspend work painting pixels.
If you disable this setting Microsoft Edge will not detect when a window is covered by other
windows.
If this policy is left not set, window hiding detection will be enabled.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Per Profile: No
Applies to a profile that is signed in with a Microsoft account: Yes
Data Type:
Boolean
Example value:
0x00000001
Back to top
See also
Configuring Microsoft Edge
Microsoft Edge Enterprise landing page
Microsoft Security Baselines Blog
Microsoft Edge - EdgeUpdater policies
for macOS
Article • 08/30/2023
The latest version of Microsoft Edge includes the following policies that you can use to
control how and when Microsoft Edge is updated.
For information about other policies available in Microsoft Edge, check out Microsoft
Edge browser policy reference
For information about Update policies available in Microsoft Edge for Windows, check
out Microsoft Edge Update policy reference.
For an example of how to use a plist to deploy the policies in this document, check out
Update configuration example
7 Note
Available policies
These tables list all of the update-related group policies available in this release of
Microsoft Edge. Use the links in the table to get more details about specific policies.
Applications Preferences
Applications
Preferences
Policy Name Caption
Applications policies
Back to top
UpdateDefault
Description
Lets you specify the default behavior for all channels concerning the way EdgeUpdater
handles available updates for Microsoft Edge. Can be overridden for individual channels
by specifying the 'Update policy override' policy for those specific channels.
If you enable this policy, EdgeUpdater handles Microsoft Edge updates according to
how you configure the following options:
Always allow updates: Updates are always applied when found, either by periodic
update check or by a manual update check.
Automatic silent updates only: Updates are applied only when they're found by the
periodic update check.
Manual updates only: Updates are applied only when the user runs a manual
update check.
Updates disabled: Updates are never applied.
If you select manual updates, make sure you periodically check for updates by using the
app's manual update mechanism, if available. If you disable updates, periodically check
for updates, and distribute them to users.
If you don't enable and configure this policy, EdgeUpdater handles available updates as
specified by the 'Update policy override' policy.
Supported values:
0 // Always allow updates
1 // Automatic silent updates only
2 // Manual updates only
3 // Updates disabled
Back to top
Update
Description
Specifies how EdgeUpdater handles available updates from Microsoft Edge.
If you enable this policy, EdgeUpdater handles Microsoft Edge updates according to
how you configure the following options:
Always allow updates: Updates are always applied when found, either by periodic
update check or by a manual update check.
Automatic silent updates only: Updates are applied only when they're found by the
periodic update check.
Manual updates only: Updates are applied only when the user runs a manual
update check.
Updates disabled: Updates are never applied.
If you select manual updates, make sure you periodically check for updates by using the
app's manual update mechanism, if available. If you disable updates, periodically check
for updates, and distribute them to users.
If you don't enable and configure this policy, EdgeUpdater handles available updates as
specified by the 'Update policy override' policy.
Supported values:
Back to top
Preferences policies
Back to top
AutoUpdateCheckPeriodMinutes
Description
Minimum number of minutes between automatic update checks.
Set this policy to the value 0 to disable all periodic network traffic by EdgeUpdater. This
is not recommended, as it prevents EdgeUpdater itself from receiving stability and
security updates.
The 'Update policy override default' and per-application 'Update policy override'
settings should be used to manage application updates rather than this setting.
Supported values:
Back to top
UpdatesSuppressed
If you disable or don't configure this policy, update checks aren't suppressed during any
specific period.
Example value:
Back to top
See also
Microsoft Edge for macOS switch from Microsoft AutoUpdate to EdgeUpdater
Microsoft Edge Enterprise landing page
Microsoft Edge - Update policies
Article • 03/23/2023
The latest version of Microsoft Edge includes the following policies that you can use to
control how and when Microsoft Edge is updated.
For information about other policies available in Microsoft Edge, check out Microsoft
Edge browser policy reference
7 Note
Available policies
These tables lists all of the update-related group policies available in this release of
Microsoft Edge. Use the links in the table to get more details about specific policies.
Applications Preferences
Applications
Preferences
Proxy Server
Applications policies
Back to top
InstallDefault
Description
You can specify the default behavior of all channels to allow or block Microsoft Edge on
domain-joined devices.
You can override this policy for individual channels by enabling the 'Allow installation'
policy for specific channels.
If you disable this policy, the installation of Microsoft Edge is blocked. This only affects
the installation of Microsoft Edge software when the 'Allow installation' policy is set to
Not Configured.
This policy doesn't prevent Microsoft Edge Update from running or prevent users from
installing Microsoft Edge software using other methods.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: InstallDefault
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
UpdateDefault
Description
Lets you specify the default behavior for all channels concerning the way Microsoft Edge
Update handles available updates for Microsoft Edge. Can be overridden for individual
channels by specifying the 'Update policy override' policy for those specific channels.
If you enable this policy, Microsoft Edge Update handles Microsoft Edge updates
according to how you configure the following options:
Always allow updates: Updates are always applied when found, either by periodic
update check or by a manual update check.
Automatic silent updates only: Updates are applied only when they're found by the
periodic update check.
Manual updates only: Updates are applied only when the user runs a manual
update check.
Updates disabled: Updates are never applied.
If you select manual updates, make sure you periodically check for updates by using the
app's manual update mechanism, if available. If you disable updates, periodically check
for updates, and distribute them to users.
If you don't enable and configure this policy, Microsoft Edge Update handles available
updates as specified by the 'Update policy override' policy.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: UpdateDefault
Value Type: REG_DWORD
Example value:
0x00000003
Back to top
Install
Allow installation
Description
Specifies whether a Microsoft Edge channel can be installed on domain-joined devices.
If you enable this policy for a channel, Microsoft Edge will not be blocked from
installation.
If you disable this policy for a channel (or set it to 'Installs disabled'), Microsoft Edge will
be blocked from installation.
If you don't configure this policy for a channel, the 'Allow installation default' policy
configuration determines whether users can install that channel of Microsoft Edge.
If you set this policy to Always allow Machine-Wide Installs but not Per-User Installs,
'Microsoft Edge' will only be deployed machine-wide.
If you set this policy to Force Installs (Machine-Wide), 'Microsoft Edge' may only be
deployed machine-wide if Microsoft Edge Update is pre-installed. Requires Microsoft
Edge Update 1.3.155.43 or higher.
If you set this policy to Force Installs (Per-User), 'Microsoft Edge' may only be deployed
on a Per-User basis to all machines if Microsoft Edge Update is pre-installed Per-User.
Requires Microsoft Edge Update 1.3.155.43 or higher.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): Install{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): Install{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): Install{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): Install{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
Update
Description
Specifies how Microsoft Edge Update handles available updates from Microsoft Edge.
If you enable this policy, Microsoft Edge Update handles Microsoft Edge updates
according to how you configure the following options:
Always allow updates: Updates are always applied when found, either by periodic
update check or by a manual update check.
Automatic silent updates only: Updates are applied only when they're found by the
periodic update check.
Manual updates only: Updates are applied only when the user runs a manual
update check. (Not all apps provide an interface for this option.)
Updates disabled: Updates are never applied.
If you select manual updates, make sure you periodically check for updates by using the
app's manual update mechanism, if available. If you disable updates, periodically check
for updates, and distribute them to users.
If you don't enable and configure this policy, Microsoft Edge Update handles available
updates as specified by the 'Update policy override default' policy.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): Update{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): Update{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): Update{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): Update{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
Allowsxs
Description
This policy lets a user run Microsoft Edge (Edge HTML) and Microsoft Edge (Chromium-
based) side-by-side.
If this policy is set to “Not configured”, Microsoft Edge (Chromium-based) will replace
Microsoft Edge (Edge HTML) after the Microsoft Edge (Chromium-based) stable channel
and the November 2019 security updates are installed. This is the same behavior as the
“Disabled” setting.
The “Disabled” setting blocks a side-by-side experience and Microsoft Edge (Chromium-
based) will replace Microsoft Edge (Edge HTML) after the Microsoft Edge (Chromium-
based) stable channel and the November 2019 security updates are installed. This is the
same behavior as the “Not Configured” setting.
When this policy is “Enabled”, Microsoft Edge (Chromium-based) and Microsoft Edge
(Edge HTML) can run side-by-side after Microsoft Edge (Chromium-based) is installed.
For this group policy to take affect, it must be configured before the automatic install of
Microsoft Edge (Chromium-based) by Windows Update. Note: A user can block the
automatic update of Microsoft Edge (Chromium-based) by using the Microsoft Edge
(Chromium-based) Blocker Toolkit.
Starting with Windows 10 version 20H2 Microsoft Edge Legacy and the side-by-side
browser experience are not supported.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: Allowsxs
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
CreateDesktopShortcutDefault
Description
Lets you specify the default behavior for all channels for creating a desktop shortcut
when Microsoft Edge is installed.
If you enable this policy a desktop shortcut is created when Microsoft Edge is installed.
If you disable this policy, no desktop shortcut will be created when Microsoft Edge is
installed.
If you don’t configure this policy a desktop shortcut to Microsoft Edge will be
created during installation.
If Microsoft Edge is already installed, this policy will have no
effect.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: CreateDesktopShortcutDefault
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
CreateDesktopShortcut
Description
If you enable this policy a desktop shortcut is created when Microsoft Edge is installed.
If you disable this policy, no desktop shortcut will be created when Microsoft Edge is
installed.
If you don’t configure this policy a desktop shortcut to Microsoft Edge will be
created during installation.
If Microsoft Edge is already installed, this policy will have no
effect.
If you don't configure this policy for a channel, the 'Prevent Desktop Shortcut creation
upon install default' policy configuration determines shortcut creation when Microsoft
Edge is installed.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): CreateDesktopShortcut{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): CreateDesktopShortcut{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): CreateDesktopShortcut{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): CreateDesktopShortcut{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
RollbackToTargetVersion
Description
Specifies that Microsoft Edge Update should rollback installations of Microsoft Edge to
the version indicated in 'Target version override'.
This policy has no effect unless 'Target version override' is set and 'Update policy
override' is set to one of the ON states (Always allow updates, Automatic silent updates
only, Manual updates only).
If you disable this policy or don't configure it, installs that have a version higher than
that specified by 'Target version override' will be left as-is.
If you enable this policy, installs that have a current version higher than specified by the
'Target version override' will be downgraded to the target version.
We recommend that users install the latest version of the Microsoft Edge browser to
ensure protection by the latest security updates. Rollback to an earlier version risks
exposure to known security issues. This policy is meant to be used as a temporary fix to
address issues in a Microsoft Edge browser update.
Before temporarily rolling back your browser version, we recommend that you turn on
Sync (https://go.microsoft.com/fwlink/?linkid=2133032 ) for all users in your
organization. If you don't turn on Sync, there is a risk of permanent browsing data loss.
Use this policy at your own risk.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): RollbackToTargetVersion{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): RollbackToTargetVersion{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): RollbackToTargetVersion{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): RollbackToTargetVersion{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
TargetVersionPrefix
Description
When this policy is enabled, and auto-update is enabled, Microsoft Edge will be
updated to the version specified by this policy value.
The policy value must be a specific Microsoft Edge version, e.g. 83.0.499.12.
If a device has newer version of Microsoft Edge than the value specified, Microsoft Edge
will remain on the newer version and not downgrade to the specified version.
If the specified version does not exist, or is improperly formatted, then Microsoft Edge
will remain on its current version and not update to future versions automatically.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Windows information and settings
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): TargetVersionPrefix{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): TargetVersionPrefix{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): TargetVersionPrefix{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): TargetVersionPrefix{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_SZ
Example value:
83.0.499.12
Back to top
TargetChannel
If you enable this poicy, the Microsoft Edge will be updated to the Channel according to
how you configure the following options:
If you do not configure this policy, Microsoft Edge will be updated to the latest version
available for the default Channel.
This policy is available only on Windows instances that are joined to a Microsoft® Active
Directory® domain.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): TargetChannel{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Value Type: REG_SZ
Example value:
dev
Back to top
RemoveDesktopShortcutDefault
Description
Lets you specify the default behavior for all channels for creating a desktop shortcut
when Microsoft Edge is installed.
If you set this policy to "Force delete system-level Desktop Shortcuts", any existing
system-level Microsoft Edge desktop shortcuts will be deleted when the browser
updates or the machine reboots.
If you set this policy to "Force delete system-level and
user-level Desktop Shortcuts", any existing system-level Microsoft Edge desktop
shortcuts will be deleted when the browser updates or the machine reboots and any
existing user-level desktop shortcuts will be deleted when the browser updates. This
includes user-level desktop shortcuts that users might have made themselves.
If you
don't configure this policy, nothing will happen to existing Microsoft Edge desktop
shortcuts.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: RemoveDesktopShortcutDefault
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
RemoveDesktopShortcut
Description
If you set this policy to "Force delete system-level Desktop Shortcuts", any existing
system-level Microsoft Edge desktop shortcuts will be deleted when the browser
updates or the machine reboots.
If you set this policy to "Force delete system-level and
user-level Desktop Shortcuts", any existing system-level Microsoft Edge desktop
shortcuts will be deleted when the browser updates or the machine reboots and any
existing user-level desktop shortcuts will be deleted when the browser updates. This
includes user-level desktop shortcuts that users might have made themselves.
If you
don't configure this policy, nothing will happen to existing Microsoft Edge desktop
shortcuts.
If you don't configure this policy for a channel, the 'Remove Desktop Shortcuts upon
update default' policy configuration determines desktop shortcut removal.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): RemoveDesktopShortcut{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): RemoveDesktopShortcut{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): RemoveDesktopShortcut{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): RemoveDesktopShortcut{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
EdgePreview
Description
Lets you specify whether users in the Windows Insider Program are enrolled in Edge
Preview via Microsoft Edge Update. A device will not be enrolled in Edge Preview if
TargetVersionPrefix is enabled or TargetChannel is configured.
If you enable this policy, users in the Windows Insider Program are enrolled in
Edge Preview via Microsoft Edge Update.
If you disable this policy, users in the Windows Insider Program cannot be enrolled
in Edge Preview via Microsoft Edge Update.
If you don't configure this policy, users in the Windows Insider Program are
enrolled in Edge Preview via Microsoft Edge Update by default.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
(Stable): EdgePreview{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
(Beta): EdgePreview{2CD8A007-E189-409D-A2C8-9AF4EF3C72AA}
(Canary): EdgePreview{65C35B14-6C1D-4122-AC46-7148CC9D6497}
(Dev): EdgePreview{0D50BFEC-CD6A-4F9A-964C-C7416E3ACB10}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
Preferences policies
Back to top
AutoUpdateCheckPeriodMinutes
Description
Minimum number of minutes between automatic update checks.
Set this policy to the value 0 to disable all periodic network traffic by Microsoft Edge
Update. This is not recommended, as it prevents Microsoft Edge Update itself from
receiving stability and security updates.
The 'Update policy override default' and per-application 'Update policy override'
settings should be used to manage application updates rather than this setting.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: AutoUpdateCheckPeriodMinutes
Value Type: REG_DWORD
Example value:
0x00000578
Back to top
UpdatesSuppressed
Description
If you enable this policy, update checks are suppressed each day starting at Hour:Minute
for a period of Duration (in minutes). Duration isn't affected by daylight saving time. For
example, if the start time is 22:00 and the duration is 480 minutes, updates will be
suppressed for exactly 8 hours, regardless of whether daylight saving time starts or ends
during this period.
If you disable or don't configure this policy, update checks aren't suppressed during any
specific period.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
UpdatesSuppressedDurationMin
UpdatesSuppressedStartHour
UpdatesSuppressedStartMin
Value Type: REG_DWORD
Example value:
duration : 0x0000003c
Back to top
ProxyMode
Description
Allows you to specify the proxy server settings that are used by Microsoft Edge Update.
If you enable this policy, you can choose between the following proxy server options:
If you choose to never use a proxy server and always connect directly, all other
options are ignored.
If you choose to use system proxy settings or auto-detect the proxy server, all
other options are ignored.
If you choose fixed server proxy mode, you can specify further options in 'Address
or URL of a proxy server' policy.
If you choose to use a .pac proxy script, you must specify the URL for the script in
'URL to proxy .pac file' policy.
If you enable this policy, users in your organization can't change the proxy settings in
Microsoft Edge Update.
If you disable or don't configure this policy, no proxy server settings are configured, but
users in your organization can choose their own proxy settings for Microsoft Edge
Update.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: ProxyMode
Value Type: REG_SZ
Example value:
fixed_servers
Back to top
ProxyPacUrl
Description
If you enable this policy, you can specify a URL for a PAC file to automate how Microsoft
Edge Update selects the appropriate proxy server for fetching a particular website.
This policy is applied only if you have specified manual proxy settings in the 'Choose
how to specify a proxy server settings' policy.
Don't configure this policy if you have selected a proxy setting other than manual in the
'Choose how to specify a proxy server settings' policy.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: ProxyPacUrl
Value Type: REG_SZ
Example value:
https://www.microsoft.com
Back to top
ProxyServer
Description
Allows you to specify the URL of the proxy server for Microsoft Edge Update to use.
If you enable this policy, you can set the proxy server URL used by Microsoft Edge
Update in your organization.
This policy is applied only if you have selected manual proxy settings in the 'Choose how
to specify a proxy server settings' policy.
Don't configure this policy if you have selected a proxy setting other than manual in the
'Choose how to specify a proxy server settings' policy.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: ProxyServer
Value Type: REG_SZ
Example value:
https://www.microsoft.com
Back to top
UpdaterExperimentationAndConfigurationServiceControl
Description
In Microsoft Edge Update, the Experimentation and Configuration Service is used to
deploy experimentation payload.
If you disable this policy, communication with the Experimentation and Configuration
Service is stopped completely.
If you don't configure this policy, on a managed device the behavior is same as policy
'disabled'.
If you don't configure this policy, on an unmanaged device the behavior is same as
policy 'enabled'.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name: UpdaterExperimentationAndConfigurationServiceControl
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
Install (WebView)
Allow installation
Description
Lets you specify whether the WebView2 Runtime can be installed using Microsoft Edge
Update.
If you enable this policy, users can install the WebView2 Runtime through Microsoft
Edge Update.
If you disable this policy (or set it to 'Installs disabled'), users cannot install the
WebView2 Runtime through Microsoft Edge Update.
If you set this policy to Always allow Machine-Wide Installs but not Per-User Installs, the
WebView2 Runtime will only be deployed machine-wide.
If you set the policy to Force Installs (Machine-Wide), users can install the WebView2
Runtime to all machines where Microsoft Edge Update is pre-installed. Requires
Microsoft Edge Update 1.3.155.43 or higher.
If you don't configure this policy, the WebView2 Runtime will be installed through
Microsoft Edge Update.
Path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\EdgeUpdate
Value Name:
Install{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
Value Type: REG_DWORD
Example value:
0x00000001
Back to top
Update (WebView)
Description
Lets you specify whether or not automatic updates are enabled for the WebView2
Runtime. The WebView2 Runtime is a component used by applications to display web
content.
Automatic updates are enabled by default. Disabling automatic updates for the
WebView2 Runtime might cause compatibility issues with applications that depend on
this component.
If you enable this policy, Microsoft Edge Update handles the WebView2 Runtime
updates according to how you configure the following options:
If you don't enable this policy, updates are automatically downloaded and applied.
Example value:
0x00000001
Back to top
See also
Configuring Microsoft Edge
Microsoft Edge Enterprise landing page
Microsoft Edge Mobile - Policies
Article • 08/21/2023
The latest version of Microsoft Edge includes the following policies that you can deploy
to configure how Microsoft Edge mobile runs in your organization. You can use the
mobile device management (MDM) OS channel on enrolled devices (Managed App
Configuration for iOS or Set up managed configurations for Android). Users aren't
required to sign in to Microsoft Edge to apply the policies.
7 Note
Available policies
These tables list all of the browser-related policies available in this release of Microsoft
Edge. Use the links in the table to get more details about specific policies.
Edge specific
Proxy server
HTTP authentication
Content settings
Default search provider
Password manager and protection
Additional
Edge specific
Proxy server
HTTP authentication
Content settings
Policy Name Caption
DefaultSearchProviderEnabled
HTTP authentication
Back to top
NtlmV2Enabled
Supported on:
Description
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
Boolean
Android:choice
NtlmV2Enabled
Example value:
true
Back to top
AuthSchemes
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy specifies which HTTP authentication schemes Microsoft Edge
supports.
Valid values:
* basic
* digest
* ntlm
* negotiate
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
String
Android:choice
AuthSchemes
Example value:
basic,digest,ntlm,negotiate
Back to top
DisableAuthNegotiateCnameLookup
Supported on:
Description
Setting the policy to Enabled skips CNAME lookup. The server name is used as entered
when generating the Kerberos SPN.
Setting the policy to Disabled or leaving it unset means CNAME lookup determines the
canonical name of the server when generating the Kerberos SPN.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
Boolean
Android:choice
DisableAuthNegotiateCnameLookup
Example value:
false
Back to top
AuthServerAllowlist
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy specifies which servers should be allowed for integrated
authentication. Integrated authentication is only on when Microsoft Edge gets an
authentication challenge from a proxy or from a server in this permitted list.
Leaving the policy unset means Microsoft Edge tries to detect if a server is on the
intranet. Only then will it respond to IWA requests. If a server is detected as internet,
then Microsoft Edge ignores IWA requests from it.
Note: Separate multiple server names with commas. Wildcards, *, are allowed.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
String
Android:choice
Example value:
*.example.com,example.com
Back to top
AuthAndroidNegotiateAccountType
Supported on:
Description
Setting the policy specifies the type of accounts provided by the Android authentication
app that supports HTTP Negotiate authentication (such as Kerberos authentication). This
information should be available from the supplier of the authentication app. For details,
see The Chromium Projects ( https://goo.gl/hajyfN )
Leaving the policy unset turns off HTTP Negotiate authentication on Android.
Supported features:
Data Type:
Android:String
iOS:String
Android and iOS restriction name:
AuthAndroidNegotiateAccountType
com.example.spnego
Back to top
AuthNegotiateDelegateAllowlist
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy assigns servers that Microsoft Edge may delegate to. Separate
multiple server names with commas. Wildcards, *, are allowed.
Leaving the policy unset means Microsoft Edge won't delegate user credentials, even if a
server is detected as intranet.
Supported features:
Data Type:
String
Android:choice
Android restriction name:
AuthNegotiateDelegateAllowlist
Example value:
*.example.com,foobar.example.com
Back to top
AllHttpAuthSchemesAllowedForOrigins
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy specifies for which origins to allow all the HTTP authentication
schemes Google Chrome supports regardless of the AuthSchemes policy.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
List of strings
Android:string
AllHttpAuthSchemesAllowedForOrigins
[
"*.example.com"
]
Back to top
Content settings
Back to top
DefaultPopupsSetting
Supported on:
Description
Setting the policy to 1 lets websites display pop-ups. Setting the policy to 2 denies pop-
ups.
Leaving it unset means BlockPopups applies, but users can change this setting.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
Android:Integer
iOS:Integer
DefaultPopupsSetting
Back to top
DefaultCookiesSetting
Supported on:
Description
Unless the RestoreOnStartup policy is set to permanently restore URLs from previous
sessions, then setting CookiesSessionOnlyForUrls lets you make a list of URL patterns
that specify sites that can and can't set cookies for one session.
Leaving the policy unset results in the use of DefaultCookiesSetting for all sites, if it's set.
If not, the user's personal setting applies. URLs not covered by the patterns specified
also result in the use of defaults.
Supported features:
Data Type:
Integer
Android:choice
DefaultCookiesSetting
Example value:
Back to top
CookiesAllowedForUrls
Description
Allows you to set a list of url patterns that specify sites which are allowed to set cookies.
If this policy is left not set the global default value will be used for all sites either from
the DefaultCookiesSetting policy if it is set, or the user's personal configuration
otherwise.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
List of strings
Android:string
CookiesAllowedForUrls
Example value:
[
"https://www.example.com",
"[*.]example.edu"
]
Back to top
CookiesBlockedForUrls
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy lets you make a list of URL patterns that specify sites that can't set
cookies.
Leaving the policy unset results in the use of DefaultCookiesSetting for all sites, if it's set.
If not, the user's personal setting applies.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
List of strings
Android:string
Android restriction name:
CookiesBlockedForUrls
Example value:
[
"https://www.example.com",
"[*.]example.edu"
]
Back to top
CookiesSessionOnlyForUrls
Supported on:
Description
Unless the RestoreOnStartup policy is set to permanently restore URLs from previous
sessions, then setting CookiesSessionOnlyForUrls lets you make a list of URL patterns
that specify sites that can and can't set cookies for one session.
Leaving the policy unset results in the use of DefaultCookiesSetting for all sites, if it's set.
If not, the user's personal setting applies. URLs not covered by the patterns specified
also result in the use of defaults.
Data Type:
List of strings
Android:string
CookiesSessionOnlyForUrls
Example value:
[
"https://www.example.com",
"[*.]example.edu"
]
Back to top
DefaultSearchProviderEnabled
Supported on:
Microsoft Edge (Android) since version 109
If you set the policy, users can't change it in Microsoft Edge. If not set, the default search
provider is on, and users can set the search provider list.
Supported features:
Data Type:
Android:Boolean
iOS:Boolean
DefaultSearchProviderEnabled
true
Back to top
DefaultSearchProviderName
Supported on:
Description
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:String
iOS:String
DefaultSearchProviderName
Back to top
DefaultSearchProviderSearchURL
Supported on:
Microsoft Edge (Android) since version 109
Description
If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderSearchURL
specifies the URL of the search engine used during a default search. The URL should
include the string '{searchTerms}', replaced in the query by the user's search terms.
Supported features:
Data Type:
Android:String
iOS:String
https://search.my.company/search?q={searchTerms}
Back to top
DefaultSearchProviderSearchURLPostParams
Supported on:
Description
If DefaultSearchProviderEnabled is on, then setting
DefaultSearchProviderSearchURLPostParams specifies the parameters when searching a
URL with POST. It consists of comma-separated, name-value pairs. If a value is a
template parameter, such as '{searchTerms}', real search terms data replaces it.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:String
iOS:String
DefaultSearchProviderSearchURLPostParams
q={searchTerms},ie=utf-8,oe=utf-8
Back to top
DefaultSearchProviderAlternateURLs
Supported on:
Description
If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderAlternateURLs
specifies a list of alternate URLs for extracting search terms from the search engine. The
URLs should include the string '{searchTerms}'.
Supported features:
Android:string
iOS:String
DefaultSearchProviderAlternateURLs
[
"https://search.my.company/suggest#q={searchTerms}",
"https://search.my.company/suggest/search#q={searchTerms}"
]
Back to top
DefaultSearchProviderEncodings
Supported on:
Microsoft Edge (Android) since version 109
Description
Data Type:
List of strings
Android:string
iOS:string
DefaultSearchProviderEncodings
[
"UTF-8",
"UTF-16",
"GB2312",
"ISO-8859-1"
]
Back to top
DefaultSearchProviderImageURL
Supported on:
Description
If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderImageURL
specifies the URL of the search engine used for image search. (If
DefaultSearchProviderImageURLPostParams is set, then image search requests use the
POST method instead.)
Supported features:
Data Type:
Android: String
iOS:String
DefaultSearchProviderImageURL
https://search.my.company/searchbyimage/upload
Back to top
DefaultSearchProviderImageURLPostParams
Description
If DefaultSearchProviderEnabled is on, then setting
DefaultSearchProviderImageURLPostParams specifies the parameters during image
search with POST. It consists of comma-separated, name-value pairs. If a value is a
template parameter, such as {imageThumbnail}, real image thumbnail data replaces it.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:String
iOS:String
DefaultSearchProviderImageURLPostParams
content={imageThumbnail},url={imageURL},sbisrc={SearchSource}
Back to top
DefaultSearchProviderKeyword
Supported on:
Description
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:String
iOS:String
DefaultSearchProviderKeyword
Back to top
DefaultSearchProviderNewTabURL
Supported on:
Microsoft Edge (Android) since version 109
Description
If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderNewTabURL
specifies the URL of the search engine used to provide a New Tab page.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:String
iOS:String
DefaultSearchProviderNewTabURL
Example value (Android and iOS):
https://search.my.company/newtab
Back to top
DefaultSearchProviderSuggestURL
Supported on:
Description
If DefaultSearchProviderEnabled is on, then setting DefaultSearchProviderSuggestURL
specifies the URL of the search engine to provide search suggestions. The URL should
include the string '{searchTerms}', replaced in the query by the user's search terms.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:String
iOS:String
Android and iOS restriction name:
DefaultSearchProviderSuggestURL
https://search.my.company/suggest?q={searchTerms}
Back to top
DefaultSearchProviderSuggestURLPostParams
Supported on:
Microsoft Edge (Android) since version 109
Description
Supported features:
iOS:String
DefaultSearchProviderSuggestURLPostParams
q={searchTerms},ie=utf-8,oe=utf-8
Back to top
EdgeNewTabPageCustomURL
Supported on:
Description
Edge for iOS and Android allows organizations to disable the New Tab Page experience
and instead have a web site launch when the user opens a new tab.
While this is a supported scenario, Microsoft recommends organizations take advantage
of the New Tab Page experience to provide dynamic content that is relevant to the user.
Supported features:
Data Type:
Android:String
iOS:String
EdgeNewTabPageCustomURL
https://www.bing.com
Back to top
EdgeMyApps
My Apps bookmark
Supported on:
Microsoft Edge (Android) since version 111
true = Shows My Apps within the Edge for iOS and Android bookmarks
false (Default) = Hides My Apps within Edge for iOS and Android
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
Android:Boolean
iOS:Boolean
EdgeMyApps
true
Back to top
EdgeDefaultHTTPS
Supported on:
Microsoft Edge (Android) since version 111
Microsoft Edge (iOS and iPadOS) since version 111
Description
By default, Edge for iOS and Android uses the HTTPS protocol handler when the user
doesn't specify the protocol in the URL.
Supported features:
Data Type:
Android:Boolean
iOS: Boolean
EdgeDefaultHTTPS
true
Back to top
EdgeDisableShareUsageData
Description
By default, Edge for iOS and Android prompts users for usage data collection to
personalize their browsing experience. Organizations can disable this data sharing by
preventing this prompt from being shown to end users.
EdgeDisableShareUsageData:
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
Android:Boolean
iOS:Boolean
EdgeDisableShareUsageData
true
Back to top
EdgeDisableShareBrowsingHistory
Supported on:
Description
By default, Edge for iOS and Android prompts users for sharing browsing history to
personalize their browsing experience. Organizations can disable this data sharing
EdgeDisableShareBrowsingHistory:
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
Android:Boolean
iOS:Boolean
EdgeDisableShareUsageData
Back to top
EdgeDisabledFeatures
Supported on:
Microsoft Edge (Android) since version 111
Description
Edge for iOS and Android allows organizations to disable certain features that are
enabled by default. To disable these features, configure the following setting:
password = Disables prompts that offer to save passwords for the end user
inprivate = Disables InPrivate browsing
autofill = Disables "Save and Fill Addresses" and "Save and Fill Payment info".
Autofill will be disabled even for previously saved information.
Note: The following new policy settings are available starting with Microsoft Edge
version 112.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
Android:String
iOS:String
EdgeDisabledFeatures
inprivate | password
Back to top
EdgeEnableKioskMode
Supported on:
Description
Edge for Android can be enabled as a kiosk app with the following settings:
EdgeEnableKioskMode:
Supported features:
Android:choice
EdgeEnableKioskMode
Example value:
true
Back to top
EdgeShowAddressBarInKioskMode
Supported on:
Description
Edge for Android address bar in kiosk mode can be hidden with the following settings:
EdgeShowAddressBarInKioskMode:
Supported features:
Data Type:
Boolean
Android:choice
EdgeShowAddressBarInKioskMode
Example value:
true
Back to top
EdgeShowBottomBarInKioskMode
Supported on:
Microsoft Edge (Android) since version 111
Description
Edge for Android bottom bar in kiosk mode can be hidden with the following settings:
EdgeShowBottomBarInKioskMode
Data Type:
Boolean
Android:choice
EdgeShowBottomBarInKioskMode
Example value:
true
Back to top
EdgeSyncDisabled
Supported on:
Microsoft Edge (Android) since version 111
Description
By default, Microsoft Edge sync enables users to access their browsing data across all
their signed-in devices.
Passwords
Sync functionality is enabled via user consent and users can turn sync on or off for each
of the data types listed above.
Organizations have the capability to disable Edge sync on iOS and Android.
Supported features:
Data Type:
Android:Boolean
iOS:Boolean
EdgeSyncDisabled
true
Back to top
EdgeNetworkStackPref
Description
The layers of the network architecture are called the network stack. The layers of a
network stack are broadly divided into sections, such as Network Interface, Network
Driver Interface Specification (NDIS), Protocol Stack, System Drivers, and User-Mode
Applications.
By default, Microsoft Edge for both iOS and Android use the Chromium network stack
for Microsoft Edge service communication, including sync services and auto search
suggestions. Microsoft Edge for iOS also provides the iOS network stack as a
configurable option for Microsoft Edge service communication.
Organizations can modify their network stack preference by configuring the following
setting.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : No
Data Type:
Integer
iOS:choice
EdgeNetworkStackPref
Example value:
0
Back to top
ProxySettings
Proxy settings
Supported on:
Description
Setting the policy configures the proxy settings for Chrome and ARC-apps, which ignore
all proxy-related options specified from the command line.
Leaving the policy unset lets users choose their proxy settings.
Setting the ProxySettings policy accepts the following fields: * ProxyMode, which lets
you specify the proxy server Microsoft Edge uses and prevents users from changing
proxy settings * ProxyPacUrl, a URL to a proxy .pac file * ProxyPacMandatory, which
prevents the network stack from falling back to direct connections with invalid or
unavailable PAC script * ProxyServer, a URL of the proxy server * ProxyBypassList, a list of
hosts for which the proxy will be bypassed
For ProxyMode, if you choose the value: * direct, a proxy is never used and all other
fields are ignored. * system, the systems's proxy is used and all other fields are ignored.
* auto_detect, all other fields are ignored. * fixed_servers, the ProxyServer and
ProxyBypassList fields are used. * pac_script, the ProxyPacUrl, ProxyPacMandatory and
ProxyBypassList fields are used.
Data Type:
Dictionary
Android:string
ProxySettings
Example value:
ProxySettings = {
"ProxyBypassList":
"https://www.example1.com,https://www.example2.com,https://internalsite/",
"ProxyMode": "fixed_servers",
"ProxyServer": "123.123.123.123:8080"
}
Back to top
PasswordManagerEnabled
Supported on:
Microsoft Edge (Android) since version 109
Microsoft Edge (iOS and iPadOS) since version 109
Description
Setting the policy to Enabled means users have Microsoft Edge remember passwords
and provide them the next time they sign in to a site.
Setting the policy to Disabled means users can't save new passwords, but previously
saved passwords will still work.
If the policy is set, users can't change it in Microsoft Edge. If not set, the user can turn
off password saving.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:Boolean
iOS:Boolean
PasswordManagerEnabled
true
Back to top
Additional policies
Back to top
URLAllowlist
Supported on:
Description
Setting the policy provides access to the listed URLs, as exceptions to URLBlocklist. See
that policy's description for the format of entries of this list. For example, setting
URLBlocklist to * will block all requests, and you can use this policy to allow access to a
limited list of URLs. Use it to open exceptions to certain schemes, subdomains of other
domains, ports, or specific paths, using the format specified at
(https://go.microsoft.com/fwlink/?linkid=2095322 ). The most specific filter
determines if a URL is blocked or allowed. The URLAllowlist policy takes precedence
over URLBlocklist. This policy is limited to 1,000 entries.
This policy also allows enabling the automatic invocation by the browser of external
application registered as protocol handlers for the listed protocols like "tel:" or "ssh:".
Supported features:
Data Type:
List of strings
Android:String
iOS:String
Android and iOS restriction name:
URLAllowlist
[
"example.com",
"https://ssl.server.com",
"hosting.com/good_path",
"https://server:8080/path",
".exact.hostname.com"
]
Back to top
URLBlocklist
Supported on:
Description
Setting the policy prevents webpages with prohibited URLs from loading. It provides a
list of URL patterns that specify forbidden URLs. Leaving the policy unset means no URLs
are prohibited in the browser. Format the URL pattern according to this format
(https://go.microsoft.com/fwlink/?linkid=2095322 ). Up to 1,000 exceptions can be
defined in URLAllowlist.
You can block javascript://* URLs. However, it affects only JavaScript entered in the
address bar (or, for example, bookmarklets). In-page JavaScript URLs with dynamically
loaded data aren't subject to this policy. For example, if you block example.com/abc,
then example.com can still load example.com/abc using XMLHTTPRequest.
Note: Blocking internal edge://* can lead to unexpected errors or may be circumvented
in special cases. Instead of blocking certain internal URLs, see if there are more specific
policies available.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
List of strings
Android:String
iOS:String
URLBlocklist
[
"example.com",
"https://ssl.server.com",
"hosting.com/bad_path",
"https://server:8080/path",
".exact.hostname.com",
"file://*",
"custom_scheme:*",
"*"
]
Back to top
SSLErrorOverrideAllowed
Allow proceeding from the SSL warning page
Supported on:
Description
Setting the policy to Enabled or leaving it unset lets users click through warning pages
Microsoft Edge shows when users navigate to sites that have SSL errors.
Setting the policy to Disabled prevent users from clicking through any warning pages.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
Android:Boolean
iOS:Boolean
SSLErrorOverrideAllowed
true
Back to top
CertificateTransparencyEnforcementDisabledForUrls
Supported on:
Description
Setting the policy turns off Certificate Transparency disclosure requirements for the
hostnames in the specified URLs. While making it harder to detect misissued certificates,
hosts can keep using certificates that otherwise wouldn't be trusted (because they
weren't properly publicly disclosed).
Leaving the policy unset means that if certificates requiring disclosure through
Certificate Transparency aren't disclosed, then Microsoft Edge doesn't trust those
certificates.
Supported features:
Data Type:
List of strings
Android:string
CertificateTransparencyEnforcementDisabledForUrls
Example value:
[
"example.com",
".example.com"
]
Back to top
CertificateTransparencyEnforcementDisabledForCas
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy turns off enforcement of Certificate Transparency disclosure
requirements for a list of subjectPublicKeyInfo hashes. Enterprise hosts can keep using
certificates that otherwise wouldn't be trusted (because they weren't properly publicly
disclosed). To turn off enforcement, the hash must meet one of these conditions:
Specify a subjectPublicKeyInfo hash by linking the hash algorithm name, a slash, and the
Base64 encoding of that hash algorithm applied to the DER-encoded
subjectPublicKeyInfo of the specified certificate. Base64 encoding format matches that
of an SPKI Fingerprint. The only recognized hash algorithm is sha256; others are
ignored.
Leaving the policy unset means that if certificates requiring disclosure through
Certificate Transparency aren't disclosed, then Google Chrome doesn't trust those
certificates.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
List of strings
Android:string
CertificateTransparencyEnforcementDisabledForCas
Example value:
[
"sha256/AAAAAAAAAAAAAAAAAAAAAA==",
"sha256//////////////////////w=="
]
Back to top
SavingBrowserHistoryDisabled
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy to Enabled means browsing history is not saved, tab syncing is off and
users can't change this setting.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Data Type:
Android:Boolean
iOS:Boolean
SavingBrowserHistoryDisabled
true
Back to top
SearchSuggestEnabled
Enable search suggestions
Supported on:
Description
Setting the policy to True turns on search suggestions in Microsoft Edge's address bar.
Setting the policy to False turns off these search suggestions.
If you set the policy, users can't change it. If not set, search suggestions are on at first,
but users can turn them off any time.
Supported features:
Dynamic Policy Refresh : Yes
Per Profile : Yes
Can Be Recommended : Yes
Data Type:
Android:Boolean
iOS:Boolean
SearchSuggestEnabled
Back to top
TranslateEnabled
Enable Translate
Supported on:
Microsoft Edge (Android) since version 109
Description
Setting the policy to True provides translation functionality when it's appropriate for
users by showing an integrated translate toolbar in Microsoft Edge and a translate
option on the right-click context menu. Setting the policy to False shuts off all built-in
translate features.
If you set the policy, users can't change this function. Leaving it unset lets them change
the setting.
Supported features:
Data Type:
Android:Boolean
iOS:Boolean
Android and iOS restriction name:
TranslateEnabled
true
Back to top
InPrivateModeAvailability
Supported on:
Microsoft Edge (Android) since version 116
Description
Specifies whether the user may open pages in InPrivate mode in Microsoft Edge.
If 'Enabled' is selected or the policy is left unset, pages may be opened in InPrivate
mode.
Note: On iOS, if the policy is changed during a session, it will only take effect on
relaunch.
Supported features:
Dynamic Policy Refresh : Yes
Data Type:
Android:Integer
iOS:Integer
Back to top
See also
Configuring Microsoft Edge
Microsoft Edge Enterprise landing page
Microsoft Security Baselines Blog
Microsoft Edge WebView2 - Policies
Article • 08/29/2023
The latest version of Microsoft Edge WebView2 includes the following policies. You can
use these policies to configure how Microsoft Edge WebView2 runs in your organization.
For information about an additional set of policies used to control how and when
Microsoft Edge WebView2 is updated, check out Microsoft Edge update policy
reference.
7 Note
Available policies
These tables list all of the group policies available in this release of Microsoft Edge
WebView2. Use the links in the table to get more details about specific policies.
Additional
BrowserExecutableFolder
Supported versions:
Description
This policy configures WebView2 applications to use the WebView2 Runtime in the
specified path. The folder should contain the following files: msedgewebview2.exe,
msedge.dll, and so on.
To set the value for the folder path, provide a Value name and Value pair. Set value
name to the Application User Model ID or the executable file name. You can use the "*"
wildcard as value name to apply to all applications.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\WebView2\BrowserExecutableFolder
Path (Recommended): N/A
Value Name: list of REG_SZ
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebView2\BrowserExecutableFolder = "Name:
*, Value: C:\\Program Files\\Microsoft Edge WebView2 Runtime Redistributable
85.0.541.0 x64"
Back to top
ReleaseChannelPreference
Supported versions:
Description
The default channel search order is WebView2 Runtime, Beta, Dev, and Canary.
To set the value for the release channel preference, provide a Value name and Value pair.
Set value name to the Application User Model ID or the executable file name. You can
use the "*" wildcard as value name to apply to all applications.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\WebView2\ReleaseChannelPreference
Path (Recommended): N/A
Value Name: list of REG_SZ
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebView2\ReleaseChannelPreference = "Name:
*, Value: 1"
Back to top
Additional policies
Back to top
ExperimentationAndConfigurationServiceControl
Supported versions:
Description
The Experimentation and Configuration Service is used to deploy Experimentation and
Configuration payloads to the client.
Configuration payload may also contain a list of actions to take on certain domains for
compatibility reasons. For example, the browser may override the User Agent string on a
website if that website is broken. Each of these actions is intended to be temporary
while Microsoft tries to resolve the issue with the site owner.
If you set this policy to 'FullMode', the full payload is downloaded from the
Experimentation and Configuration Service. This includes both the experimentation and
configuration payloads.
If you set this policy to 'RestrictedMode', the communication with the Experimentation
and Configuration Service is stopped completely. Microsoft does not recommend this
setting.
If you don't configure this policy on a managed device, the behavior on Beta and Stable
channels is the same as the 'ConfigurationsOnlyMode'. On Canary and Dev channels the
behavior is the same as 'FullMode'.
If you don't configure this policy on an unmanaged device, the behavior is the same as
the 'FullMode'.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: Yes
Data Type:
Integer
0x00000002
Back to top
NewPDFReaderWebView2List
Supported versions:
On Windows since 116 or later
Description
This policy configures WebView2 applications to launch the new version of the PDF
reader that's powered by Adobe Acrobat's PDF reader. The new PDF reader ensures that
there's no loss of functionality and delivers an enhanced PDF experience. This
experience includes richer rendering, improved performance, strong security for PDF file
handling, and greater accessibility.
If this policy is specified for an application, it is possible that it may impact other related
applications as well. The policy is applied to all WebView2s sharing the same WebView2
user data folder. These WebView2s could potentially belong to multiple applications if
those applications, which are likely from the same product family, are designed to share
the same user data folder.
Use a name-value pair to enable the new PDF reader for the application. Set the name
to the Application User Model ID or the executable file name. You can use the "*"
wildcard as value name to apply to all applications. Set the Value to true to enable the
new reader or set it to false to use the existing one.
If you enable this policy for the specified WebView2 applications, they will use the new
Adobe Acrobat powered PDF reader to open all PDF files.
If you disable the policy for the specified WebView2 applications or don't configure it,
they will use the existing PDF reader to open all PDF files.
Supported features:
Can be mandatory: Yes
Can be recommended: No
Dynamic Policy Refresh: No - Requires browser restart
Data Type:
List of strings
Path (Mandatory):
SOFTWARE\Policies\Microsoft\Edge\WebView2\NewPDFReaderWebView2List
Path (Recommended): N/A
Value Name: list of REG_SZ
Value Type: list of REG_SZ
Example value:
SOFTWARE\Policies\Microsoft\Edge\WebView2\NewPDFReaderWebView2List =
{"name": "app1.exe", "value": true}
SOFTWARE\Policies\Microsoft\Edge\WebView2\NewPDFReaderWebView2List =
{"name": "app_id_for_app2", "value": true}
SOFTWARE\Policies\Microsoft\Edge\WebView2\NewPDFReaderWebView2List =
{"name": "*", "value": false}
Back to top
See also
Configuring Microsoft Edge
Microsoft Edge Enterprise landing page
Microsoft Security Baselines Blog
Backwards compatibility for the
Enterprise New tab page
Article • 07/28/2023
This article describes the change to the New tab page and how users can be backwards
compatible with Microsoft Edge version 87 and earlier.
7 Note
7 Note
Office 365 content was originally served using the Office.com domain.
If you need more time to enable access to the MSN domain, we recommend using the
NewTabPageSetFeedType, that lets you choose either the Microsoft News or Office 365
feed experience for the new tab page.
) Important
The NewTabPageSetFeedType policy and the Office.com domain that serves Office
365 content will quit working when Microsoft Edge version 90 is released.
The following policy settings will force the Enterprise New tab page to render Office
document content from the Office.com domain.
If the switch to the Office.com isn't possible, reach out and send us feedback. Another
option is to configure the NewTabPageLocation so it points to an endpoint URL that's
allowed by your organization.
7 Note
Users who aren't signed in with Microsoft Entra ID will continue to see the MSN
News feed when they open a new tab.
Page layout
With the changes to the New tab page, the Page layout no longer has to control two
specific content types (Office 365 and Microsoft News), so the content toggle isn't
available. The next screenshot shows the flyout for the Page layout.
If you want to keep accessing Microsoft News content that isn't tied to your
organization, you must use a different browser profile. Go to edge://settings/profiles and
sign out of your Microsoft Entra ID profile. This action will bring up the standard view for
the Enterprise new tab page.
See also
Microsoft Edge Enterprise landing page
Enterprise Mode for Internet Explorer 11
Block access to consumer accounts
Article • 03/30/2023
The AllowedDomainsForApps policy prevents users from signing into Google services
using any accounts other than the accounts you provided them with. Reasons for
blocking access are to prevent users on your corporate network using their personal
Gmail accounts, or accessing a managed Google account from another domain.
Users might see the following message when you block access to consumer accounts:
"This account is not allowed to sign in within this network".
7 Note
7 Note
Microsoft Edge, which is built on Chromium, is inheriting this upstream policy from
the Chromium open source project.
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
Understand the ClickOnce and
DirectInvoke features in Microsoft Edge
Article • 10/10/2022
ClickOnce and DirectInvoke are features available in IE and Microsoft Edge that support
the use of a file handler to download files from a website. Although they serve different
purposes, both features let websites specify that a file requested for download is passed
to a file handler on the user's device. ClickOnce requests are handled by the native file
handler in Windows. DirectInvoke requests are handled by a registered file handler
specified by the website hosting the file.
ClickOnce
DirectInvoke
7 Note
The website requests that the browser use a specified file handler.
The browser checks the operating system registry to see if the file handler is
registered for the requested file type.
If the file handler is registered, the browser calls the file handler and passes the
URL as an argument to the file handler.
The file handler processes the URL and downloads the file.
7 Note
The URL is used to determine the source of the file, as well as any parameters
to use when accessing the file. For example: endpoints, a manifest, or
metadata.
Use cases
The following use cases are representative.
You can use ClickOnce to easily deploy and update software on devices with minimal
user interaction. Users can install and run a Windows application by clicking a link in a
web page. If configured correctly, the ClickOnce application can install programs
without having users set configurations for the installer. For example, file locations, what
options to install, and so on.
DirectInvoke use cases depend on the intent of the website requesting DirectInvoke. For
example, the collaborative file-editing feature of Microsoft Word. Instead of clicking a
link and downloading the entire copy of a document you're working on with your
colleagues, DirectInvoke lets you download the parts of the document that have been
changed. This strategy reduces the amount of data transferred and can reduce the time
needed to open the document.
ClickOnce and DirectInvoke are supported out of the box for all Windows users.
7 Note
The first popup asks the user if they want to open the file. This popup is displayed
regardless of whether the file was flagged as safe or unsafe. The user can Report the file
as unsafe, Cancel the request, or select Open to continue.
If the user tries to open the file, and the file was flagged as unsafe, a second popup is
displayed. This popup warns the user that the file was flagged as unsafe, and asks them
if they're sure they want to download the file.
To specify file type(s) that the ClickOnce or DirectInvoke prompts should be bypassed
for, use the policy labeled in the Group Policy Editor as "List of file types that should be
automatically opened on download". This policy setting will let specified file types to be
automatically opened after download for all domains.
You can bypass the ClickOnce or DirectInvoke prompts for specific file types for specific
domains by setting up two more policies. These policies are labeled in the Group Policy
Editor as "List of file types that should be automatically opened on download" and
"URLs where AutoOpen-FileTypes can apply".
7 Note
The policy "URLs where AutoOpen- FileTypes can apply" is a supporting policy for
"List of file types that should be automatically opened on download" and does
nothing on its own.
To get the ClickOnce protocol launch behavior, the ClickOnceEnabled policy must
not be configured as Disabled, even if the AutoOpenFileTypes “List of file types that
should be automatically opened on download” policy is set.
ClickOnce enabled
1. A user opens a link to a page that requests ClickOnce support and gets the prompt
in the next screenshot.
2. After the user selects Open, ClickOnce attempts to launch the application.
3. After the user selects Open, the browser shows a popup that asks the user if
they're sure they want to install the application.
7 Note
The interface, messaging, and options shown by the ClickOnce file handler will
vary depending on the type and configuration of the file that's accessed.
ClickOnce disabled
1. When a user opens a link to a page that requests ClickOnce support, they'll see a
message in the download tray that is similar to the one in the next screenshot.
DirectInvoke enabled
1. A user opens a link to a page that requests DirectInvoke support and gets the
prompt in the next screenshot.
2. When the user selects Open, the requested file handler is opened. In this example,
Microsoft Word is used to open the document that's shown in the previous
screenshot.
7 Note
The interface, messaging, and options shown by the DirectInvoke file handler
will vary depending on the type and configuration of the file that's accessed.
DirectInvoke disabled
1. When a user opens a link to a page that requests DirectInvoke support,
DirectInvoke behaves the same as when ClickOnce is disabled. They'll see a
message in the download tray that's similar to the one in the next screenshot.
See also
ClickOnce security and deployment
DirectInvoke in Internet Explorer
Microsoft Edge Enterprise landing page
How to use Microsoft Edge command-
line options to configure proxy settings
Article • 04/11/2022
This article describes how you can use command-line options to override the default
system network settings.
7 Note
There are scenarios where users request an alternative to using the system's default
proxy settings. To support these scenarios, Microsoft Edge supports command-line
options that you can use to configure custom proxy settings.
These command-line options correspond to the following policies in the Proxy server
group:
ProxyBypassList
ProxyMode
ProxyPacUrl
ProxyServer
ProxySettings
--no-proxy-server
Tells Microsoft Edge not to use a Proxy, even if the system is otherwise configured to
use one. It overrides any other proxy settings that are provided.
--proxy-auto-detect
Tells Microsoft Edge to try and automatically detect your proxy configuration. This
argument is ignored if --proxy-server is configured.
Tells Microsoft Edge to use a custom proxy configuration. You can specify a custom
proxy configuration in three ways.
7 Note
You can configure Microsoft Edge to try using a proxy and fallback to going direct
if the proxy isn't available. For example, --proxy-
server="http://proxy2:8080,direct:// .
--proxy-bypass-list=(<trailing_domain>|<ip-address>)[:<port>][;...]
Tells Microsoft Edge to bypass any specified proxy for the specified semicolon-separated
list of hosts. This flag must be used with --proxy-server .
7 Note
--proxy-pac-url=<pac-file-url>
Tells Microsoft Edge to use the PAC file at the specified URL. For example, --proxy-pac-
url="https://wpad/proxy.pac" tells Microsoft Edge to resolve proxy information for URL
requests using the proxy.pac file.
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms
described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
See also
To see advanced configuration settings and additional options, consult the proxy
documentation in the Chromium Open Source project.
Microsoft Edge Enterprise landing page
Configurable Microsoft Edge commands
Article • 03/16/2022
This article describes the Microsoft Edge commands that can be configured via the
ConfigureKeyboardShortcuts policy. To see a list of all the available shortcuts in
Microsoft Edge, see Keyboard shortcuts in Microsoft Edge .
Configurable commands
The following table shows the configurable commands, how to use them, and what they
do.
focus_app_toolbar Alt + Shift + T Set focus to the first item in the app
bar toolbar
focus_settings_and_more Alt or F10 Set focus to the Settings and more "…"
button
reopen_tab Ctrl + Shift + T Reopen the last closed tab, and switch
to it
See also
Microsoft Edge Enterprise landing page
Microsoft Edge for macOS switches
from Microsoft AutoUpdate to
EdgeUpdater
Article • 03/17/2023
Starting with Microsoft Edge 113, Microsoft Edge for macOS will start using a new
updater named EdgeUpdater.
7 Note
This updater change only applies to macOS, it doesn't affect Windows, Linux, iOS,
or Android users.
Overview
EdgeUpdater provides an update experience tailored to browser usage, with fast,
reliable updates and minimal user interruption. Transitioning to EdgeUpdater also aligns
our backend update systems and will allow us to deliver new macOS management
experiences.
7 Note
Microsoft Edge will automatically start using EdgeUpdater, but you still have to set
policies to manage update behavior.
We recommend that you let Microsoft Edge update itself. If you choose to manually
update Microsoft Edge for macOS, you need to set the new UpdateDefault preference
to your desired choice.
7 Note
If you use Microsoft AutoUpdate preferences to prevent browser updates, you will
need to transition to the new EdgeUpdater UpdateDefault policy before version
113 to prevent future automatic updates.
XML
<plist version="1.0">
<dict>
<key>updatePolicies</key>
<dict>
<key>global</key>
<dict>
<key>UpdateDefault</key>
<integer>3</integer>
</dict>
</dict>
</dict>
</plist>
Using Microsoft Intune, create a new device configuration profile targeting the
macOS platform and select the Preference file profile type. Target
com.microsoft.EdgeUpdater as the preference domain name and upload your
plist. For more information, see Add a property list file to macOS devices using
Microsoft Intune.
Bash
See also
Microsoft Edge Enterprise landing page
Microsoft Edge will disable modifying
document.domain
Article • 08/22/2023
2 Warning
If your website relies on relaxing the same-origin policy via document.domain , your
action is required. Continue to read more about why this is changing or go to the
Alternative cross-origin communication to learn about alternative mechanisms to
achieve cross-origin communication.
Introduction
The "domain" property of the Document interface gets or sets the domain part of the
origin of the current document, as used by the same-origin policy .
After Microsoft Edge inherits the change from Chromium, attempts to modify the
document.domain property using JavaScript will be ignored. You'll need to use alternative
7 Note
Same-site but cross-origin sites have the same eTLD+1 but different subdomains.
Consider a shared hosting service that provides a unique subdomain to each customer.
If a developer sets document.domain in their page, an attacker's page served from a
different subdomain can set the same value and modify the content of the victim page.
Similarly, consider a shared hosting service that serves pages using a different port for
each customer. If a developer sets document.domain in their page, an attacker's page
served from a different port can set the same value and modify the content of the victim
page. This attack is possible because document.domain ignores the port number
component of the origin.
7 Note
To learn more about the security implications of setting document.domain , read the
Document.domain article on MDN .
Tip
You can run your site through the LightHouse deprecated API audit to find all
APIs that are scheduled to be removed from Microsoft Edge.
The following list shows the steps a developer needs to take to use postMessage()
instead of document.domain for cross-origin DOM manipulation.
});
event.source.postMessage('succeeded', event.origin);
}
});
Origin-Agent-Cluster: ?0
The Origin-Agent-Cluster header instructs the browser whether the document should
be handled by the origin-keyed agent cluster or not. To learn more about Origin-Agent-
Cluster , read Requesting performance isolation with the Origin-Agent-Cluster header .
When you send this header, your document can continue to set document.domain even
after it becomes immutable by default.
Browser compatibility
The following organizations support deprecating document.domain in the interest of
browser compatibility.
Other resources
Document.domain
Origin Isolation and Deprecating document.domain
Deprecating document.domain setter
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
Learn how Microsoft Edge handles
mixed content downloads
Article • 04/11/2022
This article defines mixed content downloads and explains how Microsoft Edge handles
them.
7 Note
One or more of the download location's redirects was loaded over an insecure
HTTP connection.
The final download location was loaded over an insecure HTTP connection.
Either of the preceding scenarios is a mixed content download because the request was
made using secure HTTPS and both HTTP and HTTPS connections are used to reach the
final destination. Modern browsers display warnings about this type of content to
indicate that this download may be transferred insecurely even though the original page
was accessed securely.
In Microsoft Edge, mixed content downloads will be blocked but users can override and
download the file if they want to. Microsoft Edge plans on starting to block mixed
content executable file downloads starting with Microsoft Edge version 85 and will block
different filetypes in future releases.
7 Note
Deployment of this feature is subject to change based on release schedule and user
feedback.
In the download shelf, the block warning message looks like the example in the next
screenshot.
On the download page, the block warning looks like the following screenshot example:
If a user decides to keep the download, they are prompted to confirm their action. The
next screenshot shows an example of this confirmation prompt.
Supporting policies
Enterprises that want to exclude mixed content blocking from specific websites can use
the InsecureContentAllowedForUrls policy to do so.
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms
described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
See also
Microsoft Edge Enterprise landing page
Policy filters for the Enterprise personal
browser
Article • 08/25/2023
The Enterprise personal browser (MSA profile) is a lightly managed profile on managed
devices that will automatically inherit admin policies from the Work browser (Microsoft
Entra profile) for the following categories:
Security
Data Compliance
Microsoft Edge Update
The work browser policies in the following section aren't available for the Enterprise
personal browser (MSA profile).
reader enabled
See also
Microsoft Edge for Business
Progressive rollouts for Microsoft Edge
Stable channel updates
Article • 04/11/2022
Starting with Microsoft Edge 83 release, we will perform gradual rollouts of major
updates to Microsoft Edge Stable channel over the span of a few days. This progressive
rollout allows us to monitor upgrades and safely update the browser across the
organization.
7 Note
Enterprises that manage distribution via Microsoft Intune are registered for auto-
updates. Progressive Rollout is used, and all the users will see an update in a few
days.
Enterprises that manage distribution through WSUS (Windows Server Update
Services) or Configuration Manager are not registered for auto-updates.
Administrators manage and apply the updates that will be available from the start.
Progressive Rollout does not affect this process.
Please share your valuable feedback through user voice, the in-application feedback
button, or below in the comments if you have any concerns or questions.
See also
Microsoft Edge Enterprise landing page
Provision favorites for Microsoft Edge
Article • 02/07/2023
This article describes how to provision a set of favorites and folders for your
organization. You can use the Configure favorites policy to provision favorites and
folders.
7 Note
1. Go to the Microsoft Edge address bar and type this URL: edge://flags/#edge-
favorites-admin-export.
2. Under Favorites configuration export for administrators, pick Enabled from the
dropdown list and then select Restart.
3. Go to the Favorites page at edge://favorites so you can add the favorites and
folders that you want to provision.
4. When you finish adding favorites and folders you'll export them so they can be
used by the Configure favorites policy. Go to the address bar and navigate to
edge://favorites, select the ellipsis "…" and choose Export favorites configuration.
The next screenshot shows the options you have when provisioning favorites.
5. Under Export your favorites configuration you provide a name for the folder that
your users will see. Type the Folder name and pick the Platform format you want to
use. Select Copy to clipboard. The next screenshot shows "Managed favorites" for
the folder name and the platform is Windows.
See also
Microsoft Edge Enterprise landing page
Redirection from Internet Explorer to
Microsoft Edge for compatibility with
modern web sites
Article • 02/14/2023
7 Note
Overview
7 Note
Many modern websites have designs that are incompatible with Internet Explorer.
Whenever an Internet Explorer user visits an incompatible public site, they get a
message that tells them the site is incompatible with their browser, and they need to
manually switch to a different browser.
The need to manually switch to a different browser changes starting with Microsoft
Edge Stable version 87.
When a user goes to a site that is incompatible with Internet Explorer, they will be
automatically redirected to Microsoft Edge. This article describes the user experience for
redirection and the group policies that are used to configure or disable automatic
redirection.
7 Note
Microsoft maintains a list of all sites that are known to be incompatible with
Internet Explorer. For more information, see Request updates to the incompatible
sites list
Prerequisites
Microsoft Edge Stable version 87 or later
Windows versions
Windows 10 version 1709 or later
Windows 8.1
Windows 7
Redirection experience
On redirection to Microsoft Edge, users are shown the one-time dialog in the next
screenshot. This dialog explains why they're getting redirected and prompts for consent
to copy their browsing data and preferences from Internet Explorer to Microsoft Edge.
The following browsing data will be imported: Favorites, Passwords, Search engines,
open tabs, History, settings, cookies, and the Home Page.
Even if they don't give their consent by checking "Always bring over my browsing data
and preferences from Internet Explorer", they can click Continue browsing to continue
their session.
Finally, a website incompatibility banner, shown in the next screenshot, appears below
the address bar for every redirection.
When a site is redirected from Internet Explorer to Microsoft Edge,
the Internet Explorer tab that started loading the site is navigated to a
Microsoft support page that explains why the site was redirected to Microsoft Edge.
7 Note
After a redirection users can go back to using Internet Explorer for sites that are not
on the Internet Explorer incompatibility list.
7 Note
These policies will be available as ADMX file updates by October 26, 2020 and will
be available in Intune by November 9, 2020.
RedirectSitesFromInternetExplorerPreventBHOInstall
RedirectSitesFromInternetExplorerRedirectMode
HideInternetExplorerRedirectUXForIncompatibleSitesEnabled
Policy:
RedirectSitesFromInternetExplorerPreventBHOInstall
Redirection from Internet Explorer to Microsoft Edge requires an Internet Explorer
Browser Helper Object (BHO) named "IEtoEdge BHO". The
RedirectSitesFromInternetExplorerPreventBHOInstall policy controls whether or not
this BHO is installed.
Policy: RedirectSitesFromInternetExplorerRedirectMode
This policy corresponds to the Microsoft Edge Default browser setting "Let Internet
Explorer open sites in Microsoft Edge". You can access this setting by going to the
edge://settings/defaultbrowser URL.
If you don't configure this policy or set it to "Sitelist", Internet Explorer will redirect
incompatible sites to Microsoft Edge. This is the default behavior.
To disable this policy, select Enabled AND then in the dropdown under Options:
Redirect incompatible sites from Internet Explorer to Microsoft Edge, select
Disable. In this state, incompatible sites aren't redirected to Microsoft Edge.
7 Note
If you're on a personal device that isn't managed by your organization, you'll see
another setting named "Allow sites to be loaded in Internet Explorer mode" under
Internet Explorer compatibility.
Instead, if you want to let your users load sites in Internet Explorer mode, you can
do so by configuring the policy Allow Internet Explorer mode testing.
Policy:
HideInternetExplorerRedirectUXForIncompatibleSitesEnabled
This policy configures the user experience for incompatible site redirection to Microsoft
Edge.
If you enable this policy, users never see the one-time redirection dialog and the
redirection banner. No browser data or user preferences are imported.
7 Note
If you want to disable redirection AFTER updating to Microsoft Edge Stable version 87,
use the following steps:
See also
Request updates to the incompatible sites list
Microsoft Edge Enterprise landing page
Microsoft Edge Policies
Regular Expression 2 (re2.h) syntax
Article • 06/16/2022
Regular expressions are a notation for describing sets of character strings. When a string
is in the set described by a regular expression, we say that the regular expression
matches the string.
The simplest regular expression is a single literal character. Except for the
metacharacters like *+?()| , characters match themselves. To match a metacharacter,
escape it with a backslash. For example, \+ matches the literal plus character.
alternation
concatenation
repetition operators
The syntax described so far is most of the traditional Unix egrep regular expression
syntax. This subset suffices to describe all regular languages. A regular language is a set
of strings that can be matched in a single pass through the text using only a fixed
amount of memory. Newer regular expression facilities (notably Perl and those
languages that have copied it) have added many new operators and escape sequences.
These changes make the regular expressions more concise, and sometimes more cryptic,
but not more powerful.
Syntax tables
Kinds of single-character expressions Examples
Composites
xy x followed by y
x|y x or y (prefer x)
Repetitions
x{n} exactly n x
x{n}? exactly n x
Implementation restriction: The counting forms x{n,m} , x{n,} , and x{n} reject forms
that create a minimum or maximum repetition count above 1000. Unlimited repetitions
are not subject to this restriction.
Possessive repetitions
Grouping
Flags
m multi-line mode: ^ and $ match begin/end line in addition to begin/end text (default false)
U ungreedy: swap meaning of x* and x*?, x+ and x+?, etc (default false)
Empty strings
\A at beginning of text
\b at ASCII word boundary (\w on one side and \W, \A, or \z on the other)
\z at end of text
Escape sequences
\a bell (≡ \007)
\n newline (≡ \012)
x single character
\d digits (≡ [0-9])
\s whitespace (≡ [\t\n\f\r])
C other
Cc control
Cf format
Co private use
Cs surrogate
L letter
Ll lowercase letter
Lm modifier letter
Lo other letter
Lt titlecase letter
Lu uppercase letter
M mark
Mc spacing mark
Me enclosing mark
Mn non-spacing mark
N number
Nd decimal number
Nl letter number
No other number
P punctuation
Pc connector punctuation
Pd dash punctuation
Pe close punctuation
Pf final punctuation
Pi initial punctuation
Po other punctuation
Ps open punctuation
S symbol
Sc currency symbol
Sk modifier symbol
Sm math symbol
Unicode character class names--general category
So other symbol
Z separator
Zl line separator
Zp paragraph separator
Zs space separator
Adlam
Ahom
Anatolian_Hieroglyphs
Arabic
Armenian
Avestan
Balinese
Bamum
Bassa_Vah
Batak
Bengali
Bhaiksuki
Bopomofo
Brahmi
Braille
Buginese
Buhid
Canadian_Aboriginal
Carian
Caucasian_Albanian
Unicode character class names--scripts
Chakma
Cham
Cherokee
Chorasmian
Common
Coptic
Cuneiform
Cypriot
Cyrillic
Deseret
Devanagari
Dives_Akuru
Dogra
Duployan
Egyptian_Hieroglyphs
Elbasan
Elymaic
Ethiopic
Georgian
Glagolitic
Gothic
Grantha
Greek
Gujarati
Gunjala_Gondi
Gurmukhi
Unicode character class names--scripts
Han
Hangul
Hanifi_Rohingya
Hanunoo
Hatran
Hebrew
Hiragana
Imperial_Aramaic
Inherited
Inscriptional_Pahlavi
Inscriptional_Parthian
Javanese
Kaithi
Kannada
Katakana
Kayah_Li
Kharoshthi
Khitan_Small_Script
Khmer
Khojki
Khudawadi
Lao
Latin
Lepcha
Limbu
Linear_A
Unicode character class names--scripts
Linear_B
Lisu
Lycian
Lydian
Mahajani
Makasar
Malayalam
Mandaic
Manichaean
Marchen
Masaram_Gondi
Medefaidrin
Meetei_Mayek
Mende_Kikakui
Meroitic_Cursive
Meroitic_Hieroglyphs
Miao
Modi
Mongolian
Mro
Multani
Myanmar
Nabataean
Nandinagari
New_Tai_Lue
Newa
Unicode character class names--scripts
Nko
Nushu
Nyiakeng_Puachue_Hmong
Ogham
Ol_Chiki
Old_Hungarian
Old_Italic
Old_North_Arabian
Old_Permic
Old_Persian
Old_Sogdian
Old_South_Arabian
Old_Turkic
Oriya
Osage
Osmanya
Pahawh_Hmong
Palmyrene
Pau_Cin_Hau
Phags_Pa
Phoenician
Psalter_Pahlavi
Rejang
Runic
Samaritan
Saurashtra
Unicode character class names--scripts
Sharada
Shavian
Siddham
SignWriting
Sinhala
Sogdian
Sora_Sompeng
Soyombo
Sundanese
Syloti_Nagri
Syriac
Tagalog
Tagbanwa
Tai_Le
Tai_Tham
Tai_Viet
Takri
Tamil
Tangut
Telugu
Thaana
Thai
Tibetan
Tifinagh
Tirhuta
Ugaritic
Unicode character class names--scripts
Vai
Wancho
Warang_Citi
Yezidi
Yi
Zanabazar_Square
\D not \d VIM
\W not \w VIM
Magic
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms
described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
See also
Microsoft Edge Enterprise landing page
Reset Microsoft Edge data in the cloud
Article • 05/31/2022
This article describes the steps for resetting your Microsoft Edge data in the cloud.
7 Note
This article applies to Microsoft Edge version 88 or later unless otherwise noted.
Overview
There are situations in which you want to reset your Microsoft Edge data in the cloud.
For example, you want to synchronize your data, but Microsoft Edge reports that it's
unable to synchronize the data. Another example is to make sure that your data is
removed from Microsoft’s cloud. In both cases, Microsoft Edge lets you perform a cloud
data reset.
1. In Microsoft Edge, select Ctrl + Shift + O > select the ellipsis (...) > select Export
favorites.
2. Choose the file where you want to save your favorites. You can provide your own
filename or use the default name that Microsoft Edge provides,
"favorites_month_day_year.html". For example, "favorites_07_05_21.html". If you
need to restore your favorites later, you can do so from that file.
3. Select Save.
1. Stop synchronization on devices except the device you're performing the reset on.
In Microsoft Edge, select Settings > Profiles > Sync > Turn off sync.
2. After you stop synchronization, select Settings > Profiles > Sync > Reset sync. In
the Reset sync dialog box, clear "Resume sync on this device after resetting sync",
and then select Reset.
After a data reset has been successfully completed, data will once again synchronize
from your device if you chose to resume sync after the reset. You'll need to sign back in
on your other devices if you want to sync from those devices. However, if you didn’t
choose to resume sync, then your Microsoft Edge data is removed from the cloud and
your data will no longer synchronize.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge Enterprise Sync
Throttling for all cross-origin iframes
that are display: none and non-visible.
Article • 06/12/2023
This article describes iframe throttling and the benefits of standardizing throttling for
display: none and non-visible.
7 Note
Summary
Cross-origin iframes that are display: none and non-visible are throttled when
rendered cross-process, but not when they're rendered same-process. The absence of
throttling in same-process scenarios could lead to unpredictable behavior for
developers, who might not know the underlying process model used to render the
page. Also, with this iframe scenario, a malicious actor can probe to see whether a
browsing session has site/origin isolation enabled.
7 Note
Objective
Iframe throttling is a Blink mechanism that tries to reduce layout and rendering
overhead. Frames that are throttled only undergo partial layout, and
requestAnimationFrame and ResizeObserver don't operate when a frame is throttled.
Cross-origin iframes that are placed in a different process than their parent, and that are
either display: none or non-visible are throttled. Currently a cross-origin frame that's
rendered in the same-process as its parent isn'tthrottled, leading to different behavior
based on a process model. When enabled, this policy throttles all cross-origin, display:
none or non-visible frames, which gives consistent behavior between the same-process
and cross-process cases.
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms
described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
See also
Microsoft Edge Enterprise landing page
Create Microsoft Edge user data
directory variables
Article • 02/03/2023
This article explains how you can use data directory variables instead of using hard-
coded paths when modifying Microsoft Edge.
7 Note
Path variables
Policies for modifying data directory paths (For example, configuring the UserDataDir or
DownloadDirectory support variables). When configuring these policies, you can use
variables instead of hard-coded paths. For example, to store your profile data under
user local application data on Windows instead of the default location. Set the
UserDataDir policy to ${local_app_data}\Edge\Profile. On most Windows 10
installations, this path resolves to C:\Users\<Current-
user>\AppData\Local\Microsoft\Edge\Profile.
7 Note
To view the current Profile path, open the About version page (type
"edge://version"). The Profile path follows this format: C:\Users\<Current-
user>\AppData\Local\Microsoft\Edge\User Data\Default.
All policies that involve paths where Microsoft Edge stores different data are
platform dependent. Some of these policies are available only on specific
platforms, but others can be used on all platforms.
To avoid errors caused by applications starting from different locations on different
occasions, make sure that paths are absolute.
Every variable can occur only once in a path. For most of them, this is the only
meaningful way to use variables, because they resolve to absolute paths.
Almost all policies will create the path if it doesn't exist (if possible in the existing
circumstances).
Using network locations for some policies can lead to unexpected results due to
differences in how different versions/channels of Microsoft Edge handle the folder
structure. Moreover, network instability or directory-locking backup processes in
the network location can lead to unexpected reliability issues, in the form of
browser hangs or crashes.
All platforms
Variable Description
${user_name} The user who's using Microsoft Edge. Microsoft Edge respects SUIDs (Set
owner User ID up on execution) Example: audreysmall
${machine_name} The machine name, possibly including the domain name. Example:
audreysmall or audrey.ex.contoso.com
Windows only
Variable Description
${local_app_data} The Application Data folder for the current user. Example:
C:\Users\Administrator\AppData\Local
${roaming_app_data} The Roamed Application Data folder for the current user. Example:
C:\Users\Administrator\AppData\Roaming
${profile} The home folder for the current user. Example: C:\Users\Administrator
${program_files} The Program Files folder for the current process. This folder depends on
whether it's a 32-bit or 64-bit process. Example resolution: C:\Program
Files (x86)
${client_name} The name of the client PC connected to an RDP or Citrix session. This
variable is empty if it's used from a local session. If it's used in a path,
prefix it with something that's guaranteed not to be empty. Example:
C:\edge_profiles\session_${client_name} resolves to
C:\edge_profiles\session_<ForlocalSessions> and
C:\edge_profiles\session_<SomePCname> for remote sessions.
${session_name} The name of the active session. Use this name to distinguish multiple
simultaneously connected remote sessions that are using a single user
profile. Example: WinSta0 for local desktop sessions
macOS only
Variable Description
${users} The folder where users' profiles are stored. Example: /Users
Content license
7 Note
Portions of this page are modifications based on work created and shared by
Chromium.org and used according to terms described in the Creative Commons
Attribution 4.0 International License . The original page can be found here .
This work is licensed under a Creative Commons Attribution 4.0 International License .
See also
Microsoft Edge Enterprise landing page
How to roll back Microsoft Edge to a
previous version
Article • 07/31/2023
This article describes how to roll back to a previous version of Microsoft Edge using the
rollback feature. To learn more about this feature, watch Video: Microsoft Edge version
rollback.
7 Note
Introduction to rollback
Rollback lets you replace your Microsoft Edge browser version with an earlier version.
This feature is designed to be a safety net for enterprises deploying Microsoft Edge. It
provides a way to troubleshoot issues with Microsoft Edge. The benefits of rollback are
the ability to revert to previous browser version easily and quickly. Rollback reduces the
potential impact that a Microsoft Edge issue has on business operations.
Recommendations
The rollback feature is meant to be a temporary fix for issues you might find in a
Microsoft Edge browser update. We recommend that users install the latest version of
the Microsoft Edge browser to use the protection provided by the latest security
updates. Rollback to an earlier version risks exposure to known security issues.
Before temporarily rolling back your browser version, we also highly recommend that
you enable Sync for all the users in your organization. If you don't turn on Sync, there's a
risk of permanent browsing data loss. For more information about Sync, see Microsoft
Edge Sync.
U Caution
Only use rollback when necessary, there's always the risk of data loss.
7 Note
Download the MSI for the version you want to roll back to from here .
Save the MSI to your desktop.
7 Note
Close and reopen Microsoft Edge to verify that the rollback worked. Under
Settings and more (ALT + F), go to Settings and select About Microsoft
Edge.
To deploy an MSI with Microsoft Endpoint Manager, see the Create and Deploy an
Application with Configuration Manager guide. During the Create Application Wizard
step, add the ALLOW_DOWNGRADE=1 option to the Installation Program, e.g. msiexec /I
FileName.msi /qn ALLOWDOWNGRADE=1 .
3. Select Target version override and pick the browser version you want to roll back
to.
4. Select Update policy override and then select Enabled. Under Options, pick one of
the following options from the Policy dropdown list (except for Update disabled):
7 Note
5. Click OK to save the policy settings. Rollback will happen the next time Microsoft
Edge Update checks for an update. If you want the update to happen sooner, you
can change the Microsoft Edge Update polling interval or enable rollback using an
MSI.
ForceSync. Set ForceSync to enabled. This policy will force enable Sync on all
Microsoft Entra ID users. This policy is only effective for Microsoft Edge versions 86
and later.
The Configure the list of the types that are excluded from synchronization policy
allows admins to control what data can be synced by users.
Enable Notify a user that a browser restart is recommended or required for pending
updates. Under Options, select Required.
Enable Set the time period for update notifications and then set the desired time in
milliseconds.
Snapshot
A snapshot is a version stamped copy of the user data folder. During a version upgrade,
a snapshot of the previous version is made and stored in the snapshot folder. After
rollback occurs, a version matched snapshot will be copied into the new user data folder
and deleted from the snapshot folder. If no version matched snapshot is available upon
downgrade, rollback will rely on Sync to populate user data into the new Microsoft Edge
version.
The UserDataSnapshotRetentionLimit group policy allows you to set a limit for the
number of snapshots that can be retained at any given time. By default, three snapshots
are kept. You can configure this policy to keep from 0-5 snapshots.
To use rollback, make sure Install is set to Enabled. When this policy is
disabled, it prevents Microsoft Edge channels from being installed. For more
information, see Install.
For Windows versions 1903 and 1909: If your last update was before October
2019, you may have this issue.
For Windows versions 1709, 1803, and 1809: If your last update was before
November 2019, you may have this issue.
For more information, see Windows updates to support the next version of
Microsoft Edge
The following error message was shown after using the Command
Prompt and rollback didn't occur. What's wrong?
There are one of the following issues with the target version override setting:
Target version override is set to an unsupported target version.
Target version override is set to a non-existent target version.
Target version override input is incorrectly formatted.
See also
Microsoft Edge Enterprise landing page
Video: Microsoft Edge version rollback
Microsoft Edge videos
Article • 06/29/2021
The videos described in this article cover many different aspects of deploying, using, and
maintaining Microsoft Edge in the enterprise.
You can view them as part of the Mechanics's Microsoft Edge playlist or on the
Microsoft Edge YouTube channel alongside other videos.
See also
Microsoft Edge Enterprise landing page
Video: Microsoft Edge: State of the
browser 2020
Article • 06/29/2021
Click the next screenshot to watch the video by Colleen Williams, Senior Program
Manager.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge YouTube playlist
Video: Microsoft Edge browser isolation
using Application Guard
Article • 06/29/2021
This video shows how Microsoft Edge supports browser isolation using Application
Guard. Click the next screenshot to watch the video by Arunesh Chandra, Senior
Program Manager, Microsoft Edge Security.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge support for Microsoft Defender Application Guard
Microsoft Edge YouTube playlist
Video: Deploy Microsoft Edge to
hundreds or thousands of devices
Article • 06/29/2021
This video shows the steps to deploy Microsoft Edge to all your managed devices. Click
the next screenshot to watch the video by Jeremy Chapman, Director Microsoft 365.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge YouTube playlist
Video: Microsoft Edge and Data loss
prevention (DLP)
Article • 06/29/2021
This video shows how Microsoft Edge supports data loss prevention. Click the next
screenshot to watch the video by Arunesh Chandra, Senior Program Manager, Microsoft
Edge Security.
See also
Microsoft Edge Enterprise landing page
Data Loss Prevention (DLP) in Microsoft Edge
Microsoft Edge YouTube playlist
Video: Microsoft Edge and Identity
Article • 06/29/2021
This video shows how Microsoft Edge enables and supports identity for enterprise users.
Click the next screenshot to watch the video by Avi Vaid, Program Manager 2.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge identity support and configuration
Microsoft Edge YouTube playlist
Video: Microsoft Edge for Business
Article • 06/26/2023
This video gives an overview of the key features of Microsoft Edge for Business.
Click the next screenshot to watch the video by Lindsay Kubasik, Principal Group
Product Manager.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge YouTube playlist
Video: Microsoft Edge version rollback
Article • 06/29/2021
This video shows how Microsoft Edge supports version rollback. Click the next
screenshot to watch the video by Andy Zeigler, Principal Program Manager.
See also
Microsoft Edge Enterprise landing page
How to roll back Microsoft Edge to a previous version
Microsoft Edge YouTube playlist
Video: Microsoft Edge enterprise grade
PDF reader
Article • 06/29/2021
This video shows Microsoft Edge's enterprise grade PDF reader. Click the next
screenshot to watch the video by Aditi Gangwar, Program Manager 2.
See also
Microsoft Edge Enterprise landing page
PDF reader in Microsoft Edge
Microsoft Edge YouTube playlist
Video: Secure browsing on Microsoft
Edge
Article • 06/29/2021
This video shows how Microsoft Edge supports secure browsing using Microsoft
Defender SmartScreen. Click the next screenshot to watch the video by Eva Chen,
Program Manager.
Tip
See also
Microsoft Edge Enterprise landing page
Microsoft Edge support for Microsoft Defender SmartScreen
Microsoft Edge YouTube playlist
Video: Microsoft Edge security,
compatibility, and manageability
Article • 06/29/2021
This video shows how Microsoft Edge takes security, compatibility, and manageability to
the next level. Click the next screenshot to watch the video by Jeremy Chapman,
Director of Microsoft 365.
Security. Microsoft Edge helps protect your network and devices from malicious
attacks and prevents unauthorized access and leaks of corporate data.
Compatibility. Microsoft Edge is compatible with both the modern and legacy web.
Manageability. Consider your update management or servicing options for
Microsoft Edge.
See also
Microsoft Edge Enterprise landing page
Microsoft Edge security for your business
Microsoft Edge YouTube playlist