Edit

Share via


Configure Web Content Filtering on Edge

This article describes how to configure Web Content Filtering (WCF) for Microsoft Edge.

Introduction

Microsoft Edge is already one of the most secure browsers with features like phishing protection, typosquatting, and more to protect users when they're browsing online. Adding to these security features, Microsoft Edge is introducing Web Content Filtering (WCF) for EDU and SMB organizations to help them keep students and employees safe online. Using this feature, you can choose categories of websites that users aren't allowed to access while using Microsoft Edge.

You can set up web content filtering for your organization via the Microsoft Edge management service using the following steps.

Note

This experience is currently in preview.

Prerequisites

Before you can set up WCF you must meet the following prerequisites.

  1. On managed Windows devices where WCF policy needs to be applied:
    • Be signed in with work or school account on a device running Windows 10 or later.
    • Have Microsoft Edge Version 135 or higher installed.
  2. You must be a Microsoft Edge Administrator or a Global Administrator to access this experience in Microsoft 365 Admin Center.
  3. Your organization must have a M365 A1/A3/A5 license, Business Premium license, or Business Basic or Standard license with Intune Plan 1 or 2.

Note

Make sure you update to the latest version of Edge on all the managed devices where you want to run (WCF).

Setup steps

This section describes and illustrates the steps for your organization:

Enable WCF for a configuration policy

To enable WCF for a configuration policy:

  1. From the Microsoft 365 admin center, navigate to Settings -> Microsoft Edge -> Configuration policies.

  2. If you don’t yet have a configuration policy in the Edge management service assigned to your target. Microsoft Entra group, create one by following these steps: Create a configuration policy.

  3. Navigate to your desired configuration policy by clicking on it.

  4. From the configuration policy, navigate to Customization Settings -> Web content filtering.

  5. On the Web content filtering controls page, you find all the settings to manage WCF for your organization. Under Blocked categories, check all the categories that you want to block and then select Save changes.

Pick blocked categories for Web content filtering.

Important

Users with configured security settings may still be at risk on other browsers. To mitigate this risk, enabling web content filtering through the Edge management service also blocks user access to other browsers. When WCF is enabled, a new configuration policy is created in Intune. Any modifications you make to this new policy in Intune or in a configuration policy with identical groups in the Microsoft Edge management service may lead to unexpected behaviors.

Manage exceptions via allow and block lists

With the necessary categories blocked, use the allow and blocklist capabilities to manage any exceptions.

If you want to allow a particular URL that is part of a blocked category, then you can add the URL to the list of Allowed Sites by following steps:

  1. Under Web content filtering, select Allowed Sites.
  2. Type in the URL of the site you want to allow and then select "+"
  3. Select: Save Changes.

Enter URL for allowed sites in Web content filtering.

Tip

Instead of adding the URLs manually, you can import them in bulk using a .csv or .json file with the Import option. You could also bulk export the list if you want to reuse it for a different group/policy.

Similarly, if you want to block a particular URL or list of URLs, you can repeat the previous steps in the Blocked sites section.

Enter URL for blocked sites in Web content filtering.

Note

In addition to specific URLs you can use URL patterns with supported wildcard characters. Refer to this page for more information.

Important

URLs added to the Allowed sites list takes precedence over the Blocked sites list and Blocked categories. You can read more about this here.

Enable diagnostic data (optional)

Web Content Filtering (WCF) on Microsoft Edge is in preview and our aim is to make it as safe and seamless as possible. To help improve the feature and diagnose any issues that might arise during the preview, we recommend that you enable Optional data for the devices on which you're enabling WCF. Microsoft values your privacy, and we won't collect or use any personal identifiable information.

  1. To enable Diagnostic data, open the policy configuration page and go to Settings.
  2. Select Add setting.

Open policy configuration page to add a setting.

  1. Search for "DiagnosticData" and on the Configure a setting panel, under Required data, set the value to Optional data.
  2. Select Save.

Elementary School Policy.

Assign the WCF policy to a group

Now that the policy has WCF, Allowlist & Blocklist, and Diagnostic data settings configured you can assign this policy to a group.

  1. On the policy page, select Assignment and then select Assignment.

  2. Click Select Group. Search for DiagnosticData and configure Optional data as Required.

Verify that the WCF policy was applied correctly

You can check whether the policy was applied to a user's Edge browser by navigating to edge://settings/privacy. Under Privacy, search, and services > Security you should see the Web content filtering setting is enabled.

When a user tries to access a site that is blocked by WCF, they'll see a screen like the one in the next screenshot.

Prompt to get permission to access blocked site.

Note

It can take up to 90 minutes for policies set via the Edge management service be applied to user devices.

Tip

If you have the same policy set up via Intune and EMX, Intune policy takes precedence by default. You can override this default behavior using the EdgeManagementPolicyOverridesPlatformPolicy and the EdgeManagementUserPolicyOverridesCloudMachinePolicy settings in the browser policy documentation.

Managing User Access Requests

If a user encounters a blocked site which they need to access for a legitimate business reason, or that they believe shouldn't be blocked, they may request access. These requests can then be granted or denied by an administrator from the Edge management service.

Note

Requests are currently enabled for cloud-based configuration profiles.
Support for Intune-based configuration profiles is coming soon.

URLs allowed via requests will automatically add the domain name to the allow list.


Requesting Access (User Steps)

  1. Access the blocked URL.
  2. From the block page, click Request access.
  3. In the request flyout, provide a justification in the text field.
  4. Click Send.

Managing Requests (Admin Steps)

  1. From the Web content filtering page, click the Requested sites tab
  2. Under Active requests, click the domain name of the request that you wish to manage.
  3. Optional: You can view the justification message provided by a requestor by clicking the expand arrow next any of the listed request IDs.
  4. If you wish to leave the request blocked, leave the value of the Allow site for all users in this configuration policy? dropdown selection to No, block site.
  5. If you wish to allow the site, adjust the value of the dropdown to Yes, allow site.
  6. Click Save.

To change a block or allow setting from a resolved request, remove the site from the appropriate block or allow list.

Reporting

You can analyze the web activity trends in your organization by searching the audit log on Microsoft Purview. The following fields are associated with the Web Content Filtering records that are sent to Microsoft Purview.

  • Workload: MicrosoftEdge

  • Record Type: WebContentFiltering

  • Activities: Allowed URL Navigation in Microsoft Edge, Blocked URL Navigation in Microsoft Edge

You can use the above to run a search job on the Audit solution of Microsoft Purview.

PurviewDetails

You can view more details of each URL navigation in the search result by clicking on it or by exporting the results of any search query.

PurviewDetails_export

See also