Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Settings Catalog policies provide deep device-level control for Microsoft Edge browser configuration on enrolled Windows and macOS devices. These policies complement app protection policies by providing comprehensive browser hardening and enterprise customization.
Note
Settings Catalog requires device enrollment and provides device-level controls. For unmanaged devices, use App Protection Policies (Step 2) and App Configuration Policies (Step 4).
Settings Catalog for Windows
Settings Catalog for Windows provides comprehensive browser configuration with progressive security levels aligned with NIST, DISA STIG, and CISA frameworks. Following this guide doesn't make your organization compliant with these standards; they were used as input to build the security framework.
Microsoft Documentation:
Prerequisites:
- Windows 11 Pro or Enterprise
- Intune enrollment
- Microsoft Entra ID join or Hybrid
- Microsoft Edge Stable channel
- TPM 2.0 (for Application Bound Encryption)
- Hyper-V (if using Application Guard for Level 3)
Level 1 - Enterprise basic security for Windows
Level 1 configuration provides foundational browser security controls while maintaining user productivity.
- Go to the Microsoft Intune admin center.
- Select Devices > Windows > Manage devices > Configuration > Create > New policy.
- For Platform, choose Windows 10 and later. For Profile type, choose Settings catalog.
- Select Create.
- On the Basics tab, enter:
- Name: Edge Windows Level 1 Basic
- Description: Basic browser security configuration for Microsoft Edge on Windows devices.
- Select Next.
- On Configuration settings, select + Add settings.
- In the Settings picker, locate each setting using one of the following options:
- Search for a setting: Copy the Setting from the table and paste it into search.
- Browse by category: Select the Category listed for that setting.
- Configure the setting using the Value specified.
| Category | Setting | Value | Documentation |
|---|---|---|---|
| Microsoft Edge\SmartScreen settings | Configure Microsoft Defender SmartScreen | Enabled | Configure Microsoft Defender SmartScreen |
| Microsoft Edge\Automatic HTTPS | Configure automatic HTTPS | Enabled | Enable automatic HTTPS |
| Microsoft Edge\Content settings | Block third party cookies | Enabled | Block third party cookies |
| Microsoft Edge\Content settings | Configure cookies | Disabled | Configure cookies |
| Microsoft Edge\Content settings | Default pop-up window setting | Do not allow any site to show popups (2) | Default pop-up window setting |
| Microsoft Edge\Content settings | Default notification setting | Do not allow any site to show desktop notifications (2) | Default notification setting |
| Microsoft Edge\Content settings | Default geolocation setting | Don’t allow any site to track users’ physical location (2) | Default geolocation setting |
| Microsoft Edge\Content settings | Allow or block video capture | Enabled | Allow or block video capture |
| Microsoft Edge\Content settings | Allow or block audio capture | Enabled | Allow or block audio capture |
| Microsoft Edge\Privacy & data protection | Block tracking of users' web-browsing activity | Strict (3) | Block tracking of users' web-browsing activity |
| Microsoft Edge\Privacy & data protection | Allow personalization of ads, search and news by sending browsing history to Microsoft | Disabled | Allow personalization of ads, search and news by sending browsing history to Microsoft |
| Microsoft Edge\Privacy & data protection | Enable network prediction | Don’t predict network actions on any network connection (2) | Enable network prediction |
| Microsoft Edge\Privacy & data protection | Enable search suggestions | Disabled | Enable search suggestions |
| Microsoft Edge\Privacy & data protection | Send required and optional diagnostic data about browser usage | Off (0) | Send required and optional diagnostic data about browser usage |
| Microsoft Edge\Privacy & data protection | Disable saving browser history | Enabled | Disable saving browser history |
| Microsoft Edge\Privacy & data protection | EdgeCollectionsEnabled | Disabled | Enable the Collections feature |
| Microsoft Edge\Privacy Sandbox | Configure Do Not Track | Disabled | Configure Do Not Track |
| Microsoft Edge\Privacy Sandbox | Enforce Google SafeSearch | Enabled | Enforce Google SafeSearch |
| Microsoft Edge\Privacy Sandbox | Enforce Bing SafeSearch | Enabled, Configure strict search restrictions in Bing | Enforce Bing SafeSearch |
| Microsoft Edge\Privacy Sandbox | Force minimum YouTube Restricted Mode | Enabled, 1 Enforce at least Moderate Restricted Mode on YouTube | Force minimum YouTube Restricted Mode |
| Microsoft Edge\Privacy Sandbox | Continue running background apps after Microsoft Edge closes | Disabled | Continue running background apps after Microsoft Edge closes |
| Microsoft Edge\Privacy Sandbox | Disable synchronization of data using Microsoft sync services | Disabled | Disable synchronization of data using Microsoft sync services |
| Microsoft Edge\Password Manager and Protection | Enable saving passwords to the password manager | Disabled | Enable saving passwords to the password manager |
| Microsoft Edge\Password Manager and Protection | Enable AutoFill for addresses | Disabled | Enable AutoFill for addresses |
| Microsoft Edge\Password Manager and Protection | Enable AutoFill for payment instruments | Disabled | Enable AutoFill for payment instruments |
| Microsoft Edge\Authentication | Force synchronization of browser data and do not show the sync consent prompt | Disabled | Force synchronization of browser data and do not show the sync consent prompt |
| Microsoft Edge\Authentication | Windows Hello For HTTP Auth Enabled | Enabled | Windows Hello For HTTP Auth Enabled |
| Microsoft Edge\Import Controls | Allow importing of autofill form data | Disabled | Allow importing of autofill form data |
| Microsoft Edge\Import Controls | Allow importing of saved passwords | Disabled | Allow importing of saved passwords |
| Microsoft Edge\Import Controls | Allow importing of browsing history | Disabled | Allow importing of browsing history |
| Microsoft Edge\Import Controls | Allow importing of Cookies | Disabled | Allow importing of Cookies |
| Microsoft Edge\Import Controls | Allow importing of extensions | Disabled | Allow importing of extensions |
| Microsoft Edge\Import Controls | Allow importing of payment info | Disabled | Allow importing of payment info |
| Microsoft Edge\Import Controls | Allow importing of open tabs | Disabled | Allow importing of open tabs |
| Microsoft Edge\Import Controls | Allow importing of home page settings | Disabled | Allow importing of home page settings |
| Microsoft Edge\Import Controls | Allow importing of browser settings | Allow importing of browser settings | |
| Microsoft Edge\Startup, home page and new tab page | Configure the home page URL | https://copilot.microsoft.com/ | Configure the home page URL |
| Microsoft Edge\Startup, home page and new tab page | Show Home button on toolbar | Enabled | Show Home button on toolbar |
| Microsoft Edge\Startup, home page and new tab page | Configure the new tab page URL | https://copilot.microsoft.com/ | Configure the new tab page URL |
| Microsoft Edge\Startup, home page and new tab page | Allow quick links on the new tab page | Enabled | Allow quick links on the new tab page |
| Microsoft Edge\Startup, home page and new tab page | Hide the First-run experience and splash screen | Enabled | Hide the First-run experience and splash screen |
| Microsoft Edge\Network settings | Control the mode of DNS-over-HTTPS | Enable > Enable DNS-over-HTTPS without insecure fallback | Control the mode of DNS-over-HTTPS |
| Microsoft Edge\Network settings | Specify URI template of desired DNS-over-HTTPS resolver | https://cloudflare-dns.com/dns-query |
Specify URI template of desired DNS-over-HTTPS resolver |
| Microsoft Edge\Network settings | DNS interception checks enabled | Enabled | DNS interception checks enabled |
| Microsoft Edge\Network settings | Allow QUIC protocol | Disabled | Allow QUIC protocol |
| Microsoft Edge\Extensions | Control which extensions cannot be installed | ["external_component", "external_pref", "external_registry", "external_policy_download"] | Control which extensions cannot be installed |
| Microsoft Edge\Extensions | Configure extension management settings | {"*": {"installation_mode": "blocked"}} | Configure extension management settings |
| Microsoft Edge\Downloads and files | Allow download restrictions | Block dangerous downloads (1) | Allow download restrictions |
| Microsoft Edge\Downloads and files | Set download directory | ${user_home}/Downloads/Edge | Set download directory |
| Microsoft Edge\Downloads and files | Ask where to save downloaded files | Enabled | Ask where to save downloaded files |
| Microsoft Edge\Feature controls | Show Hubs Sidebar | Disabled | Show Hubs Sidebar |
| Microsoft Edge\Feature controls | Show Microsoft Rewards experiences | Disabled | Show Microsoft Rewards experiences |
| Microsoft Edge\Feature controls | Shopping in Microsoft Edge Enabled | Disabled | Shopping in Microsoft Edge Enabled |
| Microsoft Edge\Feature controls | Control whether Microsoft 365 Copilot Chat shows in the Microsoft Edge for Business toolbar | Disabled | Control whether Microsoft 365 Copilot Chat shows in the Microsoft Edge for Business toolbar |
| Microsoft Edge\Feature controls | Enable Workspaces | Enabled | Enable Workspaces |
| Microsoft Edge\Feature controls | Allow or deny screen capture | Disabled | Allow or deny screen capture |
| Microsoft Edge\Feature controls | Default sensors setting | Block (2) | Default sensors setting |
| Microsoft Edge Update\Applications | Update policy override default | Always allow updates (1) | Update policy override default |
| Microsoft Edge Update\Preferences | Auto-update check period override | 1440 | Auto-update check period override |
| Microsoft Edge Update\Preferences | Target Channel override | stable | Target Channel override |
| Microsoft Edge Update\Preferences | Let users update all apps on metered connections | Updates disabled (1) | Let users update all apps on metered connections |
| Microsoft Edge Update\Experimentation and Configuration Service | Control updater's communication with the Experimentation and Configuration Service | Disabled (0) | Control updater's communication with the Experimentation and Configuration Service |
- Select Next.
- For Scope tags, select the appropriate scope tag.
- For Assignments, assign to SEB-Level1-Devices group.
- Select Next to review the settings. Then choose Create.
Level 2 - Enterprise enhanced security for Windows
Level 2 builds on the Level 1 by duplicating its configuration and adding enhanced controls and advanced privacy protection.
- Go to the Microsoft Intune admin center.
- Select Devices > Windows > Manage devices > Configuration.
- Locate the Level 1 – Enterprise basic security – Windows Settings Catalog policy.
- Select the context menu (⋯) next to that policy, and then select Duplicate.
- In the Duplicate policy window, enter the following:
- Name: Edge Windows Level 2 Enhanced
- Description: Enhanced browser security including Application Bound Encryption, extension controls, and advanced privacy settings.
- Select Save. This action takes you back to the Windows configuration page.
- Find your new Level 2 policy in the policy list. If it doesn’t appear, select Refresh.
- When the policy appears, select the context menu (⋯) next to the policy name, and then select Edit.
- On the Basics tab, verify that the name and description are correct, and then select Next.
- On the Settings tab, all Level 1 settings are already included. You can locate more settings using one of the following options:
- Search for a setting: Use the search box to find the setting name listed in the table. When multiple results appear, choose the entry that matches the Category.
- Browse by category: Expand Microsoft Edge and select the Category listed for that setting.
- Configure each setting using the Value specified in the table.
| Category | Setting | Value | Documentation |
|---|---|---|---|
| Microsoft Edge\SmartScreen settings | Configure Microsoft Defender SmartScreen to block potentially unwanted apps | Enabled | Configure Microsoft Defender SmartScreen to block potentially unwanted apps |
| Microsoft Edge\Additional | Enable Application Bound Encryption | Enabled | Enable Application Bound Encryption |
| Microsoft Edge\Additional | Disable synchronization of data using Microsoft sync services | Enabled | Disable synchronization of data using Microsoft sync services |
| Microsoft Edge\Additional | Limit cookies from specific websites to the current session | Enabled | Limit cookies from specific websites to the current session |
| Microsoft Edge\Additional | Configure Legacy SameSite cookie behavior setting | Disabled | Configure Legacy SameSite cookie behavior setting |
| Microsoft Edge\Additional | Configure automatic client certificate selection | ["*.company.com"] | Configure automatic client certificate selection |
| Microsoft Edge\Additional | Control printing | Enabled | Control printing |
| Microsoft Edge\Additional | Set the system default printer as the default printer | Enabled | Set the system default printer as the default printer |
| Microsoft Edge\Additional | Control use of the WebHID API | Enabled, Do not allow any site to request access to HID devices via the WebHID API | Control use of the WebHID API |
| Microsoft Edge\Additional | Switch intranet sites to a work profile | Enabled | Switch intranet sites to a work profile |
| Microsoft Edge\Startup, home page and new tab page | Configure InPrivate mode availability | InPrivate mode available (0) | Configure InPrivate mode availability |
| Microsoft Edge\Content settings | Control where security restrictions on insecure origins apply | *.company.com | Control where security restrictions on insecure origins apply |
| Microsoft Edge\Content settings | Allow insecure content on specified sites | [*.contoso.com] | Allow insecure content on specified sites |
| Microsoft Edge\Content settings | Block insecure content on specified sites | ["*"] | Block insecure content on specified sites |
| Microsoft Edge\Content settings | Grant access to specific sites to connect to specific USB devices | Enabled [*.contoso.com] | Grant access to specific sites to connect to specific USB devices |
| Microsoft Edge\Content settings | Control use of the Web Bluetooth API | Enabled, Do not allow any site to request access to Bluetooth devices via the Web Bluetooth API | Control use of the Web Bluetooth API |
| Microsoft Edge\Network settings | WebRTC IP Handling Policy for URL Patterns | default_public_and_private_interfaces | WebRTC IP Handling Policy for URL Patterns |
| Microsoft Edge\Network settings | Manage exposure of local IP addresses by WebRTC | Enabled [*.contoso.com] | Manage exposure of local IP addresses by WebRTC |
| Microsoft Edge\Network settings | Control whether TLS 1.3 Early Data is enabled in Microsoft Edge | Enabled | Control whether TLS 1.3 Early Data is enabled in Microsoft Edge |
| Microsoft Edge\Network settings | Enable the network service sandbox | Enabled | Enable the network service sandbox |
| Microsoft Edge\Proxy settings | Configure proxy settings | {"mode": "system"} | Configure proxy settings |
| Microsoft Edge\Extensions | Control which extensions cannot be installed | ["*"] | Control which extensions cannot be installed |
| Microsoft Edge | Allow specific extensions to be installed | ["*.company.com"] | Allow specific extensions to be installed |
| Microsoft Edge | Allow user-level native messaging hosts (installed without admin permissions) | Enabled | Allow user-level native messaging hosts (installed without admin permissions) |
| Microsoft Edge | Configure native messaging block list | Enabled, ["*"] | Configure native messaging block list |
| Microsoft Edge | Control which extensions are installed silently | ["*"] | Control which extensions are installed silently |
| Microsoft Edge | Configure extension and user script install sources | ["*"] | Configure extension and user script install sources |
| Microsoft Edge | Configure allowed extension types | ["*"] | Configure allowed extension types |
| Microsoft Edge | Control Manifest v2 extension availability | Disabled | Control Manifest v2 extension availability |
| Microsoft Edge | Blocks external extensions from being installed | Enabled | Blocks external extensions from being installed |
| Microsoft Edge | Set download directory | ${user_home}/Downloads/EdgeControlled | Set download directory |
| Microsoft Edge | Show Downloads button on the toolbar | Enabled | Show Downloads button on the toolbar |
| Microsoft Edge | Enable insecure download warnings | Enabled | Enable insecure download warnings |
| Microsoft Edge | Default images setting | Enabled, Allow sites to show images (1) | Default images setting |
| Microsoft Edge | Default JavaScript setting | Enabled, Allow sites to run JavaScript (1) | Default JavaScript setting |
| Microsoft Edge | Configure plugins policy | Click to play (3) | Configure plugins policy |
| Microsoft Edge | Allow media autoplay for websites | Disabled | Allow media autoplay for websites |
| Microsoft Edge | Set the background tab inactivity timeout for sleeping tabs | 6 Hours (21600) = 6 hours of inactivity | Set the background tab inactivity timeout for sleeping tabs |
| Microsoft Edge | Delay before running idle actions | 30 | Delay before running idle actions |
| Microsoft Edge | Clear browsing data when Microsoft Edge closes | Enabled | Clear browsing data when Microsoft Edge closes |
| Microsoft Edge | Notify a user that a browser restart is recommended or required for pending updates | Recommended - Show a recurring prompt to the user indicating that a restart is recommended | Notify a user that a browser restart is recommended or required for pending updates |
| Microsoft Edge | Enable startup boost | Disabled | Enable startup boost |
| Microsoft Edge | Configure when efficiency mode should become active | Enabled, Efficiency mode is always active | Configure when efficiency mode should become active |
| Microsoft Edge | Configure sleeping tabs | Enabled | Configure sleeping tabs |
| Microsoft Edge | Configure auto discard sleeping tabs | Enabled | Configure auto discard sleeping tabs |
| Microsoft Edge | Let screen reader users get image descriptions from Microsoft | Enabled | Let screen reader users get image descriptions from Microsoft |
| Microsoft Edge | Control where developer tools can be used | Enabled | Control where developer tools can be used |
| Microsoft Edge | Allow remote debugging | Disabled | Allow remote debugging |
| Microsoft Edge Update\Update scheduling | Time period in each day to suppress auto-update check | Hour: 8, Minute: 0, Duration: 600 (suppress 8 AM – 6 PM) | Time period in each day to suppress auto-update check |
| Microsoft Edge Update\Preferences | Auto-update check period override | 720 (12 hours) | Auto-update check period override |
| Microsoft Edge Update\Applications | Update policy override default | Automatic silent updates only (3) | Update policy override default |
- Select Next.
- For Assignments, assign to SEB-Level2-Devices group.
- Select Next to review the settings. Then choose Save.
Level 3 – Enterprise high security for Windows
Level 3 builds on the Level 2 configuration by duplicating its policy and applying more high-security controls such as URL allowlisting, stricter data protection, and site isolation.
- Go to the Microsoft Intune admin center.
- Select Devices > Windows > Manage devices > Configuration.
- Locate the Level 2 – Enterprise enhanced security – Windows Settings Catalog policy.
- Select the context menu (⋯) next to that policy, and then select Duplicate.
- In the Duplicate policy window, enter the following:
- Name: Edge Windows Level 3 High
- Description: High-security browser configuration including URL allowlisting, site isolation, and maximum data protection.
- Select Save. This action takes you back to the Windows configuration page.
- Find your new Level 3 policy in the policy list. If it doesn’t appear, select Refresh.
- When the policy appears, select the context menu (⋯) next to the policy name, and then select Edit.
- On the Basics tab, verify that the name and description are correct, and then select Next.
- On the Settings tab, all Level 2 settings are already included. You can locate more or modified settings using one of the following options:
- Search for a setting: Use the search box to find the setting name listed in the table. When multiple results appear, choose the entry that matches the Category.
- Browse by category: Expand Microsoft Edge and select the Category listed for that setting.
- Configure each setting using the Value specified in the table.
| Category | Setting | Value | Documentation |
|---|---|---|---|
| Microsoft Edge\Content settings | Define a list of allowed URLs | [".company.com",".microsoft.com","*.office.com"] | Define a list of allowed URLs |
| Microsoft Edge\Content settings | Block access to a list of URLs | ["*"] | Block access to a list of URLs |
| Microsoft Edge\Additional | Allow download restrictions | Block all downloads (3) | Allow download restrictions |
| Microsoft Edge\Additional | Control where developer tools can be used | Disallowed (2) | Control where developer tools can be used |
| Microsoft Edge\Additional | Enable site isolation for every site | Enabled | Enable site isolation for every site |
| Microsoft Edge\Additional | Send required and optional diagnostic data about browser usage | Off (0) | Send required and optional diagnostic data about browser usage |
| Microsoft Edge\Startup, home page and new tab page | Configure InPrivate mode availability | InPrivate mode forced (2) | Configure InPrivate mode availability |
| Microsoft Edge\User Data & Retention | Limits the number of user data snapshots retained for use in case of emergency rollback | 1 | Limits the number of user data snapshots retained for use in case of emergency rollback |
| Microsoft Edge\User Data & Retention | Browsing Data Lifetime Settings | [{"data_types": ["browsing_history", "download_history", "cookies_and_other_site_data", "cached_images_and_files"], "time_to_live_in_hours": 24}] | Browsing Data Lifetime Settings |
| Microsoft Edge\User Data & Retention | Enable use of ephemeral profiles | Enabled | Enable use of ephemeral profiles |
| Microsoft Edge\Network settings | Enable network prediction | Never predict (2) | Enable network prediction |
| Microsoft Edge\Network settings | Restrict the range of local UDP ports used by WebRTC | "10000-10100" | Restrict the range of local UDP ports used by WebRTC |
| Microsoft Edge\Proxy settings | Configure proxy bypass list | [] | Configure proxy bypass list |
| Microsoft Edge\Proxy settings | Configure proxy pac URL | "https://proxy.company.com/proxy.pac" | Configure proxy pac URL |
| Microsoft Edge\Network isolation | Maximum number of concurrent connections to the proxy server | Enabled, 6 | Maximum number of concurrent connections to the proxy server |
| Microsoft Edge\Additional | Application Guard Traffic Identification | Enabled | Application Guard Traffic Identification |
| Microsoft Edge\Additional | Prevents files from being uploaded while in Application Guard | Enabled | Prevents files from being uploaded while in Application Guard |
| Microsoft Edge\Data Loss Prevention | Allow clipboard use on specific sites | Enabled, *.company.com | Allow clipboard use on specific sites |
| Microsoft Edge\Data Loss Prevention | Block clipboard use on specific sites | Enabled, * | Block clipboard use on specific sites |
| Microsoft Edge\Data Loss Prevention | Control printing | Disabled | Control printing |
| Microsoft Edge\Data Loss Prevention | Force Microsoft Defender SmartScreen checks on downloads from trusted sources | Enabled | Force Microsoft Defender SmartScreen checks on downloads from trusted sources |
| Microsoft Edge\Content settings | Minimum TLS version enabled | TLS 1.2 | Minimum TLS version enabled |
| Microsoft Edge\Privacy | Allow user feedback | Disabled | Allow user feedback |
| Microsoft Edge\Privacy | URL reporting in Edge diagnostic data enabled | Disabled | URL reporting in Edge diagnostic data enabled |
| Microsoft Edge\Session isolation | Enable site isolation for specific origins | Disabled | Enable site isolation for specific origins |
| Microsoft Edge Update\Applicatons | Target version override | 131.0.2903.112 | Target version override |
| Microsoft Edge Update\Applications | Update policy override default | Manual updates only (2) | Update policy override default |
| Microsoft Edge Update\Applications | Rollback to Target version | Enabled (1) | Rollback to Target version |
| Microsoft Edge Update\Preferences | Auto-update check period override | 10080 (7 days) | Auto-update check period override |
| Microsoft Edge Update\Update scheduling | Time period in each day to suppress auto-update check | Hour: 6, Minute: 0, Duration: 840 (suppress 6 AM – 8 PM) | Time period in each day to suppress auto-update check |
| Microsoft Edge Update\Installation behavior | Allow installation default | Always allow Machine-Wide Installs but not Per-User Installs (4) | Allow installation default |
| Microsoft Edge Update\Preview enrollment | Allow users in the Windows Insider Program to be enrolled in Edge Preview | Disabled (0) | Allow users in the Windows Insider Program to be enrolled in Edge Preview |
| Microsoft Edge Update\Shortcuts | Remove Desktop Shortcuts upon update default | Force delete system-level and user-level Desktop Shortcuts (2) | Remove Desktop Shortcuts upon update default |
- Select Next.
- For Assignments, assign to SEB-Level2-Devices group.
- Select Next to review the settings. Then choose Save.
Validation
After deploying all Windows security levels, validate that the policies have applied correctly and that each configuration behaves as expected on a test device.
Policy verification:
In the Microsoft Intune admin center, go to Devices > Windows > Manage devices > Configuration, and locate the policies for each level.
Select a policy, and then choose Device assignment status to confirm that all assigned devices show a status of Succeeded.
You can also review Per setting status to verify individual policy settings applied successfully.
On a test device, open Microsoft Edge and go toedge://policyto confirm that key settings appear as Active and not Error.Level 1 – Basic security validation:
Confirm that SmartScreen protection and Automatic HTTPS are enabled.
Verify that third-party cookies, pop-ups, and notifications are blocked and that password saving, autofill, and data synchronization are disabled.
Check that automatic updates are enabled and that browsing and download activity complies with baseline protections.Level 2 – Enhanced security validation:
Confirm that Application Bound Encryption (ABE) is enabled.
Verify that extension installation is blocked except for approved entries, InPrivate mode is available, and browser sync remains disabled.
Check that downloads are restricted, SmartScreen for trusted sources is active, and background apps do not continue running after Edge closes.
Validate that 120+ settings are applied by reviewing the Applied policies list inedge://policy.Level 3 – High security validation:
Confirm that URL filtering restricts browsing to approved domains (for example,*.company.com,*.microsoft.com,*.office.com, andlogin.microsoftonline.com).
Navigate to a non-allowlisted site to ensure it is blocked or automatically opened in an Application Guard container.
Verify that all downloads are blocked, printing and clipboard access are disabled, and browsing data clears automatically when Edge closes.
Confirm that InPrivate mode is forced, Application Guard isolation is active, and all optional features (Collections, Games, Sidebar, Drop, Wallet, Copilot) are disabled.
If any settings do not apply, sync the device from the Company Portal app or verify group assignments (SEB-Level1-Devices, SEB-Level2-Devices, or SEB-Level3-Devices).
For extra confirmation, monitor edge://policy and the Device configuration report in the Microsoft Intune admin center to ensure the expected number of policies are active per level.
Settings Catalog for macOS
Settings Catalog for macOS provides foundational browser security for enrolled Mac devices.
Microsoft Documentation:
Important
macOS Platform Limitations
- App Protection Policies (APP): Not available for macOS
- App Configuration Policies (ACP): Not available for macOS
- Settings Catalog only: macOS Microsoft Edge management relies solely on Settings Catalog policies
Prerequisites:
- macOS 12+ (Monterey or later)
- Device enrolled via Apple Business Manager (recommended)
- Microsoft Edge installed
- Administrative access
Level 1 – Enterprise basic security for macOS
Level 1 establishes foundational browser protections for enrolled macOS devices using Microsoft Edge. This level focuses on essential data-boundary, privacy, and network-security controls.
- Go to the Microsoft Intune admin center.
- Select Devices > macOS > Managed devices > Configuration > Create > New policy.
- In the Create a profile window, verify that Platform is set to macOS (this option is pre-selected and cannot be changed).
- For Profile type, choose Settings catalog, and then select Create.
- On the Basics tab, enter:
- Name: Edge macOS Level 1 Basic
- Description: Foundational browser configuration for Microsoft Edge addressing gap analysis findings (Certificate management, network policies, system integration)
- Select Next.
- On the Configuration settings tab, select + Add settings.
- In the Settings picker, locate each setting using one of the following options:
- Search for a setting: Use the search box to find the setting name listed in the table. When multiple results appear, choose the entry that matches the Category.
- Browse by category: Expand Microsoft Edge and select the Category listed for that setting.
- Configure each setting using the Value specified in the table.
| Category | Setting | Value | Documentation |
|---|---|---|---|
| Microsoft Edge | Configure Microsoft Defender SmartScreen | Enabled | Configure Microsoft Defender SmartScreen |
| Microsoft Edge | Configure Automatic HTTPS | Enabled | Configure Automatic HTTPS |
| Microsoft Edge | Default pop-up window setting | Do not allow any site to show popups (2) | Default pop-up window setting |
| Microsoft Edge | DNS interception checks enabled | Enabled | DNS interception checks enabled |
| Microsoft Edge | Automatically select client certificates for these sites | ["*.company.com"] | Automatically select client certificates |
| Microsoft Edge | Control the mode of DNS-over-HTTPS | secure (secure) = Enable DNS-over-HTTPS without insecure fallback | Control the mode of DNS-over-HTTPS |
| Microsoft Edge | Allow QUIC protocol | Disabled for security | Allow QUIC protocol |
| Microsoft Edge | Configure the home page URL | https://portal.company.com |
Configure the home page URL |
| Microsoft Edge | Show Home button on toolbar | Enabled | Show Home button on toolbar |
| Microsoft Edge | Configure the new tab page URL | https://portal.company.com |
Configure the new tab page URL |
| Microsoft Edge | Hide the First-run experience and splash screen | Enabled | Hide the First-run experience |
| Microsoft Edge | Enable saving passwords to the password manager | Disabled | Enable saving passwords to the password manager |
| Microsoft Edge | Enable AutoFill for addresses | Disabled | Enable AutoFill for addresses |
| Microsoft Edge | Enable AutoFill for credit cards | Disabled | Enable AutoFill for credit cards |
| Microsoft Edge | Block tracking of users' web-browsing activity | Strict (3) | Block tracking of users' web-browsing activity |
| Microsoft Edge | Allow personalization of ads, search and news | Disabled | Allow personalization |
| Microsoft Edge | Enable network prediction | Don't predict network actions (2) | Enable network prediction |
| Microsoft Edge | Enable search suggestions | Disabled | Enable search suggestions |
| Microsoft Edge | Send required and optional diagnostic data | Off (0) | Send required and optional diagnostic data |
| Microsoft Edge | Allow importing of autofill form data | Disabled | Allow importing of autofill form data |
| Microsoft Edge | Allow importing of saved passwords | Disabled | Allow importing of saved passwords |
| Microsoft Edge Update | Specifies how Microsoft Edge Update handles available updates from Microsoft Edge | automatic-silent-only (automatic-silent-only) | UpdatePolicyOverride |
| Microsoft Edge Update | Enable component updates in Microsoft Edge | Enabled | ComponentUpdatesEnabled |
- Select Next.
- For Scope tags, select the appropriate scope tag.
- For Assignments, assign to SEB-Level1-Devices group.
- Select Next to review the settings. Then choose Create.
Level 2 - Enterprise enhanced security for macOS
Level 2 builds on the Level 1 by duplicating its configuration and adding enhanced controls and advanced privacy protection.
- Go to the Microsoft Intune admin center.
- Select Devices > macOS > Manage devices > Configuration.
- Locate the Level 1 – Enterprise basic security – macOS Settings Catalog policy.
- Select the context menu (⋯) next to that policy, and then select Duplicate.
- In the Duplicate policy window, enter the following:
- Name: Edge macOS Level 2 Enhanced
- Description: Enhanced security with extension blocking and privacy controls.
- Select Save. This action takes you back to the macOS configuration page.
- Find your new Level 2 policy in the policy list. If it doesn't appear, select Refresh.
- When the policy appears, select the context menu (⋯) next to the policy name, and then select Edit.
- On the Basics tab, verify that the name and description are correct, and then select Next.
- On the Settings tab, all Level 1 settings are already included. You can locate more or modified settings using one of the following options:
- Search for a setting: Use the search box to find the setting name listed in the table. When multiple results appear, choose the entry that matches the Category.
- Browse by category: Expand Microsoft Edge and select the Category listed for that setting.
- Configure each setting using the Value specified in the table.
| Category | Setting | Value | Documentation |
|---|---|---|---|
| Microsoft Edge | Enhance the security state in Microsoft Edge | Strict | Enhance the security state in Microsoft Edge |
| Microsoft Edge | Configure InPrivate mode availability | Disabled (1) | Configure InPrivate mode availability |
| Microsoft Edge | Control which extensions cannot be installed | ["*"] | Control which extensions cannot be installed |
| Microsoft Edge | Control use of the WebUSB API | BlockWebUsb (2) | Control use of the WebUSB API |
| Microsoft Edge | Control use of the WebHID API | BlockWebHid (2) | Control use of the WebHID API |
| Microsoft Edge | Control where developer tools can be used | DeveloperToolsDisallowed (2) | Control where developer tools can be used |
| Microsoft Edge | Control the availability of developer mode on extensions page | Disallow (1) | Control the availability of developer mode on extensions page |
| Microsoft Edge | Enable Microsoft Defender SmartScreen DNS requests | Enabled | Enable Microsoft Defender SmartScreen DNS requests |
| Microsoft Edge | Shopping in Microsoft Edge Enabled | Disabled | Shopping in Microsoft Edge Enabled |
| Microsoft Edge | Edge Wallet E-Tree Enabled | Disabled | Edge Wallet E-Tree Enabled |
| Microsoft Edge | Enable Microsoft Bing trending suggestions in the address bar | Disabled | Enable Microsoft Bing trending suggestions |
- Select Next.
- For Assignments, assign to SEB-Level2-Devices group.
- Select Next to review the settings. Then choose Save.
Level 3 - Enterprise high security for macOS
Level 3 builds on the Level 2 configuration by duplicating its policy and applying extra high-security controls such as URL allowlisting, stricter data protection, and site isolation.
- Go to the Microsoft Intune admin center.
- Select Devices > macOS > Manage devices > Configuration.
- Locate the Level 2 – Enterprise enhanced security – macOS Settings Catalog policy.
- Select the context menu (⋯) next to that policy, and then select Duplicate.
- In the Duplicate policy window, enter the following:
- Name: Edge macOS Level 3 High
- Description: High-security configuration with URL filtering and maximum restrictions.
- Select Save. This action takes you back to the macOS configuration page.
- Find your new Level 3 policy in the policy list. If it doesn't appear, select Refresh.
- When the policy appears, select the context menu (⋯) next to the policy name, and then select Edit.
- On the Basics tab, verify that the name and description are correct, and then select Next.
- On the Settings tab, all Level 2 settings are already included. You can locate more or modified settings using one of the following options:
- Search for a setting: Use the search box to find the setting name listed in the table. When multiple results appear, choose the entry that matches the Category.
- Browse by category: Expand Microsoft Edge and select the Category listed for that setting.
- Configure each setting using the Value specified in the table.
| Category | Setting | Value | Documentation |
|---|---|---|---|
| Microsoft Edge | Configure InPrivate mode availability | InPrivate mode forced (2) | Configure InPrivate mode availability |
| Microsoft Edge | Define a list of allowed URLs | [".company.com",".microsoft.com","*.office.com"] | Define a list of allowed URLs |
| Microsoft Edge | Block access to a list of URLs | ["*"] | Block access to a list of URLs |
| Microsoft Edge | Allow download restrictions | Block all downloads (4) | Allow download restrictions |
| Microsoft Edge | Enable site isolation for every site | Enabled | Enable site isolation for every site |
| Microsoft Edge | Disable synchronization of data using Microsoft sync services | Enabled | Disable synchronization of data using Microsoft sync services |
| Microsoft Edge | Clear browsing data when Microsoft Edge closes | Enabled | Clear browsing data when Microsoft Edge closes |
| Microsoft Edge | Allow or deny screen capture | Disabled | Allow or deny screen capture |
| Microsoft Edge | Enable printing | Disabled | Enable printing |
| Microsoft Edge | Configure clipboard | [] | Configure clipboard |
| Microsoft Edge | Enable use of ephemeral profiles | Enabled | Enable use of ephemeral profiles |
| Microsoft Edge | Manage exposure of local IP addresses by WebRTC | [] | Manage exposure of local IP addresses by WebRTC |
| Microsoft Edge | Control which extensions are installed silently | [] | Control which extensions are installed silently |
| Microsoft Edge | Configure allowed extension types | extension | Configure allowed extension types |
| Microsoft Edge | Configure tracking prevention exceptions for specific sites | *.company.com | Configure tracking prevention exceptions for specific sites |
| Microsoft Edge | Allow media autoplay for websites | Disabled | Allow media autoplay for websites |
| Microsoft Edge | Allow or block video capture | Disabled | Allow or block video capture |
| Microsoft Edge | Allow or block audio capture | Disabled | Allow or block audio capture |
| Microsoft Edge | Default notification setting | BlockNotifications (2) | Default notification setting |
| Microsoft Edge | Default geolocation setting | BlockGeolocation (2) | Default geolocation setting |
| Microsoft Edge | Default sensors setting | Do not allow any site to access sensors | Default sensors setting |
- Select Next.
- For Assignments, assign to SEB-Level3-Devices group.
- Select Next to review the settings. Then choose Save.
Validation
After deploying Settings Catalog policies:
- Policy Deployment: Check Intune console for successful policy deployment
- Endpoint Verification: On device, navigate to edge://policy and verify settings
- Security Testing: Test blocked features (downloads, extensions, URLs) per level
- User Experience: Verify browser functionality meets business requirements
Next steps
Continue to Step 6 to deploy the Microsoft Edge security baseline.