The Microsoft Purview extension for Chrome is only applicable to Windows devices. The extension is not necessary for the enforcement of data loss prevention on macOS devices.
Before you begin
To use the Microsoft Purview extension for Chrome, the device must be onboarded into Endpoint data loss prevention (DLP). Review these articles if you're new to DLP or Endpoint DLP:
Before you get started, you should confirm your Microsoft 365 subscription and any add-ons. To access and use the Endpoint DLP functionality, you must have one of the following subscriptions or add-ons:
Microsoft 365 E5
Microsoft 365 A5 (EDU)
Microsoft 365 E5 compliance
Microsoft 365 A5 compliance
Microsoft 365 E5 information protection and governance
Microsoft 365 A5 information protection and governance
Your organization must be licensed for Endpoint DLP.
Your devices must be running Windows 10 x64 (build 1809 or later).
The device must have Antimalware Client version 4.18.2202.x or later. Check your current version by opening the Windows Security app, select the Settings icon, and then select About.
Permissions
Data from Endpoint DLP can be viewed in Activity explorer. There are seven roles that grant permission to view and interact with activity explorer. The account you use for accessing the data must be a member of at least one of them.
Global administrator
Compliance admin
Security admin
Compliance data admin
Global reader
Security reader
Reports reader
Mikilvægt
Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should only be used in scenarios where a lesser privileged role can't be used.
Roles and Role Groups
There are roles and role groups that you can use to fine tune your access controls.
Deploying the extension is a multi-phase process. You can choose to install it on one machine at a time, or you can use Microsoft Intune or Group Policy for organization-wide deployments.
If you're rolling out the extension to all your monitored Windows 10/11 devices, you should remove Google Chrome from the unallowed app and unallowed browser lists. For more information, see Unallowed browsers. If you're only rolling it out to a few devices, you can leave Chrome on the unallowed browser or unallowed app lists. The extension bypasses the restrictions of both lists for those computers where it's installed.
Prepare your devices
Use the procedures in these articles to onboard your devices:
Microsoft Purview has upgraded Purview Chrome extension Manifest V3. If you already have Purview Chrome extension installed, you should see automatic upgrade on your machine to 3.0.0.239 or higher.
Enter a name and optional description on the Basics tab and select Next.
Select Add settings on the Configuration settings tab.
Select Google > Google Chrome > Extensions.
Select Configure the list of force-installed apps and extensions.
Change the toggle to Enabled.
Enter the following value for the extensions and app IDs and update URL:
echcggldkblhodogklpincgchnpgcdco;https://clients2.google.com/service/update2/crx.
Select Next.
Add or edit scope tags on the Scope tags tab as needed and select Next.
Add the required deployment users, devices, and groups on the Assignments tab and select Next.
Add applicability rules on the Applicability Rules tab as required and select Next.
Select Create.
Deploy using Group Policy
If you don't want to use Microsoft Intune, you can use group policies to deploy the extension across your organization.
Adding the Chrome Extension to the ForceInstall List
In the Group Policy Management Editor, navigate to your OU.
Expand the following path Computer/User configuration > Policies > Administrative templates > Classic administrative templates > Google > Google Chrome > Extensions. This path may vary depending on your configuration.
Select Configure the list of force-installed extensions.
Right click and select Edit.
Select Enabled.
Select Show.
Under Value, add the following entry: echcggldkblhodogklpincgchnpgcdco;https://clients2.google.com/service/update2/crx
Select OK and then Apply.
Test the Extension
Upload to cloud service, or access by unallowed browsers Cloud Egress
Create or get a sensitive item and try to upload a file to one of your organization’s restricted service domains. The sensitive data must match one of our built-in Sensitive Info Types, or one of your organization’s sensitive information types. You should get a DLP toast notification on the device you're testing from that shows that this action isn't allowed when the file is open.
Simulate other DLP scenarios in Chrome
Now that you’ve removed Chrome from the disallowed browsers/apps list, you can run simulation scenarios below to confirm that the behavior meets your organization’s requirements:
Copy data from a sensitive item to another document using the Clipboard
To test, open a file that is protected against copy to clipboard actions in the Chrome browser and attempt to copy data from the file.
Expected Result: A DLP toast notification showing that this action isn't allowed when the file is open.
Print a document
To test, open a file that is protected against print actions in the Chrome browser and attempt to print the file.
Expected Result: A DLP toast notification showing that this action isn't allowed when the file is open.
Copy to USB Removable Media
To test, try to save the file to a removable media storage.
Expected Result: A DLP toast notification showing that this action isn't allowed when the file is open.
Copy to Network Share
To test, try to save the file to a network share.
Expected Result: A DLP toast notification showing that this action isn't allowed when the file is open.
Use the Alerts Management Dashboard to view Chrome DLP alerts
The Chrome extension does not support these websites:
app.textcortex.com
copilot.microsoft.com
www.virustotal.com
Known Issues and Limitations
Incognito mode isn't supported and must be disabled.
Next steps
Now that you have onboarded devices and can view the activity data in Activity explorer, you're ready to move on to your next step where you create DLP policies that protect your sensitive items.
Endpoint data loss prevention extends monitoring of file activities and protective actions for those files to endpoints. Files are made visible in the Compliance solutions