1. Home
  2. Deploying the Browser Extension via Endpoint Manager (Intune)

Deploying the Browser Extension via Endpoint Manager (Intune)

Purpose

This article explains how to prevent browser from remembering credentials via Microsoft Endpoint Manager (Intune).

Prerequisites

  • Office 365 Global Administrator
  • Endpoint Manager Licensed and Deployed

Instructions – Create Policy

  1. Login to Office 365 Admin Center. https://admin.microsoft.com/Adminportal
  2. Go to Endpoint Manager.
  3. Click on Devices.
  4. Go to Configuration Profiles.
  5. Click on Create Profile.
  6. Continue below for the browsers required. You will need to create a Profile for each browser you want to block.

Microsoft Edge

  1. Configure the following and click Create. Platform “Windows 10 and Later”, Profile Type “Templates”, Template name “Administrative Templates”.
  2. Name the Profile “Deploy Practice Protect Plugin Microsoft Edge” and click Next.
  3. In the search box type “Control which extensions are installed silently” then select the one that does not include “users can override” the click on it to Configure it.
  4. Set Enabled and use the following extension URL:  mblkikdcdlfpljlmgijhccbhiijkhded;https://edge.microsoft.com/extensionwebstorebase/v1/crx  then click Ok.
  5. Click Next.
  6. Leave scope as Default and click Next.
  7. Select All Users and All Devices (You may use custom groups as well). Click Next.
  8. Confirm the configuration and click Next.
  9. The policy will now deploy out to devices when they next check-in.
  10. Continue below for Chrome and Firefox Polices.

Google Chrome

  1. Configure the following and click Create. Platform “Windows 10 and Later”, Profile Type “Settings catalog”.
  2. Name the Profile “Deploy Practice Protect Plugin Google Chrome” and click Next.
  3. Click “+ Add settings”.
  4. Type “silently installed (Device)“, select “Administrative Template\ Google\ Google Chrome\ Extensions” and tick the box next to “Extension/App IDs and update URLs to be silently installed (Device)”
  5. On the left side of the window, click “Enable” next to “Configure the list of force-installed apps and extensions”  and past the next text (jifcoadedkediabkmjbflemiblmnbjfk;https://clients2.google.com/service/update2/crx) to the empty row as it shows on the picture.
  6. Leave scope as Default and click Next.
  7. Select All Users and All Devices (You may use custom groups as well). Click Next.
  8. Confirm the configuration and click Next.
  9. The policy will now deploy out to devices when they next check-in.
  10. Continue below for Firefox Polices.

Mozilla Firefox

  1. Download updated FireFox ADMX file from https://support.practiceprotect.com/downloads/firefox_updated.admx
  2. Go back in End Point Manage. Click Create Profile.
  3. Configure the following and click Create. Platform “Windows 10 and Later”, Profile Type “Templates”, Template name “Custom”.
  4. Fill out fields below and type “Deploy Practice Protect Plugin Mozilla Firefox” in the Name field then click Next
  5. Click Add to add a new OMA-URI.
  6. Fill Up all fileds.
    • Set Name to “Firefox ADMX”
    • OMA-URIto  “./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Firefox/Policy/FirefoxAdmx
    • Copy content from the file firefox_updated.admx to the “Value” field
      click Save.
  7. Click Add again.
  8. Fill Up all fileds.
    • Set Name to “Extensions_Install
    • OMA-URI to “./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
    • Data type “String
    • Value to “<enabled/>
      <data id=”Extensions” value=”1&#xF000;https://addons.mozilla.org/firefox/downloads/file/4110179/cyberark_identity_browser-23.5.4.xpi”/>and click Save.
  9. Click Add again.
  10. Fill Up all fileds.
    • Name = Extensions_Locked
    • OMA-URI = “./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
    • Data type to “String
    • Value to “<enabled/>
      <data id=”Extensions” value=”1&#xF000;IdaptiveBrowserExtension@idaptive.com”/>”
  11. Click Next.
  12. Select All Users and All Devices (You may use custom groups as well). Click Next
  13. Confirm the configuration and click Next.
  14. The policy will now be deployed to devices when they check-in next time.
  15. In case you are using Intune to disable “Password Manager”, you will need to use “firefox_updated.admx” file from this guide to avoid conflict.

Updated on June 2, 2023
Need Support?
Can't find the answer you're looking for?
Contact Support