1. Home
  2. Disable 3rd Party Password Managers via Endpoint Manager (Intune)

Disable 3rd Party Password Managers via Endpoint Manager (Intune)

Purpose

This article explains how to block the installation of 3rd-party password manager extensions in Microsoft Edge and Google Chrome using Microsoft Intune.

Prerequisites

  • Microsoft 365 tenant with Global Administrator or Intune Administrator role

  • Intune licensing (e.g. Intune Plan 1, Microsoft 365 E3/E5, or Business Premium). Note: Microsoft Entra ID alone does not include Intune capabilities

  • Devices must be enrolled in Intune

Instructions

  1. Sign in to the Microsoft Intune Admin Center
  2. In the left menu, click on Devices and then click on Configuration under Manage devices
  3. On the Policy tab, click Create and select New Policy
  4. Continue with the steps below for each required browser. You’ll need to create a separate policy or profile for every browser you intend to block.
Microsoft Edge

  1. Configure the following
    • For Platform choose Windows 10 and Later
    • For Profile Type choose Settings catalog
  2. Click Create
  3. On Basics setup, set the Name to Microsoft Edge – Block Unwanted Extensions and click Next.
  4. In the Configuration settings tab, click Add settings.
  5. Search for Control which extensions cannot be installed and choose Microsoft Edge\Extensions
  6. In the Setting name tick the box for Control which extensions cannot be installed
  7. Enable the switch for Control which extensions cannot be installed
  8. Enter each extension IDs you want to block in the field. Refer to the list of common Edge Password Manager IDs provided below.
    Bitwarden: jbkfoedolllekgbhcbcoahefnbanhhlh
    
    1Password: dppgmdbiimibapkepcbdbmkaabgiofem
    
    Dashlane: gehmmocbbkpblljhkekmfhjpfbkclbph
    
    OneLogin: mpnjdddkcbccdhgahjdcjppglaecajdj
    
    Okta: ncoafaeidnkeafiehpkfoeklhajkpgij
    
    Keeper: lfochlioelphaglamdcakfjemolpichk
    
    Keeper: mpfckamfocjknfipmpjdkkebpnieooca
    
    LastPass: bbcinlkgjjkejfdpemiealijmmooekmp

    Note: Keeper has published 2 extensions in the Edge Store, requiring both of the above IDs to be used when blocking the extension.

  9. Click Next.
  10. Leave scope as Default and click Next.
  11. On the Assignments tab, Click on Add all users and Add all devices.
    Note
    : If you don’t want to deploy the policy to all users, select Add groups and assign it only to the preferred group.
  12. Click Next.
  13. Review the settings to ensure the extension IDs are correct.
  14. Click Create
  15. The policy will be enforced on targeted devices at their next Intune check-in

Google Chrome

  1. Configure the following
    • For Platform choose Windows 10 and Later
    • For Profile Type choose Settings catalog

  2. Click Create
  3. On Basics setup, set the Name to Google Chrome – Block Unwanted Extensions and click Next.
  4. In the Configuration settings tab, click Add settings.
  5. Search for Chrome and select Google Google Chrome Extensions in the list

  6. In the Setting name tick the box for Configure extension installation blocklist
  7. Enable the switch for Configure extension installation blocklist
  8. Enter each extension IDs you want to block in the field. Refer to the list of Common Chrome Password Manager IDs provided below.
    Bitwarden: jbkfoedolllekgbhcbcoahefnbanhhlh
    
    1Password: dppgmdbiimibapkepcbdbmkaabgiofem
    
    Dashlane: gehmmocbbkpblljhkekmfhjpfbkclbph
    
    OneLogin: mpnjdddkcbccdhgahjdcjppglaecajdj
    
    Okta: ncoafaeidnkeafiehpkfoeklhajkpgij
    
    Keeper: lfochlioelphaglamdcakfjemolpichk
    
    Keeper: mpfckamfocjknfipmpjdkkebpnieooca
    
    LastPass: bbcinlkgjjkejfdpemiealijmmooekmp

    Note: Keeper has published 2 extensions in the Edge Store, requiring both of the above IDs to be used when blocking the extension.

  9. Click Next.
  10. Leave scope as Default and click Next.
  11. On the Assignments tab, Click on Add all users and Add all devices.
    Note
    : If you don’t want to deploy the policy to all users, select Add groups and assign it only to the preferred group.
  12. Click Next.
  13. Review the settings to ensure the extension IDs are correct.
  14. Click Create
  15. The policy will be enforced on targeted devices at their next Intune check-in

Updated on October 28, 2025
Need Support?
Can't find the answer you're looking for?
Contact Support