www.inthecloud247.com
Open in
urlscan Pro
109.237.219.55
Public Scan
URL:
https://www.inthecloud247.com/manage-google-update-settings-with-microsoft-intune/
Submission: On January 31 via manual from GB — Scanned from NL
Submission: On January 31 via manual from GB — Scanned from NL
Form analysis
2 forms found in the DOMGET https://www.inthecloud247.com/
<form role="search" method="get" class="search-form" action="https://www.inthecloud247.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
POST https://www.inthecloud247.com/wp-comments-post.php
<form action="https://www.inthecloud247.com/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
<p class="comment-notes">Your email address will not be published.</p>
<p class="comment-form-comment"><label for="comment">Comment</label><br><textarea id="comment" name="comment" cols="45" rows="5" aria-required="true"></textarea></p>
<p class="comment-form-author"><label for="author">Name </label><span class="required">*</span><br><input id="author" name="author" type="text" value="" size="30" aria-required="true"></p>
<p class="comment-form-email"><label for="email">Email </label><span class="required">*</span><br><input id="email" name="email" type="text" value="" size="30" aria-required="true"></p>
<p class="comment-form-url"><label for="url">Website</label><br><input id="url" name="url" type="text" value="" size="30"></p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"><label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="5221" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="7a344f0a05"></p>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1706699816818">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
Manage Cookie Consent To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions. Functional Functional Always active The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network. Preferences Preferences The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. Statistics Statistics The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you. Marketing Marketing The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes. Manage options Manage services Manage {vendor_count} vendors Read more about these purposes Accept Deny View preferences Save preferences View preferences Cookie Policy {title} {title} Recent posts * [ November 2, 2023 ] Map network drives on cloud-managed Windows devices Intune * [ October 28, 2023 ] The next step in a passwordless Windows experience Microsoft365 * [ October 25, 2023 ] Enable Copilot in a managed Microsoft Edge browser Intune * [ October 12, 2023 ] Hide try the new Outlook toggle the correct way Intune * [ October 11, 2023 ] Manage printer mappings on cloud-managed Windows devices Intune * LinkedIn * Twitter * YouTube * Git * RSS PETER KLAPWIJK - IN THE CLOUD 24-7 INTUNE, WINDOWS, OFFICE 365, MICROSOFT 365, AZURE, AUTOMATION MENU * Home * Intune * Windows * macOS * Android * iOS * Automation ► * Power Automate * Intune Monitoring * GitHub * Security ► * Passwordless * Security * Speaking * About me * Home * Intune * Windows * macOS * Android * iOS * Automation * Power Automate * Intune Monitoring * GitHub * Security * Passwordless * Security * Speaking * About me December 22, 2023 Search for: HomeIntuneManage Google Update settings with Microsoft Intune MANAGE GOOGLE UPDATE SETTINGS WITH MICROSOFT INTUNE April 21, 2020 Peter Klapwijk Intune, Microsoft Endpoint Manager, Microsoft365, Windows 14 This is a follow-up post on Managing Google Chrome settings with Microsoft Intune. In this post I will show how we can use Microsoft Endpoint Manager (Intune) to manage Google Update settings. Like the Google Chrome settings, the Google Update settings can also be managed using a custom configuration profile for Windows 10. The policy consists of two parts. The first part is used to deploy the Google Update ADMX file to the Intune managed device. The second part of the policy is used to manage the settings of choice. Note: most settings do only work on (Hybrid Azure) AD Joined devices. DEPLOY THE GOOGLE UPDATE ADMX FILE The Google Update ADMX file can be downloaded as part Chrome Enterprise bundle. After downloading the bundle, locate the ADMX file and open the file with a text editor. Now open a browser to sign-in to the Microsoft Endpoint Manager portal. * Sign-in to the Endpoint Manager admin center * Browse to Devices – Windows * On the Configurations profiles tab click + Create profile * Choose Windows 10 and later as Platform * Choose Custom as Profile type * Click Create * Give the configuration profile a Name * Enter a Description (optional) * Click Next * Click Add With this row we deploy the ADMX file to the Windows 10 device. As you can see the OMA-URI contains ADMXInstall. More info on how the OMA-URI is build up and complementing information about ADMX-backed policies can be read in this article on Microsoft Docs. Enter below information to the policy; Name: Chrome ADMX Ingestion OMA-URI: ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/GoogleUpdate/Policy/GoogleUpdateAdmx Data Type: String Value: As value copy the entire content of the ADMX file in the value field * Click Add * Click Next Assign the profile to a group. The policy to deploy the ADMX file is ready. In the next steps we add the settings we manage with Intune to the same policy. HOW TO BUILD UP THE OMA-URI As with deploying the ADMX file, for the settings to manage we also need to know the OMA-URI which we need to use. But the OMA-URI for managing the settings consists of some information we need to collect ourselves from the Google Update ADMX file. This is for example the OMA-URI to manage the Auto Update Check Period: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod Let`s split up the OMA-URI in seperate parts. This is default for managing applications using an ADMX file: ./Device/Vendor/MSFT/Policy/Config/ The part that comes next is not always the same, we need to follow some rules: GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod It starts with GoogleUpdate (the ADMX file name), like in the ADMXInstall URI, followed by Policy. Between every part we have the ~ sign. After Policy we see the name of two categories. These categories can be found in the Chrome ADMX file. When we open the ADMX file in a text editor, we can see there are several categories. The first categorie we find in the ADMX file is the top category and as we can see that is Cat_GoogleUpdate. We put this in the OMA-URI after Policy. Here we also see some sub categories, like Cat_Preferences and Cat_Applications. If we search the ADMX file for the sub categorie Cat_Preferences, we find the actual policies we can manage. The policy name of such a setting is the last part of the OMA-URI, in this case Pol_AutoUpdateCheckPeriod. Here we also find the Data ID of the setting, which we need later in the configuration. MANAGE GOOGLE UPDATE SETTINGS As example I show two settings; Auto Update Check Period and Update Policy Google Chrome. We have already seen how to build the OMA-URI for the policy Pol_AutoUpdateCheckPeriod, so let`s start with that one. The Data type for these settings is always String. Than we only need to know what our Value is. The value starts with <enabled/> (or <disabled/> if you like to disable a setting). If we have a setting which can only be set to enabled or disabled, than that`s the value. But for Auto Update Check Period, we need to set a value which corresponds to minutes between update checks. In this case <enabled/> is followed by a data id. The data id is found again in the ADMX file, in below example the decimal id, Part_AutoUpdateCheckPeriod. And as last we need to set a value, which is a number in this case. Open the Endpoint Manager Portal. * Open your existing custom policy or create a new policy * Click Edit next to Configurations settings * Click Add * Give the Row a Name * Fill in the OMA-URI: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod * Data type: String * Value: <enabled/> <data id="Part_AutoUpdateCheckPeriod" value="120"/> * Click Add * Click Review + Save * Click Save That`s it, the first Google Update setting is ready for deployment. The next example is found under the Google Chrome categorie: Update Policy override. Open the Chrome ADMX file and search for UpdatePolicyGoogleChrome. With the information found in the ADMX file we can create the OMA-URI. Here we find the policy name and the sub categorie. Cat_GoogleChrome is a categorie not directly located under the top categorie Cat_GoogleUpdate, there is a categorie between those. If we search back in the ADMX file, we see that the categorie between these is Cat_Applications. We also find the Data id in the ADMX file and the values we can set are here located. We have four options we can set, I prefer to set Automatic Updates Only, I use the corresponding value 3 in my policy. Open the Endpoint Manager Portal to add an extra row. * Click Add * Give the Row a Name * Fill in the OMA-URI: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_UpdatePolicyGoogleChrome * Data type: String * Value: <enabled/> <data id="Part_UpdatePolicy" value="3"/> * Click Add * Click Review + Save * Click Save Another example under the category Applications is Pol_TargetVersionPrefixGoogleChrome. This setting specifies which version Google Chrome should be updated to. The data id for this policy setting is Part_TargetVersionPrefix. And the value is the Chrome version to which the browser needs to be updated to. The OMA-URI is: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_TargetVersionPrefixGoogleChrome Value: <enabled/> <data id="Part_TargetVersionPrefix" value="100."/> Add all the required settings of your choice and switch over to the Windows device. THE END RESULT The end-result is pretty short. If the deployed settings are successful applied you can find this under the Settings. Browse to Accounts, Access work or School. Click on your account and click Info. Here we see the two settings we have deployed. If we have a look at the registry, we find the same settings under HKLM\Software\Policies\Google\Update And when we open Google Chrome and enter Chrome://policy in the address bar we find the configured settings. In the top right corner we can search for settings. Thank you for reading. I hope you find it informative and if you have any question, please leave a comment. RELATED POSTS: 1. Manage Google Chrome settings with Microsoft Intune 2. Manage Mozilla Firefox settings with Microsoft Intune 3. Manage Mozilla Firefox proxy settings with Microsoft Intune 4. Manage Internet Explorer settings with Intune * Administrative Templates * Azure AD * Browser * EMS * Google Chrome * Intune * Microsoft 365 * Microsoft Endpoint Manager * Windows10 Previous Add an Azure AD group to the local administrators group with Microsoft Intune Next Microsoft Whiteboard; We couldn`t sign you in 14 COMMENTS 1. Dilip says: April 28, 2020 at 07:30 Hi Peter, I have a windows 10 device joined in Azure active directory. I wanted to restrict Google Update to specific version Example: Chrome 80 version ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_TargetVersionPrefixGoogleChrome I have configured above in intune device configuration. The policy is getting pushed but Google Chrome still updates to latest version.. Any help what setting is required to control the chrome update to specific version? Thanks Peter Reply * Peter Klapwijk says: April 28, 2020 at 17:06 Hi Dilip, I`ve not tested that particular setting. Another approach could be to set Update policy override to Updates disabled and deploy the Chrome version of your choice to the devices. When a newer version is tested by you, deploy the next version. Reply * Dilip says: April 29, 2020 at 21:40 Thanks for your reply Peter. The another approach you mentioned is via GPO right? The device is not connected to any domain windows active directory The device is connected only to azure domain directory.Is it still possible to disable updates ? Reply * Peter Klapwijk says: April 30, 2020 at 09:24 No, have a look at the example in the post about Update policy override. You should set this to 0, to disable the updates. ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_UpdatePolicyGoogleChrome Reply * Dilip says: April 30, 2020 at 20:17 Yea I tried that Peter, UpdateDefault is set to 0 but it didn’t work for me. When you go chrome about screen it still check for updates. Expected behaviour should be updates are disabled but it still updates. Appreciate your help. Thanks * Peter Klapwijk says: May 5, 2020 at 09:11 Although the policy settings from Google Update are applied successful, they seem to have no effect on AAD joined devices. The description of the Override settings: This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. And indeed, the settings does work on Hybrid AAD joined devices. I put a note on this to the article. * Anders Ingebrigtsen Dahl says: November 25, 2020 at 12:22 Great article! Don’t know if this has changed recently, but I was able to rollback to targetversion on AAD joined device. ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_TargetVersionPrefixGoogleChrome ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_RollbackToTargetVersionGoogleChrome 2. Dilip says: May 12, 2020 at 21:02 Thanks Peter for confirming. Keep up the good work. You have helped lot of people from your article with wide range of topics. Reply 3. Kelly says: August 6, 2020 at 20:21 I have been pulling my hair out trying to figure out why this is not working on my AAD devices. Has anyone found a workaround? I need to keep my endpoints on the previous versions of Chrome for at least a couple weeks while QA continues to test our home grown applications. Reply 4. Vishnu ketineni says: August 12, 2020 at 10:07 Hi Peter, I want to update the google chrome to the latest. how I can achieve that? Thank you Reply 5. mdowst says: June 21, 2021 at 16:19 This was exactly what I was looking for because the Google KB was very much lacking in details. It worked like a charm. Thanks! Reply 6. dkernus says: September 2, 2021 at 21:24 I followed the instructions here and the configuration deployed successfully through Endpoint Manager to my Windows 10 AAD endpoints, but the Chrome version appears to be stuck on the version it was on when the config deployed. Any advice? Reply 7. O says: November 29, 2022 at 11:00 Hello, Why not set only those two: [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Update] “AutoUpdateCheckPeriodMinutes”=dword:00000078 “UpdateDefault”=dword:00000003 Reply 8. Reed says: September 25, 2023 at 15:02 I have used the same settings. However, Chrome Apps are also getting installed. Is there a way to restrict the installation of those apps or a way to block those application from installing? Example: Google Drive, YouTube, Sheet, docs, Gmail, Slides. Reply LEAVE A REPLY CANCEL REPLY Your email address will not be published. Comment Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Δ AWARD SPONSOR POPULAR POSTS * Get notified on expiring Azure App Registration client secrets January 17, 2022 67 * Manage Google Chrome settings with Microsoft Intune October 17, 2019 53 * Set default Start Menu with Microsoft Intune June 5, 2019 44 * Add an Azure AD group to the local administrators group with Microsoft Intune April 18, 2020 34 * Create a local user account on Windows 10 with Microsoft Intune April 12, 2020 33 FOLLOW ME ON TWITTER TAGS Administrative Templates Android Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring MFA Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Multi-Factor Authentication Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate PowerShell Security SharePoint Online Skype for Business Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot ARCHIVES Archives Select Month November 2023 October 2023 July 2023 June 2023 April 2023 March 2023 February 2023 December 2022 November 2022 September 2022 August 2022 July 2022 June 2022 May 2022 April 2022 March 2022 January 2022 December 2021 November 2021 October 2021 September 2021 August 2021 July 2021 June 2021 May 2021 April 2021 March 2021 February 2021 December 2020 November 2020 October 2020 September 2020 August 2020 July 2020 June 2020 May 2020 April 2020 March 2020 February 2020 January 2020 December 2019 November 2019 October 2019 September 2019 August 2019 July 2019 June 2019 May 2019 April 2019 March 2019 February 2019 January 2019 December 2018 November 2018 October 2018 September 2018 August 2018 June 2018 May 2018 April 2018 March 2018 February 2018 December 2017 November 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 December 2016 November 2016 October 2016 September 2016 ABOUT ME Peter Klapwijk, Nationale-Nederlanden I`m an IT Consultant living in The Netherlands with my wife and two kids. In 2020 I received the Microsoft MVP award for Enterprise Mobility. My focus is on cloud products offered by Microsoft like Microsoft Intune, Office 365 and Azure. RANDOM POSTS * Uninstall Windows 10 apps with Intune October 18, 2018 15 * Configure Azure AD SSO for the Samsung Knox portal April 7, 2021 2 * Manage printer mappings on cloud-managed Windows devices October 11, 2023 3 * Configure the Enterprise Mode Site List with Microsoft Intune February 15, 2020 6 * Activate Bing Chat Enterprise July 26, 2023 1 RECENT COMMENTS * LearningIntune on Map network drives on cloud-managed Windows devices * KM on Add a certificate to the Trusted Publishers with Intune without reporting errors * Peter Klapwijk on Enable Copilot in a managed Microsoft Edge browser * Phil Brown on Controlling managed favorites for Edge with Microsoft Intune – Windows * Dominic Lesniewski on Enable Copilot in a managed Microsoft Edge browser COPY RIGHT This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7. Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher. Shorthand: Don’t pass off my work as yours, it’s not nice. Copyright © 2023 | MH Magazine WordPress Theme by MH Themes Manage consent