Skip to content

Managed Browser Settings

A set of browser configurations which can be managed via the Google Workspace Admin Console (or Group Policy if you're brave enough)

A quick heads up, I refer to things as "Shortcodes" in here, though their actual name is "Preference Names".

Table of Contents


Browser Reporting

If you're managing a Google Workspace instance/tenancy, you'll want this turned on as it sends logs to your audit and investigation log tool. 3 hours is the fastest frequency.

PolicySettingShortcodeURL
Managed browser reportingEnabled managed browser cloud reportingCloudReportingEnabledLink
Managed browser reporting upload frequency3 hoursCloudReportingUploadFrequencyLink
Event ReportingEnable event reportingOnSecurityEventEnterpriseConnectorLink

Chrome Enterprise Connectors

  • Hashes are generated for uploaded/downloaded files
  • Huge text pastes are analysed for potential PII exfiltration.
  • Visits to malicious URLs (w/ the red advisory block screen) are logged + graded on severity.
    • Bypasses of that advisory are logged and reported.
PolicySettingShortcodeURL
Upload content analysis[More info to come]OnFileAttachedEnterpriseConnectorLink
Download content analysis[More info to come]OnFileDownloadedEnterpriseConnectorLink
Bulk text content analysis[More info to come]OnBulkDataEntryEnterpriseConnectorLink
Print content analysis[More info to come]OnPrintEnterpriseConnectorLink
Real time URL checkChrome Enterprise PremiumEnterpriseRealTimeUrlCheckModeLink

Chrome Updates

The goals here are simply:

  • Get browsers to update within 48 hours of a release.
  • Have Chrome check every 300 mins to see if there's an update.
  • Use a friendly endpoint for checking (cacheable url).
  • Use the extended stable channel for stability and due to the amount of updates the chrome team tend to push a day on the latest channel in comparison (Sometimes several times a day on latest).
PolicySettingShortcodeURL
Relaunch notificaiton: ConfigurationShow notification recommending relaunch???Link
Relaunch notificaiton: Time Period (hours)48RelaunchHeadsUpPeriodLink
Relaunch notificaiton: Initial quiet period (hours)4RelaunchNotificationLink
Relaunch notificaiton: Relaunch window start time00:00RelaunchNotificationPeriodLink
Relaunch notificaiton: Relaunch window duration (minutes)1440RelaunchWindowLink
Auto-update check period (minutes)300???Link
Cacheable URLsAttempt to provide cache-friendly download URLs???Link
Google updater policy precedenceCloud Google Updater policy override platform policy???Link
Supress auto-update check: Start Time08:30???Link
Supress auto-update check: Duration (minutes)120???Link
Chrome browser updates: ConfigurationAllow updates???Link
Chrome browser updates: ChannelExtended stable channel???Link

Content

Better user experience.

PolicySettingShortcodeURL
Show "Always Open" checkbox in external protocol dialogUser may select "Always allow" to skip all future confirmation promptsExternalProtocolDialogShowAlwaysOpenCheckboxLink

Enrollment controls

Populating data about the devices joining your org.

PolicySettingShortcodeURL
Asset identifier during enrollmentUsers in this organization can procide asset ID and location during enrollment???Link

Import Settings

Right now this pertains to password imports, the password manager isn't working (if you follow the rule a few sections below this) but this is a good step to take anyway.

PolicySettingShortcodeURL
Import saved passwordsDisable import of saved passwordsImportSavedPasswordsLink

Remote Access

This is in aid of restricting possible avenues for scammers to get into user workstations. I imagine every org has a desired and standard means of conducting remote support.

PolicySettingShortcodeURL
Firewall TraversalDisable firewall traversalRemoteAccessHostFirewallTraversalLink
Remote support connectionsPrevent remote support connectionsRemoteAccessHostAllowRemoteSupportConnectionsLink
Enterprise remote support connectionsPrevent remote support connections from enterprise adminsRemoteAccessHostAllowEnterpriseRemoteSupportConnectionsLink

Security

I believe that every org should have a centralised password solution (see: Bitwarden, 1Password, etc), hence it makes sense to reduce the chance of passwords stored in unknown locations.

PolicySettingShortcodeURL
Password ManagerNever allow the use of password managerPasswordManagerEnabledLink

Sign-In Settings

This is in aid of securing your data and ensuring that users are not syncing things like history or bookmarks or passwords to a personal gmail account.

PolicySettingShortcodeURL
Browser sign-in settingsEnable browser sign-inBrowserSigninLink
Separate profile for managed Google IdentityForce seperate profile and forbit secondary managed accountsManagedAccountsSigninRestrictionLink
Enterprise profile separationEnforce profile seperationProfileSeparationSettingsLink
Profile seperation data migrationSuggest to users to bring their existing data in the managed profile and give them a choice not toProfileSeparationDataMigrationSettingsLink

Other Settings

The logs that are sent are entirely anonymized and are extremely useful for helping the chromium team resolve issues. I believe there is value in turning this on if you're a workspace customer. Policy fetching is set to 300 in the event you push a bad config and realise your mistake + want to rollback before anyone gets it. Backing up chrome data locally is a general no-no.

PolicySettingShortcodeURL
Metrics ReportingSend anonymous reports of usage and crash-related data to GoogleMetricsReportingEnabledLink
Policy fetch delay300 secondsMaxInvalidationFetchDelayLink
Backup of Google Chrome dataPrevent Google Chrome data from being included in backupsAllowChromeDataInBackupsLink

URL Blocking

This can be configured here, or via shortcode URLBlocklist.

TIP

This section is rather unique since it'll be a list of URLs rather than a single configurable option.

URLReason
https://remotedesktop.google.comChromes Remote Desktop service (needed to get chromeRemoteDesktopAppBlocked to equal true in the device trust connector)
https://remotedesktop.corp.google.comGoogle Internal(?) Chrome Remote Desktop service (also needed to get chromeRemoteDesktopAppBlocked to equal true in the device trust connector)