Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Controlling managed favorites for Edge with Microsoft Intune – macOS
    Intune

    Controlling managed favorites for Edge with Microsoft Intune – macOS

    Peter KlapwijkBy Peter KlapwijkMay 17, 2020Updated:May 17, 202024 Mins Read

    In my previous post I showed how to control managed favorites for Edge with Microsoft Intune, but that was for Windows devices. In this post I show how we can control these favorites for macOS.

    For macOS there are some more steps involved in controlling these favorites, compared to how we control it for Windows. For macOS we need to created a configuration file (plist file), which we can deploy as a custom configuration policy in Intune.

    Create the plist files

    To deploy custom settings to macOS we need to have a property list (plist) file which we can deploy with a custom configuration policy. An example plist file is provided by Microsoft on the Edge for business page, where you can also download several different installer files.

    Choose a channel, build and macOS as platform and download the policy files for the example plist file.

    The file can be easily edited On Windows by using a text editor like Notepad++ or on macOS with an application like Xcode. Before we can deploy it we need to convert the file to a mobileconfig file. This can be done for example by using mcxToProfile, which can be downloaded from GitHub.

    To get an overview of all the available settings, start the Edge browser on your Mac and type edge://policy in the search bar.
    Search for favorites to get an overview of all settings related to favorites. Or search direct for managedfavorites as that is the setting we need.
    If you click on managedfavorites, your redirected to Microsoft Docs.

    Docs.

    Here you find some information related to the policy setting, like the data type. In this case Dictionary.

    A dictionary is actually a collection of different values (in this case strings) which are collected in another dictionary, which we see in the example if we scroll down on the Docs page.

    If we open a plist file in Xcode we get a better overview. Below is my own edited plist file.
    The managed favorites config, contains one or more arrays (two in the example) in which the favorites are configured.
    The first array contains the top-level favorites.
    The name of the favorites folder is put in the first dictionary (item 0). Below that we place the favorites, one by one in their own dictionary (item 1, item 2 etc).
    Every favorite exists of two strings, one for the name and one for the url.
    If we create a sub folder, that is the second array. In this second array we create the same structure with favorites consisting of strings for name and url.

    If you`re done editing the plist file, save it to a local folder.

    Convert the plist to a mobileconfig file

    When we are done adding all the required favorites to the file, we need to convert the plist file to a mobileconfig file so we can deploy it with Intune. There are several apps to convert such a file, I choose mcxToProfile. mcxToProfile is a command line tool which you can run in Terminal.
    As you can read on Github, this is the command to convert a plist file:
    ./mcxToProfile.py –plist /path/to/a/plist –identifier MyApplicationPrefs

    In our case we need to specify the location to our com.microsoft.Edge.plist file and our Identifier is com.microsoft.Edge:
    ./mcxToProfile.py –plist ./com.microsoft.Edge.plist –identifier com.microsoft.Edge

    By using com.microsoft.Edge as Identifier we make sure this will be used in file as PayloadIdentifier and in the mobileconfig filename.

    Now that we have the mobileconfig file, we are ready to create a policy in Microsoft Intune (Endpoint Manager).

    Create a custom configuration profile in Intune

    Open a browser to sign in to the Endpoint Manager admin center.

    • Sign-in to the Endpoint Manager admin center
    • Browse to Devices – macOS
    • On the Configuration profiles tab click +Create profile
    • Choose macOS as Platform
    • Choose Custom as Profile type
    • Click Create
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Click Next
    • Click on the folder icon
    • Select the mobileconfig file to upload it
    • Enter com.microsoft.Edge as Custom configuration profile name

    Click Next and finish the wizard by adding scope tags (optional) and assign the profile to a group.

    The end-result

    Now let`s have a look at the end-result on the macOS device.

    As soon as the profile is synced to the device, we see the managed favorites folder in the Edge browser, in this example Peter`s favorites. In this folder we see the favorites and the sub folder (Social media links). In the sub folder the favorites are also created.

    If we open edge://favorites from the address bar we see the favorites are managed; Favorites are managed by your organization.

    By opening edge://policy from the address bar, we see all our managed policies, including the managed favorites.

    That`s it for this post. Thank you for reading.

    And if you`d like to read more articles related to Microsoft Edge, have a look at this overview.

    Browser Edge EMS Intune macOS MEM Microsoft 365 Microsoft Edge Microsoft Endpoint Manager
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Configure Azure AD SSO for the Samsung Knox portal

    April 7, 2021

    Block the Edge Shopping Assistant with Microsoft Intune

    November 25, 2020

    Microsoft Whiteboard; We couldn`t sign you in

    May 4, 2020
    View 2 Comments

    2 Comments

    1. Scott Jenkins on July 8, 2023 23:02

      Do you have any updates for 2023 as this article is no longer accurate. I have made multiple attempts at this and all have failed. I am using the latest masOS as of this writing and a manually installed Edge browser vs deployed via Intune. This is failing on Intel and Apple silicone.

      Reply
      • Patrick Tippner on January 15, 2024 20:20

        i’m on the same boat here… mcxtoprofile is not working due to issues with the referenced “foundation” module, and the alternative tool i found called meecxprofile isn’t working either.

        Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}