Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Disable Internet Explorer 11 as a standalone app
    Intune

    Disable Internet Explorer 11 as a standalone app

    Peter KlapwijkBy Peter KlapwijkDecember 7, 2020Updated:March 10, 202193 Mins Read

    With the release of Microsofts Chromium-based Edge browser, the end is near for Internet Explorer 11. In one of the latest Windows Insider builds, Microsoft made a Group Policy setting available to Disable Internet Explorer 11 as a standalone app.

    The settings is now also found in Windows 10 20H2 (19042.804).

    In the GP Editor the setting is found under Administrative Templates, Windows Components, Internet Explorer.
    As we can see, we can enable the policy and choose one of three options for notifying the end-user.

    As the setting isn`t yet available in a current Windows 10 build, the setting isn`t available yet in the Microsoft Intune portal. But we can configure the setting with a custom configuration profile, which I show in the post.

    I`m not sure in which preview build Microsoft added this setting. I`m running Windows 10 Insider Preview Build 20270 in which I found the setting.

    Create custom configuration profile

    As the setting is added to an existing admx file (inetres.admx) which is already supported by Intune, there is no need to ingest the admx file like we need to do with for example Google Chrome. The solution is pretty straight forward, we just need to create a custom configuration profile with one row.

    We only need the exact policy name as found in the inetres.admx file and the corresponding ID.
    For this, we open the admx file on a Windows 10 device that already supports the setting and search for the policy setting; DisableInternetExplorerApp. Here is also the enum ID mentioned, which we need to use later in the profile as data ID. Also notice, the three notify options with a corresponding value.

    With this information we can build up our OMA-URI which we need when we use a custom profile:
    ./Device/Vendor/MSFT/Policy/Config/InternetExplorer/DisableInternetExplorerApp

    As explained in previous posts, the first part is always ./Device/Vendor/MSFT/Policy/Config. And in this case, it`s followed by the name of the Category (without a space) and last the policy name.

    Let`s configure the profile.

    • Sign-in to the Endpoint Manager admin center
    • Browse to Devices – Windows
    • Browse to Configuration profiles
    • Click +Create profile
    • Choose Windows 10 and later as Platform
    • Choose Custom as Profile
    • Click Create
    • Give the profile a Name
    • Enter a Description (Optional)
    • Click Next
    • Click Add on the Configuration settings tab
    • Give the Row a Name
    • Fill in the OMA-URI: ./Device/Vendor/MSFT/Policy/Config/InternetExplorer/DisableInternetExplorerApp
    • Data type: String
    • Value:
    <enabled/><data id="NotifyDisableIEOptions" value="2"/>
    • Click Save

    Here, above value corresponds to one of the notify values as found in the admx file. Change this to your needs.

    Finish setting up the configuration wizard by assigning the profile to a security group of choice.

    End-user experience

    The Internet Explorer shortcut is removed from the start menu, but IE can still be found under Program Files. Depending on the choice of the notification you made, the below notification is shown to the end-user.

    End after that the Edge browser is started.

    That`s it for this post. Keep in mind this settings is just released in preview.

    Happy testing!

    Browser Edge Intune MEM Microsoft Edge Microsoft Endpoint Manager Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Introduction to Group Policy Analytics

    September 14, 2020

    OneDrive for Business Files Restore

    March 7, 2018

    Azure AD and Intune support macOS Conditional Access

    September 6, 2017
    View 9 Comments

    9 Comments

    1. Jon on March 15, 2021 14:52

      I see this policy in my local GPO, but not domain GPOs, and ive copied over the latest 20H2 ADMX files. Any idea why?

      Reply
    2. Andy on March 22, 2021 20:35

      Running 20H2, event logs suggest that the system cannot find the OMA URI of ./Device/Vendor/MSFT/Policy/Config/InternetExplorer/DisableInternetExplorerApp

      Any ideas?

      Reply
      • Peter Klapwijk on March 23, 2021 12:36

        Are you running at least 19042.804?

        Reply
    3. Dennis on April 13, 2021 22:28

      Thanks for the post Peter.

      I am having a similar issue as Andy above. I am logged into our DC but I do not see this GPO option either on the COMPUTER or USER configurations.

      DC = Windows Server 2019 STD

      However, on my local GPO I do see this option. Locally I am running Windows 10 version 20H2

      My question is how do I enable this policy on the domain level?

      Our DC is in-house and we do not use InTunes.

      Thanks in advance for your reply and again this article.

      Reply
      • Peter Klapwijk on April 14, 2021 08:53

        Hi Dennis,

        You could give this a try;
        First, check the inetres.admx file on your local system. If it contains the DisableInternetExplorerApp setting, you should copy that file to your central store or PolicyDefinition folder.
        But I’ve not tested that, as I’m using Intune to manage the devices.

        Reply
        • Heath Durrett on May 19, 2021 16:38

          I’m also struggling to get this to work from domain group policy. I tried your suggestion and it throws an error when editing policy thereafter!?

          What I did was…

          1) Confirmed my DC C:\Windows\PolicyDefinitions\inetres.admx file does indeed contain the “DisableInternetExplorer” setting.

          2) Backed up my SYSVOL\PolicyDefinitions\inetres.admx copy and replaced it with the local copy from above.

          3) Try and create a new GPO via group policy editor and it throws out and error.

          Resource ‘$9string.AllowSaveTargetAsInIEMode)’ referenced in attribute displayName could not be found

          File
          \\MyDomain.com\SysVol\MyDomain.com\Policies\PolicyDefinitions\inetres.admx, line 35191, column 278

          Is this potentially because I have a mixture of Server 2016 and Server 2019 domain controllers? The domain is running at 2016 functional level.

          Or perhaps do you need to install Edge before this will work?

          Reply
    4. Stephen Looze on January 28, 2022 20:12

      What would the process be to revert and enable IE again through a config profile? I’ve tried both removing the device group from the profile and setting the profile to .

      Reply
      • Eric on March 8, 2022 14:52

        same. not sure if I need it yet, but I can’t deploy the disable and then find out someone need IE, and it’s irreversible. Excluding things from the OMA URI Policy works, but in order to do that I’d have to know every device that needs IE in advance. I can’t go through 5000 devices to figure out which one needs IE.

        Reply
      • Francois on August 18, 2022 15:02

        Same for me. I tried with the value a disable but the deployment fails. I would really like to find a fallback method.

        Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Managing Windows 365 Link devices with Intune

    October 24, 2025

    Hard drive and partitions are not shown while installing Windows

    October 14, 2025

    Intune compliance for Windows 365 Cloud PCs

    September 12, 2025

    Intune connector for Active Directory configuration error

    August 29, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    • AndrewWak on Issues syncing SharePoint Online libraries with OneDrive for Mac
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How I solved a strange Kerberos issue

    December 12, 2024
    Recent Comments
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    • AndrewWak on Issues syncing SharePoint Online libraries with OneDrive for Mac
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}