Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Prevent the installation of the Microsoft Search in Bing extension with Microsoft Intune
    Intune

    Prevent the installation of the Microsoft Search in Bing extension with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkFebruary 5, 2020Updated:February 5, 20205 Mins Read

    Recently Microsoft announced to install an extension for Microsoft Search on new and existing Office ProPlus installations that will set Bing as the default search provider in Google Chrome. We will start to see this with the Office 2002 release as stated in the article;

    Starting with Version 2002 of Office 365 ProPlus, an extension for Microsoft Search in Bing will be installed that makes Bing the default search engine for the Google Chrome web browser only on devices in a limited number of locations. This extension will be installed with new installations of Office 365 ProPlus or when existing installations of Office 365 ProPlus are updated.

    Fortunately I`m located in The Netherlands, which is not part of that limited number of locations (yet). But let`s have a look anyway at the possibilities to prevent the installation of this Microsoft Search extension.

    As described in the documentation, we can use the Office Deployment Tool for new installations. Switch off Set default search engine to Microsoft Search in Bing and save the configuration.

    The outcome from the tool (XML file) can be used in Intune for the Office ProPlus deployment, but you need to use (at this moment) the XML configuration option. As you see Bing is added as excluded app to the config.

    A downside of this solution, this only prevents the extension from installing for new Office ProPlus deployments. Existing Office installations will still get the extension installed when the Office suite receives an update to version 2002.

    Another option mentioned in the documentation is to use Group Policy. Microsoft links to the download location of the Administrative Templates file for Office. A big advantage of using the Administrative Templates file, this setting will be applied to new and existing Office installations.
    Although we have Administrative Templates available in Microsoft Intune for Office, this new setting is missing. The solution is, to deploy the Administrative Template file and required setting using an Intune Custom Configuration Profile.

    In this article I do not describe in detail how everything works with the custom configuration profile, such as building the OMA-URI. For that I suggest to read this previous article about Managing Google Chrome with Intune where I described that in more detail.

    Deploy the Office ADMX file

    The Administrative Templates files can be downloaded from the Microsoft site. From the downloaded package we need the office16.admx file.

    Now open a browser to sign-in to the Microsoft Intune portal.

    • Sign-in to the Device Management Portal
    • Browse to Devices – Windows
    • On the Configuration Profiles tab click Create profile
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Choose Windows 10 as Platform
    • Choose Custom as Profile type
    • Click the Settings tab
    • Click Add

    With this row we deploy the ADMX file to the Windows 10 device. As you can see the OMA-URI contains ADMXInstall for the ADMX installation. We also see customoffice16admx, which we also use in the second row later.

    Enter below information to the policy;
    Name: Office16 ADMX Ingestion
    OMA-URI: ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/customoffice16admx/Policy/customoffice16admx
    Data Type: String
    Value: As value copy the entire content of the office16.admx file in the value field

    Click OK twice and click Create.

    The policy to deploy the ADMX file is ready. In the next steps we add the settings we manage with Intune to the same policy.

    Add the Prevent Bing Install setting

    When we open the office16.admx file in a text editor and we search for Bing, we find the setting we need for preventing the installation of the Microsoft Search extension. We need the Name of this setting L_PreventBinginstall in our Custom Profile as part of the OMA-URI. We also see we have two options for this setting; Enable and Disable.

    Switch back to the Intune portal.

    • Open your existing custom policy
    • On the settings tab click Add
    • Give the Row a Name
    • Fill in the OMA-URI: ./Device/Vendor/MSFT/Policy/Config/customoffice16admx~Policy~L_MicrosoftOfficemachine~L_Updates/L_PreventBingInstall
    • Data type: String
    • Value: <enabled/>
    • Click OK

    Assign the policy to a security group.

    Verify the setting on Windows 10

    We have several locations on the Windows 10 device to verify if the setting was deployed successful.

    The first location is in the Settings of Windows.
    Open Settings and browse to the Accounts section. On the Access work or school tab, click on Connected by…. and Info. Under Policies you see all the policies applied by Intune. Here you can also find the one we deployed starting with customoffice16adm.
    If you have also deployed Office settings with the Administrative Templates profile direct from the Intune portal, you also find that settings, starting with 0ffice16v2.

    The second location where we can verify the setting is using the Windows Registry. Browse to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\office\16.0\common\officeupdate
    Here you will find the DWORD value preventbinginstall, next to other values set by an Administrative Templates policy.

    The third location, is the Eventviewer. Located under Applications and Services Logs, Microsoft, Windows, you will find DeviceManagement-Enterprise-Diagnostics-Provider. Search for event 873, which shows the start of the ADMX ingestion.

    And if you look further, you`ll find events with information about configuration of the PreventBinginstall setting, like event 814.

    I hope you`ll find the post informative and it will help you prevent the installation of the Microsoft Search in Bing extension on your Intune managed devices.

    Administrative Templates Browser Google Chrome Intune MEM Microsoft 365 Microsoft Endpoint Manager Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Create a Windows Driver update approval report with Logic Apps

    July 18, 2023

    How to update win32 applications with Microsoft Intune

    June 8, 2020

    Configure the Enterprise Mode Site List with Microsoft Intune

    February 15, 2020
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}