Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Manage Google Update settings with Microsoft Intune
    Intune

    Manage Google Update settings with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkApril 21, 2020Updated:May 16, 2025146 Mins Read

    Note; This post is already a couple of years old and in the mean-time a lot has changed in managing Google Chrome with Intune. A lot of settings are by default available in the Settings Catalog (SC) profile. And if a Chrome settings is not available in the SC, we have the option to import ADMX files to Intune like shown in this article.

    This is a follow-up post on Managing Google Chrome settings with Microsoft Intune. In this post I will show how we can use Microsoft Endpoint Manager (Intune) to manage Google Update settings.

    Like the Google Chrome settings, the Google Update settings can also be managed using a custom configuration profile for Windows 10. The policy consists of two parts. The first part is used to deploy the Google Update ADMX file to the Intune managed device. The second part of the policy is used to manage the settings of choice.

    Note: most settings do only work on (Hybrid Azure) AD Joined devices.

    Deploy the Google Update ADMX file

    The Google Update ADMX file can be downloaded as part Chrome Enterprise bundle. After downloading the bundle, locate the ADMX file and open the file with a text editor.

    Now open a browser to sign-in to the Microsoft Endpoint Manager portal.

    • Sign-in to the Endpoint Manager admin center
    • Browse to Devices – Windows
    • On the Configurations profiles tab click + Create profile
    • Choose Windows 10 and later as Platform
    • Choose Custom as Profile type
    • Click Create
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Click Next
    • Click Add

    With this row we deploy the ADMX file to the Windows 10 device. As you can see the OMA-URI contains ADMXInstall.
    More info on how the OMA-URI is build up and complementing information about ADMX-backed policies can be read in this article on Microsoft Docs.

    Enter below information to the policy;
    Name: Chrome ADMX Ingestion
    OMA-URI: ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/GoogleUpdate/Policy/GoogleUpdateAdmx
    Data Type: String
    Value: As value copy the entire content of the ADMX file in the value field

    • Click Add
    • Click Next

    Assign the profile to a group.

    The policy to deploy the ADMX file is ready. In the next steps we add the settings we manage with Intune to the same policy.

    How to build up the OMA-URI

    As with deploying the ADMX file, for the settings to manage we also need to know the OMA-URI which we need to use. But the OMA-URI for managing the settings consists of some information we need to collect ourselves from the Google Update ADMX file.

    This is for example the OMA-URI to manage the Auto Update Check Period:
    ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod
    Let`s split up the OMA-URI in seperate parts.
    This is default for managing applications using an ADMX file:
    ./Device/Vendor/MSFT/Policy/Config/

    The part that comes next is not always the same, we need to follow some rules:
    GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod
    It starts with GoogleUpdate (the ADMX file name), like in the ADMXInstall URI, followed by Policy. Between every part we have the ~ sign.
    After Policy we see the name of two categories. These categories can be found in the Chrome ADMX file.
    When we open the ADMX file in a text editor, we can see there are several categories. The first categorie we find in the ADMX file is the top category and as we can see that is Cat_GoogleUpdate. We put this in the OMA-URI after Policy.
    Here we also see some sub categories, like Cat_Preferences and Cat_Applications.

    If we search the ADMX file for the sub categorie Cat_Preferences, we find the actual policies we can manage. The policy name of such a setting is the last part of the OMA-URI, in this case Pol_AutoUpdateCheckPeriod.
    Here we also find the Data ID of the setting, which we need later in the configuration.

    Manage Google Update settings

    As example I show two settings; Auto Update Check Period and Update Policy Google Chrome.

    We have already seen how to build the OMA-URI for the policy Pol_AutoUpdateCheckPeriod, so let`s start with that one. The Data type for these settings is always String. Than we only need to know what our Value is.

    The value starts with <enabled/> (or <disabled/> if you like to disable a setting).
    If we have a setting which can only be set to enabled or disabled, than that`s the value.

    But for Auto Update Check Period, we need to set a value which corresponds to minutes between update checks. In this case <enabled/> is followed by a data id. The data id is found again in the ADMX file, in below example the decimal id, Part_AutoUpdateCheckPeriod.
    And as last we need to set a value, which is a number in this case.

    Open the Endpoint Manager Portal.

    • Open your existing custom policy or create a new policy
    • Click Edit next to Configurations settings
    • Click Add
    • Give the Row a Name
    • Fill in the OMA-URI: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod
    • Data type: String
    • Value:
    <enabled/> <data id="Part_AutoUpdateCheckPeriod" value="120"/>
    • Click Add
    • Click Review + Save
    • Click Save

    That`s it, the first Google Update setting is ready for deployment.

    The next example is found under the Google Chrome categorie: Update Policy override. Open the Chrome ADMX file and search for UpdatePolicyGoogleChrome. With the information found in the ADMX file we can create the OMA-URI.
    Here we find the policy name and the sub categorie. Cat_GoogleChrome is a categorie not directly located under the top categorie Cat_GoogleUpdate, there is a categorie between those. If we search back in the ADMX file, we see that the categorie between these is Cat_Applications.
    We also find the Data id in the ADMX file and the values we can set are here located. We have four options we can set, I prefer to set Automatic Updates Only, I use the corresponding value 3 in my policy.

    Open the Endpoint Manager Portal to add an extra row.

    • Click Add
    • Give the Row a Name
    • Fill in the OMA-URI: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_UpdatePolicyGoogleChrome
    • Data type: String
    • Value:
    <enabled/> <data id="Part_UpdatePolicy" value="3"/>
    • Click Add
    • Click Review + Save
    • Click Save

    Another example under the category Applications is Pol_TargetVersionPrefixGoogleChrome. This setting specifies which version Google Chrome should be updated to.
    The data id for this policy setting is Part_TargetVersionPrefix. And the value is the Chrome version to which the browser needs to be updated to.

    The OMA-URI is: ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_TargetVersionPrefixGoogleChrome

    Value:

    <enabled/> <data id="Part_TargetVersionPrefix" value="100."/>

    Add all the required settings of your choice and switch over to the Windows device.

    The end result

    The end-result is pretty short.
    If the deployed settings are successful applied you can find this under the Settings. Browse to Accounts, Access work or School. Click on your account and click Info.
    Here we see the two settings we have deployed.

    If we have a look at the registry, we find the same settings under HKLM\Software\Policies\Google\Update

    And when we open Google Chrome and enter Chrome://policy in the address bar we find the configured settings.
    In the top right corner we can search for settings.

    Thank you for reading. I hope you find it informative and if you have any question, please leave a comment.

    Administrative Templates Azure AD Browser EMS Google Chrome Intune Microsoft 365 Microsoft Endpoint Manager Windows10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Configure the Enterprise Mode Site List with Microsoft Intune

    February 15, 2020

    How to manage Microsoft Edge for Mac settings with Intune

    October 6, 2019

    Setup a Windows 10 kiosk device using Intune and AutoPilot

    May 4, 2019
    View 14 Comments

    14 Comments

    1. Dilip on April 28, 2020 07:30

      Hi Peter,

      I have a windows 10 device joined in Azure active directory.

      I wanted to restrict Google Update to specific version Example: Chrome 80 version

      ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_TargetVersionPrefixGoogleChrome

      I have configured above in intune device configuration.

      The policy is getting pushed but Google Chrome still updates to latest version..

      Any help what setting is required to control the chrome update to specific version?

      Thanks
      Peter

      Reply
      • Peter Klapwijk on April 28, 2020 17:06

        Hi Dilip,

        I`ve not tested that particular setting.
        Another approach could be to set Update policy override to Updates disabled and deploy the Chrome version of your choice to the devices. When a newer version is tested by you, deploy the next version.

        Reply
        • Dilip on April 29, 2020 21:40

          Thanks for your reply Peter.
          The another approach you mentioned is via GPO right? The device is not connected to any domain windows active directory
          The device is connected only to azure domain directory.Is it still possible to disable updates ?

          Reply
          • Peter Klapwijk on April 30, 2020 09:24

            No, have a look at the example in the post about Update policy override.
            You should set this to 0, to disable the updates.
            ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_UpdatePolicyGoogleChrome

            Reply
            • Dilip on April 30, 2020 20:17

              Yea I tried that Peter, UpdateDefault is set to 0 but it didn’t work for me. When you go chrome about screen it still check for updates. Expected behaviour should be updates are disabled but it still updates. Appreciate your help. Thanks

            • Peter Klapwijk on May 5, 2020 09:11

              Although the policy settings from Google Update are applied successful, they seem to have no effect on AAD joined devices.
              The description of the Override settings:
              This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain.
              And indeed, the settings does work on Hybrid AAD joined devices.
              I put a note on this to the article.

            • Anders Ingebrigtsen Dahl on November 25, 2020 12:22

              Great article!

              Don’t know if this has changed recently, but I was able to rollback to targetversion on AAD joined device.

              ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_TargetVersionPrefixGoogleChrome

              ./Device/Vendor/MSFT/Policy/Config/GoogleUpdate~Policy~Cat_GoogleUpdate~Cat_Applications~Cat_GoogleChrome/Pol_RollbackToTargetVersionGoogleChrome

    2. Dilip on May 12, 2020 21:02

      Thanks Peter for confirming. Keep up the good work. You have helped lot of people from your article with wide range of topics.

      Reply
    3. Kelly on August 6, 2020 20:21

      I have been pulling my hair out trying to figure out why this is not working on my AAD devices. Has anyone found a workaround? I need to keep my endpoints on the previous versions of Chrome for at least a couple weeks while QA continues to test our home grown applications.

      Reply
    4. Vishnu ketineni on August 12, 2020 10:07

      Hi Peter,
      I want to update the google chrome to the latest. how I can achieve that?
      Thank you

      Reply
    5. mdowst on June 21, 2021 16:19

      This was exactly what I was looking for because the Google KB was very much lacking in details. It worked like a charm. Thanks!

      Reply
    6. dkernus on September 2, 2021 21:24

      I followed the instructions here and the configuration deployed successfully through Endpoint Manager to my Windows 10 AAD endpoints, but the Chrome version appears to be stuck on the version it was on when the config deployed. Any advice?

      Reply
    7. O on November 29, 2022 11:00

      Hello,
      Why not set only those two:
      [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Update]
      “AutoUpdateCheckPeriodMinutes”=dword:00000078
      “UpdateDefault”=dword:00000003

      Reply
    8. Reed on September 25, 2023 15:02

      I have used the same settings. However, Chrome Apps are also getting installed.
      Is there a way to restrict the installation of those apps or a way to block those application from installing?
      Example: Google Drive, YouTube, Sheet, docs, Gmail, Slides.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}