Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Manage Internet Explorer settings with Intune
    Intune

    Manage Internet Explorer settings with Intune

    Peter KlapwijkBy Peter KlapwijkSeptember 20, 2017Updated:January 3, 2020197 Mins Read

    In the past, Intune was only able to deploy a predefined set of device settings to MDM managed Windows devices. Fortunately Microsoft introduced ADMX-backed policies in the Windows 10 Creators update (version 1703). With those new MDM policies we are able to set a lot of policies using Policy CSP and with the Fall Creators Update (version 1709) even more settings are added.

    A good, short explanation of what ADMX-backed policies are I found on Peter van der Woude his blog:

    Starting with Windows 10, version 1703, the Policy CSP can now also handle ADMX-backed policies. In an ADMX-backed policy, an administrative template contains the metadata of a GPO. Each administrative template specifies the registry keys, and their values, that are associated with a GPO and defines the policy settings that can be managed. Each setting in an administrative template corresponds to a specific registry value. Windows maps the name and category path of a GPO to a MDM policy area, and policy name, by parsing the associated ADMX-file, finding the specified GPO, and storing the metadata in the Policy CSP. When the MDM policy is referenced, this metadata is referenced and determines which registry keys are set or removed.

    In this blog I will show you some examples of policies to manage Internet Explorer settings with Intune on a MDM managed device. Settings which could be done easily with GPO`s, but before ADMX-backed policies couldn`t be done with Intune.

    Configure the Intune policies; Disable First run wizard

    The first thing I will do for my users is blocking the “First run wizard“. On this site you will find a list of currently available Internet Explorer CSP policies. Search for the corresponding policy DisableFirstRunWizard. You will see the Windows versions on which the policy is supported, an explanation of the policy, a Tip and ADMX info.

    Policy CSP

    DisableFirstRunWizard

    ADMX Info:
    GP English name is the corresponding GPO name.
    GP name is the corresponding GPO name which can be found in the corresponding ADMX file
    GP Path is the path to the GPO
    GP ADMX file name is corresponding ADMX file which can be found in %SystemRoot%\policydefinitions

    To see the options available for this policy, open the Group Policy Editor and open the GPO Prevent running First Run Wizard. You can enable and disable the policy, when enabling the policy you have two options, Go directly to “Welcome to IE” page and Go directly to home page.

    GPO

    Prevent running first run wizard

    Now open the inetres.admx file en search for the GP name NoFirstRunCustomise. Here on the first line you can find the corresponding registry key.
    And you can find the values you need to set in your CSP policy in Intune. In red you can see the two values (options) which are corresponding to the options in the Group Policy Editor, Go directly to “Welcome to IE” page and Go directly to home page.

    Inetres.admx

    Now open the Intune tab in the Azure portal, go to Device Configuration, Profiles and click on Create profile.

    Intune policy

    Device configuration

    Give the profile a Name, choose Windows 10 and later as Platform and choose Custom as Profile Type.
    Now Click Add

    Create profiel

    Give this setting a name and description.
    Add the OMA-URI: ./User/Vendor/MSFT/Policy/Config/InternetExplorer/DisableFirstRunWizard
    As you can see it is a user policy. The last part of the OMA-URI corresponds with  the policy you found on the list with Internet Explorer CSP Policies; InternetExplorer/DisableFirstRunWizard
    As data type you choose string.
    And in the value field you enter: <enabled/><data id=”FirstRunOptions” value=”1″ />

    OMA-ARI settings

    The first part of the value is enabled (you had two options for the GPO; disabled or enabled).
    The second part is data id, this is equal to the enum id you can find in the inetres.admx file.
    And I choose value 1, because I want to go directly to the HomePage

    Inetres.admx

    FirstRunOptions

    Now save the policy ad assign the policy to a User group.
    When we now switch over to the Windows 10 client, open Settings, Accounts, Access work or school and perform a Sync. After the sync is completed, choose Export your management log files and have a look at the file MDMDiagReport.html located in C:\Users\Public\Documents\MDMDiagnostics\
    When you scroll down you can see the policy is applied to User02.

    MDM Diagnostics

    In the inetres.admx file we could also find the corresponding registry key; key=”Software\Policies\Microsoft\Internet Explorer\Main”
    You can see the value is set to 1.

    Registry

    DisableFirstRunCustomize

    Disable Home Page Change

    The second setting I will set is Disable Home Page Change which sets the startpage (Home Page) to the url I want. Some customers want to open IE, for example, with the intranet site and not allowing the users to change it. In this example I set IE to open with this website. We first need to lookup the CSP policy at the Policy CSP list.


    Policy CSP

    DisableHomePageChange

    You can open the Group Policy Editor to see what options you have to set. It`s only disabled or enabled, when enabled you can set a url.
    Open the inetres.admx file and search for RestrictHomePage. You need the text id, marked in red, to set as Data id in the Intune Configuration Policy.

    Inetres.admx

    Now Open the Intune tab on the Azure portal and create a new Configuration policy or add a new row to an existing Policy.
    The OMA-URI is ./User/Vendor/MSFT/Policy/Config/InternetExplorer/DisableHomePageChange
    In the value field fill in <enabled/><data id=”EnterHomePagePrompt” value=”https://inthecloud247.com” />
    Off course, it starts with <enabled/> and the data id you found in the inetres.admx file. As value you enter an url between quotes.

    OMA-URI Settings

    When we have a look at the MDM Diagnostics Report on the Windows 10 client, you can see the policy is set.

    MDM Diagnostics

    Opening the Internet Explorer settings we see the url set at the Home Page.

    IE Homepage

    Allow Site To Zone Assignment List

    Another request we often get is to manage the security zones in Internet Explorer, for example to mark an url as Local Intranet. On the CSP list you have to look for AllowSiteToZoneAssignmentList.
    In the explanation you read there are 4 security zones (1-4) and which valuenames are accepted as url or IP-address.

    Policy CSP

    AllowSiteToZoneAssignmentList

    When we configure this setting with a GPO you also need a value name (url) and value (on of the security zones).

    GPO

    Site to Zone Assignment List

    Open inetres.admx and search for IZ_ZoneMaps. You need the value of list id to at in the Intune policy at Data id; IZ_ZonemapPrompt.

    Inetres.admx

    Switch over to Intune. Create an Intune Configuration Policy or edit an existing one.
    The OMA-URI is ./User/Vendor/MSFT/Policy/Config/InternetExplorer/AllowSiteToZoneAssignmentList
    In the value field fill in
    <Enabled/><Data id=”IZ_ZonemapPrompt” value=”https://login.microsoftonline.com&#xF000;1″/>
    We now know the value for Data id is found in the inetres.admx file.
    The value contains the url and separated the security zone (1-4). The url and security zone needs to be separated with the (encoded) Unicode character &#xF000; 

    OMA-URI Settings

    When you want to associate multiple url`s with security zones, you also need to separate those values with the Unicode character &#xF000; With below example I associate two url`s with security zone 1 (Local Intranet) and the third url with security zone 2 (Trusted Sites):
    <Enabled/><Data id=”IZ_ZonemapPrompt”

    value=”https://login.microsoftonline.com&#xF000;1&#xF000;https://inthecloud247.com&#xF000;1&#xF000;https://www.interchange.nl&#xF000;2″/>

    OMA-URI Settings

    Again we can check the MDM Diagnostics report

    MDM Diagnostics

    And we can see the url`s are associated with the correct security zone.

    Local intranet

    Trusted Sites

    Administrative Templates EMS Internet Explorer Intune Microsoft 365 Microsoft Endpoint Manager Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Manage Edge mobile favorites with Microsoft Intune

    November 25, 2020

    Add an Azure AD group to the local administrators group with Microsoft Intune

    April 18, 2020

    OneDrive for Business Files Restore

    March 7, 2018
    View 19 Comments

    19 Comments

    1. Devaki Priya on March 13, 2018 06:01

      Does CSP work in Interner Explorer 11 (Windows 10)

      Reply
      • Peter on March 13, 2018 09:22

        Yes, the policies described in this article are for use with IE11

        Reply
    2. Devaki Priya on March 27, 2018 17:42

      I deployed exactly same CSPs mentioned in the article, but no luck. I see event log in Windows 10 says “error”
      MDM ConfigurationManager: Command failure status. Configuration Source ID: (3EDD70EB-907E-46B9-959F-BA62A1EEA6FD), Enrollment Name: (MDMDeviceWithAAD), Provider Name: (Policy), Command Type: (Add: from Replace or Add), CSP URI: (./User/Vendor/MSFT/Policy/Config/InternetExplorer/DisableFirstRunWizard), Result: (Unspecified error).

      Any thoughts?

      Reply
      • Peter on March 27, 2018 19:30

        Hi Devaki,

        Don`t copy the value like Reply

    • Stef h on May 17, 2018 09:20

      Hello Peter,

      What do you mean? I’ve got the same problem

      Reply
      • Peter on May 17, 2018 09:36

        Hi Stef,
        I see only the first part of my comment on Devaki I added.

        But what I mean:
        Copy the example like this

        And replace the double quote`s by typing those yourself. For some reason WordPress fucked up the quotes in the article.
        If you send me an email I can also send you the correct example.

        Reply
        • Stef h on May 17, 2018 10:12

          Peter,

          Send you the e-mail. (peter @ inthecloud247.com )

          Stef

  • André on May 29, 2018 16:14

    Thanks for the nice post,

    I typed in exactly the same but it gives a -201681112 remediation error.

    Reply
    • Peter on May 30, 2018 08:36

      You should have a look at the event viewer. Have a look at DeviceManagement-Enterprise-Diagnostics-Provider, located under Applications and Services Logs, Microsoft, Windows.
      That will be of more help.

      Reply
  • R.C. de Roos on February 7, 2019 11:40

    What happens if you change the list? In my experience it will add the entry but it will not remove the old entry from the registry.

    Reply
    • Peter Klapwijk on February 7, 2019 12:21

      If you mean “AllowSiteToZoneAssignmentList”, no I don`t recognize this. On my testing it removes the old site and puts in the new site.

      Reply
      • Operator on February 20, 2019 18:28

        Does this apply to Intnue-managed AAD Joined Surface Hubs? with the exception of ./Device instead of ./User ?

        Reply
        • Peter Klapwijk on February 20, 2019 19:19

          Unfortunately I have no experience with managing a Surface Hub. If the CSP policy is supported, than I think you should try with Device. If that doesn`t work, remove device and try it without ./Device and without ./User like in the example in this document https://docs.microsoft.com/en-us/surface-hub/manage-settings-with-mdm-for-surface-hub#example-manage-surface-hub-settings-with-system-center-configuration-manager

          Reply
  • Jim on December 11, 2019 14:03

    Having real issues with policy, i just can’t get the AllowSiteToZoneAssignmentList to function correctly. It all points to missing registry entries as i get a remediation failure and when i debug it further it indicates missing template. I thought the whole point of this was you didn’t need to important any ADM templates like you do on a group policy.

    Reply
    • Peter Klapwijk on December 11, 2019 20:03

      Haven`t used this for long time myself, but this should work without deploying ADMX files. But don`t just copy past the policy from the website, as WordPress screws the quotation marks. Replace them yourself. Or send me an email and I can send you an example.

      Reply
  • Sushant Narlawar on August 18, 2021 23:41

    Do we need to do IE ADMX ingestion first? I am currently configuring settings for ./User/Vendor/MSFT/Policy/Config/InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles
    It did not work

    Reply
    • Peter Klapwijk on August 25, 2021 08:20

      No, should not be necessary. But keep in mind, the end of support for IE is near within less than a year.

      Reply
  • Tim Legge on September 7, 2021 03:35

    Is there any way to turn off Required server verification (https:) for all sites in this zone for Trusted Sites?

    Reply
    • Tim Legge on September 7, 2021 04:06

      I found a way to change it from Uncheck or Checked using the Registry
      Reg Key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
      Value Name: Flags
      Value Type: REG_DWORD
      Value Data (in decimal): 67 (to uncheck) or 71 (to check)

      But, how do I add that to this?

      Reply
  • Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}