Edge Policies for non-Domain-joined Devices – Successfully apply HomepageLocation, DefaultSearchProvider, …

In this Blog-Post I describe, how to apply restricted Edge based on Chromium Policies like HomepageLocation, NewTabPageLocation, RestoreOnStartupURLs, DefaultSearchProvider, SmartScreen and several more without domain-joining the Devices by using a “Fake-MDM-Provider”. You need this solution, if some of your policies show up in edge://policy overview to be “blocked”.

Several Microsoft Edge (based on Chromium, Version 77 and newer) Policies are described as follows: This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.

This means, that this policies are not respected and therefore not successfully applied to Edge when configured locally by gpedit.msc (Group Policy Editor) as local registry keys on devices, which are not managed by Active-Directory Domain-Join or an Mobile-Device-Management-Solution.

But: there is an easy workaround to achieve a successful honored configuration of this restricted policies by configuring a “Fake-MDM-Provider” (= enrolled for device management without actually using MDM).

This blog-post is a rewrite of an older blog-post I initially published in April 2018. The difference between my older blog-post and this newer version is, that:
1. This one covers Edge based on Chromium (Edge v77 and newer), the older Blog-Post covers Edge v44 (the now called “Edge Legacy” which was shipped with Windows 10 Releases up to v1909).
2. This one is written in english, my older one was published in German. As so many people in Microsoft-TechCommunity are asking about this restriction I decided to blog this one in English to reach a broader audience.

Local Group Policy Restrictions

As already described, several Microsoft Edge Policies are restricted to be only honored and applied when the device is Domain-Joined or managed by MDM. You can find those restricted Policies by searching for the String “This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management” in the Microsoft Edge Policy-Documentation. If you use gpedit.msc (the Local Group Policy Editor) this restriction is well documented even in the comments of the Policy-Description (but you have to scroll down to see it, as you can see on the next Screenshot):

Local Group Policy Editor, Edge Policies – some of them resticted to AD-joined-Machines

Fake-MDM-Provider?

Mobile-Device-Management-Solutions like Microsoft Intune, BlackBerry UEM, Cisco Meraki, Airwatch, MobileIron, etc… allow you to use a lightweight Device-Management by applying some assorted policies to MDM-managed-devices. Most of these solutions are not free of charge, but there are even some cloud-managed, free of charge solutions like Miradore Online to run some cost-free experiments. To “enroll” a Windows-Device to a MDM-Solution the Mobile Device Enrollment Protocol is used.

What I did is, I traced all modifications (tons of registry Keys etc…) on a Windows Machine, when enrolling a Win10-device to an MDM-Solution. Then I traced those Registry Keys checked by Microsoft Edge, to decide if the Device is MDM-Managed or not. I narrowed down the ton of registry keys to only a few of them really needed to successfully let Edge detect “this device seems to be MDM-Managed” without actually having a connection to an MDM-Provider.

As a result I can provide you a minimal-set of Registry-Keys you have to add to make Edge on a Win10-Machine “feel” like it is MDM-Managed an honors to apply the restricted Policies like HomepageLocation, NewTabPageLocation, RestoreOnStartupURLs, DefaultSearchProvider, SmartScreen and several more without domain-joining the Devices.

MDM-FakeEnrollment-Win10_v1809_v1909.reg
Some of the Fake-MDM-Provider Registry-Keys

Download the needed reg-Files

I provide you a single zip-File which contains 3 Files:
1. MDM-FakeEnrollment-Win10.reg … the Registry-Keys you have to add to let Edge “feel” like the Win10-Machine is MDM-Managed.
2. EdgeChromium-Policies-Mandatory.reg … some sample policies like configuring Google as Search-Engine, Homepage, New-Tab-Page etc… – this works after the MDM-FakeEnrollment is applied. If you set “Mandatory” Policies these Settings cannot be (re-)configured by users themselves.
3. EdgeChromium-Policies-Recommended.reg … some sample policies configured not “Mandatory” but only as “Recommeded”, these Settings can be changed by users themselves, they are just a default.
4. EdgeChromium-UpdatePolicy-SideBySide.reg … this (fully optional) Policy you may like to set to keep old EdgeLegacy available when installing EdgeChromium.

Just import the 1st one (MDM-FakeEnrollment-Win10.reg ) to enable the “Fake-MDM-Provider”. Use the 2nd one (EdgeChromium-Policies-Mandatory.reg) to import my sample configuration (like shown in the next screenshot) or use your gpedit.msc (Local Group Policy Editor).

Local Policies for Edge (based on Chromium)

When using the Group Policy Editor you need the admx-Files for Edge based on Chromium from Microsoft, you can download them here: https://www.microsoft.com/en-us/edge/business/download (Link: “Get Policy Files). Configuration then looks like this: Computer Configuration => Administrative Templates => Microsoft Edge. Be aware: it is NOT “Windows Components => Microsoft Edge” (this would be the old Edge Legacy Browser!).

Compatibility

  • Test in January 2020: I successfully tested my solution with all currently Microsoft-supported Windows 10 Releases: v1709, v1809, v1903, v1909, 2019 LTSC and all currently (January 2020) available Edge based on Chromium Versions: v79, v80 (Beta), v81 (Dev).
  • Test on 09.02.2020: Successfully tested with Edge v80.0.361.48 (Stable) up to v82.0.418.0 (Canary)
  • Test on 20.05.2020: Successfully tested with Edge v81.0.416.77 (Stable) up to v84.0.520.0 (Canary) on Win10 v1909 as well as Win10 v2004 (by InplaceUpgrade from Win10 v1909)
  • Test on 22.05.2020: Successfully tested with Edge v81.0.416.77 (old Stable) as well as v83.0.478.37 (new Stable) up to v84.0.520.0 (Canary) on Win10 v2004 (Fresh Install, Build 19041.264)
  • Test on 12.10.2020: Successfully tested with Edge v86.0.622.38  (Stable) up to v87.0.658.0  (Dev) on Win10 v1909
  • Test on 21.10.2020: Successfully tested with Edge v86.0.622.48 (Stable), v87.0.664.12 (Beta), v88.0.673.0 (Dev),  88.0.677.0 (Can) on Win10 v2009 / 20H2 Build 19042.572
  • Test on 13.11.2020: Successfully tested with Edge v86.0.622.68 (Stable), v87.0.664.30 (Beta), v88.0.692.0 (Dev), v88.0.698.0 (Can) on Win10 v2009 / 20H2 Build 19042.630 (Professional, Education, Enterprise)
  • Test on 14.12.2020: Successfully tested with Edge v87.0.664.60 (Stable), v88.0.705.18 (Beta), v89.0.723.0 (Dev), 89.0.731.0 (Can) on Win10 v2009 / 20H2 Build 19042.685 (Professional, Education, Pro Education, Enterprise)
  • Test on 11.06.2021: Successfully tested with Edge v91.0.864.41 (Stable), v92.0.902.9 (Beta), v93.0.910.5 (Dev) on Win10 v21H1 Build 19043.1052 (Professional, Education, Pro Education, Enterprise)
  • Test on 13.08.2021: Successfully tested with Edge v92.0.902.73 (Stable), v93.0.961.18 (Beta), v94.0.975.1 (Dev) on Win11 Preview v21H2 Build 22000.132 on 13.08.2021 (Professional, Education, Pro Education, Enterprise)

Supported Windows Editions:

  • Windows 10 Home => NO! Does not Support MDM, not supported by Fake-MDM-Provider
  • Windows 10 Pro Education => Bug identified on 13.11.2020, does not work with MDM or Fake-MDM => I reported this issue to Microsoft => It is fixed in Edge Stable 87.0.664.53+ or Edge Canary v88.0.704.0+
  • Windows 10 Pro => YES! tested up to Win10 20H2 and 21H1 on 11.06.2021
  • Windows 10 Pro for Workstations => Bug identified on 11.06.2021, does not work with MDM or Fake-MDM => I reported this issue to Microsoft => It is fixed in Edge starting with Version 93.0.930.0+
  • Windows 10 Education => YES! tested up to Win10 20H2 and 21H1 on 11.06.2021
  • Windows 10 Enterprise => YES! tested up to Win10 20H2 and 21H1 on 11.06.2021
  • Windows 11 Enterprise => YES! tested with Win11 Preview 21H2 on 13.08.2021

Edge Releases

After successfully applying the Fake-MDM-Registry-Keys for example the Open page on start-up Setting is successfully configured and locked:

All Edge Policies applied can be viewed by opening edge://policy

Edge-Policy Overview edge://policy

You May Also Like

56 Comments

  1. hi and thank you so much for this. unfortunately it looks like either the new win 10 May RTM is blocking this fake MDM or something else is.

    if i update a working PC from1909 to rtm 2004 fake MDM still works.

    but if i start fresh with an image base of may rtm 2004, the registry keys get blocked.

    IF possible can you build a new image off of 2004 and chormium edge v81.0.416x and check if you can tarce again the modifications needed?

    thanks

    Phil

    1. Hi Phil,
      Successfully tested with Edge v81.0.416.77 (old Stable) as well as v83.0.478.37 (new Stable) up to v84.0.520.0 (Canary) on Win10 v2004 (Fresh Install, Build 19041.264) as well as Inplace-Upgraded Win10 v2004 (WindowsInsider Build, Updated from v1909). Both work!

      Maybe your fresh Win10 Release 2004 Installation is a “Home Edition”? As far as I know you need at least an Professional Edition for using Management-Functionality like MDM or AD-Join.

      1. Hi Gunnar,

        i rebuilt from scratch and this time used win 10 pro instead of win 10 pro N. I had recently switched to use ‘N ‘ because i dont need any of the media features. I then realized after encountering issue with my activation key, i could register win 10 pro N builds. So i reverted back to regular build and activation worked.

        Then i decided to check my Edge chromium GPOs and they were now working!!

        what i dont understand is why would the ‘N’ build have impact on :
        -pro activation
        -edge GPO/MDM status

        i rebuilt N image twice and always the same

        on a side note, have you ever tried https://uupdump.ml/
        its is an online script/repository to asses required windows 10 components from MS server and create the newest bootable builds on your computer. Sure beats using MS iso bases and manually integrating updates. you can choose from the following target builds: retail/insider:slow-fast ring/release preview

        I think what might have happened in my issues is that i generated a windows 10 pro N built using uupdump script(i had been using regular win 10 pro 2004 perfectly fine before) but the image indexes had all windows version from home to enterprise and all N image indexes as well. I decided to cleanup and remove all indexes but leave only PRO N.

        anyway, its working now.

        have a good day

        1. I always use the official ISO-Files from https://my.visualstudio.com/Downloads, the official Image “Windows 10 (business editions)” contains all Windows 10 Pro/ProN/Education/Enterprise/Enterprise N/… Releases. I guess the MDM-Feature is tied to the Business-SKUs, so for finding out what happened the detected SKU would be interesting.
          Anyway, as you solved your problem I guess it is not worth to dig into this further.

          best regards,
          Gunnar

  2. Tested with Windows 10 2004 and Edge Chromium 83.0.478.45 and it’s not working 🙁

    i use the reg file.

    NewTabPageLocation Value https://hitco.at/ Error This policy is blocked – its value will be ignored.

    I don’t know what to do… any suggestion?

      1. I used “EdgeChromium-Policies.reg” after having applied “MDM-FakeEnrollment-Win10_v1809_v1909.reg”.
        I have a Windows 10 home edition, thats why I don’t have the local group policy editor (gpedit.msc).

        1. The Policy-Documentation (I cited in the beginning of this Blogpost) says, that this policies are only applicable for Windows 10 Professional, Education, Enterprise with AD-Join or MDM-enrolled. My Fake-MDM-Enrollment makes it available without actually being MDM-enrolled. But I never tried to fool Edge on a Windows Home Edition.

          1. OK thanks. It’s a pity we don’t have a lot of ouf-of-the-box customization possibilities in Edge Chromium as we have in Internet Explorer 11.
            I’ll try it @work using Windows 10 Enterprise.

  3. Der regitryhack funktioniert immer noch, auch unter Windows 2004 = 20H1
    Getestet an mehreren Maschinen in mehreren Umgebungen virtuelle und ‘richtige Maschinen’ und mit mehreren Win 10 Versionen (Pro, Education, Enterprise).

    Es liegt definitiv am Edge Browser Code ab Dev Kanal ab 85.0.538.0 und betrifft noch mehrere Einstellungen in den GPO’s.
    Die admx-Version ist egal, ob Richtlinien für Dev 85.0.531.1 (die Browser Version die als letzte funzt)
    oder für Browser Version 85.0.538.0 funzt nicht oder als letztes Browser Version 85.0.545.0 funzt nicht.

    Hier eine kleine Auflistung der Einstellungen die nicht funktionieren:

    • DefaultSearchProviderEnabled (Standardsuchanbieter aktivieren) = True
    • Richtlinie blockiert, dadurch funktionieren auch die folgenden Einstellungen nicht:
    • DefaultSearchProviderImageURL
    • DefaultSearchProviderImageURLPostParams
    • DefaultSearchProviderName
    • DefaultSearchProviderSearchURL
    • DefaultSearchProviderSuggestURL
    • (als Admin möchte ich schon eigentlich eine einheitliche Suchmaschine vorgeben können), noch eine sehr wichtige Einstellung die blockiert ist und nicht funzt
    • MetricsReporting Enabled = false (Meldung von nutzungs und absturzbezogene Daten aktivieren) Richtlinie blockiert. Ein Schelm, der Böses dabei denkt.
    • HomepageIsNewTabPage (Neue Tab Seite als Startseite festlegen) = true Richtlinie blockiert
    • HomepageLocation (Homepage URL konfigurieren) Richtlinie blockiert
    • NewTabPageLocation (URL für die neue Tabseite konfigurieren) Richtlinie blockiert
    • RestoreOnStartup (Aktion, die beim Start ausgeführt werden soll) = 5 (neue Tabseite öffnen) Richtlinie blockert
    • RestoreOnStartupURLs (Websites, die beim Start des Browser geöffnet werden soll) Richtlinie blockiert.
    1. Dear Dette,

      Thanks for your comment. I just checked and can confirm your test-result.

      Win10 v2004 (2020H1 Release) with most current Edge Chromium Stable v83.0.478.45 Release works fine.
      But when using most current Developer Release Dev 85.0.545.0 it seems not to Work with FakeMDM Provider.

      I will try to figure out if there is a solution or maybe it is a bug in the Policy-System of the Dev-Release.

      1. Hallo Gunnar,

        ich antworte auf deutsch mein englisch ist mehr als dürftig.
        ich glaube es liegt am nicht an den Admx-Vorlagen der jeweiligen Browserversion
        oder an dem FakeMDM-Provider Hack. Das Verhalten ist in AD-Umgebungen bei mir dasselbe.
        Ich bin eigentlich zum Schluß gekommen, das es irgendwas im Browser Code ist. Aber dazu bin
        nicht genug Spezialist dafür.
        Ich werde mal untersuchen, ob sich Google Chrome auch so verhält.

    2. Hi again Dette,

      I checked this behavior with Edge Developer Release Dev 85.0.545.0 again on a Machine which is REAL MDM-Managed (so no Fake-MDM but Real MDM Provider Miradore used). And it doesn’t work with Dev 85.0.545.0 – so I guess there is a Bug in most current Dev-Release.

  4. Ich hoffe nur das MS diesen Code nicht weiter bis in den stable-Kanal schleppt., wenn der mal bei 85 angekommen ist. Habe das zwar schon an MS gemeldet
    aber ich habe wenig Hoffnung auf Besserung.
    Wir installieren in AD’s immer bei 5 Prozent der User den Dev-Kanal, um später nicht auf Überraschungen zu stoßen wie jetzt zum Beispiel.

    1. I can confirm there is a Bug in Edge Dev and Edge Canary, but Stable and Beta still work. It is proven to be a bug because it doesn’t even work with true Microsoft MDM (Intune / Microsoft Endpoint Manager Admin Center / AzureAD joined Windows 10 Enterprise 2004 Device). I opened an issue in Microsoft TechCommunity to report this.

    2. I reported this bug through Edge Support, Edge Insider Forum and other channels.

      I’m glad to confirm it is fixed in todays Edge Canary 86.0.580.0 – my Fake-MDM-Provider Configuration works as expected again.

      Update on 22.07.2020: Microsoft fixed it in Edge Dev 85.0.564.13 too, so now all up to Date Versions of Edge 84, Edge Beta, Edge Dev 85 and Edge Can 64 are tested and compatible with Fake-MDM-Provider.

      1. I’m on 86.0.622.63 and .68 Official Build x64 with fake MDM and it does still not work.
        This is what I Used and it did work with the newly installed Windows 10 Pro Education Builds 2 weeks ago.

            • Windows 10 OS Version 2009 (Build 19042.630)
            • Microsoft Edge 86.0.622.68 (Offizielles Build) (64-Bit)

            Errors:

            • DefaultSearchProviderEnabled – Error, ignored
            • DefaultSearchProviderSearchURL – Error
            • DefaultSearchProviderName – Error
            • RestoreOnStartup – Error, ignored
            • RestoreOnStartupURLs – Error, ignored
            • HomepageLocation – Error, ignored
            • NewTabPageLocation – Error, ignored
            • This policy is blocked – its value will be ignored.
          1. I just re-tested with Windows 10 2009 = 20H2 and Edge 86.0.622.68, works as described.
            See here, no “ignored”, works: https://pastebin.com/yzugPiyy

            You are sure the registry-Keys for the Fake-MDM-Provider are set as I provided them?

            You said you are using “Windows 10 Pro Education” – I can confirm it works with Windows 10 Pro, Education and Enterprise. It does not work with “Home Edition” as this edition is not MDM-Join-able. Is this “Pro Education” Edition you are using MDM-join-able? Microsoft says that “Pro Education” is just a Pro with some pre-configured settings. So I guess it should work.

          2. Your Registry-Config of Fake-MDM seems OK. So to sum up:

            • Your new-installed Windows 10 Pro Education v2009 (20H2, Build 19042.630) and Edge 86.0.622.68 doesn’t work
            • Devices you installed some weeks ago still work? And they are “Pro Education v2009” too?
            • Any Idea what changed? Does Beta/Dev-Channel of Edge work?
            • Can you verify the SKU of the Windows-Version? Is it really the same Edition? I would suggest to compare the output of a working machine and the new non-working machine of
              Get-WmiObject -Class Win32_OperatingSystem | format-list Caption, Version, BuildNumber
          3. I have no access to the old devices for today and I can’t say for sure which Edge version it was, it still had the old icon and the old settingsinterface (not the chromium ones)

          4. I set up a “Windows 10 Pro Education” VM and you are right – the Policies which require MDM do NOT Work!
            Just applied another Activation-Key to Upgrade to regular “Pro” (not “Pro Education”) => Fake-MDM Works!
            Applied another Activation-Key to Upgrade to “Education” (not “Pro Education”) => Fake-MDM Works!

            Summary: Works with Win 10 20H2 “Pro”, “Education” and “Enterprise”
            Does NOT work with “Home” or “Pro Education”

            (Tested with Edge 86.0.622.68, Updating my Blog-Post)

            => I reported this to Microsoft, it should get fixed soon!

            => This Bug is fixed in Edge Canary v88.0.704.0 (19.11.2020)

  5. Dear Gunnar,

    Thank you so much for your deep knowledge and sharing it to the public.
    Your guide explains what exactly I needed – how to apply Chromium-based browser policies to my PC.

    As much help as your suggestion provides, I’m just a little curious about any side (or unwanted) effects it might cause, and possible ways to avoid them.
    For example, I found out that after importing your “Fake-MDM-Provider”, my lock screen image has changed to its default one, regardless of my Settings.
    This particular issue wouldn’t bother me at all, but just to make sure all my settings and preferences are not affected.

    Thank you again for your effort and sacrifice you have put into all the testings!

    1. I have no Idea why your “Lock Screen Image” changes. This is not a behaviour which is expected. My best guess is, that you set a policy to configure your Lock-Screen – please check HKLM\Software\Policies\Microsoft\Windows\Personalization Key if there are any “lockscreen” Policies set.

      1. Thank you for your suggestion! Using “regedit”, I found that there is no such directory
        (directories until “Windows” do exist but “Personalization” doesn’t)

        I also found thay my issue occurs only on startups – the lockscreen works according to my settings (web images) after locked again.
        I wonder if it has anything to do with internet connection on startups.
        Thank you again for your comments!

        1. If you think your problems are caused by “Fake-MDM-Provider” you can easily remove the added registry Keys to find out if this assumption is true.

          I expect no changes in behavior, but a simple timing coincidence that your observed problems started at the same day you enabled “Fake-MDM-Provider”.

    2. My guess would be that this trick also activates some policies that require domain-join to be active. Specifically, I know that Windows10 restricts certain lockscreen policies to enterprise or domain-joined machines only. This is actually kinda neat 😉 I wonder how long it’ll take M$ to plug this particular loophole.

  6. Great job. When we apply this policy, Users can’t change any settings in browser (you browser is managed by your organization message). Is there a way to allow users to change some settings while lock other settings?

    1. Only those settings which are configured by a “mandatory policy” are locked. Everything else is still configurable. And there are “recommended policies” to configure defaults and allow the user to alter the settings too. So your assumption that the label “is managed by your organization” means everything is locked is just wrong.

      1. Yeah, I was actually thinking to allow users to change settings that we configured. How to make some settings that we configure to not mandatory is the right question

        1. As I said, just configure them as “recommended” and not as “mandatory”.
          In my screenshot above you see the policies listed as “Microsoft Edge”, just one click below there is “Microsoft Edge – Default Settings” and the same policies. Configure them in “Default settings” makes them recommended, as described in the Documentation – edge://policies then shows then as “recommended” and not “mandatory” any more. Almost all policies are available in both sections – so you can chose exactly what behaviour you like for each policy.

          1. Ah, I see your point. But I want to accomplish that via registry settings instead of using group policy if that is possible?

  7. Thanks, this is absolutely great work! I would also like to confirm that this is working properly with the latest 20H2 update from November.

  8. Really very grateful link,
    I have one query
    I need to set the home page on startup and as well as to add the new pages also
    how can add new page after allowing the below key
    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\Recommended\RestoreOnStartupURLs]
    and
    "RestoreOnStartup"=dword:00000004

  9. Great work. This is going to help a lot for about 80% of our computers which are on a workgroup as of now. However, in the near future, sometime in 2021, these 80% computers and the 20% that are domain joined will be Managed by MDM Intune. We need to be able to transition to MDM without any conflicts.

    To put things into perspective, we have almost 10,000 computers scattered across the entire USA. Some are in remote areas and not all are on LANs. I would like to know if anyone has tried to join a domain or enroll in MDM while the MDM-FakeEnrollment registry is still configured. Would I need to remove these registry keys first when its time to enroll in the Microsoft Intune MDM? Again, it might be a huge challenge to locate and prepare these machines when it’s time to enroll them in Intune which is what I am trying to avoid.

    I don’t have an MDM environment where I can test this. Any feedback would be much appreciated. Thank you

    1. The “Fake-MDM” Provider doesn’t show up in “Settings -> Accounts -> Access work or school”. I didn’t test with Intune, but successfully with free Miradore-Online. I would expect there is no problem with co-existance, but there are free (time limited) Microsoft Intune / Azure Accounts too, so you can test this straight forward if you are worried about.

  10. thank a lot.
    is there a way like with edge legacy, to define a default search provider , but also a list of additional providers, so users get a default, but can change from a list afterwards?

  11. Danke für diesen großartigen Artikel. Das war bestimmt eine Menge Arbeit die Registry Keys zu finden.
    Die Keys funktionieren einwandfrei. Jetzt laufen auch die selbst gebauten Edge GPO’s ohne Probleme.

    Vielen Dank!

  12. Hello, Gunnar!
    First of all, thank you for sharing your solution, it’s really help me.
    I used FakeMDM reg and via gpedit edited policies: AutoOpenAllowedForURLs, AutoOpenFileType. This policies I need to open citrix workspace.
    Windows 10 pro 1909 and v89 stable

      1. Tried on multiple installs, it worked on exactly zero of them. System language and activation status don’t make any difference…

        1. Thank you Pieter for reporting this Issue regarding “Windows 10 pro for Workstations”. There is a bug in Edge, those MDM-Policies don’t work running on “Windows 10 pro for Workstations”, I can reproduce this issue and have reported it to Microsoft to get it fixed. All other supported Win10-Editions (Pro, Enterprise, Education, Pro Education) are working as expected with Win10 20H2 and 21H1. I updated my blog-post today (11.06.2021) to point this out.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert.