{"id":1363,"date":"2020-01-30T00:07:55","date_gmt":"2020-01-29T23:07:55","guid":{"rendered":"https:\/\/hitco.at\/blog\/?p=1363"},"modified":"2026-03-29T22:05:27","modified_gmt":"2026-03-29T20:05:27","slug":"apply-edge-policies-for-non-domain-joined-devices","status":"publish","type":"post","link":"https:\/\/hitco.at\/blog\/apply-edge-policies-for-non-domain-joined-devices\/","title":{"rendered":"Edge Policies for non-Domain-joined Devices &#8211; Successfully apply HomepageLocation, DefaultSearchProvider, &#8230;"},"content":{"rendered":"\n<p class=\"has-background\" style=\"background-color:#dadcb1\">In this Blog-Post I describe, how to <strong>apply restricted Edge based on Chromium Policies<\/strong> like <code>HomepageLocation, NewTabPageLocation,  RestoreOnStartupURLs, DefaultSearchProvider, SmartScreen<\/code> and several more <strong>without domain-joining the Devices by using a &#8222;Fake-MDM-Provider&#8220;.<\/strong> You need this solution, if some of your policies show up in <code>edge:\/\/policy<\/code> overview to be &#8222;blocked&#8220;.<\/p>\n\n\n\n<p>Several Microsoft Edge (based on Chromium, Version 77 and newer) Policies are described as follows:  <em><a href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-policies#homepagelocation\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (\u00f6ffnet in neuem Tab)\">This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management. <\/a><\/em><\/p>\n\n\n\n<p>This means, that this policies are not respected and therefore not successfully applied to Edge when configured locally by gpedit.msc (Group Policy Editor) as local registry keys on devices, which are not managed by Active-Directory Domain-Join or an Mobile-Device-Management-Solution.<\/p>\n\n\n\n<p>But: there is an easy workaround to achieve a successful honored configuration of  this restricted policies by configuring a &#8222;Fake-MDM-Provider&#8220; (= enrolled for device management without actually using MDM).<\/p>\n\n\n\n<p>This blog-post is a rewrite of an <a rel=\"noreferrer noopener\" aria-label=\" (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/hitco.at\/blog\/microsoft-edge-startseite\/\" target=\"_blank\">older blog-post I initially published in April 2018<\/a>. The difference between my older blog-post and this newer version is, that:<br>1. This one covers <a rel=\"noreferrer noopener\" aria-label=\"Edge based on Chromium (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/www.microsoft.com\/en-us\/edge\/business\/download\" target=\"_blank\">Edge based on Chromium<\/a> (Edge v77 and newer), the <a rel=\"noreferrer noopener\" aria-label=\"older Blog-Post (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/hitco.at\/blog\/microsoft-edge-startseite\/\" target=\"_blank\">older Blog-Post<\/a> covers Edge v44 (the now called &#8222;Edge Legacy&#8220; which was shipped with Windows 10 Releases up to v1909).<br>2. This one is written in english, my <a rel=\"noreferrer noopener\" aria-label=\"older one (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/hitco.at\/blog\/microsoft-edge-startseite\/\" target=\"_blank\">older one<\/a> was published in German. As so many people in Microsoft-TechCommunity are asking about this restriction I decided to blog this one in English to reach a broader audience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Local Group Policy Restrictions<\/h2>\n\n\n\n<p>As already described, several Microsoft Edge Policies are restricted to be only honored and applied when the device is Domain-Joined or managed by MDM. You can find those restricted Policies by searching for the String &#8222;<em>This policy is available only on Windows instances that are joined to a Microsoft Active Directory domain or Windows 10 Pro or Enterprise instances that are enrolled for device management&#8220; <\/em>in the <a rel=\"noreferrer noopener\" aria-label=\"Microsoft Edge Policy-Documentation (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-policies\" target=\"_blank\">Microsoft Edge Policy-Documentation<\/a>. If you use gpedit.msc (the Local Group Policy Editor) this restriction is well documented even in the comments of the Policy-Description (but you have to scroll down to see it, as you can see on the next Screenshot):<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"884\" height=\"468\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor.png\" alt=\"\" class=\"wp-image-1368\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor.png 884w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor-300x159.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor-768x407.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor-80x42.png 80w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><figcaption class=\"wp-element-caption\">Local Group Policy Editor, Edge Policies &#8211; some of them resticted to AD-joined-Machines<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Fake-MDM-Provider?<\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\"Mobile-Device-Management-Solutions (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_Mobile_Device_Management_software\" target=\"_blank\">Mobile-Device-Management-Solutions<\/a> like Microsoft Intune, BlackBerry UEM, Cisco Meraki, Airwatch, MobileIron, etc&#8230; allow you to use a lightweight Device-Management by applying some assorted policies to MDM-managed-devices. Most of these solutions are not free of charge, but there are even some cloud-managed, free of charge solutions like <a rel=\"noreferrer noopener\" aria-label=\"Miradore Online (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/www.miradore.de\/\" target=\"_blank\">Miradore Online<\/a> to run some cost-free experiments. To &#8222;enroll&#8220; a Windows-Device to a MDM-Solution the <a rel=\"noreferrer noopener\" aria-label=\"Mobile Device Enrollment Protocol (\u00f6ffnet in neuem Tab)\" href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/dn409494.aspx\" target=\"_blank\">Mobile Device Enrollment Protocol<\/a> is used. <\/p>\n\n\n\n<p>What I did is, I traced all modifications (tons of registry Keys etc&#8230;) on a Windows Machine, when enrolling a Win10\/Win11-device to an MDM-Solution. Then I traced those Registry Keys checked by Microsoft Edge, to decide if the Device is MDM-Managed or not. I narrowed down the ton of registry keys to only a few of them really needed to successfully let Edge detect &#8222;this device seems to be MDM-Managed&#8220; without actually having a connection to an MDM-Provider.<\/p>\n\n\n\n<p>As a result I can provide you a minimal-set of Registry-Keys you have to add to make Edge on a Win10\/Win11-Machine &#8222;feel&#8220; like it is MDM-Managed and honors to apply the restricted Policies like HomepageLocation, NewTabPageLocation, RestoreOnStartupURLs, DefaultSearchProvider, SmartScreen and several more without domain-joining the Devices.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: jscript; highlight: [3,4,9,12,13]; title: ; notranslate\" title=\"\">\nWindows Registry Editor Version 5.00\n\n; # Fake MDM-Enrollment - Key 1 of 2 - let a Windows Machine &quot;feel&quot; MDM-Managed\n&#x5B;HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Enrollments\\FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFF] \n&quot;EnrollmentState&quot;=dword:00000001 \n&quot;EnrollmentType&quot;=dword:00000000 \n&quot;IsFederated&quot;=dword:00000000\n\n; # Starting with Edge v147 in 04\/2026 a UPN is needed, otherwise the MDM-Provider is not accepted\n&quot;UPN&quot;=&quot;user@Fake-MDM-Provider.local&quot;\n\n; # Fake MDM-Enrollment - Key 2 of 2 - let a Windows Machine &quot;feel&quot; MDM-Managed\n&#x5B;HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Provisioning\\OMADM\\Accounts\\FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFF]\n&quot;Flags&quot;=dword:00d6fb7f\n&quot;AcctUId&quot;=&quot;0x000000000000000000000000000000000000000000000000000000000000000000000000&quot;\n&quot;RoamingCount&quot;=dword:00000000\n&quot;SslClientCertReference&quot;=&quot;MY;User;0000000000000000000000000000000000000000&quot;\n&quot;ProtoVer&quot;=&quot;1.2&quot;\n<\/pre><\/div>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"204\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor1.png\" alt=\"\" class=\"wp-image-1374\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor1.png 841w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor1-300x73.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor1-768x186.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor1-80x19.png 80w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"333\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor2.png\" alt=\"\" class=\"wp-image-1370\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor2.png 841w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor2-300x119.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor2-768x304.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-FakeMDM-Provider-RegistryEditor2-80x32.png 80w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><figcaption class=\"wp-element-caption\">Some of the Fake-MDM-Provider Registry-Keys<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Download the needed reg-Files<\/h2>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background\"><strong>I provide you a <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">single zip-File<\/a> which contains 3 Files:<\/strong><br>1. <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">MDM-FakeEnrollment.reg<\/a> &#8230; the Registry-Keys you have to add to let Edge &#8222;feel&#8220; like the Win10\/Win11-Machine is MDM-Managed.<br>2. <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">EdgeChromium-Policies-Mandatory.reg<\/a> &#8230; some sample policies like configuring Google as Search-Engine, Homepage, New-Tab-Page etc&#8230; &#8211; this works after the MDM-FakeEnrollment is applied. If you set &#8222;Mandatory&#8220; Policies these Settings cannot be (re-)configured by users themselves.<br>3. <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">EdgeChromium-Policies-Recommended.reg<\/a> &#8230; some sample policies configured not &#8222;Mandatory&#8220; but only as &#8222;Recommeded&#8220;, these Settings can be changed by users themselves, they are just a default.<br>4. <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">EdgeChromium-UpdatePolicy-SideBySide.reg<\/a> &#8230; this (fully optional) Policy you may like to set to keep old EdgeLegacy available when installing EdgeChromium. Now in Year 2022+ this is obsolete, as the old EdgeLegacy is not available on current Windows 10 Systems any more.<\/p>\n\n\n\n<p>Just import <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">the 1st one (MDM-FakeEnrollment.reg<\/a> <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">)<\/a> to enable the &#8222;Fake-MDM-Provider&#8220;. Use <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">the 2nd one (EdgeChromium-Policies-Mandatory.reg)<\/a> to import my sample configuration (like shown in the next screenshot) or use your gpedit.msc (Local Group Policy Editor).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"796\" height=\"281\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Policies-RegistryEditor.png\" alt=\"\" class=\"wp-image-1375\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Policies-RegistryEditor.png 796w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Policies-RegistryEditor-300x106.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Policies-RegistryEditor-768x271.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Policies-RegistryEditor-80x28.png 80w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\" \/><figcaption class=\"wp-element-caption\">Local Policies for Edge (based on Chromium)<\/figcaption><\/figure>\n\n\n\n<p>When using the Group Policy Editor you need the admx-Files for Edge based on Chromium from Microsoft, you can download them here:  <a href=\"https:\/\/www.microsoft.com\/en-us\/edge\/business\/download\">https:\/\/www.microsoft.com\/en-us\/edge\/business\/download<\/a> (Link: &#8222;Get Policy Files). Configuration then looks like this: Computer Configuration =&gt; Administrative Templates =&gt; Microsoft Edge. Be aware: it is <strong>NOT<\/strong> &#8222;Windows Components =&gt; Microsoft Edge&#8220; (this would be the old Edge Legacy Browser!).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"884\" height=\"468\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor.png\" alt=\"\" class=\"wp-image-1368\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor.png 884w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor-300x159.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor-768x407.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-GroupPolicyEditor-80x42.png 80w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Compatibility<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test in January 2020: I successfully tested my solution with all currently Microsoft-supported Windows 10 Releases: v1709, v1809, v1903, v1909, 2019 LTSC and all currently (January 2020) available Edge based on Chromium Versions: v79, v80 (Beta), v81 (Dev).<\/li>\n\n\n\n<li><em>Test on 09.02.2020:<\/em> Successfully tested with Edge v80.0.361.48 (Stable) up to v82.0.418.0 (Canary)<\/li>\n\n\n\n<li><em><em>Test on <\/em>20.05.2020:<\/em> Successfully tested with Edge v81.0.416.77 (Stable) up to v84.0.520.0 (Canary) on Win10 v1909 as well as Win10 v2004 (by InplaceUpgrade from Win10 v1909)<\/li>\n\n\n\n<li><em>Test on 22.05.2020:<\/em> Successfully tested with Edge v81.0.416.77 (old Stable) as well as v83.0.478.37 (new Stable) up to v84.0.520.0 (Canary) on Win10 v2004 (Fresh Install, Build 19041.264) <\/li>\n\n\n\n<li><em>Test on 12.10.2020:<\/em> Successfully tested with Edge v86.0.622.38&nbsp; (Stable) up to v87.0.658.0&nbsp; (Dev) on Win10 v1909<\/li>\n\n\n\n<li><em>Test on 21.10.2020:<\/em> Successfully tested with Edge v86.0.622.48 (Stable), v87.0.664.12 (Beta), v88.0.673.0 (Dev), &nbsp;88.0.677.0 (Can) on Win10 v2009 \/ 20H2 Build 19042.572<\/li>\n\n\n\n<li><em>Test on 13.11.2020: <\/em>Successfully tested with Edge v86.0.622.68 (Stable), v87.0.664.30 (Beta), v88.0.692.0 (Dev),  v88.0.698.0&nbsp;(Can) on Win10 v2009 \/ 20H2 Build 19042.630 (Professional, Education, Enterprise)<\/li>\n\n\n\n<li><em>Test on 14.12.2020:<\/em> Successfully tested with Edge v87.0.664.60 (Stable), v88.0.705.18 (Beta), v89.0.723.0 (Dev), 89.0.731.0 (Can) on Win10 v2009 \/ 20H2 Build 19042.685 (Professional, Education, Pro Education, Enterprise)<\/li>\n\n\n\n<li><em>Test on 11.06.2021:<\/em> Successfully tested with Edge v91.0.864.41 (Stable), v92.0.902.9&nbsp;(Beta), v93.0.910.5 (Dev) on Win10 v21H1 Build 19043.1052  (Professional, Education, Pro Education, Enterprise)<\/li>\n\n\n\n<li><em>Test on 13.08.2021:<\/em> Successfully tested with Edge v92.0.902.73 (Stable), v93.0.961.18&nbsp;(Beta), v94.0.975.1 (Dev) on Win<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">11<\/mark><\/strong> Preview v21H2 Build 22000.132 (Professional, Education, Pro Education, Enterprise)<\/li>\n\n\n\n<li><em>Test on 20.04.2022:<\/em> Successfully tested with Edge v100.0.1185.44 (Stable), Edge v101.0.1210.19 (Beta), Edge v102.0.1227.0 (Dev+Canary) on Windows 10 v21H2 Build 19044.1620 (Professional) all Patches applied. There <a rel=\"noreferrer noopener\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/enterprise\/bug-edge-beta-101-on-start-this-policy-is-blocked-its-value-will\/m-p\/3280750\" data-type=\"URL\" data-id=\"https:\/\/techcommunity.microsoft.com\/t5\/enterprise\/bug-edge-beta-101-on-start-this-policy-is-blocked-its-value-will\/m-p\/3280750\" target=\"_blank\">was a Bug in the &#8222;early&#8220; v101-Beta-Releases<\/a> which was fixed starting with v101.0.1210.19.<\/li>\n\n\n\n<li>Test on 05.09.2022: Successfully tested with Edge 105.0.1343.27&nbsp;(Stable &amp; Beta), Edge 106.0.1363.0 (Dev) on Windows 10 v21H2 Build 19044.1889 (Professional, Enterprise) all Patches applied.<\/li>\n\n\n\n<li>Test on 12.09.2022: Successfully tested with Edge 105.0.1343.33&nbsp;(Stable &amp; Beta), Edge 107.0.1375.0 (Dev) on Windows <strong>11<\/strong> v21H2 Build 22000.918 (Professional, Pro for Workstations, Pro Education, Education, Enterprise) all Patches applied<\/li>\n\n\n\n<li>Test on 22.09.2022: Successfully tested with Edge 105.0.1343.42 (Stable), 106.0.1370.17 (Beta), Edge 107.0.1387.2 (Dev) on Windows <strong>11 v21H2<\/strong> Build 22000.1042 (Professional, Pro for Workstations, Pro Education, Education, Enterprise) and Windows <strong>11 v22H2<\/strong> Build 22621.521 (Professional, Pro for Workstations, Pro Education, Education, Enterprise) &#8211; all Patches applied<\/li>\n\n\n\n<li>Test on 30.12.2022: Successfully tested with Edge 108.0.1462.54 (Stable), 109.0.1518.26&nbsp;(Beta), 110.0.1556.0&nbsp;(Dev) on Windows <strong>10<\/strong> Pro <strong>v22H2<\/strong> and Windows <strong>11<\/strong> Pro <strong>v22H2<\/strong> &#8211; all Patches applied<\/li>\n\n\n\n<li>Test on 22.08.2023: Successfully tested with Edge 116.0.1938.54&nbsp;(Stable &amp; Beta), 117.0.2045.1 (Dev) on Windows <strong>10<\/strong> Pro <strong>v22H2<\/strong> and Windows <strong>11<\/strong> Pro <strong>v22H2<\/strong> &#8211; all Patches applied. <\/li>\n\n\n\n<li>Test on 12.01.2024: Successfully tested with Edge 120.0.2210.133&nbsp;(Stable), 121.0.2277.49 (Beta), 122.0.2325.0 (Dev) on Windows <strong>10<\/strong> Pro <strong>v22H2<\/strong> and Windows <strong>11<\/strong> Pro <strong>v22H2<\/strong> &#8211; all Patches applied. <\/li>\n\n\n\n<li>Test on 12.03.2024: Successfully tested with Edge 122.0.2365.80&nbsp;(Stable), 123.0.2420.32 (Beta), 124.0.2450.2 (Dev) on Windows <strong>10<\/strong> Pro <strong>v22H2<\/strong> and Windows <strong>11<\/strong> Pro <strong>v23H2<\/strong> &#8211; all Patches applied.<\/li>\n\n\n\n<li>Test on 05.06.2024: Successfully tested with Edge 125.0.2535.85&nbsp;(Stable), 126.0.2592.36 (Beta), 127.0.2610.3 (Dev) on Windows 10 Enterprise v22H2 and Windows 11 Pro for Workstation v23H2 &#8211; all Patches applied.<\/li>\n\n\n\n<li>Test on 14.06.2024: Successfully tested with Edge 126.0.2592.56 (Stable), 126.0.2592.56&nbsp;(Beta), 127.0.2638.2 (Dev) on Windows 10 Enterprise v22H2, Windows 11 Pro + Pro for Workstation +  Pro Education + Enterprise 23H2 Build 22631.3737 &#8211; all Patches applied. <\/li>\n\n\n\n<li>Test on 18.07.2024: Successfully tested with Edge 126.0.2592.102 (Stable), 127.0.2651.49&nbsp;(Beta), 128.0.2708.0 (Dev) on Windows 10 Enterprise v22H2, Windows 11 Enterprise 23H2 &#8211; all Patches (Juli 2024 PatchTuesday) applied.<\/li>\n\n\n\n<li>Test on 16.08.2024: Successfully tested with Edge 127.0.2651.105 (Stable), 128.0.2739.22&nbsp;(Beta), 129.0.2766.0 (Dev) on Windows 10 Enterprise v22H2, Windows 11 Enterprise 23H2 &#8211; all Patches (August 2024 PatchTuesday) applied.<\/li>\n\n\n\n<li>Test on 07.10.2024: Successfully tested with Edge 129.0.2792.79 (Stable), 130.0.2849.13 (Beta), 131.0.2863.0 (Dev) on brand new, fresh installed <strong>Windows 11 v24H2<\/strong> Pro + Pro for Workstation + Education + Pro for Education + Enterprise (Build 26100.1882).<\/li>\n\n\n\n<li>Test on 10.08.2025: Successfully tested with Edge 139.0.3405.86 (Stable), 139.0.3405.8 (Beta), 140.0.3471.0 (Dev) on <strong>Windows 10 v22H2 Education &amp;<\/strong> <strong>Windows 11 v24H2<\/strong> <strong>Education <\/strong> (Fully Patched, July 2025 Patch-Tuesday).<\/li>\n\n\n\n<li>Test on 13.08.2025: Successfully tested with Edge 139.0.3405.86 (Stable), 139.0.3405.86 (Beta), 140.0.3485.6 (Dev), 141.0.3495.0 (Can) on brand new, fresh installed <strong>Windows 11 v24H2<\/strong> Enterprise Fully Patched, August 2025 PatchTuesday, Build 26100.4946).<\/li>\n\n\n\n<li>&#x2139;&#xfe0f;<strong>Starting with Edge v147 in 03\/2026 you need the new Version of Fake-MDM-Provider including configured UPN Registry-Value!<\/strong><\/li>\n\n\n\n<li>Test on 29.03.2026: Successfully tested with Edge 146.0.3856.84 (Stable), 147.0.3912.26\u00a0(Beta), 148.0.3928.0 (Dev) on brand new, fresh installed <strong>Windows 11 v25H2<\/strong> Enterprise \/ Professional \/ Education &#8211; Fully Patched, February 2025 PatchTuesday, Build 26200.8037).<\/li>\n<\/ul>\n\n\n\n<p><strong>Supported Windows Editions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows 10 Home =&gt; NO! Does not Support MDM, not supported by Fake-MDM-Provider<\/li>\n\n\n\n<li>Windows 10 Pro Education =&gt; Bug identified on 13.11.2020, does not work with MDM or Fake-MDM =&gt; <a rel=\"noreferrer noopener\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/enterprise\/bug-windows-10-pro-education-this-policy-is-blocked-its-value\/m-p\/1885249\" data-type=\"URL\" data-id=\"https:\/\/techcommunity.microsoft.com\/t5\/enterprise\/bug-windows-10-pro-education-this-policy-is-blocked-its-value\/m-p\/1885249\" target=\"_blank\">I reported this issue to Microsoft<\/a> =&gt; It is fixed in Edge Stable 87.0.664.53+ or Edge Canary v88.0.704.0+<\/li>\n\n\n\n<li>Windows 10 Pro =&gt; YES! tested Win10 20H2, 21H1, 21H2, 22H2<\/li>\n\n\n\n<li>Windows 10 Pro for Workstations =&gt; Bug identified on 11.06.2021, does not work with MDM or Fake-MDM =&gt; <a rel=\"noreferrer noopener\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/enterprise\/bug-windows-10-pro-education-this-policy-is-blocked-its-value\/m-p\/2438148#M3497\" target=\"_blank\">I reported this issue to Microsoft<\/a> =&gt; It is fixed in Edge starting with Version 93.0.930.0+ =&gt; YES!<\/li>\n\n\n\n<li>Windows 10 Education =&gt; YES! tested Win10 20H2, 21H1, 21H2, 22H2<\/li>\n\n\n\n<li>Windows 10 Enterprise =&gt; YES! tested Win10 20H2, 21H1, 21H2, 22H2<\/li>\n\n\n\n<li>Windows 10 IoT Enterprise LTSC 2021 21H2 =&gt; Bug identified in 03\/2022 =&gt; Reported to Microsoft =&gt; Result: YES, works starting with Edge v100+<\/li>\n\n\n\n<li><span style=\"color: initial;\">Windows 11 Professional =&gt; YES! tested with Win11 21H2, 22H2, 23H2<\/span>, 24H2<\/li>\n\n\n\n<li>Windows 11 Pro for Workstations =&gt; <span style=\"color: initial;\">YES! tested with Win11 21H2, 22H2<\/span>, 23H2, 24H2<\/li>\n\n\n\n<li>Windows 11 Pro Education =&gt; <span style=\"color: initial;\">YES! tested with Win11 21H2, 22H2<\/span>, 23H2, 24H2<\/li>\n\n\n\n<li>Windows 11 Education =&gt; <span style=\"color: initial;\">YES! tested with Win11 21H2, 22H2<\/span>, <span style=\"color: initial;\">23H2<\/span>, 24H2<\/li>\n\n\n\n<li>Windows 11 Enterprise =&gt; <span style=\"color: initial;\">YES! tested with Win11 21H2, 22H2, 23H2<\/span>, 24H2, 25H2<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"381\" height=\"100\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromiumLegacy-Chromium-Beta-Dev-Canary.png\" alt=\"\" class=\"wp-image-1376\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromiumLegacy-Chromium-Beta-Dev-Canary.png 381w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromiumLegacy-Chromium-Beta-Dev-Canary-300x79.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromiumLegacy-Chromium-Beta-Dev-Canary-80x21.png 80w\" sizes=\"auto, (max-width: 381px) 100vw, 381px\" \/><figcaption class=\"wp-element-caption\">Edge Releases<\/figcaption><\/figure>\n\n\n\n<p>After successfully applying the Fake-MDM-Registry-Keys for example the Open page on start-up Setting is successfully configured and locked:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Settings-Locked-LocalGroupPolicy-1024x554.png\" alt=\"\" class=\"wp-image-1377\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Settings-Locked-LocalGroupPolicy-1024x554.png 1024w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Settings-Locked-LocalGroupPolicy-300x162.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Settings-Locked-LocalGroupPolicy-768x415.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Settings-Locked-LocalGroupPolicy-80x43.png 80w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-HomePage-Settings-Locked-LocalGroupPolicy.png 1050w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>All Edge Policies applied can be viewed by opening <a href=\"\/\/policy\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"edge:\/\/policy (\u00f6ffnet in neuem Tab)\">edge:\/\/policy<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"929\" height=\"343\" src=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Policy.png\" alt=\"\" class=\"wp-image-1378\" srcset=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Policy.png 929w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Policy-300x111.png 300w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Policy-768x284.png 768w, https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Policy-80x30.png 80w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><figcaption class=\"wp-element-caption\">Edge-Policy Overview edge:\/\/policy<\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Side-Effect: Defender Tamper Protection turned off on MDM-managed Devices<\/h4>\n\n\n\n<p>When a Windows-Machine is MDM-managed the Windows Defender Tamper Protection is &#8222;Managed by Administrator&#8220; and shows turned off. This is not intentionally caused by my Fake-MDM-Provider, it is generally behavior by any MDM-managed Device as you can <a rel=\"noreferrer noopener\" href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/prevent-changes-to-security-settings-with-tamper-protection\" data-type=\"URL\" data-id=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/prevent-changes-to-security-settings-with-tamper-protection\" target=\"_blank\">read here<\/a>. Thanks <a rel=\"noreferrer noopener\" href=\"https:\/\/answers.microsoft.com\/en-us\/profile\/f56d9012-0474-4f54-b2f6-e10490146e0b\" target=\"_blank\">\u00a1Firedog<\/a> for bringing this to my attention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be Aware: Edge for Business (Edge v116+) filters most policies when logged on with Personal Microsoft Account for Profile-Synchronization!<\/h3>\n\n\n\n<p>Starting with Edge Version 116.0.1938.54 Microsoft added &#8222;Edge for Business&#8220; features to the Edge browser. When the User logs on to the Browser-Profile for Synchronization using a Personal Microsoft Account (MSA) most of the Policies will be filtered and show up as &#8222;ignored&#8220;. See my <a rel=\"noreferrer noopener\" href=\"https:\/\/hitco.at\/blog\/microsoft-edge-policies-werden-ignoriert-wenn-mit-persoenlichem-microsoft-account-angemeldet\/\" target=\"_blank\">Blog-Post about Ignored Policies when using personal Microsoft Account<\/a> and see the <a rel=\"noreferrer noopener\" href=\"https:\/\/learn.microsoft.com\/en-us\/DeployEdge\/edge-learnmore-personal-browser-policies\" target=\"_blank\">List of filtered Policies for the Enterprise Personal Browser in Detail<\/a>. As at least the &#8222;Single MSA Profile Sync&#8220; Szenario is for sure no &#8222;Edge for Business&#8220; Szenario Microsoft adopted the functionality (or lets say this Bug) again, starting with 24th August 2023 at the most current DEV and Canary Releases of Edge accept the Policies with a single syncing MSA-Profile and starting on 26th August Edge Stable Release Version 116.0.1938.54 stopped this crazy behaviour and policies are working again in the &#8222;Single MSA Profile Sync&#8220; Szenario.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Change: Edge v147 needs configured &#8222;UPN&#8220; Registry-Value<\/h2>\n\n\n\n<p>Starting with Edge v147 (currently on 29.03.3026 in Beta) the Registry-Key &#8222;UPN&#8220; (&#8222;User Principal Name&#8220;) has to be configured, otherwise Edge will not accept the Fake-MDM-Provider as legit MDM-Management.<\/p>\n\n\n\n<p>I added this setting to the <a href=\"https:\/\/hitco.at\/blog\/wp-content\/uploads\/EdgeChromium-Fake-MDM-Provider-Policies.zip\">MDM-FakeEnrollment.reg<\/a> on 29.03.2026, so if you are facing this issue, just download this updated version.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Blog-Post I describe, how to apply restricted Edge based on Chromium Policies like HomepageLocation, NewTabPageLocation,  RestoreOnStartupURLs, DefaultSearchProvider, SmartScreen and several more without domain-joining the Devices.<\/p>\n","protected":false},"author":1,"featured_media":1376,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[498],"tags":[523,210,233,231],"class_list":["post-1363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-edge","tag-blocked","tag-edge","tag-fake-mdm","tag-policies"],"_links":{"self":[{"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/posts\/1363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/comments?post=1363"}],"version-history":[{"count":93,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/posts\/1363\/revisions"}],"predecessor-version":[{"id":2631,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/posts\/1363\/revisions\/2631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/media\/1376"}],"wp:attachment":[{"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/media?parent=1363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/categories?post=1363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hitco.at\/blog\/wp-json\/wp\/v2\/tags?post=1363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}