Skip to content

Commit 2d019af

Browse files
authored
Merge pull request #10497 from haywoodsloan/8762-edge-pages
AB#8762 - Create a new TSG page for Microsoft Edge Browser product with multiple articles to be published
2 parents 0c4ae87 + f629642 commit 2d019af

17 files changed

Lines changed: 495 additions & 0 deletions

support/docfx.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,7 @@
7272
"dynamics-365/field-service/**.*": "MSDocsHeader-Dynamics365-Field-Service",
7373
"dynamics-365/sales/**.*": "MSDocsHeader-Dynamics365Sales",
7474
"mem/**.*": "MSDocsHeader-Intune",
75+
"microsoft-edge/**.*": "MSDocsHeader-MSEdge",
7576
"power-platform/**.*": "MSDocsHeader-PowerPlatform",
7677
"power-platform/power-apps/**.*": "MSDocsHeader-MSPowerApps",
7778
"power-platform/power-automate/**.*": "MSDocsHeader-MSPowerAutomate",
@@ -249,6 +250,7 @@
249250
"microsoft-identity-manager/*.md": "microsoft-identity-manager",
250251
"dynamics/gp/*.md": "dynamics-gp",
251252
"mem/configmgr/**/*.md": "configuration-manager",
253+
"microsoft-edge/**.*": "microsoft-edge",
252254
"system-center/**/*.md": "system-center",
253255
"windows/win32/**/*.md": "windows-dev-apps",
254256
"windows-hardware/drivers/**/*.md": "windows-hardware-driver-quality",
@@ -278,6 +280,7 @@
278280
"windows-365/**/*.md": "Windows 365",
279281
"mem/intune/**/*.md": "Intune",
280282
"mem/configmgr/**/*.md": "Configuration Manager",
283+
"microsoft-edge/**.*": "Microsoft Edge",
281284
"system-center/dpm/**/*.md": "Data Protection Manager",
282285
"system-center/scom/**/*.md": "Operations Manager",
283286
"system-center/orchestrator/**/*.md": "Orchestrator",
@@ -343,6 +346,10 @@
343346
"ASP.NET",
344347
"ASP.NET Core"
345348
],
349+
"microsoft-edge/**.*": [
350+
"Microsoft Edge",
351+
"Microsoft Edge Developer"
352+
],
346353
"sql/**/*.md": [
347354
"Troubleshoot",
348355
"sql"

support/index.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,11 @@ productDirectory:
7373
summary: Troubleshooting articles for Microsoft Dynamics 365
7474
url: dynamics-365/index.yml
7575

76+
- title: Microsoft Edge
77+
imageSrc: "media/hub-landing/Edge.jpg"
78+
summary: Troubleshooting articles for Microsoft Edge
79+
url: microsoft-edge/welcome-edge.yml
80+
7681
- title: Microsoft Entra
7782
imageSrc: "media/hub-landing/microsoft-entra.svg"
7883
summary: Troubleshooting articles for Microsoft Entra
531 KB
Loading
195 KB
Loading
54.7 KB
Loading
353 KB
Loading
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: Troubleshoot Self-Hosted Extension Deployment Group Policy Issues
3+
description: Learn how to resolve deployment issues for self-hosted extensions in Microsoft Edge when you use Group Policy policies.
4+
ms.custom: 'sap:Web Platform and Development\Controls and Extensions'
5+
ms.reviewer: dili, Johnny.Xu, v-shaywood
6+
ms.date: 01/28/2026
7+
---
8+
9+
# Failure to deploy self-hosted extension via group policy
10+
11+
## Summary
12+
13+
This article provides guidance to help you troubleshoot when a self-hosted extension fails to deploy through Group Policy. The extension might not appear for the target user even though you configured the policy. This article covers the common causes of this problem, including incorrect Group Policy configuration, missing or incorrect Content-Type headers on the web server, and invalid extension manifest or update manifest XML files. It also provides steps to resolve each cause.
14+
15+
## Symptoms
16+
17+
When you deploy a browser extension to Microsoft Edge by using the Group Policy [ExtensionInstallForcelist](/DeployEdge/microsoft-edge-browser-policies/extensioninstallforcelist) or [ExtensionSettings](/DeployEdge/microsoft-edge-browser-policies/extensionsettings) policy, the deployment fails, and the extension doesn't appear on the `edge://extensions` page for the target users.
18+
19+
However, if you manually drag the same extension package (`.crx` file) onto the `edge://extensions` page by having [Developer mode](/microsoft-edge/extensions/getting-started/extension-sideloading#locally-installing-and-running-an-extension) enabled, the extension installs successfully.
20+
21+
## Cause 1: Incorrect group policy configuration
22+
23+
This problem occurs because the Group Policy **ExtensionInstallForcelist** or **ExtensionSettings** policy is configured incorrectly.
24+
25+
### Solution: Verify and correct the Group Policy configuration
26+
27+
Verify and correct the Group Policy extension configuration by using the following documentation:
28+
29+
- [ExtensionInstallForcelist](/deployedge/microsoft-edge-browser-policies/extensioninstallforcelist)
30+
- [ExtensionSettings](/deployedge/microsoft-edge-browser-policies/extensionsettings)
31+
32+
## Cause 2: Incorrect Content-Type header for the .crx file
33+
34+
When you host the extension on an internal HTTP or HTTPS server, and the server doesn't return the correct **Content-Type** header for the `.crx` file, the extension deployment fails.
35+
36+
If the `.crx` file isn't served by using the header, `Content-Type: application/x-chrome-extension`, Microsoft Edge and other Chromium-based browsers don't treat the file as an installable extension package if it's downloaded as part of the Group Policy installation flow.
37+
38+
As a result, the policy is processed, but the browser doesn't silently install the extension.
39+
40+
### Solution: Configure the web server to return the correct content type
41+
42+
Configure the web server to return the correct `Content-Type` for `.crx` files. The HTTP response for the extension package must include the following header:
43+
44+
```http
45+
Content-Type: application/x-chrome-extension
46+
```
47+
48+
After you configure this header, Microsoft Edge recognizes the `.crx` file as an installable extension when it's downloaded through the policy.
49+
50+
#### Example: Configure MIME mapping on IIS
51+
52+
1. In **IIS Manager**, select the target site that hosts the extension.
53+
1. Double-click **MIME Types**.
54+
1. In the **Actions** pane, select **Add…**.
55+
1. Set **File name extension** to `.crx`.
56+
1. Set **MIME type** to `application/x-chrome-extension`.
57+
1. Select **OK**, then recycle the website or application pool, if it's necessary.
58+
59+
## Cause 3: Invalid extension manifest or update manifest XML
60+
61+
The extension metadata in `manifest.json` or in the _update manifest XML_ is invalid, such as in the following examples:
62+
63+
- The `version` field in `manifest.json` uses an invalid format (for example, `1.0-beta` or other non-numeric characters).
64+
- The _update manifest XML_ that's used for self-hosted updates contains invalid or inconsistent values (for example, mismatched version numbers or malformed XML).
65+
66+
In these cases, manual drag-and-drop installation might succeed in some scenarios. However, policy-based installation or automatic updates might fail.
67+
68+
### Solution: Validate and correct the extension manifests
69+
70+
Validate and correct the extension manifest or update manifest XML by following the Chrome documentation (applies also to Microsoft Edge and other Chromium-based browsers):
71+
72+
- [Manifest - Version](https://developer.chrome.com/docs/extensions/reference/manifest/version)
73+
- [Self-host for Linux - Update manifest](https://developer.chrome.com/docs/extensions/how-to/distribute/host-on-linux#update_manifest)
74+
75+
## Related content
76+
77+
- [Self-host for Linux - Host](https://developer.chrome.com/docs/extensions/how-to/distribute/host-on-linux#hosting)
78+
79+
[!INCLUDE [Third-party disclaimer](~/includes/third-party-disclaimer.md)]
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
title: Unexpected Block or Warning on Customer Website in Microsoft Edge
3+
description: Troubleshoot unexpected Microsoft Defender SmartScreen blocks or warnings on websites and learn how to report false positives.
4+
ms.custom: 'sap:Web Platform and Development\Connectivity and Navigation: TCP, HTTP, TLS, DNS, Proxies, Downloads'
5+
ms.reviewer: dili, Johnny.Xu, v-shaywood
6+
ms.date: 01/28/2026
7+
---
8+
9+
# Unexpected SmartScreen block or warning on website
10+
11+
When you visit a website in Microsoft Edge, [Microsoft Defender SmartScreen](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen) might block the site or display a warning if it determines that the site is potentially unsafe. This article discusses the criteria that SmartScreen uses to determine whether a site is potentially unsafe, and how to resolve the issue if a site is incorrectly marked as unsafe.
12+
13+
## Symptoms
14+
15+
When you visit a website, Microsoft Edge displays a warning page that indicates that the site is reported as unsafe.
16+
17+
:::image type="content" source="./media/unexpected-block-warning/site-blocked.png" alt-text="View of the SmartScreen block page.":::
18+
19+
## Cause
20+
21+
Microsoft Defender SmartScreen determines whether a site is potentially unsafe based on several factors, as listed in the following table.
22+
23+
| Dimension | Description |
24+
| -------------------- | --------------------------------------------------------------------------------- |
25+
| **URL Reputation** | Newly registered domains, malicious history, hosting provider, and traffic volume |
26+
| **Page Content** | Presence of deceptive forms, malicious scripts, or phishing pages |
27+
| **File Behavior** | Whether sensitive files are downloaded and their signature status |
28+
| **TLS Security** | Certificate validity and protocol version |
29+
| **User Feedback** | Number of reports and trust level |
30+
| **Dynamic Behavior** | JavaScript activity, redirects, and obfuscation |
31+
32+
If a site fails these dimension checks, SmartScreen reports the site as unsafe.
33+
34+
## Solution
35+
36+
If you believe the warning or block was incorrectly shown for a safe site, you can report it to Microsoft using the following steps.
37+
38+
### If you're the website owner
39+
40+
1. Select **Report that this site doesn't contain (malware/phishing) threats** under the **More information** header on the block page.
41+
42+
:::image type="content" source="./media/unexpected-block-warning/report-site-safe-blocked.png" alt-text="A SmartScreen block page that has the link to 'Report that this site doesn't contain malware threats' highlighted.":::
43+
44+
1. Wait for a confirmation email message from the SmartScreen Reputation Group.
45+
46+
1. If the issue is urgent, or you need a response after the Reputation Group's investigation, reply to the message from the Reputation Group to present your concerns.
47+
48+
### If you're not the website owner
49+
50+
1. Reach out to the website owner, and recommend that they report the issue by using the steps in [If you're the website owner](#if-youre-the-website-owner).
51+
52+
1. Both the site owner and you can report the issue by using the [WDSI file submission portal](https://www.microsoft.com/en-us/wdsi/filesubmission). For more detailed information about submitting files for analysis, see [Submit files for analysis](/unified-secops/submission-guide).
53+
54+
### Prevent your site from being blocked
55+
56+
To reduce the likelihood of SmartScreen blocking your site:
57+
58+
1. Enable _HTTPS_, and use a valid certificate.
59+
1. Block iframe from loading unknown third-party content.
60+
1. Use _Content Security Policy (CSP)_ and other secure response headers.
61+
1. Regularly scan for WebShells, trojans, and suspicious uploaded files.
62+
1. Maintain _domain reputation_ and avoid frequent changes to hosting or DNS.
63+
64+
## Related content
65+
66+
- [Microsoft Defender for Endpoint demonstrations](/defender-endpoint/defender-endpoint-demonstrations)
67+
- [Microsoft Defender SmartScreen Frequently Asked Questions](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx)
68+
- [Microsoft Edge support for Microsoft Defender SmartScreen](/deployedge/microsoft-edge-security-smartscreen)
69+
- [SmartScreen URL reputation demonstration](/defender-endpoint/defender-endpoint-demonstration-smartscreen-url-reputation)
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Learn About Group Policy Limits for InPrivate Extensions
3+
description: Works around an issue in which Group Policy doesn't allow enabling extensions for InPrivate browsing in Microsoft Edge.
4+
ms.custom: 'sap:Manageability and Deployment\Group Policy: ADM template and MDM'
5+
ms.reviewer: dili, Johnny.Xu, v-shaywood
6+
ms.date: 01/28/2026
7+
---
8+
9+
# Can't enable extensions for InPrivate browsing by using Group Policy
10+
11+
## Summary
12+
13+
After you deploy an extension through [Group Policy](/windows-server/identity/ad-ds/manage/group-policy/group-policy-overview), you notice that there is no policy option to enable the extension for [InPrivate browsing](/legal/microsoft-edge/privacy#inprivate-browsing). This article explains why that policy option is missing, and how to manually enable the extension for InPrivate browsing.
14+
15+
## Symptoms
16+
17+
You experience the following issue
18+
1. By using Group Policy, you successfully deploy an extension to your clients.
19+
1. You want to enable the extension for InPrivate browsing by using a policy. However, no policy option for this configuration is available.
20+
21+
## Cause
22+
23+
By design, you can't enable extensions for InPrivate browsing through Group Policy. This restriction is intentional to protect user privacy during InPrivate browsing sessions.
24+
25+
## Workaround
26+
27+
To manually enable extensions for InPrivate browsing, follow these steps:
28+
29+
1. Open Microsoft Edge, and go to `edge://extensions`.
30+
1. Find the extension that you want to enable for InPrivate browsing.
31+
1. Select **Details** for the corresponding extension.
32+
1. Select the **Allow in InPrivate** checkbox.
33+
34+
:::image type="content" source="./media/enable-extension-inprivate-policy/allow-inprivate.png" alt-text="The Allow in InPrivate option in Edge extension details.":::
35+
36+
## Related content
37+
38+
- [Configure extension management settings](/deployedge/microsoft-edge-browser-policies/extensionsettings)
39+
- [Microsoft Edge - Policies](/deployedge/microsoft-edge-policies#extensionsettings)
184 KB
Loading

0 commit comments

Comments
 (0)