Chrome Enterprise Bundle Download (2026)
Chrome Enterprise bundles provide IT administrators and developers with a streamlined way to deploy and manage Google Chrome across organization-wide infrastructure. Whether you’re scripting automated deployments or configuring group policies, understanding the bundle download process saves time and reduces deployment friction.
What Is the Chrome Enterprise Bundle?
The Chrome Enterprise bundle is a downloadable package that includes the Chrome browser installer along with administrative templates and Group Policy files. Unlike the consumer Chrome installer, the enterprise bundle gives you:
- MSI and EXE installers for silent deployment via SCCM, Intune, or GPO
- ADM/ADMX templates for configuring browser policies organization-wide
- Chrome Browser Cloud Management enrollment support
- Long-term support with extended stability windows
The bundle differs from Chrome channels you might use for testing. Enterprise bundles receive stable updates with predictable release cycles, making them suitable for environments where change management controls browser versions.
Enterprise Bundle vs. Standard Chrome Installer
Understanding what separates the enterprise bundle from a regular Chrome download helps you make the right choice for your deployment.
| Feature | Standard Chrome | Enterprise Bundle |
|---|---|---|
| Silent install support | Limited | Full MSI/EXE flags |
| Group Policy templates | Not included | ADM/ADMX included |
| Version control | Auto-update only | Manual version pinning |
| Deployment tool support | Minimal | SCCM, Intune, GPO native |
| Chrome Browser Cloud Management | Not available | Full enrollment support |
| Extended support releases | No | Available |
| Offline installation | Not reliable | Fully offline capable |
If you are managing more than a handful of machines, the enterprise bundle is the correct choice. The policy templates alone justify the switch. without them, enforcing browser settings at scale requires registry edits on every machine.
Downloading the Chrome Enterprise Bundle
Google hosts the enterprise bundle on its official Chrome Enterprise release page. The direct download URL follows a predictable pattern, which proves useful for automation scripts:
Download the latest Chrome Enterprise bundle (64-bit)
curl -L -o chrome-enterprise-bundle.zip \
"https://dl.google.com/edgedl/chrome/policy/policy_templates.zip"
This command downloads Google’s policy templates zip, which contains the ADM/ADMX files you need for Group Policy configuration. The actual browser installer lives in a separate location:
Download Chrome Enterprise MSI installer (64-bit)
curl -L -o GoogleChromeStandaloneEnterprise64.msi \
"https://dl.google.com/edgedl/chrome/install/GoogleChromeStandaloneEnterprise64.msi"
Download Chrome Enterprise MSI installer (32-bit, for legacy systems)
curl -L -o GoogleChromeStandaloneEnterprise.msi \
"https://dl.google.com/edgedl/chrome/install/GoogleChromeStandaloneEnterprise.msi"
Verify checksums after downloading to ensure file integrity before pushing to production systems:
Calculate SHA256 checksum on Linux/macOS
sha256sum GoogleChromeStandaloneEnterprise64.msi
On Windows PowerShell
Get-FileHash .\GoogleChromeStandaloneEnterprise64.msi -Algorithm SHA256
Always cross-reference your checksum against the values published on the Chrome Enterprise release page. This is especially important when downloading installers through a proxy or caching layer, where silent corruption can occur.
Automating Downloads with a Script
For organizations that refresh their deployment share on a schedule, a simple Bash script handles the download and verification loop:
#!/bin/bash
set -euo pipefail
DOWNLOAD_DIR="/srv/deploy/chrome"
INSTALLER_URL="https://dl.google.com/edgedl/chrome/install/GoogleChromeStandaloneEnterprise64.msi"
POLICY_URL="https://dl.google.com/edgedl/chrome/policy/policy_templates.zip"
mkdir -p "$DOWNLOAD_DIR"
echo "Downloading Chrome Enterprise installer..."
curl -L -o "$DOWNLOAD_DIR/GoogleChromeStandaloneEnterprise64.msi" "$INSTALLER_URL"
echo "Downloading policy templates..."
curl -L -o "$DOWNLOAD_DIR/policy_templates.zip" "$POLICY_URL"
echo "Extracting policy templates..."
unzip -o "$DOWNLOAD_DIR/policy_templates.zip" -d "$DOWNLOAD_DIR/policies"
echo "Download complete. Files in $DOWNLOAD_DIR:"
ls -lh "$DOWNLOAD_DIR"
Schedule this script via cron or a CI/CD pipeline to keep your deployment share current without manual intervention.
Silent Installation Methods
For enterprise deployment, you need silent installation options that work without user interaction. The MSI installer supports standard Windows Installer parameters:
Silent install using MSI with logging
msiexec /i GoogleChromeStandaloneEnterprise64.msi /quiet /norestart /log install.log
Silent install with verbose logging for troubleshooting
msiexec /i GoogleChromeStandaloneEnterprise64.msi /quiet /norestart /l*v install-verbose.log
The EXE installer also supports silent mode:
Silent install using EXE
.\GoogleChromeStandaloneEnterprise64.exe /silent /install
Combine these with your deployment tool of choice. For example, packaging for Intune Win32:
Install command for Intune Win32 app packaging
$installArgs = "/i `"$PSScriptRoot\GoogleChromeStandaloneEnterprise64.msi`" /quiet /norestart /l*v `"$env:TEMP\chrome-install.log`""
Start-Process msiexec.exe -ArgumentList $installArgs -Wait
Detection rule: check if Chrome exists at expected path
Test-Path "C:\Program Files\Google\Chrome\Application\chrome.exe"
For SCCM deployments, create a standard application with the install command above and a detection rule checking the chrome.exe path. Set the installation behavior to “Install for system” to ensure it writes to Program Files rather than the user’s profile.
Deployment Tool Comparison
| Tool | Preferred Package Type | Key Flag | Notes |
|---|---|---|---|
| SCCM / ConfigMgr | MSI | /quiet /norestart |
Use detection rule on chrome.exe |
| Intune Win32 | MSI or EXE | As above | Package with IntuneWinAppUtil.exe |
| GPO Software Installation | MSI only | None needed | Limited flexibility |
| PDQ Deploy | MSI or EXE | Either set | Easiest for ad-hoc rollouts |
| Ansible (Windows) | MSI | win_package module |
Good for hybrid environments |
Configuration via Group Policy
After installation, configure Chrome using Group Policy objects. Import the ADMX templates first:
- Download the policy templates zip
- Extract the contents. locate the
windows\admxfolder - Copy the ADMX files to your Central Store at
C:\Windows\SYSVOL\domain\Policies\PolicyDefinitions - Copy the corresponding ADML language files to the appropriate language subfolder (e.g.,
en-US)
PowerShell to copy templates to the Central Store
$source = "C:\Downloads\chrome-policies\windows\admx"
$dest = "\\yourdomain.local\SYSVOL\yourdomain.local\Policies\PolicyDefinitions"
Copy-Item "$source\*.admx" "$dest" -Force
Copy-Item "$source\en-US\*.adml" "$dest\en-US" -Force
Write-Host "Templates copied. Refresh Group Policy Management Console to see Chrome settings."
Key policies worth configuring immediately after deployment:
<!-- Example: Configure startup pages via GPO (for reference, not direct file editing) -->
<policy name="ChromeStartUpURLs" class="Machine">
<enabled>
<Data>
<Items>
<Item>
<Key>1</Key>
<Value>https://internal.yourcompany.com/dashboard</Value>
</Item>
</Items>
</Data>
</enabled>
</policy>
Through the Group Policy Management Editor, navigate to Computer Configuration > Administrative Templates > Google > Google Chrome to configure policies like:
- Startup, Home page, and New Tab page. Set default URLs
- Password manager. Enable or disable built-in password management
- Proxy server. Configure organization-wide proxy settings
- Extension installation. Whitelist approved extensions
- Update policies. Control when and how Chrome updates
- Safe Browsing. Set organizational safe browsing level
- Incognito mode. Enable or disable incognito to meet compliance requirements
Enforced vs. Recommended Policies
Chrome GPO distinguishes between two policy tiers:
- Enforced (
Computer Configuration > Administrative Templates > Google > Google Chrome). Users cannot override these. Use for security and compliance requirements. - Recommended (
Computer Configuration > Administrative Templates > Google > Google Chrome - Default Settings). Users can override these but see the configured value as the default.
For most enterprises, put security-critical settings (safe browsing, extension whitelisting, proxy) under enforced, and convenience settings (default search provider, home page) under recommended.
Managing Updates in Enterprise Environments
Chrome Enterprise supports several update control mechanisms. The GoogleUpdate service handles background updates, but you can configure behavior through policy or command-line switches.
Disable automatic updates when managing version changes through your deployment pipeline:
Disable automatic updates via registry policy
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Google\Update" `
-Name "AutoUpdateCheckPeriodMinutes" -Value 0 -Type DWORD
Or set a specific check interval (e.g., daily = 1440 minutes)
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Google\Update" `
-Name "AutoUpdateCheckPeriodMinutes" -Value 1440 -Type DWORD
For organizations requiring strict version control, download specific Chrome versions:
Download a specific version by constructing the URL
VERSION="120.0.6099.130"
curl -L -o chrome-enterprise-${VERSION}.msi \
"https://dl.google.com/edgedl/chrome/install/standalone/enterprise/${VERSION}/GoogleChromeStandaloneEnterprise.msi"
Update Channel Strategy
| Channel | Cadence | Best For |
|---|---|---|
| Stable | Every ~4 weeks | General workforce |
| Extended Stable | Every ~8 weeks | Regulated industries, cautious orgs |
| Beta | Every ~4 weeks (earlier) | IT pilot group |
| Dev | Weekly | Developers needing early API access |
Most enterprises run Stable for their general population and Extended Stable for systems in regulated roles such as finance or legal. Keep a small pilot group on Beta so your team sees breaking changes before they reach production.
Troubleshooting Common Issues
When Chrome fails to install or update in enterprise environments, check these common sources:
Installation fails with error 0x80070005. Insufficient permissions. Run the installer elevated or ensure the service account has rights to the target directory. Check that no prior Chrome installation exists in a user profile path that conflicts with the system-level install.
Policies not applying. Verify ADMX templates loaded correctly. Check the event log under Applications and Services Logs > Microsoft > Windows > Group Policy. Run gpresult /h gpresult.html on an affected machine to see which policies applied and which were filtered.
Force Group Policy refresh and check results
gpupdate /force
gpresult /r /scope computer | Select-String "Chrome"
Update service not running. The GoogleUpdate.exe service must run under an account with network access. Verify service status and start it if needed:
Check update service status
Get-Service GoogleUpdate | Select-Object Name, Status, StartType
Start the service if it's stopped
Start-Service GoogleUpdate
Chrome installs per-user instead of system-wide. This happens when the installer runs in the user context. Always invoke the MSI with elevated privileges (msiexec /i ... /quiet) or package it as a system-context deployment in Intune. System-wide installations write to C:\Program Files\Google\Chrome rather than the user’s AppData folder.
Extension policies ignored. Extension installation policy requires the extension ID and optionally an update URL. Confirm the ID matches exactly. Chrome extension IDs are case-sensitive lowercase strings. Test the policy with the Chrome policy viewer at chrome://policy/ on a managed machine.
Automating Deployment with Configuration Profiles
Modern management tools like Microsoft Intune support Chrome Browser configuration profiles. Create a configuration profile targeting Windows devices:
{
"chromeBookMarketplace": {
"Value": "true"
},
"defaultSearchProviderEnabled": {
"Value": "true"
},
"defaultSearchProviderSearchURL": {
"Value": "https://search.yourcompany.com/search?q={searchTerms}"
},
"homepageLocation": {
"Value": "https://internal.yourcompany.com"
},
"BrowserSignin": {
"Value": "0"
},
"SyncDisabled": {
"Value": "true"
},
"PasswordManagerEnabled": {
"Value": "false"
}
}
This JSON represents the Chrome Browser configuration profile structure you can import into Intune or other UEM solutions supporting Chrome policies. For Intune specifically, use the Settings Catalog under Device Configuration to find Chrome policies without needing to import ADMX templates manually. Microsoft and Google maintain these in the catalog already.
Chrome Browser Cloud Management as an Alternative
If your organization prefers SaaS management over on-premises GPO, Chrome Browser Cloud Management (CBCM) provides browser policy without requiring Active Directory:
- Enroll Chrome at
admin.google.com > Devices > Chrome > Settings - Deploy the enrollment token via GPO or Intune
- Configure policies through the Google Admin Console
CBCM works well for remote-first organizations that have moved away from on-premises domain controllers. It supports the same policy set as GPO and adds browser reporting and session management features.
Version Considerations
Chrome Enterprise releases follow a predictable cadence. Major versions arrive roughly every four weeks, with extended support branches receiving security updates for longer periods. When planning deployments:
- Test new major versions in a controlled pilot group before organization-wide rollout
- Monitor the Chrome Enterprise release notes for breaking policy changes
- Maintain a rollback plan by keeping the previous installer version in your deployment share
- Subscribe to the Chrome Enterprise and Education Help Community for advance notices of policy deprecations
The Chrome Enterprise bundle download process itself is straightforward, but effective enterprise browser management requires attention to update policies, configuration templates, and your deployment tooling. Start with the policy templates and MSI installer, then layer in automation and management controls as your deployment scales. Organizations that invest in proper ADMX template configuration and a structured update pilot group find that Chrome becomes a predictable, low-friction part of their endpoint stack rather than a source of support tickets.
Related Reading
- Getting Started Guide. From zero to productive with Claude Code
- AI Coding Tools Security Concerns Enterprise Guide
- Augment Code AI Review for Enterprise Teams 2026
- Chrome ADMX Templates for Windows Server: Enterprise.
Built by theluckystrike. More at zovo.one
Find the right skill → Browse 155+ skills in our Skill Finder.