Chrome Group Policy Templates 2026
Chrome group policy templates enable IT administrators to control browser settings across Windows domains. These templates come as ADMX files that you import into Group Policy Editor, allowing centralized management of Chrome across hundreds or thousands of workstations. In 2026, Google continues to expand policy options, giving administrators finer control over security, extensions, network behavior, and user experience.
This guide covers the full workflow: downloading and installing the ADMX files, configuring the most important policy categories, deploying via registry and JSON, troubleshooting policy conflicts, and deciding when to move from on-premises Group Policy to Chrome Browser Cloud Management.
Getting Started with Chrome ADMX Templates
Chrome Enterprise ships with two ADMX template files: chrome.admx and chrome.adml. The English version covers most policies, while the language-specific files provide localized policy descriptions in Group Policy Editor.
To install the templates, download the Chrome Enterprise bundle from Google’s Chrome Enterprise resources page. Extract the files and copy them to your domain controller’s PolicyDefinitions folder:
Copy Chrome ADMX files to Group Policy definitions
Copy-Item -Path ".\ChromeEnterpriseBundle\PolicyDefinitions\chrome.admx" `
-Destination "$env:SystemRoot\PolicyDefinitions\"
Copy-Item -Path ".\ChromeEnterpriseBundle\PolicyDefinitions\en-US\chrome.adml" `
-Destination "$env:SystemRoot\PolicyDefinitions\en-US\"
If you manage a Central Store (the recommended approach for multi-DC environments), copy to the SYSVOL path instead:
$centralStore = "\\$env:USERDNSDOMAIN\SYSVOL\$env:USERDNSDOMAIN\Policies\PolicyDefinitions"
Copy-Item -Path ".\ChromeEnterpriseBundle\PolicyDefinitions\chrome.admx" `
-Destination $centralStore
Copy-Item -Path ".\ChromeEnterpriseBundle\PolicyDefinitions\en-US\chrome.adml" `
-Destination "$centralStore\en-US\"
After importing, you will find Chrome policies under Computer Configuration > Administrative Templates > Google Chrome. The policies divide into categories: Extensions, Privacy, Security, Network, and User Experience. Refresh Group Policy Management Console if the Chrome node does not appear immediately after the copy.
Key Policy Categories for 2026
Extension Management Policies
Chrome provides granular control over extensions through several key policies:
- ExtensionInstallBlockList: Specifies extensions users cannot install. Use
*to block all extensions, then pair with an allowlist for a default-deny posture. - ExtensionInstallAllowlist: Restricts installation to approved extensions only. Entries are extension IDs from the Chrome Web Store URL.
- ExtensionInstallForcelist: Pre-installs extensions silently without user interaction. These appear in Chrome and cannot be removed by users.
Here is an example registry configuration for forcing an extension on all machines:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist]
"1"="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx"
"2"="bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb;https://clients2.google.com/service/update2/crx"
The update URL after the semicolon tells Chrome where to fetch the extension. For Web Store extensions, the Google update URL shown above is correct. For internally hosted extensions, replace it with your internal update manifest URL.
The extension IDs are the 32-character identifiers from the Chrome Web Store URL. This approach works well for corporate-licensed extensions or internal tools your team develops.
Extension Policy Comparison
| Policy | Effect | Typical Use Case |
|---|---|---|
ExtensionInstallForcelist |
Silently installs, cannot be removed | Corporate security tools, internal dashboards |
ExtensionInstallAllowlist |
User can install only listed extensions | Regulated environments, schools |
ExtensionInstallBlockList |
Blocks specific extensions or all with * |
Blocking known malicious or productivity-draining extensions |
ExtensionSettings |
Per-extension JSON config with fine-grained rules | Combining all of the above in a single policy |
The ExtensionSettings policy is the most powerful and is preferred when you need to mix installation modes for different extensions in one policy object. See the JSON configuration section below for a practical example.
Security Policies
Browser security policies help protect against threats while maintaining productivity:
- SafeBrowsingProtectionLevel: Configure Safe Browsing (0=off, 1=standard, 2=enhanced). Enhanced mode sends more browsing data to Google for analysis; review your privacy requirements before enabling it.
- SSLErrorOverrideAllowed: When set to
false, users cannot click through SSL certificate warnings. Recommended for all environments handling sensitive data. - CertificateTransparencyEnforcementDisabledForUrls: Exempt specific domains from Certificate Transparency requirements. Useful for internal CA-signed certificates on intranet sites.
- DeveloperToolsAvailability: Set to
2to disable DevTools entirely, or1to disallow use on extensions pages only.
For organizations handling sensitive data, the PrintJobBackgroundingEnabled policy lets you disable background printing, which prevents sensitive documents from lingering in the print spooler. Similarly, ScreenCaptureAllowed can be set to false to block screenshots in Chrome. useful for financial services or healthcare desktops where screen capture poses a data leakage risk.
Network and Proxy Settings
Chrome respects Windows proxy settings by default, but you can override them:
- ProxyMode: Choose how Chrome handles proxies (
auto_detect,pac_script,fixed_servers,direct,system) - ProxyPacUrl: Point to your PAC file location
- ProxyServer: Specify a direct proxy address
- ProxyBypassList: Comma-separated list of hosts that bypass the proxy
Set Chrome to use a specific proxy via PowerShell registry writes
$chromePath = "HKLM:\SOFTWARE\Policies\Google\Chrome"
if (-not (Test-Path $chromePath)) {
New-Item -Path $chromePath -Force | Out-Null
}
Set-ItemProperty -Path $chromePath -Name "ProxyMode" -Value "fixed_servers"
Set-ItemProperty -Path $chromePath -Name "ProxyServer" -Value "proxy.example.com:8080"
Set-ItemProperty -Path $chromePath -Name "ProxyBypassList" -Value "*.example.com,localhost,127.0.0.1"
Use pac_script when your proxy topology is complex. a PAC file gives you per-domain routing logic that a single server address cannot express.
User Experience Policies
These policies control what users see and can change in Chrome:
- BookmarkBarEnabled: Force the bookmarks bar to always show (or always hide). Useful for pointing users at intranet resources.
- BrowserSignin:
0disables browser sign-in entirely,1allows it,2forces it. In regulated environments, disable sign-in to prevent users from syncing corporate browsing data to personal Google accounts. - IncognitoModeAvailability:
1disables incognito mode. Pair this with web filtering policies to prevent users from bypassing content controls. - SpellCheckServiceEnabled: Disables sending text to Google’s spell-check service over the network. relevant in air-gapped or high-security environments.
Managing Chrome via JSON Configuration
While Group Policy works well for traditional Windows environments, modern DevOps teams often prefer JSON-based configuration. Chrome supports this through the ExtensionSettings policy value and through a managed_preferences file deployed to the Chrome installation directory.
Create a chrome_policy.json policy file for common settings:
{
"BrowserSignin": 0,
"DefaultSearchProviderEnabled": true,
"DefaultSearchProviderSearchURL": "https://search.example.com/search?q={searchTerms}",
"HomepageIsNewTabPage": false,
"HomepageLocation": "https://intranet.example.com",
"ShowHomeButton": true,
"PasswordManagerEnabled": false,
"SafeBrowsingProtectionLevel": 2,
"SSLErrorOverrideAllowed": false,
"IncognitoModeAvailability": 1,
"ExtensionSettings": {
"*": {
"installation_mode": "blocked"
},
"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa": {
"installation_mode": "force_installed",
"update_url": "https://clients2.google.com/service/update2/crx"
}
}
}
The ExtensionSettings block above implements a default-deny policy for extensions while force-installing one approved extension. This single policy value replaces the separate ExtensionInstallBlockList, ExtensionInstallAllowlist, and ExtensionInstallForcelist keys. prefer it when you need to manage more than a handful of extensions.
Deploy this file via script or endpoint management tools:
Deploy Chrome policy via JSON to managed_preferences
$policyPath = "$env:ProgramFiles\Google\Chrome\Application\master_preferences"
Copy-Item -Path ".\chrome_policy.json" -Destination $policyPath -Force
Note that master_preferences applies only on the first run for a new profile. For enforced policies that must apply on every run and cannot be overridden by users, use the registry path (HKLM:\SOFTWARE\Policies\Google\Chrome) or Group Policy. Reserve master_preferences for default settings you want to pre-configure but are willing to let users change.
Chrome Browser Cloud Management
For organizations without traditional Active Directory, Chrome Browser Cloud Management (CBCM) provides a cloud-based alternative hosted in the Google Admin console. This service allows you to:
- Enforce policies remotely without on-premises infrastructure
- Deploy extensions to managed browsers
- View reporting dashboards for browser usage and policy compliance
- Set up Chrome enterprise upgrades for paid features like DLP and threat intelligence
Enrolling a browser in CBCM requires setting the CloudManagementEnrollmentToken registry value, which is generated in the Google Admin console:
$chromePath = "HKLM:\SOFTWARE\Policies\Google\Chrome"
if (-not (Test-Path $chromePath)) {
New-Item -Path $chromePath -Force | Out-Null
}
Set-ItemProperty -Path $chromePath -Name "CloudManagementEnrollmentToken" `
-Value "your-enrollment-token-from-admin-console"
Once enrolled, the browser checks in with Google’s policy servers and applies whatever policies you have configured in the Admin console. Registry-based policies still take precedence over cloud policies when both exist. this allows a hybrid model where AD Group Policy handles core settings and CBCM handles cloud-specific reporting and extension management.
The transition from ADMX-based management to cloud management requires careful planning. Most organizations use a hybrid approach during the migration period, running both systems concurrently. A recommended migration sequence:
- Enroll all browsers in CBCM without defining any cloud policies yet
- Validate enrollment via the Admin console browser list
- Migrate non-critical policies (homepage, bookmarks) to cloud first
- Test security-critical policies (extension allowlist, proxy) in a pilot OU before moving them to cloud
- Remove the corresponding registry/GPO entries once cloud policies are confirmed working
Troubleshooting Policy Application
When policies do not apply as expected, systematic debugging helps identify the problem quickly.
chrome://policy
The most useful first step is always to open chrome://policy in the browser on an affected machine. This page lists every active policy, its source (Platform, Cloud, or Merged), and whether it parsed correctly. A red background next to a policy value indicates a configuration error. typically a type mismatch (string where integer is expected) or an invalid JSON value.
Standard Debugging Steps
- Verify ADMX import: Check that
chrome.admxappears in Group Policy Management Console under Administrative Templates. - Check policy precedence: Computer Configuration policies override User Configuration policies. Enforced policies override non-enforced. Closer OUs override parent OUs.
- Review chrome://policy: Navigate to this URL in Chrome to see active policies and any parse errors.
- Enable diagnostic logging: Set
PolicyLoggingLevelto1for verbose output in the Windows Event Viewer under Applications and Services Logs > Google > Chrome.
Run this command to force a policy refresh:
Force Group Policy update on Windows
gpupdate /force
Then check the applied policies:
View Chrome policies via registry
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Google\Chrome" | Format-List
Also check user-level policies
Get-ItemProperty -Path "HKCU:\SOFTWARE\Policies\Google\Chrome" | Format-List
A policy visible in the registry but not appearing in chrome://policy usually indicates an ADMX import problem. A policy in chrome://policy but labeled “Ignored” means a higher-precedence source is overriding it. check whether a cloud policy or a higher-level GPO is setting the same key.
Common Policy Conflicts
| Symptom | Likely Cause | Fix |
|---|---|---|
| Policy appears in registry but not chrome://policy | ADMX not imported or wrong version | Re-import ADMX matching current Chrome version |
| Extension installs despite being blocklisted | User-level policy overriding machine-level | Set policy at Computer Configuration, not User Configuration |
| Proxy settings ignored | Chrome falling back to Windows system proxy | Explicitly set ProxyMode to fixed_servers |
| Cloud policy overriding on-prem GPO | Cloud policies have higher precedence by default | Set PolicyCloudManagementEnabled to false to enforce local-only policies |
Automation with PowerShell
PowerShell scripts can automate Chrome policy deployment across your fleet. The following script deploys a standard set of policies to all Windows computers in an OU:
Deploy Chrome policies to all domain computers in a specific OU
$ou = "OU=Workstations,DC=corp,DC=example,DC=com"
$computers = Get-ADComputer -Filter {OperatingSystem -like "*Windows*"} `
-SearchBase $ou | Select-Object -ExpandProperty Name
$policySettings = @{
"SafeBrowsingProtectionLevel" = 2
"SSLErrorOverrideAllowed" = 0
"IncognitoModeAvailability" = 1
"BrowserSignin" = 0
"PasswordManagerEnabled" = 0
"UpdatePolicy" = 1
"UpdateURLOverride" = "https://internal-updates.example.com/chrome"
}
foreach ($computer in $computers) {
Invoke-Command -ComputerName $computer -ArgumentList $policySettings -ScriptBlock {
param($settings)
$chromePath = "HKLM:\SOFTWARE\Policies\Google\Chrome"
if (-not (Test-Path $chromePath)) {
New-Item -Path $chromePath -Force | Out-Null
}
foreach ($key in $settings.Keys) {
Set-ItemProperty -Path $chromePath -Name $key -Value $settings[$key]
}
Write-Host "Policies applied on $env:COMPUTERNAME"
}
}
This approach works for organizations with PowerShell Remoting enabled and appropriate firewall rules (WinRM port 5985/5986). For environments without PS Remoting, deploy the same logic via a login script GPO or your endpoint management platform (Intune, MECM, Ansible).
For Intune-managed endpoints, use the Settings Catalog in the Endpoint Manager portal. Search for “Google Chrome” in the catalog. Microsoft imports the Chrome ADMX templates and exposes most policies natively. This eliminates the need to deploy a custom ADMX file or manage registry keys directly for Intune-joined machines.
Keeping Templates Current
Chrome releases a new stable version every four weeks. New releases occasionally introduce new policy keys or deprecate old ones. When you upgrade Chrome across your fleet, also check whether a new ADMX bundle is available:
- Download the latest Chrome Enterprise bundle from the Google Chrome Enterprise landing page.
- Compare the new
chrome.admxagainst your currently deployed version by diffing the XML files. - Test any new or changed policies in a non-production OU before updating the central store.
- Update the Central Store and verify Group Policy Management Console reflects the new policy nodes.
Policy documentation for every key is available at chromeenterprise.google/policies. Each entry includes the minimum Chrome version that supports the policy, the data type, allowed values, and notes on deprecated predecessors. bookmark this reference for day-to-day admin work.
Looking Ahead
Chrome group policy templates will continue evolving as Google adds features and responds to enterprise requirements. Key areas to watch in 2026 include expanded AI feature controls (Gemini-powered features in Chrome now have their own policy namespace), tighter integration between CBCM and Google Workspace licensing, and new policies for PassKeys and WebAuthn credential management.
The combination of traditional ADMX policies, JSON configuration, and cloud-based management gives administrators flexibility in how they manage Chrome across their organizations. Choose the approach that best fits your infrastructure: ADMX and registry for traditional AD environments, CBCM for cloud-first or hybrid setups, and Intune Settings Catalog for Microsoft 365-centric organizations. All three can coexist during a transition, with policy precedence ensuring the most authoritative source always wins.
Related Reading
- Chrome ADMX Templates for Windows Server: Enterprise.
- Chrome Enterprise Extension Permissions Policy: A.
- Chrome Enterprise Password Manager Policy: A Practical Guide for Developers
Built by theluckystrike. More at zovo.one
Find the right skill → Browse 155+ skills in our Skill Finder.