


Developers must list what rights and access their extensions need.

Understand extension permissionsĮxtensions can require rights to make changes on a device or a web page to run properly. Using this model, you can decide which rights and permissions you want to allow extensions to use on your computers and devices, and then implement a global policy that allows or block extensions based on your requirements. However, Microsoft Edge also lets you manage the permissions requested by extensions. The traditional model for managing extensions uses the allowlist and blocklist approach for specific extensions. Allowlist or blocklist extensions to allow the least amount of rights needed for your users to do their work.Force-install extensions on your users' devices so they have tools that they need to be productive.Block or allow extensions on users’ computers based on your data protection policies.How much user or corporate data is stored on my users’ devices?Īs you answer these questions, you can use the granular policies that Microsoft Edge provides to:.Do some extensions ask for overly broad permissions, which could go against my company’s data security policies?.What regulations and compliance measures do I need to adhere to?.An effective security strategy involves asking the right questions for your enterprise and how extensions can fit your company’s needs. Your users need access to certain apps, sites, and extensions to do their jobs while at the same time protecting users and company data. Things to consider when managing extensions Create a web store to host Microsoft Edge extensions.Options using group policies to manage extensions. Use group policies to manage Microsoft Edge extensions.Create a strategy to manage extensions and set up administrative templates required for managing the browser. Manage Microsoft Edge extensions in the enterprise.The series consists of the following articles: This series walks through the different options and helps you pick the best method for managing extensions. This article is the first in a series that that helps admins manage extensions to provide a safe and productive experience for their users. Manage access to user and company data.Keep extensions that users need to do their job.Prevent bad apps and extensions from being installed.Organizations want to protect corporate and user data and evaluate browser extensions to ensure that they’re safe and relevant to their enterprise. This article applies to Microsoft Edge version 77 or later.
