Edge For Win7



Edge for Windows Windows 7 Service Pack 1 Windows 8.1 This update is not intended to target Enterprise devices. Specifically, this update targets devices that run Windows 7 SP1 or later versions and Windows 8.1 or later versions that are either Home, Professional, Ultimate, Starter, or Core editions. The new Microsoft Edge is based on Chromium and was released on January 15, 2020. It is compatible with all supported versions of Windows, and macOS. With speed, performance, best in class compatibility for websites and extensions, and built-in privacy and security features, it's the only browser you'll ever need. Try the new Microsoft Edge now. The Chromium-based Microsoft Edge web browser will only be made available on Windows 7 if the following is true: The SHA-2 update from September 23, 2019 or a later SHA-2 update needs to be installed and the system needs to have been restarted at least once. Microsoft Edge is mentioned in the fastest web browser for Windows. The 89.0.774.54 version of Microsoft Edge is provided as a free download on our website. This download was checked by our antivirus and was rated as safe.

Select a download

Before installing, please note:

These virtual machines expire after 90 days. We recommend setting a snapshot when you first install the virtual machine which you can roll back to later. Mac users will need to use a tool that supports zip64, like The Unarchiver, to unzip the files.
The password to your VM is 'Passw0rd!'

View installation instructions

Edge For Win 7 Download

The Microsoft Software License Terms for the Microsoft Edge and IE VMs are included in the release notes and supersede any conflicting Windows license terms included in the VMs. By downloading and using this software, you agree to these license terms.

-->

This article explains how to configure Microsoft Edge on Windows 10 using Mobile Device Management (MDM) by means of ADMX Ingestion. This article also describes:

  • How to create Open Mobile Alliance Uniform Resource Identifier (OMA-URI) for Microsoft Edge policies.
  • How to configure Microsoft Edge in Intune using ADMX ingestion and custom OMA-URI.

Note

This article applies to Microsoft Edge version 77 or later.

Prerequisites

Windows 10, with the following minimum system requirements:

  • Windows 10, version 1903 with KB4512941 and KB4517211 installed
  • Windows 10, version 1809 with KB4512534 and KB4520062 installed
  • Windows 10, version 1803 with KB4512509 and KB4519978 installed
  • Windows 10, version 1709 with KB4516071 and KB4520006 installed

Overview

You can configure Microsoft Edge on Windows 10 using MDM with your preferred Enterprise Mobility Management (EMM) or MDM provider that supports ADMX Ingestion.

Configuring Microsoft Edge with MDM is a two part process:

  1. Ingesting the Microsoft Edge ADMX file into your EMM or MDM provider. See your provider for instructions on how to ingest an ADMX file.

    Note

    For Microsoft Intune, see Configure Microsoft Edge in Intune using ADMX ingestion.

  2. Creating an OMA-URI for a Microsoft Edge policy.

Edge win 7 offline installer

Create an OMA-URI for Microsoft Edge policies

The following sections describe how to create the OMA-URI path and look up and define the value in XML format for mandatory and recommended browser polices.

Before you get started download the Microsoft Edge policy templates file (MicrosoftEdgePolicyTemplates.cab) from the Microsoft Edge Enterprise landing page and extract the contents.

There are three steps for defining the OMA-URI:

Create the OMA-URI path

Use the following formula as a guide for creating the OMA-URI paths.
./Device/Vendor/MSFT/Policy/Config/<ADMXIngestName>~Policy~<ADMXNamespace>~<ADMXCategory>/<PolicyName>

ParameterDescription
<ADMXIngestName>Use 'Edge' or what you defined when ingesting the administrative template. For example, if you used './Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/MicrosoftEdge/Policy/EdgeAdmx', then use 'MicrosoftEdge'.
The <ADMXIngestionName> must match what was used when you ingested the ADMX file.
<ADMXNamespace>Either 'microsoft_edge' or 'microsoft_edge_recommended' depending on whether you're setting a mandatory or recommended policy.
<ADMXCategory>The 'parentCategory' of the policy is defined in the ADMX file. Omit the <ADMXCategory> if the policy isn't grouped (No 'parentCategory' defined).
<PolicyName>The policy name can be found in the Browser policy reference article.

URI path example:

For this example, assume the <ADMXIngestName> node was named “Edge' and you're setting a mandatory policy. The URI path would be:
./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~<ADMXCategory>/<PolicyName>

If the policy isn't in a group (for example, DiskCacheSize) remove '~<ADMXCategory>'. Replace <PolicyName> with the name of the policy, DiskCacheSize. The URI path would be:
./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/DiskCacheSize

If the policy is in a group, follow these steps:

  1. Open msedge.admx with any xml editor.
  2. Search for the policy name you want to set. For example, 'ExtensionInstallForceList'.
  3. Use the value of the ref attribute from the parentCategory element. For example, 'Extensions' from <parentCategory ref=' Extensions'/>.
  4. Replace <ADMXCategory> with the ref attribute value to construct the URI path. The URI path would be:
    /Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Extensions/ExtensionInstallForcelist

Specify the data type

The OMA-URI data type is always “String”.

Set the value for a browser policy

This section describes how to set the value, in XML format, for each data type. Go to Browser policy reference to look up the data type of the policy.

Win7

Note

Edge for win 7 download

For non-Boolean data types, the value always starts with <enabled/>.

Boolean data type

For policies that are Boolean types use <enabled/> or <disabled/>.

Integer data type

The value always needs to start with the <enabled/> element followed by <data value='[decimal value]'/>.

To find the value name and decimal value for a new tab page, use the following steps:

  1. Open msedge.admx with any xml editor.
  2. Search for the <policy> element where the name attribute matches the policy name you want to set. For 'RestoreOnStartup', search for name='RestoreOnStartup'.
  3. In the <elements> node, find the value you want to set.
  4. Use the value in the 'valueName' attribute in the <elements> node. For 'RestoreOnStartup' the 'valueName' is 'RestoreOnStartup'.
  5. Use the value in the 'value' attribute in the <decimal> node. For 'RestoreOnStartup' to open the new tab page the value is '5'.

To open the new tab page on startup use:
<enabled/> <data value='5'/>

List of strings data type

The value always needs to start with the <enabled/> element followed by <data value='[string 1];[string 2];[string 3]'/>.

Note

The 'id=' attribute name isn't the policy name, even though in most cases it matches the policy name. It's the <list> node id attribute value, which is found in the ADMX file.

To find the listID and define the value to block a URL, follow these steps:

Get Edge For Win7

  1. Open msedge.admx with any xml editor.
  2. Search for the <policy> element where the name attribute matches the policy name you want to set. For 'URLBlocklist', search for name='URLBlocklist'.
  3. Use the value in the 'id' attribute of the <list> node for [listID].
  4. The 'value' is a list of URLs separated by a semicolon (;)

For example, to block access to contoso.com and https://ssl.server.com:
<enabled/> <data value='contoso.com;https://ssl.server.com'/>

Dictionary or String data type

The value always needs to start with the <enabled/> followed by <data value='[string]'/> .

To find the textID and define the value set the locale, follow these steps:

  1. Open msedge.admx with any xml editor.
  2. Search for the <policy> element where the name attribute matches the policy name you want to set. For 'ApplicationLocaleValue', search for name='ApplicationLocaleValue'.
  3. Use the value in the 'id' attribute of the <text> node for [textID].
  4. Set the 'value' to the culture code.

To set the locale to 'es-US' with the 'ApplicationLocaleValue' policy:
<enabled/> <data value='es-US'/>

Create the OMA-URI for a recommended policies

Defining the URI path for recommended policies depends on the policy you want to configure.

To define the URI path for a recommended policy

Edge For Win 7 Install

Use the URI path formula (./Device/Vendor/MSFT/Policy/Config/<ADMXIngestName>~Policy~<ADMXNamespace>~<ADMXCategory>/<PolicyName>) and the following steps to define the URI path:

  1. Open msedge.admx with any xml editor.

  2. If the policy you want to configure isn't in a group, skip to step 4 and remove ~<ADMXCategory> from the path.

  3. If the policy you want to configure is in a group:

    • To look up the <ADMXCategory>, search for the policy you want to set. When searching append '_recommended' to the policy name. For example, a search for 'RegisteredProtocolHandlers_recommended” has the following result:

    • Copy the value of the ref attribute from the <parentCategory> element. For 'ContentSettings', copy 'ContentSettings_recommended' from <parentCategory ref=' ContentSettings_recommended'/>.

    • Replace <ADMXCategory> with the ref attribute value to construct the URI path in the URI path formula.

  4. The <PolicyName> is the name of the policy with '_recommended' appended to it.

Edge For Win 7

OMA-URI path examples for recommended policies

The following table shows examples of OMA-URI paths for recommended policies.

PolicyOMA-URI
RegisteredProtocolHandlers./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~ContentSettings_recommended/RegisteredProtocolHandlers_recommended
PasswordManagerEnabled./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~PasswordManager_recommended/PasswordManagerEnabled_recommended
PrintHeaderFooter./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~Printing_recommended/PrintHeaderFooter_recommended
SmartScreenEnabled./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~SmartScreen_recommended/SmartScreenEnabled_recommended
HomePageLocation./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~Startup_recommended/HomepageLocation_recommended
ShowHomeButton./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~Startup_recommended/ShowHomeButton_recommended
FavoritesBarEnabled./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge_recommended~/FavoritesBarEnabled_recommended

OMA-URI examples

Edge For Win 7 Pro

OMA-URI examples with their URI path, type, and an example value.

Boolean data type examples

ShowHomeButton:

FieldValue
NameMicrosoft Edge: ShowHomeButton
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Startup/ShowHomeButton
typeString
Value<enabled/>

DefaultSearchProviderEnabled:

FieldValue
NameMicrosoft Edge: DefaultSearchProviderEnabled
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~DefaultSearchProvider/DefaultSearchProviderEnabled
typeString
Value<disable/>

Integer data type examples

AutoImportAtFirstRun:

FieldValue
NameMicrosoft Edge: AutoImportAtFirstRun
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/AutoImportAtFirstRun
typeString
Value<enabled/><data value='1'/>

DefaultImagesSetting:

FieldValue
NameMicrosoft Edge: DefaultImagesSetting
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~ContentSettings/DefaultImagesSetting
typeString
Value<enabled/><data value='2'/>

DiskCacheSize:

FieldValue
NameMicrosoft Edge: DiskCacheSize
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge/DiskCacheSize
typeString
Value<enabled/><data value='1000000'/>

List of strings data type examples

RestoreOnStartupURLS:

FieldValue
NameMicrosoft Edge: RestoreOnStartupURLS
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Startup/RestoreOnStartupURLs
TypeString
Value<enabled/><data value='1&#xF000;http://www.bing.com'/>
For multiple list items: <enabled/><data value='1&#xF000;http://www.bing.com&#xF000;2&#xF000;http://www.microsoft.com'/>

Edge For Win 7 64

ExtensionInstallForcelist:

FieldValue
NameMicrosoft Edge: ExtensionInstallForcelist
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Extensions/ExtensionInstallForcelist
TypeString
Value<enabled/><data value='1&#xF000;gbchcmhmhahfdphkhkmpfmihenigjmpp;https://extensionwebstorebase.edgesv.net/v1/crx'/>

Dictionary and String data type example

ProxyMode:

FieldValue
NameMicrosoft Edge: ProxyMode
OMA-URI./Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~ProxyMode/ProxyMode
TypeString
Value<enabled/><data value='auto_detect'/>

Configure Microsoft Edge in Intune using ADMX ingestion

The recommended way to configure Microsoft Edge with Microsoft Intune is to use the Administrative Templates profile as described in Configure Microsoft Edge policy settings with Microsoft Intune. If you want to evaluate a policy that is currently not available in the Microsoft Edge Administrative Templates in Intune you can configure Microsoft Edge using custom settings for Windows 10 devices in Intune.

This section describes how to:

Important

As a best practice, don’t use a custom OMA-URI profile and an Administration templates profile to configure the same Microsoft Edge setting in Intune. If you deploy the same policy using both a custom OMA-URI and an Administrative template profile, but with different values, users will get unpredictable results. We strongly recommend removing your OMA-URI profile before using an Administration templates profile.

Ingest the Microsoft Edge ADMX file into Intune

This section describes how to ingest the Microsoft Edge administrative template (msedge.admx file) into Intune.

Warning

Don't modify the ADMX file before ingesting the file.

To ingest the ADMX file, follow these steps:

  1. Download the Microsoft Edge policy templates file (MicrosoftEdgePolicyTemplates.cab) from the Microsoft Edge Enterprise landing page and extract the contents. The file that you want to ingest is msedge.admx.

  2. Sign in to the Microsoft Azure portal.

  3. Select Intune from All Services, or search for Intune in the portal search box.

  4. From Microsoft Intune - Overview, select Device configuration | Profiles.

  5. On the top command bar, select + Create profile.

  6. Provide the following profile information:

    • Name: Enter a descriptive name. For this example, 'Microsoft Edge ADMX ingested configuration'.
    • Description: Enter an optional description for the profile.
    • Platform: Select 'Windows 10 and later'
    • Profile type: Select 'Custom'
  7. On Custom OMA-URI Settings, click Add to add an ADMX ingestion.

  8. On Add Row, provide the following information:

    • Name: Enter a descriptive name. For this example, use 'Microsoft Edge ADMX ingestion'.

    • Description: Enter an optional description for the setting.

    • OMA-URI: Enter './Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Edge/Policy/EdgeAdmx'

    • Data type: Select 'String'

    • Value: This input area appears after you select the Data type. Open the msedge.admx file from the Microsoft Edge policy templates file you extracted in step 1. Copy ALL the text from the msedge.admx file and paste it in the Value text area shown in the following screenshot.

    • Click OK.

  9. On Custom OMA-URI Settings, click OK.

  10. On Create profile, click Create. The next screenshot shows information about the newly created profile.

[!NOTE]> You can use the preceding steps to ingest the msedgeupate.admx policy template file.-->

Set a policy using custom OMA-URI in Intune

Note

Before using the steps in this section you must complete the steps described in Ingest the Microsoft Edge ADMX file into Intune.

Edge for win 7 32 bit
  1. Sign in to the Microsoft Azure portal.

  2. Select Intune from All Services, or search for Intune in the portal search box.

  3. Go to Intune>Device configuration>Profiles.

  4. Select the 'Microsoft Edge ADMX ingested configuration' profile or the name you used for the profile.

  5. To add Microsoft Edge policy settings, you have to open Custom OMA-URI Settings. Under Manage, click Properties, and then click Settings.

  6. On Custom OMA-URI Settings, click Add.

  7. On Add Row, provide the following information:

    • Name: Enter a descriptive name. We suggest using the policy name you want to configure. For this example, use 'ShowHomeButton'.

    • Description (Optional): Enter a description for the setting.

    • OMA-URI: Enter the OMA-URI for the policy. Using the for 'ShowHomeButton' policy as an example, use this string: './Device/Vendor/MSFT/Policy/Config/Edge~Policy~microsoft_edge~Startup/ShowHomeButton'

    • Data type: Select the policy settings data type. For the 'ShowHomeButton' policy, use 'String'

    • Value: Enter the setting that you want to configure for the policy. For 'ShowHomeButton' example, enter '<enabled/>'. The following screenshot shows the settings for configuring a policy.

    • Click OK.

  8. On Custom OMA-URI Settings, click OK.

  9. On the 'Microsoft Edge ADMX ingested configuration - Properties' profile (or the name you used), click Save.

After the profile is created and the properties set, you have to assign the profile in Microsoft Intune.

Confirm that the policy was set

Use the following steps to confirm that the Microsoft Edge policy is using the profile you created. (Give Microsoft Intune time to propagate the policy to a device you assigned in the 'Microsoft Edge ADMX ingested configuration' profile example.)

Download Edge For Windows 7

  1. Open Microsoft Edge and go to edge://policy.
  2. On the Policies page, see if the policy you set in the profile is listed.
  3. If your policy isn't shown, see Diagnose MDM failures in Windows 10 or Troubleshoot a policy setting.

Troubleshoot a policy setting

If a Microsoft Edge policy isn’t taking effect, try the following steps:

Open the edge://policy page on the target device (a device you assigned the profile to in Microsoft Intune) and search for the policy. If the policy isn’t on the edge://policy page, try the following:

  • Check that the policy is in the registry and is correct. On the target device open the Windows 10 Registry Editor (Windows key + r, enter “regedit” and then press Enter.) Check that the policy is correctly defined in the SoftwarePolicies MicrosoftEdge path. If you don’t find the policy in the expected path, then the policy wasn’t pushed to the device correctly.
  • Check that the OMA-URI path is correct, and the value is a valid XML string. If either of these are incorrect the policy won’t be pushed to the target device.

For more trouble shooting tips, see Set up Microsoft Intune and Sync devices.

See also