Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Use these procedures to roll out the Microsoft Purview extension for Chrome.
Tip
Get started with Microsoft Security Copilot to explore new ways to work smarter and faster using the power of AI. Learn more about Microsoft Security Copilot in Microsoft Purview.
Note
The Microsoft Purview extension for Chrome only works on Windows devices. You don't need the extension to enforce data loss prevention on macOS devices.
Before you begin
To use the Microsoft Purview extension for Chrome, you must onboard the device into Endpoint data loss prevention (DLP). Review these articles if you're new to DLP or Endpoint DLP:
- Learn about the Microsoft Purview extension for Chrome
- Learn about Microsoft Purview Data Loss Prevention
- Create and Deploy data loss prevention policies
- Learn about Endpoint data loss prevention
- Get started with Endpoint data loss prevention
- Onboarding tools and methods for Windows 10/11 devices
- Configure device proxy and internet connection settings for Information Protection
- Using Endpoint data loss prevention
Licensing
For information on licensing, see
- Your organization must be licensed for Endpoint DLP.
- Your devices must run Windows 10 x64 (build 1809 or later).
- The device must have Antimalware Client version 4.18.2202.x or later. Check your current version by opening the Windows Security app, select the Settings icon, and then select About.
Permissions
You can view data from Endpoint DLP in Activity explorer. Seven roles grant permission to view and interact with the activity explorer. The account you use to access the data must be a member of at least one of these roles.
- Global administrator
- Compliance admin
- Security admin
- Compliance data admin
- Global reader
- Security reader
- Reports reader
Important
Use roles with the fewest permissions to improve security for your organization. Global Administrator is a highly privileged role that you should only use in scenarios where a lesser privileged role can't be used.
Roles and role groups
You can use roles and role groups to fine tune your access controls.
Here's a list of applicable roles. To learn more about them, see Permissions in the Microsoft Purview portal.
- Information Protection Admin
- Information Protection Analyst
- Information Protection Investigator
- Information Protection Reader
Here's a list of applicable role groups. To learn more about them, see Permissions in the Microsoft Purview portal.
- Information Protection
- Information Protection Admins
- Information Protection Analysts
- Information Protection Investigators
- Information Protection Readers
Overall installation workflow
Deploying the extension is a multistage process. You can install it on one machine at a time, or you can use Microsoft Intune or Group Policy for organization-wide deployments.
- Prepare your devices.
- Basic Setup Single Machine Selfhost
- Deploy using Microsoft Intune
- Deploy using Group Policy
- Test the extension
- Use the Alerts Management Dashboard to view Chrome DLP alerts
- Viewing Chrome DLP data in activity explorer
Prepare infrastructure
If you're rolling out the extension to all your monitored Windows 10/11 devices, you should remove Google Chrome from the unallowed app and unallowed browser lists. For more information, see Unallowed browsers. If you're only rolling it out to a few devices, you can leave Chrome on the unallowed browser or unallowed app lists. The extension bypasses the restrictions of both lists for those computers where it's installed.
Important
If you configure a Chrome NativeMessageBlocklist, you must configure a NativeMessageAllowlist that includes the Chrome extension.
Prepare your devices
- Use the procedures in these articles to onboard your devices:
Important
Microsoft Purview upgraded Purview Chrome extension to Manifest V3. If you already have Purview Chrome extension installed, you should see automatic upgrade on your machine to 3.0.0.239 or higher.
Basic Setup Single Machine Selfhost
This is the recommended method.
Go to Microsoft Purview Extension - Chrome Web Store (google.com).
Install the extension by following the instructions on the Chrome Web Store page.
Deploy using Microsoft Intune
Use this setup method for organization-wide deployments.
Microsoft Intune Force Install Steps
Using the settings catalog, follow these steps to manage Chrome extensions:
Sign in to the Microsoft Intune admin center.
Go to Configuration Profiles.
Select Create Profile.
Select Windows 10 and later as the platform.
Select Settings catalog as the profile type.
Select Custom as the template name.
Select Create.
Enter a name and optional description on the Basics tab and select Next.
Select Add settings on the Configuration settings tab.
Select Google > Google Chrome > Extensions.
Select Configure the list of force-installed apps and extensions.
Change the toggle to Enabled.
Enter the following value for the extensions and app IDs and update URL:
echcggldkblhodogklpincgchnpgcdco;https://clients2.google.com/service/update2/crx.Select Next.
Add or edit scope tags on the Scope tags tab as needed and select Next.
Add the required deployment users, devices, and groups on the Assignments tab and select Next.
Add applicability rules on the Applicability Rules tab as required and select Next.
Select Create.
Deploy by using Group Policy
If you don't want to use Microsoft Intune, you can use group policies to deploy the extension across your organization.
Add the Chrome extension to the ForceInstall list
In the Group Policy Management Editor, go to your OU.
Expand the following path: Computer/User configuration > Policies > Administrative templates > Classic administrative templates > Google > Google Chrome > Extensions. This path might vary depending on your configuration.
Select Configure the list of force-installed extensions.
Right-click and select Edit.
Select Enabled.
Select Show.
Under Value, add the following entry:
echcggldkblhodogklpincgchnpgcdco;https://clients2.google.com/service/update2/crxSelect OK and then Apply.
Test the extension
Upload to cloud service, or access by unallowed browsers Cloud Egress
- Create or get a sensitive item and try to upload a file to one of your organization’s restricted service domains. The sensitive data must match one of our built-in Sensitive Info Types, or one of your organization’s sensitive information types. You should get a DLP toast notification on the device you're testing from that shows that this action isn't allowed when the file is open.
Simulate other DLP scenarios in Chrome
Now that you removed Chrome from the disallowed browsers/apps list, you can run simulation scenarios to confirm that the behavior meets your organization’s requirements:
- Copy data from a sensitive item to another document using the Clipboard
- To test, open a file that is protected against copy to clipboard actions in the Chrome browser and attempt to copy data from the file.
- Expected result: A DLP toast notification showing that this action isn't allowed when the file is open.
- Print a document
- To test, open a file that is protected against print actions in the Chrome browser and attempt to print the file.
- Expected result: A DLP toast notification showing that this action isn't allowed when the file is open.
- Copy to USB Removable Media
- To test, try to save the file to a removable media storage.
- Expected result: A DLP toast notification showing that this action isn't allowed when the file is open.
- Copy to Network Share
- To test, try to save the file to a network share.
- Expected result: A DLP toast notification showing that this action isn't allowed when the file is open.
Use the Alerts Management Dashboard to view Chrome DLP alerts
Open the Data loss prevention page in the Microsoft Purview portal and select Alerts.
Refer to the procedures in Get started with the data loss prevention Alerts dashboard and Investigate data loss incidents with Microsoft Defender XDR to view alerts for your Endpoint DLP policies.
Viewing Chrome DLP data in activity explorer
Open the Microsoft Purview portal > Information protection > Explorers > Activity explorer.
Follow the procedures in Get started with Activity explorer to access and filter all the data for your Endpoint devices.
Chrome Purview extensions unsupported websites
The Chrome extension doesn't support these websites:
- app.textcortex.com
- copilot.microsoft.com
- www.virustotal.com
Known issues and limitations
- Incognito mode isn't supported and must be disabled.
Next steps
After you onboard devices and view the activity data in Activity explorer, you're ready to move on to your next step where you create DLP policies that protect your sensitive items.
See also
- Learn about Endpoint data loss prevention
- Using Endpoint data loss prevention
- Learn about data loss prevention
- Create and Deploy data loss prevention policies
- Get started with Activity explorer
- Microsoft Defender for Endpoint
- Onboarding tools and methods for Windows 10 machines
- Microsoft 365 subscription
- Microsoft Entra joined devices
- Download the new Microsoft Edge based on Chromium