Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Configuration policy for Microsoft Edge for Business Reporting Connectors
Supported versions
- On Windows since 139 or later
Description
Defines the Microsoft Edge for Business Reporting Connectors service settings that apply when a security event occurs in Microsoft Edge. These events include negative verdicts from Data Loss Prevention Connectors, password reuse, navigation to unsafe pages, and other security-sensitive actions.
The service_provider field specifies the reporting service provider. The enabled_event_names field lists the security events enabled for that provider.
This policy requires additional setup to take effect. For configuration guidance, see https://go.microsoft.com/fwlink/?linkid=2325446.
Supported features
- Can be mandatory: Yes
- Can be recommended: No
- Dynamic Policy Refresh: Yes
- Per Profile: Yes
- Applies to a profile that is signed in with a Microsoft account: No
Data type
- Dictionary
Windows information and settings
Group Policy (ADMX) info
- GP unique name: OnSecurityEventEnterpriseConnector
- GP name: Configuration policy for Microsoft Edge for Business Reporting Connectors
- GP path (Mandatory): Administrative Templates/Microsoft Edge
- GP path (Recommended): N/A
- GP ADMX file name: MSEdge.admx
Example value
[{"enabled_event_names": ["passwordChangedEvent", "sensitiveDataEvent"], "enabled_opt_in_events": [{"name": "loginEvent", "url_patterns": ["*"]}, {"name": "passwordBreachEvent", "url_patterns": ["example.com", "other.example.com"]}], "service_provider": "microsoft"}]
Registry settings
- Path (Mandatory): SOFTWARE\Policies\Microsoft\Edge
- Path (Recommended): N/A
- Value name: OnSecurityEventEnterpriseConnector
- Value type: REG_SZ
Example registry value
[{"enabled_event_names": ["passwordChangedEvent", "sensitiveDataEvent"], "enabled_opt_in_events": [{"name": "loginEvent", "url_patterns": ["*"]}, {"name": "passwordBreachEvent", "url_patterns": ["example.com", "other.example.com"]}], "service_provider": "microsoft"}]
Expanded example registry value
[
{
"enabled_event_names": [
"passwordChangedEvent",
"sensitiveDataEvent"
],
"enabled_opt_in_events": [
{
"name": "loginEvent",
"url_patterns": [
"*"
]
},
{
"name": "passwordBreachEvent",
"url_patterns": [
"example.com",
"other.example.com"
]
}
],
"service_provider": "microsoft"
}
]