Hi, there today with a new topic Allow or Block Audio Capture Policy in MS Edge Browser using M365 Admin Center. As we all know that Edge browser is one of the significant browsers that uses in many organizations. With the help of MS365, they are providing a list of policies for oragnizations.
So we deploying the Audio Capture Allowed Policy in MS Edge Browser using M365 Admin Center. We know the importance of Audio in our life if we are communicating or attend meetings the Audio is the one of the important part right? When it comes for the Microsoft Edge it can be access users Microphone through settings.
Audio Capture Allowed policy, which means that if websites can record sound from a user’s device. Through the Microsoft 365 Admin Center, IT admins can enable or disable this policy to improve the privacy, security, and user experience across the organization.
This control enhances security by preventing untrusted sites from accessing voice data, improves privacy by giving users more control over their microphone settings. So in this post lets discuss how this policy to be deployed and how to be enabled through the policy deployment steps.
Table of Contents
What Happens when the Audio Capture Access Policy is Disabled in the Browser?
When the audio capture access policy is disabled, users are not prompted for permission, and only the websites listed in the AudioCaptureAllowedUrls are allowed to access the audio capture devices. All other sites are denied access without prompting the user.
Audio Capture Allowed Policy in MS Edge Browser
We have discussed in detail about enabling and disabling the Audio Capture Allowed policy in the Microsoft Edge browser. Now, let’s see how this policy can be deployed through the Microsoft 365 Admin Center.
First, you need to sign in to the Microsoft 365 Admin Center. Then, navigate to Settings, select Microsoft Edge, and click on Configuration Policies. In the Configuration Policies section, select the + Create Policy option.
- Enable or Disable Audio Sandbox to Run Policy in MS Edge Browser using M365 Admin Center
- Enable Disable Screenshot Policies in Edge using Microsoft 365 Admin Center Policy.
- How to Enable or Disable Voice Access in Windows 11
Basics
The next step is Basics. In this step, you need to enter basic details such as the name, description, policy type, and platform. Here, you only need to focus on the name, but adding a description is helpful to avoid future confusion, as it helps you understand why the policy was created.
The policy type is set to Intune, and the platform is Windows 10 and 11 and these are selected by default, so you don’t need to change them. Just enter the name and description, then click Next.
Settings
After the Basics step, you will move on to the Settings step. Here, you need to select the settings for your policy. You can do this in 2 ways: either by clicking the blue “Add settings” button or by clicking the +Add settings option. Both options perform the same function. Clicking Add settings allows you to choose and configure the specific settings you want to include in your policy.
Configure Settings
Now, you have to configure the settings. You can either copy and paste the policy name into the search bar or browse and select the policy by category. After entering the policy name in the search bar, you will see two tabs: Value and More Details.
- In the Value tab, you will find a drop-down menu with options to Enable or Disable the policy.
- Here, I selected Enabled. After making your selection, click on Select.
More Details
The More Details tab is very important. If you don’t know much about the policy, this tab provides a brief description that helps you understand its purpose. If you are ever deploying a policy, do not skip this section, as it can be very helpful for more clarity in that policy purpose.
Enabled | Disabled |
---|---|
If you enable this policy or don’t configure it (the default setting), the user is prompted for audio capture access except from the URLs in the “AudioCaptureAllowedUrls” list. These listed URLs are granted access without prompting. | If you disable this policy, the user is not prompted, and audio capture is accessible only to the URLs configured in “AudioCaptureAllowedUrls”. |
Note: This policy affects all types of audio inputs, not only the built-in microphone.
Extensions
The next step is Extensions. This step allows you to include various extensions in your policy, such as Edge add-ons, sidebar apps, and more. This step is optional, so you can choose to skip it if it’s not needed. In this case, I skipped this section and continued to the next step.
Assignments
The next section is the Assignments section. This is a very important step in policy creation. In this section, administrators can select a specific group to which the policy will be applied. For example, I selected the Test HTMD Policy group. After selecting the group, a success message will appear. Then, click Next to continue the procedure.
Finish
The next step is Finish, and this is the last and final stage of policy creation. In this section, you can review all the details you have entered, such as the basic information, settings, assignment details, and more. If anything is missing or you want to make changes, you can go back to the previous steps and edit them easily.
- After reviewing everything, click on the Review and Create button, and the policy will be created.
- Always remember that there is an 8-hour waiting period for the policy to be deployed to the specified group.
Monitoring Status
After creating the policy, the biggest concern is whether the policy has been deployed correctly or not, right? Confirming that the policy has been successfully deployed is very important. For this, you can use the Microsoft Intune Admin Center.
First, sign in to the Microsoft Intune Admin Center. Then, go to Devices > Configuration Policies. In the Configuration policies section, search for the policy you created. In my case, I named the policy Audio Capture Allowed, so I searched for that name in the search bar.
- Once you find the policy, click on it. You will then see the device check-in status.
- As shown in my screenshot below, the status shows that the policy has succeeded.
Client Side Verification
After checking the device status, you can also confirm client-side verification using the Event Viewer. To do this, first open Event Viewer, then navigate to the following path:
Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider.
In that folder, click on Admin to review events related to the client side. Here, you should focus on Event ID 813 or 814. In my case, I found the result under Event ID 814. This event provides confirmation that the policy has been applied successfully on the client device.
- If you are facing difficulties to find the Event ID result from the list, you can user the Filter current log option.
Policy Details |
---|
MDM PolicyManager: Set policy string, Policy: (AudioCaptureAllowed), Area: (microsoft_edge~Policy~microsoft_edge), EnrollmentID requesting merge: (B1E9301C-8666-412A- BA2F-3BF8A55BFA62), Current User: (Device), String: (), Enrollment Type: (0x6), Scope: (0x0). |
Need Further Assistance or Have Technical Questions?
Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.
Author
Anoop C Nair has been a Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM, Windows, Cloud PC, Windows, Entra, Microsoft Security, Career, etc.