Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune

Let’s discuss Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune. Automatic HTTPS Upgrades Policy in Microsoft Intune help to Microsoft Edge tries to upgrade HTTP navigations to HTTPS whenever possible to improve security.

This policy is as of Microsoft Edge version 120. Navigations to captive portals, IP addresses, and non-unique hostnames are excluded from automatic upgrades. As you know that HTTPS encrypts data transferred between the user’s browser and the web server.

HTTPS prevents attackers from snooping on sensitive information like login credentials, personal data, or financial details. Enabling this policy significantly reduces the risk of Man-in-the-Middle (MitM) Attacks. For example, when a user is on an insecure public Wi-Fi network (e.g., in a café or airport), this policy is particularly critical.

With this policy, Admins can centrally manage and enforce a higher level of security across all corporate devices using Intune. Admins have full control over the organisation’s Microsoft browser. The policy provides a balance of security and usability.

Patch My PC

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune

Admins can easily configure this policy to protect the organisation from various cyber threats, including man-in-the-middle attacks, credential theft, and data leakage, which can result in financial loss and reputational damage.

Automatic HTTPS Upgrades Policy

By signing in Microsoft Intune admin center, you can start configuring HTTPS Warning Page Policy. Open the Microsoft Intune Admin center. Go to Devices > Configuration > +Create >+ New Policy.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.1
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.1

Selecting Profile and Platform

After that, you have to select platform and profile. It is important to select the platform and profile before configuring the policy. Here, I selected  Windows 10 and later as the Platform and Settings catalog as the profile type. Then click on the Create button. Then you will get the basic tab.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.2
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.2

Basic Details

Adding basic details is necessary and important in policy creation. It gives an identity for the settings you will select to create the policy. The policy name and description is useful for identifying the policy purpose. After adding this, click on the Next button.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.3
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.3

Configure the settings from Settings Picker

Using the configuration settings tab, you can access the specific settings. For this you have to click on the +Add settings hyperlink to get the settings picker. From the Settings Picker, I choose Microsoft Edge category and select Allow users to proceed from the HTTPS warning page settings. Then you can close settings picker.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.4
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.4

Disable Automatic HTTPS Upgrades Policy

Some organisations still use older internal web applications or services that only support HTTP. Forcing an HTTPS upgrade on these applications would cause them to fail or become inaccessible, disrupting business operations.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.5
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.5

Enable Automatic HTTPS Upgrades Policy

This policy helps to protect against Man-in-the-Middle (MitM) Attacks and improve security. Enabling automatic upgrades ensures that users are always using the most secure connection available. If you want to disable the Click on the Next button.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.6
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.6

Scope Tags for Policy

With scope tags, you create a restriction to the visibility of the HTTPS Warning Page. It also helps to organise resources. Here, I would like to skip this section, because it is not mandatory. Click on the Next button.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.7
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.7

Assigning Specific Groups

To assign the policy to specific groups, you can use the Assignment Tab. Here I click, +Add groups option under Included groups. I choose a group from the list of groups and click on the Select button. Again, I click on the Select button to continue.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.8
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.8

Review + Create Tab for Policy Creation

Review + Create Tab helps you recheck all the details of the policy you entered on all the tabs. After verifying all the details, click on the Create Button. After creating the policy, you will get a success message.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.9
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.9

Monitoring Status

After the policy is created, you can check the status of the policy on the Intune Portal. This status shows the policy succeeded or not. Open the Intune Portal. Go to Devices > Configuration > Search for the Policy. Here, the policy shows as successful.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.10
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.10

Event Viewer Details

Event Viewer helps you check the client side and verify the policy status. Open the Client device and open the Event Viewer. Go to Start > Event Viewer. Navigate to Logs: In the left pane, go to Application and Services Logs > Microsoft >  Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin

  • Filter for Event ID 814: This will help you quickly find the relevant logs.
Event ID Details
MDM PolicyManager: Set policy string, Policy: (HttpsUpgradesEnabled), Area:
(microsoft_edgev136~Policy~microsoft_edge), EnrollmentID requesting merge:
(EB427D85-802F-46D9-A3E2-D5B414587F63), Current User: (Device), String: (),
Enrollment Type: (0x6), Scope: (0x0).
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Table.1
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.11
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.11

Removing the Assigned Group from these Settings

If you want to remove the Assigned group from the policy, it is possible from the Intune Portal. To do this, open the Policy on Intune Portal and edit the Assignments tab and the Remove Policy.

To get more detailed information, you can refer to our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.12
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.12

How to Delete HTTPS Warning Page Policy

You can easily delete the Policy from the Intune Portal. From the Configuration section, you can delete the policy. It will completely remove it from the client devices.

For detailed information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune - Fig.13
Enforce Automatic HTTPS Upgrades Policy for Microsoft Edge for Secure Connections using Intune – Fig.13

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM,  Windows, Cloud PC,  Windows, Entra, Microsoft Security, Career, etc.

Leave a Comment