How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script

In this blog post, I am going to explain how to install Microsoft Defender Browser Protection Extension using Microsoft Intune PowerShell Script. Microsoft Defender Browser Protection is a valuable extension for Google Chrome and Microsoft Edge that enhances web security by protecting users from malicious websites and phishing attacks.

For organizations using Microsoft Intune, deploying this extension via PowerShell script ensures a consistent and automated rollout across managed devices, helping to enforce security standards and improve endpoint protection. I’ll try to demostate this feature with Google Chrome Browser Extenstion.

Using a PowerShell script, Intune/IT Admins can silently add the Microsoft Defender Browser Protection extension by writing registry keys that configure the browser to force-install the extension. This method supports both Chrome and Edge Chromium browsers and is commonly used when group policies or ADMX templates are not ideal for cloud-managed devices. By pushing the script via Intune, it simplifies deployment at scale.

Once the script is uploaded as a PowerShell Platform script in Intune, it runs on target devices and configures the necessary settings without user interaction. This approach ensures compliance and eliminates the risk of users disabling or removing the extension. It’s a practical and effective way to secure web browsing across an enterprise environment using Microsoft Defender technology.

Patch My PC
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 1
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 1

Why Microsoft Defender Browser Protection Extension is Require

Here’s a table outlining why the Microsoft Defender Browser Protection Extension is required, highlighting its key benefits and use cases. This extension is a critical part of a defense-in-depth strategy, complementing antivirus, firewall, and endpoint protection solutions.

ReasonDescription
Phishing ProtectionBlocks known phishing sites to prevent credential theft and data breaches.
Malware Site BlockingPrevents access to websites that distribute malware or exploit kits.
SmartScreen IntegrationLeverages Microsoft SmartScreen intelligence to detect unsafe URLs in real time.
Browser-Level DefenseProvides an additional security layer directly within Chrome or Edge browsers.
Policy EnforcementEnsures consistent security posture across all managed devices via Intune.
Reduced User RiskMinimizes chances of users clicking on malicious links or downloading threats
Cloud-Managed SecurityIdeal for remote/hybrid environments where on-prem GPOs are not applicable.
Lightweight and Non-IntrusiveEasy to deploy with minimal system impact and no disruption to user workflows.
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script . Table. 1

Create a Platform Script in Intune to Install Microsoft Defender Browser Protection Extension

Follow these steps to install the Microsoft Defender Browser Protection Extension using the Intune PowerShell Script. I will be using the Platform script to configure it. Log in to the Microsoft Intune Admin Center using your admin credentials.

  • Navigate to Devices  Windows > Scripts and remediations
  • Click on Platform scripts +Add
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 2
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 2

In the Basics details pane, we can name the PowerShell scriptMicrosoft Defender Browser Protection for Google Chrome” If necessary, provide a brief description of the script and click Next.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 3
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 3

Write a PowerShell Script to Install the Microsoft Defender Browser Protection Extension

Let’s write a concise PowerShell script from scrach to install the Microsoft Defender Browser Protection extension for Google Chrome, which enhances your browsing security. Save the script in a .ps1 file format.

###############################################################################

#Microsoft Defender Browser Protection - Google Chrome Browser Extension
#Author : Vaishnav K
#LinkedIn : https://www.linkedin.com/in/vaishnav-k-957b0589/ 
#Website : https://www.anoopcnair.com/author/vaishnavkuruvaikandy

###############################################################################

# Define extension ID and update URL
$ExtensionId = "bkbeeeffjjeopflfhgeknacdieedcoml"
$UpdateURL = "https://clients2.google.com/service/update2/crx"
$ExtensionValue = "$ExtensionId;$UpdateURL"
$RegPath = "HKLM:\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist"

# Ensure the main Chrome policy key exists
if (-not (Test-Path "HKLM:\SOFTWARE\Policies\Google\Chrome")) {
    New-Item -Path "HKLM:\SOFTWARE\Policies\Google\Chrome" -Force | Out-Null
}

# Create key if not present
if (-not (Test-Path $RegPath)) {
    New-Item -Path $RegPath -Force | Out-Null
    Write-Host "Created registry path: $RegPath"
}

# Check for existing values
$existing = Get-ItemProperty -Path $RegPath
$matchFound = $false

foreach ($property in $existing.PSObject.Properties) {
    if ($property.Value -eq $ExtensionValue) {
        $matchFound = $true
        Write-Host "Extension already present in registry under key: $($property.Name)"
        break
    }
}

# Add only if not found
if (-not $matchFound) {
    $index = 1
    while ($existing.PSObject.Properties.Name -contains "$index") {
        $index++
    }

    New-ItemProperty -Path $RegPath -Name "$index" -Value $ExtensionValue -PropertyType String -Force
    Write-Host "Added extension to registry with key $index"
}

Note! I’ve uploaded the PowerShell Script to my GitHub Repo, so feel free to check it out for your needs. Download from here : MicrosoftDefenderBrowserProtection_Google Chrome_New.ps1

In the Script settings pane, we can set the configurations according to our requirements. The first option is mandatory, we must browse and select our saved PS Script here.

  • Script location – Browse and select the saved script MicrosoftDefenderBrowserProtection_Google Chrome.ps1
  • Run this script using the logged on credentials – No
  • Enforce script signature check – No
  • Run script in 64 bit PowerShell Host – Yes
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 4
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 4

On the next page, keep the default scope tags. If any custom scope tags are available based on your requirements, you can select them for this script deployment.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 5
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 5

Click on Next and assign the script to HTMD – Test Computers. You can click Add groups and select the desired device group in the Included groups section.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 6
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 6

On the Review + Add pane, thoroughly check all the settings you have defined for Microsoft Defender Browser Protection for Google Chrome. Once you confirm everything is correct, select Create to implement the changes.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 7
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 7

Monitor the Microsoft Defender Browser Protection for Google Chrome Deployment

This Intune PowerShell Script has been deployed to the Microsoft Entra ID group (HTMD – Test Computers). The policy will take effect as soon as possible once the device is synced. To monitor the policy deployment status from the Intune Portal, follow the steps below.

  • Navigate to Devices > Windows > Scripts and remediations > Platform scripts

Search for the “Microsoft Defender Browser Protection for Google Chrome” Script. The deployment status for this script can be seen under the Overview status. We can see that both the Device and User statuses have succeeded.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script 1
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 8

End User Experience

We need to verify if the Intune PowerShell Script has installed the Google Chrome Microsoft Defender Browser Protection Extension. Log in to one of the targeted devices for the policy. Open the Google Chrome browser and follow the path below.

  • Click on the three dots in the top right corner of the browser > Extensions > Manage Extensions > My Extension

Microsoft Defender Browser Protection is now successfully installed, providing you with enhanced security for your browsing experience.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 9
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 9

Functionality Test – Microsoft Defender Browser Protection Extension

Now we can verify whether the Microsoft Defender Browser Protection Extension is functioning as expected. To test various scenarios, please visit this URL https://demo.smartscreen.msft.net/. You can assess situations such as Is This Phishing, Phishing Page, Malware Page, Blocked Download, Potentially Unwanted Download, and Exploit Page, Malversating etc. among others. Additionally, there are some App Rep Demos available for review.

How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 10
How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script. Fig. 10

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Vaishnav K has over 11 years of experience in SCCM, Device Management, and Automation Solutions. He writes and imparts knowledge about Microsoft Intune, Azure, PowerShell scripting, and automation. Check out his profile on LinkedIn.

2 thoughts on “How to Install Microsoft Defender Browser Protection Extension using Intune PowerShell Script”

  1. As of 18 June, 2025, this will only work if the workstation is Active Directory domain joined (meaning hybrid joined since this is an Intune policy). What happened for me is the registry entry was successfully created but no extension. Microsoft Edge works. I tweaked the script a bit to work with Edge since this is documented to work with Edge without being Active Directory domain joined. Here is what I changed in the script:

    $UpdateURL = https://edge.microsoft.com/extensionwebstorebase/v1/crx
    $RegPath = “HKLM:SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist”
    The last line in the script to: Write-Host “Extension $ExtensionId configured for force installation in Microsoft Edge.”

    I learned a lot from this article. Thank you for posting

    Source for Active Directory status: https://learn.microsoft.com/en-us/deployedge/microsoft-edge-browser-policies/extensioninstallforcelist

    Reply

Leave a Comment