First time here? Instinctive offers affordable cybersecurity for schools. Check out the features, schedule a demo, or try it now for free
Get more admin tips & tricks in your inbox
This guide covers everything you need to know about how to manage Chrome on Windows within your school district, starting with a basic overview of all of the different management options and moving into key recommendations and important policies you need to configure. Beginners will learn a lot and experts will still learn something here, because there are a lot of ways you can set this up.
If you're a long-time Windows and Active Directory admin you're probably familiar with GPO, or Group Policy Objects. These are collections of policies and can be applied to either the entire computer or to a user when they sign into the operating system.
The full collection of Chrome policies is available to set via GPO, and if you're already managing everything via Active Directory, this could be a good option. However, it has some downsides. You will not be able to configure your policies from the cloud via Google Admin Console (or its APIs), and you will not get key reporting information that is available exclusively with Chrome Browser Cloud Management. You also won't be able to align your Chrome policies across Windows and Chrome OS, if that is a consideration.
Chrome Browser Cloud Management (CBCM) allows you to manage Chrome on Windows from the Google Admin Console (and its associated cloud-based APIs). In order to set up CBCM, you set up a Google Admin Console, generate a CBCM token, and deploy that token via GPO, registry, or your Windows device MDM.
Once the token is deployed, the Chrome browsers on that machine will register with the Google Admin Console. Note that even though each Windows device might have multiple different users on it, CBCM manages at the device level.
Using CBCM is advantageous for a few reasons:
Full setup instructions for CBCM
If your organization uses Google Workspace, you have likely seen already that the Chrome policies you apply in Google Admin Console will apply to Chrome on Windows when your users sign in with their accounts. For example, if you deploy a content filtering extension for students to monitor their Chromebook usage, that filtering extension will also show up when they sign into Chrome on Windows with their school accounts.
Managing Chrome policies based on the signed-in Google Workspace user is extremely convenient for schools that also uses Chromebooks. You can have a single set of policies that works wherever your users sign in, whether that's Chrome OS, Windows, Mac, Android, iOS, or even Linux.
Google Credential Provider for Windows (GCPW) is somewhat independent of Chrome management, but it's important to mention because it can help you simplify your student and staff experience if you are already using Google Workspace.
GCPW allows your users to sign into Windows devices using their Google accounts. Rather than using Active Directory or a different username and password, users will see the regular Google sign-in screen and log in with their Workspace credentials. Once they do, they will be automatically signed into Chrome as well (and receive their Google Workspace User Policies). User passwords are managed via Google Admin Console, including if you sync in changes from another source.
An interesting (and confusing) aspect of managing Chrome on Windows is that you can use multiple of the above methods, and in fact most organizations will have some policies configured via GPO, some via CBCM, and still some via Workspace.
However, this introduces the possibility for conflicts to arise. If you block incognito mode in Workspace User Policy but enable it using CBCM, will it be available or not?
The answer is determined by the built-in precedence order that Chrome uses. Chrome will prioritize policies in the following order (top-most takes precdences over the ones below):
Even more confusingly, you can actually change this order of precedence using the CloudPolicyOverridesPlatformPolicy and CloudUserPolicyOverridesCloudMachinePolicy policies, but we really don't recommend this unless you have a strong reason to.
Chrome supports multiple "profiles," which can be useful for keeping personal and work browsing separate on the same computer. It's important to note that a Chrome Profile that isn't signed in will not receive any Google Workspace User Policies. On school computers, this means you should (1) force sign-in, and (2) limit sign-in to only your school accounts.
Here's the combination we recommend:
Isn't it annoying to find and configure each of these new policies one by one in Admin Console? We're building a tool that will instantly audit these policies for you and provide a 1-click button to set all of them at once. Get in touch to try a beta version
Name | Recommended setting |
---|---|
BrowserSignin | Force users to sign-in to use the browser |
BrowserGuestModeEnabled | False |
AllowedDomainsForApps | [yourschool.edu] |
ManagedAccountsSigninRestriction | primary account strict keep existing data |
RestrictSigninToPattern | [yourschool.edu] |
CloudReportingEnabled | true |
If you've set up your devices but policy isn't working as you expect, it's time for some troubleshooting. Go through these steps in order:
Found a better way to manage Chrome on Windows? Want to share with other admins? As always, you can share your feedback on our public feedback tracker or privately via the contact page.
Get more admin tips & tricks in your inbox