{"id":3158,"date":"2026-03-14T20:12:37","date_gmt":"2026-03-14T20:12:37","guid":{"rendered":"https:\/\/modern-workplace.uk\/?p=3158"},"modified":"2026-03-14T20:12:39","modified_gmt":"2026-03-14T20:12:39","slug":"microsoft-intune-taking-back-control-of-geolocation-in-edge-one-site-at-a-time","status":"publish","type":"post","link":"https:\/\/modern-workplace.uk\/?p=3158","title":{"rendered":"Microsoft Intune: Taking Back Control of Geolocation in Edge, One Site at a Time"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Organisations that manage Microsoft Edge through Intune, at some point, could have configured the <span style=\"text-decoration: underline;\">DefaultGeolocationSetting<\/span> policy. <\/p>\n\n\n\n<p class=\"has-medium-font-size\">It gives you three options: allow geolocation for all sites, block it for all sites, or prompt the user every time. That&#8217;s been the extent of the available control for a while: a single global switch with no per-site granularity.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>The March 2026 Intune service release added two new settings to the Windows Settings Catalog that change this: <span style=\"text-decoration: underline;\">Allow precise geolocation on these sites<\/span> and <span style=\"text-decoration: underline;\">Block geolocation on these sites<\/span>. Both are Microsoft Edge policies surfaced through the Catalog under Microsoft Edge > Content settings.<br>They allow you to define per-URL exceptions on top of the global default, which is what most real-world deployments actually need.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Why the global setting isn&#8217;t enough<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>If you manage devices used for a mix of internal web applications and general internet browsing, the global setting forces you into an uncomfortable choice.<br>If you block geolocation entirely, you risk breaking internal applications that legitimately depend on location (like warehouse management tools, field service portals, maps integrations inside an intranet). If you allow it globally, however, you give every external site the ability to prompt the user for location access with no admin control over which sites can actually get it.<br><\/p>\n\n\n\n<p class=\"has-medium-font-size\">In practice, many tenant admins compromise with AskGeolocation (the default) which prompts the user each time) and leave it at that. This means the user makes the decision, not the policy. In a regulated environment or one with a strict data handling posture, that&#8217;s not always acceptable.<br>The two new per-site settings solve this properly.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>What the settings actually do<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><em>Allow precise geolocation on these sites<\/em><br>Policy name: <span style=\"text-decoration: underline;\">PreciseGeolocationAllowedForUrls<\/span><br>Microsoft&#8217;s documentation describes it as follows: this policy lets you specify a list of URL patterns for sites that are allowed to access the user&#8217;s high-accuracy geolocation without prompting for permission. If the policy is not configured, the DefaultGeolocationSetting value applies, or the user&#8217;s personal setting is used.<br>Reference: <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-browser-policies\/precisegeolocationallowedforurls\">https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-browser-policies\/precisegeolocationallowedforurls<\/a> <br>The key phrase here is without prompting: the site gets location access with no browser prompt shown to the user. That makes it appropriate only for internal applications you explicitly trust.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><em>Block geolocation on these sites<\/em><br>Policy name: <span style=\"text-decoration: underline;\">GeolocationBlockedForUrls<\/span><br>This policy defines a list of URL patterns for sites that are blocked from accessing the user&#8217;s geolocation. According to the documentation, these sites also cannot prompt the user for location permissions at all: the permission request is suppressed entirely.<br>Reference: <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-browser-policies\/geolocationblockedforurls\">https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-browser-policies\/geolocationblockedforurls<\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>If neither policy is configured for a given site, DefaultGeolocationSetting applies as the fallback.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>The policy hierarchy<\/strong><br>It is worth being explicit about the order of precedence, as misconfiguration here produces unexpected behaviour:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>GeolocationBlockedForUrls takes effect first: if a site matches the block list, location access is denied regardless of any other setting<\/li>\n\n\n\n<li>PreciseGeolocationAllowedForUrls applies next: if a site matches the allow list and is not in the block list, location is granted silently<\/li>\n\n\n\n<li>DefaultGeolocationSetting applies to all sites not explicitly matched by either list<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\">This means if you add the same URL pattern to both lists, the block wins.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Where to configure this in Intune<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>These settings are only available through the Settings Catalog, not through device restriction templates or the legacy Administrative Templates profile type.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>Navigate to:<br>Devices > Configuration profiles > Create profile<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Platform: Windows 10 and later<br>Profile type: Settings catalog<\/p>\n\n\n\n<p class=\"has-medium-font-size\">In the Settings picker, search for Microsoft Edge, then expand Content settings. You will find:<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Allow precise geolocation on these sites<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152019.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"774\" height=\"126\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152019.jpg\" alt=\"\" class=\"wp-image-3160\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152019.jpg 774w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152019-300x49.jpg 300w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152019-768x125.jpg 768w\" sizes=\"auto, (max-width: 774px) 100vw, 774px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><br>Block geolocation on these sites<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152041.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"782\" height=\"73\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152041.jpg\" alt=\"\" class=\"wp-image-3159\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152041.jpg 782w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152041-300x28.jpg 300w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152041-768x72.jpg 768w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Both accept a list of URL patterns. Add one pattern per entry.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152148.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"772\" height=\"515\" src=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152148.jpg\" alt=\"\" class=\"wp-image-3161\" srcset=\"https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152148.jpg 772w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152148-300x200.jpg 300w, https:\/\/modern-workplace.uk\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-14-152148-768x512.jpg 768w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>URL pattern syntax<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>Both settings use Edge&#8217;s standard URL filter format. There are a few important details to note:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">Wildcards (<em>) are supported \u2014 [<\/em>.]contoso.com matches all subdomains of contoso.com<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Patterns must include the scheme \u2014 https:\/\/maps.contoso.com is valid; maps.contoso.com is not<\/li>\n\n\n\n<li class=\"has-medium-font-size\">You cannot use * as a standalone entry to match all URLs. That is what DefaultGeolocationSetting is for<\/li>\n\n\n\n<li class=\"has-medium-font-size\">Path components are supported: https:\/\/app.contoso.com\/fieldops will match that path but not https:\/\/app.contoso.com\/hr<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Practical scenarios<\/strong><br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><span style=\"text-decoration: underline;\">Block by default, allow internal tools<\/span><br>Set DefaultGeolocationSetting to BlockGeolocation and add your internal applications to the allow list. External sites are blocked entirely; internal applications get silent access without any user prompt.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><span style=\"text-decoration: underline;\">Allow by default, block specific external services<\/span><br>Leave the default as-is and add specific third-party SaaS tools to the block list. Everything else continues to prompt the user as normal.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Important details to note<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">These policies apply to Microsoft Edge only. Chrome, Firefox, and embedded WebViews from other applications are not affected<\/li>\n\n\n\n<li class=\"has-medium-font-size\">When searching for these settings in the Settings Catalog, you will see two versions of each: one without a suffix and one labelled (User). The difference is where the policy lands in the Windows registry. The device-scoped version (no suffix) writes to <span style=\"text-decoration: underline;\">HKEY_LOCAL_MACHINE (HKLM) <\/span>and applies to the machine regardless of who is signed in. The (User) version writes to <span style=\"text-decoration: underline;\">HKEY_CURRENT_USER (HKCU) <\/span>and follows the user profile across enrolled devices. For geolocation control, the device-scoped version is almost always the right choice (you want the allow and block lists enforced machine-wide, not variable depending on which user is active). If both scopes are configured for the same setting, user scope takes precedence over device scope.<\/li>\n\n\n\n<li class=\"has-medium-font-size\">The Windows OS location service must be enabled for any of this to function. if the device-level location service is off (controlled via Privacy > Turn off location in the Settings Catalog), Edge will not be able to resolve geolocation regardless of these policies<br><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\">The settings only appear in the Settings Catalog as of the March 2026 service release. If you do not see them, your tenant may not yet have the update. Microsoft is rolling this out gradually through late March 2026<br>The allow list grants access without prompting. Be deliberate about what goes on it<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The March 2026 Intune service release added two new Microsoft Edge policies to the Windows Settings Catalog: per-site geolocation allow and block lists. Here is what they do, how they interact with the existing global setting, and which scenarios they are designed to solve.<\/p>\n","protected":false},"author":1,"featured_media":3161,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[850,753,869],"tags":[890,896,895,889,891,892,886,899,893,898,885,853,864,894,888,884,897,858],"class_list":["post-3158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-850","category-microsoft365","category-microsoft-intune","tag-browser-policy","tag-content-settings","tag-data-protection","tag-defaultgeolocationsetting","tag-edge-policy","tag-endpoint-management","tag-geolocation","tag-geolocationblockedforurls","tag-hkcu","tag-hklm","tag-microsoft-edge","tag-microsoft-intune","tag-modern-workplace","tag-precisegeolocationallowedforurls","tag-privacy","tag-settings-catalog","tag-windows-10","tag-windows-11"],"_links":{"self":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts\/3158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3158"}],"version-history":[{"count":2,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts\/3158\/revisions"}],"predecessor-version":[{"id":3163,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/posts\/3158\/revisions\/3163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/modern-workplace.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}