{"id":696,"date":"2024-11-08T17:33:20","date_gmt":"2024-11-08T17:33:20","guid":{"rendered":"https:\/\/cleanbrowsing.org\/help\/?post_type=ht_kb&#038;p=696"},"modified":"2025-07-30T21:20:23","modified_gmt":"2025-07-30T21:20:23","slug":"how-to-secure-google-chrome-disable-secure-dns-and-harden-browser-policies","status":"publish","type":"ht_kb","link":"https:\/\/cleanbrowsing.org\/help\/docs\/how-to-secure-google-chrome-disable-secure-dns-and-harden-browser-policies\/","title":{"rendered":"How to Secure Google Chrome: Disable Secure DNS and Harden Browser Policies"},"content":{"rendered":"\n<p>To strengthen your organization&#8217;s security posture, it&#8217;s essential to secure browser settings, particularly for widely used browsers like Google Chrome. By leveraging Chrome&#8217;s Group Policy settings, administrators can control browser behavior and limit potential vulnerabilities. This includes disabling features like Secure DNS (DNS-over-HTTPS), which can bypass network-level filtering and pose a security risk. Additionally, managing policies to restrict or block extensions, enforce <a href=\"https:\/\/cleanbrowsing.org\/safesearch\">SafeSearch <\/a>filtering, and control built-in DNS clients can further reduce exposure to cyber threats. This guide provides detailed, step-by-step instructions on how to configure Chrome through administrative templates to harden your browser and protect your network environment.<\/p>\n\n\n<div style=\"background-color: #ed7d31; color: #ffffff; padding: 30px; border-radius: 10px; text-align: center;\">\n  <h3 style=\"font-size: 1.8em; margin-bottom: 10px; color: #ffffff; font-weight: 700;\">\n    \ud83d\udee1\ufe0f CleanBrowsing: Internet Safety Made Simple\n  <\/h3>\n  <p style=\"color: #fffaf5; font-size: 1.1em; margin-bottom: 20px;\">\n    Filter harmful websites, block adult content, and protect your entire network. All with fast, privacy-respecting DNS.\n  <\/p>\n  <a href=\"https:\/\/cleanbrowsing.org\/pricing?utm_source=cleanbrowsinghelp-posts&#038;utm_medium=cta&#038;utm_campaign=explore-filters\" \n     style=\"display: inline-block; padding: 12px 24px; background-color: #d35400; color: #ffffff; text-decoration: none; font-weight: bold; border-radius: 6px;\">\n    Start Filtering Here \u2192\n  <\/a>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-installing-administrative-templates\">Installing Administrative Templates<a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#installing-administrative-templates\"><\/a><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#step-1-download-chrome-administrative-template\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-1-download-chrome-administrative-template\"><strong>Step 1: Download Chrome Administrative Template<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Download the Administrative Template:<\/strong>&nbsp;First, you need to download the Chrome administrative template from the Chrome Enterprise page as a bundle. It contains the necessary files within it (<a href=\"https:\/\/chromeenterprise.google\/browser\/download\/#download-browser\">https:\/\/chromeenterprise.google\/browser\/download\/#download-browser<\/a>).<\/li>\n\n\n\n<li><strong>Extract the Contents:<\/strong>&nbsp;The download will include a ZIP file containing the template and documentation. Extract the contents of this ZIP file to a folder.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-2-add-the-template-to-group-policy\"><strong>Step 2: Add the Template to Group Policy<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#step-2-add-the-template-to-group-policy\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Open Group Policy Management:<\/strong>&nbsp;Press&nbsp;<strong><code>Windows Key + R<\/code><\/strong>, type&nbsp;<strong><code>gpedit.msc<\/code><\/strong>, and press Enter to open the Local Group Policy Editor.<\/li>\n\n\n\n<li><strong>Navigate to Administrative Templates:<\/strong>&nbsp;Go to&nbsp;<strong><code>Local Computer Policy<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Computer Configuration<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Administrative Templates<\/code><\/strong>.<\/li>\n\n\n\n<li><strong>Add\/Remove Templates:<\/strong>&nbsp;Right-click on&nbsp;<strong><code>Administrative Templates<\/code><\/strong>, and select&nbsp;<strong><code>Add\/Remove Templates<\/code><\/strong>.<\/li>\n\n\n\n<li><strong>Add the Chrome Template:<\/strong>&nbsp;Click on&nbsp;<strong><code>Add<\/code><\/strong>, navigate to the location where you extracted the Chrome policy templates, and select the&nbsp;<strong><code>chrome.adm<\/code><\/strong>&nbsp;or&nbsp;<strong><code>chrome.admx<\/code><\/strong>&nbsp;file (depending on your version of Windows). If you&#8217;re using the ADMX template, you should copy the ADMX file and its language folder (ADML) to the&nbsp;<strong><code>C:\\Windows\\PolicyDefinitions<\/code><\/strong>&nbsp;directory instead of using the Add\/Remove Templates option.<\/li>\n\n\n\n<li><strong>Close the Dialog:<\/strong>&nbsp;After adding the template, click&nbsp;<strong><code>Close<\/code><\/strong>&nbsp;in the&nbsp;<strong><code>Add\/Remove Templates<\/code><\/strong>&nbsp;dialog.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-configure-chrome-policy-for-blocking-extensions-and-allowing-some\"><strong>Configure Chrome Policy for Blocking Extensions and Allowing Some<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#configure-chrome-policy-for-blocking-extensions-and-allowing-some\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Navigate to Chrome Policies:<\/strong>&nbsp;Back in the Group Policy Editor, you&#8217;ll now see a&nbsp;<strong><code>Google<\/code><\/strong>&nbsp;or&nbsp;<strong><code>Google Chrome<\/code><\/strong>&nbsp;section under&nbsp;<strong><code>Administrative Templates<\/code><\/strong>&nbsp;(the exact path might vary slightly based on the template version). Navigate to it.<\/li>\n\n\n\n<li><strong>Enable Extension Allow List:<\/strong>&nbsp;Look for a policy named&nbsp;<code>Configure extension installation allow list<\/code><ul><li><strong>Enable the Policy:<\/strong>&nbsp;Double-click the policy, set it to&nbsp;<strong><code>Enabled<\/code><\/strong>.<\/li><\/ul><strong>Specify the IDs in the options off all the extensions you want to allow:<\/strong>&nbsp;In the options, add the IDs of the extensions you want to allow.<\/li>\n\n\n\n<li><strong>Disable Extension Installation:<\/strong>&nbsp;Look for a policy named something like&nbsp;<strong><code>Configure extension installation blocklist<\/code><\/strong>.<ul><li><strong>Enable the Policy:<\/strong>&nbsp;Double-click the policy, set it to&nbsp;<strong><code>Enabled<\/code><\/strong>.<\/li><\/ul><strong>Specify&nbsp;<code>*<\/code>&nbsp;to Block All Extensions:<\/strong>&nbsp;In the options, add&nbsp;<code>*<\/code>&nbsp;to the list. This wildcard character blocks the installation of all new extensions not in the allow list.<\/li>\n\n\n\n<li><strong>Apply the Policy:<\/strong>&nbsp;Click&nbsp;<strong><code>OK<\/code><\/strong>&nbsp;or&nbsp;<strong><code>Apply<\/code><\/strong>&nbsp;to save the policy settings.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-configuring-control-safesites-adult-content-filtering-in-google-chrome-via-group-policy\"><strong>Configuring &#8220;Control SafeSites adult content filtering&#8221; in Google Chrome via Group Policy:<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#configuring-control-safesites-adult-content-filtering-in-google-chrome-via-group-policy\"><\/a><\/h2>\n\n\n\n<p>To configure this policy, you will need to have administrative access to Group Policy Editor and the Chrome Administrative Template installed.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Open Group Policy Editor<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Press&nbsp;<strong><code>Win + R<\/code><\/strong>, type&nbsp;<strong><code>gpedit.msc<\/code><\/strong>, and press Enter.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Navigate to Chrome Policies<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Go to&nbsp;<strong><code>Computer Configuration<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Administrative Templates<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Google<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Google Chrome<\/code><\/strong>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Locate and Configure the Policy<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Find the&nbsp;<strong><code>Control SafeSites adult content filtering<\/code><\/strong>&nbsp;policy within the list.<\/li>\n\n\n\n<li>Double-click on it to open the policy settings.<\/li>\n\n\n\n<li>You can choose to&nbsp;<strong>Enable<\/strong>&nbsp;it to enforce SafeSites filtering or&nbsp;<strong>Disable<\/strong>&nbsp;it if you want to turn off the filtering. There may also be an option to leave the setting as&nbsp;<strong>Not Configured<\/strong>, which means the default behavior of Chrome (typically filtering disabled) will apply.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Apply the Policy<\/strong>:\n<ul class=\"wp-block-list\">\n<li>After selecting your preferred option, click&nbsp;<strong><code>Apply<\/code><\/strong>&nbsp;and then&nbsp;<strong><code>OK<\/code><\/strong>.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-disable-dns-over-https\">Disable DNS over HTTPS<a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#disable-dns-over-https\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-1-open-group-policy-editor\"><strong>Step 1: Open Group Policy Editor<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#step-1-open-group-policy-editor\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Press&nbsp;<strong><code>Win + R<\/code><\/strong>&nbsp;to open the Run dialog.<\/li>\n\n\n\n<li>Type&nbsp;<strong><code>gpedit.msc<\/code><\/strong>&nbsp;and press Enter to launch the Local Group Policy Editor.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-2-navigate-to-chrome-policies\"><strong>Step 2: Navigate to Chrome Policies<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#step-2-navigate-to-chrome-policies\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In the Group Policy Editor, navigate to&nbsp;<strong><code>Computer Configuration<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Administrative Templates<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Google<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Google Chrome<\/code><\/strong>.If you&#8217;re managing user settings, you might instead go to&nbsp;<strong><code>User Configuration<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Administrative Templates<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Google<\/code><\/strong>&nbsp;&gt;&nbsp;<strong><code>Google Chrome<\/code><\/strong>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-3-configure-the-controls-the-mode-of-dns-over-https-policy\"><strong>Step 3: Configure the &#8220;Controls the mode of DNS-over-HTTPS&#8221; Policy<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#step-3-configure-the-controls-the-mode-of-dns-over-https-policy\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Find the policy named &#8220;Controls the mode of DNS-over-HTTPS&#8221; in the list.<\/li>\n\n\n\n<li>Double-click the policy to edit it.<\/li>\n\n\n\n<li>Set the policy to&nbsp;<strong>Enabled<\/strong>. This allows you to control the DoH settings.<\/li>\n\n\n\n<li>In the options section, you will see a field to specify the mode. Enter&nbsp;<strong><code>Disable DNS-over-HTTPS<\/code><\/strong>&nbsp;to disable DNS-over-HTTPS.<\/li>\n\n\n\n<li>Click&nbsp;<strong><code>Apply<\/code><\/strong>, then&nbsp;<strong><code>OK<\/code><\/strong>&nbsp;to save the changes.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-4-disable-built-in-dns-client\"><strong>Step 4: Disable Built-in DNS Client<\/strong><a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#step-4-disable-built-in-dns-client\"><\/a><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Find the policy named&nbsp;<code>Use built-in DNS client<\/code><\/li>\n\n\n\n<li>Set it to&nbsp;<code>Disabled<\/code><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-alternatively-force-a-specific-dns-over-https-uri\">ALTERNATIVELY Force a Specific DNS over HTTPS URI<a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#alternatively-force-a-specific-dns-over-https-uri\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Find the policy named&nbsp;<code>Specify URI template of desired DNS-over-HTTPS resolver<\/code><\/li>\n\n\n\n<li>Enable the policy and set value to DoH URI<\/li>\n\n\n\n<li>Find the policy&nbsp;<code>Controls the mode of DNS-over-HTTPS<\/code>&nbsp;and set it to&nbsp;<code>Enable DNS-over-HTTPS without insecure fallback<\/code>&nbsp;. This is considered the&nbsp;<code>secure<\/code>&nbsp;policy value.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-force-google-safesearch-and-youtube-restricted-mode\">Force Google SafeSearch and YouTube Restricted Mode<a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#force-google-safesearch-and-youtube-restricted-mode\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Find the policy&nbsp;<code>Force Google SafeSearch<\/code>&nbsp;and enable it<\/li>\n\n\n\n<li>Find the policy&nbsp;<code>Force minimum YouTube Restricted Mode<\/code>&nbsp;and enable it. Set it to Moderate or Strict<\/li>\n<\/ol>\n\n\n\n<p>Note: These settings may be redundant if DNS is doing its job<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-testing-policies\">Testing Policies<a href=\"https:\/\/github.com\/nosurflock\/windows-lockdown\/blob\/main\/Windows10Setup.md#testing-policies\"><\/a><\/h2>\n\n\n\n<p>On a target client device, open Chrome and go to&nbsp;<strong>chrome:\/\/policy\/<\/strong>&nbsp;to see all policies that are applied. If you applied policy settings on the local computer, policies should appear immediately. You might need to close and reopen Chrome if it was open while you were configuring policy settings.<\/p>\n\n\n<div style=\"background-color: #1e3a5f; color: #ffffff; padding: 30px; border-radius: 10px; text-align: center;\">\n  <h3 style=\"color: #ffffff; font-size: 1.8em; margin-bottom: 10px; font-weight: 700;\">\n    \ud83d\udce6 Push DNS Logs to a Secure SIEM with Trunc\n  <\/h3>\n  <p style=\"color: #d0e6f7; font-size: 1.1em; margin-bottom: 20px;\">\n    Trunc helps you forward CleanBrowsing DNS logs\u2014and other system logs\u2014to a secure, cloud-hosted SIEM. Get real-time visibility, threat detection, and compliance reporting without the overhead.\n  <\/p>\n  <a href=\"https:\/\/trunc.org?utm_source=cleanbrowsinghelp-posts&#038;utm_medium=referral&#038;utm_campaign=log-forwarding\" \n     style=\"display: inline-block; padding: 12px 24px; background: linear-gradient(to right, #00b4d8, #0077b6); color: #ffffff; text-decoration: none; font-weight: bold; border-radius: 6px;\">\n    Explore Trunc \u2192\n  <\/a>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>To strengthen your organization&#8217;s security posture, it&#8217;s essential to secure browser settings, particularly for widely used browsers like Google Chrome. By leveraging Chrome&#8217;s Group Policy settings, administrators can control browser behavior and limit potential vulnerabilities. This includes disabling features like Secure DNS (DNS-over-HTTPS), which can bypass network-level filtering and pose&#8230;<\/p>\n","protected":false},"author":1,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[],"ht-kb-tag":[],"class_list":["post-696","ht_kb","type-ht_kb","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/ht-kb\/696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/comments?post=696"}],"version-history":[{"count":2,"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/ht-kb\/696\/revisions"}],"predecessor-version":[{"id":892,"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/ht-kb\/696\/revisions\/892"}],"wp:attachment":[{"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/media?parent=696"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/ht-kb-category?post=696"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/cleanbrowsing.org\/help\/wp-json\/wp\/v2\/ht-kb-tag?post=696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}