Share via


DeveloperToolsAvailabilityBlocklist

List of URL patterns for which developer tools are blocked

Supported versions

  • Windows: ≥ 148
  • macOS: ≥ 148
  • Android: Not supported
  • iOS: Not supported

Description

This policy specifies URL patterns where developer tools are blocked. For information on the URL format, see https://go.microsoft.com/fwlink/?linkid=2095322.

URL patterns are evaluated against the URL of every frame on the page being inspected. If any frame matches a pattern in this policy, developer tools are blocked for the entire page.

If you configure this policy and do not configure the DeveloperToolsAvailabilityAllowlist policy, developer tools are blocked when any frame matches a pattern in this policy. If no frames match, availability is determined by the DeveloperToolsAvailability policy.

If you configure both this policy and the DeveloperToolsAvailabilityAllowlist policy, the allowlist takes precedence. URLs that match the allowlist are allowed, even if they also match this policy. URLs that match this policy (but not the allowlist) are blocked. If a URL matches neither, the DeveloperToolsAvailability policy determines availability.

If you disable or do not configure this policy, developer tools availability is determined by the DeveloperToolsAvailabilityAllowlist and DeveloperToolsAvailability policies.

This policy supports up to 1,000 entries.

Supported features

  • Can be mandatory: Yes
  • Can be recommended: No
  • Dynamic Policy Refresh: Yes
  • Per Profile: Yes
  • Applies to a profile that is signed in with a Microsoft account: No

Data type

  • List of strings

Windows information and settings

Group Policy (ADMX) info

  • GP unique name: DeveloperToolsAvailabilityBlocklist
  • GP name: List of URL patterns for which developer tools are blocked
  • GP path (Mandatory): Administrative Templates/Microsoft Edge
  • GP path (Recommended): N/A
  • GP ADMX file name: MSEdge.admx

Example value

https://contoso.com
contoso.com
https://ssl.server.com
contoso.com/bad_path
https://server.contoso.com:8080/path
.exact.hostname.com
*
file://*

Registry settings

  • Path (Mandatory): SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist
  • Path (Recommended): N/A
  • Value name: 1, 2, 3, ...
  • Value type: List of REG_SZ

Example registry value

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\1 =

https://contoso.com

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\2 =

contoso.com

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\3 =

https://ssl.server.com

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\4 =

contoso.com/bad_path

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\5 =

https://server.contoso.com:8080/path

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\6 =

.exact.hostname.com

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\7 =

*

SOFTWARE\Policies\Microsoft\Edge\DeveloperToolsAvailabilityBlocklist\8 =

file://*

Mac information and settings

  • Preference Key name: DeveloperToolsAvailabilityBlocklist
  • Example value:
<array>
  <string>https://contoso.com</string>
  <string>contoso.com</string>
  <string>https://ssl.server.com</string>
  <string>contoso.com/bad_path</string>
  <string>https://server.contoso.com:8080/path</string>
  <string>.exact.hostname.com</string>
  <string>*</string>
  <string>file://*</string>
</array>

See also