Intranet Redirection Behavior

This policy configures behavior for intranet redirection via DNS interception checks. The checks attempt to discover whether the browser is behind a proxy that redirects unknown host names.

If this policy is not set, the browser will use the default behavior of DNS interception checks and intranet redirect suggestions. In M88, they are enabled by default but will be disabled by default in the future release.

DNSInterceptionChecksEnabled is a related policy that may also disable DNS interception checks; this policy is a more flexible version which may separately control intranet redirection infobars and may be expanded in the future.
If either DNSInterceptionChecksEnabled or this policy requests to disable interception checks, the checks will be disabled.

Supported on: At least Microsoft Windows 7 or Windows Server 2008 family

Intranet Redirection Behavior


  1. Use default browser behavior.
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Google\Chrome
    Value NameIntranetRedirectBehavior
    Value TypeREG_DWORD
    Value0
  2. Disable DNS interception checks and did-you-mean "http://intranetsite/" infobars.
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Google\Chrome
    Value NameIntranetRedirectBehavior
    Value TypeREG_DWORD
    Value1
  3. Disable DNS interception checks; allow did-you-mean "http://intranetsite/" infobars.
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Google\Chrome
    Value NameIntranetRedirectBehavior
    Value TypeREG_DWORD
    Value2
  4. Allow DNS interception checks and did-you-mean "http://intranetsite/" infobars.
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Google\Chrome
    Value NameIntranetRedirectBehavior
    Value TypeREG_DWORD
    Value3


chrome.admx

Administrative Templates (Computers)

Administrative Templates (Users)