Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(458)

Unified Diff: components/policy/resources/policy_templates.json

Issue 2943763002: Add a new group policy to disable safe browsing for files downloaded from trusted sources. (Closed)
Patch Set: Remove command line support Created 3 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « components/policy/core/common/policy_loader_win.cc ('k') | tools/metrics/histograms/enums.xml » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/policy/resources/policy_templates.json
diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json
index 452bfb58f9eb6280dda31525f8f371b97e1d8cc8..a9b9d3edf829da704c46c0418fb6d629a5b605d5 100644
--- a/components/policy/resources/policy_templates.json
+++ b/components/policy/resources/policy_templates.json
@@ -143,7 +143,7 @@
# persistent IDs for all fields (but not for groups!) are needed. These are
# specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
# because doing so would break the deployed wire format!
-# For your editing convenience: highest ID currently used: 374
+# For your editing convenience: highest ID currently used: 375
# And don't forget to also update the EnterprisePolicies enum of
# histograms.xml (run 'python tools/metrics/histograms/update_policies.py').
#
@@ -1796,6 +1796,34 @@
'arc_support': 'This policy has no effect on Android apps. Android apps always use the default downloads directory and cannot access any files downloaded by <ph name="PRODUCT_OS_NAME">$2<ex>Google Chrome OS</ex></ph> into a non-default downloads directory.',
},
{
+ 'name': 'SafeBrowsingForTrustedSourcesEnabled',
+ 'type': 'main',
+ 'schema': { 'type': 'boolean' },
+ 'supported_on': ['chrome.win:61-'],
pastarmovj 2017/07/04 17:06:10 nit: Haven't we branched 61 by now? I think this h
MAD 2017/07/04 17:18:28 Chrome 61 Branch Point: Thu Jul 20
+ 'features': {
+ 'can_be_recommended': True,
+ 'dynamic_refresh': True,
+ 'per_profile': True,
+ },
+ 'example_value': False,
+ 'id': 375,
+ 'caption': '''SafeBrowsing enable state for trusted sources''',
+ 'tags': ['local-data-access'],
+ 'desc': '''Identify if <ph name="PRODUCT_NAME">$1<ex>Google Chrome</ex></ph> can allow download without Safe Browsing checks when it's from a trusted source.
+
+ When False, downloaded files will not be sent to be analyzed by Safe Browsing when it's from a trusted source.
+
+ When not set (or set to True), downloaded files are sent to be analyzed by Safe Browsing, even when it's from a trusted source.
+
+ Note that these restrictions apply to downloads triggered from web page content, as well as the 'download link...' context menu option.
+
+ But these restrictions do not apply to the save / download of the currently displayed page, nor does it apply to saving as PDF from the printing options.
pastarmovj 2017/07/04 17:06:10 nit. Remove the "But" and merge with the previous
MAD 2017/07/04 17:18:28 Done.
+
+ This policy is not available on Windows instances that are not joined
+ to a Microsoft® Active Directory® domain.''',
pastarmovj 2017/07/04 17:06:10 nit: Maybe put the "MS AD" in a ph tag to prevent
MAD 2017/07/04 17:18:28 Done.
+ 'label': '''SafeBrowsing enable state for trusted sources''',
+ },
+ {
'name': 'ClearSiteDataOnExit',
'type': 'main',
'schema': { 'type': 'boolean' },
« no previous file with comments | « components/policy/core/common/policy_loader_win.cc ('k') | tools/metrics/histograms/enums.xml » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698