{
	"id": "988a6a2d-4d44-4edf-9167-d5d0d97949b8",
	"created_at": "2026-04-06T02:12:13.923914Z",
	"updated_at": "2026-04-10T03:21:43.160428Z",
	"deleted_at": null,
	"sha1_hash": "dce11d9a9cd9264f61b5c4a543fa2573d7361f70",
	"title": "Configure and deploy group policies - Microsoft dev tunnels",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 121805,
	"plain_text": "Configure and deploy group policies - Microsoft dev tunnels\r\nBy plequere-ms\r\nArchived: 2026-04-06 02:05:59 UTC\r\nConfigure and deploy Group Policy Administrative Templates for Dev Tunnels\r\nIn this article\r\n1. Prerequisites\r\n2. Policies Supported\r\n3. Configure policies with Local Group Policy Editor\r\nIT Administrators in organizations may want to control certain aspects of Dev Tunnels to achieve consistency or\r\ncompliance across their organization. An easy way to accomplish this level of control is to configure and then\r\ndeploy group policy settings to the client machines. The Dev Tunnels in Visual Studio, port forwarding built into\r\nVisual Studio Code, the Visual Studio Code Remote - Tunnels extension, and devtunnel CLI policies are\r\nconsolidated in the Administrator Template files (ADMX/ADML) for Dev Tunnels.\r\nIn this quickstart, you'll learn how to configure and deploy Dev Tunnels group policy settings across your\r\norganization.\r\nWindows Server 2016, Windows Server 2019, Windows Server 2022, Windows 8.1, Windows 10,\r\nWindows 11\r\nActive Directory\r\nAccess to Local Group Policy Editor\r\nNote\r\nThe policies are only applicable on Windows machines.\r\nhttps://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policies\r\nPage 1 of 3\n\nDisable anonymous tunnel access: Disallow anonymous tunnel access. Enabling this policy enforces\r\nusers to select either private or organization for tunnel access. This means users cannot connect to an\r\nexisting tunnel with anonymous access control, host an existing tunnel with anonymous access control, or\r\nadd anonymous access to existing or new tunnels.\r\nDisable Dev Tunnels: Disallow users from using the Dev Tunnels service. All commands, with few\r\nexceptions, should be denied access when this policy is enabled. Exceptions: unset, echo, ping, and user.\r\nAllow only selected Microsoft Entra tenant IDs: Users must authenticate within the given tenant list to\r\naccess Dev Tunnels. When enabling this policy, multiple tenant IDs can be added by using a semicolon or\r\ncomma to separate each. All commands, with few exceptions, should be denied access when this policy is\r\nenabled and the user's tenant ID isn't in the list of allowed tenant IDs. Exceptions: unset, echo, ping, and\r\nuser. Follow the steps in this article to find your Microsoft Entra tenant ID.\r\n1. Head over to the Microsoft Download Center and download the Administrator Template files\r\n(ADMX/ADML) for Dev Tunnels.\r\n2. Navigate to the C:\\Windows\\PolicyDefinitions folder and add the TunnelsPolicies.admx file.\r\n3. Navigate to the C:\\Windows\\PolicyDefinitions\\en-US folder and add the TunnelsPolicies.adml file.\r\n1. Open Command Prompt and run gpupdate /force to ensure the policy files are configured.\r\n2. Open the Windows Local Group Policy Editor.\r\n3. Navigate to Computer Configuration \u003e Administrative Templates \u003e Dev Tunnels.\r\n4. Apply the desired policy changes.\r\nAdditional resources\r\nTraining\r\nhttps://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policies\r\nPage 2 of 3\n\nLast updated on 02/12/2026\r\nSource: https://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policies\r\nhttps://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policies\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://learn.microsoft.com/en-us/azure/developer/dev-tunnels/policies"
	],
	"report_names": [
		"policies"
	],
	"threat_actors": [],
	"ts_created_at": 1775441533,
	"ts_updated_at": 1775791303,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/dce11d9a9cd9264f61b5c4a543fa2573d7361f70.pdf",
		"text": "https://archive.orkl.eu/dce11d9a9cd9264f61b5c4a543fa2573d7361f70.txt",
		"img": "https://archive.orkl.eu/dce11d9a9cd9264f61b5c4a543fa2573d7361f70.jpg"
	}
}