Getting Started with Maro
Deploy with Microsoft Intune
6 min
maro integrates with your identity and device tools, microsoft entra id and microsoft intune, to seamlessly deploy a local browser extension across managed environments and plug into an organization’s source of truth for employee identity and device posture prerequisites a valid microsoft entra id (azure ad) subscription administrator privileges in azure portal maro admin access 1\ create new policy go to intune admin center navigate to devices > configuration > create > new policy select platform windows 10 and later profile type settings catalog click create 2\ configure policy settings give your policy a name (e g , "maro security extension force install") add description "automatically installs maro cognitive security extension"click next 3\ generate client credentials click add settings under configuration settings search for "extensions" select google chrome extensions choose "configure the list of force installed apps and extensions" enable the setting 4\ configure maro extension in the extension field, enter exactly elopbipdaffijbfafcgmkilmmegldlmp;https //clients2 google com/service/update2/crx format explanation elopbipdaffijbfafcgmkilmmegldlmp = maro extension id ; = separator https //clients2 google com/service/update2/crx = chrome web store update url 5\ deploy to users click next twice select the user/device groups that should receive maro click next and create what happens next maro will automatically install on all chrome browsers in the selected groups users cannot uninstall the extension the extension will auto update through the chrome web store installation typically completes within 24 hours of policy deployment users will have to log in with their corporate email in order for data to populate the ciso console verification users will see the maro extension icon in their chrome toolbar once installation is complete the extension will be marked as "installed by your administrator" in chrome //extensions