Action Required – Configure Browser Policy to Preserve OneDrive and SharePoint Web Performance and Offline Capability

Message Center ID: MC1150662
SharePoint Online Microsoft OneDrive
preventOrFixIssue
User impact Admin impact
September 2025 October 2025

Summary

Chromium browsers will restrict local network access, causing OneDrive and SharePoint web apps to prompt users for permission, impacting performance and offline use. Admins must configure the LocalNetworkAccessAllowedForUrls policy to pre-authorize trusted domains, preventing prompts and preserving functionality before Chromium 142 rollout in October 2025.

Details

Updated October 20, 2025: We have updated the content to correctly reference Chromium 142. Thank you for your patience. 

[Introduction]

Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

[When this will happen:]

Chrome and Edge will roll out this privacy related change as part of Chromium 142 at the end of October 2025 (previously end of September).

[How this will affect your organization:]

If no action is taken:


  1. Who is affected:
    • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
    • Admins managing browser policies for Windows, macOS, and VDI environments.
  2. What will happen:

    If no action is taken:

    • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
    • If users do not click Allow, the following results occur on that device:
      • Performance acceleration will not be available (loss of faster data access behavior).
      • Offline functionality in OneDrive Web will not be available.
    • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

    When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

    [What you need to do to prepare:]

    1. Identify Required Domains
      1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
      2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
    2. Configure Browser Policy
      1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
      2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
      3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
      4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
        1. DisableNucleusSync
        2. DisableOfflineMode
    3. Remediation for Users Who Already Clicked Block
      1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
      2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.
    4. Ensure your Sync Client is updated to v.25.164

1. Per machine SKU: The Sync client will automatically apply the required permissions and policies for existing users in Chrome and Edge—no user action is needed.

    2. Per user SKU: The Sync client will prompt users via a Windows Toast notification to enable these permissions. Users should follow the notification instructions to complete setup.

    [Compliance considerations:]

    Compliance AreaExplanation
    Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
    Includes admin control

    Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

    Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
    Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.

    Change History

    October 20, 2025 at 8:36 PM Updated
    Summary
    Previous
    Chromium browsers will restrict local network access, causing OneDrive and SharePoint web apps to prompt users for permission, impacting performance and offline use. Admins must configure the LocalNetworkAccessAllowedForUrls policy to pre-authorize trusted domains, preventing prompts and preserving functionality before Chromium 141 rollout in October 2025.
    New
    Chromium browsers will restrict local network access, causing OneDrive and SharePoint web apps to prompt users for permission, impacting performance and offline use. Admins must configure the LocalNetworkAccessAllowedForUrls policy to pre-authorize trusted domains, preventing prompts and preserving functionality before Chromium 142 rollout in October 2025.
    Last Updated Date
    Previous
    2025-10-03T15:17:59.430Z
    New
    2025-10-20T19:07:20.943Z
    Body Content
    Previous

    Updated October 3, 2025: We have updated the timeline. Thank you for your patience. 

    [Introduction]

    Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

    [When this will happen:]

    Chrome and Edge will roll out this privacy related change as part of Chromium 141 at the end of October 2025 (previously end of September).

    [How this will affect your organization:]

    If no action is taken:


    1. Who is affected:
      • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
      • Admins managing browser policies for Windows, macOS, and VDI environments.
    2. What will happen:

      If no action is taken:

      • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
      • If users do not click Allow, the following results occur on that device:
        • Performance acceleration will not be available (loss of faster data access behavior).
        • Offline functionality in OneDrive Web will not be available.
      • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

      When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

      [What you need to do to prepare:]

      1. Identify Required Domains
        1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
        2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
      2. Configure Browser Policy
        1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
        2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
        3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
        4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
          1. DisableNucleusSync
          2. DisableOfflineMode
      3. Remediation for Users Who Already Clicked Block
        1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
        2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.
      4. Ensure your Sync Client is updated to v.25.164

    1. Per machine SKU: The Sync client will automatically apply the required permissions and policies for existing users in Chrome and Edge—no user action is needed.

      2. Per user SKU: The Sync client will prompt users via a Windows Toast notification to enable these permissions. Users should follow the notification instructions to complete setup.

      [Compliance considerations:]

      Compliance AreaExplanation
      Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
      Includes admin control

      Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

      Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
      Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.
      New

      Updated October 20, 2025: We have updated the content to correctly reference Chromium 142. Thank you for your patience. 

      [Introduction]

      Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

      [When this will happen:]

      Chrome and Edge will roll out this privacy related change as part of Chromium 142 at the end of October 2025 (previously end of September).

      [How this will affect your organization:]

      If no action is taken:


      1. Who is affected:
        • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
        • Admins managing browser policies for Windows, macOS, and VDI environments.
      2. What will happen:

        If no action is taken:

        • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
        • If users do not click Allow, the following results occur on that device:
          • Performance acceleration will not be available (loss of faster data access behavior).
          • Offline functionality in OneDrive Web will not be available.
        • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

        When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

        [What you need to do to prepare:]

        1. Identify Required Domains
          1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
          2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
        2. Configure Browser Policy
          1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
          2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
          3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
          4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
            1. DisableNucleusSync
            2. DisableOfflineMode
        3. Remediation for Users Who Already Clicked Block
          1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
          2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.
        4. Ensure your Sync Client is updated to v.25.164

      1. Per machine SKU: The Sync client will automatically apply the required permissions and policies for existing users in Chrome and Edge—no user action is needed.

        2. Per user SKU: The Sync client will prompt users via a Windows Toast notification to enable these permissions. Users should follow the notification instructions to complete setup.

        [Compliance considerations:]

        Compliance AreaExplanation
        Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
        Includes admin control

        Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

        Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
        Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.
        October 3, 2025 at 4:30 PM Updated
        Summary
        Previous
        Chromium browsers will restrict local network access, causing OneDrive, SharePoint, and Microsoft Lists web apps to prompt users for permission. Without admin-configured browser policies allowing trusted Microsoft 365 domains, users will lose performance and offline capabilities. Admins must deploy the LocalNetworkAccessAllowedForUrls policy before Chromium 141 rollout in late September.
        New
        Chromium browsers will restrict local network access, causing OneDrive and SharePoint web apps to prompt users for permission, impacting performance and offline use. Admins must configure the LocalNetworkAccessAllowedForUrls policy to pre-authorize trusted domains, preventing prompts and preserving functionality before Chromium 141 rollout in October 2025.
        Last Updated Date
        Previous
        2025-09-15T13:12:52.783Z
        New
        2025-10-03T15:17:59.430Z
        Body Content
        Previous

        Updated September 15, 2025: We have updated the content. Thank you for your patience.

        [Introduction]

        Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

        [When this will happen:]

        Chrome and Edge will roll out this privacy related change as part of Chromium 141 at the end of September.

        [How this will affect your organization:]

        If no action is taken:


        1. Who is affected:
          • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
          • Admins managing browser policies for Windows, macOS, and VDI environments.
        2. What will happen:

          If no action is taken:

          • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
          • If users do not click Allow, the following results occur on that device:
            • Performance acceleration will not be available (loss of faster data access behavior).
            • Offline functionality in OneDrive Web will not be available.
          • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

          When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

          [What you need to do to prepare:]

          1. Identify Required Domains
            1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
            2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
          2. Configure Browser Policy
            1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
            2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
            3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
            4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
              1. DisableNucleusSync
              2. DisableOfflineMode
          3. Remediation for Users Who Already Clicked Block
            1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
            2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.
          4. Ensure your Sync Client is updated to v.25.164

        1. Per machine SKU: The Sync client will automatically apply the required permissions and policies for existing users in Chrome and Edge—no user action is needed.

          2. Per user SKU: The Sync client will prompt users via a Windows Toast notification to enable these permissions. Users should follow the notification instructions to complete setup.

          [Compliance considerations:]

          Compliance AreaExplanation
          Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
          Includes admin control

          Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

          Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
          Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.
          New

          Updated October 3, 2025: We have updated the timeline. Thank you for your patience. 

          [Introduction]

          Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

          [When this will happen:]

          Chrome and Edge will roll out this privacy related change as part of Chromium 141 at the end of October 2025 (previously end of September).

          [How this will affect your organization:]

          If no action is taken:


          1. Who is affected:
            • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
            • Admins managing browser policies for Windows, macOS, and VDI environments.
          2. What will happen:

            If no action is taken:

            • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
            • If users do not click Allow, the following results occur on that device:
              • Performance acceleration will not be available (loss of faster data access behavior).
              • Offline functionality in OneDrive Web will not be available.
            • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

            When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

            [What you need to do to prepare:]

            1. Identify Required Domains
              1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
              2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
            2. Configure Browser Policy
              1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
              2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
              3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
              4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
                1. DisableNucleusSync
                2. DisableOfflineMode
            3. Remediation for Users Who Already Clicked Block
              1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
              2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.
            4. Ensure your Sync Client is updated to v.25.164

          1. Per machine SKU: The Sync client will automatically apply the required permissions and policies for existing users in Chrome and Edge—no user action is needed.

            2. Per user SKU: The Sync client will prompt users via a Windows Toast notification to enable these permissions. Users should follow the notification instructions to complete setup.

            [Compliance considerations:]

            Compliance AreaExplanation
            Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
            Includes admin control

            Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

            Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
            Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.
            September 15, 2025 at 2:30 PM Updated
            Summary
            Previous
            Chromium browsers will restrict local network access, prompting users for permission when accessing OneDrive, SharePoint, and Microsoft Lists. Without configuring the LocalNetworkAccessAllowedForUrls policy to pre-authorize trusted domains, users will face slower performance and loss of offline capabilities. Admins must deploy this policy before the change rolls out in Chromium 141 at September's end.
            New
            Chromium browsers will restrict local network access, causing OneDrive, SharePoint, and Microsoft Lists web apps to prompt users for permission. Without admin-configured browser policies allowing trusted Microsoft 365 domains, users will lose performance and offline capabilities. Admins must deploy the LocalNetworkAccessAllowedForUrls policy before Chromium 141 rollout in late September.
            Last Updated Date
            Previous
            2025-09-09T23:08:35.023Z
            New
            2025-09-15T13:12:52.783Z
            Tags
            Previous
            User impact,Admin impact
            New
            Updated message,User impact,Admin impact
            Body Content
            Previous

            [Introduction]

            Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

            [When this will happen:]

            Chrome and Edge will roll out this privacy related change as part of Chromium 141 at the end of September.

            [How this will affect your organization:]

            • Who is affected:
              • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
              • Admins managing browser policies for Windows, macOS, and VDI environments.
            • What will happen:

              If no action is taken:

              • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
              • If users do not click Allow, the following results occur on that device:
                • Performance acceleration will not be available (loss of faster data access behavior).
                • Offline functionality in OneDrive Web will not be available.
              • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

              When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

              [What you need to do to prepare:]

              1. Identify Required Domains
                1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
                2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
              2. Configure Browser Policy
                1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
                2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
                3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
                4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
                  1. DisableNucleusSync
                  2. DisableOfflineMode
              3. Remediation for Users Who Already Clicked Block
                1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
                2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.

            [Compliance considerations:]

            Compliance AreaExplanation
            Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
            Includes admin control

            Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

            Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
            Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.
            New

            Updated September 15, 2025: We have updated the content. Thank you for your patience.

            [Introduction]

            Upcoming privacy-related changes in Chromium-based browsers (Google Chrome and Microsoft Edge) will increase restrictions on local network access. When enforcement begins, users accessing OneDrive for Web (and some integrated Microsoft 365 experiences such as Microsoft Lists and SharePoint Document Libraries) will encounter a browser permission prompt for local network access unless the required policy is in place. If the permission is not allowed, performance optimizations and offline capabilities powered by OneDrive and Share Point will not be available. This communication provides required administrator actions to prevent loss of functionality.

            [When this will happen:]

            Chrome and Edge will roll out this privacy related change as part of Chromium 141 at the end of September.

            [How this will affect your organization:]

            If no action is taken:


            1. Who is affected:
              • All users accessing OneDrive for Web, Microsoft Lists, and SharePoint Document Libraries via Chrome or Edge browsers.
              • Admins managing browser policies for Windows, macOS, and VDI environments.
            2. What will happen:

              If no action is taken:

              • Users will see a new browser prompt requesting permission for local network access when opening OneDrive for Web and Lists.
              • If users do not click Allow, the following results occur on that device:
                • Performance acceleration will not be available (loss of faster data access behavior).
                • Offline functionality in OneDrive Web will not be available.
              • The experience will be slower and less resilient, and helpdesk contacts will increase due to unexpected prompts and missing offline capability.

              When the recommended browser policy is deployed in advance, the prompt is suppressed for the specified trusted Microsoft 365 endpoints and existing performance, and offline behavior are preserved. The policy prevents loss of existing capability and avoids user confusion.

              [What you need to do to prepare:]

              1. Identify Required Domains
                1. Include your organization’s SharePoint Online and OneDrive endpoints, for example: https://YOURTENANT-my.sharepoint.com or https://YOURTENANT.sharepoint.com
                2. Add additional sanctioned SharePoint Online host variations if applicable (e.g., specialized cloud environments). Avoid overly broad wildcards—conform to internal security governance.
              2. Configure Browser Policy
                1. Set the Chromium policy LocalNetworkAccessAllowedForUrls (Chrome Enterprise / Edge policy) to pre-authorize the listed domains.
                2. Apply via: ADMX / JSON for Windows; plist or configuration profile for macOS (Chrome and Edge).
                3. Roll out to all managed device groups (Windows, macOS, VDI as applicable).
                4. Even if the following policies are currently enabled by policy, deploy the allow-list to prevent future prompts and avoid user confusion.
                  1. DisableNucleusSync
                  2. DisableOfflineMode
              3. Remediation for Users Who Already Clicked Block
                1. Deploying the managed LocalNetworkAccessAllowedForUrls policy will override any prior per-user deny state and enforce the allow setting once the policy is applied to the device/profile; no end-user action is required after policy propagation.
                2. If you need immediate remediation before policy reaches the device, have the user open the affected OneDrive site, use the site (lock) icon, reset or change the local/network device access permission to Allow, then refresh.
              4. Ensure your Sync Client is updated to v.25.164

            1. Per machine SKU: The Sync client will automatically apply the required permissions and policies for existing users in Chrome and Edge—no user action is needed.

              2. Per user SKU: The Sync client will prompt users via a Windows Toast notification to enable these permissions. Users should follow the notification instructions to complete setup.

              [Compliance considerations:]

              Compliance AreaExplanation
              Alters how existing customer data is accessedLocal network access impacts how OneDrive and SharePoint optimize performance and offline access to cached data.
              Includes admin control

              Admins can configure the LocalNetworkAccessAllowedForUrls policy and deploy it via group policy or configuration profiles.

              Can be controlled through Entra ID group membershipPolicy deployment can be scoped to device groups managed via Entra ID.
              Allows user to enable/disable featureUsers can manually allow or block local network access via browser prompts if policy is not enforced.

              Never Miss a Microsoft 365 Update

              Join thousands of IT professionals who rely on DeltaPulse for real-time Microsoft 365 change intelligence, automated notifications, and community insights.