ANAVEM
Languagefr
How to Disable Folder Options Using Intune Group Policy

How to Disable Folder Options Using Intune Group Policy

Learn to disable Windows Explorer folder options across managed devices using Microsoft Intune Administrative Templates, preventing users from modifying critical file system settings while maintaining enterprise control.

Evan MaelEvan Mael
March 26, 2026 12 min
mediumintune 10 steps 12 min

Why Disable Folder Options in Enterprise Environments?

In enterprise environments, controlling user access to Windows File Explorer settings is crucial for maintaining security and compliance standards. The Folder Options dialog in Windows allows users to modify critical file system behaviors, including showing hidden files, changing file extensions, and altering security settings that could expose sensitive data or create vulnerabilities.

What Does Microsoft Intune Administrative Templates Provide?

Microsoft Intune's Administrative Templates, accessible through the Settings Catalog, offer granular control over Windows features without requiring traditional Group Policy infrastructure. The "Do not allow Folder Options to be opened from the Options button on the View tab of the ribbon" policy specifically targets the most common access point users employ to modify file system settings. This approach maintains administrative control while preventing unauthorized changes that could compromise security policies.

How Does This Policy Affect User Experience?

When implemented, this policy disables the Options button in the File Explorer View tab ribbon, preventing users from accessing the Folder Options dialog. Users retain normal file browsing capabilities but cannot modify view settings, file associations, or security-related options. This strikes a balance between usability and security, ensuring users can perform their daily tasks while preventing potentially harmful configuration changes that could expose the organization to security risks or compliance violations.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center

Start by signing into the Microsoft Intune admin center. Open your browser and navigate to the official portal.

https://endpoint.microsoft.com

Sign in with your Global Administrator or Intune Administrator credentials. Once logged in, you'll see the main dashboard with various management options.

Pro tip: Bookmark the endpoint.microsoft.com URL for quick access. The portal automatically redirects to the latest interface version.

Verification: Confirm you can see the "Devices" section in the left navigation pane and that your role permissions allow policy creation.

02

Navigate to Configuration Policies

From the main dashboard, navigate to the device configuration section where you'll create the new policy.

Click on Devices in the left navigation menu, then select Manage devices > Configuration. You'll see a list of existing configuration profiles if any are already created.

Click the Create button at the top of the page, then select New policy from the dropdown menu. This opens the policy creation wizard.

Verification: You should see the "Create a profile" page with platform and profile type selection options.

03

Configure Platform and Profile Settings

Select the appropriate platform and profile type for your Windows devices. This step is crucial for ensuring the policy applies correctly.

In the platform dropdown, select Windows 10 and later. For the profile type, choose Settings catalog. The Settings catalog provides access to all available Administrative Templates policies.

Platform: Windows 10 and later
Profile type: Settings catalog

Click Next to proceed to the basic information page.

Warning: Don't confuse Settings catalog with Device restrictions. The Folder Options policy is only available through Administrative Templates in the Settings catalog.

Verification: The next page should show "Basics" with fields for Name and Description.

04

Set Policy Name and Description

Provide a clear, descriptive name and detailed description for your policy. This helps with management and troubleshooting later.

Enter the following information:

Name: Disable Folder Options - File Explorer
Description: Prevents users from accessing Folder Options via the View tab ribbon in Windows File Explorer. Restricts modification of file system view settings while maintaining administrative control.

The description should clearly explain what the policy does and why it's being applied. This is especially important in enterprise environments where multiple administrators manage policies.

Click Next to proceed to the configuration settings.

Verification: The next page should display "Configuration settings" with an "Add settings" button.

05

Add Administrative Template Settings

Now you'll locate and configure the specific Administrative Template setting that controls Folder Options access.

Click the Add settings button. In the search box that appears, type:

Folder Options

From the search results, expand Administrative Templates > Windows Components > File Explorer. Look for the setting named:

Do not allow Folder Options to be opened from the Options button on the View tab of the ribbon (User)

Select this setting by clicking the checkbox next to it. This policy specifically targets the ribbon button access point in File Explorer.

Pro tip: The "(User)" designation means this policy applies to user sessions, not the computer configuration. This allows administrators to retain access while restricting standard users.

Verification: The selected setting should appear in your configuration settings list below the search area.

06

Enable the Policy Setting

Configure the policy setting to actively disable Folder Options access for users.

Click on the policy setting you just added. You'll see configuration options appear. Set the policy to Enabled. This is the key step that actually implements the restriction.

Policy State: Enabled
Effect: Disables the Options button on the View tab ribbon in File Explorer

When enabled, users will no longer be able to click the Options button in the File Explorer ribbon to access Folder Options. The button may still be visible but will be non-functional.

Click Next to proceed to scope tags configuration.

Verification: The policy should show as "Enabled" in your configuration settings summary.

07

Configure Scope Tags (Optional)

Scope tags help organize and control access to policies in large organizations. This step is optional but recommended for enterprise environments.

If your organization uses scope tags for role-based access control, add the appropriate tags here. For most implementations, you can skip this step by clicking Next without adding any tags.

Example scope tags:
- IT-Managed-Devices
- Corporate-Workstations
- Security-Restricted

Scope tags are particularly useful when different IT teams manage different device groups or when you need to delegate policy management responsibilities.

Verification: The next page should show "Assignments" where you'll select target groups.

08

Assign Policy to Target Groups

Select which users or devices will receive this policy. Start with a pilot group for testing before rolling out organization-wide.

In the Assignments section, click Add groups under "Included groups". Select your target groups from the list. For initial testing, choose a small pilot group:

Recommended approach:
1. Create pilot group: "Folder Options Policy - Pilot"
2. Add 5-10 test devices/users
3. Monitor for 24-48 hours
4. Expand to full organization

You can assign the policy to user groups (applies when users sign in) or device groups (applies to all users of those devices). For this policy, user groups are typically more appropriate.

Warning: Always test with a pilot group first. Policy changes can affect user productivity, and you want to identify any conflicts or issues before organization-wide deployment.

Click Next to review your configuration.

Verification: Your selected groups should appear in the "Included groups" section.

09

Review and Create Policy

Review all your policy settings before creating the final configuration. This is your last chance to make changes before deployment.

The review page shows a summary of your configuration:

Policy Summary:
- Name: Disable Folder Options - File Explorer
- Platform: Windows 10 and later
- Profile type: Settings catalog
- Setting: Do not allow Folder Options... (Enabled)
- Assigned groups: [Your selected groups]

Carefully review each section. Pay special attention to the assigned groups and the policy state (should be Enabled). If everything looks correct, click Create.

The policy will be created and begin deploying to assigned devices. Initial deployment can take 1-8 hours depending on device check-in schedules.

Verification: You should see a confirmation message and be redirected to the policy overview page showing deployment status.

10

Force Sync and Verify Policy Application

Speed up policy deployment by forcing device synchronization and verify the policy is working correctly.

To force immediate sync on test devices, navigate to Devices > Windows, select a target device, and click Sync. This triggers an immediate check-in.

On the target device, you can also force sync using Command Prompt as administrator:

dsregcmd /status

This command shows the device's Azure AD and Intune status. Look for recent sync timestamps.

To verify the policy is applied, open File Explorer on the target device and navigate to the View tab. The Options button should be disabled or non-functional.

You can also generate a policy report on the device:

gpresult /h C:\temp\intune-policy-report.html
Pro tip: Monitor policy deployment status in the Intune admin center under Devices > Configuration > [Your Policy] > Overview. This shows real-time deployment progress and any errors.

Verification: Users should no longer be able to access Folder Options through the File Explorer ribbon. Test with a standard user account to confirm the restriction is working.

Frequently Asked Questions

How long does it take for the Intune Folder Options policy to apply to devices?+
The policy typically applies within 1-8 hours after creation, depending on device check-in schedules. You can force immediate synchronization by selecting the device in Intune admin center and clicking Sync, or by running 'dsregcmd /status' in Command Prompt on the target device. Monitor deployment status in the policy overview page for real-time progress updates.
Can users still access Folder Options through other methods after applying this policy?+
This specific policy only disables the Options button in the File Explorer View tab ribbon. Users might still access some folder settings through other paths like Control Panel or right-click context menus. For comprehensive restriction, you may need to implement additional policies targeting these alternative access methods through the same Administrative Templates interface.
What happens if the Intune Folder Options policy conflicts with existing Group Policy settings?+
Intune policies generally take precedence over traditional Group Policy when devices are hybrid-joined or cloud-managed. However, conflicts can occur with overlapping File Explorer restrictions. Use 'gpresult /h report.html' on affected devices to identify policy conflicts and prioritize settings through assignment order or by removing conflicting traditional Group Policy objects.
Do administrators retain access to Folder Options when this Intune policy is enabled?+
Yes, this policy applies to user sessions, not computer-wide restrictions. Administrators with appropriate privileges can still access Folder Options when signed in with administrative accounts. The policy specifically targets standard user access while preserving administrative functionality, allowing IT teams to maintain system configuration capabilities.
How can I troubleshoot if the Intune Folder Options policy isn't working on some devices?+
First, verify device compliance and sync status in Intune admin center under Devices > Windows. Check that devices are properly enrolled and have recent check-in timestamps. Force manual sync if needed. Use 'gpresult /h report.html' on affected devices to confirm policy application. Common issues include device enrollment problems, network connectivity, or conflicting policies that need resolution through assignment priority adjustments.
Evan Mael
Written by

Evan Mael

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

Sign in to join the discussion