troubleshooting
15 Topics10 ChromeOS resources to bookmark as an IT Admin
Hello ChromeOS IT Admins! Here's a handy list of 10 essential resources to bookmark. These resources will help you stay up-to-date with the latest news, manage your ChromeOS devices effectively, and enhance your skills. ChromeOS Product Blog: Visit resource Stay updated with the latest official news, updates, and insights on ChromeOS. ChromeOS YouTube Video Playlist: Visit Resource Access a collection of videos covering various aspects of ChromeOS, including demos, customer stories, and security features. ChromeOS Help Center: Visit Resource Find comprehensive support articles and guides for managing ChromeOS devices in a business environment. ChromeOS Release Notes: Visit Resource - Subscribe Here Keep track of the latest ChromeOS updates, including new features, security enhancements, and changes for IT administrators. ChromeOS Device List: Visit Resource Discover the full range of ChromeOS devices to suit any enterprise requirement. Chrome Enterprise Recommended Website: Visit Resource Discover verified solutions and integrations from third-party partners that enhance your ChromeOS experience. ChromeOS Flex Device Certified List: Visit Resource Find a list of devices certified to work with ChromeOS Flex, allowing you to repurpose existing hardware. ChromeOS Auto Update Policy Device List: Visit Resource View makes/models and manage how and when ChromeOS devices receive updates to ensure security and stability. Online IT Admin Training: Visit Resource Enhance your skills with online training courses designed for ChromeOS IT administrators. Get ChromeOS Professional Admin Certified: Visit Resource Validate your expertise and become a certified ChromeOS Professional Administrator. And how about just one more bookmark! The ChromeOS Community: Visit Website We couldn’t have a shortlist of ‘go-to’ resources without shouting out this very community. Bookmark and come visit again soon! Best of luck!131Views0likes2CommentsCustom Protocol Handler for Isolated Web App Not Working After ChromeOS Update (May be).
Hello, After my ChromeOS device updated on September 25, 2025 (though not certain this is the direct cause), custom protocol handlers (web+collab:// and collab://) for my Isolated Web App (IWA) stopped working. Triggering these links in Chrome no longer launches the app—they simply do nothing. This was functional until two days ago. App Type: Isolated Web App (IWA) Manifest excerpt: { "name": "someapp", "id": "/", "short_name": "some-app", "version": "0.1.0", "update_manifest_url": "https://github.com/--some-repo--/iwa-release/releases/latest/download/update.json", "icons": [ { "src": "/192x192.png", "sizes": "192x192", "type": "image/png", "purpose": "any maskable" }, { "src": "/144x144.png", "sizes": "144x144", "type": "image/png", "purpose": "any maskable" } ], "start_url": "/", "scope": "/", "display": "standalone", "display_override": ["borderless"], "background_color": "#ffffff", "theme_color": "#3B82F6", "isolated_storage": true, "permissions_policy": { "cross-origin-isolated": ["self"], "direct-sockets": ["self"], "controlled-frame": ["self"], "window-management": ["self"], "display-capture": ["self"], "all-screens-capture": ["self"] }, "protocol_handlers": [ { "protocol": "web+collab", "url": "/?data=%s" }, { "protocol": "collab", "url": "/?data=%s" } ], "launch_handler": { "client_mode": "navigate-existing" }, "window_controls_overlay": { "enabled": true } } Recent Changes Enrolled new users in Google enterprise Updated the app manifest (see above) ChromeOS device updated on 2025-09-25 Observed Behavior Protocol links for both my IWA (web+collab://) and the official ChromeOS IWA SINK app (web+cf://) no longer launch the installed apps No errors, warnings, or manifest validation issues Clicking protocol links does nothing (both in managed and unmanaged device states) What I've Tried Checked manifest and protocol handler registration Tested after app reinstall and in different device policy states Reviewed enterprise Admin Console for new/relevant policy changes Searched for protocol handler or IWA-related changelogs/updates Compared behavior with different protocol URLs and schemes Questions Is anyone else experiencing protocol handler breakages for IWAs since a recent Chrome/ChromeOS update? Have there been changes in policy, manifest format, or handler registration that could affect this? Any ideas or diagnostics for discovering if Chrome or policy is blocking/ignoring the protocol? Any leads, recent experiences, or possible workarounds would be greatly appreciatedSolved122Views1like5CommentsMastering ChromeOS versions
Hello everyone! We all know how crucial it is to keep your ChromeOS devices running smoothly across anenterprise, especially with different versions deployed. Today, I want to highlight a fantastic, often underutilized, resource that can be a real game-changer for troubleshooting: chromiumdash.appspot.com/serving-builds?deviceCategory=ChromeOS It's packed with information that can help you quickly identify and resolve issues you might encounter. How can this website help you troubleshoot across different ChromeOS versions? Pinpoint Build Information: Ever wondered exactly what build your users are on, or what the latest stable, beta, or dev builds are for a specific device? This site gives you that information at a glance. Knowing the exact build can help you verify if a known bug has been fixed in a newer version, or if a reported issue is specific to an older release. Track Release Channels: You can see which versions are currently "serving" on Stable, Beta, Dev, and Canary channels. This is helpful when you're testing new features or trying to understand if an issue is present across all channels or just a specific one. Identify Recent Updates: If a user reports a problem right after an update, you can quickly check what changes went into that specific ChromeOS version. This can give you clues about potential regressions or new features that might be causing the issue. Compare Versions: Having trouble with a specific app or feature on an older ChromeOS version, but it works fine on a newer one? This site allows you to easily see the differences in release numbers, helping you narrow down when a fix might have been introduced, or when a change occurred that could be impacting your users. Plan Upgrades: By understanding the different serving builds, you can better plan your ChromeOS upgrade strategies and anticipate potential issues that might arise when moving to a newer version. In a nutshell, this website provides transparency into the ChromeOS release cycle, empowering you with the data you need to confidently troubleshoot problems across your diverse ChromeOS fleet. So next time you're facing a tricky ChromeOS issue, give this site a look – it might just have the answers you're looking for!100Views0likes0CommentsLocked Mode Google Form
This has worked in the past... years ago. Our domain is having an issue regarding Locked Mode in Google Forms (Quiz). The form acts as it is supposed to, popup when the student tries to open the quiz more than once using a Chromebook, however... Emails are never sent to teacher. I have checked the Google Email log. The emails are not being marked as SPAM or not making it to the INBOX. It is like the emails are never being generated. I have had multiple tickets open with Google and no resolution. Any help is appreciated.Solved84Views0likes2Comments[Bug Report & Solution] Root Cause of Grayed-Out ADB Debugging on Debian 13 (Trixie): Broken Google Repository
Hello Chrome OS Engineering Team, After extensive troubleshooting regarding the "Enable ADB debugging" toggle remaining grayed out on managed devices, I have isolated the root cause. It is not an Admin Policy issue, nor a user error. The issue is a missing dependency in the Google Package Repository for Debian 13 (Trixie), which prevents the installation of cros-guest-tools. Without cros-guest-tools, the Chrome OS Host cannot verify the container's integrity or establish the necessary bridges, leading the OS to lock developer features (ADB) as a security fallback. Here is the technical breakdown and the required fix. 1. The Environment Host: Chrome OS (Version 131+) Guest: Debian 13 (Trixie) - Current Stable. Repository Config: /etc/apt/sources.list.d/cros.list deb https://storage.googleapis.com/cros-packages/142 trixie main 2. The Error When attempting to install or update the integration tools via sudo apt install cros-guest-tools, the package manager fails with a hard dependency error: The following packages have unmet dependencies: cros-guest-tools : Depends: cros-im which is a virtual package and is not provided by any available package Running sudo apt search cros-im confirms that this package does not exist in the trixie RELEASE of the repository. 3. The Diagnosis The cros-guest-tools meta-package depends on cros-im (Input Method integration). In Bookworm (Debian 12), this dependency is satisfied (likely by cros-im-default or similar). In Trixie (Debian 13), the cros-im package has not been published or linked in the repository index. 4. The Solution (Action Required from Google) The repository maintainers need to push the missing input method packages to the Trixie DIRECTORY immediately. Required Action: Please ensure cros-im-default (or the architecture-specific equivalent) is added to: https://storage.googleapis.com/cros-packages/142/dists/trixie/main/ Once this dependency is resolvable: cros-guest-tools will install correctly. The Host<->Guest handshake will complete. The "Enable ADB Debugging" toggle will unlock in the Chrome OS Settings. Please escalate this to the Cros Packaging team. Best regards, Christophe Roux81Views0likes2CommentsMaximize resolution: Your guide to getting the most out of support 🚀
As a ChromeOS IT Admin, you ensure seamless, secure, and productive user experiences. For initial assistance, consult the articles in the Chrome Enterprise and Education Help Center. For further assistance, Google Enterprise Support is your 24/7 worldwide technical partner. Refer to the technical support services guidelines for detailed information on supported Chrome Services. Access important information regarding releases and service status: Release Notes: https://support.google.com/chrome/a/answer/7679408 Release Blog: https://chromereleases.googleblog.com/ Status Dashboard: https://www.google.com/appsstatus/dashboard/ Know your scope: What ChromeOS support covers Refer to the technical support services guidelines (TSSG) for comprehensive details on supported issue types for Chrome Services. While typical areas of supported and out-of-scope items are described below, the TSSG remains the definitive reference, and the examples provided are not exhaustive. Area Supported Items Out-of-Scope Items ChromeOS Devices Device enrollment, Enterprise policy configurations, Management of apps and extensions, OS issues. Third-party software, apps, extensions, or integrations. ChromeOS Flex Installation, Device enrollment, Audio or video challenges. Flex devices not on the certified model list. Chrome Enterprise Chrome Browser Cloud Management policies, Chrome installer packages. Third-party extensions, Design/Coding/Debugging APIs. 2. Set the pace: Choosing the right priority The priority you select dictates the pace of your case. Correct priorities help the support team focus on the most impactful issues first. Refer to How we prioritize your issue for more details. 3. Case creation best Practices: Provide the four key components Including as much information and detail as possible up front is the single best way to accelerate resolution by reducing the initial back-and-forth with support. Always include these four key components: A. Precise timestamps ⏰ When did the problem begin and end? The more specific (down to the second) the better. B. Problem & environment details 💻 What specific devices/models are affected? Which OS version? What applications are involved? Where did this occur? (e.g., production or test environment) . Attach logs (device logs, network logs), screenshots, or copies of error messages. C. Reproduction steps 🔄 Is the problem reproducible or intermittent? Provide full reproduction steps if possible. Describe what led up to the problem happening. What did you already rule out and test? D. Context and impact 📈 How does this impact your business? Are all your users affected, or only some? Do you have a workaround? Are there deadlines/key milestones at risk? Note : For quick "how-to" questions, support via chat is generally the most efficient method. However, for more complex issues that require extensive troubleshooting, it is recommended to submit a support case through the portal. This ensures that all pertinent information is captured and the appropriate priority level can be assigned, facilitating a quicker resolution. 4. Wrapping up: Case closure and feedback Upon confirmation that your issue has been successfully resolved, the support case will be closed. Following closure, you will receive a survey. Your feedback is invaluable in helping us enhance our services, so please take a moment to complete it. 5. Resolution and Escalation Guidance For more details on navigating resolution and escalation processes, please refer to the following resource: https://support.google.com/a/answer/10759436 Do you have any other questions or comments when it comes to support? Let us know if what you want to hear about next in our User Guide section.69Views0likes0CommentsThe "Enable ADB Debugging" Maze: A Call for Architectural Clarity, Unified Nomenclature, and UI Improvements
Hello Chrome OS Enterprise Community and Google Product Team, I am an administrator and developer using a managed Chromebook for Android development. For over a month, I have been unable to toggle "Enable ADB debugging" in the Linux (Crostini) settings because it remains grayed out, despite my having full admin access. After weeks of back-and-forth with Google Workspace Support, it has become clear that this is not just a bug, but a profound architectural issue regarding how managed Chrome OS handles policy dependencies and how we navigate the Admin Console. Technical Environment & Stability Context It is important to note that my development environment is not a fresh install, but a long-running, stable workspace. I have been using the same Crostini container for over a year, and recently performed a successful dist-upgrade from Debian 12 (Bookworm) to Debian 13 (Trixie), which is the current Stable release. The fact that Crostini handled this major OS upgrade without requiring a reinstall demonstrates the high quality and robustness of the Chrome OS platform. However, this longevity raises a diagnostic question: Is the ADB toggle logic failing specifically on containers that have migrated through major versions? The Current Situation: A Maze of Hidden Dependencies Support has provided numerous potential fixes, suggesting that the "ADB" feature is not controlled by one switch, but is the result of a complex calculation involving multiple policies scattered across different menus. I have re-checked all the following solutions proposed by Support between Nov 7 and Dec 11, 2025. None have solved the issue: Date Policy Name Exact Admin Console Path Action Taken Nov 7 Developer tools Devices > Chrome > Settings > Users & browsers > Content > Developer tools Set to "Always allow use of built-in developer tools." Nov 21 Linux virtual machines Devices > Chrome > Settings > Users & browsers > Virtual Machines > Linux virtual machines Set to "Allow usage for virtual machines needed to support Linux apps for users." Nov 24 Untrusted sources Devices > Chrome > Settings > Users & browsers > Android applications > Android apps from untrusted sources Set to "Allow" (Required for sideloading). Dec 3 Developer Tools (Refined) Devices > Chrome > Settings > Users & browsers > Content > Developer tools Set to "Allow use of built-in developer tools, except force-installed extensions..." Dec 10 ADB Sideloading Devices > Chrome > Settings > Device settings > Virtual Machines > ADB sideloading Set to "Allow affiliated users of this device to use ADB sideloading." Dec 11 Unaffiliated VMs Devices > Chrome > Settings > Device settings > Virtual Machines > Linux virtual machines for unaffiliated users Set to "Allow usage for virtual machines needed to support Linux apps for unaffiliated users." The Architectural Problem Administrators are currently guessing which combination of "User Settings" and "Device Settings" will result in the feature unlocking. There is no visibility into which specific policy is overriding the others. Furthermore, the UI itself makes locating these settings inefficient. Proposal 1: A "Computed Policy View" We need a diagnostic view in the console. When an Admin looks at a locked setting (like ADB Debugging), the console should display: Status: LOCKED Blocked By: Device Policy > ADB Sideloading OR User Affiliation Check Failed. Proposal 2: A Standardized Nomenclature for Admin Options The Google Admin Console contains thousands of options. Support tickets often fail because describing the path to an option is tedious and prone to error. I propose implementing a Unique Identifier System: Menus/Tabs: assigned a 3-letter nickname. Sections/Options: assigned a numerical ID. Example: Instead of describing a long path, we could simply reference ID: DEV-CHR-DEV-VMS-042 DEV: Menu (Devices) CHR: Product (Chrome) DEV: Tab (Device Settings) VMS: Section (Virtual Machines) 042: Option (ADB Sideloading) Entering this ID into the search bar should take the admin directly to the specific toggle. Proposal 3: Collapsible Sections (Fold/Unfold UI) Currently, settings pages (like Users & browsers) are massive vertical lists. To reach a section near the bottom, an admin must scroll past hundreds of irrelevant options in previous sections. Even when using the "search on page" function, the visual clutter is overwhelming. I propose adding a Fold/Unfold feature: A "Collapse All / Expand All" button at the top of the settings page. Clickable section headers that allow us to hide large blocks of settings we are not currently editing. Conclusion We cannot manage what we cannot find or understand. The current "trial and error" approach to enabling standard developer features is hindering adoption in the enterprise sector. We need better mapping, a precise language (nomenclature), and a more efficient UI to navigate this complex environment. Best regards, Christophe Roux57Views0likes1Comment