Introduction
Gaining control over students opening irrelevant files from their devices, even after implementing restrictions of downloading file types is a growing concern for IT administrators.
Opening existing local files may create security threats, where students may share malicious files to other students and disrupt the classroom environment.
The limitation is that Google Admin Console does not provide a granular setting to block specific file types opening on their Chromebooks. However admins can restrict the downloads of such file types but they can't control what is already downloaded and stored on devices.
In this guide, we’ll cover:
- Why disabling file openings for students is important
- Impact of allowing students to open locally stored files
- Available solutions and the effective way to block local file types from opening in the browser on school Chromebook.
- How to block local file types in the browser using xFanatical Safe Doc.
Why Is Controlling Local File Access a Challenge?
The major challenge is to prevent local file types from opening in Chromebooks. Admins can control the downloading and sharing permissions for specific file types but do not have any settings to control over opening existing files on a student's device. For example, students may have game files stored locally on their system and they can play games during ongoing class and disturb learning.
Unmanaged local file types access create the following challenges for administrators.
- Students can open offline games or entertainment content during ongoing classes, even when internet access is restricted.
- Since these files are already stored on the device, they remain accessible at any time.
- These files can be shared easily among students using external devices or internal transfers, which increases the spread of non-educational content across the classroom.
- Administrators lose visibility and control over student activity because these actions do not rely on internet access.
Why Google Workspace Cannot Block Opening Local File Types
Before understanding the limitation, it is important to understand how browsers handle local file access. In Chrome browsers, users can open local files stored in the device directly without the need of an active internet connection. Files can be opened using shortcuts like ctrl+O, drag and drop the file or navigate through the local file path.
Google Workspace cannot block opening local file types because this behavior is controlled entirely by the browser. The Google Admin Console provides administrative controls to manage sharing permissions and apply download restrictions. However, it does not offer a granular setting to restrict how local files are opened within the browser. There is no policy to filter or block files based on extensions such as .html, .mhtml, .mp4, .mp3 or .gif once they are already present on a device.
The Risk of Uncontrolled Local File Access in Schools
The impact of unrestricted opening of local file types in a school environment is critical since it directly affects classroom discipline and learning outcomes. Even after applying download restrictions on managed devices, students can still access and open locally stored files during learning.
Additionally, locally stored files can be of large sizes hence consume lots of device storage, which may slow down device performance in managed environments.
This issue is commonly experienced by both teachers and IT administrators. Let’s see some real time questions from customers -
“Students open HTML files stored locally on their devices and play games during classes. Even with restrictions in place, this completely bypasses our controls and becomes a major distraction.”
“We’ve noticed students sharing simple HTML game files among themselves. Since these files can be opened directly in the browser, they don’t trigger any restrictions and spread quickly across the classroom.”
Available Solutions to Disable Local File Openings in Chrome
Before choosing a solution, it’s important to understand that blocking local file openings on Chromebooks is not fully supported through native Google Admin controls. Most available methods offer only partial restrictions and come with usability or scalability limitations.
Below are the common approaches used by schools, along with their limitations. The final solution from xFanatical Safe Doc Chrome extension provides the most effective and scalable control.
- Solution 1: Disable Access to Local File URLs (file://) via Chrome Policies
Administrators can attempt to restrict access to local file paths (file://) using advanced Chrome policies or kiosk-style configurations in Google Chrome. This can limit how users navigate to local files directly through the address bar.
However, this method is not straightforward and requires custom configurations.
Limitation: This does not fully prevent opening local files via drag-and-drop, shortcuts or other indirect methods. It is also difficult to manage at scale in school environments.

- Solution 2: Device-Level Restrictions
Administrators can apply strict device-level controls using the Google Admin Console on managed Chromebooks, such as restricting USB access, limiting file transfers or enforcing kiosk mode. This helps in reducing file access on the devices.
Limitation: These controls reduce file availability but do not stop users from opening files that are already present on the device. Additionally, it impacts usability for real educational needs.

- Solution 3: Restrict Browser Downloads to Reduce Local File Access (Limited Control)
This solution focuses on reducing local files by restricting downloads at the browser level. Using the Google Admin Console, admins can configure download restrictions settings for managed devices. By navigating to Devices > Chrome > Settings > Users & Browsers > Download restrictions, admins can block download functionality. This thereby indirectly reduces the risk of students opening offline content such as .html, .mhtml, .mp4 or .mp3 files.
Limitation: This approach blocks or restricts downloads entirely but does not prevent students from opening files that already exist on the device.

- Solution 4: Browser-Level Enforcement (Recommended)
This approach uses a browser extension to enforce granular, real-time control directly within the browser. The browser extension works at the browser level without depending on backend policies.
We provide you with a Safe Doc extension which can detect when a user attempts to open a file. identifies the file types and block opening local files such as .html, .mhtml, mp4, mp3 and.gif.

Disable Opening of Local File Types with xFanatical Safe Doc
xFanatical Safe Doc is a browser extension that provides policies to maintain focused and secure learning environments for K-12 students. It provides policies to manage and restrict access to irrelevant online content for a safe and productive digital environment and allows administrators to prevent students from opening certain file types directly in the browser.
With Safe Doc, administrators can stop students from opening and playing games, access audio files, videos and other non-educational content. The extension allows admins to customize which file types to restrict from opening. By enabling the BlockOpenLocalFileTypes policy, administrators can disable opening local files such as html, mhtml, mp3, gif and mp4 files.

xFanatical Safe Doc restricts file types from opening in browsers.
How to Block Opening of Local File Types Using xFanatical Safe Doc
Step 1: Install xFanatical Safe Doc:
To get started, first install Safe Doc in your Google Workspace environment. Safe Doc is a web browser extension that seamlessly integrates with Google workspace apps.
Step 2: Configure Safe Doc settings:
Once Safe Doc is installed, you can configure its settings to prevent local files from opening while browsing on a local drive. To configure Safe Doc successfully, make sure you have deployed Safe Doc on your students' Chrome browsers and review the xFanatical Safe Doc Configuration document for detailed instructions.
Step 3: Access Google Admin Console:
Go to the Google Admin Console. In the Google Admin Console, click Devices > Chrome > Apps & Extensions and click Users & Browsers.
Step 4: Apply the policy:
Find the policy that you want to apply and review it. The policy will display in a below format:
"BlockOpenLocalFileTypes": {
"Value": [".html",".mhtml",".mp3",".mp4",".gif"]
}
Note: Admin can select which of these files they want to block. For example - If the want to just block mp3 and mp4, then value will be [".mp3",".mp4"]
Step 5: Save the policy:
After applying the policy, click Save.
Conclusion
Since Google Workspace does not provide a native way to stop students from opening already stored file types at the browser level. Native policies only manage the sharing and permissions access, but they do not control how files are opened or used after they are stored on a device. To address the problem, browser-level enforcement is the effective solution which provides a way to block opening local file types. By using xFanatical Safe Doc, administrators can define which file types are allowed and which should be restricted. As a result, schools can maintain a secure and focused digital learning environment while still allowing necessary educational resources to be accessed.
To learn more about how xFanatical Safe Doc can help enhance online safety in your educational institution, visit our website xFanatical Safe Doc
Explore xFanatical Safe Doc with 30 days of trial.
xFanatical Safe Doc