Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Manage Mozilla Firefox settings with Microsoft Intune
    Intune

    Manage Mozilla Firefox settings with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkMarch 11, 2020Updated:June 24, 2021288 Mins Read

    The last couple of weeks I wrote a lot of blog posts related to managing the new Microsoft Edge browser with Microsoft Intune. And in the past I wrote articles about managing Internet Explorer and Google Chrome. it`s now time to show how the other popular webbrowser, Mozilla Firefox, can be managed using Microsoft Intune.

    Like Google Chrome, Firefox can also be managed using a Custom configuration profile for Windows 10. The policy consists of two parts. The first part is used to deploy the Firefox ADMX file to the Intune managed device. The second part of the policy is used to manage the settings of choice.

    Deploy the Firefox ADMX file

    The Firefox ADMX file can be downloaded from GitHub. After downloading the file, locate the ADMX file and open the file with a text editor.

    Now open a browser to sign-in to the Microsoft Endpoint Manager (Intune) portal.

    • Sign-in to the Device Management Portal
    • Browse to Devices – Windows
    • On the Configuration Profiles tab click Create profile
    • Give the configuration profile a Name
    • Enter a Description (optional)
    • Choose Windows 10 as Platform
    • Choose Custom as Profile type
    • Click the Settings tab
    • Click Add

    With this row we deploy the ADMX file to the Windows 10 device. As you can see the OMA-URI contains ADMXInstall.
    More info on how the OMA-URI is build up and complementing information about ADMX-backed policies can be read in this article on Microsoft Docs.

    Enter below information to the policy;
    Name: Firefox ADMX Ingestion
    OMA-URI: ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Firefox/Policy/FirefoxAdmx
    Data Type: String
    Value: As value copy the entire content of the ADMX file in the value field

    Click OK twice and click Create.

    The policy to deploy the ADMX file is ready. In the next steps we add the settings we manage with Intune to the same policy.

    How to build up the OMA-URI

    As with deploying the ADMX file, for the settings to manage we also need to know the OMA-URI. But the OMA-URI for managing the settings consists of some information we need to collect ourselves from the Firefox ADMX file.

    This is for example the OMA-URI to manage the Homepage URL
    ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
    Let`s split up the OMA-URI in seperate parts.
    This is default for managing applications using an ADMX file:
    ./Device/Vendor/MSFT/Policy/Config/

    The part that comes next is not always the same, we need to follow some rules:
    Firefox~Policy~firefox~Homepage
    It starts with Firefox (the ADMX file name), like in the ADMXInstall URI, followed by Policy. Between every part we have the ~ sign.
    After Policy we see the name of two categories. These categories can be found in the Chrome ADMX file.
    When we open the ADMX file in a text editor, we can see there are several categories. The first categorie we find in the ADMX file is the top category and as we can see that is firefox (name). We put this in the OMA-URI after Policy.

    If we search for the actual policy we want to control, in this case HomepageURL, we also find there is a category mentioned for that policy. It is the parentcategory of HomepageURL, Homepage.
    So homepage is the next part of our OMA-URI.

    The last part of our OMA-URI is the actual policy displayname, in this case HomepageURL. If we put al this information together, we have our OMA-URI.

    Manage Homepage settings

    We start with managing the settings from the Homepage categorie. These are settings like the Homepage URL and Startpage.

    We have already seen how to build the OMA-URI for the policy HomepageURL, so let`s start with that one. The Data type for these settings is always String. Than we only need to know what our Value is.

    The value starts with <enabled/> (or <disabled/> if you like to disable a setting).
    If we have a setting which can only be set to enabled or disabled, than that`s the value.

    But for HomepageURL, we need to set the actual homepage URL. In this case <enabled/> is followed by a data id. The data id is found again in the ADMX file, in below example the text id, HomepageURL. And as last we need to set a value, the valuename, which is the URL from your website of choice.
    This policy also contains a second setting, which is optional, with which we can lock the homepage. To enable this setting we also start with <enabled/> followed by a boolean id as data id (HomepageLocked). As value we have two choices which are mentioned, trueValue, disabledValue.

    Switch over to the Intune portal.

    • Open your existing custom policy or create a new policy
    • On the settings tab click Add
    • Give the Row a Name
    • Fill in the OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
    • Data type: String
    • Value:
    <enabled/>
    <Data id="HomepageURL" value="https://inthecloud247.com"/>
    <data id="HomepageLocked" value="true"/>
    • Click OK

    That`s all to manage our first Mozilla Firefox setting using Microsoft Intune!

    The next example is the Homepage Startpage. Open the ADMX file and search for the corresponding policy. With the information found in the ADMX file we can create the OMA-URI.
    The parentcategorie is Homepage, the setting itself is HomepageStartpage.
    The data id is in this setting enum id=Startpage.
    For this setting we have three options we can set as value; none, homepage and previous-session. I choose homepage in this example.

    • Open the Intune portal
    • Give the Row a Name
    • OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
    • Data type: String
    • Value:
    <enabled/>
    <data id="StartPage" value="homepage"/>
    • Click OK

    If you`d like to configure additional homepage URLs, we can use the setting HomepageAdditional for that. In the ADMX file we find the ID to be used in the value field and further not much info.
    We can add multiple URLs to the setting. Every URL needs to be separated with the (encoded) unicode character &#xF000 and because we need to number the URLs, the unicode character is also used between the number and the URL.

    • Open the Intune portal
    • Give the Row a Name
    • OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
    • Data type: String
    • Value:
    <enabled/>
    <data id="HomepageAdditional" value="1&#xF000;http://www.microsoft.com&#xF000:2&#xF000;http://www.mempowered.eu"/>
    • Click OK

    With this settings we have configured a homepage URL, made sure an user cannot change it and the startpage URL is set to the homepage.

    Manage Block About settings

    The next example is a setting to block access to the about:config page. As you can see in the AMDX file, this policy setting isn`t located under a subcategorie, but direct onder the top categorie, firefox.
    Another difference with the previous policies, there is no id mentioned. This policy can only be set to <enabled/> or <disabled/>.

    Op

    • Open the Intune portal
    • Add a new row
    • Give the Row a Name
    • OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
    • Data type: String
    • Value:
      <enabled/>
    • Click OK

    Let`s move on to the next example.

    Manage Tracking Protection settings

    Firefox contains a feature called Tracking Protection, like we have seen in the new Edge browser. This feature can be managed with a couple of settings.
    With the first setting we enable Tracking Protection.
    Open the ADMX file and search for TrackingProtection.
    With the setting A_TrackingProtection_Value we enable the feature.

    • Open the Intune portal
    • Add a new row
    • Give the Row a Name
    • OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
    • Data type: String
    • Value:
      <enabled/>
    • Click OK

    I want to make sure Tracking Protection isn`t switched off by the user, which is done with the setting E_TrackingProtection_Locked.

    • Open the Intune portal
    • Add a new row
    • Give the Row a Name
    • OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
    • Data type: String
    • Value:
      <enabled/>
    • Click OK

    With this last example I make sure trackers are blocked for cryptominers, which can be done with the setting B_TrackingProtection_Cryptomining.

    • Open the Intune portal
    • Add a new row
    • Give the Row a Name
    • OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
    • Data type: String
    • Value:
      <enabled/>
    • Click OK

    When your done adding the ADMX file and all the settings, make sure to assign the policy to a security group.

    End-user experience

    Let`s have a look at the end-user experience.
    Make sure the policy is applied to an Intune managed device with Mozilla Firefox.

    When we now start Firefox, the homepage which we set with the policy is shown.
    If you also configured the HomepageAdditional setting, multiple tabs with websites are opened.

    If we open Settings, we see the homepage settings section is greyed out. And we see a message on the top of the page; Your browser is being managed by your organization.

    When you click on that message the about:policies page is opened which shows all managed settings.

    Switching back to the Settings, on the Privacy & Security tab we see Enhanced Tracking Protection is also managed. Tracking Protection is set to custom, Tracking content and Cryptominers is checked.

    That`s it for this blog post. I hope you find it informative and if you have any questions, let me know in the comments!

    To see how you can manage bookmarks using Intune, read the follow post!

    NB: Don`t just copy/ paste the policy values into your own custom policies. Unfortunately WordPress converts the double quotes So please replace the quotes from the article before deploying the settings.

    Administrative Templates Browser Firefox Intune MEM Microsoft Endpoint Manager Mozilla Firefox Windows Windows 10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Working with a FIDO2 security key in a virtual machine

    September 1, 2021

    Speed up your Autopilot deployments by disabling the Account Setup phase

    June 23, 2021

    Manage new ADMX Backed Windows 10 policies with Microsoft Intune

    August 19, 2020
    View 28 Comments

    28 Comments

    1. David on April 15, 2020 08:16

      very helpful article. You can add several start pages if you add a pipe between the urls.

      Reply
      • Peter Klapwijk on April 15, 2020 20:31

        Are you sure about that David? I`m only aware that we can do this by using setting HomepageAdditional.
        It added that to the article, to show how that works.

        Regards,

        Peter

        Reply
    2. David on April 20, 2020 11:03

      Yes,
      HomepageURL https://inthecloud247.com|https://www.google.com
      should work

      Regards,

      David

      Reply
    3. Peter de Vries on April 29, 2020 15:55

      Hello Peter (Klapwijk),

      I am trying to add a list of sites that are automatically authenticed via the Firefox option > network.automatic-ntlm-auth.trusted-uris
      I Tried the following, and it not working

      Name: some_name
      Description: some_description
      OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
      Data type: String
      Value:

      Could you tell me how I can do this using a OMA-URI in Intune?

      Best regards,

      Peter (de Vries)

      Reply
      • Peter de Vries on April 29, 2020 23:27

        I managed to solve it with the below OMA-URI value

        [enabled/]
        [Data id=”Authentication” value=”1https://fqdn1,https://fqdn2,https://fqdn3” valueprefix=”true”/]

        I am using open en close brackets because in the example because if I use greater / less than brackets the code is not displayed. Hope this works better for the example

        Reply
        • Peter Klapwijk on April 30, 2020 09:23

          Thanks for sharing the solution Peter, glad you resolved the issue.

          Yes, unfortunately these kind of values are scrambled on the WordPress site.

          Reply
        • Veronika Robinson on October 1, 2020 21:26

          Peter,
          Can you please clarify the syntax for OMA-URI value? Is the below correct?

          <Data id=”Authentication” value=”1 https://acbj.sharepoint.com/sites/home” valueprefix=”true”/]

          Reply
    4. Peter Klapwijk on April 29, 2020 19:14

      Hi Peter,

      Not tried that particular setting, but have you tried to separate the URLs with the unicode character as described above? You probably also need to number the URLs, than you should also need to take that in mind.
      This is also used for HomepageAdditional which you can use as an example, just replace data id and the URLs.
      I suggest to first test the policy with only one URL, to make sure the policy itself is working as expected. If that works fine, try to add additional URLs.

      Reply
      • Peter de Vries on April 29, 2020 23:30

        Just got it to work and replied to my own first comment with an example of how i did it. See above

        Could you maybe remove my other comment with the server names in it? That was not supposed to happen. Thanks in advance

        Reply
    5. Keith Moon on May 5, 2020 04:19

      Hello Peter,
      I’ve followed your instruction, it’s great, one thing I can’t get my head around, not sure you have tried, is setting Browser Bookmarks, so that all deployed firefox browsers have some default bookmarks.
      I’ve tried with various combinations of the below, and no joy.
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
      string

      Reply
      • Peter Klapwijk on May 6, 2020 14:12

        Maybe it`s related to this bug: Due to a bug, you must select the location.
        I`ve used the Github example from Firefox to test this setting, without luck. I`m not able to help at this moment.

        Reply
      • Bruce on May 19, 2020 23:59

        Were you able to get the bookmarks to work?

        Reply
        • Keith Moon on May 20, 2020 00:02

          I did get the bookmarks to work in bookmarks bar, which also allows in bookmarks menu. So it does work.

          Reply
          • Bruce on May 20, 2020 00:05

            Bookmarks is the last piece for me. Anyway you can ping me on twitter? Twitter Handle is BruceSaaaa

            Reply
            • Peter Klapwijk on May 22, 2020 16:35

              I spend some more time on the Bookmarks and it now is clear why my setting failed 🙂
              All 5 settings are required for Bookmarks and as I left out the BookmarkFavicon it failed on that, but I missed that event error. Also important is to start the URL with http or https. If it doesn`t start with that (but for example with www), the policy might show success, but no Bookmark is shown.

    6. Otacon95 on May 5, 2020 09:26

      Hello Peter,
      It seems the proxy configuration doesn’t work. I want to use ConnectionType=system.
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
      \data id=”ConnectionType” value=”system”//
      I have an unknown error.

      Reply
      • Peter Klapwijk on May 6, 2020 14:13

        Hello,

        Maybe it`s related to this bug:
        Due to a bug, you must select a value for the SOCKS proxy version.

        Reply
        • Peter Klapwijk on May 25, 2020 20:36

          It seems that, like with the Bookmark policy, all settings need to be configured to get the proxy configured.
          That means setting ConnectionType to system and also configuring all those settings:

          data id=”ProxyLocked
          data id=”ConnectionType
          data id=”HTTPProxy
          data id=”UseHTTPProxyForAllProtocols
          data id=”SSLProxy
          data id=”FTPProxy
          data id=”SOCKSProxy
          data id=”SOCKSVersion
          data id=”AutoConfigURL
          data id=”Passthrough
          data id=”AutoLogin
          data id=”UseProxyForDNS

          Settings which can be left blank, like AutoConfigURL, can be left blank.
          Where you need to make a choice between true or false, make a choice etc. That`s the only way to get this configured at this moment.

          Reply
          • Barry on June 2, 2021 15:56

            Sorry to bounce this thread, but struggling to get the Proxy locked from working using this method in Intune.
            OMA-URI = ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy

            Data Type = String

            data id=”ProxyLocked” value=”true”/>
            data id=”ConnectionType” value=”system”/>
            data id=”HTTPProxy”
            data id=”UseHTTPProxyForAllProtocols”
            data id=”SSLProxy”
            data id=”FTPProxy”
            data id=”SOCKSProxy”
            data id=”SOCKSVersion”
            data id=”AutoConfigURL”
            data id=”Passthrough”

            Any adivce?

            Reply
            • Peter Klapwijk on June 15, 2021 22:40

              Sent me an email and I can share the config via email (as it will get scrambled in the comments).

            • Ryan on June 24, 2021 17:32

              We are struggling with the Proxy settings (we believe they have been added correctly but are not displaying in Firefox, as well as the WebsiteFilter command – can you help with either of these?

            • Peter Klapwijk on June 24, 2021 21:42

              I just wrote this short article which shows how I configured the proxy settings:
              https://inthecloud247.com/manage-mozilla-firefox-proxy-settings-with-microsoft-intune/

              I have no experience with the webfilter.

    7. Keith Moon on May 25, 2020 23:09

      It’s great Peter, all working for me. Thanks for your assistance!!

      Reply
      • Peter Klapwijk on May 26, 2020 13:20

        You`re welcome, happy to help!

        Reply
    8. Niv Dolgin on September 27, 2020 03:10

      Anyone seenig a sucessful injest of ADMX, but the OMA URI fail with infamous error code 0x87d1fde8 (Event ID 404/The system cannot find the file specified). From what I see, all the registry value are present in HKLM\[…]\PolicyManager\AdmxInstalled and HKLM\[…]\PolicyManager\AdmxDefault. I’ve checked syntax, spelling, trailing spaces, can’t find any differences.

      Same method works fine for Chrome. 🙁

      Reply
      • Peter Klapwijk on September 28, 2020 11:34

        Which ADMX file are you using?

        Post the OMA-URI for the ADMX ingestion and the setting itself here, so I can have a look.

        Reply
      • Mark on October 6, 2020 07:19

        Yes! I followed them guide in the Firefox Documentation and have the same problem. The ingest ‘works’ but there are no policy Folders for Firefox listed under ADMXdefault. Which is why we get errors for missing policies when applying them. Is it still broke for you?

        Reply
    9. Ryan on June 25, 2021 12:02

      Thank you so much Peter for the Proxy information – works like a dream! Have you ever use the “WebsiteFilter” command within Firefox as this is not playing ball, but blocking via Proxy works perfectly.
      Thanks again!

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Adam on Get notified on expiring Azure App Registration client secrets
    • Peter Klapwijk on Update Windows Defender during Windows Autopilot enrollments
    • Rob van de Ven on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Carl on Update Windows Defender during Windows Autopilot enrollments
    • Peter Klapwijk on The next step in a passwordless Windows experience
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}