SOLVED
Home

HowTo OMA-URI - something not working

%3CLINGO-SUB%20id%3D%22lingo-sub-908566%22%20slang%3D%22en-US%22%3EHowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-908566%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20folks%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Ei'm%20trying%20to%20experiment%20with%20OMA-URI%20within%20custom%20profiles.%3C%2FP%3E%3CP%3EIn%20this%20Use-case%20we're%20trying%20to%20achive%2C%20that%20we%20can%20manage%20Google%20Chrome%20Updates.%3C%2FP%3E%3CP%3ETherefore%20i've%20downloaded%20the%20GoogleUpdate.admx%20and%20ingested%20it%20into%20the%20Intune%20custom%20profile.%3C%2FP%3E%3CP%3EThis%20is%20working%2C%20i'm%20able%20to%20see%20the%20admx%20at%20the%20clients%20registry%20under%20%22%3CEM%3EHKEY_LOCAL_MACHINE%5CSOFTWARE%5CMicrosoft%5CPolicyManager%5CAdmxInstalled%3C%2FEM%3E%22%20as%20well%20as%20the%20corresponding%2C%20possible%20values%20under%3CEM%3E%26nbsp%3B..%5CPolicyManager%5CAdmxDefault%3C%2FEM%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWell%2C%20this%20looks%20good.%3C%2FP%3E%3CP%3ENow%20i%20want%20to%20add%20the%20first%20setting%20to%20the%20custom%20profile.%3C%2FP%3E%3CP%3EI%20had%20a%20look%20in%26nbsp%3B%3CEM%3E..%5CPolicyManager%5CAdmxDefault%3C%2FEM%3E%20and%20found%20the%20value%20%22%3CEM%3EChromeUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences%5CPol_AutoUpdateCheckPeriod%3C%2FEM%3E%22.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAfterwards%20i've%20build%20the%20oma-uri%20path%20like%20this%3A%3C%2FP%3E%3CP%3E%3CEM%3E.%2FDevice%2FVendor%2FMSFT%2FPolicy%2FConfig%2FChromeUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences%2FPol_AutoUpdateCheckPeriod%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20i%20really%20don't%20get%3A%3C%2FP%3E%3CP%3EHow%20to%20find%20out%20what%20value%20type%20(and%20what%20spelling)%20is%20required%3F%3C%2FP%3E%3CP%3EIn%20this%20case%20i%20think%20it%20should%20be%20Integer%20and%20e.g.%2060%20(for%2060%20minutes).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUnfortunatelly%20this%20setting%20is%20marked%20as%20%22remediation%20failed%22.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-908566%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EADMX%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EChrome%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECSP%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Device%20Management%20(MDM)%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EUpdate%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-909466%22%20slang%3D%22en-US%22%3ERe%3A%20HowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-909466%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F275685%22%20target%3D%22_blank%22%3E%40PatrickF11%3C%2FA%3E%20right%2C%20now%20the%20only%20supported%20ADMX%20backed%20policies%20are%20listed%20here%26nbsp%3B%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicies-admx-backed%26nbsp%3B%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicies-admx-backed%3C%2FA%3E%3C%2FFONT%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-911584%22%20slang%3D%22en-US%22%3ERe%3A%20HowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-911584%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F172380%22%20target%3D%22_blank%22%3E%40Steve%20Bucci%3C%2FA%3E%26nbsp%3BOh%20okay%2C%20that%20wonders%20me.%3C%2FP%3E%3CP%3ECurrently%20we're%20using%20another%20ADMX%20template%20for%20configuring%20Google%20Chrome%20itself%20successfully.%3CBR%20%2F%3EIn%20the%20past%20we%20used%20another%20one%20for%20configuring%20OneDrive.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-912247%22%20slang%3D%22en-US%22%3ERe%3A%20HowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-912247%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F275685%22%20target%3D%22_blank%22%3E%40PatrickF11%3C%2FA%3E%20there%20are%20often%20times%20where%20unsupported%20scenarios%20work%2C%20until%20they%20don't.%26nbsp%3B%20That%20is%20basically%20what%20supported%2Funsupported%20comes%20down%20to%3A%20supported%3Ddesigned%20to%20work%20consistently%20and%20unsupported%3Dno%20design%20to%20work%20consistently.%3CBR%20%2F%3E%3CBR%20%2F%3EFrom%20the%20Intune%20UserVoice%20there%20is%20an%20article%20on%20the%20mapping%20for%20Policy%20CSP%20being%20complete%2C%20but%20not%20the%20translation.%26nbsp%3B%20This%20item%20is%20on%20the%20mapping%2C%20with%20a%20link%20to%20the%20translation%20item%20if%20you%20want%20to%20upvote.%26nbsp%3B%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fmicrosoftintune.uservoice.com%2Fforums%2F291681-ideas%2Fsuggestions%2F31741903-provide-a-mapping-between-gpo-and-oma-uri-admx-b%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmicrosoftintune.uservoice.com%2Fforums%2F291681-ideas%2Fsuggestions%2F31741903-provide-a-mapping-between-gpo-and-oma-uri-admx-b%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-912253%22%20slang%3D%22en-US%22%3ERe%3A%20HowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-912253%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F275685%22%20target%3D%22_blank%22%3E%40PatrickF11%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20assume%20you%20have%20seen%20this%20post%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fsupport.google.com%2Fchrome%2Fa%2Fanswer%2F9102677%3Fhl%3Den%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsupport.google.com%2Fchrome%2Fa%2Fanswer%2F9102677%3Fhl%3Den%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUnfortunately%2C%20there%20is%20nothing%20much%20else%20we%20can%20do.%20I%20would%20suggest%20to%20double%20check%20the%20spelling%2C%20if%20that's%20all%20okay%2C%20I%20assume%20this%20to%20be%20a%20bug%20within%20Google%20Chrome%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-914196%22%20slang%3D%22en-US%22%3ERe%3A%20HowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-914196%22%20slang%3D%22en-US%22%3E%3CP%3EHey%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F275685%22%20target%3D%22_blank%22%3E%40PatrickF11%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3Efirst%20of%20all%20we%20need%20to%20differentiate%20a%20bit%20the%20technology%20used%20here.%20There%20is%20a%20ADMX%20ingestion%20and%20a%20ADMX%20backed%20policy%20which%20is%20fairly%20similar%20but%20not%20identical.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%20uses%20a%20technique%20called%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Funderstanding-admx-backed-policies%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20aria-label%3D%22ADMX-backed%20policies%20(opens%20in%20a%20new%20tab)%22%3EADMX-backed%20policies%3C%2FA%3E%3CSPAN%3E.%20This%20is%20a%20clever%20move%20to%20make%20important%20policies%20shipped%20with%20Windows%2010%20accessible%20by%20compiling%20them%20into%20MDM%20policies%20%3CU%3Eduring%20OS-build%20time%3C%2FU%3E.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%20addition%20to%20that%2C%20it%20is%20even%20allowed%20to%20ingest%20new%20third%20party%20ADMX%20policies%20and%20compile%20them%20to%20new%20MDM%20policies%20(e.g.%20Google%20Chrome%20ADMX%20policies).%20This%20allows%20us%20and%20Microsoft%20to%20easily%20make%20new%20policies%20available%20for%20MDM%20configuration.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ETo%20dive%20into%20that%20topic%20I%20really%20recommend%20to%20carefully%20read%20the%20article%20here%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Funderstanding-admx-backed-policies%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20aria-label%3D%22Understanding%20ADMX-backed%20policies%20(opens%20in%20a%20new%20tab)%22%3EUnderstanding%20ADMX-backed%20policies%3C%2FA%3E%3CSPAN%3E%2C%20which%20provides%20great%20details%20on%20the%20whole%20process.%20For%20custom%20ADMX%20ingestion%20read%20carefully%20this%20article%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fwin32-and-centennial-app-policy-configuration%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20aria-label%3D%22Win32%20and%20Desktop%20Bridge%20app%20policy%20configuration%20(opens%20in%20a%20new%20tab)%22%3EWin32%20and%20Desktop%20Bridge%20app%20policy%20configuration%3C%2FA%3E%3CSPAN%3E.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ERegarding%20your%20problem%20we%20talk%20about%20a%20ADMX%20ingested%20policy%20(Google%20Chrome)%20where%20we%20are%20ingesting%20the%20ADMX%20definition%20and%20then%20configure%20them.%20This%20is%20supported%20for%20third%20party%20admx%20files.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EYour%20config%20will%20work%20if%20you%20use%20the%20following%20settings%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOMA-URI%3A%3CBR%20%2F%3E.%2FVendor%2FMSFT%2FPolicy%2FConfigOperations%2FADMXInstall%2FChrome%2FPolicy%2FGoogleUpdateAdmx%3CBR%20%2F%3EValue%3A%3CBR%20%2F%3Eyour-google-chrome-update-admx%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOMA-URI%3A%3CBR%20%2F%3E.%2FVendor%2FMSFT%2FPolicy%2FConfig%2F%3CSTRONG%3EChrome%3C%2FSTRONG%3E~Policy~Cat_GoogleUpdate~Cat_Preferences%2FPol_AutoUpdateCheckPeriod%3CBR%20%2F%3EValue%3A%3CBR%20%2F%3E%3CENABLED%3E%3C%2FENABLED%3E%3CBR%20%2F%3E%3CDATA%20id%3D%22%26quot%3BPart_AutoUpdateCheckPeriod%26quot%3B%22%20value%3D%22%26quot%3B60%26quot%3B%2F%22%3E%3C%2FDATA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYour%20policy%20for%20configuration%20was%20slightly%20wrong%20it%20is%20Chrome~%20and%20not%20ChromeUpdate~.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3Athumbs_up%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3Ebest%2C%3C%2FP%3E%0A%3CP%3EOliver%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-916448%22%20slang%3D%22en-US%22%3ERe%3A%20HowTo%20OMA-URI%20-%20something%20not%20working%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-916448%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F172380%22%20target%3D%22_blank%22%3E%40Steve%20Bucci%3C%2FA%3E%26nbsp%3BThank%20you%20(and%20the%20others)%20for%20your%20reply.%3C%2FP%3E%3CP%3ESo%20just%20to%20be%20clear%3A%20Many%20custom%20ADMX%20Ingestions%20and%20configurations%20should%20work%2C%20but%20they're%20not%20especcially%20marked%20as%20%22supported%22%20until%20they%20appear%20in%20the%20list%20of%20supported%20ones%2C%20right%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F186539%22%20target%3D%22_blank%22%3E%40Thijs%20Lecomte%3C%2FA%3E%26nbsp%3BI've%20read%20this%20one.%20We're%20already%20using%20some%20of%20them%20to%20configure%20the%20chrome%20browser%20itself.%20Now%20the%20second%20step%20should%20be%20the%20management%20of%20updates%20of%20the%20chrome%20browser.%20That's%20why%20i%20tried%20to%20experiment%20with%20the%20custom%20admx%20file%20and%20ingested%20it%20into%20intune.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F174439%22%20target%3D%22_blank%22%3E%40Oliver%20Kieselbach%3C%2FA%3E%26nbsp%3BThank%20you%20for%20the%20provided%20links%2C%20i'm%20excited%20to%20read%20them.%3C%2FP%3E%3CP%3EPlease%20correct%20me%20if%20theres%20a%20misunderstanding%20at%20my%20point%20of%20view%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Ingesting%20custom%20ADMX%20Files%20and%20use%20them%20to%20configure%20some%20settings%20is%20supported%20and%20should%20work.%20(as%20in%20my%20case%3A%20the%20chrome%20update%20for%20example.)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E2.%20Naming%3A%3C%2FP%3E%3CP%3EIngesting%20of%20an%20ADMX%20File%3A%3C%2FP%3E%3CP%3E-%26nbsp%3BHow%20could%20i%20have%20known%20that%20i%20need%20to%20name%20this%20%22chrome%22%20instead%20of%20%22ChromeUpdate%22%3F%3C%2FP%3E%3CP%3E(If%20i%20would%20have%20known%20that%2C%20i%20would%20have%20used%20this%20of%20course%20in%20the%20setting%20OMA-URI%20itself%2C%20too)%3C%2FP%3E%3CP%3E-%20You've%20left%20away%20%22.%2FDevice%22%20in%20your%20suggestion.%20Isn't%20it%20neccesary%20for%20me%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E3.%20The%20Ingesting%20of%20the%20ADMX%20with%20the%20choosen%20name%20%22ChromeUpdate%22%20instead%20of%20%22Chrome%22%20worked.%20At%20least%20i%20can%20see%20this%20in%20the%20registry.%20(.%5CPolicyManager%5CAdmxInstalled%5CChromeUpdates)%3C%2FP%3E%3CP%3EWhy%20is%20this%20wrong%20anyway%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E4.%20How%20could%20i%20found%20out%20the%20proper%20data%20type%20and%20the%20value%2C%20e.g.%20when%20it%20is%20a%20string%20and%20not%20a%20simple%20number%20(integer).%20In%20some%20cases%20i%20need%20something%20like%20%22%3C%2FP%3E%3C%2FLINGO-BODY%3E%22%20followed%20by%20completely%20various%20strings.%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%20very%20much%20for%20answering%20my%20questions%20and%20pushing%20me%20in%20the%20right%20directions.%3C%2FP%3E%3CP%3EHopefully%20my%20questions%20are%20not%20that%20dumb.%20%3AD%3C%2Fimg%3E%20(I'm%20really%20interested%20in%20understanding%20this%20topic%2C%20not%20just%20making%20it%20work%20through%20copy%26amp%3Bpaste)%3C%2FP%3E
Highlighted
Frequent Contributor

Hi folks,

 

i'm trying to experiment with OMA-URI within custom profiles.

In this Use-case we're trying to achive, that we can manage Google Chrome Updates.

Therefore i've downloaded the GoogleUpdate.admx and ingested it into the Intune custom profile.

This is working, i'm able to see the admx at the clients registry under "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\AdmxInstalled" as well as the corresponding, possible values under ..\PolicyManager\AdmxDefault.

 

Well, this looks good.

Now i want to add the first setting to the custom profile.

I had a look in ..\PolicyManager\AdmxDefault and found the value "ChromeUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences\Pol_AutoUpdateCheckPeriod".

 

Afterwards i've build the oma-uri path like this:

./Device/Vendor/MSFT/Policy/Config/ChromeUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod

 

What i really don't get:

How to find out what value type (and what spelling) is required?

In this case i think it should be Integer and e.g. 60 (for 60 minutes).

 

Unfortunatelly this setting is marked as "remediation failed".

19 Replies

@PatrickF11 right, now the only supported ADMX backed policies are listed here https://docs.microsoft.com/en-us/windows/client-management/mdm/policies-admx-backed 

@Steve Bucci Oh okay, that wonders me.

Currently we're using another ADMX template for configuring Google Chrome itself successfully.
In the past we used another one for configuring OneDrive.

@PatrickF11 there are often times where unsupported scenarios work, until they don't.  That is basically what supported/unsupported comes down to: supported=designed to work consistently and unsupported=no design to work consistently.

From the Intune UserVoice there is an article on the mapping for Policy CSP being complete, but not the translation.  This item is on the mapping, with a link to the translation item if you want to upvote. https://microsoftintune.uservoice.com/forums/291681-ideas/suggestions/31741903-provide-a-mapping-bet...

@PatrickF11 

 

I assume you have seen this post: https://support.google.com/chrome/a/answer/9102677?hl=en

 

Unfortunately, there is nothing much else we can do. I would suggest to double check the spelling, if that's all okay, I assume this to be a bug within Google Chrome

Hey @PatrickF11,

 

first of all we need to differentiate a bit the technology used here. There is a ADMX ingestion and a ADMX backed policy which is fairly similar but not identical.

 

Microsoft uses a technique called ADMX-backed policies. This is a clever move to make important policies shipped with Windows 10 accessible by compiling them into MDM policies during OS-build time.

 

In addition to that, it is even allowed to ingest new third party ADMX policies and compile them to new MDM policies (e.g. Google Chrome ADMX policies). This allows us and Microsoft to easily make new policies available for MDM configuration.

 

To dive into that topic I really recommend to carefully read the article here Understanding ADMX-backed policies, which provides great details on the whole process. For custom ADMX ingestion read carefully this article Win32 and Desktop Bridge app policy configuration

 

Regarding your problem we talk about a ADMX ingested policy (Google Chrome) where we are ingesting the ADMX definition and then configure them. This is supported for third party admx files.

 

Your config will work if you use the following settings:

 

OMA-URI:
./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Chrome/Policy/GoogleUpdateAdmx
Value:
your-google-chrome-update-admx

 

OMA-URI:
./Vendor/MSFT/Policy/Config/Chrome~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod
Value:
<enabled/>
<data id="Part_AutoUpdateCheckPeriod" value="60"/>

 

Your policy for configuration was slightly wrong it is Chrome~ and not ChromeUpdate~.

 

:thumbs_up:

 

best,

Oliver

@Steve Bucci Thank you (and the others) for your reply.

So just to be clear: Many custom ADMX Ingestions and configurations should work, but they're not especcially marked as "supported" until they appear in the list of supported ones, right?

 

@Thijs Lecomte I've read this one. We're already using some of them to configure the chrome browser itself. Now the second step should be the management of updates of the chrome browser. That's why i tried to experiment with the custom admx file and ingested it into intune.

 

@Oliver Kieselbach Thank you for the provided links, i'm excited to read them.

Please correct me if theres a misunderstanding at my point of view:

 

1. Ingesting custom ADMX Files and use them to configure some settings is supported and should work. (as in my case: the chrome update for example.)

 

2. Naming:

Ingesting of an ADMX File:

- How could i have known that i need to name this "chrome" instead of "ChromeUpdate"?

(If i would have known that, i would have used this of course in the setting OMA-URI itself, too)

- You've left away "./Device" in your suggestion. Isn't it neccesary for me?

 

3. The Ingesting of the ADMX with the choosen name "ChromeUpdate" instead of "Chrome" worked. At least i can see this in the registry. (.\PolicyManager\AdmxInstalled\ChromeUpdates)

Why is this wrong anyway? (I thought that this could be a freely choosen name which should be equal to the name i use in the setting.)

 

4. How could i found out the proper data type and the value, e.g. when it is a string and not a simple number (integer). In some cases i need something like "</enable>" followed by completely various strings.

 

Thank you very much for answering my questions and pushing me in the right directions.

Hopefully my questions are not that dumb. :D (I'm really interested in understanding this topic, not just making it work through copy&paste)

Solution

@PatrickF11 

 

1. Ingesting custom ADMX Files and use them to configure some settings is supported and should work. (as in my case: the chrome update for example.)

 

=> Starting in Windows 10, version 1703, you can import ADMX files (also called ADMX ingestion) and set those ADMX-backed policies for Win32 and Desktop Bridge apps by using Windows 10 Mobile Device Management (MDM) on desktop SKUs. The ADMX files that define policy information can be ingested to your device by using the Policy CSP URI, ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall. The ingested ADMX file is then processed into MDM policies.
https://docs.microsoft.com/en-us/windows/client-management/mdm/win32-and-centennial-app-policy-confi...

 

2. Naming:

Ingesting of an ADMX File:

- How could i have known that i need to name this "chrome" instead of "ChromeUpdate"?

(If i would have known that, i would have used this of course in the setting OMA-URI itself, too)

- You've left away "./Device" in your suggestion. Isn't it neccesary for me?

 

=> simply look at the ingested ADMX file and you will see the complete structure and here we have the Chrome~

 

SNAG-0028.png

 

Sorry slightly different screenshot (chrome policy not googleupdate) but was the one I had currently, same applies to googleupdate of course...

 

regarding ./Device:

Device scope:

  • ./Device/Vendor/MSFT/Policy/Config/AreaName/PolicyName to configure the policy.
  • ./Device/Vendor/MSFT/Policy/Result/AreaName/PolicyName to get the result.

For device wide configuration the Device/ portion may be omitted from the path, deeming the following paths respectively equivalent:

  • ./Vendor/MSFT/Policy/Config/AreaName/PolicyName to configure the policy.
  • ./Vendor/MSFT/Policy/Result/AreaName/PolicyName to get the result.

https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-configuration-service-provider

 

 

 

3. The Ingesting of the ADMX with the choosen name "ChromeUpdate" instead of "Chrome" worked. At least i can see this in the registry. (.\PolicyManager\AdmxInstalled\ChromeUpdates)

Why is this wrong anyway? (I thought that this could be a freely choosen name which should be equal to the name i use in the setting.)

 

=> Only during the ingestion the name at the end is free to choose, it must not be equal, you could also name it ChromeV2Admx for example. Here I've chosen ChromeAdmx
./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Chrome/Policy/ChromeAdmx

 

SNAG-0029.png

 

It's an ingestion name and does not correlate to the category path from above.

 

Sorry slightly different screenshot (chrome policy not googleupdate) but was the one I had currently, same applies to googleupdate of course...

 

 

4. How could i found out the proper data type and the value, e.g. when it is a string and not a simple number (integer). In some cases i need something like "</enable>" followed by completely various strings.

 

=> looking at this article: 

Understanding ADMX-backed policies

https://docs.microsoft.com/en-us/windows/client-management/mdm/understanding-admx-backed-policies

there are examples of Decimal Element, Boolean Element, List Elements, Enum, No Element, MultiText Element, Text Element

 

 

Thank you very much for answering my questions and pushing me in the right directions.

Hopefully my questions are not that dumb. :D (I'm really interested in understanding this topic, not just making it work through copy&paste)

 

@Oliver Kieselbach 

Thank you very much!

 

1. Okay.

 

2. At first i've ingested the ChromeUpdate ADMX with this OMA-URI:

 

./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/ChromeUpdate/Policy/ChromeUpdateAdmx

 

The string "ADMXInstall/ChromeUpdate" was choosen by myself, because "Chrome" already exists and i wanted to keep that nice and clean.

 

After this step (and assigning this policy) i've noticed the ADMX in the registry:

Registry_AdmxInstalled.png

Isn't this correct? (Of course i could have build the OMA-URI as "ADMXInstall/Chrome/Policy/ChromeUpdateAdmx" but i thought, my idea was right.

 

After i've noticed the registry i've found under "AdmxDefault all of the possible configurations:

Registry_AdmxDefault.png

That's why i thought, everything is working fine.

For testing purposes i rebuild the OMA-URI to "Google" instead "GoogleUpdate".

Now this appears here: (appears twice, because of earlier assignment)

Registry_AdmxInstalled2.png

Why should this be correct and the "ChromeUpdate\Policy\ChromeUpdateAdmx" not?

 

3. So i'm "allowed" to use this with or without "./Device" Prefix, if its a device wide config?

 

4. Thank you for this article, as said before, i'm going to read through this.

@PatrickF11 

 

Oh, I see you used initially ChromeUpdate (my fault I thought somehow you used Chrome as Appname, maybe I read to fast, sorry):

./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/ChromeUpdate/Policy/ChromeUpdateAdmx

then you are right, this should work also:

 

./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/ChromeUpdate/Policy/GoogleUpdateAdmx
Value:
your-google-chrome-update-admx

 

OMA-URI:
./Vendor/MSFT/Policy/Config/ChromeUpdate~Policy~Cat_GoogleUpdate~Cat_Preferences/Pol_AutoUpdateCheckPeriod
Value:
<enabled/>
<data id="Part_AutoUpdateCheckPeriod" value="60"/>

 

it is defined by:

./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}/{SettingType}/{FileUid or AdmxFileName}

https://docs.microsoft.com/en-us/windows/client-management/mdm/win32-and-centennial-app-policy-confi...

 

3.) So i'm "allowed" to use this with or without "./Device" Prefix, if its a device wide config? => YES

 

best,

Oliver

@Oliver Kieselbach 

Okay, thanks for the confusion. :D

So nearly everything i thought of first, was right, except the data type and the value.

 

The current problem is:

When trying to choose data type "string" and the value 

 

<enabled/>
<data id="Part_AutoUpdateCheckPeriod" value="60"/>

 

i get an error when saving this configuration:

 

Unable to save due to invalid data. Update your data then try again: The property 'isReadOnly' does not exist on type 'microsoft.management.services.api.omaSettingString'. Make sure to only use property names that are defined by the type.

 

Is "id="part_...."" really the correct syntax? Shouldn't it be "id="pol_....""?

 

As before i'm able to save integer / 60, but as you said this should be the wrong data type & value.

Hey @PatrickF11,

 

I've seen this error just once. I couldn't fix it at that point in time. I've recreated the policy and the error went away. I don't know what caused this and I've never seen the error again. Please try to recreate the complete policy.

 

best,

Oliver

@Oliver Kieselbach 

 

it has already been sufficient to remove this OMA-URI Setting out of the profile and to re-add it.

Could you please answer my last question belonging the data id?

 

Thank you very much! You really teached me many things about the OMA-URI Settings. :)

@PatrickF11 

Sure here we go :)

Part_ is correct as we reference the policy decimal element id with that:

    <policy name="Pol_AutoUpdateCheckPeriod" class="Machine"
        displayName="$(string.Pol_AutoUpdateCheckPeriod)"
        explainText="$(string.Explain_AutoUpdateCheckPeriod)"
        presentation="$(presentation.Pol_AutoUpdateCheckPeriod)"
        key="Software\Policies\Google\Update">
      <parentCategory ref="Cat_Preferences" />
      <supportedOn ref="Sup_GoogleUpdate1_2_145_5" />
      <elements>
        <decimal id="Part_AutoUpdateCheckPeriod"
            key="Software\Policies\Google\Update"
            valueName="AutoUpdateCheckPeriodMinutes"
            required="true" minValue="0" maxValue="43200" />
      </elements>
    </policy>

 

with this value and notation we are referencing the value directly not the policy element

<enabled/>
<data id="Part_AutoUpdateCheckPeriod" value="60"/>

 

This way the MDM client exactly knows which element in the ADMX file it has to use. Tt can also be the case that an policy definition has more than one element for configuration. That's why we exactly reference the value which configures the setting in the end.

@Oliver Kieselbach 

 

Ladys and Gentlemen: THIS is good support! :)

 

Again: Thank you for all the help.

I really don't know which of your answers i should mark as "best response" :D

 

And thanks to all the others. :) I really appreciated it.

Hey @Oliver Kieselbach 

 

there's one last question left open, after i've read through the links recommended by you:

 

When ingesting an admx, first i have to build the OMA-URI Path.

 

./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/NAME111/Policy/NAME222

 

In one of your earlier replies you've written, that only "NAME222" is a free to choose name.

After i've read though the articles i think that "NAME111" is also free to choose, when ingesting the admx file.

What i know: When configuring an element i need to use "NAME111" of course like in the following example:

 

./Device/Vendor/MSFT/Policy/Config/NAME111~Policy~RestOfConfigPath/ConfigItem

 

And of course: i need to look into the registry (PolicyManager\AdmxDefault\...) to find the correct name for the config. ("RestOfConfigPath")

 

So referrencing to the Subject "Chrome Update":

I could have build the OMA-URI String for ingesting like i mentioned above, with the freely choosen name (NAME111).

Afterwards i could add configurations like that:

./Device/Vendor/MSFT/Policy/Config/NAME111~Policy~RestOfConfigPathFromRegedit/ConfigItem

 

Did I summarize that correctly?

So the name "NAME111" doesn't matter at all, it just have to be the same in the "ingesting part" and in the "configuration part" of my custom intune profile, right?

@PatrickF11 

that's correct, 

NAME222

is absolutely free and has no consequence other than representation in registry. Often it is wise to use something like your own prefix or a version MyFile or Filev1

 

NAME111

has to be used in both OMA-URIs that's why it miss understandingly referred to not free to choose. in fact it is free to choose but must be used in both OMA URIs

 

your summary is correct! :thumbs_up: 

@Oliver Kieselbach 

 

Great, thank you (again).

Hi @PatrickF11 With the help of Oliver you have probably already deployed the policy, otherwise have a look at my article about managing Chrome with intune https://www.inthecloud247.com/manage-google-chrome-settings-with-microsoft-intune/ Maybe it is of any help.

@Peter Klapwijk 

Probably your article would have helped, too.

 

Just a short addition to your article:

You're building the string together while looking inside of the admx file.

Of course, this is working. But it's much easier, after ingesting the admx file, to have a look at the clients registry. (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\AdmxDefault\)

At this location, every policy ingested by an admx is listed.

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
35 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies