blob: bca0a8b4df26491e1bda71fff6d47cfb0d49e6db [file] [log] [blame]
<div><div><a name="top"/><br/><p>Both Chromium and Google Chrome support the same set of policies. Please note that this document may include unreleased policies (i.e. their 'Supported on' entry refers to a not-yet released version of Chromium) which are subject to change or removal without notice and for which no guarantees of any kind are provided, including no guarantees with respect to their security and privacy properties.</p><p>These policies are strictly intended to be used to configure instances of Chromium internal to your organisation. Use of these policies outside of your organisation (for example, in a publicly distributed program) is considered malware and will likely be labelled as malware by Google and anti-virus vendors.</p><p>These settings don't need to be configured manually! Easy-to-use templates for Windows, Mac and Linux are available for download from <a href="https://www.chromium.org/administrators/policy-templates">https://www.chromium.org/administrators/policy-templates</a>.</p><p>The recommended way to configure policy on Windows is via GPO, although provisioning policy via registry is still supported for Windows instances that are joined to a Microsoft® Active Directory® domain.</p><br/><br/><br/><table style="border-style: none; border-collapse: collapse;"><thead><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;font-weight: bold;">Policy Name</td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;font-weight: bold;">Description</td></tr></thead><tbody><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Accessibility">Accessibility settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ShowAccessibilityOptionsInSystemTrayMenu">ShowAccessibilityOptionsInSystemTrayMenu</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Show accessibility options in system tray menu</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#LargeCursorEnabled">LargeCursorEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable large cursor</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SpokenFeedbackEnabled">SpokenFeedbackEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable spoken feedback</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#HighContrastEnabled">HighContrastEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable high contrast mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#VirtualKeyboardEnabled">VirtualKeyboardEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable on-screen keyboard</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#StickyKeysEnabled">StickyKeysEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable sticky keys</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#KeyboardDefaultToFunctionKeys">KeyboardDefaultToFunctionKeys</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Media keys default to function keys</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenMagnifierType">ScreenMagnifierType</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set screen magnifier type</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenDefaultLargeCursorEnabled">DeviceLoginScreenDefaultLargeCursorEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set default state of the large cursor on the login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenDefaultSpokenFeedbackEnabled">DeviceLoginScreenDefaultSpokenFeedbackEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the default state of spoken feedback on the login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenDefaultHighContrastEnabled">DeviceLoginScreenDefaultHighContrastEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the default state of high contrast mode on the login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenDefaultVirtualKeyboardEnabled">DeviceLoginScreenDefaultVirtualKeyboardEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set default state of the on-screen keyboard on the login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenDefaultScreenMagnifierType">DeviceLoginScreenDefaultScreenMagnifierType</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the default screen magnifier type enabled on the login screen</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Arc">Android settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ArcEnabled">ArcEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable ARC</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#UnaffiliatedArcAllowed">UnaffiliatedArcAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow unaffiliated users to use ARC</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ArcPolicy">ArcPolicy</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure ARC</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ArcAppInstallEventLoggingEnabled">ArcAppInstallEventLoggingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Log events for Android app installs</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ArcBackupRestoreServiceEnabled">ArcBackupRestoreServiceEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control Android backup and restore service</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ArcGoogleLocationServicesEnabled">ArcGoogleLocationServicesEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control Android Google Location services</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ArcCertificatesSyncMode">ArcCertificatesSyncMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set certificate availability for ARC-apps</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AppRecommendationZeroStateEnabled">AppRecommendationZeroStateEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable App Recommendations in Zero State of Search Box</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ContentSettings">Content Settings ...</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultCookiesSetting">DefaultCookiesSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default cookies setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultImagesSetting">DefaultImagesSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default images setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultJavaScriptSetting">DefaultJavaScriptSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default JavaScript setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultPluginsSetting">DefaultPluginsSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default Flash setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultPopupsSetting">DefaultPopupsSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultNotificationsSetting">DefaultNotificationsSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default notification settings</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultGeolocationSetting">DefaultGeolocationSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default geolocation setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultMediaStreamSetting">DefaultMediaStreamSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default mediastream setting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultWebBluetoothGuardSetting">DefaultWebBluetoothGuardSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control use of the Web Bluetooth API</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultWebUsbGuardSetting">DefaultWebUsbGuardSetting</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control use of the WebUSB API</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AutoSelectCertificateForUrls">AutoSelectCertificateForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Automatically select client certificates for these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CookiesAllowedForUrls">CookiesAllowedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow cookies on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CookiesBlockedForUrls">CookiesBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block cookies on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CookiesSessionOnlyForUrls">CookiesSessionOnlyForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Limit cookies from matching URLs to the current session</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ImagesAllowedForUrls">ImagesAllowedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow images on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ImagesBlockedForUrls">ImagesBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block images on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#JavaScriptAllowedForUrls">JavaScriptAllowedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow JavaScript on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#JavaScriptBlockedForUrls">JavaScriptBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block JavaScript on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PluginsAllowedForUrls">PluginsAllowedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow the Flash plug-in on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PluginsBlockedForUrls">PluginsBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block the Flash plug-in on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PopupsAllowedForUrls">PopupsAllowedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow pop-ups on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RegisteredProtocolHandlers">RegisteredProtocolHandlers</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Register protocol handlers</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PopupsBlockedForUrls">PopupsBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block pop-ups on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NotificationsAllowedForUrls">NotificationsAllowedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow notifications on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NotificationsBlockedForUrls">NotificationsBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block notifications from these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#WebUsbAllowDevicesForUrls">WebUsbAllowDevicesForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Automatically grant permission to these sites to connect to USB devices with the given vendor and product IDs.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#WebUsbAskForUrls">WebUsbAskForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow WebUSB on these sites</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#WebUsbBlockedForUrls">WebUsbBlockedForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block WebUSB on these sites</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DateAndTime">Date and time</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SystemTimezone">SystemTimezone</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Timezone</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SystemTimezoneAutomaticDetection">SystemTimezoneAutomaticDetection</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the automatic timezone detection method</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SystemUse24HourClock">SystemUse24HourClock</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use 24 hour clock by default</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DefaultSearchProvider">Default search provider</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderEnabled">DefaultSearchProviderEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable the default search provider</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderName">DefaultSearchProviderName</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider name</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderKeyword">DefaultSearchProviderKeyword</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider keyword</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderSearchURL">DefaultSearchProviderSearchURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider search URL</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderSuggestURL">DefaultSearchProviderSuggestURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider suggest URL</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderIconURL">DefaultSearchProviderIconURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider icon</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderEncodings">DefaultSearchProviderEncodings</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider encodings</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderAlternateURLs">DefaultSearchProviderAlternateURLs</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">List of alternative URLs for the default search provider</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderImageURL">DefaultSearchProviderImageURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Parameter providing search-by-image feature for the default search provider</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderNewTabURL">DefaultSearchProviderNewTabURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default search provider new tab page URL</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderSearchURLPostParams">DefaultSearchProviderSearchURLPostParams</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Parameters for search URL which uses POST</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderSuggestURLPostParams">DefaultSearchProviderSuggestURLPostParams</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Parameters for suggest URL which uses POST</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultSearchProviderImageURLPostParams">DefaultSearchProviderImageURLPostParams</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Parameters for image URL which uses POST</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeviceUpdate">Device update settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ChromeOsReleaseChannel">ChromeOsReleaseChannel</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Release channel</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ChromeOsReleaseChannelDelegated">ChromeOsReleaseChannelDelegated</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Users may configure the Chrome OS release channel</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAutoUpdateDisabled">DeviceAutoUpdateDisabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Auto Update</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAutoUpdateP2PEnabled">DeviceAutoUpdateP2PEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Auto update p2p enabled</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAutoUpdateTimeRestrictions">DeviceAutoUpdateTimeRestrictions</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Update Time Restrictions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceTargetVersionPrefix">DeviceTargetVersionPrefix</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Target Auto-Update Version</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUpdateStagingSchedule">DeviceUpdateStagingSchedule</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">The staging schedule for applying a new update</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUpdateScatterFactor">DeviceUpdateScatterFactor</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Auto update scatter factor</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUpdateAllowedConnectionTypes">DeviceUpdateAllowedConnectionTypes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Connection types allowed for updates</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUpdateHttpDownloadsEnabled">DeviceUpdateHttpDownloadsEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow autoupdate downloads via HTTP</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RebootAfterUpdate">RebootAfterUpdate</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Automatically reboot after update</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#MinimumRequiredChromeVersion">MinimumRequiredChromeVersion</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure minimum allowed Chrome version for the device.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceRollbackToTargetVersion">DeviceRollbackToTargetVersion</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Roll back to target version</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceRollbackAllowedMilestones">DeviceRollbackAllowedMilestones</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Number of milestones roll-back is allowed</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceQuickFixBuildToken">DeviceQuickFixBuildToken</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Provide users with Quick Fix Build</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Display">Display</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceDisplayResolution">DeviceDisplayResolution</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set display resolution and scale factor</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DisplayRotationDefault">DisplayRotationDefault</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set default display rotation, reapplied on every reboot</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Extensions">Extensions</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionInstallBlacklist">ExtensionInstallBlacklist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure extension installation blacklist</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionInstallWhitelist">ExtensionInstallWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure extension installation whitelist</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionInstallForcelist">ExtensionInstallForcelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the list of force-installed apps and extensions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionInstallSources">ExtensionInstallSources</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure extension, app, and user script install sources</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionAllowedTypes">ExtensionAllowedTypes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure allowed app/extension types</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionAllowInsecureUpdates">ExtensionAllowInsecureUpdates</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow insecure algorithms in integrity checks on extension updates and installations</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionSettings">ExtensionSettings</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Extension management settings</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#GoogleAssistant">Google Assistant</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#VoiceInteractionContextEnabled">VoiceInteractionContextEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">&quot;Allow Google Assistant to access screen context&quot;</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#VoiceInteractionHotwordEnabled">VoiceInteractionHotwordEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Google Assistant to listen for the voice activation phrase</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#GoogleCast">Google Cast</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#EnableMediaRouter">EnableMediaRouter</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Google Cast</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ShowCastIconInToolbar">ShowCastIconInToolbar</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Show the Google Cast toolbar icon</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Drive">Google Drive</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DriveDisabled">DriveDisabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Drive in the Chromium OS Files app</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DriveDisabledOverCellular">DriveDisabledOverCellular</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Google Drive over mobile connections in the Chromium OS Files app</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#HTTPAuthentication">HTTP authentication</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AuthSchemes">AuthSchemes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Supported authentication schemes</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DisableAuthNegotiateCnameLookup">DisableAuthNegotiateCnameLookup</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable CNAME lookup when negotiating Kerberos authentication</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#EnableAuthNegotiatePort">EnableAuthNegotiatePort</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Include non-standard port in Kerberos SPN</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AuthServerWhitelist">AuthServerWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Authentication server whitelist</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AuthNegotiateDelegateWhitelist">AuthNegotiateDelegateWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Kerberos delegation server whitelist</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AuthNegotiateDelegateByKdcPolicy">AuthNegotiateDelegateByKdcPolicy</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use KDC policy to delegate credentials.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#GSSAPILibraryName">GSSAPILibraryName</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">GSSAPI library name</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AuthAndroidNegotiateAccountType">AuthAndroidNegotiateAccountType</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Account type for HTTP Negotiate authentication</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AllowCrossOriginAuthPrompt">AllowCrossOriginAuthPrompt</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Cross-origin HTTP Basic Auth prompts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NtlmV2Enabled">NtlmV2Enabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable NTLMv2 authentication.</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Kiosk">Kiosk settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLocalAccounts">DeviceLocalAccounts</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device-local accounts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLocalAccountAutoLoginId">DeviceLocalAccountAutoLoginId</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device-local account for auto-login</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLocalAccountAutoLoginDelay">DeviceLocalAccountAutoLoginDelay</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device-local account auto-login timer</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLocalAccountAutoLoginBailoutEnabled">DeviceLocalAccountAutoLoginBailoutEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable bailout keyboard shortcut for auto-login</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLocalAccountPromptForNetworkWhenOffline">DeviceLocalAccountPromptForNetworkWhenOffline</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable network configuration prompt when offline</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AllowKioskAppControlChromeVersion">AllowKioskAppControlChromeVersion</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow the auto launched with zero delay kiosk app to control Chromium OS version</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BrowserSwitcher">Legacy Browser Support</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AlternativeBrowserPath">AlternativeBrowserPath</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Alternative browser to launch for configured websites.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AlternativeBrowserParameters">AlternativeBrowserParameters</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Command-line parameters for the alternative browser.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherChromePath">BrowserSwitcherChromePath</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Path to Chrome for switching from the alternative browser.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherChromeParameters">BrowserSwitcherChromeParameters</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Command-line parameters for switching from the alternative browser.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherDelay">BrowserSwitcherDelay</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Delay before launching alternative browser (milliseconds)</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherEnabled">BrowserSwitcherEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable the Legacy Browser Support feature.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherExternalSitelistUrl">BrowserSwitcherExternalSitelistUrl</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URL of an XML file that contains URLs to load in an alternative browser.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherExternalGreylistUrl">BrowserSwitcherExternalGreylistUrl</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URL of an XML file that contains URLs that should never trigger a browser switch.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherKeepLastChromeTab">BrowserSwitcherKeepLastChromeTab</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Keep last tab open in Chrome.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherUrlList">BrowserSwitcherUrlList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Websites to open in alternative browser</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherUrlGreylist">BrowserSwitcherUrlGreylist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Websites that should never trigger a browser switch.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#BrowserSwitcherUseIeSitelist">BrowserSwitcherUseIeSitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use Internet Explorer's SiteList policy for Legacy Browser Support.</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Crostini">Linux container</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#VirtualMachinesAllowed">VirtualMachinesAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow devices to run virtual machines on Chrome OS</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CrostiniAllowed">CrostiniAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">User is enabled to run Crostini</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUnaffiliatedCrostiniAllowed">DeviceUnaffiliatedCrostiniAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow unaffiliated users to use Crostini</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CrostiniExportImportUIAllowed">CrostiniExportImportUIAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">User is enabled to export/import Crostini containers via the UI</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ActiveDirectoryManagement">Microsoft® Active Directory® management settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceMachinePasswordChangeRate">DeviceMachinePasswordChangeRate</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Machine password change rate</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUserPolicyLoopbackProcessingMode">DeviceUserPolicyLoopbackProcessingMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">User policy loopback processing mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceKerberosEncryptionTypes">DeviceKerberosEncryptionTypes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allowed Kerberos encryption types</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceGpoCacheLifetime">DeviceGpoCacheLifetime</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">GPO cache lifetime</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAuthDataCacheLifetime">DeviceAuthDataCacheLifetime</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Authentication data cache lifetime</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#NativeMessaging">Native Messaging</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativeMessagingBlacklist">NativeMessagingBlacklist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure native messaging blacklist</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativeMessagingWhitelist">NativeMessagingWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure native messaging whitelist</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativeMessagingUserLevelHosts">NativeMessagingUserLevelHosts</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow user-level Native Messaging hosts (installed without admin permissions)</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#NetworkFileShares">Network File Shares settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NetworkFileSharesAllowed">NetworkFileSharesAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Controls Network File Shares for ChromeOS availability</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NetBiosShareDiscoveryEnabled">NetBiosShareDiscoveryEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Controls Network File Share discovery via NetBIOS</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NTLMShareAuthenticationEnabled">NTLMShareAuthenticationEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Controls enabling NTLM as an authentication protocol for SMB mounts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NetworkFileSharesPreconfiguredShares">NetworkFileSharesPreconfiguredShares</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">List of pre-configured network file shares.</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Network">Network settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceOpenNetworkConfiguration">DeviceOpenNetworkConfiguration</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device-level network configuration</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceDataRoamingEnabled">DeviceDataRoamingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable data roaming</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NetworkThrottlingEnabled">NetworkThrottlingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable throttling network bandwidth</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceHostnameTemplate">DeviceHostnameTemplate</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device network hostname template</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceWiFiFastTransitionEnabled">DeviceWiFiFastTransitionEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable 802.11r Fast Transition</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceWiFiAllowed">DeviceWiFiAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Wi-Fi</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceDockMacAddressSource">DeviceDockMacAddressSource</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device MAC address source when docked</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Other">Other</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#UsbDetachableWhitelist">UsbDetachableWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Whitelist of USB detachable devices</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAllowBluetooth">DeviceAllowBluetooth</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow bluetooth on device</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#TPMFirmwareUpdateSettings">TPMFirmwareUpdateSettings</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure TPM firmware update behaviour</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DevicePolicyRefreshRate">DevicePolicyRefreshRate</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Refresh rate for Device Policy</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceBlockDevmode">DeviceBlockDevmode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block developer mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAllowRedeemChromeOsRegistrationOffers">DeviceAllowRedeemChromeOsRegistrationOffers</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow users to redeem offers through Chrome OS Registration</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceQuirksDownloadEnabled">DeviceQuirksDownloadEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable queries to Quirks Server for hardware profiles</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ExtensionCacheSize">ExtensionCacheSize</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set Apps and Extensions cache size (in bytes)</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceOffHours">DeviceOffHours</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Off hours intervals when the specified device policies are released</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PasswordManager">Password manager</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PasswordManagerEnabled">PasswordManagerEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable saving passwords to the password manager</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PluginVm">PluginVm</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PluginVmAllowed">PluginVmAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow devices to use a PluginVm on Chromium OS</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PluginVmLicenseKey">PluginVmLicenseKey</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">PluginVm licence key</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PluginVmImage">PluginVmImage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">PluginVm image</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PowerAndShutdown">Power and shutdown</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenPowerManagement">DeviceLoginScreenPowerManagement</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Power management on the login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#UptimeLimit">UptimeLimit</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Limit device uptime by automatically rebooting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceRebootOnShutdown">DeviceRebootOnShutdown</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Automatic reboot on device shutdown</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PowerManagement">Power management</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenDimDelayAC">ScreenDimDelayAC</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen dim delay when running on AC power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenOffDelayAC">ScreenOffDelayAC</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen off delay when running on AC power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenLockDelayAC">ScreenLockDelayAC</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen lock delay when running on AC power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleWarningDelayAC">IdleWarningDelayAC</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Idle warning delay when running on AC power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleDelayAC">IdleDelayAC</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Idle delay when running on AC power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenDimDelayBattery">ScreenDimDelayBattery</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen dim delay when running on battery power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenOffDelayBattery">ScreenOffDelayBattery</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen off delay when running on battery power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenLockDelayBattery">ScreenLockDelayBattery</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen lock delay when running on battery power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleWarningDelayBattery">IdleWarningDelayBattery</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Idle warning delay when running on battery power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleDelayBattery">IdleDelayBattery</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Idle delay when running on battery power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleAction">IdleAction</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Action to take when the idle delay is reached</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleActionAC">IdleActionAC</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Action to take when the idle delay is reached while running on AC power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#IdleActionBattery">IdleActionBattery</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Action to take when the idle delay is reached while running on battery power</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#LidCloseAction">LidCloseAction</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Action to take when the user closes the lid</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PowerManagementUsesAudioActivity">PowerManagementUsesAudioActivity</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Specify whether audio activity affects power management</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PowerManagementUsesVideoActivity">PowerManagementUsesVideoActivity</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Specify whether video activity affects power management</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PresentationScreenDimDelayScale">PresentationScreenDimDelayScale</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Percentage by which to scale the screen dim delay in presentation mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AllowWakeLocks">AllowWakeLocks</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow wake locks</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AllowScreenWakeLocks">AllowScreenWakeLocks</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow screen wake locks</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#UserActivityScreenDimDelayScale">UserActivityScreenDimDelayScale</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Percentage by which to scale the screen dim delay if the user becomes active after dimming</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#WaitForInitialUserActivity">WaitForInitialUserActivity</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Wait for initial user activity</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PowerManagementIdleSettings">PowerManagementIdleSettings</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Power management settings when the user becomes idle</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenLockDelays">ScreenLockDelays</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen lock delays</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PowerSmartDimEnabled">PowerSmartDimEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable smart dim model to extend the time until the screen is dimmed</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ScreenBrightnessPercent">ScreenBrightnessPercent</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Screen brightness per cent</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DevicePowerPeakShiftBatteryThreshold">DevicePowerPeakShiftBatteryThreshold</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set power peak shift battery threshold in per cent</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DevicePowerPeakShiftDayConfig">DevicePowerPeakShiftDayConfig</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set power peak shift day config</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DevicePowerPeakShiftEnabled">DevicePowerPeakShiftEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable power peak shift</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceBootOnAcEnabled">DeviceBootOnAcEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable boot on AC (alternating current)</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAdvancedBatteryChargeModeEnabled">DeviceAdvancedBatteryChargeModeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable advanced battery charge mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAdvancedBatteryChargeModeDayConfig">DeviceAdvancedBatteryChargeModeDayConfig</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set advanced battery charge mode day config</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceBatteryChargeMode">DeviceBatteryChargeMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Battery charge mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceBatteryChargeCustomStartCharging">DeviceBatteryChargeCustomStartCharging</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set battery charge custom start charging in per cent</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceBatteryChargeCustomStopCharging">DeviceBatteryChargeCustomStopCharging</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set battery charge custom stop charging in per cent</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUsbPowerShareEnabled">DeviceUsbPowerShareEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable USB power share</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Printing">Printing</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintingEnabled">PrintingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable printing</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CloudPrintProxyEnabled">CloudPrintProxyEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Google Cloud Print proxy</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintingAllowedColorModes">PrintingAllowedColorModes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Restrict printing colour mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintingAllowedDuplexModes">PrintingAllowedDuplexModes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Restrict printing duplex mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintingColorDefault">PrintingColorDefault</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default printing colour mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintingDuplexDefault">PrintingDuplexDefault</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default printing duplex mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#CloudPrintSubmitEnabled">CloudPrintSubmitEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable submission of documents to Google Cloud Print</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DisablePrintPreview">DisablePrintPreview</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Print Preview</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintHeaderFooter">PrintHeaderFooter</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Print headers and footers</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DefaultPrinterSelection">DefaultPrinterSelection</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Default printer selection rules</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativePrinters">NativePrinters</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Native Printing</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativePrintersBulkConfiguration">NativePrintersBulkConfiguration</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enterprise printer configuration file</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativePrintersBulkAccessMode">NativePrintersBulkAccessMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Printer configuration access policy.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativePrintersBulkBlacklist">NativePrintersBulkBlacklist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disabled enterprise printers</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NativePrintersBulkWhitelist">NativePrintersBulkWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enabled enterprise printers</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceNativePrinters">DeviceNativePrinters</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enterprise printer configuration file for devices</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceNativePrintersAccessMode">DeviceNativePrintersAccessMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device printers configuration access policy.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceNativePrintersBlacklist">DeviceNativePrintersBlacklist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disabled enterprise device printers</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceNativePrintersWhitelist">DeviceNativePrintersWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enabled enterprise device printers</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PrintPreviewUseSystemDefaultPrinter">PrintPreviewUseSystemDefaultPrinter</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use System Default Printer as Default</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Proxy">Proxy server</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ProxyMode">ProxyMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Choose how to specify proxy server settings</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ProxyServerMode">ProxyServerMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Choose how to specify proxy server settings</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ProxyServer">ProxyServer</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Address or URL of proxy server</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ProxyPacUrl">ProxyPacUrl</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URL to a proxy .pac file</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ProxyBypassList">ProxyBypassList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Proxy bypass rules</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#QuickUnlock">Quick unlock</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#QuickUnlockModeWhitelist">QuickUnlockModeWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure allowed quick unlock modes</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#QuickUnlockTimeout">QuickUnlockTimeout</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set how often user has to enter password to use quick unlock</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PinUnlockMinimumLength">PinUnlockMinimumLength</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the minimum length of the lock screen PIN</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PinUnlockMaximumLength">PinUnlockMaximumLength</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the maximum length of the lock screen PIN</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PinUnlockWeakPinsAllowed">PinUnlockWeakPinsAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable users to set weak PINs for the lock screen PIN</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RemoteAccess">Remote access</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostClientDomain">RemoteAccessHostClientDomain</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the required domain name for remote access clients</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostClientDomainList">RemoteAccessHostClientDomainList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the required domain names for remote access clients</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostFirewallTraversal">RemoteAccessHostFirewallTraversal</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable firewall traversal from remote access host</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostDomain">RemoteAccessHostDomain</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the required domain name for remote access hosts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostDomainList">RemoteAccessHostDomainList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the required domain names for remote access hosts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostTalkGadgetPrefix">RemoteAccessHostTalkGadgetPrefix</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the TalkGadget prefix for remote access hosts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostRequireCurtain">RemoteAccessHostRequireCurtain</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable curtaining of remote access hosts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostAllowClientPairing">RemoteAccessHostAllowClientPairing</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable or disable PIN-less authentication for remote access hosts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostAllowGnubbyAuth">RemoteAccessHostAllowGnubbyAuth</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow gnubby authentication for remote access hosts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostAllowRelayedConnection">RemoteAccessHostAllowRelayedConnection</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable the use of relay servers by the remote access host</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostUdpPortRange">RemoteAccessHostUdpPortRange</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Restrict the UDP port range used by the remote access host</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostMatchUsername">RemoteAccessHostMatchUsername</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Require that the name of the local user and the remote access host owner match</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostTokenUrl">RemoteAccessHostTokenUrl</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URL where remote access clients should obtain their authentication token</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostTokenValidationUrl">RemoteAccessHostTokenValidationUrl</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URL for validating remote access client authentication token</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostTokenValidationCertificateIssuer">RemoteAccessHostTokenValidationCertificateIssuer</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Client certificate for connecting to RemoteAccessHostTokenValidationUrl</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostAllowUiAccessForRemoteAssistance">RemoteAccessHostAllowUiAccessForRemoteAssistance</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow remote users to interact with elevated windows in remote assistance sessions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RemoteAccessHostAllowFileTransfer">RemoteAccessHostAllowFileTransfer</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow remote access users to transfer files to/from the host</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Attestation">Remote attestation</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AttestationEnabledForDevice">AttestationEnabledForDevice</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable remote attestation for the device</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AttestationEnabledForUser">AttestationEnabledForUser</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable remote attestation for the user</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AttestationExtensionWhitelist">AttestationExtensionWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Extensions allowed to to use the remote attestation API</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#AttestationForContentProtectionEnabled">AttestationForContentProtectionEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable the use of remote attestation for content protection for the device</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SafeBrowsing">Safe Browsing settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SafeBrowsingEnabled">SafeBrowsingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Safe Browsing</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SafeBrowsingExtendedReportingEnabled">SafeBrowsingExtendedReportingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Safe Browsing Extended Reporting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SafeBrowsingExtendedReportingOptInAllowed">SafeBrowsingExtendedReportingOptInAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow users to opt in to Safe Browsing extended reporting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#SafeBrowsingWhitelistDomains">SafeBrowsingWhitelistDomains</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the list of domains on which Safe Browsing will not trigger warnings.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PasswordProtectionWarningTrigger">PasswordProtectionWarningTrigger</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Password protection warning trigger</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PasswordProtectionLoginURLs">PasswordProtectionLoginURLs</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the list of enterprise login URLs where password protection service should capture fingerprint of password.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#PasswordProtectionChangePasswordURL">PasswordProtectionChangePasswordURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the change password URL.</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Signin">Sign-in settings</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceGuestModeEnabled">DeviceGuestModeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable guest mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceUserWhitelist">DeviceUserWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Login user white list</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceAllowNewUsers">DeviceAllowNewUsers</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow creation of new user accounts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenDomainAutoComplete">DeviceLoginScreenDomainAutoComplete</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable domain name autocomplete during user sign in</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceShowUserNamesOnSignin">DeviceShowUserNamesOnSignin</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Show usernames on login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceWallpaperImage">DeviceWallpaperImage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device wallpaper image</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceEphemeralUsersEnabled">DeviceEphemeralUsersEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Wipe user data on sign-out</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#LoginAuthenticationBehavior">LoginAuthenticationBehavior</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the login authentication behaviour</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceTransferSAMLCookies">DeviceTransferSAMLCookies</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Transfer SAML IdP cookies during login</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#LoginVideoCaptureAllowedUrls">LoginVideoCaptureAllowedUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URLs that will be granted access to video capture devices on SAML login pages</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenExtensions">DeviceLoginScreenExtensions</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the list of installed apps on the login screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenLocales">DeviceLoginScreenLocales</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device sign-in screen locale</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenInputMethods">DeviceLoginScreenInputMethods</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Device sign-in screen keyboard layouts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceSecondFactorAuthentication">DeviceSecondFactorAuthentication</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Integrated second factor authentication mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenIsolateOrigins">DeviceLoginScreenIsolateOrigins</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Site Isolation for specified origins</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceLoginScreenAutoSelectCertificateForUrls">DeviceLoginScreenAutoSelectCertificateForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Automatically select client certificates for these sites on the sign-in screen</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Startup">Startup, Home page and New Tab page</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ShowHomeButton">ShowHomeButton</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Show Home button on the toolbar</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#HomepageLocation">HomepageLocation</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the home page URL</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#HomepageIsNewTabPage">HomepageIsNewTabPage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use New Tab Page as homepage</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#NewTabPageLocation">NewTabPageLocation</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the New Tab page URL</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RestoreOnStartup">RestoreOnStartup</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Action on start-up</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#RestoreOnStartupURLs">RestoreOnStartupURLs</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URLs to open on start-up</td></tr><tr style="height: 0px;"><td colspan="2" style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UserAndDeviceReporting">User and device reporting</a></td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceVersionInfo">ReportDeviceVersionInfo</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report OS and firmware version</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceBootMode">ReportDeviceBootMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report device boot mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceUsers">ReportDeviceUsers</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report device users</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceActivityTimes">ReportDeviceActivityTimes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report device activity times</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceNetworkInterfaces">ReportDeviceNetworkInterfaces</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report device network interfaces</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceHardwareStatus">ReportDeviceHardwareStatus</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report hardware status</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceSessionStatus">ReportDeviceSessionStatus</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report information about active kiosk sessions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceBoardStatus">ReportDeviceBoardStatus</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report board status</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDevicePowerStatus">ReportDevicePowerStatus</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report power status</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportDeviceStorageStatus">ReportDeviceStorageStatus</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report storage status</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportUploadFrequency">ReportUploadFrequency</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Frequency of device status report uploads</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#ReportArcStatusEnabled">ReportArcStatusEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report information about status of Android</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#HeartbeatEnabled">HeartbeatEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Send network packets to the management server to monitor online status</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#HeartbeatFrequency">HeartbeatFrequency</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Frequency of monitoring network packets</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#LogUploadEnabled">LogUploadEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Send system logs to the management server</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 21px;"><a href="#DeviceMetricsReportingEnabled">DeviceMetricsReportingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable metrics reporting</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AbusiveExperienceInterventionEnforce">AbusiveExperienceInterventionEnforce</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Abusive Experience Intervention Enforce</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AdsSettingForIntrusiveAdsSites">AdsSettingForIntrusiveAdsSites</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Ads setting for sites with intrusive ads</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowDeletingBrowserHistory">AllowDeletingBrowserHistory</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable deleting browser and download history</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowDinosaurEasterEgg">AllowDinosaurEasterEgg</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Dinosaur Easter Egg Game</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowFileSelectionDialogs">AllowFileSelectionDialogs</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow invocation of file selection dialogues</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowOutdatedPlugins">AllowOutdatedPlugins</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow running plug-ins that are outdated</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowPopupsDuringPageUnload">AllowPopupsDuringPageUnload</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allows a page to show pop-ups during its unloading</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowScreenLock">AllowScreenLock</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Permit locking the screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowedDomainsForApps">AllowedDomainsForApps</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Define domains allowed to access G Suite</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowedInputMethods">AllowedInputMethods</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the allowed input methods in a user session</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AllowedLanguages">AllowedLanguages</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure the allowed languages in a user session</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AlternateErrorPagesEnabled">AlternateErrorPagesEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable alternate error pages</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AlwaysOpenPdfExternally">AlwaysOpenPdfExternally</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Always Open PDF files externally</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ApplicationLocaleValue">ApplicationLocaleValue</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Application locale</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AudioCaptureAllowed">AudioCaptureAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow or deny audio capture</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AudioCaptureAllowedUrls">AudioCaptureAllowedUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URLs that will be granted access to audio capture devices without prompt</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AudioOutputAllowed">AudioOutputAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow playing audio</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AutoFillEnabled">AutoFillEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable AutoFill</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AutofillAddressEnabled">AutofillAddressEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable AutoFill for addresses</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AutofillCreditCardEnabled">AutofillCreditCardEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable AutoFill for credit cards</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AutoplayAllowed">AutoplayAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow media auto-play</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#AutoplayWhitelist">AutoplayWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow media auto-play on a whitelist of URL patterns</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BackgroundModeEnabled">BackgroundModeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Continue running background apps when Chromium is closed</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BlockThirdPartyCookies">BlockThirdPartyCookies</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block third-party cookies</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BookmarkBarEnabled">BookmarkBarEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Bookmark Bar</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BrowserAddPersonEnabled">BrowserAddPersonEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable add person in user manager</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BrowserGuestModeEnabled">BrowserGuestModeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable guest mode in browser</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BrowserNetworkTimeQueriesEnabled">BrowserNetworkTimeQueriesEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow queries to a Google time service</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BrowserSignin">BrowserSignin</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Browser sign in settings</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#BuiltInDnsClientEnabled">BuiltInDnsClientEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use built-in DNS client</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CaptivePortalAuthenticationIgnoresProxy">CaptivePortalAuthenticationIgnoresProxy</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Captive portal authentication ignores proxy</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CertificateManagementAllowed">CertificateManagementAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow users to manage installed certificates.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CertificateTransparencyEnforcementDisabledForCas">CertificateTransparencyEnforcementDisabledForCas</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Certificate Transparency enforcement for a list of subjectPublicKeyInfo hashes</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CertificateTransparencyEnforcementDisabledForLegacyCas">CertificateTransparencyEnforcementDisabledForLegacyCas</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Certificate Transparency enforcement for a list of Legacy Certificate Authorities</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CertificateTransparencyEnforcementDisabledForUrls">CertificateTransparencyEnforcementDisabledForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Certificate Transparency enforcement for a list of URLs</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ChromeCleanupEnabled">ChromeCleanupEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Chrome Cleanup on Windows</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ChromeCleanupReportingEnabled">ChromeCleanupReportingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control how Chrome Cleanup reports data to Google</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ChromeOsLockOnIdleSuspend">ChromeOsLockOnIdleSuspend</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable lock when the device become idle or suspended</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ChromeOsMultiProfileUserBehavior">ChromeOsMultiProfileUserBehavior</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control the user behaviour in a multiprofile session</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CloudManagementEnrollmentMandatory">CloudManagementEnrollmentMandatory</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable mandatory cloud management enrolment</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CloudManagementEnrollmentToken">CloudManagementEnrollmentToken</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">The enrolment token of cloud policy on desktop</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CloudPolicyOverridesPlatformPolicy">CloudPolicyOverridesPlatformPolicy</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Chromium cloud policy overrides Platform policy.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#CommandLineFlagSecurityWarningsEnabled">CommandLineFlagSecurityWarningsEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable security warnings for command-line flags</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ComponentUpdatesEnabled">ComponentUpdatesEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable component updates in Chromium</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ContextualSearchEnabled">ContextualSearchEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Tap to Search</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ContextualSuggestionsEnabled">ContextualSuggestionsEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable contextual suggestions of related web pages</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DataCompressionProxyEnabled">DataCompressionProxyEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable the data compression proxy feature</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DefaultBrowserSettingEnabled">DefaultBrowserSettingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set Chromium as Default Browser</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DefaultDownloadDirectory">DefaultDownloadDirectory</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set default download directory</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeveloperToolsAvailability">DeveloperToolsAvailability</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control where Developer Tools can be used</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeveloperToolsDisabled">DeveloperToolsDisabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable Developer Tools</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeviceLocalAccountManagedSessionEnabled">DeviceLocalAccountManagedSessionEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow managed session on device</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DevicePowerwashAllowed">DevicePowerwashAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow the device to request powerwash</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeviceRebootOnUserSignout">DeviceRebootOnUserSignout</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force device reboot when user signs out</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeviceScheduledUpdateCheck">DeviceScheduledUpdateCheck</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set custom schedule to check for updates</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DeviceWebUsbAllowDevicesForUrls">DeviceWebUsbAllowDevicesForUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Automatically grant permission to these sites to connect to USB devices with the given vendor and product IDs.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Disable3DAPIs">Disable3DAPIs</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable support for 3D graphics APIs</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DisableSafeBrowsingProceedAnyway">DisableSafeBrowsingProceedAnyway</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable proceeding from the Safe Browsing warning page</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DisableScreenshots">DisableScreenshots</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable taking screenshots</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DisabledPlugins">DisabledPlugins</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Specify a list of disabled plug-ins</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DisabledPluginsExceptions">DisabledPluginsExceptions</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Specify a list of plug-ins that the user can enable or disable</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DisabledSchemes">DisabledSchemes</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable URL protocol schemes</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DiskCacheDir">DiskCacheDir</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set disk cache directory</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DiskCacheSize">DiskCacheSize</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set disk cache size in bytes</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DownloadDirectory">DownloadDirectory</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set download directory</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#DownloadRestrictions">DownloadRestrictions</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow download restrictions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EasyUnlockAllowed">EasyUnlockAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Smart Lock to be used</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EcryptfsMigrationStrategy">EcryptfsMigrationStrategy</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Migration strategy for eCryptfs</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EditBookmarksEnabled">EditBookmarksEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable or disable bookmark editing</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EnableDeprecatedWebPlatformFeatures">EnableDeprecatedWebPlatformFeatures</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable deprecated web platform features for a limited time</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EnableOnlineRevocationChecks">EnableOnlineRevocationChecks</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable online OCSP/CRL checks</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EnableSyncConsent">EnableSyncConsent</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable displaying Sync Consent during sign-in</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EnabledPlugins">EnabledPlugins</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Specify a list of enabled plug-ins</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#EnterpriseHardwarePlatformAPIEnabled">EnterpriseHardwarePlatformAPIEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enables managed extensions to use the Enterprise Hardware Platform API</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ExternalStorageDisabled">ExternalStorageDisabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable mounting of external storage</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ExternalStorageReadOnly">ExternalStorageReadOnly</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Treat external storage devices as read-only</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceBrowserSignin">ForceBrowserSignin</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable force sign-in for Chromium</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceEphemeralProfiles">ForceEphemeralProfiles</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Ephemeral profile</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceGoogleSafeSearch">ForceGoogleSafeSearch</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force Google SafeSearch</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceMaximizeOnFirstRun">ForceMaximizeOnFirstRun</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Maximise the first browser window on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceNetworkInProcess">ForceNetworkInProcess</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force networking code to run in the browser process</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceSafeSearch">ForceSafeSearch</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force SafeSearch</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceYouTubeRestrict">ForceYouTubeRestrict</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force minimum YouTube Restricted Mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ForceYouTubeSafetyMode">ForceYouTubeSafetyMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force YouTube Safety Mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#FullscreenAllowed">FullscreenAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow fullscreen mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#HardwareAccelerationModeEnabled">HardwareAccelerationModeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Use hardware acceleration when available</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#HideWebStoreIcon">HideWebStoreIcon</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Hide the web store from the New Tab Page and app launcher</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#Http09OnNonDefaultPortsEnabled">Http09OnNonDefaultPortsEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable HTTP/0.9 support on non-default ports</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ImportAutofillFormData">ImportAutofillFormData</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Import auto-fill form data from default browser on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ImportBookmarks">ImportBookmarks</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Import bookmarks from default browser on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ImportHistory">ImportHistory</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Import browsing history from default browser on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ImportHomepage">ImportHomepage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Import of homepage from default browser on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ImportSavedPasswords">ImportSavedPasswords</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Import saved passwords from default browser on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ImportSearchEngine">ImportSearchEngine</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Import search engines from default browser on first run</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#IncognitoEnabled">IncognitoEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Incognito mode</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#IncognitoModeAvailability">IncognitoModeAvailability</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Incognito mode availability</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#InstantTetheringAllowed">InstantTetheringAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Instant Tethering to be used.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#IsolateOrigins">IsolateOrigins</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Site Isolation for specified origins</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#IsolateOriginsAndroid">IsolateOriginsAndroid</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Site Isolation for specified origins on Android devices</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#JavascriptEnabled">JavascriptEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable JavaScript</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#KeyPermissions">KeyPermissions</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Key Permissions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#MachineLevelUserCloudPolicyEnrollmentToken">MachineLevelUserCloudPolicyEnrollmentToken</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">The enrolment token of cloud policy on desktop</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ManagedBookmarks">ManagedBookmarks</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Managed Bookmarks</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#MaxConnectionsPerProxy">MaxConnectionsPerProxy</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Maximum number of concurrent connections to the proxy server</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#MaxInvalidationFetchDelay">MaxInvalidationFetchDelay</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Maximum fetch delay after a policy invalidation</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#MediaRouterCastAllowAllIPs">MediaRouterCastAllowAllIPs</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Google Cast to connect to Cast devices on all IP addresses.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#MetricsReportingEnabled">MetricsReportingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable reporting of usage and crash-related data</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#NTPContentSuggestionsEnabled">NTPContentSuggestionsEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Show content suggestions on the New Tab page</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#NetworkPredictionOptions">NetworkPredictionOptions</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable network prediction.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#NoteTakingAppsLockScreenWhitelist">NoteTakingAppsLockScreenWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Whitelist note-taking apps allowed on the Chromium OS lock screen</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#OpenNetworkConfiguration">OpenNetworkConfiguration</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">User-level network configuration</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#OverrideSecurityRestrictionsOnInsecureOrigin">OverrideSecurityRestrictionsOnInsecureOrigin</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Origins or hostname patterns for which restrictions on
insecure origins should not apply</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ParentAccessCodeConfig">ParentAccessCodeConfig</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Parent Access Code Configuration</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PinnedLauncherApps">PinnedLauncherApps</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">List of pinned apps to show in the launcher</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PolicyDictionaryMultipleSourceMergeList">PolicyDictionaryMultipleSourceMergeList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow merging dictionary policies from different sources</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PolicyListMultipleSourceMergeList">PolicyListMultipleSourceMergeList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow merging list policies from different sources</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PolicyRefreshRate">PolicyRefreshRate</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Refresh rate for user policy</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PromotionalTabsEnabled">PromotionalTabsEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable showing full-tab promotional content</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#PromptForDownloadLocation">PromptForDownloadLocation</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Ask where to save each file before downloading</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ProxySettings">ProxySettings</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Proxy settings</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#QuicAllowed">QuicAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow QUIC protocol</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RelaunchHeadsUpPeriod">RelaunchHeadsUpPeriod</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the time of the first user relaunch notification</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RelaunchNotification">RelaunchNotification</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Notify a user that a browser relaunch or device restart is recommended or required</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RelaunchNotificationPeriod">RelaunchNotificationPeriod</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the time period for update notifications</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ReportCrostiniUsageEnabled">ReportCrostiniUsageEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Report information about usage of Linux apps</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RequireOnlineRevocationChecksForLocalAnchors">RequireOnlineRevocationChecksForLocalAnchors</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Require online OCSP/CRL checks for local trust anchors</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RestrictAccountsToPatterns">RestrictAccountsToPatterns</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Restrict accounts that are visible in Chromium</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RestrictSigninToPattern">RestrictSigninToPattern</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Restrict which Google accounts are allowed to be set as browser primary accounts in Chromium</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RoamingProfileLocation">RoamingProfileLocation</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the roaming profile directory</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RoamingProfileSupportEnabled">RoamingProfileSupportEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable the creation of roaming copies for Chromium profile data</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#RunAllFlashInAllowMode">RunAllFlashInAllowMode</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Extend Flash content setting to all content</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SAMLOfflineSigninTimeLimit">SAMLOfflineSigninTimeLimit</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Limit the time for which a user authenticated via SAML can log in offline</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SSLErrorOverrideAllowed">SSLErrorOverrideAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow proceeding from the SSL warning page</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SSLVersionMin">SSLVersionMin</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Minimum SSL version enabled</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SafeBrowsingForTrustedSourcesEnabled">SafeBrowsingForTrustedSourcesEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Safe Browsing for trusted sources</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SafeSitesFilterBehavior">SafeSitesFilterBehavior</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control SafeSites adult content filtering.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SavingBrowserHistoryDisabled">SavingBrowserHistoryDisabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable saving browser history</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SchedulerConfiguration">SchedulerConfiguration</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Select task scheduler configuration</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SearchSuggestEnabled">SearchSuggestEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable search suggestions</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SecondaryGoogleAccountSigninAllowed">SecondaryGoogleAccountSigninAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Multiple Sign-in Within the Browser</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SecurityKeyPermitAttestation">SecurityKeyPermitAttestation</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URLs/domains automatically permitted direct Security Key attestation</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SessionLengthLimit">SessionLengthLimit</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Limit the length of a user session</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SessionLocales">SessionLocales</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the recommended locales for a managed session</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ShelfAutoHideBehavior">ShelfAutoHideBehavior</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Control shelf auto-hiding</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ShowAppsShortcutInBookmarkBar">ShowAppsShortcutInBookmarkBar</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Show the apps shortcut in the bookmark bar</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ShowLogoutButtonInTray">ShowLogoutButtonInTray</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Add a logout button to the system tray</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SignedHTTPExchangeEnabled">SignedHTTPExchangeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Signed HTTP Exchange (SXG) support</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SigninAllowed">SigninAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow sign-in to Chromium</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SitePerProcess">SitePerProcess</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Site Isolation for every site</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SitePerProcessAndroid">SitePerProcessAndroid</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Site Isolation for every site</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SmartLockSigninAllowed">SmartLockSigninAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow Smart Lock Sign-in to be used.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SmsMessagesAllowed">SmsMessagesAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow SMS messages to be synced from phone to Chromebook.</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SpellCheckServiceEnabled">SpellCheckServiceEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable or disable spell checking web service</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SpellcheckEnabled">SpellcheckEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable spellcheck</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SpellcheckLanguage">SpellcheckLanguage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force enable spellcheck languages</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SpellcheckLanguageBlacklist">SpellcheckLanguageBlacklist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Force disable spellcheck languages</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#StartupBrowserWindowLaunchSuppressed">StartupBrowserWindowLaunchSuppressed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Suppress launching of browser window</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SuppressUnsupportedOSWarning">SuppressUnsupportedOSWarning</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Suppress the unsupported OS warning</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#SyncDisabled">SyncDisabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Disable synchronisation of data with Google</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#TabLifecyclesEnabled">TabLifecyclesEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enables or disables tab lifecycles</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#TaskManagerEndProcessEnabled">TaskManagerEndProcessEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable ending processes in Task Manager</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#TermsOfServiceURL">TermsOfServiceURL</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the Terms of Service for a device-local account</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#ThirdPartyBlockingEnabled">ThirdPartyBlockingEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable third-party software injection blocking</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#TouchVirtualKeyboardEnabled">TouchVirtualKeyboardEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable virtual keyboard</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#TranslateEnabled">TranslateEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable Translate</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#URLBlacklist">URLBlacklist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Block access to a list of URLs</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#URLWhitelist">URLWhitelist</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow access to a list of URLs</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UnifiedDesktopEnabledByDefault">UnifiedDesktopEnabledByDefault</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Make Unified Desktop available and turn on by default</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UnsafelyTreatInsecureOriginAsSecure">UnsafelyTreatInsecureOriginAsSecure</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Origins or hostname patterns for which restrictions on
insecure origins should not apply</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UrlKeyedAnonymizedDataCollectionEnabled">UrlKeyedAnonymizedDataCollectionEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable URL-keyed anonymised data collection</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UsageTimeLimit">UsageTimeLimit</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Time Limit</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UserAvatarImage">UserAvatarImage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">User avatar image</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UserDataDir">UserDataDir</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set user data directory</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UserDisplayName">UserDisplayName</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Set the display name for device-local accounts</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#UserFeedbackAllowed">UserFeedbackAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow user feedback</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#VideoCaptureAllowed">VideoCaptureAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow or deny video capture</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#VideoCaptureAllowedUrls">VideoCaptureAllowedUrls</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">URLs that will be granted access to video capture devices without prompt</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#VpnConfigAllowed">VpnConfigAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow the user to manage VPN connections</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WPADQuickCheckEnabled">WPADQuickCheckEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable WPAD optimisation</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WallpaperImage">WallpaperImage</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Wallpaper image</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WebAppInstallForceList">WebAppInstallForceList</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Configure list of force-installed web apps</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WebDriverOverridesIncompatiblePolicies">WebDriverOverridesIncompatiblePolicies</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow WebDriver to Override Incompatible Policies</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WebRtcEventLogCollectionAllowed">WebRtcEventLogCollectionAllowed</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Allow collection of WebRTC event logs from Google services</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WebRtcUdpPortRange">WebRtcUdpPortRange</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Restrict the range of local UDP ports used by WebRTC</td></tr><tr style="height: 0px;"><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 200px;padding-left: 7px;"><a href="#WelcomePageOnOSUpgradeEnabled">WelcomePageOnOSUpgradeEnabled</a></td><td style="border: 1px dotted rgb(170, 170, 170); padding: 7px; vertical-align: top; width: 236px; height: 15px;width: 100%;">Enable showing the welcome page on the first browser launch following OS upgrade</td></tr></tbody></table></div><div><div style="margin-left: 0px"><h2><a name="Accessibility"/>Accessibility settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure Chromium OS accessibility features.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ShowAccessibilityOptionsInSystemTrayMenu"/>ShowAccessibilityOptionsInSystemTrayMenu</h3><span>Show accessibility options in system tray menu</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ShowAccessibilityOptionsInSystemTrayMenu</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 27</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true, Accessibility options always appear in system tray menu.</p><p>If this policy is set to false, Accessibility options never appear in system tray menu.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, Accessibility options will not appear in the system tray menu, but the user can cause the Accessibility options to appear via the Settings page.</p><p>When accessibility features are enabled (by other means, e.g. by a key combination), Accessibility options will always appear in system tray menu.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="LargeCursorEnabled"/>LargeCursorEnabled</h3><span>Enable large cursor</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\LargeCursorEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the large cursor accessibility feature.</p><p>If this policy is set to true, the large cursor will always be enabled.</p><p>If this policy is set to false, the large cursor will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, the large cursor is disabled initially but can be enabled by the user at any time.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SpokenFeedbackEnabled"/>SpokenFeedbackEnabled</h3><span>Enable spoken feedback</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SpokenFeedbackEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the spoken feedback accessibility feature.</p><p>If this policy is set to true, spoken feedback will always be enabled.</p><p>If this policy is set to false, spoken feedback will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, spoken feedback is disabled initially but can be enabled by the user at any time.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="HighContrastEnabled"/>HighContrastEnabled</h3><span>Enable high contrast mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\HighContrastEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the high contrast mode accessibility feature.</p><p>If this policy is set to true, high contrast mode will always be enabled.</p><p>If this policy is set to false, high contrast mode will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, high contrast mode is disabled initially but can be enabled by the user at any time.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="VirtualKeyboardEnabled"/>VirtualKeyboardEnabled</h3><span>Enable on-screen keyboard</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VirtualKeyboardEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the on-screen keyboard accessibility feature.</p><p>If this policy is set to true, the on-screen keyboard will always be enabled.</p><p>If this policy is set to false, the on-screen keyboard will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, the on-screen keyboard is disabled initially but can be enabled by the user at any time.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="StickyKeysEnabled"/>StickyKeysEnabled</h3><span>Enable sticky keys</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\StickyKeysEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 76</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the sticky keys accessibility feature.</p><p>If this policy is set to true, the sticky keys will always be enabled.</p><p>If this policy is set to false, the sticky keys will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, the sticky keys is disabled initially but can be enabled by the user at any time.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="KeyboardDefaultToFunctionKeys"/>KeyboardDefaultToFunctionKeys</h3><span>Media keys default to function keys</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\KeyboardDefaultToFunctionKeys</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 35</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Changes the default behaviour of the top row keys to function keys.</p><p>If this policy is set to true, the keyboard's top row of keys will produce function key commands by default. The search key has to be pressed to revert their behaviour back to media keys.</p><p>If this policy is set to false or left unset, the keyboard will produce media key commands by default and function key commands when the search key is held.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenMagnifierType"/>ScreenMagnifierType</h3><span>Set screen magnifier type</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenMagnifierType</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set, it controls the type of screen magnifier that is enabled. Setting the policy to 'None' disables the screen magnifier.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, the screen magnifier is disabled initially but can be enabled by the user at any time.</p><ul><li>0 = Screen magnifier disabled</li><li>1 = Full-screen magnifier enabled</li><li>2 = Docked magnifier enabled</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenDefaultLargeCursorEnabled"/>DeviceLoginScreenDefaultLargeCursorEnabled</h3><span>Set default state of the large cursor on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenDefaultLargeCursorEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set the default state of the large cursor accessibility feature on the login screen.</p><p>If this policy is set to true, the large cursor will be enabled when the login screen is shown.</p><p>If this policy is set to false, the large cursor will be disabled when the login screen is shown.</p><p>If you set this policy, users can temporarily override it by enabling or disabling the large cursor. However, the user's choice is not persistent and the default is restored whenever the login screen is shown anew or the user remains idle on the login screen for a minute.</p><p>If this policy is left unset, the large cursor is disabled when the login screen is first shown. Users can enable or disable the large cursor at any time and its status on the login screen is persisted between users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenDefaultSpokenFeedbackEnabled"/>DeviceLoginScreenDefaultSpokenFeedbackEnabled</h3><span>Set the default state of spoken feedback on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenDefaultSpokenFeedbackEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set the default state of the spoken feedback accessibility feature on the login screen.</p><p>If this policy is set to true, spoken feedback will be enabled when the login screen is shown.</p><p>If this policy is set to false, spoken feedback will be disabled when the login screen is shown.</p><p>If you set this policy, users can temporarily override it by enabling or disabling spoken feedback. However, the user's choice is not persistent and the default is restored whenever the login screen is shown anew or the user remains idle on the login screen for a minute.</p><p>If this policy is left unset, spoken feedback is disabled when the login screen is first shown. Users can enable or disable spoken feedback at any time and its status on the login screen is persisted between users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenDefaultHighContrastEnabled"/>DeviceLoginScreenDefaultHighContrastEnabled</h3><span>Set the default state of high contrast mode on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenDefaultHighContrastEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set the default state of the high contrast mode accessibility feature on the login screen.</p><p>If this policy is set to true, high contrast mode will be enabled when the login screen is shown.</p><p>If this policy is set to false, high contrast mode will be disabled when the login screen is shown.</p><p>If you set this policy, users can temporarily override it by enabling or disabling high contrast mode. However, the user's choice is not persistent and the default is restored whenever the login screen is shown anew or the user remains idle on the login screen for a minute.</p><p>If this policy is left unset, high contrast mode is disabled when the login screen is first shown. Users can enable or disable high contrast mode at any time and its status on the login screen is persisted between users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenDefaultVirtualKeyboardEnabled"/>DeviceLoginScreenDefaultVirtualKeyboardEnabled</h3><span>Set default state of the on-screen keyboard on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenDefaultVirtualKeyboardEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set the default state of the on-screen keyboard accessibility feature on the login screen.</p><p>If this policy is set to true, the on-screen keyboard will be enabled when the login screen is shown.</p><p>If this policy is set to false, the on-screen keyboard will be disabled when the login screen is shown.</p><p>If you set this policy, users can temporarily override it by enabling or disabling the on-screen keyboard. However, the user's choice is not persistent and the default is restored whenever the login screen is shown anew or the user remains idle on the login screen for a minute.</p><p>If this policy is left unset, the on-screen keyboard is disabled when the login screen is first shown. Users can enable or disable the on-screen keyboard any time and its status on the login screen is persisted between users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenDefaultScreenMagnifierType"/>DeviceLoginScreenDefaultScreenMagnifierType</h3><span>Set the default screen magnifier type enabled on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenDefaultScreenMagnifierType</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set the default type of screen magnifier that is enabled on the login screen.</p><p>If this policy is set, it controls the type of screen magnifier that is enabled when the login screen is shown. Setting the policy to &quot;None&quot; disables the screen magnifier.</p><p>If you set this policy, users can temporarily override it by enabling or disabling the screen magnifier. However, the user's choice is not persistent and the default is restored whenever the login screen is shown anew or the user remains idle on the login screen for a minute.</p><p>If this policy is left unset, the screen magnifier is disabled when the login screen is first shown. Users can enable or disable the screen magnifier at any time and its status on the login screen is persisted between users.</p><ul><li>0 = Screen magnifier disabled</li><li>1 = Full-screen magnifier enabled</li><li>2 = Docked magnifier enabled</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Arc"/>Android settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls settings for the Android container (ARC) and Android apps.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ArcEnabled"/>ArcEnabled</h3><span>Enable ARC</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ArcEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 50</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set to true, ARC will be enabled for the user
(subject to additional policy settings checks – ARC will still be
unavailable if either ephemeral mode or multiple sign-in is enabled
in the current user session).</p><p>If this setting is disabled or not configured then enterprise users are
unable to use ARC.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="UnaffiliatedArcAllowed"/>UnaffiliatedArcAllowed</h3><span>Allow unaffiliated users to use ARC</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UnaffiliatedArcAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 64</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set to false, unaffiliated users will not be allowed to use ARC.</p><p>If the policy is unset or set to true, all users are allowed to use ARC (unless ARC is disabled by other means).</p><p>Changes to the policy will only be applied while ARC is not running, e.g. while Chrome OS is starting.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ArcPolicy"/>ArcPolicy</h3><span>Configure ARC</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ArcPolicy</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 50</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies a set of policies that will be handed over to the ARC runtime. The value must be valid JSON.</p><p>This policy can be used to configure which Android apps are automatically installed on the device.</p><p>To pin apps to the launcher, see PinnedLauncherApps.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;applications&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;defaultPermissionPolicy&quot;: {
&quot;description&quot;: &quot;Policy for granting permission requests to apps. PERMISSION_POLICY_UNSPECIFIED: Policy not specified. If no policy is specified for a permission at any level, then the `PROMPT` behavior is used by default. PROMPT: Prompt the user to grant a permission. GRANT: Automatically grant a permission. DENY: Automatically deny a permission.&quot;,
&quot;enum&quot;: [
&quot;PERMISSION_POLICY_UNSPECIFIED&quot;,
&quot;PROMPT&quot;,
&quot;GRANT&quot;,
&quot;DENY&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;installType&quot;: {
&quot;description&quot;: &quot;Specifies how an app is installed. OPTIONAL: The app is not installed automatically, but the user can install it. This is the default if this policy is not specified. PRELOAD: The app is installed automatically, but the user can uninstall it. FORCE_INSTALLED: The app is installed automatically and the user cannot uninstall it. BLOCKED: The app is blocked and cannot be installed. If the app was installed under a previous policy it will be uninstalled.&quot;,
&quot;enum&quot;: [
&quot;OPTIONAL&quot;,
&quot;PRELOAD&quot;,
&quot;FORCE_INSTALLED&quot;,
&quot;BLOCKED&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;managedConfiguration&quot;: {
&quot;description&quot;: &quot;App-specific JSON configuration object with a set of key-value pairs, e.g. '\&quot;managedConfiguration\&quot;: { \&quot;key1\&quot;: value1, \&quot;key2\&quot;: value2 }'. The keys are defined in the app manifest.&quot;,
&quot;type&quot;: &quot;object&quot;
},
&quot;packageName&quot;: {
&quot;description&quot;: &quot;Android app identifier, e.g. \&quot;com.google.android.gm\&quot; for Gmail&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;{&quot;applications&quot;:[{&quot;packageName&quot;:&quot;com.google.android.gm&quot;,&quot;installType&quot;:&quot;FORCE_INSTALLED&quot;,&quot;defaultPermissionPolicy&quot;:&quot;PROMPT&quot;,&quot;managedConfiguration&quot;:{}},{&quot;packageName&quot;:&quot;com.google.android.apps.docs&quot;,&quot;installType&quot;:&quot;PRELOAD&quot;,&quot;defaultPermissionPolicy&quot;:&quot;PROMPT&quot;,&quot;managedConfiguration&quot;:{}}]}&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ArcAppInstallEventLoggingEnabled"/>ArcAppInstallEventLoggingEnabled</h3><span>Log events for Android app installs</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables reporting of key events during Android app installation to Google. Events are captured only for apps whose installation was triggered via policy.</p><p>If the policy is set to true, events will be logged.
If the policy is set to false or unset, events will not be logged.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ArcBackupRestoreServiceEnabled"/>ArcBackupRestoreServiceEnabled</h3><span>Control Android backup and restore service</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ArcBackupRestoreServiceEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the initial state of Android backup and restore.</p><p>When this policy is not configured or set to BackupAndRestoreDisabled, Android backup and restore is initially disabled.</p><p>When this policy is set to BackupAndRestoreEnabled, Android backup and restore is initially enabled.</p><p>When this policy is set to BackupAndRestoreUnderUserControl, the user is asked to choose whether to use Android backup and restore. If the user enables backup and restore, Android app data is uploaded to Android backup servers and restored from them upon app re-installations for compatible apps.</p><p>Note that this policy controls the state of Android backup and restore during initial setup only. The user can open Android settings afterwards and turn Android backup and restore on/off.</p><ul><li>0 = Backup and restore disabled</li><li>1 = User decides whether to enable backup and restore</li><li>2 = Backup and restore enabled</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ArcGoogleLocationServicesEnabled"/>ArcGoogleLocationServicesEnabled</h3><span>Control Android Google Location services</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ArcGoogleLocationServicesEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the initial state of Google location services.</p><p>When this policy is not configured or set to GoogleLocationServicesDisabled, Google location services are initially disabled.</p><p>When this policy is set to GoogleLocationServicesEnabled, Google location services are initially enabled.</p><p>When this policy is set to GoogleLocationServicesUnderUserControl, the user is asked to choose whether to use Google location services. This will allow Android apps to use the services to query the device location, and also will enable submitting of anonymous location data to Google.</p><p>Note that this policy controls the state of Google location services during initial setup only. The user can open Android settings afterwards and turn Google location services on/off.</p><p>Note that this policy is ignored and Google location services are always disabled when the DefaultGeolocationSetting policy is set to BlockGeolocation.</p><ul><li>0 = Google Location services disabled</li><li>1 = User decides whether to enable Google Location services</li><li>2 = Google location services enabled</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ArcCertificatesSyncMode"/>ArcCertificatesSyncMode</h3><span>Set certificate availability for ARC-apps</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ArcCertificatesSyncMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 52</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If set to SyncDisabled or not configured, Chromium OS certificates are not available for ARC-apps.</p><p>If set to CopyCaCerts, all ONC-installed CA certificates with Web TrustBit are available for ARC-apps.</p><ul><li>0 = Disable usage of Chromium OS certificates to ARC-apps</li><li>1 = Enable Chromium OS CA certificates to ARC-apps</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AppRecommendationZeroStateEnabled"/>AppRecommendationZeroStateEnabled</h3><span>Enable App Recommendations in Zero State of Search Box</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AppRecommendationZeroStateEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable App Recommendation in Zero State of search box in launcher.</p><p>If this policy is set to true, App recommendations may appear in the zero state search.</p><p>If this policy is set to false, App recommendations will not appear in the zero state search.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, the default is False for managed devices.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="ContentSettings"/>Content Settings ...</h2><div style="margin-top: 20px; margin-bottom: 20px;">Content settings allow you to specify how contents of a specific type (for example Cookies, Images or JavaScript) are handled.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultCookiesSetting"/>DefaultCookiesSetting</h3><span>Default cookies setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultCookiesSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultCookiesSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultCookiesSetting</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultCookiesSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to set local data. Setting local data can be either allowed for all websites or denied for all websites.</p><p>If this policy is set to 'Keep cookies for the duration of the session' then cookies will be cleared when the session closes. Note that if Chromium is running in 'background mode', the session may not close when the last window is closed. Please see the 'BackgroundModeEnabled' policy for more information about configuring this behaviour.</p><p>If this policy is left not set, 'AllowCookies' will be used and the user will be able to change it.</p><ul><li>1 = Allow all sites to set local data.</li><li>2 = Do not allow any site to set local data</li><li>4 = Keep cookies for the duration of the session.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#CookiesSettings">CookiesSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultImagesSetting"/>DefaultImagesSetting</h3><span>Default images setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultImagesSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultImagesSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultImagesSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to display images. Displaying images can be either allowed for all websites or denied for all websites.</p><p>If this policy is left not set, 'AllowImages' will be used and the user will be able to change it.</p><p>Note: This policy was erroneously enabled on Android, but this functionality has never been fully supported on Android.</p><ul><li>1 = Allow all sites to show all images</li><li>2 = Do not allow any site to show images</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#ImageSettings">ImageSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultJavaScriptSetting"/>DefaultJavaScriptSetting</h3><span>Default JavaScript setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultJavaScriptSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultJavaScriptSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultJavaScriptSetting</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultJavaScriptSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to run JavaScript. Running JavaScript can be either allowed for all websites or denied for all websites.</p><p>If this policy is left unset, 'AllowJavaScript' will be used and the user will be able to change it.</p><ul><li>1 = Allow all sites to run JavaScript (recommended)</li><li>2 = Do not allow any site to run JavaScript</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#JavascriptSettings">JavascriptSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultPluginsSetting"/>DefaultPluginsSetting</h3><span>Default Flash setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultPluginsSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultPluginsSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultPluginsSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to automatically run the Flash plug-in. Automatically running the Flash plug-in can be either allowed for all websites or denied for all websites.</p><p>Click to play allows the Flash plug-in to run but the user must click on the placeholder to start its execution.</p><p>Automatic playback is only allowed for domains explicitly listed in the PluginsAllowedForUrls policy. If you want to enabled automatic playback for all sites, consider adding <a href="http://*">http://*</a> and <a href="https://*">https://*</a> to this list.</p><p>If this policy is left not set, the user will be able to change this setting manually.</p><ul><li>1 = Allow all sites to automatically run the Flash plug-in</li><li>2 = Block the Flash plug-in</li><li>3 = Click to play</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#PluginsSettings">PluginsSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultPopupsSetting"/>DefaultPopupsSetting</h3><span>setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultPopupsSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultPopupsSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultPopupsSetting</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultPopupsSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 33</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to show pop-ups. Showing pop-ups can be either allowed for all websites or denied for all websites.</p><p>If this policy is left unset, 'BlockPop-ups' will be used and the user will be able to change it.</p><ul><li>1 = Allow all sites to show pop-ups</li><li>2 = Do not allow any site to show pop-ups</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#PopupsSettings">PopupsSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultNotificationsSetting"/>DefaultNotificationsSetting</h3><span>Default notification settings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultNotificationsSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultNotificationsSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultNotificationsSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to display desktop notifications. Displaying desktop notifications can be allowed by default, denied by default or the user can be asked every time a website wants to show desktop notifications.</p><p>If this policy is left not set, 'AskNotifications' will be used and the user will be able to change it.</p><ul><li>1 = Allow SITE to show desktop notifications?</li><li>2 = Do not allow any site to show desktop notifications</li><li>3 = Ask every time a site wants to show desktop notifications</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#NotificationsSettings">NotificationsSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultGeolocationSetting"/>DefaultGeolocationSetting</h3><span>Default geolocation setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultGeolocationSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultGeolocationSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultGeolocationSetting</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultGeolocationSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to track the users' physical location. Tracking the users' physical location can be allowed by default, denied by default or the user can be asked every time a website requests the physical location.</p><p>If this policy is left not set, 'AskGeolocation' will be used and the user will be able to change it.</p><ul><li>1 = Allow sites to track the users' physical location</li><li>2 = Do not allow any site to track the users' physical location</li><li>3 = Ask whenever a site wants to track the users' physical location</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>If this policy is set to BlockGeolocation, Android apps cannot access location information. If you set this policy to any other value or leave it unset, the user is asked to consent when an Android app wants to access location information.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultMediaStreamSetting"/>DefaultMediaStreamSetting (deprecated)</h3><span>Default mediastream setting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultMediaStreamSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultMediaStreamSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultMediaStreamSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 22</li><li>Chromium OS (Chromium OS) since version 22</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to get access to media capture devices. Access to media capture devices can be allowed by default, or the user can be asked every time a website wants to get access to media capture devices.</p><p>If this policy is left not set, 'PromptOnAccess' will be used and the user will be able to change it.</p><ul><li>2 = Do not allow any site to access the camera and microphone</li><li>3 = Ask every time a site wants to access the camera and/or microphone</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultWebBluetoothGuardSetting"/>DefaultWebBluetoothGuardSetting</h3><span>Control use of the Web Bluetooth API</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultWebBluetoothGuardSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultWebBluetoothGuardSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultWebBluetoothGuardSetting</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultWebBluetoothGuardSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 50</li><li>Chromium (Android) since version 50</li><li>Chromium (Linux, Mac, Windows) since version 50</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to get access to nearby Bluetooth devices. Access can be completely blocked, or the user can be asked every time a website wants to get access to nearby Bluetooth devices.</p><p>If this policy is left not set, '3' will be used, and the user will be able to change it.</p><ul><li>2 = Do not allow any site to request access to Bluetooth devices via the Web Bluetooth API</li><li>3 = Allow sites to ask the user to grant access to a nearby Bluetooth device</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultWebUsbGuardSetting"/>DefaultWebUsbGuardSetting</h3><span>Control use of the WebUSB API</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultWebUsbGuardSetting</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultWebUsbGuardSetting</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultWebUsbGuardSetting</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultWebUsbGuardSetting</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 67</li><li>Chromium (Android) since version 67</li><li>Chromium (Linux, Mac, Windows) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether websites are allowed to get access to connected USB devices. Access can be completely blocked, or the user can be asked every time a website wants to get access to connected USB devices.</p><p>This policy can be overridden for specific URL patterns using the 'WebUsbAskForUrls' and 'WebUsbBlockedForUrls' policies.</p><p>If this policy is left not set, '3' will be used, and the user will be able to change it.</p><ul><li>2 = Do not allow any site to request access to USB devices via the WebUSB API</li><li>3 = Allow sites to ask the user to grant access to a connected USB device</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#WebUsbSettings">WebUsbSettings</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AutoSelectCertificateForUrls"/>AutoSelectCertificateForUrls</h3><span>Automatically select client certificates for these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AutoSelectCertificateForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AutoSelectCertificateForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AutoSelectCertificateForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li><li>Chromium OS (Chromium OS) since version 15</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify a list of URL patterns that specify sites for which Chromium should automatically select a client certificate, if the site requests a certificate.</p><p>The value must be an array of stringified JSON dictionaries. Each dictionary must have the form { &quot;pattern&quot;: &quot;$URL_PATTERN&quot;, &quot;filter&quot; : $FILTER }, where $URL_PATTERN is a content setting pattern. $FILTER restricts from which client certificates the browser will automatically select. Independent of the filter, only certificates that match the server's certificate request will be selected. For example, if $FILTER has the form { &quot;ISSUER&quot;: { &quot;CN&quot;: &quot;$ISSUER_CN&quot; } }, additionally only client certificates are selected that are issued by a certificate with the CommonName $ISSUER_CN. If $FILTER contains an &quot;ISSUER&quot; and a &quot;SUBJECT&quot; section, a client certificate must satisfy both conditions to be selected. If $FILTER specifies an organisation (&quot;O&quot;), a certificate must have at least one organisation which matches the specified value to be selected. If $FILTER specifies an organisation unit (&quot;OU&quot;), a certificate must have at least one organisation unit which matches the specified value to be selected. If $FILTER is the empty dictionary {}, the selection of client certificates is not additionally restricted.</p><p>If this policy is left not set, no auto-selection will be done for any site.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;filter&quot;: {
&quot;properties&quot;: {
&quot;ISSUER&quot;: {
&quot;id&quot;: &quot;CertPrincipalFields&quot;,
&quot;properties&quot;: {
&quot;CN&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;L&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;O&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;OU&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;SUBJECT&quot;: {
&quot;$ref&quot;: &quot;CertPrincipalFields&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;pattern&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\AutoSelectCertificateForUrls\1 = &quot;{&quot;pattern&quot;:&quot;https://www.example.com&quot;,&quot;filter&quot;:{&quot;ISSUER&quot;:{&quot;CN&quot;:&quot;certificate issuer name&quot;, &quot;L&quot;: &quot;certificate issuer location&quot;, &quot;O&quot;: &quot;certificate issuer org&quot;, &quot;OU&quot;: &quot;certificate issuer org unit&quot;}, &quot;SUBJECT&quot;:{&quot;CN&quot;:&quot;certificate subject name&quot;, &quot;L&quot;: &quot;certificate subject location&quot;, &quot;O&quot;: &quot;certificate subject org&quot;, &quot;OU&quot;: &quot;certificate subject org unit&quot;}}}&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\AutoSelectCertificateForUrls\1 = &quot;{&quot;pattern&quot;:&quot;https://www.example.com&quot;,&quot;filter&quot;:{&quot;ISSUER&quot;:{&quot;CN&quot;:&quot;certificate issuer name&quot;, &quot;L&quot;: &quot;certificate issuer location&quot;, &quot;O&quot;: &quot;certificate issuer org&quot;, &quot;OU&quot;: &quot;certificate issuer org unit&quot;}, &quot;SUBJECT&quot;:{&quot;CN&quot;:&quot;certificate subject name&quot;, &quot;L&quot;: &quot;certificate subject location&quot;, &quot;O&quot;: &quot;certificate subject org&quot;, &quot;OU&quot;: &quot;certificate subject org unit&quot;}}}&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;{&quot;pattern&quot;:&quot;https://www.example.com&quot;,&quot;filter&quot;:{&quot;ISSUER&quot;:{&quot;CN&quot;:&quot;certificate issuer name&quot;, &quot;L&quot;: &quot;certificate issuer location&quot;, &quot;O&quot;: &quot;certificate issuer org&quot;, &quot;OU&quot;: &quot;certificate issuer org unit&quot;}, &quot;SUBJECT&quot;:{&quot;CN&quot;:&quot;certificate subject name&quot;, &quot;L&quot;: &quot;certificate subject location&quot;, &quot;O&quot;: &quot;certificate subject org&quot;, &quot;OU&quot;: &quot;certificate subject org unit&quot;}}}&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;{&quot;pattern&quot;:&quot;https://www.example.com&quot;,&quot;filter&quot;:{&quot;ISSUER&quot;:{&quot;CN&quot;:&quot;certificate issuer name&quot;, &quot;L&quot;: &quot;certificate issuer location&quot;, &quot;O&quot;: &quot;certificate issuer org&quot;, &quot;OU&quot;: &quot;certificate issuer org unit&quot;}, &quot;SUBJECT&quot;:{&quot;CN&quot;:&quot;certificate subject name&quot;, &quot;L&quot;: &quot;certificate subject location&quot;, &quot;O&quot;: &quot;certificate subject org&quot;, &quot;OU&quot;: &quot;certificate subject org unit&quot;}}}&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CookiesAllowedForUrls"/>CookiesAllowedForUrls</h3><span>Allow cookies on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CookiesAllowedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CookiesAllowedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CookiesAllowedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">CookiesAllowedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URL patterns that specify sites which are allowed to set cookies.</p><p>If this policy is left not set, the global default value will be used for all sites, either from the 'DefaultCookiesSetting' policy if it is set, or from the user's personal configuration.</p><p>Also see policies 'CookiesBlockedForUrls' and 'CookiesSessionOnlyForUrls'. Note: There must be no conflicting URL patterns between these three policies – it is not specified as to which policy takes precedence.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\CookiesAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\CookiesAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\CookiesAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\CookiesAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CookiesBlockedForUrls"/>CookiesBlockedForUrls</h3><span>Block cookies on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CookiesBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CookiesBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CookiesBlockedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">CookiesBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URL patterns that specify sites which are not allowed to set cookies.</p><p>If this policy is left not set, the global default value will be used for all sites, either from the 'DefaultCookiesSetting' policy if it is set, or from the user's personal configuration.</p><p>Also see policies 'CookiesAllowedForUrls' and 'CookiesSessionOnlyForUrls'. Note: There must be no conflicting URL patterns between these three policies – it is not specified as to which policy takes precedence.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\CookiesBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\CookiesBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\CookiesBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\CookiesBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CookiesSessionOnlyForUrls"/>CookiesSessionOnlyForUrls</h3><span>Limit cookies from matching URLs to the current session</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CookiesSessionOnlyForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CookiesSessionOnlyForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CookiesSessionOnlyForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">CookiesSessionOnlyForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Cookies set by pages matching these URL patterns will be limited to the current session, i.e. they will be deleted when the browser exits.</p><p>For URLs not covered by the patterns specified here, or for all URLs if this policy is not set, the global default value will be used either from the 'DefaultCookiesSetting' policy, if it is set, or from the user's personal configuration.</p><p>Note: If Chromium is running in 'background mode', the session may not be closed when the last browser window is closed, but will stay active instead until the browser exits. Please see the 'BackgroundModeEnabled' policy for more information about configuring this behaviour.</p><p>Also see policies 'CookiesAllowedForUrls' and 'CookiesBlockedForUrls'. Note: There must be no conflicting URL patterns between these three policies – it is not specified as to which policy takes precedence.</p><p>If the 'RestoreOnStartup' policy is set to restore URLs from previous sessions, this policy will not be respected and cookies will be stored permanently for those sites.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\CookiesSessionOnlyForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\CookiesSessionOnlyForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\CookiesSessionOnlyForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\CookiesSessionOnlyForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ImagesAllowedForUrls"/>ImagesAllowedForUrls</h3><span>Allow images on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImagesAllowedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ImagesAllowedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImagesAllowedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URL patterns that specify sites which are allowed to display images.</p><p>If this policy is left not set, the global default value will be used for all sites, either from the 'DefaultImagesSetting' policy if it is set, or from the user's personal configuration.</p><p>Note: This policy was erroneously enabled on Android, but this functionality has never been fully supported on Android.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ImagesAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\ImagesAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ImagesAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\ImagesAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ImagesBlockedForUrls"/>ImagesBlockedForUrls</h3><span>Block images on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImagesBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ImagesBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImagesBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URL patterns that specify sites which are not allowed to display images.</p><p>If this policy is left not set, the global default value will be used for all sites, either from the 'DefaultImagesSetting' policy if it is set, or from the user's personal configuration.</p><p>Note: This policy was erroneously enabled on Android, but this functionality has never been fully supported on Android.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ImagesBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\ImagesBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ImagesBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\ImagesBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="JavaScriptAllowedForUrls"/>JavaScriptAllowedForUrls</h3><span>Allow JavaScript on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\JavaScriptAllowedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\JavaScriptAllowedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">JavaScriptAllowedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">JavaScriptAllowedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are allowed to run JavaScript.</p><p>If this policy is left not set the global default value will be used for all sites either from the 'DefaultJavaScriptSetting' policy, if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\JavaScriptAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\JavaScriptAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\JavaScriptAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\JavaScriptAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="JavaScriptBlockedForUrls"/>JavaScriptBlockedForUrls</h3><span>Block JavaScript on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\JavaScriptBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\JavaScriptBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">JavaScriptBlockedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">JavaScriptBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are not allowed to run JavaScript.</p><p>If this policy is left not set the global default value will be used for all sites either from the 'DefaultJavaScriptSetting' policy, if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\JavaScriptBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\JavaScriptBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\JavaScriptBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\JavaScriptBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PluginsAllowedForUrls"/>PluginsAllowedForUrls</h3><span>Allow the Flash plug-in on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PluginsAllowedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PluginsAllowedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PluginsAllowedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URL patterns that specify sites which are allowed to run the Flash plug-in.</p><p>If this policy is left not set the global default value will be used for all sites either from the 'DefaultPluginsSetting' policy if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PluginsAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\PluginsAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PluginsAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\PluginsAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PluginsBlockedForUrls"/>PluginsBlockedForUrls</h3><span>Block the Flash plug-in on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PluginsBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PluginsBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PluginsBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URL patterns that specify sites which are not allowed to run the Flash plug-in.</p><p>If this policy is left not set the global default value will be used for all sites either from the 'DefaultPluginsSetting' policy if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PluginsBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\PluginsBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PluginsBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\PluginsBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PopupsAllowedForUrls"/>PopupsAllowedForUrls</h3><span>Allow pop-ups on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PopupsAllowedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PopupsAllowedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PopupsAllowedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">PopupsAllowedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are allowed to open pop-ups.</p><p>If this policy is left unset the global default value will be used for all sites either from the 'DefaultPop-upsSetting' policy, if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PopupsAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\PopupsAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PopupsAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\PopupsAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RegisteredProtocolHandlers"/>RegisteredProtocolHandlers</h3><span>Register protocol handlers</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\Recommended\RegisteredProtocolHandlers</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\Recommended\RegisteredProtocolHandlers</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RegisteredProtocolHandlers</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 37</li><li>Chromium OS (Chromium OS) since version 37</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can Be Mandatory: No, Can be Recommended: Yes, Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to register a list of protocol handlers. This can only be a recommended policy. The property |protocol| should be set to the scheme such as 'mailto' and the property |url| should be set to the URL pattern of the application that handles the scheme. The pattern can include a '%s', which if present will be replaced by the handled URL.</p><p>The protocol handlers registered by policy are merged with the ones registered by the user and both are available for use. The user can override the protocol handlers installed by policy by installing a new default handler, but cannot remove a protocol handler registered by policy.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>The protocol handlers set via this policy are not used when handling Android intents.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;default&quot;: {
&quot;description&quot;: &quot;A boolean flag indicating if the protocol handler should be set as the default.&quot;,
&quot;type&quot;: &quot;boolean&quot;
},
&quot;protocol&quot;: {
&quot;description&quot;: &quot;The protocol for the protocol handler.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;description&quot;: &quot;The URL of the protocol handler.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;required&quot;: [
&quot;protocol&quot;,
&quot;url&quot;
],
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\Recommended\RegisteredProtocolHandlers = [
{
&quot;default&quot;: true,
&quot;protocol&quot;: &quot;mailto&quot;,
&quot;url&quot;: &quot;https://mail.google.com/mail/?extsrc=mailto&amp;url=%s&quot;
}
]</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\Recommended\RegisteredProtocolHandlers = [
{
&quot;default&quot;: true,
&quot;protocol&quot;: &quot;mailto&quot;,
&quot;url&quot;: &quot;https://mail.google.com/mail/?extsrc=mailto&amp;url=%s&quot;
}
]</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">RegisteredProtocolHandlers: [
{
&quot;default&quot;: true,
&quot;protocol&quot;: &quot;mailto&quot;,
&quot;url&quot;: &quot;https://mail.google.com/mail/?extsrc=mailto&amp;url=%s&quot;
}
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;key&gt;RegisteredProtocolHandlers&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;default&lt;/key&gt;
&lt;true/&gt;
&lt;key&gt;protocol&lt;/key&gt;
&lt;string&gt;mailto&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;https://mail.google.com/mail/?extsrc=mailto&amp;amp;url=%s&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PopupsBlockedForUrls"/>PopupsBlockedForUrls</h3><span>Block pop-ups on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PopupsBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PopupsBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PopupsBlockedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">PopupsBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are not allowed to open pop-ups.</p><p>If this policy is left unset, the global default value will be used for all sites either from the 'DefaultPop-upsSetting' policy, if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PopupsBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\PopupsBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PopupsBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\PopupsBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NotificationsAllowedForUrls"/>NotificationsAllowedForUrls</h3><span>Allow notifications on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NotificationsAllowedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NotificationsAllowedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NotificationsAllowedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 16</li><li>Chromium OS (Chromium OS) since version 16</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are allowed to display notifications.</p><p>If this policy is left unset, the global default value will be used for all sites either from the 'DefaultNotificationsSetting' policy, if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\NotificationsAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\NotificationsAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NotificationsAllowedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\NotificationsAllowedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NotificationsBlockedForUrls"/>NotificationsBlockedForUrls</h3><span>Block notifications from these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NotificationsBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NotificationsBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NotificationsBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 16</li><li>Chromium OS (Chromium OS) since version 16</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are not allowed to display notifications.</p><p>If this policy is left unset the global default value will be used for all sites either from the 'DefaultNotificationsSetting' policy, if it is set, or the user's personal configuration otherwise.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\NotificationsBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\NotificationsBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NotificationsBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\NotificationsBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="WebUsbAllowDevicesForUrls"/>WebUsbAllowDevicesForUrls</h3><span>Automatically grant permission to these sites to connect to USB devices with the given vendor and product IDs.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Android:string, Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebUsbAllowDevicesForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WebUsbAllowDevicesForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebUsbAllowDevicesForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">WebUsbAllowDevicesForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 75</li><li>Chromium OS (Chromium OS) since version 74</li><li>Chromium (Linux, Mac, Windows) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URLs that specify which sites will automatically be granted permission to access a USB device with the given vendor and product IDs. Each item in the list must contain both devices and URLs in order for the policy to be valid. Each item in devices can contain a vendor ID and product ID field. Any ID that is omitted is treated as a wildcard with one exception, and that exception is that a product ID cannot be specified without a vendor ID also being specified. Otherwise, the policy will not be valid and will be ignored.</p><p>The USB permission model uses the URL of the requesting site ('requesting URL') and the URL of the top-level frame site ('embedding URL') to grant permission to the requesting URL to access the USB device. The requesting URL may be different from the embedding URL when the requesting site is loaded in an iframe. Therefore, the 'URLs' field can contain up to two URL strings delimited by a comma to specify the requesting and embedding URL respectively. If only one URL is specified, then access to the corresponding USB devices will be granted when the requesting site's URL matches this URL regardless of embedding status. The URLs in 'URLs' must be valid URLs, otherwise the policy will be ignored.</p><p>If this policy is left not set, the global default value will be used for all sites either from the 'DefaultWebUsbGuardSetting' policy if it is set, or the user's personal configuration otherwise.</p><p>URL patterns in this policy should not clash with the ones configured via WebUsbBlockedForUrls. If there is a clash, this policy will take precedence over WebUsbBlockedForUrls and WebUsbAskForUrls.</p><p>Values for this policy and the DeviceWebUsbAllowDevicesForUrls policy are merged together.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;devices&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;product_id&quot;: {
&quot;type&quot;: &quot;integer&quot;
},
&quot;vendor_id&quot;: {
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;urls&quot;: {
&quot;items&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;required&quot;: [
&quot;devices&quot;,
&quot;urls&quot;
],
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\WebUsbAllowDevicesForUrls = [
{
&quot;devices&quot;: [
{
&quot;product_id&quot;: 5678,
&quot;vendor_id&quot;: 1234
}
],
&quot;urls&quot;: [
&quot;https://google.com&quot;,
&quot;https://requesting.com,https://embedded.com&quot;
]
}
]</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\WebUsbAllowDevicesForUrls = [
{
&quot;devices&quot;: [
{
&quot;product_id&quot;: 5678,
&quot;vendor_id&quot;: 1234
}
],
&quot;urls&quot;: [
&quot;https://google.com&quot;,
&quot;https://requesting.com,https://embedded.com&quot;
]
}
]</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">WebUsbAllowDevicesForUrls: [
{
&quot;devices&quot;: [
{
&quot;product_id&quot;: 5678,
&quot;vendor_id&quot;: 1234
}
],
&quot;urls&quot;: [
&quot;https://google.com&quot;,
&quot;https://requesting.com,https://embedded.com&quot;
]
}
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;key&gt;WebUsbAllowDevicesForUrls&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;devices&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;product_id&lt;/key&gt;
&lt;integer&gt;5678&lt;/integer&gt;
&lt;key&gt;vendor_id&lt;/key&gt;
&lt;integer&gt;1234&lt;/integer&gt;
&lt;/dict&gt;
&lt;/array&gt;
&lt;key&gt;urls&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;https://google.com&lt;/string&gt;
&lt;string&gt;https://requesting.com,https://embedded.com&lt;/string&gt;
&lt;/array&gt;
&lt;/dict&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="WebUsbAskForUrls"/>WebUsbAskForUrls</h3><span>Allow WebUSB on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebUsbAskForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WebUsbAskForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebUsbAskForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">WebUsbAskForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 68</li><li>Chromium (Android) since version 68</li><li>Chromium (Linux, Mac, Windows) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are allowed to ask the user to grant them access to a USB device.</p><p>If this policy is left not set, the global default value will be used for all sites either from the 'DefaultWebUsbGuardSetting' policy if it is set, or the user's personal configuration otherwise.</p><p>URL patterns in this policy should not clash with ones configured via WebUsbBlockedForUrls. It is unspecified which of the two policies takes precedence if a URL matches with both.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\WebUsbAskForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\WebUsbAskForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\WebUsbAskForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\WebUsbAskForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="WebUsbBlockedForUrls"/>WebUsbBlockedForUrls</h3><span>Block WebUSB on these sites</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebUsbBlockedForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WebUsbBlockedForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebUsbBlockedForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">WebUsbBlockedForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 68</li><li>Chromium (Android) since version 68</li><li>Chromium (Linux, Mac, Windows) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of url patterns that specify sites which are prevented from asking the user to grant them access to a USB device.</p><p>If this policy is left not set, the global default value will be used for all sites either from the 'DefaultWebUsbGuardSetting' policy if it is set, or the user's personal configuration otherwise.</p><p>URL patterns in this policy should not clash with ones configured via WebUsbAskForUrls. It is unspecified which of the two policies takes precedence if a URL matches with both.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\WebUsbBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\WebUsbBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\WebUsbBlockedForUrls\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\WebUsbBlockedForUrls\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="DateAndTime"/>Date and time</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls clock and time zone settings.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SystemTimezone"/>SystemTimezone</h3><span>Timezone</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SystemTimezone</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 22</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the enforced timezone to be used for the device. When this policy is set, users on the device cannot override the specified timezone. If an invalid value is provided, the policy is still activated using &quot;GMT&quot; instead. If an empty string is provided, the policy is ignored.</p><p>If this policy is not used, the currently active time zone will remain in use; however, users can change the time zone.</p><p>New devices start with the time zone set to &quot;US/Pacific&quot;.</p><p>The format of the value follows the names of time zones in the &quot;IANA Time Zone Database&quot; (see &quot;<a href="https://en.wikipedia.org/wiki/Tz_database">https://en.wikipedia.org/wiki/Tz_database</a>&quot;). In particular, most time zones can be referred to by &quot;continent/large_city&quot; or &quot;ocean/large_city&quot;.</p><p>Setting this policy completely disables automatic time zone resolve by device location. It also overrides SystemTimezoneAutomaticDetection policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;America/Los_Angeles&quot;</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#DateAndTime">DateAndTime</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SystemTimezoneAutomaticDetection"/>SystemTimezoneAutomaticDetection</h3><span>Configure the automatic timezone detection method</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SystemTimezoneAutomaticDetection</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 53</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, automatic time zone detection flow will be in one of the following ways depending on the value of the setting:</p><p>If set to TimezoneAutomaticDetectionUsersDecide, users would be able to control automatic time zone detection using normal controls in chrome://settings.</p><p>If set to TimezoneAutomaticDetectionDisabled, automatic time zone controls in chrome://settings will be disabled. Automatic time zone detection will always be off.</p><p>If set to TimezoneAutomaticDetectionIPOnly, time zone controls in chrome://settings will be disabled. Automatic time zone detection will always be on. Time zone detection will use IP-only method to resolve location.</p><p>If set to TimezoneAutomaticDetectionSendWiFiAccessPoints, time zone controls in chrome://settings will be disabled. Automatic time zone detection will always be on. The list of visible Wi-Fi access points will always be sent to Geolocation API server for fine-grained time zone detection.</p><p>If set to TimezoneAutomaticDetectionSendAllLocationInfo, time zone controls in chrome://settings will be disabled. Automatic time zone detection will always be on. Location information (such as Wi-Fi access points, reachable mobile masts, GPS) will be sent to a server for fine-grained time zone detection.</p><p>If this policy is not set, it will behave as if TimezoneAutomaticDetectionUsersDecide is set.</p><p>If SystemTimezone policy is set, it overrides this policy. In this case automatic time zone detection is completely disabled.</p><ul><li>0 = Let users decide</li><li>1 = Never auto-detect timezone</li><li>2 = Always use coarse timezone detection</li><li>3 = Always send Wi-Fi access points to server while resolving timezone</li><li>4 = Always send any available location signals to the server while resolving time zone</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SystemUse24HourClock"/>SystemUse24HourClock</h3><span>Use 24 hour clock by default</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SystemUse24HourClock</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the clock format be used for the device.</p><p>This policy configures the clock format to use on the log-in screen and as a default for user sessions. Users can still override the clock format for their account.</p><p>If the policy is set to true, the device will use a 24-hour clock format. If the policy is set to false, the device will use a 12-hour clock format.</p><p>If this policy is not set, the device will default to a 24-hour clock format.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="DefaultSearchProvider"/>Default search provider</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configures the default search provider. You can specify the default search provider that the user will use or choose to disable default search.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderEnabled"/>DefaultSearchProviderEnabled</h3><span>Enable the default search provider</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables the use of a default search provider.</p><p>If you enable this setting, a default search is performed when the user types text in to the omnibox that is not a URL.</p><p>You can specify the default search provider to be used by setting the rest of the default search policies. If these are left empty, the user can choose the default provider.</p><p>If you disable this setting, no search is performed when the user enters non-URL text in to the omnibox.</p><p>If you enable or disable this setting, users cannot change or override this setting in Chromium.</p><p>If this policy is left not set, the default search provider is enabled, and the user will be able to set the search provider list.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#DefaultSearchProvider">DefaultSearchProvider</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderName"/>DefaultSearchProviderName</h3><span>Default search provider name</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderName</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderName</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderName</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderName</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the name of the default search provider. If left empty or not set, the host name specified by the search URL will be used.</p><p>This policy is only considered if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;My Intranet Search&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderKeyword"/>DefaultSearchProviderKeyword</h3><span>Default search provider keyword</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderKeyword</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderKeyword</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderKeyword</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderKeyword</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the keyword, which is the shortcut used in the omnibox to trigger the search for this provider.</p><p>This policy is optional. If not set, no keyword will activate the search provider.</p><p>This policy is only considered if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;mis&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderSearchURL"/>DefaultSearchProviderSearchURL</h3><span>Default search provider search URL</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderSearchURL</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderSearchURL</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSearchURL</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSearchURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the URL of the search engine used when doing a default search. The URL should contain the string '{searchTerms}', which will be replaced at query time by the terms the user is searching for.</p><p>Google's search URL can be specified as: '{google:baseURL}search?q={searchTerms}&amp;{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:searchClient}{google:sourceId}ie={inputEncoding}'.</p><p>This option must be set when the 'DefaultSearchProviderEnabled' policy is enabled and will only be respected if this is the case.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://search.my.company/search?q={searchTerms}&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderSuggestURL"/>DefaultSearchProviderSuggestURL</h3><span>Default search provider suggest URL</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderSuggestURL</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderSuggestURL</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSuggestURL</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSuggestURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the URL of the search engine used to provide search suggestions. The URL should contain the string '{searchTerms}', which will be replaced at query time by the text the user has entered so far.</p><p>This policy is optional. If not set, no suggest URL will be used.</p><p>Google's suggest URL can be specified as: '{google:baseURL}complete/search?output=chrome&amp;q={searchTerms}'.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://search.my.company/suggest?q={searchTerms}&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderIconURL"/>DefaultSearchProviderIconURL</h3><span>Default search provider icon</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderIconURL</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderIconURL</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderIconURL</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderIconURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the favourite icon URL of the default search provider.</p><p>This policy is optional. If not set, no icon will be present for the search provider.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://search.my.company/favicon.ico&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderEncodings"/>DefaultSearchProviderEncodings</h3><span>Default search provider encodings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderEncodings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderEncodings</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderEncodings</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderEncodings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the character encodings supported by the search provider. Encodings are code page names like UTF-8, GB2312, and ISO-8859-1. They are tried in the order provided.</p><p>This policy is optional. If not set, the default will be used which is UTF-8.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\DefaultSearchProviderEncodings\1 = &quot;UTF-8&quot;
Software\Policies\Chromium\DefaultSearchProviderEncodings\2 = &quot;UTF-16&quot;
Software\Policies\Chromium\DefaultSearchProviderEncodings\3 = &quot;GB2312&quot;
Software\Policies\Chromium\DefaultSearchProviderEncodings\4 = &quot;ISO-8859-1&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\1 = &quot;UTF-8&quot;
Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\2 = &quot;UTF-16&quot;
Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\3 = &quot;GB2312&quot;
Software\Policies\ChromiumOS\DefaultSearchProviderEncodings\4 = &quot;ISO-8859-1&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;UTF-8&quot;,
&quot;UTF-16&quot;,
&quot;GB2312&quot;,
&quot;ISO-8859-1&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;UTF-8&lt;/string&gt;
&lt;string&gt;UTF-16&lt;/string&gt;
&lt;string&gt;GB2312&lt;/string&gt;
&lt;string&gt;ISO-8859-1&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderAlternateURLs"/>DefaultSearchProviderAlternateURLs</h3><span>List of alternative URLs for the default search provider</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderAlternateURLs</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderAlternateURLs</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderAlternateURLs</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderAlternateURLs</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 24</li><li>Chromium OS (Chromium OS) since version 24</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies a list of alternative URLs that can be used to extract search terms from the search engine. The URLs should contain the string '{searchTerms}', which will be used to extract the search terms.</p><p>This policy is optional. If not set, no alternative urls will be used to extract search terms.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\DefaultSearchProviderAlternateURLs\1 = &quot;https://search.my.company/suggest#q={searchTerms}&quot;
Software\Policies\Chromium\DefaultSearchProviderAlternateURLs\2 = &quot;https://search.my.company/suggest/search#q={searchTerms}&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DefaultSearchProviderAlternateURLs\1 = &quot;https://search.my.company/suggest#q={searchTerms}&quot;
Software\Policies\ChromiumOS\DefaultSearchProviderAlternateURLs\2 = &quot;https://search.my.company/suggest/search#q={searchTerms}&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://search.my.company/suggest#q={searchTerms}&quot;,
&quot;https://search.my.company/suggest/search#q={searchTerms}&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://search.my.company/suggest#q={searchTerms}&lt;/string&gt;
&lt;string&gt;https://search.my.company/suggest/search#q={searchTerms}&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderImageURL"/>DefaultSearchProviderImageURL</h3><span>Parameter providing search-by-image feature for the default search provider</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderImageURL</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderImageURL</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderImageURL</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderImageURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 29</li><li>Chromium OS (Chromium OS) since version 29</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the URL of the search engine used to provide image search. Search requests will be sent using the GET method. If the DefaultSearchProviderImageURLPostParams policy is set then image search requests will use the POST method instead.</p><p>This policy is optional. If not set, no image search will be used.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://search.my.company/searchbyimage/upload&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderNewTabURL"/>DefaultSearchProviderNewTabURL</h3><span>Default search provider new tab page URL</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderNewTabURL</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderNewTabURL</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderNewTabURL</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderNewTabURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 30</li><li>Chromium OS (Chromium OS) since version 30</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the URL that a search engine uses to provide a new tab page.</p><p>This policy is optional. If not set, no new tab page will be provided.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://search.my.company/newtab&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderSearchURLPostParams"/>DefaultSearchProviderSearchURLPostParams</h3><span>Parameters for search URL which uses POST</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderSearchURLPostParams</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderSearchURLPostParams</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSearchURLPostParams</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSearchURLPostParams</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 29</li><li>Chromium OS (Chromium OS) since version 29</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the parameters used when searching a URL with POST. It consists of comma-separated name/value pairs. If a value is a template parameter, like {searchTerms} in above example, it will be replaced with real search terms data.</p><p>This policy is optional. If not set, search request will be sent using the GET method.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;q={searchTerms},ie=utf-8,oe=utf-8&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderSuggestURLPostParams"/>DefaultSearchProviderSuggestURLPostParams</h3><span>Parameters for suggest URL which uses POST</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderSuggestURLPostParams</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderSuggestURLPostParams</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSuggestURLPostParams</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderSuggestURLPostParams</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 29</li><li>Chromium OS (Chromium OS) since version 29</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the parameters used when doing suggestion search with POST. It consists of comma-separated name/value pairs. If a value is a template parameter, like {searchTerms} in above example, it will be replaced with real search terms data.</p><p>This policy is optional. If not set, suggest search request will be sent using the GET method.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;q={searchTerms},ie=utf-8,oe=utf-8&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultSearchProviderImageURLPostParams"/>DefaultSearchProviderImageURLPostParams</h3><span>Parameters for image URL which uses POST</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultSearchProviderImageURLPostParams</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultSearchProviderImageURLPostParams</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultSearchProviderImageURLPostParams</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DefaultSearchProviderImageURLPostParams</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 29</li><li>Chromium OS (Chromium OS) since version 29</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the parameters used when doing image search with POST. It consists of comma-separated name/value pairs. If a value is a template parameter, like {imageThumbnail} in above example, it will be replaced with real image thumbnail data.</p><p>This policy is optional. If not set, image search request will be sent using the GET method.</p><p>This policy is only respected if the 'DefaultSearchProviderEnabled' policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;content={imageThumbnail},url={imageURL},sbisrc={SearchSource}&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="DeviceUpdate"/>Device update settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls how and when Chrome OS updates are applied.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ChromeOsReleaseChannel"/>ChromeOsReleaseChannel</h3><span>Release channel</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ChromeOsReleaseChannel</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the release channel that this device should be locked to.</p><ul><li>&quot;stable-channel&quot; = Stable channel</li><li>&quot;beta-channel&quot; = Beta channel</li><li>&quot;dev-channel&quot; = Dev channel (may be unstable)</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;stable-channel&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ChromeOsReleaseChannelDelegated"/>ChromeOsReleaseChannelDelegated</h3><span>Users may configure the Chrome OS release channel</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ChromeOsReleaseChannelDelegated</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to True and the ChromeOsReleaseChannel policy is not specified then users of the enrolling domain will be allowed to change the release channel of the device. If this policy is set to false the device will be locked in whatever channel it was last set.</p><p>The user selected channel will be overridden by the ChromeOsReleaseChannel policy, but if the policy channel is more stable than the one that was installed on the device, then the channel will only switch after the version of the more stable channel reaches a higher version number than the one installed on the device.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAutoUpdateDisabled"/>DeviceAutoUpdateDisabled</h3><span>Disable Auto Update</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAutoUpdateDisabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables automatic updates when set to True.</p><p>Chromium OS devices automatically check for updates when this setting is not configured or set to False.</p><p>Warning: It is recommended to keep auto-updates enabled so that users receive software updates and critical security fixes. Turning off auto-updates might leave users at risk.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAutoUpdateP2PEnabled"/>DeviceAutoUpdateP2PEnabled</h3><span>Auto update p2p enabled</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAutoUpdateP2PEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 31</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether p2p is to be used for OS update payloads. If set to True, devices will share and attempt to consume update payloads on the LAN, potentially reducing Internet bandwidth usage and congestion. If the update payload is not available on the LAN, the device will fall back to downloading from an update server. If set to False or not configured, p2p will not be used.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAutoUpdateTimeRestrictions"/>DeviceAutoUpdateTimeRestrictions</h3><span>Update Time Restrictions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAutoUpdateTimeRestrictions</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the time frames during which the Chromium OS device is not allowed to check for updates automatically.
When this policy is set to a non-empty list of time intervals:
Devices will not be able to check for updates automatically during the specified time intervals. Devices that require a rollback or are below the minimum Chromium OS version will not be affected by this policy due to potential security issues. Furthermore, this policy will not block update checks requested by users or administrators.
When this policy is unset or contains no time intervals:
No automatic update checks will be blocked by this policy, but they may be blocked by other policies. This feature is only enabled on Chrome devices configured as auto-launch kiosks. Other devices will not be restricted by this policy.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;description&quot;: &quot;Time interval that spans at most one week. If the start time is later than the end time, then the interval will wrap around.&quot;,
&quot;properties&quot;: {
&quot;end&quot;: {
&quot;$ref&quot;: &quot;DisallowedTimeInterval&quot;,
&quot;description&quot;: &quot;End of the interval, exclusive.&quot;
},
&quot;start&quot;: {
&quot;description&quot;: &quot;Start time of the interval, inclusive.&quot;,
&quot;id&quot;: &quot;DisallowedTimeInterval&quot;,
&quot;properties&quot;: {
&quot;day_of_week&quot;: {
&quot;description&quot;: &quot;Day of the week for the interval.&quot;,
&quot;enum&quot;: [
&quot;Monday&quot;,
&quot;Tuesday&quot;,
&quot;Wednesday&quot;,
&quot;Thursday&quot;,
&quot;Friday&quot;,
&quot;Saturday&quot;,
&quot;Sunday&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;hours&quot;: {
&quot;description&quot;: &quot;Hours elapsed since the start of the day in (24 hour format).&quot;,
&quot;maximum&quot;: 23,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;minutes&quot;: {
&quot;description&quot;: &quot;Minutes elapsed in the current hour.&quot;,
&quot;maximum&quot;: 59,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;required&quot;: [
&quot;day_of_week&quot;,
&quot;minutes&quot;,
&quot;hours&quot;
],
&quot;type&quot;: &quot;object&quot;
}
},
&quot;required&quot;: [
&quot;start&quot;,
&quot;end&quot;
],
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceAutoUpdateTimeRestrictions = [
{
&quot;end&quot;: {
&quot;day_of_week&quot;: &quot;Thursday&quot;,
&quot;hours&quot;: 2,
&quot;minutes&quot;: 30
},
&quot;start&quot;: {
&quot;day_of_week&quot;: &quot;Monday&quot;,
&quot;hours&quot;: 3,
&quot;minutes&quot;: 50
}
},
{
&quot;end&quot;: {
&quot;day_of_week&quot;: &quot;Sunday&quot;,
&quot;hours&quot;: 15,
&quot;minutes&quot;: 10
},
&quot;start&quot;: {
&quot;day_of_week&quot;: &quot;Thursday&quot;,
&quot;hours&quot;: 3,
&quot;minutes&quot;: 30
}
}
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceTargetVersionPrefix"/>DeviceTargetVersionPrefix</h3><span>Target Auto-Update Version</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceTargetVersionPrefix</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Sets a target version for Auto Updates.</p><p>Specifies the prefix of a target version Chromium OS should update to. If the device is running a version that's before the specified prefix, it will update to the latest version with the given prefix. If the device is already on a later version, effects depend on the value of DeviceRollbackToTargetVersion. The prefix format works component-wise as is demonstrated in the following example:</p><p>&quot;&quot; (or not configured): update to latest version available.
&quot;1412.&quot;: update to any minor version of 1412 (e.g. 1412.24.34 or 1412.60.2)
&quot;1412.2.&quot;: update to any minor version of 1412.2 (e.g. 1412.2.34 or 1412.2.2)
&quot;1412.24.34&quot;: update to this specific version only</p><p>Warning: It is not recommended to configure version restrictions as they may prevent users from receiving software updates and critical security fixes. Restricting updates to a specific version prefix might leave users at risk.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;1412.&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUpdateStagingSchedule"/>DeviceUpdateStagingSchedule</h3><span>The staging schedule for applying a new update</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUpdateStagingSchedule</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy defines a list of percentages that will define the fraction of Chromium OS devices in the OU to update per day starting from the day that the update is first discovered. The discovery time is later than the update published time, since it could be a while after the update publishing until the device checks for updates.</p><p>Each (day, percentage) pair contains which percentage of the fleet has to be updated by the given number of days since the update has been discovered. For example, if we have the pairs [(4, 40), (10, 70), (15, 100)], then 40% of the fleet should have been updated 4 days after seeing the update. 70% should be updated after 10 days, and so on.</p><p>If there is a value defined for this policy, updates will ignore the DeviceUpdateScatterFactor policy and follow this policy instead.</p><p>If this list is empty, there will be no staging, and updates will be applied according to other device policies.</p><p>This policy does not apply for channel switches.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;description&quot;: &quot;Contains the number of days and the percentage of the fleet that should be updated after those days have passed.&quot;,
&quot;id&quot;: &quot;DayPercentagePair&quot;,
&quot;properties&quot;: {
&quot;days&quot;: {
&quot;description&quot;: &quot;Days from update discovery.&quot;,
&quot;maximum&quot;: 28,
&quot;minimum&quot;: 1,
&quot;type&quot;: &quot;integer&quot;
},
&quot;percentage&quot;: {
&quot;description&quot;: &quot;Percentage of the fleet that should be updated after the given days.&quot;,
&quot;maximum&quot;: 100,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceUpdateStagingSchedule = [
{
&quot;days&quot;: 7,
&quot;percentage&quot;: 50
},
{
&quot;days&quot;: 10,
&quot;percentage&quot;: 100
}
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUpdateScatterFactor"/>DeviceUpdateScatterFactor</h3><span>Auto update scatter factor</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUpdateScatterFactor</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 20</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the number of seconds up to which a device may randomly delay its download of an update from the time the update was first pushed out to the server. The device may wait a portion of this time in terms of wall-clock-time and the remaining portion in terms of the number of update checks. In any case, the scatter is upper bounded to a constant amount of time so that a device does not ever get stuck waiting to download an update forever.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00001c20 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUpdateAllowedConnectionTypes"/>DeviceUpdateAllowedConnectionTypes</h3><span>Connection types allowed for updates</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUpdateAllowedConnectionTypes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 21</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>The types of connections that are allowed to use for OS updates. OS updates potentially put heavy strain on the connection due to their size and may incur additional cost. Therefore, they are by default not enabled for connection types that are considered expensive, which include WiMax, Bluetooth and Cellular at the moment.</p><p> The recognised connection type identifiers are &quot;ethernet&quot;, &quot;wifi&quot;, &quot;wimax&quot;, &quot;bluetooth&quot; and &quot;cellular&quot;.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceUpdateAllowedConnectionTypes\1 = &quot;ethernet&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUpdateHttpDownloadsEnabled"/>DeviceUpdateHttpDownloadsEnabled</h3><span>Allow autoupdate downloads via HTTP</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUpdateHttpDownloadsEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Auto-update payloads on Chromium OS can be downloaded via HTTP instead of HTTPS. This allows transparent HTTP caching of HTTP downloads.</p><p>If this policy is set to true, Chromium OS will attempt to download auto-update payloads via HTTP. If the policy is set to false or not set, HTTPS will be used for downloading auto-update payloads.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RebootAfterUpdate"/>RebootAfterUpdate</h3><span>Automatically reboot after update</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RebootAfterUpdate</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Schedule an automatic reboot after a Chromium OS update has been applied.</p><p>When this policy is set to true, an automatic reboot is scheduled when a Chromium OS update has been applied and a reboot is required to complete the update process. The reboot is scheduled immediately but may be delayed on the device by up to 24 hours if a user is currently using the device.</p><p>When this policy is set to false, no automatic reboot is scheduled after applying a Chromium OS update. The update process is completed when the user next reboots the device.</p><p>If you set this policy, users cannot change or override it.</p><p>Note: Currently, automatic reboots are only enabled while the login screen is being shown or a Kiosk app session is in progress. This will change in the future and the policy will always apply, regardless of whether a session of any particular type is in progress or not.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="MinimumRequiredChromeVersion"/>MinimumRequiredChromeVersion</h3><span>Configure minimum allowed Chrome version for the device.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\MinimumRequiredChromeVersion</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 64</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the requirement of the minimum allowed version of Chromium. Versions below given are treated as obsolete and device would not allow user to sign in before OS is updated.
If current version becomes obsolete during user session, user will be forcefully signed out.</p><p>If this policy is not set, no restrictions are applied, and user can sign in regardless of Chromium version.</p><p>Here 'Version' can be either an exact version such as '61.0.3163.120' or a version prefix, such as '61.0'</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;61.0.3163.120&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceRollbackToTargetVersion"/>DeviceRollbackToTargetVersion</h3><span>Roll back to target version</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceRollbackToTargetVersion</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether the device should roll back to the version set by DeviceTargetVersionPrefix if it's already running a later version.</p><p>Default is RollbackDisabled.</p><ul><li>1 = Do not roll back to target version if OS version is newer than target. Updates are also disabled.</li><li>2 = Roll back and stay on target version if OS version is newer than target. Do a powerwash during the process.</li><li>3 = Roll back and stay on target version if OS version is newer than target. Try to carry over device-level configuration (including network credentials) through the rollback process, if possible, but do the rollback with full powerwash even if restoring the data is not possible (because the target version doesn't support restoring data or because of a backward-incompatible change).
Supported on Chromium OS version 75 and higher. For older clients, this value means that rollback is disabled.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceRollbackAllowedMilestones"/>DeviceRollbackAllowedMilestones</h3><span>Number of milestones roll-back is allowed</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceRollbackAllowedMilestones</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the minimum number of Chromium OS milestones roll back should be allowed starting from the stable version at any time.</p><p>Default is zero for consumer, four (approx. half a year) for enterprise-enrolled devices.</p><p>Setting this policy prevents roll back protection to apply for at least this number of milestones.</p><p>Setting this policy to a lower value has a permanent effect: the device MAY not be able to roll back to earlier versions even after the policy is reset to a larger value.</p><p>Actual roll back possibilities may also depend on the board and critical vulnerability patches.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:0</li><li>Maximum:4</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000004 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceQuickFixBuildToken"/>DeviceQuickFixBuildToken</h3><span>Provide users with Quick Fix Build</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceQuickFixBuildToken</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether or not the device should be updated to a Quick Fix Build.</p><p>If policy value is set to a token that maps to a Quick Fix Build, the device will be updated to the corresponding Quick Fix Build if the update is not blocked by another policy.</p><p>If this policy is not set, or if its value does not map to a Quick Fix Build, then the device won't be updated to a Quick Fix Build. If the device is already running a Quick Fix Build and the policy is not set anymore or its value does not map to a Quick Fix Build anymore, then the device will be updated to a regular build if the update is not blocked by another policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;sometoken&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Display"/>Display</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls display settings.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceDisplayResolution"/>DeviceDisplayResolution</h3><span>Set display resolution and scale factor</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceDisplayResolution</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, resolution and scale factor of each
display are set to the specified values. External display settings are
applied to all connected external displays.</p><p>Values of 'external_width' and 'external_height' should be specified in
pixels. Values of 'external_scale_percentage' and
'internal_scale_percentage' should be specified in per cents.</p><p>If 'external_use_native' is set to true, policy will ignore values of
'external_height' and 'external_width' and set resolution of the external
displays to their native resolution.</p><p>If 'external_use_native' is false or not provided and either
'external_height' or 'external_width' is not provided, policy doesn't
affect the external display settings. If specified resolution or
scale factor is not supported by some display, policy is not applied to
that display.</p><p>If 'recommended' flag is set to true, users may change resolution and
scale factor of any display via the settings page after logging in, but
their settings will be overridden by the policy value at the next reboot.
If 'recommended' flag is set to false or not set, users can't change the
display settings.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;external_height&quot;: {
&quot;minimum&quot;: 1,
&quot;type&quot;: &quot;integer&quot;
},
&quot;external_scale_percentage&quot;: {
&quot;minimum&quot;: 1,
&quot;type&quot;: &quot;integer&quot;
},
&quot;external_use_native&quot;: {
&quot;type&quot;: &quot;boolean&quot;
},
&quot;external_width&quot;: {
&quot;minimum&quot;: 1,
&quot;type&quot;: &quot;integer&quot;
},
&quot;internal_scale_percentage&quot;: {
&quot;minimum&quot;: 1,
&quot;type&quot;: &quot;integer&quot;
},
&quot;recommended&quot;: {
&quot;type&quot;: &quot;boolean&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceDisplayResolution = {
&quot;external_height&quot;: 1080,
&quot;external_scale_percentage&quot;: 100,
&quot;external_use_native&quot;: false,
&quot;external_width&quot;: 1920,
&quot;internal_scale_percentage&quot;: 150,
&quot;recommended&quot;: true
}</dd></dl></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Display">Display</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DisplayRotationDefault"/>DisplayRotationDefault</h3><span>Set default display rotation, reapplied on every reboot</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisplayRotationDefault</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 48</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set, each display is rotated to the
specified orientation on every reboot and the first time that it is connected
after the policy value has changed. Users may change the display
rotation via the settings page after logging in, but their
setting will be overridden by the policy value at the next reboot.</p><p>This policy applies to both the primary and all secondary displays.</p><p>If the policy is not set, the default value is 0 degrees and the user is
free to change it. In this case, the default value is not reapplied at
restart.</p><ul><li>0 = Rotate screen by 0 degrees</li><li>1 = Rotate screen clockwise by 90 degrees</li><li>2 = Rotate screen by 180 degrees</li><li>3 = Rotate screen clockwise by 270 degrees</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Extensions"/>Extensions</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configures extension-related policies. The user is not allowed to install blacklisted extensions unless they are whitelisted. You can also force Chromium to automatically install extensions by specifying them in ExtensionInstallForcelist. Force-installed extensions are installed regardless of whether they are present in the blacklist.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionInstallBlacklist"/>ExtensionInstallBlacklist</h3><span>Configure extension installation blacklist</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionInstallBlacklist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionInstallBlacklist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionInstallBlacklist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify which extensions the users can NOT install. Extensions already installed will be disabled if blacklisted, without a way for the user to enable them. Once a disabled, blacklisted extension is removed, it will automatically get re-enabled.</p><p>A blacklist value of '*' means all extensions are blacklisted unless they are explicitly listed in the whitelist.</p><p>If this policy is left 'not set' the user can install any extension in Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ExtensionInstallBlacklist\1 = &quot;extension_id1&quot;
Software\Policies\Chromium\ExtensionInstallBlacklist\2 = &quot;extension_id2&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ExtensionInstallBlacklist\1 = &quot;extension_id1&quot;
Software\Policies\ChromiumOS\ExtensionInstallBlacklist\2 = &quot;extension_id2&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;extension_id1&quot;,
&quot;extension_id2&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;extension_id1&lt;/string&gt;
&lt;string&gt;extension_id2&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Extensions">Extensions</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionInstallWhitelist"/>ExtensionInstallWhitelist</h3><span>Configure extension installation whitelist</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionInstallWhitelist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionInstallWhitelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionInstallWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify which extensions are not subject to the blacklist.</p><p>A blacklist value of * means all extensions are blacklisted and users can only install extensions listed in the whitelist.</p><p>By default, all extensions are whitelisted, but if all extensions have been blacklisted by policy, the whitelist can be used to override that policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ExtensionInstallWhitelist\1 = &quot;extension_id1&quot;
Software\Policies\Chromium\ExtensionInstallWhitelist\2 = &quot;extension_id2&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ExtensionInstallWhitelist\1 = &quot;extension_id1&quot;
Software\Policies\ChromiumOS\ExtensionInstallWhitelist\2 = &quot;extension_id2&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;extension_id1&quot;,
&quot;extension_id2&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;extension_id1&lt;/string&gt;
&lt;string&gt;extension_id2&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionInstallForcelist"/>ExtensionInstallForcelist</h3><span>Configure the list of force-installed apps and extensions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionInstallForcelist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionInstallForcelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionInstallForcelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies a list of apps and extensions that are installed silently,
without user interaction, and which cannot be uninstalled nor
disabled by the user. All permissions requested by the
apps/extensions are granted implicitly, without user interaction,
including any additional permissions requested by future versions of
the app/extension. Furthermore, permissions are granted for the
enterprise.deviceAttributes and enterprise.platformKeys extension
APIs. (These two APIs are not available to apps/extensions that are
not force-installed.)</p><p>This policy takes precedence over a potentially conflicting ExtensionInstallBlacklist policy. If an app or extension that previously had been force-installed is removed from this list, it is automatically uninstalled by Chromium.</p><p>For Windows, instances that are not joined to a Microsoft® Active Directory® domain, forced installation is limited to apps and extensions listed in the Chrome Web Store.</p><p>Note that the source code of any extension may be altered by users via Developer Tools (potentially rendering the extension dysfunctional). If this is a concern, the DeveloperToolsDisabled policy should be set.</p><p>Each list item of the policy is a string that contains an extension ID and, optionally, an 'update' URL separated by a semicolon (;). The extension ID is the 32-letter string found e.g. on chrome://extensions when in developer mode. The 'update' URL, if specified, should point to an Update Manifest XML document as described at <a href="https://developer.chrome.com/extensions/autoupdate">https://developer.chrome.com/extensions/autoupdate</a>. By default, the Chrome Web Store's update URL is used (which currently is &quot;<a href="https://clients2.google.com/service/update2/crx">https://clients2.google.com/service/update2/crx</a>&quot;). Note that the 'update' URL set in this policy is only used for the initial installation; subsequent updates of the extension employ the update URL indicated in the extension's manifest. Note: Specifying the 'update' URL explicitly was mandatory in Chromium versions up to and including 67.</p><p>For example, aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;<a href="https://clients2.google.com/service/update2/crx">https://clients2.google.com/service/update2/crx</a> installs the extension with ID aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa from the standard Chrome Web Store 'update' URL. For more information about hosting extensions, see: <a href="https://developer.chrome.com/extensions/hosting">https://developer.chrome.com/extensions/hosting</a>.</p><p>If this policy is left not set, no apps or extensions are installed automatically and the user can uninstall any app or extension in Chromium.</p><p>Note that this policy doesn't apply to incognito mode.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Android apps can be force-installed from the Google Admin console using Google Play. They do not use this policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ExtensionInstallForcelist\1 = &quot;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx&quot;
Software\Policies\Chromium\ExtensionInstallForcelist\2 = &quot;abcdefghijklmnopabcdefghijklmnop&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ExtensionInstallForcelist\1 = &quot;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx&quot;
Software\Policies\ChromiumOS\ExtensionInstallForcelist\2 = &quot;abcdefghijklmnopabcdefghijklmnop&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx&quot;,
&quot;abcdefghijklmnopabcdefghijklmnop&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa;https://clients2.google.com/service/update2/crx&lt;/string&gt;
&lt;string&gt;abcdefghijklmnopabcdefghijklmnop&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionInstallSources"/>ExtensionInstallSources</h3><span>Configure extension, app, and user script install sources</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionInstallSources</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionInstallSources</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionInstallSources</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 21</li><li>Chromium OS (Chromium OS) since version 21</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify which URLs are allowed to install extensions, apps and themes.</p><p>Starting in Chromium 21, it is more difficult to install extensions, apps and user scripts from outside the Chrome Web Store. Previously, users could click on a link to a *.crx file, and Chromium would offer to install the file after a few warnings. After Chromium 21, such files must be downloaded and dragged onto the Chromium settings page. This setting allows specific URLs to have the old, easier installation flow.</p><p>Each item in this list is an extension-style match pattern (see <a href="https://developer.chrome.com/extensions/match_patterns">https://developer.chrome.com/extensions/match_patterns</a>). Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.crx file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns.</p><p>ExtensionInstallBlacklist takes precedence over this policy. That is, an extension on the blacklist won't be installed, even if it happens from a site on this list.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ExtensionInstallSources\1 = &quot;https://corp.mycompany.com/*&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ExtensionInstallSources\1 = &quot;https://corp.mycompany.com/*&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://corp.mycompany.com/*&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://corp.mycompany.com/*&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionAllowedTypes"/>ExtensionAllowedTypes</h3><span>Configure allowed app/extension types</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionAllowedTypes</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionAllowedTypes</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionAllowedTypes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 25</li><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls which app/extension types are allowed to be installed and limits runtime access.</p><p>This setting white-lists the allowed types of extension/apps that can be installed in Chromium and which hosts they can interact with. The value is a list of strings, each of which should be one of the following: 'extension', 'theme', 'user_script', 'hosted_app', 'legacy_packaged_app', 'platform_app'. See the Chromium extensions documentation for more information on these types.</p><p>Note that this policy also affects extensions and apps to be force-installed via ExtensionInstallForcelist.</p><p>If this setting is configured, extensions/apps which have a type that is not on the list will not be installed.</p><p>If this setting is left unconfigured, no restrictions on the acceptable extension/app types are enforced.</p><p>Prior to version 75 using multiple comma-separated extension IDs is not supported and will be skipped. The rest of the policy will continue to apply.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ExtensionAllowedTypes\1 = &quot;hosted_app&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ExtensionAllowedTypes\1 = &quot;hosted_app&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;hosted_app&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;hosted_app&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionAllowInsecureUpdates"/>ExtensionAllowInsecureUpdates</h3><span>Allow insecure algorithms in integrity checks on extension updates and installations</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionAllowInsecureUpdates</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionAllowInsecureUpdates</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionAllowInsecureUpdates</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 73</li><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Chromium provides for the secure update and installation of extensions. However, the content of some extensions hosted outside of the Chrome Web Store may only be protected by insecure signing or hashing algorithms such as SHA1. When this policy is disabled, fresh installation of and updates to such extensions will not be permitted by Chrome (until the extension developers rebuild the extension with stronger algorithms). When this policy is enabled, installation and updates for such extensions will be permitted.</p><p>This will default to the enabled behaviour when unset.
Starting in Chromium 75, this will default to the disabled behaviour when unset.</p><p>Starting in Chromium 77, this policy will be ignored and treated as disabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionSettings"/>ExtensionSettings</h3><span>Extension management settings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ExtensionSettings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExtensionSettings</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ExtensionSettings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 62</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures extension management settings for Chromium.</p><p>This policy controls multiple settings, including settings controlled by any existing extension-related policies. This policy will override any legacy policies if both are set.</p><p>This policy maps an extension ID or an update URL to its configuration. With an extension ID, configuration will be applied to the specified extension only. A default configuration can be set for the special ID &quot;*&quot;, which will apply to all extensions that don't have a custom configuration set in this policy. With an update URL, configuration will be applied to all extensions with the exact update URL stated in manifest of this extension, as described at <a href="https://developer.chrome.com/extensions/autoupdate">https://developer.chrome.com/extensions/autoupdate</a>.</p><p>For Windows instances that are not joined to a Microsoft® Active Directory® domain, forced installation is limited to apps and extensions listed in the Chrome Web Store.
</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;patternProperties&quot;: {
&quot;^[a-p]{32}(?:,[a-p]{32})*,?$&quot;: {
&quot;properties&quot;: {
&quot;allowed_permissions&quot;: {
&quot;$ref&quot;: &quot;ListOfPermissions&quot;
},
&quot;blocked_install_message&quot;: {
&quot;description&quot;: &quot;text that will be displayed to the user in the chrome webstore if installation is blocked.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;blocked_permissions&quot;: {
&quot;id&quot;: &quot;ListOfPermissions&quot;,
&quot;items&quot;: {
&quot;pattern&quot;: &quot;^[a-z][a-zA-Z.]*$&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;installation_mode&quot;: {
&quot;enum&quot;: [
&quot;blocked&quot;,
&quot;allowed&quot;,
&quot;force_installed&quot;,
&quot;normal_installed&quot;,
&quot;removed&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;minimum_version_required&quot;: {
&quot;pattern&quot;: &quot;^[0-9]+([.][0-9]+)*$&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;runtime_allowed_hosts&quot;: {
&quot;$ref&quot;: &quot;ListOfUrlPatterns&quot;
},
&quot;runtime_blocked_hosts&quot;: {
&quot;id&quot;: &quot;ListOfUrlPatterns&quot;,
&quot;items&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;update_url&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;^update_url:&quot;: {
&quot;properties&quot;: {
&quot;allowed_permissions&quot;: {
&quot;$ref&quot;: &quot;ListOfPermissions&quot;
},
&quot;blocked_permissions&quot;: {
&quot;$ref&quot;: &quot;ListOfPermissions&quot;
},
&quot;installation_mode&quot;: {
&quot;enum&quot;: [
&quot;blocked&quot;,
&quot;allowed&quot;,
&quot;removed&quot;
],
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}
},
&quot;properties&quot;: {
&quot;*&quot;: {
&quot;properties&quot;: {
&quot;allowed_types&quot;: {
&quot;$ref&quot;: &quot;ExtensionAllowedTypes&quot;
},
&quot;blocked_install_message&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;blocked_permissions&quot;: {
&quot;$ref&quot;: &quot;ListOfPermissions&quot;
},
&quot;install_sources&quot;: {
&quot;$ref&quot;: &quot;ExtensionInstallSources&quot;
},
&quot;installation_mode&quot;: {
&quot;enum&quot;: [
&quot;blocked&quot;,
&quot;allowed&quot;,
&quot;removed&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;runtime_allowed_hosts&quot;: {
&quot;$ref&quot;: &quot;ListOfUrlPatterns&quot;
},
&quot;runtime_blocked_hosts&quot;: {
&quot;$ref&quot;: &quot;ListOfUrlPatterns&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Expanded schema description:</dt><dd><a href="https://www.chromium.org/administrators/policy-list-3/extension-settings-full">https://www.chromium.org/administrators/policy-list-3/extension-settings-full</a></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ExtensionSettings = {
&quot;*&quot;: {
&quot;allowed_types&quot;: [
&quot;hosted_app&quot;
],
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;blocked_permissions&quot;: [
&quot;downloads&quot;,
&quot;bookmarks&quot;
],
&quot;install_sources&quot;: [
&quot;https://company-intranet/chromeapps&quot;
],
&quot;installation_mode&quot;: &quot;blocked&quot;,
&quot;runtime_allowed_hosts&quot;: [
&quot;*://good.example.com&quot;
],
&quot;runtime_blocked_hosts&quot;: [
&quot;*://*.example.com&quot;
]
},
&quot;abcdefghijklmnopabcdefghijklmnop&quot;: {
&quot;blocked_permissions&quot;: [
&quot;history&quot;
],
&quot;installation_mode&quot;: &quot;allowed&quot;,
&quot;minimum_version_required&quot;: &quot;1.0.1&quot;
},
&quot;bcdefghijklmnopabcdefghijklmnopa&quot;: {
&quot;allowed_permissions&quot;: [
&quot;downloads&quot;
],
&quot;installation_mode&quot;: &quot;force_installed&quot;,
&quot;runtime_allowed_hosts&quot;: [
&quot;*://good.example.com&quot;
],
&quot;runtime_blocked_hosts&quot;: [
&quot;*://*.example.com&quot;
],
&quot;update_url&quot;: &quot;https://example.com/update_url&quot;
},
&quot;cdefghijklmnopabcdefghijklmnopab&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;installation_mode&quot;: &quot;blocked&quot;
},
&quot;defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;installation_mode&quot;: &quot;blocked&quot;
},
&quot;fghijklmnopabcdefghijklmnopabcde&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom removal message.&quot;,
&quot;installation_mode&quot;: &quot;removed&quot;
},
&quot;update_url:https://www.example.com/update.xml&quot;: {
&quot;allowed_permissions&quot;: [
&quot;downloads&quot;
],
&quot;blocked_permissions&quot;: [
&quot;wallpaper&quot;
],
&quot;installation_mode&quot;: &quot;allowed&quot;
}
}</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ExtensionSettings = {
&quot;*&quot;: {
&quot;allowed_types&quot;: [
&quot;hosted_app&quot;
],
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;blocked_permissions&quot;: [
&quot;downloads&quot;,
&quot;bookmarks&quot;
],
&quot;install_sources&quot;: [
&quot;https://company-intranet/chromeapps&quot;
],
&quot;installation_mode&quot;: &quot;blocked&quot;,
&quot;runtime_allowed_hosts&quot;: [
&quot;*://good.example.com&quot;
],
&quot;runtime_blocked_hosts&quot;: [
&quot;*://*.example.com&quot;
]
},
&quot;abcdefghijklmnopabcdefghijklmnop&quot;: {
&quot;blocked_permissions&quot;: [
&quot;history&quot;
],
&quot;installation_mode&quot;: &quot;allowed&quot;,
&quot;minimum_version_required&quot;: &quot;1.0.1&quot;
},
&quot;bcdefghijklmnopabcdefghijklmnopa&quot;: {
&quot;allowed_permissions&quot;: [
&quot;downloads&quot;
],
&quot;installation_mode&quot;: &quot;force_installed&quot;,
&quot;runtime_allowed_hosts&quot;: [
&quot;*://good.example.com&quot;
],
&quot;runtime_blocked_hosts&quot;: [
&quot;*://*.example.com&quot;
],
&quot;update_url&quot;: &quot;https://example.com/update_url&quot;
},
&quot;cdefghijklmnopabcdefghijklmnopab&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;installation_mode&quot;: &quot;blocked&quot;
},
&quot;defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;installation_mode&quot;: &quot;blocked&quot;
},
&quot;fghijklmnopabcdefghijklmnopabcde&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom removal message.&quot;,
&quot;installation_mode&quot;: &quot;removed&quot;
},
&quot;update_url:https://www.example.com/update.xml&quot;: {
&quot;allowed_permissions&quot;: [
&quot;downloads&quot;
],
&quot;blocked_permissions&quot;: [
&quot;wallpaper&quot;
],
&quot;installation_mode&quot;: &quot;allowed&quot;
}
}</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">ExtensionSettings: {
&quot;*&quot;: {
&quot;allowed_types&quot;: [
&quot;hosted_app&quot;
],
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;blocked_permissions&quot;: [
&quot;downloads&quot;,
&quot;bookmarks&quot;
],
&quot;install_sources&quot;: [
&quot;https://company-intranet/chromeapps&quot;
],
&quot;installation_mode&quot;: &quot;blocked&quot;,
&quot;runtime_allowed_hosts&quot;: [
&quot;*://good.example.com&quot;
],
&quot;runtime_blocked_hosts&quot;: [
&quot;*://*.example.com&quot;
]
},
&quot;abcdefghijklmnopabcdefghijklmnop&quot;: {
&quot;blocked_permissions&quot;: [
&quot;history&quot;
],
&quot;installation_mode&quot;: &quot;allowed&quot;,
&quot;minimum_version_required&quot;: &quot;1.0.1&quot;
},
&quot;bcdefghijklmnopabcdefghijklmnopa&quot;: {
&quot;allowed_permissions&quot;: [
&quot;downloads&quot;
],
&quot;installation_mode&quot;: &quot;force_installed&quot;,
&quot;runtime_allowed_hosts&quot;: [
&quot;*://good.example.com&quot;
],
&quot;runtime_blocked_hosts&quot;: [
&quot;*://*.example.com&quot;
],
&quot;update_url&quot;: &quot;https://example.com/update_url&quot;
},
&quot;cdefghijklmnopabcdefghijklmnopab&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;installation_mode&quot;: &quot;blocked&quot;
},
&quot;defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom error message.&quot;,
&quot;installation_mode&quot;: &quot;blocked&quot;
},
&quot;fghijklmnopabcdefghijklmnopabcde&quot;: {
&quot;blocked_install_message&quot;: &quot;Custom removal message.&quot;,
&quot;installation_mode&quot;: &quot;removed&quot;
},
&quot;update_url:https://www.example.com/update.xml&quot;: {
&quot;allowed_permissions&quot;: [
&quot;downloads&quot;
],
&quot;blocked_permissions&quot;: [
&quot;wallpaper&quot;
],
&quot;installation_mode&quot;: &quot;allowed&quot;
}
}</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;key&gt;ExtensionSettings&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;*&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;allowed_types&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;hosted_app&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;blocked_install_message&lt;/key&gt;
&lt;string&gt;Custom error message.&lt;/string&gt;
&lt;key&gt;blocked_permissions&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;downloads&lt;/string&gt;
&lt;string&gt;bookmarks&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;install_sources&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;https://company-intranet/chromeapps&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;blocked&lt;/string&gt;
&lt;key&gt;runtime_allowed_hosts&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;*://good.example.com&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;runtime_blocked_hosts&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;*://*.example.com&lt;/string&gt;
&lt;/array&gt;
&lt;/dict&gt;
&lt;key&gt;abcdefghijklmnopabcdefghijklmnop&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;blocked_permissions&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;history&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;allowed&lt;/string&gt;
&lt;key&gt;minimum_version_required&lt;/key&gt;
&lt;string&gt;1.0.1&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;bcdefghijklmnopabcdefghijklmnopa&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;allowed_permissions&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;downloads&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;force_installed&lt;/string&gt;
&lt;key&gt;runtime_allowed_hosts&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;*://good.example.com&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;runtime_blocked_hosts&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;*://*.example.com&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;update_url&lt;/key&gt;
&lt;string&gt;https://example.com/update_url&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;cdefghijklmnopabcdefghijklmnopab&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;blocked_install_message&lt;/key&gt;
&lt;string&gt;Custom error message.&lt;/string&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;blocked&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;defghijklmnopabcdefghijklmnopabc,efghijklmnopabcdefghijklmnopabcd&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;blocked_install_message&lt;/key&gt;
&lt;string&gt;Custom error message.&lt;/string&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;blocked&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;fghijklmnopabcdefghijklmnopabcde&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;blocked_install_message&lt;/key&gt;
&lt;string&gt;Custom removal message.&lt;/string&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;removed&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;update_url:https://www.example.com/update.xml&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;allowed_permissions&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;downloads&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;blocked_permissions&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;wallpaper&lt;/string&gt;
&lt;/array&gt;
&lt;key&gt;installation_mode&lt;/key&gt;
&lt;string&gt;allowed&lt;/string&gt;
&lt;/dict&gt;
&lt;/dict&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="GoogleAssistant"/>Google Assistant</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls settings for Google Assistant.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="VoiceInteractionContextEnabled"/>VoiceInteractionContextEnabled</h3><span>&quot;Allow Google Assistant to access screen context&quot;</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VoiceInteractionContextEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy gives Google Assistant permission to access screen context and send the info to server.
If the policy is enabled, Google Assistant will be allowed to access screen context.
If the policy is disabled, Google Assistant will not be allowed to access screen context.
If not set, users can decide whether to allow Google Assistant to access screen context or not</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="VoiceInteractionHotwordEnabled"/>VoiceInteractionHotwordEnabled</h3><span>Allow Google Assistant to listen for the voice activation phrase</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VoiceInteractionHotwordEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy gives Google Assistant permission to listen for the voice activation phrase.</p><p>If the policy is enabled, Google Assistant would listen for the voice activation phrase.
If the policy is disabled, Google Assistant would not listen for the voice activation phrase.
If the policy is not set, users can decide whether to allow Google Assistant to listen for the voice activation phrase.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="GoogleCast"/>Google Cast</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure policies for Google Cast, a feature that allows users to send the contents of tabs, sites or the desktop from the browser to remote displays and sound systems.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="EnableMediaRouter"/>EnableMediaRouter</h3><span>Enable Google Cast</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EnableMediaRouter</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnableMediaRouter</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EnableMediaRouter</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">EnableMediaRouter</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 52</li><li>Chromium OS (Chromium OS) since version 52</li><li>Chromium (Android) since version 52</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or is not set, Google Cast will be enabled, and users will be able to launch it from the app menu, page context menus, media controls on Cast-enabled websites and (if shown), the cast toolbar icon.</p><p>If this policy set to false, Google Cast will be disabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ShowCastIconInToolbar"/>ShowCastIconInToolbar</h3><span>Show the Google Cast toolbar icon</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ShowCastIconInToolbar</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ShowCastIconInToolbar</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ShowCastIconInToolbar</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 58</li><li>Chromium OS (Chromium OS) since version 58</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true, the Cast toolbar icon will always be shown on the toolbar or the overflow menu and users will not be able to remove it.</p><p>If this policy is set to false or is not set, users will be able to pin or remove the icon via its contextual menu.</p><p>If the policy &quot;EnableMediaRouter&quot; is set to false, then this policy's value would have no effect and the toolbar icon would not be shown.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Drive"/>Google Drive</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure Google Drive in Chromium OS.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DriveDisabled"/>DriveDisabled</h3><span>Disable Drive in the Chromium OS Files app</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DriveDisabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables Google Drive syncing in the Chromium OS Files app when set to True. In that case, no data is uploaded to Google Drive.</p><p>If not set or set to False, then users will be able to transfer files to Google Drive.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy does not prevent the user from using the Android Google Drive app. If you want to prevent access to Google Drive, you should disallow installation of the Android Google Drive app as well.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Drive">Drive</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DriveDisabledOverCellular"/>DriveDisabledOverCellular</h3><span>Disable Google Drive over mobile connections in the Chromium OS Files app</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DriveDisabledOverCellular</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables Google Drive syncing in the Chromium OS Files app when using a mobile connection when set to True. In that case, data is only synced to Google Drive when connected via Wi-Fi or Ethernet.</p><p>If not set or set to False, then users will be able to transfer files to Google Drive via mobile connections.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the Android Google Drive app. If you want to prevent use of Google Drive over mobile connections, you should disallow installation of the Android Google Drive app.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="HTTPAuthentication"/>HTTP authentication</h2><div style="margin-top: 20px; margin-bottom: 20px;">Policies related to integrated HTTP authentication.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AuthSchemes"/>AuthSchemes</h3><span>Supported authentication schemes</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AuthSchemes</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AuthSchemes</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AuthSchemes</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AuthSchemes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium (Android) since version 46</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies which HTTP authentication schemes are supported by Chromium.</p><p>Possible values are 'basic', 'digest', 'ntlm' and 'negotiate'. Separate multiple values with commas.</p><p>If this policy is left unset, all four schemes will be used.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;basic,digest,ntlm,negotiate&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DisableAuthNegotiateCnameLookup"/>DisableAuthNegotiateCnameLookup</h3><span>Disable CNAME lookup when negotiating Kerberos authentication</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisableAuthNegotiateCnameLookup</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisableAuthNegotiateCnameLookup</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisableAuthNegotiateCnameLookup</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DisableAuthNegotiateCnameLookup</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium (Android) since version 46</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether the generated Kerberos SPN is based on the canonical DNS name or the original name entered.</p><p>If you enable this setting, CNAME lookup will be skipped and the server name will be used as entered.</p><p>If you disable this setting or leave it unset, the canonical name of the server will be determined via CNAME lookup.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="EnableAuthNegotiatePort"/>EnableAuthNegotiatePort</h3><span>Include non-standard port in Kerberos SPN</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EnableAuthNegotiatePort</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnableAuthNegotiatePort</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EnableAuthNegotiatePort</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether the generated Kerberos SPN should include a non-standard port. If you enable this setting, and a non-standard port (i.e. a port other than 80 or 443) is entered, it will be included in the generated Kerberos SPN. If you disable this setting, the generated Kerberos SPN will not include a port in any case.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AuthServerWhitelist"/>AuthServerWhitelist</h3><span>Authentication server whitelist</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AuthServerWhitelist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AuthServerWhitelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AuthServerWhitelist</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AuthServerWhitelist</dd><dt style="font-weight: bold;">Android WebView restriction name:</dt><dd style="font-family: monospace;">com.android.browser:AuthServerWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium (Android) since version 46</li><li>Chromium WebView (Android) since version 49</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies which servers should be whitelisted for integrated authentication. Integrated authentication is only enabled when Chromium receives an authentication challenge from a proxy or from a server which is in this permitted list.</p><p>Separate multiple server names with commas. Wildcards (*) are allowed.</p><p>If you leave this policy unset Chromium will try to detect if a server is on the Intranet and only then will it respond to IWA requests. If a server is detected as Internet then IWA requests from it will be ignored by Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;*example.com,foobar.com,*baz&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AuthNegotiateDelegateWhitelist"/>AuthNegotiateDelegateWhitelist</h3><span>Kerberos delegation server whitelist</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AuthNegotiateDelegateWhitelist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AuthNegotiateDelegateWhitelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AuthNegotiateDelegateWhitelist</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AuthNegotiateDelegateWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium (Android) since version 46</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Servers that Chromium may delegate to.</p><p>Separate multiple server names with commas. Wildcards (*) are allowed.</p><p>If you leave this policy unset Chromium will not delegate user credentials even if a server is detected as Intranet.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;foobar.example.com&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AuthNegotiateDelegateByKdcPolicy"/>AuthNegotiateDelegateByKdcPolicy</h3><span>Use KDC policy to delegate credentials.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AuthNegotiateDelegateByKdcPolicy</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AuthNegotiateDelegateByKdcPolicy</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux) since version 74</li><li>Chromium (Mac) since version 74</li><li>Chromium OS (Chromium OS) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls whether approval by KDC policy is respected to decide whether to delegate Kerberos tickets.</p><p>If this policy is true, HTTP authentication respects approval by KDC policy, i.e. Chrome only delegates credentials if the KDC sets OK-AS-DELEGATE on a service ticket. Please see <a href="https://tools.ietf.org/html/rfc5896.html">https://tools.ietf.org/html/rfc5896.html</a> for more information. Service should also match 'AuthNegotiateDelegateWhitelist' policy.</p><p>If this policy is not set or set to false, KDC policy is ignored on supported platforms and 'AuthNegotiateDelegateWhitelist' policy only is respected.</p><p>On Windows KDC policy is always respected.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="GSSAPILibraryName"/>GSSAPILibraryName</h3><span>GSSAPI library name</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">GSSAPILibraryName</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux) since version 9</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies which GSSAPI library to use for HTTP authentication. You can set either just a library name or a full path.</p><p>If no setting is provided, Chromium will fall back to using a default library name.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;libgssapi_krb5.so.2&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AuthAndroidNegotiateAccountType"/>AuthAndroidNegotiateAccountType</h3><span>Account type for HTTP Negotiate authentication</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AuthAndroidNegotiateAccountType</dd><dt style="font-weight: bold;">Android WebView restriction name:</dt><dd style="font-family: monospace;">com.android.browser:AuthAndroidNegotiateAccountType</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 46</li><li>Chromium WebView (Android) since version 49</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the account type of the accounts provided by the Android authentication app that supports HTTP Negotiate authentication (e.g. Kerberos authentication). This information should be available from the supplier of the authentication app. For more details see <a href="https://goo.gl/hajyfN">https://goo.gl/hajyfN</a>.</p><p>If no setting is provided, HTTP Negotiate authentication is disabled on Android.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;com.example.spnego&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AllowCrossOriginAuthPrompt"/>AllowCrossOriginAuthPrompt</h3><span>Cross-origin HTTP Basic Auth prompts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowCrossOriginAuthPrompt</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowCrossOriginAuthPrompt</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowCrossOriginAuthPrompt</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 13</li><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls whether third-party sub-content on a page is allowed to pop up an HTTP Basic Auth dialogue box.</p><p>Typically this is disabled as a phishing defence. If this policy is not set, this is disabled and third-party sub-content will not be allowed to pop up a HTTP Basic Auth dialogue box.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NtlmV2Enabled"/>NtlmV2Enabled</h3><span>Enable NTLMv2 authentication.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NtlmV2Enabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NtlmV2Enabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">NtlmV2Enabled</dd><dt style="font-weight: bold;">Android WebView restriction name:</dt><dd style="font-family: monospace;">com.android.browser:NtlmV2Enabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux) since version 63</li><li>Chromium (Mac) since version 63</li><li>Chromium OS (Chromium OS) since version 63</li><li>Chromium (Android) since version 63</li><li>Chromium WebView (Android) since version 63</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls whether NTLMv2 is enabled.</p><p>All recent versions of Samba and Windows servers support NTLMv2. This should only be disabled for backwards compatibility and reduces the security of authentication.</p><p>If this policy is not set, the default is true and NTLMv2 is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Kiosk"/>Kiosk settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls public session and kiosk account types.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLocalAccounts"/>DeviceLocalAccounts</h3><span>Device-local accounts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the list of device-local accounts to be shown on the login screen.</p><p>Every list entry specifies an identifier, which is used internally to tell the different device-local accounts apart.</p></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Kiosk">Kiosk</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLocalAccountAutoLoginId"/>DeviceLocalAccountAutoLoginId</h3><span>Device-local account for auto-login</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>A device-local account to auto-login after a delay.</p><p>If this policy is set, the specified session will be automatically logged in after a period of time has elapsed at the login screen without user interaction. The device-local account must already be configured (see |DeviceLocalAccounts|).</p><p>If this policy is unset, there will be no auto-login.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLocalAccountAutoLoginDelay"/>DeviceLocalAccountAutoLoginDelay</h3><span>Device-local account auto-login timer</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>The device-local account auto-login delay.</p><p>If the |DeviceLocalAccountAutoLoginId| policy is unset, this policy has no effect. Otherwise:</p><p>If this policy is set, it determines the amount of time without user activity that should elapse before automatically logging into the device-local account specified by the |DeviceLocalAccountAutoLoginId| policy.</p><p>If this policy is unset, 0 milliseconds will be used as the timeout.</p><p>This policy is specified in milliseconds.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLocalAccountAutoLoginBailoutEnabled"/>DeviceLocalAccountAutoLoginBailoutEnabled</h3><span>Enable bailout keyboard shortcut for auto-login</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 28</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable bailout keyboard shortcut for auto-login.</p><p>If this policy is unset or set to True and a device-local account is configured for zero-delay auto-login, Chromium OS will honour the keyboard shortcut Ctrl+Alt+S for bypassing auto-login and showing the login screen.</p><p>If this policy is set to False, zero-delay auto-login (if configured) cannot be bypassed.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLocalAccountPromptForNetworkWhenOffline"/>DeviceLocalAccountPromptForNetworkWhenOffline</h3><span>Enable network configuration prompt when offline</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 33</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable network configuration prompt when offline.</p><p>If this policy is unset or set to True and a device-local account is configured for zero-delay auto-login and the device does not have access to the Internet, Chromium OS will show a network configuration prompt.</p><p>If this policy is set to False, an error message will be displayed instead of the network configuration prompt.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AllowKioskAppControlChromeVersion"/>AllowKioskAppControlChromeVersion</h3><span>Allow the auto launched with zero delay kiosk app to control Chromium OS version</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 51</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Whether to allow the auto launched with zero delay kiosk app to control Chromium OS version.</p><p>This policy controls whether to allow the auto launched with zero delay kiosk app to control Chromium OS version by declaring a required_platform_version in its manifest and use it as the auto update target version prefix.</p><p>If the policy is set to true, the value of required_platform_version manifest key of the auto launched with zero delay kiosk app is used as auto update target version prefix.</p><p>If the policy is not configured or set to false, the required_platform_version manifest key is ignored and auto update proceeds as normal.</p><p>Warning: It is not recommended to delegate control of the Chromium OS version to a kiosk app as it may prevent the device from receiving software updates and critical security fixes. Delegating control of the Chromium OS version might leave users at risk.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>If the kiosk app is an Android app, it will have no control over the Chromium OS version, even if this policy is set to True.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="BrowserSwitcher"/>Legacy Browser Support</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure policies to switch between browsers.
Configured websites will automatically open in a different browser from Chromium.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AlternativeBrowserPath"/>AlternativeBrowserPath</h3><span>Alternative browser to launch for configured websites.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AlternativeBrowserPath</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AlternativeBrowserPath</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls which command to use to open URLs in an alternative browser.</p><p>When this policy is left unset, a platform-specific default is used: Internet Explorer for Windows or Safari for Mac OS X. On Linux, launching an alternative browser will fail when this is unset.</p><p>When this policy is set to one of ${ie}, ${firefox}, ${safari} or
${opera}, that browser will launch if it is installed. ${ie} is only
available on Windows, and ${safari} is only available on Windows and Mac
OS X.</p><p>When this policy is set to a file path, that file is used as an executable
file.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;${ie}&quot;</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#BrowserSwitcher">BrowserSwitcher</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AlternativeBrowserParameters"/>AlternativeBrowserParameters</h3><span>Command-line parameters for the alternative browser.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AlternativeBrowserParameters</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AlternativeBrowserParameters</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls command-line parameters to launch to the alternative browser.</p><p>When this policy is left unset, only the URL is passed as a command-line parameter.</p><p>When this policy is set to a list of strings, each string is passed to the alternative browser as a separate command-line parameters. On Windows, the parameters are joined with spaces. On Mac OS X and Linux, a parameter may contain spaces and still be treated as a single parameter.</p><p>If an element contains ${url}, it gets replaced with the URL of the page to open.</p><p>If no element contains ${url}, the URL is appended at the end of the command line.</p><p>Environment variables are expanded. On Windows, %ABC% is replaced with the value of the ABC environment variable. On Mac OS X and Linux, ${ABC} is replaced with the value of the ABC environment variable.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\AlternativeBrowserParameters\1 = &quot;-foreground&quot;
Software\Policies\Chromium\AlternativeBrowserParameters\2 = &quot;-new-window&quot;
Software\Policies\Chromium\AlternativeBrowserParameters\3 = &quot;${url}&quot;
Software\Policies\Chromium\AlternativeBrowserParameters\4 = &quot;-profile&quot;
Software\Policies\Chromium\AlternativeBrowserParameters\5 = &quot;%HOME%\browser_profile&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;-foreground&quot;,
&quot;-new-window&quot;,
&quot;${url}&quot;,
&quot;-profile&quot;,
&quot;%HOME%\browser_profile&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;-foreground&lt;/string&gt;
&lt;string&gt;-new-window&lt;/string&gt;
&lt;string&gt;${url}&lt;/string&gt;
&lt;string&gt;-profile&lt;/string&gt;
&lt;string&gt;%HOME%\browser_profile&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherChromePath"/>BrowserSwitcherChromePath</h3><span>Path to Chrome for switching from the alternative browser.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherChromePath</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the command to use to open URLs in Chromium when switching from Internet Explorer.</p><p>If the 'Legacy Browser Support' add-in for Internet Explorer is not installed, this policy has no effect.</p><p>When this policy is left unset, Internet Explorer will auto-detect Chromium's own executable path when launching Chromium from Internet Explorer.</p><p>When this policy is set, it will be used to launch Chromium when launching Chromium from Internet Explorer.</p><p>This policy can be set to an executable file path, or ${chrome} to auto-detect Chrome's install location.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;${chrome}&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherChromeParameters"/>BrowserSwitcherChromeParameters</h3><span>Command-line parameters for switching from the alternative browser.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherChromeParameters</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls command-line parameters for Chrome from Internet Explorer.</p><p>If the 'Legacy Browser Support' add-in for Internet Explorer is not installed, this policy has no effect.</p><p>When this policy is left unset, Internet Explorer only passes the URL to Chrome as a command-line parameter.</p><p>When this policy is set to a list of strings, the strings are joined with spaces and passed to Chrome as command-line parameters.</p><p>If an element contains ${url}, it gets replaced with the URL of the page to open.</p><p>If no element contains ${url}, the URL is appended at the end of the command line.</p><p>Environment variables are expanded. On Windows, %ABC% is replaced with the value of the ABC environment variable.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\BrowserSwitcherChromeParameters\1 = &quot;--force-dark-mode&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherDelay"/>BrowserSwitcherDelay</h3><span>Delay before launching alternative browser (milliseconds)</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherDelay</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherDelay</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls how long to wait before launching an alternative browser, in milliseconds.</p><p>When this policy is left unset, or set to 0, navigating to a designated URL immediately opens it in an alternative browser.</p><p>When this policy is set to a number, Chrome shows a message for that many milliseconds, and then opens the alternative browser.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00002710 (Windows), 10000 (Linux), 10000 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherEnabled"/>BrowserSwitcherEnabled</h3><span>Enable the Legacy Browser Support feature.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether to enable Legacy Browser Support.</p><p>When this policy is left unset, or is set to false, Chrome will not attempt to launch designated URLs in an alternative browser.</p><p>When this policy is set to true, Chrome will attempt to launch some URLs in an alternative browser (such as Internet Explorer). This feature is configured using the policies in the Legacy Browser support group.</p><p>This feature is a replacement for the 'Legacy Browser Support' extension. Configuration from the extension will carry over to this feature, but it is strongly advisable to use the Chrome policies instead. This ensures better compatibility in the future.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherExternalSitelistUrl"/>BrowserSwitcherExternalSitelistUrl</h3><span>URL of an XML file that contains URLs to load in an alternative browser.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherExternalSitelistUrl</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherExternalSitelistUrl</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is a URL that points to an XML file in the same format as Internet Explorer's SiteList policy. This loads rules from an XML file, without sharing those rules with Internet Explorer.</p><p>When this policy is left unset, or not set to a valid URL, Chromium does not use it as a source of rules for switching browsers.</p><p>When this policy is set to a valid URL, Chromium downloads the site list from that URL, and applies the rules as if they had been configured with the BrowserSwitcherUrlList policy.</p><p>For more information on Internet Explorer's SiteList policy: <a href="https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode">https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode</a></p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;http://example.com/sitelist.xml&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherExternalGreylistUrl"/>BrowserSwitcherExternalGreylistUrl</h3><span>URL of an XML file that contains URLs that should never trigger a browser switch.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherExternalGreylistUrl</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherExternalGreylistUrl</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 77</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is a URL that points to an XML file in the same format as Internet Explorer'sSiteList policy. This loads rules from an XML file, without sharing those rules with Internet Explorer.</p><p>The rules in this XML file apply in the same way as BrowserSwitcherUrlGreylist. That is, these rules prevent Chromium from opening the alternative browser, and also prevent the alternative browser from opening Chromium.</p><p>When this policy is left unset, or not set to a valid URL, Chromium does not use it as a source of rules that don't trigger a browser switch.</p><p>When this policy is set to a valid URL, Chromium downloads the site list from that URL, and applies the rules as if they had been configured with the BrowserSwitcherUrlGreylist policy.</p><p>For more information on Internet Explorer's SiteList policy: <a href="https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode">https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode</a></p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;http://example.com/greylist.xml&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherKeepLastChromeTab"/>BrowserSwitcherKeepLastChromeTab</h3><span>Keep last tab open in Chrome.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherKeepLastChromeTab</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherKeepLastChromeTab</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether to close Chrome completely when the last tab would switch to another browser.</p><p>When this policy is left unset, or is set to true, Chrome will keep at least one tab open, after switching to an alternative browser.</p><p>When this policy is set to false, Chrome will close the tab after switching to an alternative browser, even if it was the last tab. This will cause Chrome to exit completely.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherUrlList"/>BrowserSwitcherUrlList</h3><span>Websites to open in alternative browser</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherUrlList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherUrlList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the list of websites to open in an alternative browser.</p><p>Note that elements can also be added to this list through the BrowserSwitcherUseIeSitelist and BrowserSwitcherExternalSitelistUrl policies.</p><p>When this policy is left unset, no websites are added to the list.</p><p>When this policy is set, each item is treated as a rule for something to open in an alternative browser. Chromium uses those rules when choosing if a URL should open in an alternative browser.</p><p>When the Internet Explorer add-in is present and enabled, Internet Explorer switches back to Chromium when the rules do not match.</p><p>If rules contradict each other, Chromium uses the most specific rule.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\BrowserSwitcherUrlList\1 = &quot;ie.com&quot;
Software\Policies\Chromium\BrowserSwitcherUrlList\2 = &quot;!open-in-chrome.ie.com&quot;
Software\Policies\Chromium\BrowserSwitcherUrlList\3 = &quot;foobar.com/ie-only/&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;ie.com&quot;,
&quot;!open-in-chrome.ie.com&quot;,
&quot;foobar.com/ie-only/&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;ie.com&lt;/string&gt;
&lt;string&gt;!open-in-chrome.ie.com&lt;/string&gt;
&lt;string&gt;foobar.com/ie-only/&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherUrlGreylist"/>BrowserSwitcherUrlGreylist</h3><span>Websites that should never trigger a browser switch.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherUrlGreylist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSwitcherUrlGreylist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the list of websites that will never cause a browser switch.</p><p>Note that elements can also be added to this list through the BrowserSwitcherExternalGreylistUrl policy.</p><p>When this policy is left unset, no websites are added to the list.</p><p>When this policy is set, each item is treated as a rule, similar to the BrowserSwitcherUrlList policy. However, the logic is reversed: rules that match will not open an alternative browser.</p><p>Unlike BrowserSwitcherUrlList, rules apply to both directions. That is, when the Internet Explorer add-in is present and enabled, it also controls whether Internet Explorer should open these URLs in Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\BrowserSwitcherUrlGreylist\1 = &quot;ie.com&quot;
Software\Policies\Chromium\BrowserSwitcherUrlGreylist\2 = &quot;!open-in-chrome.ie.com&quot;
Software\Policies\Chromium\BrowserSwitcherUrlGreylist\3 = &quot;foobar.com/ie-only/&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;ie.com&quot;,
&quot;!open-in-chrome.ie.com&quot;,
&quot;foobar.com/ie-only/&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;ie.com&lt;/string&gt;
&lt;string&gt;!open-in-chrome.ie.com&lt;/string&gt;
&lt;string&gt;foobar.com/ie-only/&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="BrowserSwitcherUseIeSitelist"/>BrowserSwitcherUseIeSitelist</h3><span>Use Internet Explorer's SiteList policy for Legacy Browser Support.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSwitcherUseIeSitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether to load rules from Internet Explorer's SiteList policy.</p><p>When this policy is left unset, or set to false, Chromium does not use Internet Explorer's SiteList policy as a source of rules for switching browsers.</p><p>When this policy is set to true, Chromium reads Internet Explorer's SiteList to obtain the site list's URL. Chromium then downloads the site list from that URL, and applies the rules as if they had been configured with the BrowserSwitcherUrlList policy.</p><p>For more information on Internet Explorer's SiteList policy: <a href="https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode">https://docs.microsoft.com/internet-explorer/ie11-deploy-guide/what-is-enterprise-mode</a></p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Crostini"/>Linux container</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls settings for the Linux container (Crostini).</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="VirtualMachinesAllowed"/>VirtualMachinesAllowed</h3><span>Allow devices to run virtual machines on Chrome OS</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VirtualMachinesAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to control whether virtual machines are allowed to run on Chrome OS.</p><p>If the policy is set to True, the device is allowed to run virtual machines.
If the policy is set to False, the device will not be allowed to run virtual machines.
All three policies, VirtualMachinesAllowed, CrostiniAllowed and DeviceUnaffiliatedCrostiniAllowed need to be true when they apply for Crostini to be allowed to run.
When this policy is changed to False, it applies to starting new virtual machines but does not shut down virtual machines which are already running.
When this policy is not set on a managed device, the device is not allowed to run virtual machines.
Unmanaged devices are allowed to run virtual machines.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CrostiniAllowed"/>CrostiniAllowed</h3><span>User is enabled to run Crostini</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CrostiniAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable this user to run Crostini.</p><p>If the policy is set to false, Crostini is not enabled for the user.
If set to true or left unset, Crostini is enabled for the user as long as other settings also allow it.
All three policies, VirtualMachinesAllowed, CrostiniAllowed and DeviceUnaffiliatedCrostiniAllowed need to be true when they apply for Crostini to be allowed to run.
When this policy is changed to false, it applies to starting new Crostini containers but does not shut down containers which are already running.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUnaffiliatedCrostiniAllowed"/>DeviceUnaffiliatedCrostiniAllowed</h3><span>Allow unaffiliated users to use Crostini</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUnaffiliatedCrostiniAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set to false, unaffiliated users will not be allowed to use Crostini.</p><p>If the policy is unset or set to true, all users are allowed to use Crostini as long as other settings also allow it.
All three policies, VirtualMachinesAllowed, CrostiniAllowed and DeviceUnaffiliatedCrostiniAllowed need to be true when they apply for Crostini to be allowed to run.
When this policy is changed to false, it applies to starting new Crostini containers but does not shut down containers which are already running.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CrostiniExportImportUIAllowed"/>CrostiniExportImportUIAllowed</h3><span>User is enabled to export/import Crostini containers via the UI</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CrostiniExportImportUIAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set to false, the export/import UI will not be available to users. However, it is still possible to use 'lxc' commands directly in the virtual machine to export and import container images.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="ActiveDirectoryManagement"/>Microsoft® Active Directory® management settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls settings specific to Microsoft® Active Directory®-managed Chromium OS devices.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceMachinePasswordChangeRate"/>DeviceMachinePasswordChangeRate</h3><span>Machine password change rate</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceMachinePasswordChangeRate</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the rate (in days) at which a client changes their machine account password. The password is randomly generated by the client and not visible to the user.</p><p>Just like user passwords, machine passwords should be changed regularly. Disabling this policy or setting a high number of days can have a negative impact on security since it gives potential attackers more time to find the machine account password and use it.</p><p>If the policy is unset, the machine account password is changed every 30 days.</p><p>If the policy is set to 0, machine account password change is disabled.</p><p>Note that passwords might get older than the specified number of days if the client has been offline for a longer period of time.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:0</li><li>Maximum:9999</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#ActiveDirectoryManagement">ActiveDirectoryManagement</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUserPolicyLoopbackProcessingMode"/>DeviceUserPolicyLoopbackProcessingMode</h3><span>User policy loopback processing mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUserPolicyLoopbackProcessingMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether and how user policy from computer GPO is processed.</p><p>If the policy is set to 'Default' or if it is unset, user policy is read only from user GPOs (computer GPOs are ignored).</p><p>If the policy is set to 'Merge', user policy in user GPOs is merged with user policy in computer GPOs (computer GPOs take preference).</p><p>If the policy is set to 'Replace', user policy in user GPOs is replaced by user policy in computer GPOs (user GPOs are ignored).</p><ul><li>0 = Default</li><li>1 = Merge</li><li>2 = Replace</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceKerberosEncryptionTypes"/>DeviceKerberosEncryptionTypes</h3><span>Allowed Kerberos encryption types</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceKerberosEncryptionTypes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Sets encryption types that are allowed when requesting Kerberos tickets from an Microsoft® Active Directory® server.</p><p>If the policy is set to 'All', both the AES encryption types 'aes256-cts-hmac-sha1-96' and 'aes128-cts-hmac-sha1-96' as well as the RC4 encryption type 'rc4-hmac' are allowed. AES encryption takes preference if the server supports both types. Note that RC4 is insecure and the server should be reconfigured if possible to support AES encryption.</p><p>If the policy is set to 'Strong' or if it is unset, only the AES encryption types are allowed.</p><p>If the policy is set to 'Legacy', only the RC4 encryption type is allowed. This option is insecure and should only be needed in very specific circumstances.</p><p>See also <a href="https://wiki.samba.org/index.php/Samba_4.6_Features_added/changed#Kerberos_client_encryption_types">https://wiki.samba.org/index.php/Samba_4.6_Features_added/changed#Kerberos_client_encryption_types</a>.</p><ul><li>0 = All (insecure)</li><li>1 = Strong</li><li>2 = Legacy (insecure)</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceGpoCacheLifetime"/>DeviceGpoCacheLifetime</h3><span>GPO cache lifetime</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceGpoCacheLifetime</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the lifetime (in hours) of the Group Policy Object (GPO) cache. Instead of re-downloading GPOs on every policy fetch, the system may reuse cached GPOs as long as their version does not change. This policy specifies the maximum duration for which cached GPOs may be reused before they are re-downloaded. Rebooting and logging out clears the cache.</p><p>If the policy is unset, cached GPOs may be reused for up to 25 hours.</p><p>If the policy is set to 0, GPO caching is turned off. Note that this increases server load since GPOs are re-downloaded on every policy fetch, even if they did not change.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:0</li><li>Maximum:9999</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAuthDataCacheLifetime"/>DeviceAuthDataCacheLifetime</h3><span>Authentication data cache lifetime</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAuthDataCacheLifetime</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the lifetime (in hours) of the authentication data cache. The cache is used to speed up sign-in. It contains general data (workgroup name etc.) about affiliated realms, i.e. realms trusted by the machine realm. No user-specific data and no data for unaffiliated realms is cached. Rebooting the device clears the cache.</p><p>If the policy is unset, cached authentication data may be reused for up to 73 hours.</p><p>If the policy is set to 0, authentication data caching is turned off. This can significantly slow down sign-in of affiliated users since realm-specific data has to be fetched on every sign-in.</p><p>Note that realm data is cached even for ephemeral users. The cache should be turned off if tracing the realm of ephemeral users is to be prevented.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:0</li><li>Maximum:9999</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="NativeMessaging"/>Native Messaging</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configures policies for Native Messaging. Blacklisted native messaging hosts won't be allowed unless they are whitelisted.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativeMessagingBlacklist"/>NativeMessagingBlacklist</h3><span>Configure native messaging blacklist</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NativeMessagingBlacklist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NativeMessagingBlacklist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify which native messaging hosts should not be loaded.</p><p>A blacklist value of '*' means that all native messaging hosts are blacklisted unless they are explicitly listed in the whitelist.</p><p>If this policy is left not set Chromium will load all installed native messaging hosts.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\NativeMessagingBlacklist\1 = &quot;com.native.messaging.host.name1&quot;
Software\Policies\Chromium\NativeMessagingBlacklist\2 = &quot;com.native.messaging.host.name2&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;com.native.messaging.host.name1&quot;,
&quot;com.native.messaging.host.name2&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;com.native.messaging.host.name1&lt;/string&gt;
&lt;string&gt;com.native.messaging.host.name2&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#NativeMessaging">NativeMessaging</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativeMessagingWhitelist"/>NativeMessagingWhitelist</h3><span>Configure native messaging whitelist</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NativeMessagingWhitelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NativeMessagingWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify which native messaging hosts are not subject to the blacklist.</p><p>A blacklist value of * means that all native messaging hosts are blacklisted and only native messaging hosts listed in the whitelist will be loaded.</p><p>By default, all native messaging hosts are whitelisted, but if all native messaging hosts have been blacklisted by policy, the whitelist can be used to override that policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\NativeMessagingWhitelist\1 = &quot;com.native.messaging.host.name1&quot;
Software\Policies\Chromium\NativeMessagingWhitelist\2 = &quot;com.native.messaging.host.name2&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;com.native.messaging.host.name1&quot;,
&quot;com.native.messaging.host.name2&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;com.native.messaging.host.name1&lt;/string&gt;
&lt;string&gt;com.native.messaging.host.name2&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativeMessagingUserLevelHosts"/>NativeMessagingUserLevelHosts</h3><span>Allow user-level Native Messaging hosts (installed without admin permissions)</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NativeMessagingUserLevelHosts</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NativeMessagingUserLevelHosts</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables user-level installation of Native Messaging hosts.</p><p>If this setting is enabled, then Chromium allows usage of Native Messaging hosts installed on user level.</p><p>If this setting is disabled, then Chromium will only use Native Messaging hosts installed on system level.</p><p>If this setting is left not set, Chromium will allow usage of user-level Native Messaging hosts.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="NetworkFileShares"/>Network File Shares settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure Network File Shares-related policies.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NetworkFileSharesAllowed"/>NetworkFileSharesAllowed</h3><span>Controls Network File Shares for ChromeOS availability</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NetworkFileSharesAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether the Network File Shares feature for Chromium OS is allowed for a user.</p><p>When this policy is not configured or set to True, users will be able to use Network File Shares.</p><p>When this policy is set to False, users will be unable to use Network File Shares.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#NetworkFileShares">NetworkFileShares</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NetBiosShareDiscoveryEnabled"/>NetBiosShareDiscoveryEnabled</h3><span>Controls Network File Share discovery via NetBIOS</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NetBiosShareDiscoveryEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether the Network File Shares feature for Chromium OS should use the NetBIOS Name Query Request protocol to discover shares on the network.
When this policy is set to True, share discovery will use the NetBIOS Name Query Request protocol protocol to discover shares on the network.
When this policy is set to False, share discovery will not use the NetBIOS Name Query Request protocol protocol to discover shares.
If the policy is left not set, the default is disabled for enterprise-managed users and enabled for non-managed users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NTLMShareAuthenticationEnabled"/>NTLMShareAuthenticationEnabled</h3><span>Controls enabling NTLM as an authentication protocol for SMB mounts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NTLMShareAuthenticationEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether the Network File Shares feature for Chromium OS will use NTLM for authentication.</p><p>When this policy is set to True, NTLM will be used for authentication to SMB shares if necessary.
When this policy is set to False, NTLM authentication to SMB shares will be disabled.</p><p>If the policy is left not set, the default is disabled for enterprise-managed users and enabled for non-managed users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NetworkFileSharesPreconfiguredShares"/>NetworkFileSharesPreconfiguredShares</h3><span>List of pre-configured network file shares.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NetworkFileSharesPreconfiguredShares</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies a list of pre-configured network file shares.</p><p>Each list item of the policy is an object with two members: &quot;share_url&quot; and &quot;mode&quot;. &quot;share_url&quot; should be the URL of the share and &quot;mode&quot; should be either &quot;drop_down&quot; or &quot;pre_mount&quot;. &quot;drop_down&quot; mode indicates that &quot;share_url&quot; will be added to the share discovery drop-down. &quot;pre_mount&quot; mode indicates that &quot;share_url&quot; will be mounted.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;mode&quot;: {
&quot;enum&quot;: [
&quot;drop_down&quot;,
&quot;pre_mount&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;share_url&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;required&quot;: [
&quot;share_url&quot;,
&quot;mode&quot;
],
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NetworkFileSharesPreconfiguredShares = [
{
&quot;mode&quot;: &quot;drop_down&quot;,
&quot;share_url&quot;: &quot;smb://server/share&quot;
},
{
&quot;mode&quot;: &quot;drop_down&quot;,
&quot;share_url&quot;: &quot;\\\\server\\share&quot;
}
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Network"/>Network settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls device-wide network configuration.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceOpenNetworkConfiguration"/>DeviceOpenNetworkConfiguration</h3><span>Device-level network configuration</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceOpenNetworkConfiguration</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 16</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows pushing network configuration to be applied for all users of a Chromium OS device. The network configuration is a JSON-formatted string as defined by the Open Network Configuration format.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Android apps can use the network configurations and CA certificates set via this policy, but do not have access to some configuration options.</p></dd><dt style="font-weight: bold;">Expanded schema description:</dt><dd><a href="https://chromium.googlesource.com/chromium/src/+/master/components/onc/docs/onc_spec.md">https://chromium.googlesource.com/chromium/src/+/master/components/onc/docs/onc_spec.md</a></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;{ &quot;NetworkConfigurations&quot;: [ { &quot;GUID&quot;: &quot;{4b224dfd-6849-7a63-5e394343244ae9c9}&quot;, &quot;Name&quot;: &quot;my WiFi&quot;, &quot;Type&quot;: &quot;WiFi&quot;, &quot;WiFi&quot;: { &quot;SSID&quot;: &quot;my WiFi&quot;, &quot;HiddenSSID&quot;: false, &quot;Security&quot;: &quot;None&quot;, &quot;AutoConnect&quot;: true } } ] }&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceDataRoamingEnabled"/>DeviceDataRoamingEnabled</h3><span>Enable data roaming</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceDataRoamingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Determines whether data roaming should be enabled for the device. If set to true, data roaming is allowed. If left unconfigured or set to false, data roaming will be unavailable.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NetworkThrottlingEnabled"/>NetworkThrottlingEnabled</h3><span>Enable throttling network bandwidth</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 56</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows enabling or disabling network throttling.
This applies to all users, and to all interfaces on the device. Once set,
the throttling persists until the policy is changed to disable it.</p><p>If set to false, there is no throttling.
If set to true, the system is throttled to achieve the provided upload and download rates (in kbits/s).</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;download_rate_kbits&quot;: {
&quot;description&quot;: &quot;Desired download rate in kbits/s.&quot;,
&quot;type&quot;: &quot;integer&quot;
},
&quot;enabled&quot;: {
&quot;description&quot;: &quot;A boolean flag indicating if throttling is enabled.&quot;,
&quot;type&quot;: &quot;boolean&quot;
},
&quot;upload_rate_kbits&quot;: {
&quot;description&quot;: &quot;Desired upload rate in kbits/s.&quot;,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;required&quot;: [
&quot;enabled&quot;,
&quot;upload_rate_kbits&quot;,
&quot;download_rate_kbits&quot;
],
&quot;type&quot;: &quot;object&quot;
}</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceHostnameTemplate"/>DeviceHostnameTemplate</h3><span>Device network hostname template</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceHostnameTemplate</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Determine the hostname of the device used in DHCP requests.</p><p>If this policy is set to a non-empty string, that string will be used as the device hostname during DHCP request.</p><p>The string can contain variables ${ASSET_ID}, ${SERIAL_NUM}, ${MAC_ADDR}, ${MACHINE_NAME} that would be replaced with values on the device before using as a hostname. Resulting substitution should be a valid hostname (per RFC 1035, section 3.1).</p><p>If this policy is not set, or the value after substitution is not a valid hostname, no hostname will be set in DHCP request.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;chromebook-${ASSET_ID}&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceWiFiFastTransitionEnabled"/>DeviceWiFiFastTransitionEnabled</h3><span>Enable 802.11r Fast Transition</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceWiFiFastTransitionEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows enabling or disabling Fast Transition.
This applies to all users, and to all interfaces on the device.
In order for Fast Transition to be used, both this setting and the per-network ONC property need to be enabled.
Once set, Fast Transition persists until the policy is changed to disable it.</p><p>If this policy is not set or set to false, Fast Transition is not used.
If set to true, Fast Transition is used when the wireless access point supports it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#WiFi">WiFi</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceWiFiAllowed"/>DeviceWiFiAllowed</h3><span>Enable Wi-Fi</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceWiFiAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If the policy is set to false, Chromium OS will disable Wi-Fi and users cannot re-enable it.
If the policy is set to true or left unset, users will be able to enable or disable Wi-Fi as they wish.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceDockMacAddressSource"/>DeviceDockMacAddressSource</h3><span>Device MAC address source when docked</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceDockMacAddressSource</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
Configures which MAC (media access control) address will be used when a dock is connected to the device.</p><p>When a dock is connected to some device models, the device's designated dock MAC address is used to identify the device on Ethernet by default. This policy allows the administrator to change the source of the MAC address while docked.</p><p>If 'DeviceDockMacAddress' is selected or the policy is left unset, the device's designated dock MAC address will be used.</p><p>If 'DeviceNicMacAddress' is selected, the device's NIC (network interface controller) MAC address will be used.</p><p>If 'DockNicMacAddress' is selected, the dock's NIC MAC address will be used.</p><p>This setting cannot be changed by the user.</p><ul><li>1 = Device's designated dock MAC address</li><li>2 = Device's built-in NIC MAC address</li><li>3 = Dock's built-in NIC MAC address</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Other"/>Other</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls miscellaneous settings including USB, Bluetooth, policy refresh, developer mode and others.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="UsbDetachableWhitelist"/>UsbDetachableWhitelist</h3><span>Whitelist of USB detachable devices</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UsbDetachableWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 51</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Defines the list of USB devices that are allowed to be detached from their kernel driver in order to be used through the chrome.usb API directly inside a web application. Entries are pairs of USB Vendor Identifier and Product Identifier to identify a specific hardware.</p><p>If this policy is not configured, the list of a detachable USB devices is empty.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\UsbDetachableWhitelist\1 = &quot;{'vendor_id': 1027, 'product_id': 24577}&quot;
Software\Policies\ChromiumOS\UsbDetachableWhitelist\2 = &quot;{'vendor_id': 16700, 'product_id': 8453}&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAllowBluetooth"/>DeviceAllowBluetooth</h3><span>Allow bluetooth on device</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAllowBluetooth</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 52</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to false, Chromium OS will disable Bluetooth and the user cannot enable it back.</p><p>If this policy is set to true or left unset, the user will be able to enable or disable Bluetooth as they wish.</p><p>If this policy is set, the user cannot change or override it.</p><p>After enabling Bluetooth, the user must log out and log back in for the changes to take effect (no need for this when disabling Bluetooth).</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="TPMFirmwareUpdateSettings"/>TPMFirmwareUpdateSettings</h3><span>Configure TPM firmware update behaviour</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\TPMFirmwareUpdateSettings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 63</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures availability and behaviour of TPM firmware update functionality.</p><p>Individual settings can be specified in JSON properties:</p><p>allow-user-initiated-powerwash: If set to true, users will be able to trigger the powerwash flow to install a TPM firmware update.</p><p>allow-user-initiated-preserve-device-state: If set to true, users will be able to invoke the TPM firmware update flow that preserves device-wide state (including enterprise enrolment), but loses user data. This update flow is available starting from version 68.</p><p>auto-update-mode: Controls how automatic TPM firmware updates are enforced for vulnerable TPM firmware. All flows preserve local device state.
If set to 1 or left not set, TPM firmware updates are not enforced.
If set to 2, TPM firmware will be updated at the next reboot after user acknowledges the update.
If set to 3, TPM firmware will be updated at the next reboot.
If set to 4, TPM firmware will be updated after enrolment, before user sign-in.
This option is available starting from version 74.</p><p>If the policy is not set, TPM firmware update functionality will not be available.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;allow-user-initiated-powerwash&quot;: {
&quot;type&quot;: &quot;boolean&quot;
},
&quot;allow-user-initiated-preserve-device-state&quot;: {
&quot;type&quot;: &quot;boolean&quot;
},
&quot;auto-update-mode&quot;: {
&quot;enum&quot;: [
1,
2,
3,
4
],
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\TPMFirmwareUpdateSettings = {
&quot;allow-user-initiated-powerwash&quot;: true,
&quot;allow-user-initiated-preserve-device-state&quot;: true,
&quot;auto-update-mode&quot;: 1
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DevicePolicyRefreshRate"/>DevicePolicyRefreshRate</h3><span>Refresh rate for Device Policy</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DevicePolicyRefreshRate</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the period in milliseconds at which the device management service is queried for device policy information.</p><p>Setting this policy overrides the default value of 3 hours. Valid values for this policy are in the range from 1,800,000 (30 minutes) to 86,400,000 (1 day). Any values not in this range will be clamped to the respective boundary.</p><p>Leaving this policy not set will make Chromium OS use the default value of 3 hours.</p><p>Note that if the platform supports policy notifications, the refresh delay will be set to 24 hours (ignoring all defaults and the value of this policy) because it is expected that policy notifications will force a refresh automatically whenever policy changes, making more frequent refreshes unnecessary.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x0036ee80 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceBlockDevmode"/>DeviceBlockDevmode</h3><span>Block developer mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 37</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Block developer mode.</p><p>If this policy is set to True, Chromium OS will prevent the device from booting into developer mode. The system will refuse to boot and show an error screen when the developer switch is turned on.</p><p>If this policy is unset or set to False, developer mode will remain available for the device.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy controls Chromium OS developer mode only. If you want to prevent access to Android Developer Options, you need to set the DeveloperToolsDisabled policy.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAllowRedeemChromeOsRegistrationOffers"/>DeviceAllowRedeemChromeOsRegistrationOffers</h3><span>Allow users to redeem offers through Chrome OS Registration</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAllowRedeemChromeOsRegistrationOffers</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>IT admins for enterprise devices can use this flag to control whether to allow users to redeem offers through Chrome OS Registration.</p><p>If this policy is set to true or left not set, users will be able to redeem offers through Chrome OS Registration.</p><p>If this policy is set to false, user will not be able to redeem offers.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceQuirksDownloadEnabled"/>DeviceQuirksDownloadEnabled</h3><span>Enable queries to Quirks Server for hardware profiles</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceQuirksDownloadEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 51</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>The Quirks Server provides hardware-specific configuration files, such as ICC display profiles to adjust monitor calibration.</p><p>When this policy is set to false, the device will not attempt to contact the Quirks Server to download configuration files.</p><p>If this policy is true or not configured, then Chromium OS will automatically contact the Quirks Server and download configuration files, if available, and store them on the device. Such files might, for example, be used to improve display quality of attached monitors.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ExtensionCacheSize"/>ExtensionCacheSize</h3><span>Set Apps and Extensions cache size (in bytes)</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 43</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Chromium OS caches Apps and Extensions for installation by multiple users of a single device to avoid re-downloading them for each user.
If this policy is not configured or the value is lower than 1 MB, Chromium OS will use the default cache size.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>The cache is not used for Android apps. If multiple users install the same Android app, it will be downloaded anew for each user.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceOffHours"/>DeviceOffHours</h3><span>Off hours intervals when the specified device policies are released</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceOffHours</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 62</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If 'OffHours' policy is set, then the specified device policies are ignored (use the default settings of these policies) during the defined time intervals. Device policies are re-applied by Chrome on every event when 'OffHours' period starts or ends. User will be notified and forced to sign out when 'OffHours' time end and device policy settings are changed (e.g. when user is logged in with an unallowed account).</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;ignored_policy_proto_tags&quot;: {
&quot;items&quot;: {
&quot;type&quot;: &quot;integer&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;intervals&quot;: {
&quot;items&quot;: {
&quot;id&quot;: &quot;WeeklyTimeIntervals&quot;,
&quot;properties&quot;: {
&quot;end&quot;: {
&quot;$ref&quot;: &quot;WeeklyTime&quot;
},
&quot;start&quot;: {
&quot;id&quot;: &quot;WeeklyTime&quot;,
&quot;properties&quot;: {
&quot;day_of_week&quot;: {
&quot;enum&quot;: [
&quot;MONDAY&quot;,
&quot;TUESDAY&quot;,
&quot;WEDNESDAY&quot;,
&quot;THURSDAY&quot;,
&quot;FRIDAY&quot;,
&quot;SATURDAY&quot;,
&quot;SUNDAY&quot;
],
&quot;id&quot;: &quot;WeekDay&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;time&quot;: {
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;timezone&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceOffHours = {
&quot;ignored_policy_proto_tags&quot;: [
3,
8
],
&quot;intervals&quot;: [
{
&quot;end&quot;: {
&quot;day_of_week&quot;: &quot;MONDAY&quot;,
&quot;time&quot;: 21720000
},
&quot;start&quot;: {
&quot;day_of_week&quot;: &quot;MONDAY&quot;,
&quot;time&quot;: 12840000
}
},
{
&quot;end&quot;: {
&quot;day_of_week&quot;: &quot;FRIDAY&quot;,
&quot;time&quot;: 57600000
},
&quot;start&quot;: {
&quot;day_of_week&quot;: &quot;FRIDAY&quot;,
&quot;time&quot;: 38640000
}
}
],
&quot;timezone&quot;: &quot;GMT&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="PasswordManager"/>Password manager</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configures the password manager.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PasswordManagerEnabled"/>PasswordManagerEnabled</h3><span>Enable saving passwords to the password manager</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PasswordManagerEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PasswordManagerEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PasswordManagerEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">PasswordManagerEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, users can have Chromium memorise passwords and provide them automatically the next time they log in to a site.</p><p>If this setting is disabled, users cannot save new passwords but they may still use passwords that have been saved previously.</p><p>If this policy is enabled or disabled, users cannot change or override it in Chromium. If this policy is unset, password saving is allowed (but can be turned off by the user).</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on Android apps.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#PasswordManager">PasswordManager</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="PluginVm"/>PluginVm</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure PluginVm-related policies.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PluginVmAllowed"/>PluginVmAllowed</h3><span>Allow devices to use a PluginVm on Chromium OS</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PluginVmAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable this device to run PluginVm.</p><p>If the policy is set to false or left unset, PluginVm is not enabled for the device. If set to true, PluginVm is enabled for the device as long as other settings also allow it. PluginVmAllowed needs to be true, PluginVmLicenseKey and PluginVmImage need to be set for PluginVm to be allowed to run.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#PluginVm">PluginVm</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PluginVmLicenseKey"/>PluginVmLicenseKey</h3><span>PluginVm licence key</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PluginVmLicenseKey</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy specifies PluginVm licence key for this device.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;LICENSE_KEY&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PluginVmImage"/>PluginVmImage</h3><span>PluginVm image</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PluginVmImage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy specifies the PluginVm image for a user. The policy is set by specifying the URL from which the device can download the image and a SHA-256 hash used to verify the integrity of the download.</p><p>The policy should be specified as a string that expresses the URL and hash in the JSON format.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;hash&quot;: {
&quot;description&quot;: &quot;The SHA-256 hash of the PluginVm image.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;description&quot;: &quot;The URL from which the PluginVm image can be downloaded.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PluginVmImage = {
&quot;hash&quot;: &quot;842841a4c75a55ad050d686f4ea5f77e83ae059877fe9b6946aa63d3d057ed32&quot;,
&quot;url&quot;: &quot;https://example.com/plugin_vm_image&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="PowerAndShutdown"/>Power and shutdown</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls settings related to power management and rebooting.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenPowerManagement"/>DeviceLoginScreenPowerManagement</h3><span>Power management on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenPowerManagement</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configure power management on the log-in screen in Chromium OS.</p><p>This policy lets you configure how Chromium OS behaves when there is no user activity for some amount of time while the log-in screen is being shown. The policy controls multiple settings. For their individual semantics and value ranges, see the corresponding policies that control power management within a session. The only deviations from these policies are:
* The actions to take on idle or lid close cannot be to end the session.
* The default action taken on idle when running on AC power is to shut down.</p><p>If a setting is left unspecified, a default value is used.</p><p>If this policy is unset, defaults are used for all settings.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;AC&quot;: {
&quot;description&quot;: &quot;Power management settings applicable only when running on AC power&quot;,
&quot;id&quot;: &quot;DeviceLoginScreenPowerSettings&quot;,
&quot;properties&quot;: {
&quot;Delays&quot;: {
&quot;properties&quot;: {
&quot;Idle&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the idle action is taken, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;ScreenDim&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the screen is dimmed, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;ScreenOff&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the screen is turned off, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;IdleAction&quot;: {
&quot;description&quot;: &quot;Action to take when the idle delay is reached&quot;,
&quot;enum&quot;: [
&quot;Suspend&quot;,
&quot;Shutdown&quot;,
&quot;DoNothing&quot;
],
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;Battery&quot;: {
&quot;$ref&quot;: &quot;DeviceLoginScreenPowerSettings&quot;,
&quot;description&quot;: &quot;Power management settings applicable only when running on battery power&quot;
},
&quot;LidCloseAction&quot;: {
&quot;description&quot;: &quot;Action to take when the lid is closed&quot;,
&quot;enum&quot;: [
&quot;Suspend&quot;,
&quot;Shutdown&quot;,
&quot;DoNothing&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;UserActivityScreenDimDelayScale&quot;: {
&quot;description&quot;: &quot;Percentage by which the screen dim delay is scaled when user activity is observed while the screen is dimmed or soon after the screen has been turned off&quot;,
&quot;minimum&quot;: 100,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceLoginScreenPowerManagement = {
&quot;AC&quot;: {
&quot;IdleAction&quot;: &quot;DoNothing&quot;
},
&quot;Battery&quot;: {
&quot;Delays&quot;: {
&quot;Idle&quot;: 30000,
&quot;ScreenDim&quot;: 10000,
&quot;ScreenOff&quot;: 20000
},
&quot;IdleAction&quot;: &quot;DoNothing&quot;
},
&quot;LidCloseAction&quot;: &quot;Suspend&quot;,
&quot;UserActivityScreenDimDelayScale&quot;: 110
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="UptimeLimit"/>UptimeLimit</h3><span>Limit device uptime by automatically rebooting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Limit the device uptime by scheduling automatic reboots.</p><p>When this policy is set, it specifies the length of device uptime after which an automatic reboot is scheduled.</p><p>When this policy is not set, the device uptime is not limited.</p><p>If you set this policy, users cannot change or override it.</p><p>An automatic reboot is scheduled at the selected time but may be delayed on the device by up to 24 hours if a user is currently using the device.</p><p>Note: Currently, automatic reboots are only enabled while the login screen is being shown or a Kiosk app session is in progress. This will change in the future and the policy will always apply, regardless of whether a session of any particular type is in progress or not.</p><p>The policy value should be specified in seconds. Values are clamped to be at least 3600 (one hour).</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceRebootOnShutdown"/>DeviceRebootOnShutdown</h3><span>Automatic reboot on device shutdown</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceRebootOnShutdown</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to false or not configured, Chromium OS will allow the user to shut down the device.
If this policy is set to true, Chromium OS will trigger a reboot when the user shuts down the device. Chromium OS replaces all occurrences of shutdown buttons in the UI by reboot buttons. If the user shuts down the device using the power button, it will not automatically reboot, even if the policy is enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="PowerManagement"/>Power management</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure power management in Chromium OS.
These policies let you configure how Chromium OS behaves when the user remains idle for some amount of time.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenDimDelayAC"/>ScreenDimDelayAC (deprecated)</h3><span>Screen dim delay when running on AC power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenDimDelayAC</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is dimmed when running on AC power.</p><p>When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS dims the screen.</p><p>When this policy is set to zero, Chromium OS does not dim the screen when the user becomes idle.</p><p>When this policy is unset, a default length of time is used.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than or equal to the screen off delay (if set) and the idle delay.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000668a0 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenOffDelayAC"/>ScreenOffDelayAC (deprecated)</h3><span>Screen off delay when running on AC power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenOffDelayAC</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is turned off when running on AC power.</p><p>When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS turns off the screen.</p><p>When this policy is set to zero, Chromium OS does not turn off the screen when the user becomes idle.</p><p>When this policy is unset, a default length of time is used.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than or equal to the idle delay.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00075300 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenLockDelayAC"/>ScreenLockDelayAC (deprecated)</h3><span>Screen lock delay when running on AC power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenLockDelayAC</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is locked when running on AC power.</p><p>When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS locks the screen.</p><p>When this policy is set to zero, Chromium OS does not lock the screen when the user becomes idle.</p><p>When this policy is unset, a default length of time is used.</p><p>The recommended way to lock the screen on idle is to enable screen locking on suspend and have Chromium OS suspend after the idle delay. This policy should only be used when screen locking should occur a significant amount of time sooner than suspend or when suspend on idle is not desired at all.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than the idle delay.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000927c0 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleWarningDelayAC"/>IdleWarningDelayAC (deprecated)</h3><span>Idle warning delay when running on AC power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleWarningDelayAC</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 27</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which a warning dialogue is shown when running on AC power.</p><p>When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS shows a warning dialogue telling the user that the idle action is about to be taken.</p><p>When this policy is unset, no warning dialogue is shown.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than or equal to the idle delay.</p><p>The warning message is only shown if the idle action is to log out or shut down.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000850e8 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleDelayAC"/>IdleDelayAC (deprecated)</h3><span>Idle delay when running on AC power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleDelayAC</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the idle action is taken when running on AC power.</p><p>When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS takes the idle action, which can be configured separately.</p><p>When this policy is unset, a default length of time is used.</p><p>The policy value should be specified in milliseconds.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x001b7740 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenDimDelayBattery"/>ScreenDimDelayBattery (deprecated)</h3><span>Screen dim delay when running on battery power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenDimDelayBattery</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is dimmed when running on battery power.</p><p>When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS dims the screen.</p><p>When this policy is set to zero, Chromium OS does not dim the screen when the user becomes idle.</p><p>When this policy is unset, a default length of time is used.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than or equal the screen off delay (if set) and the idle delay.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000493e0 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenOffDelayBattery"/>ScreenOffDelayBattery (deprecated)</h3><span>Screen off delay when running on battery power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenOffDelayBattery</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is turned off when running on battery power.</p><p>When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS turns off the screen.</p><p>When this policy is set to zero, Chromium OS does not turn off the screen when the user becomes idle.</p><p>When this policy is unset, a default length of time is used.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than or equal the idle delay.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00057e40 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenLockDelayBattery"/>ScreenLockDelayBattery (deprecated)</h3><span>Screen lock delay when running on battery power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenLockDelayBattery</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is locked when running on battery power.</p><p>When this policy is set to a value greater than zero, it specifies the length of time that the user must remain idle before Chromium OS locks the screen.</p><p>When this policy is set to zero, Chromium OS does not lock the screen when the user becomes idle.</p><p>When this policy is unset, a default length of time is used.</p><p>The recommended way to lock the screen on idle is to enable screen locking on suspend and have Chromium OS suspend after the idle delay. This policy should only be used when screen locking should occur a significant amount of time sooner than suspend or when suspend on idle is not desired at all.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than the idle delay.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000927c0 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleWarningDelayBattery"/>IdleWarningDelayBattery (deprecated)</h3><span>Idle warning delay when running on battery power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleWarningDelayBattery</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 27</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which a warning dialogue is shown when running on battery power.</p><p>When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS shows a warning dialogue telling the user that the idle action is about to be taken.</p><p>When this policy is unset, no warning dialogue is shown.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than or equal to the idle delay.</p><p>The warning message is only shown if the idle action is to log out or shut down.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000850e8 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleDelayBattery"/>IdleDelayBattery (deprecated)</h3><span>Idle delay when running on battery power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleDelayBattery</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the idle action is taken when running on battery power.</p><p>When this policy is set, it specifies the length of time that the user must remain idle before Chromium OS takes the idle action, which can be configured separately.</p><p>When this policy is unset, a default length of time is used.</p><p>The policy value should be specified in milliseconds.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000927c0 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleAction"/>IdleAction (deprecated)</h3><span>Action to take when the idle delay is reached</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleAction</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Note that this policy is deprecated and will be removed in the future.</p><p>This policy provides a fallback value for the more specific IdleActionAC and IdleActionBattery policies. If this policy is set, its value gets used if the respective more specific policy is not set.</p><p>When this policy is unset, behaviour of the more specific policies remains unaffected.</p><ul><li>0 = Suspend</li><li>1 = Log the user out</li><li>2 = Shut down</li><li>3 = Do nothing</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleActionAC"/>IdleActionAC (deprecated)</h3><span>Action to take when the idle delay is reached while running on AC power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleActionAC</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, it specifies the action that Chromium OS takes when the user remains idle for the length of time given by the idle delay, which can be configured separately.</p><p>When this policy is unset, the default action is taken, which is suspend.</p><p>If the action is suspend, Chromium OS can be configured separately to either lock or not lock the screen before suspending.</p><ul><li>0 = Suspend</li><li>1 = Log the user out</li><li>2 = Shut down</li><li>3 = Do nothing</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="IdleActionBattery"/>IdleActionBattery (deprecated)</h3><span>Action to take when the idle delay is reached while running on battery power</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IdleActionBattery</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, it specifies the action that Chromium OS takes when the user remains idle for the length of time given by the idle delay, which can be configured separately.</p><p>When this policy is unset, the default action is taken, which is suspend.</p><p>If the action is suspend, Chromium OS can be configured separately to either lock or not lock the screen before suspending.</p><ul><li>0 = Suspend</li><li>1 = Log the user out</li><li>2 = Shut down</li><li>3 = Do nothing</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="LidCloseAction"/>LidCloseAction</h3><span>Action to take when the user closes the lid</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\LidCloseAction</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, it specifies the action that Chromium OS takes when the user closes the device's lid.</p><p>When this policy is unset, the default action is taken, which is suspend.</p><p>If the action is suspend, Chromium OS can be configured separately to either lock or not lock the screen before suspending.</p><ul><li>0 = Suspend</li><li>1 = Log the user out</li><li>2 = Shut down</li><li>3 = Do nothing</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PowerManagementUsesAudioActivity"/>PowerManagementUsesAudioActivity</h3><span>Specify whether audio activity affects power management</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PowerManagementUsesAudioActivity</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or is unset, the user is not considered to be idle while audio is playing. This prevents the idle timeout from being reached and the idle action from being taken. However, screen dimming, screen off and screen lock will be performed after the configured timeouts, irrespective of audio activity.</p><p>If this policy is set to false, audio activity does not prevent the user from being considered idle.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PowerManagementUsesVideoActivity"/>PowerManagementUsesVideoActivity</h3><span>Specify whether video activity affects power management</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PowerManagementUsesVideoActivity</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or is unset, the user is not considered to be idle while video is playing. This prevents the idle delay, screen dim delay, screen off delay and screen lock delay from being reached, and the corresponding actions from being taken.</p><p>If this policy is set to false, video activity does not prevent the user from being considered idle.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Video playing in Android apps is not taken into consideration, even if this policy is set to True.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PresentationScreenDimDelayScale"/>PresentationScreenDimDelayScale</h3><span>Percentage by which to scale the screen dim delay in presentation mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PresentationScreenDimDelayScale</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the percentage by which the screen dim delay is scaled when the device is in presentation mode.</p><p>If this policy is set, it specifies the percentage by which the screen dim delay is scaled when the device is in presentation mode. When the screen dim delay is scaled, the screen off, screen lock and idle delays get adjusted to maintain the same distances from the screen dim delay as originally configured.</p><p>If this policy is unset, a default scale factor is used.</p><p>This policy only takes effect if the PowerSmartDimEnabled is disabled. Otherwise, this policy is ignored because the screen dim delay is determined by a machine-learning model.</p><p>The scale factor must be 100% or more. Values that would make the screen dim delay in presentation mode shorter than the regular screen dim delay are not allowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000000c8 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AllowWakeLocks"/>AllowWakeLocks</h3><span>Allow wake locks</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowWakeLocks</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether wake locks are allowed. Wake locks can be requested by extensions via the power management extension API and by ARC apps.</p><p>If this policy is set to true or left not set, wake locks will be honoured for power management.</p><p>If this policy is set to false, wake lock requests will be ignored.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AllowScreenWakeLocks"/>AllowScreenWakeLocks</h3><span>Allow screen wake locks</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowScreenWakeLocks</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 28</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether screen wake locks are allowed. Screen wake locks can be requested by extensions via the power management extension API and by ARC apps.</p><p>If this policy is set to true or left not set, screen wake locks will be honoured for power management, unless AllowWakeLocks is set to false.</p><p>If this policy is set to false, screen wake lock requests will be demoted to system wake lock requests.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="UserActivityScreenDimDelayScale"/>UserActivityScreenDimDelayScale</h3><span>Percentage by which to scale the screen dim delay if the user becomes active after dimming</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UserActivityScreenDimDelayScale</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the percentage by which the screen dim delay is scaled when user activity is observed while the screen is dimmed or soon after the screen has been turned off.</p><p>If this policy is set, it specifies the percentage by which the screen dim delay is scaled when user activity is observed while the screen is dimmed or soon after the screen has been turned off. When the dim delay is scaled, the screen off, screen lock and idle delays get adjusted to maintain the same distances from the screen dim delay as originally configured.</p><p>If this policy is unset, a default scale factor is used.</p><p>This policy only takes effect if the PowerSmartDimEnabled policy is disabled. Otherwise, this policy is ignored because the screen dim delay is determined by a machine-learning model.</p><p>The scale factor must be 100% or more.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x000000c8 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="WaitForInitialUserActivity"/>WaitForInitialUserActivity</h3><span>Wait for initial user activity</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WaitForInitialUserActivity</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 32</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether power management delays and the session length limit should only start running after the first user activity has been observed in a session.</p><p>If this policy is set to True, power management delays and the session length limit do not start running until after the first user activity has been observed in a session.</p><p>If this policy is set to False or left unset, power management delays and the session length limit start running immediately on session start.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PowerManagementIdleSettings"/>PowerManagementIdleSettings</h3><span>Power management settings when the user becomes idle</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PowerManagementIdleSettings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 35</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls multiple settings for the power management strategy when the user becomes idle.</p><p>There are four types of action:
* The screen will be dimmed if the user remains idle for the time specified by |ScreenDim|.
* The screen will be turned off if the user remains idle for the time specified by |ScreenOff|.
* A warning dialogue will be shown if the user remains idle for the time specified by |IdleWarning|, telling the user that the idle action is about to be taken. The warning message is only shown if the idle action is to log out or shut down.
* The action specified by |IdleAction| will be taken if the user remains idle for the time specified by |Idle|.</p><p>For each of above actions, the delay should be specified in milliseconds, and needs to be set to a value greater than zero to trigger the corresponding action. In case the delay is set to zero, Chromium OS will not take the corresponding action.</p><p>For each of the above delays, when the length of time is unset, a default value will be used.</p><p>Note that |ScreenDim| values will be clamped to be less than or equal to |ScreenOff|, |ScreenOff| and |IdleWarning| will be clamped to be less than or equal to |Idle|.</p><p>|IdleAction| can be one of four possible actions:
* |Suspend|
* |Logout|
* |Shutdown|
* |DoNothing|</p><p>When the |IdleAction| is unset, the default action is taken, which is suspend.</p><p>There are also separate settings for AC power and battery.
</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;AC&quot;: {
&quot;description&quot;: &quot;Delays and actions to take when the device is idle and running on AC power&quot;,
&quot;id&quot;: &quot;PowerManagementDelays&quot;,
&quot;properties&quot;: {
&quot;Delays&quot;: {
&quot;properties&quot;: {
&quot;Idle&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the idle action is taken, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;IdleWarning&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which a warning dialog is shown, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;ScreenDim&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the screen is dimmed, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;ScreenOff&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the screen is turned off, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;IdleAction&quot;: {
&quot;description&quot;: &quot;Action to take when the idle delay is reached&quot;,
&quot;enum&quot;: [
&quot;Suspend&quot;,
&quot;Logout&quot;,
&quot;Shutdown&quot;,
&quot;DoNothing&quot;
],
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;Battery&quot;: {
&quot;$ref&quot;: &quot;PowerManagementDelays&quot;,
&quot;description&quot;: &quot;Delays and actions to take when the device is idle and running on battery&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PowerManagementIdleSettings = {
&quot;AC&quot;: {
&quot;IdleAction&quot;: &quot;DoNothing&quot;
},
&quot;Battery&quot;: {
&quot;Delays&quot;: {
&quot;Idle&quot;: 30000,
&quot;IdleWarning&quot;: 5000,
&quot;ScreenDim&quot;: 10000,
&quot;ScreenOff&quot;: 20000
},
&quot;IdleAction&quot;: &quot;DoNothing&quot;
}
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenLockDelays"/>ScreenLockDelays</h3><span>Screen lock delays</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenLockDelays</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 35</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the length of time without user input after which the screen is locked when running on AC power or battery.</p><p>When the length of time is set to a value greater than zero, it represents the length of time that the user must remain idle before Chromium OS locks the screen.</p><p>When the length of time is set to zero, Chromium OS does not lock the screen when the user becomes idle.</p><p>When the length of time is unset, a default length of time is used.</p><p>The recommended way to lock the screen on idle is to enable screen locking on suspend and have Chromium OS suspend after the idle delay. This policy should only be used when screen locking should occur a significant amount of time sooner than suspend or when suspend on idle is not desired at all.</p><p>The policy value should be specified in milliseconds. Values are clamped to be less than the idle delay.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;AC&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the screen is locked when running on AC power, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;Battery&quot;: {
&quot;description&quot;: &quot;The length of time without user input after which the screen is locked when running on battery, in milliseconds&quot;,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ScreenLockDelays = {
&quot;AC&quot;: 600000,
&quot;Battery&quot;: 300000
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PowerSmartDimEnabled"/>PowerSmartDimEnabled</h3><span>Enable smart dim model to extend the time until the screen is dimmed</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PowerSmartDimEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether a smart dim model is allowed to extend the time until the screen is dimmed.</p><p>When the screen is about to be dimmed, the smart dim model evaluates if dimming the screen should be deferred. If the smart dim model defers dimming the screen, it effectively extends the time until the screen is dimmed. In this case, the screen off, screen lock and idle delays get adjusted to maintain the same distances from the screen dim delay as originally configured.
If this policy is set to True or left not set, the smart dim model will be enabled and allowed to extend the time until the screen is dimmed. If this policy is set to False, the smart dim model will not influence screen dimming.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ScreenBrightnessPercent"/>ScreenBrightnessPercent</h3><span>Screen brightness per cent</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ScreenBrightnessPercent</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies screen brightness per cent.
When this policy is set, initial screen brightness is adjusted to the policy value, but the user can change it later on. Auto-brightness features are disabled.
When this policy is unset, user screen controls and auto-brightness features are not affected.
The policy values should be specified in per cents in the range 0-100.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;BrightnessAC&quot;: {
&quot;description&quot;: &quot;Screen brightness percent when running on AC power&quot;,
&quot;maximum&quot;: 100,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;BrightnessBattery&quot;: {
&quot;description&quot;: &quot;Screen brightness percent when running on battery power&quot;,
&quot;maximum&quot;: 100,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ScreenBrightnessPercent = {
&quot;BrightnessAC&quot;: 90,
&quot;BrightnessBattery&quot;: 75
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DevicePowerPeakShiftBatteryThreshold"/>DevicePowerPeakShiftBatteryThreshold</h3><span>Set power peak shift battery threshold in per cent</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DevicePowerPeakShiftBatteryThreshold</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set power peak shift battery threshold in per cent.</p><p>This policy is only used if DevicePowerPeakShiftEnabled is set to true.</p><p>If this policy is not configured or left unset, power peak shift will always be disabled.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:15</li><li>Maximum:100</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000014 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DevicePowerPeakShiftDayConfig"/>DevicePowerPeakShiftDayConfig</h3><span>Set power peak shift day config</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DevicePowerPeakShiftDayConfig</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set power peak shift day config.</p><p>This policy is only used if DevicePowerPeakShiftEnabled is set to true.</p><p>If this policy is not configured or left unset, power peak shift will always be disabled.</p><p>Note: Allowed values for minute field in start_time, end_time and charge_start_time are 0, 15, 30, 45.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;entries&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;charge_start_time&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
},
&quot;day&quot;: {
&quot;$ref&quot;: &quot;WeekDay&quot;
},
&quot;end_time&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
},
&quot;start_time&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DevicePowerPeakShiftDayConfig = {
&quot;entries&quot;: [
{
&quot;charge_start_time&quot;: {
&quot;hour&quot;: 20,
&quot;minute&quot;: 45
},
&quot;day&quot;: &quot;MONDAY&quot;,
&quot;end_time&quot;: {
&quot;hour&quot;: 15,
&quot;minute&quot;: 15
},
&quot;start_time&quot;: {
&quot;hour&quot;: 9,
&quot;minute&quot;: 0
}
},
{
&quot;charge_start_time&quot;: {
&quot;hour&quot;: 23,
&quot;minute&quot;: 45
},
&quot;day&quot;: &quot;FRIDAY&quot;,
&quot;end_time&quot;: {
&quot;hour&quot;: 21,
&quot;minute&quot;: 0
},
&quot;start_time&quot;: {
&quot;hour&quot;: 2,
&quot;minute&quot;: 30
}
}
]
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DevicePowerPeakShiftEnabled"/>DevicePowerPeakShiftEnabled</h3><span>Enable power peak shift</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DevicePowerPeakShiftEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the power peak shift power-management policy.</p><p>Peak shift is a power-saving policy that minimises alternating current usage during the peak usage times during the day. For each weekday, a start and end time to run in power peak shift mode can be set. During these times the system will run from the battery even if the alternating current is attached, as long as the battery stays above the threshold specified. After the end time specified, the system will run from alternating current if attached but will not charge the battery. The system will again function normally using alternating current and recharging the battery after the specified charge start time.</p><p>If this policy is set to true, and DevicePowerPeakShiftBatteryThreshold, DevicePowerPeakShiftDayConfig are set, then power peak shift will always be enabled if supported on the device.</p><p>If this policy is set to false, power peak shift will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, power peak shift is disabled initially and cannot be enabled by the user.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceBootOnAcEnabled"/>DeviceBootOnAcEnabled</h3><span>Enable boot on AC (alternating current)</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceBootOnAcEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the boot on AC power management policy.</p><p>Boot on AC provides an opportunity for system to automatically boot up from OFF/Hibernate state when line power is inserted.</p><p>If this policy is set to true then boot on AC will always be enabled if supported on the device.</p><p>If this policy is set to false, boot on AC will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, boot on AC is disabled and cannot be enabled by the user.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAdvancedBatteryChargeModeEnabled"/>DeviceAdvancedBatteryChargeModeEnabled</h3><span>Enable advanced battery charge mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAdvancedBatteryChargeModeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the advanced battery charge mode power management policy.</p><p>Advanced Battery Charging Mode allows the user to maximise the battery health. In Advanced Charging Mode the system will use standard charging algorithm and other techniques during non-work hours to maximise battery health. During work hours, an express charge is used. This express charge allows the battery to be charged faster; therefore, the battery is at full charge sooner. For each day, the time in which the system will be most heavily used is specified by the start time and the duration.</p><p>If this policy is set to true, and DeviceAdvancedBatteryChargeModeDayConfig is set, then advanced battery charge mode will always be enabled if supported on the device.</p><p>If this policy is set to false, advanced battery charge mode will always be disabled.</p><p>If you set this policy, users cannot change or override it.</p><p>If this policy is left unset, advanced battery charge mode is disabled and cannot be enabled by the user.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAdvancedBatteryChargeModeDayConfig"/>DeviceAdvancedBatteryChargeModeDayConfig</h3><span>Set advanced battery charge mode day config</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAdvancedBatteryChargeModeDayConfig</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set advanced battery charge mode day config.</p><p>This policy is only used if DeviceAdvancedBatteryChargeModeEnabled is set to true.</p><p>If this policy is not configured or left unset, advanced battery charge mode will always be disabled.</p><p>Note: charge_start_time must be less than charge_end_time.</p><p>Note: allowed values for minute field in charge_start_time and charge_end_time are 0, 15, 30, 45.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;entries&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;charge_end_time&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
},
&quot;charge_start_time&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
},
&quot;day&quot;: {
&quot;$ref&quot;: &quot;WeekDay&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceAdvancedBatteryChargeModeDayConfig = {
&quot;entries&quot;: [
{
&quot;charge_end_time&quot;: {
&quot;hour&quot;: 23,
&quot;minute&quot;: 0
},
&quot;charge_start_time&quot;: {
&quot;hour&quot;: 20,
&quot;minute&quot;: 30
},
&quot;day&quot;: &quot;TUESDAY&quot;
},
{
&quot;charge_end_time&quot;: {
&quot;hour&quot;: 6,
&quot;minute&quot;: 45
},
&quot;charge_start_time&quot;: {
&quot;hour&quot;: 4,
&quot;minute&quot;: 15
},
&quot;day&quot;: &quot;FRIDAY&quot;
}
]
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceBatteryChargeMode"/>DeviceBatteryChargeMode</h3><span>Battery charge mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceBatteryChargeMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies battery charge mode power management policy.</p><p>Dynamically control battery charging to minimise battery wear-out due to battery stress and extend battery life.</p><p>If custom battery charge mode is selected then DeviceBatteryChargeCustomStartCharging and DeviceBatteryChargeCustomStopCharging must be specified.</p><p>If this policy is set then battery charge mode will be applied if supported on the device.</p><p>If this policy is left unset and policy is supported on the device, the standard battery charge mode will be applied and cannot be changed by the user.</p><p>Note: DeviceAdvancedBatteryChargeModeEnabled overrides this policy if the former is specified.</p><ul><li>1 = Fully charge battery at a standard rate.</li><li>2 = Charge battery using fast charging technology.</li><li>3 = Charge battery for devices that are primarily connected to an external power source.</li><li>4 = Adaptive charge battery based on battery usage pattern.</li><li>5 = Charge battery while it is within a fixed range.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceBatteryChargeCustomStartCharging"/>DeviceBatteryChargeCustomStartCharging</h3><span>Set battery charge custom start charging in per cent</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceBatteryChargeCustomStartCharging</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set battery charge custom start charging in per cent.</p><p>Battery starts charging when it depletes the battery charge custom start charging value.</p><p>DeviceBatteryChargeCustomStartCharging must be less than DeviceBatteryChargeCustomStopCharging.</p><p>This policy is only used if DeviceBatteryChargeMode is set to custom.</p><p>If this policy is not configured or left unset, the standard battery charge mode will be applied.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:50</li><li>Maximum:95</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x0000003c (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceBatteryChargeCustomStopCharging"/>DeviceBatteryChargeCustomStopCharging</h3><span>Set battery charge custom stop charging in per cent</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceBatteryChargeCustomStopCharging</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Set battery charge custom stop charging in per cent.</p><p>Battery stops charging when it reaches the battery charge custom stop charging value.</p><p>DeviceBatteryChargeCustomStartCharging must be less than DeviceBatteryChargeCustomStopCharging.</p><p>This policy is only used if DeviceBatteryChargeMode is set to custom.</p><p>If this policy is not configured or left unset, the standard battery charge mode will be applied.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:55</li><li>Maximum:100</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x0000005a (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUsbPowerShareEnabled"/>DeviceUsbPowerShareEnabled</h3><span>Enable USB power share</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUsbPowerShareEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable the USB power share power management policy.</p><p>Certain devices have a specific USB port marked with a lightning bolt or battery icon that can be used to charge devices like a mobile phone using the system battery. This policy affects the charging behaviour of this port while the system is in the sleep and shutdown modes. This policy does not affect the other USB ports and the charging behaviour while the system is awake.</p><p>When awake, the USB port will always provide power.</p><p>When sleeping, if this policy is set to true, then power will be supplied to the USB port when the device is plugged into the wall charger or if the battery level is &gt; 50%. Otherwise no power is supplied.</p><p>When shut down, if this policy is set to true, then power will be supplied to the USB port when the device is plugged into the wall charger. Otherwise no power is supplied.</p><p>If this policy is left unset, the policy is enabled and cannot be disabled by the user.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Printing"/>Printing</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls printing settings.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintingEnabled"/>PrintingEnabled</h3><span>Enable printing</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PrintingEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PrintingEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PrintingEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">PrintingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 39</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables printing in Chromium and prevents users from changing this setting.</p><p>If this setting is enabled or not configured, users can print.</p><p>If this setting is disabled, users cannot print from Chromium. Printing is disabled in the wrench menu, extensions, JavaScript applications etc. It is still possible to print from plugins that bypass Chromium while printing. For example, certain Flash applications have the print option in their context menu, which is not covered by this policy.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on Android apps.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CloudPrintProxyEnabled"/>CloudPrintProxyEnabled</h3><span>Enable Google Cloud Print proxy</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CloudPrintProxyEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CloudPrintProxyEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 17</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium to act as a proxy between Google Cloud Print and legacy printers connected to the machine.</p><p>If this setting is enabled or not configured, users can enable the cloud print proxy by authentication with their Google Account.</p><p>If this setting is disabled, users cannot enable the proxy, and the machine will not be allowed to share it's printers with Google Cloud Print.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintingAllowedColorModes"/>PrintingAllowedColorModes</h3><span>Restrict printing colour mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PrintingAllowedColorModes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Sets printing to colour only, monochrome only or no colour mode restriction. Unset policy is treated as no restriction.</p><ul><li>&quot;any&quot; = Allow all colour modes</li><li>&quot;color&quot; = Colour printing only</li><li>&quot;monochrome&quot; = Monochrome printing only</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;monochrome&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintingAllowedDuplexModes"/>PrintingAllowedDuplexModes</h3><span>Restrict printing duplex mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PrintingAllowedDuplexModes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Restricts printing duplex mode. Unset policy and empty set are treated as no restriction.</p><ul><li>&quot;any&quot; = Allow all duplex modes</li><li>&quot;simplex&quot; = Simplex printing only</li><li>&quot;duplex&quot; = Duplex printing only</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;duplex&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintingColorDefault"/>PrintingColorDefault</h3><span>Default printing colour mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PrintingColorDefault</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Overrides default printing colour mode. If the mode is unavailable, this policy is ignored.</p><ul><li>&quot;color&quot; = Enable colour printing</li><li>&quot;monochrome&quot; = Enable monochrome printing</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;monochrome&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintingDuplexDefault"/>PrintingDuplexDefault</h3><span>Default printing duplex mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PrintingDuplexDefault</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Overrides default printing duplex mode. If the mode is unavailable, this policy is ignored.</p><ul><li>&quot;simplex&quot; = Enable simplex printing</li><li>&quot;short-edge&quot; = Enable short-edge duplex printing</li><li>&quot;long-edge&quot; = Enable long-edge duplex printing</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;long-edge&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="CloudPrintSubmitEnabled"/>CloudPrintSubmitEnabled</h3><span>Enable submission of documents to Google Cloud Print</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CloudPrintSubmitEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CloudPrintSubmitEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 17</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium to submit documents to Google Cloud Print for printing. NOTE: This only affects Google Cloud Print support in Chromium. It does not prevent users from submitting print jobs on websites.</p><p>If this setting is enabled or not configured, users can print to Google Cloud Print from the Chromium print dialogue.</p><p>If this setting is disabled, users cannot print to Google Cloud Print from the Chromium print dialogue</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DisablePrintPreview"/>DisablePrintPreview</h3><span>Disable Print Preview</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisablePrintPreview</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisablePrintPreview</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 18</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Show the system print dialogue instead of print preview.</p><p>When this setting is enabled, Chromium will open the system print dialogue instead of the built-in print preview when a user requests a page to be printed.</p><p>If this policy is not set or is set to false, print commands trigger the print preview screen.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintHeaderFooter"/>PrintHeaderFooter</h3><span>Print headers and footers</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PrintHeaderFooter</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PrintHeaderFooter</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PrintHeaderFooter</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li><li>Chromium (Linux, Mac, Windows) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Force 'headers and footers' to be on or off in the printing dialogue.</p><p>If the policy is unset, the user can decide whether to print headers and footers.</p><p>If the policy is set to false, 'Headers and footers' is not selected in the print preview dialogue and the user cannot change it.</p><p>If the policy is set to true, 'Headers and footers' is selected in the print preview dialogue and the user cannot change it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DefaultPrinterSelection"/>DefaultPrinterSelection</h3><span>Default printer selection rules</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultPrinterSelection</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DefaultPrinterSelection</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultPrinterSelection</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 48</li><li>Chromium OS (Chromium OS) since version 48</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Overrides Chromium default printer selection rules.</p><p>This policy determines the rules for selecting the default printer in Chromium which happens the first time that the print function is used with a profile.</p><p>When this policy is set, Chromium will attempt to find a printer matching all of the specified attributes, and select it as default printer. The first printer found matching the policy is selected; in case of non-unique match any matching printer can be selected, depending on the order printers are discovered.</p><p>If this policy is not set or matching printer is not found within the timeout, the printer defaults to built-in PDF printer or no printer selected, when PDF printer is not available.</p><p>Printers connected to Google Cloud Print are considered &quot;cloud&quot;; the rest of the printers are classified as &quot;local&quot;.
Omitting a field means all values match, for example, not specifying connectivity will cause Print Preview to initiate the discovery of all kinds of printers, local and cloud.
Regular expression patterns must follow the JavaScript RegExp syntax and matches are case sensitive.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on Android apps.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;idPattern&quot;: {
&quot;description&quot;: &quot;Regular expression to match printer id.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;kind&quot;: {
&quot;description&quot;: &quot;Whether to limit the search of the matching printer to a specific set of printers.&quot;,
&quot;enum&quot;: [
&quot;local&quot;,
&quot;cloud&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;namePattern&quot;: {
&quot;description&quot;: &quot;Regular expression to match printer display name.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;{ &quot;kind&quot;: &quot;cloud&quot;, &quot;idPattern&quot;: &quot;.*public&quot;, &quot;namePattern&quot;: &quot;.*Color&quot; }&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativePrinters"/>NativePrinters</h3><span>Native Printing</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NativePrinters</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures a list of printers.</p><p>This policy allows administrators to provide printer configurations for their users.</p><p>display_name and description are free-form strings that can be customised for ease of printer selection. manufacturer and model serve to ease printer identification by end users. They represent the manufacturer and model of the printer. uri should be an address reachable from a client computer including the scheme, port and queue. uuid is optional. If provided, it is used to help de-duplicate zeroconf printers.</p><p>Either effective_model should contain the name of the printer or autoconf should be set to true. The printers with both or without any properties will be ignored.</p><p>Printer setup is completed upon the first use of a printer. PPDs are not downloaded until the printer is used. After that time, frequently used PPDs are cached.</p><p>This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.</p><p>For Active Directory managed devices this policy supports expansion of ${MACHINE_NAME[,pos[,count]]} to the Active Directory machine name or a substring of it. For example, if the machine name is CHROMEBOOK, then ${MACHINE_NAME,6,4} would be replaced by the four characters starting after the sixth position, i.e. BOOK. Note that the position is zero-based.
</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;id&quot;: &quot;PrinterType&quot;,
&quot;properties&quot;: {
&quot;description&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;display_name&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;manufacturer&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;model&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;ppd_resource&quot;: {
&quot;id&quot;: &quot;PpdResource&quot;,
&quot;properties&quot;: {
&quot;autoconf&quot;: {
&quot;description&quot;: &quot;Boolean flag indicating whether IPP Everywhere should be used to set up the printer. This flag is supported on $2 version 76 and higher.&quot;,
&quot;type&quot;: &quot;boolean&quot;
},
&quot;effective_model&quot;: {
&quot;description&quot;: &quot;This field must match one of the strings which represent a $2 supported printer. The string will be used to identify and install the appropriate PPD for the printer. More information can be found at https://support.google.com/chrome?p=noncloudprint.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;uri&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;uuid&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NativePrinters\1 = &quot;{ &quot;display_name&quot;: &quot;Color Laser&quot;, &quot;description&quot;: &quot;The printer next to the water cooler.&quot;, &quot;manufacturer&quot;: &quot;Printer Manufacturer&quot;, &quot;model&quot;: &quot;Color Laser 2004&quot;, &quot;uri&quot;: &quot;ipps://print-server.intranet.example.com:443/ipp/cl2k4&quot;, &quot;uuid&quot;: &quot;1c395fdb-5d93-4904-b246-b2c046e79d12&quot;, &quot;ppd_resource&quot;: { &quot;effective_model&quot;: &quot;Printer Manufacturer ColorLaser2k4&quot;, &quot;autoconf&quot;: false } }&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativePrintersBulkConfiguration"/>NativePrintersBulkConfiguration</h3><span>Enterprise printer configuration file</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NativePrintersBulkConfiguration</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Provides configurations for enterprise printers.</p><p>This policy allows you to provide printer configurations to Chromium OS devices. The format is the same as the NativePrinters dictionary, with an additional required 'id' or 'guid' field per printer for whitelisting or blacklisting.</p><p>The size of the file must not exceed 5 MB and must be encoded in JSON. It is estimated that a file containing approximately 21,000 printers will encode as a 5 MB file. The cryptographic hash is used to verify the integrity of the download.</p><p>The file is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.</p><p>If this policy is set, Chromium OS will download the file for printer configurations and make printers available in accordance with NativePrintersBulkAccessMode, NativePrintersBulkWhitelist and NativePrintersBulkBlacklist.</p><p>If you set this policy, users cannot change or override it.</p><p>This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.
</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;hash&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NativePrintersBulkConfiguration = {
&quot;hash&quot;: &quot;deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef&quot;,
&quot;url&quot;: &quot;https://example.com/printerpolicy&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativePrintersBulkAccessMode"/>NativePrintersBulkAccessMode</h3><span>Printer configuration access policy.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NativePrintersBulkAccessMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls which printers from the NativePrintersBulkConfiguration are available to users.</p><p>Designates which access policy is used for bulk printer configuration. If AllowAll is selected, all printers are shown. If BlacklistRestriction is selected, NativePrintersBulkBlacklist is used to restrict access to the specified printers. If WhitelistPrintersOnly is selected, NativePrintersBulkWhitelist designates only those printers which are selectable.</p><p>If this policy is not set, AllowAll is assumed.
</p><ul><li>0 = All printers are shown except those in the blacklist.</li><li>1 = Only printers in the whitelist are shown to users</li><li>2 = Allow all printers from the configuration file.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativePrintersBulkBlacklist"/>NativePrintersBulkBlacklist</h3><span>Disabled enterprise printers</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NativePrintersBulkBlacklist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the printers which a user cannot use.</p><p>This policy is only used if BlacklistRestriction is chosen for NativePrintersBulkAccessMode.</p><p>If this policy is used, all printers are provided to the user except for the ids listed in this policy. The ids must correspond to the 'id' or 'guid' fields in the file specified in NativePrintersBulkConfiguration.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NativePrintersBulkBlacklist\1 = &quot;id1&quot;
Software\Policies\ChromiumOS\NativePrintersBulkBlacklist\2 = &quot;id2&quot;
Software\Policies\ChromiumOS\NativePrintersBulkBlacklist\3 = &quot;id3&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NativePrintersBulkWhitelist"/>NativePrintersBulkWhitelist</h3><span>Enabled enterprise printers</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NativePrintersBulkWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the printers which a user can use.</p><p>This policy is only used if WhitelistPrintersOnly is chosen for NativePrintersBulkAccessMode.</p><p>If this policy is used, only the printers with ids matching the values in this policy are available to the user. The ids must correspond to the 'id' or 'guid' fields in the file specified in NativePrintersBulkConfiguration.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NativePrintersBulkWhitelist\1 = &quot;id1&quot;
Software\Policies\ChromiumOS\NativePrintersBulkWhitelist\2 = &quot;id2&quot;
Software\Policies\ChromiumOS\NativePrintersBulkWhitelist\3 = &quot;id3&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceNativePrinters"/>DeviceNativePrinters</h3><span>Enterprise printer configuration file for devices</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceNativePrinters</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Provides configurations for enterprise printers bound to devices.</p><p>This policy allows you to provide printer configurations to Chromium OS devices. The format is the same as the NativePrinters dictionary, with an additional required 'id' or 'guid' field per printer for whitelisting or blacklisting.</p><p>The size of the file must not exceed 5 MB and must be encoded in JSON. It is estimated that a file containing approximately 21,000 printers will encode as a 5 MB file. The cryptographic hash is used to verify the integrity of the download.</p><p>The file is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.</p><p>If this policy is set, Chromium OS will download the file for printer configurations and make printers available in accordance with DeviceNativePrintersAccessMode, DeviceNativePrintersWhitelist and DeviceNativePrintersBlacklist.</p><p>This policy has no effect on whether users can configure printers on individual devices. It is intended to be supplementary to the configuration of printers by individual users.</p><p>This policy is additive to the NativePrintersBulkConfiguration.</p><p>If this policy is unset, there will be no device printers and the other DeviceNativePrinter* policies will be ignored.
</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;hash&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceNativePrinters = {
&quot;hash&quot;: &quot;deadbeefdeadbeefdeadbeefdeadbeefdeafdeadbeefdeadbeef&quot;,
&quot;url&quot;: &quot;https://example.com/printerpolicy&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceNativePrintersAccessMode"/>DeviceNativePrintersAccessMode</h3><span>Device printers configuration access policy.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceNativePrintersAccessMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls which printers from the DeviceNativePrinters are available to users.</p><p>Designates which access policy is used for bulk printer configuration. If AllowAll is selected, all printers are shown. If BlacklistRestriction is selected, DeviceNativePrintersBlacklist is used to restrict access to the specified printers. If WhitelistPrintersOnly is selected, DeviceNativePrintersWhitelist designates only those printers which are selectable.</p><p>If this policy is not set, AllowAll is assumed.
</p><ul><li>0 = All printers are shown except those in the blacklist.</li><li>1 = Only printers in the whitelist are shown to users</li><li>2 = Allow all printers from the configuration file.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceNativePrintersBlacklist"/>DeviceNativePrintersBlacklist</h3><span>Disabled enterprise device printers</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the printers which a user cannot use.</p><p>This policy is only used if BlacklistRestriction is chosen for DeviceNativePrintersAccessMode.</p><p>If this policy is used, all printers are provided to the user except for the ids listed in this policy. The ids must correspond to the 'id' or 'guid' fields in the file specified in DeviceNativePrinters.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist\1 = &quot;id1&quot;
Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist\2 = &quot;id2&quot;
Software\Policies\ChromiumOS\DeviceNativePrintersBlacklist\3 = &quot;id3&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceNativePrintersWhitelist"/>DeviceNativePrintersWhitelist</h3><span>Enabled enterprise device printers</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the printers which a user can use.</p><p>This policy is only used if WhitelistPrintersOnly is chosen for DeviceNativePrintersAccessMode</p><p>If this policy is used, only the printers with ids matching the values in this policy are available to the user. The ids must correspond to the 'id' or 'guid' fields in the file specified in DeviceNativePrinters.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist\1 = &quot;id1&quot;
Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist\2 = &quot;id2&quot;
Software\Policies\ChromiumOS\DeviceNativePrintersWhitelist\3 = &quot;id3&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PrintPreviewUseSystemDefaultPrinter"/>PrintPreviewUseSystemDefaultPrinter</h3><span>Use System Default Printer as Default</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PrintPreviewUseSystemDefaultPrinter</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PrintPreviewUseSystemDefaultPrinter</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Causes Chromium to use the system default printer as the default choice in Print Preview instead of the most recently used printer.</p><p>If you disable this setting or do not set a value, Print Preview will use the most recently used printer as the default destination choice.</p><p>If you enable this setting, Print Preview will use the OS system default printer as the default destination choice.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Proxy"/>Proxy server</h2><div style="margin-top: 20px; margin-bottom: 20px;">Allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings.
If you choose to never use a proxy server and always connect directly, all other options are ignored.
If you choose to auto detect the proxy server, all other options are ignored.
For detailed examples, visit:
https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett.
If you enable this setting, Chromium and ARC-apps, ignore all proxy-related options specified from the command line.
Leaving these policies unset will allow the users to choose the proxy settings on their own.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ProxyMode"/>ProxyMode</h3><span>Choose how to specify proxy server settings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Android:choice, Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ProxyMode</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ProxyMode</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ProxyMode</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ProxyMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings.</p><p>This policy only takes effect if the ProxySettings policy has not been specified.</p><p>If you choose to never use a proxy server and always connect directly, all other options are ignored.</p><p>If you choose to use system proxy settings, all other options are ignored.</p><p>If you choose to auto-detect the proxy server, all other options are ignored.</p><p>If you choose fixed server proxy mode, you can specify further options in 'Address or URL of proxy server' and 'Comma-separated list of proxy bypass rules'. Only the HTTP proxy server with the highest priority is available for ARC-apps.</p><p>If you choose to use a .pac proxy script, you must specify the URL to the script in 'URL to a proxy .pac file'.</p><p>For detailed examples, visit:
<a href="https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett">https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett</a>.</p><p>If you enable this setting, Chromium and ARC apps ignore all proxy-related options specified from the command line.</p><p>Leaving this policy not set will allow the users to choose the proxy settings on their own.</p><ul><li>&quot;direct&quot; = Never use a proxy</li><li>&quot;auto_detect&quot; = Auto detect proxy settings</li><li>&quot;pac_script&quot; = Use a .pac proxy script</li><li>&quot;fixed_servers&quot; = Use fixed proxy servers</li><li>&quot;system&quot; = Use system proxy settings</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honour:</p><p>If you choose to never use a proxy server, Android apps are informed that no proxy is configured.</p><p>If you choose to use system proxy settings or a fixed server proxy, Android apps are provided with the http proxy server address and port.</p><p>If you choose to auto detect the proxy server, the script URL &quot;<a href="http://wpad/wpad.dat">http://wpad/wpad.dat</a>&quot; is provided to Android apps. No other part of the proxy auto-detection protocol is used.</p><p>If you choose to use a .pac proxy script, the script URL is provided to Android apps.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;direct&quot;</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Proxy">Proxy</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ProxyServerMode"/>ProxyServerMode (deprecated)</h3><span>Choose how to specify proxy server settings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ProxyServerMode</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ProxyServerMode</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ProxyServerMode</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ProxyServerMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated, use ProxyMode instead.</p><p>Allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings.</p><p>This policy only takes effect if the ProxySettings policy has not been specified.</p><p>If you choose to never use a proxy server and always connect directly, all other options are ignored.</p><p>If you choose to use system proxy settings or auto-detect the proxy server, all other options are ignored.</p><p>If you choose manual proxy settings, you can specify further options in 'Address or URL of proxy server', 'URL to a proxy .pac file' and 'Comma-separated list of proxy bypass rules'. Only the HTTP proxy server with the highest priority is available for ARC-apps.</p><p>For detailed examples, visit:
<a href="https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett">https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett</a>.</p><p>If you enable this setting, Chromium ignores all proxy-related options specified from the command line.</p><p>Leaving this policy not set will allow the users to choose the proxy settings on their own.</p><ul><li>0 = Never use a proxy</li><li>1 = Auto detect proxy settings</li><li>2 = Manually specify proxy settings</li><li>3 = Use system proxy settings</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honour. See the ProxyMode policy for more details.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ProxyServer"/>ProxyServer</h3><span>Address or URL of proxy server</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ProxyServer</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ProxyServer</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ProxyServer</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ProxyServer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>You can specify the URL of the proxy server here.</p><p>This policy only takes effect if you have selected manual proxy settings at 'Choose how to specify proxy server settings' and if the ProxySettings policy has not been specified.</p><p>You should leave this policy not set if you have selected any other mode for setting proxy policies.</p><p>For more options and detailed examples, visit:
<a href="https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett">https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett</a>.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honour. See the ProxyMode policy for more details.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;123.123.123.123:8080&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ProxyPacUrl"/>ProxyPacUrl</h3><span>URL to a proxy .pac file</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ProxyPacUrl</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ProxyPacUrl</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ProxyPacUrl</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ProxyPacUrl</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>You can specify a URL to a proxy .pac file here.</p><p>This policy only takes effect if you have selected manual proxy settings at 'Choose how to specify proxy server settings' and if the ProxySettings policy has not been specified.</p><p>You should leave this policy not set if you have selected any other mode for setting proxy policies.</p><p>For detailed examples, visit:
<a href="https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett">https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett</a>.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honour. See the ProxyMode policy for more details.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://internal.site/example.pac&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ProxyBypassList"/>ProxyBypassList</h3><span>Proxy bypass rules</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ProxyBypassList</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ProxyBypassList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ProxyBypassList</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ProxyBypassList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Chromium will bypass any proxy for the list of hosts given here.</p><p>This policy only takes effect if you have selected manual proxy settings at 'Choose how to specify proxy server settings' and if the ProxySettings policy has not been specified.</p><p>You should leave this policy not set if you have selected any other mode for setting proxy policies.</p><p>For more detailed examples, visit:
<a href="https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett">https://www.chromium.org/developers/design-documents/network-settings#TOC-Command-line-options-for-proxy-sett</a>.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>You cannot force Android apps to use a proxy. A subset of proxy settings is made available to Android apps, which they may voluntarily choose to honour. See the ProxyMode policy for more details.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://www.example1.com,https://www.example2.com,https://internalsite/&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="QuickUnlock"/>Quick unlock</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configures quick unlock related policies.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="QuickUnlockModeWhitelist"/>QuickUnlockModeWhitelist</h3><span>Configure allowed quick unlock modes</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\QuickUnlockModeWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 56</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>A whitelist controlling which quick unlock modes the user can configure and use to unlock the lock screen.</p><p>This value is a list of strings; valid list entries are: 'all', 'PIN', 'FINGERPRINT'. Adding 'all' to the list means that every quick unlock mode is available to the user, including ones implemented in the future. Otherwise, only the quick unlock modes present in the list will be available.</p><p>For example, to allow every quick unlock mode, use ['all']. To allow only PIN unlock, use ['PIN']. To allow PIN and fingerprint, use ['PIN', 'FINGERPRINT']. To disable all quick unlock modes, use [].</p><p>By default, no quick unlock modes are available for managed devices.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\QuickUnlockModeWhitelist\1 = &quot;PIN&quot;</dd></dl></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#QuickUnlock">QuickUnlock</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="QuickUnlockTimeout"/>QuickUnlockTimeout</h3><span>Set how often user has to enter password to use quick unlock</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\QuickUnlockTimeout</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This setting controls how often the lock screen will request the password to be entered in order to continue using quick unlock. Each time the lock screen is entered, if the last password entry was more than this setting, the quick unlock will not be available on entering the lock screen. Should the user stay on the lock screen past this period of time, a password will be requested next time the user enters the wrong code, or re-enters the lock screen, whichever comes first.</p><p>If this setting is configured, users using quick unlock will be requested to enter their passwords on the lock screen depending on this setting.</p><p>If this setting is not configured, users using quick unlock will be requested to enter their password on the lock screen every day.</p><ul><li>0 = Password entry is required every six hours</li><li>1 = Password entry is required every twelve hours</li><li>2 = Password entry is required every two days (48 hours)</li><li>3 = Password entry is required every week (168 hours)</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PinUnlockMinimumLength"/>PinUnlockMinimumLength</h3><span>Set the minimum length of the lock screen PIN</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PinUnlockMinimumLength</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set, the configured minimal PIN length is enforced. (The absolute minimum PIN length is 1; values less than 1 are treated as 1.)</p><p>If the policy is not set, a minimal PIN length of 6 digits is enforced. This is the recommended minimum.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000006 (Windows)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#PinUnlock">PinUnlock</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PinUnlockMaximumLength"/>PinUnlockMaximumLength</h3><span>Set the maximum length of the lock screen PIN</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PinUnlockMaximumLength</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set, the configured maximal PIN length is enforced. A value of 0 or less means no maximum length; in that case, the user may set a PIN as long as they want. If this setting is less than PinUnlockMinimumLength but greater than 0, the maximum length is the same as the minimum length.</p><p>If the policy is not set, no maximum length is enforced.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PinUnlockWeakPinsAllowed"/>PinUnlockWeakPinsAllowed</h3><span>Enable users to set weak PINs for the lock screen PIN</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PinUnlockWeakPinsAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If false, users will be unable to set PINs which are weak and easy to guess.</p><p>Some example weak PINs: PINs containing only one digit (1111), PINs whose digits are increasing by 1 (1234), PINs whose digits are decreasing by 1 (4321) and PINs which are commonly used.</p><p>By default, users will get a warning, not error, if the PIN is considered weak.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="RemoteAccess"/>Remote access</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure remote access options in Chrome Remote Desktop host.
Chrome Remote Desktop host is a native service that runs on the target machine that a user can connect to using Chrome Remote Desktop application. The native service is packaged and executed separately from the Chromium browser.
These policies are ignored unless the Chrome Remote Desktop host is installed.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostClientDomain"/>RemoteAccessHostClientDomain (deprecated)</h3><span>Configure the required domain name for remote access clients</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostClientDomain</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostClientDomain</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostClientDomain</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 22</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Please use RemoteAccessHostClientDomainList instead.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;my-awesome-domain.com&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostClientDomainList"/>RemoteAccessHostClientDomainList</h3><span>Configure the required domain names for remote access clients</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostClientDomainList</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostClientDomainList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostClientDomainList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 60</li><li>Chromium OS (Chromium OS) since version 60</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the required client domain names that will be imposed on remote access clients and prevents users from changing it.</p><p>If this setting is enabled, then only clients from one of the specified domains can connect to the host.</p><p>If this setting is disabled or not set, then the default policy for the connection type is applied. For remote assistance, this allows clients from any domain to connect to the host; for anytime remote access, only the host owner can connect.</p><p>This setting will override RemoteAccessHostClientDomain, if present.</p><p>See also RemoteAccessHostDomainList.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\RemoteAccessHostClientDomainList\1 = &quot;my-awesome-domain.com&quot;
Software\Policies\Chromium\RemoteAccessHostClientDomainList\2 = &quot;my-auxiliary-domain.com&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\RemoteAccessHostClientDomainList\1 = &quot;my-awesome-domain.com&quot;
Software\Policies\ChromiumOS\RemoteAccessHostClientDomainList\2 = &quot;my-auxiliary-domain.com&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;my-awesome-domain.com&quot;,
&quot;my-auxiliary-domain.com&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;my-awesome-domain.com&lt;/string&gt;
&lt;string&gt;my-auxiliary-domain.com&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostFirewallTraversal"/>RemoteAccessHostFirewallTraversal</h3><span>Enable firewall traversal from remote access host</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostFirewallTraversal</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostFirewallTraversal</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostFirewallTraversal</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 14</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables usage of STUN servers when remote clients are trying to establish a connection to this machine.</p><p>If this setting is enabled, then remote clients can discover and connect to this machine even if they are separated by a firewall.</p><p>If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machines within the local network.</p><p>If this policy is not set, the setting will be enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostDomain"/>RemoteAccessHostDomain (deprecated)</h3><span>Configure the required domain name for remote access hosts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostDomain</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostDomain</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostDomain</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 22</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Please use RemoteAccessHostDomainList instead.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;my-awesome-domain.com&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostDomainList"/>RemoteAccessHostDomainList</h3><span>Configure the required domain names for remote access hosts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostDomainList</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostDomainList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostDomainList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 60</li><li>Chromium OS (Chromium OS) since version 60</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the required host domain names that will be imposed on remote access hosts and prevents users from changing it.</p><p>If this setting is enabled, then hosts can be shared only using accounts registered on one of the specified domain names.</p><p>If this setting is disabled or not set, then hosts can be shared using any account.</p><p>This setting will override RemoteAccessHostDomain, if present.</p><p>See also RemoteAccessHostClientDomainList.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\RemoteAccessHostDomainList\1 = &quot;my-awesome-domain.com&quot;
Software\Policies\Chromium\RemoteAccessHostDomainList\2 = &quot;my-auxiliary-domain.com&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\RemoteAccessHostDomainList\1 = &quot;my-awesome-domain.com&quot;
Software\Policies\ChromiumOS\RemoteAccessHostDomainList\2 = &quot;my-auxiliary-domain.com&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;my-awesome-domain.com&quot;,
&quot;my-auxiliary-domain.com&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;my-awesome-domain.com&lt;/string&gt;
&lt;string&gt;my-auxiliary-domain.com&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostTalkGadgetPrefix"/>RemoteAccessHostTalkGadgetPrefix</h3><span>Configure the TalkGadget prefix for remote access hosts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostTalkGadgetPrefix</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostTalkGadgetPrefix</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostTalkGadgetPrefix</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 22</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the TalkGadget prefix that will be used by remote access hosts and prevents users from changing it.</p><p>If specified, this prefix is prepended to the base TalkGadget name to create a full domain name for the TalkGadget. The base TalkGadget domain name is '.talkgadget.google.com'.</p><p>If this setting is enabled, then hosts will use the custom domain name when accessing the TalkGadget instead of the default domain name.</p><p>If this setting is disabled or not set, then the default TalkGadget domain name ('chromoting-host.talkgadget.google.com') will be used for all hosts.</p><p>Remote access clients are not affected by this policy setting. They will always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;chromoting-host&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostRequireCurtain"/>RemoteAccessHostRequireCurtain</h3><span>Enable curtaining of remote access hosts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostRequireCurtain</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostRequireCurtain</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostRequireCurtain</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 23</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables curtaining of remote access hosts while a connection is in progress.</p><p>If this setting is enabled, then hosts' physical input and output devices are disabled while a remote connection is in progress.</p><p>If this setting is disabled or not set, then both local and remote users can interact with the host when it is being shared.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostAllowClientPairing"/>RemoteAccessHostAllowClientPairing</h3><span>Enable or disable PIN-less authentication for remote access hosts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostAllowClientPairing</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostAllowClientPairing</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostAllowClientPairing</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 30</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled or not configured, then users can opt to pair clients and hosts at connection time, eliminating the need to enter a PIN every time.</p><p>If this setting is disabled, then this feature will not be available.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostAllowGnubbyAuth"/>RemoteAccessHostAllowGnubbyAuth</h3><span>Allow gnubby authentication for remote access hosts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostAllowGnubbyAuth</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostAllowGnubbyAuth</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostAllowGnubbyAuth</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 35</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, then gnubby authentication requests will be proxied across a remote host connection.</p><p>If this setting is disabled or not configured, gnubby authentication requests will not be proxied.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostAllowRelayedConnection"/>RemoteAccessHostAllowRelayedConnection</h3><span>Enable the use of relay servers by the remote access host</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostAllowRelayedConnection</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostAllowRelayedConnection</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostAllowRelayedConnection</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 36</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables usage of relay servers when remote clients are trying to establish a connection to this machine.</p><p>If this setting is enabled, then remote clients can use relay servers to connect to this machine when a direct connection is not available (e.g. due to firewall restrictions).</p><p>Note that if the policy RemoteAccessHostFirewallTraversal is disabled, this policy will be ignored.</p><p>If this policy is not set, the setting will be enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostUdpPortRange"/>RemoteAccessHostUdpPortRange</h3><span>Restrict the UDP port range used by the remote access host</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostUdpPortRange</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostUdpPortRange</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostUdpPortRange</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 36</li><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Restricts the UDP port range used by the remote access host in this machine.</p><p>If this policy is not set, or if it is set to an empty string, the remote access host will be allowed to use any available port, unless the policy RemoteAccessHostFirewallTraversal is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;12400-12409&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostMatchUsername"/>RemoteAccessHostMatchUsername</h3><span>Require that the name of the local user and the remote access host owner match</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostMatchUsername</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostMatchUsername</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux) since version 25</li><li>Chromium (Mac) since version 25</li><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, then the remote access host compares the name of the local user (that the host is associated with) and the name of the Google Account registered as the host owner (i.e. 'johndoe' if the host is owned by 'johndoe@example.com'Google Account). The remote access host will not start if the name of the host owner is different from the name of the local user that the host is associated with. RemoteAccessHostMatchUsername policy should be used together with RemoteAccessHostDomain to also enforce that the Google Account of the host owner is associated with a specific domain (i.e. 'example.com').</p><p>If this setting is disabled or not set, then the remote access host can be associated with any local user.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostTokenUrl"/>RemoteAccessHostTokenUrl</h3><span>URL where remote access clients should obtain their authentication token</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostTokenUrl</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostTokenUrl</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostTokenUrl</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 28</li><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set, the remote access host will require authenticating clients to obtain an authentication token from this URL in order to connect. Must be used in conjunction with RemoteAccessHostTokenValidationUrl.</p><p>This feature is currently disabled server-side.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://example.com/issue&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostTokenValidationUrl"/>RemoteAccessHostTokenValidationUrl</h3><span>URL for validating remote access client authentication token</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostTokenValidationUrl</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostTokenValidationUrl</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostTokenValidationUrl</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 28</li><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set, the remote access host will use this URL to validate authentication tokens from remote access clients, in order to accept connections. Must be used in conjunction with RemoteAccessHostTokenUrl.</p><p>This feature is currently disabled server-side.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://example.com/validate&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostTokenValidationCertificateIssuer"/>RemoteAccessHostTokenValidationCertificateIssuer</h3><span>Client certificate for connecting to RemoteAccessHostTokenValidationUrl</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostTokenValidationCertificateIssuer</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RemoteAccessHostTokenValidationCertificateIssuer</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostTokenValidationCertificateIssuer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 28</li><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set, the host will use a client certificate with the given issuer CN to authenticate to RemoteAccessHostTokenValidationUrl. Set it to '*' to use any available client certificate.</p><p>This feature is currently disabled server-side.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;Example Certificate Authority&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostAllowUiAccessForRemoteAssistance"/>RemoteAccessHostAllowUiAccessForRemoteAssistance</h3><span>Allow remote users to interact with elevated windows in remote assistance sessions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostAllowUiAccessForRemoteAssistance</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 55</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, the remote assistance host will be run in a process with uiAccess permissions. This will allow remote users to interact with elevated windows on the local user's desktop.</p><p>If this setting is disabled or not configured, the remote assistance host will run in the user's context and remote users cannot interact with elevated windows on the desktop.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RemoteAccessHostAllowFileTransfer"/>RemoteAccessHostAllowFileTransfer</h3><span>Allow remote access users to transfer files to/from the host</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RemoteAccessHostAllowFileTransfer</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RemoteAccessHostAllowFileTransfer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls the ability of a user connected to a remote access host to transfer files between the client and the host. This does not apply to remote assistance connections, which do not support file transfer.</p><p>If this setting is disabled, file transfer will not be allowed. If this setting is enabled or not set, file transfer will be allowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Attestation"/>Remote attestation</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure the remote attestation with TPM mechanism.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AttestationEnabledForDevice"/>AttestationEnabledForDevice</h3><span>Enable remote attestation for the device</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 28</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If true, remote attestation is allowed for the device and a certificate will automatically be generated and uploaded to the Device Management Server.</p><p>If it is set to false, or if it is not set, no certificate will be generated and calls to the enterprise.platformKeys extension API will fail.</p></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Attestation">Attestation</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AttestationEnabledForUser"/>AttestationEnabledForUser</h3><span>Enable remote attestation for the user</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AttestationEnabledForUser</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 28</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If true, the user can use the hardware on Chrome devices to remotely attest its identity to the privacy CA via the Enterprise Platform Keys API using chrome.enterprise.platformKeys.challengeUserKey().</p><p>If it is set to false, or if it is not set, calls to the API will fail with an error code.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AttestationExtensionWhitelist"/>AttestationExtensionWhitelist</h3><span>Extensions allowed to to use the remote attestation API</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AttestationExtensionWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 28</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy specifies the allowed extensions to use the Enterprise Platform Keys API function chrome.enterprise.platformKeys.challengeUserKey() for remote attestation. Extensions must be added to this list to use the API.</p><p>If an extension is not in the list, or the list is not set, the call to the API will fail with an error code.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\AttestationExtensionWhitelist\1 = &quot;ghdilpkmfbfdnomkmaiogjhjnggaggoi&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="AttestationForContentProtectionEnabled"/>AttestationForContentProtectionEnabled</h3><span>Enable the use of remote attestation for content protection for the device</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 31</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Chrome OS devices can use remote attestation (Verified Access) to get a certificate issued by the Chrome OS CA that asserts that the device is eligible to play protected content. This process involves sending hardware endorsement information to the Chrome OS CA which uniquely identifies the device.</p><p>If this setting is false, the device will not use remote attestation for content protection and the device may be unable to play protected content.</p><p>If this setting is true, or if it is not set, remote attestation may be used for content protection.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="SafeBrowsing"/>Safe Browsing settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure Safe Browsing related policies.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SafeBrowsingEnabled"/>SafeBrowsingEnabled</h3><span>Enable Safe Browsing</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SafeBrowsingEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SafeBrowsingEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SafeBrowsingEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SafeBrowsingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium's Safe Browsing feature and prevents users from changing this setting.</p><p>If you enable this setting, Safe Browsing is always active.</p><p>If you disable this setting, Safe Browsing is never active.</p><p>If you enable or disable this setting, users cannot change or override the 'Enable phishing and malware protection' setting in Chromium.</p><p>If this policy is left not set, this will be enabled but the user will be able to change it.</p><p>See <a href="https://developers.google.com/safe-browsing">https://developers.google.com/safe-browsing</a> for more info on Safe Browsing.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#SafeBrowsing">SafeBrowsing</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SafeBrowsingExtendedReportingEnabled"/>SafeBrowsingExtendedReportingEnabled</h3><span>Enable Safe Browsing Extended Reporting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SafeBrowsingExtendedReportingEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SafeBrowsingExtendedReportingEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SafeBrowsingExtendedReportingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 66</li><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium's Safe Browsing Extended Reporting and prevents users from changing this setting.</p><p>Extended Reporting sends some system information and page content to Google servers to help detect dangerous apps and sites.</p><p>If the setting is set to true, then reports will be created and sent whenever necessary (such as when a security interstitial is shown).</p><p>If the setting is set to false, reports will never be sent.</p><p>If this policy is set to true or false, the user will not be able to modify the setting.</p><p>If this policy is left unset, the user will be able to change the setting and decide whether to send reports or not.</p><p>See <a href="https://developers.google.com/safe-browsing">https://developers.google.com/safe-browsing</a> for more info on Safe Browsing.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SafeBrowsingExtendedReportingOptInAllowed"/>SafeBrowsingExtendedReportingOptInAllowed (deprecated)</h3><span>Allow users to opt in to Safe Browsing extended reporting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SafeBrowsingExtendedReportingOptInAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SafeBrowsingExtendedReportingOptInAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SafeBrowsingExtendedReportingOptInAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 44</li><li>Chromium OS (Chromium OS) since version 44</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This setting is deprecated – use SafeBrowsingExtendedReportingEnabled instead. Enabling or disabling SafeBrowsingExtendedReportingEnabled is equivalent to setting SafeBrowsingExtendedReportingOptInAllowed to False.</p><p>Setting this policy to false stops users from choosing to send some system information and page content to Google servers. If this setting is true or not configured, then users will be allowed to send some system information and page content to Safe Browsing to help detect dangerous apps and sites.</p><p>See <a href="https://developers.google.com/safe-browsing">https://developers.google.com/safe-browsing</a> for more info on Safe Browsing.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="SafeBrowsingWhitelistDomains"/>SafeBrowsingWhitelistDomains</h3><span>Configure the list of domains on which Safe Browsing will not trigger warnings.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SafeBrowsingWhitelistDomains</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SafeBrowsingWhitelistDomains</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SafeBrowsingWhitelistDomains</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 68</li><li>Chromium OS (Chromium OS) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configure the list of domains which Safe Browsing will trust. This means:
Safe Browsing will not check for dangerous resources (e.g. phishing, malware or unwanted software) if their URLs match these domains.
Safe Browsing's download protection service will not check downloads hosted on these domains.
Safe Browsing's password protection service will not check for password reuse if the page URL matches these domains.</p><p>If this setting is enabled, then Safe Browsing will trust these domains.
If this setting is disabled or not set, then default Safe Browsing protection is applied to all resources.
This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\SafeBrowsingWhitelistDomains\1 = &quot;mydomain.com&quot;
Software\Policies\Chromium\SafeBrowsingWhitelistDomains\2 = &quot;myuniversity.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\SafeBrowsingWhitelistDomains\1 = &quot;mydomain.com&quot;
Software\Policies\ChromiumOS\SafeBrowsingWhitelistDomains\2 = &quot;myuniversity.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;mydomain.com&quot;,
&quot;myuniversity.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;mydomain.com&lt;/string&gt;
&lt;string&gt;myuniversity.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PasswordProtectionWarningTrigger"/>PasswordProtectionWarningTrigger</h3><span>Password protection warning trigger</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PasswordProtectionWarningTrigger</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PasswordProtectionWarningTrigger</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PasswordProtectionWarningTrigger</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to control the triggering of password protection warning. Password protection alerts users when they reuse their protected password on potentially suspicious sites.</p><p>You can use 'PasswordProtectionLoginURLs' and 'PasswordProtectionChangePasswordURL' policies to configure which password to protect.</p><p>If this policy is set to 'PasswordProtectionWarningOff', no password protection warning will be shown.
If this policy is set to 'PasswordProtectionWarningOnPasswordReuse', password protection warning will be shown when the user reuses their protected password on a non-whitelisted site.
If this policy is set to 'PasswordProtectionWarningOnPhishingReuse', password protection warning will be shown when the user reuses their protected password on a phishing site.
If this policy is left unset, password protection service will only protect Google passwords but the user will be able to change this setting.</p><ul><li>0 = Password protection warning is off</li><li>1 = Password protection warning is triggered by password reuse</li><li>2 = Password protection warning is triggered by password reuse on phishing page</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#PasswordProtection">PasswordProtection</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PasswordProtectionLoginURLs"/>PasswordProtectionLoginURLs</h3><span>Configure the list of enterprise login URLs where password protection service should capture fingerprint of password.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PasswordProtectionLoginURLs</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PasswordProtectionLoginURLs</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PasswordProtectionLoginURLs</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configure the list of enterprise login URLs (HTTP and HTTPS schemes only). Fingerprint of password will be captured on these URLs and used for password reuse detection.
In order for Chromium to correctly capture password fingerprints, please make sure that your login pages follow the guidelines on <a href="https://www.chromium.org/developers/design-documents/create-amazing-password-forms">https://www.chromium.org/developers/design-documents/create-amazing-password-forms</a>.</p><p>If this setting is enabled, then password protection service will capture fingerprint of password on these URLs for password reuse detection purpose.
If this setting is disabled or not set, then password protection service will only capture password fingerprint on <a href="https://accounts.google.com">https://accounts.google.com</a>.
This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PasswordProtectionLoginURLs\1 = &quot;https://mydomain.com/login.html&quot;
Software\Policies\Chromium\PasswordProtectionLoginURLs\2 = &quot;https://login.mydomain.com&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PasswordProtectionLoginURLs\1 = &quot;https://mydomain.com/login.html&quot;
Software\Policies\ChromiumOS\PasswordProtectionLoginURLs\2 = &quot;https://login.mydomain.com&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://mydomain.com/login.html&quot;,
&quot;https://login.mydomain.com&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://mydomain.com/login.html&lt;/string&gt;
&lt;string&gt;https://login.mydomain.com&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="PasswordProtectionChangePasswordURL"/>PasswordProtectionChangePasswordURL</h3><span>Configure the change password URL.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PasswordProtectionChangePasswordURL</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PasswordProtectionChangePasswordURL</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PasswordProtectionChangePasswordURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configure the change password URL (HTTP and HTTPS schemes only). Password protection service will send users to this URL to change their password after seeing a warning in the browser.
In order for Chromium to correctly capture the new password fingerprint on this change password page, please make sure that your change password page follows the guidelines on <a href="https://www.chromium.org/developers/design-documents/create-amazing-password-forms">https://www.chromium.org/developers/design-documents/create-amazing-password-forms</a>.</p><p>If this setting is enabled, then password protection service will send users to this URL to change their password after seeing a warning in the browser.
If this setting is disabled or not set, then password protection service will send users to <a href="https://myaccounts.google.com">https://myaccounts.google.com</a> to change their password.
This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://mydomain.com/change_password.html&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Signin"/>Sign-in settings</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls the behaviour of the sign-in screen, where users log in to their accounts. Settings include who can log in, what type of accounts are allowed, what authentication methods should be used, as well as general accessibility, input method and locale settings.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceGuestModeEnabled"/>DeviceGuestModeEnabled</h3><span>Enable guest mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceGuestModeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or not configured, Chromium OS will enable guest logins. Guest logins are anonymous user sessions and do not require a password.</p><p>If this policy is set to false, Chromium OS will not allow guest sessions to be started.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceUserWhitelist"/>DeviceUserWhitelist</h3><span>Login user white list</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceUserWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Defines the list of users that are allowed to log in to the device. Entries are of the form user@domain, such as madmax@managedchrome.com. To allow arbitrary users on a domain, use entries of the form *@domain.</p><p>If this policy is not configured, there are no restrictions on which users are allowed to sign in. Note that creating new users still requires the DeviceAllowNewUsers policy to be configured appropriately.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy controls who may start a Chromium OS session. It does not prevent users from signing in to additional Google accounts within Android. If you want to prevent this, configure the Android-specific accountTypesWithManagementDisabled policy as part of ArcPolicy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceUserWhitelist\1 = &quot;madmax@managedchrome.com&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceAllowNewUsers"/>DeviceAllowNewUsers</h3><span>Allow creation of new user accounts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceAllowNewUsers</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls whether Chromium OS allows new user accounts to be created. If this policy is set to false, users that do not have an account already will not be able to log in.</p><p>If this policy is set to true or not configured, new user accounts will be allowed to be created provided that DeviceUserWhitelist does not prevent the user from logging in.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy controls whether new users can be added to Chromium OS. It does not prevent users from signing in to additional Google accounts within Android. If you want to prevent this, configure the Android-specific accountTypesWithManagementDisabled policy as part of ArcPolicy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenDomainAutoComplete"/>DeviceLoginScreenDomainAutoComplete</h3><span>Enable domain name autocomplete during user sign in</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenDomainAutoComplete</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 44</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to a blank string or not configured, Chromium OS will not show an auto-complete option during user sign-in flow.
If this policy is set to a string representing a domain name, Chromium OS will show an auto-complete option during user sign-in allowing the user to type in only their user name without the domain name extension. The user will be able to overwrite this domain name extension.
If the value of the policy is not a valid domain, the policy will not be applied.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;students.school.edu&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceShowUserNamesOnSignin"/>DeviceShowUserNamesOnSignin</h3><span>Show usernames on login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceShowUserNamesOnSignin</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or not configured, Chromium OS will show existing users on the login screen and allow to pick one.</p><p>If this policy is set to false, Chromium OS will not show existing users on the login screen. The normal sign-in screen (prompting for the user email and password or phone) or the SAML interstitial screen (if enabled via the LoginAuthenticationBehavior policy) will be shown, unless a Managed Session is configured. When a Managed Session is configured, only the Managed Session accounts will be shown, allowing to pick one of them.</p><p>Note that this policy does not affect whether the device keeps or discards the local user data.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceWallpaperImage"/>DeviceWallpaperImage</h3><span>Device wallpaper image</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceWallpaperImage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configure device-level wallpaper image that is shown on the login screen if no user has yet signed in to the device. The policy is set by specifying the URL from which the Chrome OS device can download the wallpaper image and a cryptographic hash used to verify the integrity of the download. The image must be in JPEG format and its file size must not exceed 16 MB. The URL must be accessible without any authentication. The wallpaper image is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.</p><p>If the device wallpaper policy is set, the Chrome OS device will download and use the wallpaper image on the login screen if no user has yet signed in to the device. Once the user logs in, the user's wallpaper policy kicks in.</p><p>If the device wallpaper policy is left not set, it's the user's wallpaper policy to decide what to show if the user's wallpaper policy is set.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;hash&quot;: {
&quot;description&quot;: &quot;The SHA-256 hash of the wallpaper image.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;description&quot;: &quot;The URL from which the wallpaper image can be downloaded.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceWallpaperImage = {
&quot;hash&quot;: &quot;1337c0ded00d84b1dbadf00dd15ea5eb000deaddeaddeaddeaddeaddeaddead0&quot;,
&quot;url&quot;: &quot;https://example.com/device_wallpaper.jpg&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceEphemeralUsersEnabled"/>DeviceEphemeralUsersEnabled</h3><span>Wipe user data on sign-out</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceEphemeralUsersEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Determines whether Chromium OS keeps local account data after logout. If set to true, no persistent accounts are kept by Chromium OS and all data from the user session will be discarded after logout. If this policy is set to false or not configured, the device may keep (encrypted) local user data.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="LoginAuthenticationBehavior"/>LoginAuthenticationBehavior</h3><span>Configure the login authentication behaviour</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 51</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, the login authentication flow will happen in one of the following ways depending on the value of the setting:</p><p>If set to GAIA, login will be done via the normal GAIA authentication flow.</p><p>If set to SAML_INTERSTITIAL, login will show an interstitial screen offering the user the option to go forward with authentication via the SAML IdP of the device's enrolment domain or go back to the normal GAIA login flow.</p><ul><li>0 = Authentication via the default GAIA flow</li><li>1 = Redirect to SAML IdP after user confirmation</li></ul></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceTransferSAMLCookies"/>DeviceTransferSAMLCookies</h3><span>Transfer SAML IdP cookies during login</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 38</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether authentication cookies set by a SAML IdP during login should be transferred to the user's profile.</p><p>When a user authenticates via a SAML IdP during login, cookies set by the IdP are written to a temporary profile at first. These cookies can be transferred to the user's profile to carry forward the authentication state.</p><p>When this policy is set to true, cookies set by the IdP are transferred to the user's profile every time they authenticate against the SAML IdP during login.</p><p>When this policy is set to false or unset, cookies set by the IdP are transferred to the user's profile during their first login on a device only.</p><p>This policy affects users whose domain matches the device's enrolment domain only. For all other users, cookies set by the IdP are transferred to the user's profile during their first login on the device only.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Cookies transferred to the user's profile are not accessible to Android apps.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="LoginVideoCaptureAllowedUrls"/>LoginVideoCaptureAllowedUrls</h3><span>URLs that will be granted access to video capture devices on SAML login pages</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 52</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Patterns in this list will be matched against the security
origin of the requesting URL. If a match is found, access to video
capture devices will be granted on SAML login pages. If no match is
found, access will be automatically denied. Wildcard patterns are not
allowed.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenExtensions"/>DeviceLoginScreenExtensions</h3><span>Configure the list of installed apps on the login screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenExtensions</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 60</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
Specifies a list of apps that are installed silently on the login screen, without user interaction, and which cannot be uninstalled.
All permissions requested by the apps are granted implicitly, without user interaction, including any additional permissions requested by future versions of the app.</p><p>Note that, for security and privacy reasons, extensions are not allowed to be installed using this policy. Moreover, the devices on the Stable channel will only install the apps that belong to the white list bundled into Chromium. Any items that don't conform to these conditions will be ignored.</p><p>If an app that had previously been force-installed is removed from this list, it is automatically uninstalled by Chromium.</p><p>Each list item of the policy is a string that contains an extension ID and an 'update' URL separated by a semi-colon (;). The extension ID is the 32-letter string found, e.g. on chrome://extensions when in developer mode. The 'update' URL should point to an Update Manifest XML document as described at <a href="https://developer.chrome.com/extensions/autoupdate">https://developer.chrome.com/extensions/autoupdate</a>. Note that the 'update' URL set in this policy is only used for the initial installation; subsequent updates of the extension employ the update URL indicated in the extension's manifest.</p><p>For example, gbchcmhmhahfdphkhkmpfmihenigjmpp;<a href="https://clients2.google.com/service/update2/crx">https://clients2.google.com/service/update2/crx</a> installs the Chrome Remote Desktop app from the standard Chrome Web Store 'update' URL. For more information about hosting extensions, see: <a href="https://developer.chrome.com/extensions/hosting">https://developer.chrome.com/extensions/hosting</a>.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceLoginScreenExtensions\1 = &quot;gbchcmhmhahfdphkhkmpfmihenigjmpp;https://clients2.google.com/service/update2/crx&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenLocales"/>DeviceLoginScreenLocales</h3><span>Device sign-in screen locale</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenLocales</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 58</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the locale which is enforced on the Chromium OS sign-in screen.</p><p>If this policy is set, the sign-in screen will always be displayed in the locale which is given by the first value of this policy (the policy is defined as a list for forward compatibility). If this policy is not set or is set to an empty list, the sign-in screen will be displayed in the locale of the last user session. If this policy is set to a value which is not a valid locale, the sign-in screen will be displayed in a fallback locale (currently, en-US).</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceLoginScreenLocales\1 = &quot;en-US&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenInputMethods"/>DeviceLoginScreenInputMethods</h3><span>Device sign-in screen keyboard layouts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenInputMethods</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 58</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures which keyboard layouts are allowed on the Chromium OS sign-in screen.</p><p>If this policy is set to a list of input method identifiers, the given input methods will be available on the sign-in screen. The first given input method will be preselected. While a user pod is focused on the sign-in screen, the user's last used input method will be available in addition to the input methods given by this policy. If this policy is not set, the input methods on the sign-in screen will be derived from the locale in which the sign-in screen is displayed. Values which are not valid input method identifiers will be ignored.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceLoginScreenInputMethods\1 = &quot;xkb:us::en&quot;
Software\Policies\ChromiumOS\DeviceLoginScreenInputMethods\2 = &quot;xkb:ch::ger&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceSecondFactorAuthentication"/>DeviceSecondFactorAuthentication</h3><span>Integrated second factor authentication mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies how the on-board secure element hardware can be used to provide a second-factor authentication if it is compatible with this feature. The machine power button is used to detect the user physical presence.</p><p>If 'Disabled' is selected, no second factor is provided.</p><p>If 'U2F' is selected, the integrated second factor will behave according the FIDO U2F specification.</p><p>If 'U2F_EXTENDED' is selected, the integrated second factor will provide the U2F functions plus some extensions for individual attestation.</p><ul><li>1 = Second factor disabled</li><li>2 = U2F (Universal Second Factor)</li><li>3 = U2F plus extensions for individual attestation</li></ul></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenIsolateOrigins"/>DeviceLoginScreenIsolateOrigins</h3><span>Enable Site Isolation for specified origins</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenIsolateOrigins</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
This policy applies to the sign-in screen. Please see also the IsolateOrigins policy which applies to the user session.
If the policy is enabled, each of the named origins in a comma-separated list will run in its own process. This will also isolate origins named by sub-domains; e.g. specifying <a href="https://example.com/">https://example.com/</a> will also cause <a href="https://foo.example.com/">https://foo.example.com/</a> to be isolated as part of the <a href="https://example.com/">https://example.com/</a> site.
If the policy is not configured or disabled, the platform default site isolation settings will be used for the sign-in screen.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://example.com/,https://othersite.org/&quot;</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#LoginScreenOrigins">LoginScreenOrigins</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceLoginScreenAutoSelectCertificateForUrls"/>DeviceLoginScreenAutoSelectCertificateForUrls</h3><span>Automatically select client certificates for these sites on the sign-in screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLoginScreenAutoSelectCertificateForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify a list of URL patterns that specify sites for which a client certificate is automatically selected on the sign-in screen in the frame hosting the SAML flow, if the site requests a certificate. An example usage is to configure a device-wide certificate to be presented to the SAML IdP.</p><p>The value must be an array of stringified JSON dictionaries. Each dictionary must have the form { 'pattern': '$URL_PATTERN, 'filter' : $FILTER }, where $URL_PATTERN is a content setting pattern. $FILTER restricts from which client certificates the browser will automatically select. Independent of the filter, only certificates will be selected that match the server's certificate request. If $FILTER has the form { 'ISSUER': { 'CN': '$ISSUER_CN' } }, additionally only client certificates are selected that are issued by a certificate with the CommonName $ISSUER_CN. If $FILTER is the empty dictionary {}, the selection of client certificates is not additionally restricted.</p><p>If this policy is left not set, no auto-selection will be done for any site.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;filter&quot;: {
&quot;properties&quot;: {
&quot;ISSUER&quot;: {
&quot;properties&quot;: {
&quot;CN&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;pattern&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceLoginScreenAutoSelectCertificateForUrls\1 = &quot;{&quot;pattern&quot;:&quot;https://www.example.com&quot;,&quot;filter&quot;:{&quot;ISSUER&quot;:{&quot;CN&quot;:&quot;certificate issuer name&quot;}}}&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="Startup"/>Startup, Home page and New Tab page</h2><div style="margin-top: 20px; margin-bottom: 20px;">Configure the pages to load on startup, the default home page and the default new tab page in Chromium and prevents users from changing them.
The user's home page settings are only completely locked down if you either select the home page to be the new tab page, or set it to be a URL and specify a home page URL. If you don't specify the home page URL, then the user is still able to set the home page to the new tab page by specifying 'chrome://newtab'.
The policy 'URLs to open on startup' is ignored unless you select 'Open a list of URLs' in 'Action on startup'.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ShowHomeButton"/>ShowHomeButton</h3><span>Show Home button on the toolbar</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ShowHomeButton</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ShowHomeButton</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ShowHomeButton</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Shows the Home button on Chromium's toolbar.</p><p>If you enable this setting, the Home button is always shown.</p><p>If you disable this setting, the Home button is never shown.</p><p>If you enable or disable this setting, users cannot change or override this setting in Chromium.</p><p>Leaving this policy unset will allow the user to choose whether to show the home button.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="HomepageLocation"/>HomepageLocation</h3><span>Configure the home page URL</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\HomepageLocation</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\HomepageLocation</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">HomepageLocation</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the default homepage URL in Chromium and prevents users from changing it.</p><p>The homepage is the page opened by the Home button. The pages that open on start-up are controlled by the RestoreOnStartup policies.</p><p>The homepage type can either be set to a URL that you specify here or set to the new tab page. If you select the new tab page, then this policy does not take effect.</p><p>If you enable this setting, users cannot change their homepage URL in Chromium, but they can still choose the new tab page as their homepage.</p><p>Leaving this policy not set will also allow the user to choose their own homepage if HomepageIsNewTabPage is not set.</p><p>The URL must have a standard scheme, e.g. '<a href="http://example.com'">http://example.com'</a> or '<a href="https://example.com'">https://example.com'</a>.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://www.chromium.org&quot;</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#Homepage">Homepage</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="HomepageIsNewTabPage"/>HomepageIsNewTabPage</h3><span>Use New Tab Page as homepage</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\HomepageIsNewTabPage</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\HomepageIsNewTabPage</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">HomepageIsNewTabPage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the type of the default homepage in Chromium and prevents users from changing homepage preferences. The homepage can either be set to a URL that you specify, or set to the new tab page.</p><p>If you enable this setting, the new tab page is always used for the homepage, and the homepage URL location is ignored.</p><p>If you disable this setting, the user's homepage will never be the new tab page, unless its URL is set to 'chrome://newtab'.</p><p>If you enable or disable this setting, users cannot change their homepage type in Chromium.</p><p>Leaving this policy not set will allow the user to choose whether the new tab page is their homepage on their own.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="NewTabPageLocation"/>NewTabPageLocation</h3><span>Configure the New Tab page URL</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NewTabPageLocation</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NewTabPageLocation</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NewTabPageLocation</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 58</li><li>Chromium OS (Chromium OS) since version 58</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the default new tab page URL and prevents users from changing it.</p><p>The new tab page is the page opened when new tabs are created (including the one opened in new windows).</p><p>This policy does not decide which pages are to be opened on start up. Those are controlled by the RestoreOnStartup policies. Yet this policy does affect the homepage if that is set to open the new tab page, as well as the start-up page if that is set to open the new tab page.</p><p>If the policy is not set or left empty the default new tab page is used.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://www.chromium.org&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RestoreOnStartup"/>RestoreOnStartup</h3><span>Action on start-up</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RestoreOnStartup</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RestoreOnStartup</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RestoreOnStartup</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to specify the behaviour on start-up.</p><p>If you choose 'Open new tab page' the new tab page will always be opened when you start Chromium.</p><p>If you choose 'Restore the last session', the URLs that were open last time Chromium was closed will be re-opened and the browsing session will be restored as it was left.
Choosing this option disables some settings that rely on sessions or that perform actions on exit (such as Clear browsing data on exit or session-only cookies).</p><p>If you choose 'Open a list of URLs', the list of 'URLs to open on start-up' will be opened when a user starts Chromium.</p><p>If you enable this setting, users cannot change or override it in Chromium.</p><p>Disabling this setting is equivalent to leaving it not configured. The user will still be able to change it in Chromium.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p><ul><li>5 = Open New Tab Page</li><li>1 = Restore the last session</li><li>4 = Open a list of URLs</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000004 (Windows), 4 (Linux), 4 (Mac)</dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#RestoreOnStartup">RestoreOnStartup</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="RestoreOnStartupURLs"/>RestoreOnStartupURLs</h3><span>URLs to open on start-up</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RestoreOnStartupURLs</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RestoreOnStartupURLs</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RestoreOnStartupURLs</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If 'Open a list of URLs' is selected as the start-up action, this allows you to specify the list of URLs that are opened. If left not set, no URL will be opened on start up.</p><p>This policy only works if the 'RestoreOnStartup' policy is set to 'RestoreOnStartupIsURLs'.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\RestoreOnStartupURLs\1 = &quot;https://example.com&quot;
Software\Policies\Chromium\RestoreOnStartupURLs\2 = &quot;https://www.chromium.org&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\RestoreOnStartupURLs\1 = &quot;https://example.com&quot;
Software\Policies\ChromiumOS\RestoreOnStartupURLs\2 = &quot;https://www.chromium.org&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://example.com&quot;,
&quot;https://www.chromium.org&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://example.com&lt;/string&gt;
&lt;string&gt;https://www.chromium.org&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h2><a name="UserAndDeviceReporting"/>User and device reporting</h2><div style="margin-top: 20px; margin-bottom: 20px;">Controls what kind of user and device information is reported.</div><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceVersionInfo"/>ReportDeviceVersionInfo</h3><span>Report OS and firmware version</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 18</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report OS and firmware version of enrolled devices.</p><p>If this setting is not set or set to True, enrolled devices will report the OS and firmware version periodically. If this setting is set to False, version info will not be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd><dt style="font-weight: bold;">Policy atomic group:</dt><dd>This policy is part of the following atomic group (only policies from the highest priority source present in the group are applied) : <a href="./policy-list-3/atomic_groups#UserAndDeviceReporting">UserAndDeviceReporting</a></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceBootMode"/>ReportDeviceBootMode</h3><span>Report device boot mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 18</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report the state of the device's dev switch at boot.</p><p>If the policy is set to false, the state of the dev switch will not be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceUsers"/>ReportDeviceUsers</h3><span>Report device users</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 32</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report list of device users that have recently logged in.</p><p>If the policy is set to false, the users will not be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceActivityTimes"/>ReportDeviceActivityTimes</h3><span>Report device activity times</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 18</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report device activity times.</p><p>If this setting is not set or set to True, enrolled devices will report time periods when a user is active on the device. If this setting is set to False, device activity times will not be recorded or reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceNetworkInterfaces"/>ReportDeviceNetworkInterfaces</h3><span>Report device network interfaces</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report list of network interfaces with their types and hardware addresses to the server.</p><p>If the policy is set to false, the interface list will not be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceHardwareStatus"/>ReportDeviceHardwareStatus</h3><span>Report hardware status</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report hardware statistics such as CPU/RAM usage.</p><p>If the policy is set to false, the statistics will not be reported.
If set to true or left unset, statistics will be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceSessionStatus"/>ReportDeviceSessionStatus</h3><span>Report information about active kiosk sessions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report information about the active kiosk session, such as
application ID and version.</p><p>If the policy is set to false, the kiosk session information will not be
reported. If set to true or left unset, kiosk session information will be
reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceBoardStatus"/>ReportDeviceBoardStatus</h3><span>Report board status</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report hardware statistics for SoC components.</p><p>If the policy is set to false, the statistics will not be reported.
If set to true or left unset, statistics will be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDevicePowerStatus"/>ReportDevicePowerStatus</h3><span>Report power status</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report hardware statistics and identifiers related to power.</p><p>If the policy is set to false, the statistics will not be reported.
If set to true or left unset, statistics will be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportDeviceStorageStatus"/>ReportDeviceStorageStatus</h3><span>Report storage status</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Report hardware statistics and identifiers for storage devices.</p><p>If the policy is set to false, the statistics will not be reported.
If set to true or left unset, statistics will be reported.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportUploadFrequency"/>ReportUploadFrequency</h3><span>Frequency of device status report uploads</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 42</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>How frequently device status uploads are sent, in milliseconds.</p><p>If this policy is unset, the default frequency is 3 hours. The minimum
allowed frequency is 60 seconds.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:60000</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="ReportArcStatusEnabled"/>ReportArcStatusEnabled</h3><span>Report information about status of Android</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 55</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Information about the status of Android is sent back to the
server.</p><p>If the policy is set to false or left unset, no status information is reported.
If set to true, status information is reported.</p><p>This policy only applies if Android apps are enabled.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="HeartbeatEnabled"/>HeartbeatEnabled</h3><span>Send network packets to the management server to monitor online status</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 43</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Send network packets to the management server to monitor online status, to allow
the server to detect if the device is offline.</p><p>If this policy is set to true, monitoring network packets (so-called heartbeats) will be sent.
If set to false or unset, no packets will be sent.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="HeartbeatFrequency"/>HeartbeatFrequency</h3><span>Frequency of monitoring network packets</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 43</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>How frequently monitoring network packets are sent, in milliseconds.</p><p>If this policy is unset, the default interval is 3 minutes. The minimum
interval is 30 seconds and the maximum interval is 24 hours – values
outside of this range will be clamped to this range.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:30000</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="LogUploadEnabled"/>LogUploadEnabled</h3><span>Send system logs to the management server</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 46</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Send system logs to the management server, to allow
admins to monitor system logs.</p><p>If this policy is set to true, system logs will be sent. If set
to false or unset, then no system logs will be sent.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the logging done by Android.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 28px"><h3><a name="DeviceMetricsReportingEnabled"/>DeviceMetricsReportingEnabled</h3><span>Enable metrics reporting</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceMetricsReportingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 14</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls whether usage metrics and diagnostic data, including crash reports, are reported back to Google.</p><p>If set to true, Chromium OS will report usage metrics and diagnostic data.</p><p>If set to false, metrics and diagnostic data reporting will be disabled.</p><p>If not configured, metrics and diagnostic data reporting will be disabled on unmanaged devices, and enabled on managed devices.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy also controls Android usage and diagnostic data collection.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AbusiveExperienceInterventionEnforce"/>AbusiveExperienceInterventionEnforce</h3><span>Abusive Experience Intervention Enforce</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AbusiveExperienceInterventionEnforce</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AbusiveExperienceInterventionEnforce</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AbusiveExperienceInterventionEnforce</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 65</li><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether sites with abusive experiences should be prevented from opening new windows or tabs.</p><p>If this policy is set to True, sites with abusive experiences will be prevented from opening new windows or tabs.
However, this behaviour will not trigger if SafeBrowsingEnabled policy is set to False.
If this policy is set to False, sites with abusive experiences will be allowed to open new windows or tabs.
If this policy is left not set, True will be used.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AdsSettingForIntrusiveAdsSites"/>AdsSettingForIntrusiveAdsSites</h3><span>Ads setting for sites with intrusive ads</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AdsSettingForIntrusiveAdsSites</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AdsSettingForIntrusiveAdsSites</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AdsSettingForIntrusiveAdsSites</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 65</li><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set whether ads should be blocked on sites with intrusive ads.</p><p>If this policy is set to 2, ads will be blocked on sites with intrusive ads.
However, this behaviour will not trigger if SafeBrowsingEnabled policy is set to False.
If this policy is set to 1, ads will not be blocked on sites with intrusive ads.
If this policy is left not set, 2 will be used.</p><ul><li>1 = Allow ads on all sites</li><li>2 = Do not allow ads on sites with intrusive ads</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowDeletingBrowserHistory"/>AllowDeletingBrowserHistory</h3><span>Enable deleting browser and download history</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowDeletingBrowserHistory</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowDeletingBrowserHistory</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowDeletingBrowserHistory</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 57</li><li>Chromium OS (Chromium OS) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables deleting browser history and download history in Chromium and prevents users from changing this setting.</p><p>Note that even with this policy disabled, the browsing and download history are not guaranteed to be retained: users may be able to edit or delete the history database files directly and the browser itself may expire or archive any or all history items at any time.</p><p>If this setting is enabled or not set, browsing and download history can be deleted.</p><p>If this setting is disabled, browsing and download history cannot be deleted.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowDinosaurEasterEgg"/>AllowDinosaurEasterEgg</h3><span>Allow Dinosaur Easter Egg Game</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowDinosaurEasterEgg</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowDinosaurEasterEgg</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowDinosaurEasterEgg</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 48</li><li>Chromium (Linux, Mac, Windows) since version 48</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allow users to play dinosaur easter egg game when device is offline.</p><p>If this policy is set to False, users will not be able to play the dinosaur Easter egg game when device is offline. If this setting is set to True, users are allowed to play the dinosaur game. If this policy is not set, users are not allowed to play the dinosaur Easter egg game on enrolled Chrome OS, but are allowed to play it under other circumstances.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowFileSelectionDialogs"/>AllowFileSelectionDialogs</h3><span>Allow invocation of file selection dialogues</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowFileSelectionDialogs</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowFileSelectionDialogs</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows access to local files on the machine by allowing Chromium to display file selection dialogues.</p><p>If you enable this setting, users can open file selection dialogues as normal.</p><p>If you disable this setting, whenever the user performs an action which would provoke a file selection dialogue (like importing bookmarks, uploading files, saving links, etc.) a message is displayed instead and the user is assumed to have clicked Cancel on the file selection dialogue.</p><p>If this setting is not set, users can open file selection dialogues as normal.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowOutdatedPlugins"/>AllowOutdatedPlugins</h3><span>Allow running plug-ins that are outdated</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowOutdatedPlugins</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowOutdatedPlugins</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowOutdatedPlugins</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 12</li><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If you enable this setting, outdated plugins are used as normal plugins.</p><p>If you disable this setting, outdated plugins will not be used and users will not be asked for permission to run them.</p><p>If this setting is not set, users will be asked for permission to run outdated plugins.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowPopupsDuringPageUnload"/>AllowPopupsDuringPageUnload</h3><span>Allows a page to show pop-ups during its unloading</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowPopupsDuringPageUnload</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowPopupsDuringPageUnload</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowPopupsDuringPageUnload</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AllowPopupsDuringPageUnload</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 74</li><li>Chromium OS (Chromium OS) since version 74</li><li>Chromium (Android) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy allows an admin to specify that a page may show pop-ups during its unloading.</p><p>When the policy is set to enabled, pages are allowed to show pop-ups while they are being unloaded.</p><p>When the policy is set to disabled or not set, pages are not allowed to show pop-ups while they are being unloaded, as per the spec (<a href="https://html.spec.whatwg.org/#apis-for-creating-and-navigating-browsing-contexts-by-name">https://html.spec.whatwg.org/#apis-for-creating-and-navigating-browsing-contexts-by-name</a>).</p><p>This policy will be removed in Chrome 82.</p><p>See <a href="https://www.chromestatus.com/feature/5989473649164288">https://www.chromestatus.com/feature/5989473649164288</a> .</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowScreenLock"/>AllowScreenLock</h3><span>Permit locking the screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowScreenLock</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 52</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to false, users will not be able to lock the screen (only signing out from the user session will be possible). If this setting is set to true or not set, users who authenticated with a password can lock the screen.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowedDomainsForApps"/>AllowedDomainsForApps</h3><span>Define domains allowed to access G Suite</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AllowedDomainsForApps</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowedDomainsForApps</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AllowedDomainsForApps</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AllowedDomainsForApps</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 51</li><li>Chromium OS (Chromium OS) since version 51</li><li>Chromium (Android) since version 51</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium's restricted login feature in G Suite and prevents users from changing this setting.</p><p>If you define this setting, the user will only be able to access Google
Apps using accounts from the specified domains (note that to allow
gmail.com/googlemail.com accounts, you should add 'consumer_accounts'
(without quotes) to the list of domains).</p><p>This setting will prevent the user from logging in, and adding a secondary
account, on a managed device that requires Google authentication, if that
account does not belong to the aforementioned list of allowed domains.</p><p>If you leave this setting empty/not configured, the user will be able to
access G Suite with any account.</p><p>This policy causes the X-GoogApps-Allowed-Domains header to be appended to
all HTTP and HTTPS requests to all google.com domains, as described in
<a href="https://support.google.com/a/answer/1668854">https://support.google.com/a/answer/1668854</a>.</p><p>Users cannot change or override this setting.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;managedchrome.com,example.com&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowedInputMethods"/>AllowedInputMethods</h3><span>Configure the allowed input methods in a user session</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowedInputMethods</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures which keyboard layouts are allowed for Chromium OS user sessions.</p><p>If this policy is set, the user can only select one of the input methods specified by this policy. If this policy is not set or set to an empty list, the user can select all supported input methods. If the current input method is not allowed by this policy, the input method will be switched to the hardware keyboard layout (if allowed) or the first valid entry in this list. All invalid or unsupported input methods in this list will be ignored.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\AllowedInputMethods\1 = &quot;xkb:us::eng&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AllowedLanguages"/>AllowedLanguages</h3><span>Configure the allowed languages in a user session</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AllowedLanguages</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the languages that can be used as the preferred languages by Chromium OS.</p><p>If this policy is set, the user can only add one of the languages listed in this policy to the list of preferred languages. If this policy is not set or set to an empty list, user can specify any languages as preferred. If this policy is set to a list with invalid values, all invalid values will be ignored. If a user previously added some languages that are not allowed by this policy, to the list of preferred languages, they will be removed. If the user had previously configured Chromium OS to be displayed in one of the languages not allowed by this policy, the display language will be switched to an allowed UI language next time the user signs in. Otherwise, Chromium OS will switch to the first valid value specified by this policy, or to a fallback locale (currently en-US), if this policy only contains invalid entries.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\AllowedLanguages\1 = &quot;en-US&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AlternateErrorPagesEnabled"/>AlternateErrorPagesEnabled</h3><span>Enable alternate error pages</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AlternateErrorPagesEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AlternateErrorPagesEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AlternateErrorPagesEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AlternateErrorPagesEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables the use of alternative error pages that are built into Chromium (such as 'page not found') and prevents users from changing this setting.</p><p>If you enable this setting, alternative error pages are used.</p><p>If you disable this setting, alternative error pages are never used.</p><p>If you enable or disable this setting, users cannot change or override this setting in Chromium.</p><p>If this policy is left unset, this will be enabled but the user will be able to change it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AlwaysOpenPdfExternally"/>AlwaysOpenPdfExternally</h3><span>Always Open PDF files externally</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AlwaysOpenPdfExternally</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AlwaysOpenPdfExternally</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 55</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables the internal PDF viewer in Chromium. Instead, it treats it as download and allows the user to open PDF files with the default application.</p><p>If this policy is left not set or disabled the PDF plug-in will be used to open PDF files, unless the user disables it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ApplicationLocaleValue"/>ApplicationLocaleValue</h3><span>Application locale</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ApplicationLocaleValue</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 8</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the application locale in Chromium and prevents users from changing the locale.</p><p>If you enable this setting, Chromium uses the specified locale. If the configured locale is not supported, 'en-US' is used instead.</p><p>If this setting is disabled or not set, Chromium uses either the user-specified preferred locale (if configured), the system locale or the default locale 'en-US'.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;en&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AudioCaptureAllowed"/>AudioCaptureAllowed</h3><span>Allow or deny audio capture</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AudioCaptureAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AudioCaptureAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AudioCaptureAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 25</li><li>Chromium OS (Chromium OS) since version 23</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If enabled or not configured (default), the user will be prompted for audio capture access except for URLs configured in the AudioCaptureAllowedUrls list which will be granted access without prompting.</p><p>When this policy is disabled, the user will never be prompted and audio capture will only be available to URLs configured in AudioCaptureAllowedUrls.</p><p>This policy affects all types of audio inputs and not only the built-in microphone.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>For Android apps, this policy affects the microphone only. When this policy is set to true, the microphone is muted for all Android apps, with no exceptions.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AudioCaptureAllowedUrls"/>AudioCaptureAllowedUrls</h3><span>URLs that will be granted access to audio capture devices without prompt</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AudioCaptureAllowedUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AudioCaptureAllowedUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AudioCaptureAllowedUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 29</li><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Patterns in this list will be matched against the security
origin of the requesting URL. If a match is found, access to audio
capture devices will be granted without prompt.</p><p>NOTE: Until version 45, this policy was only supported in Kiosk mode.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\AudioCaptureAllowedUrls\1 = &quot;https://www.example.com/&quot;
Software\Policies\Chromium\AudioCaptureAllowedUrls\2 = &quot;https://[*.]example.edu/&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\AudioCaptureAllowedUrls\1 = &quot;https://www.example.com/&quot;
Software\Policies\ChromiumOS\AudioCaptureAllowedUrls\2 = &quot;https://[*.]example.edu/&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com/&quot;,
&quot;https://[*.]example.edu/&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com/&lt;/string&gt;
&lt;string&gt;https://[*.]example.edu/&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AudioOutputAllowed"/>AudioOutputAllowed</h3><span>Allow playing audio</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AudioOutputAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 23</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set to false, audio output will not be available on the device while the user is logged in.</p><p>This policy affects all types of audio output and not only the built-in speakers. Audio accessibility features are also inhibited by this policy. Do not enable this policy if a screen reader is required for the user.</p><p>If this setting is set to true, or not configured, then users can use all supported audio outputs on their device.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AutoFillEnabled"/>AutoFillEnabled (deprecated)</h3><span>Enable AutoFill</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AutoFillEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AutoFillEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AutoFillEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AutoFillEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated in M70, please use AutofillAddressEnabled and AutofillCreditCardEnabled instead.</p><p>Enables Chromium's Auto-Fill feature and allows users to auto-complete web forms using previously stored information such as address or credit card information.</p><p>If you disable this setting, Auto-Fill will be inaccessible to users.</p><p>If you enable this setting or do not set a value, Auto-Fill will remain under the control of the user. This will allow them to configure Auto-Fill profiles and to switch Auto-Fill on or off at their own discretion.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AutofillAddressEnabled"/>AutofillAddressEnabled</h3><span>Enable AutoFill for addresses</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AutofillAddressEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AutofillAddressEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AutofillAddressEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AutofillAddressEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li><li>Chromium (Android) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium's AutoFill feature and allows users to auto-complete address information in web forms using previously stored information.</p><p>If this setting is disabled, AutoFill will never suggest, or fill address information, nor will it save additional address information that the user might submit while browsing the web.</p><p>If this setting is enabled or has no value, the user will be able to control AutoFill for addresses in the UI.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AutofillCreditCardEnabled"/>AutofillCreditCardEnabled</h3><span>Enable AutoFill for credit cards</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AutofillCreditCardEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AutofillCreditCardEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AutofillCreditCardEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">AutofillCreditCardEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 63</li><li>Chromium OS (Chromium OS) since version 63</li><li>Chromium (Android) since version 63</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables Chromium's Auto-Fill feature and allows users to auto-complete credit card information in web forms using previously stored information.</p><p>If this setting is disabled, Auto-fill will never suggest or fill in credit card information, nor will it save additional credit card information that the user might submit while browsing the web.</p><p>If this setting is enabled or has no value, the user will be able to control Auto-fill for credit cards in the UI.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AutoplayAllowed"/>AutoplayAllowed</h3><span>Allow media auto-play</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AutoplayAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AutoplayAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AutoplayAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 66</li><li>Chromium (Linux) since version 66</li><li>Chromium (Mac) since version 66</li><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to control whether videos with audio content can play automatically (without user consent) Chromium.</p><p>If the policy is set to True, Chromium is allowed to auto-play media.
If the policy is set to False, Chromium is not allowed to auto-play media. The Auto-PlayWhitelist policy can be used to override this for certain URL patterns.
By default, Chromium is not allowed to auto-play media. The Auto-PlayWhitelist policy can be used to override this for certain URL patterns.</p><p>Note that if Chromium is running and this policy changes, it will only be applied to newly opened tabs. Therefore, some tabs might still observe the previous behaviour.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="AutoplayWhitelist"/>AutoplayWhitelist</h3><span>Allow media auto-play on a whitelist of URL patterns</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\AutoplayWhitelist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\AutoplayWhitelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">AutoplayWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 66</li><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls the whitelist of URL patterns on which auto-play will always be enabled.</p><p>If auto-play is enabled then videos can play automatically (without user consent) with audio content in Chromium.</p><p>Valid URL patterns specifications are:</p><p>- [*.]domain.tld (matches domain.tld and all sub-domains)</p><p>- host (matches an exact hostname)</p><p>- scheme://host:port (supported schemes: http,https)</p><p>- scheme://[*.]domain.tld:port (supported schemes: http,https)</p><p>- file://path (The path has to be an absolute path and start with a '/')</p><p>- a.b.c.d (matches an exact IPv4 ip)</p><p>- [a:b:c:d:e:f:g:h] (matches an exact IPv6 ip)</p><p>If the AutoplayAllowed policy is set to True then this policy will have no effect.</p><p>If the AutoplayAllowed policy is set to False then any URL patterns set in this policy will still be allowed to play.</p><p>Note that if Chromium is running and this policy changes, it will only be applied to new opened tabs. Therefore some tabs might still observe the previous behaviour.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\AutoplayWhitelist\1 = &quot;https://www.example.com&quot;
Software\Policies\Chromium\AutoplayWhitelist\2 = &quot;[*.]example.edu&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\AutoplayWhitelist\1 = &quot;https://www.example.com&quot;
Software\Policies\ChromiumOS\AutoplayWhitelist\2 = &quot;[*.]example.edu&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com&quot;,
&quot;[*.]example.edu&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com&lt;/string&gt;
&lt;string&gt;[*.]example.edu&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BackgroundModeEnabled"/>BackgroundModeEnabled</h3><span>Continue running background apps when Chromium is closed</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BackgroundModeEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BackgroundModeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 19</li><li>Chromium (Linux) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Determines whether a Chromium process is started on OS login and keeps running when the last browser window is closed, allowing background apps and the current browsing session to remain active, including any session cookies. The background process displays an icon in the system tray and can always be closed from there.</p><p>If this policy is set to True, background mode is enabled and cannot be controlled by the user in the browser settings.</p><p>If this policy is set to False, background mode is disabled and cannot be controlled by the user in the browser settings.</p><p>If this policy is left unset, background mode is initially disabled and can be controlled by the user in the browser settings.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BlockThirdPartyCookies"/>BlockThirdPartyCookies</h3><span>Block third-party cookies</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BlockThirdPartyCookies</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\BlockThirdPartyCookies</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BlockThirdPartyCookies</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 10</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enabling this setting prevents cookies from being set by web page elements that are not from the domain that is in the browser's address bar.</p><p>Disabling this setting allows cookies to be set by web page elements that are not from the domain that is in the browser's address bar and prevents users from changing this setting.</p><p>If this policy is left not set, third-party cookies will be enabled but the user will be able to change that.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BookmarkBarEnabled"/>BookmarkBarEnabled</h3><span>Enable Bookmark Bar</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BookmarkBarEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\BookmarkBarEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BookmarkBarEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 12</li><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If you enable this setting, Chromium will show a bookmark bar.</p><p>If you disable this setting, users will never see the bookmark bar.</p><p>If you enable or disable this setting, users cannot change or override it in Chromium.</p><p>If this setting is left not set, the user can decide to use this function or not.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BrowserAddPersonEnabled"/>BrowserAddPersonEnabled</h3><span>Enable add person in user manager</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserAddPersonEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserAddPersonEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 39</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or not configured, Chromium will allow Add Person from the user manager.</p><p>If this policy is set to false, Chromium will not allow creation of new profiles from the user manager.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BrowserGuestModeEnabled"/>BrowserGuestModeEnabled</h3><span>Enable guest mode in browser</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserGuestModeEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserGuestModeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 38</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or not configured, Chromium will enable guest logins. Guest logins are Chromium profiles where all windows are in incognito mode.</p><p>If this policy is set to false, Chromium will not allow guest profiles to be started.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BrowserNetworkTimeQueriesEnabled"/>BrowserNetworkTimeQueriesEnabled</h3><span>Allow queries to a Google time service</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserNetworkTimeQueriesEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserNetworkTimeQueriesEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 60</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Setting this policy to false stops Chromium from occasionally sending queries to a Google server to retrieve an accurate timestamp. These queries will be enabled if this policy is set to True or is not set.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BrowserSignin"/>BrowserSignin</h3><span>Browser sign in settings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BrowserSignin</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BrowserSignin</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">BrowserSignin</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 70</li><li>Chromium (Android) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the sign-in behaviour of the browser. It allows you to specify if the user can sign in to Chromium with their account and use account-related services such as Chrome Sync.</p><p>If the policy is set to 'Disable browser sign-in', the user cannot sign in to the browser and use account-based services. In this case browser-level features such as Chrome Sync cannot be used and will be unavailable. If the user was signed in and the policy is set 'Disabled', they will be signed out the next time that they run Chrome but their local profile data such as bookmarks, passwords, etc. will stay preserved. The user will still be able to sign in to and use Google web services such as Gmail.</p><p>If the policy is set to 'Enable browser sign-in', the user is allowed to sign in to the browser and is automatically signed in to the browser when signed in to Google web services such as Gmail. Being signed in to the browser means that the user's account information will be kept by the browser. However, it does not mean that Chrome Sync will be turned on per default; the user must separately opt in to use this feature. Enabling this policy will prevent the user from turning off the setting that allows browser sign-in. To control the availability of Chrome Sync, use the 'SyncDisabled' policy.</p><p>If the policy is set to 'Force browser sign-in', the user is presented with an account selection dialogue and has to choose and sign in to an account to use the browser. This ensures that for managed accounts the policies associated with the account are applied and enforced. By default this turns on Chrome Sync for the account, except for the case when sync was disabled by the domain admin or via the 'SyncDisabled' policy. The default value of BrowserGuestModeEnabled will be set to false. Note: Existing unsigned profiles will be locked and inaccessible after enabling this policy. For more information, see help centre article: <a href="https://support.google.com/chrome/a/answer/7572556">https://support.google.com/chrome/a/answer/7572556</a>.</p><p>If this policy is not set then the user can decide if they want to enable the browser sign-in option and use it as they see fit.</p><ul><li>0 = Disable browser sign-in</li><li>1 = Enable browser sign-in</li><li>2 = Force users to sign-in to use the browser</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Android), 2 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="BuiltInDnsClientEnabled"/>BuiltInDnsClientEnabled</h3><span>Use built-in DNS client</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\BuiltInDnsClientEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">BuiltInDnsClientEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls whether the built-in DNS client is used in Chromium.</p><p>If this policy is set to true, the built-in DNS client will be used, if available.</p><p>If this policy is set to false, the built-in DNS client will never be used.</p><p>If this policy is left not set, the built-in DNS client will be enabled by default on MacOS, Android (when neither Private DNS nor VPN are enabled) and ChromeOS, and the users will be able to change whether the built-in DNS client is used by editing chrome://flags or specifying a command-line flag.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CaptivePortalAuthenticationIgnoresProxy"/>CaptivePortalAuthenticationIgnoresProxy</h3><span>Captive portal authentication ignores proxy</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CaptivePortalAuthenticationIgnoresProxy</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy allows Chromium OS to bypass any proxy for captive portal authentication.</p><p>This policy only takes effect if a proxy is configured (for example through policy, by the user in chrome://settings or by extensions).</p><p>If you enable this setting, any captive portal authentication pages (i.e. all web pages starting from captive portal sign-in page until Chromium detects successful Internet connection) will be displayed in a separate window ignoring all policy settings and restrictions for the current user.</p><p>If you disable this setting or leave it unset, any captive portal authentication pages will be shown in a (regular) new browser tab, using the current user's proxy settings.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CertificateManagementAllowed"/>CertificateManagementAllowed</h3><span>Allow users to manage installed certificates.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CertificateManagementAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether users are able to import and remove certificates via Certificate Manager.</p><p>If this policy is set to 'Allow users to manage all certificates' or left not set, users will be able to manage certificates.</p><p>If this policy is set to 'Allow users to manage user certificates', users will be able to manage user certificates, but not device-wide certificates.</p><p>If this policy is set to 'Disallow users to manage certificates', users will not be able to manage certificates, they can only view certificates.</p><ul><li>0 = Allow users to manage all certificates</li><li>1 = Allow users to manage user certificates</li><li>2 = Disallow users from managing certificates</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CertificateTransparencyEnforcementDisabledForCas"/>CertificateTransparencyEnforcementDisabledForCas</h3><span>Disable Certificate Transparency enforcement for a list of subjectPublicKeyInfo hashes</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForCas</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForCas</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CertificateTransparencyEnforcementDisabledForCas</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">CertificateTransparencyEnforcementDisabledForCas</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 67</li><li>Chromium OS (Chromium OS) since version 67</li><li>Chromium (Android) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables enforcing Certificate Transparency requirements for a list of subjectPublicKeyInfo hashes.</p><p>This policy allows disabling Certificate Transparency disclosure requirements for certificate chains that contain certificates with one of the specified subjectPublicKeyInfo hashes. This allows certificates that would otherwise be untrusted, because they were not properly publicly disclosed, to continue to be used for Enterprise hosts.</p><p>In order for Certificate Transparency enforcement to be disabled when this policy is set, one of the following conditions must be met:
1. The hash is of the server certificate's subjectPublicKeyInfo.
2. The hash is of a subjectPublicKeyInfo that appears in a CA certificate in the certificate chain, that CA certificate is constrained via the X.509v3 nameConstraints extension, one or more directoryName nameConstraints are present in the permittedSubtrees, and the directoryName contains an organizationName attribute.
3. The hash is of a subjectPublicKeyInfo that appears in a CA certificate in the certificate chain, the CA certificate has one or more organizationName attributes in the certificate Subject, and the server's certificate contains the same number of organizationName attributes, in the same order, and with byte-for-byte identical values.</p><p>A subjectPublicKeyInfo hash is specified by concatenating the hash algorithm name, the '/' character and the Base64 encoding of that hash algorithm applied to the DER-encoded subjectPublicKeyInfo of the specified certificate. This Base64 encoding is the same format as an SPKI Fingerprint, as defined in RFC 7469, Section 2.4. Unrecognised hash algorithms are ignored. The only supported hash algorithm at this time is 'sha256'.</p><p>If this policy is not set, any certificate that is required to be disclosed via Certificate Transparency will be treated as untrusted if it is not disclosed according to the Certificate Transparency policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForCas\1 = &quot;sha256/AAAAAAAAAAAAAAAAAAAAAA==&quot;
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForCas\2 = &quot;sha256//////////////////////w==&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForCas\1 = &quot;sha256/AAAAAAAAAAAAAAAAAAAAAA==&quot;
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForCas\2 = &quot;sha256//////////////////////w==&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;sha256/AAAAAAAAAAAAAAAAAAAAAA==&quot;,
&quot;sha256//////////////////////w==&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;sha256/AAAAAAAAAAAAAAAAAAAAAA==&lt;/string&gt;
&lt;string&gt;sha256//////////////////////w==&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CertificateTransparencyEnforcementDisabledForLegacyCas"/>CertificateTransparencyEnforcementDisabledForLegacyCas</h3><span>Disable Certificate Transparency enforcement for a list of Legacy Certificate Authorities</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForLegacyCas</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForLegacyCas</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CertificateTransparencyEnforcementDisabledForLegacyCas</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">CertificateTransparencyEnforcementDisabledForLegacyCas</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 67</li><li>Chromium OS (Chromium OS) since version 67</li><li>Chromium (Android) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables enforcing Certificate Transparency requirements for a list of Legacy Certificate Authorities.</p><p>This policy allows disabling Certificate Transparency disclosure requirements for certificate chains that contain certificates with one of the specified subjectPublicKeyInfo hashes. This allows certificates that would otherwise be untrusted, because they were not properly publicly disclosed, to continue to be used for Enterprise hosts.</p><p>In order for Certificate Transparency enforcement to be disabled when this policy is set, the hash must be of a subjectPublicKeyInfo appearing in a CA certificate that is recognised as a Legacy Certificate Authority (CA). A Legacy CA is a CA that has been publicly trusted by one or more operating systems supported by Chromium, but is not trusted by the Android Open Source Project or Chromium OS.</p><p>A subjectPublicKeyInfo hash is specified by concatenating the hash algorithm name, the '/' character and the Base64 encoding of that hash algorithm applied to the DER-encoded subjectPublicKeyInfo of the specified certificate. This Base64 encoding is the same format as an SPKI Fingerprint, as defined in RFC 7469, Section 2.4. Unrecognised hash algorithms are ignored. The only supported hash algorithm at this time is 'sha256'.</p><p>If this policy is not set, any certificate that is required to be disclosed via Certificate Transparency will be treated as untrusted if it is not disclosed according to the Certificate Transparency policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForLegacyCas\1 = &quot;sha256/AAAAAAAAAAAAAAAAAAAAAA==&quot;
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForLegacyCas\2 = &quot;sha256//////////////////////w==&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForLegacyCas\1 = &quot;sha256/AAAAAAAAAAAAAAAAAAAAAA==&quot;
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForLegacyCas\2 = &quot;sha256//////////////////////w==&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;sha256/AAAAAAAAAAAAAAAAAAAAAA==&quot;,
&quot;sha256//////////////////////w==&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;sha256/AAAAAAAAAAAAAAAAAAAAAA==&lt;/string&gt;
&lt;string&gt;sha256//////////////////////w==&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CertificateTransparencyEnforcementDisabledForUrls"/>CertificateTransparencyEnforcementDisabledForUrls</h3><span>Disable Certificate Transparency enforcement for a list of URLs</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CertificateTransparencyEnforcementDisabledForUrls</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">CertificateTransparencyEnforcementDisabledForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 53</li><li>Chromium OS (Chromium OS) since version 53</li><li>Chromium (Android) since version 53</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables enforcing Certificate Transparency requirements to the listed URLs.</p><p>This policy allows certificates for the hostnames in the specified URLs to not be disclosed via Certificate Transparency. This allows certificates that would otherwise be untrusted, because they were not properly publicly disclosed, to continue to be used, but makes it harder to detect miss-isued certificates for those hosts.</p><p>A URL pattern is formatted according to <a href="https://www.chromium.org/administrators/url-blacklist-filter-format">https://www.chromium.org/administrators/url-blacklist-filter-format</a>. However, because certificates are valid for a given hostname independent of the scheme, port or path, only the hostname portion of the URL is considered. Wildcard hosts are not supported.</p><p>If this policy is not set, any certificate that is required to be disclosed via Certificate Transparency will be treated as untrusted if it is not disclosed according to the Certificate Transparency policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForUrls\1 = &quot;example.com&quot;
Software\Policies\Chromium\CertificateTransparencyEnforcementDisabledForUrls\2 = &quot;.example.com&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForUrls\1 = &quot;example.com&quot;
Software\Policies\ChromiumOS\CertificateTransparencyEnforcementDisabledForUrls\2 = &quot;.example.com&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;example.com&quot;,
&quot;.example.com&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;example.com&lt;/string&gt;
&lt;string&gt;.example.com&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ChromeCleanupEnabled"/>ChromeCleanupEnabled</h3><span>Enable Chrome Cleanup on Windows</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ChromeCleanupEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If disabled, prevents Chrome Clean-Up from scanning the system for unwanted software and performing clean ups. Manually triggering Chrome Clean-Up from chrome://settings/cleanup is disabled.</p><p>If enabled or unset, Chrome Clean-Up periodically scans the system for unwanted software and should any be found, will ask the user if they wish to remove it. Manually triggering Chrome Clean-Up from chrome://settings is enabled.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ChromeCleanupReportingEnabled"/>ChromeCleanupReportingEnabled</h3><span>Control how Chrome Cleanup reports data to Google</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ChromeCleanupReportingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If unset, should Chrome Clean-Up detect unwanted software, it may report metadata about the scan to Google, in accordance with policy set by SafeBrowsingExtendedReportingEnabled. Chrome Clean-Up will then ask the user if they wish to clean up the unwanted software. The user can choose to share results of the clean up with Google to assist with future unwanted software detection. These results contain file metadata, automatically installed extensions and registry keys as described by the Chrome Privacy Whitepaper.</p><p>If disabled, should Chrome Clean-Up detect unwanted software, it will not report metadata about the scan to Google, overriding any policy set by SafeBrowsingExtendedReportingEnabled. Chrome Clean-Up will ask the user if they wish to clean up the unwanted software. Results of the clean up will not be reported to Google and the user will not have the option to do so.</p><p>If enabled, should Chrome Clean-Up detect unwanted software, it may report metadata about the scan to Google, in accordance with policy set by SafeBrowsingExtendedReportingEnabled. Chrome Clean-Up will ask the user if they wish to clean up the unwanted software. Results of the clean up will be reported to Google and the user will not have the option to prevent it.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ChromeOsLockOnIdleSuspend"/>ChromeOsLockOnIdleSuspend</h3><span>Enable lock when the device become idle or suspended</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ChromeOsLockOnIdleSuspend</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 9</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable lock when Chromium OS devices become idle or suspended.</p><p>If you enable this setting, users will be asked for a password to unlock the device from sleep.</p><p>If you disable this setting, users will not be asked for a password to unlock the device from sleep.</p><p>If you enable or disable this setting, users cannot change or override it.</p><p>If the policy is left not set the user can choose whether they want to be asked for password to unlock the device or not.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ChromeOsMultiProfileUserBehavior"/>ChromeOsMultiProfileUserBehavior</h3><span>Control the user behaviour in a multiprofile session</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ChromeOsMultiProfileUserBehavior</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 31</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Control the user behaviour in a multi-profile session on Chromium OS devices.</p><p>If this policy is set to 'Multi-ProfileUserBehaviourUnrestricted', the user can be either the primary or secondary user in a multi-profile session.</p><p>If this policy is set to 'Multi-ProfileUserBehaviourMustBePrimary', the user can only be the primary user in a multi-profile session.</p><p>If this policy is set to 'Multi-ProfileUserBehaviourNotAllowed', the user cannot be part of a multi-profile session.</p><p>If you set this setting, users cannot change or override it.</p><p>If the setting is changed while the user is signed into a multi-profile session, all users in the session will be checked against their corresponding settings. The session will be closed if any one of the users is no longer allowed to be in the session.</p><p>If the policy is left not set, the default value 'Multi-ProfileUserBehaviourMustBePrimary' applies for enterprise-managed users and 'Multi-ProfileUserBehaviourUnrestricted' will be used for non-managed users.</p><ul><li>&quot;unrestricted&quot; = Allow enterprise user to be both primary and secondary (Default behaviour for non-managed users)</li><li>&quot;primary-only&quot; = Allow enterprise user to be primary multi-profile user only (Default behaviour for enterprise-managed users)</li><li>&quot;not-allowed&quot; = Do not allow enterprise user to be part of multiprofile (primary or secondary)</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>When multiple users are logged in, only the primary user can use Android apps.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;unrestricted&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CloudManagementEnrollmentMandatory"/>CloudManagementEnrollmentMandatory</h3><span>Enable mandatory cloud management enrolment</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CloudManagementEnrollmentMandatory</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CloudManagementEnrollmentMandatory</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If this policy is set to true, cloud management enrolment is mandatory and blocks Chrome launch process if failed.</p><p>If this policy is left unset or set to false, cloud management enrolment is optional and does not block Chrome launch process if failed.</p><p>This policy is used by machine scope cloud policy enrolment on desktop and can be set by Registry or GPO on Windows, plist on Mac and JSON policy file on Linux.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CloudManagementEnrollmentToken"/>CloudManagementEnrollmentToken</h3><span>The enrolment token of cloud policy on desktop</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CloudManagementEnrollmentToken</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CloudManagementEnrollmentToken</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If this policy is set, Chromium will try to register itself and apply associated cloud policy for all profiles.</p><p>The value of this policy is an Enrolment token that can be retrieved from the Google Admin console.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;37185d02-e055-11e7-80c1-9a214cf093ae&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CloudPolicyOverridesPlatformPolicy"/>CloudPolicyOverridesPlatformPolicy</h3><span>Chromium cloud policy overrides Platform policy.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CloudPolicyOverridesPlatformPolicy</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CloudPolicyOverridesPlatformPolicy</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If the policy is set to true, cloud policy takes precedence if it conflicts with platform policy.
If the policy is set to false or not configured, platform policy takes precedence if it conflicts with cloud policy.</p><p>This policy is only available as a mandatory machine platform policy and it only affects machine scope cloud policies.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="CommandLineFlagSecurityWarningsEnabled"/>CommandLineFlagSecurityWarningsEnabled</h3><span>Enable security warnings for command-line flags</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\CommandLineFlagSecurityWarningsEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">CommandLineFlagSecurityWarningsEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 76</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If disabled, prevents security warnings from appearing when Chrome is launched with some potentially dangerous command-line flags.</p><p>If enabled or unset, security warnings are displayed when some command-line flags are used to launch Chrome.</p><p>On Windows, this policy is only available on instances that are joined to a Microsoft® Active Directory® domain or Windows 10 Pro or Enterprise instances that are enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ComponentUpdatesEnabled"/>ComponentUpdatesEnabled</h3><span>Enable component updates in Chromium</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ComponentUpdatesEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ComponentUpdatesEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ComponentUpdatesEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 54</li><li>Chromium OS (Chromium OS) since version 54</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables component updates for all components in Chromium when not set or set to True.</p><p>If set to False, updates to components are disabled. However, some components are exempt from this policy: updates to any component that does not contain executable code, does not significantly alter the behaviour of the browser or is critical for its security will not be disabled.
Examples of such components include the certificate revocation lists and Safe Browsing data.
See <a href="https://developers.google.com/safe-browsing">https://developers.google.com/safe-browsing</a> for more info on Safe Browsing.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ContextualSearchEnabled"/>ContextualSearchEnabled</h3><span>Enable Tap to Search</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ContextualSearchEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 40</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables the availability of Tap to Search in Chromium's content view.</p><p>If you enable this setting, Tap to Search will be available to the user and they can choose to turn the feature on or off.</p><p>If you disable this setting, Tap to Search will be disabled completely.</p><p>If this policy is left not set, it is equivalent to being enabled, see description above.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>true (Android)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ContextualSuggestionsEnabled"/>ContextualSuggestionsEnabled</h3><span>Enable contextual suggestions of related web pages</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ContextualSuggestionsEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this is set to true or unset, Chromium will suggest pages related to the current page.
These suggestions are fetched remotely from Google servers.</p><p>If this setting is set to false, suggestions will not be fetched or displayed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>true (Android)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DataCompressionProxyEnabled"/>DataCompressionProxyEnabled</h3><span>Enable the data compression proxy feature</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DataCompressionProxyEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 31</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable or disable the data compression proxy and prevent users from changing this setting.</p><p>If you enable or disable this setting, users cannot change or override this setting.</p><p>If this policy is left not set, the data compression proxy feature will be available for the user to choose whether to use it or not.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>true (Android)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DefaultBrowserSettingEnabled"/>DefaultBrowserSettingEnabled</h3><span>Set Chromium as Default Browser</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DefaultBrowserSettingEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultBrowserSettingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows 7) since version 11</li><li>Chromium (Mac) since version 11</li><li>Chromium (Linux) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the default browser checks in Chromium and prevents users from changing them.</p><p>If you enable this setting, Chromium will always check on start-up whether it is the default browser and automatically register itself if possible.</p><p>If this setting is disabled, Chromium will never check if it is the default browser and will disable user controls for setting this option.</p><p>If this setting is not set, Chromium will allow the user to control whether it is the default browser and whether user notifications should be shown when it isn't.</p><p>Note for administrators of Microsoft® Windows: Enabling this setting will only work for machines running Windows 7. For versions of Windows starting with Windows 8, you must deploy a 'default application associations' file that makes Chromium the handler for the https and http protocols (and, optionally, the ftp protocol and file formats such as .html, .htm, .pdf, .svg, .webp, etc…). See <a href="https://support.google.com/chrome?p=make_chrome_default_win">https://support.google.com/chrome?p=make_chrome_default_win</a> for more information.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DefaultDownloadDirectory"/>DefaultDownloadDirectory</h3><span>Set default download directory</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\Recommended\DefaultDownloadDirectory</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\Recommended\DefaultDownloadDirectory</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DefaultDownloadDirectory</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 64</li><li>Chromium OS (Chromium OS) since version 64</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can Be Mandatory: No, Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the default directory that Chromium will use for downloading files.</p><p>If you set this policy, it will change the default directory that Chromium downloads files to. This policy is not mandatory, so the user will be able to change the directory.</p><p>If you do not set this policy, Chromium will use its usual default directory (platform-specific).</p><p>See <a href="https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables">https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables</a> for a list of variables that can be used.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;/home/${user_name}/Downloads&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DeveloperToolsAvailability"/>DeveloperToolsAvailability</h3><span>Control where Developer Tools can be used</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DeveloperToolsAvailability</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeveloperToolsAvailability</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DeveloperToolsAvailability</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 68</li><li>Chromium OS (Chromium OS) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to control where Developer Tools can be used.</p><p>If this policy is set to 'DeveloperToolsDisallowedForForceInstalledExtensions' (value 0, which is the default value), the Developer Tools and the JavaScript console can be accessed in general, but they cannot be accessed in the context of extensions installed by enterprise policy.
If this policy is set to 'DeveloperToolsAllowed' (value 1), the Developer Tools and the JavaScript console can be accessed and used in all contexts, including the context of extensions installed by enterprise policy.
If this policy is set to 'DeveloperToolsDisallowed' (value 2), the Developer Tools cannot be accessed and website elements can no longer be inspected. Any keyboard shortcuts and any menu or context menu entries to open the Developer Tools or the JavaScript Console will be disabled.</p><ul><li>0 = Disallow usage of the Developer Tools on extensions installed by enterprise policy; allow usage of the Developer Tools in other contexts</li><li>1 = Allow usage of the Developer Tools</li><li>2 = Disallow usage of the Developer Tools</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy also controls access to Android Developer Options. If you set this policy to 'DeveloperToolsDisallowed' (value 2), users cannot access Developer Options. If you set this policy to another value or leave it unset, users can access Developer Options by tapping seven times on the build number in the Android settings app.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DeveloperToolsDisabled"/>DeveloperToolsDisabled (deprecated)</h3><span>Disable Developer Tools</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DeveloperToolsDisabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeveloperToolsDisabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DeveloperToolsDisabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated in M68. Please use DeveloperToolsAvailability instead.</p><p>Disables Developer Tools and JavaScript console.</p><p>If you enable this setting, Developer Tools cannot be accessed nor website elements inspected. Any keyboard shortcuts, menu or context menu entries to open Developer Tools or JavaScript Console will be disabled.</p><p>Setting this option to disabled, or leaving it not set allows the user to use Developer Tools and JavaScript console.</p><p>If policy DeveloperToolsAvailability is set, the value of policy DeveloperToolsDisabled is ignored.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy also controls access to Android Developer Options. If you set this policy to true, users cannot access Developer Options. If you set this policy to false or leave it unset, users can access Developer Options by tapping seven times on the build number in the Android settings app.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DeviceLocalAccountManagedSessionEnabled"/>DeviceLocalAccountManagedSessionEnabled</h3><span>Allow managed session on device</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceLocalAccountManagedSessionEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to false, managed guest session will behave as documented in <a href="https://support.google.com/chrome/a/answer/3017014">https://support.google.com/chrome/a/answer/3017014</a> – the standard 'Public Session'.</p><p>If this policy is set to true or left unset, managed guest session will take on 'Managed Session' behaviour which lifts many of the restrictions that are in place for regular 'Public Sessions'.</p><p>If this policy is set, the user cannot change or override it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DevicePowerwashAllowed"/>DevicePowerwashAllowed</h3><span>Allow the device to request powerwash</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DevicePowerwashAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 77</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
This policy when set to False, does not allow the device to trigger powerwash.
When set to True, it allows the device to trigger powerwash.
If left unset, it defaults to False, meaning it doesn't allow the device to powerwash.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DeviceRebootOnUserSignout"/>DeviceRebootOnUserSignout</h3><span>Force device reboot when user signs out</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceRebootOnUserSignout</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 76</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
This policy, when set to ArcSession, forces the device to reboot when a user signs out if Android has started.
When set to Always, it forces the device to reboot on every user sign-out.
If left unset, it has no effect and no reboot is forced on user sign-out. The same applies if set to Never.
This policy has effect only for unaffiliated users.
</p><ul><li>1 = Do not reboot on user sign-out.</li><li>2 = Reboot on user sign-out if Android has started.</li><li>3 = Always reboot on user sign-out.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DeviceScheduledUpdateCheck"/>DeviceScheduledUpdateCheck</h3><span>Set custom schedule to check for updates</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows setting a custom schedule to check for updates. This applies to all users, and to all interfaces on the device. Once set, the device will check for updates according to the schedule. The policy must be removed to cancel any more scheduled update checks.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;day_of_month&quot;: {
&quot;description&quot;: &quot;Day of month [1-28] when the update check should happen, interpreted in the device's local time zone. Only used when 'frequency' is 'MONTHLY'. If this is more than the maximum number of days in a given month then the last day of the month will be chosen. Currently it is restricted to 28 to resolve month rollover ambiguities.&quot;,
&quot;maximum&quot;: 28,
&quot;minimum&quot;: 1,
&quot;type&quot;: &quot;integer&quot;
},
&quot;day_of_week&quot;: {
&quot;$ref&quot;: &quot;WeekDay&quot;,
&quot;description&quot;: &quot;Day of week when the update check should happen, interpreted in the device's local time zone. Only used when 'frequency' is 'WEEKLY'.&quot;
},
&quot;frequency&quot;: {
&quot;description&quot;: &quot;Frequency with which the update check should recur.&quot;,
&quot;enum&quot;: [
&quot;DAILY&quot;,
&quot;WEEKLY&quot;,
&quot;MONTHLY&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;update_check_time&quot;: {
&quot;$ref&quot;: &quot;Time&quot;,
&quot;description&quot;: &quot;Time when the update check should happen, interpreted in the device's local time zone.&quot;
}
},
&quot;required&quot;: [
&quot;update_check_time&quot;,
&quot;frequency&quot;
],
&quot;type&quot;: &quot;object&quot;
}</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DeviceWebUsbAllowDevicesForUrls"/>DeviceWebUsbAllowDevicesForUrls</h3><span>Automatically grant permission to these sites to connect to USB devices with the given vendor and product IDs.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DeviceWebUsbAllowDevicesForUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 77</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set a list of URLs that specify which sites will automatically be granted permission to access a USB device with the given vendor and product IDs. Each item in the list must contain both devices and URLs in order for the policy to be valid. Each item in devices can contain a vendor ID and product ID field. Any ID that is omitted is treated as a wildcard with one exception, and that exception is that a product ID cannot be specified without a vendor ID also being specified. Otherwise, the policy will not be valid and will be ignored.</p><p>The USB permission model uses the URL of the requesting site ('requesting URL') and the URL of the top-level frame site ('embedding URL') to grant permission to the requesting URL to access the USB device. The requesting URL may be different from the embedding URL when the requesting site is loaded in an iframe. Therefore, the 'URLs' field can contain up to two URL strings delimited by a comma to specify the requesting and embedding URL respectively. If only one URL is specified, then access to the corresponding USB devices will be granted when the requesting site's URL matches this URL regardless of embedding status. The URLs in 'URLs' must be valid URLs, otherwise the policy will be ignored.</p><p>If this policy is left not set, the global default value will be used for all sites either from the 'DefaultWebUsbGuardSetting' policy if it is set, or the user's personal configuration otherwise.</p><p>URL patterns in this policy should not clash with the ones configured via WebUsbBlockedForUrls. If there is a clash, this policy will take precedence over WebUsbBlockedForUrls and WebUsbAskForUrls.</p><p>Values for this policy and the WebUsbAllowDevicesForUrls policy are merged together.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;devices&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;product_id&quot;: {
&quot;type&quot;: &quot;integer&quot;
},
&quot;vendor_id&quot;: {
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;urls&quot;: {
&quot;items&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;required&quot;: [
&quot;devices&quot;,
&quot;urls&quot;
],
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DeviceWebUsbAllowDevicesForUrls = [
{
&quot;devices&quot;: [
{
&quot;product_id&quot;: 5678,
&quot;vendor_id&quot;: 1234
}
],
&quot;urls&quot;: [
&quot;https://google.com&quot;,
&quot;https://requesting.com,https://embedded.com&quot;
]
}
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="Disable3DAPIs"/>Disable3DAPIs</h3><span>Disable support for 3D graphics APIs</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\Disable3DAPIs</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\Disable3DAPIs</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">Disable3DAPIs</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 9</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enabling this setting prevents web pages from accessing the graphics processing unit (GPU). Specifically, web pages cannot access the WebGL API and plugins can not use the Pepper 3D API.</p><p>Disabling this setting or leaving it not set potentially allows web pages to use the WebGL API and plugins to use the Pepper 3D API. The default settings of the browser may still require command line arguments to be passed in order to use these APIs.</p><p>If HardwareAccelerationModeEnabled is set to false, Disable3DAPIs is ignored and it is equivalent to Disable3DAPIs being set to true.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DisableSafeBrowsingProceedAnyway"/>DisableSafeBrowsingProceedAnyway</h3><span>Disable proceeding from the Safe Browsing warning page</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisableSafeBrowsingProceedAnyway</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisableSafeBrowsingProceedAnyway</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisableSafeBrowsingProceedAnyway</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">DisableSafeBrowsingProceedAnyway</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 22</li><li>Chromium OS (Chromium OS) since version 22</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>The Safe Browsing service shows a warning page when users navigate to sites that are flagged as potentially malicious. Enabling this setting prevents users from proceeding anyway from the warning page to the malicious site.</p><p>This policy only prevents users from proceeding on Safe Browsing warnings (e.g. malware and phishing) not for SSL certificate-related issues such as invalid or expired certificates.</p><p>If this setting is disabled or not configured then users can choose to proceed to the flagged site after being shown the warning.</p><p>See <a href="https://developers.google.com/safe-browsing">https://developers.google.com/safe-browsing</a> for more info on Safe Browsing.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DisableScreenshots"/>DisableScreenshots</h3><span>Disable taking screenshots</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisableScreenshots</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisableScreenshots</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisableScreenshots</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 22</li><li>Chromium (Linux, Mac, Windows) since version 22</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If enabled, screenshots cannot be taken using keyboard shortcuts or extension APIs.</p><p>If disabled or not specified, taking screenshots is allowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DisabledPlugins"/>DisabledPlugins (deprecated)</h3><span>Specify a list of disabled plug-ins</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisabledPlugins</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisabledPlugins</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisabledPlugins</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Please use the DefaultPluginsSetting to control the availability of the Flash plugin and AlwaysOpenPdfExternally to control whether the integrated PDF viewer should be used for opening PDF files.</p><p>Specifies a list of plugins that are disabled in Chromium and prevents users from changing this setting.</p><p>The wildcard characters '*' and '?' can be used to match sequences of arbitrary characters. '*' matches an arbitrary number of characters while '?' specifies an optional single character, i.e. matches zero or one characters. The escape character is '\', so to match actual '*', '?' or '\' characters, you can put a '\' in front of them.</p><p>If you enable this setting, the specified list of plugins is never used in Chromium. The plugins are marked as disabled in 'about:plugins' and users cannot enable them.</p><p>Note that this policy can be overridden by EnabledPlugins and DisabledPluginsExceptions.</p><p>If this policy is left not set, the user can use any plugin installed on the system except for hard-coded incompatible, outdated or dangerous plugins.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\DisabledPlugins\1 = &quot;Java&quot;
Software\Policies\Chromium\DisabledPlugins\2 = &quot;Shockwave Flash&quot;
Software\Policies\Chromium\DisabledPlugins\3 = &quot;Chrome PDF Viewer&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DisabledPlugins\1 = &quot;Java&quot;
Software\Policies\ChromiumOS\DisabledPlugins\2 = &quot;Shockwave Flash&quot;
Software\Policies\ChromiumOS\DisabledPlugins\3 = &quot;Chrome PDF Viewer&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;Java&quot;,
&quot;Shockwave Flash&quot;,
&quot;Chrome PDF Viewer&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;Java&lt;/string&gt;
&lt;string&gt;Shockwave Flash&lt;/string&gt;
&lt;string&gt;Chrome PDF Viewer&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DisabledPluginsExceptions"/>DisabledPluginsExceptions (deprecated)</h3><span>Specify a list of plug-ins that the user can enable or disable</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisabledPluginsExceptions</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisabledPluginsExceptions</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisabledPluginsExceptions</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Please use the DefaultPluginsSetting to control the availability of the Flash plugin and AlwaysOpenPdfExternally to control whether the integrated PDF viewer should be used for opening PDF files.</p><p>Specifies a list of plugins that user can enable or disable in Chromium.</p><p>The wildcard characters '*' and '?' can be used to match sequences of arbitrary characters. '*' matches an arbitrary number of characters while '?' specifies an optional single character, i.e. matches zero or one characters. The escape character is '\', so to match actual '*', '?' or '\' characters, you can put a '\' in front of them.</p><p>If you enable this setting, the specified list of plugins can be used in Chromium. Users can enable or disable them in 'about:plugins', even if the plugin also matches a pattern in DisabledPlugins. Users can also enable and disable plugins that don't match any patterns in DisabledPlugins, DisabledPluginsExceptions and EnabledPlugins.</p><p>This policy is meant to allow for strict plugin blacklisting where the 'DisabledPlugins' list contains wildcarded entries such as disable all plugins '*' or disable all Java plugins '*Java*' but the administrator wishes to enable some particular version such as 'IcedTea Java 2.3'. This particular versions can be specified in this policy.</p><p>Note that both the plugin name and the plugin's group name have to be exempted. Each plugin group is shown in a separate section in about:plugins; each section may have one or more plugins. For example, the 'Shockwave Flash' plugin belongs to the 'Adobe Flash Player' group, and both names have to have a match in the exceptions list if that plugin is to be exempted from the blacklist.</p><p>If this policy is left not set, any plugin that matches the patterns in the 'DisabledPlugins' will be locked disabled and the user won't be able to enable them.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\DisabledPluginsExceptions\1 = &quot;Java&quot;
Software\Policies\Chromium\DisabledPluginsExceptions\2 = &quot;Shockwave Flash&quot;
Software\Policies\Chromium\DisabledPluginsExceptions\3 = &quot;Chrome PDF Viewer&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DisabledPluginsExceptions\1 = &quot;Java&quot;
Software\Policies\ChromiumOS\DisabledPluginsExceptions\2 = &quot;Shockwave Flash&quot;
Software\Policies\ChromiumOS\DisabledPluginsExceptions\3 = &quot;Chrome PDF Viewer&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;Java&quot;,
&quot;Shockwave Flash&quot;,
&quot;Chrome PDF Viewer&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;Java&lt;/string&gt;
&lt;string&gt;Shockwave Flash&lt;/string&gt;
&lt;string&gt;Chrome PDF Viewer&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DisabledSchemes"/>DisabledSchemes (deprecated)</h3><span>Disable URL protocol schemes</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DisabledSchemes</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DisabledSchemes</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DisabledSchemes</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 12</li><li>Chromium OS (Chromium OS) since version 12</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated, please use URLBlacklist instead.</p><p>Disables the listed protocol schemes in Chromium.</p><p>URLs using a scheme from this list will not load and can not be navigated to.</p><p>If this policy is left not set or the list is empty all schemes will be accessible in Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\DisabledSchemes\1 = &quot;file&quot;
Software\Policies\Chromium\DisabledSchemes\2 = &quot;https&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\DisabledSchemes\1 = &quot;file&quot;
Software\Policies\ChromiumOS\DisabledSchemes\2 = &quot;https&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;file&quot;,
&quot;https&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;file&lt;/string&gt;
&lt;string&gt;https&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DiskCacheDir"/>DiskCacheDir</h3><span>Set disk cache directory</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DiskCacheDir</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DiskCacheDir</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 13</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the directory that Chromium will use for storing cached files on the disk.</p><p>If you set this policy, Chromium will use the provided directory regardless of whether the user has specified the '--disk-cache-dir' flag or not. To avoid data loss or other unexpected errors this policy should not be set to a volume's root directory or to a directory used for other purposes, because Chromium manages its contents.</p><p>See <a href="https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables">https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables</a> for a list of variables that can be used.</p><p>If this policy is left not set the default cache directory will be used and the user will be able to override it with the '--disk-cache-dir' command line flag.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;${user_home}/Chrome_cache&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DiskCacheSize"/>DiskCacheSize</h3><span>Set disk cache size in bytes</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DiskCacheSize</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DiskCacheSize</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 17</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the cache size that Chromium will use for storing cached files on the disk.</p><p>If you set this policy, Chromium will use the provided cache size regardless of whether the user has specified the '--disk-cache-size' flag or not. The value specified in this policy is not a hard boundary but rather a suggestion to the caching system, any value below a few megabytes is too small and will be rounded up to a sane minimum.</p><p>If the value of this policy is 0, the default cache size will be used but the user will not be able to change it.</p><p>If this policy is not set, the default size will be used and the user will be able to override it with the --disk-cache-size flag.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x06400000 (Windows), 104857600 (Linux), 104857600 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DownloadDirectory"/>DownloadDirectory</h3><span>Set download directory</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DownloadDirectory</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DownloadDirectory</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DownloadDirectory</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 35</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the directory that Chromium will use for downloading files.</p><p>If you set this policy, Chromium will use the provided directory regardless of whether the user has specified one or enabled the flag to be prompted for download location every time.</p><p>See <a href="https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables">https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables</a> for a list of variables that can be used.</p><p>If this policy is left not set the default download directory will be used and the user will be able to change it.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on Android apps. Android apps always use the default downloads directory and cannot access any files downloaded by Chromium OS into a non-default downloads directory.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;/home/${user_name}/Downloads&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="DownloadRestrictions"/>DownloadRestrictions</h3><span>Allow download restrictions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\DownloadRestrictions</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\DownloadRestrictions</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">DownloadRestrictions</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 61</li><li>Chromium OS (Chromium OS) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the type of downloads that Chromium will completely block, without letting users override the security decision.</p><p>If you set this policy, Chromium will prevent certain types of downloads and won't let users bypass the security warnings.</p><p>When the 'Block dangerous downloads' option is chosen, all downloads are allowed, except for those that carry Safe Browsing warnings.</p><p>When the 'Block potentially dangerous downloads' option is chosen, all downloads are allowed, except for those that carry Safe Browsing warnings of potentially dangerous downloads.</p><p>When the 'Block all downloads' option is chosen, all downloads are blocked.</p><p>When this policy is not set, (or the 'No special restrictions' option is chosen), the downloads will go through the usual security restrictions based on Safe Browsing analysis results.</p><p>Note that these restrictions apply to downloads triggered from web page content, as well as the 'download link...' context menu option. These restrictions do not apply to the save/download of the currently displayed page, nor do they apply to saving as PDF from the printing options.</p><p>See <a href="https://developers.google.com/safe-browsing">https://developers.google.com/safe-browsing</a> for more info on Safe Browsing.</p><ul><li>0 = No special restrictions</li><li>1 = Block dangerous downloads</li><li>2 = Block potentially dangerous downloads</li><li>3 = Block all downloads</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows), 2 (Linux), 2 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EasyUnlockAllowed"/>EasyUnlockAllowed</h3><span>Allow Smart Lock to be used</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EasyUnlockAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 38</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If you enable this setting, users will be allowed to use Smart Lock if the requirements for the feature are satisfied.</p><p>If you disable this setting, users will not be allowed to use Smart Lock.</p><p>If this policy is left not set, the default is not allowed for enterprise-managed users and allowed for non-managed users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EcryptfsMigrationStrategy"/>EcryptfsMigrationStrategy</h3><span>Migration strategy for eCryptfs</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EcryptfsMigrationStrategy</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the action that should be taken when the user's home directory was created with ecryptfs encryption.</p><p>If you set this policy to 'DisallowArc', Android apps will be disabled for the user and no migration from ecryptfs to ext4 encryption will be performed. Android apps will not be prevented from running when the home directory is already ext4-encrypted.</p><p>If you set this policy to 'Migrate', ecryptfs-encrypted home directories will be automatically migrated to ext4 encryption on sign-in without asking for user consent.</p><p>If you set this policy to 'Wipe', ecryptfs-encrypted home directories will be deleted on sign-in and new ext4-encrypted home directories will be created instead. Warning: This removes the user's local data.</p><p>If you set this policy to 'MinimalMigrate', ecryptfs-encrypted home directories will be deleted on sign-in and new ext4-encrypted home directories will be created instead. However, it will be attempted to preserve login tokens so that the user does not have to sign in again. Warning: This removes the user's local data.</p><p>If you set this policy to an option that is no longer supported ('AskUser' or 'AskForEcryptfsArcUsers'), it will be treated as if you had selected 'Migrate' instead.</p><p>This policy does not apply to kiosk users. If this policy is left not set, the device will behave as if 'DisallowArc' was chosen.</p><ul><li>0 = Disallow data migration and ARC.</li><li>1 = Migrate automatically, don’t ask for user consent.</li><li>2 = Wipe the user’s eCryptfs home directory and start with a fresh ext4-encrypted home directory.</li><li>4 = Similar to Wipe (value 2), but tries to preserve login tokens so that the user does not have to sign in again.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000002 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EditBookmarksEnabled"/>EditBookmarksEnabled</h3><span>Enable or disable bookmark editing</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EditBookmarksEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EditBookmarksEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EditBookmarksEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">EditBookmarksEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 12</li><li>Chromium OS (Chromium OS) since version 12</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If you enable this setting, bookmarks can be added, removed or modified. This is the default also when this policy is not set.</p><p>If you disable this setting, bookmarks cannot be added, removed or modified. Existing bookmarks are still available.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EnableDeprecatedWebPlatformFeatures"/>EnableDeprecatedWebPlatformFeatures</h3><span>Enable deprecated web platform features for a limited time</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:multi-select]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EnableDeprecatedWebPlatformFeatures</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnableDeprecatedWebPlatformFeatures</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EnableDeprecatedWebPlatformFeatures</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">EnableDeprecatedWebPlatformFeatures</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 37</li><li>Chromium OS (Chromium OS) since version 37</li><li>Chromium (Android) since version 37</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specify a list of deprecated web platform features to re-enable temporarily.</p><p>This policy gives administrators the ability to re-enable deprecated web platform features for a limited time. Features are identified by a string tag and the features corresponding to the tags included in the list specified by this policy will get re-enabled.</p><p>If this policy is left not set or the list is empty or does not match one of the supported string tags, all deprecated web platform features will remain disabled.</p><p>While the policy itself is supported on the above platforms, the feature that it is enabling may be available on fewer platforms. Not all deprecated Web Platform features can be re-enabled. Only the ones explicitly listed below can be for a limited period of time, which is different per feature. The general format of the string tag will be [DeprecatedFeatureName]_EffectiveUntil[yyyymmdd]. As reference, you can find the intent behind the Web Platform feature changes at <a href="https://bit.ly/blinkintents">https://bit.ly/blinkintents</a>.
</p><ul><li>&quot;ExampleDeprecatedFeature_EffectiveUntil20080902&quot; = Enable ExampleDeprecatedFeature API through 2008/09/02</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\EnableDeprecatedWebPlatformFeatures\1 = &quot;ExampleDeprecatedFeature_EffectiveUntil20080902&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\EnableDeprecatedWebPlatformFeatures\1 = &quot;ExampleDeprecatedFeature_EffectiveUntil20080902&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;ExampleDeprecatedFeature_EffectiveUntil20080902&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;ExampleDeprecatedFeature_EffectiveUntil20080902&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EnableOnlineRevocationChecks"/>EnableOnlineRevocationChecks</h3><span>Enable online OCSP/CRL checks</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EnableOnlineRevocationChecks</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnableOnlineRevocationChecks</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EnableOnlineRevocationChecks</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 19</li><li>Chromium OS (Chromium OS) since version 19</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>In light of the fact that soft-fail, online revocation checks provide no effective security benefit, they are disabled by default in Chromium version 19 and later. By setting this policy to true, the previous behaviour is restored and online OCSP/CRL checks will be performed.</p><p>If the policy is not set, or is set to false, then Chromium will not perform online revocation checks in Chromium 19 and later.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EnableSyncConsent"/>EnableSyncConsent</h3><span>Enable displaying Sync Consent during sign-in</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnableSyncConsent</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls if Sync Consent can be shown to the user during first sign-in. It should be set to false if Sync Consent is never needed for the user.
If set to false, Sync Consent will not be displayed.
If set to true or unset, Sync Consent can be displayed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EnabledPlugins"/>EnabledPlugins (deprecated)</h3><span>Specify a list of enabled plug-ins</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EnabledPlugins</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnabledPlugins</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EnabledPlugins</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Please use the DefaultPluginsSetting to control the availability of the Flash plugin and AlwaysOpenPdfExternally to control whether the integrated PDF viewer should be used for opening PDF files.</p><p>Specifies a list of plugins that are enabled in Chromium and prevents users from changing this setting.</p><p>The wildcard characters '*' and '?' can be used to match sequences of arbitrary characters. '*' matches an arbitrary number of characters while '?' specifies an optional single character, i.e. matches zero or one characters. The escape character is '\', so to match actual '*', '?' or '\' characters, you can put a '\' in front of them.</p><p>The specified list of plugins is always used in Chromium if they are installed. The plugins are marked as enabled in 'about:plugins' and users cannot disable them.</p><p>Note that this policy overrides both DisabledPlugins and DisabledPluginsExceptions.</p><p>If this policy is left not set, the user can disable any plugin installed on the system.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\EnabledPlugins\1 = &quot;Java&quot;
Software\Policies\Chromium\EnabledPlugins\2 = &quot;Shockwave Flash&quot;
Software\Policies\Chromium\EnabledPlugins\3 = &quot;Chrome PDF Viewer&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\EnabledPlugins\1 = &quot;Java&quot;
Software\Policies\ChromiumOS\EnabledPlugins\2 = &quot;Shockwave Flash&quot;
Software\Policies\ChromiumOS\EnabledPlugins\3 = &quot;Chrome PDF Viewer&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;Java&quot;,
&quot;Shockwave Flash&quot;,
&quot;Chrome PDF Viewer&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;Java&lt;/string&gt;
&lt;string&gt;Shockwave Flash&lt;/string&gt;
&lt;string&gt;Chrome PDF Viewer&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="EnterpriseHardwarePlatformAPIEnabled"/>EnterpriseHardwarePlatformAPIEnabled</h3><span>Enables managed extensions to use the Enterprise Hardware Platform API</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\EnterpriseHardwarePlatformAPIEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\EnterpriseHardwarePlatformAPIEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">EnterpriseHardwarePlatformAPIEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">EnterpriseHardwarePlatformAPIEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 71</li><li>Chromium OS (Chromium OS) since version 71</li><li>Chromium (Android) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set to enabled, extensions installed by enterprise policy are allowed to use the Enterprise Hardware Platform API.
When this policy is set to disabled or not set, no extensions are allowed to use the Enterprise Hardware Platform API.
This policy also applies to component extensions such as the Hangout Services extension.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ExternalStorageDisabled"/>ExternalStorageDisabled</h3><span>Disable mounting of external storage</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExternalStorageDisabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 22</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set to true, external storage will not be available in the file browser.</p><p>This policy affects all types of storage media. For example: USB flash drives, external hard drives, SD and other memory cards, optical storage, etc. Internal storage is not affected, therefore files saved in the Download folder can still be accessed. Google Drive is also not affected by this policy.</p><p>If this setting is disabled or not configured then users can use all supported types of external storage on their device.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ExternalStorageReadOnly"/>ExternalStorageReadOnly</h3><span>Treat external storage devices as read-only</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ExternalStorageReadOnly</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 54</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set to true, users cannot write anything to external storage devices.</p><p>If this setting is set to false or not configured, then users can create and modify files of external storage devices which are physically writable.</p><p>The ExternalStorageDisabled policy takes precedence over this policy – if ExternalStorageDisabled is set to true, then all access to external storage is disabled and this policy is consequently ignored.</p><p>Dynamic refresh of this policy is supported in M56 and later.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceBrowserSignin"/>ForceBrowserSignin (deprecated)</h3><span>Enable force sign-in for Chromium</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceBrowserSignin</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ForceBrowserSignin</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ForceBrowserSignin</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 64</li><li>Chromium (Mac) since version 66</li><li>Chromium (Android) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Consider using BrowserSignin instead.</p><p>If this policy is set to true, the user has to sign in to Chromium with their profile before using the browser. And the default value of BrowserGuestModeEnabled will be set to false. Note: Existing unsigned profiles will be locked and inaccessible after enabling this policy. For more information, see help centre article.</p><p>If this policy is set to false or not configured, user can use the browser without sign in to Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceEphemeralProfiles"/>ForceEphemeralProfiles</h3><span>Ephemeral profile</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceEphemeralProfiles</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ForceEphemeralProfiles</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 32</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If set to enabled this policy forces the profile to be switched to ephemeral mode. If this policy is specified as an OS policy (e.g. GPO on Windows) it will apply to every profile on the system; if the policy is set as a Cloud policy it will apply only to a profile signed in with a managed account.</p><p>In this mode the profile data is persisted on disk only for the length of the user session. Features like browser history, extensions and their data, web data like cookies and web databases are not preserved after the browser is closed. However this does not prevent the user from downloading any data to disk manually, save pages or print them.</p><p>If the user has enabled sync, all this data is preserved in their sync profile just as with regular profiles. Incognito mode is also available if not explicitly disabled by policy.</p><p>If the policy is set to disabled or left not set signing in leads to regular profiles.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceGoogleSafeSearch"/>ForceGoogleSafeSearch</h3><span>Force Google SafeSearch</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceGoogleSafeSearch</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ForceGoogleSafeSearch</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ForceGoogleSafeSearch</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ForceGoogleSafeSearch</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 41</li><li>Chromium OS (Chromium OS) since version 41</li><li>Chromium (Android) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Forces queries in Google Web Search to be done with SafeSearch set to active and prevents users from changing this setting.</p><p>If you enable this setting, SafeSearch in Google Search is always active.</p><p>If you disable this setting or do not set a value, SafeSearch in Google Search is not enforced.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceMaximizeOnFirstRun"/>ForceMaximizeOnFirstRun</h3><span>Maximise the first browser window on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ForceMaximizeOnFirstRun</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 43</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true, Chromium will unconditionally maximise the first window shown on first run.
If this policy is set to false or not configured, the decision whether to maximise the first window shown will be based on the screen size.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceNetworkInProcess"/>ForceNetworkInProcess</h3><span>Force networking code to run in the browser process</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceNetworkInProcess</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 72</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces networking code to run in the browser process.</p><p>This policy is disabled by default, and if enabled, leaves users open to the security issues once the networking process is sandboxed.</p><p>This policy is intended to give enterprises a chance to migrate to third-party software that does not depend on hooking the networking APIs. Proxy servers are recommended over LSPs and Win32 API patching.</p><p>If this policy is not set, networking code may run out of the browser process depending on field trials of the Network Service experiment.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceSafeSearch"/>ForceSafeSearch (deprecated)</h3><span>Force SafeSearch</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceSafeSearch</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ForceSafeSearch</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ForceSafeSearch</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ForceSafeSearch</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 25</li><li>Chromium OS (Chromium OS) since version 25</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated; please use ForceGoogleSafeSearch and ForceYouTubeRestrict instead. This policy is ignored if either the ForceGoogleSafeSearch, the ForceYouTubeRestrict or the (deprecated) ForceYouTubeSafetyMode policies are set.</p><p>Forces queries in Google Web Search to be done with SafeSearch set to active and prevents users from changing this setting. This setting also forces Moderate Restricted Mode on YouTube.</p><p>If you enable this setting, SafeSearch in Google Search and Moderate Restricted Mode YouTube is always active.</p><p>If you disable this setting or do not set a value, SafeSearch in Google Search and Restricted Mode in YouTube is not enforced.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceYouTubeRestrict"/>ForceYouTubeRestrict</h3><span>Force minimum YouTube Restricted Mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceYouTubeRestrict</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ForceYouTubeRestrict</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ForceYouTubeRestrict</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ForceYouTubeRestrict</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 55</li><li>Chromium OS (Chromium OS) since version 55</li><li>Chromium (Android) since version 55</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enforces a minimum Restricted Mode on YouTube and prevents users from
picking a less restricted mode.</p><p>If this setting is set to Strict, Strict Restricted Mode on YouTube is always active.</p><p>If this setting is set to Moderate, the user may only pick Moderate Restricted Mode
and Strict Restricted Mode on YouTube, but cannot disable Restricted Mode.</p><p>If this setting is set to Off or no value is set, Restricted Mode on YouTube is not enforced by Chromium. However, external policies such as YouTube policies might still enforce Restricted Mode.</p><ul><li>0 = Do not enforce Restricted Mode on YouTube</li><li>1 = Enforce at least Moderate Restricted Mode on YouTube</li><li>2 = Enforce Strict Restricted Mode for YouTube</li></ul></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the Android YouTube app. If Safety Mode on YouTube should be enforced, installation of the Android YouTube app should be disallowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), 0 (Linux), 0 (Android), 0 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ForceYouTubeSafetyMode"/>ForceYouTubeSafetyMode (deprecated)</h3><span>Force YouTube Safety Mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ForceYouTubeSafetyMode</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ForceYouTubeSafetyMode</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ForceYouTubeSafetyMode</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ForceYouTubeSafetyMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 41</li><li>Chromium OS (Chromium OS) since version 41</li><li>Chromium (Android) since version 41</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Consider using ForceYouTubeRestrict, which overrides this policy and allows more fine-grained tuning.</p><p>Forces YouTube Moderate Restricted Mode and prevents users from changing this setting.</p><p>If this setting is enabled, Restricted Mode on YouTube is always enforced to be at least Moderate.</p><p>If this setting is disabled or no value is set, Restricted Mode on YouTube is not enforced by Chromium. External policies such as YouTube policies might still enforce Restricted Mode, though.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the Android YouTube app. If Safety Mode on YouTube should be enforced, installation of the Android YouTube app should be disallowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="FullscreenAllowed"/>FullscreenAllowed</h3><span>Allow fullscreen mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\FullscreenAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\FullscreenAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">FullscreenAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 31</li><li>Chromium (Linux) since version 31</li><li>Chromium OS (Chromium OS) since version 31</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the availability of full screen mode in which all Chromium UI is hidden and only web content is visible.</p><p>If this policy is set to true or not configured, the user, apps and extensions with appropriate permissions can enter full screen mode.</p><p>If this policy is set to false, neither the user nor any apps or extensions can enter full screen mode.</p><p>On all platforms except Chromium OS, kiosk mode is unavailable when full screen mode is disabled.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy has no effect on the Android apps. They will be able to enter full screen mode even if this policy is set to False.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="HardwareAccelerationModeEnabled"/>HardwareAccelerationModeEnabled</h3><span>Use hardware acceleration when available</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\HardwareAccelerationModeEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">HardwareAccelerationModeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 46</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or left unset, hardware acceleration will be enabled unless a certain GPU feature is blacklisted.</p><p>If this policy is set to false, hardware acceleration will be disabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="HideWebStoreIcon"/>HideWebStoreIcon</h3><span>Hide the web store from the New Tab Page and app launcher</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\HideWebStoreIcon</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\HideWebStoreIcon</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">HideWebStoreIcon</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 26</li><li>Chromium OS (Chromium OS) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Hide the Chrome Web Store app and footer link from the New Tab Page and Chromium OS app launcher.</p><p>When this policy is set to true, the icons are hidden.</p><p>When this policy is set to false or is not configured, the icons are visible.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="Http09OnNonDefaultPortsEnabled"/>Http09OnNonDefaultPortsEnabled (deprecated)</h3><span>Enable HTTP/0.9 support on non-default ports</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\Http09OnNonDefaultPortsEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\Http09OnNonDefaultPortsEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">Http09OnNonDefaultPortsEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 54 until version 77</li><li>Chromium OS (Chromium OS) since version 54 until version 77</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated, and slated for removal in Chrome 78, with no replacement.</p><p>This policy enables HTTP/0.9 on ports other than 80 for HTTP and 443 for HTTPS.</p><p>This policy is disabled by default, and if enabled, leaves users open to the security issue <a href="https://crbug.com/600352">https://crbug.com/600352</a>.</p><p>This policy is intended to give enterprises a chance to migrate exising servers off of HTTP/0.9, and will be removed in the future.</p><p>If this policy is not set, HTTP/0.9 will be disabled on non-default ports.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ImportAutofillFormData"/>ImportAutofillFormData</h3><span>Import auto-fill form data from default browser on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImportAutofillFormData</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImportAutofillFormData</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 39</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces the auto-fill form data to be imported from the previous default browser if enabled. If enabled, this policy also affects the import dialogue.</p><p>If disabled, the auto-fill form data is not imported.</p><p>If it is not set, the user may be asked whether to import or importing may happen automatically.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ImportBookmarks"/>ImportBookmarks</h3><span>Import bookmarks from default browser on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImportBookmarks</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImportBookmarks</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces bookmarks to be imported from the current default browser if enabled. If enabled, this policy also affects the import dialogue.</p><p>If disabled, no bookmarks are imported.</p><p>If it is not set, the user may be asked whether to import or importing may happen automatically.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ImportHistory"/>ImportHistory</h3><span>Import browsing history from default browser on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImportHistory</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImportHistory</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces the browsing history to be imported from the current default browser, if enabled. If enabled, this policy also affects the import dialogue.</p><p>If disabled, no browsing history is imported.</p><p>If it is not set, the user may be asked whether to import or importing may happen automatically.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ImportHomepage"/>ImportHomepage</h3><span>Import of homepage from default browser on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImportHomepage</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImportHomepage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces the home page to be imported from the current default browser if enabled.</p><p>If disabled, the home page is not imported.</p><p>If it is not set, the user may be asked whether to import or importing may happen automatically.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ImportSavedPasswords"/>ImportSavedPasswords</h3><span>Import saved passwords from default browser on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImportSavedPasswords</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImportSavedPasswords</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces the saved passwords to be imported from the previous default browser, if enabled. If enabled, this policy also affects the import dialogue.</p><p>If disabled, the saved passwords are not imported.</p><p>If it is not set, the user may be asked whether to import or importing may happen automatically.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ImportSearchEngine"/>ImportSearchEngine</h3><span>Import search engines from default browser on first run</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ImportSearchEngine</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ImportSearchEngine</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy forces search engines to be imported from the current default browser, if enabled. If enabled, this policy also affects the import dialogue.</p><p>If disabled, the default search engine is not imported.</p><p>If it is not set, the user may be asked whether to import or importing may happen automatically.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="IncognitoEnabled"/>IncognitoEnabled (deprecated)</h3><span>Enable Incognito mode</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\IncognitoEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IncognitoEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">IncognitoEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">IncognitoEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 11</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Please, use IncognitoModeAvailability instead.
Enables Incognito mode in Chromium.</p><p>If this setting is enabled or not configured, users can open web pages in incognito mode.</p><p>If this setting is disabled, users cannot open web pages in incognito mode.</p><p>If this policy is left unset, this will be enabled and the user will be able to use incognito mode.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), false (Android), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="IncognitoModeAvailability"/>IncognitoModeAvailability</h3><span>Incognito mode availability</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\IncognitoModeAvailability</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IncognitoModeAvailability</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">IncognitoModeAvailability</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">IncognitoModeAvailability</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 14</li><li>Chromium OS (Chromium OS) since version 14</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies whether the user may open pages in Incognito mode in Chromium.</p><p>If 'Enabled' is selected or the policy is left unset, pages may be opened in Incognito mode.</p><p>If 'Disabled' is selected, pages may not be opened in Incognito mode.</p><p>If 'Forced' is selected, pages may be opened ONLY in Incognito mode.</p><ul><li>0 = Incognito mode available.</li><li>1 = Incognito mode disabled.</li><li>2 = Incognito mode forced.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="InstantTetheringAllowed"/>InstantTetheringAllowed</h3><span>Allow Instant Tethering to be used.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\InstantTetheringAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 60</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, users will be allowed to use Instant Tethering, which allows their Google phone to share its mobile data with their device.</p><p>If this setting is disabled, users will not be allowed to use Instant Tethering.</p><p>If this policy is left not set, the default is not allowed for enterprise-managed users and allowed for non-managed users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="IsolateOrigins"/>IsolateOrigins</h3><span>Enable Site Isolation for specified origins</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\IsolateOrigins</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\IsolateOrigins</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">IsolateOrigins</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 63</li><li>Chromium OS (Chromium OS) since version 63</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If the policy is enabled, each of the named origins in a comma-separated list will run in its own process. This will also isolate origins named by sub-domains; e.g. specifying <a href="https://example.com/">https://example.com/</a> will also cause <a href="https://foo.example.com/">https://foo.example.com/</a> to be isolated as part of the <a href="https://example.com/">https://example.com/</a> site.
If the policy is not configured or disabled, the user will be able to change this setting.</p><p>NOTE: This policy does not apply on Android. To enable IsolateOrigins on Android, use the IsolateOriginsAndroid policy setting.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://example.com/,https://othersite.org/&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="IsolateOriginsAndroid"/>IsolateOriginsAndroid</h3><span>Enable Site Isolation for specified origins on Android devices</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">IsolateOriginsAndroid</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If the policy is enabled, each of the named origins in a
comma-separated list will run in its own process. This will also isolate
origins named by subdomains; e.g. specifying <a href="https://example.com/">https://example.com/</a> will
also cause <a href="https://foo.example.com/">https://foo.example.com/</a> to be isolated as part of the
<a href="https://example.com/">https://example.com/</a> site.
If the policy is disabled, no explicit Site Isolation will happen and field trials of IsolateOriginsAndroid and SitePerProcessAndroid will be disabled. Users will still be able to enable IsolateOrigins manually, via command line flag.
If the policy is not configured, the user will be able to change this setting.</p><p>NOTE: On Android, Site Isolation is experimental. Support will improve over time, but currently it may cause performance problems.</p><p>NOTE: This policy applies only to Chrome on Android running on devices with strictly more than 1 GB of RAM. To apply the policy on non-Android platforms, use IsolateOrigins.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://example.com/,https://othersite.org/&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="JavascriptEnabled"/>JavascriptEnabled (deprecated)</h3><span>Enable JavaScript</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\JavascriptEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\JavascriptEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">JavascriptEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">JavascriptEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated, please use DefaultJavaScriptSetting instead.</p><p>Can be used to disable JavaScript in Chromium.</p><p>If this setting is disabled, web pages cannot use JavaScript and the user cannot change that setting.</p><p>If this setting is enabled or not set, web pages can use JavaScript but the user can change that setting.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="KeyPermissions"/>KeyPermissions</h3><span>Key Permissions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\KeyPermissions</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 45</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Grants access to corporate keys to extensions.</p><p>Keys are designated for corporate usage if they're generated using the chrome.enterprise.platformKeys API on a managed account. Keys imported or generated in another way are not designated for corporate usage.</p><p>Access to keys designated for corporate usage is solely controlled by this policy. The user can neither grant nor withdraw access to corporate keys to or from extensions.</p><p>By default an extension cannot use a key designated for corporate usage, which is equivalent to setting allowCorporateKeyUsage to false for that extension.</p><p>Only if allowCorporateKeyUsage is set to true for an extension, it can use any platform key marked for corporate usage to sign arbitrary data. This permission should only be granted if the extension is trusted to secure access to the key against attackers.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Android apps cannot get access to corporate keys. This policy has no effect on them.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;additionalProperties&quot;: {
&quot;properties&quot;: {
&quot;allowCorporateKeyUsage&quot;: {
&quot;description&quot;: &quot;If set to true, this extension can use all keys that are designated for corporate usage to sign arbitrary data. If set to false, it cannot access any such keys and the user cannot grant such permission either.&quot;,
&quot;type&quot;: &quot;boolean&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\KeyPermissions = {
&quot;extension1&quot;: {
&quot;allowCorporateKeyUsage&quot;: true
},
&quot;extension2&quot;: {
&quot;allowCorporateKeyUsage&quot;: false
}
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="MachineLevelUserCloudPolicyEnrollmentToken"/>MachineLevelUserCloudPolicyEnrollmentToken (deprecated)</h3><span>The enrolment token of cloud policy on desktop</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\MachineLevelUserCloudPolicyEnrollmentToken</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">MachineLevelUserCloudPolicyEnrollmentToken</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
This policy is deprecated in M72. Please use CloudManagementEnrollmentToken instead.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;37185d02-e055-11e7-80c1-9a214cf093ae&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ManagedBookmarks"/>ManagedBookmarks</h3><span>Managed Bookmarks</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Android:string, Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ManagedBookmarks</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ManagedBookmarks</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ManagedBookmarks</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ManagedBookmarks</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 30</li><li>Chromium (Linux, Mac, Windows) since version 37</li><li>Chromium OS (Chromium OS) since version 37</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures a list of managed bookmarks.</p><p>The policy consists of a list of bookmarks whereas each bookmark is a dictionary containing the keys 'name' and 'url' which hold the bookmark's name and its target. A subfolder may be configured by defining a bookmark without an 'url' key but with an additional 'children' key, which itself contains a list of bookmarks as defined above (some of which may be folders again). Chromium amends incomplete URLs as if they were submitted via the Omnibox, for example 'google.com' becomes '<a href="https://google.com/'">https://google.com/'</a>.</p><p>These bookmarks are placed in a folder that can't be modified by the user (but the user can choose to hide it from the bookmark bar). By default, the folder name is 'Managed bookmarks' but it can be customised by adding to the list of bookmarks a dictionary containing the key 'toplevel_name' with the desired folder name as the value.</p><p>Managed bookmarks are not synced to the user account and can't be modified by extensions.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;id&quot;: &quot;BookmarkType&quot;,
&quot;properties&quot;: {
&quot;children&quot;: {
&quot;items&quot;: {
&quot;$ref&quot;: &quot;BookmarkType&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;name&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;toplevel_name&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ManagedBookmarks = [
{
&quot;toplevel_name&quot;: &quot;My managed bookmarks folder&quot;
},
{
&quot;name&quot;: &quot;Google&quot;,
&quot;url&quot;: &quot;google.com&quot;
},
{
&quot;name&quot;: &quot;Youtube&quot;,
&quot;url&quot;: &quot;youtube.com&quot;
},
{
&quot;children&quot;: [
{
&quot;name&quot;: &quot;Chromium&quot;,
&quot;url&quot;: &quot;chromium.org&quot;
},
{
&quot;name&quot;: &quot;Chromium Developers&quot;,
&quot;url&quot;: &quot;dev.chromium.org&quot;
}
],
&quot;name&quot;: &quot;Chrome links&quot;
}
]</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ManagedBookmarks = [
{
&quot;toplevel_name&quot;: &quot;My managed bookmarks folder&quot;
},
{
&quot;name&quot;: &quot;Google&quot;,
&quot;url&quot;: &quot;google.com&quot;
},
{
&quot;name&quot;: &quot;Youtube&quot;,
&quot;url&quot;: &quot;youtube.com&quot;
},
{
&quot;children&quot;: [
{
&quot;name&quot;: &quot;Chromium&quot;,
&quot;url&quot;: &quot;chromium.org&quot;
},
{
&quot;name&quot;: &quot;Chromium Developers&quot;,
&quot;url&quot;: &quot;dev.chromium.org&quot;
}
],
&quot;name&quot;: &quot;Chrome links&quot;
}
]</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">ManagedBookmarks: [
{
&quot;toplevel_name&quot;: &quot;My managed bookmarks folder&quot;
},
{
&quot;name&quot;: &quot;Google&quot;,
&quot;url&quot;: &quot;google.com&quot;
},
{
&quot;name&quot;: &quot;Youtube&quot;,
&quot;url&quot;: &quot;youtube.com&quot;
},
{
&quot;children&quot;: [
{
&quot;name&quot;: &quot;Chromium&quot;,
&quot;url&quot;: &quot;chromium.org&quot;
},
{
&quot;name&quot;: &quot;Chromium Developers&quot;,
&quot;url&quot;: &quot;dev.chromium.org&quot;
}
],
&quot;name&quot;: &quot;Chrome links&quot;
}
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;key&gt;ManagedBookmarks&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;toplevel_name&lt;/key&gt;
&lt;string&gt;My managed bookmarks folder&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;name&lt;/key&gt;
&lt;string&gt;Google&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;google.com&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;name&lt;/key&gt;
&lt;string&gt;Youtube&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;youtube.com&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;children&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;name&lt;/key&gt;
&lt;string&gt;Chromium&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;chromium.org&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;name&lt;/key&gt;
&lt;string&gt;Chromium Developers&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;dev.chromium.org&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;
&lt;key&gt;name&lt;/key&gt;
&lt;string&gt;Chrome links&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="MaxConnectionsPerProxy"/>MaxConnectionsPerProxy</h3><span>Maximum number of concurrent connections to the proxy server</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\MaxConnectionsPerProxy</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">MaxConnectionsPerProxy</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 14</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the maximal number of simultaneous connections to the proxy server.</p><p>Some proxy servers can not handle high number of concurrent connections per client and this can be solved by setting this policy to a lower value.</p><p>The value of this policy should be lower than 100 and higher than 6 and the default value is 32.</p><p>Some web apps are known to consume many connections with hanging GETs, so lowering below 32 may lead to browser networking hangs if too many such web apps are open. Lower below the default at your own risk.</p><p>If this policy is left not set the default value will be used which is 32.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000020 (Windows), 32 (Linux), 32 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="MaxInvalidationFetchDelay"/>MaxInvalidationFetchDelay</h3><span>Maximum fetch delay after a policy invalidation</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\MaxInvalidationFetchDelay</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\MaxInvalidationFetchDelay</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">MaxInvalidationFetchDelay</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 30</li><li>Chromium OS (Chromium OS) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the maximum delay in milliseconds between receiving a policy invalidation and fetching the new policy from the device management service.</p><p>Setting this policy overrides the default value of 5,000 milliseconds. Valid values for this policy are in the range from 1,000 (1 second) to 300,000 (5 minutes). Any values not in this range will be clamped to the respective boundary.</p><p>Leaving this policy not set will make Chromium use the default value of 5,000 milliseconds.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00002710 (Windows), 10000 (Linux), 10000 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="MediaRouterCastAllowAllIPs"/>MediaRouterCastAllowAllIPs</h3><span>Allow Google Cast to connect to Cast devices on all IP addresses.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\MediaRouterCastAllowAllIPs</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\MediaRouterCastAllowAllIPs</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">MediaRouterCastAllowAllIPs</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 67</li><li>Chromium OS (Chromium OS) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true, Google Cast will connect to Cast devices on all IP addresses, not just RFC1918/RFC4193 private addresses.</p><p>If this policy is set to false, Google Cast will connect to Cast devices on RFC1918/RFC4193 private addresses only.</p><p>If this policy is not set, Google Cast will connect to Cast devices on RFC1918/RFC4193 private addresses only, unless the CastAllowAllIPs feature is enabled.</p><p>If the policy 'EnableMediaRouter' is set to false, then this policy's value would have no effect.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="MetricsReportingEnabled"/>MetricsReportingEnabled</h3><span>Enable reporting of usage and crash-related data</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\MetricsReportingEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">MetricsReportingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables anonymous reporting of usage and crash-related data about Chromium to Google, and prevents users from changing this setting.</p><p>If this setting is enabled, anonymous reporting of usage and crash-related
data is sent to Google. If it is disabled, this information is not sent
to Google. In both cases, users cannot change or override the setting.
If this policy is left not set, the setting will be what the user chose
upon installation/first run.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.
(For Chrome OS, see DeviceMetricsReportingEnabled.)</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="NTPContentSuggestionsEnabled"/>NTPContentSuggestionsEnabled</h3><span>Show content suggestions on the New Tab page</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">NTPContentSuggestionsEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 54</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this is set to true or not set, the New Tab page may show content suggestions based on the user's browsing history, interests or location.</p><p>If this is set to false, automatically-generated content suggestions are not shown on the New Tab page.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>true (Android)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="NetworkPredictionOptions"/>NetworkPredictionOptions</h3><span>Enable network prediction.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Android:choice, Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\NetworkPredictionOptions</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NetworkPredictionOptions</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">NetworkPredictionOptions</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">NetworkPredictionOptions</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 38</li><li>Chromium OS (Chromium OS) since version 38</li><li>Chromium (Android) since version 38</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables network prediction in Chromium and prevents users from changing this setting.</p><p>This controls DNS pre-fetching, TCP and SSL pre-connection and pre-rendering of web pages.</p><p>If you set this policy, users cannot change or override this setting in Chromium.</p><p>If this policy is left not set, network prediction will be enabled but the user will be able to change it.</p><ul><li>0 = Predict network actions on any network connection</li><li>1 = Predict network actions on any network that is not cellular.
(Deprecated in 50, removed in 52. After 52, if value 1 is set, it will be treated as 0 – predict network actions on any network connection.)</li><li>2 = Do not predict network actions on any network connection</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Android), 1 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="NoteTakingAppsLockScreenWhitelist"/>NoteTakingAppsLockScreenWhitelist</h3><span>Whitelist note-taking apps allowed on the Chromium OS lock screen</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\NoteTakingAppsLockScreenWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies list of apps that can be enabled as a note-taking app on the Chromium OS lock screen.</p><p>If the preferred note-taking app is enabled on the lock screen, the lock screen will contain UI element for launching the preferred note taking app.
When launched, the app will be able to create an app window on top of the lock screen and create data items (notes) in the lock screen context. The app will be able to import created notes to the primary user session, when the session is unlocked. Currently, only Chrome note-taking apps are supported on the lock screen.</p><p>If the policy is set, the user will be allowed to enable an app on the lock screen only if the app's extension ID is contained in the policy list value.
As a consequence, setting this policy to an empty list will disable note-taking on the lock screen entirely.
Note that the policy containing an app ID does not necessarily mean that the user will be able to enable the app as a note-taking app on the lock screen - for example, on Chrome 61, the set of available apps is additionally restricted by the platform.</p><p>If the policy is left unset, there will be no restrictions on the set of apps the user can enable on the lock screen imposed by the policy.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\NoteTakingAppsLockScreenWhitelist\1 = &quot;abcdefghabcdefghabcdefghabcdefgh&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="OpenNetworkConfiguration"/>OpenNetworkConfiguration</h3><span>User-level network configuration</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\OpenNetworkConfiguration</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 16</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows pushing network configuration to be applied per-user to a Chromium OS device. The network configuration is a JSON-formatted string as defined by the Open Network Configuration format.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Android apps can use the network configurations and CA certificates set via this policy, but do not have access to some configuration options.</p></dd><dt style="font-weight: bold;">Expanded schema description:</dt><dd><a href="https://chromium.googlesource.com/chromium/src/+/master/components/onc/docs/onc_spec.md">https://chromium.googlesource.com/chromium/src/+/master/components/onc/docs/onc_spec.md</a></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;{ &quot;NetworkConfigurations&quot;: [ { &quot;GUID&quot;: &quot;{4b224dfd-6849-7a63-5e394343244ae9c9}&quot;, &quot;Name&quot;: &quot;my WiFi&quot;, &quot;Type&quot;: &quot;WiFi&quot;, &quot;WiFi&quot;: { &quot;SSID&quot;: &quot;my WiFi&quot;, &quot;HiddenSSID&quot;: false, &quot;Security&quot;: &quot;None&quot;, &quot;AutoConnect&quot;: true } } ] }&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="OverrideSecurityRestrictionsOnInsecureOrigin"/>OverrideSecurityRestrictionsOnInsecureOrigin</h3><span>Origins or hostname patterns for which restrictions on
insecure origins should not apply</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\OverrideSecurityRestrictionsOnInsecureOrigin</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\OverrideSecurityRestrictionsOnInsecureOrigin</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">OverrideSecurityRestrictionsOnInsecureOrigin</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">OverrideSecurityRestrictionsOnInsecureOrigin</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li><li>Chromium (Android) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
The policy specifies a list of origins (URLs) or hostname patterns (such
as '*.example.com') for which security restrictions on insecure origins
will not apply.</p><p>The intent is to allow organisations to set whitelist origins for legacy
applications that cannot deploy TLS, or to set up a staging server for
internal web development so that their developers can test out features
requiring secure contexts without having to deploy TLS on the staging
server. This policy will also prevent the origin from being labelled
'Not Secure' in the omnibox.</p><p>Setting a list of URLs in this policy has the same effect as setting the
command-line flag '--unsafely-treat-insecure-origin-as-secure' to a
comma-separated list of the same URLs. If the policy is set, it will
override the command-line flag.</p><p>This policy will override UnsafelyTreatInsecureOriginAsSecure, if present.</p><p>For more information on secure contexts, see
<a href="https://www.w3.org/TR/secure-contexts/">https://www.w3.org/TR/secure-contexts/</a>.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\OverrideSecurityRestrictionsOnInsecureOrigin\1 = &quot;http://testserver.example.com/&quot;
Software\Policies\Chromium\OverrideSecurityRestrictionsOnInsecureOrigin\2 = &quot;*.example.org&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\OverrideSecurityRestrictionsOnInsecureOrigin\1 = &quot;http://testserver.example.com/&quot;
Software\Policies\ChromiumOS\OverrideSecurityRestrictionsOnInsecureOrigin\2 = &quot;*.example.org&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;http://testserver.example.com/&quot;,
&quot;*.example.org&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;http://testserver.example.com/&lt;/string&gt;
&lt;string&gt;*.example.org&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ParentAccessCodeConfig"/>ParentAccessCodeConfig</h3><span>Parent Access Code Configuration</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ParentAccessCodeConfig</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 73</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy specifies configuration that is used to generate and verify Parent Access Code.</p><p>|current_config| is always used for generating access code and should be used for validating access code only when it cannot be validated with |future_config|.
|future_config| is the primary config used for validating access code.
|old_configs| should be used for validating access code only when it cannot be validated with |future_config| nor |current_config|.</p><p>The expected way of using this policy is to gradually rotate access code configuration. New configuration is always put into |future_config| and at the same
time the existing value is moved into |current_config|. |current_config|'s previous values are moved into |old_configs| and removed after rotation cycle is finished.</p><p>This policy applies only to child user.
When this policy is set, Parent Access Code can be verified on child user's device.
When this policy is unset, it is not possible to verify Parent Access Code on child user's device.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;current_config&quot;: {
&quot;description&quot;: &quot;Configuration used to generate and verify Parent Access Code.&quot;,
&quot;id&quot;: &quot;Config&quot;,
&quot;properties&quot;: {
&quot;access_code_ttl&quot;: {
&quot;description&quot;: &quot;Time that access code is valid for (in seconds).&quot;,
&quot;maximum&quot;: 3600,
&quot;minimum&quot;: 60,
&quot;type&quot;: &quot;integer&quot;
},
&quot;clock_drift_tolerance&quot;: {
&quot;description&quot;: &quot;The allowed difference between the clock on child and parent devices (in seconds).&quot;,
&quot;maximum&quot;: 1800,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;shared_secret&quot;: {
&quot;description&quot;: &quot;Secret shared between child and parent devices.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;future_config&quot;: {
&quot;$ref&quot;: &quot;Config&quot;
},
&quot;old_configs&quot;: {
&quot;items&quot;: {
&quot;$ref&quot;: &quot;Config&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;sensitiveValue&quot;: true,
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ParentAccessCodeConfig = {
&quot;current_config&quot;: {
&quot;access_code_ttl&quot;: 600,
&quot;clock_drift_tolerance&quot;: 300,
&quot;shared_secret&quot;: &quot;oOA9nX02LdhYdOzwMsGof+QA3wUKP4YMNlk9S/W3o+w=&quot;
},
&quot;future_config&quot;: {
&quot;access_code_ttl&quot;: 600,
&quot;clock_drift_tolerance&quot;: 300,
&quot;shared_secret&quot;: &quot;KMsoIjnpvcWmiU1GHchp2blR96mNyJwS&quot;
},
&quot;old_configs&quot;: [
{
&quot;access_code_ttl&quot;: 600,
&quot;clock_drift_tolerance&quot;: 300,
&quot;shared_secret&quot;: &quot;sTr6jqMTJGCbLhWI5plFTQb/VsqxwX2Q&quot;
}
]
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="PinnedLauncherApps"/>PinnedLauncherApps</h3><span>List of pinned apps to show in the launcher</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PinnedLauncherApps</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 20</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Lists the application identifiers Chromium OS shows as pinned apps in the launcher bar.</p><p>If this policy is configured, the set of applications is fixed and can't be changed by the user.</p><p>If this policy is left unset, the user may change the list of pinned apps in the launcher.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>This policy can also be used to pin Android apps.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PinnedLauncherApps\1 = &quot;pjkljhegncpnkpknbcohdijeoejaedia&quot;
Software\Policies\ChromiumOS\PinnedLauncherApps\2 = &quot;com.google.android.gm&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="PolicyDictionaryMultipleSourceMergeList"/>PolicyDictionaryMultipleSourceMergeList</h3><span>Allow merging dictionary policies from different sources</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PolicyDictionaryMultipleSourceMergeList</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PolicyDictionaryMultipleSourceMergeList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PolicyDictionaryMultipleSourceMergeList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 76</li><li>Chromium OS (Chromium OS) since version 76</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows the selected policies to be merged when they come from different sources, with the same scopes and level.</p><p>The merging consists in merging the first level keys of the dictionary from each source. In case of conflict between keys, the key coming from the highest priority source will be applied.</p><p>If a policy is in the list, in case there is conflict between two sources, given that they have the same scopes and level, the values will be merged into a new policy dictionary.</p><p>If a policy is in the list, in case there is conflict between two sources but also between different scopes and/or level, the policy with the highest priority will be applied.</p><p>If a policy is not in the list, in case there is any conflict between sources, scopes and/or level, the policy with the highest priority will be applied.</p><ul><li>&quot;ContentPackManualBehaviorURLs&quot; = Managed user manual exception URLs</li><li>&quot;DeviceLoginScreenPowerManagement&quot; = Power management on the login screen</li><li>&quot;ExtensionSettings&quot; = Extension management settings</li><li>&quot;KeyPermissions&quot; = Key Permissions</li><li>&quot;PowerManagementIdleSettings&quot; = Power management settings when the user becomes idle</li><li>&quot;ScreenBrightnessPercent&quot; = Screen brightness per cent</li><li>&quot;ScreenLockDelays&quot; = Screen lock delays</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PolicyDictionaryMultipleSourceMergeList\1 = &quot;ExtensionSettings&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PolicyDictionaryMultipleSourceMergeList\1 = &quot;ExtensionSettings&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;ExtensionSettings&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;ExtensionSettings&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="PolicyListMultipleSourceMergeList"/>PolicyListMultipleSourceMergeList</h3><span>Allow merging list policies from different sources</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PolicyListMultipleSourceMergeList</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PolicyListMultipleSourceMergeList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PolicyListMultipleSourceMergeList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 75</li><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows the selected policies to be merged when they come from different sources, with the same scopes and level.</p><p>If a policy is in the list, in case there is conflict between two sources, given that they have the same scopes and level, the values will be merged into a new policy list.</p><p>If a policy is in the list, in case there is conflict between two sources but also between different scopes and/or level, the policy with the highest priority will be applied.</p><p>If a policy is not in the list, in case there is any conflict between sources, scopes and/or level, the policy with the highest priority will be applied.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\PolicyListMultipleSourceMergeList\1 = &quot;ExtensionInstallWhitelist&quot;
Software\Policies\Chromium\PolicyListMultipleSourceMergeList\2 = &quot;ExtensionInstallBlacklist&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\PolicyListMultipleSourceMergeList\1 = &quot;ExtensionInstallWhitelist&quot;
Software\Policies\ChromiumOS\PolicyListMultipleSourceMergeList\2 = &quot;ExtensionInstallBlacklist&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;ExtensionInstallWhitelist&quot;,
&quot;ExtensionInstallBlacklist&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;ExtensionInstallWhitelist&lt;/string&gt;
&lt;string&gt;ExtensionInstallBlacklist&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="PolicyRefreshRate"/>PolicyRefreshRate</h3><span>Refresh rate for user policy</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PolicyRefreshRate</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies the period in milliseconds at which the device management service is queried for user policy information.</p><p>Setting this policy overrides the default value of 3 hours. Valid values for this policy are in the range from 1,800,000 (30 minutes) to 86,400,000 (1 day). Any values not in this range will be clamped to the respective boundary. If the platform supports policy notifications, the refresh delay will be set to 24 hours because it is expected that policy notifications will force a refresh automatically whenever policy changes.</p><p>Leaving this policy not set will make Chromium use the default value of 3 hours.</p><p>Note that if the platform supports policy notifications, the refresh delay will be set to 24 hours (ignoring all defaults and the value of this policy) because it is expected that policy notifications will force a refresh automatically whenever policy changes, making more frequent refreshes unnecessary.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x0036ee80 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="PromotionalTabsEnabled"/>PromotionalTabsEnabled</h3><span>Enable showing full-tab promotional content</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PromotionalTabsEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PromotionalTabsEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to control the presentation of full-tab promotional and/or educational content in Chromium.</p><p>If not configured or enabled (set to true), Chromium may show full-tab content to users to provide product information.</p><p>If disabled (set to false), Chromium will not show full-tab content to users to provide product information.</p><p>This setting controls the presentation of the welcome pages that help users sign in to Chromium, choose it as their default browser or otherwise inform them of product features.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="PromptForDownloadLocation"/>PromptForDownloadLocation</h3><span>Ask where to save each file before downloading</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\PromptForDownloadLocation</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\PromptForDownloadLocation</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">PromptForDownloadLocation</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 64</li><li>Chromium OS (Chromium OS) since version 64</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If the policy is enabled, the user will be asked where to save each file before downloading.
If the policy is disabled, downloads will start immediately, and the user will not be asked where to save the file.
If the policy is not configured, the user will be able to change this setting.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ProxySettings"/>ProxySettings</h3><span>Proxy settings</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Android:string, Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ProxySettings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ProxySettings</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ProxySettings</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">ProxySettings</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 18</li><li>Chromium OS (Chromium OS) since version 18</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the proxy settings for Chromium. These proxy settings will be available for ARC apps too.</p><p>If you enable this setting, Chromium and ARC apps ignore all proxy-related options specified from the command line.</p><p>Leaving this policy not set will allow the users to choose the proxy settings on their own.</p><p>If the ProxySettings policy is set, it will override any of the individual policies ProxyMode, ProxyPacUrl, ProxyServer, ProxyBypassList and ProxyServerMode.</p><p>The ProxyMode field allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings.</p><p>The ProxyPacUrl field is a URL to a proxy .pac file.</p><p>The ProxyServer field is a URL of the proxy server.</p><p>The ProxyBypassList field is a list of proxy hosts that Chromium will bypass.</p><p>The ProxyServerMode field is deprecated in favour of the field 'ProxyMode'. It allows you to specify the proxy server used by Chromium and prevents users from changing proxy settings.</p><p>If you choose the value 'direct' as 'ProxyMode', a proxy will never be used and all other fields will be ignored.</p><p>If you choose the value 'system' as 'ProxyMode', the systems's proxy will be used and all other fields will be ignored.</p><p>If you choose the value 'auto_detect' as 'ProxyMode', all other fields will be ignored.</p><p>If you choose the value 'fixed_server' as 'ProxyMode', the 'ProxyServer' and 'ProxyBypassList' fields will be used.</p><p>If you choose the value 'pac_script' as 'ProxyMode', the 'ProxyPacUrl' and 'ProxyBypassList' fields will be used.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Only a subset of proxy configuration options are made available to Android apps. Android apps may voluntarily choose to use the proxy. You cannot force them to use a proxy.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;ProxyBypassList&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;ProxyMode&quot;: {
&quot;enum&quot;: [
&quot;direct&quot;,
&quot;auto_detect&quot;,
&quot;pac_script&quot;,
&quot;fixed_servers&quot;,
&quot;system&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;ProxyPacUrl&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;ProxyServer&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;ProxyServerMode&quot;: {
&quot;$ref&quot;: &quot;ProxyServerMode&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\ProxySettings = {
&quot;ProxyBypassList&quot;: &quot;https://www.example1.com,https://www.example2.com,https://internalsite/&quot;,
&quot;ProxyMode&quot;: &quot;direct&quot;,
&quot;ProxyPacUrl&quot;: &quot;https://internal.site/example.pac&quot;,
&quot;ProxyServer&quot;: &quot;123.123.123.123:8080&quot;,
&quot;ProxyServerMode&quot;: 2
}</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\ProxySettings = {
&quot;ProxyBypassList&quot;: &quot;https://www.example1.com,https://www.example2.com,https://internalsite/&quot;,
&quot;ProxyMode&quot;: &quot;direct&quot;,
&quot;ProxyPacUrl&quot;: &quot;https://internal.site/example.pac&quot;,
&quot;ProxyServer&quot;: &quot;123.123.123.123:8080&quot;,
&quot;ProxyServerMode&quot;: 2
}</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">ProxySettings: {
&quot;ProxyBypassList&quot;: &quot;https://www.example1.com,https://www.example2.com,https://internalsite/&quot;,
&quot;ProxyMode&quot;: &quot;direct&quot;,
&quot;ProxyPacUrl&quot;: &quot;https://internal.site/example.pac&quot;,
&quot;ProxyServer&quot;: &quot;123.123.123.123:8080&quot;,
&quot;ProxyServerMode&quot;: 2
}</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;key&gt;ProxySettings&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;ProxyBypassList&lt;/key&gt;
&lt;string&gt;https://www.example1.com,https://www.example2.com,https://internalsite/&lt;/string&gt;
&lt;key&gt;ProxyMode&lt;/key&gt;
&lt;string&gt;direct&lt;/string&gt;
&lt;key&gt;ProxyPacUrl&lt;/key&gt;
&lt;string&gt;https://internal.site/example.pac&lt;/string&gt;
&lt;key&gt;ProxyServer&lt;/key&gt;
&lt;string&gt;123.123.123.123:8080&lt;/string&gt;
&lt;key&gt;ProxyServerMode&lt;/key&gt;
&lt;integer&gt;2&lt;/integer&gt;
&lt;/dict&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="QuicAllowed"/>QuicAllowed</h3><span>Allow QUIC protocol</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\QuicAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\QuicAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">QuicAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 43</li><li>Chromium OS (Chromium OS) since version 43</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or not set usage of QUIC protocol in Chromium is allowed.
If this policy is set to false usage of QUIC protocol is disallowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RelaunchHeadsUpPeriod"/>RelaunchHeadsUpPeriod</h3><span>Set the time of the first user relaunch notification</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RelaunchHeadsUpPeriod</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 76</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set the time period, in milliseconds, between the first notification that a Chromium OS device must be restarted to apply a pending update and the end of the time period specified by the RelaunchNotificationPeriod policy.</p><p>If not set, the default period of 86400000 milliseconds (one day) is used for Chromium OS devices.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:3600000</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x05265c00 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RelaunchNotification"/>RelaunchNotification</h3><span>Notify a user that a browser relaunch or device restart is recommended or required</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RelaunchNotification</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RelaunchNotification</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RelaunchNotification</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 66</li><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Notify users that Chromium must be relaunched or Chromium OS must be restarted to apply a pending update.</p><p>This policy setting enables notifications to inform the user that a browser relaunch or device restart is recommended or required. If not set, Chromium indicates to the user that a relaunch is needed via subtle changes to its menu, while Chromium OS indicates such via a notification in the system tray. If set to 'Recommended', a recurring warning will be shown to the user that a relaunch is recommended. The user can dismiss this warning to defer the relaunch. If set to 'Required', a recurring warning will be shown to the user indicating that a browser relaunch will be forced once the notification period passes. The default period is seven days for Chromium and four days for Chromium OS, and may be configured via the RelaunchNotificationPeriod policy setting.</p><p>The user's session is restored following the relaunch/restart.</p><ul><li>1 = Show a recurring prompt to the user indicating that a relaunch is recommended</li><li>2 = Show a recurring prompt to the user indicating that a relaunch is required</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), 1 (Linux), 1 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RelaunchNotificationPeriod"/>RelaunchNotificationPeriod</h3><span>Set the time period for update notifications</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RelaunchNotificationPeriod</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RelaunchNotificationPeriod</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RelaunchNotificationPeriod</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 67</li><li>Chromium OS (Chromium OS) since version 67</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to set the time period, in milliseconds, over which users are notified that Chromium must be relaunched or that a Chromium OS device must be restarted to apply a pending update.</p><p>Over this time period, the user will be repeatedly informed of the need for an update. For Chromium OS devices, a restart notification appears in the system tray according to the RelaunchHeadsUpPeriod policy. For Chromium browsers, the app menu changes to indicate that a relaunch is needed once one third of the notification period passes. This notification changes colour once two thirds of the notification period passes, and again once the full notification period has passed. The additional notifications enabled by the RelaunchNotification policy follow this same schedule.</p><p>If not set, the default period of 345600000 milliseconds (four days) is used for Chromium OS devices and 604800000 milliseconds (one week) for Chromium.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:3600000</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x240c8400 (Windows), 604800000 (Linux), 604800000 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ReportCrostiniUsageEnabled"/>ReportCrostiniUsageEnabled</h3><span>Report information about usage of Linux apps</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Information about the usage of Linux apps is sent back to the
server.</p><p>If the policy is set to false or left unset, no usage information is
reported. If set to true, usage information is reported.</p><p>This policy only applies if Linux app support is enabled.</p></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RequireOnlineRevocationChecksForLocalAnchors"/>RequireOnlineRevocationChecksForLocalAnchors</h3><span>Require online OCSP/CRL checks for local trust anchors</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RequireOnlineRevocationChecksForLocalAnchors</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RequireOnlineRevocationChecksForLocalAnchors</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RequireOnlineRevocationChecksForLocalAnchors</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 30</li><li>Chromium (Linux) since version 30</li><li>Chromium (Windows) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this setting is enabled, Chromium will always perform revocation checking for server certificates that successfully validate and are signed by locally-installed CA certificates.</p><p>If Chromium is unable to obtain revocation status information, such certificates will be treated as revoked ('hard-fail').</p><p>If this policy is not set or it is set to false then Chromium will use the existing online revocation checking settings.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RestrictAccountsToPatterns"/>RestrictAccountsToPatterns</h3><span>Restrict accounts that are visible in Chromium</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">RestrictAccountsToPatterns</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Contains a list of patterns which are used to control the visiblity of accounts in Chromium.</p><p>Each Google Account on the device will be compared to patterns stored in this policy to determine the account visibility in Chromium. The account will be visible if its name matches any pattern on the list. Otherwise, the account will be hidden.</p><p>Use the wildcard character '*' to match zero or more arbitrary characters. The escape character is '\', so to match actual '*' or '\' characters, put a '\' in front of them.</p><p>If this policy is not set, all Google Accounts on the device will be visible in Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;*@example.com&quot;,
&quot;user@managedchrome.com&quot;
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RestrictSigninToPattern"/>RestrictSigninToPattern</h3><span>Restrict which Google accounts are allowed to be set as browser primary accounts in Chromium</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RestrictSigninToPattern</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RestrictSigninToPattern</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 21</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Contains a regular expression which is used to determine which Google Accounts can be set as browser primary accounts in Chromium (i.e. the account that is chosen during the Sync opt-in flow).</p><p>An appropriate error is displayed if a user tries to set a browser primary account with a username that does not match this pattern.</p><p>If this policy is left not set or blank, then the user can set any Google Account as a browser primary account in Chromium.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;.*@example.com&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RoamingProfileLocation"/>RoamingProfileLocation</h3><span>Set the roaming profile directory</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RoamingProfileLocation</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the directory that Chromium will use for storing the roaming copy of the profiles.</p><p>If you set this policy, Chromium will use the provided directory to store the roaming copy of the profiles if the RoamingProfileSupportEnabled policy has been enabled. If the RoamingProfileSupportEnabled policy is disabled or left unset, the value stored in this policy is not used.</p><p>See <a href="https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables">https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables</a> for a list of variables that can be used.</p><p>If this policy is left not set, the default roaming profile path will be used.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;${roaming_app_data}\chrome-profile&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RoamingProfileSupportEnabled"/>RoamingProfileSupportEnabled</h3><span>Enable the creation of roaming copies for Chromium profile data</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RoamingProfileSupportEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 57</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If you enable this setting, the settings stored in Chromium profiles such as bookmarks, auto-fill data, passwords, etc. will also be written to a file stored in the Roaming user profile folder or a location specified by the Administrator through the RoamingProfileLocation policy. Enabling this policy disables cloud sync.</p><p>If this policy is disabled or left not set only the regular local profiles will be used.</p><p>The SyncDisabled policy disables all data synchronisation, overriding RoamingProfileSupportEnabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="RunAllFlashInAllowMode"/>RunAllFlashInAllowMode</h3><span>Extend Flash content setting to all content</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\RunAllFlashInAllowMode</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\RunAllFlashInAllowMode</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">RunAllFlashInAllowMode</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 63</li><li>Chromium OS (Chromium OS) since version 63</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If you enable this setting, all Flash content embedded on websites that have been set to allow Flash in content settings – either by the user or by enterprise policy – will be run, including content from other origins or small content.</p><p>To control which websites are allowed to run Flash, see the 'DefaultPluginsSetting', 'PluginsAllowedForURLs' and 'PluginsBlockedForURLs' policies.</p><p>If this setting is disabled or not set, Flash content from other origins or small content might be blocked.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SAMLOfflineSigninTimeLimit"/>SAMLOfflineSigninTimeLimit</h3><span>Limit the time for which a user authenticated via SAML can log in offline</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SAMLOfflineSigninTimeLimit</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>During login, Chromium OS can authenticate against a server (online) or using a cached password (offline).</p><p>When this policy is set to a value of -1, the user can authenticate offline indefinitely. When this policy is set to any other value, it specifies the length of time since the last online authentication after which the user must use online authentication again.</p><p>Leaving this policy not set will make Chromium OS use a default time limit of 14 days, after which the user must use online authentication again.</p><p>This policy only affects users who authenticated using SAML.</p><p>The policy value should be specified in seconds.</p></dd><dt style="font-weight: bold;">Restrictions:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Minimum:-1</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000020 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SSLErrorOverrideAllowed"/>SSLErrorOverrideAllowed</h3><span>Allow proceeding from the SSL warning page</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SSLErrorOverrideAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SSLErrorOverrideAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SSLErrorOverrideAllowed</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SSLErrorOverrideAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 44</li><li>Chromium OS (Chromium OS) since version 44</li><li>Chromium (Android) since version 44</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Chrome shows a warning page when users navigate to sites that have SSL errors. By default or when this policy is set to true, users are allowed to click through these warning pages.
Setting this policy to false disallows users to click through any warning page.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SSLVersionMin"/>SSLVersionMin</h3><span>Minimum SSL version enabled</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Android:choice, Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SSLVersionMin</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SSLVersionMin</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SSLVersionMin</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SSLVersionMin</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 66</li><li>Chromium OS (Chromium OS) since version 66</li><li>Chromium (Android) since version 66</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is not configured then Chromium uses a default minimum version which is TLS 1.0.</p><p>Otherwise it may be set to one of the following values: 'tls1', 'tls1.1' or 'tls1.2'. When set, Chromium will not use SSL/TLS versions less than the specified version. An unrecognised value will be ignored.</p><ul><li>&quot;tls1&quot; = TLS 1.0</li><li>&quot;tls1.1&quot; = TLS 1.1</li><li>&quot;tls1.2&quot; = TLS 1.2</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;tls1&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SafeBrowsingForTrustedSourcesEnabled"/>SafeBrowsingForTrustedSourcesEnabled</h3><span>Enable Safe Browsing for trusted sources</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SafeBrowsingForTrustedSourcesEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 61</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Identify if Chromium can allow download without Safe Browsing checks when it's from a trusted source.</p><p>When False, downloaded files will not be sent to be analysed by Safe Browsing when it's from a trusted source.</p><p>When not set (or set to True), downloaded files are sent to be analysed by Safe Browsing, even when it's from a trusted source.</p><p>Note that these restrictions apply to downloads triggered from web page content, as well as the 'download link…' context menu option. These restrictions do not apply to the save/download of the currently displayed page, nor does it apply to saving as PDF from the printing options.</p><p>This policy is available only on Windows instances that are joined to a Microsoft® Active Directory® domain. It also applies to Windows 10 Pro or Enterprise instances that enrolled for device management.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SafeSitesFilterBehavior"/>SafeSitesFilterBehavior</h3><span>Control SafeSites adult content filtering.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SafeSitesFilterBehavior</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SafeSitesFilterBehavior</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SafeSitesFilterBehavior</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls the application of the SafeSites URL filter.
This filter uses the Google Safe Search API to classify URLs as pornographic or not.</p><p>When this policy is not configured or set to 'Do not filter sites for adult content', sites will not be filtered.</p><p>When this policy is set to 'Filter top-level sites for adult content', sites classified as pornographic will be filtered.</p><ul><li>0 = Do not filter sites for adult content</li><li>1 = Filter top-level sites (but not embedded iframes) for adult content</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), 0 (Linux), 0 (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SavingBrowserHistoryDisabled"/>SavingBrowserHistoryDisabled</h3><span>Disable saving browser history</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SavingBrowserHistoryDisabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SavingBrowserHistoryDisabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SavingBrowserHistoryDisabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SavingBrowserHistoryDisabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables saving browser history in Chromium and prevents users from changing this setting.</p><p>If this setting is enabled, browsing history is not saved. This setting also disables tab syncing.</p><p>If this setting is disabled or not set, browsing history is saved.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SchedulerConfiguration"/>SchedulerConfiguration</h3><span>Select task scheduler configuration</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SchedulerConfiguration</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 74</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Instructs Chromium OS to use the task scheduler configuration identified by the specified name.</p><p>This policy can be set to 'conservative' and 'performance', which select task scheduler configurations that are tuned for stability vs. maximum performance, respectively.</p><p>If the policy is left unset, the user can make their own choice.</p><ul><li>&quot;conservative&quot; = Optimise for stability.</li><li>&quot;performance&quot; = Optimise for performance.</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;performance&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SearchSuggestEnabled"/>SearchSuggestEnabled</h3><span>Enable search suggestions</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SearchSuggestEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SearchSuggestEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SearchSuggestEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SearchSuggestEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables search suggestions in Chromium's omnibox and prevents users from changing this setting.</p><p>If you enable this setting, search suggestions are used.</p><p>If you disable this setting, search suggestions are never used.</p><p>If you enable or disable this setting, users cannot change or override this setting in Chromium.</p><p>If this policy is left not set, this will be enabled but the user will be able to change it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SecondaryGoogleAccountSigninAllowed"/>SecondaryGoogleAccountSigninAllowed</h3><span>Allow Multiple Sign-in Within the Browser</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SecondaryGoogleAccountSigninAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This setting allows users to switch between Google Accounts within the content area of their browser window after they sign in to their Chromium OS device.</p><p>If this policy is set to false, signing in to a different account from non-Incognito browser content area will not be allowed.</p><p>If this policy is unset or set to true, the default behaviour will be used: signing in to a different account from the browser content area will be allowed, except for child accounts where it will be blocked for non-Incognito content area.</p><p>In case signing in to a different account shouldn't be allowed via the Incognito mode, consider blocking that mode using the IncognitoModeAvailability policy.</p><p>Note that users will be able to access Google services in an unauthenticated state by blocking their cookies.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SecurityKeyPermitAttestation"/>SecurityKeyPermitAttestation</h3><span>URLs/domains automatically permitted direct Security Key attestation</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SecurityKeyPermitAttestation</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SecurityKeyPermitAttestation</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SecurityKeyPermitAttestation</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 65</li><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies URLs and domains for which no prompt will be shown when attestation certificates from Security Keys are requested. Additionally, a signal will be sent to the Security Key indicating that individual attestation may be used. Without this, users will be prompted in Chrome 65+ when sites request attestation of Security Keys.</p><p>URLs (like <a href="https://example.com/some/path">https://example.com/some/path</a>) will only match as U2F appIDs. Domains (like example.com) only match as webauthn RP IDs. Thus, to cover both U2F and webauthn APIs for a given site, both the appID URL and domain would need to be listed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\SecurityKeyPermitAttestation\1 = &quot;https://example.com&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\SecurityKeyPermitAttestation\1 = &quot;https://example.com&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://example.com&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://example.com&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SessionLengthLimit"/>SessionLengthLimit</h3><span>Limit the length of a user session</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Integer [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SessionLengthLimit</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>When this policy is set, it specifies the length of time after which a user is automatically logged out, terminating the session. The user is informed about the remaining time by a countdown timer shown in the system tray.</p><p>When this policy is not set, the session length is not limited.</p><p>If you set this policy, users cannot change or override it.</p><p>The policy value should be specified in milliseconds. Values are clamped to a range of 30 seconds to 24 hours.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x0036ee80 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SessionLocales"/>SessionLocales</h3><span>Set the recommended locales for a managed session</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SessionLocales</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 38</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Sets one or more recommended locales for a managed session, allowing users to easily choose one of these locales.</p><p>The user can choose a locale and a keyboard layout before starting a managed session. By default, all locales supported by Chromium OS are listed in alphabetic order. You can use this policy to move a set of recommended locales to the top of the list.</p><p>If this policy is not set, the current UI locale will be pre-selected.</p><p>If this policy is set, the recommended locales will be moved to the top of the list and will be visually separated from all other locales. The recommended locales will be listed in the order in which they appear in the policy. The first recommended locale will be pre-selected.</p><p>If there is more than one recommended locale, it is assumed that users will want to select from these locales. Locale and keyboard layout selection will be prominently offered when starting a managed session. Otherwise, it is assumed that most users will want to use the pre-selected locale. Locale and keyboard layout selection will be less prominently offered when starting a managed session.</p><p>When this policy is set and automatic login is enabled (see the |DeviceLocalAccountAutoLoginId| and |DeviceLocalAccountAutoLoginDelay| policies), the automatically started managed session will use the first recommended locale and the most popular keyboard layout matching this locale.</p><p>The pre-selected keyboard layout will always be the most popular layout matching the pre-selected locale.</p><p>This policy can only be set as recommended. You can use this policy to move a set of recommended locales to the top but users are always allowed to choose any locale supported by Chromium OS for their session.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\SessionLocales\1 = &quot;de&quot;
Software\Policies\ChromiumOS\SessionLocales\2 = &quot;fr&quot;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ShelfAutoHideBehavior"/>ShelfAutoHideBehavior</h3><span>Control shelf auto-hiding</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ShelfAutoHideBehavior</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Control auto-hiding of the Chromium OS shelf.</p><p>If this policy is set to 'AlwaysAutoHideShelf', the shelf will always auto-hide.</p><p>If this policy is set to 'NeverAutoHideShelf', the shelf never auto-hides.</p><p>If you set this policy, users cannot change or override it.</p><p>If the policy is left not set, users can choose whether the shelf should auto-hide.</p><ul><li>&quot;Always&quot; = Always auto-hide the shelf</li><li>&quot;Never&quot; = Never auto-hide the shelf</li></ul></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;Always&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ShowAppsShortcutInBookmarkBar"/>ShowAppsShortcutInBookmarkBar</h3><span>Show the apps shortcut in the bookmark bar</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ShowAppsShortcutInBookmarkBar</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">ShowAppsShortcutInBookmarkBar</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 37</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables or disables the apps shortcut in the bookmark bar.</p><p>If this policy is not set then the user can choose to show or hide the apps shortcut from the bookmark bar context menu.</p><p>If this policy is configured then the user can't change it, and the apps shortcut is always shown or never shown.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ShowLogoutButtonInTray"/>ShowLogoutButtonInTray</h3><span>Add a logout button to the system tray</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\ShowLogoutButtonInTray</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If enabled, a big, red logout button is shown in the system tray while a session is active and the screen is not locked.</p><p>If disabled or not specified, no big, red logout button is shown in the system tray.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SignedHTTPExchangeEnabled"/>SignedHTTPExchangeEnabled</h3><span>Enable Signed HTTP Exchange (SXG) support</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SignedHTTPExchangeEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SignedHTTPExchangeEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SignedHTTPExchangeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 75</li><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable support for Signed HTTP Exchange (SXG).</p><p>If this policy is unset or set to Enabled, Google Chrome will accept web contents served as Signed HTTP Exchanges.</p><p>If this policy is set to Disabled, Signed HTTP Exchanges cannot be loaded.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SigninAllowed"/>SigninAllowed (deprecated)</h3><span>Allow sign-in to Chromium</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SigninAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SigninAllowed</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SigninAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 27</li><li>Chromium (Android) since version 38</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy is deprecated. Consider using BrowserSignin instead.</p><p>Allows the user to sign in to Chromium.</p><p>If you set this policy, you can configure whether a user is allowed to sign in to Chromium. Setting this policy to 'False' will prevent apps and extensions that use the chrome.identity API from functioning, so you may want to use SyncDisabled instead.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SitePerProcess"/>SitePerProcess</h3><span>Enable Site Isolation for every site</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SitePerProcess</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SitePerProcess</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SitePerProcess</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 63</li><li>Chromium OS (Chromium OS) since version 63</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
This setting, SitePerProcess, may be used to disallow users from opting out of the default behavior of isolating all sites. Note that the IsolateOrigins policy may also be useful for isolating additional, finer-grained origins.
If the policy is enabled, users will be unable to opt out of the default behavior where each site runs in its own process.
If the policy is not configured or disabled, the user will be able to opt out of site isolation
(e.g. using &quot;Disable site isolation&quot; entry in chrome://flags). Setting the policy to disabled and/or not configuring the policy does not turn off Site Isolation.
On Chromium OS version 76 and earlier, it is recommended to also set the DeviceLoginScreenSitePerProcess device policy to the same value. If the values specified by the two policies don't match, a delay may be incurred when entering a user session while the value specified by user policy is being applied.</p><p>NOTE: This policy does not apply on Android. To enable SitePerProcess on Android, use the SitePerProcessAndroid policy setting.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SitePerProcessAndroid"/>SitePerProcessAndroid</h3><span>Enable Site Isolation for every site</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">SitePerProcessAndroid</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Android) since version 68</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
You might want to look at the IsolateOriginsAndroid policy setting to get the best of both worlds – isolation and limited impact for users – by using IsolateOriginsAndroid, with a list of sites that you want to isolate. This setting, SitePerProcessAndroid, isolates all sites.
If the policy is enabled, each site will run in its own process.
If the policy is disabled, no explicit Site Isolation will happen and field trials of IsolateOriginsAndroid and SitePerProcessAndroid will be disabled. However, users will still be able to facilitate SitePerProcess manually.
If the policy is not configured, the user will be able to change this setting.</p><p>NOTE: On Android, Site Isolation is experimental. Support will improve over time, but currently it may cause performance problems.</p><p>NOTE: This policy only applies to Chrome on Android, running on devices with strictly more than 1 GB of RAM. To apply the policy on non-Android platforms, use SitePerProcess.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>true (Android)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SmartLockSigninAllowed"/>SmartLockSigninAllowed</h3><span>Allow Smart Lock Sign-in to be used.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SmartLockSigninAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, users will be allowed to sign into their account with Smart Lock. This is more permissive than usual Smart Lock behaviour which only allows users to unlock their screen.</p><p>If this setting is disabled, users will not be allowed to use Smart Lock Sign-in.</p><p>If this policy is left not set, the default is not allowed for enterprise-managed users and allowed for non-managed users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SmsMessagesAllowed"/>SmsMessagesAllowed</h3><span>Allow SMS messages to be synced from phone to Chromebook.</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SmsMessagesAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this setting is enabled, users will be allowed to set up their devices to sync SMS messages between their phones and Chromebooks. Note that if this policy is allowed, users must explicitly opt into this feature by completing a setup flow. Once the setup flow is complete, users will be able to send and receive SMS messages on their Chromebooks.</p><p>If this setting is disabled, users will not be allowed to set up SMS syncing.</p><p>If this policy is left not set, the default is not allowed for managed users and allowed for non-managed users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SpellCheckServiceEnabled"/>SpellCheckServiceEnabled</h3><span>Enable or disable spell checking web service</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SpellCheckServiceEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SpellCheckServiceEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SpellCheckServiceEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 22</li><li>Chromium OS (Chromium OS) since version 22</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Chromium can use a Google web service to help resolve spelling errors. If this setting is enabled, then this service is always used. If this setting is disabled, then this service is never used.</p><p>Spell checking can still be performed using a downloaded dictionary; this policy only controls the usage of the online service.</p><p>If this setting is not configured then users can choose whether the spell checking service should be used or not.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SpellcheckEnabled"/>SpellcheckEnabled</h3><span>Enable spellcheck</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SpellcheckEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SpellcheckEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SpellcheckEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 65</li><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is not set, the user can enable or disable spellcheck in the language settings.</p><p>If this policy is set to true, spellcheck is enabled and the user cannot disable it. On Microsoft® Windows, Chromium OS and Linux, spellcheck languages can be individually toggled on or off, so that the user can still effectively disable spellcheck by toggling off every spellcheck language. To avoid that, the SpellcheckLanguage policy can be used to force specific spellcheck languages to be enabled.</p><p>If this policy is set to false, spellcheck is disabled and the user cannot enable it. The SpellcheckLanguage and SpellcheckLanguageBlacklist policies have no effect when this policy is set to false.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SpellcheckLanguage"/>SpellcheckLanguage</h3><span>Force enable spellcheck languages</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SpellcheckLanguage</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SpellcheckLanguage</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SpellcheckLanguage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 65</li><li>Chromium (Linux) since version 65</li><li>Chromium OS (Chromium OS) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Force-enables spellcheck languages. Unrecognised languages in the list will be ignored.</p><p>If you enable this policy, spellcheck will be enabled for the languages specified, in addition to the languages for which the user has enabled spellcheck.</p><p>If you do not set this policy, or disable it, there will be no change to the user's spellcheck preferences.</p><p>If the SpellcheckEnabled policy is set to false, this policy will have no effect.</p><p>If a language is included in both this policy and the SpellcheckLanguageBlacklist policy, this policy is prioritised and the spellcheck language is enabled.</p><p>The currently supported languages are: af, bg, ca, cs, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\SpellcheckLanguage\1 = &quot;fr&quot;
Software\Policies\Chromium\SpellcheckLanguage\2 = &quot;es&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\SpellcheckLanguage\1 = &quot;fr&quot;
Software\Policies\ChromiumOS\SpellcheckLanguage\2 = &quot;es&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;fr&quot;,
&quot;es&quot;
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SpellcheckLanguageBlacklist"/>SpellcheckLanguageBlacklist</h3><span>Force disable spellcheck languages</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SpellcheckLanguageBlacklist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SpellcheckLanguageBlacklist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SpellcheckLanguageBlacklist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 75</li><li>Chromium (Linux) since version 75</li><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Force-disables spellcheck languages. Unrecognised languages in that list will be ignored.</p><p>If you enable this policy, spellcheck will be disabled for the languages specified. The user can still enable or disable spellcheck for languages not in the list.</p><p>If you do not set this policy, or disable it, there will be no change to the user's spellcheck preferences.</p><p>If the SpellcheckEnabled policy is set to false, this policy will have no effect.</p><p>If a language is included in both this policy and the SpellcheckLanguage policy, the latter is prioritised and the spellcheck language will be enabled.</p><p>The currently supported languages are: af, bg, ca, cs, da, de, el, en-AU, en-CA, en-GB, en-US, es, es-419, es-AR, es-ES, es-MX, es-US, et, fa, fo, fr, he, hi, hr, hu, id, it, ko, lt, lv, nb, nl, pl, pt-BR, pt-PT, ro, ru, sh, sk, sl, sq, sr, sv, ta, tg, tr, uk, vi.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\SpellcheckLanguageBlacklist\1 = &quot;fr&quot;
Software\Policies\Chromium\SpellcheckLanguageBlacklist\2 = &quot;es&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\SpellcheckLanguageBlacklist\1 = &quot;fr&quot;
Software\Policies\ChromiumOS\SpellcheckLanguageBlacklist\2 = &quot;es&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;fr&quot;,
&quot;es&quot;
]</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="StartupBrowserWindowLaunchSuppressed"/>StartupBrowserWindowLaunchSuppressed</h3><span>Suppress launching of browser window</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\StartupBrowserWindowLaunchSuppressed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 76</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy controls whether the browser window should be launched at the start of the session.</p><p>If this policy is enabled, the browser window will not be launched.</p><p>If this policy is disabled or not set, the browser window is allowed to launch. Note that the browser window might not launch due to other policies or command-line flags.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SuppressUnsupportedOSWarning"/>SuppressUnsupportedOSWarning</h3><span>Suppress the unsupported OS warning</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SuppressUnsupportedOSWarning</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SuppressUnsupportedOSWarning</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SuppressUnsupportedOSWarning</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 49</li><li>Chromium OS (Chromium OS) since version 49</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Suppresses the warning that appears when Chromium is running on a computer or operating system that is no longer supported.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="SyncDisabled"/>SyncDisabled</h3><span>Disable synchronisation of data with Google</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\SyncDisabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\SyncDisabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">SyncDisabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 8</li><li>Chromium OS (Chromium OS) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Disables data synchronisation in Chromium using Google-hosted synchronisation services and prevents users from changing this setting.</p><p>If you enable this setting, users cannot change or override this setting in Chromium.</p><p>If this policy is left not set, Google Sync will be available for the user to choose whether to use it or not.</p><p>To fully disable Google Sync, it is recommended that you disable the Google Sync service in the Google Admin console.</p><p>This policy should not be enabled when RoamingProfileSupportEnabled policy is set to enabled as that feature shares the same client-side functionality. The Google-hosted synchronisation is disabled in this case completely.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Disabling Google Sync will cause Android Backup and Restore to not function properly.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="TabLifecyclesEnabled"/>TabLifecyclesEnabled</h3><span>Enables or disables tab lifecycles</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\TabLifecyclesEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>The tab life cycles feature reclaims CPU and eventually memory associated with running tabs that have not been used in a long period of time, by first throttling them, then freezing them and finally discarding them.</p><p>If the policy is set to false then tab lifecycles are disabled, and all tabs will be left running normally.</p><p>If the policy is set to true or left unspecified then tab life cycles are enabled.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="TaskManagerEndProcessEnabled"/>TaskManagerEndProcessEnabled</h3><span>Enable ending processes in Task Manager</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\TaskManagerEndProcessEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\TaskManagerEndProcessEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">TaskManagerEndProcessEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 52</li><li>Chromium OS (Chromium OS) since version 52</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If set to false, the 'End process' button is disabled in the Task Manager.</p><p>If set to true or not configured, the user can end processes in the Task Manager.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="TermsOfServiceURL"/>TermsOfServiceURL</h3><span>Set the Terms of Service for a device-local account</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\TermsOfServiceURL</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 26</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Sets the Terms of Service that the user must accept before starting a device-local account session.</p><p>If this policy is set, Chromium OS will download the Terms of Service and present them to the user whenever a device-local account session is starting. The user will only be allowed into the session after accepting the Terms of Service.</p><p>If this policy is not set, no Terms of Service are shown.</p><p>The policy should be set to a URL from which Chromium OS can download the Terms of Service. The Terms of Service must be plain text, served as MIME type text/plain. No markup is allowed.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;https://www.example.com/terms_of_service.txt&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="ThirdPartyBlockingEnabled"/>ThirdPartyBlockingEnabled</h3><span>Enable third-party software injection blocking</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\ThirdPartyBlockingEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set to false then third-party software will be allowed to inject executable code into Chrome's processes. If the policy is unset or set to true then third-party software will be prevented from injecting executable code into Chrome's processes.</p><p>Regardless of the value of this policy, the browser will not currently block third-party software from injecting executable code into its processes on a machine that is joined to a Microsoft® Active Directory® domain.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="TouchVirtualKeyboardEnabled"/>TouchVirtualKeyboardEnabled</h3><span>Enable virtual keyboard</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\TouchVirtualKeyboardEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 37</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy configures enabling the virtual keyboard as an input device on ChromeOS. Users cannot override this policy.</p><p>If the policy is set to true, the on-screen virtual keyboard will always be enabled.</p><p>If set to false, the on-screen virtual keyboard will always be disabled.</p><p>If you set this policy, users cannot change or override it. However, users will still be able to enable/disable an accessibility on-screen keyboard which takes precedence over the virtual keyboard controlled by this policy. See the |VirtualKeyboardEnabled| policy for controlling the accessibility on-screen keyboard.</p><p>If this policy is left unset, the on-screen keyboard is disabled initially but can be enabled by the user anytime. Heuristic rules may also be used to decide when to display the keyboard.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="TranslateEnabled"/>TranslateEnabled</h3><span>Enable Translate</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\TranslateEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\TranslateEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">TranslateEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">TranslateEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 12</li><li>Chromium OS (Chromium OS) since version 12</li><li>Chromium (Android) since version 30</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: Yes, Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enables the integrated Google Translate service on Chromium.</p><p>If you enable this setting, Chromium will offer translation functionality to the user by showing an integrated translate toolbar (when appropriate) and a translate option on the right-click context menu.</p><p>If you disable this setting, all built-in translate features will be disabled.</p><p>If you enable or disable this setting, users cannot change or override this setting in Chromium.</p><p>If this setting is left not set the user can decide to use this function or not.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="URLBlacklist"/>URLBlacklist</h3><span>Block access to a list of URLs</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\URLBlacklist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\URLBlacklist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">URLBlacklist</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">URLBlacklist</dd><dt style="font-weight: bold;">Android WebView restriction name:</dt><dd style="font-family: monospace;">com.android.browser:URLBlacklist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li><li>Chromium OS (Chromium OS) since version 15</li><li>Chromium (Android) since version 30</li><li>Chromium WebView (Android) since version 47</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy prevents the user from loading web pages from blacklisted URLs. The blacklist provides a list of URL patterns that specify which URLs will be blacklisted.</p><p>A URL pattern has to be formatted according to <a href="https://www.chromium.org/administrators/url-blacklist-filter-format">https://www.chromium.org/administrators/url-blacklist-filter-format</a>.</p><p>Exceptions can be defined in the URL whitelist policy. These policies are limited to 1,000 entries; subsequent entries will be ignored.</p><p>Note that it is not recommended to block internal 'chrome://*' URLs after this may lead to unexpected errors.</p><p>From M73 you can block 'javascript://*' URLs. However, it only affects JavaScript typed in address bar (or, for example, bookmarklets). Note that in-page JavaScript URLs, as long as data is dynamically loaded, are not subject to this policy. For example, if you block 'example.com/abc', page 'example.com' will still be able to load 'example.com/abc' via XMLHTTPRequest.</p><p>If this policy is not set, no URL will be blacklisted in the browser.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Android apps may voluntarily choose to honour this list. You cannot force them to honour it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\URLBlacklist\1 = &quot;example.com&quot;
Software\Policies\Chromium\URLBlacklist\2 = &quot;https://ssl.server.com&quot;
Software\Policies\Chromium\URLBlacklist\3 = &quot;hosting.com/bad_path&quot;
Software\Policies\Chromium\URLBlacklist\4 = &quot;https://server:8080/path&quot;
Software\Policies\Chromium\URLBlacklist\5 = &quot;.exact.hostname.com&quot;
Software\Policies\Chromium\URLBlacklist\6 = &quot;file://*&quot;
Software\Policies\Chromium\URLBlacklist\7 = &quot;custom_scheme:*&quot;
Software\Policies\Chromium\URLBlacklist\8 = &quot;*&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\URLBlacklist\1 = &quot;example.com&quot;
Software\Policies\ChromiumOS\URLBlacklist\2 = &quot;https://ssl.server.com&quot;
Software\Policies\ChromiumOS\URLBlacklist\3 = &quot;hosting.com/bad_path&quot;
Software\Policies\ChromiumOS\URLBlacklist\4 = &quot;https://server:8080/path&quot;
Software\Policies\ChromiumOS\URLBlacklist\5 = &quot;.exact.hostname.com&quot;
Software\Policies\ChromiumOS\URLBlacklist\6 = &quot;file://*&quot;
Software\Policies\ChromiumOS\URLBlacklist\7 = &quot;custom_scheme:*&quot;
Software\Policies\ChromiumOS\URLBlacklist\8 = &quot;*&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;example.com&quot;,
&quot;https://ssl.server.com&quot;,
&quot;hosting.com/bad_path&quot;,
&quot;https://server:8080/path&quot;,
&quot;.exact.hostname.com&quot;,
&quot;file://*&quot;,
&quot;custom_scheme:*&quot;,
&quot;*&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;example.com&lt;/string&gt;
&lt;string&gt;https://ssl.server.com&lt;/string&gt;
&lt;string&gt;hosting.com/bad_path&lt;/string&gt;
&lt;string&gt;https://server:8080/path&lt;/string&gt;
&lt;string&gt;.exact.hostname.com&lt;/string&gt;
&lt;string&gt;file://*&lt;/string&gt;
&lt;string&gt;custom_scheme:*&lt;/string&gt;
&lt;string&gt;*&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="URLWhitelist"/>URLWhitelist</h3><span>Allow access to a list of URLs</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings [Android:string] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\URLWhitelist</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\URLWhitelist</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">URLWhitelist</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">URLWhitelist</dd><dt style="font-weight: bold;">Android WebView restriction name:</dt><dd style="font-family: monospace;">com.android.browser:URLWhitelist</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 15</li><li>Chromium OS (Chromium OS) since version 15</li><li>Chromium (Android) since version 30</li><li>Chromium WebView (Android) since version 47</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows access to the listed URLs, as exceptions to the URL blacklist.</p><p>See the description of the URL blacklist policy for the format of entries of this list.</p><p>This policy can be used to open exceptions to restrictive blacklists. For example, '*' can be blacklisted to block all requests, and this policy can be used to allow access to a limited list of URLs. It can be used to open exceptions to certain schemes, subdomains of other domains, ports or specific paths.</p><p>The most specific filter will determine if a URL is blocked or allowed. The whitelist takes precedence over the blacklist.</p><p>This policy is limited to 1000 entries; subsequent entries will be ignored.</p><p>If this policy is not set there will be no exceptions to the blacklist from the 'URLBlacklist' policy.</p></dd><dt style="font-weight: bold;">Note for Chromium OS devices supporting Android apps:</dt><dd><p>Android apps may voluntarily choose to honour this list. You cannot force them to honour it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\URLWhitelist\1 = &quot;example.com&quot;
Software\Policies\Chromium\URLWhitelist\2 = &quot;https://ssl.server.com&quot;
Software\Policies\Chromium\URLWhitelist\3 = &quot;hosting.com/good_path&quot;
Software\Policies\Chromium\URLWhitelist\4 = &quot;https://server:8080/path&quot;
Software\Policies\Chromium\URLWhitelist\5 = &quot;.exact.hostname.com&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\URLWhitelist\1 = &quot;example.com&quot;
Software\Policies\ChromiumOS\URLWhitelist\2 = &quot;https://ssl.server.com&quot;
Software\Policies\ChromiumOS\URLWhitelist\3 = &quot;hosting.com/good_path&quot;
Software\Policies\ChromiumOS\URLWhitelist\4 = &quot;https://server:8080/path&quot;
Software\Policies\ChromiumOS\URLWhitelist\5 = &quot;.exact.hostname.com&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;example.com&quot;,
&quot;https://ssl.server.com&quot;,
&quot;hosting.com/good_path&quot;,
&quot;https://server:8080/path&quot;,
&quot;.exact.hostname.com&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;example.com&lt;/string&gt;
&lt;string&gt;https://ssl.server.com&lt;/string&gt;
&lt;string&gt;hosting.com/good_path&lt;/string&gt;
&lt;string&gt;https://server:8080/path&lt;/string&gt;
&lt;string&gt;.exact.hostname.com&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UnifiedDesktopEnabledByDefault"/>UnifiedDesktopEnabledByDefault</h3><span>Make Unified Desktop available and turn on by default</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UnifiedDesktopEnabledByDefault</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 47</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Can be Recommended: No, Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true, Unified Desktop is allowed and
enabled by default, which allows applications to span multiple displays.
The user may disable Unified Desktop for individual displays by unticking
it in the display settings.</p><p>If this policy is set to false or unset, Unified Desktop will be
disabled. In this case, the user cannot enable the feature.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UnsafelyTreatInsecureOriginAsSecure"/>UnsafelyTreatInsecureOriginAsSecure (deprecated)</h3><span>Origins or hostname patterns for which restrictions on
insecure origins should not apply</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\UnsafelyTreatInsecureOriginAsSecure</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">UnsafelyTreatInsecureOriginAsSecure</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Deprecated in M69. Use
OverrideSecurityRestrictionsOnInsecureOrigin instead.</p><p>The policy specifies a list of origins (URLs) or hostname patterns (such
as '*.example.com') for which security restrictions on insecure origins
will not apply.</p><p>The intent is to allow organisations to whitelist origins for legacy
applications that cannot deploy TLS, or to set up a staging server for
internal web development so that their developers can test out features
requiring secure contexts without having to deploy TLS on the staging
server. This policy will also prevent the origin from being labelled
'Not Secure' in the omnibox.</p><p>Setting a list of URLs in this policy has the same effect as setting the
command-line flag '--unsafely-treat-insecure-origin-as-secure' to a
comma-separated list of the same URLs. If the policy is set, it will
override the command-line flag.</p><p>This policy is deprecated in M69 in favour of
OverrideSecurityRestrictionsOnInsecureOrigin. If both policies are
present, OverrideSecurityRestrictionsOnInsecureOrigin will override this
policy.</p><p>For more information on secure contexts, see
<a href="https://www.w3.org/TR/secure-contexts/">https://www.w3.org/TR/secure-contexts/</a>
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\UnsafelyTreatInsecureOriginAsSecure\1 = &quot;http://testserver.example.com/&quot;
Software\Policies\Chromium\UnsafelyTreatInsecureOriginAsSecure\2 = &quot;*.example.org&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;http://testserver.example.com/&quot;,
&quot;*.example.org&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;http://testserver.example.com/&lt;/string&gt;
&lt;string&gt;*.example.org&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UrlKeyedAnonymizedDataCollectionEnabled"/>UrlKeyedAnonymizedDataCollectionEnabled</h3><span>Enable URL-keyed anonymised data collection</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\UrlKeyedAnonymizedDataCollectionEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UrlKeyedAnonymizedDataCollectionEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">UrlKeyedAnonymizedDataCollectionEnabled</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">UrlKeyedAnonymizedDataCollectionEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 69</li><li>Chromium OS (Chromium OS) since version 69</li><li>Chromium (Android) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Enable URL-keyed anonymised data collection in Chromium and prevents users from changing this setting.</p><p>URL-keyed anonymised data collection sends URLs of pages that the user visits to Google to make searches and browsing better.</p><p>If you enable this policy, URL-keyed anonymised data collection is always active.</p><p>If you disable this policy, URL-keyed anonymised data collection is never active.</p><p>If this policy is left not set, URL-keyed anonymised data collection will be enabled but the user will be able to change it.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), true (Android), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UsageTimeLimit"/>UsageTimeLimit</h3><span>Time Limit</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UsageTimeLimit</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 69</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to lock the user's session based on the client time or the usage quota of the day.</p><p>The |time_window_limit| specifies a daily window in which the user's session should be locked. We only support one rule for each day of the week, therefore the |entries| array may vary from 0 to 7 in size. |starts_at| and |ends_at| are the beginning and the end of the window limit, when |ends_at| is smaller than |starts_at| it means that the |time_limit_window| ends on the following day. |last_updated_millis| is the UTC timestamp for the last time that this entry was updated; it is sent as a string because the timestamp wouldn't fit in an integer.</p><p>The |time_usage_limit| specifies a daily screen quota, so when the user reaches it, the user's session is locked. There is a property for each day of the week, and it should be set only if there is an active quota for that day. |usage_quota_mins| is the amount of time that the managed device can be used in a day and |reset_at| is the time when the usage quota is renewed. The default value for |reset_at| is midnight ({'hour': 0, 'minute': 0}). |last_updated_millis| is the UTC timestamp for the last time that this entry was updated; it is sent as a string because the timestamp wouldn't fit in an integer.</p><p>|overrides| is provided to invalidate temporarily one or more of the previous rules.
* If neither time_window_limit nor time_usage_limit is active, |LOCK| can be used to lock the device.
* |LOCK| temporarily locks a user session until the next time_window_limit or time_usage_limit starts.
* |UNLOCK| unlocks a user's session locked by time_window_limit or time_usage_limit.
|created_time_millis| is the UTC timestamp for the override creation; it is sent as a String because the timestamp wouldn't fit in an integer. It is used to determine whether this override should still be applied. If the current active time limit feature (time usage limit or time window limit) started after the override was created, it should not take action. Also, if the override was created before the last change of the active time_window_limit or time_usage_window, it should not be applied.</p><p>Multiple overrides may be sent; the newest valid entry is the one that is going to be applied.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;overrides&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;action&quot;: {
&quot;enum&quot;: [
&quot;LOCK&quot;,
&quot;UNLOCK&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;action_specific_data&quot;: {
&quot;properties&quot;: {
&quot;duration_mins&quot;: {
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;created_at_millis&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
},
&quot;time_usage_limit&quot;: {
&quot;properties&quot;: {
&quot;friday&quot;: {
&quot;$ref&quot;: &quot;TimeUsageLimitEntry&quot;
},
&quot;monday&quot;: {
&quot;id&quot;: &quot;TimeUsageLimitEntry&quot;,
&quot;properties&quot;: {
&quot;last_updated_millis&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;usage_quota_mins&quot;: {
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;reset_at&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
},
&quot;saturday&quot;: {
&quot;$ref&quot;: &quot;TimeUsageLimitEntry&quot;
},
&quot;sunday&quot;: {
&quot;$ref&quot;: &quot;TimeUsageLimitEntry&quot;
},
&quot;thursday&quot;: {
&quot;$ref&quot;: &quot;TimeUsageLimitEntry&quot;
},
&quot;tuesday&quot;: {
&quot;$ref&quot;: &quot;TimeUsageLimitEntry&quot;
},
&quot;wednesday&quot;: {
&quot;$ref&quot;: &quot;TimeUsageLimitEntry&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;time_window_limit&quot;: {
&quot;properties&quot;: {
&quot;entries&quot;: {
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;effective_day&quot;: {
&quot;$ref&quot;: &quot;WeekDay&quot;
},
&quot;ends_at&quot;: {
&quot;$ref&quot;: &quot;Time&quot;
},
&quot;last_updated_millis&quot;: {
&quot;type&quot;: &quot;string&quot;
},
&quot;starts_at&quot;: {
&quot;id&quot;: &quot;Time&quot;,
&quot;properties&quot;: {
&quot;hour&quot;: {
&quot;maximum&quot;: 23,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
},
&quot;minute&quot;: {
&quot;maximum&quot;: 59,
&quot;minimum&quot;: 0,
&quot;type&quot;: &quot;integer&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}
},
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\UsageTimeLimit = {
&quot;overrides&quot;: [
{
&quot;action&quot;: &quot;UNLOCK&quot;,
&quot;action_specific_data&quot;: {
&quot;duration_mins&quot;: 30
},
&quot;created_at_millis&quot;: &quot;1250000&quot;
}
],
&quot;time_usage_limit&quot;: {
&quot;friday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
},
&quot;monday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
},
&quot;reset_at&quot;: {
&quot;hour&quot;: 6,
&quot;minute&quot;: 0
},
&quot;saturday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
},
&quot;sunday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
},
&quot;thursday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
},
&quot;tuesday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
},
&quot;wednesday&quot;: {
&quot;last_updated_millis&quot;: &quot;1200000&quot;,
&quot;usage_quota_mins&quot;: 120
}
},
&quot;time_window_limit&quot;: {
&quot;entries&quot;: [
{
&quot;effective_day&quot;: &quot;WEDNESDAY&quot;,
&quot;ends_at&quot;: {
&quot;hour&quot;: 7,
&quot;minute&quot;: 30
},
&quot;last_updated_millis&quot;: &quot;1000000&quot;,
&quot;starts_at&quot;: {
&quot;hour&quot;: 21,
&quot;minute&quot;: 0
}
}
]
}
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UserAvatarImage"/>UserAvatarImage</h3><span>User avatar image</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UserAvatarImage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 34</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy allows you to configure the avatar image representing the user on the login screen. The policy is set by specifying the URL from which Chromium OS can download the avatar image and a cryptographic hash used to verify the integrity of the download. The image must be in JPEG format and its size must not exceed 512 KB. The URL must be accessible without any authentication.</p><p>The avatar image is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.</p><p>If this policy is set, Chromium OS will download and use the avatar image.</p><p>If you set this policy, users cannot change or override it.</p><p>If the policy is left not set, the user can choose the avatar image representing them on the login screen.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;hash&quot;: {
&quot;description&quot;: &quot;The SHA-256 hash of the avatar image.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;description&quot;: &quot;The URL from which the avatar image can be downloaded.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\UserAvatarImage = {
&quot;hash&quot;: &quot;deadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeefdeadbeef&quot;,
&quot;url&quot;: &quot;https://example.com/avatar.jpg&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UserDataDir"/>UserDataDir</h3><span>Set user data directory</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\UserDataDir</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">UserDataDir</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 11</li><li>Chromium (Mac) since version 11</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Configures the directory that Chromium will use for storing user data.</p><p>If you set this policy, Chromium will use the provided directory regardless of whether the user has specified the '--user-data-dir' flag or not. To avoid data loss or other unexpected errors this policy should not be set to a volume's root directory or to a directory used for other purposes, because Chromium manages its contents.</p><p>See <a href="https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables">https://www.chromium.org/administrators/policy-list-3/user-data-directory-variables</a> for a list of variables that can be used.</p><p>If this policy is left not set the default profile path will be used and the user will be able to override it with the '--user-data-dir' command line flag.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;${users}/${user_name}/Chrome&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UserDisplayName"/>UserDisplayName</h3><span>Set the display name for device-local accounts</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UserDisplayName</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Controls the account name Chromium OS shows on the login screen for the corresponding device-local account.</p><p>If this policy is set, the login screen will use the specified string in the picture-based login chooser for the corresponding device-local account.</p><p>If the policy is left not set, Chromium OS will use the device-local account's email account ID as the display name on the login screen.</p><p>This policy is ignored for regular user accounts.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;Policy User&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="UserFeedbackAllowed"/>UserFeedbackAllowed</h3><span>Allow user feedback</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\UserFeedbackAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\UserFeedbackAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">UserFeedbackAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 77</li><li>Chromium OS (Chromium OS) since version 77</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allow user feedback.
If the policy is set to false, users cannot send feedback to Google.</p><p>If the policy is unset or set to true, users can send feedback to Google via Menu-&gt;Help-&gt;Report an Issue or key combination.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="VideoCaptureAllowed"/>VideoCaptureAllowed</h3><span>Allow or deny video capture</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\VideoCaptureAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VideoCaptureAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">VideoCaptureAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 25</li><li>Chromium OS (Chromium OS) since version 25</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If enabled or not configured (default), the user will be prompted for video capture access except for URLs configured in the VideoCaptureAllowedUrls list which will be granted access without prompting.</p><p>When this policy is disabled, the user will never be prompted and video capture will only be available to URLs configured in VideoCaptureAllowedUrls.</p><p>This policy affects all types of video inputs and not only the built-in camera.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows), false (Linux), &lt;false /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="VideoCaptureAllowedUrls"/>VideoCaptureAllowedUrls</h3><span>URLs that will be granted access to video capture devices without prompt</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>List of strings</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\VideoCaptureAllowedUrls</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VideoCaptureAllowedUrls</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">VideoCaptureAllowedUrls</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 29</li><li>Chromium OS (Chromium OS) since version 29</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Patterns in this list will be matched against the security
origin of the requesting URL. If a match is found, access to video
capture devices will be granted without prompt.</p><p>NOTE: Until version 45, this policy was only supported in Kiosk mode.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\VideoCaptureAllowedUrls\1 = &quot;https://www.example.com/&quot;
Software\Policies\Chromium\VideoCaptureAllowedUrls\2 = &quot;https://[*.]example.edu/&quot;</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\VideoCaptureAllowedUrls\1 = &quot;https://www.example.com/&quot;
Software\Policies\ChromiumOS\VideoCaptureAllowedUrls\2 = &quot;https://[*.]example.edu/&quot;</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">[
&quot;https://www.example.com/&quot;,
&quot;https://[*.]example.edu/&quot;
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;array&gt;
&lt;string&gt;https://www.example.com/&lt;/string&gt;
&lt;string&gt;https://[*.]example.edu/&lt;/string&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="VpnConfigAllowed"/>VpnConfigAllowed</h3><span>Allow the user to manage VPN connections</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\VpnConfigAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 71</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allow the user to manage VPN connections.</p><p>If this policy is set to false, all Chromium OS user interfaces that would allow the user to disconnect or modify VPN connections are disabled.</p><p>If this policy is unset or set to true, users can disconnect or modify VPN connections as usual.</p><p>If the VPN connection is created via a VPN app, the UI inside the app remains unaffected by this policy. Therefore, the user might still be able to use the app to modify the VPN connection.</p><p>This policy is meant to be used together with the 'Always on VPN' feature, that lets the admin decide to establish a VPN connection on boot.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WPADQuickCheckEnabled"/>WPADQuickCheckEnabled</h3><span>Enable WPAD optimisation</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WPADQuickCheckEnabled</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WPADQuickCheckEnabled</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WPADQuickCheckEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 35</li><li>Chromium OS (Chromium OS) since version 35</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Allows you to turn off WPAD (Web Proxy Auto-Discovery) optimisation in Chromium.</p><p>If this policy is set to false, WPAD optimisation is disabled causing Chromium to wait longer for DNS-based WPAD servers. If the policy is not set or is enabled, WPAD optimisation is enabled.</p><p>Independent of whether or how this policy is set, the WPAD optimisation setting cannot be changed by users.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WallpaperImage"/>WallpaperImage</h3><span>Wallpaper image</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>External data reference [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WallpaperImage</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium OS (Chromium OS) since version 35</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy allows you to configure the wallpaper image that is shown on the desktop and on the login screen background for the user. The policy is set by specifying the URL from which Chromium OS can download the wallpaper image and a cryptographic hash used to verify the integrity of the download. The image must be in JPEG format and its file size must not exceed 16 MB. The URL must be accessible without any authentication.</p><p>The wallpaper image is downloaded and cached. It will be re-downloaded whenever the URL or the hash changes.</p><p>If this policy is set, Chromium OS will download and use the wallpaper image.</p><p>If you set this policy, users cannot change or override it.</p><p>If the policy is left not set, the user can choose an image to be shown on the desktop and on the login screen background.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;properties&quot;: {
&quot;hash&quot;: {
&quot;description&quot;: &quot;The SHA-256 hash of the wallpaper image.&quot;,
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;description&quot;: &quot;The URL from which the wallpaper image can be downloaded.&quot;,
&quot;type&quot;: &quot;string&quot;
}
},
&quot;type&quot;: &quot;object&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\WallpaperImage = {
&quot;hash&quot;: &quot;baddecafbaddecafbaddecafbaddecafbaddecafbaddecafbaddecafbaddecaf&quot;,
&quot;url&quot;: &quot;https://example.com/wallpaper.jpg&quot;
}</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WebAppInstallForceList"/>WebAppInstallForceList</h3><span>Configure list of force-installed web apps</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Dictionary [Windows:REG_SZ] (encoded as a JSON string, for details see https://www.chromium.org/administrators/complex-policies-on-windows)</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebAppInstallForceList</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WebAppInstallForceList</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebAppInstallForceList</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 75</li><li>Chromium OS (Chromium OS) since version 75</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>Specifies a list of websites that are installed silently, without user interaction, and which cannot be uninstalled nor disabled by the user.</p><p>Each list item of the policy is an object with a mandatory member: 'url' and two optional members: 'default_launch_container' and 'create_desktop_shortcut'. 'url' should be the URL of the web app to install, 'launch_container' should be either 'window' or 'tab' to indicate how the Web App will be opened once installed, and 'create_desktop_shortcut' should be true if a desktop shortcut should be created on Linux and Windows. If 'default_launch_container' is omitted, the app will open in a tab by default. Regardless of the value of 'default_launch_container', users are able to change which container the app will open in. If 'create_desktop_shortcuts' is omitted, no desktop shortcuts will be created.</p></dd><dt style="font-weight: bold;">Schema:</dt><dd style="font-family: monospace;white-space: pre-wrap;">{
&quot;items&quot;: {
&quot;properties&quot;: {
&quot;create_desktop_shortcut&quot;: {
&quot;type&quot;: &quot;boolean&quot;
},
&quot;default_launch_container&quot;: {
&quot;enum&quot;: [
&quot;tab&quot;,
&quot;window&quot;
],
&quot;type&quot;: &quot;string&quot;
},
&quot;url&quot;: {
&quot;type&quot;: &quot;string&quot;
}
},
&quot;required&quot;: [
&quot;url&quot;
],
&quot;type&quot;: &quot;object&quot;
},
&quot;type&quot;: &quot;array&quot;
}</dd><dt style="font-weight: bold;">Sample value</dt><dd><dl style="margin-top: 0px; margin-bottom: 0px;"><dt>Windows (Windows clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\Chromium\WebAppInstallForceList = [
{
&quot;create_desktop_shortcut&quot;: true,
&quot;default_launch_container&quot;: &quot;window&quot;,
&quot;url&quot;: &quot;https://www.google.com/maps&quot;
},
{
&quot;default_launch_container&quot;: &quot;tab&quot;,
&quot;url&quot;: &quot;https://docs.google.com&quot;
}
]</dd><dt>Windows (Chromium OS clients):</dt><dd style="font-family: monospace;white-space: pre-wrap;">Software\Policies\ChromiumOS\WebAppInstallForceList = [
{
&quot;create_desktop_shortcut&quot;: true,
&quot;default_launch_container&quot;: &quot;window&quot;,
&quot;url&quot;: &quot;https://www.google.com/maps&quot;
},
{
&quot;default_launch_container&quot;: &quot;tab&quot;,
&quot;url&quot;: &quot;https://docs.google.com&quot;
}
]</dd><dt>Android/Linux:</dt><dd style="font-family: monospace;white-space: pre-wrap;">WebAppInstallForceList: [
{
&quot;create_desktop_shortcut&quot;: true,
&quot;default_launch_container&quot;: &quot;window&quot;,
&quot;url&quot;: &quot;https://www.google.com/maps&quot;
},
{
&quot;default_launch_container&quot;: &quot;tab&quot;,
&quot;url&quot;: &quot;https://docs.google.com&quot;
}
]</dd><dt>Mac:</dt><dd style="font-family: monospace;white-space: pre-wrap;">&lt;key&gt;WebAppInstallForceList&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;create_desktop_shortcut&lt;/key&gt;
&lt;true/&gt;
&lt;key&gt;default_launch_container&lt;/key&gt;
&lt;string&gt;window&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;https://www.google.com/maps&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;default_launch_container&lt;/key&gt;
&lt;string&gt;tab&lt;/string&gt;
&lt;key&gt;url&lt;/key&gt;
&lt;string&gt;https://docs.google.com&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;</dd></dl></dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WebDriverOverridesIncompatiblePolicies"/>WebDriverOverridesIncompatiblePolicies</h3><span>Allow WebDriver to Override Incompatible Policies</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebDriverOverridesIncompatiblePolicies</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebDriverOverridesIncompatiblePolicies</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 65</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>This policy allows users of the WebDriver feature to override
policies which can interfere with its operation.</p><p>Currently this policy disables SitePerProcess and IsolateOrigins policies.</p><p>If the policy is enabled, WebDriver will be able to override incompatible
policies.
If the policy is disabled or not configured, WebDriver will not be allowed
to override incompatible policies.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WebRtcEventLogCollectionAllowed"/>WebRtcEventLogCollectionAllowed</h3><span>Allow collection of WebRTC event logs from Google services</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebRtcEventLogCollectionAllowed</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WebRtcEventLogCollectionAllowed</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebRtcEventLogCollectionAllowed</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 70</li><li>Chromium OS (Chromium OS) since version 70</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: Yes, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>
If the policy is set to true, Chromium is allowed to collect WebRTC event logs from Google services (e.g. Google Meet) and upload those logs to Google.</p><p>If the policy is set to false, or is unset, Chromium may not collect or upload such logs.</p><p>These logs contain diagnostic information helpful when debugging issues with audio or video calls in Chrome, such as the time and size of sent and received RTP packets, feedback about congestion on the network, and metadata about time and quality of audio and video frames. These logs do not contain audio or video contents from the call.</p><p>This data collection by Chrome can only be triggered by Google's web services, such as Google Hangouts or Google Meet.</p><p>Google may associate these logs, by means of a session ID, with other logs collected by the Google service itself; this is intended to make debugging easier.
</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000001 (Windows), true (Linux), &lt;true /&gt; (Mac)</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WebRtcUdpPortRange"/>WebRtcUdpPortRange</h3><span>Restrict the range of local UDP ports used by WebRTC</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>String [Windows:REG_SZ]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WebRtcUdpPortRange</dd><dt style="font-weight: bold;">Windows registry location for Chromium OS clients:</dt><dd style="font-family: monospace;">Software\Policies\ChromiumOS\WebRtcUdpPortRange</dd><dt style="font-weight: bold;">Mac/Linux preference name:</dt><dd style="font-family: monospace;">WebRtcUdpPortRange</dd><dt style="font-weight: bold;">Android restriction name:</dt><dd style="font-family: monospace;">WebRtcUdpPortRange</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Linux, Mac, Windows) since version 54</li><li>Chromium OS (Chromium OS) since version 54</li><li>Chromium (Android) since version 54</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: Yes</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If the policy is set, the UDP port range used by WebRTC is restricted to the specified port interval (endpoints included).</p><p>If the policy is not set, or if it is set to the empty string or an invalid port range, WebRTC is allowed to use any available local UDP port.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>&quot;10000-11999&quot;</dd></dl><a href="#top">Back to top</a></div><div style="margin-left: 0px"><h3><a name="WelcomePageOnOSUpgradeEnabled"/>WelcomePageOnOSUpgradeEnabled</h3><span>Enable showing the welcome page on the first browser launch following OS upgrade</span><dl><dt style="font-weight: bold;">Data Types</dt><dd>Boolean [Windows:REG_DWORD]</dd><dt style="font-weight: bold;">Windows registry location for Windows clients:</dt><dd style="font-family: monospace;">Software\Policies\Chromium\WelcomePageOnOSUpgradeEnabled</dd><dt style="font-weight: bold;">Supported on:</dt><dd><ul style="padding-left: 0px; margin-left: 0px;"><li>Chromium (Windows) since version 45</li></ul></dd><dt style="font-weight: bold;">Supported features:</dt><dd>Dynamic Policy Refresh: No, Per Profile: No</dd><dt style="font-weight: bold;">Description:</dt><dd><p>If this policy is set to true or not configured, the browser will re-show the welcome page on the first launch following an OS upgrade.</p><p>If this policy is set to false, the browser will not re-show the welcome page on the first launch following an OS upgrade.</p></dd><dt style="font-weight: bold;">Sample value</dt><dd>0x00000000 (Windows)</dd></dl><a href="#top">Back to top</a></div></div></div>