1. Home
  2. Disable Browser Password Saving via Endpoint Manager (Intune)

Disable Browser Password Saving via Endpoint Manager (Intune)

Purpose

This article outlines the steps to configure Microsoft Intune policies to block browsers from saving or remembering user credentials, helping maintain security compliance across managed devices.

Prerequisites

  • Microsoft 365 tenant with Global Administrator or Intune Administrator role

  • Intune licensing (e.g. Intune Plan 1, Microsoft 365 E3/E5, or Business Premium). Note: Microsoft Entra ID alone does not include Intune capabilities

  • Devices must be enrolled in Intune

Instructions

  1. Sign in to the Microsoft Intune Admin Center
  2. In the left menu, click on Devices and then click on Configuration under Manage devices
  3. On the Policy tab, click Create and select New Policy
  4. Continue with the steps below for each required browser. You’ll need to create a separate policy or profile for every browser you intend to block.
Microsoft Edge

  1. Configure the following
    • For Platform choose Windows 10 and Later
    • For Profile Type choose Settings catalog
  2. Click Create
  3. Name the Profile to Block Password Saving – Microsoft Edge and click Next.
  4. In the Configuration settings tab, click Add settings.
  5. Search for  Password Manager
  6. Choose Microsoft Edge\Password manager and protection
  7. In the Setting name, tick the box for Enable saving passwords to the password manager.

  8. In the left panel, ensure that the switch for Enable saving passwords to the password manager is set to Disabled. This will prevent users from storing passwords in the browser for improved security.

  9. Click Next to continue.

  10. Leave scope as Default and click Next.
  11. On the Assignments tab, Click on Add all users and Add all devices.  Note: If you don’t want to deploy the policy to all users, select Add groups instead and assign it only to the preferred group.
  12. Click Next.
  13. Review the settings and ensure password saving option is disabled.
  14. Click Create
  15. The policy will be enforced on targeted devices/users at their next Intune check-in

Google Chrome

    1. Configure the following
      • For Platform choose Windows 10 and Later
      • For Profile Type choose Settings catalog
    2. Click Create
    3. Name the Profile to  Block Password Saving –  Google Chrome  and click Next
    4. In the Configuration settings tab, click Add settings.
    5. Search for  Password Manager
    6. Choose Google Google Chrome Password manager
    7. In the Setting name, tick the box for Enable saving passwords to the password manager.
    8. In the left panel, ensure that the switch for Enable saving passwords to the password manager is set to Disabled. This will prevent users from storing passwords in the browser for improved security.
    9. Click Next to continue.
    10. Leave scope as Default and click Next.
    11. On the Assignments tab, Click on Add all users and Add all devices.  Note: If you don’t want to deploy the policy to all users, select Add groups instead and assign it only to the preferred group.
    12. Click Next.
    13. Review the settings and ensure password saving option is disabled.
    14. Click Create
    15. The policy will be enforced on targeted devices/users at their next Intune check-in

 

Mozilla Firefox

  1. Open new tab in the browser and go to the Firefox Policy Template site:https://github.com/mozilla/policy-templates/releases
  2. Under the Assets section, click policy_templates.zip to download the file. Note that the file name or version number may vary depending on the latest release available.

  3. Extract the downloaded zip file.

  4. Open the extracted folder, then navigate to policy_templates > windows (folder name may vary depending on the version).

  5. Locate the firefox.admx file inside.


  6. Right-click on the file, firefox.admx. Select Open with, choose Notepad, and click OK. Ensure that “Always use this app to open…” is unchecked.
  7. Press Ctrl + A to select all text, then right-click and choose Copy. You will need this content later.
  8. Now return to Intune and create a new policy.
  9. Configure the following settings:
    1. Platform: Windows 10 and later

    2. Profile type: Templates

    3. Template name: Custom

  10. Click Create.
  11. Name the profile to Block Password Saving – Mozilla FireFox and click Next.
  12. In the Configuration settings section, click Add next to OMA-URI Settings.

  13. Configure the following settings:
    1. Name: Firefox ADMX

    2. OMA-URI: Copy and paste the below URI:
      ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Firefox/Policy/FirefoxAdmx

    3. Data type: Select String in the dropdown

    4. Value: Paste the contents you copied from Step 7

  14. Click Save. Firefox ADMX is now added.
  15. click on Add again next to OMA-URI Settings.
  16. Configure the following:
    1. Name: PasswordManagerEnabled

    2. OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled

    3. Data type: String

    4. Value: <disabled/>

  17. Click Save.
  18. Add another OMA-URI Settings. Click Add.
  19. Configure the following:
    1. Name: DisableFirefoxAccounts

    2. OMA-URI:
      ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts

    3. Data type: String

    4. Value: <enabled/>

  20. Click Save.
  21. Click Add again
  22. Configure the following:
    1. Name: OfferToSaveLogins

    2. OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins

    3. Data type: String

    4. Value: <disabled/>

  23. Click Save. Then, click Next.
  24. On the Assignments tab, Click on Add all users and Add all devices.  Note: If you don’t want to deploy the policy to all users, select Add groups instead and assign it only to the preferred group.
  25. Leave the Applicability Rules as Default, and click Next.
  26. Review all the settings and ensure that all Firefox configurations have been added correctly.

  27. Click Create
  28. The policy will be enforced on targeted devices/users at their next Intune check-in

Updated on October 28, 2025
Need Support?
Can't find the answer you're looking for?
Contact Support