Managed settings - uBlockOrigin/uBOL-home GitHub Wiki
With uBO Lite version 2025.4.13.1188 and above, the default filtering mode is Optimal. More settings will be added to control the default filtering mode and to allow more filtering mode for specific websites.
For more general information about configuring policy for extensions, see https://www.chromium.org/administrators/configuring-policy-for-extensions/.
Important: It can take long seconds at browser launch before uBOL is able to read managed settings, and as a consequence there might be a delay at browser launch before they become effective and reflected in the user interface. This is out of control of uBOL. As soon as the storage.managed.get
API returns, the managed settings should then be properly enforced.
defaultFiltering
disabledFeatures
disableFirstRunPage
noFiltering
rulesets
showBlockedCount
strictBlockMode
By default, the filtering mode is optimal, and defaultFiltering
allows to pick a different default filtering mode.
Value: a string, one of "none"
, "basic"
, "optimal"
, "complete"
.
Chromium on GNU/Linux:
{
"3rdparty": {
"extensions": {
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
"defaultFiltering": "basic"
}
}
}
}
Google Chrome on Windows:
Data Type: REG_SZ[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"defaultFiltering"="optimal"
Microsoft Edge on Windows:
Data Type: REG_SZ[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"defaultFiltering"="optimal"
Disable specific user-facing features.
Value: Array of strings.
Each string is a token which dictates what must be disabled. Currently supported tokens:
-
dashboard
: Prevent changes to any setting through the dashboard. -
develop
: Prevent "Developer mode" from being enabled. -
filteringMode
: Prevent changes to either default or per-site filtering mode. -
picker
: Prevent access to the tool used to create custom filters. -
zapper
: Prevent access to the tool used to remove elements from a webpage.
Chromium on GNU/Linux:
{
"3rdparty": {
"extensions": {
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
"disabledFeatures": [ "dashboard" ]
}
}
}
}
Google Chrome on Windows:
Data Type: REG_SZExactly use ,
(comma + space) to separate values.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"disabledFeatures"="["dashboard"]"
Microsoft Edge on Windows:
Data Type: REG_SZExactly use ,
(comma + space) to separate values.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"disabledFeatures"="["dashboard"]"
OS-agnostic Chrome policy:
OS-agnostic Chrome policy on https://admin.google.com/ac/chrome/apps/user?ref=browser
{
"disabledFeatures": {
"Value": [
"dashboard"
]
}
}
Disable first-run page.
Value: Boolean.
Chromium on GNU/Linux:
{
"3rdparty": {
"extensions": {
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
"disableFirstRunPage": true
}
}
}
}
Google Chrome on Windows:
Data Type: REG_DWORD[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"disableFirstRunPage"=dword:00000001
Microsoft Edge on Windows:
Data Type: REG_DWORD[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"disableFirstRunPage"=dword:00000001
OS-agnostic Chrome policy:
OS-agnostic Chrome policy on https://admin.google.com/ac/chrome/apps/user?ref=browser
This JSON snippet should be added in the free-form input named Policy for extensions.
{
"disableFirstRunPage" : {
"Value": true
}
}
Disable uBOL for specific sites.
Value: Array of strings.
Each string is a hostname to add to the list. You can remove specific hostname from the no-filtering list by prefixing with -
, e.g. -example.com
. To remove all entries from the no-filtering list, use -*
.
Chromium on GNU/Linux:
{
"3rdparty": {
"extensions": {
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
"noFiltering": [ "example.com", "mycorp.test" ]
}
}
}
}
Google Chrome on Windows:
Data Type: REG_SZExactly use ,
(comma + space) to separate values.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"noFiltering"="["example.com", "mycorp.test"]"
Microsoft Edge on Windows:
Data Type: REG_SZExactly use ,
(comma + space) to separate values.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"noFiltering"="["example.com", "mycorp.test"]"
OS-agnostic Chrome policy:
OS-agnostic Chrome policy on https://admin.google.com/ac/chrome/apps/user?ref=browser
{
"noFiltering" : {
"Value": [
"example.com",
"mycorp.test"
]
}
}
Enable/disable specific rulesets.
Value: Array of strings.
Each string is the prefix +
to enable or -
to disable, followed by the id of the ruleset to enable/disable. The special value -*
can be used to disable all non-default rulesets, except for those enabled by the policy.
Rulesets specified in the policy can't be enabled/disabled by the user.
Refer to ruleset-details.json to find out the id of a specific ruleset.
Mind the maximum number of enabled rulesets imposed by the extension framework.
Example of usage, all rulesets except the default one(s) are disabled, "AdGuard URL Tracking Protection" and "EasyList/uBO – Cookie Notices" are enabled. +default
is added so as to prevent the user from being able to disable it.
Chromium on GNU/Linux:
{
"3rdparty": {
"extensions": {
"ddkjiahejlhfcafbddmgiahcphecmpfh": {
"rulesets": [
"-*",
"+default",
"+adguard-spyware-url",
"+annoyances-cookies"
]
}
}
}
}
Google Chrome on Windows:
Data Type: REG_SZExactly use ,
(comma + space) to separate values.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"rulesets"="["-*", "+default", "+adguard-spyware-url", "+annoyances-cookies"]"
Microsoft Edge on Windows:
Data Type: REG_SZExactly use ,
(comma + space) to separate values.
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"rulesets"="["-*", "+default", "+adguard-spyware-url", "+annoyances-cookies"]"
OS-agnostic Chrome policy:
OS-agnostic Chrome policy on https://admin.google.com/ac/chrome/apps/user?ref=browser
{
"rulesets": {
"Value": [
"-*",
"+default",
"+adguard-spyware-url",
"+annoyances-cookies"
]
}
}
Enable/disable the counter on the toolbar icon.
Value: Boolean, enabled by default.
Google Chrome on Windows:
Data Type: REG_DWORD[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"showBlockedCount"=dword:00000001
Microsoft Edge on Windows:
Data Type: REG_DWORD[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"showBlockedCount"=dword:00000001
Enable/disable strict blocking.
Value: Boolean. enabled by default.
Google Chrome on Windows:
Data Type: REG_DWORD[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\ddkjiahejlhfcafbddmgiahcphecmpfh\policy]
"strictBlockMode"=dword:00000001
Microsoft Edge on Windows:
Data Type: REG_DWORD[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\cimighlppcgcoapaliogpjjdehbnofhn\policy]
"strictBlockMode"=dword:00000001
Documentation from other people:
People who know how to manage those settings under other OSes are welcome to contribute their knowledge here for the benefit of others, feel free to add useful information.
See related issue https://github.com/uBlockOrigin/uBOL-home/discussions/35.