Hello TechUST,
Hope you have sorted this out. If not, suggestion is to deploy separately because for Enterprise policy configuration, importing ADMX and creating a configuration profile is the most straight forward option.
For preferences, you can use custom OMA-URI.
- On Intune Portal -> Device -> Windows -> Configuration -> Create policy
- Select Windows 10 and later -> Templates -> Custom
- Go through the wizard and add OMA URI like below, OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
Value(String):
<enabled/> <data id="Authentication" value="1mydomain2https://myotherdomain.com"/>
This should help with your requirement. You can script the entire thing into a single deployment as well, but this is more straight forward and easy to monitor.
Refer to: https://mozilla.github.io/policy-templates/#authentication
https://support.mozilla.org/en-US/kb/managing-firefox-intune
Also refer to: https://learn.microsoft.com/en-us/intune/intune-service/configuration/administrative-templates-import-custom
Hope this helps!
If you found the information above helpful, please Click Yes. This will assist others in the community who encounter a similar issue, enabling them to quickly find the solution and benefit from the guidance provided.