HijackedIgnoreList
Note Starting with Windows 10, version 1703, this setting can no longer be used in provisioning packages. For more information on changes to the Windows Provisioning Framework, see Windows Provisioning Framework. This setting may have a Configuration Service Provider (CSP) equivalent that can be used instead. To determine if a CSP for this setting exists, see the description below.
Used to specify a list of captive portal SSIDs for which the browser should not be launched automatically.
When Windows devices connect to a Wi-Fi hotspot that uses a captive portal, the web browser is automatically opened so that the user can sign in. Until this authentication process is completed, the Wi-Fi hotspot connection is not available for applications and services running on the device. As a result, applications provided by mobile operators or third party vendors to authenticate the Wi-Fi hotspot settings will not work.
To suppress the launch of the browser and enable this type of application to run as expected, OEMs must register the SSID of one or more networks. These networks will be available immediately when the connection is established.
Set the HijackedIgnoreList
value to the set list of captive portal SSIDs for which the browser should not be launched automatically. The SSIDs shold be separated by semicolons. For example, ContosoWiFi;FabrikamWiFi;ContosoFabrikamWiFi and so on.
Edition | x86-based devices | x64-based devices | ARM-based devices |
---|---|---|---|
Windows 10 Mobile | N/A |
N/A |
Supported |