]> git.p6c8.net - policy-templates.git/blob - README.md
Fix some alphabetization - Fixes #837
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
10 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
11 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
12 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
13 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
14 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
15 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
16 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
17 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
18 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
19 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
20 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
21 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
22 | **[`Certificates`](#certificates)** |
23 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
24 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
25 | **[`Cookies`](#cookies)** | Configure cookie preferences.
26 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
27 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
28 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
29 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
30 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
31 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
32 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
33 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
34 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
35 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
36 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
37 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
38 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
39 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
40 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
41 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
42 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
43 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
44 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
45 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
46 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
47 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
48 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
49 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
50 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
51 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
52 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
53 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
54 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
55 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
56 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
57 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
58 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
59 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
60 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
61 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
62 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
63 | **[`Handlers`](#handlers)** | Configure default application handlers.
64 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
65 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
66 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
67 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
68 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
69 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
70 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates..
71 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
72 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
73 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
74 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
75 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
76 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
77 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
78 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
79 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
80 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
81 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
82 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
83 | **[`Preferences`](#preferences)** | Set and lock preferences.
84 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
85 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
86 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
87 | **[`Proxy`](#proxy)** | Configure proxy settings.
88 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
89 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
90 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
91 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
92 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
93 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
94 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
95 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
96 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
97 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
98 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
99 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
100 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
101 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
102 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
103 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
104 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
105 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
106
107 ### 3rdparty
108
109 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
110
111 ### AppAutoUpdate
112
113 Enable or disable **automatic** application update.
114
115 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
116
117 If set to false, application updates are downloaded but the user can choose when to install the update.
118
119 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
120
121 **Compatibility:** Firefox 75, Firefox ESR 68.7\
122 **CCK2 Equivalent:** N/A\
123 **Preferences Affected:** `app.update.auto`
124
125 #### Windows (GPO)
126 ```
127 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
128 ```
129 #### Windows (Intune)
130 OMA-URI:
131 ```
132 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
133 ```
134 Value (string):
135 ```
136 <enabled/> or <disabled/>
137 ```
138 #### macOS
139 ```
140 <dict>
141 <key>AppAutoUpdate</key>
142 <true/> | <false/>
143 </dict>
144 ```
145 #### policies.json
146 ```
147 {
148 "policies": {
149 "AppAutoUpdate": true | false
150 }
151 }
152 ```
153 ### AllowedDomainsForApps
154
155 Define domains allowed to access Google Workspace.
156
157 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
158
159 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
160
161 **Compatibility:** Firefox 89, Firefox ESR 78.11\
162 **CCK2 Equivalent:** N/A\
163 **Preferences Affected:** N/A
164
165 #### Windows (GPO)
166 ```
167 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
168 ```
169 #### Windows (Intune)
170 OMA-URI:
171 ```
172 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
173 ```
174 Value (string):
175 ```
176 <enabled/>
177 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
178 ```
179 #### macOS
180 ```
181 <dict>
182 <key>AllowedDomainsForApps</key>
183 <string>managedfirefox.com,example.com</string>
184 </dict>
185 ```
186 #### policies.json
187 ```
188 {
189 "policies": {
190 "AllowedDomainsForApps": "managedfirefox.com,example.com"
191 }
192 }
193 ```
194 ### AppUpdateURL
195
196 Change the URL for application update if you are providing Firefox updates from a custom update server.
197
198 **Compatibility:** Firefox 62, Firefox ESR 60.2\
199 **CCK2 Equivalent:** N/A\
200 **Preferences Affected:** `app.update.url`
201
202 #### Windows (GPO)
203 ```
204 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
205 ```
206 #### Windows (Intune)
207 OMA-URI:
208 ```
209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
210 ```
211 Value (string):
212 ```
213 <enabled/>
214 <data id="AppUpdateURL" value="https://yoursite.com"/>
215 ```
216 #### macOS
217 ```
218 <dict>
219 <key>AppUpdateURL</key>
220 <string>https://yoursite.com</string>
221 </dict>
222 ```
223 #### policies.json
224 ```
225 {
226 "policies": {
227 "AppUpdateURL": "https://yoursite.com"
228 }
229 }
230 ```
231 ### Authentication
232
233 Configure sites that support integrated authentication.
234
235 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
236
237 `PrivateBrowsing` enables integrated authentication in private browsing.
238
239 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
240 **CCK2 Equivalent:** N/A\
241 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
242
243 #### Windows (GPO)
244 ```
245 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
246 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
247 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
248 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
249 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
250 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
251 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
252 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
253 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
254 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
255 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
256 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
257 ```
258 #### Windows (Intune)
259 OMA-URI:
260 ```
261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
262 ```
263 Value (string):
264 ```
265 <enabled/>
266 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
267 ```
268 OMA-URI:
269 ```
270 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
271 ```
272 Value (string):
273 ```
274 <enabled/>
275 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
276 ```
277 OMA-URI:
278 ```
279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
280 ```
281 Value (string):
282 ```
283 <enabled/>
284 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
285 ```
286 OMA-URI:
287 ```
288 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
289 ```
290 Value (string):
291 ```
292 <enabled/>
293 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
294 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
295 ```
296 OMA-URI:
297 ```
298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
299 ```
300 Value (string):
301 ```
302 <enabled/> or <disabled/>
303 ```
304 OMA-URI:
305 ```
306 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
307 ```
308 Value (string):
309 ```
310 <enabled/> or <disabled/>
311 ```
312 #### macOS
313 ```
314 <dict>
315 <key>Authentication</key>
316 <dict>
317 <key>SPNEGO</key>
318 <array>
319 <string>mydomain.com</string>
320 <string>https://myotherdomain.com</string>
321 </array>
322 <key>Delegated</key>
323 <array>
324 <string>mydomain.com</string>
325 <string>https://myotherdomain.com</string>
326 </array>
327 <key>NTLM</key>
328 <array>
329 <string>mydomain.com</string>
330 <string>https://myotherdomain.com</string>
331 </array>
332 <key>AllowNonFQDN</key>
333 <dict>
334 <key>SPNEGO</key>
335 <true/> | <false/>
336 <key>NTLM</key>
337 <true/> | <false/>
338 </dict>
339 <key>AllowProxies</key>
340 <dict>
341 <key>SPNEGO</key>
342 <true/> | <false/>
343 <key>NTLM</key>
344 <true/> | <false/>
345 </dict>
346 <key>Locked</key>
347 <true/> | <false/>
348 <key>PrivateBrowsing</key>
349 <true/> | <false/>
350 </dict>
351 </dict>
352 ```
353 #### policies.json
354 ```
355 {
356 "policies": {
357 "Authentication": {
358 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
359 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
360 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
361 "AllowNonFQDN": {
362 "SPNEGO": true | false,
363 "NTLM": true | false
364 },
365 "AllowProxies": {
366 "SPNEGO": true | false,
367 "NTLM": true | false
368 },
369 "Locked": true | false,
370 "PrivateBrowsing": true | false
371 }
372 }
373 }
374 ```
375 ### AutoLaunchProtocolsFromOrigins
376 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
377
378 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
379
380 The schema is:
381 ```
382 {
383 "items": {
384 "properties": {
385 "allowed_origins": {
386 "items": {
387 "type": "string"
388 },
389 "type": "array"
390 },
391 "protocol": {
392 "type": "string"
393 }
394 },
395 "required": [
396 "protocol",
397 "allowed_origins"
398 ],
399 "type": "object"
400 },
401 "type": "array"
402 }
403 ```
404 **Compatibility:** Firefox 90, Firefox ESR 78.12\
405 **CCK2 Equivalent:** N/A\
406 **Preferences Affected:** N/A
407
408 #### Windows (GPO)
409 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
410 ```
411 [
412 {
413 "protocol": "zoommtg",
414 "allowed_origins": [
415 "https://somesite.zoom.us"
416 ]
417 }
418 ]
419 ```
420 #### Windows (Intune)
421 OMA-URI:
422 ```
423 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
424 ```
425 Value (string):
426 ```
427 <enabled/>
428 <data id="JSON" value='
429 [
430 {
431 "protocol": "zoommtg",
432 "allowed_origins": [
433 "https://somesite.zoom.us"
434 ]
435 }
436 ]'/>
437 ```
438 #### macOS
439 ```
440 <dict>
441 <key>AutoLaunchProtocolsFromOrigins</key>
442 <array>
443 <dict>
444 <key>protocol</key>
445 <string>zoommtg</string>
446 <key>allowed_origins</key>
447 <array>
448 <string>https://somesite.zoom.us</string>
449 </array>
450 </dict>
451 </array>
452 </dict>
453 ```
454 #### policies.json
455 ```
456 {
457 "policies": {
458 "AutoLaunchProtocolsFromOrigins": [{
459 "protocol": "zoommtg",
460 "allowed_origins": [
461 "https://somesite.zoom.us"
462 ]
463 }]
464 }
465 }
466 ```
467 ### BackgroundAppUpdate
468
469 Enable or disable **automatic** application update **in the background**, when the application is not running.
470
471 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
472
473 If set to false, the application will not try to install updates when the application is not running.
474
475 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
476
477 **Compatibility:** Firefox 90 (Windows only)\
478 **CCK2 Equivalent:** N/A\
479 **Preferences Affected:** `app.update.background.enabled`
480
481 #### Windows (GPO)
482 ```
483 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
484 ```
485 #### Windows (Intune)
486 OMA-URI:
487 ```
488 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
489 ```
490 Value (string):
491 ```
492 <enabled/> or <disabled/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>BackgroundAppUpdate</key>
498 <true/> | <false/>
499 </dict>
500 ```
501 #### policies.json
502 ```
503 {
504 "policies": {
505 "BackgroundAppUpdate": true | false
506 }
507 }
508 ```
509 ### BlockAboutAddons
510
511 Block access to the Add-ons Manager (about:addons).
512
513 **Compatibility:** Firefox 60, Firefox ESR 60\
514 **CCK2 Equivalent:** `disableAddonsManager`\
515 **Preferences Affected:** N/A
516
517 #### Windows (GPO)
518 ```
519 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
520 ```
521 #### Windows (Intune)
522 OMA-URI:
523 ```
524 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
525 ```
526 Value (string):
527 ```
528 <enabled/> or <disabled/>
529 ```
530 #### macOS
531 ```
532 <dict>
533 <key>BlockAboutAddons</key>
534 <true/> | <false/>
535 </dict>
536 ```
537 #### policies.json
538 ```
539 {
540 "policies": {
541 "BlockAboutAddons": true | false
542 }
543 }
544 ```
545 ### BlockAboutConfig
546
547 Block access to about:config.
548
549 **Compatibility:** Firefox 60, Firefox ESR 60\
550 **CCK2 Equivalent:** `disableAboutConfig`\
551 **Preferences Affected:** N/A
552
553 #### Windows (GPO)
554 ```
555 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
556 ```
557 #### Windows (Intune)
558 OMA-URI:
559 ```
560 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
561 ```
562 Value (string):
563 ```
564 <enabled/> or <disabled/>
565 ```
566 #### macOS
567 ```
568 <dict>
569 <key>BlockAboutConfig</key>
570 <true/> | <false/>
571 </dict>
572 ```
573 #### policies.json
574 ```
575 {
576 "policies": {
577 "BlockAboutConfig": true | false
578 }
579 }
580 ```
581 ### BlockAboutProfiles
582
583 Block access to About Profiles (about:profiles).
584
585 **Compatibility:** Firefox 60, Firefox ESR 60\
586 **CCK2 Equivalent:** `disableAboutProfiles`\
587 **Preferences Affected:** N/A
588
589 #### Windows (GPO)
590 ```
591 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
592 ```
593 #### Windows (Intune)
594 OMA-URI:
595 ```
596 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
597 ```
598 Value (string):
599 ```
600 <enabled/> or <disabled/>
601 ```
602 #### macOS
603 ```
604 <dict>
605 <key>BlockAboutProfiles</key>
606 <true/> | <false/>
607 </dict>
608 ```
609 #### policies.json
610 ```
611 {
612 "policies": {
613 "BlockAboutProfiles": true | false
614 }
615 }
616 ```
617 ### BlockAboutSupport
618
619 Block access to Troubleshooting Information (about:support).
620
621 **Compatibility:** Firefox 60, Firefox ESR 60\
622 **CCK2 Equivalent:** `disableAboutSupport`\
623 **Preferences Affected:** N/A
624
625 #### Windows (GPO)
626 ```
627 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
628 ```
629 #### Windows (Intune)
630 OMA-URI:
631 ```
632 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
633 ```
634 Value (string):
635 ```
636 <enabled/> or <disabled/>
637 ```
638 #### macOS
639 ```
640 <dict>
641 <key>BlockAboutSupport</key>
642 <true/> | <false/>
643 </dict>
644 ```
645 #### policies.json
646 ```
647 {
648 "policies": {
649 "BlockAboutSupport": true | false
650 }
651 }
652 ```
653 ### Bookmarks
654
655 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
656
657 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
658
659 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
660
661 **Compatibility:** Firefox 60, Firefox ESR 60\
662 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
663 **Preferences Affected:** N/A
664
665 #### Windows (GPO)
666 ```
667 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
668 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
669 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
670 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
671 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
672
673 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
674 ```
675 []
676 ```
677
678 ```
679 #### Windows (Intune)
680 OMA-URI:
681 ```
682 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
683 ```
684 Value (string):
685 ```
686 <enabled/>
687 <data id="BookmarkTitle" value="Example"/>
688 <data id="BookmarkURL" value="https://example.com"/>
689 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
690 <data id="BookmarkPlacement" value="toolbar | menu"/>
691 <data id="BookmarkFolder" value="FolderName"/>
692 ```
693 OMA-URI:
694 ```
695 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
696 ```
697 Value (string):
698 ```
699 <enabled/>
700 <data id="JSON" value='[]'/>
701 ```
702 #### macOS
703 ```
704 <dict>
705 <key>Bookmarks</key>
706 <array>
707 <dict>
708 <key>Title</key>
709 <string>Example</string>
710 <key>URL</key>
711 <string>https://example.com</string>
712 <key>Favicon</key>
713 <string>https://example.com/favicon.ico</string>
714 <key>Placement</key>
715 <string>toolbar | menu</string>
716 <key>Folder</key>
717 <string>FolderName</string>
718 </dict>
719 </array>
720 </dict>
721 ```
722 #### policies.json
723 ```
724 {
725 "policies": {
726 "Bookmarks": [
727 {
728 "Title": "Example",
729 "URL": "https://example.com",
730 "Favicon": "https://example.com/favicon.ico",
731 "Placement": "toolbar" | "menu",
732 "Folder": "FolderName"
733 }
734 ]
735 }
736 }
737 ```
738 ### CaptivePortal
739 Enable or disable the detection of captive portals.
740
741 **Compatibility:** Firefox 67, Firefox ESR 60.7\
742 **CCK2 Equivalent:** N/A\
743 **Preferences Affected:** `network.captive-portal-service.enabled`
744
745 #### Windows (GPO)
746 ```
747 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
748 ```
749 #### Windows (Intune)
750 OMA-URI:
751 ```
752 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
753 ```
754 Value (string):
755 ```
756 <enabled/> or <disabled/>
757 ```
758 #### macOS
759 ```
760 <dict>
761 <key>CaptivePortal</key>
762 <true/> | <false/>
763 </dict>
764 ```
765 #### policies.json
766 ```
767 {
768 "policies": {
769 "CaptivePortal": true | false
770 }
771 }
772 ```
773 ### Certificates
774
775 ### Certificates | ImportEnterpriseRoots
776
777 Trust certificates that have been added to the operating system certificate store by a user or administrator.
778
779 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
780
781 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
782
783 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
784 **CCK2 Equivalent:** N/A\
785 **Preferences Affected:** `security.enterprise_roots.enabled`
786
787 #### Windows (GPO)
788 ```
789 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
790 ```
791 #### Windows (Intune)
792 OMA-URI:
793 ```
794 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
795 ```
796 Value (string):
797 ```
798 <enabled/> or <disabled/>
799 ```
800 #### macOS
801 ```
802 <dict>
803 <key>Certificates</key>
804 <dict>
805 <key>ImportEnterpriseRoots</key>
806 <true/> | <false/>
807 </dict>
808 </dict>
809 ```
810 #### policies.json
811 ```
812 {
813 "policies": {
814 "Certificates": {
815 "ImportEnterpriseRoots": true | false
816 }
817 }
818 }
819 ```
820 ### Certificates | Install
821
822 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
823
824 - Windows
825 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
826 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
827 - macOS
828 - /Library/Application Support/Mozilla/Certificates
829 - ~/Library/Application Support/Mozilla/Certificates
830 - Linux
831 - /usr/lib/mozilla/certificates
832 - /usr/lib64/mozilla/certificates
833 - ~/.mozilla/certificates
834
835 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
836
837 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
838
839 Certificates are installed using the trust string `CT,CT,`.
840
841 Binary (DER) and ASCII (PEM) certificates are both supported.
842
843 **Compatibility:** Firefox 64, Firefox ESR 64\
844 **CCK2 Equivalent:** `certs.ca`\
845 **Preferences Affected:** N/A
846
847 #### Windows (GPO)
848 ```
849 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
850 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
851 ```
852 #### Windows (Intune)
853 OMA-URI:
854 ```
855 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
856 ```
857 Value (string):
858 ```
859 <enabled/>
860 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
861 ```
862 #### macOS
863 ```
864 <dict>
865 <key>Certificates</key>
866 <dict>
867 <key>Install</key>
868 <array>
869 <string>cert1.der</string>
870 <string>/Users/username/cert2.pem</string>
871 </array>
872 </dict>
873 </dict>
874 ```
875 #### policies.json
876 ```
877 {
878 "policies": {
879 "Certificates": {
880 "Install": ["cert1.der", "/home/username/cert2.pem"]
881 }
882 }
883 }
884 ```
885 ### Cookies
886 Configure cookie preferences.
887
888 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
889
890 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
891
892 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
893
894 `Default` determines whether cookies are accepted at all.
895
896 `AcceptThirdParty` determines how third-party cookies are handled.
897
898 `ExpireAtSessionEnd` determines when cookies expire.
899
900 `RejectTracker` only rejects cookies for trackers.
901
902 `Locked` prevents the user from changing cookie preferences.
903
904 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1)\
905 **CCK2 Equivalent:** N/A\
906 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.lifetimePolicy`
907
908 #### Windows (GPO)
909 ```
910 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
911 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
912 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
913 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
914 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
915 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
916 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
917 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
918 ```
919 #### Windows (Intune)
920 OMA-URI:
921 ```
922 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
923 ```
924 Value (string):
925 ```
926 <enabled/>
927 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
928 ```
929 OMA-URI:
930 ```
931 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
932 ```
933 Value (string):
934 ```
935 <enabled/>
936 <data id="Cookies_Allow" value="1&#xF000;https://example.edu"/>
937 ```
938 OMA-URI:
939 ```
940 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
941 ```
942 Value (string):
943 ```
944 <enabled/>
945 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
946 ```
947 OMA-URI:
948 ```
949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
950 ```
951 Value (string):
952 ```
953 <enabled/> or <disabled/>
954 ```
955 OMA-URI:
956 ```
957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
958 ```
959 Value (string):
960 ```
961 <enabled/>
962 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
963 ```
964 OMA-URI:
965 ```
966 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
967 ```
968 Value (string):
969 ```
970 <enabled/> or <disabled/>
971 ```
972 OMA-URI:
973 ```
974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
975 ```
976 Value (string):
977 ```
978 <enabled/> or <disabled/>
979 ```
980 OMA-URI:
981 ```
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
983 ```
984 Value (string):
985 ```
986 <enabled/> or <disabled/>
987 ```
988 #### macOS
989 ```
990 <dict>
991 <key>Cookies</key>
992 <dict>
993 <key>Allow</key>
994 <array>
995 <string>http://example.com</string>
996 </array>
997 <key>AllowSession</key>
998 <array>
999 <string>http://example.edu</string>
1000 </array>
1001 <key>Block</key>
1002 <array>
1003 <string>http://example.org</string>
1004 </array>
1005 <key>Default</key>
1006 <true/> | <false/>
1007 <key>AcceptThirdParty</key>
1008 <string>always | never | from-visited</string>
1009 <key>ExpireAtSessionEnd</key>
1010 <true/> | <false/>
1011 <key>RejectTracker</key>
1012 <true/> | <false/>
1013 <key>Locked</key>
1014 <true/> | <false/>
1015 </dict>
1016 </dict>
1017 ```
1018 #### policies.json
1019 ```
1020 {
1021 "policies": {
1022 "Cookies": {
1023 "Allow": ["http://example.org/"],
1024 "AllowSession": ["http://example.edu/"],
1025 "Block": ["http://example.edu/"],
1026 "Default": true | false,
1027 "AcceptThirdParty": "always" | "never" | "from-visited",
1028 "ExpireAtSessionEnd": true | false,
1029 "RejectTracker": true | false,
1030 "Locked": true | false
1031 }
1032 }
1033 }
1034 ```
1035 ### DisableSetDesktopBackground
1036 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
1037
1038 **Compatibility:** Firefox 60, Firefox ESR 60\
1039 **CCK2 Equivalent:** `removeSetDesktopBackground`\
1040 **Preferences Affected:** N/A
1041
1042 #### Windows (GPO)
1043 ```
1044 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
1045 ```
1046 #### Windows (Intune)
1047 OMA-URI:
1048 ```
1049 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
1050 ```
1051 Value (string):
1052 ```
1053 <enabled/> or <disabled/>
1054 ```
1055 #### macOS
1056 ```
1057 <dict>
1058 <key>DisableSetDesktopBackground</key>
1059 <true/> | <false/>
1060 </dict>
1061 ```
1062 #### policies.json
1063 ```
1064 {
1065 "policies": {
1066 "DisableSetDesktopBackground": true | false
1067 }
1068 }
1069 ```
1070 ### DisableMasterPasswordCreation
1071 Remove the master password functionality.
1072
1073 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1074
1075 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1076
1077 **Compatibility:** Firefox 60, Firefox ESR 60\
1078 **CCK2 Equivalent:** `noMasterPassword`\
1079 **Preferences Affected:** N/A
1080
1081 #### Windows (GPO)
1082 ```
1083 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1084 ```
1085 #### Windows (Intune)
1086 OMA-URI:
1087 ```
1088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1089 ```
1090 Value (string):
1091 ```
1092 <enabled/> or <disabled/>
1093 ```
1094 #### macOS
1095 ```
1096 <dict>
1097 <key>DisableMasterPasswordCreation</key>
1098 <true/> | <false/>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableMasterPasswordCreation": true | false
1106 }
1107 }
1108 ```
1109 ### DefaultDownloadDirectory
1110 Set the default download directory.
1111
1112 You can use ${home} for the native home directory.
1113
1114 **Compatibility:** Firefox 68, Firefox ESR 68\
1115 **CCK2 Equivalent:** N/A\
1116 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1117
1118 #### Windows (GPO)
1119 ```
1120 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1121 ```
1122 #### Windows (Intune)
1123 OMA-URI:
1124 ```
1125 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1126 ```
1127 Value (string):
1128 ```
1129 <enabled/>
1130 <data id="Preferences_String" value="${home}\Downloads"/>
1131 ```
1132 #### macOS
1133 ```
1134 <dict>
1135 <key>DefaultDownloadDirectory</key>
1136 <string>${home}/Downloads</string>
1137 </dict>
1138 ```
1139 #### policies.json (macOS and Linux)
1140 ```
1141 {
1142 "policies": {
1143 "DefaultDownloadDirectory": "${home}/Downloads"
1144 }
1145 ```
1146 #### policies.json (Windows)
1147 ```
1148 {
1149 "policies": {
1150 "DefaultDownloadDirectory": "${home}\\Downloads"
1151 }
1152 ```
1153 ### DisableAppUpdate
1154 Turn off application updates within Firefox.
1155
1156 **Compatibility:** Firefox 60, Firefox ESR 60\
1157 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1158 **Preferences Affected:** N/A
1159
1160 #### Windows (GPO)
1161 ```
1162 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1163 ```
1164 #### Windows (Intune)
1165 OMA-URI:
1166 ```
1167 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1168 ```
1169 Value (string):
1170 ```
1171 <enabled/> or <disabled/>
1172 ```
1173 #### macOS
1174 ```
1175 <dict>
1176 <key>DisableAppUpdate</key>
1177 <true/> | <false/>
1178 </dict>
1179 ```
1180 #### policies.json
1181 ```
1182 {
1183 "policies": {
1184 "DisableAppUpdate": true | false
1185 }
1186 }
1187 ```
1188 ### DisableBuiltinPDFViewer
1189 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1190
1191 **Compatibility:** Firefox 60, Firefox ESR 60\
1192 **CCK2 Equivalent:** `disablePDFjs`\
1193 **Preferences Affected:** `pdfjs.disabled`
1194
1195 #### Windows (GPO)
1196 ```
1197 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1198 ```
1199 #### Windows (Intune)
1200 OMA-URI:
1201 ```
1202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1203 ```
1204 Value (string):
1205 ```
1206 <enabled/> or <disabled/>
1207 ```
1208 #### macOS
1209 ```
1210 <dict>
1211 <key>DisableBuiltinPDFViewer</key>
1212 <true/> | <false/>
1213 </dict>
1214 ```
1215 #### policies.json
1216 ```
1217 {
1218 "policies": {
1219 "DisableBuiltinPDFViewer": true | false
1220 }
1221 }
1222 ```
1223 ### DisabledCiphers
1224 Disable specific cryptographic ciphers.
1225
1226 **Preferences Affected:** `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.rsa_des_ede3_sha`
1227
1228 ---
1229 **Note:**
1230
1231 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1232
1233 ---
1234 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
1235 **CCK2 Equivalent:** N/A\
1236 **Preferences Affected:** N/A
1237
1238 #### Windows (GPO)
1239 ```
1240 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1241 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1242 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1243 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1244 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1245 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1246 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1247 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1248 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
1249 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1250 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
1251 ```
1252 #### Windows (Intune)
1253 OMA-URI:
1254 ```
1255 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1259 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
1262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
1264 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
1265 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
1266 ```
1267 Value (string):
1268 ```
1269 <enabled/> or <disabled/>
1270 ```
1271 #### macOS
1272 ```
1273 <dict>
1274 <key>DisabledCiphers</key>
1275 <dict>
1276 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1277 <true/> | <false/>
1278 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1279 <true/> | <false/>
1280 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1281 <true/> | <false/>
1282 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1283 <true/> | <false/>
1284 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1285 <true/> | <false/>
1286 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1287 <true/> | <false/>
1288 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1289 <true/> | <false/>
1290 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1291 <true/> | <false/>
1292 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1293 <true/> | <false/>
1294 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1295 <true/> | <false/>
1296 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1297 <true/> | <false/>
1298 </dict>
1299 </dict>
1300 ```
1301 #### policies.json
1302 ```
1303 {
1304 "policies": {
1305 "DisabledCiphers": {
1306 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1307 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1308 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1309 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1310 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1311 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1312 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1313 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1314 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false,
1315 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false,
1316 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1317 }
1318 }
1319 }
1320 ```
1321 ### DisableDefaultBrowserAgent
1322 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1323
1324 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1325
1326 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1327 **CCK2 Equivalent:** N/A\
1328 **Preferences Affected:** N/A
1329
1330 #### Windows (GPO)
1331 ```
1332 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1333 ```
1334 #### Windows (Intune)
1335 OMA-URI:
1336 ```
1337 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1338 ```
1339 Value (string):
1340 ```
1341 <enabled/> or <disabled/>
1342 ```
1343 #### policies.json
1344 ```
1345 {
1346 "policies": {
1347 "DisableDefaultBrowserAgent": true | false
1348 }
1349 }
1350 ```
1351 ### DisableDeveloperTools
1352 Remove access to all developer tools.
1353
1354 **Compatibility:** Firefox 60, Firefox ESR 60\
1355 **CCK2 Equivalent:** `removeDeveloperTools`\
1356 **Preferences Affected:** `devtools.policy.disabled`
1357
1358 #### Windows (GPO)
1359 ```
1360 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1361 ```
1362 #### Windows (Intune)
1363 OMA-URI:
1364 ```
1365 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1366 ```
1367 Value (string):
1368 ```
1369 <enabled/> or <disabled/>
1370 ```
1371 #### macOS
1372 ```
1373 <dict>
1374 <key>DisableDeveloperTools</key>
1375 <true/> | <false/>
1376 </dict>
1377 ```
1378 #### policies.json
1379 ```
1380 {
1381 "policies": {
1382 "DisableDeveloperTools": true | false
1383 }
1384 }
1385 ```
1386 ### DisableFeedbackCommands
1387 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1388
1389 **Compatibility:** Firefox 60, Firefox ESR 60\
1390 **CCK2 Equivalent:** N/A\
1391 **Preferences Affected:** N/A
1392
1393 #### Windows (GPO)
1394 ```
1395 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1396 ```
1397 #### Windows (Intune)
1398 OMA-URI:
1399 ```
1400 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1401 ```
1402 Value (string):
1403 ```
1404 <enabled/> or <disabled/>
1405 ```
1406 #### macOS
1407 ```
1408 <dict>
1409 <key>DisableFeedbackCommands</key>
1410 <true/> | <false/>
1411 </dict>
1412 ```
1413 #### policies.json
1414 ```
1415 {
1416 "policies": {
1417 "DisableFeedbackCommands": true | false
1418 }
1419 }
1420 ```
1421 ### DisableFirefoxAccounts
1422 Disable Firefox Accounts integration (Sync).
1423
1424 **Compatibility:** Firefox 60, Firefox ESR 60\
1425 **CCK2 Equivalent:** `disableSync`\
1426 **Preferences Affected:** `identity.fxaccounts.enabled`
1427
1428 #### Windows (GPO)
1429 ```
1430 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1431 ```
1432 #### Windows (Intune)
1433 OMA-URI:
1434 ```
1435 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1436 ```
1437 Value (string):
1438 ```
1439 <enabled/> or <disabled/>
1440 ```
1441 #### macOS
1442 ```
1443 <dict>
1444 <key>DisableFirefoxAccounts</key>
1445 <true/> | <false/>
1446 </dict>
1447 ```
1448 #### policies.json
1449 ```
1450 {
1451 "policies": {
1452 "DisableFirefoxAccounts": true | false
1453 }
1454 }
1455 ```
1456 ### DisableFirefoxScreenshots
1457 Remove access to Firefox Screenshots.
1458
1459 **Compatibility:** Firefox 60, Firefox ESR 60\
1460 **CCK2 Equivalent:** N/A\
1461 **Preferences Affected:** `extensions.screenshots.disabled`
1462
1463 #### Windows (GPO)
1464 ```
1465 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1466 ```
1467 #### Windows (Intune)
1468 OMA-URI:
1469 ```
1470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1471 ```
1472 Value (string):
1473 ```
1474 <enabled/> or <disabled/>
1475 ```
1476 #### macOS
1477 ```
1478 <dict>
1479 <key>DisableFirefoxScreenshots</key>
1480 <true/> | <false/>
1481 </dict>
1482 ```
1483 #### policies.json
1484 ```
1485 {
1486 "policies": {
1487 "DisableFirefoxScreenshots": true | false
1488 }
1489 }
1490 ```
1491 ### DisableFirefoxStudies
1492 Disable Firefox studies (Shield).
1493
1494 **Compatibility:** Firefox 60, Firefox ESR 60\
1495 **CCK2 Equivalent:** N/A\
1496 **Preferences Affected:** N/A
1497
1498 #### Windows (GPO)
1499 ```
1500 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1501 ```
1502 #### Windows (Intune)
1503 OMA-URI:
1504 ```
1505 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1506 ```
1507 Value (string):
1508 ```
1509 <enabled/> or <disabled/>
1510 ```
1511 #### macOS
1512 ```
1513 <dict>
1514 <key>DisableFirefoxStudies</key>
1515 <true/> | <false/>
1516 </dict>
1517 ```
1518 #### policies.json
1519 ```
1520 {
1521 "policies": {
1522 "DisableFirefoxStudies": true | false
1523 }
1524 }
1525 ```
1526 ### DisableForgetButton
1527 Disable the "Forget" button.
1528
1529 **Compatibility:** Firefox 60, Firefox ESR 60\
1530 **CCK2 Equivalent:** `disableForget`\
1531 **Preferences Affected:** N/A
1532
1533 #### Windows (GPO)
1534 ```
1535 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1536 ```
1537 #### Windows (Intune)
1538 OMA-URI:
1539 ```
1540 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1541 ```
1542 Value (string):
1543 ```
1544 <enabled/> or <disabled/>
1545 ```
1546 #### macOS
1547 ```
1548 <dict>
1549 <key>DisableForgetButton</key>
1550 <true/> | <false/>
1551 </dict>
1552 ```
1553 #### policies.json
1554 ```
1555 {
1556 "policies": {
1557 "DisableForgetButton": true | false
1558 }
1559 }
1560 ```
1561 ### DisableFormHistory
1562 Turn off saving information on web forms and the search bar.
1563
1564 **Compatibility:** Firefox 60, Firefox ESR 60\
1565 **CCK2 Equivalent:** `disableFormFill`\
1566 **Preferences Affected:** `browser.formfill.enable`
1567
1568 #### Windows (GPO)
1569 ```
1570 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1571 ```
1572 #### Windows (Intune)
1573 OMA-URI:
1574 ```
1575 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1576 ```
1577 Value (string):
1578 ```
1579 <enabled/> or <disabled/>
1580 ```
1581 #### macOS
1582 ```
1583 <dict>
1584 <key>DisableFormHistory</key>
1585 <true/> | <false/>
1586 </dict>
1587 ```
1588 #### policies.json
1589 ```
1590 {
1591 "policies": {
1592 "DisableFormHistory": true | false
1593 }
1594 }
1595 ```
1596 ### DisablePasswordReveal
1597 Do not allow passwords to be shown in saved logins
1598
1599 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1600 **CCK2 Equivalent:** N/A
1601 **Preferences Affected:** N/A
1602
1603 #### Windows (GPO)
1604 ```
1605 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1606 ```
1607 #### Windows (Intune)
1608 OMA-URI:
1609 ```
1610 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1611 ```
1612 Value (string):
1613 ```
1614 <enabled/> or <disabled/>
1615 ```
1616 #### macOS
1617 ```
1618 <dict>
1619 <key>DisablePasswordReveal</key>
1620 <true/> | <false/>
1621 </dict>
1622 ```
1623 #### policies.json
1624 ```
1625 {
1626 "policies": {
1627 "DisablePasswordReveal": true | false
1628 }
1629 }
1630 ```
1631 ### DisablePocket
1632 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1633
1634 **Compatibility:** Firefox 60, Firefox ESR 60\
1635 **CCK2 Equivalent:** `disablePocket`\
1636 **Preferences Affected:** `extensions.pocket.enabled`
1637
1638 #### Windows (GPO)
1639 ```
1640 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1641 ```
1642 #### Windows (Intune)
1643 OMA-URI:
1644 ```
1645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1646 ```
1647 Value (string):
1648 ```
1649 <enabled/> or <disabled/>
1650 ```
1651 #### macOS
1652 ```
1653 <dict>
1654 <key>DisablePocket</key>
1655 <true/> | <false/>
1656 </dict>
1657 ```
1658 #### policies.json
1659 ```
1660 {
1661 "policies": {
1662 "DisablePocket": true | false
1663 }
1664 }
1665 ```
1666 ### DisablePrivateBrowsing
1667 Remove access to private browsing.
1668
1669 **Compatibility:** Firefox 60, Firefox ESR 60\
1670 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1671 **Preferences Affected:** N/A
1672
1673 #### Windows (GPO)
1674 ```
1675 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1676 ```
1677 #### Windows (Intune)
1678 OMA-URI:
1679 ```
1680 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1681 ```
1682 Value (string):
1683 ```
1684 <enabled/> or <disabled/>
1685 ```
1686 #### macOS
1687 ```
1688 <dict>
1689 <key>DisablePrivateBrowsing</key>
1690 <true/> | <false/>
1691 </dict>
1692 ```
1693 #### policies.json
1694 ```
1695 {
1696 "policies": {
1697 "DisablePrivateBrowsing": true | false
1698 }
1699 }
1700 ```
1701 ### DisableProfileImport
1702 Disables the "Import data from another browser" option in the bookmarks window.
1703
1704 **Compatibility:** Firefox 60, Firefox ESR 60\
1705 **CCK2 Equivalent:** N/A\
1706 **Preferences Affected:** N/A
1707
1708 #### Windows (GPO)
1709 ```
1710 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1711 ```
1712 #### Windows (Intune)
1713 OMA-URI:
1714 ```
1715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1716 ```
1717 Value (string):
1718 ```
1719 <enabled/> or <disabled/>
1720 ```
1721 #### macOS
1722 ```
1723 <dict>
1724 <key>DisableProfileImport</key>
1725 <true/> | <false/>
1726 </dict>
1727 ```
1728 #### policies.json
1729 ```
1730 {
1731 "policies": {
1732 "DisableProfileImport": true | false
1733 }
1734 }
1735 ```
1736 ### DisableProfileRefresh
1737 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1738
1739 **Compatibility:** Firefox 60, Firefox ESR 60\
1740 **CCK2 Equivalent:** `disableResetFirefox`\
1741 **Preferences Affected:** `browser.disableResetPrompt`
1742
1743 #### Windows (GPO)
1744 ```
1745 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1746 ```
1747 #### Windows (Intune)
1748 OMA-URI:
1749 ```
1750 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1751 ```
1752 Value (string):
1753 ```
1754 <enabled/> or <disabled/>
1755 ```
1756 #### macOS
1757 ```
1758 <dict>
1759 <key>DisableProfileRefresh</key>
1760 <true/> | <false/>
1761 </dict>
1762 ```
1763 #### policies.json
1764 ```
1765 {
1766 "policies": {
1767 "DisableProfileRefresh": true | false
1768 }
1769 }
1770 ```
1771 ### DisableSafeMode
1772 Disable safe mode within the browser.
1773
1774 On Windows, this disables safe mode via the command line as well.
1775
1776 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1777 **CCK2 Equivalent:** `disableSafeMode`\
1778 **Preferences Affected:** N/A
1779
1780 #### Windows (GPO)
1781 ```
1782 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1783 ```
1784 #### Windows (Intune)
1785 OMA-URI:
1786 ```
1787 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1788 ```
1789 Value (string):
1790 ```
1791 <enabled/> or <disabled/>
1792 ```
1793 #### macOS
1794 ```
1795 <dict>
1796 <key>DisableSafeMode</key>
1797 <true/> | <false/>
1798 </dict>
1799 ```
1800 #### policies.json
1801 ```
1802 {
1803 "policies": {
1804 "DisableSafeMode": true | false
1805 }
1806 }
1807 ```
1808 ### DisableSecurityBypass
1809 Prevent the user from bypassing security in certain cases.
1810
1811 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1812
1813 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1814
1815 **Compatibility:** Firefox 60, Firefox ESR 60\
1816 **CCK2 Equivalent:** N/A\
1817 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
1818
1819 #### Windows (GPO)
1820 ```
1821 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1822 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1823 ```
1824 #### Windows (Intune)
1825 OMA-URI:
1826 ```
1827 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1828 ```
1829 Value (string):
1830 ```
1831 <enabled/> or <disabled/>
1832 ```
1833 OMA-URI:
1834 ```
1835 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1836 ```
1837 Value (string):
1838 ```
1839 <enabled/> or <disabled/>
1840 ```
1841
1842 #### macOS
1843 ```
1844 <dict>
1845 <key>DisableSecurityBypass</key>
1846 <dict>
1847 <key>InvalidCertificate</key>
1848 <true/> | <false/>
1849 <key>SafeBrowsing</key>
1850 <true/> | <false/>
1851 </dict>
1852 </dict>
1853 ```
1854 #### policies.json
1855 ```
1856 {
1857 "policies": {
1858 "DisableSecurityBypass": {
1859 "InvalidCertificate": true | false,
1860 "SafeBrowsing": true | false
1861 }
1862 }
1863 }
1864 ```
1865 ### DisableSystemAddonUpdate
1866 Prevent system add-ons from being installed or update.
1867
1868 **Compatibility:** Firefox 60, Firefox ESR 60\
1869 **CCK2 Equivalent:** N/A\
1870 **Preferences Affected:** N/A
1871
1872 #### Windows (GPO)
1873 ```
1874 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1875 ```
1876 #### Windows (Intune)
1877 OMA-URI:
1878 ```
1879 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1880 ```
1881 Value (string):
1882 ```
1883 <enabled/> or <disabled/>
1884 ```
1885 #### macOS
1886 ```
1887 <dict>
1888 <key>DisableSystemAddonUpdate</key>
1889 <true/> | <false/>
1890 </dict>
1891 ```
1892 #### policies.json
1893 ```
1894 {
1895 "policies": {
1896 "DisableSystemAddonUpdate": true | false
1897 }
1898 }
1899 ```
1900 ### DisableTelemetry
1901 Prevent the upload of telemetry data.
1902
1903 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1904
1905 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1906
1907 **Compatibility:** Firefox 60, Firefox ESR 60\
1908 **CCK2 Equivalent:** `disableTelemetry`\
1909 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
1910
1911 #### Windows (GPO)
1912 ```
1913 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1914 ```
1915 #### Windows (Intune)
1916 OMA-URI:
1917 ```
1918 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1919 ```
1920 Value (string):
1921 ```
1922 <enabled/> or <disabled/>
1923 ```
1924 #### macOS
1925 ```
1926 <dict>
1927 <key>DisableTelemetry</key>
1928 <true/> | <false/>
1929 </dict>
1930 ```
1931 #### policies.json
1932 ```
1933 {
1934 "policies": {
1935 "DisableTelemetry": true | false
1936 }
1937 }
1938 ```
1939 ### DisplayBookmarksToolbar
1940 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1941
1942 **Compatibility:** Firefox 60, Firefox ESR 60\
1943 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1944 **Preferences Affected:** N/A
1945
1946 #### Windows (GPO)
1947 ```
1948 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1949 ```
1950 #### Windows (Intune)
1951 OMA-URI:
1952 ```
1953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1954 ```
1955 Value (string):
1956 ```
1957 <enabled/> or <disabled/>
1958 ```
1959 #### macOS
1960 ```
1961 <dict>
1962 <key>DisplayBookmarksToolbar</key>
1963 <true/> | <false/>
1964 </dict>
1965 ```
1966 #### policies.json
1967 ```
1968 {
1969 "policies": {
1970 "DisplayBookmarksToolbar": true | false
1971 }
1972 }
1973 ```
1974 ### DisplayMenuBar
1975 Set the state of the menubar.
1976
1977 `always` means the menubar is shown and cannot be hidden.
1978
1979 `never` means the menubar is hidden and cannot be shown.
1980
1981 `default-on` means the menubar is on by default but can be hidden.
1982
1983 `default-off` means the menubar is off by default but can be shown.
1984
1985 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1986 **CCK2 Equivalent:** `displayMenuBar`\
1987 **Preferences Affected:** N/A
1988
1989 #### Windows (GPO)
1990 ```
1991 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1992 ```
1993 #### Windows (Intune)
1994 OMA-URI:
1995 ```
1996 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1997 ```
1998 Value (string):
1999 ```
2000 <enabled/>
2001 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2002 ```
2003 #### macOS
2004 ```
2005 <dict>
2006 <key>DisplayMenuBar</key>
2007 <string>always | never | default-on | default-off</string>
2008 </dict>
2009 ```
2010 #### policies.json
2011 ```
2012 {
2013 "policies": {
2014 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2015 }
2016 }
2017 ```
2018 ### DisplayMenuBar (Deprecated)
2019 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
2020
2021 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
2022 **CCK2 Equivalent:** `displayMenuBar`\
2023 **Preferences Affected:** N/A
2024
2025 #### Windows (GPO)
2026 ```
2027 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
2028 ```
2029 #### macOS
2030 ```
2031 <dict>
2032 <key>DisplayMenuBar</key>
2033 <true/> | <false/>
2034 </dict>
2035 ```
2036 #### policies.json
2037 ```
2038 {
2039 "policies": {
2040 "DisplayMenuBar": true | false
2041 }
2042 }
2043 ```
2044 ### DNSOverHTTPS
2045 Configure DNS over HTTPS.
2046
2047 `Enabled` determines whether DNS over HTTPS is enabled
2048
2049 `ProviderURL` is a URL to another provider.
2050
2051 `Locked` prevents the user from changing DNS over HTTPS preferences.
2052
2053 `ExcludedDomains` excludes domains from DNS over HTTPS.
2054
2055 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
2056 **CCK2 Equivalent:** N/A\
2057 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2058
2059 #### Windows (GPO)
2060 ```
2061 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2062 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2063 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2064 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2065 ```
2066 #### Windows (Intune)
2067 OMA-URI:
2068 ```
2069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2070 ```
2071 Value (string):
2072 ```
2073 <enabled/> or <disabled/>
2074 ```
2075 OMA-URI:
2076 ```
2077 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2078 ```
2079 Value (string):
2080 ```
2081 <enabled/>
2082 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2083 ```
2084 OMA-URI:
2085 ```
2086 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2087 ```
2088 Value (string):
2089 ```
2090 <enabled/> or <disabled/>
2091 ```
2092 OMA-URI:
2093 ```
2094 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2095 ```
2096 Value (string):
2097 ```
2098 <enabled/>
2099 <data id="List" value="1&#xF000;example.com"/>
2100 ```
2101 #### macOS
2102 ```
2103 <dict>
2104 <key>DNSOverHTTPS</key>
2105 <dict>
2106 <key>Enabled</key>
2107 <true/> | <false/>
2108 <key>ProviderURL</key>
2109 <string>URL_TO_ALTERNATE_PROVIDER</string>
2110 <key>Locked</key>
2111 <true/> | <false/>
2112 <key>ExcludedDomains</key>
2113 <array>
2114 <string>example.com</string>
2115 </array>
2116 </dict>
2117 </dict>
2118 ```
2119 #### policies.json
2120 ```
2121 {
2122 "policies": {
2123 "DNSOverHTTPS": {
2124 "Enabled": true | false,
2125 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2126 "Locked": true | false,
2127 "ExcludedDomains": ["example.com"]
2128 }
2129 }
2130 }
2131 ```
2132 ### DontCheckDefaultBrowser
2133 Don't check if Firefox is the default browser at startup.
2134
2135 **Compatibility:** Firefox 60, Firefox ESR 60\
2136 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2137 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2138
2139 #### Windows (GPO)
2140 ```
2141 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2142 ```
2143 #### Windows (Intune)
2144 OMA-URI:
2145 ```
2146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2147 ```
2148 Value (string):
2149 ```
2150 <enabled/> or <disabled/>
2151 ```
2152 #### macOS
2153 ```
2154 <dict>
2155 <key>DontCheckDefaultBrowser</key>
2156 <true/> | <false/>
2157 </dict>
2158 ```
2159 #### policies.json
2160 ```
2161 {
2162 "policies": {
2163 "DontCheckDefaultBrowser": true | false
2164 }
2165 }
2166 ```
2167 ### DownloadDirectory
2168 Set and lock the download directory.
2169
2170 You can use ${home} for the native home directory.
2171
2172 **Compatibility:** Firefox 68, Firefox ESR 68\
2173 **CCK2 Equivalent:** N/A\
2174 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2175
2176 #### Windows (GPO)
2177 ```
2178 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2179 ```
2180 #### Windows (Intune)
2181 OMA-URI:
2182 ```
2183 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2184 ```
2185 Value (string):
2186 ```
2187 <enabled/>
2188 <data id="Preferences_String" value="${home}\Downloads"/>
2189 ```
2190 #### macOS
2191 ```
2192 <dict>
2193 <key>DownloadDirectory</key>
2194 <string>${home}/Downloads</string>
2195 </dict>
2196 ```
2197 #### policies.json (macOS and Linux)
2198 ```
2199 {
2200 "policies": {
2201 "DownloadDirectory": "${home}/Downloads"
2202 }
2203 ```
2204 #### policies.json (Windows)
2205 ```
2206 {
2207 "policies": {
2208 "DownloadDirectory": "${home}\\Downloads"
2209 }
2210 ```
2211 ### EnableTrackingProtection
2212 Configure tracking protection.
2213
2214 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2215
2216 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2217
2218 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2219
2220 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2221
2222 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2223
2224 `Exceptions` are origins for which tracking protection is not enabled.
2225
2226 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2227 **CCK2 Equivalent:** N/A\
2228 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2229
2230 #### Windows (GPO)
2231 ```
2232 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2233 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2234 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2235 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2236 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2237 ```
2238 #### Windows (Intune)
2239 OMA-URI:
2240 ```
2241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2242 ```
2243 Value (string):
2244 ```
2245 <enabled/> or <disabled/>
2246 ```
2247 OMA-URI:
2248 ```
2249 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2250 ```
2251 Value (string):
2252 ```
2253 <enabled/> or <disabled/>
2254 ```
2255 OMA-URI:
2256 ```
2257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2258 ```
2259 Value (string):
2260 ```
2261 <enabled/> or <disabled/>
2262 ```
2263 OMA-URI:
2264 ```
2265 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2266 ```
2267 Value (string):
2268 ```
2269 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2270 ```
2271 OMA-URI:
2272 ```
2273 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2274 ```
2275 Value (string):
2276 ```
2277 <enabled/> or <disabled/>
2278 ```
2279 #### macOS
2280 ```
2281 <dict>
2282 <key>EnableTrackingProtection</key>
2283 <dict>
2284 <key>Value</key>
2285 <true/> | <false/>
2286 <key>Locked</key>
2287 <true/> | <false/>
2288 <key>Cryptomining</key>
2289 <true/> | <false/>
2290 <key>Fingerprinting</key>
2291 <true/> | <false/>
2292 <key>Exceptions</key>
2293 <array>
2294 <string>https://example.com</string>
2295 </array>
2296 </dict>
2297 </dict>
2298 ```
2299 #### policies.json
2300 ```
2301 {
2302 "policies": {
2303 "EnableTrackingProtection": {
2304 "Value": true | false,
2305 "Locked": true | false,
2306 "Cryptomining": true | false,
2307 "Fingerprinting": true | false,
2308 "Exceptions": ["https://example.com"]
2309 }
2310 }
2311 }
2312 ```
2313 ### EncryptedMediaExtensions
2314 Enable or disable Encrypted Media Extensions and optionally lock it.
2315
2316 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2317
2318 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2319
2320 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2321 **CCK2 Equivalent:** N/A\
2322 **Preferences Affected:** `media.eme.enabled`
2323
2324 #### Windows (GPO)
2325 ```
2326 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2327 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2328 ```
2329 #### Windows (Intune)
2330 OMA-URI:
2331 ```
2332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2334 ```
2335 Value (string):
2336 ```
2337 <enabled/>or <disabled/>
2338 ```
2339 #### macOS
2340 ```
2341 <dict>
2342 <key>EncryptedMediaExtensions</key>
2343 <dict>
2344 <key>Enabled</key>
2345 <true/> | <false/>
2346 <key>Locked</key>
2347 <true/> | <false/>
2348 </dict>
2349 </dict>
2350 ```
2351 #### policies.json
2352 ```
2353 {
2354 "policies": {
2355 "EncryptedMediaExtensions": {
2356 "Enabled": true | false,
2357 "Locked": true | false
2358 }
2359 }
2360 }
2361 ```
2362 ### EnterprisePoliciesEnabled
2363 Enable policy support on macOS.
2364
2365 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2366 **CCK2 Equivalent:** N/A\
2367 **Preferences Affected:** N/A
2368
2369 #### macOS
2370 ```
2371 <dict>
2372 <key>EnterprisePoliciesEnabled</key>
2373 <true/>
2374 </dict>
2375 ```
2376 ### Extensions
2377 Control the installation, uninstallation and locking of extensions.
2378
2379 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2380
2381 `Install` is a list of URLs or native paths for extensions to be installed.
2382
2383 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2384
2385 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2386
2387 **Compatibility:** Firefox 60, Firefox ESR 60\
2388 **CCK2 Equivalent:** `addons`\
2389 **Preferences Affected:** N/A
2390
2391 #### Windows (GPO)
2392 ```
2393 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2394 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2395 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2396 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2397 ```
2398 #### Windows (Intune)
2399 OMA-URI:
2400 ```
2401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2402 ```
2403 Value (string):
2404 ```
2405 <enabled/>
2406 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2407 ```
2408 OMA-URI:
2409 ```
2410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2411 ```
2412 Value (string):
2413 ```
2414 <enabled/>
2415 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2416 ```
2417 OMA-URI:
2418 ```
2419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2420 ```
2421 Value (string):
2422 ```
2423 <enabled/>
2424 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2425 ```
2426 #### macOS
2427 ```
2428 <dict>
2429 <key>Extensions</key>
2430 <dict>
2431 <key>Install</key>
2432 <array>
2433 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2434 <string>//path/to/xpi</string>
2435 </array>
2436 <key>Uninstall</key>
2437 <array>
2438 <string>bad_addon_id@mozilla.org</string>
2439 </array>
2440 <key>Locked</key>
2441 <array>
2442 <string>addon_id@mozilla.org</string>
2443 </array>
2444 </dict>
2445 </dict>
2446 ```
2447 #### policies.json
2448 ```
2449 {
2450 "policies": {
2451 "Extensions": {
2452 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2453 "Uninstall": ["bad_addon_id@mozilla.org"],
2454 "Locked": ["addon_id@mozilla.org"]
2455 }
2456 }
2457 }
2458 ```
2459 ### ExtensionSettings
2460 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2461
2462 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2463
2464 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2465
2466 The configuration for each extension is another dictionary that can contain the fields documented below.
2467
2468 | Name | Description |
2469 | --- | --- |
2470 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2471 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2472 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2473 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2474 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2475 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2476 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2477 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2478 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2479 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2480 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2481
2482 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2483 **CCK2 Equivalent:** N/A\
2484 **Preferences Affected:** N/A
2485
2486 #### Windows (GPO)
2487 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2488 ```
2489 {
2490 "*": {
2491 "blocked_install_message": "Custom error message.",
2492 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2493 "installation_mode": "blocked",
2494 "allowed_types": ["extension"]
2495 },
2496 "uBlock0@raymondhill.net": {
2497 "installation_mode": "force_installed",
2498 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2499 },
2500 "https-everywhere@eff.org": {
2501 "installation_mode": "allowed"
2502 }
2503 }
2504 ```
2505 #### Windows (Intune)
2506 OMA-URI:
2507 ```
2508 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2509 ```
2510 Value (string):
2511 ```
2512 <enabled/>
2513 <data id="ExtensionSettings" value='
2514 {
2515 "*": {
2516 "blocked_install_message": "Custom error message.",
2517 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2518 "installation_mode": "blocked",
2519 "allowed_types": ["extension"]
2520 },
2521 "uBlock0@raymondhill.net": {
2522 "installation_mode": "force_installed",
2523 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2524 },
2525 "https-everywhere@eff.org": {
2526 "installation_mode": "allowed"
2527 }
2528 }'/>
2529 ```
2530 #### macOS
2531 ```
2532 <dict>
2533 <key>ExtensionSettings</key>
2534 <dict>
2535 <key>*</key>
2536 <dict>
2537 <key>blocked_install_message</key>
2538 <string>Custom error message.</string>
2539 <key>install_sources</key>
2540 <array>
2541 <string>about:addons</string>
2542 <string>https://addons.mozilla.org/</string>
2543 </array>
2544 <key>installation_mode</key>
2545 <string>blocked</string>
2546 <key>allowed_types</key>
2547 <array>
2548 <string>extension</string>
2549 </array>
2550 </dict>
2551 <key>uBlock0@raymondhill.net</key>
2552 <dict>
2553 <key>installation_mode</key>
2554 <string>force_installed</string>
2555 <key>install_url</key>
2556 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2557 </dict>
2558 <key>https-everywhere@eff.org</key>
2559 <dict>
2560 <key>installation_mode</key>
2561 <string>allowed</string>
2562 </dict>
2563 </dict>
2564 </dict>
2565 ```
2566 #### policies.json
2567 ```
2568 {
2569 "policies": {
2570 "ExtensionSettings": {
2571 "*": {
2572 "blocked_install_message": "Custom error message.",
2573 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2574 "installation_mode": "blocked",
2575 "allowed_types": ["extension"]
2576 },
2577 "uBlock0@raymondhill.net": {
2578 "installation_mode": "force_installed",
2579 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2580 },
2581 "https-everywhere@eff.org": {
2582 "installation_mode": "allowed"
2583 }
2584 }
2585 }
2586 }
2587 ```
2588 ### ExtensionUpdate
2589 Control extension updates.
2590
2591 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2592 **CCK2 Equivalent:** N/A\
2593 **Preferences Affected:** `extensions.update.enabled`
2594
2595 #### Windows (GPO)
2596 ```
2597 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2598 ```
2599 #### Windows (Intune)
2600 OMA-URI:
2601 ```
2602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2603 ```
2604 Value (string):
2605 ```
2606 <enabled/> or <disabled/>
2607 ```
2608 #### macOS
2609 ```
2610 <dict>
2611 <key>ExtensionUpdate</key>
2612 <true/> | <false/>
2613 </dict>
2614 ```
2615 #### policies.json
2616 ```
2617 {
2618 "policies": {
2619 "ExtensionUpdate": true | false
2620 }
2621 }
2622 ```
2623 ### FirefoxHome
2624 Customize the Firefox Home page.
2625
2626 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4)
2627 **CCK2 Equivalent:** N/A\
2628 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
2629
2630 #### Windows (GPO)
2631 ```
2632 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2633 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2634 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
2635 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2636 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2637 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
2638 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2639 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2640 ```
2641 #### Windows (Intune)
2642 OMA-URI:
2643 ```
2644 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2645 ```
2646 Value (string):
2647 ```
2648 <enabled/>
2649 <data id="FirefoxHome_Search" value="true | false"/>
2650 <data id="FirefoxHome_TopSites" value="true | false"/>
2651 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
2652 <data id="FirefoxHome_Highlights" value="true | false"/>
2653 <data id="FirefoxHome_Pocket" value="true | false"/>
2654 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
2655 <data id="FirefoxHome_Snippets" value="true | false"/>
2656 <data id="FirefoxHome_Locked" value="true | false"/>
2657 ```
2658 #### macOS
2659 ```
2660 <dict>
2661 <key>FirefoxHome</key>
2662 <dict>
2663 <key>Search</key>
2664 <true/> | <false/>
2665 <key>TopSites</key>
2666 <true/> | <false/>
2667 <key>SponsoredTopSites</key>
2668 <true/> | <false/>
2669 <key>Highlights</key>
2670 <true/> | <false/>
2671 <key>Pocket</key>
2672 <true/> | <false/>
2673 <key>SponsoredPocket</key>
2674 <true/> | <false/>
2675 <key>Snippets</key>
2676 <true/> | <false/>
2677 <key>Locked</key>
2678 <true/> | <false/>
2679 </dict>
2680 </dict>
2681 ```
2682 #### policies.json
2683 ```
2684 {
2685 "policies": {
2686 "FirefoxHome": {
2687 "Search": true | false,
2688 "TopSites": true | false,
2689 "SponsoredTopSites": true | false,
2690 "Highlights": true | false,
2691 "Pocket": true | false,
2692 "SponsoredPocket": true | false,
2693 "Snippets": true | false,
2694 "Locked": true | false
2695 }
2696 }
2697 }
2698 ```
2699 ### FlashPlugin (Deprecated)
2700 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2701
2702 `Allow` is a list of origins where Flash are allowed.
2703
2704 `Block` is a list of origins where Flash is not allowed.
2705
2706 `Default` determines whether or not Flash is allowed by default.
2707
2708 `Locked` prevents the user from changing Flash preferences.
2709
2710 **Compatibility:** Firefox 60, Firefox ESR 60\
2711 **CCK2 Equivalent:** `permissions.plugin`\
2712 **Preferences Affected:** `plugin.state.flash`
2713
2714 #### Windows (GPO)
2715 ```
2716 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2717 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2718 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2719 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2720 ```
2721 #### Windows (Intune)
2722 OMA-URI:
2723 ```
2724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2725 ```
2726 Value (string):
2727 ```
2728 <enabled/>
2729 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2730 ```
2731 OMA-URI:
2732 ```
2733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2734 ```
2735 Value (string):
2736 ```
2737 <enabled/> or <disabled/>
2738 ```
2739 OMA-URI:
2740 ```
2741 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2742 ```
2743 Value (string):
2744 ```
2745 <enabled/> or <disabled/>
2746 ```
2747 #### macOS
2748 ```
2749 <dict>
2750 <key>FlashPlugin</key>
2751 <dict>
2752 <key>Allow</key>
2753 <array>
2754 <string>http://example.org</string>
2755 </array>
2756 <key>Block</key>
2757 <array>
2758 <string>http://example.edu</string>
2759 </array>
2760 <key>Default</key>
2761 <true/> | <false/>
2762 <key>Locked</key>
2763 <true/> | <false/>
2764 </dict>
2765 </dict>
2766 ```
2767 #### policies.json
2768 ```
2769 {
2770 "policies": {
2771 "FlashPlugin": {
2772 "Allow": ["http://example.org/"],
2773 "Block": ["http://example.edu/"],
2774 "Default": true | false,
2775 "Locked": true | false
2776 }
2777 }
2778 }
2779 ```
2780 ### Handlers
2781 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2782
2783 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2784
2785 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2786
2787 | Name | Description |
2788 | --- | --- |
2789 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2790 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2791 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2792 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2793 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2794 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2795
2796 **Compatibility:** Firefox 78, Firefox ESR 78\
2797 **CCK2 Equivalent:** N/A\
2798 **Preferences Affected:** N/A
2799
2800 #### Windows (GPO)
2801 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2802 ```
2803 {
2804 "mimeTypes": {
2805 "application/msword": {
2806 "action": "useSystemDefault",
2807 "ask": true | false
2808 }
2809 },
2810 "schemes": {
2811 "mailto": {
2812 "action": "useHelperApp",
2813 "ask": true | false,
2814 "handlers": [{
2815 "name": "Gmail",
2816 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2817 }]
2818 }
2819 },
2820 "extensions": {
2821 "pdf": {
2822 "action": "useHelperApp",
2823 "ask": true | false,
2824 "handlers": [{
2825 "name": "Adobe Acrobat",
2826 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2827 }]
2828 }
2829 }
2830 }
2831 ```
2832 #### Windows (Intune)
2833 OMA-URI:
2834 ```
2835 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2836 ```
2837 Value (string):
2838 ```
2839 <enabled/>
2840 <data id="Handlers" value='
2841 {
2842 "mimeTypes": {
2843 "application/msword": {
2844 "action": "useSystemDefault",
2845 "ask": true | false
2846 }
2847 },
2848 "schemes": {
2849 "mailto": {
2850 "action": "useHelperApp",
2851 "ask": true | false,
2852 "handlers": [{
2853 "name": "Gmail",
2854 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2855 }]
2856 }
2857 },
2858 "extensions": {
2859 "pdf": {
2860 "action": "useHelperApp",
2861 "ask": true | false,
2862 "handlers": [{
2863 "name": "Adobe Acrobat",
2864 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2865 }]
2866 }
2867 }
2868 }
2869 '/>
2870 ```
2871 #### macOS
2872 ```
2873 <dict>
2874 <key>Handlers</key>
2875 <dict>
2876 <key>mimeTypes</key>
2877 <dict>
2878 <key>application/msword</key>
2879 <dict>
2880 <key>action</key>
2881 <string>useSystemDefault</string>
2882 <key>ask</key>
2883 <true/> | <false/>
2884 </dict>
2885 </dict>
2886 <key>schemes</key>
2887 <dict>
2888 <key>mailto</key>
2889 <dict>
2890 <key>action</key>
2891 <string>useHelperApp</string>
2892 <key>ask</key>
2893 <true/> | <false/>
2894 <key>handlers</key>
2895 <array>
2896 <dict>
2897 <key>name</key>
2898 <string>Gmail</string>
2899 <key>uriTemplate</key>
2900 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2901 </dict>
2902 </array>
2903 </dict>
2904 </dict>
2905 <key>extensions</key>
2906 <dict>
2907 <key>pdf</key>
2908 <dict>
2909 <key>action</key>
2910 <string>useHelperApp</string>
2911 <key>ask</key>
2912 <true/> | <false/>
2913 <key>handlers</key>
2914 <array>
2915 <dict>
2916 <key>name</key>
2917 <string>Adobe Acrobat</string>
2918 <key>path</key>
2919 <string>/System/Applications/Preview.app</string>
2920 </dict>
2921 </array>
2922 </dict>
2923 </dict>
2924 </dict>
2925 </dict>
2926 ```
2927 #### policies.json
2928 ```
2929 {
2930 "policies": {
2931 "Handlers": {
2932 "mimeTypes": {
2933 "application/msword": {
2934 "action": "useSystemDefault",
2935 "ask": false
2936 }
2937 },
2938 "schemes": {
2939 "mailto": {
2940 "action": "useHelperApp",
2941 "ask": true | false,
2942 "handlers": [{
2943 "name": "Gmail",
2944 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2945 }]
2946 }
2947 },
2948 "extensions": {
2949 "pdf": {
2950 "action": "useHelperApp",
2951 "ask": true | false,
2952 "handlers": [{
2953 "name": "Adobe Acrobat",
2954 "path": "/usr/bin/acroread"
2955 }]
2956 }
2957 }
2958 }
2959 }
2960 }
2961 ```
2962 ### HardwareAcceleration
2963 Control hardware acceleration.
2964
2965 **Compatibility:** Firefox 60, Firefox ESR 60\
2966 **CCK2 Equivalent:** N/A\
2967 **Preferences Affected:** `layers.acceleration.disabled`
2968
2969 #### Windows (GPO)
2970 ```
2971 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2972 ```
2973 #### Windows (Intune)
2974 OMA-URI:
2975 ```
2976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2977 ```
2978 Value (string):
2979 ```
2980 <enabled/> or <disabled/>
2981 ```
2982 #### macOS
2983 ```
2984 <dict>
2985 <key>HardwareAcceleration</key>
2986 <true/> | <false/>
2987 </dict>
2988 ```
2989 #### policies.json
2990 ```
2991 {
2992 "policies": {
2993 "HardwareAcceleration": true | false
2994 }
2995 }
2996 ```
2997 ### Homepage
2998 Configure the default homepage and how Firefox starts.
2999
3000 `URL` is the default homepage.
3001
3002 `Locked` prevents the user from changing homepage preferences.
3003
3004 `Additional` allows for more than one homepage.
3005
3006 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3007
3008 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3009
3010 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3011 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3012 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3013
3014 #### Windows (GPO)
3015 ```
3016 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3017 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3018 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3019 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3020 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3021 ```
3022 #### Windows (Intune)
3023 OMA-URI:
3024 ```
3025 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3026 ```
3027 Value (string):
3028 ```
3029 <enabled/>
3030
3031 <data id="HomepageURL" value="https://example.com"/>
3032 <data id="HomepageLocked" value="true | false"/>
3033 ```
3034 OMA-URI:
3035 ```
3036 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3037 ```
3038 Value (string):
3039 ```
3040 <enabled/>
3041
3042 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3043 ```
3044 OMA-URI:
3045 ```
3046 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3047 ```
3048 Value (string):
3049 ```
3050 <enabled/>
3051
3052 <data id="StartPage" value="none | homepage | previous-session"/>
3053 ```
3054 #### macOS
3055 ```
3056 <dict>
3057 <key>Homepage</key>
3058 <dict>
3059 <key>URL</key>
3060 <string>http://example.com</string>
3061 <key>Locked</key>
3062 <true/> | <false/>
3063 <key>Additional</key>
3064 <array>
3065 <string>http://example.org</string>
3066 <string>http://example.edu</string>
3067 </array>
3068 <key>StartPage</key>
3069 <string>none | homepage | previous-session | homepage-locked</string>
3070 </dict>
3071 </dict>
3072 ```
3073 #### policies.json
3074 ```
3075 {
3076 "policies": {
3077 "Homepage": {
3078 "URL": "http://example.com/",
3079 "Locked": true | false,
3080 "Additional": ["http://example.org/",
3081 "http://example.edu/"],
3082 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3083 }
3084 }
3085 }
3086 ```
3087 ### InstallAddonsPermission
3088 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3089
3090 `Allow` is a list of origins where extension installs are allowed.
3091
3092 `Default` determines whether or not extension installs are allowed by default.
3093
3094 **Compatibility:** Firefox 60, Firefox ESR 60\
3095 **CCK2 Equivalent:** `permissions.install`\
3096 **Preferences Affected:** `xpinstall.enabled`
3097
3098 #### Windows (GPO)
3099 ```
3100 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3101 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3102 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3103 ```
3104 #### Windows (Intune)
3105 OMA-URI:
3106 ```
3107 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3108 ```
3109 Value (string):
3110 ```
3111 <enabled/>
3112 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3113 ```
3114 OMA-URI:
3115 ```
3116 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3117 ```
3118 Value (string):
3119 ```
3120 <enabled/>
3121 ```
3122 #### macOS
3123 ```
3124 <dict>
3125 <key>InstallAddonsPermission</key>
3126 <dict>
3127 <key>Allow</key>
3128 <array>
3129 <string>http://example.org</string>
3130 <string>http://example.edu</string>
3131 </array>
3132 <key>Default</key>
3133 <true/> | <false/>
3134 </dict>
3135 </dict>
3136 ```
3137 #### policies.json
3138 ```
3139 {
3140 "policies": {
3141 "InstallAddonsPermission": {
3142 "Allow": ["http://example.org/",
3143 "http://example.edu/"],
3144 "Default": true | false
3145 }
3146 }
3147 }
3148 ```
3149 ### LegacyProfiles
3150 Disable the feature enforcing a separate profile for each installation.
3151
3152 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3153
3154 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3155
3156 This policy only work on Windows via GPO (not policies.json).
3157
3158 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3159 **CCK2 Equivalent:** N/A\
3160 **Preferences Affected:** N/A
3161
3162 #### Windows (GPO)
3163 ```
3164 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3165 ```
3166 #### Windows (Intune)
3167 OMA-URI:
3168 ```
3169 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3170 ```
3171 Value (string):
3172 ```
3173 <enabled/> or <disabled/>
3174 ```
3175 ### LocalFileLinks
3176 Enable linking to local files by origin.
3177
3178 **Compatibility:** Firefox 68, Firefox ESR 68\
3179 **CCK2 Equivalent:** N/A\
3180 **Preferences Affected:** `capability.policy.localfilelinks.*`
3181
3182 #### Windows (GPO)
3183 ```
3184 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3185 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3186 ```
3187 #### Windows (Intune)
3188 OMA-URI:
3189 ```
3190 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3191 ```
3192 Value (string):
3193 ```
3194 <enabled/>
3195 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3196 ```
3197 #### macOS
3198 ```
3199 <dict>
3200 <key>LocalFileLinks</key>
3201 <array>
3202 <string>http://example.org</string>
3203 <string>http://example.edu</string>
3204 </array>
3205 </dict>
3206 ```
3207 #### policies.json
3208 ```
3209 {
3210 "policies": {
3211 "LocalFileLinks": ["http://example.org/",
3212 "http://example.edu/"]
3213 }
3214 }
3215 ```
3216 ### ManagedBookmarks
3217 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3218
3219 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3220
3221 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3222 ```
3223 {
3224 "items": {
3225 "id": "BookmarkType",
3226 "properties": {
3227 "children": {
3228 "items": {
3229 "$ref": "BookmarkType"
3230 },
3231 "type": "array"
3232 },
3233 "name": {
3234 "type": "string"
3235 },
3236 "toplevel_name": {
3237 "type": "string"
3238 },
3239 "url": {
3240 "type": "string"
3241 }
3242 },
3243 "type": "object"
3244 },
3245 "type": "array"
3246 }
3247 ```
3248 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3249 **CCK2 Equivalent:** N/A\
3250 **Preferences Affected:** N/A
3251
3252 #### Windows (GPO)
3253 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3254 ```
3255 [
3256 {
3257 "toplevel_name": "My managed bookmarks folder"
3258 },
3259 {
3260 "url": "example.com",
3261 "name": "Example"
3262 },
3263 {
3264 "name": "Mozilla links",
3265 "children": [
3266 {
3267 "url": "https://mozilla.org",
3268 "name": "Mozilla.org"
3269 },
3270 {
3271 "url": "https://support.mozilla.org/",
3272 "name": "SUMO"
3273 }
3274 ]
3275 }
3276 ]
3277 ```
3278 #### Windows (Intune)
3279 OMA-URI:
3280 ```
3281 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3282 ```
3283 Value (string):
3284 ```
3285 <enabled/>
3286 <data id="JSON" value='
3287 [
3288 {
3289 "toplevel_name": "My managed bookmarks folder"
3290 },
3291 {
3292 "url": "example.com",
3293 "name": "Example"
3294 },
3295 {
3296 "name": "Mozilla links",
3297 "children": [
3298 {
3299 "url": "https://mozilla.org",
3300 "name": "Mozilla.org"
3301 },
3302 {
3303 "url": "https://support.mozilla.org/",
3304 "name": "SUMO"
3305 }
3306 ]
3307 }
3308 ]'/>
3309 ```
3310 #### macOS
3311 ```
3312 <dict>
3313 <key>ManagedBookmarks</key>
3314 <array>
3315 <dict>
3316 <key>toplevel_name</key>
3317 <string>My managed bookmarks folder</string>
3318 <dict>
3319 <key>url</key>
3320 <string>example.com</string>
3321 <key>name</key>
3322 <string>Example</string>
3323 </dict>
3324 <dict>
3325 <key>name</key>
3326 <string>Mozilla links</string>
3327 <key>children</key>
3328 <array>
3329 <dict>
3330 <key>url</key>
3331 <string>https://mozilla.org</string>
3332 <key>name</key>
3333 <string>Mozilla</string>
3334 </dict>
3335 <dict>
3336 <key>url</key>
3337 <string>https://support.mozilla.org/</string>
3338 <key>name</key>
3339 <string>SUMO</string>
3340 </dict>
3341 </array>
3342 </dict>
3343 </array>
3344 </dict>
3345 ```
3346 #### policies.json
3347 ```
3348 {
3349 "policies": {
3350 "ManagedBookmarks": [
3351 {
3352 "toplevel_name": "My managed bookmarks folder"
3353 },
3354 {
3355 "url": "example.com",
3356 "name": "Example"
3357 },
3358 {
3359 "name": "Mozilla links",
3360 "children": [
3361 {
3362 "url": "https://mozilla.org",
3363 "name": "Mozilla.org"
3364 },
3365 {
3366 "url": "https://support.mozilla.org/",
3367 "name": "SUMO"
3368 }
3369 ]
3370 }
3371 ]
3372 }
3373 }
3374 ```
3375 ### ManualAppUpdateOnly
3376
3377 Switch to manual updates only.
3378
3379 If this policy is enabled:
3380 1. The user will never be prompted to install updates
3381 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3382 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3383
3384 This policy is primarily intended for advanced end users, not for enterprises.
3385
3386 **Compatibility:** Firefox 87\
3387 **CCK2 Equivalent:** N/A\
3388 **Preferences Affected:** N/A
3389
3390 #### policies.json
3391 ```
3392 {
3393 "policies": {
3394 "ManualAppUpdateOnly": true | false
3395 }
3396 }
3397 ```
3398 ### NetworkPrediction
3399 Enable or disable network prediction (DNS prefetching).
3400
3401 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3402 **CCK2 Equivalent:** N/A\
3403 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3404
3405 #### Windows (GPO)
3406 ```
3407 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3408 ```
3409 #### Windows (Intune)
3410 OMA-URI:
3411 ```
3412 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3413 ```
3414 Value (string):
3415 ```
3416 <enabled/> or <disabled/>
3417 ```
3418 #### macOS
3419 ```
3420 <dict>
3421 <key>NetworkPrediction</key>
3422 <true/> | <false/>
3423 </dict>
3424 ```
3425 #### policies.json
3426 ```
3427 {
3428 "policies": {
3429 "NetworkPrediction": true | false
3430 }
3431 ```
3432 ### NewTabPage
3433 Enable or disable the New Tab page.
3434
3435 **Compatibility:** Firefox 68, Firefox ESR 68\
3436 **CCK2 Equivalent:** N/A\
3437 **Preferences Affected:** `browser.newtabpage.enabled`
3438
3439 #### Windows (GPO)
3440 ```
3441 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3442 ```
3443 #### Windows (Intune)
3444 OMA-URI:
3445 ```
3446 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3447 ```
3448 Value (string):
3449 ```
3450 <enabled/> or <disabled/>
3451 ```
3452 #### macOS
3453 ```
3454 <dict>
3455 <key>NewTabPage</key>
3456 <true/> | <false/>
3457 </dict>
3458 ```
3459 #### policies.json
3460 ```
3461 {
3462 "policies": {
3463 "NewTabPage": true | false
3464 }
3465 ```
3466 ### NoDefaultBookmarks
3467 Disable the creation of default bookmarks.
3468
3469 This policy is only effective if the user profile has not been created yet.
3470
3471 **Compatibility:** Firefox 60, Firefox ESR 60\
3472 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3473 **Preferences Affected:** N/A
3474
3475 #### Windows (GPO)
3476 ```
3477 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3478 ```
3479 #### Windows (Intune)
3480 OMA-URI:
3481 ```
3482 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3483 ```
3484 Value (string):
3485 ```
3486 <enabled/> or <disabled/>
3487 ```
3488 #### macOS
3489 ```
3490 <dict>
3491 <key>NoDefaultBookmarks</key>
3492 <true/> | <false/>
3493 </dict>
3494 ```
3495 #### policies.json
3496 ```
3497 {
3498 "policies": {
3499 "NoDefaultBookmarks": true | false
3500 }
3501 }
3502 ```
3503 ### OfferToSaveLogins
3504 Control whether or not Firefox offers to save passwords.
3505
3506 **Compatibility:** Firefox 60, Firefox ESR 60\
3507 **CCK2 Equivalent:** `dontRememberPasswords`\
3508 **Preferences Affected:** `signon.rememberSignons`
3509
3510 #### Windows (GPO)
3511 ```
3512 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3513 ```
3514 #### Windows (Intune)
3515 OMA-URI:
3516 ```
3517 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3518 ```
3519 Value (string):
3520 ```
3521 <enabled/> or <disabled/>
3522 ```
3523 #### macOS
3524 ```
3525 <dict>
3526 <key>OfferToSaveLogins</key>
3527 <true/> | <false/>
3528 </dict>
3529 ```
3530 #### policies.json
3531 ```
3532 {
3533 "policies": {
3534 "OfferToSaveLogins": true | false
3535 }
3536 }
3537 ```
3538 ### OfferToSaveLoginsDefault
3539 Sets the default value of signon.rememberSignons without locking it.
3540
3541 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3542 **CCK2 Equivalent:** `dontRememberPasswords`\
3543 **Preferences Affected:** `signon.rememberSignons`
3544
3545 #### Windows (GPO)
3546 ```
3547 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3548 ```
3549 #### Windows (Intune)
3550 OMA-URI:
3551 ```
3552 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3553 ```
3554 Value (string):
3555 ```
3556 <enabled/> or <disabled/>
3557 ```
3558 #### macOS
3559 ```
3560 <dict>
3561 <key>OfferToSaveLoginsDefault</key>
3562 <true/> | <false/>
3563 </dict>
3564 ```
3565 #### policies.json
3566 ```
3567 {
3568 "policies": {
3569 "OfferToSaveLoginsDefault": true | false
3570 }
3571 }
3572 ```
3573 ### OverrideFirstRunPage
3574 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3575
3576 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3577
3578 **Compatibility:** Firefox 60, Firefox ESR 60\
3579 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3580 **Preferences Affected:** `startup.homepage_welcome_url`
3581
3582 #### Windows (GPO)
3583 ```
3584 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3585 ```
3586 #### Windows (Intune)
3587 OMA-URI:
3588 ```
3589 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3590 ```
3591 Value (string):
3592 ```
3593 <enabled/>
3594 <data id="OverridePage" value="https://example.com"/>
3595 ```
3596 #### macOS
3597 ```
3598 <dict>
3599 <key>OverrideFirstRunPage</key>
3600 <string>http://example.org</string>
3601 </dict>
3602 ```
3603 #### policies.json
3604 ```
3605 {
3606 "policies": {
3607 "OverrideFirstRunPage": "http://example.org"
3608 }
3609 }
3610 ```
3611 ### OverridePostUpdatePage
3612 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3613
3614 **Compatibility:** Firefox 60, Firefox ESR 60\
3615 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3616 **Preferences Affected:** `startup.homepage_override_url`
3617
3618 #### Windows (GPO)
3619 ```
3620 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3621 ```
3622 #### Windows (Intune)
3623 OMA-URI:
3624 ```
3625 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3626 ```
3627 Value (string):
3628 ```
3629 <enabled/>
3630 <data id="OverridePage" value="https://example.com"/>
3631 ```
3632 #### macOS
3633 ```
3634 <dict>
3635 <key>OverridePostUpdatePage</key>
3636 <string>http://example.org</string>
3637 </dict>
3638 ```
3639 #### policies.json
3640 ```
3641 {
3642 "policies": {
3643 "OverridePostUpdatePage": "http://example.org"
3644 }
3645 }
3646 ```
3647 ### PasswordManagerEnabled
3648 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3649
3650 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3651 **CCK2 Equivalent:** N/A\
3652 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3653
3654 #### Windows (GPO)
3655 ```
3656 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3657 ```
3658 #### Windows (Intune)
3659 OMA-URI:
3660 ```
3661 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3662 ```
3663 Value (string):
3664 ```
3665 <enabled/> or <disabled/>
3666 ```
3667 #### macOS
3668 ```
3669 <dict>
3670 <key>PasswordManagerEnabled</key>
3671 <true/> | <false/>
3672 </dict>
3673 ```
3674 #### policies.json
3675 ```
3676 {
3677 "policies": {
3678 "PasswordManagerEnabled": true | false
3679 }
3680 }
3681 ```
3682 ### PDFjs
3683 Disable or configure PDF.js, the built-in PDF viewer.
3684
3685 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3686
3687 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3688
3689 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3690
3691 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3692 **CCK2 Equivalent:** N/A\
3693 **Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions`
3694
3695 #### Windows (GPO)
3696 ```
3697 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3698 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3699 ```
3700 #### Windows (Intune)
3701 OMA-URI:
3702 ```
3703 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3704 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3705 ```
3706 Value (string):
3707 ```
3708 <enabled/>or <disabled/>
3709 ```
3710 #### macOS
3711 ```
3712 <dict>
3713 <key>PDFjs</key>
3714 <dict>
3715 <key>Enabled</key>
3716 <true/> | <false/>
3717 <key>EnablePermissions</key>
3718 <true/> | <false/>
3719 </dict>
3720 </dict>
3721 ```
3722 #### policies.json
3723 ```
3724 {
3725 "policies": {
3726 "PDFjs": {
3727 "Enabled": true | false,
3728 "EnablePermissions": true | false
3729 }
3730 }
3731 }
3732 ```
3733 ### Permissions
3734 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3735
3736 `Allow` is a list of origins where the feature is allowed.
3737
3738 `Block` is a list of origins where the feature is not allowed.
3739
3740 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3741
3742 `Locked` prevents the user from changing preferences for the feature.
3743
3744 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3745
3746 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3747 **CCK2 Equivalent:** N/A\
3748 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
3749
3750 #### Windows (GPO)
3751 ```
3752 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3753 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3754 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3755 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3756 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3757 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3758 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3759 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3760 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3761 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3762 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3763 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3764 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3765 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3766 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3767 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3768 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3769 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3770 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3771 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3772 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3773 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3774 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3775 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3776 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3777 ```
3778 #### Windows (Intune)
3779 OMA-URI:
3780 ```
3781 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3782 ```
3783 Value (string):
3784 ```
3785 <enabled/> or <disabled/>
3786 ```
3787 OMA-URI:
3788 ```
3789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3790 ```
3791 Value (string):
3792 ```
3793 <enabled/> or <disabled/>
3794 ```
3795 OMA-URI:
3796 ```
3797 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3798 ```
3799 Value (string):
3800 ```
3801 <enabled/>
3802 <data id="Permissions" value="1&#xF000;https://example.org"/>
3803 ```
3804 OMA-URI:
3805 ```
3806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3807 ```
3808 Value (string):
3809 ```
3810 <enabled/> or <disabled/>
3811 ```
3812 OMA-URI:
3813 ```
3814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3815 ```
3816 Value (string):
3817 ```
3818 <enabled/> or <disabled/>
3819 ```
3820 OMA-URI:
3821 ```
3822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3823 ```
3824 Value (string):
3825 ```
3826 <enabled/>
3827 <data id="Permissions" value="1&#xF000;https://example.org"/>
3828 ```
3829 OMA-URI:
3830 ```
3831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3832 ```
3833 Value (string):
3834 ```
3835 <enabled/>
3836 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3837 ```
3838 OMA-URI:
3839 ```
3840 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3841 ```
3842 Value (string):
3843 ```
3844 <enabled/>
3845 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3846 ```
3847 OMA-URI:
3848 ```
3849 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3850 ```
3851 Value (string):
3852 ```
3853 <enabled/> or <disabled/>
3854 ```
3855 OMA-URI:
3856 ```
3857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
3858 ```
3859 Value (string):
3860 ```
3861 <enabled/>
3862 <data id="Permissions" value="1&#xF000;https://example.org"/>
3863 ```
3864 OMA-URI:
3865 ```
3866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
3867 ```
3868 Value (string):
3869 ```
3870 <enabled/>
3871 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3872 ```
3873 OMA-URI:
3874 ```
3875 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
3876 ```
3877 Value (string):
3878 ```
3879 <enabled/> or <disabled/>
3880 ```
3881 OMA-URI:
3882 ```
3883 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
3884 ```
3885 Value (string):
3886 ```
3887 <enabled/> or <disabled/>
3888 ```
3889 #### macOS
3890 ```
3891 <dict>
3892 <key>Permissions</key>
3893 <dict>
3894 <key>Camera</key>
3895 <dict>
3896 <key>Allow</key>
3897 <array>
3898 <string>https://example.org</string>
3899 <string>https://example.org:1234</string>
3900 </array>
3901 <key>Block</key>
3902 <array>
3903 <string>https://example.edu</string>
3904 </array>
3905 <key>BlockNewRequests</key>
3906 <true/> | <false/>
3907 <key>Locked</key>
3908 <true/> | <false/>
3909 </dict>
3910 <key>Microphone</key>
3911 <dict>
3912 <key>Allow</key>
3913 <array>
3914 <string>https://example.org</string>
3915 </array>
3916 <key>Block</key>
3917 <array>
3918 <string>https://example.edu</string>
3919 </array>
3920 <key>BlockNewRequests</key>
3921 <true/> | <false/>
3922 <key>Locked</key>
3923 <true/> | <false/>
3924 </dict>
3925 <key>Location</key>
3926 <dict>
3927 <key>Allow</key>
3928 <array>
3929 <string>https://example.org</string>
3930 </array>
3931 <key>Block</key>
3932 <array>
3933 <string>https://example.edu</string>
3934 </array>
3935 <key>BlockNewRequests</key>
3936 <true/> | <false/>
3937 <key>Locked</key>
3938 <true/> | <false/>
3939 </dict>
3940 <key>Notifications</key>
3941 <dict>
3942 <key>Allow</key>
3943 <array>
3944 <string>https://example.org</string>
3945 </array>
3946 <key>Block</key>
3947 <array>
3948 <string>https://example.edu</string>
3949 </array>
3950 <key>BlockNewRequests</key>
3951 <true/>
3952 <key>Locked</key>
3953 <true/>
3954 </dict>
3955 <key>Autoplay</key>
3956 <dict>
3957 <key>Allow</key>
3958 <array>
3959 <string>https://example.org</string>
3960 </array>
3961 <key>Block</key>
3962 <array>
3963 <string>https://example.edu</string>
3964 </array>
3965 <key>Default</key>
3966 <string>allow-audio-video | block-audio | block-audio-video</string>
3967 <key>Locked</key>
3968 <true/> | <false/>
3969 </dict>
3970 </dict>
3971 </dict>
3972 ```
3973 #### policies.json
3974 ```
3975 {
3976 "policies": {
3977 "Permissions": {
3978 "Camera": {
3979 "Allow": ["https://example.org","https://example.org:1234"],
3980 "Block": ["https://example.edu"],
3981 "BlockNewRequests": true | false,
3982 "Locked": true | false
3983 },
3984 "Microphone": {
3985 "Allow": ["https://example.org"],
3986 "Block": ["https://example.edu"],
3987 "BlockNewRequests": true | false,
3988 "Locked": true | false
3989 },
3990 "Location": {
3991 "Allow": ["https://example.org"],
3992 "Block": ["https://example.edu"],
3993 "BlockNewRequests": true | false,
3994 "Locked": true | false
3995 },
3996 "Notifications": {
3997 "Allow": ["https://example.org"],
3998 "Block": ["https://example.edu"],
3999 "BlockNewRequests": true | false,
4000 "Locked": true | false
4001 },
4002 "Autoplay": {
4003 "Allow": ["https://example.org"],
4004 "Block": ["https://example.edu"],
4005 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4006 "Locked": true | false
4007 }
4008 }
4009 }
4010 }
4011 ```
4012 ### PictureInPicture
4013
4014 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4015
4016 **Compatibility:** Firefox 78, Firefox ESR 78\
4017 **CCK2 Equivalent:** N/A\
4018 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4019
4020 #### Windows (GPO)
4021 ```
4022 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4023 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4024
4025 ```
4026 #### Windows (Intune)
4027 OMA-URI:
4028 ```
4029 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4030 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4031 ```
4032 Value (string):
4033 ```
4034 <enabled/> or <disabled/>
4035 ```
4036 #### macOS
4037 ```
4038 <dict>
4039 <key>PictureInPicture</key>
4040 <dict>
4041 <key>Enabled</key>
4042 <true/> | <false/>
4043 <key>Locked</key>
4044 <true/> | <false/>
4045 </dict>
4046 </dict>
4047 ```
4048 #### policies.json
4049 ```
4050 {
4051 "policies": {
4052 "PictureInPicture": {
4053 "Enabled": true | false,
4054 "Locked": true | false
4055 }
4056 }
4057 }
4058 ```
4059 ### PopupBlocking
4060 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4061
4062 `Allow` is a list of origins where popup-windows are allowed.
4063
4064 `Default` determines whether or not pop-up windows are allowed by default.
4065
4066 `Locked` prevents the user from changing pop-up preferences.
4067
4068 **Compatibility:** Firefox 60, Firefox ESR 60\
4069 **CCK2 Equivalent:** `permissions.popup`\
4070 **Preferences Affected:** `dom.disable_open_during_load`
4071
4072 #### Windows (GPO)
4073 ```
4074 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4075 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4076 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4077 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4078 ```
4079 #### Windows (Intune)
4080 OMA-URI:
4081 ```
4082 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4083 ```
4084 Value (string):
4085 ```
4086 <enabled/>
4087 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4088 ```
4089 OMA-URI:
4090 ```
4091 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4092 ```
4093 Value (string):
4094 ```
4095 <enabled/> or <disabled/>
4096 ```
4097 OMA-URI:
4098 ```
4099 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4100 ```
4101 Value (string):
4102 ```
4103 <enabled/> or <disabled/>
4104 ```
4105 #### macOS
4106 ```
4107 <dict>
4108 <key>PopupBlocking</key>
4109 <dict>
4110 <key>Allow</key>
4111 <array>
4112 <string>http://example.org</string>
4113 <string>http://example.edu</string>
4114 </array>
4115 <key>Default</key>
4116 <true/> | <false/>
4117 <key>Locked</key>
4118 <true/> | <false/>
4119 </dict>
4120 </dict>
4121 ```
4122 #### policies.json
4123 ```
4124 {
4125 "policies": {
4126 "PopupBlocking": {
4127 "Allow": ["http://example.org/",
4128 "http://example.edu/"],
4129 "Default": true | false,
4130 "Locked": true | false
4131 }
4132 }
4133 }
4134 ```
4135 ### Preferences
4136 Set and lock preferences.
4137
4138 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4139
4140 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4141
4142 Preferences that start with the following prefixes are supported:
4143 ```
4144 accessibility.
4145 app.update.* (Firefox 86, Firefox 78.8)
4146 browser.
4147 datareporting.policy.
4148 dom.
4149 extensions.
4150 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4151 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4152 geo.
4153 gfx.
4154 intl.
4155 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4156 layers.
4157 layout.
4158 media.
4159 network.
4160 pdfjs. (Firefox 84, Firefox ESR 78.6)
4161 places.
4162 print.
4163 signon. (Firefox 83, Firefox ESR 78.5)
4164 spellchecker. (Firefox 84, Firefox ESR 78.6)
4165 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4166 ui.
4167 widget.
4168 ```
4169 as well as the following security preferences:
4170 | Preference | Type | Default
4171 | --- | --- | ---
4172 | security.default_personal_cert | string | Ask Every Time
4173 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4174 | security.insecure_connection_text.enabled | bool | false
4175 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4176 | security.insecure_connection_text.pbmode.enabled | bool | false
4177 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4178 | security.insecure_field_warning.contextual.enabled | bool | true
4179 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4180 | security.mixed_content.block_active_content | boolean | true
4181 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4182 | security.osclientcerts.autoload | boolean | false
4183 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4184 | security.ssl.errorReporting.enabled | boolean | true
4185 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4186 | security.tls.enable_0rtt_data | boolean | true
4187 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15).
4188 | security.tls.hello_downgrade_check | boolean | true
4189 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4190 | security.tls.version.enable-deprecated | boolean | false
4191 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8).
4192 | security.warn_submit_secure_to_insecure | boolean | true
4193 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting s form from https to http.
4194 &nbsp;
4195
4196 Using the preference as the key, set the `Value` to the corresponding preference value.
4197
4198 `Status` can be "default", "locked", "user" or "clear"
4199
4200 Default preferences can be modified by the user.
4201
4202 If a value is locked, it is also set as the default.
4203
4204 User preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy.
4205
4206 User preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4207
4208 See the examples below for more detail.
4209
4210 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4211
4212 Status
4213 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4214 **CCK2 Equivalent:** `preferences`\
4215 **Preferences Affected:** Many
4216
4217 #### Windows (GPO)
4218 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4219 ```
4220 {
4221 "accessibility.force_disabled": {
4222 "Value": 1,
4223 "Status": "default"
4224 },
4225 "browser.cache.disk.parent_directory": {
4226 "Value": "SOME_NATIVE_PATH",
4227 "Status": "user"
4228 },
4229 "browser.tabs.warnOnClose": {
4230 "Value": false,
4231 "Status": "locked"
4232 }
4233 }
4234 ```
4235 #### Windows (Intune)
4236 OMA-URI:
4237 ```
4238 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4239 ```
4240 Value (string):
4241 ```
4242 <enabled/>
4243 <data id="JSON" value='
4244 {
4245 "accessibility.force_disabled": {
4246 "Value": 1,
4247 "Status": "default"
4248 },
4249 "browser.cache.disk.parent_directory": {
4250 "Value": "SOME_NATIVE_PATH",
4251 "Status": "user"
4252 },
4253 "browser.tabs.warnOnClose": {
4254 "Value": false,
4255 "Status": "locked"
4256 }
4257 }'/>
4258 ```
4259 #### macOS
4260 ```
4261 <dict>
4262 <key>Preferences</key>
4263 <dict>
4264 <key>accessibility.force_disabled</key>
4265 <dict>
4266 <key>Value</key>
4267 <integer>1</integer>
4268 <key>Status</key>
4269 <string>default</string>
4270 </dict>
4271 <key>browser.cache.disk.parent_directory</key>
4272 <dict>
4273 <key>Value</key>
4274 <string>SOME_NATIVE_PATH</string>
4275 <key>Status</key>
4276 <string>user</string>
4277 </dict>
4278 <key>browser.tabs.warnOnClose</key>
4279 <dict>
4280 <key>Value</key>
4281 <false/>
4282 <key>Status</key>
4283 <string>locked</string>
4284 </dict>
4285 </dict>
4286 </dict>
4287 ```
4288 #### policies.json
4289 ```
4290 {
4291 "policies": {
4292 "Preferences": {
4293 "accessibility.force_disabled": {
4294 "Value": 1,
4295 "Status": "default"
4296 },
4297 "browser.cache.disk.parent_directory": {
4298 "Value": "SOME_NATIVE_PATH",
4299 "Status": "user"
4300 },
4301 "browser.tabs.warnOnClose": {
4302 "Value": false,
4303 "Status": "locked"
4304 }
4305 }
4306 }
4307 }
4308 ```
4309 ### Preferences (Deprecated)
4310 Set and lock certain preferences.
4311
4312 **Compatibility:** See below\
4313 **CCK2 Equivalent:** `preferences`\
4314 **Preferences Affected:** See below
4315
4316 | Preference | Type | Compatibility | Default
4317 | --- | --- | --- | ---
4318 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4319 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4320 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4321 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4322 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4323 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4324 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4325 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4326 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4327 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4328 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4329 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4330 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4331 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4332 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4333 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4334 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4335 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4336 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4337 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4338 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4339 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4340 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4341 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4342 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4343 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4344 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4345 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4346 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4347 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4348 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4349 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4350 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4351 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4352 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4353 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4354 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4355 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4356 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4357 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4358 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4359 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4360 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4361 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4362 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4363 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4364 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4365 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4366 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4367 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4368 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4369 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4370 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4371 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4372 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4373 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4374 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4376 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4377 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4378 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4379 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4380 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4381 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4382 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4383 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4384 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4385 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4386 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4387 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4388 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4389 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4390 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4391 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4392 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4393 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4394 disabled
4395 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4396 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4397 disabled
4398 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4399 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4400 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4401 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4402 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4403 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4404 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4405 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4406 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4407 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4408 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4409 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4410 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4411 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4412 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4413 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4414 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4415 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4416 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4417 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4418 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4419 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4420 #### Windows (GPO)
4421 ```
4422 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4423 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4424 ```
4425 #### Windows (Intune)
4426 OMA-URI: (periods are replaced by underscores)
4427 ```
4428 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4429 ```
4430 Value (string):
4431 ```
4432 <enabled/> or <disabled/>
4433 ```
4434 OMA-URI: (periods are replaced by underscores)
4435 ```
4436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4437 ```
4438 Value (string):
4439 ```
4440 <enabled/>
4441 <data id="Preferences_String" value="string_value"/>
4442 ```
4443 #### macOS
4444 ```
4445 <dict>
4446 <key>Preferences</key>
4447 <dict>
4448 <key>boolean_preference_name</key>
4449 <true/> | <false/>
4450 <key>string_preference_name</key>
4451 <string>string_value</string>
4452 </dict>
4453 </dict>
4454 ```
4455 #### policies.json
4456 ```
4457 {
4458 "policies": {
4459 "Preferences": {
4460 "boolean_preference_name": true | false,
4461 "string_preference_name": "string_value"
4462 }
4463 }
4464 }
4465 ```
4466 ### PrimaryPassword
4467 Require or prevent using a primary (formerly master) password.
4468
4469 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4470
4471 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4472
4473 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4474 **CCK2 Equivalent:** `noMasterPassword`\
4475 **Preferences Affected:** N/A
4476
4477 #### Windows (GPO)
4478 ```
4479 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4480 ```
4481 #### Windows (Intune)
4482 OMA-URI:
4483 ```
4484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4485 ```
4486 Value (string):
4487 ```
4488 <enabled/> or <disabled/>
4489 ```
4490 #### macOS
4491 ```
4492 <dict>
4493 <key>PrimaryPassword</key>
4494 <true/> | <false/>
4495 </dict>
4496 ```
4497 #### policies.json
4498 ```
4499 {
4500 "policies": {
4501 "PrimaryPassword": true | false
4502 }
4503 }
4504 ```
4505 ### PromptForDownloadLocation
4506 Ask where to save each file before downloading.
4507
4508 **Compatibility:** Firefox 68, Firefox ESR 68\
4509 **CCK2 Equivalent:** N/A\
4510 **Preferences Affected:** `browser.download.useDownloadDir`
4511
4512 #### Windows (GPO)
4513 ```
4514 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4515 ```
4516 #### Windows (Intune)
4517 OMA-URI:
4518 ```
4519 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4520 ```
4521 Value (string):
4522 ```
4523 <enabled/> or <disabled/>
4524 ```
4525 #### macOS
4526 ```
4527 <dict>
4528 <key>PromptForDownloadLocation</key>
4529 <true/> | <false/>
4530 </dict>
4531 ```
4532 #### policies.json
4533 ```
4534 {
4535 "policies": {
4536 "PromptForDownloadLocation": true | false
4537 }
4538 }
4539 ```
4540 ### Proxy
4541 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4542 To specify ports, append them to the hostnames with a colon (:).
4543
4544 `Mode` is the proxy method being used.
4545
4546 `Locked` is whether or not proxy settings can be changed.
4547
4548 `HTTPProxy` is the HTTP proxy server.
4549
4550 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4551
4552 `SSLProxy` is the SSL proxy server.
4553
4554 `FTPProxy` is the FTP proxy server.
4555
4556 `SOCKSProxy` is the SOCKS proxy server
4557
4558 `SOCKSVersion` is the SOCKS version (4 or 5)
4559
4560 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4561
4562 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4563
4564 `AutoLogin` means do not prompt for authentication if password is saved.
4565
4566 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4567
4568 **Compatibility:** Firefox 60, Firefox ESR 60\
4569 **CCK2 Equivalent:** `networkProxy*`\
4570 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
4571
4572 #### Windows (GPO)
4573 ```
4574 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4575 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4576 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4577 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4578 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4579 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4580 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4581 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4582 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4583 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4584 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4585 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4586 ```
4587 #### Windows (Intune)
4588 OMA-URI:
4589 ```
4590 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4591 ```
4592 Value (string):
4593 ```
4594 <enabled/>
4595 <data id="ProxyLocked" value="true | false"/>
4596 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4597 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4598 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4599 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4600 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4601 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4602 <data id="SOCKSVersion" value="4 | 5"/>
4603 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4604 <data id="Passthrough" value="<local>"/>
4605 <data id="AutoLogin" value="true | false"/>
4606 <data id="UseProxyForDNS" value="true | false"/>
4607 ```
4608 #### macOS
4609 ```
4610 <dict>
4611 <key>Proxy</key>
4612 <dict>
4613 <key>Mode</key>
4614 <string>none | system | manual | autoDetect | autoConfig</string>
4615 <key>Locked</key>
4616 <true> | </false>
4617 <key>HTTPProxy</key>
4618 <string>https://httpproxy.example.com</string>
4619 <key>UseHTTPProxyForAllProtocols</key>
4620 <true> | </false>
4621 <key>SSLProxy</key>
4622 <string>https://sslproxy.example.com</string>
4623 <key>FTPProxy</key>
4624 <string>https://ftpproxy.example.com</string>
4625 <key>SOCKSProxy</key>
4626 <string>https://socksproxy.example.com</string>
4627 <key>SOCKSVersion</key>
4628 <string>4 | 5</string>
4629 <key>Passthrough</key>
4630 <string>&lt;local>&gt;</string>
4631 <key>AutoConfigURL</key>
4632 <string>URL_TO_AUTOCONFIG</string>
4633 <key>AutoLogin</key>
4634 <true> | </false>
4635 <key>UseProxyForDNS</key>
4636 <true> | </false>
4637 </dict>
4638 </dict>
4639 ```
4640 #### policies.json
4641 ```
4642 {
4643 "policies": {
4644 "Proxy": {
4645 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4646 "Locked": true | false,
4647 "HTTPProxy": "hostname",
4648 "UseHTTPProxyForAllProtocols": true | false,
4649 "SSLProxy": "hostname",
4650 "FTPProxy": "hostname",
4651 "SOCKSProxy": "hostname",
4652 "SOCKSVersion": 4 | 5,
4653 "Passthrough": "<local>",
4654 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4655 "AutoLogin": true | false,
4656 "UseProxyForDNS": true | false
4657 }
4658 }
4659 }
4660 ```
4661 ### RequestedLocales
4662 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4663
4664 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4665
4666 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4667 **CCK2 Equivalent:** N/A\
4668 **Preferences Affected:** N/A
4669 #### Windows (GPO)
4670 ```
4671 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4672 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4673
4674 or
4675
4676 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4677 ```
4678 #### Windows (Intune)
4679 OMA-URI:
4680 ```
4681 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4682 ```
4683 Value (string):
4684 ```
4685 <enabled/>
4686 <data id="Preferences_String" value="de,en-US"/>
4687 ```
4688 #### macOS
4689 ```
4690 <dict>
4691 <key>RequestedLocales</key>
4692 <array>
4693 <string>de</string>
4694 <string>en-US</string>
4695 </array>
4696 </dict>
4697
4698 or
4699
4700 <dict>
4701 <key>RequestedLocales</key>
4702 <string>de,en-US</string>
4703 </dict>
4704
4705 ```
4706 #### policies.json
4707 ```
4708 {
4709 "policies": {
4710 "RequestedLocales": ["de", "en-US"]
4711 }
4712 }
4713
4714 or
4715
4716 {
4717 "policies": {
4718 "RequestedLocales": "de,en-US"
4719 }
4720 }
4721 ```
4722 <a name="SanitizeOnShutdown"></a>
4723
4724 ### SanitizeOnShutdown (Selective)
4725 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4726
4727 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4728
4729 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4730 **CCK2 Equivalent:** N/A\
4731 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
4732 #### Windows (GPO)
4733 ```
4734 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4735 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4736 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4737 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4738 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4739 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4740 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4741 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4742 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4743 ```
4744 #### Windows (Intune)
4745 OMA-URI:
4746 ```
4747 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4748 ```
4749 Value (string):
4750 ```
4751 <enabled/> or <disabled/>
4752 ```
4753 OMA-URI:
4754 ```
4755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4756 ```
4757 Value (string):
4758 ```
4759 <enabled/> or <disabled/>
4760 ```
4761 OMA-URI:
4762 ```
4763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4764 ```
4765 Value (string):
4766 ```
4767 <enabled/> or <disabled/>
4768 ```
4769 OMA-URI:
4770 ```
4771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4772 ```
4773 Value (string):
4774 ```
4775 <enabled/> or <disabled/>
4776 ```
4777 OMA-URI:
4778 ```
4779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4780 ```
4781 Value (string):
4782 ```
4783 <enabled/> or <disabled/>
4784 ```
4785 OMA-URI:
4786 ```
4787 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4788 ```
4789 Value (string):
4790 ```
4791 <enabled/> or <disabled/>
4792 ```
4793 OMA-URI:
4794 ```
4795 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4796 ```
4797 Value (string):
4798 ```
4799 <enabled/> or <disabled/>
4800 ```
4801 OMA-URI:
4802 ```
4803 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4804 ```
4805 Value (string):
4806 ```
4807 <enabled/> or <disabled/>
4808 ```
4809 OMA-URI:
4810 ```
4811 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4812 ```
4813 Value (string):
4814 ```
4815 <enabled/> or <disabled/>
4816 ```
4817 #### macOS
4818 ```
4819 <dict>
4820 <key>SanitizeOnShutdown</key>
4821 <dict>
4822 <key>Cache</key>
4823 <true/> | <false/>
4824 <key>Cookies</key>
4825 <true/> | <false/>
4826 <key>Downloads</key>
4827 <true/> | <false/>
4828 <key>FormData</key>
4829 <true/> | <false/>
4830 <key>History</key>
4831 <true/> | <false/>
4832 <key>Sessions</key>
4833 <true/> | <false/>
4834 <key>SiteSettings</key>
4835 <true/> | <false/>
4836 <key>OfflineApps</key>
4837 <true/> | <false/>
4838 <key>Locked</key>
4839 <true/> | <false/>
4840 </dict>
4841 </dict>
4842 ```
4843 #### policies.json
4844 ```
4845 {
4846 "policies": {
4847 "SanitizeOnShutdown": {
4848 "Cache": true | false,
4849 "Cookies": true | false,
4850 "Downloads": true | false,
4851 "FormData": true | false,
4852 "History": true | false,
4853 "Sessions": true | false,
4854 "SiteSettings": true | false,
4855 "OfflineApps": true | false,
4856 "Locked": true | false
4857 }
4858 }
4859 }
4860 ```
4861 ### SanitizeOnShutdown (All)
4862 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4863
4864 **Compatibility:** Firefox 60, Firefox ESR 60\
4865 **CCK2 Equivalent:** N/A\
4866 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
4867 #### Windows (GPO)
4868 ```
4869 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4870 ```
4871 #### Windows (Intune)
4872 OMA-URI:
4873 ```
4874 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4875 ```
4876 Value (string):
4877 ```
4878 <enabled/> or <disabled/>
4879 ```
4880 #### macOS
4881 ```
4882 <dict>
4883 <key>SanitizeOnShutdown</key>
4884 <true/> | <false/>
4885 </dict>
4886 ```
4887 #### policies.json
4888 ```
4889 {
4890 "policies": {
4891 "SanitizeOnShutdown": true | false
4892 }
4893 }
4894 ```
4895 ### SearchBar
4896 Set whether or not search bar is displayed.
4897
4898 **Compatibility:** Firefox 60, Firefox ESR 60\
4899 **CCK2 Equivalent:** `showSearchBar`\
4900 **Preferences Affected:** N/A
4901
4902 #### Windows (GPO)
4903 ```
4904 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4905 ```
4906
4907 #### Windows (Intune)
4908 OMA-URI:
4909 ```
4910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4911 ```
4912 Value (string):
4913 ```
4914 <enabled/>
4915 <data id="SearchBar" value="unified | separate"/>
4916 ```
4917 #### macOS
4918 ```
4919 <dict>
4920 <key>SearchBar</key>
4921 <string>unified | separate</string>
4922 </dict>
4923 ```
4924 #### policies.json
4925 ```
4926 {
4927 "policies": {
4928 "SearchBar": "unified" | "separate"
4929 }
4930 }
4931 ```
4932 <a name="SearchEngines"></a>
4933
4934 ### SearchEngines (This policy is only available on the ESR.)
4935
4936 ### SearchEngines | Add
4937
4938 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4939
4940 `Name` is the name of the search engine.
4941
4942 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4943
4944 `Method` is either GET or POST
4945
4946 `IconURL` is a URL for the icon to use.
4947
4948 `Alias` is a keyword to use for the engine.
4949
4950 `Description` is a description of the search engine.
4951
4952 `PostData` is the POST data as name value pairs separated by &.
4953
4954 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4955
4956 `Encoding` is the query charset for the engine. It defaults to UTF-8.
4957
4958 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
4959 **CCK2 Equivalent:** `searchplugins`\
4960 **Preferences Affected:** N/A
4961
4962 #### Windows (GPO)
4963 ```
4964 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4965 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4966 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4967 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4968 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4969 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4970 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4971 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4972 ```
4973 #### Windows (Intune)
4974 OMA-URI:
4975 ```
4976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4977 ```
4978 Value (string):
4979 ```
4980 <enabled/>
4981 <data id="SearchEngine_Name" value="Example1"/>
4982 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4983 <data id="SearchEngine_Method" value="GET | POST"/>
4984 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4985 <data id="SearchEngine_Alias" value="example"/>
4986 <data id="SearchEngine_Description" value="Example Description"/>
4987 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4988 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4989 ```
4990 #### macOS
4991 ```
4992 <dict>
4993 <key>SearchEngines</key>
4994 <dict>
4995 <key>Add</key>
4996 <array>
4997 <dict>
4998 <key>Name</key>
4999 <string>Example1</string>
5000 <key>URLTemplate</key>
5001 <string>https://www.example.org/q={searchTerms}</string>
5002 <key>Method</key>
5003 <string>GET | POST </string>
5004 <key>IconURL</key>
5005 <string>https://www.example.org/favicon.ico</string>
5006 <key>Alias</key>
5007 <string>example</string>
5008 <key>Description</key>
5009 <string>Example Description</string>
5010 <key>SuggestURLTemplate</key>
5011 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5012 <key>PostData</key>
5013 <string>name=value&q={searchTerms}</string>
5014 </dict>
5015 <array>
5016 </dict>
5017 </dict>
5018 ```
5019 #### policies.json
5020 ```
5021 {
5022 "policies": {
5023 "SearchEngines": {
5024 "Add": [
5025 {
5026 "Name": "Example1",
5027 "URLTemplate": "https://www.example.org/q={searchTerms}",
5028 "Method": "GET" | "POST",
5029 "IconURL": "https://www.example.org/favicon.ico",
5030 "Alias": "example",
5031 "Description": "Description",
5032 "PostData": "name=value&q={searchTerms}",
5033 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5034 }
5035 ]
5036 }
5037 }
5038 }
5039 ```
5040 ### SearchEngines | Default
5041
5042 Set the default search engine. This policy is only available on the ESR.
5043
5044 **Compatibility:** Firefox ESR 60\
5045 **CCK2 Equivalent:** `defaultSearchEngine`\
5046 **Preferences Affected:** N/A
5047
5048 #### Windows (GPO)
5049 ```
5050 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5051 ```
5052 #### Windows (Intune)
5053 OMA-URI:
5054 ```
5055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5056 ```
5057 Value (string):
5058 ```
5059 <enabled/>
5060 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5061 ```
5062 #### macOS
5063 ```
5064 <dict>
5065 <key>SearchEngines</key>
5066 <dict>
5067 <key>Default</key>
5068 <string>NAME_OF_SEARCH_ENGINE</string>
5069 </dict>
5070 </dict>
5071 ```
5072 #### policies.json
5073 ```
5074 {
5075 "policies": {
5076 "SearchEngines": {
5077 "Default": "NAME_OF_SEARCH_ENGINE"
5078 }
5079 }
5080 }
5081 ```
5082 ### SearchEngines | PreventInstalls
5083
5084 Prevent installing search engines from webpages.
5085
5086 **Compatibility:** Firefox ESR 60\
5087 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5088 **Preferences Affected:** N/A
5089
5090 #### Windows (GPO)
5091 ```
5092 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5093 ```
5094 #### Windows (Intune)
5095 OMA-URI:
5096 ```
5097 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5098 ```
5099 Value (string):
5100 ```
5101 <enabled/> or <disabled/>
5102 ```
5103 #### macOS
5104 ```
5105 <dict>
5106 <key>SearchEngines</key>
5107 <dict>
5108 <key>PreventInstalls</key>
5109 <true/> | <false/>
5110 </dict>
5111 </dict>
5112 ```
5113 #### policies.json
5114 ```
5115 {
5116 "policies": {
5117 "SearchEngines": {
5118 "PreventInstalls": true | false
5119 }
5120 }
5121 }
5122 ```
5123 ### SearchEngines | Remove
5124
5125 Hide built-in search engines. This policy is only available on the ESR.
5126
5127 **Compatibility:** Firefox ESR 60.2\
5128 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5129 **Preferences Affected:** N/A
5130
5131 #### Windows (GPO)
5132 ```
5133 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5134 ```
5135 #### Windows (Intune)
5136 OMA-URI:
5137 ```
5138 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5139 ```
5140 Value (string):
5141 ```
5142 <enabled/>
5143 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5144 ```
5145 #### macOS
5146 ```
5147 <dict>
5148 <key>SearchEngines</key>
5149 <dict>
5150 <key>Remove</key>
5151 <array>
5152 <string>NAME_OF_SEARCH_ENGINE</string>
5153 </array>
5154 </dict>
5155 </dict>
5156 ```
5157 #### policies.json
5158 ```
5159 {
5160 "policies": {
5161 "SearchEngines": {
5162 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5163 }
5164 }
5165 }
5166 ```
5167 ### SearchSuggestEnabled
5168
5169 Enable search suggestions.
5170
5171 **Compatibility:** Firefox 68, Firefox ESR 68\
5172 **CCK2 Equivalent:** N/A\
5173 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5174
5175 #### Windows (GPO)
5176 ```
5177 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5178 ```
5179 #### Windows (Intune)
5180 OMA-URI:
5181 ```
5182 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5183 ```
5184 Value (string):
5185 ```
5186 <enabled/> or <disabled/>
5187 ```
5188 #### macOS
5189 ```
5190 <dict>
5191 <key>SearchSuggestEnabled</key>
5192 <true/> | <false/>
5193 </dict>
5194 ```
5195 #### policies.json
5196 ```
5197 {
5198 "policies": {
5199 "SearchSuggestEnabled": true | false
5200 }
5201 }
5202 ```
5203 ### SecurityDevices
5204
5205 Install PKCS #11 modules.
5206
5207 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5208 **CCK2 Equivalent:** `certs.devices`\
5209 **Preferences Affected:** N/A
5210
5211 #### Windows (GPO)
5212 ```
5213 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5214 ```
5215 #### Windows (Intune)
5216 OMA-URI:
5217 ```
5218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5219 ```
5220 Value (string):
5221 ```
5222 <enabled/>
5223 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5224 ```
5225 #### macOS
5226 ```
5227 <dict>
5228 <key>SecurityDevices</key>
5229 <dict>
5230 <key>NAME_OF_DEVICE</key>
5231 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5232 </dict>
5233 </dict>
5234 ```
5235
5236 #### policies.json
5237 ```
5238 {
5239 "policies": {
5240 "SecurityDevices": {
5241 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5242 }
5243 }
5244 }
5245 ```
5246 ### ShowHomeButton
5247 Show the home button on the toolbar.
5248
5249 Future versions of Firefox will not show the home button by default.
5250
5251 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5252 **CCK2 Equivalent:** N/A\
5253 **Preferences Affected:** N/A
5254
5255 #### Windows (GPO)
5256 ```
5257 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5258 ```
5259 #### Windows (Intune)
5260 OMA-URI:
5261 ```
5262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ShowHomeButton
5263 ```
5264 Value (string):
5265 ```
5266 <enabled/> or <disabled/>
5267 ```
5268 #### macOS
5269 ```
5270 <dict>
5271 <key>ShowHomeButton</key>
5272 <true/> | <false/>
5273 </dict>
5274 ```
5275 #### policies.json
5276 ```
5277 {
5278 "policies": {
5279 "ShowHomeButton": true | false
5280 }
5281 }
5282 ```
5283 ### SSLVersionMax
5284
5285 Set and lock the maximum version of TLS.
5286
5287 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5288 **CCK2 Equivalent:** N/A\
5289 **Preferences Affected:** `security.tls.version.max`
5290
5291 #### Windows (GPO)
5292 ```
5293 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5294 ```
5295 #### Windows (Intune)
5296 OMA-URI:
5297 ```
5298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5299 ```
5300 Value (string):
5301 ```
5302 <enabled/>
5303 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5304 ```
5305 #### macOS
5306 ```
5307 <dict>
5308 <key>SSLVersionMax</key>
5309 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5310 </dict>
5311 ```
5312
5313 #### policies.json
5314 ```
5315 {
5316 "policies": {
5317 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5318 }
5319 }
5320 ```
5321 ### SSLVersionMin
5322
5323 Set and lock the minimum version of TLS.
5324
5325 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5326 **CCK2 Equivalent:** N/A\
5327 **Preferences Affected:** `security.tls.version.min`
5328
5329 #### Windows (GPO)
5330 ```
5331 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5332 ```
5333 #### Windows (Intune)
5334 OMA-URI:
5335 ```
5336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5337 ```
5338 Value (string):
5339 ```
5340 <enabled/>
5341 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5342 ```
5343 #### macOS
5344 ```
5345 <dict>
5346 <key>SSLVersionMin</key>
5347 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5348 </dict>
5349 ```
5350
5351 #### policies.json
5352 ```
5353 {
5354 "policies": {
5355 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5356 }
5357 }
5358 ```
5359 ### SupportMenu
5360 Add a menuitem to the help menu for specifying support information.
5361
5362 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5363 **CCK2 Equivalent:** helpMenu\
5364 **Preferences Affected:** N/A
5365
5366 #### Windows (GPO)
5367 ```
5368 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5369 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5370 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5371 ```
5372 #### Windows (Intune)
5373 OMA-URI:
5374 ```
5375 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5376 ```
5377 Value (string):
5378 ```
5379 <enabled/>
5380 <data id="SupportMenuTitle" value="Support Menu"/>
5381 <data id="SupportMenuURL" value="http://example.com/support"/>
5382 <data id="SupportMenuAccessKey" value="S">
5383 ```
5384 #### macOS
5385 ```
5386 <dict>
5387 <key>SupportMenu</key>
5388 <dict>
5389 <key>Title</key>
5390 <string>SupportMenu</string>
5391 <key>URL</key>
5392 <string>http://example.com/support</string>
5393 <key>AccessKey</key>
5394 <string>S</string>
5395 </dict>
5396 </dict>
5397 ```
5398 #### policies.json
5399 ```
5400 {
5401 "policies": {
5402 "SupportMenu": {
5403 "Title": "Support Menu",
5404 "URL": "http://example.com/support",
5405 "AccessKey": "S"
5406 }
5407 }
5408 }
5409 ```
5410 ### UserMessaging
5411
5412 Prevent Firefox from messaging the user in certain situations.
5413
5414 `WhatsNew` Remove the "What's New" icon and menuitem.
5415
5416 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
5417
5418 `FeatureRecommendations` IF false, don't recommend browser features.
5419
5420 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
5421
5422 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
5423
5424 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5425 **CCK2 Equivalent:** N/A\
5426 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`
5427
5428 #### Windows (GPO)
5429 ```
5430 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5431 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5432 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5433 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5434 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
5435 ```
5436 #### Windows (Intune)
5437 OMA-URI:
5438 ```
5439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
5440 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
5441 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
5442 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
5443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
5444 ```
5445 Value (string):
5446 ```
5447 <enabled/> or <disabled/>
5448 ```
5449 #### macOS
5450 ```
5451 <dict>
5452 <key>UserMessaging</key>
5453 <dict>
5454 <key>WhatsNew</key>
5455 <true/> | <false/>
5456 <key>ExtensionRecommendations</key>
5457 <true/> | <false/>
5458 <key>FeatureRecommendations</key>
5459 <true/> | <false/>
5460 <key>UrlbarInterventions</key>
5461 <true/> | <false/>
5462 <key>SkipOnboarding</key>
5463 <true/> | <false/>
5464 </dict>
5465 </dict>
5466 ```
5467 #### policies.json
5468 ```
5469 {
5470 "policies": {
5471 "UserMessaging": {
5472 "WhatsNew": true | false,
5473 "ExtensionRecommendations": true | false,
5474 "FeatureRecommendations": true | false,
5475 "UrlbarInterventions": true | false
5476 "SkipOnboarding": true | false
5477 }
5478 }
5479 }
5480 ```
5481 ### WebsiteFilter
5482 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5483 The arrays are limited to 1000 entries each.
5484
5485 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
5486
5487 For specific protocols, use `https://*/*` or `http://*/*`.
5488
5489 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5490
5491 **Compatibility:** Firefox 60, Firefox ESR 60\
5492 **CCK2 Equivalent:** N/A\
5493 **Preferences Affected:** N/A
5494
5495 #### Windows (GPO)
5496 ```
5497 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5498 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5499 ```
5500 #### Windows (Intune)
5501 OMA-URI:
5502 ```
5503 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5504 ```
5505 Value (string):
5506 ```
5507 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
5508 ```
5509 OMA-URI:
5510 ```
5511 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5512 ```
5513 Value (string):
5514 ```
5515 <enabled/>
5516 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5517 ```
5518 #### macOS
5519 ```
5520 <dict>
5521 <key>WebsiteFilter</key>
5522 <dict>
5523 <key>Block</key>
5524 <array>
5525 <string><all_urls></string>
5526 </array>
5527 <key>Exceptions</key>
5528 <array>
5529 <string>http://example.org/*</string>
5530 </array>
5531 </dict>
5532
5533 </dict>
5534 ```
5535 #### policies.json
5536 ```
5537 {
5538 "policies": {
5539 "WebsiteFilter": {
5540 "Block": ["<all_urls>"],
5541 "Exceptions": ["http://example.org/*"]
5542 }
5543 }
5544 }
5545 ```
5546 ### WindowsSSO
5547 Allow Windows single sign-on for Microsoft, work, and school accounts.
5548
5549 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
5550
5551 **Compatibility:** Firefox 91\
5552 **CCK2 Equivalent:** N/A\
5553 **Preferences Affected:** `network.http.windows-sso.enabled`
5554
5555 #### Windows (GPO)
5556 ```
5557 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
5558 ```
5559 #### Windows (Intune)
5560 OMA-URI:
5561 ```
5562 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
5563 ```
5564 Value (string):
5565 ```
5566 <enabled/> or <disabled/>
5567 ```
5568 #### policies.json
5569 ```
5570 {
5571 "policies": {
5572 "WindowsSSO": true | false
5573 }
5574 }
5575 ```

patrick-canterino.de