]> git.p6c8.net - policy-templates.git/blob - README.md
Handlers policy
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
66 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
67 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
68 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
69 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
70 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
71 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
72 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
73 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
74 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
75 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
76 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
77 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
78 | **[`Preferences`](#preferences)** | Set and lock some preferences.
79 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
80 | **[`Proxy`](#proxy)** | Configure proxy settings.
81 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
82 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
83 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
84 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
85 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
86 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
87 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
88 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
91 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
92 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
93 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
94 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
95 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
96 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
97
98 ### AppAutoUpdate
99
100 Enable or disable **automatic** application update.
101
102 If set to true, application updates are installed without user approval.
103
104 If set to false, application updates are downloaded but the user can choose when to install the update.
105
106 If you have disabled updates via DisableAppUpdate, this policy has no effect.
107
108 **Compatibility:** Firefox 75, Firefox ESR 68.7\
109 **CCK2 Equivalent:** N/A\
110 **Preferences Affected:** app.update.auto
111
112 #### Windows (GPO)
113 ```
114 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
115 ```
116 #### Windows (Intune)
117 OMA-URI:
118 ```
119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
120 ```
121 Value (string):
122 ```
123 <enabled/> or <disabled/>
124 ```
125 #### macOS
126 ```
127 <dict>
128 <key>AppAutoUpdate</key>
129 <true/> | <false/>
130 </dict>
131 ```
132 #### policies.json
133 ```
134 {
135 "policies": {
136 "AppAutoUpdate": true | false
137 }
138 }
139 ```
140 ### AppUpdateURL
141
142 Change the URL for application update.
143
144 **Compatibility:** Firefox 62, Firefox ESR 60.2\
145 **CCK2 Equivalent:** N/A\
146 **Preferences Affected:** `app.update.url`
147
148 #### Windows (GPO)
149 ```
150 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
151 ```
152 #### Windows (Intune)
153 OMA-URI:
154 ```
155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
156 ```
157 Value (string):
158 ```
159 <enabled/>
160 <data id="AppUpdateURL" value="https://yoursite.com"/>
161 ```
162 #### macOS
163 ```
164 <dict>
165 <key>AppUpdateURL</key>
166 <string>https://yoursite.com</string>
167 </dict>
168 ```
169 #### policies.json
170 ```
171 {
172 "policies": {
173 "AppUpdateURL": "https://yoursite.com"
174 }
175 }
176 ```
177 ### Authentication
178
179 Configure sites that support integrated authentication.
180
181 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
182
183 `PrivateBrowsing` enables integrated authentication in prviate browsing.
184
185 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
186 **CCK2 Equivalent:** N/A\
187 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
188
189 #### Windows (GPO)
190 ```
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
202 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
203 ```
204 #### Windows (Intune)
205 OMA-URI:
206 ```
207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
208 ```
209 Value (string):
210 ```
211 <enabled/>
212 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
213 ```
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
240 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
241 ```
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>Authentication</key>
262 <dict>
263 <key>SPNEGO</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>Delegated</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>NTLM</key>
274 <array>
275 <string>mydomain.com</string>
276 <string>https://myotherdomain.com</string>
277 </array>
278 <key>AllowNonFQDN</key>
279 <dict>
280 <key>SPNEGO</key>
281 <true/> | <false/>
282 <key>NTLM</key>
283 <true/> | <false/>
284 </dict>
285 <key>AllowProxies</key>
286 <dict>
287 <key>SPNEGO</key>
288 <true/> | <false/>
289 <key>NTLM</key>
290 <true/> | <false/>
291 </dict>
292 <key>Locked</key>
293 <true/> | <false/>
294 <key>PrivateBrowsing</key>
295 <true/> | <false/>
296 </dict>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "Authentication": {
304 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
305 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
306 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
307 "AllowNonFQDN": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "AllowProxies": {
312 "SPNEGO": true | false,
313 "NTLM": true | false
314 },
315 "Locked": true | false,
316 "PrivateBrowsing": true | false
317 }
318 }
319 }
320 ```
321 ### BlockAboutAddons
322
323 Block access to the Add-ons Manager (about:addons).
324
325 **Compatibility:** Firefox 60, Firefox ESR 60\
326 **CCK2 Equivalent:** `disableAddonsManager`\
327 **Preferences Affected:** N/A
328
329 #### Windows (GPO)
330 ```
331 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
332 ```
333 #### Windows (Intune)
334 OMA-URI:
335 ```
336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
337 ```
338 Value (string):
339 ```
340 <enabled/> or <disabled/>
341 ```
342 #### macOS
343 ```
344 <dict>
345 <key>BlockAboutAddons</key>
346 <true/> | <false/>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "BlockAboutAddons": true | false
354 }
355 }
356 ```
357 ### BlockAboutConfig
358
359 Block access to about:config.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60\
362 **CCK2 Equivalent:** `disableAboutConfig`\
363 **Preferences Affected:** N/A
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
368 ```
369 #### Windows (Intune)
370 OMA-URI:
371 ```
372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
373 ```
374 Value (string):
375 ```
376 <enabled/> or <disabled/>
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>BlockAboutConfig</key>
382 <true/> | <false/>
383 </dict>
384 ```
385 #### policies.json
386 ```
387 {
388 "policies": {
389 "BlockAboutConfig": true | false
390 }
391 }
392 ```
393 ### BlockAboutProfiles
394
395 Block access to About Profiles (about:profiles).
396
397 **Compatibility:** Firefox 60, Firefox ESR 60\
398 **CCK2 Equivalent:** `disableAboutProfiles`\
399 **Preferences Affected:** N/A
400
401 #### Windows (GPO)
402 ```
403 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
404 ```
405 #### Windows (Intune)
406 OMA-URI:
407 ```
408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
409 ```
410 Value (string):
411 ```
412 <enabled/> or <disabled/>
413 ```
414 #### macOS
415 ```
416 <dict>
417 <key>BlockAboutProfiles</key>
418 <true/> | <false/>
419 </dict>
420 ```
421 #### policies.json
422 ```
423 {
424 "policies": {
425 "BlockAboutProfiles": true | false
426 }
427 }
428 ```
429 ### BlockAboutSupport
430
431 Block access to Troubleshooting Information (about:support).
432
433 **Compatibility:** Firefox 60, Firefox ESR 60\
434 **CCK2 Equivalent:** `disableAboutSupport`\
435 **Preferences Affected:** N/A
436
437 #### Windows (GPO)
438 ```
439 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
440 ```
441 #### Windows (Intune)
442 OMA-URI:
443 ```
444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
445 ```
446 Value (string):
447 ```
448 <enabled/> or <disabled/>
449 ```
450 #### macOS
451 ```
452 <dict>
453 <key>BlockAboutSupport</key>
454 <true/> | <false/>
455 </dict>
456 ```
457 #### policies.json
458 ```
459 {
460 "policies": {
461 "BlockAboutSupport": true | false
462 }
463 }
464 ```
465 ### Bookmarks
466
467 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
468
469 **Compatibility:** Firefox 60, Firefox ESR 60\
470 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
471 **Preferences Affected:** N/A
472
473 #### Windows (GPO)
474 ```
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
479 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
485 ```
486 Value (string):
487 ```
488 <enabled/>
489 <data id="BookmarkTitle" value="Example"/>
490 <data id="BookmarkURL" value="https://example.com"/>
491 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
492 <data id="BookmarkPlacement" value="toolbar | menu"/>
493 <data id="BookmarkFolder" value="FolderName"/>
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>Bookmarks</key>
499 <array>
500 <dict>
501 <key>Title</key>
502 <string>Example</string>
503 <key>URL</key>
504 <string>https://example.com</string>
505 <key>Favicon</key>
506 <string>https://example.com/favicon.ico</string>
507 <key>Placement</key>
508 <string>toolbar | menu</string>
509 <key>Folder</key>
510 <string>FolderName</string>
511 </dict>
512 </array>
513 </dict>
514 ```
515 #### policies.json
516 ```
517 {
518 "policies": {
519 "Bookmarks": [
520 {
521 "Title": "Example",
522 "URL": "https://example.com",
523 "Favicon": "https://example.com/favicon.ico",
524 "Placement": "toolbar" | "menu",
525 "Folder": "FolderName"
526 }
527 ]
528 }
529 }
530 ```
531 ### CaptivePortal
532 Enable or disable the detection of captive portals.
533
534 **Compatibility:** Firefox 67, Firefox ESR 60.7\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `network.captive-portal-service.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>CaptivePortal</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "CaptivePortal": true | false
563 }
564 }
565 ```
566 ### Certificates
567
568 ### Certificates | ImportEnterpriseRoots
569
570 Trust certificates that have been added to the operating system certificate store by a user or administrator.
571
572 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
573
574 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
575 **CCK2 Equivalent:** N/A\
576 **Preferences Affected:** `security.enterprise_roots.enabled`
577
578 #### Windows (GPO)
579 ```
580 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
581 ```
582 #### Windows (Intune)
583 OMA-URI:
584 ```
585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
586 ```
587 Value (string):
588 ```
589 <enabled/> or <disabled/>
590 ```
591 #### macOS
592 ```
593 <dict>
594 <key>Certificates</key>
595 <dict>
596 <key>ImportEnterpriseRoots</key>
597 <true/> | <false/>
598 </dict>
599 </dict>
600 ```
601 #### policies.json
602 ```
603 {
604 "policies": {
605 "Certificates": {
606 "ImportEnterpriseRoots": true | false
607 }
608 }
609 }
610 ```
611 ### Certificates | Install
612
613 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
614
615 - Windows
616 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
617 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
618 - macOS
619 - /Library/Application Support/Mozilla/Certificates
620 - ~/Library/Application Support/Mozilla/Certificates
621 - Linux
622 - /usr/lib/mozilla/certificates
623 - /usr/lib64/mozilla/certificates
624 - ~/.mozilla/certificates
625
626 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
627
628 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
629
630 Certificates are installed using the trust string `CT,CT,`.
631
632 Binary (DER) and ASCII (PEM) certificates are both supported.
633
634 **Compatibility:** Firefox 64, Firefox ESR 64\
635 **CCK2 Equivalent:** `certs.ca`\
636 **Preferences Affected:** N/A
637
638 #### Windows (GPO)
639 ```
640 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
641 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
642 ```
643 #### Windows (Intune)
644 OMA-URI:
645 ```
646 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
647 ```
648 Value (string):
649 ```
650 <enabled/>
651 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
652 ```
653 #### macOS
654 ```
655 <dict>
656 <key>Certificates</key>
657 <dict>
658 <key>Install</key>
659 <array>
660 <string>cert1.der</string>
661 <string>/Users/username/cert2.pem</string>
662 </array>
663 </dict>
664 </dict>
665 ```
666 #### policies.json
667 ```
668 {
669 "policies": {
670 "Certificates": {
671 "Install": ["cert1.der", "/home/username/cert2.pem"]
672 }
673 }
674 }
675 ```
676 ### Cookies
677 Configure cookie preferences.
678
679 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
680
681 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
682
683 `Default` determines whether cookies are accepted at all.
684
685 `AcceptThirdParty` determines how third-party cookies are handled.
686
687 `ExpireAtSessionEnd` determines when cookies expire.
688
689 `RejectTracker` only rejects cookies for trackers.
690
691 `Locked` prevents the user from changing cookie preferences.
692
693 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
694 **CCK2 Equivalent:** N/A\
695 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
696
697 #### Windows (GPO)
698 ```
699 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
700 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
701 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
702 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
703 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
705 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
706 ```
707 #### Windows (Intune)
708 OMA-URI:
709 ```
710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
711 ```
712 Value (string):
713 ```
714 <enabled/>
715 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
716 ```
717 OMA-URI:
718 ```
719 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
720 ```
721 Value (string):
722 ```
723 <enabled/>
724 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
725 ```
726 OMA-URI:
727 ```
728 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
729 ```
730 Value (string):
731 ```
732 <enabled/> or <disabled/>
733 ```
734 OMA-URI:
735 ```
736 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
737 ```
738 Value (string):
739 ```
740 <enabled/>
741 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
742 ```
743 OMA-URI:
744 ```
745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
746 ```
747 Value (string):
748 ```
749 <enabled/> or <disabled/>
750 ```
751 OMA-URI:
752 ```
753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
754 ```
755 Value (string):
756 ```
757 <enabled/> or <disabled/>
758 ```
759 OMA-URI:
760 ```
761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
762 ```
763 Value (string):
764 ```
765 <enabled/> or <disabled/>
766 ```
767 #### macOS
768 ```
769 <dict>
770 <key>Cookies</key>
771 <dict>
772 <key>Allow</key>
773 <array>
774 <string>http://example.com</string>
775 </array>
776 <key>Block</key>
777 <array>
778 <string>http://example.org</string>
779 </array>
780 <key>Default</key>
781 <true/> | <false/>
782 <key>AcceptThirdParty</key>
783 <string>always | never | from-visited</string>
784 <key>ExpireAtSessionEnd</key>
785 <true/> | <false/>
786 <key>RejectTracker</key>
787 <true/> | <false/>
788 <key>Locked</key>
789 <true/> | <false/>
790 </dict>
791 </dict>
792 ```
793 #### policies.json
794 ```
795 {
796 "policies": {
797 "Cookies": {
798 "Allow": ["http://example.org/"],
799 "Block": ["http://example.edu/"],
800 "Default": true | false,
801 "AcceptThirdParty": "always" | "never" | "from-visited",
802 "ExpireAtSessionEnd": true | false,
803 "RejectTracker": true | false,
804 "Locked": true | false
805 }
806 }
807 }
808 ```
809 ### DisableSetDesktopBackground
810 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
811
812 **Compatibility:** Firefox 60, Firefox ESR 60\
813 **CCK2 Equivalent:** `removeSetDesktopBackground`\
814 **Preferences Affected:** N/A
815
816 #### Windows (GPO)
817 ```
818 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
819 ```
820 #### Windows (Intune)
821 OMA-URI:
822 ```
823 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
824 ```
825 Value (string):
826 ```
827 <enabled/> or <disabled/>
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisableSetDesktopBackground</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "DisableSetDesktopBackground": true | false
841 }
842 }
843 ```
844 ### DisableMasterPasswordCreation
845 Remove the master password functionality.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `noMasterPassword`\
849 **Preferences Affected:** N/A
850
851 #### Windows (GPO)
852 ```
853 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
854 ```
855 #### Windows (Intune)
856 OMA-URI:
857 ```
858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
859 ```
860 Value (string):
861 ```
862 <enabled/> or <disabled/>
863 ```
864 #### macOS
865 ```
866 <dict>
867 <key>DisableMasterPasswordCreation</key>
868 <true/> | <false/>
869 </dict>
870 ```
871 #### policies.json
872 ```
873 {
874 "policies": {
875 "DisableMasterPasswordCreation": true | false
876 }
877 }
878 ```
879 ### DisableAppUpdate
880 Turn off application updates.
881
882 **Compatibility:** Firefox 60, Firefox ESR 60\
883 **CCK2 Equivalent:** `disableFirefoxUpdates`\
884 **Preferences Affected:** N/A
885
886 #### Windows (GPO)
887 ```
888 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
889 ```
890 #### Windows (Intune)
891 OMA-URI:
892 ```
893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
894 ```
895 Value (string):
896 ```
897 <enabled/> or <disabled/>
898 ```
899 #### macOS
900 ```
901 <dict>
902 <key>DisableAppUpdate</key>
903 <true/> | <false/>
904 </dict>
905 ```
906 #### policies.json
907 ```
908 {
909 "policies": {
910 "DisableAppUpdate": true | false
911 }
912 }
913 ```
914 ### DisableBuiltinPDFViewer
915 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
916
917 **Compatibility:** Firefox 60, Firefox ESR 60\
918 **CCK2 Equivalent:** `disablePDFjs`\
919 **Preferences Affected:** `pdfjs.disabled`
920
921 #### Windows (GPO)
922 ```
923 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
924 ```
925 #### Windows (Intune)
926 OMA-URI:
927 ```
928 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
929 ```
930 Value (string):
931 ```
932 <enabled/> or <disabled/>
933 ```
934 #### macOS
935 ```
936 <dict>
937 <key>DisableBuiltinPDFViewer</key>
938 <true/> | <false/>
939 </dict>
940 ```
941 #### policies.json
942 ```
943 {
944 "policies": {
945 "DisableBuiltinPDFViewer": true | false
946 }
947 }
948 ```
949 ### DisabledCiphers
950 Disable specific cryptographic ciphers.
951
952 ---
953 **Note:**
954
955 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
956
957 ---
958 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
959 **CCK2 Equivalent:** N/A\
960 **Preferences Affected:** N/A
961
962 #### Windows (GPO)
963 ```
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
975 ```
976 #### Windows (Intune)
977 OMA-URI:
978 ```
979 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
990 ```
991 Value (string):
992 ```
993 <enabled/> or <disabled/>
994 ```
995 #### macOS
996 ```
997 <dict>
998 <key>DisabledCiphers</key>
999 <dict>
1000 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1001 <true/> | <false/>
1002 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1005 <true/> | <false/>
1006 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1007 <true/> | <false/>
1008 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1009 <true/> | <false/>
1010 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1011 <true/> | <false/>
1012 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1013 <true/> | <false/>
1014 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1015 <true/> | <false/>
1016 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1017 <true/> | <false/>
1018 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1019 <true/> | <false/>
1020 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1021 <true/> | <false/>
1022 </dict>
1023 </dict>
1024 ```
1025 #### policies.json
1026 ```
1027 {
1028 "policies": {
1029 "DisabledCiphers" {
1030 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1031 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1032 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1035 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1036 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1037 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1038 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1039 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1040 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1041 }
1042 }
1043 }
1044 ```
1045 ### DisableDefaultBrowserAgent
1046 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1047
1048 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1049 **CCK2 Equivalent:** N/A\
1050 **Preferences Affected:** N/A
1051
1052 #### Windows (GPO)
1053 ```
1054 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1055 ```
1056 #### Windows (Intune)
1057 OMA-URI:
1058 ```
1059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1060 ```
1061 Value (string):
1062 ```
1063 <enabled/> or <disabled/>
1064 ```
1065 #### policies.json
1066 ```
1067 {
1068 "policies": {
1069 "DisableDefaultBrowserAgent": true | false
1070 }
1071 }
1072 ```
1073 ### DisableDeveloperTools
1074 Remove access to all developer tools.
1075
1076 **Compatibility:** Firefox 60, Firefox ESR 60\
1077 **CCK2 Equivalent:** `removeDeveloperTools`\
1078 **Preferences Affected:** `devtools.policy.disabled`
1079
1080 #### Windows (GPO)
1081 ```
1082 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1083 ```
1084 #### Windows (Intune)
1085 OMA-URI:
1086 ```
1087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1088 ```
1089 Value (string):
1090 ```
1091 <enabled/> or <disabled/>
1092 ```
1093 #### macOS
1094 ```
1095 <dict>
1096 <key>DisableDeveloperTools</key>
1097 <true/> | <false/>
1098 </dict>
1099 ```
1100 #### policies.json
1101 ```
1102 {
1103 "policies": {
1104 "DisableDeveloperTools": true | false
1105 }
1106 }
1107 ```
1108 ### DisableFeedbackCommands
1109 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1110
1111 **Compatibility:** Firefox 60, Firefox ESR 60\
1112 **CCK2 Equivalent:** N/A\
1113 **Preferences Affected:** N/A
1114
1115 #### Windows (GPO)
1116 ```
1117 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1118 ```
1119 #### Windows (Intune)
1120 OMA-URI:
1121 ```
1122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1123 ```
1124 Value (string):
1125 ```
1126 <enabled/> or <disabled/>
1127 ```
1128 #### macOS
1129 ```
1130 <dict>
1131 <key>DisableFeedbackCommands</key>
1132 <true/> | <false/>
1133 </dict>
1134 ```
1135 #### policies.json
1136 ```
1137 {
1138 "policies": {
1139 "DisableFeedbackCommands": true | false
1140 }
1141 }
1142 ```
1143 ### DisableFirefoxScreenshots
1144 Remove access to Firefox Screenshots.
1145
1146 **Compatibility:** Firefox 60, Firefox ESR 60\
1147 **CCK2 Equivalent:** N/A\
1148 **Preferences Affected:** `extensions.screenshots.disabled`
1149
1150 #### Windows (GPO)
1151 ```
1152 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1153 ```
1154 #### Windows (Intune)
1155 OMA-URI:
1156 ```
1157 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1158 ```
1159 Value (string):
1160 ```
1161 <enabled/> or <disabled/>
1162 ```
1163 #### macOS
1164 ```
1165 <dict>
1166 <key>DisableFirefoxScreenshots</key>
1167 <true/> | <false/>
1168 </dict>
1169 ```
1170 #### policies.json
1171 ```
1172 {
1173 "policies": {
1174 "DisableFirefoxScreenshots": true | false
1175 }
1176 }
1177 ```
1178 ### DisableFirefoxAccounts
1179 Disable Firefox Accounts integration (Sync).
1180
1181 **Compatibility:** Firefox 60, Firefox ESR 60\
1182 **CCK2 Equivalent:** `disableSync`\
1183 **Preferences Affected:** `identity.fxaccounts.enabled`
1184
1185 #### Windows (GPO)
1186 ```
1187 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1188 ```
1189 #### Windows (Intune)
1190 OMA-URI:
1191 ```
1192 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1193 ```
1194 Value (string):
1195 ```
1196 <enabled/> or <disabled/>
1197 ```
1198 #### macOS
1199 ```
1200 <dict>
1201 <key>DisableFirefoxAccounts</key>
1202 <true/> | <false/>
1203 </dict>
1204 ```
1205 #### policies.json
1206 ```
1207 {
1208 "policies": {
1209 "DisableFirefoxAccounts": true | false
1210 }
1211 }
1212 ```
1213 ### DisableFirefoxStudies
1214 Disable Firefox studies (Shield).
1215
1216 **Compatibility:** Firefox 60, Firefox ESR 60\
1217 **CCK2 Equivalent:** N/A\
1218 **Preferences Affected:** N/A
1219
1220 #### Windows (GPO)
1221 ```
1222 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1223 ```
1224 #### Windows (Intune)
1225 OMA-URI:
1226 ```
1227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1228 ```
1229 Value (string):
1230 ```
1231 <enabled/> or <disabled/>
1232 ```
1233 #### macOS
1234 ```
1235 <dict>
1236 <key>DisableFirefoxStudies</key>
1237 <true/> | <false/>
1238 </dict>
1239 ```
1240 #### policies.json
1241 ```
1242 {
1243 "policies": {
1244 "DisableFirefoxStudies": true | false
1245 }
1246 }
1247 ```
1248 ### DisableForgetButton
1249 Disable the "Forget" button.
1250
1251 **Compatibility:** Firefox 60, Firefox ESR 60\
1252 **CCK2 Equivalent:** `disableForget`\
1253 **Preferences Affected:** N/A
1254
1255 #### Windows (GPO)
1256 ```
1257 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1258 ```
1259 #### Windows (Intune)
1260 OMA-URI:
1261 ```
1262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1263 ```
1264 Value (string):
1265 ```
1266 <enabled/> or <disabled/>
1267 ```
1268 #### macOS
1269 ```
1270 <dict>
1271 <key>DisableForgetButton</key>
1272 <true/> | <false/>
1273 </dict>
1274 ```
1275 #### policies.json
1276 ```
1277 {
1278 "policies": {
1279 "DisableForgetButton": true | false
1280 }
1281 }
1282 ```
1283 ### DisableFormHistory
1284 Turn off saving information on web forms and the search bar.
1285
1286 **Compatibility:** Firefox 60, Firefox ESR 60\
1287 **CCK2 Equivalent:** `disableFormFill`\
1288 **Preferences Affected:** ` browser.formfill.enable`
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1293 ```
1294 #### Windows (Intune)
1295 OMA-URI:
1296 ```
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1298 ```
1299 Value (string):
1300 ```
1301 <enabled/> or <disabled/>
1302 ```
1303 #### macOS
1304 ```
1305 <dict>
1306 <key>DisableFormHistory</key>
1307 <true/> | <false/>
1308 </dict>
1309 ```
1310 #### policies.json
1311 ```
1312 {
1313 "policies": {
1314 "DisableFormHistory": true | false
1315 }
1316 }
1317 ```
1318 ### DisablePasswordReveal
1319 Do not allow passwords to be shown in saved logins
1320
1321 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1322 **CCK2 Equivalent:** N/A
1323 **Preferences Affected:** N/A
1324
1325 #### Windows (GPO)
1326 ```
1327 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1328 ```
1329 #### Windows (Intune)
1330 OMA-URI:
1331 ```
1332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1333 ```
1334 Value (string):
1335 ```
1336 <enabled/> or <disabled/>
1337 ```
1338 #### macOS
1339 ```
1340 <dict>
1341 <key>DisablePasswordReveal</key>
1342 <true/> | <false/>
1343 </dict>
1344 ```
1345 #### policies.json
1346 ```
1347 {
1348 "policies": {
1349 "DisablePasswordReveal": true | false
1350 }
1351 }
1352 ```
1353 ### DisablePocket
1354 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1355
1356 **Compatibility:** Firefox 60, Firefox ESR 60\
1357 **CCK2 Equivalent:** `disablePocket`\
1358 **Preferences Affected:** `extensions.pocket.enabled`
1359
1360 #### Windows (GPO)
1361 ```
1362 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1363 ```
1364 #### Windows (Intune)
1365 OMA-URI:
1366 ```
1367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1368 ```
1369 Value (string):
1370 ```
1371 <enabled/> or <disabled/>
1372 ```
1373 #### macOS
1374 ```
1375 <dict>
1376 <key>DisablePocket</key>
1377 <true/> | <false/>
1378 </dict>
1379 ```
1380 #### policies.json
1381 ```
1382 {
1383 "policies": {
1384 "DisablePocket": true | false
1385 }
1386 }
1387 ```
1388 ### DisablePrivateBrowsing
1389 Remove access to private browsing.
1390
1391 **Compatibility:** Firefox 60, Firefox ESR 60\
1392 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1393 **Preferences Affected:** N/A
1394
1395 #### Windows (GPO)
1396 ```
1397 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1398 ```
1399 #### Windows (Intune)
1400 OMA-URI:
1401 ```
1402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1403 ```
1404 Value (string):
1405 ```
1406 <enabled/> or <disabled/>
1407 ```
1408 #### macOS
1409 ```
1410 <dict>
1411 <key>DisablePrivateBrowsing</key>
1412 <true/> | <false/>
1413 </dict>
1414 ```
1415 #### policies.json
1416 ```
1417 {
1418 "policies": {
1419 "DisablePrivateBrowsing": true | false
1420 }
1421 }
1422 ```
1423 ### DisableProfileImport
1424 Disables the "Import data from another browser" option in the bookmarks window.
1425
1426 **Compatibility:** Firefox 60, Firefox ESR 60\
1427 **CCK2 Equivalent:** N/A\
1428 **Preferences Affected:** N/A
1429
1430 #### Windows (GPO)
1431 ```
1432 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1433 ```
1434 #### Windows (Intune)
1435 OMA-URI:
1436 ```
1437 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1438 ```
1439 Value (string):
1440 ```
1441 <enabled/> or <disabled/>
1442 ```
1443 #### macOS
1444 ```
1445 <dict>
1446 <key>DisableProfileImport</key>
1447 <true/> | <false/>
1448 </dict>
1449 ```
1450 #### policies.json
1451 ```
1452 {
1453 "policies": {
1454 "DisableProfileImport": true | false
1455 }
1456 }
1457 ```
1458 ### DisableProfileRefresh
1459 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1460
1461 **Compatibility:** Firefox 60, Firefox ESR 60\
1462 **CCK2 Equivalent:** `disableResetFirefox`\
1463 **Preferences Affected:** `browser.disableResetPrompt`
1464
1465 #### Windows (GPO)
1466 ```
1467 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1468 ```
1469 #### Windows (Intune)
1470 OMA-URI:
1471 ```
1472 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1473 ```
1474 Value (string):
1475 ```
1476 <enabled/> or <disabled/>
1477 ```
1478 #### macOS
1479 ```
1480 <dict>
1481 <key>DisableProfileRefresh</key>
1482 <true/> | <false/>
1483 </dict>
1484 ```
1485 #### policies.json
1486 ```
1487 {
1488 "policies": {
1489 "DisableProfileRefresh": true | false
1490 }
1491 }
1492 ```
1493 ### DisableSafeMode
1494 Disable safe mode within the browser.
1495
1496 On Windows, this disables safe mode via the command line as well.
1497
1498 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1499 **CCK2 Equivalent:** `disableSafeMode`\
1500 **Preferences Affected:** N/A
1501
1502 #### Windows (GPO)
1503 ```
1504 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1505 ```
1506 #### Windows (Intune)
1507 OMA-URI:
1508 ```
1509 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1510 ```
1511 Value (string):
1512 ```
1513 <enabled/> or <disabled/>
1514 ```
1515 #### macOS
1516 ```
1517 <dict>
1518 <key>DisableSafeMode</key>
1519 <true/> | <false/>
1520 </dict>
1521 ```
1522 #### policies.json
1523 ```
1524 {
1525 "policies": {
1526 "DisableSafeMode": true | false
1527 }
1528 }
1529 ```
1530 ### DisableSecurityBypass
1531 Prevent the user from bypassing security in certain cases.
1532
1533 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1534
1535 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1536
1537 **Compatibility:** Firefox 60, Firefox ESR 60\
1538 **CCK2 Equivalent:** N/A\
1539 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1540
1541 #### Windows (GPO)
1542 ```
1543 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1544 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1545 ```
1546 #### Windows (Intune)
1547 OMA-URI:
1548 ```
1549 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1550 ```
1551 Value (string):
1552 ```
1553 <enabled/> or <disabled/>
1554 ```
1555 OMA-URI:
1556 ```
1557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1558 ```
1559 Value (string):
1560 ```
1561 <enabled/> or <disabled/>
1562 ```
1563
1564 #### macOS
1565 ```
1566 <dict>
1567 <key>DisableSecurityBypass</key>
1568 <dict>
1569 <key>InvalidCertificate</key>
1570 <true/> | <false/>
1571 <key><SafeBrowsing/key>
1572 <true/> | <false/>
1573 </dict>
1574 </dict>
1575 ```
1576 #### policies.json
1577 ```
1578 {
1579 "policies": {
1580 "DisableSecurityBypass": {
1581 "InvalidCertificate": true | false,
1582 "SafeBrowsing": true | false
1583 }
1584 }
1585 }
1586 ```
1587 ### DisableSystemAddonUpdate
1588 Prevent system add-ons from being installed or update.
1589
1590 **Compatibility:** Firefox 60, Firefox ESR 60\
1591 **CCK2 Equivalent:** N/A\
1592 **Preferences Affected:** N/A
1593
1594 #### Windows (GPO)
1595 ```
1596 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1597 ```
1598 #### Windows (Intune)
1599 OMA-URI:
1600 ```
1601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1602 ```
1603 Value (string):
1604 ```
1605 <enabled/> or <disabled/>
1606 ```
1607 #### macOS
1608 ```
1609 <dict>
1610 <key>DisableSystemAddonUpdate</key>
1611 <true/> | <false/>
1612 </dict>
1613 ```
1614 #### policies.json
1615 ```
1616 {
1617 "policies": {
1618 "DisableSystemAddonUpdate": true | false
1619 }
1620 }
1621 ```
1622 ### DisableTelemetry
1623 Prevent the upload of telemetry data.
1624
1625 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1626
1627 **Compatibility:** Firefox 60, Firefox ESR 60\
1628 **CCK2 Equivalent:** `disableTelemetry`\
1629 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1630
1631 #### Windows (GPO)
1632 ```
1633 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1634 ```
1635 #### Windows (Intune)
1636 OMA-URI:
1637 ```
1638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1639 ```
1640 Value (string):
1641 ```
1642 <enabled/> or <disabled/>
1643 ```
1644 #### macOS
1645 ```
1646 <dict>
1647 <key>DisableTelemetry</key>
1648 <true/> | <false/>
1649 </dict>
1650 ```
1651 #### policies.json
1652 ```
1653 {
1654 "policies": {
1655 "DisableTelemetry": true | false
1656 }
1657 }
1658 ```
1659 ### DisplayBookmarksToolbar
1660 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1661
1662 **Compatibility:** Firefox 60, Firefox ESR 60\
1663 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1664 **Preferences Affected:** N/A
1665
1666 #### Windows (GPO)
1667 ```
1668 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1669 ```
1670 #### Windows (Intune)
1671 OMA-URI:
1672 ```
1673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1674 ```
1675 Value (string):
1676 ```
1677 <enabled/> or <disabled/>
1678 ```
1679 #### macOS
1680 ```
1681 <dict>
1682 <key>DisplayBookmarksToolbar</key>
1683 <true/> | <false/>
1684 </dict>
1685 ```
1686 #### policies.json
1687 ```
1688 {
1689 "policies": {
1690 "DisplayBookmarksToolbar": true | false
1691 }
1692 }
1693 ```
1694 ### DisplayMenuBar (Deprecated)
1695 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1696
1697 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1698 **CCK2 Equivalent:** `displayMenuBar`\
1699 **Preferences Affected:** N/A
1700
1701 #### Windows (GPO)
1702 ```
1703 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1704 ```
1705 #### macOS
1706 ```
1707 <dict>
1708 <key>DisplayMenuBar</key>
1709 <true/> | <false/>
1710 </dict>
1711 ```
1712 #### policies.json
1713 ```
1714 {
1715 "policies": {
1716 "DisplayMenuBar": true | false
1717 }
1718 }
1719 ```
1720 ### DisplayMenuBar
1721 Set the state of the menubar.
1722
1723 `always` means the menubar is shown and cannot be hidden.
1724
1725 `never` means the menubar is hidden and cannot be shown.
1726
1727 `default-on` means the menubar is on by default but can be hidden.
1728
1729 `default-off` means the menubar is off by default but can be shown.
1730
1731 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1732 **CCK2 Equivalent:** `displayMenuBar`\
1733 **Preferences Affected:** N/A
1734
1735 #### Windows (GPO)
1736 ```
1737 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1738 ```
1739 #### Windows (Intune)
1740 OMA-URI:
1741 ```
1742 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1743 ```
1744 Value (string):
1745 ```
1746 <enabled/>
1747 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1748 ```
1749 #### macOS
1750 ```
1751 <dict>
1752 <key>DisplayMenuBar</key>
1753 <string>always | never | default-on | default-off</string>
1754 </dict>
1755 ```
1756 #### policies.json
1757 ```
1758 {
1759 "policies": {
1760 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1761 }
1762 }
1763 ```
1764 ### DNSOverHTTPS
1765 Configure DNS over HTTPS.
1766
1767 `Enabled` determines whether DNS over HTTPS is enabled
1768
1769 `ProviderURL` is a URL to another provider.
1770
1771 `Locked` prevents the user from changing DNS over HTTPS preferences.
1772
1773 `ExcludedDomains` excludes domains from DNS over HTTPS.
1774
1775 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1776 **CCK2 Equivalent:** N/A\
1777 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1778
1779 #### Windows (GPO)
1780 ```
1781 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1785 ```
1786 #### Windows (Intune)
1787 OMA-URI:
1788 ```
1789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1790 ```
1791 Value (string):
1792 ```
1793 <enabled/> or <disabled/>
1794 ```
1795 OMA-URI:
1796 ```
1797 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1798 ```
1799 Value (string):
1800 ```
1801 <enabled/>
1802 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1803 ```
1804 OMA-URI:
1805 ```
1806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1807 ```
1808 Value (string):
1809 ```
1810 <enabled/> or <disabled/>
1811 ```
1812 OMA-URI:
1813 ```
1814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1815 ```
1816 Value (string):
1817 ```
1818 <enabled/>
1819 <data id="List" value="1&#xF000;example.com"/>
1820 ```
1821 #### macOS
1822 ```
1823 <dict>
1824 <key>DNSOverHTTPS</key>
1825 <dict>
1826 <key>Enabled</key>
1827 <true/> | <false/>
1828 <key>ProviderURL</key>
1829 <string>URL_TO_ALTERNATE_PROVIDER</string>
1830 <key>Locked</key>
1831 <true/> | <false/>
1832 <key>ExcludedDomains</key>
1833 <array>
1834 <string>example.com</string>
1835 </array>
1836 </dict>
1837 </dict>
1838 ```
1839 #### policies.json
1840 ```
1841 {
1842 "policies": {
1843 "DNSOverHTTPS": {
1844 "Enabled": true | false,
1845 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1846 "Locked": true | false,
1847 "ExcludedDomains": ["example.com"]
1848 }
1849 }
1850 }
1851 ```
1852 ### DontCheckDefaultBrowser
1853 Don't check if Firefox is the default browser at startup.
1854
1855 **Compatibility:** Firefox 60, Firefox ESR 60\
1856 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1857 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1858
1859 #### Windows (GPO)
1860 ```
1861 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1862 ```
1863 #### Windows (Intune)
1864 OMA-URI:
1865 ```
1866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1867 ```
1868 Value (string):
1869 ```
1870 <enabled/> or <disabled/>
1871 ```
1872 #### macOS
1873 ```
1874 <dict>
1875 <key>DontCheckDefaultBrowser</key>
1876 <true/> | <false/>
1877 </dict>
1878 ```
1879 #### policies.json
1880 ```
1881 {
1882 "policies": {
1883 "DontCheckDefaultBrowser": true | false
1884 }
1885 }
1886 ```
1887 ### DefaultDownloadDirectory
1888 Set the default download directory.
1889
1890 You can use ${home} for the native home directory.
1891
1892 **Compatibility:** Firefox 68, Firefox ESR 68\
1893 **CCK2 Equivalent:** N/A\
1894 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1895
1896 #### Windows (GPO)
1897 ```
1898 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1899 ```
1900 #### Windows (Intune)
1901 OMA-URI:
1902 ```
1903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1904 ```
1905 Value (string):
1906 ```
1907 <enabled/>
1908 <data id="Preferences_String" value="${home}\Downloads"/>
1909 ```
1910 #### macOS
1911 ```
1912 <dict>
1913 <key>DefaultDownloadDirectory</key>
1914 <string>${home}/Downloads</string>
1915 </dict>
1916 ```
1917 #### policies.json (macOS and Linux)
1918 ```
1919 {
1920 "policies": {
1921 "DefaultDownloadDirectory": "${home}/Downloads"
1922 }
1923 ```
1924 #### policies.json (Windows)
1925 ```
1926 {
1927 "policies": {
1928 "DefaultDownloadDirectory": "${home}\\Downloads"
1929 }
1930 ```
1931 ### DownloadDirectory
1932 Set and lock the download directory.
1933
1934 You can use ${home} for the native home directory.
1935
1936 **Compatibility:** Firefox 68, Firefox ESR 68\
1937 **CCK2 Equivalent:** N/A\
1938 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1939
1940 #### Windows (GPO)
1941 ```
1942 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1943 ```
1944 #### Windows (Intune)
1945 OMA-URI:
1946 ```
1947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1948 ```
1949 Value (string):
1950 ```
1951 <enabled/>
1952 <data id="Preferences_String" value="${home}\Downloads"/>
1953 ```
1954 #### macOS
1955 ```
1956 <dict>
1957 <key>DownloadDirectory</key>
1958 <string>${home}/Downloads</string>
1959 </dict>
1960 ```
1961 #### policies.json (macOS and Linux)
1962 ```
1963 {
1964 "policies": {
1965 "DownloadDirectory": "${home}/Downloads"
1966 }
1967 ```
1968 #### policies.json (Windows)
1969 ```
1970 {
1971 "policies": {
1972 "DownloadDirectory": "${home}\\Downloads"
1973 }
1974 ```
1975 ### EnableTrackingProtection
1976 Configure tracking protection.
1977
1978 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1979
1980 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1981
1982 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1983
1984 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1985
1986 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1987
1988 `Exceptions` are origins for which tracking protection is not enabled.
1989
1990 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1991 **CCK2 Equivalent:** N/A\
1992 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1993
1994 #### Windows (GPO)
1995 ```
1996 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2001 ```
2002 #### Windows (Intune)
2003 OMA-URI:
2004 ```
2005 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2006 ```
2007 Value (string):
2008 ```
2009 <enabled/>
2010 <data id="TrackingProtectionLocked" value="true | false"/>
2011 <data id="Cryptomining" value="true | false"/>
2012 <data id="Fingerprinting" value="true | false"/>
2013 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2014 ```
2015 #### macOS
2016 ```
2017 <dict>
2018 <key>EnableTrackingProtection</key>
2019 <dict>
2020 <key>Value</key>
2021 <true/> | <false/>
2022 <key><Locked</key>
2023 <true/> | <false/>
2024 <key><Cryptomining</key>
2025 <true/> | <false/>
2026 <key><Fingerprinting</key>
2027 <true/> | <false/>
2028 <key>Exceptions</key>
2029 <array>
2030 <string>https://example.com</string>
2031 </array>
2032 </dict>
2033 </dict>
2034 ```
2035 #### policies.json
2036 ```
2037 {
2038 "policies": {
2039 "EnableTrackingProtection": {
2040 "Value": true | false,
2041 "Locked": true | false,
2042 "Cryptomining": true | false,
2043 "Fingerprinting": true | false,
2044 "Exceptions": ["https://example.com"]
2045 }
2046 }
2047 ```
2048 ### EncryptedMediaExtensions
2049 Enable or disable Encrypted Media Extensions and optionally lock it.
2050
2051 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2052
2053 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2054
2055 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2056 **CCK2 Equivalent:** N/A\
2057 **Preferences Affected:** `media.eme.enabled`
2058
2059 #### Windows (GPO)
2060 ```
2061 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2062 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2063 ```
2064 #### Windows (Intune)
2065 OMA-URI:
2066 ```
2067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2069 ```
2070 Value (string):
2071 ```
2072 <enabled/>or <disabled/>
2073 ```
2074 #### macOS
2075 ```
2076 <dict>
2077 <key>EncryptedMediaExtensions</key>
2078 <dict>
2079 <key>Enabled</key>
2080 <true/> | <false/>
2081 <key><Locked</key>
2082 <true/> | <false/>
2083 </dict>
2084 </dict>
2085 ```
2086 #### policies.json
2087 ```
2088 {
2089 "policies": {
2090 "EncryptedMediaExtensions": {
2091 "Enabled": true | false,
2092 "Locked": true | false
2093 }
2094 }
2095 ```
2096 ### EnterprisePoliciesEnabled
2097 Enable policy support on macOS.
2098
2099 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2100 **CCK2 Equivalent:** N/A\
2101 **Preferences Affected:** N/A
2102
2103 #### macOS
2104 ```
2105 <dict>
2106 <key>EnterprisePoliciesEnabled</key>
2107 <true/>
2108 </dict>
2109 ```
2110 ### Extensions
2111 Control the installation, uninstallation and locking of extensions.
2112
2113 `Install` is a list of URLs or native paths for extensions to be installed.
2114
2115 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2116
2117 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2118
2119 **Compatibility:** Firefox 60, Firefox ESR 60\
2120 **CCK2 Equivalent:** `addons`\
2121 **Preferences Affected:** N/A
2122
2123 #### Windows (GPO)
2124 ```
2125 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2126 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2127 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2128 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2129 ```
2130 #### macOS
2131 ```
2132 <dict>
2133 <key>Extensions</key>
2134 <dict>
2135 <key>Install</key>
2136 <array>
2137 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2138 <string>//path/to/xpi</string>
2139 </array>
2140 <key>Uninstall</key>
2141 <array>
2142 <string>bad_addon_id@mozilla.org</string>
2143 </array>
2144 <key>Locked</key>
2145 <array>
2146 <string>addon_id@mozilla.org</string>
2147 </array>
2148 </dict>
2149 </dict>
2150 ```
2151 #### policies.json
2152 ```
2153 {
2154 "policies": {
2155 "Extensions": {
2156 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2157 "Uninstall": ["bad_addon_id@mozilla.org"],
2158 "Locked": ["addon_id@mozilla.org"]
2159 }
2160 }
2161 }
2162 ```
2163 ### ExtensionSettings
2164 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2165
2166 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2167
2168 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2169
2170 The configuration for each extension is another dictionary that can contain the fields documented below.
2171
2172 | Name | Description |
2173 | --- | --- |
2174 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2175 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2176 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2178 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2179 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2180 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2181 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2182 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2183
2184 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2185 **CCK2 Equivalent:** N/A\
2186 **Preferences Affected:** N/A
2187
2188 #### Windows (GPO)
2189 ```
2190 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2191 {
2192 "*": {
2193 "blocked_install_message": "Custom error message.",
2194 "install_sources": ["https://addons.mozilla.org/"],
2195 "installation_mode": "blocked",
2196 "allowed_types": ["extension"]
2197 },
2198 "uBlock0@raymondhill.net": {
2199 "installation_mode": "force_installed",
2200 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2201 }
2202 }
2203 ```
2204 #### Windows (Intune)
2205 OMA-URI:
2206 ```
2207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2208 ```
2209 Value (string):
2210 ```
2211 <enabled/>
2212 <data id="ExtensionSettings" value='
2213 "*": {
2214 "blocked_install_message": "Custom error message.",
2215 "install_sources": ["https://addons.mozilla.org/"],
2216 "installation_mode": "blocked",
2217 "allowed_types": ["extension"]
2218 },
2219 "uBlock0@raymondhill.net": {
2220 "installation_mode": "force_installed",
2221 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2222 }'/>
2223 ```
2224 #### macOS
2225 ```
2226 <dict>
2227 <key>ExtensionSettings</key>
2228 <dict>
2229 <key>*</key>
2230 <dict>
2231 <key>blocked_install_message</key>
2232 <string>Custom error message.</string>
2233 <key>install_sources</key>
2234 <array>
2235 <string>https://addons.mozilla.org/</string>
2236 </array>
2237 <key>installation_mode</key>
2238 <string>blocked</string>
2239 <key>allowed_types</key>
2240 <array>
2241 <string>extension</string>
2242 </array>
2243 </dict>
2244 <key>uBlock0@raymondhill.net</key>
2245 <dict>
2246 <key>installation_mode</key>
2247 <string>force_installed</string>
2248 <key>install_url</key>
2249 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2250 </dict>
2251 </dict>
2252 </dict>
2253 ```
2254 #### policies.json
2255 ```
2256 {
2257 "policies": {
2258 "ExtensionSettings": {
2259 "*": {
2260 "blocked_install_message": "Custom error message.",
2261 "install_sources": ["https://addons.mozilla.org/"],
2262 "installation_mode": "blocked",
2263 "allowed_types": ["extension"]
2264 },
2265 "uBlock0@raymondhill.net": {
2266 "installation_mode": "force_installed",
2267 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2268 }
2269 }
2270 }
2271 }
2272 ```
2273 ### ExtensionUpdate
2274 Control extension updates.
2275
2276 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2277 **CCK2 Equivalent:** N/A\
2278 **Preferences Affected:** `extensions.update.enabled`
2279
2280 #### Windows (GPO)
2281 ```
2282 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2283 ```
2284 #### Windows (Intune)
2285 OMA-URI:
2286 ```
2287 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2288 ```
2289 Value (string):
2290 ```
2291 <enabled/> or <disabled/>
2292 ```
2293 #### macOS
2294 ```
2295 <dict>
2296 <key>ExtensionUpdate</key>
2297 <true/> | <false/>
2298 </dict>
2299 ```
2300 #### policies.json
2301 ```
2302 {
2303 "policies": {
2304 "ExtensionUpdate": true | false
2305 }
2306 }
2307 ```
2308 ### FlashPlugin
2309 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2310
2311 `Allow` is a list of origins where Flash are allowed.
2312
2313 `Block` is a list of origins where Flash is not allowed.
2314
2315 `Default` determines whether or not Flash is allowed by default.
2316
2317 `Locked` prevents the user from changing Flash preferences.
2318
2319 **Compatibility:** Firefox 60, Firefox ESR 60\
2320 **CCK2 Equivalent:** `permissions.plugin`\
2321 **Preferences Affected:** `plugin.state.flash`
2322
2323 #### Windows (GPO)
2324 ```
2325 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2326 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2327 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2328 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2329 ```
2330 #### Windows (Intune)
2331 OMA-URI:
2332 ```
2333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2334 ```
2335 Value (string):
2336 ```
2337 <enabled/>
2338 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2339 ```
2340 OMA-URI:
2341 ```
2342 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2343 ```
2344 Value (string):
2345 ```
2346 <enabled/> or <disabled/>
2347 ```
2348 OMA-URI:
2349 ```
2350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2351 ```
2352 Value (string):
2353 ```
2354 <enabled/> or <disabled/>
2355 ```
2356 #### macOS
2357 ```
2358 <dict>
2359 <key>FlashPlugin</key>
2360 <dict>
2361 <key>Allow</key>
2362 <array>
2363 <string>http://example.org</string>
2364 </array>
2365 <key>Block</key>
2366 <array>
2367 <string>http://example.edu</string>
2368 </array>
2369 <key>Default</key>
2370 <true/> | <false/>
2371 <key>Locked</key>
2372 <true/> | <false/>
2373 </dict>
2374 </dict>
2375 ```
2376 #### policies.json
2377 ```
2378 {
2379 "policies": {
2380 "FlashPlugin": {
2381 "Allow": ["http://example.org/"],
2382 "Block": ["http://example.edu/"],
2383 "Default": true | false,
2384 "Locked": true | false
2385 }
2386 }
2387 }
2388 ```
2389
2390
2391
2392 ### Handlers
2393 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2394
2395 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2396
2397 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2398
2399 | Name | Description |
2400 | --- | --- |
2401 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2402 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2403 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2404 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2405 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2406 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2407
2408 **Compatibility:** Firefox 78, Firefox ESR 78\
2409 **CCK2 Equivalent:** N/A\
2410 **Preferences Affected:** N/A
2411
2412 #### Windows (GPO)
2413 ```
2414 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2415 {
2416 "mimeTypes": {
2417 "application/msword": {
2418 "action": "useSystemDefault",
2419 "ask": true | false
2420 }
2421 },
2422 "schemes": {
2423 "mailto": {
2424 "action": "useHelperApp",
2425 "ask": true | false,
2426 "handlers": [{
2427 "name": "Gmail",
2428 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2429 }]
2430 }
2431 },
2432 "extensions": {
2433 "pdf": {
2434 "action": "useHelperApp",
2435 "ask": true | false,
2436 "handlers": [{
2437 "name": "Adobe Acrobat",
2438 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2439 }]
2440 }
2441 }
2442 }
2443 ```
2444 #### Windows (Intune)
2445 OMA-URI:
2446 ```
2447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2448 ```
2449 Value (string):
2450 ```
2451 <enabled/>
2452 <data id="Handlers" value='
2453 {
2454 "mimeTypes": {
2455 "application/msword": {
2456 "action": "useSystemDefault",
2457 "ask": true | false
2458 }
2459 },
2460 "schemes": {
2461 "mailto": {
2462 "action": "useHelperApp",
2463 "ask": true | false,
2464 "handlers": [{
2465 "name": "Gmail",
2466 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2467 }]
2468 }
2469 },
2470 "extensions": {
2471 "pdf": {
2472 "action": "useHelperApp",
2473 "ask": true | false,
2474 "handlers": [{
2475 "name": "Adobe Acrobat",
2476 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2477 }]
2478 }
2479 }
2480 }
2481 '/>
2482 ```
2483 #### macOS
2484 ```
2485 <dict>
2486 <key>Handlers</key>
2487 <dict>
2488 <key>mimeTypes</key>
2489 <dict>
2490 <key>application/msword</key>
2491 <dict>
2492 <key>action</key>
2493 <string>useSystemDefault</string>
2494 <key>ask</key>
2495 <true/> | <false/>
2496 </dict>
2497 </dict>
2498 <key>schemes</key>
2499 <dict>
2500 <key>mailto</key>
2501 <dict>
2502 <key>action</key>
2503 <string>useHelperApp</string>
2504 <key>ask</key>
2505 <true/> | <false/>
2506 <key>handlers</key>
2507 <array>
2508 <dict>
2509 <key>name</key>
2510 <string>Gmail</string>
2511 <key>uriTemplate</key>
2512 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2513 </dict>
2514 </array>
2515 </dict>
2516 </dict>
2517 <key>extensions</key>
2518 <dict>
2519 <key>pdf</key>
2520 <dict>
2521 <key>action</key>
2522 <string>useHelperApp</string>
2523 <key>ask</key>
2524 <true/> | <false/>
2525 <key>handlers</key>
2526 <array>
2527 <dict>
2528 <key>name</key>
2529 <string>Adobe Acrobat</string>
2530 <key>path</key>
2531 <string>/System/Applications/Preview.app</string>
2532 </dict>
2533 </array>
2534 </dict>
2535 </dict>
2536 </dict>
2537 </dict>
2538 ```
2539 #### policies.json
2540 ```
2541 {
2542 "mimeTypes": {
2543 "application/msword": {
2544 "action": "useSystemDefault",
2545 "ask": false
2546 }
2547 },
2548 "schemes": {
2549 "mailto": {
2550 "action": "useHelperApp",
2551 "ask": true | false,
2552 "handlers": [{
2553 "name": "Gmail",
2554 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2555 }]
2556 }
2557 },
2558 "extensions": {
2559 "pdf": {
2560 "action": "useHelperApp",
2561 "ask": true | false,
2562 "handlers": [{
2563 "name": "Adobe Acrobat",
2564 "path": "/usr/bin/acroread"
2565 }]
2566 }
2567 }
2568 }
2569 ```
2570 ### FirefoxHome
2571 Customize the Firefox Home page.
2572
2573 **Compatibility:** Firefox 68, Firefox ESR 68\
2574 **CCK2 Equivalent:** N/A\
2575 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2576
2577 #### Windows (GPO)
2578 ```
2579 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2580 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2581 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2582 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2583 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2584 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2585 ```
2586 #### Windows (Intune)
2587 OMA-URI:
2588 ```
2589 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2590 ```
2591 Value (string):
2592 ```
2593 <enabled/>
2594 <data id="FirefoxHome_Search" value="true | false"/>
2595 <data id="FirefoxHome_TopSites" value="true | false"/>
2596 <data id="FirefoxHome_Highlights" value="true | false"/>
2597 <data id="FirefoxHome_Pocket" value="true | false"/>
2598 <data id="FirefoxHome_Snippets" value="true | false"/>
2599 <data id="FirefoxHome_Locked" value="true | false"/>
2600 ```
2601 #### macOS
2602 ```
2603 <dict>
2604 <key>FirefoxHome</key>
2605 <dict>
2606 <key>Search</key>
2607 <true/> | <false/>
2608 <key>TopSites</key>
2609 <true/> | <false/>
2610 <key>Highlights</key>
2611 <true/> | <false/>
2612 <key>Pocket</key>
2613 <true/> | <false/>
2614 <key>Snippets</key>
2615 <true/> | <false/>
2616 <key>Locked</key>
2617 <true/> | <false/>
2618 </dict>
2619 </dict>
2620 ```
2621 #### policies.json
2622 ```
2623 {
2624 "policies": {
2625 "FirefoxHome": {
2626 "Search": true | false,
2627 "TopSites": true | false,
2628 "Highlights": true | false,
2629 "Pocket": true | false,
2630 "Snippets": true | false,
2631 "Locked": true | false
2632 }
2633 }
2634 }
2635 ```
2636 ### HardwareAcceleration
2637 Control hardware acceleration.
2638
2639 **Compatibility:** Firefox 60, Firefox ESR 60\
2640 **CCK2 Equivalent:** N/A\
2641 **Preferences Affected:** `layers.acceleration.disabled`
2642
2643 #### Windows (GPO)
2644 ```
2645 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2646 ```
2647 #### Windows (Intune)
2648 OMA-URI:
2649 ```
2650 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2651 ```
2652 Value (string):
2653 ```
2654 <enabled/> or <disabled/>
2655 ```
2656 #### macOS
2657 ```
2658 <dict>
2659 <key>HardwareAcceleration</key>
2660 <true/> | <false/>
2661 </dict>
2662 ```
2663 #### policies.json
2664 ```
2665 {
2666 "policies": {
2667 "HardwareAcceleration": true | false
2668 }
2669 }
2670 ```
2671 ### Homepage
2672 Configure the default homepage and how Firefox starts.
2673
2674 `URL` is the default homepage.
2675
2676 `Locked` prevents the user from changing homepage preferences.
2677
2678 `Additional` allows for more than one homepage.
2679
2680 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2681
2682 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2683
2684 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2685 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2686 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2687
2688 #### Windows (GPO)
2689 ```
2690 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2691 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2692 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2693 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2694 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2695 ```
2696 #### Windows (Intune)
2697 OMA-URI:
2698 ```
2699 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2700 ```
2701 Value (string):
2702 ```
2703 <enabled/>
2704
2705 <data id="HomepageURL" value="https://example.com"/>
2706 <data id="HomepageLocked" value="true | false"/>
2707 ```
2708 OMA-URI:
2709 ```
2710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2711 ```
2712 Value (string):
2713 ```
2714 <enabled/>
2715
2716 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2717 ```
2718 OMA-URI:
2719 ```
2720 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2721 ```
2722 Value (string):
2723 ```
2724 <enabled/>
2725
2726 <data id="StartPage" value="none | homepage | previous-session"/>
2727 ```
2728 #### macOS
2729 ```
2730 <dict>
2731 <key>Homepage</key>
2732 <dict>
2733 <key>URL</key>
2734 <string>http://example.com</string>
2735 <key>Locked</key>
2736 <true/> | <false/>
2737 <key>Additional</key>
2738 <array>
2739 <string>http://example.org</string>
2740 <string>http://example.edu</string>
2741 </array>
2742 <key>StartPage</key>
2743 <string>none | homepage | previous-session | homepage-locked</string>
2744 </dict>
2745 </dict>
2746 ```
2747 #### policies.json
2748 ```
2749 {
2750 "policies": {
2751 "Homepage": {
2752 "URL": "http://example.com/",
2753 "Locked": true | false,
2754 "Additional": ["http://example.org/",
2755 "http://example.edu/"],
2756 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2757 }
2758 }
2759 }
2760 ```
2761 ### InstallAddonsPermission
2762 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2763
2764 `Allow` is a list of origins where extension installs are allowed.
2765
2766 `Default` determines whether or not extension installs are allowed by default.
2767
2768 **Compatibility:** Firefox 60, Firefox ESR 60\
2769 **CCK2 Equivalent:** `permissions.install`\
2770 **Preferences Affected:** `xpinstall.enabled`
2771
2772 #### Windows (GPO)
2773 ```
2774 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2775 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2776 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2777 ```
2778 #### Windows (Intune)
2779 OMA-URI:
2780 ```
2781 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2782 ```
2783 Value (string):
2784 ```
2785 <enabled/>
2786 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2787 ```
2788 OMA-URI:
2789 ```
2790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2791 ```
2792 Value (string):
2793 ```
2794 <enabled/>
2795 ```
2796 #### macOS
2797 ```
2798 <dict>
2799 <key>InstallAddonsPermission</key>
2800 <dict>
2801 <key>Allow</key>
2802 <array>
2803 <string>http://example.org</string>
2804 <string>http://example.edu</string>
2805 </array>
2806 <key>Default</key>
2807 <true/> | <false/>
2808 </dict>
2809 </dict>
2810 ```
2811 #### policies.json
2812 ```
2813 {
2814 "policies": {
2815 "InstallAddonsPermission": {
2816 "Allow": ["http://example.org/",
2817 "http://example.edu/"],
2818 "Default": true | false
2819 }
2820 }
2821 }
2822 ```
2823 ### LegacyProfiles
2824 Disable the feature enforcing a separate profile for each installation.
2825
2826 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2827
2828 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2829
2830 This policy only work on Windows via GPO (not policies.json).
2831
2832 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2833 **CCK2 Equivalent:** N/A\
2834 **Preferences Affected:** N/A
2835
2836 #### Windows (GPO)
2837 ```
2838 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2839 ```
2840 #### Windows (Intune)
2841 OMA-URI:
2842 ```
2843 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2844 ```
2845 Value (string):
2846 ```
2847 <enabled/> or <disabled/>
2848 ```
2849 ### LocalFileLinks
2850 Enable linking to local files by origin.
2851
2852 **Compatibility:** Firefox 68, Firefox ESR 68\
2853 **CCK2 Equivalent:** N/A\
2854 **Preferences Affected:** `capability.policy.localfilelinks.*`
2855
2856 #### Windows (GPO)
2857 ```
2858 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2859 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2860 ```
2861 #### Windows (Intune)
2862 OMA-URI:
2863 ```
2864 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2865 ```
2866 Value (string):
2867 ```
2868 <enabled/>
2869 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2870 ```
2871 #### macOS
2872 ```
2873 <dict>
2874 <key>LocalFileLinks</key>
2875 <array>
2876 <string>http://example.org</string>
2877 <string>http://example.edu</string>
2878 </array>
2879 </dict>
2880 ```
2881 #### policies.json
2882 ```
2883 {
2884 "policies": {
2885 "LocalFileLinks": ["http://example.org/",
2886 "http://example.edu/"]
2887 }
2888 }
2889 ```
2890 ### MasterPassword
2891 Require or prevent using a master password.
2892
2893 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2894
2895 **Compatibility:** Firefox 78, Firefox ESR 78\
2896 **CCK2 Equivalent:** `noMasterPassword`\
2897 **Preferences Affected:** N/A
2898
2899 #### Windows (GPO)
2900 ```
2901 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2902 ```
2903 #### Windows (Intune)
2904 OMA-URI:
2905 ```
2906 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2907 ```
2908 Value (string):
2909 ```
2910 <enabled/> or <disabled/>
2911 ```
2912 #### macOS
2913 ```
2914 <dict>
2915 <key>MasterPassword</key>
2916 <true/> | <false/>
2917 </dict>
2918 ```
2919 #### policies.json
2920 ```
2921 {
2922 "policies": {
2923 "MasterPassword": true | false
2924 }
2925 }
2926 ```
2927 ### NetworkPrediction
2928 Enable or disable network prediction (DNS prefetching).
2929
2930 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2931 **CCK2 Equivalent:** N/A\
2932 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2933
2934 #### Windows (GPO)
2935 ```
2936 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2937 ```
2938 #### Windows (Intune)
2939 OMA-URI:
2940 ```
2941 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2942 ```
2943 Value (string):
2944 ```
2945 <enabled/> or <disabled/>
2946 ```
2947 #### macOS
2948 ```
2949 <dict>
2950 <key>NetworkPrediction</key>
2951 <true/> | <false/>
2952 </dict>
2953 ```
2954 #### policies.json
2955 ```
2956 {
2957 "policies": {
2958 "NetworkPrediction": true | false
2959 }
2960 ```
2961 ### NewTabPage
2962 Enable or disable the New Tab page.
2963
2964 **Compatibility:** Firefox 68, Firefox ESR 68\
2965 **CCK2 Equivalent:** N/A\
2966 **Preferences Affected:** `browser.newtabpage.enabled`
2967
2968 #### Windows (GPO)
2969 ```
2970 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2971 ```
2972 #### Windows (Intune)
2973 OMA-URI:
2974 ```
2975 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2976 ```
2977 Value (string):
2978 ```
2979 <enabled/> or <disabled/>
2980 ```
2981 #### macOS
2982 ```
2983 <dict>
2984 <key>NewTabPage</key>
2985 <true/> | <false/>
2986 </dict>
2987 ```
2988 #### policies.json
2989 ```
2990 {
2991 "policies": {
2992 "NewTabPage": true | false
2993 }
2994 ```
2995 ### NoDefaultBookmarks
2996 Disable the creation of default bookmarks.
2997
2998 This policy is only effective if the user profile has not been created yet.
2999
3000 **Compatibility:** Firefox 60, Firefox ESR 60\
3001 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3002 **Preferences Affected:** N/A
3003
3004 #### Windows (GPO)
3005 ```
3006 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3007 ```
3008 #### Windows (Intune)
3009 OMA-URI:
3010 ```
3011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3012 ```
3013 Value (string):
3014 ```
3015 <enabled/> or <disabled/>
3016 ```
3017 #### macOS
3018 ```
3019 <dict>
3020 <key>NoDefaultBookmarks</key>
3021 <true/> | <false/>
3022 </dict>
3023 ```
3024 #### policies.json
3025 ```
3026 {
3027 "policies": {
3028 "NoDefaultBookmarks": true | false
3029 }
3030 }
3031 ```
3032 ### OfferToSaveLogins
3033 Control whether or not Firefox offers to save passwords.
3034
3035 **Compatibility:** Firefox 60, Firefox ESR 60\
3036 **CCK2 Equivalent:** `dontRememberPasswords`\
3037 **Preferences Affected:** `signon.rememberSignons`
3038
3039 #### Windows (GPO)
3040 ```
3041 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3042 ```
3043 #### Windows (Intune)
3044 OMA-URI:
3045 ```
3046 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3047 ```
3048 Value (string):
3049 ```
3050 <enabled/> or <disabled/>
3051 ```
3052 #### macOS
3053 ```
3054 <dict>
3055 <key>OfferToSaveLogins</key>
3056 <true/> | <false/>
3057 </dict>
3058 ```
3059 #### policies.json
3060 ```
3061 {
3062 "policies": {
3063 "OfferToSaveLogins": true | false
3064 }
3065 }
3066 ```
3067 ### OfferToSaveLoginsDefault
3068 Sets the default value of signon.rememberSignons without locking it.
3069
3070 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3071 **CCK2 Equivalent:** `dontRememberPasswords`\
3072 **Preferences Affected:** `signon.rememberSignons`
3073
3074 #### Windows (GPO)
3075 ```
3076 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3077 ```
3078 #### Windows (Intune)
3079 OMA-URI:
3080 ```
3081 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3082 ```
3083 Value (string):
3084 ```
3085 <enabled/> or <disabled/>
3086 ```
3087 #### macOS
3088 ```
3089 <dict>
3090 <key>OfferToSaveLoginsDefault</key>
3091 <true/> | <false/>
3092 </dict>
3093 ```
3094 #### policies.json
3095 ```
3096 {
3097 "policies": {
3098 "OfferToSaveLoginsDefault": true | false
3099 }
3100 }
3101 ```
3102 ### OverrideFirstRunPage
3103 Override the first run page. If the value is blank, no first run page is displayed.
3104
3105 **Compatibility:** Firefox 60, Firefox ESR 60\
3106 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3107 **Preferences Affected:** `startup.homepage_welcome_url`
3108
3109 #### Windows (GPO)
3110 ```
3111 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3112 ```
3113 #### Windows (Intune)
3114 OMA-URI:
3115 ```
3116 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3117 ```
3118 Value (string):
3119 ```
3120 <enabled/>
3121 <data id="OverridePage" value="https://example.com"/>
3122 ```
3123 #### macOS
3124 ```
3125 <dict>
3126 <key>OverrideFirstRunPage</key>
3127 <string>http://example.org</string>
3128 </dict>
3129 ```
3130 #### policies.json
3131 ```
3132 {
3133 "policies": {
3134 "OverrideFirstRunPage": "http://example.org"
3135 }
3136 ```
3137 ### OverridePostUpdatePage
3138 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3139
3140 **Compatibility:** Firefox 60, Firefox ESR 60\
3141 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3142 **Preferences Affected:** `startup.homepage_override_url`
3143
3144 #### Windows (GPO)
3145 ```
3146 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3147 ```
3148 #### Windows (Intune)
3149 OMA-URI:
3150 ```
3151 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3152 ```
3153 Value (string):
3154 ```
3155 <enabled/>
3156 <data id="OverridePage" value="https://example.com"/>
3157 ```
3158 #### macOS
3159 ```
3160 <dict>
3161 <key>OverridePostUpdatePage</key>
3162 <string>http://example.org</string>
3163 </dict>
3164 ```
3165 #### policies.json
3166 ```
3167 {
3168 "policies": {
3169 "OverridePostUpdatePage": "http://example.org"
3170 }
3171 ```
3172 ### PasswordManagerEnabled
3173 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3174
3175 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3176 **CCK2 Equivalent:** N/A\
3177 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3178
3179 #### Windows (GPO)
3180 ```
3181 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3182 ```
3183 #### Windows (Intune)
3184 OMA-URI:
3185 ```
3186 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3187 ```
3188 Value (string):
3189 ```
3190 <enabled/> or <disabled/>
3191 ```
3192 #### macOS
3193 ```
3194 <dict>
3195 <key>PasswordManagerEnabled</key>
3196 <true/> | <false/>
3197 </dict>
3198 ```
3199 #### policies.json
3200 ```
3201 {
3202 "policies": {
3203 "PasswordManagerEnabled": true | false
3204 }
3205 }
3206 ```
3207 ### PDFjs
3208 Disable or configure PDF.js, the built-in PDF viewer.
3209
3210 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3211
3212 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3213
3214 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3215
3216 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3217 **CCK2 Equivalent:** N/A\
3218 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3219
3220 #### Windows (GPO)
3221 ```
3222 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3223 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3224 ```
3225 #### Windows (Intune)
3226 OMA-URI:
3227 ```
3228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3229 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3230 ```
3231 Value (string):
3232 ```
3233 <enabled/>or <disabled/>
3234 ```
3235 #### macOS
3236 ```
3237 <dict>
3238 <key>PDFjs</key>
3239 <dict>
3240 <key>Enabled</key>
3241 <true/> | <false/>
3242 <key><EnablePermissions</key>
3243 <true/> | <false/>
3244 </dict>
3245 </dict>
3246 ```
3247 #### policies.json
3248 ```
3249 {
3250 "policies": {
3251 "PSFjs": {
3252 "Enabled": true | false,
3253 "EnablePermissions": true | false
3254 }
3255 }
3256 ```
3257 ### Permissions
3258 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3259
3260 `Allow` is a list of origins where the feature is allowed.
3261
3262 `Block` is a list of origins where the feature is not allowed.
3263
3264 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3265
3266 `Locked` prevents the user from changing preferences for the feature.
3267
3268 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3269
3270 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3271 **CCK2 Equivalent:** N/A\
3272 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3273
3274 #### Windows (GPO)
3275 ```
3276 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3277 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3278 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3279 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3280 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3281 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3282 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3283 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3284 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3285 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3286 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3287 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3288 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3289 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3290 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3291 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3292 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3293 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3294 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3295 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3296 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3297 ```
3298 #### Windows (Intune)
3299 OMA-URI:
3300 ```
3301 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3302 ```
3303 Value (string):
3304 ```
3305 <enabled/> or <disabled/>
3306 ```
3307 OMA-URI:
3308 ```
3309 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3310 ```
3311 Value (string):
3312 ```
3313 <enabled/> or <disabled/>
3314 ```
3315 OMA-URI:
3316 ```
3317 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3318 ```
3319 Value (string):
3320 ```
3321 <enabled/>
3322 <data id="Permissions" value="1&#xF000;https://example.org"/>
3323 ```
3324 OMA-URI:
3325 ```
3326 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3327 ```
3328 Value (string):
3329 ```
3330 <enabled/> or <disabled/>
3331 ```
3332 OMA-URI:
3333 ```
3334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3335 ```
3336 Value (string):
3337 ```
3338 <enabled/> or <disabled/>
3339 ```
3340 OMA-URI:
3341 ```
3342 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3343 ```
3344 Value (string):
3345 ```
3346 <enabled/>
3347 <data id="Permissions" value="1&#xF000;https://example.org"/>
3348 ```
3349 OMA-URI:
3350 ```
3351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3352 ```
3353 Value (string):
3354 ```
3355 <enabled/>
3356 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3357 ```
3358 OMA-URI:
3359 ```
3360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3361 ```
3362 Value (string):
3363 ```
3364 <enabled/>
3365 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3366 ```
3367 OMA-URI:
3368 ```
3369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3370 ```
3371 Value (string):
3372 ```
3373 <enabled/> or <disabled/>
3374 ```
3375 #### macOS
3376 ```
3377 <dict>
3378 <key>Permissions</key>
3379 <dict>
3380 <key>Camera</key>
3381 <dict>
3382 <key>Allow</key>
3383 <array>
3384 <string>https://example.org</string>
3385 <string>https://example.org:1234</string>
3386 </array>
3387 <key>Block</key>
3388 <array>
3389 <string>https://example.edu</string>
3390 </array>
3391 <key>BlockNewRequests</key>
3392 <true/> | <false/>
3393 <key>Locked</key>
3394 <true/> | <false/>
3395 </dict>
3396 <key>Microphone</key>
3397 <dict>
3398 <key>Allow</key>
3399 <array>
3400 <string>https://example.org</string>
3401 </array>
3402 <key>Block</key>
3403 <array>
3404 <string>https://example.edu</string>
3405 </array>
3406 <key>BlockNewRequests</key>
3407 <true/> | <false/>
3408 <key>Locked</key>
3409 <true/> | <false/>
3410 </dict>
3411 <key>Location</key>
3412 <dict>
3413 <key>Allow</key>
3414 <array>
3415 <string>https://example.org</string>
3416 </array>
3417 <key>Block</key>
3418 <array>
3419 <string>https://example.edu</string>
3420 </array>
3421 <key>BlockNewRequests</key>
3422 <true/> | <false/>
3423 <key>Locked</key>
3424 <true/> | <false/>
3425 </dict>
3426 <key>Notifications</key>
3427 <dict>
3428 <key>Allow</key>
3429 <array>
3430 <string>https://example.org</string>
3431 </array>
3432 <key>Block</key>
3433 <array>
3434 <string>https://example.edu</string>
3435 </array>
3436 <key>BlockNewRequests</key>
3437 <true/>
3438 <key>Locked</key>
3439 <true/>
3440 </dict>
3441 <key>Autoplay</key>
3442 <dict>
3443 <key>Allow</key>
3444 <array>
3445 <string>https://example.org</string>
3446 </array>
3447 <key>Block</key>
3448 <array>
3449 <string>https://example.edu</string>
3450 </array>
3451 <key>Default</key>
3452 <string>allow-audio-video | block-audio | block-audio-video</string>
3453 <key>Locked</key>
3454 <true/> | <false/>
3455 </dict>
3456 </dict>
3457 </dict>
3458 ```
3459 #### policies.json
3460 ```
3461 {
3462 "policies": {
3463 "Permissions": {
3464 "Camera": {
3465 "Allow": ["https://example.org","https://example.org:1234"],
3466 "Block": ["https://example.edu"],
3467 "BlockNewRequests": true | false,
3468 "Locked": true | false
3469 },
3470 "Microphone": {
3471 "Allow": ["https://example.org"],
3472 "Block": ["https://example.edu"],
3473 "BlockNewRequests": true | false,
3474 "Locked": true | false
3475 },
3476 "Location": {
3477 "Allow": ["https://example.org"],
3478 "Block": ["https://example.edu"],
3479 "BlockNewRequests": true | false,
3480 "Locked": true | false
3481 },
3482 "Notifications": {
3483 "Allow": ["https://example.org"],
3484 "Block": ["https://example.edu"],
3485 "BlockNewRequests": true | false,
3486 "Locked": true | false
3487 },
3488 "Autoplay": {
3489 "Allow": ["https://example.org"],
3490 "Block": ["https://example.edu"],
3491 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3492 "Locked": true | false
3493 }
3494 }
3495 }
3496 }
3497 ```
3498 ### PictureInPicture
3499
3500 Enable or disable Picture-in-Picture.
3501
3502 **Compatibility:** Firefox 78, Firefox ESR 78\
3503 **CCK2 Equivalent:** N/A\
3504 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3505
3506 #### Windows (GPO)
3507 ```
3508 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3509 ```
3510 #### Windows (Intune)
3511 OMA-URI:
3512 ```
3513 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3514 ```
3515 Value (string):
3516 ```
3517 <enabled/> or <disabled/>
3518 ```
3519 #### macOS
3520 ```
3521 <dict>
3522 <key>PictureInPicture</key>
3523 <true/> | <false/>
3524 </dict>
3525 ```
3526 #### policies.json
3527 ```
3528 {
3529 "policies": {
3530 "PictureInPicture": true | false
3531 }
3532 }
3533 ```
3534 ### PopupBlocking
3535 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3536
3537 `Allow` is a list of origins where popup-windows are allowed.
3538
3539 `Default` determines whether or not pop-up windows are allowed by default.
3540
3541 `Locked` prevents the user from changing pop-up preferences.
3542
3543 **Compatibility:** Firefox 60, Firefox ESR 60\
3544 **CCK2 Equivalent:** `permissions.popup`\
3545 **Preferences Affected:** `dom.disable_open_during_load`
3546
3547 #### Windows (GPO)
3548 ```
3549 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3550 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3551 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3552 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3553 ```
3554 #### Windows (Intune)
3555 OMA-URI:
3556 ```
3557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3558 ```
3559 Value (string):
3560 ```
3561 <enabled/>
3562 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3563 ```
3564 OMA-URI:
3565 ```
3566 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3567 ```
3568 Value (string):
3569 ```
3570 <enabled/> or <disabled/>
3571 ```
3572 OMA-URI:
3573 ```
3574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3575 ```
3576 Value (string):
3577 ```
3578 <enabled/> or <disabled/>
3579 ```
3580 #### macOS
3581 ```
3582 <dict>
3583 <key>PopupBlocking</key>
3584 <dict>
3585 <key>Allow</key>
3586 <array>
3587 <string>http://example.org</string>
3588 <string>http://example.edu</string>
3589 </array>
3590 <key>Default</key>
3591 <true/> | <false/>
3592 <key>Locked</key>
3593 <true/> | <false/>
3594 </dict>
3595 </dict>
3596 ```
3597 #### policies.json
3598 ```
3599 {
3600 "policies": {
3601 "PopupBlocking": {
3602 "Allow": ["http://example.org/",
3603 "http://example.edu/"],
3604 "Default": true | false,
3605 "Locked": true | false
3606 }
3607 }
3608 }
3609 ```
3610 ### Preferences
3611 Set and lock certain preferences.
3612
3613 **Compatibility:** See below\
3614 **CCK2 Equivalent:** `preferences`\
3615 **Preferences Affected:** See below
3616
3617 | Preference | Type | Compatibility | Default
3618 | --- | --- | --- | ---
3619 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3620 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3621 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3622 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3623 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3624 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3625 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3626 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3627 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3628 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3629 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3630 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3631 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3632 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3633 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3634 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3635 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3636 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3637 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3639 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3640 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3641 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3643 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3644 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3645 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3647 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3648 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3649 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3650 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3651 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3653 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3655 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3657 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3659 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3661 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3663 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3665 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3667 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3668 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3669 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3670 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3671 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3673 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3675 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3676 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3677 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3678 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3679 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3680 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3681 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3682 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3683 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3684 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3685 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3686 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3687 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3688 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3689 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3691 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3693 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3695 disabled
3696 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3697 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3698 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3699 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3700 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3701 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3702 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3703 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3704 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3705 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3706 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3707 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3708 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3709 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3710 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3711 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3712 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3713 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3714 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3716 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3718 #### Windows (GPO)
3719 ```
3720 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3721 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3722 ```
3723 #### Windows (Intune)
3724 OMA-URI: (periods are replaced by underscores)
3725 ```
3726 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3727 ```
3728 Value (string):
3729 ```
3730 <enabled/> or <disabled/>
3731 ```
3732 #### macOS
3733 ```
3734 <dict>
3735 <key>Preferences</key>
3736 <dict>
3737 <key>boolean_preference_name</key>
3738 <true/> | <false/>
3739 <key>string_preference_name</key>
3740 <string>string_value</string>
3741 </dict>
3742 </dict>
3743 ```
3744 #### policies.json
3745 ```
3746 {
3747 "policies": {
3748 "Preferences": {
3749 "boolean_preference_name": true | false,
3750 "string_preference_name": "string_value"
3751 }
3752 }
3753 }
3754 ```
3755 ### PromptForDownloadLocation
3756 Ask where to save each file before downloading.
3757
3758 **Compatibility:** Firefox 68, Firefox ESR 68\
3759 **CCK2 Equivalent:** N/A\
3760 **Preferences Affected:** `browser.download.useDownloadDir`
3761
3762 #### Windows (GPO)
3763 ```
3764 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3765 ```
3766 #### Windows (Intune)
3767 OMA-URI:
3768 ```
3769 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3770 ```
3771 Value (string):
3772 ```
3773 <enabled/> or <disabled/>
3774 ```
3775 #### macOS
3776 ```
3777 <dict>
3778 <key>PromptForDownloadLocation</key>
3779 <true/> | <false/>
3780 </dict>
3781 ```
3782 #### policies.json
3783 ```
3784 {
3785 "policies": {
3786 "PromptForDownloadLocation": true | false
3787 }
3788 }
3789 ```
3790 ### Proxy
3791 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3792 To specify ports, append them to the hostnames with a colon (:).
3793
3794 `Mode` is the proxy method being used.
3795
3796 `Locked` is whether or not proxy settings can be changed.
3797
3798 `HTTPProxy` is the HTTP proxy server.
3799
3800 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3801
3802 `SSLProxy` is the SSL proxy server.
3803
3804 `FTPProxy` is the FTP proxy server.
3805
3806 `SOCKSProxy` is the SOCKS proxy server
3807
3808 `SOCKSVersion` is the SOCKS version (4 or 5)
3809
3810 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3811
3812 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3813
3814 `AutoLogin` means do not prompt for authentication if password is saved.
3815
3816 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3817
3818 **Compatibility:** Firefox 60, Firefox ESR 60\
3819 **CCK2 Equivalent:** `networkProxy*`\
3820 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3821
3822 #### Windows (GPO)
3823 ```
3824 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3825 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3826 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3827 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3828 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3829 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3830 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3831 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3832 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3833 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3834 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3835 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3836 ```
3837 #### Windows (Intune)
3838 OMA-URI:
3839 ```
3840 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3841 ```
3842 Value (string):
3843 ```
3844 <enabled/>
3845 <data id="ProxyLocked" value="true | false"/>
3846 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3847 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3848 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3849 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3850 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3851 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3852 <data id="SOCKSVersion" value="4 | 5"/>
3853 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3854 <data id="Passthrough" value="<local>"/>
3855 <data id="AutoLogin" value="true | false"/>
3856 <data id="UseProxyForDNS" value="true | false"/>
3857 ```
3858 #### macOS
3859 ```
3860 <dict>
3861 <key>Proxy</key>
3862 <dict>
3863 <key>Mode</key>
3864 <string>none | system | manual | autoDetect | autoConfig</string>
3865 <key>Locked</key>
3866 <true> | </false>
3867 <key>HTTPProxy</key>
3868 <string>https://httpproxy.example.com</string>
3869 <key>UseHTTPProxyForAllProtocols</key>
3870 <true> | </false>
3871 <key>SSLProxy</key>
3872 <string>https://sslproxy.example.com</string>
3873 <key>FTPProxy</key>
3874 <string>https://ftpproxy.example.com</string>
3875 <key>SOCKSProxy</key>
3876 <string>https://socksproxy.example.com</string>
3877 <key>SOCKSVersion</key>
3878 <string>4 | 5</string>
3879 <key>Passthrough</key>
3880 <string>&lt;local>&gt;</string>
3881 <key>AutoConfigURL</key>
3882 <string>URL_TO_AUTOCONFIG</string>
3883 <key>AutoLogin</key>
3884 <true> | </false>
3885 <key>UseProxyForDNS</key>
3886 <true> | </false>
3887 </dict>
3888 </dict>
3889 ```
3890 #### policies.json
3891 ```
3892 {
3893 "policies": {
3894 "Proxy": {
3895 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3896 "Locked": true | false,
3897 "HTTPProxy": "hostname",
3898 "UseHTTPProxyForAllProtocols": true | false,
3899 "SSLProxy": "hostname",
3900 "FTPProxy": "hostname",
3901 "SOCKSProxy": "hostname",
3902 "SOCKSVersion": 4 | 5
3903 "Passthrough": "<local>",
3904 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3905 "AutoLogin": true | false,
3906 "UseProxyForDNS": true | false
3907 }
3908 }
3909 }
3910 ```
3911 ### RequestedLocales
3912 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3913
3914 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3915
3916 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3917 **CCK2 Equivalent:** N/A\
3918 **Preferences Affected:** N/A
3919 #### Windows (GPO)
3920 ```
3921 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3922 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3923
3924 or
3925
3926 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3927 ```
3928 #### Windows (Intune)
3929 OMA-URI:
3930 ```
3931 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3932 ```
3933 Value (string):
3934 ```
3935 <enabled/>
3936 <data id="Preferences_String" value="de,en-US"/>
3937 ```
3938 #### macOS
3939 ```
3940 <dict>
3941 <key>RequestedLocales</key>
3942 <array>
3943 <string>de</string>
3944 <string>en-US</string>
3945 </array>
3946 </dict>
3947
3948 or
3949
3950 <dict>
3951 <key>RequestedLocales</key>
3952 <string>de,en-US</string>
3953 </dict>
3954
3955 ```
3956 #### policies.json
3957 ```
3958 {
3959 "policies": {
3960 "RequestedLocales": ["de", "en-US"]
3961 }
3962 }
3963
3964 or
3965
3966 {
3967 "policies": {
3968 "RequestedLocales": "de,en-US"
3969 }
3970 }
3971 ```
3972 <a name="SanitizeOnShutdown"></a>
3973
3974 ### SanitizeOnShutdown (Selective)
3975 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3976
3977 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3978
3979 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3980 **CCK2 Equivalent:** N/A\
3981 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3982 #### Windows (GPO)
3983 ```
3984 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3985 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3986 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3987 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3988 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3989 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3990 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3991 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3992 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3993 ```
3994 #### Windows (Intune)
3995 OMA-URI:
3996 ```
3997 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3998 ```
3999 Value (string):
4000 ```
4001 <enabled/> or <disabled/>
4002 ```
4003 #### macOS
4004 ```
4005 <dict>
4006 <key>SanitizeOnShutdown</key>
4007 <dict>
4008 <key>Cache</key>
4009 <true/> | <false/>
4010 <key>Cookies</key>
4011 <true/> | <false/>
4012 <key>Downloads</key>
4013 <true/> | <false/>
4014 <key>FormData</key>
4015 <true/> | <false/>
4016 <key>History</key>
4017 <true/> | <false/>
4018 <key>Sessions</key>
4019 <true/> | <false/>
4020 <key>SiteSettings</key>
4021 <true/> | <false/>
4022 <key>OfflineApps</key>
4023 <true/> | <false/>
4024 <key>Locked</key>
4025 <true/> | <false/>
4026 </dict>
4027 </dict>
4028 ```
4029 #### policies.json
4030 ```
4031 {
4032 "policies": {
4033 "SanitizeOnShutdown": {
4034 "Cache": true | false,
4035 "Cookies": true | false,
4036 "Downloads": true | false,
4037 "FormData": true | false,
4038 "History": true | false,
4039 "Sessions": true | false,
4040 "SiteSettings": true | false,
4041 "OfflineApps": true | false,
4042 "Locked": true | false
4043 }
4044 }
4045 }
4046 ```
4047 ### SanitizeOnShutdown (All)
4048 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4049
4050 **Compatibility:** Firefox 60, Firefox ESR 60\
4051 **CCK2 Equivalent:** N/A\
4052 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4053 #### Windows (GPO)
4054 ```
4055 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4056 ```
4057 #### Windows (Intune)
4058 OMA-URI:
4059 ```
4060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4061 ```
4062 Value (string):
4063 ```
4064 <enabled/> or <disabled/>
4065 ```
4066 #### macOS
4067 ```
4068 <dict>
4069 <key>SanitizeOnShutdown</key>
4070 <true/> | <false/>
4071 </dict>
4072 ```
4073 #### policies.json
4074 ```
4075 {
4076 "policies": {
4077 "SanitizeOnShutdown": true | false
4078 }
4079 }
4080 ```
4081 ### SearchBar
4082 Set whether or not search bar is displayed.
4083
4084 **Compatibility:** Firefox 60, Firefox ESR 60\
4085 **CCK2 Equivalent:** `showSearchBar`\
4086 **Preferences Affected:** N/A
4087
4088 #### Windows (GPO)
4089 ```
4090 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4091 ```
4092
4093 #### Windows (Intune)
4094 OMA-URI:
4095 ```
4096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4097 ```
4098 Value (string):
4099 ```
4100 <enabled/>
4101 <data id="Permissions" value="unified | separate"/>
4102 #### macOS
4103 ```
4104 <dict>
4105 <key>SearchBar</key>
4106 <string>unified | separate</string>
4107 </dict>
4108 ```
4109 #### policies.json
4110 ```
4111 {
4112 "policies": {
4113 "SearchBar": "unified" | "separate"
4114 }
4115 }
4116 ```
4117 <a name="SearchEngines"></a>
4118
4119 ### SearchEngines (This policy is only available on the ESR.)
4120
4121 ### SearchEngines | Default
4122
4123 Set the default search engine. This policy is only available on the ESR.
4124
4125 **Compatibility:** Firefox ESR 60\
4126 **CCK2 Equivalent:** `defaultSearchEngine`\
4127 **Preferences Affected:** N/A
4128
4129 #### Windows (GPO)
4130 ```
4131 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4132 ```
4133 #### Windows (Intune)
4134 OMA-URI:
4135 ```
4136 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4137 ```
4138 Value (string):
4139 ```
4140 <enabled/>
4141 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4142 ```
4143 #### macOS
4144 ```
4145 <dict>
4146 <key>SearchEngines</key>
4147 <dict>
4148 <key>Default</key>
4149 <string>NAME_OF_SEARCH_ENGINE</string>
4150 </dict>
4151 </dict>
4152 ```
4153 #### policies.json
4154 ```
4155 {
4156 "policies": {
4157 "SearchEngines": {
4158 "Default": "NAME_OF_SEARCH_ENGINE"
4159 }
4160 }
4161 }
4162 ```
4163 ### SearchEngines | PreventInstalls
4164
4165 Prevent installing search engines from webpages.
4166
4167 **Compatibility:** Firefox ESR 60\
4168 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4169 **Preferences Affected:** N/A
4170
4171 #### Windows (GPO)
4172 ```
4173 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4174 ```
4175 #### Windows (Intune)
4176 OMA-URI:
4177 ```
4178 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4179 ```
4180 Value (string):
4181 ```
4182 <enabled/> or <disabled/>
4183 ```
4184 #### macOS
4185 ```
4186 <dict>
4187 <key>SearchEngines</key>
4188 <dict>
4189 <key>PreventInstalls</key>
4190 <true/> | <false/>
4191 </dict>
4192 </dict>
4193 ```
4194 #### policies.json
4195 ```
4196 {
4197 "policies": {
4198 "SearchEngines": {
4199 "PreventInstalls": true | false
4200 }
4201 }
4202 }
4203 ```
4204 ### SearchEngines | Remove
4205
4206 Hide built-in search engines. This policy is only available on the ESR.
4207
4208 **Compatibility:** Firefox ESR 60.2\
4209 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4210 **Preferences Affected:** N/A
4211
4212 #### Windows (GPO)
4213 ```
4214 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4215 ```
4216 #### Windows (Intune)
4217 OMA-URI:
4218 ```
4219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4220 ```
4221 Value (string):
4222 ```
4223 <enabled/>
4224 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4225 ```
4226 #### macOS
4227 ```
4228 <dict>
4229 <key>SearchEngines</key>
4230 <dict>
4231 <key>Remove</key>
4232 <array>
4233 <string>NAME_OF_SEARCH_ENGINE</string>
4234 </array>
4235 </dict>
4236 </dict>
4237 ```
4238 #### policies.json
4239 ```
4240 {
4241 "policies": {
4242 "SearchEngines": {
4243 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4244 }
4245 }
4246 }
4247 ```
4248 ### SearchEngines | Add
4249
4250 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4251
4252 `Name` is the name of the search engine.
4253
4254 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4255
4256 `Method` is either GET or POST
4257
4258 `IconURL` is a URL for the icon to use.
4259
4260 `Alias` is a keyword to use for the engine.
4261
4262 `Description` is a description of the search engine.
4263
4264 `PostData` is the POST data as name value pairs separated by &.
4265
4266 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4267
4268 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4269 **CCK2 Equivalent:** `searchplugins`\
4270 **Preferences Affected:** N/A
4271
4272 #### Windows (GPO)
4273 ```
4274 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4275 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4276 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4277 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4278 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4279 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4280 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4281 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4282 ```
4283 #### Windows (Intune)
4284 OMA-URI:
4285 ```
4286 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4287 ```
4288 Value (string):
4289 ```
4290 <enabled/>
4291 <data id="SearchEngine_Name" value="Example1"/>
4292 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4293 <data id="SearchEngine_Method" value="GET | POST"/>
4294 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4295 <data id="SearchEngine_Alias" value="example"/>
4296 <data id="SearchEngine_Description" value="Example Description"/>
4297 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4298 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4299 ```
4300 #### macOS
4301 ```
4302 <dict>
4303 <key>SearchEngines</key>
4304 <dict>
4305 <key>Add</key>
4306 <array>
4307 <dict>
4308 <key>Name</key>
4309 <string>Example1</string>
4310 <key>URLTemplate</key>
4311 <string>https://www.example.org/q={searchTerms}</string>
4312 <key>Method</key>
4313 <string>GET | POST </string>
4314 <key>IconURL</key>
4315 <string>https://www.example.org/favicon.ico</string>
4316 <key>Alias</key>
4317 <string>example</string>
4318 <key>Description</key>
4319 <string>Example Description</string>
4320 <key>SuggestURLTemplate</key>
4321 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4322 <key>PostData</key>
4323 <string>name=value&q={searchTerms}</string>
4324 </dict>
4325 <array>
4326 </dict>
4327 </dict>
4328 ```
4329 #### policies.json
4330 ```
4331 {
4332 "policies": {
4333 "SearchEngines": {
4334 "Add": [
4335 {
4336 "Name": "Example1",
4337 "URLTemplate": "https://www.example.org/q={searchTerms}",
4338 "Method": "GET" | "POST",
4339 "IconURL": "https://www.example.org/favicon.ico",
4340 "Alias": "example",
4341 "Description": "Description",
4342 "PostData": "name=value&q={searchTerms}",
4343 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4344 }
4345 ]
4346 }
4347 }
4348 }
4349 ```
4350 ### SearchSuggestEnabled
4351
4352 Enable search suggestions.
4353
4354 **Compatibility:** Firefox 68, Firefox ESR 68\
4355 **CCK2 Equivalent:** N/A\
4356 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4357
4358 #### Windows (GPO)
4359 ```
4360 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4361 ```
4362 #### Windows (Intune)
4363 OMA-URI:
4364 ```
4365 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4366 ```
4367 Value (string):
4368 ```
4369 <enabled/> or <disabled/>
4370 ```
4371 #### macOS
4372 ```
4373 <dict>
4374 <key>SearchSuggestEnabled</key>
4375 <true/> | <false/>
4376 </dict>
4377 ```
4378 #### policies.json
4379 ```
4380 {
4381 "policies": {
4382 "SearchSuggestEnabled": true | false
4383 }
4384 }
4385 ```
4386 ### SecurityDevices
4387
4388 Install PKCS #11 modules.
4389
4390 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4391 **CCK2 Equivalent:** `certs.devices`\
4392 **Preferences Affected:** N/A
4393
4394 #### Windows (GPO)
4395 ```
4396 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4397 ```
4398 #### Windows (Intune)
4399 OMA-URI:
4400 ```
4401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4402 ```
4403 Value (string):
4404 ```
4405 <enabled/>
4406 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4407 ```
4408 #### macOS
4409 ```
4410 <dict>
4411 <key>SecurityDevices</key>
4412 <dict>
4413 <key>NAME_OF_DEVICE</key>
4414 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4415 </dict>
4416 </dict>
4417 ```
4418
4419 #### policies.json
4420 ```
4421 {
4422 "policies": {
4423 "SecurityDevices": {
4424 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4425 }
4426 }
4427 }
4428 ```
4429 ### SSLVersionMax
4430
4431 Set and lock the maximum version of TLS.
4432
4433 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4434 **CCK2 Equivalent:** N/A\
4435 **Preferences Affected:** `security.tls.version.max`
4436
4437 #### Windows (GPO)
4438 ```
4439 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4440 ```
4441 #### Windows (Intune)
4442 OMA-URI:
4443 ```
4444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4445 ```
4446 Value (string):
4447 ```
4448 <enabled/>
4449 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4450 ```
4451 #### macOS
4452 ```
4453 <dict>
4454 <key>SSLVersionMax</key>
4455 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4456 </dict>
4457 ```
4458
4459 #### policies.json
4460 ```
4461 {
4462 "policies": {
4463 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4464 }
4465 }
4466 ```
4467 ### SSLVersionMin
4468
4469 Set and lock the minimum version of TLS.
4470
4471 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4472 **CCK2 Equivalent:** N/A\
4473 **Preferences Affected:** `security.tls.version.min`
4474
4475 #### Windows (GPO)
4476 ```
4477 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4478 ```
4479 #### Windows (Intune)
4480 OMA-URI:
4481 ```
4482 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4483 ```
4484 Value (string):
4485 ```
4486 <enabled/>
4487 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4488 ```
4489 #### macOS
4490 ```
4491 <dict>
4492 <key>SSLVersionMin</key>
4493 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4494 </dict>
4495 ```
4496
4497 #### policies.json
4498 ```
4499 {
4500 "policies": {
4501 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4502 }
4503 }
4504 ```
4505 ### SupportMenu
4506 Add a menuitem to the help menu for specifying support information.
4507
4508 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4509 **CCK2 Equivalent:** helpMenu\
4510 **Preferences Affected:** N/A
4511
4512 #### Windows (GPO)
4513 ```
4514 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4515 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4516 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4517 ```
4518 #### Windows (Intune)
4519 OMA-URI:
4520 ```
4521 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4522 ```
4523 Value (string):
4524 ```
4525 <enabled/>
4526 <data id="SupportMenuTitle" value="Support Menu"/>
4527 <data id="SupportMenuURL" value="http://example.com/support"/>
4528 <data id="SupportMenuAccessKey" value="S">
4529 ```
4530 #### macOS
4531 ```
4532 <dict>
4533 <key>SupportMenu</key>
4534 <dict>
4535 <key>Title</key>
4536 <string>SupportMenu</string>
4537 <key>URL</key>
4538 <string>http://example.com/support</string>
4539 <key>AccessKey</key>
4540 <string>S</string>
4541 </dict>
4542 </dict>
4543 ```
4544 #### policies.json
4545 ```
4546 {
4547 "policies": {
4548 "SupportMenu": {
4549 "Title": "Support Menu",
4550 "URL": "http://example.com/support",
4551 "AccessKey": "S"
4552 }
4553 }
4554 }
4555 ```
4556 ### UserMessaging
4557
4558 Prevent installing search engines from webpages.
4559
4560 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4561
4562 `ExtensionRecommendations` Don't recommend extensions.
4563
4564 `FeatureRecommendations` Don't recommend browser features.
4565
4566 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4567
4568 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4569 **CCK2 Equivalent:** N/A\
4570 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4571
4572 #### Windows (GPO)
4573 ```
4574 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4575 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4576 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4577 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4578 ```
4579 #### Windows (Intune)
4580 OMA-URI:
4581 ```
4582 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4586 ```
4587 Value (string):
4588 ```
4589 <enabled/> or <disabled/>
4590 ```
4591 #### macOS
4592 ```
4593 <dict>
4594 <key>UserMessaging</key>
4595 <dict>
4596 <key>WhatsNew</key>
4597 <true/> | <false/>
4598 <key>ExtensionRecommendations</key>
4599 <true/> | <false/>
4600 <key>FeatureRecommendations</key>
4601 <true/> | <false/>
4602 <key>UrlbarInterventions</key>
4603 <true/> | <false/>
4604 </dict>
4605 </dict>
4606 ```
4607 #### policies.json
4608 ```
4609 {
4610 "policies": {
4611 "UserMessaging": {
4612 "WhatsNew": true | false,
4613 "ExtensionRecommendations": true | false,
4614 "FeatureRecommendations": true | false,
4615 "UrlbarInterventions": true | false
4616 }
4617 }
4618 }
4619 ```
4620 ### WebsiteFilter
4621 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4622
4623 **Compatibility:** Firefox 60, Firefox ESR 60\
4624 **CCK2 Equivalent:** N/A\
4625 **Preferences Affected:** N/A
4626
4627 #### Windows (GPO)
4628 ```
4629 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4630 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4631 ```
4632 #### Windows (Intune)
4633 OMA-URI:
4634 ```
4635 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4636 ```
4637 Value (string):
4638 ```
4639 <enabled/>
4640 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4641 ```
4642 OMA-URI:
4643 ```
4644 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4645 ```
4646 Value (string):
4647 ```
4648 <enabled/>
4649 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4650 ```
4651 #### macOS
4652 ```
4653 <dict>
4654 <key>WebsiteFilter</key>
4655 <dict>
4656 <key>Block</key>
4657 <array>
4658 <string><all_urls></string>
4659 </array>
4660 <key>Exceptions</key>
4661 <array>
4662 <string>http://example.org/*</string>
4663 </array>
4664 </dict>
4665
4666 </dict>
4667 ```
4668 #### policies.json
4669 ```
4670 {
4671 "policies": {
4672 "WebsiteFilter": {
4673 "Block": ["<all_urls>"],
4674 "Exceptions": ["http://example.org/*"]
4675 }
4676 }
4677 }
4678 ```

patrick-canterino.de