]> git.p6c8.net - policy-templates.git/blob - README.md
Add BackgroundAppUpdate (Fixes #756)
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
10 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
11 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
12 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
13 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable automatic application update in the background, when the application is not running.
14 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
15 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
16 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
17 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
18 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
19 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
20 | **[`Certificates`](#certificates)** |
21 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
22 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
23 | **[`Cookies`](#cookies)** | Configure cookie preferences.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
38 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
39 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
40 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
41 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
42 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
43 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
44 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
45 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
46 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
47 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
48 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
49 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
50 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
51 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
52 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
53 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
54 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
55 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
56 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
57 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
58 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
59 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
60 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
61 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
62 | **[`Handlers`](#handlers)** | Configure default application handlers.
63 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
64 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
65 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
66 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
67 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
68 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates..
69 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
70 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
71 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
72 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
73 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
74 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
75 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
76 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
77 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
78 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
79 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
80 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
81 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
82 | **[`Preferences`](#preferences)** | Set and lock preferences.
83 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
84 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
85 | **[`Proxy`](#proxy)** | Configure proxy settings.
86 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
87 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
88 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
89 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
90 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
91 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
92 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
93 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
94 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
95 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
96 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
97 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
98 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
99 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
100 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
101 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
102
103 ### 3rdparty
104
105 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
106
107 ### AppAutoUpdate
108
109 Enable or disable **automatic** application update.
110
111 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
112
113 If set to false, application updates are downloaded but the user can choose when to install the update.
114
115 If you have disabled updates via DisableAppUpdate, this policy has no effect.
116
117 **Compatibility:** Firefox 75, Firefox ESR 68.7\
118 **CCK2 Equivalent:** N/A\
119 **Preferences Affected:** app.update.auto
120
121 #### Windows (GPO)
122 ```
123 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
124 ```
125 #### Windows (Intune)
126 OMA-URI:
127 ```
128 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
129 ```
130 Value (string):
131 ```
132 <enabled/> or <disabled/>
133 ```
134 #### macOS
135 ```
136 <dict>
137 <key>AppAutoUpdate</key>
138 <true/> | <false/>
139 </dict>
140 ```
141 #### policies.json
142 ```
143 {
144 "policies": {
145 "AppAutoUpdate": true | false
146 }
147 }
148 ```
149 ### AppUpdateURL
150
151 Change the URL for application update if you are providing Firefox updates from a custom update server.
152
153 **Compatibility:** Firefox 62, Firefox ESR 60.2\
154 **CCK2 Equivalent:** N/A\
155 **Preferences Affected:** `app.update.url`
156
157 #### Windows (GPO)
158 ```
159 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
160 ```
161 #### Windows (Intune)
162 OMA-URI:
163 ```
164 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
165 ```
166 Value (string):
167 ```
168 <enabled/>
169 <data id="AppUpdateURL" value="https://yoursite.com"/>
170 ```
171 #### macOS
172 ```
173 <dict>
174 <key>AppUpdateURL</key>
175 <string>https://yoursite.com</string>
176 </dict>
177 ```
178 #### policies.json
179 ```
180 {
181 "policies": {
182 "AppUpdateURL": "https://yoursite.com"
183 }
184 }
185 ```
186 ### Authentication
187
188 Configure sites that support integrated authentication.
189
190 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
191
192 `PrivateBrowsing` enables integrated authentication in private browsing.
193
194 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
195 **CCK2 Equivalent:** N/A\
196 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
197
198 #### Windows (GPO)
199 ```
200 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
201 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
202 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
203 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
204 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
205 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
206 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
207 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
208 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
209 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
210 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
211 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
212 ```
213 #### Windows (Intune)
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
244 ```
245 Value (string):
246 ```
247 <enabled/>
248 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
249 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
250 ```
251 OMA-URI:
252 ```
253 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
254 ```
255 Value (string):
256 ```
257 <enabled/> or <disabled/>
258 ```
259 OMA-URI:
260 ```
261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
262 ```
263 Value (string):
264 ```
265 <enabled/> or <disabled/>
266 ```
267 #### macOS
268 ```
269 <dict>
270 <key>Authentication</key>
271 <dict>
272 <key>SPNEGO</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>Delegated</key>
278 <array>
279 <string>mydomain.com</string>
280 <string>https://myotherdomain.com</string>
281 </array>
282 <key>NTLM</key>
283 <array>
284 <string>mydomain.com</string>
285 <string>https://myotherdomain.com</string>
286 </array>
287 <key>AllowNonFQDN</key>
288 <dict>
289 <key>SPNEGO</key>
290 <true/> | <false/>
291 <key>NTLM</key>
292 <true/> | <false/>
293 </dict>
294 <key>AllowProxies</key>
295 <dict>
296 <key>SPNEGO</key>
297 <true/> | <false/>
298 <key>NTLM</key>
299 <true/> | <false/>
300 </dict>
301 <key>Locked</key>
302 <true/> | <false/>
303 <key>PrivateBrowsing</key>
304 <true/> | <false/>
305 </dict>
306 </dict>
307 ```
308 #### policies.json
309 ```
310 {
311 "policies": {
312 "Authentication": {
313 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
314 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
315 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
316 "AllowNonFQDN": {
317 "SPNEGO": true | false,
318 "NTLM": true | false
319 },
320 "AllowProxies": {
321 "SPNEGO": true | false,
322 "NTLM": true | false
323 },
324 "Locked": true | false,
325 "PrivateBrowsing": true | false
326 }
327 }
328 }
329 ```
330 ### BackgroundAppUpdate
331
332 Enable or disable **automatic** application update **in the background**, when the application is not running.
333
334 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
335
336 If set to false, the application will not try to install updates when the application is not running.
337
338 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppUpdateAuto`, this policy has no effect.
339
340 **Compatibility:** Firefox 89\
341 **CCK2 Equivalent:** N/A\
342 **Preferences Affected:** `app.update.background.enabled`
343
344 #### Windows (GPO)
345 ```
346 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
347 ```
348 #### Windows (Intune)
349 OMA-URI:
350 ```
351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
352 ```
353 Value (string):
354 ```
355 <enabled/> or <disabled/>
356 ```
357 #### macOS
358 ```
359 <dict>
360 <key>BackgroundAppUpdate</key>
361 <true/> | <false/>
362 </dict>
363 ```
364 #### policies.json
365 ```
366 {
367 "policies": {
368 "BackgroundAppUpdate": true | false
369 }
370 }
371 ```
372 ### BlockAboutAddons
373
374 Block access to the Add-ons Manager (about:addons).
375
376 **Compatibility:** Firefox 60, Firefox ESR 60\
377 **CCK2 Equivalent:** `disableAddonsManager`\
378 **Preferences Affected:** N/A
379
380 #### Windows (GPO)
381 ```
382 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
383 ```
384 #### Windows (Intune)
385 OMA-URI:
386 ```
387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
388 ```
389 Value (string):
390 ```
391 <enabled/> or <disabled/>
392 ```
393 #### macOS
394 ```
395 <dict>
396 <key>BlockAboutAddons</key>
397 <true/> | <false/>
398 </dict>
399 ```
400 #### policies.json
401 ```
402 {
403 "policies": {
404 "BlockAboutAddons": true | false
405 }
406 }
407 ```
408 ### BlockAboutConfig
409
410 Block access to about:config.
411
412 **Compatibility:** Firefox 60, Firefox ESR 60\
413 **CCK2 Equivalent:** `disableAboutConfig`\
414 **Preferences Affected:** N/A
415
416 #### Windows (GPO)
417 ```
418 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
419 ```
420 #### Windows (Intune)
421 OMA-URI:
422 ```
423 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
424 ```
425 Value (string):
426 ```
427 <enabled/> or <disabled/>
428 ```
429 #### macOS
430 ```
431 <dict>
432 <key>BlockAboutConfig</key>
433 <true/> | <false/>
434 </dict>
435 ```
436 #### policies.json
437 ```
438 {
439 "policies": {
440 "BlockAboutConfig": true | false
441 }
442 }
443 ```
444 ### BlockAboutProfiles
445
446 Block access to About Profiles (about:profiles).
447
448 **Compatibility:** Firefox 60, Firefox ESR 60\
449 **CCK2 Equivalent:** `disableAboutProfiles`\
450 **Preferences Affected:** N/A
451
452 #### Windows (GPO)
453 ```
454 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
455 ```
456 #### Windows (Intune)
457 OMA-URI:
458 ```
459 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
460 ```
461 Value (string):
462 ```
463 <enabled/> or <disabled/>
464 ```
465 #### macOS
466 ```
467 <dict>
468 <key>BlockAboutProfiles</key>
469 <true/> | <false/>
470 </dict>
471 ```
472 #### policies.json
473 ```
474 {
475 "policies": {
476 "BlockAboutProfiles": true | false
477 }
478 }
479 ```
480 ### BlockAboutSupport
481
482 Block access to Troubleshooting Information (about:support).
483
484 **Compatibility:** Firefox 60, Firefox ESR 60\
485 **CCK2 Equivalent:** `disableAboutSupport`\
486 **Preferences Affected:** N/A
487
488 #### Windows (GPO)
489 ```
490 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
491 ```
492 #### Windows (Intune)
493 OMA-URI:
494 ```
495 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
496 ```
497 Value (string):
498 ```
499 <enabled/> or <disabled/>
500 ```
501 #### macOS
502 ```
503 <dict>
504 <key>BlockAboutSupport</key>
505 <true/> | <false/>
506 </dict>
507 ```
508 #### policies.json
509 ```
510 {
511 "policies": {
512 "BlockAboutSupport": true | false
513 }
514 }
515 ```
516 ### Bookmarks
517
518 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
519
520 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
521
522 **Compatibility:** Firefox 60, Firefox ESR 60\
523 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
524 **Preferences Affected:** N/A
525
526 #### Windows (GPO)
527 ```
528 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
529 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
530 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
531 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
532 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
533 ```
534 #### Windows (Intune)
535 OMA-URI:
536 ```
537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
538 ```
539 Value (string):
540 ```
541 <enabled/>
542 <data id="BookmarkTitle" value="Example"/>
543 <data id="BookmarkURL" value="https://example.com"/>
544 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
545 <data id="BookmarkPlacement" value="toolbar | menu"/>
546 <data id="BookmarkFolder" value="FolderName"/>
547 ```
548 #### macOS
549 ```
550 <dict>
551 <key>Bookmarks</key>
552 <array>
553 <dict>
554 <key>Title</key>
555 <string>Example</string>
556 <key>URL</key>
557 <string>https://example.com</string>
558 <key>Favicon</key>
559 <string>https://example.com/favicon.ico</string>
560 <key>Placement</key>
561 <string>toolbar | menu</string>
562 <key>Folder</key>
563 <string>FolderName</string>
564 </dict>
565 </array>
566 </dict>
567 ```
568 #### policies.json
569 ```
570 {
571 "policies": {
572 "Bookmarks": [
573 {
574 "Title": "Example",
575 "URL": "https://example.com",
576 "Favicon": "https://example.com/favicon.ico",
577 "Placement": "toolbar" | "menu",
578 "Folder": "FolderName"
579 }
580 ]
581 }
582 }
583 ```
584 ### CaptivePortal
585 Enable or disable the detection of captive portals.
586
587 **Compatibility:** Firefox 67, Firefox ESR 60.7\
588 **CCK2 Equivalent:** N/A\
589 **Preferences Affected:** `network.captive-portal-service.enabled`
590
591 #### Windows (GPO)
592 ```
593 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
594 ```
595 #### Windows (Intune)
596 OMA-URI:
597 ```
598 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
599 ```
600 Value (string):
601 ```
602 <enabled/> or <disabled/>
603 ```
604 #### macOS
605 ```
606 <dict>
607 <key>CaptivePortal</key>
608 <true/> | <false/>
609 </dict>
610 ```
611 #### policies.json
612 ```
613 {
614 "policies": {
615 "CaptivePortal": true | false
616 }
617 }
618 ```
619 ### Certificates
620
621 ### Certificates | ImportEnterpriseRoots
622
623 Trust certificates that have been added to the operating system certificate store by a user or administrator.
624
625 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
626
627 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
628
629 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
630 **CCK2 Equivalent:** N/A\
631 **Preferences Affected:** `security.enterprise_roots.enabled`
632
633 #### Windows (GPO)
634 ```
635 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
636 ```
637 #### Windows (Intune)
638 OMA-URI:
639 ```
640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
641 ```
642 Value (string):
643 ```
644 <enabled/> or <disabled/>
645 ```
646 #### macOS
647 ```
648 <dict>
649 <key>Certificates</key>
650 <dict>
651 <key>ImportEnterpriseRoots</key>
652 <true/> | <false/>
653 </dict>
654 </dict>
655 ```
656 #### policies.json
657 ```
658 {
659 "policies": {
660 "Certificates": {
661 "ImportEnterpriseRoots": true | false
662 }
663 }
664 }
665 ```
666 ### Certificates | Install
667
668 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
669
670 - Windows
671 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
672 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
673 - macOS
674 - /Library/Application Support/Mozilla/Certificates
675 - ~/Library/Application Support/Mozilla/Certificates
676 - Linux
677 - /usr/lib/mozilla/certificates
678 - /usr/lib64/mozilla/certificates
679 - ~/.mozilla/certificates
680
681 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
682
683 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
684
685 Certificates are installed using the trust string `CT,CT,`.
686
687 Binary (DER) and ASCII (PEM) certificates are both supported.
688
689 **Compatibility:** Firefox 64, Firefox ESR 64\
690 **CCK2 Equivalent:** `certs.ca`\
691 **Preferences Affected:** N/A
692
693 #### Windows (GPO)
694 ```
695 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
696 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
697 ```
698 #### Windows (Intune)
699 OMA-URI:
700 ```
701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
702 ```
703 Value (string):
704 ```
705 <enabled/>
706 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
707 ```
708 #### macOS
709 ```
710 <dict>
711 <key>Certificates</key>
712 <dict>
713 <key>Install</key>
714 <array>
715 <string>cert1.der</string>
716 <string>/Users/username/cert2.pem</string>
717 </array>
718 </dict>
719 </dict>
720 ```
721 #### policies.json
722 ```
723 {
724 "policies": {
725 "Certificates": {
726 "Install": ["cert1.der", "/home/username/cert2.pem"]
727 }
728 }
729 }
730 ```
731 ### Cookies
732 Configure cookie preferences.
733
734 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
735
736 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
737
738 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
739
740 `Default` determines whether cookies are accepted at all.
741
742 `AcceptThirdParty` determines how third-party cookies are handled.
743
744 `ExpireAtSessionEnd` determines when cookies expire.
745
746 `RejectTracker` only rejects cookies for trackers.
747
748 `Locked` prevents the user from changing cookie preferences.
749
750 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1)\
751 **CCK2 Equivalent:** N/A\
752 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
753
754 #### Windows (GPO)
755 ```
756 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
757 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
758 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
759 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
760 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
761 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
762 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
763 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
764 ```
765 #### Windows (Intune)
766 OMA-URI:
767 ```
768 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
769 ```
770 Value (string):
771 ```
772 <enabled/>
773 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
774 ```
775 OMA-URI:
776 ```
777 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
778 ```
779 Value (string):
780 ```
781 <enabled/>
782 <data id="Cookies_Allow" value="1&#xF000;https://example.edu"/>
783 ```
784 OMA-URI:
785 ```
786 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
787 ```
788 Value (string):
789 ```
790 <enabled/>
791 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
792 ```
793 OMA-URI:
794 ```
795 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
796 ```
797 Value (string):
798 ```
799 <enabled/> or <disabled/>
800 ```
801 OMA-URI:
802 ```
803 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
804 ```
805 Value (string):
806 ```
807 <enabled/>
808 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
809 ```
810 OMA-URI:
811 ```
812 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
813 ```
814 Value (string):
815 ```
816 <enabled/> or <disabled/>
817 ```
818 OMA-URI:
819 ```
820 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
821 ```
822 Value (string):
823 ```
824 <enabled/> or <disabled/>
825 ```
826 OMA-URI:
827 ```
828 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
829 ```
830 Value (string):
831 ```
832 <enabled/> or <disabled/>
833 ```
834 #### macOS
835 ```
836 <dict>
837 <key>Cookies</key>
838 <dict>
839 <key>Allow</key>
840 <array>
841 <string>http://example.com</string>
842 </array>
843 <key>AllowSession</key>
844 <array>
845 <string>http://example.edu</string>
846 </array>
847 <key>Block</key>
848 <array>
849 <string>http://example.org</string>
850 </array>
851 <key>Default</key>
852 <true/> | <false/>
853 <key>AcceptThirdParty</key>
854 <string>always | never | from-visited</string>
855 <key>ExpireAtSessionEnd</key>
856 <true/> | <false/>
857 <key>RejectTracker</key>
858 <true/> | <false/>
859 <key>Locked</key>
860 <true/> | <false/>
861 </dict>
862 </dict>
863 ```
864 #### policies.json
865 ```
866 {
867 "policies": {
868 "Cookies": {
869 "Allow": ["http://example.org/"],
870 "AllowSession": ["http://example.edu/"],
871 "Block": ["http://example.edu/"],
872 "Default": true | false,
873 "AcceptThirdParty": "always" | "never" | "from-visited",
874 "ExpireAtSessionEnd": true | false,
875 "RejectTracker": true | false,
876 "Locked": true | false
877 }
878 }
879 }
880 ```
881 ### DisableSetDesktopBackground
882 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
883
884 **Compatibility:** Firefox 60, Firefox ESR 60\
885 **CCK2 Equivalent:** `removeSetDesktopBackground`\
886 **Preferences Affected:** N/A
887
888 #### Windows (GPO)
889 ```
890 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
891 ```
892 #### Windows (Intune)
893 OMA-URI:
894 ```
895 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
896 ```
897 Value (string):
898 ```
899 <enabled/> or <disabled/>
900 ```
901 #### macOS
902 ```
903 <dict>
904 <key>DisableSetDesktopBackground</key>
905 <true/> | <false/>
906 </dict>
907 ```
908 #### policies.json
909 ```
910 {
911 "policies": {
912 "DisableSetDesktopBackground": true | false
913 }
914 }
915 ```
916 ### DisableMasterPasswordCreation
917 Remove the master password functionality.
918
919 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
920
921 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
922
923 **Compatibility:** Firefox 60, Firefox ESR 60\
924 **CCK2 Equivalent:** `noMasterPassword`\
925 **Preferences Affected:** N/A
926
927 #### Windows (GPO)
928 ```
929 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
930 ```
931 #### Windows (Intune)
932 OMA-URI:
933 ```
934 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
935 ```
936 Value (string):
937 ```
938 <enabled/> or <disabled/>
939 ```
940 #### macOS
941 ```
942 <dict>
943 <key>DisableMasterPasswordCreation</key>
944 <true/> | <false/>
945 </dict>
946 ```
947 #### policies.json
948 ```
949 {
950 "policies": {
951 "DisableMasterPasswordCreation": true | false
952 }
953 }
954 ```
955 ### DisableAppUpdate
956 Turn off application updates within Firefox.
957
958 **Compatibility:** Firefox 60, Firefox ESR 60\
959 **CCK2 Equivalent:** `disableFirefoxUpdates`\
960 **Preferences Affected:** N/A
961
962 #### Windows (GPO)
963 ```
964 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
965 ```
966 #### Windows (Intune)
967 OMA-URI:
968 ```
969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
970 ```
971 Value (string):
972 ```
973 <enabled/> or <disabled/>
974 ```
975 #### macOS
976 ```
977 <dict>
978 <key>DisableAppUpdate</key>
979 <true/> | <false/>
980 </dict>
981 ```
982 #### policies.json
983 ```
984 {
985 "policies": {
986 "DisableAppUpdate": true | false
987 }
988 }
989 ```
990 ### DisableBuiltinPDFViewer
991 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
992
993 **Compatibility:** Firefox 60, Firefox ESR 60\
994 **CCK2 Equivalent:** `disablePDFjs`\
995 **Preferences Affected:** `pdfjs.disabled`
996
997 #### Windows (GPO)
998 ```
999 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1000 ```
1001 #### Windows (Intune)
1002 OMA-URI:
1003 ```
1004 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1005 ```
1006 Value (string):
1007 ```
1008 <enabled/> or <disabled/>
1009 ```
1010 #### macOS
1011 ```
1012 <dict>
1013 <key>DisableBuiltinPDFViewer</key>
1014 <true/> | <false/>
1015 </dict>
1016 ```
1017 #### policies.json
1018 ```
1019 {
1020 "policies": {
1021 "DisableBuiltinPDFViewer": true | false
1022 }
1023 }
1024 ```
1025 ### DisabledCiphers
1026 Disable specific cryptographic ciphers.
1027
1028 ---
1029 **Note:**
1030
1031 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1032
1033 ---
1034 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
1035 **CCK2 Equivalent:** N/A\
1036 **Preferences Affected:** N/A
1037
1038 #### Windows (GPO)
1039 ```
1040 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1041 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1042 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1043 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1044 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1045 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1046 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1047 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1048 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
1049 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1050 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
1051 ```
1052 #### Windows (Intune)
1053 OMA-URI:
1054 ```
1055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1056 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1057 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1058 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
1062 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
1063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
1064 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
1065 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
1066 ```
1067 Value (string):
1068 ```
1069 <enabled/> or <disabled/>
1070 ```
1071 #### macOS
1072 ```
1073 <dict>
1074 <key>DisabledCiphers</key>
1075 <dict>
1076 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1077 <true/> | <false/>
1078 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1079 <true/> | <false/>
1080 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1081 <true/> | <false/>
1082 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1083 <true/> | <false/>
1084 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1085 <true/> | <false/>
1086 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1087 <true/> | <false/>
1088 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1089 <true/> | <false/>
1090 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1091 <true/> | <false/>
1092 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1093 <true/> | <false/>
1094 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1095 <true/> | <false/>
1096 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1097 <true/> | <false/>
1098 </dict>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisabledCiphers": {
1106 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1107 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1108 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1109 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1110 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1111 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1112 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1113 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1114 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false,
1115 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false,
1116 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1117 }
1118 }
1119 }
1120 ```
1121 ### DisableDefaultBrowserAgent
1122 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1123
1124 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1125
1126 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1127 **CCK2 Equivalent:** N/A\
1128 **Preferences Affected:** N/A
1129
1130 #### Windows (GPO)
1131 ```
1132 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1133 ```
1134 #### Windows (Intune)
1135 OMA-URI:
1136 ```
1137 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1138 ```
1139 Value (string):
1140 ```
1141 <enabled/> or <disabled/>
1142 ```
1143 #### policies.json
1144 ```
1145 {
1146 "policies": {
1147 "DisableDefaultBrowserAgent": true | false
1148 }
1149 }
1150 ```
1151 ### DisableDeveloperTools
1152 Remove access to all developer tools.
1153
1154 **Compatibility:** Firefox 60, Firefox ESR 60\
1155 **CCK2 Equivalent:** `removeDeveloperTools`\
1156 **Preferences Affected:** `devtools.policy.disabled`
1157
1158 #### Windows (GPO)
1159 ```
1160 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1161 ```
1162 #### Windows (Intune)
1163 OMA-URI:
1164 ```
1165 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1166 ```
1167 Value (string):
1168 ```
1169 <enabled/> or <disabled/>
1170 ```
1171 #### macOS
1172 ```
1173 <dict>
1174 <key>DisableDeveloperTools</key>
1175 <true/> | <false/>
1176 </dict>
1177 ```
1178 #### policies.json
1179 ```
1180 {
1181 "policies": {
1182 "DisableDeveloperTools": true | false
1183 }
1184 }
1185 ```
1186 ### DisableFeedbackCommands
1187 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1188
1189 **Compatibility:** Firefox 60, Firefox ESR 60\
1190 **CCK2 Equivalent:** N/A\
1191 **Preferences Affected:** N/A
1192
1193 #### Windows (GPO)
1194 ```
1195 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1196 ```
1197 #### Windows (Intune)
1198 OMA-URI:
1199 ```
1200 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1201 ```
1202 Value (string):
1203 ```
1204 <enabled/> or <disabled/>
1205 ```
1206 #### macOS
1207 ```
1208 <dict>
1209 <key>DisableFeedbackCommands</key>
1210 <true/> | <false/>
1211 </dict>
1212 ```
1213 #### policies.json
1214 ```
1215 {
1216 "policies": {
1217 "DisableFeedbackCommands": true | false
1218 }
1219 }
1220 ```
1221 ### DisableFirefoxScreenshots
1222 Remove access to Firefox Screenshots.
1223
1224 **Compatibility:** Firefox 60, Firefox ESR 60\
1225 **CCK2 Equivalent:** N/A\
1226 **Preferences Affected:** `extensions.screenshots.disabled`
1227
1228 #### Windows (GPO)
1229 ```
1230 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1231 ```
1232 #### Windows (Intune)
1233 OMA-URI:
1234 ```
1235 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1236 ```
1237 Value (string):
1238 ```
1239 <enabled/> or <disabled/>
1240 ```
1241 #### macOS
1242 ```
1243 <dict>
1244 <key>DisableFirefoxScreenshots</key>
1245 <true/> | <false/>
1246 </dict>
1247 ```
1248 #### policies.json
1249 ```
1250 {
1251 "policies": {
1252 "DisableFirefoxScreenshots": true | false
1253 }
1254 }
1255 ```
1256 ### DisableFirefoxAccounts
1257 Disable Firefox Accounts integration (Sync).
1258
1259 **Compatibility:** Firefox 60, Firefox ESR 60\
1260 **CCK2 Equivalent:** `disableSync`\
1261 **Preferences Affected:** `identity.fxaccounts.enabled`
1262
1263 #### Windows (GPO)
1264 ```
1265 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1266 ```
1267 #### Windows (Intune)
1268 OMA-URI:
1269 ```
1270 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1271 ```
1272 Value (string):
1273 ```
1274 <enabled/> or <disabled/>
1275 ```
1276 #### macOS
1277 ```
1278 <dict>
1279 <key>DisableFirefoxAccounts</key>
1280 <true/> | <false/>
1281 </dict>
1282 ```
1283 #### policies.json
1284 ```
1285 {
1286 "policies": {
1287 "DisableFirefoxAccounts": true | false
1288 }
1289 }
1290 ```
1291 ### DisableFirefoxStudies
1292 Disable Firefox studies (Shield).
1293
1294 **Compatibility:** Firefox 60, Firefox ESR 60\
1295 **CCK2 Equivalent:** N/A\
1296 **Preferences Affected:** N/A
1297
1298 #### Windows (GPO)
1299 ```
1300 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1301 ```
1302 #### Windows (Intune)
1303 OMA-URI:
1304 ```
1305 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1306 ```
1307 Value (string):
1308 ```
1309 <enabled/> or <disabled/>
1310 ```
1311 #### macOS
1312 ```
1313 <dict>
1314 <key>DisableFirefoxStudies</key>
1315 <true/> | <false/>
1316 </dict>
1317 ```
1318 #### policies.json
1319 ```
1320 {
1321 "policies": {
1322 "DisableFirefoxStudies": true | false
1323 }
1324 }
1325 ```
1326 ### DisableForgetButton
1327 Disable the "Forget" button.
1328
1329 **Compatibility:** Firefox 60, Firefox ESR 60\
1330 **CCK2 Equivalent:** `disableForget`\
1331 **Preferences Affected:** N/A
1332
1333 #### Windows (GPO)
1334 ```
1335 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1336 ```
1337 #### Windows (Intune)
1338 OMA-URI:
1339 ```
1340 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1341 ```
1342 Value (string):
1343 ```
1344 <enabled/> or <disabled/>
1345 ```
1346 #### macOS
1347 ```
1348 <dict>
1349 <key>DisableForgetButton</key>
1350 <true/> | <false/>
1351 </dict>
1352 ```
1353 #### policies.json
1354 ```
1355 {
1356 "policies": {
1357 "DisableForgetButton": true | false
1358 }
1359 }
1360 ```
1361 ### DisableFormHistory
1362 Turn off saving information on web forms and the search bar.
1363
1364 **Compatibility:** Firefox 60, Firefox ESR 60\
1365 **CCK2 Equivalent:** `disableFormFill`\
1366 **Preferences Affected:** ` browser.formfill.enable`
1367
1368 #### Windows (GPO)
1369 ```
1370 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1371 ```
1372 #### Windows (Intune)
1373 OMA-URI:
1374 ```
1375 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1376 ```
1377 Value (string):
1378 ```
1379 <enabled/> or <disabled/>
1380 ```
1381 #### macOS
1382 ```
1383 <dict>
1384 <key>DisableFormHistory</key>
1385 <true/> | <false/>
1386 </dict>
1387 ```
1388 #### policies.json
1389 ```
1390 {
1391 "policies": {
1392 "DisableFormHistory": true | false
1393 }
1394 }
1395 ```
1396 ### DisablePasswordReveal
1397 Do not allow passwords to be shown in saved logins
1398
1399 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1400 **CCK2 Equivalent:** N/A
1401 **Preferences Affected:** N/A
1402
1403 #### Windows (GPO)
1404 ```
1405 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1406 ```
1407 #### Windows (Intune)
1408 OMA-URI:
1409 ```
1410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1411 ```
1412 Value (string):
1413 ```
1414 <enabled/> or <disabled/>
1415 ```
1416 #### macOS
1417 ```
1418 <dict>
1419 <key>DisablePasswordReveal</key>
1420 <true/> | <false/>
1421 </dict>
1422 ```
1423 #### policies.json
1424 ```
1425 {
1426 "policies": {
1427 "DisablePasswordReveal": true | false
1428 }
1429 }
1430 ```
1431 ### DisablePocket
1432 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1433
1434 **Compatibility:** Firefox 60, Firefox ESR 60\
1435 **CCK2 Equivalent:** `disablePocket`\
1436 **Preferences Affected:** `extensions.pocket.enabled`
1437
1438 #### Windows (GPO)
1439 ```
1440 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1441 ```
1442 #### Windows (Intune)
1443 OMA-URI:
1444 ```
1445 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1446 ```
1447 Value (string):
1448 ```
1449 <enabled/> or <disabled/>
1450 ```
1451 #### macOS
1452 ```
1453 <dict>
1454 <key>DisablePocket</key>
1455 <true/> | <false/>
1456 </dict>
1457 ```
1458 #### policies.json
1459 ```
1460 {
1461 "policies": {
1462 "DisablePocket": true | false
1463 }
1464 }
1465 ```
1466 ### DisablePrivateBrowsing
1467 Remove access to private browsing.
1468
1469 **Compatibility:** Firefox 60, Firefox ESR 60\
1470 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1471 **Preferences Affected:** N/A
1472
1473 #### Windows (GPO)
1474 ```
1475 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1476 ```
1477 #### Windows (Intune)
1478 OMA-URI:
1479 ```
1480 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1481 ```
1482 Value (string):
1483 ```
1484 <enabled/> or <disabled/>
1485 ```
1486 #### macOS
1487 ```
1488 <dict>
1489 <key>DisablePrivateBrowsing</key>
1490 <true/> | <false/>
1491 </dict>
1492 ```
1493 #### policies.json
1494 ```
1495 {
1496 "policies": {
1497 "DisablePrivateBrowsing": true | false
1498 }
1499 }
1500 ```
1501 ### DisableProfileImport
1502 Disables the "Import data from another browser" option in the bookmarks window.
1503
1504 **Compatibility:** Firefox 60, Firefox ESR 60\
1505 **CCK2 Equivalent:** N/A\
1506 **Preferences Affected:** N/A
1507
1508 #### Windows (GPO)
1509 ```
1510 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1511 ```
1512 #### Windows (Intune)
1513 OMA-URI:
1514 ```
1515 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1516 ```
1517 Value (string):
1518 ```
1519 <enabled/> or <disabled/>
1520 ```
1521 #### macOS
1522 ```
1523 <dict>
1524 <key>DisableProfileImport</key>
1525 <true/> | <false/>
1526 </dict>
1527 ```
1528 #### policies.json
1529 ```
1530 {
1531 "policies": {
1532 "DisableProfileImport": true | false
1533 }
1534 }
1535 ```
1536 ### DisableProfileRefresh
1537 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1538
1539 **Compatibility:** Firefox 60, Firefox ESR 60\
1540 **CCK2 Equivalent:** `disableResetFirefox`\
1541 **Preferences Affected:** `browser.disableResetPrompt`
1542
1543 #### Windows (GPO)
1544 ```
1545 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1546 ```
1547 #### Windows (Intune)
1548 OMA-URI:
1549 ```
1550 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1551 ```
1552 Value (string):
1553 ```
1554 <enabled/> or <disabled/>
1555 ```
1556 #### macOS
1557 ```
1558 <dict>
1559 <key>DisableProfileRefresh</key>
1560 <true/> | <false/>
1561 </dict>
1562 ```
1563 #### policies.json
1564 ```
1565 {
1566 "policies": {
1567 "DisableProfileRefresh": true | false
1568 }
1569 }
1570 ```
1571 ### DisableSafeMode
1572 Disable safe mode within the browser.
1573
1574 On Windows, this disables safe mode via the command line as well.
1575
1576 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1577 **CCK2 Equivalent:** `disableSafeMode`\
1578 **Preferences Affected:** N/A
1579
1580 #### Windows (GPO)
1581 ```
1582 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1583 ```
1584 #### Windows (Intune)
1585 OMA-URI:
1586 ```
1587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1588 ```
1589 Value (string):
1590 ```
1591 <enabled/> or <disabled/>
1592 ```
1593 #### macOS
1594 ```
1595 <dict>
1596 <key>DisableSafeMode</key>
1597 <true/> | <false/>
1598 </dict>
1599 ```
1600 #### policies.json
1601 ```
1602 {
1603 "policies": {
1604 "DisableSafeMode": true | false
1605 }
1606 }
1607 ```
1608 ### DisableSecurityBypass
1609 Prevent the user from bypassing security in certain cases.
1610
1611 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1612
1613 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1614
1615 **Compatibility:** Firefox 60, Firefox ESR 60\
1616 **CCK2 Equivalent:** N/A\
1617 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1618
1619 #### Windows (GPO)
1620 ```
1621 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1622 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1623 ```
1624 #### Windows (Intune)
1625 OMA-URI:
1626 ```
1627 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1628 ```
1629 Value (string):
1630 ```
1631 <enabled/> or <disabled/>
1632 ```
1633 OMA-URI:
1634 ```
1635 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1636 ```
1637 Value (string):
1638 ```
1639 <enabled/> or <disabled/>
1640 ```
1641
1642 #### macOS
1643 ```
1644 <dict>
1645 <key>DisableSecurityBypass</key>
1646 <dict>
1647 <key>InvalidCertificate</key>
1648 <true/> | <false/>
1649 <key>SafeBrowsing</key>
1650 <true/> | <false/>
1651 </dict>
1652 </dict>
1653 ```
1654 #### policies.json
1655 ```
1656 {
1657 "policies": {
1658 "DisableSecurityBypass": {
1659 "InvalidCertificate": true | false,
1660 "SafeBrowsing": true | false
1661 }
1662 }
1663 }
1664 ```
1665 ### DisableSystemAddonUpdate
1666 Prevent system add-ons from being installed or update.
1667
1668 **Compatibility:** Firefox 60, Firefox ESR 60\
1669 **CCK2 Equivalent:** N/A\
1670 **Preferences Affected:** N/A
1671
1672 #### Windows (GPO)
1673 ```
1674 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1675 ```
1676 #### Windows (Intune)
1677 OMA-URI:
1678 ```
1679 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1680 ```
1681 Value (string):
1682 ```
1683 <enabled/> or <disabled/>
1684 ```
1685 #### macOS
1686 ```
1687 <dict>
1688 <key>DisableSystemAddonUpdate</key>
1689 <true/> | <false/>
1690 </dict>
1691 ```
1692 #### policies.json
1693 ```
1694 {
1695 "policies": {
1696 "DisableSystemAddonUpdate": true | false
1697 }
1698 }
1699 ```
1700 ### DisableTelemetry
1701 Prevent the upload of telemetry data.
1702
1703 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1704
1705 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1706
1707 **Compatibility:** Firefox 60, Firefox ESR 60\
1708 **CCK2 Equivalent:** `disableTelemetry`\
1709 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled,toolkit.telemetry.archive.enabled`
1710
1711 #### Windows (GPO)
1712 ```
1713 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1714 ```
1715 #### Windows (Intune)
1716 OMA-URI:
1717 ```
1718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1719 ```
1720 Value (string):
1721 ```
1722 <enabled/> or <disabled/>
1723 ```
1724 #### macOS
1725 ```
1726 <dict>
1727 <key>DisableTelemetry</key>
1728 <true/> | <false/>
1729 </dict>
1730 ```
1731 #### policies.json
1732 ```
1733 {
1734 "policies": {
1735 "DisableTelemetry": true | false
1736 }
1737 }
1738 ```
1739 ### DisplayBookmarksToolbar
1740 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1741
1742 **Compatibility:** Firefox 60, Firefox ESR 60\
1743 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1744 **Preferences Affected:** N/A
1745
1746 #### Windows (GPO)
1747 ```
1748 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1749 ```
1750 #### Windows (Intune)
1751 OMA-URI:
1752 ```
1753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1754 ```
1755 Value (string):
1756 ```
1757 <enabled/> or <disabled/>
1758 ```
1759 #### macOS
1760 ```
1761 <dict>
1762 <key>DisplayBookmarksToolbar</key>
1763 <true/> | <false/>
1764 </dict>
1765 ```
1766 #### policies.json
1767 ```
1768 {
1769 "policies": {
1770 "DisplayBookmarksToolbar": true | false
1771 }
1772 }
1773 ```
1774 ### DisplayMenuBar (Deprecated)
1775 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1776
1777 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1778 **CCK2 Equivalent:** `displayMenuBar`\
1779 **Preferences Affected:** N/A
1780
1781 #### Windows (GPO)
1782 ```
1783 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1784 ```
1785 #### macOS
1786 ```
1787 <dict>
1788 <key>DisplayMenuBar</key>
1789 <true/> | <false/>
1790 </dict>
1791 ```
1792 #### policies.json
1793 ```
1794 {
1795 "policies": {
1796 "DisplayMenuBar": true | false
1797 }
1798 }
1799 ```
1800 ### DisplayMenuBar
1801 Set the state of the menubar.
1802
1803 `always` means the menubar is shown and cannot be hidden.
1804
1805 `never` means the menubar is hidden and cannot be shown.
1806
1807 `default-on` means the menubar is on by default but can be hidden.
1808
1809 `default-off` means the menubar is off by default but can be shown.
1810
1811 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1812 **CCK2 Equivalent:** `displayMenuBar`\
1813 **Preferences Affected:** N/A
1814
1815 #### Windows (GPO)
1816 ```
1817 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1818 ```
1819 #### Windows (Intune)
1820 OMA-URI:
1821 ```
1822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1823 ```
1824 Value (string):
1825 ```
1826 <enabled/>
1827 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1828 ```
1829 #### macOS
1830 ```
1831 <dict>
1832 <key>DisplayMenuBar</key>
1833 <string>always | never | default-on | default-off</string>
1834 </dict>
1835 ```
1836 #### policies.json
1837 ```
1838 {
1839 "policies": {
1840 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1841 }
1842 }
1843 ```
1844 ### DNSOverHTTPS
1845 Configure DNS over HTTPS.
1846
1847 `Enabled` determines whether DNS over HTTPS is enabled
1848
1849 `ProviderURL` is a URL to another provider.
1850
1851 `Locked` prevents the user from changing DNS over HTTPS preferences.
1852
1853 `ExcludedDomains` excludes domains from DNS over HTTPS.
1854
1855 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1856 **CCK2 Equivalent:** N/A\
1857 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1858
1859 #### Windows (GPO)
1860 ```
1861 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1862 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1863 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1864 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1865 ```
1866 #### Windows (Intune)
1867 OMA-URI:
1868 ```
1869 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1870 ```
1871 Value (string):
1872 ```
1873 <enabled/> or <disabled/>
1874 ```
1875 OMA-URI:
1876 ```
1877 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1878 ```
1879 Value (string):
1880 ```
1881 <enabled/>
1882 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1883 ```
1884 OMA-URI:
1885 ```
1886 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1887 ```
1888 Value (string):
1889 ```
1890 <enabled/> or <disabled/>
1891 ```
1892 OMA-URI:
1893 ```
1894 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1895 ```
1896 Value (string):
1897 ```
1898 <enabled/>
1899 <data id="List" value="1&#xF000;example.com"/>
1900 ```
1901 #### macOS
1902 ```
1903 <dict>
1904 <key>DNSOverHTTPS</key>
1905 <dict>
1906 <key>Enabled</key>
1907 <true/> | <false/>
1908 <key>ProviderURL</key>
1909 <string>URL_TO_ALTERNATE_PROVIDER</string>
1910 <key>Locked</key>
1911 <true/> | <false/>
1912 <key>ExcludedDomains</key>
1913 <array>
1914 <string>example.com</string>
1915 </array>
1916 </dict>
1917 </dict>
1918 ```
1919 #### policies.json
1920 ```
1921 {
1922 "policies": {
1923 "DNSOverHTTPS": {
1924 "Enabled": true | false,
1925 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1926 "Locked": true | false,
1927 "ExcludedDomains": ["example.com"]
1928 }
1929 }
1930 }
1931 ```
1932 ### DontCheckDefaultBrowser
1933 Don't check if Firefox is the default browser at startup.
1934
1935 **Compatibility:** Firefox 60, Firefox ESR 60\
1936 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1937 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1938
1939 #### Windows (GPO)
1940 ```
1941 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1942 ```
1943 #### Windows (Intune)
1944 OMA-URI:
1945 ```
1946 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1947 ```
1948 Value (string):
1949 ```
1950 <enabled/> or <disabled/>
1951 ```
1952 #### macOS
1953 ```
1954 <dict>
1955 <key>DontCheckDefaultBrowser</key>
1956 <true/> | <false/>
1957 </dict>
1958 ```
1959 #### policies.json
1960 ```
1961 {
1962 "policies": {
1963 "DontCheckDefaultBrowser": true | false
1964 }
1965 }
1966 ```
1967 ### DefaultDownloadDirectory
1968 Set the default download directory.
1969
1970 You can use ${home} for the native home directory.
1971
1972 **Compatibility:** Firefox 68, Firefox ESR 68\
1973 **CCK2 Equivalent:** N/A\
1974 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1975
1976 #### Windows (GPO)
1977 ```
1978 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1979 ```
1980 #### Windows (Intune)
1981 OMA-URI:
1982 ```
1983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1984 ```
1985 Value (string):
1986 ```
1987 <enabled/>
1988 <data id="Preferences_String" value="${home}\Downloads"/>
1989 ```
1990 #### macOS
1991 ```
1992 <dict>
1993 <key>DefaultDownloadDirectory</key>
1994 <string>${home}/Downloads</string>
1995 </dict>
1996 ```
1997 #### policies.json (macOS and Linux)
1998 ```
1999 {
2000 "policies": {
2001 "DefaultDownloadDirectory": "${home}/Downloads"
2002 }
2003 ```
2004 #### policies.json (Windows)
2005 ```
2006 {
2007 "policies": {
2008 "DefaultDownloadDirectory": "${home}\\Downloads"
2009 }
2010 ```
2011 ### DownloadDirectory
2012 Set and lock the download directory.
2013
2014 You can use ${home} for the native home directory.
2015
2016 **Compatibility:** Firefox 68, Firefox ESR 68\
2017 **CCK2 Equivalent:** N/A\
2018 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
2019
2020 #### Windows (GPO)
2021 ```
2022 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2023 ```
2024 #### Windows (Intune)
2025 OMA-URI:
2026 ```
2027 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2028 ```
2029 Value (string):
2030 ```
2031 <enabled/>
2032 <data id="Preferences_String" value="${home}\Downloads"/>
2033 ```
2034 #### macOS
2035 ```
2036 <dict>
2037 <key>DownloadDirectory</key>
2038 <string>${home}/Downloads</string>
2039 </dict>
2040 ```
2041 #### policies.json (macOS and Linux)
2042 ```
2043 {
2044 "policies": {
2045 "DownloadDirectory": "${home}/Downloads"
2046 }
2047 ```
2048 #### policies.json (Windows)
2049 ```
2050 {
2051 "policies": {
2052 "DownloadDirectory": "${home}\\Downloads"
2053 }
2054 ```
2055 ### EnableTrackingProtection
2056 Configure tracking protection.
2057
2058 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2059
2060 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2061
2062 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2063
2064 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2065
2066 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2067
2068 `Exceptions` are origins for which tracking protection is not enabled.
2069
2070 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2071 **CCK2 Equivalent:** N/A\
2072 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
2073
2074 #### Windows (GPO)
2075 ```
2076 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2077 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2078 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2079 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2080 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2081 ```
2082 #### Windows (Intune)
2083 OMA-URI:
2084 ```
2085 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2086 ```
2087 Value (string):
2088 ```
2089 <enabled/> or <disabled/>
2090 ```
2091 OMA-URI:
2092 ```
2093 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2094 ```
2095 Value (string):
2096 ```
2097 <enabled/> or <disabled/>
2098 ```
2099 OMA-URI:
2100 ```
2101 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2102 ```
2103 Value (string):
2104 ```
2105 <enabled/> or <disabled/>
2106 ```
2107 OMA-URI:
2108 ```
2109 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2110 ```
2111 Value (string):
2112 ```
2113 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2114 ```
2115 OMA-URI:
2116 ```
2117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2118 ```
2119 Value (string):
2120 ```
2121 <enabled/> or <disabled/>
2122 ```
2123 #### macOS
2124 ```
2125 <dict>
2126 <key>EnableTrackingProtection</key>
2127 <dict>
2128 <key>Value</key>
2129 <true/> | <false/>
2130 <key>Locked</key>
2131 <true/> | <false/>
2132 <key>Cryptomining</key>
2133 <true/> | <false/>
2134 <key>Fingerprinting</key>
2135 <true/> | <false/>
2136 <key>Exceptions</key>
2137 <array>
2138 <string>https://example.com</string>
2139 </array>
2140 </dict>
2141 </dict>
2142 ```
2143 #### policies.json
2144 ```
2145 {
2146 "policies": {
2147 "EnableTrackingProtection": {
2148 "Value": true | false,
2149 "Locked": true | false,
2150 "Cryptomining": true | false,
2151 "Fingerprinting": true | false,
2152 "Exceptions": ["https://example.com"]
2153 }
2154 }
2155 ```
2156 ### EncryptedMediaExtensions
2157 Enable or disable Encrypted Media Extensions and optionally lock it.
2158
2159 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2160
2161 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2162
2163 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2164 **CCK2 Equivalent:** N/A\
2165 **Preferences Affected:** `media.eme.enabled`
2166
2167 #### Windows (GPO)
2168 ```
2169 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2170 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2171 ```
2172 #### Windows (Intune)
2173 OMA-URI:
2174 ```
2175 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2176 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2177 ```
2178 Value (string):
2179 ```
2180 <enabled/>or <disabled/>
2181 ```
2182 #### macOS
2183 ```
2184 <dict>
2185 <key>EncryptedMediaExtensions</key>
2186 <dict>
2187 <key>Enabled</key>
2188 <true/> | <false/>
2189 <key>Locked</key>
2190 <true/> | <false/>
2191 </dict>
2192 </dict>
2193 ```
2194 #### policies.json
2195 ```
2196 {
2197 "policies": {
2198 "EncryptedMediaExtensions": {
2199 "Enabled": true | false,
2200 "Locked": true | false
2201 }
2202 }
2203 ```
2204 ### EnterprisePoliciesEnabled
2205 Enable policy support on macOS.
2206
2207 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2208 **CCK2 Equivalent:** N/A\
2209 **Preferences Affected:** N/A
2210
2211 #### macOS
2212 ```
2213 <dict>
2214 <key>EnterprisePoliciesEnabled</key>
2215 <true/>
2216 </dict>
2217 ```
2218 ### Extensions
2219 Control the installation, uninstallation and locking of extensions.
2220
2221 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2222
2223 `Install` is a list of URLs or native paths for extensions to be installed.
2224
2225 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2226
2227 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2228
2229 **Compatibility:** Firefox 60, Firefox ESR 60\
2230 **CCK2 Equivalent:** `addons`\
2231 **Preferences Affected:** N/A
2232
2233 #### Windows (GPO)
2234 ```
2235 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2236 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2237 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2238 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2239 ```
2240 #### Windows (Intune)
2241 OMA-URI:
2242 ```
2243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2244 ```
2245 Value (string):
2246 ```
2247 <enabled/>
2248 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2249 ```
2250 OMA-URI:
2251 ```
2252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2253 ```
2254 Value (string):
2255 ```
2256 <enabled/>
2257 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2258 ```
2259 OMA-URI:
2260 ```
2261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2262 ```
2263 Value (string):
2264 ```
2265 <enabled/>
2266 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2267 ```
2268 #### macOS
2269 ```
2270 <dict>
2271 <key>Extensions</key>
2272 <dict>
2273 <key>Install</key>
2274 <array>
2275 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2276 <string>//path/to/xpi</string>
2277 </array>
2278 <key>Uninstall</key>
2279 <array>
2280 <string>bad_addon_id@mozilla.org</string>
2281 </array>
2282 <key>Locked</key>
2283 <array>
2284 <string>addon_id@mozilla.org</string>
2285 </array>
2286 </dict>
2287 </dict>
2288 ```
2289 #### policies.json
2290 ```
2291 {
2292 "policies": {
2293 "Extensions": {
2294 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2295 "Uninstall": ["bad_addon_id@mozilla.org"],
2296 "Locked": ["addon_id@mozilla.org"]
2297 }
2298 }
2299 }
2300 ```
2301 ### ExtensionSettings
2302 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2303
2304 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2305
2306 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2307
2308 The configuration for each extension is another dictionary that can contain the fields documented below.
2309
2310 | Name | Description |
2311 | --- | --- |
2312 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2313 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2314 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2315 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2316 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2317 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2318 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2319 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2320 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2321 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2322
2323 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2324 **CCK2 Equivalent:** N/A\
2325 **Preferences Affected:** N/A
2326
2327 #### Windows (GPO)
2328 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2329 ```
2330 {
2331 "*": {
2332 "blocked_install_message": "Custom error message.",
2333 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2334 "installation_mode": "blocked",
2335 "allowed_types": ["extension"]
2336 },
2337 "uBlock0@raymondhill.net": {
2338 "installation_mode": "force_installed",
2339 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2340 },
2341 "https-everywhere@eff.org": {
2342 "installation_mode": "allowed"
2343 }
2344 }
2345 ```
2346 #### Windows (Intune)
2347 OMA-URI:
2348 ```
2349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2350 ```
2351 Value (string):
2352 ```
2353 <enabled/>
2354 <data id="ExtensionSettings" value='
2355 {
2356 "*": {
2357 "blocked_install_message": "Custom error message.",
2358 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2359 "installation_mode": "blocked",
2360 "allowed_types": ["extension"]
2361 },
2362 "uBlock0@raymondhill.net": {
2363 "installation_mode": "force_installed",
2364 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2365 },
2366 "https-everywhere@eff.org": {
2367 "installation_mode": "allowed"
2368 }
2369 }'/>
2370 ```
2371 #### macOS
2372 ```
2373 <dict>
2374 <key>ExtensionSettings</key>
2375 <dict>
2376 <key>*</key>
2377 <dict>
2378 <key>blocked_install_message</key>
2379 <string>Custom error message.</string>
2380 <key>install_sources</key>
2381 <array>
2382 <string>about:addons</string>
2383 <string>https://addons.mozilla.org/</string>
2384 </array>
2385 <key>installation_mode</key>
2386 <string>blocked</string>
2387 <key>allowed_types</key>
2388 <array>
2389 <string>extension</string>
2390 </array>
2391 </dict>
2392 <key>uBlock0@raymondhill.net</key>
2393 <dict>
2394 <key>installation_mode</key>
2395 <string>force_installed</string>
2396 <key>install_url</key>
2397 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2398 </dict>
2399 <key>https-everywhere@eff.org</key>
2400 <dict>
2401 <key>installation_mode</key>
2402 <string>allowed</string>
2403 </dict>
2404 </dict>
2405 </dict>
2406 ```
2407 #### policies.json
2408 ```
2409 {
2410 "policies": {
2411 "ExtensionSettings": {
2412 "*": {
2413 "blocked_install_message": "Custom error message.",
2414 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2415 "installation_mode": "blocked",
2416 "allowed_types": ["extension"]
2417 },
2418 "uBlock0@raymondhill.net": {
2419 "installation_mode": "force_installed",
2420 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2421 },
2422 "https-everywhere@eff.org": {
2423 "installation_mode": "allowed"
2424 }
2425 }
2426 }
2427 }
2428 ```
2429 ### ExtensionUpdate
2430 Control extension updates.
2431
2432 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2433 **CCK2 Equivalent:** N/A\
2434 **Preferences Affected:** `extensions.update.enabled`
2435
2436 #### Windows (GPO)
2437 ```
2438 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2439 ```
2440 #### Windows (Intune)
2441 OMA-URI:
2442 ```
2443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2444 ```
2445 Value (string):
2446 ```
2447 <enabled/> or <disabled/>
2448 ```
2449 #### macOS
2450 ```
2451 <dict>
2452 <key>ExtensionUpdate</key>
2453 <true/> | <false/>
2454 </dict>
2455 ```
2456 #### policies.json
2457 ```
2458 {
2459 "policies": {
2460 "ExtensionUpdate": true | false
2461 }
2462 }
2463 ```
2464 ### FlashPlugin
2465 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2466
2467 `Allow` is a list of origins where Flash are allowed.
2468
2469 `Block` is a list of origins where Flash is not allowed.
2470
2471 `Default` determines whether or not Flash is allowed by default.
2472
2473 `Locked` prevents the user from changing Flash preferences.
2474
2475 **Compatibility:** Firefox 60, Firefox ESR 60\
2476 **CCK2 Equivalent:** `permissions.plugin`\
2477 **Preferences Affected:** `plugin.state.flash`
2478
2479 #### Windows (GPO)
2480 ```
2481 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2482 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2483 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2484 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2485 ```
2486 #### Windows (Intune)
2487 OMA-URI:
2488 ```
2489 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2490 ```
2491 Value (string):
2492 ```
2493 <enabled/>
2494 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2495 ```
2496 OMA-URI:
2497 ```
2498 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2499 ```
2500 Value (string):
2501 ```
2502 <enabled/> or <disabled/>
2503 ```
2504 OMA-URI:
2505 ```
2506 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2507 ```
2508 Value (string):
2509 ```
2510 <enabled/> or <disabled/>
2511 ```
2512 #### macOS
2513 ```
2514 <dict>
2515 <key>FlashPlugin</key>
2516 <dict>
2517 <key>Allow</key>
2518 <array>
2519 <string>http://example.org</string>
2520 </array>
2521 <key>Block</key>
2522 <array>
2523 <string>http://example.edu</string>
2524 </array>
2525 <key>Default</key>
2526 <true/> | <false/>
2527 <key>Locked</key>
2528 <true/> | <false/>
2529 </dict>
2530 </dict>
2531 ```
2532 #### policies.json
2533 ```
2534 {
2535 "policies": {
2536 "FlashPlugin": {
2537 "Allow": ["http://example.org/"],
2538 "Block": ["http://example.edu/"],
2539 "Default": true | false,
2540 "Locked": true | false
2541 }
2542 }
2543 }
2544 ```
2545
2546
2547
2548 ### Handlers
2549 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2550
2551 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2552
2553 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2554
2555 | Name | Description |
2556 | --- | --- |
2557 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2558 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2559 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2560 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2561 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2562 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2563
2564 **Compatibility:** Firefox 78, Firefox ESR 78\
2565 **CCK2 Equivalent:** N/A\
2566 **Preferences Affected:** N/A
2567
2568 #### Windows (GPO)
2569 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2570 ```
2571 {
2572 "mimeTypes": {
2573 "application/msword": {
2574 "action": "useSystemDefault",
2575 "ask": true | false
2576 }
2577 },
2578 "schemes": {
2579 "mailto": {
2580 "action": "useHelperApp",
2581 "ask": true | false,
2582 "handlers": [{
2583 "name": "Gmail",
2584 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2585 }]
2586 }
2587 },
2588 "extensions": {
2589 "pdf": {
2590 "action": "useHelperApp",
2591 "ask": true | false,
2592 "handlers": [{
2593 "name": "Adobe Acrobat",
2594 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2595 }]
2596 }
2597 }
2598 }
2599 ```
2600 #### Windows (Intune)
2601 OMA-URI:
2602 ```
2603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2604 ```
2605 Value (string):
2606 ```
2607 <enabled/>
2608 <data id="Handlers" value='
2609 {
2610 "mimeTypes": {
2611 "application/msword": {
2612 "action": "useSystemDefault",
2613 "ask": true | false
2614 }
2615 },
2616 "schemes": {
2617 "mailto": {
2618 "action": "useHelperApp",
2619 "ask": true | false,
2620 "handlers": [{
2621 "name": "Gmail",
2622 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2623 }]
2624 }
2625 },
2626 "extensions": {
2627 "pdf": {
2628 "action": "useHelperApp",
2629 "ask": true | false,
2630 "handlers": [{
2631 "name": "Adobe Acrobat",
2632 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2633 }]
2634 }
2635 }
2636 }
2637 '/>
2638 ```
2639 #### macOS
2640 ```
2641 <dict>
2642 <key>Handlers</key>
2643 <dict>
2644 <key>mimeTypes</key>
2645 <dict>
2646 <key>application/msword</key>
2647 <dict>
2648 <key>action</key>
2649 <string>useSystemDefault</string>
2650 <key>ask</key>
2651 <true/> | <false/>
2652 </dict>
2653 </dict>
2654 <key>schemes</key>
2655 <dict>
2656 <key>mailto</key>
2657 <dict>
2658 <key>action</key>
2659 <string>useHelperApp</string>
2660 <key>ask</key>
2661 <true/> | <false/>
2662 <key>handlers</key>
2663 <array>
2664 <dict>
2665 <key>name</key>
2666 <string>Gmail</string>
2667 <key>uriTemplate</key>
2668 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2669 </dict>
2670 </array>
2671 </dict>
2672 </dict>
2673 <key>extensions</key>
2674 <dict>
2675 <key>pdf</key>
2676 <dict>
2677 <key>action</key>
2678 <string>useHelperApp</string>
2679 <key>ask</key>
2680 <true/> | <false/>
2681 <key>handlers</key>
2682 <array>
2683 <dict>
2684 <key>name</key>
2685 <string>Adobe Acrobat</string>
2686 <key>path</key>
2687 <string>/System/Applications/Preview.app</string>
2688 </dict>
2689 </array>
2690 </dict>
2691 </dict>
2692 </dict>
2693 </dict>
2694 ```
2695 #### policies.json
2696 ```
2697 {
2698 "policies": {
2699 "Handlers": {
2700 "mimeTypes": {
2701 "application/msword": {
2702 "action": "useSystemDefault",
2703 "ask": false
2704 }
2705 },
2706 "schemes": {
2707 "mailto": {
2708 "action": "useHelperApp",
2709 "ask": true | false,
2710 "handlers": [{
2711 "name": "Gmail",
2712 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2713 }]
2714 }
2715 },
2716 "extensions": {
2717 "pdf": {
2718 "action": "useHelperApp",
2719 "ask": true | false,
2720 "handlers": [{
2721 "name": "Adobe Acrobat",
2722 "path": "/usr/bin/acroread"
2723 }]
2724 }
2725 }
2726 }
2727 }
2728 }
2729 ```
2730 ### FirefoxHome
2731 Customize the Firefox Home page.
2732
2733 **Compatibility:** Firefox 68, Firefox ESR 68\
2734 **CCK2 Equivalent:** N/A\
2735 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2736
2737 #### Windows (GPO)
2738 ```
2739 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2740 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2741 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2742 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2743 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2744 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2745 ```
2746 #### Windows (Intune)
2747 OMA-URI:
2748 ```
2749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2750 ```
2751 Value (string):
2752 ```
2753 <enabled/>
2754 <data id="FirefoxHome_Search" value="true | false"/>
2755 <data id="FirefoxHome_TopSites" value="true | false"/>
2756 <data id="FirefoxHome_Highlights" value="true | false"/>
2757 <data id="FirefoxHome_Pocket" value="true | false"/>
2758 <data id="FirefoxHome_Snippets" value="true | false"/>
2759 <data id="FirefoxHome_Locked" value="true | false"/>
2760 ```
2761 #### macOS
2762 ```
2763 <dict>
2764 <key>FirefoxHome</key>
2765 <dict>
2766 <key>Search</key>
2767 <true/> | <false/>
2768 <key>TopSites</key>
2769 <true/> | <false/>
2770 <key>Highlights</key>
2771 <true/> | <false/>
2772 <key>Pocket</key>
2773 <true/> | <false/>
2774 <key>Snippets</key>
2775 <true/> | <false/>
2776 <key>Locked</key>
2777 <true/> | <false/>
2778 </dict>
2779 </dict>
2780 ```
2781 #### policies.json
2782 ```
2783 {
2784 "policies": {
2785 "FirefoxHome": {
2786 "Search": true | false,
2787 "TopSites": true | false,
2788 "Highlights": true | false,
2789 "Pocket": true | false,
2790 "Snippets": true | false,
2791 "Locked": true | false
2792 }
2793 }
2794 }
2795 ```
2796 ### HardwareAcceleration
2797 Control hardware acceleration.
2798
2799 **Compatibility:** Firefox 60, Firefox ESR 60\
2800 **CCK2 Equivalent:** N/A\
2801 **Preferences Affected:** `layers.acceleration.disabled`
2802
2803 #### Windows (GPO)
2804 ```
2805 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2806 ```
2807 #### Windows (Intune)
2808 OMA-URI:
2809 ```
2810 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2811 ```
2812 Value (string):
2813 ```
2814 <enabled/> or <disabled/>
2815 ```
2816 #### macOS
2817 ```
2818 <dict>
2819 <key>HardwareAcceleration</key>
2820 <true/> | <false/>
2821 </dict>
2822 ```
2823 #### policies.json
2824 ```
2825 {
2826 "policies": {
2827 "HardwareAcceleration": true | false
2828 }
2829 }
2830 ```
2831 ### Homepage
2832 Configure the default homepage and how Firefox starts.
2833
2834 `URL` is the default homepage.
2835
2836 `Locked` prevents the user from changing homepage preferences.
2837
2838 `Additional` allows for more than one homepage.
2839
2840 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2841
2842 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
2843
2844 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2845 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2846 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2847
2848 #### Windows (GPO)
2849 ```
2850 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2851 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2852 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2853 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2854 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2855 ```
2856 #### Windows (Intune)
2857 OMA-URI:
2858 ```
2859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2860 ```
2861 Value (string):
2862 ```
2863 <enabled/>
2864
2865 <data id="HomepageURL" value="https://example.com"/>
2866 <data id="HomepageLocked" value="true | false"/>
2867 ```
2868 OMA-URI:
2869 ```
2870 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2871 ```
2872 Value (string):
2873 ```
2874 <enabled/>
2875
2876 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2877 ```
2878 OMA-URI:
2879 ```
2880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2881 ```
2882 Value (string):
2883 ```
2884 <enabled/>
2885
2886 <data id="StartPage" value="none | homepage | previous-session"/>
2887 ```
2888 #### macOS
2889 ```
2890 <dict>
2891 <key>Homepage</key>
2892 <dict>
2893 <key>URL</key>
2894 <string>http://example.com</string>
2895 <key>Locked</key>
2896 <true/> | <false/>
2897 <key>Additional</key>
2898 <array>
2899 <string>http://example.org</string>
2900 <string>http://example.edu</string>
2901 </array>
2902 <key>StartPage</key>
2903 <string>none | homepage | previous-session | homepage-locked</string>
2904 </dict>
2905 </dict>
2906 ```
2907 #### policies.json
2908 ```
2909 {
2910 "policies": {
2911 "Homepage": {
2912 "URL": "http://example.com/",
2913 "Locked": true | false,
2914 "Additional": ["http://example.org/",
2915 "http://example.edu/"],
2916 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2917 }
2918 }
2919 }
2920 ```
2921 ### InstallAddonsPermission
2922 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2923
2924 `Allow` is a list of origins where extension installs are allowed.
2925
2926 `Default` determines whether or not extension installs are allowed by default.
2927
2928 **Compatibility:** Firefox 60, Firefox ESR 60\
2929 **CCK2 Equivalent:** `permissions.install`\
2930 **Preferences Affected:** `xpinstall.enabled`
2931
2932 #### Windows (GPO)
2933 ```
2934 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2935 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2936 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2937 ```
2938 #### Windows (Intune)
2939 OMA-URI:
2940 ```
2941 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2942 ```
2943 Value (string):
2944 ```
2945 <enabled/>
2946 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2947 ```
2948 OMA-URI:
2949 ```
2950 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2951 ```
2952 Value (string):
2953 ```
2954 <enabled/>
2955 ```
2956 #### macOS
2957 ```
2958 <dict>
2959 <key>InstallAddonsPermission</key>
2960 <dict>
2961 <key>Allow</key>
2962 <array>
2963 <string>http://example.org</string>
2964 <string>http://example.edu</string>
2965 </array>
2966 <key>Default</key>
2967 <true/> | <false/>
2968 </dict>
2969 </dict>
2970 ```
2971 #### policies.json
2972 ```
2973 {
2974 "policies": {
2975 "InstallAddonsPermission": {
2976 "Allow": ["http://example.org/",
2977 "http://example.edu/"],
2978 "Default": true | false
2979 }
2980 }
2981 }
2982 ```
2983 ### LegacyProfiles
2984 Disable the feature enforcing a separate profile for each installation.
2985
2986 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2987
2988 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2989
2990 This policy only work on Windows via GPO (not policies.json).
2991
2992 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2993 **CCK2 Equivalent:** N/A\
2994 **Preferences Affected:** N/A
2995
2996 #### Windows (GPO)
2997 ```
2998 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2999 ```
3000 #### Windows (Intune)
3001 OMA-URI:
3002 ```
3003 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3004 ```
3005 Value (string):
3006 ```
3007 <enabled/> or <disabled/>
3008 ```
3009 ### LocalFileLinks
3010 Enable linking to local files by origin.
3011
3012 **Compatibility:** Firefox 68, Firefox ESR 68\
3013 **CCK2 Equivalent:** N/A\
3014 **Preferences Affected:** `capability.policy.localfilelinks.*`
3015
3016 #### Windows (GPO)
3017 ```
3018 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3019 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3020 ```
3021 #### Windows (Intune)
3022 OMA-URI:
3023 ```
3024 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3025 ```
3026 Value (string):
3027 ```
3028 <enabled/>
3029 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3030 ```
3031 #### macOS
3032 ```
3033 <dict>
3034 <key>LocalFileLinks</key>
3035 <array>
3036 <string>http://example.org</string>
3037 <string>http://example.edu</string>
3038 </array>
3039 </dict>
3040 ```
3041 #### policies.json
3042 ```
3043 {
3044 "policies": {
3045 "LocalFileLinks": ["http://example.org/",
3046 "http://example.edu/"]
3047 }
3048 }
3049 ```
3050 ### ManagedBookmarks
3051 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3052
3053 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3054
3055 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3056 ```
3057 {
3058 "items": {
3059 "id": "BookmarkType",
3060 "properties": {
3061 "children": {
3062 "items": {
3063 "$ref": "BookmarkType"
3064 },
3065 "type": "array"
3066 },
3067 "name": {
3068 "type": "string"
3069 },
3070 "toplevel_name": {
3071 "type": "string"
3072 },
3073 "url": {
3074 "type": "string"
3075 }
3076 },
3077 "type": "object"
3078 },
3079 "type": "array"
3080 }
3081 ```
3082 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3083 **CCK2 Equivalent:** N/A\
3084 **Preferences Affected:** N/A
3085
3086 #### Windows (GPO)
3087 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3088 ```
3089 [
3090 {
3091 "toplevel_name": "My managed bookmarks folder"
3092 },
3093 {
3094 "url": "example.com",
3095 "name": "Example"
3096 },
3097 {
3098 "name": "Mozilla links",
3099 "children": [
3100 {
3101 "url": "https://mozilla.org",
3102 "name": "Mozilla.org"
3103 },
3104 {
3105 "url": "https://support.mozilla.org/",
3106 "name": "SUMO"
3107 }
3108 ]
3109 }
3110 ]
3111 ```
3112 #### Windows (Intune)
3113 OMA-URI:
3114 ```
3115 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3116 ```
3117 Value (string):
3118 ```
3119 <enabled/>
3120 <data id="JSON" value='
3121 [
3122 {
3123 "toplevel_name": "My managed bookmarks folder"
3124 },
3125 {
3126 "url": "example.com",
3127 "name": "Example"
3128 },
3129 {
3130 "name": "Mozilla links",
3131 "children": [
3132 {
3133 "url": "https://mozilla.org",
3134 "name": "Mozilla.org"
3135 },
3136 {
3137 "url": "https://support.mozilla.org/",
3138 "name": "SUMO"
3139 }
3140 ]
3141 }
3142 ]'/>
3143 ```
3144 #### macOS
3145 ```
3146 <dict>
3147 <key>ManagedBookmarks</key>
3148 <array>
3149 <dict>
3150 <key>toplevel_name</key>
3151 <string>My managed bookmarks folder</string></dict>
3152 <dict>
3153 <key>url</key>
3154 <string>example.com</string>
3155 <key>name</key>
3156 <string>Example</string>
3157 </dict>
3158 <dict>
3159 <key>name</key>
3160 <string>Mozilla links</string>
3161 <key>children</key>
3162 <array>
3163 <dict>
3164 <key>url</key>
3165 <string>https://mozilla.org</string>
3166 <key>name</key>
3167 <string>Mozilla</string>
3168 </dict>
3169 <dict>
3170 <key>url</key>
3171 <string>https://support.mozilla.org/</string>
3172 <key>name</key>
3173 <string>SUMO</string>
3174 </dict>
3175 </array>
3176 </dict>
3177 </array>
3178 </dict>
3179 ```
3180 #### policies.json
3181 ```
3182 {
3183 "policies": {
3184 "ManagedBookmarks": [
3185 {
3186 "toplevel_name": "My managed bookmarks folder"
3187 },
3188 {
3189 "url": "example.com",
3190 "name": "Example"
3191 },
3192 {
3193 "name": "Mozilla links",
3194 "children": [
3195 {
3196 "url": "https://mozilla.org",
3197 "name": "Mozilla.org"
3198 },
3199 {
3200 "url": "https://support.mozilla.org/",
3201 "name": "SUMO"
3202 }
3203 ]
3204 }
3205 ]
3206 }
3207 }
3208 ```
3209 ### ManualAppUpdateOnly
3210
3211 Switch to manual updates only.
3212
3213 If this policy is enabled:
3214 1. The user will never be prompted to install updates
3215 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3216 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3217
3218 This policy is primarily intended for advanced end users, not for enterprises.
3219
3220 **Compatibility:** Firefox 87\
3221 **CCK2 Equivalent:** N/A\
3222 **Preferences Affected:** N/A
3223
3224 #### policies.json
3225 ```
3226 {
3227 "policies": {
3228 "ManualAppUpdateOnly": true | false
3229 }
3230 }
3231 ```
3232 ### PrimaryPassword
3233 Require or prevent using a primary (formerly master) password.
3234
3235 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
3236
3237 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
3238
3239 **Compatibility:** Firefox 79, Firefox ESR 78.1\
3240 **CCK2 Equivalent:** `noMasterPassword`\
3241 **Preferences Affected:** N/A
3242
3243 #### Windows (GPO)
3244 ```
3245 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
3246 ```
3247 #### Windows (Intune)
3248 OMA-URI:
3249 ```
3250 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
3251 ```
3252 Value (string):
3253 ```
3254 <enabled/> or <disabled/>
3255 ```
3256 #### macOS
3257 ```
3258 <dict>
3259 <key>PrimaryPassword</key>
3260 <true/> | <false/>
3261 </dict>
3262 ```
3263 #### policies.json
3264 ```
3265 {
3266 "policies": {
3267 "PrimaryPassword": true | false
3268 }
3269 }
3270 ```
3271 ### NetworkPrediction
3272 Enable or disable network prediction (DNS prefetching).
3273
3274 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3275 **CCK2 Equivalent:** N/A\
3276 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
3277
3278 #### Windows (GPO)
3279 ```
3280 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3281 ```
3282 #### Windows (Intune)
3283 OMA-URI:
3284 ```
3285 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3286 ```
3287 Value (string):
3288 ```
3289 <enabled/> or <disabled/>
3290 ```
3291 #### macOS
3292 ```
3293 <dict>
3294 <key>NetworkPrediction</key>
3295 <true/> | <false/>
3296 </dict>
3297 ```
3298 #### policies.json
3299 ```
3300 {
3301 "policies": {
3302 "NetworkPrediction": true | false
3303 }
3304 ```
3305 ### NewTabPage
3306 Enable or disable the New Tab page.
3307
3308 **Compatibility:** Firefox 68, Firefox ESR 68\
3309 **CCK2 Equivalent:** N/A\
3310 **Preferences Affected:** `browser.newtabpage.enabled`
3311
3312 #### Windows (GPO)
3313 ```
3314 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3315 ```
3316 #### Windows (Intune)
3317 OMA-URI:
3318 ```
3319 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3320 ```
3321 Value (string):
3322 ```
3323 <enabled/> or <disabled/>
3324 ```
3325 #### macOS
3326 ```
3327 <dict>
3328 <key>NewTabPage</key>
3329 <true/> | <false/>
3330 </dict>
3331 ```
3332 #### policies.json
3333 ```
3334 {
3335 "policies": {
3336 "NewTabPage": true | false
3337 }
3338 ```
3339 ### NoDefaultBookmarks
3340 Disable the creation of default bookmarks.
3341
3342 This policy is only effective if the user profile has not been created yet.
3343
3344 **Compatibility:** Firefox 60, Firefox ESR 60\
3345 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3346 **Preferences Affected:** N/A
3347
3348 #### Windows (GPO)
3349 ```
3350 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3351 ```
3352 #### Windows (Intune)
3353 OMA-URI:
3354 ```
3355 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3356 ```
3357 Value (string):
3358 ```
3359 <enabled/> or <disabled/>
3360 ```
3361 #### macOS
3362 ```
3363 <dict>
3364 <key>NoDefaultBookmarks</key>
3365 <true/> | <false/>
3366 </dict>
3367 ```
3368 #### policies.json
3369 ```
3370 {
3371 "policies": {
3372 "NoDefaultBookmarks": true | false
3373 }
3374 }
3375 ```
3376 ### OfferToSaveLogins
3377 Control whether or not Firefox offers to save passwords.
3378
3379 **Compatibility:** Firefox 60, Firefox ESR 60\
3380 **CCK2 Equivalent:** `dontRememberPasswords`\
3381 **Preferences Affected:** `signon.rememberSignons`
3382
3383 #### Windows (GPO)
3384 ```
3385 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3386 ```
3387 #### Windows (Intune)
3388 OMA-URI:
3389 ```
3390 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3391 ```
3392 Value (string):
3393 ```
3394 <enabled/> or <disabled/>
3395 ```
3396 #### macOS
3397 ```
3398 <dict>
3399 <key>OfferToSaveLogins</key>
3400 <true/> | <false/>
3401 </dict>
3402 ```
3403 #### policies.json
3404 ```
3405 {
3406 "policies": {
3407 "OfferToSaveLogins": true | false
3408 }
3409 }
3410 ```
3411 ### OfferToSaveLoginsDefault
3412 Sets the default value of signon.rememberSignons without locking it.
3413
3414 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3415 **CCK2 Equivalent:** `dontRememberPasswords`\
3416 **Preferences Affected:** `signon.rememberSignons`
3417
3418 #### Windows (GPO)
3419 ```
3420 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3421 ```
3422 #### Windows (Intune)
3423 OMA-URI:
3424 ```
3425 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3426 ```
3427 Value (string):
3428 ```
3429 <enabled/> or <disabled/>
3430 ```
3431 #### macOS
3432 ```
3433 <dict>
3434 <key>OfferToSaveLoginsDefault</key>
3435 <true/> | <false/>
3436 </dict>
3437 ```
3438 #### policies.json
3439 ```
3440 {
3441 "policies": {
3442 "OfferToSaveLoginsDefault": true | false
3443 }
3444 }
3445 ```
3446 ### OverrideFirstRunPage
3447 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3448
3449 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3450
3451 **Compatibility:** Firefox 60, Firefox ESR 60\
3452 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3453 **Preferences Affected:** `startup.homepage_welcome_url`
3454
3455 #### Windows (GPO)
3456 ```
3457 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3458 ```
3459 #### Windows (Intune)
3460 OMA-URI:
3461 ```
3462 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3463 ```
3464 Value (string):
3465 ```
3466 <enabled/>
3467 <data id="OverridePage" value="https://example.com"/>
3468 ```
3469 #### macOS
3470 ```
3471 <dict>
3472 <key>OverrideFirstRunPage</key>
3473 <string>http://example.org</string>
3474 </dict>
3475 ```
3476 #### policies.json
3477 ```
3478 {
3479 "policies": {
3480 "OverrideFirstRunPage": "http://example.org"
3481 }
3482 ```
3483 ### OverridePostUpdatePage
3484 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3485
3486 **Compatibility:** Firefox 60, Firefox ESR 60\
3487 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3488 **Preferences Affected:** `startup.homepage_override_url`
3489
3490 #### Windows (GPO)
3491 ```
3492 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3493 ```
3494 #### Windows (Intune)
3495 OMA-URI:
3496 ```
3497 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3498 ```
3499 Value (string):
3500 ```
3501 <enabled/>
3502 <data id="OverridePage" value="https://example.com"/>
3503 ```
3504 #### macOS
3505 ```
3506 <dict>
3507 <key>OverridePostUpdatePage</key>
3508 <string>http://example.org</string>
3509 </dict>
3510 ```
3511 #### policies.json
3512 ```
3513 {
3514 "policies": {
3515 "OverridePostUpdatePage": "http://example.org"
3516 }
3517 ```
3518 ### PasswordManagerEnabled
3519 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3520
3521 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3522 **CCK2 Equivalent:** N/A\
3523 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3524
3525 #### Windows (GPO)
3526 ```
3527 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3528 ```
3529 #### Windows (Intune)
3530 OMA-URI:
3531 ```
3532 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3533 ```
3534 Value (string):
3535 ```
3536 <enabled/> or <disabled/>
3537 ```
3538 #### macOS
3539 ```
3540 <dict>
3541 <key>PasswordManagerEnabled</key>
3542 <true/> | <false/>
3543 </dict>
3544 ```
3545 #### policies.json
3546 ```
3547 {
3548 "policies": {
3549 "PasswordManagerEnabled": true | false
3550 }
3551 }
3552 ```
3553 ### PDFjs
3554 Disable or configure PDF.js, the built-in PDF viewer.
3555
3556 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3557
3558 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3559
3560 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3561
3562 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3563 **CCK2 Equivalent:** N/A\
3564 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3565
3566 #### Windows (GPO)
3567 ```
3568 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3569 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3570 ```
3571 #### Windows (Intune)
3572 OMA-URI:
3573 ```
3574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3575 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3576 ```
3577 Value (string):
3578 ```
3579 <enabled/>or <disabled/>
3580 ```
3581 #### macOS
3582 ```
3583 <dict>
3584 <key>PDFjs</key>
3585 <dict>
3586 <key>Enabled</key>
3587 <true/> | <false/>
3588 <key>EnablePermissions</key>
3589 <true/> | <false/>
3590 </dict>
3591 </dict>
3592 ```
3593 #### policies.json
3594 ```
3595 {
3596 "policies": {
3597 "PSFjs": {
3598 "Enabled": true | false,
3599 "EnablePermissions": true | false
3600 }
3601 }
3602 ```
3603 ### Permissions
3604 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3605
3606 `Allow` is a list of origins where the feature is allowed.
3607
3608 `Block` is a list of origins where the feature is not allowed.
3609
3610 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3611
3612 `Locked` prevents the user from changing preferences for the feature.
3613
3614 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3615
3616 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3617 **CCK2 Equivalent:** N/A\
3618 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`.`permissions.default.xr`
3619
3620 #### Windows (GPO)
3621 ```
3622 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3623 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3624 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3625 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3626 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3627 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3628 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3629 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3630 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3631 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3632 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3633 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3634 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3635 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3636 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3637 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3638 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3639 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3640 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3641 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3642 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3643 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3644 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3645 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3646 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3647 ```
3648 #### Windows (Intune)
3649 OMA-URI:
3650 ```
3651 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3652 ```
3653 Value (string):
3654 ```
3655 <enabled/> or <disabled/>
3656 ```
3657 OMA-URI:
3658 ```
3659 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3660 ```
3661 Value (string):
3662 ```
3663 <enabled/> or <disabled/>
3664 ```
3665 OMA-URI:
3666 ```
3667 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3668 ```
3669 Value (string):
3670 ```
3671 <enabled/>
3672 <data id="Permissions" value="1&#xF000;https://example.org"/>
3673 ```
3674 OMA-URI:
3675 ```
3676 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3677 ```
3678 Value (string):
3679 ```
3680 <enabled/> or <disabled/>
3681 ```
3682 OMA-URI:
3683 ```
3684 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3685 ```
3686 Value (string):
3687 ```
3688 <enabled/> or <disabled/>
3689 ```
3690 OMA-URI:
3691 ```
3692 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3693 ```
3694 Value (string):
3695 ```
3696 <enabled/>
3697 <data id="Permissions" value="1&#xF000;https://example.org"/>
3698 ```
3699 OMA-URI:
3700 ```
3701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3702 ```
3703 Value (string):
3704 ```
3705 <enabled/>
3706 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3707 ```
3708 OMA-URI:
3709 ```
3710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3711 ```
3712 Value (string):
3713 ```
3714 <enabled/>
3715 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3716 ```
3717 OMA-URI:
3718 ```
3719 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3720 ```
3721 Value (string):
3722 ```
3723 <enabled/> or <disabled/>
3724 ```
3725 OMA-URI:
3726 ```
3727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
3728 ```
3729 Value (string):
3730 ```
3731 <enabled/>
3732 <data id="Permissions" value="1&#xF000;https://example.org"/>
3733 ```
3734 OMA-URI:
3735 ```
3736 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
3737 ```
3738 Value (string):
3739 ```
3740 <enabled/>
3741 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3742 ```
3743 OMA-URI:
3744 ```
3745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
3746 ```
3747 Value (string):
3748 ```
3749 <enabled/> or <disabled/>
3750 ```
3751 OMA-URI:
3752 ```
3753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
3754 ```
3755 Value (string):
3756 ```
3757 <enabled/> or <disabled/>
3758 ```
3759 #### macOS
3760 ```
3761 <dict>
3762 <key>Permissions</key>
3763 <dict>
3764 <key>Camera</key>
3765 <dict>
3766 <key>Allow</key>
3767 <array>
3768 <string>https://example.org</string>
3769 <string>https://example.org:1234</string>
3770 </array>
3771 <key>Block</key>
3772 <array>
3773 <string>https://example.edu</string>
3774 </array>
3775 <key>BlockNewRequests</key>
3776 <true/> | <false/>
3777 <key>Locked</key>
3778 <true/> | <false/>
3779 </dict>
3780 <key>Microphone</key>
3781 <dict>
3782 <key>Allow</key>
3783 <array>
3784 <string>https://example.org</string>
3785 </array>
3786 <key>Block</key>
3787 <array>
3788 <string>https://example.edu</string>
3789 </array>
3790 <key>BlockNewRequests</key>
3791 <true/> | <false/>
3792 <key>Locked</key>
3793 <true/> | <false/>
3794 </dict>
3795 <key>Location</key>
3796 <dict>
3797 <key>Allow</key>
3798 <array>
3799 <string>https://example.org</string>
3800 </array>
3801 <key>Block</key>
3802 <array>
3803 <string>https://example.edu</string>
3804 </array>
3805 <key>BlockNewRequests</key>
3806 <true/> | <false/>
3807 <key>Locked</key>
3808 <true/> | <false/>
3809 </dict>
3810 <key>Notifications</key>
3811 <dict>
3812 <key>Allow</key>
3813 <array>
3814 <string>https://example.org</string>
3815 </array>
3816 <key>Block</key>
3817 <array>
3818 <string>https://example.edu</string>
3819 </array>
3820 <key>BlockNewRequests</key>
3821 <true/>
3822 <key>Locked</key>
3823 <true/>
3824 </dict>
3825 <key>Autoplay</key>
3826 <dict>
3827 <key>Allow</key>
3828 <array>
3829 <string>https://example.org</string>
3830 </array>
3831 <key>Block</key>
3832 <array>
3833 <string>https://example.edu</string>
3834 </array>
3835 <key>Default</key>
3836 <string>allow-audio-video | block-audio | block-audio-video</string>
3837 <key>Locked</key>
3838 <true/> | <false/>
3839 </dict>
3840 </dict>
3841 </dict>
3842 ```
3843 #### policies.json
3844 ```
3845 {
3846 "policies": {
3847 "Permissions": {
3848 "Camera": {
3849 "Allow": ["https://example.org","https://example.org:1234"],
3850 "Block": ["https://example.edu"],
3851 "BlockNewRequests": true | false,
3852 "Locked": true | false
3853 },
3854 "Microphone": {
3855 "Allow": ["https://example.org"],
3856 "Block": ["https://example.edu"],
3857 "BlockNewRequests": true | false,
3858 "Locked": true | false
3859 },
3860 "Location": {
3861 "Allow": ["https://example.org"],
3862 "Block": ["https://example.edu"],
3863 "BlockNewRequests": true | false,
3864 "Locked": true | false
3865 },
3866 "Notifications": {
3867 "Allow": ["https://example.org"],
3868 "Block": ["https://example.edu"],
3869 "BlockNewRequests": true | false,
3870 "Locked": true | false
3871 },
3872 "Autoplay": {
3873 "Allow": ["https://example.org"],
3874 "Block": ["https://example.edu"],
3875 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3876 "Locked": true | false
3877 }
3878 }
3879 }
3880 }
3881 ```
3882 ### PictureInPicture
3883
3884 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
3885
3886 **Compatibility:** Firefox 78, Firefox ESR 78\
3887 **CCK2 Equivalent:** N/A\
3888 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3889
3890 #### Windows (GPO)
3891 ```
3892 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
3893 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
3894
3895 ```
3896 #### Windows (Intune)
3897 OMA-URI:
3898 ```
3899 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
3900 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
3901 ```
3902 Value (string):
3903 ```
3904 <enabled/> or <disabled/>
3905 ```
3906 #### macOS
3907 ```
3908 <dict>
3909 <key>PictureInPicture</key>
3910 <dict>
3911 <key>Enabled</key>
3912 <true/> | <false/>
3913 <key>Locked</key>
3914 <true/> | <false/>
3915 </dict>
3916 </dict>
3917 ```
3918 #### policies.json
3919 ```
3920 {
3921 "policies": {
3922 "PictureInPicture": {
3923 "Enabled": true | false,
3924 "Locked": true, false
3925 }
3926 }
3927 }
3928 ```
3929 ### PopupBlocking
3930 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3931
3932 `Allow` is a list of origins where popup-windows are allowed.
3933
3934 `Default` determines whether or not pop-up windows are allowed by default.
3935
3936 `Locked` prevents the user from changing pop-up preferences.
3937
3938 **Compatibility:** Firefox 60, Firefox ESR 60\
3939 **CCK2 Equivalent:** `permissions.popup`\
3940 **Preferences Affected:** `dom.disable_open_during_load`
3941
3942 #### Windows (GPO)
3943 ```
3944 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3945 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3946 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3947 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3948 ```
3949 #### Windows (Intune)
3950 OMA-URI:
3951 ```
3952 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3953 ```
3954 Value (string):
3955 ```
3956 <enabled/>
3957 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3958 ```
3959 OMA-URI:
3960 ```
3961 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3962 ```
3963 Value (string):
3964 ```
3965 <enabled/> or <disabled/>
3966 ```
3967 OMA-URI:
3968 ```
3969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3970 ```
3971 Value (string):
3972 ```
3973 <enabled/> or <disabled/>
3974 ```
3975 #### macOS
3976 ```
3977 <dict>
3978 <key>PopupBlocking</key>
3979 <dict>
3980 <key>Allow</key>
3981 <array>
3982 <string>http://example.org</string>
3983 <string>http://example.edu</string>
3984 </array>
3985 <key>Default</key>
3986 <true/> | <false/>
3987 <key>Locked</key>
3988 <true/> | <false/>
3989 </dict>
3990 </dict>
3991 ```
3992 #### policies.json
3993 ```
3994 {
3995 "policies": {
3996 "PopupBlocking": {
3997 "Allow": ["http://example.org/",
3998 "http://example.edu/"],
3999 "Default": true | false,
4000 "Locked": true | false
4001 }
4002 }
4003 }
4004 ```
4005 ### Preferences
4006 Set and lock preferences.
4007
4008 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4009
4010 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4011
4012 Preferences that start with the following prefixes are supported:
4013 ```
4014 accessibility.
4015 app.update.* (Firefox 86, Firefox 78.8)
4016 browser.
4017 datareporting.policy.
4018 dom.
4019 extensions.
4020 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4021 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4022 geo.
4023 intl.
4024 layout.
4025 media.
4026 network.
4027 pdfjs. (Firefox 84, Firefox ESR 78.6)
4028 places.
4029 print.
4030 signon. (Firefox 83, Firefox ESR 78.5)
4031 spellchecker. (Firefox 84, Firefox ESR 78.6)
4032 ui.
4033 widget.
4034 ```
4035 as well as the following security preferences:
4036 | Preference | Type | Default
4037 | --- | --- | ---
4038 | security.default_personal_cert | string | Ask Every Time
4039 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4040 | security.insecure_connection_text.enabled | bool | false
4041 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4042 | security.insecure_connection_text.pbmode.enabled | bool | false
4043 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4044 | security.insecure_field_warning.contextual.enabled | bool | true
4045 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4046 | security.mixed_content.block_active_content | boolean | true
4047 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4048 | security.osclientcerts.autoload | boolean | false
4049 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4050 | security.ssl.errorReporting.enabled | boolean | true
4051 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4052 | security.tls.hello_downgrade_check | boolean | true
4053 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4054 | security.tls.version.enable-deprecated | boolean | false
4055 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8)
4056 | security.warn_submit_secure_to_insecure | boolean | true
4057 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting s form from https to http.
4058 &nbsp;
4059
4060 Using the preference as the key, set the `Value` to the corresponding preference value.
4061
4062 `Status` can be "default", "locked", "user" or "clear"
4063
4064 Default preferences can be modified by the user.
4065
4066 If a value is locked, it is also set as the default.
4067
4068 User preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy.
4069
4070 User preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4071
4072 See the examples below for more detail.
4073
4074 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4075
4076 Status
4077 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4078 **CCK2 Equivalent:** `preferences`\
4079 **Preferences Affected:** Many
4080
4081 #### Windows (GPO)
4082 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4083 ```
4084 {
4085 "accessibility.force_disabled": {
4086 "Value": 1,
4087 "Status": "default"
4088 },
4089 "browser.cache.disk.parent_directory": {
4090 "Value": "SOME_NATIVE_PATH",
4091 "Status": "user"
4092 },
4093 "browser.tabs.warnOnClose": {
4094 "Value": false,
4095 "Status": "locked"
4096 }
4097 }
4098 ```
4099 #### Windows (Intune)
4100 OMA-URI:
4101 ```
4102 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4103 ```
4104 Value (string):
4105 ```
4106 <enabled/>
4107 <data id="JSON" value='
4108 {
4109 "accessibility.force_disabled": {
4110 "Value": 1,
4111 "Status": "default"
4112 },
4113 "browser.cache.disk.parent_directory": {
4114 "Value": "SOME_NATIVE_PATH",
4115 "Status": "user"
4116 },
4117 "browser.tabs.warnOnClose": {
4118 "Value": false,
4119 "Status": "locked"
4120 }
4121 }'/>
4122 ```
4123 #### macOS
4124 ```
4125 <dict>
4126 <key>Preferences</key>
4127 <dict>
4128 <key>accessibility.force_disabled</key>
4129 <dict>
4130 <key>Value</key>
4131 <integer>1</integer>
4132 <key>Status</key>
4133 <string>default</string>
4134 </dict>
4135 <key>browser.cache.disk.parent_directory</key>
4136 <dict>
4137 <key>Value</key>
4138 <string>SOME_NATIVE_PATH</string>
4139 <key>Status</key>
4140 <string>user</string>
4141 </dict>
4142 <key>browser.tabs.warnOnClose</key>
4143 <dict>
4144 <key>Value</key>
4145 <false/>
4146 <key>Status</key>
4147 <string>locked</string>
4148 </dict>
4149 </dict>
4150 </dict>
4151 ```
4152 #### policies.json
4153 ```
4154 {
4155 "policies": {
4156 "Preferences": {
4157 "accessibility.force_disabled": {
4158 "Value": 1,
4159 "Status": "default"
4160 },
4161 "browser.cache.disk.parent_directory": {
4162 "Value": "SOME_NATIVE_PATH",
4163 "Status": "user"
4164 },
4165 "browser.tabs.warnOnClose": {
4166 "Value": false,
4167 "Status": "locked"
4168 }
4169 }
4170 }
4171 }
4172 ```
4173 ### Preferences (Deprecated)
4174 Set and lock certain preferences.
4175
4176 **Compatibility:** See below\
4177 **CCK2 Equivalent:** `preferences`\
4178 **Preferences Affected:** See below
4179
4180 | Preference | Type | Compatibility | Default
4181 | --- | --- | --- | ---
4182 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4183 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4184 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4185 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4186 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4187 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4188 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4189 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4190 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4191 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4192 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4193 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4194 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4195 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4196 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4197 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4198 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4199 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4200 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4201 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4202 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4203 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4204 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4205 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4206 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4207 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4208 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4209 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4210 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4211 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4212 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4213 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4214 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4215 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4216 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4217 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4218 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4219 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4220 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4221 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4222 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4223 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4224 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4225 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4226 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4227 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4228 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4229 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4230 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4231 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4232 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4233 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4234 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4235 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4236 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4237 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4238 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4239 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4240 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4241 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4242 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4243 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4244 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4245 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4246 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4247 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4248 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4249 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4250 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4251 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4252 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4253 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4254 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4255 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4256 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4257 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4258 disabled
4259 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4260 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4261 disabled
4262 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4263 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4264 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4265 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4266 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4267 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4268 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4269 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4270 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4271 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4272 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4273 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4274 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4275 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4276 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4277 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4278 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4279 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4280 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4281 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4282 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4283 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4284 #### Windows (GPO)
4285 ```
4286 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4287 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4288 ```
4289 #### Windows (Intune)
4290 OMA-URI: (periods are replaced by underscores)
4291 ```
4292 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4293 ```
4294 Value (string):
4295 ```
4296 <enabled/> or <disabled/>
4297 ```
4298 OMA-URI: (periods are replaced by underscores)
4299 ```
4300 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4301 ```
4302 Value (string):
4303 ```
4304 <enabled/>
4305 <data id="Preferences_String" value="string_value"/>
4306 ```
4307 #### macOS
4308 ```
4309 <dict>
4310 <key>Preferences</key>
4311 <dict>
4312 <key>boolean_preference_name</key>
4313 <true/> | <false/>
4314 <key>string_preference_name</key>
4315 <string>string_value</string>
4316 </dict>
4317 </dict>
4318 ```
4319 #### policies.json
4320 ```
4321 {
4322 "policies": {
4323 "Preferences": {
4324 "boolean_preference_name": true | false,
4325 "string_preference_name": "string_value"
4326 }
4327 }
4328 }
4329 ```
4330 ### PromptForDownloadLocation
4331 Ask where to save each file before downloading.
4332
4333 **Compatibility:** Firefox 68, Firefox ESR 68\
4334 **CCK2 Equivalent:** N/A\
4335 **Preferences Affected:** `browser.download.useDownloadDir`
4336
4337 #### Windows (GPO)
4338 ```
4339 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4340 ```
4341 #### Windows (Intune)
4342 OMA-URI:
4343 ```
4344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4345 ```
4346 Value (string):
4347 ```
4348 <enabled/> or <disabled/>
4349 ```
4350 #### macOS
4351 ```
4352 <dict>
4353 <key>PromptForDownloadLocation</key>
4354 <true/> | <false/>
4355 </dict>
4356 ```
4357 #### policies.json
4358 ```
4359 {
4360 "policies": {
4361 "PromptForDownloadLocation": true | false
4362 }
4363 }
4364 ```
4365 ### Proxy
4366 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4367 To specify ports, append them to the hostnames with a colon (:).
4368
4369 `Mode` is the proxy method being used.
4370
4371 `Locked` is whether or not proxy settings can be changed.
4372
4373 `HTTPProxy` is the HTTP proxy server.
4374
4375 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4376
4377 `SSLProxy` is the SSL proxy server.
4378
4379 `FTPProxy` is the FTP proxy server.
4380
4381 `SOCKSProxy` is the SOCKS proxy server
4382
4383 `SOCKSVersion` is the SOCKS version (4 or 5)
4384
4385 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4386
4387 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4388
4389 `AutoLogin` means do not prompt for authentication if password is saved.
4390
4391 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4392
4393 **Compatibility:** Firefox 60, Firefox ESR 60\
4394 **CCK2 Equivalent:** `networkProxy*`\
4395 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
4396
4397 #### Windows (GPO)
4398 ```
4399 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4400 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4401 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4402 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4403 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4404 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4405 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4406 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4407 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4408 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4409 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4410 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4411 ```
4412 #### Windows (Intune)
4413 OMA-URI:
4414 ```
4415 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4416 ```
4417 Value (string):
4418 ```
4419 <enabled/>
4420 <data id="ProxyLocked" value="true | false"/>
4421 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4422 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4423 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4424 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4425 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4426 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4427 <data id="SOCKSVersion" value="4 | 5"/>
4428 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4429 <data id="Passthrough" value="<local>"/>
4430 <data id="AutoLogin" value="true | false"/>
4431 <data id="UseProxyForDNS" value="true | false"/>
4432 ```
4433 #### macOS
4434 ```
4435 <dict>
4436 <key>Proxy</key>
4437 <dict>
4438 <key>Mode</key>
4439 <string>none | system | manual | autoDetect | autoConfig</string>
4440 <key>Locked</key>
4441 <true> | </false>
4442 <key>HTTPProxy</key>
4443 <string>https://httpproxy.example.com</string>
4444 <key>UseHTTPProxyForAllProtocols</key>
4445 <true> | </false>
4446 <key>SSLProxy</key>
4447 <string>https://sslproxy.example.com</string>
4448 <key>FTPProxy</key>
4449 <string>https://ftpproxy.example.com</string>
4450 <key>SOCKSProxy</key>
4451 <string>https://socksproxy.example.com</string>
4452 <key>SOCKSVersion</key>
4453 <string>4 | 5</string>
4454 <key>Passthrough</key>
4455 <string>&lt;local>&gt;</string>
4456 <key>AutoConfigURL</key>
4457 <string>URL_TO_AUTOCONFIG</string>
4458 <key>AutoLogin</key>
4459 <true> | </false>
4460 <key>UseProxyForDNS</key>
4461 <true> | </false>
4462 </dict>
4463 </dict>
4464 ```
4465 #### policies.json
4466 ```
4467 {
4468 "policies": {
4469 "Proxy": {
4470 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4471 "Locked": true | false,
4472 "HTTPProxy": "hostname",
4473 "UseHTTPProxyForAllProtocols": true | false,
4474 "SSLProxy": "hostname",
4475 "FTPProxy": "hostname",
4476 "SOCKSProxy": "hostname",
4477 "SOCKSVersion": 4 | 5
4478 "Passthrough": "<local>",
4479 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4480 "AutoLogin": true | false,
4481 "UseProxyForDNS": true | false
4482 }
4483 }
4484 }
4485 ```
4486 ### RequestedLocales
4487 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4488
4489 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4490
4491 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4492 **CCK2 Equivalent:** N/A\
4493 **Preferences Affected:** N/A
4494 #### Windows (GPO)
4495 ```
4496 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4497 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4498
4499 or
4500
4501 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4502 ```
4503 #### Windows (Intune)
4504 OMA-URI:
4505 ```
4506 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4507 ```
4508 Value (string):
4509 ```
4510 <enabled/>
4511 <data id="Preferences_String" value="de,en-US"/>
4512 ```
4513 #### macOS
4514 ```
4515 <dict>
4516 <key>RequestedLocales</key>
4517 <array>
4518 <string>de</string>
4519 <string>en-US</string>
4520 </array>
4521 </dict>
4522
4523 or
4524
4525 <dict>
4526 <key>RequestedLocales</key>
4527 <string>de,en-US</string>
4528 </dict>
4529
4530 ```
4531 #### policies.json
4532 ```
4533 {
4534 "policies": {
4535 "RequestedLocales": ["de", "en-US"]
4536 }
4537 }
4538
4539 or
4540
4541 {
4542 "policies": {
4543 "RequestedLocales": "de,en-US"
4544 }
4545 }
4546 ```
4547 <a name="SanitizeOnShutdown"></a>
4548
4549 ### SanitizeOnShutdown (Selective)
4550 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4551
4552 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4553
4554 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4555 **CCK2 Equivalent:** N/A\
4556 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4557 #### Windows (GPO)
4558 ```
4559 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4560 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4561 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4562 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4563 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4564 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4565 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4566 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4567 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4568 ```
4569 #### Windows (Intune)
4570 OMA-URI:
4571 ```
4572 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4573 ```
4574 Value (string):
4575 ```
4576 <enabled/> or <disabled/>
4577 ```
4578 OMA-URI:
4579 ```
4580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4581 ```
4582 Value (string):
4583 ```
4584 <enabled/> or <disabled/>
4585 ```
4586 OMA-URI:
4587 ```
4588 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4589 ```
4590 Value (string):
4591 ```
4592 <enabled/> or <disabled/>
4593 ```
4594 OMA-URI:
4595 ```
4596 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4597 ```
4598 Value (string):
4599 ```
4600 <enabled/> or <disabled/>
4601 ```
4602 OMA-URI:
4603 ```
4604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4605 ```
4606 Value (string):
4607 ```
4608 <enabled/> or <disabled/>
4609 ```
4610 OMA-URI:
4611 ```
4612 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4613 ```
4614 Value (string):
4615 ```
4616 <enabled/> or <disabled/>
4617 ```
4618 OMA-URI:
4619 ```
4620 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4621 ```
4622 Value (string):
4623 ```
4624 <enabled/> or <disabled/>
4625 ```
4626 OMA-URI:
4627 ```
4628 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4629 ```
4630 Value (string):
4631 ```
4632 <enabled/> or <disabled/>
4633 ```
4634 OMA-URI:
4635 ```
4636 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4637 ```
4638 Value (string):
4639 ```
4640 <enabled/> or <disabled/>
4641 ```
4642 #### macOS
4643 ```
4644 <dict>
4645 <key>SanitizeOnShutdown</key>
4646 <dict>
4647 <key>Cache</key>
4648 <true/> | <false/>
4649 <key>Cookies</key>
4650 <true/> | <false/>
4651 <key>Downloads</key>
4652 <true/> | <false/>
4653 <key>FormData</key>
4654 <true/> | <false/>
4655 <key>History</key>
4656 <true/> | <false/>
4657 <key>Sessions</key>
4658 <true/> | <false/>
4659 <key>SiteSettings</key>
4660 <true/> | <false/>
4661 <key>OfflineApps</key>
4662 <true/> | <false/>
4663 <key>Locked</key>
4664 <true/> | <false/>
4665 </dict>
4666 </dict>
4667 ```
4668 #### policies.json
4669 ```
4670 {
4671 "policies": {
4672 "SanitizeOnShutdown": {
4673 "Cache": true | false,
4674 "Cookies": true | false,
4675 "Downloads": true | false,
4676 "FormData": true | false,
4677 "History": true | false,
4678 "Sessions": true | false,
4679 "SiteSettings": true | false,
4680 "OfflineApps": true | false,
4681 "Locked": true | false
4682 }
4683 }
4684 }
4685 ```
4686 ### SanitizeOnShutdown (All)
4687 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4688
4689 **Compatibility:** Firefox 60, Firefox ESR 60\
4690 **CCK2 Equivalent:** N/A\
4691 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4692 #### Windows (GPO)
4693 ```
4694 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4695 ```
4696 #### Windows (Intune)
4697 OMA-URI:
4698 ```
4699 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4700 ```
4701 Value (string):
4702 ```
4703 <enabled/> or <disabled/>
4704 ```
4705 #### macOS
4706 ```
4707 <dict>
4708 <key>SanitizeOnShutdown</key>
4709 <true/> | <false/>
4710 </dict>
4711 ```
4712 #### policies.json
4713 ```
4714 {
4715 "policies": {
4716 "SanitizeOnShutdown": true | false
4717 }
4718 }
4719 ```
4720 ### SearchBar
4721 Set whether or not search bar is displayed.
4722
4723 **Compatibility:** Firefox 60, Firefox ESR 60\
4724 **CCK2 Equivalent:** `showSearchBar`\
4725 **Preferences Affected:** N/A
4726
4727 #### Windows (GPO)
4728 ```
4729 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4730 ```
4731
4732 #### Windows (Intune)
4733 OMA-URI:
4734 ```
4735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4736 ```
4737 Value (string):
4738 ```
4739 <enabled/>
4740 <data id="Permissions" value="unified | separate"/>
4741 ```
4742 #### macOS
4743 ```
4744 <dict>
4745 <key>SearchBar</key>
4746 <string>unified | separate</string>
4747 </dict>
4748 ```
4749 #### policies.json
4750 ```
4751 {
4752 "policies": {
4753 "SearchBar": "unified" | "separate"
4754 }
4755 }
4756 ```
4757 <a name="SearchEngines"></a>
4758
4759 ### SearchEngines (This policy is only available on the ESR.)
4760
4761 ### SearchEngines | Default
4762
4763 Set the default search engine. This policy is only available on the ESR.
4764
4765 **Compatibility:** Firefox ESR 60\
4766 **CCK2 Equivalent:** `defaultSearchEngine`\
4767 **Preferences Affected:** N/A
4768
4769 #### Windows (GPO)
4770 ```
4771 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4772 ```
4773 #### Windows (Intune)
4774 OMA-URI:
4775 ```
4776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4777 ```
4778 Value (string):
4779 ```
4780 <enabled/>
4781 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4782 ```
4783 #### macOS
4784 ```
4785 <dict>
4786 <key>SearchEngines</key>
4787 <dict>
4788 <key>Default</key>
4789 <string>NAME_OF_SEARCH_ENGINE</string>
4790 </dict>
4791 </dict>
4792 ```
4793 #### policies.json
4794 ```
4795 {
4796 "policies": {
4797 "SearchEngines": {
4798 "Default": "NAME_OF_SEARCH_ENGINE"
4799 }
4800 }
4801 }
4802 ```
4803 ### SearchEngines | PreventInstalls
4804
4805 Prevent installing search engines from webpages.
4806
4807 **Compatibility:** Firefox ESR 60\
4808 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4809 **Preferences Affected:** N/A
4810
4811 #### Windows (GPO)
4812 ```
4813 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4814 ```
4815 #### Windows (Intune)
4816 OMA-URI:
4817 ```
4818 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4819 ```
4820 Value (string):
4821 ```
4822 <enabled/> or <disabled/>
4823 ```
4824 #### macOS
4825 ```
4826 <dict>
4827 <key>SearchEngines</key>
4828 <dict>
4829 <key>PreventInstalls</key>
4830 <true/> | <false/>
4831 </dict>
4832 </dict>
4833 ```
4834 #### policies.json
4835 ```
4836 {
4837 "policies": {
4838 "SearchEngines": {
4839 "PreventInstalls": true | false
4840 }
4841 }
4842 }
4843 ```
4844 ### SearchEngines | Remove
4845
4846 Hide built-in search engines. This policy is only available on the ESR.
4847
4848 **Compatibility:** Firefox ESR 60.2\
4849 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4850 **Preferences Affected:** N/A
4851
4852 #### Windows (GPO)
4853 ```
4854 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4855 ```
4856 #### Windows (Intune)
4857 OMA-URI:
4858 ```
4859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4860 ```
4861 Value (string):
4862 ```
4863 <enabled/>
4864 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4865 ```
4866 #### macOS
4867 ```
4868 <dict>
4869 <key>SearchEngines</key>
4870 <dict>
4871 <key>Remove</key>
4872 <array>
4873 <string>NAME_OF_SEARCH_ENGINE</string>
4874 </array>
4875 </dict>
4876 </dict>
4877 ```
4878 #### policies.json
4879 ```
4880 {
4881 "policies": {
4882 "SearchEngines": {
4883 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4884 }
4885 }
4886 }
4887 ```
4888 ### SearchEngines | Add
4889
4890 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4891
4892 `Name` is the name of the search engine.
4893
4894 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4895
4896 `Method` is either GET or POST
4897
4898 `IconURL` is a URL for the icon to use.
4899
4900 `Alias` is a keyword to use for the engine.
4901
4902 `Description` is a description of the search engine.
4903
4904 `PostData` is the POST data as name value pairs separated by &.
4905
4906 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4907
4908 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4909 **CCK2 Equivalent:** `searchplugins`\
4910 **Preferences Affected:** N/A
4911
4912 #### Windows (GPO)
4913 ```
4914 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4915 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4916 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4917 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4918 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4919 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4920 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4921 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4922 ```
4923 #### Windows (Intune)
4924 OMA-URI:
4925 ```
4926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4927 ```
4928 Value (string):
4929 ```
4930 <enabled/>
4931 <data id="SearchEngine_Name" value="Example1"/>
4932 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4933 <data id="SearchEngine_Method" value="GET | POST"/>
4934 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4935 <data id="SearchEngine_Alias" value="example"/>
4936 <data id="SearchEngine_Description" value="Example Description"/>
4937 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4938 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4939 ```
4940 #### macOS
4941 ```
4942 <dict>
4943 <key>SearchEngines</key>
4944 <dict>
4945 <key>Add</key>
4946 <array>
4947 <dict>
4948 <key>Name</key>
4949 <string>Example1</string>
4950 <key>URLTemplate</key>
4951 <string>https://www.example.org/q={searchTerms}</string>
4952 <key>Method</key>
4953 <string>GET | POST </string>
4954 <key>IconURL</key>
4955 <string>https://www.example.org/favicon.ico</string>
4956 <key>Alias</key>
4957 <string>example</string>
4958 <key>Description</key>
4959 <string>Example Description</string>
4960 <key>SuggestURLTemplate</key>
4961 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4962 <key>PostData</key>
4963 <string>name=value&q={searchTerms}</string>
4964 </dict>
4965 <array>
4966 </dict>
4967 </dict>
4968 ```
4969 #### policies.json
4970 ```
4971 {
4972 "policies": {
4973 "SearchEngines": {
4974 "Add": [
4975 {
4976 "Name": "Example1",
4977 "URLTemplate": "https://www.example.org/q={searchTerms}",
4978 "Method": "GET" | "POST",
4979 "IconURL": "https://www.example.org/favicon.ico",
4980 "Alias": "example",
4981 "Description": "Description",
4982 "PostData": "name=value&q={searchTerms}",
4983 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4984 }
4985 ]
4986 }
4987 }
4988 }
4989 ```
4990 ### SearchSuggestEnabled
4991
4992 Enable search suggestions.
4993
4994 **Compatibility:** Firefox 68, Firefox ESR 68\
4995 **CCK2 Equivalent:** N/A\
4996 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4997
4998 #### Windows (GPO)
4999 ```
5000 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5001 ```
5002 #### Windows (Intune)
5003 OMA-URI:
5004 ```
5005 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5006 ```
5007 Value (string):
5008 ```
5009 <enabled/> or <disabled/>
5010 ```
5011 #### macOS
5012 ```
5013 <dict>
5014 <key>SearchSuggestEnabled</key>
5015 <true/> | <false/>
5016 </dict>
5017 ```
5018 #### policies.json
5019 ```
5020 {
5021 "policies": {
5022 "SearchSuggestEnabled": true | false
5023 }
5024 }
5025 ```
5026 ### SecurityDevices
5027
5028 Install PKCS #11 modules.
5029
5030 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5031 **CCK2 Equivalent:** `certs.devices`\
5032 **Preferences Affected:** N/A
5033
5034 #### Windows (GPO)
5035 ```
5036 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5037 ```
5038 #### Windows (Intune)
5039 OMA-URI:
5040 ```
5041 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5042 ```
5043 Value (string):
5044 ```
5045 <enabled/>
5046 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5047 ```
5048 #### macOS
5049 ```
5050 <dict>
5051 <key>SecurityDevices</key>
5052 <dict>
5053 <key>NAME_OF_DEVICE</key>
5054 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5055 </dict>
5056 </dict>
5057 ```
5058
5059 #### policies.json
5060 ```
5061 {
5062 "policies": {
5063 "SecurityDevices": {
5064 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5065 }
5066 }
5067 }
5068 ```
5069 ### SSLVersionMax
5070
5071 Set and lock the maximum version of TLS.
5072
5073 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5074 **CCK2 Equivalent:** N/A\
5075 **Preferences Affected:** `security.tls.version.max`
5076
5077 #### Windows (GPO)
5078 ```
5079 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5080 ```
5081 #### Windows (Intune)
5082 OMA-URI:
5083 ```
5084 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5085 ```
5086 Value (string):
5087 ```
5088 <enabled/>
5089 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5090 ```
5091 #### macOS
5092 ```
5093 <dict>
5094 <key>SSLVersionMax</key>
5095 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5096 </dict>
5097 ```
5098
5099 #### policies.json
5100 ```
5101 {
5102 "policies": {
5103 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5104 }
5105 }
5106 ```
5107 ### SSLVersionMin
5108
5109 Set and lock the minimum version of TLS.
5110
5111 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5112 **CCK2 Equivalent:** N/A\
5113 **Preferences Affected:** `security.tls.version.min`
5114
5115 #### Windows (GPO)
5116 ```
5117 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5118 ```
5119 #### Windows (Intune)
5120 OMA-URI:
5121 ```
5122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5123 ```
5124 Value (string):
5125 ```
5126 <enabled/>
5127 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5128 ```
5129 #### macOS
5130 ```
5131 <dict>
5132 <key>SSLVersionMin</key>
5133 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5134 </dict>
5135 ```
5136
5137 #### policies.json
5138 ```
5139 {
5140 "policies": {
5141 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5142 }
5143 }
5144 ```
5145 ### SupportMenu
5146 Add a menuitem to the help menu for specifying support information.
5147
5148 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5149 **CCK2 Equivalent:** helpMenu\
5150 **Preferences Affected:** N/A
5151
5152 #### Windows (GPO)
5153 ```
5154 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5155 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5156 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5157 ```
5158 #### Windows (Intune)
5159 OMA-URI:
5160 ```
5161 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5162 ```
5163 Value (string):
5164 ```
5165 <enabled/>
5166 <data id="SupportMenuTitle" value="Support Menu"/>
5167 <data id="SupportMenuURL" value="http://example.com/support"/>
5168 <data id="SupportMenuAccessKey" value="S">
5169 ```
5170 #### macOS
5171 ```
5172 <dict>
5173 <key>SupportMenu</key>
5174 <dict>
5175 <key>Title</key>
5176 <string>SupportMenu</string>
5177 <key>URL</key>
5178 <string>http://example.com/support</string>
5179 <key>AccessKey</key>
5180 <string>S</string>
5181 </dict>
5182 </dict>
5183 ```
5184 #### policies.json
5185 ```
5186 {
5187 "policies": {
5188 "SupportMenu": {
5189 "Title": "Support Menu",
5190 "URL": "http://example.com/support",
5191 "AccessKey": "S"
5192 }
5193 }
5194 }
5195 ```
5196 ### UserMessaging
5197
5198 Prevent Firefox from messaging the user in certain situations.
5199
5200 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
5201
5202 `ExtensionRecommendations` Don't recommend extensions while the user is visiting web pages.
5203
5204 `FeatureRecommendations` Don't recommend browser features.
5205
5206 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
5207
5208 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5209 **CCK2 Equivalent:** N/A\
5210 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
5211
5212 #### Windows (GPO)
5213 ```
5214 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5215 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5216 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5217 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5218 ```
5219 #### Windows (Intune)
5220 OMA-URI:
5221 ```
5222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
5223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
5224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
5225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
5226 ```
5227 Value (string):
5228 ```
5229 <enabled/> or <disabled/>
5230 ```
5231 #### macOS
5232 ```
5233 <dict>
5234 <key>UserMessaging</key>
5235 <dict>
5236 <key>WhatsNew</key>
5237 <true/> | <false/>
5238 <key>ExtensionRecommendations</key>
5239 <true/> | <false/>
5240 <key>FeatureRecommendations</key>
5241 <true/> | <false/>
5242 <key>UrlbarInterventions</key>
5243 <true/> | <false/>
5244 </dict>
5245 </dict>
5246 ```
5247 #### policies.json
5248 ```
5249 {
5250 "policies": {
5251 "UserMessaging": {
5252 "WhatsNew": true | false,
5253 "ExtensionRecommendations": true | false,
5254 "FeatureRecommendations": true | false,
5255 "UrlbarInterventions": true | false
5256 }
5257 }
5258 }
5259 ```
5260 ### WebsiteFilter
5261 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5262 The arrays are limited to 1000 entries each.
5263
5264 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5265
5266 **Compatibility:** Firefox 60, Firefox ESR 60\
5267 **CCK2 Equivalent:** N/A\
5268 **Preferences Affected:** N/A
5269
5270 #### Windows (GPO)
5271 ```
5272 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5273 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5274 ```
5275 #### Windows (Intune)
5276 OMA-URI:
5277 ```
5278 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5279 ```
5280 Value (string):
5281 ```
5282 <enabled/>
5283 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
5284 ```
5285 OMA-URI:
5286 ```
5287 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5288 ```
5289 Value (string):
5290 ```
5291 <enabled/>
5292 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5293 ```
5294 #### macOS
5295 ```
5296 <dict>
5297 <key>WebsiteFilter</key>
5298 <dict>
5299 <key>Block</key>
5300 <array>
5301 <string><all_urls></string>
5302 </array>
5303 <key>Exceptions</key>
5304 <array>
5305 <string>http://example.org/*</string>
5306 </array>
5307 </dict>
5308
5309 </dict>
5310 ```
5311 #### policies.json
5312 ```
5313 {
5314 "policies": {
5315 "WebsiteFilter": {
5316 "Block": ["<all_urls>"],
5317 "Exceptions": ["http://example.org/*"]
5318 }
5319 }
5320 }
5321 ```

patrick-canterino.de