]> git.p6c8.net - policy-templates.git/blob - README.md
1f50b95c2d8bd1fce5b7dd6e8fa9ea1fb1f12607
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
42 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
43 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
44 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
45 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
46 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
47 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
48 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
49 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
50 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
51 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
52 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
53 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
54 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
55 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
56 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
57 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
58 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
59 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
60 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
61 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
62 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
63 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
64 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
65 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
66 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
67 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
68 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
69 | **[`Preferences`](#preferences)** | Set and lock some preferences.
70 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
71 | **[`Proxy`](#proxy)** | Configure proxy settings.
72 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
73 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
74 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
75 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
76 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
77 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
78 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
79 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
80 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
81 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
82 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
83 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
84 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
85 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
86 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
87
88 ### AppUpdateURL
89
90 Change the URL for application update.
91
92 **Compatibility:** Firefox 62, Firefox ESR 60.2\
93 **CCK2 Equivalent:** N/A\
94 **Preferences Affected:** `app.update.url`
95
96 #### Windows (GPO)
97 ```
98 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
99 ```
100 #### macOS
101 ```
102 <dict>
103 <key>AppUpdateURL</key>
104 <string>https://yoursite.com</string>
105 </dict>
106 ```
107 #### policies.json
108 ```
109 {
110 "policies": {
111 "AppUpdateURL": "https://yoursite.com"
112 }
113 }
114 ```
115 ### Authentication
116
117 Configure sites that support integrated authentication.
118
119 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
120
121 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
122 **CCK2 Equivalent:** N/A\
123 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
124
125 #### Windows (GPO)
126 ```
127 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
128 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
133 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
134 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
135 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
136 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
137 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
138 ```
139 #### macOS
140 ```
141 <dict>
142 <key>Authentication</key>
143 <dict>
144 <key>SPNEGO</key>
145 <array>
146 <string>mydomain.com</string>
147 <string>https://myotherdomain.com</string>
148 </array>
149 <key>Delegated</key>
150 <array>
151 <string>mydomain.com</string>
152 <string>https://myotherdomain.com</string>
153 </array>
154 <key>NTLM</key>
155 <array>
156 <string>mydomain.com</string>
157 <string>https://myotherdomain.com</string>
158 </array>
159 <key>AllowNonFQDN</key>
160 <dict>
161 <key>SPNEGO</key>
162 <true/> | <false/>
163 <key>NTLM</key>
164 <true/> | <false/>
165 </dict>
166 <key>AllowProxies</key>
167 <dict>
168 <key>SPNEGO</key>
169 <true/> | <false/>
170 <key>NTLM</key>
171 <true/> | <false/>
172 </dict>
173 <key>Locked</key>
174 <true/> | <false/>
175 </dict>
176 </dict>
177 ```
178 #### policies.json
179 ```
180 {
181 "policies": {
182 "Authentication": {
183 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
184 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
185 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
186 "AllowNonFQDN": {
187 "SPNEGO": true | false,
188 "NTLM": true | false
189 },
190 "AllowProxies": {
191 "SPNEGO": true | false,
192 "NTLM": true | false
193 },
194 "Locked": true | false
195 }
196 }
197 }
198 ```
199 ### BlockAboutAddons
200
201 Block access to the Add-ons Manager (about:addons).
202
203 **Compatibility:** Firefox 60, Firefox ESR 60\
204 **CCK2 Equivalent:** `disableAddonsManager`\
205 **Preferences Affected:** N/A
206
207 #### Windows (GPO)
208 ```
209 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
210 ```
211 #### macOS
212 ```
213 <dict>
214 <key>BlockAboutAddons</key>
215 <true/> | <false/>
216 </dict>
217 ```
218 #### policies.json
219 ```
220 {
221 "policies": {
222 "BlockAboutAddons": true | false
223 }
224 }
225 ```
226 ### BlockAboutConfig
227
228 Block access to about:config.
229
230 **Compatibility:** Firefox 60, Firefox ESR 60\
231 **CCK2 Equivalent:** `disableAboutConfig`\
232 **Preferences Affected:** N/A
233
234 #### Windows (GPO)
235 ```
236 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
237 ```
238 #### macOS
239 ```
240 <dict>
241 <key>BlockAboutConfig</key>
242 <true/> | <false/>
243 </dict>
244 ```
245 #### policies.json
246 ```
247 {
248 "policies": {
249 "BlockAboutConfig": true | false
250 }
251 }
252 ```
253 ### BlockAboutProfiles
254
255 Block access to About Profiles (about:profiles).
256
257 **Compatibility:** Firefox 60, Firefox ESR 60\
258 **CCK2 Equivalent:** `disableAboutProfiles`\
259 **Preferences Affected:** N/A
260
261 #### Windows (GPO)
262 ```
263 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
264 ```
265 #### macOS
266 ```
267 <dict>
268 <key>BlockAboutProfiles</key>
269 <true/> | <false/>
270 </dict>
271 ```
272 #### policies.json
273 ```
274 {
275 "policies": {
276 "BlockAboutProfiles": true | false
277 }
278 }
279 ```
280 ### BlockAboutSupport
281
282 Block access to Troubleshooting Information (about:support).
283
284 **Compatibility:** Firefox 60, Firefox ESR 60\
285 **CCK2 Equivalent:** `disableAboutSupport`\
286 **Preferences Affected:** N/A
287
288 #### Windows (GPO)
289 ```
290 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
291 ```
292 #### macOS
293 ```
294 <dict>
295 <key>BlockAboutSupport</key>
296 <true/> | <false/>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "BlockAboutSupport": true | false
304 }
305 }
306 ```
307 ### Bookmarks
308
309 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
310
311 **Compatibility:** Firefox 60, Firefox ESR 60\
312 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
313 **Preferences Affected:** N/A
314
315 #### Windows (GPO)
316 ```
317 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
318 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
319 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
320 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
321 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
322 ```
323 #### macOS
324 ```
325 <dict>
326 <key>Bookmarks</key>
327 <array>
328 <dict>
329 <key>Title</key>
330 <string>Example</string>
331 <key>URL</key>
332 <string>https://example.com</string>
333 <key>Favicon</key>
334 <string>https://example.com/favicon.ico</string>
335 <key>Placement</key>
336 <string>toolbar | menu</string>
337 <key>Folder</key>
338 <string>FolderName</string>
339 </dict>
340 </array>
341 </dict>
342 ```
343 #### policies.json
344 ```
345 {
346 "policies": {
347 "Bookmarks": [
348 {
349 "Title": "Example",
350 "URL": "https://example.com",
351 "Favicon": "https://example.com/favicon.ico",
352 "Placement": "toolbar" | "menu",
353 "Folder": "FolderName"
354 }
355 ]
356 }
357 }
358 ```
359 ### CaptivePortal
360 Enable or disable the detection of captive portals.
361
362 **Compatibility:** Firefox 67, Firefox ESR 60.7\
363 **CCK2 Equivalent:** N/A\
364 **Preferences Affected:** `network.captive-portal-service.enabled`
365
366 #### Windows (GPO)
367 ```
368 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
369 ```
370 #### macOS
371 ```
372 <dict>
373 <key>CaptivePortal</key>
374 <true/> | <false/>
375 </dict>
376 ```
377 #### policies.json
378 ```
379 {
380 "policies": {
381 "CaptivePortal": true | false
382 }
383 }
384 ```
385 ### Certificates
386
387 ### Certificates | ImportEnterpriseRoots
388
389 Trust certificates that have been added to the operating system certificate store by a user or administrator.
390
391 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
392
393 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
394 **CCK2 Equivalent:** N/A\
395 **Preferences Affected:** `security.enterprise_roots.enabled`
396
397 #### Windows (GPO)
398 ```
399 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
400 ```
401 #### macOS
402 ```
403 <dict>
404 <key>Certificates</key>
405 <dict>
406 <key>ImportEnterpriseRoots</key>
407 <true/> | <false/>
408 </dict>
409 </dict>
410 ```
411 #### policies.json
412 ```
413 {
414 "policies": {
415 "Certificates": {
416 "ImportEnterpriseRoots": true | false
417 }
418 }
419 }
420 ```
421 ### Certificates | Install
422
423 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
424
425 - Windows
426 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
427 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
428 - macOS
429 - /Library/Application Support/Mozilla/Certificates
430 - ~/Library/Application Support/Mozilla/Certificates
431 - Linux
432 - /usr/lib/mozilla/certificates
433 - /usr/lib64/mozilla/certificates
434 - ~/.mozilla/certificates
435
436 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
437
438 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
439
440 Certificates are installed using the trust string `CT,CT,`.
441
442 Binary (DER) and ASCII (PEM) certificates are both supported.
443
444 **Compatibility:** Firefox 64, Firefox ESR 64\
445 **CCK2 Equivalent:** `certs.ca`\
446 **Preferences Affected:** N/A
447
448 #### Windows (GPO)
449 ```
450 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
451 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
452 ```
453 #### macOS
454 ```
455 <dict>
456 <key>Certificates</key>
457 <dict>
458 <key>Install</key>
459 <array>
460 <string>cert1.der</string>
461 <string>/Users/username/cert2.pem</string>
462 </array>
463 </dict>
464 </dict>
465 ```
466 #### policies.json
467 ```
468 {
469 "policies": {
470 "Certificates": {
471 "Install": ["cert1.der", "/home/username/cert2.pem"]
472 }
473 }
474 }
475 ```
476 ### Cookies
477 Configure cookie preferences.
478
479 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
480
481 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
482
483 `Default` determines whether cookies are accepted at all.
484
485 `AcceptThirdParty` determines how third-party cookies are handled.
486
487 `ExpireAtSessionEnd` determines when cookies expire.
488
489 `RejectTracker` only rejects cookies for trackers.
490
491 `Locked` prevents the user from changing cookie preferences.
492
493 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
494 **CCK2 Equivalent:** N/A\
495 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
496
497 #### Windows (GPO)
498 ```
499 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
500 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
501 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
502 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
503 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
504 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
505 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
506 ```
507 #### macOS
508 ```
509 <dict>
510 <key>Cookies</key>
511 <dict>
512 <key>Allow</key>
513 <array>
514 <string>http://example.com</string>
515 </array>
516 <key>Block</key>
517 <array>
518 <string>http://example.org</string>
519 </array>
520 <key>Default</key>
521 <true/> | <false/>
522 <key>AcceptThirdParty</key>
523 <string>always | never | from-visited</string>
524 <key>ExpireAtSessionEnd</key>
525 <true/> | <false/>
526 <key>RejectTracker</key>
527 <true/> | <false/>
528 <key>Locked</key>
529 <true/> | <false/>
530 </dict>
531 </dict>
532 ```
533 #### policies.json
534 ```
535 {
536 "policies": {
537 "Cookies": {
538 "Allow": ["http://example.org/"],
539 "Block": ["http://example.edu/"],
540 "Default": true | false,
541 "AcceptThirdParty": "always" | "never" | "from-visited",
542 "ExpireAtSessionEnd": true | false,
543 "RejectTracker": true | false,
544 "Locked": true | false
545 }
546 }
547 }
548 ```
549 ### DisableSetDesktopBackground
550 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
551
552 **Compatibility:** Firefox 60, Firefox ESR 60\
553 **CCK2 Equivalent:** `removeSetDesktopBackground`\
554 **Preferences Affected:** N/A
555
556 #### Windows (GPO)
557 ```
558 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
559 ```
560
561 #### macOS
562 ```
563 <dict>
564 <key>DisableSetDesktopBackground</key>
565 <true/> | <false/>
566 </dict>
567 ```
568 #### policies.json
569 ```
570 {
571 "policies": {
572 "DisableSetDesktopBackground": true | false
573 }
574 }
575 ```
576 ### DisableMasterPasswordCreation
577 Remove the master password functionality.
578
579 **Compatibility:** Firefox 60, Firefox ESR 60\
580 **CCK2 Equivalent:** `noMasterPassword`\
581 **Preferences Affected:** N/A
582
583 #### Windows (GPO)
584 ```
585 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
586 ```
587
588 #### macOS
589 ```
590 <dict>
591 <key>DisableMasterPasswordCreation</key>
592 <true/> | <false/>
593 </dict>
594 ```
595 #### policies.json
596 ```
597 {
598 "policies": {
599 "DisableMasterPasswordCreation": true | false
600 }
601 }
602 ```
603 ### DisableAppUpdate
604 Turn off application updates.
605
606 **Compatibility:** Firefox 60, Firefox ESR 60\
607 **CCK2 Equivalent:** `disableFirefoxUpdates`\
608 **Preferences Affected:** N/A
609
610 #### Windows (GPO)
611 ```
612 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
613 ```
614 #### macOS
615 ```
616 <dict>
617 <key>DisableAppUpdate</key>
618 <true/> | <false/>
619 </dict>
620 ```
621 #### policies.json
622 ```
623 {
624 "policies": {
625 "DisableAppUpdate": true | false
626 }
627 }
628 ```
629 ### DisableBuiltinPDFViewer
630 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
631
632 **Compatibility:** Firefox 60, Firefox ESR 60\
633 **CCK2 Equivalent:** `disablePDFjs`\
634 **Preferences Affected:** `pdfjs.disabled`
635
636 #### Windows (GPO)
637 ```
638 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
639 ```
640
641 #### macOS
642 ```
643 <dict>
644 <key>DisableBuiltinPDFViewer</key>
645 <true/> | <false/>
646 </dict>
647 ```
648 #### policies.json
649 ```
650 {
651 "policies": {
652 "DisableBuiltinPDFViewer": true | false
653 }
654 }
655 ```
656 ### DisableDeveloperTools
657 Remove access to all developer tools.
658
659 **Compatibility:** Firefox 60, Firefox ESR 60\
660 **CCK2 Equivalent:** `removeDeveloperTools`\
661 **Preferences Affected:** `devtools.policy.disabled`
662
663 #### Windows (GPO)
664 ```
665 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
666 ```
667
668 #### macOS
669 ```
670 <dict>
671 <key>DisableDeveloperTools</key>
672 <true/> | <false/>
673 </dict>
674 ```
675 #### policies.json
676 ```
677 {
678 "policies": {
679 "DisableDeveloperTools": true | false
680 }
681 }
682 ```
683 ### DisableFeedbackCommands
684 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
685
686 **Compatibility:** Firefox 60, Firefox ESR 60\
687 **CCK2 Equivalent:** N/A\
688 **Preferences Affected:** N/A
689
690 #### Windows (GPO)
691 ```
692 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
693 ```
694 #### macOS
695 ```
696 <dict>
697 <key>DisableFeedbackCommands</key>
698 <true/> | <false/>
699 </dict>
700 ```
701 #### policies.json
702 ```
703 {
704 "policies": {
705 "DisableFeedbackCommands": true | false
706 }
707 }
708 ```
709 ### DisableFirefoxScreenshots
710 Remove access to Firefox Screenshots.
711
712 **Compatibility:** Firefox 60, Firefox ESR 60\
713 **CCK2 Equivalent:** N/A\
714 **Preferences Affected:** `extensions.screenshots.disabled`
715
716 #### Windows (GPO)
717 ```
718 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
719 ```
720 #### macOS
721 ```
722 <dict>
723 <key>DisableFirefoxScreenshots</key>
724 <true/> | <false/>
725 </dict>
726 ```
727 #### policies.json
728 ```
729 {
730 "policies": {
731 "DisableFirefoxScreenshots": true | false
732 }
733 }
734 ```
735 ### DisableFirefoxAccounts
736 Disable Firefox Accounts integration (Sync).
737
738 **Compatibility:** Firefox 60, Firefox ESR 60\
739 **CCK2 Equivalent:** `disableSync`\
740 **Preferences Affected:** `identity.fxaccounts.enabled`
741
742 #### Windows (GPO)
743 ```
744 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
745 ```
746 #### macOS
747 ```
748 <dict>
749 <key>DisableFirefoxAccounts</key>
750 <true/> | <false/>
751 </dict>
752 ```
753 #### policies.json
754 ```
755 {
756 "policies": {
757 "DisableFirefoxAccounts": true | false
758 }
759 }
760 ```
761 ### DisableFirefoxStudies
762 Disable Firefox studies (Shield).
763
764 **Compatibility:** Firefox 60, Firefox ESR 60\
765 **CCK2 Equivalent:** `disableForget`\
766 **Preferences Affected:** N/A
767
768 #### Windows (GPO)
769 ```
770 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
771 ```
772 #### macOS
773 ```
774 <dict>
775 <key>DisableFirefoxStudies</key>
776 <true/> | <false/>
777 </dict>
778 ```
779 #### policies.json
780 ```
781 {
782 "policies": {
783 "DisableFirefoxStudies": true | false
784 }
785 }
786 ```
787 ### DisableForgetButton
788 Disable the "Forget" button.
789
790 **Compatibility:** Firefox 60, Firefox ESR 60\
791 **CCK2 Equivalent:** `disableForget`\
792 **Preferences Affected:** N/A
793
794 #### Windows (GPO)
795 ```
796 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
797 ```
798 #### macOS
799 ```
800 <dict>
801 <key>DisableForgetButton</key>
802 <true/> | <false/>
803 </dict>
804 ```
805 #### policies.json
806 ```
807 {
808 "policies": {
809 "DisableForgetButton": true | false
810 }
811 }
812 ```
813 ### DisableFormHistory
814 Turn off saving information on web forms and the search bar.
815
816 **Compatibility:** Firefox 60, Firefox ESR 60\
817 **CCK2 Equivalent:** `disableFormFill`\
818 **Preferences Affected:** ` browser.formfill.enable`
819
820 #### Windows (GPO)
821 ```
822 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
823 ```
824 #### macOS
825 ```
826 <dict>
827 <key>DisableFormHistory</key>
828 <true/> | <false/>
829 </dict>
830 ```
831 #### policies.json
832 ```
833 {
834 "policies": {
835 "DisableFormHistory": true | false
836 }
837 }
838 ```
839 ### DisablePasswordReveal
840 Do not allow passwords to be shown in saved logins
841
842 **Compatibility:** Firefox 71, Firefox ESR 68.3\
843 **CCK2 Equivalent:** N/A
844 **Preferences Affected:** N/A
845
846 #### Windows (GPO)
847 ```
848 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
849 ```
850
851 #### macOS
852 ```
853 <dict>
854 <key>DisablePasswordReveal</key>
855 <true/> | <false/>
856 </dict>
857 ```
858 #### policies.json
859 ```
860 {
861 "policies": {
862 "DisablePasswordReveal": true | false
863 }
864 }
865 ```
866 ### DisablePocket
867 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
868
869 **Compatibility:** Firefox 60, Firefox ESR 60\
870 **CCK2 Equivalent:** `disablePocket`\
871 **Preferences Affected:** `extensions.pocket.enabled`
872
873 #### Windows (GPO)
874 ```
875 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
876 ```
877 #### macOS
878 ```
879 <dict>
880 <key>DisablePocket</key>
881 <true/> | <false/>
882 </dict>
883 ```
884 #### policies.json
885 ```
886 {
887 "policies": {
888 "DisablePocket": true | false
889 }
890 }
891 ```
892 ### DisablePrivateBrowsing
893 Remove access to private browsing.
894
895 **Compatibility:** Firefox 60, Firefox ESR 60\
896 **CCK2 Equivalent:** `disablePrivateBrowsing`\
897 **Preferences Affected:** N/A
898
899 #### Windows (GPO)
900 ```
901 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
902 ```
903 #### macOS
904 ```
905 <dict>
906 <key>DisablePrivateBrowsing</key>
907 <true/> | <false/>
908 </dict>
909 ```
910 #### policies.json
911 ```
912 {
913 "policies": {
914 "DisablePrivateBrowsing": true | false
915 }
916 }
917 ```
918 ### DisableProfileImport
919 Disables the "Import data from another browser" option in the bookmarks window.
920
921 **Compatibility:** Firefox 60, Firefox ESR 60\
922 **CCK2 Equivalent:** N/A\
923 **Preferences Affected:** N/A
924
925 #### Windows (GPO)
926 ```
927 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
928 ```
929 #### macOS
930 ```
931 <dict>
932 <key>DisableProfileImport</key>
933 <true/> | <false/>
934 </dict>
935 ```
936 #### policies.json
937 ```
938 {
939 "policies": {
940 "DisableProfileImport": true | false
941 }
942 }
943 ```
944 ### DisableProfileRefresh
945 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
946
947 **Compatibility:** Firefox 60, Firefox ESR 60\
948 **CCK2 Equivalent:** `disableResetFirefox`\
949 **Preferences Affected:** `browser.disableResetPrompt`
950
951 #### Windows (GPO)
952 ```
953 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
954 ```
955 #### macOS
956 ```
957 <dict>
958 <key>DisableProfileRefresh</key>
959 <true/> | <false/>
960 </dict>
961 ```
962 #### policies.json
963 ```
964 {
965 "policies": {
966 "DisableProfileRefresh": true | false
967 }
968 }
969 ```
970 ### DisableSafeMode
971 Disable safe mode within the browser.
972
973 On Windows, this disables safe mode via the command line as well.
974
975 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
976 **CCK2 Equivalent:** `disableSafeMode`\
977 **Preferences Affected:** N/A
978
979 #### Windows (GPO)
980 ```
981 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisableSafeMode</key>
987 <true/> | <false/>
988 </dict>
989 ```
990 #### policies.json
991 ```
992 {
993 "policies": {
994 "DisableSafeMode": true | false
995 }
996 }
997 ```
998 ### DisableSecurityBypass
999 Prevent the user from bypassing security in certain cases.
1000
1001 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1002
1003 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1004
1005 **Compatibility:** Firefox 60, Firefox ESR 60\
1006 **CCK2 Equivalent:** N/A\
1007 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1008
1009 #### Windows (GPO)
1010 ```
1011 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1012 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1013 ```
1014 #### macOS
1015 ```
1016 <dict>
1017 <key>DisableSecurityBypass</key>
1018 <dict>
1019 <key>InvalidCertificate</key>
1020 <true/> | <false/>
1021 <key><SafeBrowsing/key>
1022 <true/> | <false/>
1023 </dict>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisableSecurityBypass": {
1031 "InvalidCertificate": true false,
1032 "SafeBrowsing": true false
1033 }
1034 }
1035 }
1036 ```
1037 ### DisableSystemAddonUpdate
1038 Prevent system add-ons from being installed or update.
1039
1040 **Compatibility:** Firefox 60, Firefox ESR 60\
1041 **CCK2 Equivalent:** N/A\
1042 **Preferences Affected:** N/A
1043
1044 #### Windows (GPO)
1045 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1046 ```
1047 #### macOS
1048 ```
1049 <dict>
1050 <key>DisableSystemAddonUpdate</key>
1051 <true/> | <false/>
1052 </dict>
1053 ```
1054 #### policies.json
1055 ```
1056 {
1057 "policies": {
1058 "DisableSystemAddonUpdate": true | false
1059 }
1060 }
1061 ```
1062 ### DisableTelemetry
1063 Prevent the upload of telemetry data.
1064
1065 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1066
1067 **Compatibility:** Firefox 60, Firefox ESR 60\
1068 **CCK2 Equivalent:** `disableTelemetry`\
1069 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1070
1071 #### Windows (GPO)
1072 ```
1073 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1074 ```
1075 #### macOS
1076 ```
1077 <dict>
1078 <key>DisableTelemetry</key>
1079 <true/> | <false/>
1080 </dict>
1081 ```
1082 #### policies.json
1083 ```
1084 {
1085 "policies": {
1086 "DisableTelemetry": true | false
1087 }
1088 }
1089 ```
1090 ### DisplayBookmarksToolbar
1091 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1092
1093 **Compatibility:** Firefox 60, Firefox ESR 60\
1094 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1095 **Preferences Affected:** N/A
1096
1097 #### Windows (GPO)
1098 ```
1099 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1100 ```
1101 #### macOS
1102 ```
1103 <dict>
1104 <key>DisplayBookmarksToolbar</key>
1105 <true/> | <false/>
1106 </dict>
1107 ```
1108 #### policies.json
1109 ```
1110 {
1111 "policies": {
1112 "DisplayBookmarksToolbar": true | false
1113 }
1114 }
1115 ```
1116 ### DisplayMenuBar (Deprecated)
1117 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1118
1119 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1120 **CCK2 Equivalent:** `displayMenuBar`\
1121 **Preferences Affected:** N/A
1122
1123 #### Windows (GPO)
1124 ```
1125 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1126 ```
1127 #### macOS
1128 ```
1129 <dict>
1130 <key>DisplayMenuBar</key>
1131 <true/> | <false/>
1132 </dict>
1133 ```
1134 #### policies.json
1135 ```
1136 {
1137 "policies": {
1138 "DisplayMenuBar": true | false
1139 }
1140 }
1141 ```
1142 ### DisplayMenuBar
1143 Set the state of the menubar.
1144
1145 `always` means the menubar is shown and cannot be hidden.
1146
1147 `never` means the menubar is hidden and cannot be shown.
1148
1149 `default-on` means the menubar is on by default but can be hidden.
1150
1151 `default-off` means the menubar is off by default but can be shown.
1152
1153 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1154 **CCK2 Equivalent:** `displayMenuBar`\
1155 **Preferences Affected:** N/A
1156
1157 #### Windows (GPO)
1158 ```
1159 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1160 ```
1161 #### macOS
1162 ```
1163 <dict>
1164 <key>DisplayMenuBar</key>
1165 <string>always | never | default-on | default-off</string>
1166 </dict>
1167 ```
1168 #### policies.json
1169 ```
1170 {
1171 "policies": {
1172 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1173 }
1174 }
1175 ```
1176 ### DNSOverHTTPS
1177 Configure DNS over HTTPS.
1178
1179 `Enabled` determines whether DNS over HTTPS is enabled
1180
1181 `ProviderURL` is a URL to another provider.
1182
1183 `Locked` prevents the user from changing DNS over HTTPS preferences.
1184
1185 **Compatibility:** Firefox 63, Firefox ESR 68\
1186 **CCK2 Equivalent:** N/A\
1187 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1188
1189 #### Windows (GPO)
1190 ```
1191 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1192 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1193 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1194 ```
1195 #### macOS
1196 ```
1197 <dict>
1198 <key>DNSOverHTTPS</key>
1199 <dict>
1200 <key>Enabled</key>
1201 <true/> | <false/>
1202 <key>ProviderURL</key>
1203 <string>URL_TO_ALTERNATE_PROVIDER</string>
1204 <key>Locked</key>
1205 <true/> | <false/>
1206 </dict>
1207 </dict>
1208 ```
1209 #### policies.json
1210 ```
1211 {
1212 "policies": {
1213 "DNSOverHTTPS": {
1214 "Enabled": true | false,
1215 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1216 "Locked": true | false
1217 }
1218 }
1219 }
1220 ```
1221 ### DontCheckDefaultBrowser
1222 Don't check if Firefox is the default browser at startup.
1223
1224 **Compatibility:** Firefox 60, Firefox ESR 60\
1225 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1226 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1227
1228 #### Windows (GPO)
1229 ```
1230 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1231 ```
1232 #### macOS
1233 ```
1234 <dict>
1235 <key>DontCheckDefaultBrowser</key>
1236 <true/> | <false/>
1237 </dict>
1238 ```
1239 #### policies.json
1240 ```
1241 {
1242 "policies": {
1243 "DontCheckDefaultBrowser": true | false
1244 }
1245 }
1246 ```
1247 ### DefaultDownloadDirectory
1248 Set the default download directory.
1249
1250 You can use ${home} for the native home directory.
1251
1252 **Compatibility:** Firefox 68, Firefox ESR 68\
1253 **CCK2 Equivalent:** N/A\
1254 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1259 ```
1260 #### macOS
1261 ```
1262 <dict>
1263 <key>DefaultDownloadDirectory</key>
1264 <string>${home}/Downloads</string>
1265 </dict>
1266 ```
1267 #### policies.json (macOS and Linux)
1268 ```
1269 {
1270 "policies": {
1271 "DefaultDownloadDirectory": "${home}/Downloads"
1272 }
1273 ```
1274 #### policies.json (Windows)
1275 ```
1276 {
1277 "policies": {
1278 "DefaultDownloadDirectory": "${home}\\Downloads"
1279 }
1280 ```
1281 ### DownloadDirectory
1282 Set and lock the download directory.
1283
1284 You can use ${home} for the native home directory.
1285
1286 **Compatibility:** Firefox 68, Firefox ESR 68\
1287 **CCK2 Equivalent:** N/A\
1288 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1293 ```
1294 #### macOS
1295 ```
1296 <dict>
1297 <key>DownloadDirectory</key>
1298 <string>${home}/Downloads</string>
1299 </dict>
1300 ```
1301 #### policies.json (macOS and Linux)
1302 ```
1303 {
1304 "policies": {
1305 "DownloadDirectory": "${home}/Downloads"
1306 }
1307 ```
1308 #### policies.json (Windows)
1309 ```
1310 {
1311 "policies": {
1312 "DownloadDirectory": "${home}\\Downloads"
1313 }
1314 ```
1315 ### EnableTrackingProtection
1316 Configure tracking protection.
1317
1318 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1319
1320 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1321
1322 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1323
1324 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1325
1326 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1327
1328 `Exceptions` are origins for which tracking protection is not enabled.
1329
1330 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1331 **CCK2 Equivalent:** N/A\
1332 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1333
1334 #### Windows (GPO)
1335 ```
1336 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1337 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1338 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1339 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1340 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1= "https://example.com"
1341
1342 ```
1343 #### macOS
1344 ```
1345 <dict>
1346 <key>EnableTrackingProtection</key>
1347 <dict>
1348 <key>Value</key>
1349 <true/> | <false/>
1350 <key><Locked</key>
1351 <true/> | <false/>
1352 <key><Cryptomining</key>
1353 <true/> | <false/>
1354 <key><Fingerprinting</key>
1355 <true/> | <false/>
1356 <key>Exceptions</key>
1357 <array>
1358 <string>https://example.com</string>
1359 </array>
1360 </dict>
1361 </dict>
1362 ```
1363 #### policies.json
1364 ```
1365 {
1366 "policies": {
1367 "EnableTrackingProtection": {
1368 "Value": [true, false],
1369 "Locked": [true, false],
1370 "Cryptomining": [true, false],
1371 "Fingerprinting": [true, false],
1372 "Exceptions": ["https://example.com"]
1373 }
1374 }
1375 ```
1376 ### EnterprisePoliciesEnabled
1377 Enable policy support on macOS.
1378
1379 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1380 **CCK2 Equivalent:** N/A\
1381 **Preferences Affected:** N/A
1382
1383 #### macOS
1384 ```
1385 <dict>
1386 <key>EnterprisePoliciesEnabled</key>
1387 <true/>
1388 </dict>
1389 ```
1390 ### Extensions
1391 Control the installation, uninstallation and locking of extensions.
1392
1393 `Install` is a list of URLs or native paths for extensions to be installed.
1394
1395 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1396
1397 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1398
1399 **Compatibility:** Firefox 60, Firefox ESR 60\
1400 **CCK2 Equivalent:** `addons`\
1401 **Preferences Affected:** N/A
1402
1403 #### Windows (GPO)
1404 ```
1405 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1406 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1407 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1408 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1409 ```
1410 #### macOS
1411 ```
1412 <dict>
1413 <key>Extensions</key>
1414 <dict>
1415 <key>Install</key>
1416 <array>
1417 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1418 <string>//path/to/xpi</string>
1419 </array>
1420 <key>Uninstall</key>
1421 <array>
1422 <string>bad_addon_id@mozilla.org</string>
1423 </array>
1424 <key>Locked</key>
1425 <array>
1426 <string>addon_id@mozilla.org</string>
1427 </array>
1428 </dict>
1429 </dict>
1430 ```
1431 #### policies.json
1432 ```
1433 {
1434 "policies": {
1435 "Extensions": {
1436 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1437 "Uninstall": ["bad_addon_id@mozilla.org"],
1438 "Locked": ["addon_id@mozilla.org"]
1439 }
1440 }
1441 }
1442 ```
1443 ### ExtensionSettings
1444 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1445
1446 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1447
1448 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1449
1450 The configuration for each extension is another dictionary that can contain the fields documented below.
1451
1452 | Name | Description |
1453 | --- | --- |
1454 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1455 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1456 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1457 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1458 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1459 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1460 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1461 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1462 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1463
1464 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1465 **CCK2 Equivalent:** N/A\
1466 **Preferences Affected:** N/A
1467
1468 #### Windows (GPO)
1469 ```
1470 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1471 {
1472 "*": {
1473 "blocked_install_message": "Custom error message.",
1474 "install_sources": ["https://addons.mozilla.org/"],
1475 "installation_mode": "blocked",
1476 "allowed_types": ["extension"]
1477 },
1478 "uBlock0@raymondhill.net": {
1479 "installation_mode": "force_installed",
1480 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1481 }
1482 }
1483 ```
1484 #### macOS
1485 ```
1486 <dict>
1487 <key>ExtensionSettings</key>
1488 <dict>
1489 <key>*</key>
1490 <dict>
1491 <key>blocked_install_message</key>
1492 <string>Custom error message.</string>
1493 <key>install_sources</key>
1494 <array>
1495 <string>https://addons.mozilla.org/</string>
1496 </array>
1497 <key>installation_mode</key>
1498 <string>blocked</string>
1499 <key>allowed_types</key>
1500 <array>
1501 <string>extension</string>
1502 </array>
1503 </dict>
1504 <key>uBlock0@raymondhill.net</key>
1505 <dict>
1506 <key>installation_mode</key>
1507 <string>force_installed</string>
1508 <key>install_url</key>
1509 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1510 </dict>
1511 </dict>
1512 </dict>
1513 ```
1514 #### policies.json
1515 ```
1516 {
1517 "policies": {
1518 "ExtensionSettings": {
1519 "*": {
1520 "blocked_install_message": "Custom error message.",
1521 "install_sources": ["https://addons.mozilla.org/"],
1522 "installation_mode": "blocked",
1523 "allowed_types": ["extension"]
1524 },
1525 "uBlock0@raymondhill.net": {
1526 "installation_mode": "force_installed",
1527 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1528 }
1529 }
1530 }
1531 }
1532 ```
1533 ### ExtensionUpdate
1534 Control extension updates.
1535
1536 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1537 **CCK2 Equivalent:** N/A\
1538 **Preferences Affected:** `extensions.update.enabled`
1539
1540 #### Windows (GPO)
1541 ```
1542 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1543 ```
1544 #### macOS
1545 ```
1546 <dict>
1547 <key>ExtensionUpdate</key>
1548 <true/> | <false/>
1549 </dict>
1550 ```
1551 #### policies.json
1552 ```
1553 {
1554 "policies": {
1555 "ExtensionUpdate": true | false
1556 }
1557 }
1558 ```
1559 ### FlashPlugin
1560 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1561
1562 `Allow` is a list of origins where Flash are allowed.
1563
1564 `Block` is a list of origins where Flash is not allowed.
1565
1566 `Default` determines whether or not Flash is allowed by default.
1567
1568 `Locked` prevents the user from changing Flash preferences.
1569
1570 **Compatibility:** Firefox 60, Firefox ESR 60\
1571 **CCK2 Equivalent:** `permissions.plugin`\
1572 **Preferences Affected:** `plugin.state.flash`
1573
1574 #### Windows (GPO)
1575 ```
1576 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1577 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1578 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1579 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1580 ```
1581 #### macOS
1582 ```
1583 <dict>
1584 <key>FlashPlugin</key>
1585 <dict>
1586 <key>Allow</key>
1587 <array>
1588 <string>http://example.org</string>
1589 </array>
1590 <key>Block</key>
1591 <array>
1592 <string>http://example.edu</string>
1593 </array>
1594 <key>Default</key>
1595 <true/> | <false/>
1596 <key>Locked</key>
1597 <true/> | <false/>
1598 </dict>
1599 </dict>
1600 ```
1601 #### policies.json
1602 ```
1603 {
1604 "policies": {
1605 "FlashPlugin": {
1606 "Allow": ["http://example.org/"],
1607 "Block": ["http://example.edu/"],
1608 "Default": true | false,
1609 "Locked": true | false
1610 }
1611 }
1612 }
1613 ```
1614 ### FirefoxHome
1615 Customize the Firefox Home page.
1616
1617 **Compatibility:** Firefox 68, Firefox ESR 68\
1618 **CCK2 Equivalent:** N/A\
1619 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1620
1621 #### Windows (GPO)
1622 ```
1623 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1624 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1625 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1626 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1627 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1628 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1629 ```
1630 #### macOS
1631 ```
1632 <dict>
1633 <key>FirefoxHome</key>
1634 <dict>
1635 <key>Search</key>
1636 <true/> | <false/>
1637 <key>TopSites</key>
1638 <true/> | <false/>
1639 <key>Highlights</key>
1640 <true/> | <false/>
1641 <key>Pocket</key>
1642 <true/> | <false/>
1643 <key>Snippets</key>
1644 <true/> | <false/>
1645 <key>Locked</key>
1646 <true/> | <false/>
1647 </dict>
1648 </dict>
1649 ```
1650 #### policies.json
1651 ```
1652 {
1653 "policies": {
1654 "FirefoxHome": {
1655 "Search": true | false,
1656 "TopSites": true | false,
1657 "Highlights": true | false,
1658 "Pocket": true | false,
1659 "Snippets": true | false,
1660 "Locked": true | false
1661 }
1662 }
1663 }
1664 ```
1665 ### HardwareAcceleration
1666 Control hardware acceleration.
1667
1668 **Compatibility:** Firefox 60, Firefox ESR 60\
1669 **CCK2 Equivalent:** N/A\
1670 **Preferences Affected:** `layers.acceleration.disabled`
1671
1672 #### Windows (GPO)
1673 ```
1674 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1675 ```
1676 #### macOS
1677 ```
1678 <dict>
1679 <key>HardwareAcceleration</key>
1680 <true/> | <false/>
1681 </dict>
1682 ```
1683 #### policies.json
1684 ```
1685 {
1686 "policies": {
1687 "HardwareAcceleration": true | false
1688 }
1689 }
1690 ```
1691 ### Homepage
1692 Configure the default homepage and how Firefox starts.
1693
1694 `URL` is the default homepage.
1695
1696 `Locked` prevents the user from changing homepage preferences.
1697
1698 `Additional` allows for more than one homepage.
1699
1700 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1701
1702 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1703 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1704 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1705
1706 #### Windows (GPO)
1707 ```
1708 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1709 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1710 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1711 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1712 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1713 ```
1714 #### macOS
1715 ```
1716 <dict>
1717 <key>Homepage</key>
1718 <dict>
1719 <key>URL</key>
1720 <string>http://example.com</string>
1721 <key>Locked</key>
1722 <true/> | <false/>
1723 <key>Additional</key>
1724 <array>
1725 <string>http://example.org</string>
1726 <string>http://example.edu</string>
1727 </array>
1728 <key>StartPage</key>
1729 <string>none | homepage | previous-session</string>
1730 </dict>
1731 </dict>
1732 ```
1733 #### policies.json
1734 ```
1735 {
1736 "policies": {
1737 "Homepage": {
1738 "URL": "http://example.com/",
1739 "Locked": true | false,
1740 "Additional": ["http://example.org/",
1741 "http://example.edu/"],
1742 "StartPage": "none" | "homepage" | "previous-session"
1743 }
1744 }
1745 }
1746 ```
1747 ### InstallAddonsPermission
1748 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1749
1750 `Allow` is a list of origins where extension installs are allowed.
1751
1752 `Default` determines whether or not extension installs are allowed by default.
1753
1754 **Compatibility:** Firefox 60, Firefox ESR 60\
1755 **CCK2 Equivalent:** `permissions.install`\
1756 **Preferences Affected:** `xpinstall.enabled`
1757
1758 #### Windows (GPO)
1759 ```
1760 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1761 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1762 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1763 ```
1764 #### macOS
1765 ```
1766 <dict>
1767 <key>InstallAddonsPermission</key>
1768 <dict>
1769 <key>Allow</key>
1770 <array>
1771 <string>http://example.org</string>
1772 <string>http://example.edu</string>
1773 </array>
1774 <key>Default</key>
1775 <true/> | <false/>
1776 </dict>
1777 </dict>
1778 ```
1779 #### policies.json
1780 ```
1781 {
1782 "policies": {
1783 "InstallAddonsPermission": {
1784 "Allow": ["http://example.org/",
1785 "http://example.edu/"],
1786 "Default": true | false
1787 }
1788 }
1789 }
1790 ```
1791 ### LegacyProfiles
1792 Disable the feature enforcing a separate profile for each installation.
1793
1794 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1795
1796 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1797
1798 This policy only work on Windows via GPO (not policies.json).
1799
1800 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1801 **CCK2 Equivalent:** N/A\
1802 **Preferences Affected:** N/A
1803
1804 #### Windows (GPO)
1805 ```
1806 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1807 ```
1808 ### LocalFileLinks
1809 Enable linking to local files by origin.
1810
1811 **Compatibility:** Firefox 68, Firefox ESR 68\
1812 **CCK2 Equivalent:** N/A\
1813 **Preferences Affected:** `capability.policy.localfilelinks.*`
1814
1815 #### Windows (GPO)
1816 ```
1817 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1818 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1819 ```
1820 #### macOS
1821 ```
1822 <dict>
1823 <key>LocalFileLinks</key>
1824 <array>
1825 <string>http://example.org</string>
1826 <string>http://example.edu</string>
1827 </array>
1828 </dict>
1829 ```
1830 #### policies.json
1831 ```
1832 {
1833 "policies": {
1834 "LocalFileLinks": ["http://example.org/",
1835 "http://example.edu/"]
1836 }
1837 }
1838 ```
1839 ### NoDefaultBookmarks
1840 Disable the creation of default bookmarks.
1841
1842 This policy is only effective if the user profile has not been created yet.
1843
1844 **Compatibility:** Firefox 60, Firefox ESR 60\
1845 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1846 **Preferences Affected:** N/A
1847
1848 #### Windows (GPO)
1849 ```
1850 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1851 ```
1852 #### macOS
1853 ```
1854 <dict>
1855 <key>NoDefaultBookmarks</key>
1856 <true/> | <false/>
1857 </dict>
1858 ```
1859 #### policies.json
1860 ```
1861 {
1862 "policies": {
1863 "NoDefaultBookmarks": true | false
1864 }
1865 }
1866 ```
1867 ### NetworkPrediction
1868 Enable or disable network prediction (DNS prefetching).
1869
1870 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1871 **CCK2 Equivalent:** N/A\
1872 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1873
1874 #### Windows (GPO)
1875 ```
1876 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1877 ```
1878 #### macOS
1879 ```
1880 <dict>
1881 <key>NetworkPrediction</key>
1882 <true/> | <false/>
1883 </dict>
1884 ```
1885 #### policies.json
1886 ```
1887 {
1888 "policies": {
1889 "NetworkPrediction": true | false
1890 }
1891 ```
1892 ### NewTabPage
1893 Enable or disable the New Tab page.
1894
1895 **Compatibility:** Firefox 68, Firefox ESR 68\
1896 **CCK2 Equivalent:** N/A\
1897 **Preferences Affected:** `browser.newtabpage.enabled`
1898
1899 #### Windows (GPO)
1900 ```
1901 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1902 ```
1903 #### macOS
1904 ```
1905 <dict>
1906 <key>NewTabPage</key>
1907 <true/> | <false/>
1908 </dict>
1909 ```
1910 #### policies.json
1911 ```
1912 {
1913 "policies": {
1914 "NewTabPage": true | false
1915 }
1916 ```
1917 ### OfferToSaveLogins
1918 Control whether or not Firefox offers to save passwords.
1919
1920 **Compatibility:** Firefox 60, Firefox ESR 60\
1921 **CCK2 Equivalent:** `dontRememberPasswords`\
1922 **Preferences Affected:** `signon.rememberSignons`
1923
1924 #### Windows (GPO)
1925 ```
1926 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1927 ```
1928 #### macOS
1929 ```
1930 <dict>
1931 <key>OfferToSaveLogins</key>
1932 <true/> | <false/>
1933 </dict>
1934 ```
1935 #### policies.json
1936 ```
1937 {
1938 "policies": {
1939 "OfferToSaveLogins": true | false
1940 }
1941 }
1942 ```
1943 ### OfferToSaveLoginsDefault
1944 Sets the default value of signon.rememberSignons without locking it.
1945
1946 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1947 **CCK2 Equivalent:** `dontRememberPasswords`\
1948 **Preferences Affected:** `signon.rememberSignons`
1949
1950 #### Windows (GPO)
1951 ```
1952 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1953 ```
1954 #### macOS
1955 ```
1956 <dict>
1957 <key>OfferToSaveLoginsDefault</key>
1958 <true/> | <false/>
1959 </dict>
1960 ```
1961 #### policies.json
1962 ```
1963 {
1964 "policies": {
1965 "OfferToSaveLoginsDefault": true | false
1966 }
1967 }
1968 ```
1969 ### OverrideFirstRunPage
1970 Override the first run page. If the value is blank, no first run page is displayed.
1971
1972 **Compatibility:** Firefox 60, Firefox ESR 60\
1973 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1974 **Preferences Affected:** `startup.homepage_welcome_url`
1975
1976 #### Windows (GPO)
1977 ```
1978 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1979 ```
1980 #### macOS
1981 ```
1982 <dict>
1983 <key>OverrideFirstRunPage</key>
1984 <string>http://example.org</string>
1985 </dict>
1986 ```
1987 #### policies.json
1988 ```
1989 {
1990 "policies": {
1991 "OverrideFirstRunPage": "http://example.org"
1992 }
1993 ```
1994 ### OverridePostUpdatePage
1995 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1996
1997 **Compatibility:** Firefox 60, Firefox ESR 60\
1998 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1999 **Preferences Affected:** `startup.homepage_override_url`
2000
2001 #### Windows (GPO)
2002 ```
2003 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2004 ```
2005 #### macOS
2006 ```
2007 <dict>
2008 <key>OverridePostUpdatePage</key>
2009 <string>http://example.org</string>
2010 </dict>
2011 ```
2012 #### policies.json
2013 ```
2014 {
2015 "policies": {
2016 "OverridePostUpdatePage": "http://example.org"
2017 }
2018 ```
2019 ### PasswordManagerEnabled
2020 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2021
2022 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2023 **CCK2 Equivalent:** N/A\
2024 **Preferences Affected:** `prefs.privacy.disable_button.view_passwords`
2025
2026 #### Windows (GPO)
2027 ```
2028 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2029 ```
2030 #### macOS
2031 ```
2032 <dict>
2033 <key>PasswordManagerEnabled</key>
2034 <true/> | <false/>
2035 </dict>
2036 ```
2037 #### policies.json
2038 ```
2039 {
2040 "policies": {
2041 "PasswordManagerEnabled": true | false
2042 }
2043 }
2044 ```
2045 ### Permissions
2046 Set permissions associated with camera, microphone, location, and notifications. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2047
2048 `Allow` is a list of origins where the feature is allowed.
2049
2050 `Block` is a list of origins where the feature is not allowed.
2051
2052 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2053
2054 `Locked` prevents the user from changing preferences for the feature.
2055
2056 **Compatibility:** Firefox 62, Firefox ESR 60.2\
2057 **CCK2 Equivalent:** N/A\
2058 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2059
2060 #### Windows (GPO)
2061 ```
2062 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2063 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2064 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2065 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2066 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2067 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2068 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2069 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2070 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2071 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2072 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2073 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2074 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2075 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2076 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2077 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2078 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2079 ```
2080 #### macOS
2081 ```
2082 <dict>
2083 <key>Permissions</key>
2084 <dict>
2085 <key>Camera</key>
2086 <dict>
2087 <key>Allow</key>
2088 <array>
2089 <string>https://example.org</string>
2090 <string>https://example.org:1234</string>
2091 </array>
2092 <key>Block</key>
2093 <array>
2094 <string>https://example.edu</string>
2095 </array>
2096 <key>BlockNewRequests</key>
2097 <true/>
2098 <key>Locked</key>
2099 <true/>
2100 </dict>
2101 <key>Microphone</key>
2102 <dict>
2103 <key>Allow</key>
2104 <array>
2105 <string>https://example.org</string>
2106 </array>
2107 <key>Block</key>
2108 <array>
2109 <string>https://example.edu</string>
2110 </array>
2111 <key>BlockNewRequests</key>
2112 <true/>
2113 <key>Locked</key>
2114 <true/>
2115 </dict>
2116 <key>Location</key>
2117 <dict>
2118 <key>Allow</key>
2119 <array>
2120 <string>https://example.org</string>
2121 </array>
2122 <key>Block</key>
2123 <array>
2124 <string>https://example.edu</string>
2125 </array>
2126 <key>BlockNewRequests</key>
2127 <true/>
2128 <key>Locked</key>
2129 <true/>
2130 </dict>
2131 <key>Notifications</key>
2132 <dict>
2133 <key>Allow</key>
2134 <array>
2135 <string>https://example.org</string>
2136 </array>
2137 <key>Block</key>
2138 <array>
2139 <string>https://example.edu</string>
2140 </array>
2141 <key>BlockNewRequests</key>
2142 <true/>
2143 <key>Locked</key>
2144 <true/>
2145 </dict>
2146 </dict>
2147 </dict>
2148 ```
2149 #### policies.json
2150 ```
2151 {
2152 "policies": {
2153 "Permissions": {
2154 "Camera": {
2155 "Allow": ["https://example.org","https://example.org:1234"],
2156 "Block": ["https://example.edu"],
2157 "BlockNewRequests": true | false,
2158 "Locked": true | false
2159 },
2160 "Microphone": {
2161 "Allow": ["https://example.org"],
2162 "Block": ["https://example.edu"],
2163 "BlockNewRequests": true | false,
2164 "Locked": true | false
2165 },
2166 "Location": {
2167 "Allow": ["https://example.org"],
2168 "Block": ["https://example.edu"],
2169 "BlockNewRequests": true | false,
2170 "Locked": true | false
2171 },
2172 "Notifications": {
2173 "Allow": ["https://example.org"],
2174 "Block": ["https://example.edu"],
2175 "BlockNewRequests": true | false,
2176 "Locked": true | false
2177 }
2178 }
2179 }
2180 }
2181 ```
2182 ### PopupBlocking
2183 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2184
2185 `Allow` is a list of origins where popup-windows are allowed.
2186
2187 `Default` determines whether or not pop-up windows are allowed by default.
2188
2189 `Locked` prevents the user from changing pop-up preferences.
2190
2191 **Compatibility:** Firefox 60, Firefox ESR 60\
2192 **CCK2 Equivalent:** `permissions.popup`\
2193 **Preferences Affected:** `dom.disable_open_during_load`
2194
2195 #### Windows (GPO)
2196 ```
2197 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2198 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2199 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2200 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2201 ```
2202 #### macOS
2203 ```
2204 <dict>
2205 <key>PopupBlocking</key>
2206 <dict>
2207 <key>Allow</key>
2208 <array>
2209 <string>http://example.org</string>
2210 <string>http://example.edu</string>
2211 </array>
2212 <key>Default</key>
2213 <true/> | <false/>
2214 <key>Locked</key>
2215 <true/> | <false/>
2216 </dict>
2217 </dict>
2218 ```
2219 #### policies.json
2220 ```
2221 {
2222 "policies": {
2223 "PopupBlocking": {
2224 "Allow": ["http://example.org/",
2225 "http://example.edu/"],
2226 "Default": true | false,
2227 "Locked": true | false
2228 }
2229 }
2230 }
2231 ```
2232 ### Preferences
2233 Set and lock certain preferences.
2234
2235 **Compatibility:** See below\
2236 **CCK2 Equivalent:** `preferences`\
2237 **Preferences Affected:** See below
2238
2239 | Preference | Type | Compatibility | Default
2240 | --- | --- | --- | ---
2241 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2242 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2243 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2244 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2245 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2246 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2247 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2248 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2249 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2250 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2251 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2252 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2253 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2254 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2255 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2256 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2257 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2258 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2259 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2260 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2261 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2262 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2263 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2264 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2265 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2266 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2267 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2268 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2269 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2270 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2271 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2272 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2273 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2274 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2275 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2276 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2277 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2278 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2279 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2280 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2281 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2282 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2283 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2284 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2285 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2286 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2287 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2288 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2289 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2290 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2291 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2292 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2293 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2294 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2295 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2296 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2297 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2298 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2299 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2300 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2301 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2302 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2303 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2304 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2305 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2306 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2307 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2308 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2309 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2310 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2311 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2312 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2313 disabled
2314 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2315 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2316 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2317 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2318 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2319 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2320 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2321 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2322 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2323 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2324 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2325 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2326 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2327 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2328 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2329 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2330 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2331 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2332 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2333 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2334 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2335 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2336 #### Windows (GPO)
2337 ```
2338 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2339 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2340 ```
2341 #### macOS
2342 ```
2343 <dict>
2344 <key>Preferences</key>
2345 <dict>
2346 <key>boolean_preference_name</key>
2347 <true/> | <false/>
2348 <key>string_preference_name</key>
2349 <string>string_value</string>
2350 </dict>
2351 </dict>
2352 ```
2353 #### policies.json
2354 ```
2355 {
2356 "policies": {
2357 "Preferences": {
2358 "boolean_preference_name": true | false,
2359 "string_preference_name": "string_value"
2360 }
2361 }
2362 }
2363 ```
2364 ### PromptForDownloadLocation
2365 Ask where to save each file before downloading.
2366
2367 **Compatibility:** Firefox 68, Firefox ESR 68\
2368 **CCK2 Equivalent:** N/A
2369 **Preferences Affected:** `browser.download.useDownloadDir`
2370
2371 #### Windows (GPO)
2372 ```
2373 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2374 ```
2375 #### macOS
2376 ```
2377 <dict>
2378 <key>PromptForDownloadLocation</key>
2379 <true/> | <false/>
2380 </dict>
2381 ```
2382 #### policies.json
2383 ```
2384 {
2385 "policies": {
2386 "PromptForDownloadLocation": true | false
2387 }
2388 }
2389 ```
2390 ### Proxy
2391 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2392 To specify ports, append them to the hostnames with a colon (:).
2393
2394 `Mode` is the proxy method being used.
2395
2396 `Locked` is whether or not proxy settings can be changed.
2397
2398 `HTTPProxy` is the HTTP proxy server.
2399
2400 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2401
2402 `SSLProxy` is the SSL proxy server.
2403
2404 `FTPProxy` is the FTP proxy server.
2405
2406 `SOCKSProxy` is the SOCKS proxy server
2407
2408 `SOCKSVersion` is the SOCKS version (4 or 5)
2409
2410 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2411
2412 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2413
2414 `AutoLogin` means do not prompt for authentication if password is saved.
2415
2416 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2417
2418 **Compatibility:** Firefox 60, Firefox ESR 60\
2419 **CCK2 Equivalent:** `networkProxy*`\
2420 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2421
2422 #### Windows (GPO)
2423 ```
2424 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2425 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2426 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2427 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2428 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2429 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2430 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2431 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2432 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2433 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2434 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2435 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2436 ```
2437 #### macOS
2438 ```
2439 <dict>
2440 <key>Proxy</key>
2441 <dict>
2442 <key>Mode</key>
2443 <string>none | system | manual | autoDetect | autoConfig</string>
2444 <key>Locked</key>
2445 <true> | </false>
2446 <key>HTTPProxy</key>
2447 <string>https://httpproxy.example.com</string>
2448 <key>UseHTTPProxyForAllProtocols</key>
2449 <true> | </false>
2450 <key>SSLProxy</key>
2451 <string>https://sslproxy.example.com</string>
2452 <key>FTPProxy</key>
2453 <string>https://ftpproxy.example.com</string>
2454 <key>SOCKSProxy</key>
2455 <string>https://socksproxy.example.com</string>
2456 <key>SOCKSVersion</key>
2457 <string>4 | 5</string>
2458 <key>Passthrough</key>
2459 <string>&lt;local>&gt;</string>
2460 <key>AutoConfigURL</key>
2461 <string>URL_TO_AUTOCONFIG</string>
2462 <key>AutoLogin</key>
2463 <true> | </false>
2464 <key>UseProxyForDNS</key>
2465 <true> | </false>
2466 </dict>
2467 </dict>
2468 ```
2469 #### policies.json
2470 ```
2471 {
2472 "policies": {
2473 "Proxy": {
2474 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2475 "Locked": [true, false],
2476 "HTTPProxy": "hostname",
2477 "UseHTTPProxyForAllProtocols": [true, false],
2478 "SSLProxy": "hostname",
2479 "FTPProxy": "hostname",
2480 "SOCKSProxy": "hostname",
2481 "SOCKSVersion": 4 | 5
2482 "Passthrough": "<local>",
2483 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2484 "AutoLogin": [true, false],
2485 "UseProxyForDNS": [true, false]
2486 }
2487 }
2488 }
2489 ```
2490 ### RequestedLocales
2491 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2492
2493 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2494
2495 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2496 **CCK2 Equivalent:** N/A\
2497 **Preferences Affected:** N/A
2498 #### Windows (GPO)
2499 ```
2500 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2501 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2502
2503 or
2504
2505 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2506 ```
2507 #### macOS
2508 ```
2509 <dict>
2510 <key>RequestedLocales</key>
2511 <array>
2512 <string>de</string>
2513 <string>en-US</string>
2514 </array>
2515 </dict>
2516
2517 or
2518
2519 <dict>
2520 <key>RequestedLocales</key>
2521 <string>de,en-US</string>
2522 </dict>
2523
2524 ```
2525 #### policies.json
2526 ```
2527 {
2528 "policies": {
2529 "RequestedLocales": ["de", "en-US"]
2530 }
2531 }
2532
2533 or
2534
2535 {
2536 "policies": {
2537 "RequestedLocales": "de,en-US"
2538 }
2539 }
2540 ```
2541 ### SanitizeOnShutdown (Selective)
2542 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2543
2544 **Compatibility:** Firefox 68, Firefox ESR 68\
2545 **CCK2 Equivalent:** N/A\
2546 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2547 #### Windows (GPO)
2548 ```
2549 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2550 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2551 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2552 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2553 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2554 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2555 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2556 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2557 ```
2558 #### macOS
2559 ```
2560 <dict>
2561 <key>SanitizeOnShutdown</key>
2562 <dict>
2563 <key>Cache</key>
2564 <true/> | <false/>
2565 <key>Cookies</key>
2566 <true/> | <false/>
2567 <key>Downloads</key>
2568 <true/> | <false/>
2569 <key>FormData</key>
2570 <true/> | <false/>
2571 <key>History</key>
2572 <true/> | <false/>
2573 <key>Sessions</key>
2574 <true/> | <false/>
2575 <key>SiteSettings</key>
2576 <true/> | <false/>
2577 <key>OfflineApps</key>
2578 <true/> | <false/>
2579 </dict>
2580 </dict>
2581 ```
2582 #### policies.json
2583 ```
2584 {
2585 "policies": {
2586 "SanitizeOnShutdown": {
2587 "Cache": true | false,
2588 "Cookies": true | false,
2589 "Downloads": true | false,
2590 "FormData": true | false,
2591 "History": true | false,
2592 "Sessions": true | false,
2593 "SiteSettings": true | false,
2594 "OfflineApps": true | false
2595 }
2596 }
2597 }
2598 ```
2599 ### SanitizeOnShutdown (All)
2600 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2601
2602 **Compatibility:** Firefox 60, Firefox ESR 60\
2603 **CCK2 Equivalent:** N/A\
2604 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2605 #### Windows (GPO)
2606 ```
2607 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2608 ```
2609 #### macOS
2610 ```
2611 <dict>
2612 <key>SanitizeOnShutdown</key>
2613 <true/> | <false/>
2614 </dict>
2615 ```
2616 #### policies.json
2617 ```
2618 {
2619 "policies": {
2620 "SanitizeOnShutdown": true | false
2621 }
2622 }
2623 ```
2624 ### SearchBar
2625 Set whether or not search bar is displayed.
2626
2627 **Compatibility:** Firefox 60, Firefox ESR 60\
2628 **CCK2 Equivalent:** `showSearchBar`\
2629 **Preferences Affected:** N/A
2630
2631 #### Windows (GPO)
2632 ```
2633 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2634 ```
2635 #### macOS
2636 ```
2637 <dict>
2638 <key>SearchBar</key>
2639 <string>unified | separate</string>
2640 </dict>
2641 ```
2642
2643 #### policies.json
2644 ```
2645 {
2646 "policies": {
2647 "SearchBar": "unified" | "separate"
2648 }
2649 }
2650 ```
2651
2652
2653
2654
2655
2656 ### SearchEngines (This policy is only available on the ESR.)
2657
2658 ### SearchEngines | Default
2659
2660 Set the default search engine. This policy is only available on the ESR.
2661
2662 **Compatibility:** Firefox ESR 60\
2663 **CCK2 Equivalent:** `defaultSearchEngine`\
2664 **Preferences Affected:** N/A
2665
2666 #### Windows (GPO)
2667 ```
2668 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2669 ```
2670 #### macOS
2671 ```
2672 <dict>
2673 <key>SearchEngines</key>
2674 <dict>
2675 <key>Default</key>
2676 <string>NAME_OF_SEARCH_ENGINE</string>
2677 </dict>
2678 </dict>
2679 ```
2680 #### policies.json
2681 ```
2682 {
2683 "policies": {
2684 "SearchEngines": {
2685 "Default": "NAME_OF_SEARCH_ENGINE"
2686 }
2687 }
2688 }
2689 ```
2690 ### SearchEngines | PreventInstalls
2691
2692 Prevent installing search engines from webpages.
2693
2694 **Compatibility:** Firefox ESR 60\
2695 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2696 **Preferences Affected:** N/A
2697
2698 #### Windows (GPO)
2699 ```
2700 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2701 ```
2702 #### macOS
2703 ```
2704 <dict>
2705 <key>SearchEngines</key>
2706 <dict>
2707 <key>PreventInstalls</key>
2708 <true/> | <false/>
2709 </dict>
2710 </dict>
2711 ```
2712 #### policies.json
2713 ```
2714 {
2715 "policies": {
2716 "SearchEngines": {
2717 "PreventInstalls": true | false
2718 }
2719 }
2720 }
2721 ```
2722 ### SearchEngines | Remove
2723
2724 Hide built-in search engines. This policy is only available on the ESR.
2725
2726 **Compatibility:** Firefox ESR 60.2\
2727 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2728 **Preferences Affected:** N/A
2729
2730 #### Windows (GPO)
2731 ```
2732 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2733 ```
2734 #### macOS
2735 ```
2736 <dict>
2737 <key>SearchEngines</key>
2738 <dict>
2739 <key>Remove</key>
2740 <array>
2741 <string>NAME_OF_SEARCH_ENGINE</string>
2742 </array>
2743 </dict>
2744 </dict>
2745 ```
2746 #### policies.json
2747 ```
2748 {
2749 "policies": {
2750 "SearchEngines": {
2751 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2752 }
2753 }
2754 }
2755 ```
2756 ### SearchEngines | Add
2757
2758 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2759
2760 `Name` is the name of the search engine.
2761
2762 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2763
2764 `Method` is either GET or POST
2765
2766 `IconURL` is a URL for the icon to use.
2767
2768 `Alias` is a keyword to use for the engine.
2769
2770 `Description` is a description of the search engine.
2771
2772 `PostData` is the POST data as name value pairs separated by &.
2773
2774 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2775
2776 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2777 **CCK2 Equivalent:** `searchplugins`\
2778 **Preferences Affected:** N/A
2779
2780 #### Windows (GPO)
2781 ```
2782 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2783 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2784 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2785 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2786 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2787 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2788 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2789 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2790 ```
2791
2792 #### macOS
2793 ```
2794 <dict>
2795 <key>SearchEngines</key>
2796 <dict>
2797 <key>Add</key>
2798 <array>
2799 <dict>
2800 <key>Name</key>
2801 <string>Example1</string>
2802 <key>URLTemplate</key>
2803 <string>https://www.example.org/q={searchTerms}</string>
2804 <key>Method</key>
2805 <string>GET | POST </string>
2806 <key>IconURL</key>
2807 <string>https://www.example.org/favicon.ico</string>
2808 <key>Alias</key>
2809 <string>example</string>
2810 <key>Description</key>
2811 <string>Example Description</string>
2812 <key>SuggestURLTemplate</key>
2813 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2814 <key>PostData</key>
2815 <string>name=value&q={searchTerms}</string>
2816 </dict>
2817 <array>
2818 </dict>
2819 </dict>
2820 ```
2821 #### policies.json
2822 ```
2823 {
2824 "policies": {
2825 "SearchEngines": {
2826 "Add": [
2827 {
2828 "Name": "Example1",
2829 "URLTemplate": "https://www.example.org/q={searchTerms}",
2830 "Method": "GET" | "POST",
2831 "IconURL": "https://www.example.org/favicon.ico",
2832 "Alias": "example",
2833 "Description": "Description",
2834 "PostData": "name=value&q={searchTerms}",
2835 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2836 }
2837 ]
2838 }
2839 }
2840 }
2841 ```
2842 ### SearchSuggestEnabled
2843
2844 Enable search suggestions.
2845
2846 **Compatibility:** Firefox 68, Firefox ESR 68\
2847 **CCK2 Equivalent:** N/A\
2848 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2849
2850 #### Windows (GPO)
2851 ```
2852 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2853 ```
2854 #### macOS
2855 ```
2856 <dict>
2857 <key>SearchSuggestEnabled</key>
2858 <true/> | <false/>
2859 </dict>
2860 ```
2861 #### policies.json
2862 ```
2863 {
2864 "policies": {
2865 "SearchSuggestEnabled": true | false
2866 }
2867 }
2868 ```
2869 ### SecurityDevices
2870
2871 Install PKCS #11 modules.
2872
2873 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2874 **CCK2 Equivalent:** `certs.devices`\
2875 **Preferences Affected:** N/A
2876
2877 #### Windows (GPO)
2878 ```
2879 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2880 ```
2881 #### macOS
2882 ```
2883 <dict>
2884 <key>SecurityDevices</key>
2885 <dict>
2886 <key>NAME_OF_DEVICE</key>
2887 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2888 </dict>
2889 </dict>
2890 ```
2891
2892 #### policies.json
2893 ```
2894 {
2895 "policies": {
2896 "SecurityDevices": {
2897 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2898 }
2899 }
2900 }
2901 ```
2902 ### SSLVersionMax
2903
2904 Set and lock the maximum version of TLS.
2905
2906 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2907 **CCK2 Equivalent:** N/A\
2908 **Preferences Affected:** `security.tls.version.max`
2909
2910 #### Windows (GPO)
2911 ```
2912 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2913 ```
2914 #### macOS
2915 ```
2916 <dict>
2917 <key>SSLVersionMax</key>
2918 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2919 </dict>
2920 ```
2921
2922 #### policies.json
2923 ```
2924 {
2925 "policies": {
2926 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2927 }
2928 }
2929 ```
2930 ### SSLVersionMin
2931
2932 Set and lock the minimum version of TLS.
2933
2934 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2935 **CCK2 Equivalent:** N/A\
2936 **Preferences Affected:** `security.tls.version.min`
2937
2938 #### Windows (GPO)
2939 ```
2940 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2941 ```
2942 #### macOS
2943 ```
2944 <dict>
2945 <key>SSLVersionMin</key>
2946 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2947 </dict>
2948 ```
2949
2950 #### policies.json
2951 ```
2952 {
2953 "policies": {
2954 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2955 }
2956 }
2957 ```
2958 ### SupportMenu
2959 Add a menuitem to the help menu for specifying support information.
2960
2961 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2962 **CCK2 Equivalent:** helpMenu\
2963 **Preferences Affected:** N/A
2964
2965 #### Windows (GPO)
2966 ```
2967 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2968 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2969 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
2970 ```
2971 #### macOS
2972 ```
2973 <dict>
2974 <key>SupportMenu</key>
2975 <dict>
2976 <key>Title</key>
2977 <string>SupportMenu</string>
2978 <key>URL</key>
2979 <string>http://example.com/support</string>
2980 <key>AccessKey</key>
2981 <string>S</string>
2982 </dict>
2983 </dict>
2984 ```
2985 #### policies.json
2986 ```
2987 {
2988 "policies": {
2989 "SupportMenu": {
2990 "Title": "Support Menu",
2991 "URL": "http://example.com/support",
2992 "AccessKey": "S"
2993 }
2994 }
2995 }
2996 ```
2997 ### WebsiteFilter
2998 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2999
3000 **Compatibility:** Firefox 60, Firefox ESR 60\
3001 **CCK2 Equivalent:** N/A\
3002 **Preferences Affected:** N/A
3003
3004 #### Windows (GPO)
3005 ```
3006 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
3007 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
3008 ```
3009 #### macOS
3010 ```
3011 <dict>
3012 <key>WebsiteFilter</key>
3013 <dict>
3014 <key>Block</key>
3015 <array>
3016 <string><all_urls></string>
3017 </array>
3018 <key>Exceptions</key>
3019 <array>
3020 <string>http://example.org/*</string>
3021 </array>
3022 </dict>
3023
3024 </dict>
3025 ```
3026 #### policies.json
3027 ```
3028 {
3029 "policies": {
3030 "WebsiteFilter": {
3031 "Block": ["<all_urls>"],
3032 "Exceptions": ["http://example.org/*"]
3033 }
3034 }
3035 }
3036 ```

patrick-canterino.de