]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #565 from mozilla/DisableDefaultBrowserAgent
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#AppAutoUpdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
11 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
35 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
38 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
39 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
40 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
41 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
42 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
43 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
44 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
45 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
46 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
47 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
48 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
49 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
50 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
51 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
52 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
53 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
54 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
55 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
56 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
57 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
58 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
59 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
60 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
61 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
62 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
63 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
64 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
65 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
66 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
67 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
68 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
69 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
70 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
71 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
72 | **[`Preferences`](#preferences)** | Set and lock some preferences.
73 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
74 | **[`Proxy`](#proxy)** | Configure proxy settings.
75 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
76 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
77 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
78 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
79 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
80 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
81 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
82 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
83 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
84 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
87 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
88 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
89 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
90 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
91
92 ### AppAutoUpdate
93
94 Enable or disable **automatic** application update.
95
96 If set to true, application updates are installed without user approval.
97
98 If set to false, application updates are downloaded but the user can choose when to install the update.
99
100 If you have disabled updates via DisableAppUpdate, this policy has no effect.
101
102 **Compatibility:** Firefox 75, Firefox ESR 68.7\
103 **CCK2 Equivalent:** N/A\
104 **Preferences Affected:** app.update.auto
105
106 #### Windows (GPO)
107 ```
108 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
109 ```
110 #### macOS
111 ```
112 <dict>
113 <key>AppAutoUpdate</key>
114 <true/> | <false/>
115 </dict>
116 ```
117 #### policies.json
118 ```
119 {
120 "policies": {
121 "AppAutoUpdate": true | false
122 }
123 }
124 ```
125 ### AppUpdateURL
126
127 Change the URL for application update.
128
129 **Compatibility:** Firefox 62, Firefox ESR 60.2\
130 **CCK2 Equivalent:** N/A\
131 **Preferences Affected:** `app.update.url`
132
133 #### Windows (GPO)
134 ```
135 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
136 ```
137 #### macOS
138 ```
139 <dict>
140 <key>AppUpdateURL</key>
141 <string>https://yoursite.com</string>
142 </dict>
143 ```
144 #### policies.json
145 ```
146 {
147 "policies": {
148 "AppUpdateURL": "https://yoursite.com"
149 }
150 }
151 ```
152 ### Authentication
153
154 Configure sites that support integrated authentication.
155
156 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
157
158 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
159 **CCK2 Equivalent:** N/A\
160 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
161
162 #### Windows (GPO)
163 ```
164 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
165 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
166 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
167 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
168 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
169 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
170 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
171 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
172 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
173 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
174 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
175 ```
176 #### macOS
177 ```
178 <dict>
179 <key>Authentication</key>
180 <dict>
181 <key>SPNEGO</key>
182 <array>
183 <string>mydomain.com</string>
184 <string>https://myotherdomain.com</string>
185 </array>
186 <key>Delegated</key>
187 <array>
188 <string>mydomain.com</string>
189 <string>https://myotherdomain.com</string>
190 </array>
191 <key>NTLM</key>
192 <array>
193 <string>mydomain.com</string>
194 <string>https://myotherdomain.com</string>
195 </array>
196 <key>AllowNonFQDN</key>
197 <dict>
198 <key>SPNEGO</key>
199 <true/> | <false/>
200 <key>NTLM</key>
201 <true/> | <false/>
202 </dict>
203 <key>AllowProxies</key>
204 <dict>
205 <key>SPNEGO</key>
206 <true/> | <false/>
207 <key>NTLM</key>
208 <true/> | <false/>
209 </dict>
210 <key>Locked</key>
211 <true/> | <false/>
212 </dict>
213 </dict>
214 ```
215 #### policies.json
216 ```
217 {
218 "policies": {
219 "Authentication": {
220 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
221 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
222 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
223 "AllowNonFQDN": {
224 "SPNEGO": true | false,
225 "NTLM": true | false
226 },
227 "AllowProxies": {
228 "SPNEGO": true | false,
229 "NTLM": true | false
230 },
231 "Locked": true | false
232 }
233 }
234 }
235 ```
236 ### BlockAboutAddons
237
238 Block access to the Add-ons Manager (about:addons).
239
240 **Compatibility:** Firefox 60, Firefox ESR 60\
241 **CCK2 Equivalent:** `disableAddonsManager`\
242 **Preferences Affected:** N/A
243
244 #### Windows (GPO)
245 ```
246 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
247 ```
248 #### macOS
249 ```
250 <dict>
251 <key>BlockAboutAddons</key>
252 <true/> | <false/>
253 </dict>
254 ```
255 #### policies.json
256 ```
257 {
258 "policies": {
259 "BlockAboutAddons": true | false
260 }
261 }
262 ```
263 ### BlockAboutConfig
264
265 Block access to about:config.
266
267 **Compatibility:** Firefox 60, Firefox ESR 60\
268 **CCK2 Equivalent:** `disableAboutConfig`\
269 **Preferences Affected:** N/A
270
271 #### Windows (GPO)
272 ```
273 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
274 ```
275 #### macOS
276 ```
277 <dict>
278 <key>BlockAboutConfig</key>
279 <true/> | <false/>
280 </dict>
281 ```
282 #### policies.json
283 ```
284 {
285 "policies": {
286 "BlockAboutConfig": true | false
287 }
288 }
289 ```
290 ### BlockAboutProfiles
291
292 Block access to About Profiles (about:profiles).
293
294 **Compatibility:** Firefox 60, Firefox ESR 60\
295 **CCK2 Equivalent:** `disableAboutProfiles`\
296 **Preferences Affected:** N/A
297
298 #### Windows (GPO)
299 ```
300 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
301 ```
302 #### macOS
303 ```
304 <dict>
305 <key>BlockAboutProfiles</key>
306 <true/> | <false/>
307 </dict>
308 ```
309 #### policies.json
310 ```
311 {
312 "policies": {
313 "BlockAboutProfiles": true | false
314 }
315 }
316 ```
317 ### BlockAboutSupport
318
319 Block access to Troubleshooting Information (about:support).
320
321 **Compatibility:** Firefox 60, Firefox ESR 60\
322 **CCK2 Equivalent:** `disableAboutSupport`\
323 **Preferences Affected:** N/A
324
325 #### Windows (GPO)
326 ```
327 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
328 ```
329 #### macOS
330 ```
331 <dict>
332 <key>BlockAboutSupport</key>
333 <true/> | <false/>
334 </dict>
335 ```
336 #### policies.json
337 ```
338 {
339 "policies": {
340 "BlockAboutSupport": true | false
341 }
342 }
343 ```
344 ### Bookmarks
345
346 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
347
348 **Compatibility:** Firefox 60, Firefox ESR 60\
349 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
350 **Preferences Affected:** N/A
351
352 #### Windows (GPO)
353 ```
354 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
355 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
356 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
357 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
358 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
359 ```
360 #### macOS
361 ```
362 <dict>
363 <key>Bookmarks</key>
364 <array>
365 <dict>
366 <key>Title</key>
367 <string>Example</string>
368 <key>URL</key>
369 <string>https://example.com</string>
370 <key>Favicon</key>
371 <string>https://example.com/favicon.ico</string>
372 <key>Placement</key>
373 <string>toolbar | menu</string>
374 <key>Folder</key>
375 <string>FolderName</string>
376 </dict>
377 </array>
378 </dict>
379 ```
380 #### policies.json
381 ```
382 {
383 "policies": {
384 "Bookmarks": [
385 {
386 "Title": "Example",
387 "URL": "https://example.com",
388 "Favicon": "https://example.com/favicon.ico",
389 "Placement": "toolbar" | "menu",
390 "Folder": "FolderName"
391 }
392 ]
393 }
394 }
395 ```
396 ### CaptivePortal
397 Enable or disable the detection of captive portals.
398
399 **Compatibility:** Firefox 67, Firefox ESR 60.7\
400 **CCK2 Equivalent:** N/A\
401 **Preferences Affected:** `network.captive-portal-service.enabled`
402
403 #### Windows (GPO)
404 ```
405 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
406 ```
407 #### macOS
408 ```
409 <dict>
410 <key>CaptivePortal</key>
411 <true/> | <false/>
412 </dict>
413 ```
414 #### policies.json
415 ```
416 {
417 "policies": {
418 "CaptivePortal": true | false
419 }
420 }
421 ```
422 ### Certificates
423
424 ### Certificates | ImportEnterpriseRoots
425
426 Trust certificates that have been added to the operating system certificate store by a user or administrator.
427
428 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
429
430 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
431 **CCK2 Equivalent:** N/A\
432 **Preferences Affected:** `security.enterprise_roots.enabled`
433
434 #### Windows (GPO)
435 ```
436 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
437 ```
438 #### macOS
439 ```
440 <dict>
441 <key>Certificates</key>
442 <dict>
443 <key>ImportEnterpriseRoots</key>
444 <true/> | <false/>
445 </dict>
446 </dict>
447 ```
448 #### policies.json
449 ```
450 {
451 "policies": {
452 "Certificates": {
453 "ImportEnterpriseRoots": true | false
454 }
455 }
456 }
457 ```
458 ### Certificates | Install
459
460 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
461
462 - Windows
463 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
464 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
465 - macOS
466 - /Library/Application Support/Mozilla/Certificates
467 - ~/Library/Application Support/Mozilla/Certificates
468 - Linux
469 - /usr/lib/mozilla/certificates
470 - /usr/lib64/mozilla/certificates
471 - ~/.mozilla/certificates
472
473 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
474
475 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
476
477 Certificates are installed using the trust string `CT,CT,`.
478
479 Binary (DER) and ASCII (PEM) certificates are both supported.
480
481 **Compatibility:** Firefox 64, Firefox ESR 64\
482 **CCK2 Equivalent:** `certs.ca`\
483 **Preferences Affected:** N/A
484
485 #### Windows (GPO)
486 ```
487 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
488 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
489 ```
490 #### macOS
491 ```
492 <dict>
493 <key>Certificates</key>
494 <dict>
495 <key>Install</key>
496 <array>
497 <string>cert1.der</string>
498 <string>/Users/username/cert2.pem</string>
499 </array>
500 </dict>
501 </dict>
502 ```
503 #### policies.json
504 ```
505 {
506 "policies": {
507 "Certificates": {
508 "Install": ["cert1.der", "/home/username/cert2.pem"]
509 }
510 }
511 }
512 ```
513 ### Cookies
514 Configure cookie preferences.
515
516 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
517
518 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
519
520 `Default` determines whether cookies are accepted at all.
521
522 `AcceptThirdParty` determines how third-party cookies are handled.
523
524 `ExpireAtSessionEnd` determines when cookies expire.
525
526 `RejectTracker` only rejects cookies for trackers.
527
528 `Locked` prevents the user from changing cookie preferences.
529
530 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
531 **CCK2 Equivalent:** N/A\
532 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
533
534 #### Windows (GPO)
535 ```
536 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
537 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
538 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
539 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
540 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
541 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
542 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
543 ```
544 #### macOS
545 ```
546 <dict>
547 <key>Cookies</key>
548 <dict>
549 <key>Allow</key>
550 <array>
551 <string>http://example.com</string>
552 </array>
553 <key>Block</key>
554 <array>
555 <string>http://example.org</string>
556 </array>
557 <key>Default</key>
558 <true/> | <false/>
559 <key>AcceptThirdParty</key>
560 <string>always | never | from-visited</string>
561 <key>ExpireAtSessionEnd</key>
562 <true/> | <false/>
563 <key>RejectTracker</key>
564 <true/> | <false/>
565 <key>Locked</key>
566 <true/> | <false/>
567 </dict>
568 </dict>
569 ```
570 #### policies.json
571 ```
572 {
573 "policies": {
574 "Cookies": {
575 "Allow": ["http://example.org/"],
576 "Block": ["http://example.edu/"],
577 "Default": true | false,
578 "AcceptThirdParty": "always" | "never" | "from-visited",
579 "ExpireAtSessionEnd": true | false,
580 "RejectTracker": true | false,
581 "Locked": true | false
582 }
583 }
584 }
585 ```
586 ### DisableSetDesktopBackground
587 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
588
589 **Compatibility:** Firefox 60, Firefox ESR 60\
590 **CCK2 Equivalent:** `removeSetDesktopBackground`\
591 **Preferences Affected:** N/A
592
593 #### Windows (GPO)
594 ```
595 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
596 ```
597
598 #### macOS
599 ```
600 <dict>
601 <key>DisableSetDesktopBackground</key>
602 <true/> | <false/>
603 </dict>
604 ```
605 #### policies.json
606 ```
607 {
608 "policies": {
609 "DisableSetDesktopBackground": true | false
610 }
611 }
612 ```
613 ### DisableMasterPasswordCreation
614 Remove the master password functionality.
615
616 **Compatibility:** Firefox 60, Firefox ESR 60\
617 **CCK2 Equivalent:** `noMasterPassword`\
618 **Preferences Affected:** N/A
619
620 #### Windows (GPO)
621 ```
622 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
623 ```
624
625 #### macOS
626 ```
627 <dict>
628 <key>DisableMasterPasswordCreation</key>
629 <true/> | <false/>
630 </dict>
631 ```
632 #### policies.json
633 ```
634 {
635 "policies": {
636 "DisableMasterPasswordCreation": true | false
637 }
638 }
639 ```
640 ### DisableAppUpdate
641 Turn off application updates.
642
643 **Compatibility:** Firefox 60, Firefox ESR 60\
644 **CCK2 Equivalent:** `disableFirefoxUpdates`\
645 **Preferences Affected:** N/A
646
647 #### Windows (GPO)
648 ```
649 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
650 ```
651 #### macOS
652 ```
653 <dict>
654 <key>DisableAppUpdate</key>
655 <true/> | <false/>
656 </dict>
657 ```
658 #### policies.json
659 ```
660 {
661 "policies": {
662 "DisableAppUpdate": true | false
663 }
664 }
665 ```
666 ### DisableBuiltinPDFViewer
667 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
668
669 **Compatibility:** Firefox 60, Firefox ESR 60\
670 **CCK2 Equivalent:** `disablePDFjs`\
671 **Preferences Affected:** `pdfjs.disabled`
672
673 #### Windows (GPO)
674 ```
675 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
676 ```
677
678 #### macOS
679 ```
680 <dict>
681 <key>DisableBuiltinPDFViewer</key>
682 <true/> | <false/>
683 </dict>
684 ```
685 #### policies.json
686 ```
687 {
688 "policies": {
689 "DisableBuiltinPDFViewer": true | false
690 }
691 }
692 ```
693 ### DisableDefaultBrowserAgent
694 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
695
696 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
697 **CCK2 Equivalent:** N/A\
698 **Preferences Affected:** N/A
699
700 #### Windows (GPO)
701 ```
702 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
703 ```
704
705 #### policies.json
706 ```
707 {
708 "policies": {
709 "DisableDefaultBrowserAgent": true | false
710 }
711 }
712 ```
713 ### DisableDeveloperTools
714 Remove access to all developer tools.
715
716 **Compatibility:** Firefox 60, Firefox ESR 60\
717 **CCK2 Equivalent:** `removeDeveloperTools`\
718 **Preferences Affected:** `devtools.policy.disabled`
719
720 #### Windows (GPO)
721 ```
722 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
723 ```
724
725 #### macOS
726 ```
727 <dict>
728 <key>DisableDeveloperTools</key>
729 <true/> | <false/>
730 </dict>
731 ```
732 #### policies.json
733 ```
734 {
735 "policies": {
736 "DisableDeveloperTools": true | false
737 }
738 }
739 ```
740 ### DisableFeedbackCommands
741 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
742
743 **Compatibility:** Firefox 60, Firefox ESR 60\
744 **CCK2 Equivalent:** N/A\
745 **Preferences Affected:** N/A
746
747 #### Windows (GPO)
748 ```
749 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
750 ```
751 #### macOS
752 ```
753 <dict>
754 <key>DisableFeedbackCommands</key>
755 <true/> | <false/>
756 </dict>
757 ```
758 #### policies.json
759 ```
760 {
761 "policies": {
762 "DisableFeedbackCommands": true | false
763 }
764 }
765 ```
766 ### DisableFirefoxScreenshots
767 Remove access to Firefox Screenshots.
768
769 **Compatibility:** Firefox 60, Firefox ESR 60\
770 **CCK2 Equivalent:** N/A\
771 **Preferences Affected:** `extensions.screenshots.disabled`
772
773 #### Windows (GPO)
774 ```
775 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
776 ```
777 #### macOS
778 ```
779 <dict>
780 <key>DisableFirefoxScreenshots</key>
781 <true/> | <false/>
782 </dict>
783 ```
784 #### policies.json
785 ```
786 {
787 "policies": {
788 "DisableFirefoxScreenshots": true | false
789 }
790 }
791 ```
792 ### DisableFirefoxAccounts
793 Disable Firefox Accounts integration (Sync).
794
795 **Compatibility:** Firefox 60, Firefox ESR 60\
796 **CCK2 Equivalent:** `disableSync`\
797 **Preferences Affected:** `identity.fxaccounts.enabled`
798
799 #### Windows (GPO)
800 ```
801 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
802 ```
803 #### macOS
804 ```
805 <dict>
806 <key>DisableFirefoxAccounts</key>
807 <true/> | <false/>
808 </dict>
809 ```
810 #### policies.json
811 ```
812 {
813 "policies": {
814 "DisableFirefoxAccounts": true | false
815 }
816 }
817 ```
818 ### DisableFirefoxStudies
819 Disable Firefox studies (Shield).
820
821 **Compatibility:** Firefox 60, Firefox ESR 60\
822 **CCK2 Equivalent:** N/A\
823 **Preferences Affected:** N/A
824
825 #### Windows (GPO)
826 ```
827 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisableFirefoxStudies</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "DisableFirefoxStudies": true | false
841 }
842 }
843 ```
844 ### DisableForgetButton
845 Disable the "Forget" button.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `disableForget`\
849 **Preferences Affected:** N/A
850
851 #### Windows (GPO)
852 ```
853 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>DisableForgetButton</key>
859 <true/> | <false/>
860 </dict>
861 ```
862 #### policies.json
863 ```
864 {
865 "policies": {
866 "DisableForgetButton": true | false
867 }
868 }
869 ```
870 ### DisableFormHistory
871 Turn off saving information on web forms and the search bar.
872
873 **Compatibility:** Firefox 60, Firefox ESR 60\
874 **CCK2 Equivalent:** `disableFormFill`\
875 **Preferences Affected:** ` browser.formfill.enable`
876
877 #### Windows (GPO)
878 ```
879 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
880 ```
881 #### macOS
882 ```
883 <dict>
884 <key>DisableFormHistory</key>
885 <true/> | <false/>
886 </dict>
887 ```
888 #### policies.json
889 ```
890 {
891 "policies": {
892 "DisableFormHistory": true | false
893 }
894 }
895 ```
896 ### DisablePasswordReveal
897 Do not allow passwords to be shown in saved logins
898
899 **Compatibility:** Firefox 71, Firefox ESR 68.3\
900 **CCK2 Equivalent:** N/A
901 **Preferences Affected:** N/A
902
903 #### Windows (GPO)
904 ```
905 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
906 ```
907
908 #### macOS
909 ```
910 <dict>
911 <key>DisablePasswordReveal</key>
912 <true/> | <false/>
913 </dict>
914 ```
915 #### policies.json
916 ```
917 {
918 "policies": {
919 "DisablePasswordReveal": true | false
920 }
921 }
922 ```
923 ### DisablePocket
924 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
925
926 **Compatibility:** Firefox 60, Firefox ESR 60\
927 **CCK2 Equivalent:** `disablePocket`\
928 **Preferences Affected:** `extensions.pocket.enabled`
929
930 #### Windows (GPO)
931 ```
932 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
933 ```
934 #### macOS
935 ```
936 <dict>
937 <key>DisablePocket</key>
938 <true/> | <false/>
939 </dict>
940 ```
941 #### policies.json
942 ```
943 {
944 "policies": {
945 "DisablePocket": true | false
946 }
947 }
948 ```
949 ### DisablePrivateBrowsing
950 Remove access to private browsing.
951
952 **Compatibility:** Firefox 60, Firefox ESR 60\
953 **CCK2 Equivalent:** `disablePrivateBrowsing`\
954 **Preferences Affected:** N/A
955
956 #### Windows (GPO)
957 ```
958 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
959 ```
960 #### macOS
961 ```
962 <dict>
963 <key>DisablePrivateBrowsing</key>
964 <true/> | <false/>
965 </dict>
966 ```
967 #### policies.json
968 ```
969 {
970 "policies": {
971 "DisablePrivateBrowsing": true | false
972 }
973 }
974 ```
975 ### DisableProfileImport
976 Disables the "Import data from another browser" option in the bookmarks window.
977
978 **Compatibility:** Firefox 60, Firefox ESR 60\
979 **CCK2 Equivalent:** N/A\
980 **Preferences Affected:** N/A
981
982 #### Windows (GPO)
983 ```
984 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
985 ```
986 #### macOS
987 ```
988 <dict>
989 <key>DisableProfileImport</key>
990 <true/> | <false/>
991 </dict>
992 ```
993 #### policies.json
994 ```
995 {
996 "policies": {
997 "DisableProfileImport": true | false
998 }
999 }
1000 ```
1001 ### DisableProfileRefresh
1002 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1003
1004 **Compatibility:** Firefox 60, Firefox ESR 60\
1005 **CCK2 Equivalent:** `disableResetFirefox`\
1006 **Preferences Affected:** `browser.disableResetPrompt`
1007
1008 #### Windows (GPO)
1009 ```
1010 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1011 ```
1012 #### macOS
1013 ```
1014 <dict>
1015 <key>DisableProfileRefresh</key>
1016 <true/> | <false/>
1017 </dict>
1018 ```
1019 #### policies.json
1020 ```
1021 {
1022 "policies": {
1023 "DisableProfileRefresh": true | false
1024 }
1025 }
1026 ```
1027 ### DisableSafeMode
1028 Disable safe mode within the browser.
1029
1030 On Windows, this disables safe mode via the command line as well.
1031
1032 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1033 **CCK2 Equivalent:** `disableSafeMode`\
1034 **Preferences Affected:** N/A
1035
1036 #### Windows (GPO)
1037 ```
1038 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1039 ```
1040 #### macOS
1041 ```
1042 <dict>
1043 <key>DisableSafeMode</key>
1044 <true/> | <false/>
1045 </dict>
1046 ```
1047 #### policies.json
1048 ```
1049 {
1050 "policies": {
1051 "DisableSafeMode": true | false
1052 }
1053 }
1054 ```
1055 ### DisableSecurityBypass
1056 Prevent the user from bypassing security in certain cases.
1057
1058 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1059
1060 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1061
1062 **Compatibility:** Firefox 60, Firefox ESR 60\
1063 **CCK2 Equivalent:** N/A\
1064 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1065
1066 #### Windows (GPO)
1067 ```
1068 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1069 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1070 ```
1071 #### macOS
1072 ```
1073 <dict>
1074 <key>DisableSecurityBypass</key>
1075 <dict>
1076 <key>InvalidCertificate</key>
1077 <true/> | <false/>
1078 <key><SafeBrowsing/key>
1079 <true/> | <false/>
1080 </dict>
1081 </dict>
1082 ```
1083 #### policies.json
1084 ```
1085 {
1086 "policies": {
1087 "DisableSecurityBypass": {
1088 "InvalidCertificate": true false,
1089 "SafeBrowsing": true false
1090 }
1091 }
1092 }
1093 ```
1094 ### DisableSystemAddonUpdate
1095 Prevent system add-ons from being installed or update.
1096
1097 **Compatibility:** Firefox 60, Firefox ESR 60\
1098 **CCK2 Equivalent:** N/A\
1099 **Preferences Affected:** N/A
1100
1101 #### Windows (GPO)
1102 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1103 ```
1104 #### macOS
1105 ```
1106 <dict>
1107 <key>DisableSystemAddonUpdate</key>
1108 <true/> | <false/>
1109 </dict>
1110 ```
1111 #### policies.json
1112 ```
1113 {
1114 "policies": {
1115 "DisableSystemAddonUpdate": true | false
1116 }
1117 }
1118 ```
1119 ### DisableTelemetry
1120 Prevent the upload of telemetry data.
1121
1122 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1123
1124 **Compatibility:** Firefox 60, Firefox ESR 60\
1125 **CCK2 Equivalent:** `disableTelemetry`\
1126 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1127
1128 #### Windows (GPO)
1129 ```
1130 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1131 ```
1132 #### macOS
1133 ```
1134 <dict>
1135 <key>DisableTelemetry</key>
1136 <true/> | <false/>
1137 </dict>
1138 ```
1139 #### policies.json
1140 ```
1141 {
1142 "policies": {
1143 "DisableTelemetry": true | false
1144 }
1145 }
1146 ```
1147 ### DisplayBookmarksToolbar
1148 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1149
1150 **Compatibility:** Firefox 60, Firefox ESR 60\
1151 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1152 **Preferences Affected:** N/A
1153
1154 #### Windows (GPO)
1155 ```
1156 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1157 ```
1158 #### macOS
1159 ```
1160 <dict>
1161 <key>DisplayBookmarksToolbar</key>
1162 <true/> | <false/>
1163 </dict>
1164 ```
1165 #### policies.json
1166 ```
1167 {
1168 "policies": {
1169 "DisplayBookmarksToolbar": true | false
1170 }
1171 }
1172 ```
1173 ### DisplayMenuBar (Deprecated)
1174 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1175
1176 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1177 **CCK2 Equivalent:** `displayMenuBar`\
1178 **Preferences Affected:** N/A
1179
1180 #### Windows (GPO)
1181 ```
1182 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1183 ```
1184 #### macOS
1185 ```
1186 <dict>
1187 <key>DisplayMenuBar</key>
1188 <true/> | <false/>
1189 </dict>
1190 ```
1191 #### policies.json
1192 ```
1193 {
1194 "policies": {
1195 "DisplayMenuBar": true | false
1196 }
1197 }
1198 ```
1199 ### DisplayMenuBar
1200 Set the state of the menubar.
1201
1202 `always` means the menubar is shown and cannot be hidden.
1203
1204 `never` means the menubar is hidden and cannot be shown.
1205
1206 `default-on` means the menubar is on by default but can be hidden.
1207
1208 `default-off` means the menubar is off by default but can be shown.
1209
1210 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1211 **CCK2 Equivalent:** `displayMenuBar`\
1212 **Preferences Affected:** N/A
1213
1214 #### Windows (GPO)
1215 ```
1216 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1217 ```
1218 #### macOS
1219 ```
1220 <dict>
1221 <key>DisplayMenuBar</key>
1222 <string>always | never | default-on | default-off</string>
1223 </dict>
1224 ```
1225 #### policies.json
1226 ```
1227 {
1228 "policies": {
1229 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1230 }
1231 }
1232 ```
1233 ### DNSOverHTTPS
1234 Configure DNS over HTTPS.
1235
1236 `Enabled` determines whether DNS over HTTPS is enabled
1237
1238 `ProviderURL` is a URL to another provider.
1239
1240 `Locked` prevents the user from changing DNS over HTTPS preferences.
1241
1242 **Compatibility:** Firefox 63, Firefox ESR 68\
1243 **CCK2 Equivalent:** N/A\
1244 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1245
1246 #### Windows (GPO)
1247 ```
1248 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1249 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1250 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1251 ```
1252 #### macOS
1253 ```
1254 <dict>
1255 <key>DNSOverHTTPS</key>
1256 <dict>
1257 <key>Enabled</key>
1258 <true/> | <false/>
1259 <key>ProviderURL</key>
1260 <string>URL_TO_ALTERNATE_PROVIDER</string>
1261 <key>Locked</key>
1262 <true/> | <false/>
1263 </dict>
1264 </dict>
1265 ```
1266 #### policies.json
1267 ```
1268 {
1269 "policies": {
1270 "DNSOverHTTPS": {
1271 "Enabled": true | false,
1272 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1273 "Locked": true | false
1274 }
1275 }
1276 }
1277 ```
1278 ### DontCheckDefaultBrowser
1279 Don't check if Firefox is the default browser at startup.
1280
1281 **Compatibility:** Firefox 60, Firefox ESR 60\
1282 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1283 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1284
1285 #### Windows (GPO)
1286 ```
1287 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1288 ```
1289 #### macOS
1290 ```
1291 <dict>
1292 <key>DontCheckDefaultBrowser</key>
1293 <true/> | <false/>
1294 </dict>
1295 ```
1296 #### policies.json
1297 ```
1298 {
1299 "policies": {
1300 "DontCheckDefaultBrowser": true | false
1301 }
1302 }
1303 ```
1304 ### DefaultDownloadDirectory
1305 Set the default download directory.
1306
1307 You can use ${home} for the native home directory.
1308
1309 **Compatibility:** Firefox 68, Firefox ESR 68\
1310 **CCK2 Equivalent:** N/A\
1311 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1312
1313 #### Windows (GPO)
1314 ```
1315 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1316 ```
1317 #### macOS
1318 ```
1319 <dict>
1320 <key>DefaultDownloadDirectory</key>
1321 <string>${home}/Downloads</string>
1322 </dict>
1323 ```
1324 #### policies.json (macOS and Linux)
1325 ```
1326 {
1327 "policies": {
1328 "DefaultDownloadDirectory": "${home}/Downloads"
1329 }
1330 ```
1331 #### policies.json (Windows)
1332 ```
1333 {
1334 "policies": {
1335 "DefaultDownloadDirectory": "${home}\\Downloads"
1336 }
1337 ```
1338 ### DownloadDirectory
1339 Set and lock the download directory.
1340
1341 You can use ${home} for the native home directory.
1342
1343 **Compatibility:** Firefox 68, Firefox ESR 68\
1344 **CCK2 Equivalent:** N/A\
1345 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1346
1347 #### Windows (GPO)
1348 ```
1349 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1350 ```
1351 #### macOS
1352 ```
1353 <dict>
1354 <key>DownloadDirectory</key>
1355 <string>${home}/Downloads</string>
1356 </dict>
1357 ```
1358 #### policies.json (macOS and Linux)
1359 ```
1360 {
1361 "policies": {
1362 "DownloadDirectory": "${home}/Downloads"
1363 }
1364 ```
1365 #### policies.json (Windows)
1366 ```
1367 {
1368 "policies": {
1369 "DownloadDirectory": "${home}\\Downloads"
1370 }
1371 ```
1372 ### EnableTrackingProtection
1373 Configure tracking protection.
1374
1375 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1376
1377 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1378
1379 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1380
1381 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1382
1383 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1384
1385 `Exceptions` are origins for which tracking protection is not enabled.
1386
1387 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1388 **CCK2 Equivalent:** N/A\
1389 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1390
1391 #### Windows (GPO)
1392 ```
1393 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1394 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1395 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1396 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1397 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1398 ```
1399 #### macOS
1400 ```
1401 <dict>
1402 <key>EnableTrackingProtection</key>
1403 <dict>
1404 <key>Value</key>
1405 <true/> | <false/>
1406 <key><Locked</key>
1407 <true/> | <false/>
1408 <key><Cryptomining</key>
1409 <true/> | <false/>
1410 <key><Fingerprinting</key>
1411 <true/> | <false/>
1412 <key>Exceptions</key>
1413 <array>
1414 <string>https://example.com</string>
1415 </array>
1416 </dict>
1417 </dict>
1418 ```
1419 #### policies.json
1420 ```
1421 {
1422 "policies": {
1423 "EnableTrackingProtection": {
1424 "Value": [true, false],
1425 "Locked": [true, false],
1426 "Cryptomining": [true, false],
1427 "Fingerprinting": [true, false],
1428 "Exceptions": ["https://example.com"]
1429 }
1430 }
1431 ```
1432 ### EnterprisePoliciesEnabled
1433 Enable policy support on macOS.
1434
1435 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1436 **CCK2 Equivalent:** N/A\
1437 **Preferences Affected:** N/A
1438
1439 #### macOS
1440 ```
1441 <dict>
1442 <key>EnterprisePoliciesEnabled</key>
1443 <true/>
1444 </dict>
1445 ```
1446 ### Extensions
1447 Control the installation, uninstallation and locking of extensions.
1448
1449 `Install` is a list of URLs or native paths for extensions to be installed.
1450
1451 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1452
1453 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1454
1455 **Compatibility:** Firefox 60, Firefox ESR 60\
1456 **CCK2 Equivalent:** `addons`\
1457 **Preferences Affected:** N/A
1458
1459 #### Windows (GPO)
1460 ```
1461 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1462 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1463 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1464 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1465 ```
1466 #### macOS
1467 ```
1468 <dict>
1469 <key>Extensions</key>
1470 <dict>
1471 <key>Install</key>
1472 <array>
1473 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1474 <string>//path/to/xpi</string>
1475 </array>
1476 <key>Uninstall</key>
1477 <array>
1478 <string>bad_addon_id@mozilla.org</string>
1479 </array>
1480 <key>Locked</key>
1481 <array>
1482 <string>addon_id@mozilla.org</string>
1483 </array>
1484 </dict>
1485 </dict>
1486 ```
1487 #### policies.json
1488 ```
1489 {
1490 "policies": {
1491 "Extensions": {
1492 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1493 "Uninstall": ["bad_addon_id@mozilla.org"],
1494 "Locked": ["addon_id@mozilla.org"]
1495 }
1496 }
1497 }
1498 ```
1499 ### ExtensionSettings
1500 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1501
1502 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1503
1504 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1505
1506 The configuration for each extension is another dictionary that can contain the fields documented below.
1507
1508 | Name | Description |
1509 | --- | --- |
1510 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1511 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1512 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1513 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1514 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1515 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1516 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1517 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1518 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1519
1520 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1521 **CCK2 Equivalent:** N/A\
1522 **Preferences Affected:** N/A
1523
1524 #### Windows (GPO)
1525 ```
1526 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1527 {
1528 "*": {
1529 "blocked_install_message": "Custom error message.",
1530 "install_sources": ["https://addons.mozilla.org/"],
1531 "installation_mode": "blocked",
1532 "allowed_types": ["extension"]
1533 },
1534 "uBlock0@raymondhill.net": {
1535 "installation_mode": "force_installed",
1536 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1537 }
1538 }
1539 ```
1540 #### macOS
1541 ```
1542 <dict>
1543 <key>ExtensionSettings</key>
1544 <dict>
1545 <key>*</key>
1546 <dict>
1547 <key>blocked_install_message</key>
1548 <string>Custom error message.</string>
1549 <key>install_sources</key>
1550 <array>
1551 <string>https://addons.mozilla.org/</string>
1552 </array>
1553 <key>installation_mode</key>
1554 <string>blocked</string>
1555 <key>allowed_types</key>
1556 <array>
1557 <string>extension</string>
1558 </array>
1559 </dict>
1560 <key>uBlock0@raymondhill.net</key>
1561 <dict>
1562 <key>installation_mode</key>
1563 <string>force_installed</string>
1564 <key>install_url</key>
1565 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1566 </dict>
1567 </dict>
1568 </dict>
1569 ```
1570 #### policies.json
1571 ```
1572 {
1573 "policies": {
1574 "ExtensionSettings": {
1575 "*": {
1576 "blocked_install_message": "Custom error message.",
1577 "install_sources": ["https://addons.mozilla.org/"],
1578 "installation_mode": "blocked",
1579 "allowed_types": ["extension"]
1580 },
1581 "uBlock0@raymondhill.net": {
1582 "installation_mode": "force_installed",
1583 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1584 }
1585 }
1586 }
1587 }
1588 ```
1589 ### ExtensionUpdate
1590 Control extension updates.
1591
1592 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1593 **CCK2 Equivalent:** N/A\
1594 **Preferences Affected:** `extensions.update.enabled`
1595
1596 #### Windows (GPO)
1597 ```
1598 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1599 ```
1600 #### macOS
1601 ```
1602 <dict>
1603 <key>ExtensionUpdate</key>
1604 <true/> | <false/>
1605 </dict>
1606 ```
1607 #### policies.json
1608 ```
1609 {
1610 "policies": {
1611 "ExtensionUpdate": true | false
1612 }
1613 }
1614 ```
1615 ### FlashPlugin
1616 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1617
1618 `Allow` is a list of origins where Flash are allowed.
1619
1620 `Block` is a list of origins where Flash is not allowed.
1621
1622 `Default` determines whether or not Flash is allowed by default.
1623
1624 `Locked` prevents the user from changing Flash preferences.
1625
1626 **Compatibility:** Firefox 60, Firefox ESR 60\
1627 **CCK2 Equivalent:** `permissions.plugin`\
1628 **Preferences Affected:** `plugin.state.flash`
1629
1630 #### Windows (GPO)
1631 ```
1632 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1633 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1634 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1635 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1636 ```
1637 #### macOS
1638 ```
1639 <dict>
1640 <key>FlashPlugin</key>
1641 <dict>
1642 <key>Allow</key>
1643 <array>
1644 <string>http://example.org</string>
1645 </array>
1646 <key>Block</key>
1647 <array>
1648 <string>http://example.edu</string>
1649 </array>
1650 <key>Default</key>
1651 <true/> | <false/>
1652 <key>Locked</key>
1653 <true/> | <false/>
1654 </dict>
1655 </dict>
1656 ```
1657 #### policies.json
1658 ```
1659 {
1660 "policies": {
1661 "FlashPlugin": {
1662 "Allow": ["http://example.org/"],
1663 "Block": ["http://example.edu/"],
1664 "Default": true | false,
1665 "Locked": true | false
1666 }
1667 }
1668 }
1669 ```
1670 ### FirefoxHome
1671 Customize the Firefox Home page.
1672
1673 **Compatibility:** Firefox 68, Firefox ESR 68\
1674 **CCK2 Equivalent:** N/A\
1675 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1676
1677 #### Windows (GPO)
1678 ```
1679 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1680 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1681 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1682 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1683 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1684 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1685 ```
1686 #### macOS
1687 ```
1688 <dict>
1689 <key>FirefoxHome</key>
1690 <dict>
1691 <key>Search</key>
1692 <true/> | <false/>
1693 <key>TopSites</key>
1694 <true/> | <false/>
1695 <key>Highlights</key>
1696 <true/> | <false/>
1697 <key>Pocket</key>
1698 <true/> | <false/>
1699 <key>Snippets</key>
1700 <true/> | <false/>
1701 <key>Locked</key>
1702 <true/> | <false/>
1703 </dict>
1704 </dict>
1705 ```
1706 #### policies.json
1707 ```
1708 {
1709 "policies": {
1710 "FirefoxHome": {
1711 "Search": true | false,
1712 "TopSites": true | false,
1713 "Highlights": true | false,
1714 "Pocket": true | false,
1715 "Snippets": true | false,
1716 "Locked": true | false
1717 }
1718 }
1719 }
1720 ```
1721 ### HardwareAcceleration
1722 Control hardware acceleration.
1723
1724 **Compatibility:** Firefox 60, Firefox ESR 60\
1725 **CCK2 Equivalent:** N/A\
1726 **Preferences Affected:** `layers.acceleration.disabled`
1727
1728 #### Windows (GPO)
1729 ```
1730 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1731 ```
1732 #### macOS
1733 ```
1734 <dict>
1735 <key>HardwareAcceleration</key>
1736 <true/> | <false/>
1737 </dict>
1738 ```
1739 #### policies.json
1740 ```
1741 {
1742 "policies": {
1743 "HardwareAcceleration": true | false
1744 }
1745 }
1746 ```
1747 ### Homepage
1748 Configure the default homepage and how Firefox starts.
1749
1750 `URL` is the default homepage.
1751
1752 `Locked` prevents the user from changing homepage preferences.
1753
1754 `Additional` allows for more than one homepage.
1755
1756 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1757
1758 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1759 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1760 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1761
1762 #### Windows (GPO)
1763 ```
1764 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1765 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1766 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1767 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1768 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1769 ```
1770 #### macOS
1771 ```
1772 <dict>
1773 <key>Homepage</key>
1774 <dict>
1775 <key>URL</key>
1776 <string>http://example.com</string>
1777 <key>Locked</key>
1778 <true/> | <false/>
1779 <key>Additional</key>
1780 <array>
1781 <string>http://example.org</string>
1782 <string>http://example.edu</string>
1783 </array>
1784 <key>StartPage</key>
1785 <string>none | homepage | previous-session</string>
1786 </dict>
1787 </dict>
1788 ```
1789 #### policies.json
1790 ```
1791 {
1792 "policies": {
1793 "Homepage": {
1794 "URL": "http://example.com/",
1795 "Locked": true | false,
1796 "Additional": ["http://example.org/",
1797 "http://example.edu/"],
1798 "StartPage": "none" | "homepage" | "previous-session"
1799 }
1800 }
1801 }
1802 ```
1803 ### InstallAddonsPermission
1804 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1805
1806 `Allow` is a list of origins where extension installs are allowed.
1807
1808 `Default` determines whether or not extension installs are allowed by default.
1809
1810 **Compatibility:** Firefox 60, Firefox ESR 60\
1811 **CCK2 Equivalent:** `permissions.install`\
1812 **Preferences Affected:** `xpinstall.enabled`
1813
1814 #### Windows (GPO)
1815 ```
1816 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1817 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1818 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1819 ```
1820 #### macOS
1821 ```
1822 <dict>
1823 <key>InstallAddonsPermission</key>
1824 <dict>
1825 <key>Allow</key>
1826 <array>
1827 <string>http://example.org</string>
1828 <string>http://example.edu</string>
1829 </array>
1830 <key>Default</key>
1831 <true/> | <false/>
1832 </dict>
1833 </dict>
1834 ```
1835 #### policies.json
1836 ```
1837 {
1838 "policies": {
1839 "InstallAddonsPermission": {
1840 "Allow": ["http://example.org/",
1841 "http://example.edu/"],
1842 "Default": true | false
1843 }
1844 }
1845 }
1846 ```
1847 ### LegacyProfiles
1848 Disable the feature enforcing a separate profile for each installation.
1849
1850 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1851
1852 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1853
1854 This policy only work on Windows via GPO (not policies.json).
1855
1856 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1857 **CCK2 Equivalent:** N/A\
1858 **Preferences Affected:** N/A
1859
1860 #### Windows (GPO)
1861 ```
1862 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1863 ```
1864 ### LocalFileLinks
1865 Enable linking to local files by origin.
1866
1867 **Compatibility:** Firefox 68, Firefox ESR 68\
1868 **CCK2 Equivalent:** N/A\
1869 **Preferences Affected:** `capability.policy.localfilelinks.*`
1870
1871 #### Windows (GPO)
1872 ```
1873 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1874 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1875 ```
1876 #### macOS
1877 ```
1878 <dict>
1879 <key>LocalFileLinks</key>
1880 <array>
1881 <string>http://example.org</string>
1882 <string>http://example.edu</string>
1883 </array>
1884 </dict>
1885 ```
1886 #### policies.json
1887 ```
1888 {
1889 "policies": {
1890 "LocalFileLinks": ["http://example.org/",
1891 "http://example.edu/"]
1892 }
1893 }
1894 ```
1895 ### NoDefaultBookmarks
1896 Disable the creation of default bookmarks.
1897
1898 This policy is only effective if the user profile has not been created yet.
1899
1900 **Compatibility:** Firefox 60, Firefox ESR 60\
1901 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1902 **Preferences Affected:** N/A
1903
1904 #### Windows (GPO)
1905 ```
1906 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1907 ```
1908 #### macOS
1909 ```
1910 <dict>
1911 <key>NoDefaultBookmarks</key>
1912 <true/> | <false/>
1913 </dict>
1914 ```
1915 #### policies.json
1916 ```
1917 {
1918 "policies": {
1919 "NoDefaultBookmarks": true | false
1920 }
1921 }
1922 ```
1923 ### NetworkPrediction
1924 Enable or disable network prediction (DNS prefetching).
1925
1926 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1927 **CCK2 Equivalent:** N/A\
1928 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1929
1930 #### Windows (GPO)
1931 ```
1932 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1933 ```
1934 #### macOS
1935 ```
1936 <dict>
1937 <key>NetworkPrediction</key>
1938 <true/> | <false/>
1939 </dict>
1940 ```
1941 #### policies.json
1942 ```
1943 {
1944 "policies": {
1945 "NetworkPrediction": true | false
1946 }
1947 ```
1948 ### NewTabPage
1949 Enable or disable the New Tab page.
1950
1951 **Compatibility:** Firefox 68, Firefox ESR 68\
1952 **CCK2 Equivalent:** N/A\
1953 **Preferences Affected:** `browser.newtabpage.enabled`
1954
1955 #### Windows (GPO)
1956 ```
1957 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1958 ```
1959 #### macOS
1960 ```
1961 <dict>
1962 <key>NewTabPage</key>
1963 <true/> | <false/>
1964 </dict>
1965 ```
1966 #### policies.json
1967 ```
1968 {
1969 "policies": {
1970 "NewTabPage": true | false
1971 }
1972 ```
1973 ### OfferToSaveLogins
1974 Control whether or not Firefox offers to save passwords.
1975
1976 **Compatibility:** Firefox 60, Firefox ESR 60\
1977 **CCK2 Equivalent:** `dontRememberPasswords`\
1978 **Preferences Affected:** `signon.rememberSignons`
1979
1980 #### Windows (GPO)
1981 ```
1982 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1983 ```
1984 #### macOS
1985 ```
1986 <dict>
1987 <key>OfferToSaveLogins</key>
1988 <true/> | <false/>
1989 </dict>
1990 ```
1991 #### policies.json
1992 ```
1993 {
1994 "policies": {
1995 "OfferToSaveLogins": true | false
1996 }
1997 }
1998 ```
1999 ### OfferToSaveLoginsDefault
2000 Sets the default value of signon.rememberSignons without locking it.
2001
2002 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2003 **CCK2 Equivalent:** `dontRememberPasswords`\
2004 **Preferences Affected:** `signon.rememberSignons`
2005
2006 #### Windows (GPO)
2007 ```
2008 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2009 ```
2010 #### macOS
2011 ```
2012 <dict>
2013 <key>OfferToSaveLoginsDefault</key>
2014 <true/> | <false/>
2015 </dict>
2016 ```
2017 #### policies.json
2018 ```
2019 {
2020 "policies": {
2021 "OfferToSaveLoginsDefault": true | false
2022 }
2023 }
2024 ```
2025 ### OverrideFirstRunPage
2026 Override the first run page. If the value is blank, no first run page is displayed.
2027
2028 **Compatibility:** Firefox 60, Firefox ESR 60\
2029 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2030 **Preferences Affected:** `startup.homepage_welcome_url`
2031
2032 #### Windows (GPO)
2033 ```
2034 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2035 ```
2036 #### macOS
2037 ```
2038 <dict>
2039 <key>OverrideFirstRunPage</key>
2040 <string>http://example.org</string>
2041 </dict>
2042 ```
2043 #### policies.json
2044 ```
2045 {
2046 "policies": {
2047 "OverrideFirstRunPage": "http://example.org"
2048 }
2049 ```
2050 ### OverridePostUpdatePage
2051 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2052
2053 **Compatibility:** Firefox 60, Firefox ESR 60\
2054 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2055 **Preferences Affected:** `startup.homepage_override_url`
2056
2057 #### Windows (GPO)
2058 ```
2059 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2060 ```
2061 #### macOS
2062 ```
2063 <dict>
2064 <key>OverridePostUpdatePage</key>
2065 <string>http://example.org</string>
2066 </dict>
2067 ```
2068 #### policies.json
2069 ```
2070 {
2071 "policies": {
2072 "OverridePostUpdatePage": "http://example.org"
2073 }
2074 ```
2075 ### PasswordManagerEnabled
2076 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2077
2078 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2079 **CCK2 Equivalent:** N/A\
2080 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2081
2082 #### Windows (GPO)
2083 ```
2084 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2085 ```
2086 #### macOS
2087 ```
2088 <dict>
2089 <key>PasswordManagerEnabled</key>
2090 <true/> | <false/>
2091 </dict>
2092 ```
2093 #### policies.json
2094 ```
2095 {
2096 "policies": {
2097 "PasswordManagerEnabled": true | false
2098 }
2099 }
2100 ```
2101 ### Permissions
2102 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2103
2104 `Allow` is a list of origins where the feature is allowed.
2105
2106 `Block` is a list of origins where the feature is not allowed.
2107
2108 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2109
2110 `Locked` prevents the user from changing preferences for the feature.
2111
2112 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2113 **CCK2 Equivalent:** N/A\
2114 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2115
2116 #### Windows (GPO)
2117 ```
2118 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2119 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2120 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2121 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2122 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2123 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2124 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2125 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2126 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2127 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2128 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2129 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2130 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2131 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2132 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2133 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2134 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2135 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2136 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2137 ```
2138 #### macOS
2139 ```
2140 <dict>
2141 <key>Permissions</key>
2142 <dict>
2143 <key>Camera</key>
2144 <dict>
2145 <key>Allow</key>
2146 <array>
2147 <string>https://example.org</string>
2148 <string>https://example.org:1234</string>
2149 </array>
2150 <key>Block</key>
2151 <array>
2152 <string>https://example.edu</string>
2153 </array>
2154 <key>BlockNewRequests</key>
2155 <true/>
2156 <key>Locked</key>
2157 <true/>
2158 </dict>
2159 <key>Microphone</key>
2160 <dict>
2161 <key>Allow</key>
2162 <array>
2163 <string>https://example.org</string>
2164 </array>
2165 <key>Block</key>
2166 <array>
2167 <string>https://example.edu</string>
2168 </array>
2169 <key>BlockNewRequests</key>
2170 <true/>
2171 <key>Locked</key>
2172 <true/>
2173 </dict>
2174 <key>Location</key>
2175 <dict>
2176 <key>Allow</key>
2177 <array>
2178 <string>https://example.org</string>
2179 </array>
2180 <key>Block</key>
2181 <array>
2182 <string>https://example.edu</string>
2183 </array>
2184 <key>BlockNewRequests</key>
2185 <true/>
2186 <key>Locked</key>
2187 <true/>
2188 </dict>
2189 <key>Notifications</key>
2190 <dict>
2191 <key>Allow</key>
2192 <array>
2193 <string>https://example.org</string>
2194 </array>
2195 <key>Block</key>
2196 <array>
2197 <string>https://example.edu</string>
2198 </array>
2199 <key>BlockNewRequests</key>
2200 <true/>
2201 <key>Locked</key>
2202 <true/>
2203 </dict>
2204 <key>Autoplay</key>
2205 <dict>
2206 <key>Allow</key>
2207 <array>
2208 <string>https://example.org</string>
2209 </array>
2210 <key>Block</key>
2211 <array>
2212 <string>https://example.edu</string>
2213 </array>
2214 </dict>
2215 </dict>
2216 </dict>
2217 ```
2218 #### policies.json
2219 ```
2220 {
2221 "policies": {
2222 "Permissions": {
2223 "Camera": {
2224 "Allow": ["https://example.org","https://example.org:1234"],
2225 "Block": ["https://example.edu"],
2226 "BlockNewRequests": true | false,
2227 "Locked": true | false
2228 },
2229 "Microphone": {
2230 "Allow": ["https://example.org"],
2231 "Block": ["https://example.edu"],
2232 "BlockNewRequests": true | false,
2233 "Locked": true | false
2234 },
2235 "Location": {
2236 "Allow": ["https://example.org"],
2237 "Block": ["https://example.edu"],
2238 "BlockNewRequests": true | false,
2239 "Locked": true | false
2240 },
2241 "Notifications": {
2242 "Allow": ["https://example.org"],
2243 "Block": ["https://example.edu"],
2244 "BlockNewRequests": true | false,
2245 "Locked": true | false
2246 },
2247 "Autoplay": {
2248 "Allow": ["https://example.org"],
2249 "Block": ["https://example.edu"]
2250 }
2251 }
2252 }
2253 }
2254 ```
2255 ### PopupBlocking
2256 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2257
2258 `Allow` is a list of origins where popup-windows are allowed.
2259
2260 `Default` determines whether or not pop-up windows are allowed by default.
2261
2262 `Locked` prevents the user from changing pop-up preferences.
2263
2264 **Compatibility:** Firefox 60, Firefox ESR 60\
2265 **CCK2 Equivalent:** `permissions.popup`\
2266 **Preferences Affected:** `dom.disable_open_during_load`
2267
2268 #### Windows (GPO)
2269 ```
2270 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2271 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2272 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2273 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2274 ```
2275 #### macOS
2276 ```
2277 <dict>
2278 <key>PopupBlocking</key>
2279 <dict>
2280 <key>Allow</key>
2281 <array>
2282 <string>http://example.org</string>
2283 <string>http://example.edu</string>
2284 </array>
2285 <key>Default</key>
2286 <true/> | <false/>
2287 <key>Locked</key>
2288 <true/> | <false/>
2289 </dict>
2290 </dict>
2291 ```
2292 #### policies.json
2293 ```
2294 {
2295 "policies": {
2296 "PopupBlocking": {
2297 "Allow": ["http://example.org/",
2298 "http://example.edu/"],
2299 "Default": true | false,
2300 "Locked": true | false
2301 }
2302 }
2303 }
2304 ```
2305 ### Preferences
2306 Set and lock certain preferences.
2307
2308 **Compatibility:** See below\
2309 **CCK2 Equivalent:** `preferences`\
2310 **Preferences Affected:** See below
2311
2312 | Preference | Type | Compatibility | Default
2313 | --- | --- | --- | ---
2314 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2315 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2316 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2317 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2318 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2319 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2320 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2321 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2322 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2323 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2324 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2325 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2326 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2327 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2328 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2329 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2330 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2331 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2332 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2333 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2334 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2335 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2336 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2337 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2338 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2339 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2340 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2341 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2342 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2343 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2344 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2345 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2346 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2347 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2348 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2349 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2350 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2351 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2352 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2353 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2354 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2355 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2356 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2357 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2358 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2359 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2360 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2361 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2362 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2363 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2364 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2365 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2366 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2367 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2368 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2369 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2370 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2371 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2372 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2373 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2374 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2376 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2377 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2378 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2379 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2380 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2381 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2382 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2383 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2384 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2385 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2386 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2387 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2388 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2389 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2390 disabled
2391 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2392 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2393 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2394 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2395 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2396 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2397 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2398 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2399 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2400 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2401 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2402 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2403 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2404 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2405 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2406 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2407 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2408 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2409 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2410 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2411 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2412 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2413 #### Windows (GPO)
2414 ```
2415 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2416 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2417 ```
2418 #### macOS
2419 ```
2420 <dict>
2421 <key>Preferences</key>
2422 <dict>
2423 <key>boolean_preference_name</key>
2424 <true/> | <false/>
2425 <key>string_preference_name</key>
2426 <string>string_value</string>
2427 </dict>
2428 </dict>
2429 ```
2430 #### policies.json
2431 ```
2432 {
2433 "policies": {
2434 "Preferences": {
2435 "boolean_preference_name": true | false,
2436 "string_preference_name": "string_value"
2437 }
2438 }
2439 }
2440 ```
2441 ### PromptForDownloadLocation
2442 Ask where to save each file before downloading.
2443
2444 **Compatibility:** Firefox 68, Firefox ESR 68\
2445 **CCK2 Equivalent:** N/A\
2446 **Preferences Affected:** `browser.download.useDownloadDir`
2447
2448 #### Windows (GPO)
2449 ```
2450 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2451 ```
2452 #### macOS
2453 ```
2454 <dict>
2455 <key>PromptForDownloadLocation</key>
2456 <true/> | <false/>
2457 </dict>
2458 ```
2459 #### policies.json
2460 ```
2461 {
2462 "policies": {
2463 "PromptForDownloadLocation": true | false
2464 }
2465 }
2466 ```
2467 ### Proxy
2468 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2469 To specify ports, append them to the hostnames with a colon (:).
2470
2471 `Mode` is the proxy method being used.
2472
2473 `Locked` is whether or not proxy settings can be changed.
2474
2475 `HTTPProxy` is the HTTP proxy server.
2476
2477 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2478
2479 `SSLProxy` is the SSL proxy server.
2480
2481 `FTPProxy` is the FTP proxy server.
2482
2483 `SOCKSProxy` is the SOCKS proxy server
2484
2485 `SOCKSVersion` is the SOCKS version (4 or 5)
2486
2487 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2488
2489 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2490
2491 `AutoLogin` means do not prompt for authentication if password is saved.
2492
2493 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2494
2495 **Compatibility:** Firefox 60, Firefox ESR 60\
2496 **CCK2 Equivalent:** `networkProxy*`\
2497 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2498
2499 #### Windows (GPO)
2500 ```
2501 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2502 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2503 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2504 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2505 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2506 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2507 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2508 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2509 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2510 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2511 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2512 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2513 ```
2514 #### macOS
2515 ```
2516 <dict>
2517 <key>Proxy</key>
2518 <dict>
2519 <key>Mode</key>
2520 <string>none | system | manual | autoDetect | autoConfig</string>
2521 <key>Locked</key>
2522 <true> | </false>
2523 <key>HTTPProxy</key>
2524 <string>https://httpproxy.example.com</string>
2525 <key>UseHTTPProxyForAllProtocols</key>
2526 <true> | </false>
2527 <key>SSLProxy</key>
2528 <string>https://sslproxy.example.com</string>
2529 <key>FTPProxy</key>
2530 <string>https://ftpproxy.example.com</string>
2531 <key>SOCKSProxy</key>
2532 <string>https://socksproxy.example.com</string>
2533 <key>SOCKSVersion</key>
2534 <string>4 | 5</string>
2535 <key>Passthrough</key>
2536 <string>&lt;local>&gt;</string>
2537 <key>AutoConfigURL</key>
2538 <string>URL_TO_AUTOCONFIG</string>
2539 <key>AutoLogin</key>
2540 <true> | </false>
2541 <key>UseProxyForDNS</key>
2542 <true> | </false>
2543 </dict>
2544 </dict>
2545 ```
2546 #### policies.json
2547 ```
2548 {
2549 "policies": {
2550 "Proxy": {
2551 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2552 "Locked": [true, false],
2553 "HTTPProxy": "hostname",
2554 "UseHTTPProxyForAllProtocols": [true, false],
2555 "SSLProxy": "hostname",
2556 "FTPProxy": "hostname",
2557 "SOCKSProxy": "hostname",
2558 "SOCKSVersion": 4 | 5
2559 "Passthrough": "<local>",
2560 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2561 "AutoLogin": [true, false],
2562 "UseProxyForDNS": [true, false]
2563 }
2564 }
2565 }
2566 ```
2567 ### RequestedLocales
2568 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2569
2570 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2571
2572 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2573 **CCK2 Equivalent:** N/A\
2574 **Preferences Affected:** N/A
2575 #### Windows (GPO)
2576 ```
2577 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2578 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2579
2580 or
2581
2582 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2583 ```
2584 #### macOS
2585 ```
2586 <dict>
2587 <key>RequestedLocales</key>
2588 <array>
2589 <string>de</string>
2590 <string>en-US</string>
2591 </array>
2592 </dict>
2593
2594 or
2595
2596 <dict>
2597 <key>RequestedLocales</key>
2598 <string>de,en-US</string>
2599 </dict>
2600
2601 ```
2602 #### policies.json
2603 ```
2604 {
2605 "policies": {
2606 "RequestedLocales": ["de", "en-US"]
2607 }
2608 }
2609
2610 or
2611
2612 {
2613 "policies": {
2614 "RequestedLocales": "de,en-US"
2615 }
2616 }
2617 ```
2618 ### SanitizeOnShutdown (Selective)
2619 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2620
2621 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2622
2623 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2624 **CCK2 Equivalent:** N/A\
2625 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2626 #### Windows (GPO)
2627 ```
2628 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2629 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2630 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2631 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2632 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2633 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2634 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2635 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2636 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2637 ```
2638 #### macOS
2639 ```
2640 <dict>
2641 <key>SanitizeOnShutdown</key>
2642 <dict>
2643 <key>Cache</key>
2644 <true/> | <false/>
2645 <key>Cookies</key>
2646 <true/> | <false/>
2647 <key>Downloads</key>
2648 <true/> | <false/>
2649 <key>FormData</key>
2650 <true/> | <false/>
2651 <key>History</key>
2652 <true/> | <false/>
2653 <key>Sessions</key>
2654 <true/> | <false/>
2655 <key>SiteSettings</key>
2656 <true/> | <false/>
2657 <key>OfflineApps</key>
2658 <true/> | <false/>
2659 <key>Locked</key>
2660 <true/> | <false/>
2661 </dict>
2662 </dict>
2663 ```
2664 #### policies.json
2665 ```
2666 {
2667 "policies": {
2668 "SanitizeOnShutdown": {
2669 "Cache": true | false,
2670 "Cookies": true | false,
2671 "Downloads": true | false,
2672 "FormData": true | false,
2673 "History": true | false,
2674 "Sessions": true | false,
2675 "SiteSettings": true | false,
2676 "OfflineApps": true | false,
2677 "Locked": true | false
2678 }
2679 }
2680 }
2681 ```
2682 ### SanitizeOnShutdown (All)
2683 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2684
2685 **Compatibility:** Firefox 60, Firefox ESR 60\
2686 **CCK2 Equivalent:** N/A\
2687 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2688 #### Windows (GPO)
2689 ```
2690 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2691 ```
2692 #### macOS
2693 ```
2694 <dict>
2695 <key>SanitizeOnShutdown</key>
2696 <true/> | <false/>
2697 </dict>
2698 ```
2699 #### policies.json
2700 ```
2701 {
2702 "policies": {
2703 "SanitizeOnShutdown": true | false
2704 }
2705 }
2706 ```
2707 ### SearchBar
2708 Set whether or not search bar is displayed.
2709
2710 **Compatibility:** Firefox 60, Firefox ESR 60\
2711 **CCK2 Equivalent:** `showSearchBar`\
2712 **Preferences Affected:** N/A
2713
2714 #### Windows (GPO)
2715 ```
2716 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2717 ```
2718 #### macOS
2719 ```
2720 <dict>
2721 <key>SearchBar</key>
2722 <string>unified | separate</string>
2723 </dict>
2724 ```
2725
2726 #### policies.json
2727 ```
2728 {
2729 "policies": {
2730 "SearchBar": "unified" | "separate"
2731 }
2732 }
2733 ```
2734
2735
2736
2737
2738
2739 ### SearchEngines (This policy is only available on the ESR.)
2740
2741 ### SearchEngines | Default
2742
2743 Set the default search engine. This policy is only available on the ESR.
2744
2745 **Compatibility:** Firefox ESR 60\
2746 **CCK2 Equivalent:** `defaultSearchEngine`\
2747 **Preferences Affected:** N/A
2748
2749 #### Windows (GPO)
2750 ```
2751 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2752 ```
2753 #### macOS
2754 ```
2755 <dict>
2756 <key>SearchEngines</key>
2757 <dict>
2758 <key>Default</key>
2759 <string>NAME_OF_SEARCH_ENGINE</string>
2760 </dict>
2761 </dict>
2762 ```
2763 #### policies.json
2764 ```
2765 {
2766 "policies": {
2767 "SearchEngines": {
2768 "Default": "NAME_OF_SEARCH_ENGINE"
2769 }
2770 }
2771 }
2772 ```
2773 ### SearchEngines | PreventInstalls
2774
2775 Prevent installing search engines from webpages.
2776
2777 **Compatibility:** Firefox ESR 60\
2778 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2779 **Preferences Affected:** N/A
2780
2781 #### Windows (GPO)
2782 ```
2783 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2784 ```
2785 #### macOS
2786 ```
2787 <dict>
2788 <key>SearchEngines</key>
2789 <dict>
2790 <key>PreventInstalls</key>
2791 <true/> | <false/>
2792 </dict>
2793 </dict>
2794 ```
2795 #### policies.json
2796 ```
2797 {
2798 "policies": {
2799 "SearchEngines": {
2800 "PreventInstalls": true | false
2801 }
2802 }
2803 }
2804 ```
2805 ### SearchEngines | Remove
2806
2807 Hide built-in search engines. This policy is only available on the ESR.
2808
2809 **Compatibility:** Firefox ESR 60.2\
2810 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2811 **Preferences Affected:** N/A
2812
2813 #### Windows (GPO)
2814 ```
2815 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2816 ```
2817 #### macOS
2818 ```
2819 <dict>
2820 <key>SearchEngines</key>
2821 <dict>
2822 <key>Remove</key>
2823 <array>
2824 <string>NAME_OF_SEARCH_ENGINE</string>
2825 </array>
2826 </dict>
2827 </dict>
2828 ```
2829 #### policies.json
2830 ```
2831 {
2832 "policies": {
2833 "SearchEngines": {
2834 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2835 }
2836 }
2837 }
2838 ```
2839 ### SearchEngines | Add
2840
2841 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2842
2843 `Name` is the name of the search engine.
2844
2845 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2846
2847 `Method` is either GET or POST
2848
2849 `IconURL` is a URL for the icon to use.
2850
2851 `Alias` is a keyword to use for the engine.
2852
2853 `Description` is a description of the search engine.
2854
2855 `PostData` is the POST data as name value pairs separated by &.
2856
2857 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2858
2859 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2860 **CCK2 Equivalent:** `searchplugins`\
2861 **Preferences Affected:** N/A
2862
2863 #### Windows (GPO)
2864 ```
2865 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2866 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2867 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2868 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2869 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2870 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2871 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2872 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2873 ```
2874
2875 #### macOS
2876 ```
2877 <dict>
2878 <key>SearchEngines</key>
2879 <dict>
2880 <key>Add</key>
2881 <array>
2882 <dict>
2883 <key>Name</key>
2884 <string>Example1</string>
2885 <key>URLTemplate</key>
2886 <string>https://www.example.org/q={searchTerms}</string>
2887 <key>Method</key>
2888 <string>GET | POST </string>
2889 <key>IconURL</key>
2890 <string>https://www.example.org/favicon.ico</string>
2891 <key>Alias</key>
2892 <string>example</string>
2893 <key>Description</key>
2894 <string>Example Description</string>
2895 <key>SuggestURLTemplate</key>
2896 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2897 <key>PostData</key>
2898 <string>name=value&q={searchTerms}</string>
2899 </dict>
2900 <array>
2901 </dict>
2902 </dict>
2903 ```
2904 #### policies.json
2905 ```
2906 {
2907 "policies": {
2908 "SearchEngines": {
2909 "Add": [
2910 {
2911 "Name": "Example1",
2912 "URLTemplate": "https://www.example.org/q={searchTerms}",
2913 "Method": "GET" | "POST",
2914 "IconURL": "https://www.example.org/favicon.ico",
2915 "Alias": "example",
2916 "Description": "Description",
2917 "PostData": "name=value&q={searchTerms}",
2918 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2919 }
2920 ]
2921 }
2922 }
2923 }
2924 ```
2925 ### SearchSuggestEnabled
2926
2927 Enable search suggestions.
2928
2929 **Compatibility:** Firefox 68, Firefox ESR 68\
2930 **CCK2 Equivalent:** N/A\
2931 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2932
2933 #### Windows (GPO)
2934 ```
2935 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2936 ```
2937 #### macOS
2938 ```
2939 <dict>
2940 <key>SearchSuggestEnabled</key>
2941 <true/> | <false/>
2942 </dict>
2943 ```
2944 #### policies.json
2945 ```
2946 {
2947 "policies": {
2948 "SearchSuggestEnabled": true | false
2949 }
2950 }
2951 ```
2952 ### SecurityDevices
2953
2954 Install PKCS #11 modules.
2955
2956 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2957 **CCK2 Equivalent:** `certs.devices`\
2958 **Preferences Affected:** N/A
2959
2960 #### Windows (GPO)
2961 ```
2962 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2963 ```
2964 #### macOS
2965 ```
2966 <dict>
2967 <key>SecurityDevices</key>
2968 <dict>
2969 <key>NAME_OF_DEVICE</key>
2970 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2971 </dict>
2972 </dict>
2973 ```
2974
2975 #### policies.json
2976 ```
2977 {
2978 "policies": {
2979 "SecurityDevices": {
2980 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2981 }
2982 }
2983 }
2984 ```
2985 ### SSLVersionMax
2986
2987 Set and lock the maximum version of TLS.
2988
2989 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2990 **CCK2 Equivalent:** N/A\
2991 **Preferences Affected:** `security.tls.version.max`
2992
2993 #### Windows (GPO)
2994 ```
2995 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2996 ```
2997 #### macOS
2998 ```
2999 <dict>
3000 <key>SSLVersionMax</key>
3001 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3002 </dict>
3003 ```
3004
3005 #### policies.json
3006 ```
3007 {
3008 "policies": {
3009 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3010 }
3011 }
3012 ```
3013 ### SSLVersionMin
3014
3015 Set and lock the minimum version of TLS.
3016
3017 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3018 **CCK2 Equivalent:** N/A\
3019 **Preferences Affected:** `security.tls.version.min`
3020
3021 #### Windows (GPO)
3022 ```
3023 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3024 ```
3025 #### macOS
3026 ```
3027 <dict>
3028 <key>SSLVersionMin</key>
3029 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3030 </dict>
3031 ```
3032
3033 #### policies.json
3034 ```
3035 {
3036 "policies": {
3037 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3038 }
3039 }
3040 ```
3041 ### SupportMenu
3042 Add a menuitem to the help menu for specifying support information.
3043
3044 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3045 **CCK2 Equivalent:** helpMenu\
3046 **Preferences Affected:** N/A
3047
3048 #### Windows (GPO)
3049 ```
3050 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3051 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3052 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3053 ```
3054 #### macOS
3055 ```
3056 <dict>
3057 <key>SupportMenu</key>
3058 <dict>
3059 <key>Title</key>
3060 <string>SupportMenu</string>
3061 <key>URL</key>
3062 <string>http://example.com/support</string>
3063 <key>AccessKey</key>
3064 <string>S</string>
3065 </dict>
3066 </dict>
3067 ```
3068 #### policies.json
3069 ```
3070 {
3071 "policies": {
3072 "SupportMenu": {
3073 "Title": "Support Menu",
3074 "URL": "http://example.com/support",
3075 "AccessKey": "S"
3076 }
3077 }
3078 }
3079 ```
3080 ### UserMessaging
3081
3082 Prevent installing search engines from webpages.
3083
3084 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3085
3086 `ExtensionRecommendations` Don't recommend extensions.
3087
3088 `FeatureRecommendations` Don't recommend browser features.
3089
3090 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3091
3092 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3093 **CCK2 Equivalent:** N/A\
3094 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3095
3096 #### Windows (GPO)
3097 ```
3098 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3099 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3100 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3101 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3102 ```
3103 #### macOS
3104 ```
3105 <dict>
3106 <key>UserMessaging</key>
3107 <dict>
3108 <key>WhatsNew</key>
3109 <true/> | <false/>
3110 <key>ExtensionRecommendations</key>
3111 <true/> | <false/>
3112 <key>FeatureRecommendations</key>
3113 <true/> | <false/>
3114 <key>UrlbarInterventions</key>
3115 <true/> | <false/>
3116 </dict>
3117 </dict>
3118 ```
3119 #### policies.json
3120 ```
3121 {
3122 "policies": {
3123 "UserMessaging": {
3124 "WhatsNew": true | false,
3125 "ExtensionRecommendations": true | false,
3126 "FeatureRecommendations": true | false,
3127 "UrlbarInterventions": true | false
3128 }
3129 }
3130 }
3131 ```
3132 ### WebsiteFilter
3133 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3134
3135 **Compatibility:** Firefox 60, Firefox ESR 60\
3136 **CCK2 Equivalent:** N/A\
3137 **Preferences Affected:** N/A
3138
3139 #### Windows (GPO)
3140 ```
3141 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3142 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3143 ```
3144 #### macOS
3145 ```
3146 <dict>
3147 <key>WebsiteFilter</key>
3148 <dict>
3149 <key>Block</key>
3150 <array>
3151 <string><all_urls></string>
3152 </array>
3153 <key>Exceptions</key>
3154 <array>
3155 <string>http://example.org/*</string>
3156 </array>
3157 </dict>
3158
3159 </dict>
3160 ```
3161 #### policies.json
3162 ```
3163 {
3164 "policies": {
3165 "WebsiteFilter": {
3166 "Block": ["<all_urls>"],
3167 "Exceptions": ["http://example.org/*"]
3168 }
3169 }
3170 }
3171 ```

patrick-canterino.de