]> git.p6c8.net - policy-templates.git/blob - docs/index.md
3939dc85fa4dcba8f5477be841bc0e43c89fb15a
[policy-templates.git] / docs / index.md
1 Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
2
3 Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example:
4 ```
5 {
6 "policies": {
7 "Authentication": {
8 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"]
9 }
10 "Authentication_Comment": "These domains are required for us"
11 }
12 }
13 ```
14 Note: The `policies.json` must use the UTF-8 encoding.
15
16 | Policy Name | Description
17 | --- | --- |
18 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
19 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
20 | **[`AllowFileSelectionDialogs`](#allowfileselectiondialogs)** | Allow file selection dialogs.
21 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
22 | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
23 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
24 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
25 | **[`AutofillAddressEnabled`](#autofilladdressenabled)** | Enable autofill for addresses.
26 | **[`AutofillCreditCardEnabled`](#autofillcreditcardenabled)** | Enable autofill for payment methods.
27 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
28 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
29 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
30 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
31 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
32 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
33 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
34 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
35 | **[`Certificates`](#certificates)** |
36 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
37 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
38 | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
39 | **[`Cookies`](#cookies)** | Configure cookie preferences.
40 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
41 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
42 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
43 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
44 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
45 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
46 | **[`DisableEncryptedClientHello`](#disableencryptedclienthello)** | Disable the TLS Feature Encrypted Client Hello (ECH).
47 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
48 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
49 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
50 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
51 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
52 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
53 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
54 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
55 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
56 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
57 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
58 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
59 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
60 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
61 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
62 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
63 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
64 | **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules.
65 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
66 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
67 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
68 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
69 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
70 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
71 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
72 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
73 | **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
74 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
75 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
76 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
77 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
78 | **[`FirefoxSuggest`](#firefoxsuggest)** | Customize Firefox Suggest.
79 | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
80 | **[`Handlers`](#handlers)** | Configure default application handlers.
81 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
82 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
83 | **[`HttpAllowlist`](#httpallowlist)** | Configure origins that will not be upgraded to HTTPS.
84 | **[`HttpsOnlyMode`](#httpsonlymode)** | Configure HTTPS-Only Mode.
85 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
86 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
87 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
88 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
89 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
90 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
91 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
92 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
93 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
94 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
95 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
96 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
97 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
98 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
99 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
100 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
101 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
102 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
103 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
104 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
105 | **[`PostQuantumKeyAgreementEnabled`](#postquantumkeyagreementenabled)** | Enable post-quantum key agreement for TLS.
106 | **[`Preferences`](#preferences)** | Set and lock preferences.
107 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
108 | **[`PrintingEnabled`](#printingenabled)** | Enable or disable printing.
109 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
110 | **[`Proxy`](#proxy)** | Configure proxy settings.
111 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
112 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
113 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
114 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
115 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
116 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
117 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
118 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
119 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
120 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
121 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
122 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
123 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
124 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
125 | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
126 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
127 | **[`TranslateEnabled`](#translateenabled)** | Enable or disable webpage translation.
128 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
129 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
130 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
131 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
132
133 ### 3rdparty
134
135 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/enterprise-development/#how-to-add-policy).
136
137 For GPO and Intune, the extension developer should provide an ADMX file.
138
139 **Compatibility:** Firefox 68\
140 **CCK2 Equivalent:** N/A\
141 **Preferences Affected:** N/A
142
143 #### macOS
144 ```
145 <dict>
146 <key>3rdparty</key>
147 <dict>
148 <key>Extensions</key>
149 <dict>
150 <key>uBlock0@raymondhill.net</key>
151 <dict>
152 <key>adminSettings</key>
153 <dict>
154 <key>selectedFilterLists</key>
155 <array>
156 <string>ublock-privacy</string>
157 <string>ublock-badware</string>
158 <string>ublock-filters</string>
159 <string>user-filters</string>
160 </array>
161 </dict>
162 </dict>
163 </dict>
164 </dict>
165 </dict>
166 ```
167 #### policies.json
168 ```
169 {
170 "policies": {
171 "3rdparty": {
172 "Extensions": {
173 "uBlock0@raymondhill.net": {
174 "adminSettings": {
175 "selectedFilterLists": [
176 "ublock-privacy",
177 "ublock-badware",
178 "ublock-filters",
179 "user-filters"
180 ]
181 }
182 }
183 }
184 }
185 }
186 }
187 ```
188
189 ### AllowedDomainsForApps
190
191 Define domains allowed to access Google Workspace.
192
193 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
194
195 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
196
197 **Compatibility:** Firefox 89, Firefox ESR 78.11\
198 **CCK2 Equivalent:** N/A\
199 **Preferences Affected:** N/A
200
201 #### Windows (GPO)
202 ```
203 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
204 ```
205 #### Windows (Intune)
206 OMA-URI:
207 ```
208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
209 ```
210 Value (string):
211 ```
212 <enabled/>
213 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
214 ```
215 #### macOS
216 ```
217 <dict>
218 <key>AllowedDomainsForApps</key>
219 <string>managedfirefox.com,example.com</string>
220 </dict>
221 ```
222 #### policies.json
223 ```
224 {
225 "policies": {
226 "AllowedDomainsForApps": "managedfirefox.com,example.com"
227 }
228 }
229 ```
230 ### AllowFileSelectionDialogs
231
232 Enable or disable file selection dialogs.
233
234 **Compatibility:** Firefox 124\
235 **CCK2 Equivalent:** N/A\
236 **Preferences Affected:** `widget.disable_file_pickers`
237
238 #### Windows (GPO)
239 ```
240 Software\Policies\Mozilla\Firefox\AllowFileSelectionDialogs = 0x1 | 0x0
241 ```
242 #### Windows (Intune)
243 OMA-URI:
244 ```
245 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoAllowFileSelectionDialogsUpdate
246 ```
247 Value (string):
248 ```
249 <enabled/> or <disabled/>
250 ```
251 #### macOS
252 ```
253 <dict>
254 <key>AllowFileSelectionDialogs</key>
255 <true/> | <false/>
256 </dict>
257 ```
258 #### policies.json
259 ```
260 {
261 "policies": {
262 "AllowFileSelectionDialogs": true | false
263 }
264 }
265 ```
266 ### AppAutoUpdate
267
268 Enable or disable **automatic** application update.
269
270 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
271
272 If set to false, application updates are downloaded but the user can choose when to install the update.
273
274 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
275
276 **Compatibility:** Firefox 75, Firefox ESR 68.7\
277 **CCK2 Equivalent:** N/A\
278 **Preferences Affected:** `app.update.auto`
279
280 #### Windows (GPO)
281 ```
282 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
283 ```
284 #### Windows (Intune)
285 OMA-URI:
286 ```
287 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
288 ```
289 Value (string):
290 ```
291 <enabled/> or <disabled/>
292 ```
293 #### macOS
294 ```
295 <dict>
296 <key>AppAutoUpdate</key>
297 <true/> | <false/>
298 </dict>
299 ```
300 #### policies.json
301 ```
302 {
303 "policies": {
304 "AppAutoUpdate": true | false
305 }
306 }
307 ```
308 ### AppUpdatePin
309
310 Prevent Firefox from being updated beyond the specified version.
311
312 You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
313
314 You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
315
316 You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
317
318 **Compatibility:** Firefox 102,\
319 **CCK2 Equivalent:** N/A\
320 **Preferences Affected:** N/A
321
322 #### Windows (GPO)
323 ```
324 Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
325 ```
326 #### Windows (Intune)
327 OMA-URI:
328 ```
329 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
330 ```
331 Value (string):
332 ```
333 <enabled/>
334 <data id="AppUpdatePin" value="106."/>
335 ```
336 #### macOS
337 ```
338 <dict>
339 <key>AppUpdatePin</key>
340 <string>106.</string>
341 </dict>
342 ```
343 #### policies.json
344 ```
345 {
346 "policies": {
347 "AppUpdatePin": "106."
348 }
349 }
350 ```
351 ### AppUpdateURL
352
353 Change the URL for application update if you are providing Firefox updates from a custom update server.
354
355 **Compatibility:** Firefox 62, Firefox ESR 60.2\
356 **CCK2 Equivalent:** N/A\
357 **Preferences Affected:** `app.update.url`
358
359 #### Windows (GPO)
360 ```
361 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
362 ```
363 #### Windows (Intune)
364 OMA-URI:
365 ```
366 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
367 ```
368 Value (string):
369 ```
370 <enabled/>
371 <data id="AppUpdateURL" value="https://yoursite.com"/>
372 ```
373 #### macOS
374 ```
375 <dict>
376 <key>AppUpdateURL</key>
377 <string>https://yoursite.com</string>
378 </dict>
379 ```
380 #### policies.json
381 ```
382 {
383 "policies": {
384 "AppUpdateURL": "https://yoursite.com"
385 }
386 }
387 ```
388 ### Authentication
389
390 Configure sites that support integrated authentication.
391
392 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
393
394 `PrivateBrowsing` enables integrated authentication in private browsing.
395
396 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
397 **CCK2 Equivalent:** N/A\
398 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
403 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
404 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
405 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
406 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
407 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
408 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
409 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
410 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
411 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
412 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
413 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
414 ```
415 #### Windows (Intune)
416 OMA-URI:
417 ```
418 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
419 ```
420 Value (string):
421 ```
422 <enabled/>
423 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
424 ```
425 OMA-URI:
426 ```
427 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
428 ```
429 Value (string):
430 ```
431 <enabled/>
432 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
433 ```
434 OMA-URI:
435 ```
436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
437 ```
438 Value (string):
439 ```
440 <enabled/>
441 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
442 ```
443 OMA-URI:
444 ```
445 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
446 ```
447 Value (string):
448 ```
449 <enabled/>
450 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
451 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
452 ```
453 OMA-URI:
454 ```
455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
456 ```
457 Value (string):
458 ```
459 <enabled/> or <disabled/>
460 ```
461 OMA-URI:
462 ```
463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
464 ```
465 Value (string):
466 ```
467 <enabled/> or <disabled/>
468 ```
469 #### macOS
470 ```
471 <dict>
472 <key>Authentication</key>
473 <dict>
474 <key>SPNEGO</key>
475 <array>
476 <string>mydomain.com</string>
477 <string>https://myotherdomain.com</string>
478 </array>
479 <key>Delegated</key>
480 <array>
481 <string>mydomain.com</string>
482 <string>https://myotherdomain.com</string>
483 </array>
484 <key>NTLM</key>
485 <array>
486 <string>mydomain.com</string>
487 <string>https://myotherdomain.com</string>
488 </array>
489 <key>AllowNonFQDN</key>
490 <dict>
491 <key>SPNEGO</key>
492 <true/> | <false/>
493 <key>NTLM</key>
494 <true/> | <false/>
495 </dict>
496 <key>AllowProxies</key>
497 <dict>
498 <key>SPNEGO</key>
499 <true/> | <false/>
500 <key>NTLM</key>
501 <true/> | <false/>
502 </dict>
503 <key>Locked</key>
504 <true/> | <false/>
505 <key>PrivateBrowsing</key>
506 <true/> | <false/>
507 </dict>
508 </dict>
509 ```
510 #### policies.json
511 ```
512 {
513 "policies": {
514 "Authentication": {
515 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
516 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
517 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
518 "AllowNonFQDN": {
519 "SPNEGO": true | false,
520 "NTLM": true | false
521 },
522 "AllowProxies": {
523 "SPNEGO": true | false,
524 "NTLM": true | false
525 },
526 "Locked": true | false,
527 "PrivateBrowsing": true | false
528 }
529 }
530 }
531 ```
532 ### AutofillAddressEnabled
533
534 Enables or disables autofill for addresses.
535
536 This only applies when address autofill is enabled for a particular Firefox version or region. See [this page](https://support.mozilla.org/kb/automatically-fill-your-address-web-forms) for more information.
537
538 **Compatibility:** Firefox 125, Firefox ESR 115.10\
539 **CCK2 Equivalent:** N/A\
540 **Preferences Affected:** `extensions.formautofill.addresses.enabled`
541
542 #### Windows (GPO)
543 ```
544 Software\Policies\Mozilla\Firefox\AutofillAddressEnabled = 0x1 | 0x0
545 ```
546 #### Windows (Intune)
547 OMA-URI:
548 ```
549 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutofillAddressEnabled
550 ```
551 Value (string):
552 ```
553 <enabled/> or <disabled/>
554 ```
555 #### macOS
556 ```
557 <dict>
558 <key>AutofillAddressEnabled</key>
559 <true/> | <false/>
560 </dict>
561 ```
562 #### policies.json
563 ```
564 {
565 "policies": {
566 "AutofillAddressEnabled": true | false
567 }
568 }
569 ```
570 ### AutofillCreditCardEnabled
571
572 Enables or disables autofill for payment methods.
573
574 This only applies when payment method autofill is enabled for a particular Firefox version or region. See [this page](https://support.mozilla.org/kb/credit-card-autofill) for more information.
575
576 **Compatibility:** Firefox 125, Firefox ESR 115.10\
577 **CCK2 Equivalent:** N/A\
578 **Preferences Affected:** `extensions.formautofill.creditCards.enabled`
579
580 #### Windows (GPO)
581 ```
582 Software\Policies\Mozilla\Firefox\AutofillCreditCardEnabled = 0x1 | 0x0
583 ```
584 #### Windows (Intune)
585 OMA-URI:
586 ```
587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutofillCreditCardEnabled
588 ```
589 Value (string):
590 ```
591 <enabled/> or <disabled/>
592 ```
593 #### macOS
594 ```
595 <dict>
596 <key>AutofillCreditCardEnabled</key>
597 <true/> | <false/>
598 </dict>
599 ```
600 #### policies.json
601 ```
602 {
603 "policies": {
604 "AutofillCreditCardEnabled": true | false
605 }
606 }
607 ```
608 ### AutoLaunchProtocolsFromOrigins
609 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
610
611 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
612
613 The schema is:
614 ```
615 {
616 "items": {
617 "properties": {
618 "allowed_origins": {
619 "items": {
620 "type": "string"
621 },
622 "type": "array"
623 },
624 "protocol": {
625 "type": "string"
626 }
627 },
628 "required": [
629 "protocol",
630 "allowed_origins"
631 ],
632 "type": "object"
633 },
634 "type": "array"
635 }
636 ```
637 **Compatibility:** Firefox 90, Firefox ESR 78.12\
638 **CCK2 Equivalent:** N/A\
639 **Preferences Affected:** N/A
640
641 #### Windows (GPO)
642 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
643 ```
644 [
645 {
646 "protocol": "zoommtg",
647 "allowed_origins": [
648 "https://somesite.zoom.us"
649 ]
650 }
651 ]
652 ```
653 #### Windows (Intune)
654 OMA-URI:
655 ```
656 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
657 ```
658 Value (string):
659 ```
660 <enabled/>
661 <data id="JSON" value='
662 [
663 {
664 "protocol": "zoommtg",
665 "allowed_origins": [
666 "https://somesite.zoom.us"
667 ]
668 }
669 ]'/>
670 ```
671 #### macOS
672 ```
673 <dict>
674 <key>AutoLaunchProtocolsFromOrigins</key>
675 <array>
676 <dict>
677 <key>protocol</key>
678 <string>zoommtg</string>
679 <key>allowed_origins</key>
680 <array>
681 <string>https://somesite.zoom.us</string>
682 </array>
683 </dict>
684 </array>
685 </dict>
686 ```
687 #### policies.json
688 ```
689 {
690 "policies": {
691 "AutoLaunchProtocolsFromOrigins": [{
692 "protocol": "zoommtg",
693 "allowed_origins": [
694 "https://somesite.zoom.us"
695 ]
696 }]
697 }
698 }
699 ```
700 ### BackgroundAppUpdate
701
702 Enable or disable **automatic** application update **in the background**, when the application is not running.
703
704 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
705
706 If set to false, the application will not try to install updates when the application is not running.
707
708 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
709
710 If you are having trouble getting the background task to run, verify your configuration with the ["Requirements to run" section in this support document](https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows).
711
712 **Compatibility:** Firefox 90 (Windows only)\
713 **CCK2 Equivalent:** N/A\
714 **Preferences Affected:** `app.update.background.enabled`
715
716 #### Windows (GPO)
717 ```
718 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
719 ```
720 #### Windows (Intune)
721 OMA-URI:
722 ```
723 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
724 ```
725 Value (string):
726 ```
727 <enabled/> or <disabled/>
728 ```
729 #### macOS
730 ```
731 <dict>
732 <key>BackgroundAppUpdate</key>
733 <true/> | <false/>
734 </dict>
735 ```
736 #### policies.json
737 ```
738 {
739 "policies": {
740 "BackgroundAppUpdate": true | false
741 }
742 }
743 ```
744 ### BlockAboutAddons
745
746 Block access to the Add-ons Manager (about:addons).
747
748 **Compatibility:** Firefox 60, Firefox ESR 60\
749 **CCK2 Equivalent:** `disableAddonsManager`\
750 **Preferences Affected:** N/A
751
752 #### Windows (GPO)
753 ```
754 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
755 ```
756 #### Windows (Intune)
757 OMA-URI:
758 ```
759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
760 ```
761 Value (string):
762 ```
763 <enabled/> or <disabled/>
764 ```
765 #### macOS
766 ```
767 <dict>
768 <key>BlockAboutAddons</key>
769 <true/> | <false/>
770 </dict>
771 ```
772 #### policies.json
773 ```
774 {
775 "policies": {
776 "BlockAboutAddons": true | false
777 }
778 }
779 ```
780 ### BlockAboutConfig
781
782 Block access to about:config.
783
784 **Compatibility:** Firefox 60, Firefox ESR 60\
785 **CCK2 Equivalent:** `disableAboutConfig`\
786 **Preferences Affected:** N/A
787
788 #### Windows (GPO)
789 ```
790 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
791 ```
792 #### Windows (Intune)
793 OMA-URI:
794 ```
795 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
796 ```
797 Value (string):
798 ```
799 <enabled/> or <disabled/>
800 ```
801 #### macOS
802 ```
803 <dict>
804 <key>BlockAboutConfig</key>
805 <true/> | <false/>
806 </dict>
807 ```
808 #### policies.json
809 ```
810 {
811 "policies": {
812 "BlockAboutConfig": true | false
813 }
814 }
815 ```
816 ### BlockAboutProfiles
817
818 Block access to About Profiles (about:profiles).
819
820 **Compatibility:** Firefox 60, Firefox ESR 60\
821 **CCK2 Equivalent:** `disableAboutProfiles`\
822 **Preferences Affected:** N/A
823
824 #### Windows (GPO)
825 ```
826 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
827 ```
828 #### Windows (Intune)
829 OMA-URI:
830 ```
831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
832 ```
833 Value (string):
834 ```
835 <enabled/> or <disabled/>
836 ```
837 #### macOS
838 ```
839 <dict>
840 <key>BlockAboutProfiles</key>
841 <true/> | <false/>
842 </dict>
843 ```
844 #### policies.json
845 ```
846 {
847 "policies": {
848 "BlockAboutProfiles": true | false
849 }
850 }
851 ```
852 ### BlockAboutSupport
853
854 Block access to Troubleshooting Information (about:support).
855
856 **Compatibility:** Firefox 60, Firefox ESR 60\
857 **CCK2 Equivalent:** `disableAboutSupport`\
858 **Preferences Affected:** N/A
859
860 #### Windows (GPO)
861 ```
862 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
863 ```
864 #### Windows (Intune)
865 OMA-URI:
866 ```
867 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
868 ```
869 Value (string):
870 ```
871 <enabled/> or <disabled/>
872 ```
873 #### macOS
874 ```
875 <dict>
876 <key>BlockAboutSupport</key>
877 <true/> | <false/>
878 </dict>
879 ```
880 #### policies.json
881 ```
882 {
883 "policies": {
884 "BlockAboutSupport": true | false
885 }
886 }
887 ```
888 ### Bookmarks
889
890 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
891
892 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
893
894 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
895
896 **Compatibility:** Firefox 60, Firefox ESR 60\
897 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
898 **Preferences Affected:** N/A
899
900 #### Windows (GPO)
901 ```
902 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
903 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
904 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
905 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
906 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
907
908 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
909 ```
910 []
911 ```
912
913 ```
914 #### Windows (Intune)
915 OMA-URI:
916 ```
917 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
918 ```
919 Value (string):
920 ```
921 <enabled/>
922 <data id="BookmarkTitle" value="Example"/>
923 <data id="BookmarkURL" value="https://example.com"/>
924 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
925 <data id="BookmarkPlacement" value="toolbar | menu"/>
926 <data id="BookmarkFolder" value="FolderName"/>
927 ```
928 OMA-URI:
929 ```
930 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
931 ```
932 Value (string):
933 ```
934 <enabled/>
935 <data id="JSON" value='[]'/>
936 ```
937 #### macOS
938 ```
939 <dict>
940 <key>Bookmarks</key>
941 <array>
942 <dict>
943 <key>Title</key>
944 <string>Example</string>
945 <key>URL</key>
946 <string>https://example.com</string>
947 <key>Favicon</key>
948 <string>https://example.com/favicon.ico</string>
949 <key>Placement</key>
950 <string>toolbar | menu</string>
951 <key>Folder</key>
952 <string>FolderName</string>
953 </dict>
954 </array>
955 </dict>
956 ```
957 #### policies.json
958 ```
959 {
960 "policies": {
961 "Bookmarks": [
962 {
963 "Title": "Example",
964 "URL": "https://example.com",
965 "Favicon": "https://example.com/favicon.ico",
966 "Placement": "toolbar" | "menu",
967 "Folder": "FolderName"
968 }
969 ]
970 }
971 }
972 ```
973 ### CaptivePortal
974 Enable or disable the detection of captive portals.
975
976 **Compatibility:** Firefox 67, Firefox ESR 60.7\
977 **CCK2 Equivalent:** N/A\
978 **Preferences Affected:** `network.captive-portal-service.enabled`
979
980 #### Windows (GPO)
981 ```
982 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
983 ```
984 #### Windows (Intune)
985 OMA-URI:
986 ```
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
988 ```
989 Value (string):
990 ```
991 <enabled/> or <disabled/>
992 ```
993 #### macOS
994 ```
995 <dict>
996 <key>CaptivePortal</key>
997 <true/> | <false/>
998 </dict>
999 ```
1000 #### policies.json
1001 ```
1002 {
1003 "policies": {
1004 "CaptivePortal": true | false
1005 }
1006 }
1007 ```
1008 ### Certificates
1009
1010 ### Certificates | ImportEnterpriseRoots
1011
1012 Trust certificates that have been added to the operating system certificate store by a user or administrator.
1013
1014 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
1015
1016 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
1017
1018 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
1019 **CCK2 Equivalent:** N/A\
1020 **Preferences Affected:** `security.enterprise_roots.enabled`
1021
1022 #### Windows (GPO)
1023 ```
1024 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
1025 ```
1026 #### Windows (Intune)
1027 OMA-URI:
1028 ```
1029 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
1030 ```
1031 Value (string):
1032 ```
1033 <enabled/> or <disabled/>
1034 ```
1035 #### macOS
1036 ```
1037 <dict>
1038 <key>Certificates</key>
1039 <dict>
1040 <key>ImportEnterpriseRoots</key>
1041 <true/> | <false/>
1042 </dict>
1043 </dict>
1044 ```
1045 #### policies.json
1046 ```
1047 {
1048 "policies": {
1049 "Certificates": {
1050 "ImportEnterpriseRoots": true | false
1051 }
1052 }
1053 }
1054 ```
1055 ### Certificates | Install
1056
1057 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
1058
1059 - Windows
1060 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
1061 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
1062 - macOS
1063 - /Library/Application Support/Mozilla/Certificates
1064 - ~/Library/Application Support/Mozilla/Certificates
1065 - Linux
1066 - /usr/lib/mozilla/certificates
1067 - /usr/lib64/mozilla/certificates
1068 - ~/.mozilla/certificates
1069
1070 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
1071
1072 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
1073
1074 Certificates are installed using the trust string `CT,CT,`.
1075
1076 Binary (DER) and ASCII (PEM) certificates are both supported.
1077
1078 **Compatibility:** Firefox 64, Firefox ESR 64\
1079 **CCK2 Equivalent:** `certs.ca`\
1080 **Preferences Affected:** N/A
1081
1082 #### Windows (GPO)
1083 ```
1084 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
1085 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
1086 ```
1087 #### Windows (Intune)
1088 OMA-URI:
1089 ```
1090 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
1091 ```
1092 Value (string):
1093 ```
1094 <enabled/>
1095 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
1096 ```
1097 #### macOS
1098 ```
1099 <dict>
1100 <key>Certificates</key>
1101 <dict>
1102 <key>Install</key>
1103 <array>
1104 <string>cert1.der</string>
1105 <string>/Users/username/cert2.pem</string>
1106 </array>
1107 </dict>
1108 </dict>
1109 ```
1110 #### policies.json
1111 ```
1112 {
1113 "policies": {
1114 "Certificates": {
1115 "Install": ["cert1.der", "/home/username/cert2.pem"]
1116 }
1117 }
1118 }
1119 ```
1120 ### Containers
1121 Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
1122
1123 Currently you can set the initial set of containers.
1124
1125 For each container, you can specify the name, icon, and color.
1126
1127 | Name | Description |
1128 | --- | --- |
1129 | `name`| Name of container
1130 | `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence`
1131 | `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar`
1132
1133 **Compatibility:** Firefox 113\
1134 **CCK2 Equivalent:** N/A\
1135 **Preferences Affected:** N/A
1136
1137 #### Windows (GPO)
1138 Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) =
1139 ```
1140 {
1141 "Default": [
1142 {
1143 "name": "My container",
1144 "icon": "pet",
1145 "color": "turquoise"
1146 }
1147 ]
1148 }
1149 ```
1150 #### Windows (Intune)
1151 OMA-URI:
1152 ```
1153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers
1154 ```
1155 Value (string):
1156 ```
1157 <enabled/>
1158 <data id="JSON" value='
1159 {
1160 "Default": [
1161 {
1162 "name": "My container",
1163 "icon": "pet",
1164 "color": "turquoise"
1165 }
1166 ]
1167 }
1168 '/>
1169 ```
1170 #### macOS
1171 ```
1172 <dict>
1173 <key>Default</key>
1174 <dict>
1175 <key>Containers</key>
1176 <array>
1177 <dict>
1178 <key>name</key>
1179 <string>My container</string>
1180 <key>icon</key>
1181 <string>pet</string>
1182 <key>color</key>
1183 <string>turquoise</string>
1184 </dict>
1185 </array>
1186 </dict>
1187 </dict>
1188 ```
1189 #### policies.json
1190 ```
1191 {
1192 "policies": {
1193 "Containers": {
1194 "Default": [
1195 {
1196 "name": "My container",
1197 "icon": "pet",
1198 "color": "turquoise"
1199 }
1200 ]
1201 }
1202 }
1203 }
1204 ```
1205 ### Cookies
1206 Configure cookie preferences.
1207
1208 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
1209
1210 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
1211
1212 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
1213
1214 `Behavior` sets the default behavior for cookies based on the values below.
1215
1216 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
1217
1218 | Value | Description
1219 | --- | --- |
1220 | accept | Accept all cookies
1221 | reject-foreign | Reject third party cookies
1222 | reject | Reject all cookies
1223 | limit-foreign | Reject third party cookies for sites you haven't visited
1224 | reject-tracker | Reject cookies for known trackers (default)
1225 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
1226
1227 `Locked` prevents the user from changing cookie preferences.
1228
1229 `Default` determines whether cookies are accepted at all. (*Deprecated*. Use `Behavior` instead)
1230
1231 `AcceptThirdParty` determines how third-party cookies are handled. (*Deprecated*. Use `Behavior` instead)
1232
1233 `RejectTracker` only rejects cookies for trackers. (*Deprecated*. Use `Behavior` instead)
1234
1235 `ExpireAtSessionEnd` determines when cookies expire. (*Deprecated*. Use [`SanitizeOnShutdown`](#sanitizeonshutdown-selective) instead)
1236
1237 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
1238 **CCK2 Equivalent:** N/A\
1239 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
1240
1241 #### Windows (GPO)
1242 ```
1243 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
1244 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
1245 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
1246 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1247 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1248 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1249 ```
1250 #### Windows (Intune)
1251 OMA-URI:
1252 ```
1253 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
1254 ```
1255 Value (string):
1256 ```
1257 <enabled/>
1258 <data id="Permissions" value="1&#xF000;https://example.com"/>
1259 ```
1260 OMA-URI:
1261 ```
1262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1263 ```
1264 Value (string):
1265 ```
1266 <enabled/>
1267 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1268 ```
1269 OMA-URI:
1270 ```
1271 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1272 ```
1273 Value (string):
1274 ```
1275 <enabled/>
1276 <data id="Permissions" value="1&#xF000;https://example.org"/>
1277 ```
1278 OMA-URI:
1279 ```
1280 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1281 ```
1282 Value (string):
1283 ```
1284 <enabled/> or <disabled/>
1285 ```
1286 OMA-URI:
1287 ```
1288 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1289 ```
1290 Value (string):
1291 ```
1292 <enabled/>
1293 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1294 ```
1295 OMA-URI:
1296 ```
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1298 ```
1299 Value (string):
1300 ```
1301 <enabled/>
1302 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>Cookies</key>
1308 <dict>
1309 <key>Allow</key>
1310 <array>
1311 <string>http://example.com</string>
1312 </array>
1313 <key>AllowSession</key>
1314 <array>
1315 <string>http://example.edu</string>
1316 </array>
1317 <key>Block</key>
1318 <array>
1319 <string>http://example.org</string>
1320 </array>
1321 <key>Locked</key>
1322 <true/> | <false/>
1323 <key>Behavior</key>
1324 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1325 <key>BehaviorPrivateBrowsing</key>
1326 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1327 </dict>
1328 </dict>
1329 ```
1330 #### policies.json
1331 ```
1332 {
1333 "policies": {
1334 "Cookies": {
1335 "Allow": ["http://example.org/"],
1336 "AllowSession": ["http://example.edu/"],
1337 "Block": ["http://example.edu/"],
1338 "Locked": true | false,
1339 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1340 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1341 }
1342 }
1343 }
1344 ```
1345 ### DefaultDownloadDirectory
1346 Set the default download directory.
1347
1348 You can use ${home} for the native home directory.
1349
1350 **Compatibility:** Firefox 68, Firefox ESR 68\
1351 **CCK2 Equivalent:** N/A\
1352 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1353
1354 #### Windows (GPO)
1355 ```
1356 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1357 ```
1358 #### Windows (Intune)
1359 OMA-URI:
1360 ```
1361 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1362 ```
1363 Value (string):
1364 ```
1365 <enabled/>
1366 <data id="Preferences_String" value="${home}\Downloads"/>
1367 ```
1368 #### macOS
1369 ```
1370 <dict>
1371 <key>DefaultDownloadDirectory</key>
1372 <string>${home}/Downloads</string>
1373 </dict>
1374 ```
1375 #### policies.json (macOS and Linux)
1376 ```
1377 {
1378 "policies": {
1379 "DefaultDownloadDirectory": "${home}/Downloads"
1380 }
1381 }
1382 ```
1383 #### policies.json (Windows)
1384 ```
1385 {
1386 "policies": {
1387 "DefaultDownloadDirectory": "${home}\\Downloads"
1388 }
1389 }
1390 ```
1391 ### DisableAppUpdate
1392 Turn off application updates within Firefox.
1393
1394 **Compatibility:** Firefox 60, Firefox ESR 60\
1395 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1396 **Preferences Affected:** N/A
1397
1398 #### Windows (GPO)
1399 ```
1400 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1401 ```
1402 #### Windows (Intune)
1403 OMA-URI:
1404 ```
1405 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1406 ```
1407 Value (string):
1408 ```
1409 <enabled/> or <disabled/>
1410 ```
1411 #### macOS
1412 ```
1413 <dict>
1414 <key>DisableAppUpdate</key>
1415 <true/> | <false/>
1416 </dict>
1417 ```
1418 #### policies.json
1419 ```
1420 {
1421 "policies": {
1422 "DisableAppUpdate": true | false
1423 }
1424 }
1425 ```
1426 ### DisableBuiltinPDFViewer
1427 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1428
1429 **Compatibility:** Firefox 60, Firefox ESR 60\
1430 **CCK2 Equivalent:** `disablePDFjs`\
1431 **Preferences Affected:** `pdfjs.disabled`
1432
1433 #### Windows (GPO)
1434 ```
1435 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1436 ```
1437 #### Windows (Intune)
1438 OMA-URI:
1439 ```
1440 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1441 ```
1442 Value (string):
1443 ```
1444 <enabled/> or <disabled/>
1445 ```
1446 #### macOS
1447 ```
1448 <dict>
1449 <key>DisableBuiltinPDFViewer</key>
1450 <true/> | <false/>
1451 </dict>
1452 ```
1453 #### policies.json
1454 ```
1455 {
1456 "policies": {
1457 "DisableBuiltinPDFViewer": true | false
1458 }
1459 }
1460 ```
1461 ### DisabledCiphers
1462 Disable specific cryptographic ciphers, listed below.
1463
1464 ```
1465 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1466 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1467 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1468 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1469 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1470 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1471 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1472 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1473 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1474 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1475 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1476 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1477 TLS_RSA_WITH_AES_128_GCM_SHA256
1478 TLS_RSA_WITH_AES_256_GCM_SHA384
1479 TLS_RSA_WITH_AES_128_CBC_SHA
1480 TLS_RSA_WITH_AES_256_CBC_SHA
1481 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1482 ```
1483
1484 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1485
1486 ---
1487 **Note:**
1488
1489 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1490
1491 ---
1492 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1493 **CCK2 Equivalent:** N/A\
1494 **Preferences Affected:** N/A
1495
1496 #### Windows (GPO)
1497 ```
1498 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1499 ```
1500 #### Windows (Intune)
1501 OMA-URI:
1502 ```
1503 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1504
1505 ```
1506 Value (string):
1507 ```
1508 <enabled/> or <disabled/>
1509 ```
1510 #### macOS
1511 ```
1512 <dict>
1513 <key>DisabledCiphers</key>
1514 <dict>
1515 <key>CIPHER_NAME</key>
1516 <true/> | <false/>
1517 </dict>
1518 </dict>
1519 ```
1520 #### policies.json
1521 ```
1522 {
1523 "policies": {
1524 "DisabledCiphers": {
1525 "CIPHER_NAME": true | false,
1526 }
1527 }
1528 }
1529 ```
1530 ### DisableDefaultBrowserAgent
1531 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1532
1533 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1534
1535 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1536 **CCK2 Equivalent:** N/A\
1537 **Preferences Affected:** N/A
1538
1539 #### Windows (GPO)
1540 ```
1541 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1542 ```
1543 #### Windows (Intune)
1544 OMA-URI:
1545 ```
1546 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1547 ```
1548 Value (string):
1549 ```
1550 <enabled/> or <disabled/>
1551 ```
1552 #### policies.json
1553 ```
1554 {
1555 "policies": {
1556 "DisableDefaultBrowserAgent": true | false
1557 }
1558 }
1559 ```
1560 ### DisableDeveloperTools
1561 Remove access to all developer tools.
1562
1563 **Compatibility:** Firefox 60, Firefox ESR 60\
1564 **CCK2 Equivalent:** `removeDeveloperTools`\
1565 **Preferences Affected:** `devtools.policy.disabled`
1566
1567 #### Windows (GPO)
1568 ```
1569 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1570 ```
1571 #### Windows (Intune)
1572 OMA-URI:
1573 ```
1574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1575 ```
1576 Value (string):
1577 ```
1578 <enabled/> or <disabled/>
1579 ```
1580 #### macOS
1581 ```
1582 <dict>
1583 <key>DisableDeveloperTools</key>
1584 <true/> | <false/>
1585 </dict>
1586 ```
1587 #### policies.json
1588 ```
1589 {
1590 "policies": {
1591 "DisableDeveloperTools": true | false
1592 }
1593 }
1594 ```
1595 ### DisableFeedbackCommands
1596 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1597
1598 **Compatibility:** Firefox 60, Firefox ESR 60\
1599 **CCK2 Equivalent:** N/A\
1600 **Preferences Affected:** N/A
1601
1602 #### Windows (GPO)
1603 ```
1604 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1605 ```
1606 #### Windows (Intune)
1607 OMA-URI:
1608 ```
1609 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1610 ```
1611 Value (string):
1612 ```
1613 <enabled/> or <disabled/>
1614 ```
1615 #### macOS
1616 ```
1617 <dict>
1618 <key>DisableFeedbackCommands</key>
1619 <true/> | <false/>
1620 </dict>
1621 ```
1622 #### policies.json
1623 ```
1624 {
1625 "policies": {
1626 "DisableFeedbackCommands": true | false
1627 }
1628 }
1629 ```
1630 ### DisableEncryptedClientHello
1631 Disable the TLS Feature for Encrypted Client Hello. Note that TLS Client Hellos will still contain an ECH extension, but this extension will not be used by Firefox during the TLS handshake.
1632
1633 **Compatibility:** Firefox 127, Firefox ESR 128\
1634 **CCK2 Equivalent:** N/A\
1635 **Preferences Affected:** `network.dns.echconfig.enabled`, `network.dns.http3_echconfig.enabled`
1636
1637 #### Windows (GPO)
1638 ```
1639 Software\Policies\Mozilla\Firefox\DisableEncryptedClientHello = 0x1 | 0x0
1640 ```
1641 #### Windows (Intune)
1642 OMA-URI:
1643 ```
1644 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableEncryptedClientHello
1645 ```
1646 Value (string):
1647 ```
1648 <enabled/> or <disabled/>
1649 ```
1650 #### macOS
1651 ```
1652 <dict>
1653 <key>DisableEncryptedClientHello</key>
1654 <true/> | <false/>
1655 </dict>
1656 ```
1657 #### policies.json
1658 ```
1659 {
1660 "policies": {
1661 "DisableEncryptedClientHello": true | false
1662 }
1663 }
1664 ```
1665 ### DisableFirefoxAccounts
1666 Disable Firefox Accounts integration (Sync).
1667
1668 **Compatibility:** Firefox 60, Firefox ESR 60\
1669 **CCK2 Equivalent:** `disableSync`\
1670 **Preferences Affected:** `identity.fxaccounts.enabled`
1671
1672 #### Windows (GPO)
1673 ```
1674 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1675 ```
1676 #### Windows (Intune)
1677 OMA-URI:
1678 ```
1679 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1680 ```
1681 Value (string):
1682 ```
1683 <enabled/> or <disabled/>
1684 ```
1685 #### macOS
1686 ```
1687 <dict>
1688 <key>DisableFirefoxAccounts</key>
1689 <true/> | <false/>
1690 </dict>
1691 ```
1692 #### policies.json
1693 ```
1694 {
1695 "policies": {
1696 "DisableFirefoxAccounts": true | false
1697 }
1698 }
1699 ```
1700 ### DisableFirefoxScreenshots
1701 Remove access to Firefox Screenshots.
1702
1703 **Compatibility:** Firefox 60, Firefox ESR 60\
1704 **CCK2 Equivalent:** N/A\
1705 **Preferences Affected:** `extensions.screenshots.disabled`
1706
1707 #### Windows (GPO)
1708 ```
1709 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1710 ```
1711 #### Windows (Intune)
1712 OMA-URI:
1713 ```
1714 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1715 ```
1716 Value (string):
1717 ```
1718 <enabled/> or <disabled/>
1719 ```
1720 #### macOS
1721 ```
1722 <dict>
1723 <key>DisableFirefoxScreenshots</key>
1724 <true/> | <false/>
1725 </dict>
1726 ```
1727 #### policies.json
1728 ```
1729 {
1730 "policies": {
1731 "DisableFirefoxScreenshots": true | false
1732 }
1733 }
1734 ```
1735 ### DisableFirefoxStudies
1736 Disable Firefox studies (Shield).
1737
1738 **Compatibility:** Firefox 60, Firefox ESR 60\
1739 **CCK2 Equivalent:** N/A\
1740 **Preferences Affected:** `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
1741
1742 #### Windows (GPO)
1743 ```
1744 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1745 ```
1746 #### Windows (Intune)
1747 OMA-URI:
1748 ```
1749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1750 ```
1751 Value (string):
1752 ```
1753 <enabled/> or <disabled/>
1754 ```
1755 #### macOS
1756 ```
1757 <dict>
1758 <key>DisableFirefoxStudies</key>
1759 <true/> | <false/>
1760 </dict>
1761 ```
1762 #### policies.json
1763 ```
1764 {
1765 "policies": {
1766 "DisableFirefoxStudies": true | false
1767 }
1768 }
1769 ```
1770 ### DisableForgetButton
1771 Disable the "Forget" button.
1772
1773 **Compatibility:** Firefox 60, Firefox ESR 60\
1774 **CCK2 Equivalent:** `disableForget`\
1775 **Preferences Affected:** N/A
1776
1777 #### Windows (GPO)
1778 ```
1779 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1780 ```
1781 #### Windows (Intune)
1782 OMA-URI:
1783 ```
1784 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1785 ```
1786 Value (string):
1787 ```
1788 <enabled/> or <disabled/>
1789 ```
1790 #### macOS
1791 ```
1792 <dict>
1793 <key>DisableForgetButton</key>
1794 <true/> | <false/>
1795 </dict>
1796 ```
1797 #### policies.json
1798 ```
1799 {
1800 "policies": {
1801 "DisableForgetButton": true | false
1802 }
1803 }
1804 ```
1805 ### DisableFormHistory
1806 Turn off saving information on web forms and the search bar.
1807
1808 **Compatibility:** Firefox 60, Firefox ESR 60\
1809 **CCK2 Equivalent:** `disableFormFill`\
1810 **Preferences Affected:** `browser.formfill.enable`
1811
1812 #### Windows (GPO)
1813 ```
1814 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1815 ```
1816 #### Windows (Intune)
1817 OMA-URI:
1818 ```
1819 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1820 ```
1821 Value (string):
1822 ```
1823 <enabled/> or <disabled/>
1824 ```
1825 #### macOS
1826 ```
1827 <dict>
1828 <key>DisableFormHistory</key>
1829 <true/> | <false/>
1830 </dict>
1831 ```
1832 #### policies.json
1833 ```
1834 {
1835 "policies": {
1836 "DisableFormHistory": true | false
1837 }
1838 }
1839 ```
1840 ### DisableMasterPasswordCreation
1841 Remove the master password functionality.
1842
1843 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1844
1845 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1846
1847 **Compatibility:** Firefox 60, Firefox ESR 60\
1848 **CCK2 Equivalent:** `noMasterPassword`\
1849 **Preferences Affected:** N/A
1850
1851 #### Windows (GPO)
1852 ```
1853 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1854 ```
1855 #### Windows (Intune)
1856 OMA-URI:
1857 ```
1858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1859 ```
1860 Value (string):
1861 ```
1862 <enabled/> or <disabled/>
1863 ```
1864 #### macOS
1865 ```
1866 <dict>
1867 <key>DisableMasterPasswordCreation</key>
1868 <true/> | <false/>
1869 </dict>
1870 ```
1871 #### policies.json
1872 ```
1873 {
1874 "policies": {
1875 "DisableMasterPasswordCreation": true | false
1876 }
1877 }
1878 ```
1879 ### DisablePasswordReveal
1880 Do not allow passwords to be shown in saved logins
1881
1882 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1883 **CCK2 Equivalent:** N/A
1884 **Preferences Affected:** N/A
1885
1886 #### Windows (GPO)
1887 ```
1888 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1889 ```
1890 #### Windows (Intune)
1891 OMA-URI:
1892 ```
1893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1894 ```
1895 Value (string):
1896 ```
1897 <enabled/> or <disabled/>
1898 ```
1899 #### macOS
1900 ```
1901 <dict>
1902 <key>DisablePasswordReveal</key>
1903 <true/> | <false/>
1904 </dict>
1905 ```
1906 #### policies.json
1907 ```
1908 {
1909 "policies": {
1910 "DisablePasswordReveal": true | false
1911 }
1912 }
1913 ```
1914 ### DisablePocket
1915 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1916
1917 **Compatibility:** Firefox 60, Firefox ESR 60\
1918 **CCK2 Equivalent:** `disablePocket`\
1919 **Preferences Affected:** `extensions.pocket.enabled`
1920
1921 #### Windows (GPO)
1922 ```
1923 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1924 ```
1925 #### Windows (Intune)
1926 OMA-URI:
1927 ```
1928 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1929 ```
1930 Value (string):
1931 ```
1932 <enabled/> or <disabled/>
1933 ```
1934 #### macOS
1935 ```
1936 <dict>
1937 <key>DisablePocket</key>
1938 <true/> | <false/>
1939 </dict>
1940 ```
1941 #### policies.json
1942 ```
1943 {
1944 "policies": {
1945 "DisablePocket": true | false
1946 }
1947 }
1948 ```
1949 ### DisablePrivateBrowsing
1950 Remove access to private browsing.
1951
1952 **Compatibility:** Firefox 60, Firefox ESR 60\
1953 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1954 **Preferences Affected:** N/A
1955
1956 #### Windows (GPO)
1957 ```
1958 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1959 ```
1960 #### Windows (Intune)
1961 OMA-URI:
1962 ```
1963 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1964 ```
1965 Value (string):
1966 ```
1967 <enabled/> or <disabled/>
1968 ```
1969 #### macOS
1970 ```
1971 <dict>
1972 <key>DisablePrivateBrowsing</key>
1973 <true/> | <false/>
1974 </dict>
1975 ```
1976 #### policies.json
1977 ```
1978 {
1979 "policies": {
1980 "DisablePrivateBrowsing": true | false
1981 }
1982 }
1983 ```
1984 ### DisableProfileImport
1985 Disables the "Import data from another browser" option in the bookmarks window.
1986
1987 **Compatibility:** Firefox 60, Firefox ESR 60\
1988 **CCK2 Equivalent:** N/A\
1989 **Preferences Affected:** N/A
1990
1991 #### Windows (GPO)
1992 ```
1993 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1994 ```
1995 #### Windows (Intune)
1996 OMA-URI:
1997 ```
1998 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1999 ```
2000 Value (string):
2001 ```
2002 <enabled/> or <disabled/>
2003 ```
2004 #### macOS
2005 ```
2006 <dict>
2007 <key>DisableProfileImport</key>
2008 <true/> | <false/>
2009 </dict>
2010 ```
2011 #### policies.json
2012 ```
2013 {
2014 "policies": {
2015 "DisableProfileImport": true | false
2016 }
2017 }
2018 ```
2019 ### DisableProfileRefresh
2020 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
2021
2022 **Compatibility:** Firefox 60, Firefox ESR 60\
2023 **CCK2 Equivalent:** `disableResetFirefox`\
2024 **Preferences Affected:** `browser.disableResetPrompt`
2025
2026 #### Windows (GPO)
2027 ```
2028 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
2029 ```
2030 #### Windows (Intune)
2031 OMA-URI:
2032 ```
2033 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
2034 ```
2035 Value (string):
2036 ```
2037 <enabled/> or <disabled/>
2038 ```
2039 #### macOS
2040 ```
2041 <dict>
2042 <key>DisableProfileRefresh</key>
2043 <true/> | <false/>
2044 </dict>
2045 ```
2046 #### policies.json
2047 ```
2048 {
2049 "policies": {
2050 "DisableProfileRefresh": true | false
2051 }
2052 }
2053 ```
2054 ### DisableSafeMode
2055 Disable safe mode within the browser.
2056
2057 On Windows, this disables safe mode via the command line as well.
2058
2059 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
2060 **CCK2 Equivalent:** `disableSafeMode`\
2061 **Preferences Affected:** N/A
2062
2063 #### Windows (GPO)
2064 ```
2065 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
2066 ```
2067 #### Windows (Intune)
2068 OMA-URI:
2069 ```
2070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
2071 ```
2072 Value (string):
2073 ```
2074 <enabled/> or <disabled/>
2075 ```
2076 #### macOS
2077 ```
2078 <dict>
2079 <key>DisableSafeMode</key>
2080 <true/> | <false/>
2081 </dict>
2082 ```
2083 #### policies.json
2084 ```
2085 {
2086 "policies": {
2087 "DisableSafeMode": true | false
2088 }
2089 }
2090 ```
2091 ### DisableSecurityBypass
2092 Prevent the user from bypassing security in certain cases.
2093
2094 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
2095
2096 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
2097
2098 These policies only affect what happens when an error is shown, they do not affect any settings in preferences.
2099
2100 **Compatibility:** Firefox 60, Firefox ESR 60\
2101 **CCK2 Equivalent:** N/A\
2102 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
2103
2104 #### Windows (GPO)
2105 ```
2106 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
2107 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
2108 ```
2109 #### Windows (Intune)
2110 OMA-URI:
2111 ```
2112 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
2113 ```
2114 Value (string):
2115 ```
2116 <enabled/> or <disabled/>
2117 ```
2118 OMA-URI:
2119 ```
2120 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
2121 ```
2122 Value (string):
2123 ```
2124 <enabled/> or <disabled/>
2125 ```
2126
2127 #### macOS
2128 ```
2129 <dict>
2130 <key>DisableSecurityBypass</key>
2131 <dict>
2132 <key>InvalidCertificate</key>
2133 <true/> | <false/>
2134 <key>SafeBrowsing</key>
2135 <true/> | <false/>
2136 </dict>
2137 </dict>
2138 ```
2139 #### policies.json
2140 ```
2141 {
2142 "policies": {
2143 "DisableSecurityBypass": {
2144 "InvalidCertificate": true | false,
2145 "SafeBrowsing": true | false
2146 }
2147 }
2148 }
2149 ```
2150 ### DisableSetDesktopBackground
2151 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
2152
2153 **Compatibility:** Firefox 60, Firefox ESR 60\
2154 **CCK2 Equivalent:** `removeSetDesktopBackground`\
2155 **Preferences Affected:** N/A
2156
2157 #### Windows (GPO)
2158 ```
2159 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
2160 ```
2161 #### Windows (Intune)
2162 OMA-URI:
2163 ```
2164 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
2165 ```
2166 Value (string):
2167 ```
2168 <enabled/> or <disabled/>
2169 ```
2170 #### macOS
2171 ```
2172 <dict>
2173 <key>DisableSetDesktopBackground</key>
2174 <true/> | <false/>
2175 </dict>
2176 ```
2177 #### policies.json
2178 ```
2179 {
2180 "policies": {
2181 "DisableSetDesktopBackground": true | false
2182 }
2183 }
2184 ```
2185 ### DisableSystemAddonUpdate
2186 Prevent system add-ons from being installed or updated.
2187
2188 **Compatibility:** Firefox 60, Firefox ESR 60\
2189 **CCK2 Equivalent:** N/A\
2190 **Preferences Affected:** N/A
2191
2192 #### Windows (GPO)
2193 ```
2194 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
2195 ```
2196 #### Windows (Intune)
2197 OMA-URI:
2198 ```
2199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
2200 ```
2201 Value (string):
2202 ```
2203 <enabled/> or <disabled/>
2204 ```
2205 #### macOS
2206 ```
2207 <dict>
2208 <key>DisableSystemAddonUpdate</key>
2209 <true/> | <false/>
2210 </dict>
2211 ```
2212 #### policies.json
2213 ```
2214 {
2215 "policies": {
2216 "DisableSystemAddonUpdate": true | false
2217 }
2218 }
2219 ```
2220 ### DisableTelemetry
2221 Prevent the upload of telemetry data.
2222
2223 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
2224
2225 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
2226
2227 **Compatibility:** Firefox 60, Firefox ESR 60\
2228 **CCK2 Equivalent:** `disableTelemetry`\
2229 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
2230
2231 #### Windows (GPO)
2232 ```
2233 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
2234 ```
2235 #### Windows (Intune)
2236 OMA-URI:
2237 ```
2238 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
2239 ```
2240 Value (string):
2241 ```
2242 <enabled/> or <disabled/>
2243 ```
2244 #### macOS
2245 ```
2246 <dict>
2247 <key>DisableTelemetry</key>
2248 <true/> | <false/>
2249 </dict>
2250 ```
2251 #### policies.json
2252 ```
2253 {
2254 "policies": {
2255 "DisableTelemetry": true | false
2256 }
2257 }
2258 ```
2259 ### DisableThirdPartyModuleBlocking
2260 Do not allow blocking third-party modules from the `about:third-party` page.
2261
2262 This policy only works on Windows through GPO (not policies.json).
2263
2264 **Compatibility:** Firefox 110 (Windows only, GPO only)\
2265 **CCK2 Equivalent:** N/A\
2266 **Preferences Affected:** N/A
2267
2268 #### Windows (GPO)
2269 ```
2270 Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0
2271 ```
2272 #### Windows (Intune)
2273 OMA-URI:
2274 ```
2275 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking
2276 ```
2277 Value (string):
2278 ```
2279 <enabled/> or <disabled/>
2280 ```
2281 ### DisplayBookmarksToolbar
2282 Set the initial state of the bookmarks toolbar. A user can still change how it is displayed.
2283
2284 `always` means the bookmarks toolbar is always shown.
2285
2286 `never` means the bookmarks toolbar is not shown.
2287
2288 `newtab` means the bookmarks toolbar is only shown on the new tab page.
2289
2290 **Compatibility:** Firefox 109, Firefox ESR 102.7\
2291 **CCK2 Equivalent:** N/A\
2292 **Preferences Affected:** N/A
2293
2294 #### Windows (GPO)
2295 ```
2296 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab"
2297 ```
2298 #### Windows (Intune)
2299 OMA-URI:
2300 ```
2301 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum
2302 ```
2303 Value (string):
2304 ```
2305 <enabled/>
2306 <data id="DisplayBookmarksToolbar" value="always | never | newtab"/>
2307 ```
2308 #### macOS
2309 ```
2310 <dict>
2311 <key>DisplayBookmarksToolbar</key>
2312 <string>always | never | newtab</string>
2313 </dict>
2314 ```
2315 #### policies.json
2316 ```
2317 {
2318 "policies": {
2319 "DisplayBookmarksToolbar": "always" | "never" | "newtab"
2320 }
2321 }
2322 ```
2323 ### DisplayMenuBar
2324 Set the state of the menubar.
2325
2326 `always` means the menubar is shown and cannot be hidden.
2327
2328 `never` means the menubar is hidden and cannot be shown.
2329
2330 `default-on` means the menubar is on by default but can be hidden.
2331
2332 `default-off` means the menubar is off by default but can be shown.
2333
2334 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2335 **CCK2 Equivalent:** `displayMenuBar`\
2336 **Preferences Affected:** N/A
2337
2338 #### Windows (GPO)
2339 ```
2340 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2341 ```
2342 #### Windows (Intune)
2343 OMA-URI:
2344 ```
2345 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2346 ```
2347 Value (string):
2348 ```
2349 <enabled/>
2350 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2351 ```
2352 #### macOS
2353 ```
2354 <dict>
2355 <key>DisplayMenuBar</key>
2356 <string>always | never | default-on | default-off</string>
2357 </dict>
2358 ```
2359 #### policies.json
2360 ```
2361 {
2362 "policies": {
2363 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2364 }
2365 }
2366 ```
2367 ### DNSOverHTTPS
2368 Configure DNS over HTTPS.
2369
2370 `Enabled` determines whether DNS over HTTPS is enabled
2371
2372 `ProviderURL` is a URL to another provider.
2373
2374 `Locked` prevents the user from changing DNS over HTTPS preferences.
2375
2376 `ExcludedDomains` excludes domains from DNS over HTTPS.
2377
2378 `Fallback` determines whether or not Firefox will use your default DNS resolver if there is a problem with the secure DNS provider.
2379
2380 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7) (Fallback added in 124)\
2381 **CCK2 Equivalent:** N/A\
2382 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2383
2384 #### Windows (GPO)
2385 ```
2386 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2387 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2388 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2389 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2390 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Fallback = 0x1 | 0x0
2391 ```
2392 #### Windows (Intune)
2393 OMA-URI:
2394 ```
2395 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2396 ```
2397 Value (string):
2398 ```
2399 <enabled/> or <disabled/>
2400 ```
2401 OMA-URI:
2402 ```
2403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2404 ```
2405 Value (string):
2406 ```
2407 <enabled/>
2408 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2409 ```
2410 OMA-URI:
2411 ```
2412 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2413 ```
2414 Value (string):
2415 ```
2416 <enabled/> or <disabled/>
2417 ```
2418 OMA-URI:
2419 ```
2420 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2421 ```
2422 Value (string):
2423 ```
2424 <enabled/>
2425 <data id="List" value="1&#xF000;example.com"/>
2426 ```
2427 OMA-URI:
2428 ```
2429 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Fallback
2430 ```
2431 Value (string):
2432 ```
2433 <enabled/> or <disabled/>
2434 ```
2435 #### macOS
2436 ```
2437 <dict>
2438 <key>DNSOverHTTPS</key>
2439 <dict>
2440 <key>Enabled</key>
2441 <true/> | <false/>
2442 <key>ProviderURL</key>
2443 <string>URL_TO_ALTERNATE_PROVIDER</string>
2444 <key>Locked</key>
2445 <true/> | <false/>
2446 <key>ExcludedDomains</key>
2447 <array>
2448 <string>example.com</string>
2449 </array>
2450 <key>Fallback</key>
2451 <true/> | <false/>
2452 </dict>
2453 </dict>
2454 ```
2455 #### policies.json
2456 ```
2457 {
2458 "policies": {
2459 "DNSOverHTTPS": {
2460 "Enabled": true | false,
2461 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2462 "Locked": true | false,
2463 "ExcludedDomains": ["example.com"],
2464 "Fallback": true | false,
2465 }
2466 }
2467 }
2468 ```
2469 ### DontCheckDefaultBrowser
2470 Don't check if Firefox is the default browser at startup.
2471
2472 **Compatibility:** Firefox 60, Firefox ESR 60\
2473 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2474 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2475
2476 #### Windows (GPO)
2477 ```
2478 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2479 ```
2480 #### Windows (Intune)
2481 OMA-URI:
2482 ```
2483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2484 ```
2485 Value (string):
2486 ```
2487 <enabled/> or <disabled/>
2488 ```
2489 #### macOS
2490 ```
2491 <dict>
2492 <key>DontCheckDefaultBrowser</key>
2493 <true/> | <false/>
2494 </dict>
2495 ```
2496 #### policies.json
2497 ```
2498 {
2499 "policies": {
2500 "DontCheckDefaultBrowser": true | false
2501 }
2502 }
2503 ```
2504 ### DownloadDirectory
2505 Set and lock the download directory.
2506
2507 You can use ${home} for the native home directory.
2508
2509 **Compatibility:** Firefox 68, Firefox ESR 68\
2510 **CCK2 Equivalent:** N/A\
2511 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2512
2513 #### Windows (GPO)
2514 ```
2515 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2516 ```
2517 #### Windows (Intune)
2518 OMA-URI:
2519 ```
2520 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2521 ```
2522 Value (string):
2523 ```
2524 <enabled/>
2525 <data id="Preferences_String" value="${home}\Downloads"/>
2526 ```
2527 #### macOS
2528 ```
2529 <dict>
2530 <key>DownloadDirectory</key>
2531 <string>${home}/Downloads</string>
2532 </dict>
2533 ```
2534 #### policies.json (macOS and Linux)
2535 ```
2536 {
2537 "policies": {
2538 "DownloadDirectory": "${home}/Downloads"
2539 }
2540 ```
2541 #### policies.json (Windows)
2542 ```
2543 {
2544 "policies": {
2545 "DownloadDirectory": "${home}\\Downloads"
2546 }
2547 ```
2548 ### EnableTrackingProtection
2549 Configure tracking protection.
2550
2551 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2552
2553 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2554
2555 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2556
2557 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2558
2559 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2560
2561 If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112)
2562
2563 `Exceptions` are origins for which tracking protection is not enabled.
2564
2565 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2566 **CCK2 Equivalent:** N/A\
2567 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2568
2569 #### Windows (GPO)
2570 ```
2571 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2572 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2573 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2574 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2575 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2576 ```
2577 #### Windows (Intune)
2578 OMA-URI:
2579 ```
2580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2581 ```
2582 Value (string):
2583 ```
2584 <enabled/> or <disabled/>
2585 ```
2586 OMA-URI:
2587 ```
2588 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2589 ```
2590 Value (string):
2591 ```
2592 <enabled/> or <disabled/>
2593 ```
2594 OMA-URI:
2595 ```
2596 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2597 ```
2598 Value (string):
2599 ```
2600 <enabled/> or <disabled/>
2601 ```
2602 OMA-URI:
2603 ```
2604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2605 ```
2606 Value (string):
2607 ```
2608 <enabled/>
2609 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2610 ```
2611 OMA-URI:
2612 ```
2613 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2614 ```
2615 Value (string):
2616 ```
2617 <enabled/> or <disabled/>
2618 ```
2619 #### macOS
2620 ```
2621 <dict>
2622 <key>EnableTrackingProtection</key>
2623 <dict>
2624 <key>Value</key>
2625 <true/> | <false/>
2626 <key>Locked</key>
2627 <true/> | <false/>
2628 <key>Cryptomining</key>
2629 <true/> | <false/>
2630 <key>Fingerprinting</key>
2631 <true/> | <false/>
2632 <key>Exceptions</key>
2633 <array>
2634 <string>https://example.com</string>
2635 </array>
2636 </dict>
2637 </dict>
2638 ```
2639 #### policies.json
2640 ```
2641 {
2642 "policies": {
2643 "EnableTrackingProtection": {
2644 "Value": true | false,
2645 "Locked": true | false,
2646 "Cryptomining": true | false,
2647 "Fingerprinting": true | false,
2648 "Exceptions": ["https://example.com"]
2649 }
2650 }
2651 }
2652 ```
2653 ### EncryptedMediaExtensions
2654 Enable or disable Encrypted Media Extensions and optionally lock it.
2655
2656 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2657
2658 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2659
2660 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2661 **CCK2 Equivalent:** N/A\
2662 **Preferences Affected:** `media.eme.enabled`
2663
2664 #### Windows (GPO)
2665 ```
2666 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2667 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2668 ```
2669 #### Windows (Intune)
2670 OMA-URI:
2671 ```
2672 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2674 ```
2675 Value (string):
2676 ```
2677 <enabled/>or <disabled/>
2678 ```
2679 #### macOS
2680 ```
2681 <dict>
2682 <key>EncryptedMediaExtensions</key>
2683 <dict>
2684 <key>Enabled</key>
2685 <true/> | <false/>
2686 <key>Locked</key>
2687 <true/> | <false/>
2688 </dict>
2689 </dict>
2690 ```
2691 #### policies.json
2692 ```
2693 {
2694 "policies": {
2695 "EncryptedMediaExtensions": {
2696 "Enabled": true | false,
2697 "Locked": true | false
2698 }
2699 }
2700 }
2701 ```
2702 ### EnterprisePoliciesEnabled
2703 Enable policy support on macOS.
2704
2705 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2706 **CCK2 Equivalent:** N/A\
2707 **Preferences Affected:** N/A
2708
2709 #### macOS
2710 ```
2711 <dict>
2712 <key>EnterprisePoliciesEnabled</key>
2713 <true/>
2714 </dict>
2715 ```
2716 ### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2717
2718 Disable warnings based on file extension for specific file types on domains.
2719
2720 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
2721
2722 Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
2723
2724 **Compatibility:** Firefox 102\
2725 **CCK2 Equivalent:** N/A\
2726 **Preferences Affected:** N/A
2727
2728 #### Windows (GPO)
2729 Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
2730 ```
2731 [
2732 {
2733 "file_extension": "jnlp",
2734 "domains": ["example.com"]
2735 }
2736 ]
2737 ```
2738 #### Windows (Intune)
2739 OMA-URI:
2740 ```
2741 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2742 ```
2743 Value (string):
2744 ```
2745 <enabled/>
2746 <data id="JSON" value='
2747 [
2748 {
2749 "file_extension": "jnlp",
2750 "domains": ["example.com"]
2751 }
2752 ]
2753 '/>
2754 ```
2755 #### macOS
2756 ```
2757 <dict>
2758 <key>ExemptDomainFileTypePairsFromFileTypeDownloadWarnings</key>
2759 <array>
2760 <dict>
2761 <key>file_extension</key>
2762 <string>jnlp</string>
2763 <key>domains</key>
2764 <array>
2765 <string>example.com</string>
2766 </array>
2767 </dict>
2768 </array>
2769 </dict>
2770 ```
2771 #### policies.json
2772 ```
2773 {
2774 "policies": {
2775 "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
2776 "file_extension": "jnlp",
2777 "domains": ["example.com"]
2778 }]
2779 }
2780 }
2781 ```
2782 ### Extensions
2783 Control the installation, uninstallation and locking of extensions.
2784
2785 We strongly recommend that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2786
2787 This method will be deprecated in the near future.
2788
2789 `Install` is a list of URLs or native paths for extensions to be installed.
2790
2791 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2792
2793 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2794
2795 **Compatibility:** Firefox 60, Firefox ESR 60\
2796 **CCK2 Equivalent:** `addons`\
2797 **Preferences Affected:** N/A
2798
2799 #### Windows (GPO)
2800 ```
2801 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2802 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2803 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2804 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2805 ```
2806 #### Windows (Intune)
2807 OMA-URI:
2808 ```
2809 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2810 ```
2811 Value (string):
2812 ```
2813 <enabled/>
2814 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2815 ```
2816 OMA-URI:
2817 ```
2818 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2819 ```
2820 Value (string):
2821 ```
2822 <enabled/>
2823 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2824 ```
2825 OMA-URI:
2826 ```
2827 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2828 ```
2829 Value (string):
2830 ```
2831 <enabled/>
2832 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2833 ```
2834 #### macOS
2835 ```
2836 <dict>
2837 <key>Extensions</key>
2838 <dict>
2839 <key>Install</key>
2840 <array>
2841 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2842 <string>//path/to/xpi</string>
2843 </array>
2844 <key>Uninstall</key>
2845 <array>
2846 <string>bad_addon_id@mozilla.org</string>
2847 </array>
2848 <key>Locked</key>
2849 <array>
2850 <string>addon_id@mozilla.org</string>
2851 </array>
2852 </dict>
2853 </dict>
2854 ```
2855 #### policies.json
2856 ```
2857 {
2858 "policies": {
2859 "Extensions": {
2860 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2861 "Uninstall": ["bad_addon_id@mozilla.org"],
2862 "Locked": ["addon_id@mozilla.org"]
2863 }
2864 }
2865 }
2866 ```
2867 ### ExtensionSettings
2868 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2869
2870 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2871
2872 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2873
2874 The configuration for each extension is another dictionary that can contain the fields documented below.
2875
2876 | Name | Description |
2877 | --- | --- |
2878 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2879 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2880 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2881 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2882 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2883 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2884 | `install_sources` | A list of sources from which installing extensions is allowed using URL match patterns. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2885 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2886 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2887 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2888 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2889 | `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`.
2890 | `temporarily_allow_weak_signatures`| (Firefox 127) A boolean that indicates whether to allow installing extensions signed using deprecated signature algorithms.
2891
2892 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2893 **CCK2 Equivalent:** N/A\
2894 **Preferences Affected:** N/A
2895
2896 #### Windows (GPO)
2897 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2898 ```
2899 {
2900 "*": {
2901 "blocked_install_message": "Custom error message.",
2902 "install_sources": ["https://yourwebsite.com/*"],
2903 "installation_mode": "blocked",
2904 "allowed_types": ["extension"]
2905 },
2906 "uBlock0@raymondhill.net": {
2907 "installation_mode": "force_installed",
2908 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2909 },
2910 "https-everywhere@eff.org": {
2911 "installation_mode": "allowed",
2912 "updates_disabled": false
2913 }
2914 }
2915 ```
2916 #### Windows (Intune)
2917 OMA-URI:
2918 ```
2919 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2920 ```
2921 Value (string):
2922 ```
2923 <enabled/>
2924 <data id="ExtensionSettings" value='
2925 {
2926 "*": {
2927 "blocked_install_message": "Custom error message.",
2928 "install_sources": ["https://yourwebsite.com/*"],
2929 "installation_mode": "blocked",
2930 "allowed_types": ["extension"]
2931 },
2932 "uBlock0@raymondhill.net": {
2933 "installation_mode": "force_installed",
2934 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2935 },
2936 "https-everywhere@eff.org": {
2937 "installation_mode": "allowed",
2938 "updates_disabled": false
2939 }
2940 }'/>
2941 ```
2942 #### macOS
2943 ```
2944 <dict>
2945 <key>ExtensionSettings</key>
2946 <dict>
2947 <key>*</key>
2948 <dict>
2949 <key>blocked_install_message</key>
2950 <string>Custom error message.</string>
2951 <key>install_sources</key>
2952 <array>
2953 <string>"https://yourwebsite.com/*"</string>
2954 </array>
2955 <key>installation_mode</key>
2956 <string>blocked</string>
2957 <key>allowed_types</key>
2958 <array>
2959 <string>extension</string>
2960 </array>
2961 </dict>
2962 <key>uBlock0@raymondhill.net</key>
2963 <dict>
2964 <key>installation_mode</key>
2965 <string>force_installed</string>
2966 <key>install_url</key>
2967 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2968 </dict>
2969 <key>https-everywhere@eff.org</key>
2970 <dict>
2971 <key>installation_mode</key>
2972 <string>allowed</string>
2973 <key>updates_disabled</key>
2974 <true/> | <false/>
2975 </dict>
2976 </dict>
2977 </dict>
2978 ```
2979 #### policies.json
2980 ```
2981 {
2982 "policies": {
2983 "ExtensionSettings": {
2984 "*": {
2985 "blocked_install_message": "Custom error message.",
2986 "install_sources": ["https://yourwebsite.com/*"],
2987 "installation_mode": "blocked",
2988 "allowed_types": ["extension"]
2989 },
2990 "uBlock0@raymondhill.net": {
2991 "installation_mode": "force_installed",
2992 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2993 },
2994 "https-everywhere@eff.org": {
2995 "installation_mode": "allowed",
2996 "updates_disabled": false
2997 }
2998 }
2999 }
3000 }
3001 ```
3002 ### ExtensionUpdate
3003 Control extension updates.
3004
3005 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3006 **CCK2 Equivalent:** N/A\
3007 **Preferences Affected:** `extensions.update.enabled`
3008
3009 #### Windows (GPO)
3010 ```
3011 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
3012 ```
3013 #### Windows (Intune)
3014 OMA-URI:
3015 ```
3016 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
3017 ```
3018 Value (string):
3019 ```
3020 <enabled/> or <disabled/>
3021 ```
3022 #### macOS
3023 ```
3024 <dict>
3025 <key>ExtensionUpdate</key>
3026 <true/> | <false/>
3027 </dict>
3028 ```
3029 #### policies.json
3030 ```
3031 {
3032 "policies": {
3033 "ExtensionUpdate": true | false
3034 }
3035 }
3036 ```
3037 ### FirefoxHome
3038 Customize the Firefox Home page.
3039
3040 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4, Snippets was deprecated in Firefox 122)
3041 **CCK2 Equivalent:** N/A\
3042 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
3043
3044 #### Windows (GPO)
3045 ```
3046 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
3047 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
3048 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
3049 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
3050 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
3051 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
3052 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
3053 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
3054 ```
3055 #### Windows (Intune)
3056 OMA-URI:
3057 ```
3058 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
3059 ```
3060 Value (string):
3061 ```
3062 <enabled/>
3063 <data id="FirefoxHome_Search" value="true | false"/>
3064 <data id="FirefoxHome_TopSites" value="true | false"/>
3065 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
3066 <data id="FirefoxHome_Highlights" value="true | false"/>
3067 <data id="FirefoxHome_Pocket" value="true | false"/>
3068 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
3069 <data id="FirefoxHome_Snippets" value="true | false"/>
3070 <data id="FirefoxHome_Locked" value="true | false"/>
3071 ```
3072 #### macOS
3073 ```
3074 <dict>
3075 <key>FirefoxHome</key>
3076 <dict>
3077 <key>Search</key>
3078 <true/> | <false/>
3079 <key>TopSites</key>
3080 <true/> | <false/>
3081 <key>SponsoredTopSites</key>
3082 <true/> | <false/>
3083 <key>Highlights</key>
3084 <true/> | <false/>
3085 <key>Pocket</key>
3086 <true/> | <false/>
3087 <key>SponsoredPocket</key>
3088 <true/> | <false/>
3089 <key>Snippets</key>
3090 <true/> | <false/>
3091 <key>Locked</key>
3092 <true/> | <false/>
3093 </dict>
3094 </dict>
3095 ```
3096 #### policies.json
3097 ```
3098 {
3099 "policies": {
3100 "FirefoxHome": {
3101 "Search": true | false,
3102 "TopSites": true | false,
3103 "SponsoredTopSites": true | false,
3104 "Highlights": true | false,
3105 "Pocket": true | false,
3106 "SponsoredPocket": true | false,
3107 "Snippets": true | false,
3108 "Locked": true | false
3109 }
3110 }
3111 }
3112 ```
3113 ### FirefoxSuggest
3114 Customize Firefox Suggest (US only).
3115
3116 **Compatibility:** Firefox 118, Firefox ESR 115.3.
3117 **CCK2 Equivalent:** N/A\
3118 **Preferences Affected:** `browser.urlbar.suggest.quicksuggest.nonsponsored`, `browser.urlbar.suggest.quicksuggest.sponsored`, `browser.urlbar.quicksuggest.dataCollection.enabled`
3119
3120 #### Windows (GPO)
3121 ```
3122 Software\Policies\Mozilla\Firefox\FirefoxSuggest\WebSuggestions = 0x1 | 0x0
3123 Software\Policies\Mozilla\Firefox\FirefoxSuggest\SponsoredSuggestions = 0x1 | 0x0
3124 Software\Policies\Mozilla\Firefox\FirefoxSuggest\ImproveSuggest = 0x1 | 0x0
3125 Software\Policies\Mozilla\Firefox\FirefoxSuggest\Locked = 0x1 | 0x0
3126 ```
3127 #### Windows (Intune)
3128 OMA-URI:
3129 ```
3130 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/WebSuggestions
3131 ```
3132 Value (string):
3133 ```
3134 <enabled/> or <disabled/>
3135 ```
3136 OMA-URI:
3137 ```
3138 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/SponsoredSuggestions
3139 ```
3140 Value (string):
3141 ```
3142 <enabled/> or <disabled/>
3143 ```
3144 OMA-URI:
3145 ```
3146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/ImproveSuggest
3147 ```
3148 Value (string):
3149 ```
3150 <enabled/> or <disabled/>
3151 ```
3152 OMA-URI:
3153 ```
3154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/Locked
3155 ```
3156 Value (string):
3157 ```
3158 <enabled/> or <disabled/>
3159 ```
3160 #### macOS
3161 ```
3162 <dict>
3163 <key>FirefoxSuggest</key>
3164 <dict>
3165 <key>WebSuggestions</key>
3166 <true/> | <false/>
3167 <key>SponsoredSuggestions</key>
3168 <true/> | <false/>
3169 <key>ImproveSuggest</key>
3170 <true/> | <false/>
3171 <key>Locked</key>
3172 <true/> | <false/>
3173 </dict>
3174 </dict>
3175 ```
3176 #### policies.json
3177 ```
3178 {
3179 "policies": {
3180 "FirefoxSuggest": {
3181 "WebSuggestions": true | false,
3182 "SponsoredSuggestions": true | false,
3183 "ImproveSuggest": true | false,
3184 "Locked": true | false
3185 }
3186 }
3187 }
3188 ```
3189 ### GoToIntranetSiteForSingleWordEntryInAddressBar
3190 Whether to always go through the DNS server before sending a single word search string to a search engine.
3191
3192 If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
3193
3194 The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
3195
3196 If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
3197
3198 You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
3199
3200 Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
3201
3202 **Compatibility:** Firefox 104, Firefox ESR 102.2\
3203 **CCK2 Equivalent:** `N/A`\
3204 **Preferences Affected:** `browser.fixup.dns_first_for_single_words`
3205
3206 #### Windows (GPO)
3207 ```
3208 Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
3209 ```
3210 #### Windows (Intune)
3211 OMA-URI:
3212 ```
3213 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
3214 ```
3215 Value (string):
3216 ```
3217 <enabled/> or <disabled/>
3218 ```
3219 #### macOS
3220 ```
3221 <dict>
3222 <key>GoToIntranetSiteForSingleWordEntryInAddressBar</key>
3223 <true/> | <false/>
3224 </dict>
3225 ```
3226 #### policies.json
3227 ```
3228 {
3229 "policies": {
3230 "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
3231 }
3232 }
3233 ```
3234 ### Handlers
3235 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
3236
3237 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
3238
3239 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
3240
3241 | Name | Description |
3242 | --- | --- |
3243 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
3244 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
3245 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
3246 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
3247 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
3248 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
3249
3250 **Compatibility:** Firefox 78, Firefox ESR 78\
3251 **CCK2 Equivalent:** N/A\
3252 **Preferences Affected:** N/A
3253
3254 #### Windows (GPO)
3255 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
3256 ```
3257 {
3258 "mimeTypes": {
3259 "application/msword": {
3260 "action": "useSystemDefault",
3261 "ask": true | false
3262 }
3263 },
3264 "schemes": {
3265 "mailto": {
3266 "action": "useHelperApp",
3267 "ask": true | false,
3268 "handlers": [{
3269 "name": "Gmail",
3270 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3271 }]
3272 }
3273 },
3274 "extensions": {
3275 "pdf": {
3276 "action": "useHelperApp",
3277 "ask": true | false,
3278 "handlers": [{
3279 "name": "Adobe Acrobat",
3280 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3281 }]
3282 }
3283 }
3284 }
3285 ```
3286 #### Windows (Intune)
3287 OMA-URI:
3288 ```
3289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
3290 ```
3291 Value (string):
3292 ```
3293 <enabled/>
3294 <data id="Handlers" value='
3295 {
3296 "mimeTypes": {
3297 "application/msword": {
3298 "action": "useSystemDefault",
3299 "ask": true | false
3300 }
3301 },
3302 "schemes": {
3303 "mailto": {
3304 "action": "useHelperApp",
3305 "ask": true | false,
3306 "handlers": [{
3307 "name": "Gmail",
3308 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
3309 }]
3310 }
3311 },
3312 "extensions": {
3313 "pdf": {
3314 "action": "useHelperApp",
3315 "ask": true | false,
3316 "handlers": [{
3317 "name": "Adobe Acrobat",
3318 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3319 }]
3320 }
3321 }
3322 }
3323 '/>
3324 ```
3325 #### macOS
3326 ```
3327 <dict>
3328 <key>Handlers</key>
3329 <dict>
3330 <key>mimeTypes</key>
3331 <dict>
3332 <key>application/msword</key>
3333 <dict>
3334 <key>action</key>
3335 <string>useSystemDefault</string>
3336 <key>ask</key>
3337 <true/> | <false/>
3338 </dict>
3339 </dict>
3340 <key>schemes</key>
3341 <dict>
3342 <key>mailto</key>
3343 <dict>
3344 <key>action</key>
3345 <string>useHelperApp</string>
3346 <key>ask</key>
3347 <true/> | <false/>
3348 <key>handlers</key>
3349 <array>
3350 <dict>
3351 <key>name</key>
3352 <string>Gmail</string>
3353 <key>uriTemplate</key>
3354 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
3355 </dict>
3356 </array>
3357 </dict>
3358 </dict>
3359 <key>extensions</key>
3360 <dict>
3361 <key>pdf</key>
3362 <dict>
3363 <key>action</key>
3364 <string>useHelperApp</string>
3365 <key>ask</key>
3366 <true/> | <false/>
3367 <key>handlers</key>
3368 <array>
3369 <dict>
3370 <key>name</key>
3371 <string>Adobe Acrobat</string>
3372 <key>path</key>
3373 <string>/System/Applications/Preview.app</string>
3374 </dict>
3375 </array>
3376 </dict>
3377 </dict>
3378 </dict>
3379 </dict>
3380 ```
3381 #### policies.json
3382 ```
3383 {
3384 "policies": {
3385 "Handlers": {
3386 "mimeTypes": {
3387 "application/msword": {
3388 "action": "useSystemDefault",
3389 "ask": false
3390 }
3391 },
3392 "schemes": {
3393 "mailto": {
3394 "action": "useHelperApp",
3395 "ask": true | false,
3396 "handlers": [{
3397 "name": "Gmail",
3398 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3399 }]
3400 }
3401 },
3402 "extensions": {
3403 "pdf": {
3404 "action": "useHelperApp",
3405 "ask": true | false,
3406 "handlers": [{
3407 "name": "Adobe Acrobat",
3408 "path": "/usr/bin/acroread"
3409 }]
3410 }
3411 }
3412 }
3413 }
3414 }
3415 ```
3416 ### HardwareAcceleration
3417 Control hardware acceleration.
3418
3419 **Compatibility:** Firefox 60, Firefox ESR 60\
3420 **CCK2 Equivalent:** N/A\
3421 **Preferences Affected:** `layers.acceleration.disabled`
3422
3423 #### Windows (GPO)
3424 ```
3425 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3426 ```
3427 #### Windows (Intune)
3428 OMA-URI:
3429 ```
3430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3431 ```
3432 Value (string):
3433 ```
3434 <enabled/> or <disabled/>
3435 ```
3436 #### macOS
3437 ```
3438 <dict>
3439 <key>HardwareAcceleration</key>
3440 <true/> | <false/>
3441 </dict>
3442 ```
3443 #### policies.json
3444 ```
3445 {
3446 "policies": {
3447 "HardwareAcceleration": true | false
3448 }
3449 }
3450 ```
3451 ### Homepage
3452 Configure the default homepage and how Firefox starts.
3453
3454 `URL` is the default homepage.
3455
3456 `Locked` prevents the user from changing homepage preferences.
3457
3458 `Additional` allows for more than one homepage.
3459
3460 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3461
3462 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3463
3464 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3465 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3466 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3467
3468 #### Windows (GPO)
3469 ```
3470 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3471 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3472 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3473 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3474 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3475 ```
3476 #### Windows (Intune)
3477 OMA-URI:
3478 ```
3479 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3480 ```
3481 Value (string):
3482 ```
3483 <enabled/>
3484
3485 <data id="HomepageURL" value="https://example.com"/>
3486 <data id="HomepageLocked" value="true | false"/>
3487 ```
3488 OMA-URI:
3489 ```
3490 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3491 ```
3492 Value (string):
3493 ```
3494 <enabled/>
3495
3496 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3497 ```
3498 OMA-URI:
3499 ```
3500 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3501 ```
3502 Value (string):
3503 ```
3504 <enabled/>
3505
3506 <data id="StartPage" value="none | homepage | previous-session"/>
3507 ```
3508 #### macOS
3509 ```
3510 <dict>
3511 <key>Homepage</key>
3512 <dict>
3513 <key>URL</key>
3514 <string>http://example.com</string>
3515 <key>Locked</key>
3516 <true/> | <false/>
3517 <key>Additional</key>
3518 <array>
3519 <string>http://example.org</string>
3520 <string>http://example.edu</string>
3521 </array>
3522 <key>StartPage</key>
3523 <string>none | homepage | previous-session | homepage-locked</string>
3524 </dict>
3525 </dict>
3526 ```
3527 #### policies.json
3528 ```
3529 {
3530 "policies": {
3531 "Homepage": {
3532 "URL": "http://example.com/",
3533 "Locked": true | false,
3534 "Additional": ["http://example.org/",
3535 "http://example.edu/"],
3536 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3537 }
3538 }
3539 }
3540 ```
3541 ### HttpAllowlist
3542 Configure sites that will not be upgraded to HTTPS.
3543
3544 The sites are specified as a list of origins.
3545
3546 **Compatibility:** Firefox 127\
3547 **CCK2 Equivalent:** N/A\
3548 **Preferences Affected:** N/A
3549
3550 #### Windows (GPO)
3551 ```
3552 Software\Policies\Mozilla\Firefox\HttpAllowlist\1 = "http://example.org"
3553 Software\Policies\Mozilla\Firefox\HttpAllowlist\2 = "http://example.edu"
3554 ```
3555 #### Windows (Intune)
3556 OMA-URI:
3557 ```
3558 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HttpAllowlist
3559 ```
3560 Value (string):
3561 ```
3562 <enabled/>
3563 <data id="List" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3564 ```
3565 #### macOS
3566 ```
3567 <dict>
3568 <key>HttpAllowlist </key>
3569 <array>
3570 <string>http://example.org</string>
3571 <string>http://example.edu</string>
3572 </array>
3573 </dict>
3574 ```
3575 #### policies.json
3576 ```
3577 {
3578 "policies": {
3579 "HttpAllowlist ": ["http://example.org",
3580 "http://example.edu"]
3581 }
3582 }
3583 ```
3584 ### HttpsOnlyMode
3585 Configure HTTPS-Only Mode.
3586
3587 | Value | Description
3588 | --- | --- |
3589 | allowed | HTTPS-Only Mode is off by default, but the user can turn it on.
3590 | disallowed | HTTPS-Only Mode is off and the user can't turn it on.
3591 | enabled | HTTPS-Only Mode is on by default, but the user can turn it off.
3592 | force_enabled | HTTPS-Only Mode is on and the user can't turn it off.
3593
3594 **Compatibility:** Firefox 127\
3595 **CCK2 Equivalent:** N/A\
3596 **Preferences Affected:** `dom.security.https_only_mode`
3597
3598 #### Windows (GPO)
3599 ```
3600 Software\Policies\Mozilla\Firefox\HttpsOnlyMode = "allowed", "disallowed", "enabled", "force_enabled"
3601 ```
3602 #### Windows (Intune)
3603 OMA-URI:
3604 ```
3605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HttpsOnlyMode
3606 ```
3607 Value (string):
3608 ```
3609 <enabled/>
3610 <data id="HttpsOnlyMode" value="allowed | disallowed | enabled | force_enabled"/>
3611 ```
3612 #### macOS
3613 ```
3614 <dict>
3615 <key>HttpsOnlyMode</key>
3616 <string>allowed | disallowed | enabled | force_enabled</string>
3617 </dict>
3618 ```
3619 #### policies.json
3620 ```
3621 {
3622 "policies": {
3623 "HttpsOnlyMode": "allowed" | "disallowed" | "enabled" | "force_enabled"
3624 }
3625 }
3626 ```
3627 ### InstallAddonsPermission
3628 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3629
3630 `Allow` is a list of origins where extension installs are allowed.
3631
3632 `Default` determines whether or not extension installs are allowed by default.
3633
3634 **Compatibility:** Firefox 60, Firefox ESR 60\
3635 **CCK2 Equivalent:** `permissions.install`\
3636 **Preferences Affected:** `xpinstall.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3637
3638 #### Windows (GPO)
3639 ```
3640 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3641 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3642 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3643 ```
3644 #### Windows (Intune)
3645 OMA-URI:
3646 ```
3647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3648 ```
3649 Value (string):
3650 ```
3651 <enabled/>
3652 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3653 ```
3654 OMA-URI:
3655 ```
3656 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3657 ```
3658 Value (string):
3659 ```
3660 <enabled/>
3661 ```
3662 #### macOS
3663 ```
3664 <dict>
3665 <key>InstallAddonsPermission</key>
3666 <dict>
3667 <key>Allow</key>
3668 <array>
3669 <string>http://example.org</string>
3670 <string>http://example.edu</string>
3671 </array>
3672 <key>Default</key>
3673 <true/> | <false/>
3674 </dict>
3675 </dict>
3676 ```
3677 #### policies.json
3678 ```
3679 {
3680 "policies": {
3681 "InstallAddonsPermission": {
3682 "Allow": ["http://example.org/",
3683 "http://example.edu/"],
3684 "Default": true | false
3685 }
3686 }
3687 }
3688 ```
3689 ### LegacyProfiles
3690 Disable the feature enforcing a separate profile for each installation.
3691
3692 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3693
3694 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3695
3696 This policy only work on Windows via GPO (not policies.json).
3697
3698 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3699 **CCK2 Equivalent:** N/A\
3700 **Preferences Affected:** N/A
3701
3702 #### Windows (GPO)
3703 ```
3704 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3705 ```
3706 #### Windows (Intune)
3707 OMA-URI:
3708 ```
3709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3710 ```
3711 Value (string):
3712 ```
3713 <enabled/> or <disabled/>
3714 ```
3715 ### LegacySameSiteCookieBehaviorEnabled
3716 Enable default legacy SameSite cookie behavior setting.
3717
3718 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3719
3720 **Compatibility:** Firefox 96\
3721 **CCK2 Equivalent:** N/A\
3722 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3723
3724 #### Windows (GPO)
3725 ```
3726 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3727 ```
3728 #### Windows (Intune)
3729 OMA-URI:
3730 ```
3731 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3732 ```
3733 Value (string):
3734 ```
3735 <enabled/> or <disabled/>
3736 ```
3737 #### macOS
3738 ```
3739 <dict>
3740 <key>LegacySameSiteCookieBehaviorEnabled</key>
3741 <true/> | <false/>
3742 </dict>
3743 ```
3744 #### policies.json
3745 ```
3746 {
3747 "policies": {
3748 "LegacySameSiteCookieBehaviorEnabled": true | false
3749 }
3750 ```
3751 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3752 Revert to legacy SameSite behavior for cookies on specified sites.
3753
3754 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3755
3756 **Compatibility:** Firefox 96\
3757 **CCK2 Equivalent:** N/A\
3758 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3759
3760 #### Windows (GPO)
3761 ```
3762 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3763 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3764 ```
3765 #### Windows (Intune)
3766 OMA-URI:
3767 ```
3768 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3769 ```
3770 Value (string):
3771 ```
3772 <enabled/>
3773 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3774 ```
3775 #### macOS
3776 ```
3777 <dict>
3778 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3779 <array>
3780 <string>example.org</string>
3781 <string>example.edu</string>
3782 </array>
3783 </dict>
3784 ```
3785 #### policies.json
3786 ```
3787 {
3788 "policies": {
3789 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3790 "example.edu"]
3791 }
3792 }
3793 ```
3794 ### LocalFileLinks
3795 Enable linking to local files by origin.
3796
3797 **Compatibility:** Firefox 68, Firefox ESR 68\
3798 **CCK2 Equivalent:** N/A\
3799 **Preferences Affected:** `capability.policy.localfilelinks.*`
3800
3801 #### Windows (GPO)
3802 ```
3803 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3804 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3805 ```
3806 #### Windows (Intune)
3807 OMA-URI:
3808 ```
3809 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3810 ```
3811 Value (string):
3812 ```
3813 <enabled/>
3814 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3815 ```
3816 #### macOS
3817 ```
3818 <dict>
3819 <key>LocalFileLinks</key>
3820 <array>
3821 <string>http://example.org</string>
3822 <string>http://example.edu</string>
3823 </array>
3824 </dict>
3825 ```
3826 #### policies.json
3827 ```
3828 {
3829 "policies": {
3830 "LocalFileLinks": ["http://example.org/",
3831 "http://example.edu/"]
3832 }
3833 }
3834 ```
3835 ### ManagedBookmarks
3836 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3837
3838 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3839
3840 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3841 ```
3842 {
3843 "items": {
3844 "id": "BookmarkType",
3845 "properties": {
3846 "children": {
3847 "items": {
3848 "$ref": "BookmarkType"
3849 },
3850 "type": "array"
3851 },
3852 "name": {
3853 "type": "string"
3854 },
3855 "toplevel_name": {
3856 "type": "string"
3857 },
3858 "url": {
3859 "type": "string"
3860 }
3861 },
3862 "type": "object"
3863 },
3864 "type": "array"
3865 }
3866 ```
3867 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3868 **CCK2 Equivalent:** N/A\
3869 **Preferences Affected:** N/A
3870
3871 #### Windows (GPO)
3872 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3873 ```
3874 [
3875 {
3876 "toplevel_name": "My managed bookmarks folder"
3877 },
3878 {
3879 "url": "example.com",
3880 "name": "Example"
3881 },
3882 {
3883 "name": "Mozilla links",
3884 "children": [
3885 {
3886 "url": "https://mozilla.org",
3887 "name": "Mozilla.org"
3888 },
3889 {
3890 "url": "https://support.mozilla.org/",
3891 "name": "SUMO"
3892 }
3893 ]
3894 }
3895 ]
3896 ```
3897 #### Windows (Intune)
3898 OMA-URI:
3899 ```
3900 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3901 ```
3902 Value (string):
3903 ```
3904 <enabled/>
3905 <data id="JSON" value='
3906 [
3907 {
3908 "toplevel_name": "My managed bookmarks folder"
3909 },
3910 {
3911 "url": "example.com",
3912 "name": "Example"
3913 },
3914 {
3915 "name": "Mozilla links",
3916 "children": [
3917 {
3918 "url": "https://mozilla.org",
3919 "name": "Mozilla.org"
3920 },
3921 {
3922 "url": "https://support.mozilla.org/",
3923 "name": "SUMO"
3924 }
3925 ]
3926 }
3927 ]'/>
3928 ```
3929 #### macOS
3930 ```
3931 <dict>
3932 <key>ManagedBookmarks</key>
3933 <array>
3934 <dict>
3935 <key>toplevel_name</key>
3936 <string>My managed bookmarks folder</string>
3937 <dict>
3938 <key>url</key>
3939 <string>example.com</string>
3940 <key>name</key>
3941 <string>Example</string>
3942 </dict>
3943 <dict>
3944 <key>name</key>
3945 <string>Mozilla links</string>
3946 <key>children</key>
3947 <array>
3948 <dict>
3949 <key>url</key>
3950 <string>https://mozilla.org</string>
3951 <key>name</key>
3952 <string>Mozilla</string>
3953 </dict>
3954 <dict>
3955 <key>url</key>
3956 <string>https://support.mozilla.org/</string>
3957 <key>name</key>
3958 <string>SUMO</string>
3959 </dict>
3960 </array>
3961 </dict>
3962 </array>
3963 </dict>
3964 ```
3965 #### policies.json
3966 ```
3967 {
3968 "policies": {
3969 "ManagedBookmarks": [
3970 {
3971 "toplevel_name": "My managed bookmarks folder"
3972 },
3973 {
3974 "url": "example.com",
3975 "name": "Example"
3976 },
3977 {
3978 "name": "Mozilla links",
3979 "children": [
3980 {
3981 "url": "https://mozilla.org",
3982 "name": "Mozilla.org"
3983 },
3984 {
3985 "url": "https://support.mozilla.org/",
3986 "name": "SUMO"
3987 }
3988 ]
3989 }
3990 ]
3991 }
3992 }
3993 ```
3994 ### ManualAppUpdateOnly
3995
3996 Switch to manual updates only.
3997
3998 If this policy is enabled:
3999 1. The user will never be prompted to install updates
4000 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
4001 3. The update UI will work as expected, unlike when using DisableAppUpdate.
4002
4003 This policy is primarily intended for advanced end users, not for enterprises, but it is available via GPO.
4004
4005 **Compatibility:** Firefox 87\
4006 **CCK2 Equivalent:** N/A\
4007 **Preferences Affected:** N/A
4008
4009 #### Windows (GPO)
4010 ```
4011 Software\Policies\Mozilla\Firefox\ManualAppUpdateOnly = 0x1 | 0x0
4012 ```
4013 #### Windows (Intune)
4014 OMA-URI:
4015 ```
4016 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManualAppUpdateOnly
4017 ```
4018 Value (string):
4019 ```
4020 <enabled/> or <disabled/>
4021 ```
4022 #### macOS
4023 ```
4024 <dict>
4025 <key>ManualAppUpdateOnly</key>
4026 <true/> | <false/>
4027 </dict>
4028 ```
4029 #### policies.json
4030 ```
4031 {
4032 "policies": {
4033 "ManualAppUpdateOnly": true | false
4034 }
4035 }
4036 ```
4037 ### NetworkPrediction
4038 Enable or disable network prediction (DNS prefetching).
4039
4040 **Compatibility:** Firefox 67, Firefox ESR 60.7\
4041 **CCK2 Equivalent:** N/A\
4042 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
4043
4044 #### Windows (GPO)
4045 ```
4046 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
4047 ```
4048 #### Windows (Intune)
4049 OMA-URI:
4050 ```
4051 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
4052 ```
4053 Value (string):
4054 ```
4055 <enabled/> or <disabled/>
4056 ```
4057 #### macOS
4058 ```
4059 <dict>
4060 <key>NetworkPrediction</key>
4061 <true/> | <false/>
4062 </dict>
4063 ```
4064 #### policies.json
4065 ```
4066 {
4067 "policies": {
4068 "NetworkPrediction": true | false
4069 }
4070 ```
4071 ### NewTabPage
4072 Enable or disable the New Tab page.
4073
4074 **Compatibility:** Firefox 68, Firefox ESR 68\
4075 **CCK2 Equivalent:** N/A\
4076 **Preferences Affected:** `browser.newtabpage.enabled`
4077
4078 #### Windows (GPO)
4079 ```
4080 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
4081 ```
4082 #### Windows (Intune)
4083 OMA-URI:
4084 ```
4085 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
4086 ```
4087 Value (string):
4088 ```
4089 <enabled/> or <disabled/>
4090 ```
4091 #### macOS
4092 ```
4093 <dict>
4094 <key>NewTabPage</key>
4095 <true/> | <false/>
4096 </dict>
4097 ```
4098 #### policies.json
4099 ```
4100 {
4101 "policies": {
4102 "NewTabPage": true | false
4103 }
4104 ```
4105 ### NoDefaultBookmarks
4106 Disable the creation of default bookmarks.
4107
4108 This policy is only effective if the user profile has not been created yet.
4109
4110 **Compatibility:** Firefox 60, Firefox ESR 60\
4111 **CCK2 Equivalent:** `removeDefaultBookmarks`\
4112 **Preferences Affected:** N/A
4113
4114 #### Windows (GPO)
4115 ```
4116 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
4117 ```
4118 #### Windows (Intune)
4119 OMA-URI:
4120 ```
4121 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
4122 ```
4123 Value (string):
4124 ```
4125 <enabled/> or <disabled/>
4126 ```
4127 #### macOS
4128 ```
4129 <dict>
4130 <key>NoDefaultBookmarks</key>
4131 <true/> | <false/>
4132 </dict>
4133 ```
4134 #### policies.json
4135 ```
4136 {
4137 "policies": {
4138 "NoDefaultBookmarks": true | false
4139 }
4140 }
4141 ```
4142 ### OfferToSaveLogins
4143 Control whether or not Firefox offers to save passwords.
4144
4145 **Compatibility:** Firefox 60, Firefox ESR 60\
4146 **CCK2 Equivalent:** `dontRememberPasswords`\
4147 **Preferences Affected:** `signon.rememberSignons`
4148
4149 #### Windows (GPO)
4150 ```
4151 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
4152 ```
4153 #### Windows (Intune)
4154 OMA-URI:
4155 ```
4156 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
4157 ```
4158 Value (string):
4159 ```
4160 <enabled/> or <disabled/>
4161 ```
4162 #### macOS
4163 ```
4164 <dict>
4165 <key>OfferToSaveLogins</key>
4166 <true/> | <false/>
4167 </dict>
4168 ```
4169 #### policies.json
4170 ```
4171 {
4172 "policies": {
4173 "OfferToSaveLogins": true | false
4174 }
4175 }
4176 ```
4177 ### OfferToSaveLoginsDefault
4178 Sets the default value of signon.rememberSignons without locking it.
4179
4180 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4181 **CCK2 Equivalent:** `dontRememberPasswords`\
4182 **Preferences Affected:** `signon.rememberSignons`
4183
4184 #### Windows (GPO)
4185 ```
4186 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
4187 ```
4188 #### Windows (Intune)
4189 OMA-URI:
4190 ```
4191 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
4192 ```
4193 Value (string):
4194 ```
4195 <enabled/> or <disabled/>
4196 ```
4197 #### macOS
4198 ```
4199 <dict>
4200 <key>OfferToSaveLoginsDefault</key>
4201 <true/> | <false/>
4202 </dict>
4203 ```
4204 #### policies.json
4205 ```
4206 {
4207 "policies": {
4208 "OfferToSaveLoginsDefault": true | false
4209 }
4210 }
4211 ```
4212 ### OverrideFirstRunPage
4213 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
4214
4215 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
4216
4217 **Compatibility:** Firefox 60, Firefox ESR 60\
4218 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
4219 **Preferences Affected:** `startup.homepage_welcome_url`
4220
4221 #### Windows (GPO)
4222 ```
4223 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
4224 ```
4225 #### Windows (Intune)
4226 OMA-URI:
4227 ```
4228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
4229 ```
4230 Value (string):
4231 ```
4232 <enabled/>
4233 <data id="OverridePage" value="https://example.com"/>
4234 ```
4235 #### macOS
4236 ```
4237 <dict>
4238 <key>OverrideFirstRunPage</key>
4239 <string>http://example.org</string>
4240 </dict>
4241 ```
4242 #### policies.json
4243 ```
4244 {
4245 "policies": {
4246 "OverrideFirstRunPage": "http://example.org"
4247 }
4248 }
4249 ```
4250 ### OverridePostUpdatePage
4251 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
4252
4253 **Compatibility:** Firefox 60, Firefox ESR 60\
4254 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
4255 **Preferences Affected:** `startup.homepage_override_url`
4256
4257 #### Windows (GPO)
4258 ```
4259 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
4260 ```
4261 #### Windows (Intune)
4262 OMA-URI:
4263 ```
4264 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
4265 ```
4266 Value (string):
4267 ```
4268 <enabled/>
4269 <data id="OverridePage" value="https://example.com"/>
4270 ```
4271 #### macOS
4272 ```
4273 <dict>
4274 <key>OverridePostUpdatePage</key>
4275 <string>http://example.org</string>
4276 </dict>
4277 ```
4278 #### policies.json
4279 ```
4280 {
4281 "policies": {
4282 "OverridePostUpdatePage": "http://example.org"
4283 }
4284 }
4285 ```
4286 ### PasswordManagerEnabled
4287 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
4288
4289 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4290 **CCK2 Equivalent:** N/A\
4291 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
4292
4293 #### Windows (GPO)
4294 ```
4295 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
4296 ```
4297 #### Windows (Intune)
4298 OMA-URI:
4299 ```
4300 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
4301 ```
4302 Value (string):
4303 ```
4304 <enabled/> or <disabled/>
4305 ```
4306 #### macOS
4307 ```
4308 <dict>
4309 <key>PasswordManagerEnabled</key>
4310 <true/> | <false/>
4311 </dict>
4312 ```
4313 #### policies.json
4314 ```
4315 {
4316 "policies": {
4317 "PasswordManagerEnabled": true | false
4318 }
4319 }
4320 ```
4321 ### PasswordManagerExceptions
4322 Prevent Firefox from saving passwords for specific sites.
4323
4324 The sites are specified as a list of origins.
4325
4326 **Compatibility:** Firefox 101\
4327 **CCK2 Equivalent:** N/A\
4328 **Preferences Affected:** N/A
4329
4330 #### Windows (GPO)
4331 ```
4332 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
4333 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
4334 ```
4335 #### Windows (Intune)
4336 OMA-URI:
4337 ```
4338 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
4339 ```
4340 Value (string):
4341 ```
4342 <enabled/>
4343 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4344 ```
4345 #### macOS
4346 ```
4347 <dict>
4348 <key>PasswordManagerExceptions</key>
4349 <array>
4350 <string>https://example.org</string>
4351 <string>https://example.edu</string>
4352 </array>
4353 </dict>
4354 ```
4355 #### policies.json
4356 ```
4357 {
4358 "policies": {
4359 "PasswordManagerExceptions": ["https://example.org",
4360 "https://example.edu"]
4361 }
4362 }
4363 ```
4364 ### PDFjs
4365 Disable or configure PDF.js, the built-in PDF viewer.
4366
4367 If `Enabled` is set to false, the built-in PDF viewer is disabled.
4368
4369 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
4370
4371 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
4372
4373 **Compatibility:** Firefox 77, Firefox ESR 68.9\
4374 **CCK2 Equivalent:** N/A\
4375 **Preferences Affected:** `pdfjs.disabled`, `pdfjs.enablePermissions`
4376
4377 #### Windows (GPO)
4378 ```
4379 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
4380 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
4381 ```
4382 #### Windows (Intune)
4383 OMA-URI:
4384 ```
4385 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
4386 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
4387 ```
4388 Value (string):
4389 ```
4390 <enabled/>or <disabled/>
4391 ```
4392 #### macOS
4393 ```
4394 <dict>
4395 <key>PDFjs</key>
4396 <dict>
4397 <key>Enabled</key>
4398 <true/> | <false/>
4399 <key>EnablePermissions</key>
4400 <true/> | <false/>
4401 </dict>
4402 </dict>
4403 ```
4404 #### policies.json
4405 ```
4406 {
4407 "policies": {
4408 "PDFjs": {
4409 "Enabled": true | false,
4410 "EnablePermissions": true | false
4411 }
4412 }
4413 }
4414 ```
4415 ### Permissions
4416 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
4417
4418 `Allow` is a list of origins where the feature is allowed.
4419
4420 `Block` is a list of origins where the feature is not allowed.
4421
4422 `BlockNewRequests` determines whether or not new requests can be made for the feature.
4423
4424 `Locked` prevents the user from changing preferences for the feature.
4425
4426 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
4427
4428 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
4429 **CCK2 Equivalent:** N/A\
4430 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
4431
4432 #### Windows (GPO)
4433 ```
4434 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
4435 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
4436 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
4437 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
4438 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
4439 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
4440 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
4441 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
4442 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
4443 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
4444 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
4445 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
4446 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
4447 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
4448 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
4449 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
4450 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
4451 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
4452 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
4453 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
4454 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
4455 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
4456 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
4457 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
4458 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
4459 ```
4460 #### Windows (Intune)
4461 OMA-URI:
4462 ```
4463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
4464 ```
4465 Value (string):
4466 ```
4467 <enabled/> or <disabled/>
4468 ```
4469 OMA-URI:
4470 ```
4471 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
4472 ```
4473 Value (string):
4474 ```
4475 <enabled/> or <disabled/>
4476 ```
4477 OMA-URI:
4478 ```
4479 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
4480 ```
4481 Value (string):
4482 ```
4483 <enabled/>
4484 <data id="Permissions" value="1&#xF000;https://example.org"/>
4485 ```
4486 OMA-URI:
4487 ```
4488 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
4489 ```
4490 Value (string):
4491 ```
4492 <enabled/> or <disabled/>
4493 ```
4494 OMA-URI:
4495 ```
4496 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4497 ```
4498 Value (string):
4499 ```
4500 <enabled/> or <disabled/>
4501 ```
4502 OMA-URI:
4503 ```
4504 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4505 ```
4506 Value (string):
4507 ```
4508 <enabled/>
4509 <data id="Permissions" value="1&#xF000;https://example.org"/>
4510 ```
4511 OMA-URI:
4512 ```
4513 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4514 ```
4515 Value (string):
4516 ```
4517 <enabled/>
4518 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4519 ```
4520 OMA-URI:
4521 ```
4522 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4523 ```
4524 Value (string):
4525 ```
4526 <enabled/>
4527 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4528 ```
4529 OMA-URI:
4530 ```
4531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4532 ```
4533 Value (string):
4534 ```
4535 <enabled/> or <disabled/>
4536 ```
4537 OMA-URI:
4538 ```
4539 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4540 ```
4541 Value (string):
4542 ```
4543 <enabled/>
4544 <data id="Permissions" value="1&#xF000;https://example.org"/>
4545 ```
4546 OMA-URI:
4547 ```
4548 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4549 ```
4550 Value (string):
4551 ```
4552 <enabled/>
4553 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4554 ```
4555 OMA-URI:
4556 ```
4557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4558 ```
4559 Value (string):
4560 ```
4561 <enabled/> or <disabled/>
4562 ```
4563 OMA-URI:
4564 ```
4565 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4566 ```
4567 Value (string):
4568 ```
4569 <enabled/> or <disabled/>
4570 ```
4571 #### macOS
4572 ```
4573 <dict>
4574 <key>Permissions</key>
4575 <dict>
4576 <key>Camera</key>
4577 <dict>
4578 <key>Allow</key>
4579 <array>
4580 <string>https://example.org</string>
4581 <string>https://example.org:1234</string>
4582 </array>
4583 <key>Block</key>
4584 <array>
4585 <string>https://example.edu</string>
4586 </array>
4587 <key>BlockNewRequests</key>
4588 <true/> | <false/>
4589 <key>Locked</key>
4590 <true/> | <false/>
4591 </dict>
4592 <key>Microphone</key>
4593 <dict>
4594 <key>Allow</key>
4595 <array>
4596 <string>https://example.org</string>
4597 </array>
4598 <key>Block</key>
4599 <array>
4600 <string>https://example.edu</string>
4601 </array>
4602 <key>BlockNewRequests</key>
4603 <true/> | <false/>
4604 <key>Locked</key>
4605 <true/> | <false/>
4606 </dict>
4607 <key>Location</key>
4608 <dict>
4609 <key>Allow</key>
4610 <array>
4611 <string>https://example.org</string>
4612 </array>
4613 <key>Block</key>
4614 <array>
4615 <string>https://example.edu</string>
4616 </array>
4617 <key>BlockNewRequests</key>
4618 <true/> | <false/>
4619 <key>Locked</key>
4620 <true/> | <false/>
4621 </dict>
4622 <key>Notifications</key>
4623 <dict>
4624 <key>Allow</key>
4625 <array>
4626 <string>https://example.org</string>
4627 </array>
4628 <key>Block</key>
4629 <array>
4630 <string>https://example.edu</string>
4631 </array>
4632 <key>BlockNewRequests</key>
4633 <true/>
4634 <key>Locked</key>
4635 <true/>
4636 </dict>
4637 <key>Autoplay</key>
4638 <dict>
4639 <key>Allow</key>
4640 <array>
4641 <string>https://example.org</string>
4642 </array>
4643 <key>Block</key>
4644 <array>
4645 <string>https://example.edu</string>
4646 </array>
4647 <key>Default</key>
4648 <string>allow-audio-video | block-audio | block-audio-video</string>
4649 <key>Locked</key>
4650 <true/> | <false/>
4651 </dict>
4652 </dict>
4653 </dict>
4654 ```
4655 #### policies.json
4656 ```
4657 {
4658 "policies": {
4659 "Permissions": {
4660 "Camera": {
4661 "Allow": ["https://example.org","https://example.org:1234"],
4662 "Block": ["https://example.edu"],
4663 "BlockNewRequests": true | false,
4664 "Locked": true | false
4665 },
4666 "Microphone": {
4667 "Allow": ["https://example.org"],
4668 "Block": ["https://example.edu"],
4669 "BlockNewRequests": true | false,
4670 "Locked": true | false
4671 },
4672 "Location": {
4673 "Allow": ["https://example.org"],
4674 "Block": ["https://example.edu"],
4675 "BlockNewRequests": true | false,
4676 "Locked": true | false
4677 },
4678 "Notifications": {
4679 "Allow": ["https://example.org"],
4680 "Block": ["https://example.edu"],
4681 "BlockNewRequests": true | false,
4682 "Locked": true | false
4683 },
4684 "Autoplay": {
4685 "Allow": ["https://example.org"],
4686 "Block": ["https://example.edu"],
4687 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4688 "Locked": true | false
4689 }
4690 }
4691 }
4692 }
4693 ```
4694 ### PictureInPicture
4695
4696 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4697
4698 **Compatibility:** Firefox 78, Firefox ESR 78\
4699 **CCK2 Equivalent:** N/A\
4700 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4701
4702 #### Windows (GPO)
4703 ```
4704 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4705 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4706
4707 ```
4708 #### Windows (Intune)
4709 OMA-URI:
4710 ```
4711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4712 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4713 ```
4714 Value (string):
4715 ```
4716 <enabled/> or <disabled/>
4717 ```
4718 #### macOS
4719 ```
4720 <dict>
4721 <key>PictureInPicture</key>
4722 <dict>
4723 <key>Enabled</key>
4724 <true/> | <false/>
4725 <key>Locked</key>
4726 <true/> | <false/>
4727 </dict>
4728 </dict>
4729 ```
4730 #### policies.json
4731 ```
4732 {
4733 "policies": {
4734 "PictureInPicture": {
4735 "Enabled": true | false,
4736 "Locked": true | false
4737 }
4738 }
4739 }
4740 ```
4741 ### PopupBlocking
4742 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4743
4744 `Allow` is a list of origins where popup-windows are allowed.
4745
4746 `Default` determines whether or not pop-up windows are allowed by default.
4747
4748 `Locked` prevents the user from changing pop-up preferences.
4749
4750 **Compatibility:** Firefox 60, Firefox ESR 60\
4751 **CCK2 Equivalent:** `permissions.popup`\
4752 **Preferences Affected:** `dom.disable_open_during_load`
4753
4754 #### Windows (GPO)
4755 ```
4756 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4757 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4758 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4759 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4760 ```
4761 #### Windows (Intune)
4762 OMA-URI:
4763 ```
4764 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4765 ```
4766 Value (string):
4767 ```
4768 <enabled/>
4769 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4770 ```
4771 OMA-URI:
4772 ```
4773 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4774 ```
4775 Value (string):
4776 ```
4777 <enabled/> or <disabled/>
4778 ```
4779 OMA-URI:
4780 ```
4781 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4782 ```
4783 Value (string):
4784 ```
4785 <enabled/> or <disabled/>
4786 ```
4787 #### macOS
4788 ```
4789 <dict>
4790 <key>PopupBlocking</key>
4791 <dict>
4792 <key>Allow</key>
4793 <array>
4794 <string>http://example.org</string>
4795 <string>http://example.edu</string>
4796 </array>
4797 <key>Default</key>
4798 <true/> | <false/>
4799 <key>Locked</key>
4800 <true/> | <false/>
4801 </dict>
4802 </dict>
4803 ```
4804 #### policies.json
4805 ```
4806 {
4807 "policies": {
4808 "PopupBlocking": {
4809 "Allow": ["http://example.org/",
4810 "http://example.edu/"],
4811 "Default": true | false,
4812 "Locked": true | false
4813 }
4814 }
4815 }
4816 ```
4817 ### PostQuantumKeyAgreementEnabled
4818 Enable post-quantum key agreement for TLS.
4819
4820 **Compatibility:** Firefox 127\
4821 **CCK2 Equivalent:** N/A\
4822 **Preferences Affected:** `security.tls.enable_kyber`, `network.http.http3.enable_kyber` (Firefox 128)
4823
4824 #### Windows (GPO)
4825 ```
4826 Software\Policies\Mozilla\Firefox\PostQuantumKeyAgreementEnabled = 0x1 | 0x0
4827 ```
4828 #### Windows (Intune)
4829 OMA-URI:
4830 ```
4831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PostQuantumKeyAgreementEnabled
4832 ```
4833 Value (string):
4834 ```
4835 <enabled/> or <disabled/>
4836 ```
4837 #### macOS
4838 ```
4839 <dict>
4840 <key>PostQuantumKeyAgreementEnabled</key>
4841 <true/> | <false/>
4842 </dict>
4843 ```
4844 #### policies.json
4845 ```
4846 {
4847 "policies": {
4848 "PostQuantumKeyAgreementEnabled": true | false
4849 }
4850 }
4851 ```
4852 ### Preferences
4853 Set and lock preferences.
4854
4855 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section in group policy.
4856
4857 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4858
4859 Preferences that start with the following prefixes are supported:
4860 ```
4861 accessibility.
4862 alerts.* (Firefox 122, Firefox ESR 115.7)
4863 app.update.* (Firefox 86, Firefox ESR 78.8)
4864 browser.
4865 datareporting.policy.
4866 dom.
4867 extensions.
4868 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4869 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4870 geo.
4871 gfx.
4872 intl.
4873 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4874 layers.
4875 layout.
4876 media.
4877 network.
4878 pdfjs. (Firefox 84, Firefox ESR 78.6)
4879 places.
4880 pref.
4881 print.
4882 privacy.globalprivacycontrol.enabled (Firefox 127, Firefox ESR 128.0)
4883 privacy.userContext.enabled (Firefox 126, Firefox ESR 115.11)
4884 privacy.userContext.ui.enabled (Firefox 126, Firefox ESR 115.11)
4885 signon. (Firefox 83, Firefox ESR 78.5)
4886 spellchecker. (Firefox 84, Firefox ESR 78.6)
4887 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4888 ui.
4889 widget.
4890 xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only)
4891 xpinstall.whitelist.required (Firefox 118, Firefox ESR 115.3)
4892 ```
4893 as well as the following security preferences:
4894
4895 | Preference | Type | Default
4896 | --- | --- | --- |
4897 | security.default_personal_cert | string | Ask Every Time
4898 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4899 | security.disable_button.openCertManager | string | N/A
4900 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4901 | security.disable_button.openDeviceManager | string | N/A
4902 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4903 | security.insecure_connection_text.enabled | bool | false
4904 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4905 | security.insecure_connection_text.pbmode.enabled | bool | false
4906 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4907 | security.mixed_content.block_active_content | boolean | true
4908 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, mixed active content (HTTP subresources such as scripts, fetch requests, etc. on a HTTPS page) will be blocked.
4909 | security.mixed_content.block_display_content | boolean | false
4910 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, mixed passive/display content (HTTP subresources such as images, videos, etc. on a HTTPS page) will be blocked. (Firefox 127, Firefox ESR 128.0)
4911 | security.mixed_content.upgrade_display_content | boolean | true
4912 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, mixed passive/display content (HTTP subresources such as images, videos, etc. on a HTTPS page) will be upgraded to HTTPS. (Firefox 127, Firefox ESR 128.0)
4913 | security.osclientcerts.autoload | boolean | false
4914 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4915 | security.OCSP.enabled | integer | 1
4916 | &nbsp;&nbsp;&nbsp;&nbsp;If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates.
4917 | security.OCSP.require | boolean | false
4918 | &nbsp;&nbsp;&nbsp;&nbsp; If true, if an OCSP request times out, the connection fails.
4919 | security.osclientcerts.assume_rsa_pss_support | boolean | true
4920 | &nbsp;&nbsp;&nbsp;&nbsp; If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12)
4921 | security.ssl.enable_ocsp_stapling | boolean | true
4922 | &nbsp;&nbsp;&nbsp;&nbsp; If false, OCSP stapling is not enabled.
4923 | security.ssl.errorReporting.enabled | boolean | true
4924 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4925 | security.ssl.require_safe_negotiation | boolean | false
4926 | &nbsp;&nbsp;&nbsp;&nbsp;If true, Firefox will only negotiate TLS connections with servers that indicate they support secure renegotiation. (Firefox 118, Firefox ESR 115.3)
4927 | security.tls.enable_0rtt_data | boolean | true
4928 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off. (Firefox 93, Firefox 91.2, Firefox 78.15)
4929 | security.tls.hello_downgrade_check | boolean | true
4930 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4931 | security.tls.version.enable-deprecated | boolean | false
4932 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1. (Firefox 86, Firefox 78.8)
4933 | security.warn_submit_secure_to_insecure | boolean | true
4934 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4935
4936 Using the preference as the key, set the `Value` to the corresponding preference value.
4937
4938 `Status` can be "default", "locked", "user" or "clear"
4939
4940 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4941 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4942 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4943 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4944
4945 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4946
4947 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4948
4949 You can also set the `Type` starting in Firefox 123 and Firefox ESR 115.8. It can be `number`, `boolean` or `string`. This is especially useful if you are seeing 0 or 1 values being converted to booleans when set as user preferences.
4950
4951 See the examples below for more detail.
4952
4953 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4954
4955 Status
4956 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4957 **CCK2 Equivalent:** `preferences`\
4958 **Preferences Affected:** Many
4959
4960 #### Windows (GPO)
4961 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4962 ```
4963 {
4964 "accessibility.force_disabled": {
4965 "Value": 1,
4966 "Status": "default",
4967 "Type": "number"
4968
4969 },
4970 "browser.cache.disk.parent_directory": {
4971 "Value": "SOME_NATIVE_PATH",
4972 "Status": "user"
4973 },
4974 "browser.tabs.warnOnClose": {
4975 "Value": false,
4976 "Status": "locked"
4977 }
4978 }
4979 ```
4980 #### Windows (Intune)
4981 OMA-URI:
4982 ```
4983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4984 ```
4985 Value (string):
4986 ```
4987 <enabled/>
4988 <data id="JSON" value='
4989 {
4990 "accessibility.force_disabled": {
4991 "Value": 1,
4992 "Status": "default",
4993 "Type": "number"
4994 },
4995 "browser.cache.disk.parent_directory": {
4996 "Value": "SOME_NATIVE_PATH",
4997 "Status": "user"
4998 },
4999 "browser.tabs.warnOnClose": {
5000 "Value": false,
5001 "Status": "locked"
5002 }
5003 }'/>
5004 ```
5005 #### macOS
5006 ```
5007 <dict>
5008 <key>Preferences</key>
5009 <dict>
5010 <key>accessibility.force_disabled</key>
5011 <dict>
5012 <key>Value</key>
5013 <integer>1</integer>
5014 <key>Status</key>
5015 <string>default</string>
5016 <key>Type</key>
5017 <string>number</string>
5018 </dict>
5019 <key>browser.cache.disk.parent_directory</key>
5020 <dict>
5021 <key>Value</key>
5022 <string>SOME_NATIVE_PATH</string>
5023 <key>Status</key>
5024 <string>user</string>
5025 </dict>
5026 <key>browser.tabs.warnOnClose</key>
5027 <dict>
5028 <key>Value</key>
5029 <false/>
5030 <key>Status</key>
5031 <string>locked</string>
5032 </dict>
5033 </dict>
5034 </dict>
5035 ```
5036 #### policies.json
5037 ```
5038 {
5039 "policies": {
5040 "Preferences": {
5041 "accessibility.force_disabled": {
5042 "Value": 1,
5043 "Status": "default"
5044 "Type": "number"
5045 },
5046 "browser.cache.disk.parent_directory": {
5047 "Value": "SOME_NATIVE_PATH",
5048 "Status": "user"
5049 },
5050 "browser.tabs.warnOnClose": {
5051 "Value": false,
5052 "Status": "locked"
5053 }
5054 }
5055 }
5056 }
5057 ```
5058 ### PrimaryPassword
5059 Require or prevent using a primary (formerly master) password.
5060
5061 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
5062
5063 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
5064
5065 **Compatibility:** Firefox 79, Firefox ESR 78.1\
5066 **CCK2 Equivalent:** `noMasterPassword`\
5067 **Preferences Affected:** N/A
5068
5069 #### Windows (GPO)
5070 ```
5071 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
5072 ```
5073 #### Windows (Intune)
5074 OMA-URI:
5075 ```
5076 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
5077 ```
5078 Value (string):
5079 ```
5080 <enabled/> or <disabled/>
5081 ```
5082 #### macOS
5083 ```
5084 <dict>
5085 <key>PrimaryPassword</key>
5086 <true/> | <false/>
5087 </dict>
5088 ```
5089 #### policies.json
5090 ```
5091 {
5092 "policies": {
5093 "PrimaryPassword": true | false
5094 }
5095 }
5096 ```
5097 ### PrintingEnabled
5098 Enable or disable printing.
5099
5100 **Compatibility:** Firefox 120, Firefox ESR 115.5\
5101 **CCK2 Equivalent:** N/A\
5102 **Preferences Affected:** `print.enabled`
5103
5104 #### Windows (GPO)
5105 ```
5106 Software\Policies\Mozilla\Firefox\PrintingEnabled = 0x1 | 0x0
5107 ```
5108 #### Windows (Intune)
5109 OMA-URI:
5110 ```
5111 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrintingEnabled
5112 ```
5113 Value (string):
5114 ```
5115 <enabled/> or <disabled/>
5116 ```
5117 #### macOS
5118 ```
5119 <dict>
5120 <key>PrintingEnabled</key>
5121 <true/> | <false/>
5122 </dict>
5123 ```
5124 #### policies.json
5125 ```
5126 {
5127 "policies": {
5128 "PrintingEnabled": true | false
5129 }
5130 }
5131 ```
5132 ### PromptForDownloadLocation
5133 Ask where to save each file before downloading.
5134
5135 **Compatibility:** Firefox 68, Firefox ESR 68\
5136 **CCK2 Equivalent:** N/A\
5137 **Preferences Affected:** `browser.download.useDownloadDir`
5138
5139 #### Windows (GPO)
5140 ```
5141 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
5142 ```
5143 #### Windows (Intune)
5144 OMA-URI:
5145 ```
5146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
5147 ```
5148 Value (string):
5149 ```
5150 <enabled/> or <disabled/>
5151 ```
5152 #### macOS
5153 ```
5154 <dict>
5155 <key>PromptForDownloadLocation</key>
5156 <true/> | <false/>
5157 </dict>
5158 ```
5159 #### policies.json
5160 ```
5161 {
5162 "policies": {
5163 "PromptForDownloadLocation": true | false
5164 }
5165 }
5166 ```
5167 ### Proxy
5168 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
5169 To specify ports, append them to the hostnames with a colon (:).
5170
5171 Unless you lock this policy, changes the user already has in place will take effect.
5172
5173 `Mode` is the proxy method being used.
5174
5175 `Locked` is whether or not proxy settings can be changed.
5176
5177 `HTTPProxy` is the HTTP proxy server.
5178
5179 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
5180
5181 `SSLProxy` is the SSL proxy server.
5182
5183 `FTPProxy` is the FTP proxy server.
5184
5185 `SOCKSProxy` is the SOCKS proxy server
5186
5187 `SOCKSVersion` is the SOCKS version (4 or 5)
5188
5189 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
5190
5191 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
5192
5193 `AutoLogin` means do not prompt for authentication if password is saved.
5194
5195 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
5196
5197 **Compatibility:** Firefox 60, Firefox ESR 60\
5198 **CCK2 Equivalent:** `networkProxy*`\
5199 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
5200
5201 #### Windows (GPO)
5202 ```
5203 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
5204 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
5205 Software\Policies\Mozilla\Firefox\Proxy\HTTPProxy = https://httpproxy.example.com
5206 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
5207 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
5208 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
5209 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
5210 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
5211 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
5212 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
5213 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
5214 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
5215 ```
5216 #### Windows (Intune)
5217 **Note**
5218 These setttings were moved to a category to make them easier to configure via Intune.
5219
5220 OMA-URI:
5221 ```
5222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked
5223 ```
5224 Value (string):
5225 ```
5226 <enabled/> or <disabled/>
5227 ```
5228 OMA-URI:
5229 ```
5230 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType
5231 ```
5232 Value (string):
5233 ```
5234 <enabled/>
5235 <data id="Proxy_ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5236 ```
5237 OMA-URI:
5238 ```
5239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy
5240 ```
5241 Value (string):
5242 ```
5243 <enabled/>
5244 <data id="Proxy_HTTPProxy" value="httpproxy.example.com"/>
5245 ```
5246 OMA-URI:
5247 ```
5248 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols
5249 ```
5250 Value (string):
5251 ```
5252 <enabled/> or <disabled/>
5253 ```
5254 OMA-URI:
5255 ```
5256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy
5257 ```
5258 Value (string):
5259 ```
5260 <enabled/>
5261 <data id="Proxy_SSLProxy" value="sslproxy.example.com"/>
5262 ```
5263 OMA-URI:
5264 ```
5265 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy
5266 ```
5267 Value (string):
5268 ```
5269 <enabled/>
5270 <data id="Proxy_SOCKSProxy" value="socksproxy.example.com"/>
5271 <data id="Proxy_SOCKSVersion" value="4 | 5"/>
5272 ```
5273 OMA-URI:
5274 ```
5275 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL
5276 ```
5277 Value (string):
5278 ```
5279 <enabled/>
5280 <data id="Proxy_AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5281 ```
5282 OMA-URI:
5283 ```
5284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough
5285 ```
5286 Value (string):
5287 ```
5288 <enabled/>
5289 <data id="Proxy_Passthrough" value="&lt;local&gt;"/>
5290 ```
5291 OMA-URI:
5292 ```
5293 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin
5294 ```
5295 Value (string):
5296 ```
5297 <enabled/> or <disabled/>
5298 ```
5299 OMA-URI:
5300 ```
5301 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS
5302 ```
5303 Value (string):
5304 ```
5305 <enabled/> or <disabled/>
5306 ```
5307 OMA-URI (Old way):
5308 ```
5309 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
5310 ```
5311 Value (string):
5312 ```
5313 <enabled/>
5314 <data id="ProxyLocked" value="true | false"/>
5315 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5316 <data id="HTTPProxy" value="httpproxy.example.com"/>
5317 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
5318 <data id="SSLProxy" value="sslproxy.example.com"/>
5319 <data id="FTPProxy" value="ftpproxy.example.com"/>
5320 <data id="SOCKSProxy" value="socksproxy.example.com"/>
5321 <data id="SOCKSVersion" value="4 | 5"/>
5322 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5323 <data id="Passthrough" value="<local>"/>
5324 <data id="AutoLogin" value="true | false"/>
5325 <data id="UseProxyForDNS" value="true | false"/>
5326 ```
5327 #### macOS
5328 ```
5329 <dict>
5330 <key>Proxy</key>
5331 <dict>
5332 <key>Mode</key>
5333 <string>none | system | manual | autoDetect | autoConfig</string>
5334 <key>Locked</key>
5335 <true> | </false>
5336 <key>HTTPProxy</key>
5337 <string>https://httpproxy.example.com</string>
5338 <key>UseHTTPProxyForAllProtocols</key>
5339 <true> | </false>
5340 <key>SSLProxy</key>
5341 <string>https://sslproxy.example.com</string>
5342 <key>FTPProxy</key>
5343 <string>https://ftpproxy.example.com</string>
5344 <key>SOCKSProxy</key>
5345 <string>https://socksproxy.example.com</string>
5346 <key>SOCKSVersion</key>
5347 <string>4 | 5</string>
5348 <key>Passthrough</key>
5349 <string>&lt;local>&gt;</string>
5350 <key>AutoConfigURL</key>
5351 <string>URL_TO_AUTOCONFIG</string>
5352 <key>AutoLogin</key>
5353 <true> | </false>
5354 <key>UseProxyForDNS</key>
5355 <true> | </false>
5356 </dict>
5357 </dict>
5358 ```
5359 #### policies.json
5360 ```
5361 {
5362 "policies": {
5363 "Proxy": {
5364 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
5365 "Locked": true | false,
5366 "HTTPProxy": "hostname",
5367 "UseHTTPProxyForAllProtocols": true | false,
5368 "SSLProxy": "hostname",
5369 "FTPProxy": "hostname",
5370 "SOCKSProxy": "hostname",
5371 "SOCKSVersion": 4 | 5,
5372 "Passthrough": "<local>",
5373 "AutoConfigURL": "URL_TO_AUTOCONFIG",
5374 "AutoLogin": true | false,
5375 "UseProxyForDNS": true | false
5376 }
5377 }
5378 }
5379 ```
5380 ### RequestedLocales
5381 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
5382
5383 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
5384
5385 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
5386 **CCK2 Equivalent:** N/A\
5387 **Preferences Affected:** N/A
5388 #### Windows (GPO)
5389 ```
5390 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
5391 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
5392
5393 or
5394
5395 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
5396 ```
5397 #### Windows (Intune)
5398 OMA-URI:
5399 ```
5400 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
5401 ```
5402 Value (string):
5403 ```
5404 <enabled/>
5405 <data id="Preferences_String" value="de,en-US"/>
5406 ```
5407 #### macOS
5408 ```
5409 <dict>
5410 <key>RequestedLocales</key>
5411 <array>
5412 <string>de</string>
5413 <string>en-US</string>
5414 </array>
5415 </dict>
5416
5417 or
5418
5419 <dict>
5420 <key>RequestedLocales</key>
5421 <string>de,en-US</string>
5422 </dict>
5423
5424 ```
5425 #### policies.json
5426 ```
5427 {
5428 "policies": {
5429 "RequestedLocales": ["de", "en-US"]
5430 }
5431 }
5432
5433 or
5434
5435 {
5436 "policies": {
5437 "RequestedLocales": "de,en-US"
5438 }
5439 }
5440 ```
5441 <a name="SanitizeOnShutdown"></a>
5442
5443 ### SanitizeOnShutdown (Selective)
5444 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
5445
5446 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
5447
5448 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
5449 **CCK2 Equivalent:** N/A\
5450 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5451 #### Windows (GPO)
5452 ```
5453 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
5454 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
5455 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
5456 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
5457 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
5458 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
5459 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
5460 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
5461 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
5462 ```
5463 #### Windows (Intune)
5464 OMA-URI:
5465 ```
5466 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
5467 ```
5468 Value (string):
5469 ```
5470 <enabled/> or <disabled/>
5471 ```
5472 OMA-URI:
5473 ```
5474 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
5475 ```
5476 Value (string):
5477 ```
5478 <enabled/> or <disabled/>
5479 ```
5480 OMA-URI:
5481 ```
5482 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
5483 ```
5484 Value (string):
5485 ```
5486 <enabled/> or <disabled/>
5487 ```
5488 OMA-URI:
5489 ```
5490 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
5491 ```
5492 Value (string):
5493 ```
5494 <enabled/> or <disabled/>
5495 ```
5496 OMA-URI:
5497 ```
5498 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
5499 ```
5500 Value (string):
5501 ```
5502 <enabled/> or <disabled/>
5503 ```
5504 OMA-URI:
5505 ```
5506 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
5507 ```
5508 Value (string):
5509 ```
5510 <enabled/> or <disabled/>
5511 ```
5512 OMA-URI:
5513 ```
5514 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
5515 ```
5516 Value (string):
5517 ```
5518 <enabled/> or <disabled/>
5519 ```
5520 OMA-URI:
5521 ```
5522 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
5523 ```
5524 Value (string):
5525 ```
5526 <enabled/> or <disabled/>
5527 ```
5528 OMA-URI:
5529 ```
5530 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5531 ```
5532 Value (string):
5533 ```
5534 <enabled/> or <disabled/>
5535 ```
5536 #### macOS
5537 ```
5538 <dict>
5539 <key>SanitizeOnShutdown</key>
5540 <dict>
5541 <key>Cache</key>
5542 <true/> | <false/>
5543 <key>Cookies</key>
5544 <true/> | <false/>
5545 <key>Downloads</key>
5546 <true/> | <false/>
5547 <key>FormData</key>
5548 <true/> | <false/>
5549 <key>History</key>
5550 <true/> | <false/>
5551 <key>Sessions</key>
5552 <true/> | <false/>
5553 <key>SiteSettings</key>
5554 <true/> | <false/>
5555 <key>OfflineApps</key>
5556 <true/> | <false/>
5557 <key>Locked</key>
5558 <true/> | <false/>
5559 </dict>
5560 </dict>
5561 ```
5562 #### policies.json
5563 ```
5564 {
5565 "policies": {
5566 "SanitizeOnShutdown": {
5567 "Cache": true | false,
5568 "Cookies": true | false,
5569 "Downloads": true | false,
5570 "FormData": true | false,
5571 "History": true | false,
5572 "Sessions": true | false,
5573 "SiteSettings": true | false,
5574 "OfflineApps": true | false,
5575 "Locked": true | false
5576 }
5577 }
5578 }
5579 ```
5580 ### SanitizeOnShutdown (All)
5581 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5582
5583 **Compatibility:** Firefox 60, Firefox ESR 60\
5584 **CCK2 Equivalent:** N/A\
5585 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5586 #### Windows (GPO)
5587 ```
5588 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5589 ```
5590 #### Windows (Intune)
5591 OMA-URI:
5592 ```
5593 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5594 ```
5595 Value (string):
5596 ```
5597 <enabled/> or <disabled/>
5598 ```
5599 #### macOS
5600 ```
5601 <dict>
5602 <key>SanitizeOnShutdown</key>
5603 <true/> | <false/>
5604 </dict>
5605 ```
5606 #### policies.json
5607 ```
5608 {
5609 "policies": {
5610 "SanitizeOnShutdown": true | false
5611 }
5612 }
5613 ```
5614 ### SearchBar
5615 Set whether or not search bar is displayed.
5616
5617 **Compatibility:** Firefox 60, Firefox ESR 60\
5618 **CCK2 Equivalent:** `showSearchBar`\
5619 **Preferences Affected:** N/A
5620
5621 #### Windows (GPO)
5622 ```
5623 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5624 ```
5625
5626 #### Windows (Intune)
5627 OMA-URI:
5628 ```
5629 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5630 ```
5631 Value (string):
5632 ```
5633 <enabled/>
5634 <data id="SearchBar" value="unified | separate"/>
5635 ```
5636 #### macOS
5637 ```
5638 <dict>
5639 <key>SearchBar</key>
5640 <string>unified | separate</string>
5641 </dict>
5642 ```
5643 #### policies.json
5644 ```
5645 {
5646 "policies": {
5647 "SearchBar": "unified" | "separate"
5648 }
5649 }
5650 ```
5651 <a name="SearchEngines"></a>
5652
5653 ### SearchEngines (This policy is only available on the ESR.)
5654
5655 ### SearchEngines | Add
5656
5657 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5658
5659 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5660
5661 `Name` is the name of the search engine.
5662
5663 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5664
5665 `Method` is either GET or POST
5666
5667 `IconURL` is a URL for the icon to use.
5668
5669 `Alias` is a keyword to use for the engine.
5670
5671 `Description` is a description of the search engine.
5672
5673 `PostData` is the POST data as name value pairs separated by &.
5674
5675 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5676
5677 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5678
5679 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5680 **CCK2 Equivalent:** `searchplugins`\
5681 **Preferences Affected:** N/A
5682
5683 #### Windows (GPO)
5684 ```
5685 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5686 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5687 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5688 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5689 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5690 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5691 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5692 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5693 ```
5694 #### Windows (Intune)
5695 OMA-URI:
5696 ```
5697 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5698 ```
5699 Value (string):
5700 ```
5701 <enabled/>
5702 <data id="SearchEngine_Name" value="Example1"/>
5703 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5704 <data id="SearchEngine_Method" value="GET | POST"/>
5705 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5706 <data id="SearchEngine_Alias" value="example"/>
5707 <data id="SearchEngine_Description" value="Example Description"/>
5708 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5709 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5710 ```
5711 #### macOS
5712 ```
5713 <dict>
5714 <key>SearchEngines</key>
5715 <dict>
5716 <key>Add</key>
5717 <array>
5718 <dict>
5719 <key>Name</key>
5720 <string>Example1</string>
5721 <key>URLTemplate</key>
5722 <string>https://www.example.org/q={searchTerms}</string>
5723 <key>Method</key>
5724 <string>GET | POST </string>
5725 <key>IconURL</key>
5726 <string>https://www.example.org/favicon.ico</string>
5727 <key>Alias</key>
5728 <string>example</string>
5729 <key>Description</key>
5730 <string>Example Description</string>
5731 <key>SuggestURLTemplate</key>
5732 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5733 <key>PostData</key>
5734 <string>name=value&q={searchTerms}</string>
5735 </dict>
5736 <array>
5737 </dict>
5738 </dict>
5739 ```
5740 #### policies.json
5741 ```
5742 {
5743 "policies": {
5744 "SearchEngines": {
5745 "Add": [
5746 {
5747 "Name": "Example1",
5748 "URLTemplate": "https://www.example.org/q={searchTerms}",
5749 "Method": "GET" | "POST",
5750 "IconURL": "https://www.example.org/favicon.ico",
5751 "Alias": "example",
5752 "Description": "Description",
5753 "PostData": "name=value&q={searchTerms}",
5754 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5755 }
5756 ]
5757 }
5758 }
5759 }
5760 ```
5761 ### SearchEngines | Default
5762
5763 Set the default search engine. This policy is only available on the ESR.
5764
5765 **Compatibility:** Firefox ESR 60\
5766 **CCK2 Equivalent:** `defaultSearchEngine`\
5767 **Preferences Affected:** N/A
5768
5769 #### Windows (GPO)
5770 ```
5771 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5772 ```
5773 #### Windows (Intune)
5774 OMA-URI:
5775 ```
5776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5777 ```
5778 Value (string):
5779 ```
5780 <enabled/>
5781 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5782 ```
5783 #### macOS
5784 ```
5785 <dict>
5786 <key>SearchEngines</key>
5787 <dict>
5788 <key>Default</key>
5789 <string>NAME_OF_SEARCH_ENGINE</string>
5790 </dict>
5791 </dict>
5792 ```
5793 #### policies.json
5794 ```
5795 {
5796 "policies": {
5797 "SearchEngines": {
5798 "Default": "NAME_OF_SEARCH_ENGINE"
5799 }
5800 }
5801 }
5802 ```
5803 ### SearchEngines | PreventInstalls
5804
5805 Prevent installing search engines from webpages.
5806
5807 **Compatibility:** Firefox ESR 60\
5808 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5809 **Preferences Affected:** N/A
5810
5811 #### Windows (GPO)
5812 ```
5813 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5814 ```
5815 #### Windows (Intune)
5816 OMA-URI:
5817 ```
5818 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5819 ```
5820 Value (string):
5821 ```
5822 <enabled/> or <disabled/>
5823 ```
5824 #### macOS
5825 ```
5826 <dict>
5827 <key>SearchEngines</key>
5828 <dict>
5829 <key>PreventInstalls</key>
5830 <true/> | <false/>
5831 </dict>
5832 </dict>
5833 ```
5834 #### policies.json
5835 ```
5836 {
5837 "policies": {
5838 "SearchEngines": {
5839 "PreventInstalls": true | false
5840 }
5841 }
5842 }
5843 ```
5844 ### SearchEngines | Remove
5845
5846 Hide built-in search engines. This policy is only available on the ESR.
5847
5848 **Compatibility:** Firefox ESR 60.2\
5849 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5850 **Preferences Affected:** N/A
5851
5852 #### Windows (GPO)
5853 ```
5854 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5855 ```
5856 #### Windows (Intune)
5857 OMA-URI:
5858 ```
5859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5860 ```
5861 Value (string):
5862 ```
5863 <enabled/>
5864 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5865 ```
5866 #### macOS
5867 ```
5868 <dict>
5869 <key>SearchEngines</key>
5870 <dict>
5871 <key>Remove</key>
5872 <array>
5873 <string>NAME_OF_SEARCH_ENGINE</string>
5874 </array>
5875 </dict>
5876 </dict>
5877 ```
5878 #### policies.json
5879 ```
5880 {
5881 "policies": {
5882 "SearchEngines": {
5883 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5884 }
5885 }
5886 }
5887 ```
5888 ### SearchSuggestEnabled
5889
5890 Enable search suggestions.
5891
5892 **Compatibility:** Firefox 68, Firefox ESR 68\
5893 **CCK2 Equivalent:** N/A\
5894 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5895
5896 #### Windows (GPO)
5897 ```
5898 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5899 ```
5900 #### Windows (Intune)
5901 OMA-URI:
5902 ```
5903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5904 ```
5905 Value (string):
5906 ```
5907 <enabled/> or <disabled/>
5908 ```
5909 #### macOS
5910 ```
5911 <dict>
5912 <key>SearchSuggestEnabled</key>
5913 <true/> | <false/>
5914 </dict>
5915 ```
5916 #### policies.json
5917 ```
5918 {
5919 "policies": {
5920 "SearchSuggestEnabled": true | false
5921 }
5922 }
5923 ```
5924 ### SecurityDevices
5925
5926 Add or delete PKCS #11 modules.
5927
5928 **Compatibility:** Firefox 114, Firefox ESR 112.12\
5929 **CCK2 Equivalent:** N/A\
5930 **Preferences Affected:** N/A
5931
5932 #### Windows (GPO)
5933 ```
5934 Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE
5935 Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE
5936 ```
5937 #### Windows (Intune)
5938 OMA-URI:
5939 ```
5940 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add
5941 ```
5942 Value (string):
5943 ```
5944 <enabled/>
5945 <data id="SecurityDevices" value="NAME_OF_DEVICE_TO_ADD&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5946 ```
5947 OMA-URI:
5948 ```
5949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete
5950 ```
5951 Value (string):
5952 ```
5953 <enabled/>
5954 <data id="SecurityDevices" value="1&#xF000;NAME_OF_DEVICE_TO_REMOVE"/>
5955 ```
5956 #### macOS
5957 ```
5958 <dict>
5959 <key>SecurityDevices</key>
5960 <dict>
5961 <key>Add<key>
5962 <dict>
5963 <key>NAME_OF_DEVICE_TO_ADD</key>
5964 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5965 </dict>
5966 <key>Delete</add>
5967 <array>
5968 <string>NAME_OF_DEVICE_TO_DELETE</string>
5969 </array>
5970 </dict>
5971 </dict>
5972 ```
5973 #### policies.json
5974 ```
5975 {
5976 "policies": {
5977 "SecurityDevices": {
5978 "Add": {
5979 "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE"
5980 },
5981 "Delete": ["NAME_OF_DEVICE_TO_DELETE"]
5982 }
5983 }
5984 }
5985 ```
5986 ### SecurityDevices (Deprecated)
5987
5988 Install PKCS #11 modules.
5989
5990 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5991 **CCK2 Equivalent:** `certs.devices`\
5992 **Preferences Affected:** N/A
5993
5994 #### Windows (GPO)
5995 ```
5996 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5997 ```
5998 #### Windows (Intune)
5999 OMA-URI:
6000 ```
6001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
6002 ```
6003 Value (string):
6004 ```
6005 <enabled/>
6006 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
6007 ```
6008 #### macOS
6009 ```
6010 <dict>
6011 <key>SecurityDevices</key>
6012 <dict>
6013 <key>NAME_OF_DEVICE</key>
6014 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
6015 </dict>
6016 </dict>
6017 ```
6018 #### policies.json
6019 ```
6020 {
6021 "policies": {
6022 "SecurityDevices": {
6023 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
6024 }
6025 }
6026 }
6027 ```
6028 ### ShowHomeButton
6029 Show the home button on the toolbar.
6030
6031 Future versions of Firefox will not show the home button by default.
6032
6033 **Compatibility:** Firefox 88, Firefox ESR 78.10\
6034 **CCK2 Equivalent:** N/A\
6035 **Preferences Affected:** N/A
6036
6037 #### Windows (GPO)
6038 ```
6039 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
6040 ```
6041 #### Windows (Intune)
6042 OMA-URI:
6043 ```
6044 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
6045 ```
6046 Value (string):
6047 ```
6048 <enabled/> or <disabled/>
6049 ```
6050 #### macOS
6051 ```
6052 <dict>
6053 <key>ShowHomeButton</key>
6054 <true/> | <false/>
6055 </dict>
6056 ```
6057 #### policies.json
6058 ```
6059 {
6060 "policies": {
6061 "ShowHomeButton": true | false
6062 }
6063 }
6064 ```
6065 ### SSLVersionMax
6066
6067 Set and lock the maximum version of TLS. (Firefox defaults to a maximum of TLS 1.3.)
6068
6069 **Compatibility:** Firefox 66, Firefox ESR 60.6\
6070 **CCK2 Equivalent:** N/A\
6071 **Preferences Affected:** `security.tls.version.max`
6072
6073 #### Windows (GPO)
6074 ```
6075 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6076 ```
6077 #### Windows (Intune)
6078 OMA-URI:
6079 ```
6080 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
6081 ```
6082 Value (string):
6083 ```
6084 <enabled/>
6085 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
6086 ```
6087 #### macOS
6088 ```
6089 <dict>
6090 <key>SSLVersionMax</key>
6091 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
6092 </dict>
6093 ```
6094
6095 #### policies.json
6096 ```
6097 {
6098 "policies": {
6099 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6100 }
6101 }
6102 ```
6103 ### SSLVersionMin
6104
6105 Set and lock the minimum version of TLS. (Firefox defaults to a minimum of TLS 1.2.)
6106
6107 **Compatibility:** Firefox 66, Firefox ESR 60.6\
6108 **CCK2 Equivalent:** N/A\
6109 **Preferences Affected:** `security.tls.version.min`
6110
6111 #### Windows (GPO)
6112 ```
6113 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6114 ```
6115 #### Windows (Intune)
6116 OMA-URI:
6117 ```
6118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
6119 ```
6120 Value (string):
6121 ```
6122 <enabled/>
6123 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
6124 ```
6125 #### macOS
6126 ```
6127 <dict>
6128 <key>SSLVersionMin</key>
6129 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
6130 </dict>
6131 ```
6132
6133 #### policies.json
6134 ```
6135 {
6136 "policies": {
6137 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
6138 }
6139 }
6140 ```
6141 ### StartDownloadsInTempDirectory
6142 Force downloads to start off in a local, temporary location rather than the default download directory.
6143
6144 **Compatibility:** Firefox 102\
6145 **CCK2 Equivalent:** N/A\
6146 **Preferences Affected:** `browser.download.start_downloads_in_tmp_dir`
6147
6148 #### Windows (GPO)
6149 ```
6150 Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
6151 ```
6152 #### Windows (Intune)
6153 OMA-URI:
6154 ```
6155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
6156 ```
6157 Value (string):
6158 ```
6159 <enabled/> or <disabled/>
6160 ```
6161 #### macOS
6162 ```
6163 <dict>
6164 <key>StartDownloadsInTempDirectory</key>
6165 <true/> | <false/>
6166 </dict>
6167 ```
6168 #### policies.json
6169 ```
6170 {
6171 "policies": {
6172 "StartDownloadsInTempDirectory": true | false
6173 }
6174 ```
6175 ### SupportMenu
6176 Add a menuitem to the help menu for specifying support information.
6177
6178 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
6179 **CCK2 Equivalent:** helpMenu\
6180 **Preferences Affected:** N/A
6181
6182 #### Windows (GPO)
6183 ```
6184 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
6185 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
6186 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
6187 ```
6188 #### Windows (Intune)
6189 OMA-URI:
6190 ```
6191 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
6192 ```
6193 Value (string):
6194 ```
6195 <enabled/>
6196 <data id="SupportMenuTitle" value="Support Menu"/>
6197 <data id="SupportMenuURL" value="http://example.com/support"/>
6198 <data id="SupportMenuAccessKey" value="S"/>
6199 ```
6200 #### macOS
6201 ```
6202 <dict>
6203 <key>SupportMenu</key>
6204 <dict>
6205 <key>Title</key>
6206 <string>SupportMenu</string>
6207 <key>URL</key>
6208 <string>http://example.com/support</string>
6209 <key>AccessKey</key>
6210 <string>S</string>
6211 </dict>
6212 </dict>
6213 ```
6214 #### policies.json
6215 ```
6216 {
6217 "policies": {
6218 "SupportMenu": {
6219 "Title": "Support Menu",
6220 "URL": "http://example.com/support",
6221 "AccessKey": "S"
6222 }
6223 }
6224 }
6225 ```
6226 ### TranslateEnabled
6227 Enable or disable webpage translation.
6228
6229 Note: Web page translation is done completely on the client, so there is no data or privacy risk.
6230
6231 If you only want to disable the popup, you can set the pref `browser.translations.automaticallyPopup` to false using the [Preferences](#preferences) policy.
6232
6233 **Compatibility:** Firefox 126\
6234 **CCK2 Equivalent:** N/A\
6235 **Preferences Affected:** `browser.translations.enable`
6236
6237 #### Windows (GPO)
6238 ```
6239 Software\Policies\Mozilla\Firefox\TranslateEnabled = 0x1 | 0x0
6240 ```
6241 #### Windows (Intune)
6242 OMA-URI:
6243 ```
6244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TranslateEnabled
6245 ```
6246 Value (string):
6247 ```
6248 <enabled/> or <disabled/>
6249 ```
6250 #### macOS
6251 ```
6252 <dict>
6253 <key>TranslateEnabled</key>
6254 <true/> | <false/>
6255 </dict>
6256 ```
6257 #### policies.json
6258 ```
6259 {
6260 "policies": {
6261 "TranslateEnabled": true | false
6262 }
6263 }
6264 ```
6265 ### UserMessaging
6266
6267 Prevent Firefox from messaging the user in certain situations.
6268
6269 `WhatsNew` Remove the "What's New" icon and menuitem. (*Deprecated*)
6270
6271 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
6272
6273 `FeatureRecommendations` If false, don't recommend browser features.
6274
6275 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
6276
6277 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
6278
6279 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
6280
6281 `Locked` prevents the user from changing user messaging preferences.
6282
6283 **Compatibility:** Firefox 75, Firefox ESR 68.7\
6284 **CCK2 Equivalent:** N/A\
6285 **Preferences Affected:** `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
6286
6287 #### Windows (GPO)
6288 ```
6289 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
6290 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
6291 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
6292 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
6293 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
6294 Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0
6295 ```
6296 #### Windows (Intune)
6297 OMA-URI:
6298 ```
6299 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
6300 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
6301 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
6302 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
6303 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
6304 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_Locked
6305 ```
6306 Value (string):
6307 ```
6308 <enabled/> or <disabled/>
6309 ```
6310 #### macOS
6311 ```
6312 <dict>
6313 <key>UserMessaging</key>
6314 <dict>
6315 <key>ExtensionRecommendations</key>
6316 <true/> | <false/>
6317 <key>FeatureRecommendations</key>
6318 <true/> | <false/>
6319 <key>UrlbarInterventions</key>
6320 <true/> | <false/>
6321 <key>SkipOnboarding</key>
6322 <true/> | <false/>
6323 <key>MoreFromMozilla</key>
6324 <true/> | <false/>
6325 <key>Locked</key>
6326 <true/> | <false/>
6327 </dict>
6328 </dict>
6329 ```
6330 #### policies.json
6331 ```
6332 {
6333 "policies": {
6334 "UserMessaging": {
6335 "ExtensionRecommendations": true | false,
6336 "FeatureRecommendations": true | false,
6337 "UrlbarInterventions": true | false,
6338 "SkipOnboarding": true | false,
6339 "MoreFromMozilla": true | false,
6340 "Locked": true | false
6341 }
6342 }
6343 }
6344 ```
6345 ### UseSystemPrintDialog
6346 Use the system print dialog instead of the print preview window.
6347
6348 **Compatibility:** Firefox 102\
6349 **CCK2 Equivalent:** N/A\
6350 **Preferences Affected:** `print.prefer_system_dialog`
6351
6352 #### Windows (GPO)
6353 ```
6354 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
6355 ```
6356 #### Windows (Intune)
6357 OMA-URI:
6358 ```
6359 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
6360 ```
6361 Value (string):
6362 ```
6363 <enabled/> or <disabled/>
6364 ```
6365 #### macOS
6366 ```
6367 <dict>
6368 <key>UseSystemPrintDialog</key>
6369 <true/> | <false/>
6370 </dict>
6371 ```
6372 #### policies.json
6373 ```
6374 {
6375 "policies": {
6376 "UseSystemPrintDialog": true | false
6377 }
6378 }
6379 ```
6380 ### WebsiteFilter
6381 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
6382 The arrays are limited to 1000 entries each.
6383
6384 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
6385
6386 For specific protocols, use `https://*/*` or `http://*/*`.
6387
6388 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
6389
6390 **Compatibility:** Firefox 60, Firefox ESR 60\
6391 **CCK2 Equivalent:** N/A\
6392 **Preferences Affected:** N/A
6393
6394 #### Windows (GPO)
6395 ```
6396 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
6397 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
6398 ```
6399 #### Windows (Intune)
6400 OMA-URI:
6401 ```
6402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
6403 ```
6404 Value (string):
6405 ```
6406 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
6407 ```
6408 OMA-URI:
6409 ```
6410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
6411 ```
6412 Value (string):
6413 ```
6414 <enabled/>
6415 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
6416 ```
6417 #### macOS
6418 ```
6419 <dict>
6420 <key>WebsiteFilter</key>
6421 <dict>
6422 <key>Block</key>
6423 <array>
6424 <string><all_urls></string>
6425 </array>
6426 <key>Exceptions</key>
6427 <array>
6428 <string>http://example.org/*</string>
6429 </array>
6430 </dict>
6431
6432 </dict>
6433 ```
6434 #### policies.json
6435 ```
6436 {
6437 "policies": {
6438 "WebsiteFilter": {
6439 "Block": ["<all_urls>"],
6440 "Exceptions": ["http://example.org/*"]
6441 }
6442 }
6443 }
6444 ```
6445 ### WindowsSSO
6446 Allow Windows single sign-on for Microsoft, work, and school accounts.
6447
6448 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
6449
6450 **Compatibility:** Firefox 91\
6451 **CCK2 Equivalent:** N/A\
6452 **Preferences Affected:** `network.http.windows-sso.enabled`
6453
6454 #### Windows (GPO)
6455 ```
6456 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
6457 ```
6458 #### Windows (Intune)
6459 OMA-URI:
6460 ```
6461 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
6462 ```
6463 Value (string):
6464 ```
6465 <enabled/> or <disabled/>
6466 ```
6467 #### policies.json
6468 ```
6469 {
6470 "policies": {
6471 "WindowsSSO": true | false
6472 }
6473 }
6474 ```

patrick-canterino.de