]> git.p6c8.net - policy-templates.git/blob - docs/index.md
Fix Duplicate
[policy-templates.git] / docs / index.md
1 Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
2
3 Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example:
4
5 ```
6 {
7 "policies": {
8 "Authentication": {
9 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"]
10 }
11 "Authentication_Comment": "These domains are required for us"
12 }
13 }
14 ```
15
16 | Policy Name | Description
17 | --- | --- |
18 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
19 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
20 | **[`AllowFileSelectionDialogs`](#allowfileselectiondialogs)** | Allow file selection dialogs.
21 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
22 | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
23 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
24 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
25 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
26 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
27 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
28 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
29 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
30 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
31 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
32 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
33 | **[`Certificates`](#certificates)** |
34 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
35 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
36 | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
37 | **[`Cookies`](#cookies)** | Configure cookie preferences.
38 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
39 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
40 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
41 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
42 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
43 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
44 | **[`DisableEncryptedClientHello`](#disableencryptedclienthello)** | Disable the TLS Feature Encrypted Client Hello (ECH).
45 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
46 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
47 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
48 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
49 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
50 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
51 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
52 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
53 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
54 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
55 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
56 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
57 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
58 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
59 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
60 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
61 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
62 | **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules.
63 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
64 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
65 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
66 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
67 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
68 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
69 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
70 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
71 | **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
72 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
73 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
74 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
75 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
76 | **[`FirefoxSuggest`](#firefoxsuggest)** | Customize Firefox Suggest.
77 | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
78 | **[`Handlers`](#handlers)** | Configure default application handlers.
79 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
80 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
81 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
82 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
83 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
84 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
85 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
86 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
87 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
88 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
89 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
90 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
91 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
92 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
93 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
94 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
95 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
96 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
97 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
98 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
99 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
100 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
101 | **[`Preferences`](#preferences)** | Set and lock preferences.
102 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
103 | **[`PrintingEnabled`](#printingenabled)** | Enable or disable printing.
104 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
105 | **[`Proxy`](#proxy)** | Configure proxy settings.
106 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
107 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
108 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
109 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
110 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
111 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
112 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
113 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
114 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
115 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
116 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
117 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
118 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
119 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
120 | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
121 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
122 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
123 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
124 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
125 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
126
127 ### 3rdparty
128
129 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
130
131 For GPO and Intune, the extension developer should provide an ADMX file.
132
133 **Compatibility:** Firefox 68\
134 **CCK2 Equivalent:** N/A\
135 **Preferences Affected:** N/A
136
137 #### macOS
138 ```
139 <dict>
140 <key>3rdparty</key>
141 <dict>
142 <key>Extensions</key>
143 <dict>
144 <key>uBlock0@raymondhill.net</key>
145 <dict>
146 <key>adminSettings</key>
147 <dict>
148 <key>selectedFilterLists</key>
149 <array>
150 <string>ublock-privacy</string>
151 <string>ublock-badware</string>
152 <string>ublock-filters</string>
153 <string>user-filters</string>
154 </array>
155 </dict>
156 </dict>
157 </dict>
158 </dict>
159 </dict>
160 ```
161 #### policies.json
162 ```
163 {
164 "policies": {
165 "3rdparty": {
166 "Extensions": {
167 "uBlock0@raymondhill.net": {
168 "adminSettings": {
169 "selectedFilterLists": [
170 "ublock-privacy",
171 "ublock-badware",
172 "ublock-filters",
173 "user-filters"
174 ]
175 }
176 }
177 }
178 }
179 }
180 }
181 ```
182
183 ### AllowedDomainsForApps
184
185 Define domains allowed to access Google Workspace.
186
187 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
188
189 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
190
191 **Compatibility:** Firefox 89, Firefox ESR 78.11\
192 **CCK2 Equivalent:** N/A\
193 **Preferences Affected:** N/A
194
195 #### Windows (GPO)
196 ```
197 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
198 ```
199 #### Windows (Intune)
200 OMA-URI:
201 ```
202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
203 ```
204 Value (string):
205 ```
206 <enabled/>
207 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
208 ```
209 #### macOS
210 ```
211 <dict>
212 <key>AllowedDomainsForApps</key>
213 <string>managedfirefox.com,example.com</string>
214 </dict>
215 ```
216 #### policies.json
217 ```
218 {
219 "policies": {
220 "AllowedDomainsForApps": "managedfirefox.com,example.com"
221 }
222 }
223 ```
224 ### AllowFileSelectionDialogs
225
226 Enable or disable file selection dialogs.
227
228 **Compatibility:** Firefox 124\
229 **CCK2 Equivalent:** N/A\
230 **Preferences Affected:** `widget.disable_file_pickers`
231
232 #### Windows (GPO)
233 ```
234 Software\Policies\Mozilla\Firefox\AllowFileSelectionDialogs = 0x1 | 0x0
235 ```
236 #### Windows (Intune)
237 OMA-URI:
238 ```
239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoAllowFileSelectionDialogsUpdate
240 ```
241 Value (string):
242 ```
243 <enabled/> or <disabled/>
244 ```
245 #### macOS
246 ```
247 <dict>
248 <key>AllowFileSelectionDialogs</key>
249 <true/> | <false/>
250 </dict>
251 ```
252 #### policies.json
253 ```
254 {
255 "policies": {
256 "AllowFileSelectionDialogs": true | false
257 }
258 }
259 ```
260 ### AppAutoUpdate
261
262 Enable or disable **automatic** application update.
263
264 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
265
266 If set to false, application updates are downloaded but the user can choose when to install the update.
267
268 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
269
270 **Compatibility:** Firefox 75, Firefox ESR 68.7\
271 **CCK2 Equivalent:** N/A\
272 **Preferences Affected:** `app.update.auto`
273
274 #### Windows (GPO)
275 ```
276 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
277 ```
278 #### Windows (Intune)
279 OMA-URI:
280 ```
281 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
282 ```
283 Value (string):
284 ```
285 <enabled/> or <disabled/>
286 ```
287 #### macOS
288 ```
289 <dict>
290 <key>AppAutoUpdate</key>
291 <true/> | <false/>
292 </dict>
293 ```
294 #### policies.json
295 ```
296 {
297 "policies": {
298 "AppAutoUpdate": true | false
299 }
300 }
301 ```
302 ### AppUpdatePin
303
304 Prevent Firefox from being updated beyond the specified version.
305
306 You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
307
308 You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
309
310 You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
311
312 **Compatibility:** Firefox 102,\
313 **CCK2 Equivalent:** N/A\
314 **Preferences Affected:** N/A
315
316 #### Windows (GPO)
317 ```
318 Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
319 ```
320 #### Windows (Intune)
321 OMA-URI:
322 ```
323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
324 ```
325 Value (string):
326 ```
327 <enabled/>
328 <data id="AppUpdatePin" value="106."/>
329 ```
330 #### macOS
331 ```
332 <dict>
333 <key>AppUpdatePin</key>
334 <string>106.</string>
335 </dict>
336 ```
337 #### policies.json
338 ```
339 {
340 "policies": {
341 "AppUpdatePin": "106."
342 }
343 }
344 ```
345 ### AppUpdateURL
346
347 Change the URL for application update if you are providing Firefox updates from a custom update server.
348
349 **Compatibility:** Firefox 62, Firefox ESR 60.2\
350 **CCK2 Equivalent:** N/A\
351 **Preferences Affected:** `app.update.url`
352
353 #### Windows (GPO)
354 ```
355 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
356 ```
357 #### Windows (Intune)
358 OMA-URI:
359 ```
360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
361 ```
362 Value (string):
363 ```
364 <enabled/>
365 <data id="AppUpdateURL" value="https://yoursite.com"/>
366 ```
367 #### macOS
368 ```
369 <dict>
370 <key>AppUpdateURL</key>
371 <string>https://yoursite.com</string>
372 </dict>
373 ```
374 #### policies.json
375 ```
376 {
377 "policies": {
378 "AppUpdateURL": "https://yoursite.com"
379 }
380 }
381 ```
382 ### Authentication
383
384 Configure sites that support integrated authentication.
385
386 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
387
388 `PrivateBrowsing` enables integrated authentication in private browsing.
389
390 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
391 **CCK2 Equivalent:** N/A\
392 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
393
394 #### Windows (GPO)
395 ```
396 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
397 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
398 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
399 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
400 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
401 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
402 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
403 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
404 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
405 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
406 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
407 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
408 ```
409 #### Windows (Intune)
410 OMA-URI:
411 ```
412 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
413 ```
414 Value (string):
415 ```
416 <enabled/>
417 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
418 ```
419 OMA-URI:
420 ```
421 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
422 ```
423 Value (string):
424 ```
425 <enabled/>
426 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
427 ```
428 OMA-URI:
429 ```
430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
431 ```
432 Value (string):
433 ```
434 <enabled/>
435 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
436 ```
437 OMA-URI:
438 ```
439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
440 ```
441 Value (string):
442 ```
443 <enabled/>
444 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
445 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
446 ```
447 OMA-URI:
448 ```
449 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
450 ```
451 Value (string):
452 ```
453 <enabled/> or <disabled/>
454 ```
455 OMA-URI:
456 ```
457 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
458 ```
459 Value (string):
460 ```
461 <enabled/> or <disabled/>
462 ```
463 #### macOS
464 ```
465 <dict>
466 <key>Authentication</key>
467 <dict>
468 <key>SPNEGO</key>
469 <array>
470 <string>mydomain.com</string>
471 <string>https://myotherdomain.com</string>
472 </array>
473 <key>Delegated</key>
474 <array>
475 <string>mydomain.com</string>
476 <string>https://myotherdomain.com</string>
477 </array>
478 <key>NTLM</key>
479 <array>
480 <string>mydomain.com</string>
481 <string>https://myotherdomain.com</string>
482 </array>
483 <key>AllowNonFQDN</key>
484 <dict>
485 <key>SPNEGO</key>
486 <true/> | <false/>
487 <key>NTLM</key>
488 <true/> | <false/>
489 </dict>
490 <key>AllowProxies</key>
491 <dict>
492 <key>SPNEGO</key>
493 <true/> | <false/>
494 <key>NTLM</key>
495 <true/> | <false/>
496 </dict>
497 <key>Locked</key>
498 <true/> | <false/>
499 <key>PrivateBrowsing</key>
500 <true/> | <false/>
501 </dict>
502 </dict>
503 ```
504 #### policies.json
505 ```
506 {
507 "policies": {
508 "Authentication": {
509 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
510 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
511 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
512 "AllowNonFQDN": {
513 "SPNEGO": true | false,
514 "NTLM": true | false
515 },
516 "AllowProxies": {
517 "SPNEGO": true | false,
518 "NTLM": true | false
519 },
520 "Locked": true | false,
521 "PrivateBrowsing": true | false
522 }
523 }
524 }
525 ```
526 ### AutoLaunchProtocolsFromOrigins
527 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
528
529 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
530
531 The schema is:
532 ```
533 {
534 "items": {
535 "properties": {
536 "allowed_origins": {
537 "items": {
538 "type": "string"
539 },
540 "type": "array"
541 },
542 "protocol": {
543 "type": "string"
544 }
545 },
546 "required": [
547 "protocol",
548 "allowed_origins"
549 ],
550 "type": "object"
551 },
552 "type": "array"
553 }
554 ```
555 **Compatibility:** Firefox 90, Firefox ESR 78.12\
556 **CCK2 Equivalent:** N/A\
557 **Preferences Affected:** N/A
558
559 #### Windows (GPO)
560 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
561 ```
562 [
563 {
564 "protocol": "zoommtg",
565 "allowed_origins": [
566 "https://somesite.zoom.us"
567 ]
568 }
569 ]
570 ```
571 #### Windows (Intune)
572 OMA-URI:
573 ```
574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
575 ```
576 Value (string):
577 ```
578 <enabled/>
579 <data id="JSON" value='
580 [
581 {
582 "protocol": "zoommtg",
583 "allowed_origins": [
584 "https://somesite.zoom.us"
585 ]
586 }
587 ]'/>
588 ```
589 #### macOS
590 ```
591 <dict>
592 <key>AutoLaunchProtocolsFromOrigins</key>
593 <array>
594 <dict>
595 <key>protocol</key>
596 <string>zoommtg</string>
597 <key>allowed_origins</key>
598 <array>
599 <string>https://somesite.zoom.us</string>
600 </array>
601 </dict>
602 </array>
603 </dict>
604 ```
605 #### policies.json
606 ```
607 {
608 "policies": {
609 "AutoLaunchProtocolsFromOrigins": [{
610 "protocol": "zoommtg",
611 "allowed_origins": [
612 "https://somesite.zoom.us"
613 ]
614 }]
615 }
616 }
617 ```
618 ### BackgroundAppUpdate
619
620 Enable or disable **automatic** application update **in the background**, when the application is not running.
621
622 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
623
624 If set to false, the application will not try to install updates when the application is not running.
625
626 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
627
628 If you are having trouble getting the background task to run, verify your configuration with the ["Requirements to run" section in this support document](https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows).
629
630 **Compatibility:** Firefox 90 (Windows only)\
631 **CCK2 Equivalent:** N/A\
632 **Preferences Affected:** `app.update.background.enabled`
633
634 #### Windows (GPO)
635 ```
636 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
637 ```
638 #### Windows (Intune)
639 OMA-URI:
640 ```
641 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
642 ```
643 Value (string):
644 ```
645 <enabled/> or <disabled/>
646 ```
647 #### macOS
648 ```
649 <dict>
650 <key>BackgroundAppUpdate</key>
651 <true/> | <false/>
652 </dict>
653 ```
654 #### policies.json
655 ```
656 {
657 "policies": {
658 "BackgroundAppUpdate": true | false
659 }
660 }
661 ```
662 ### BlockAboutAddons
663
664 Block access to the Add-ons Manager (about:addons).
665
666 **Compatibility:** Firefox 60, Firefox ESR 60\
667 **CCK2 Equivalent:** `disableAddonsManager`\
668 **Preferences Affected:** N/A
669
670 #### Windows (GPO)
671 ```
672 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
673 ```
674 #### Windows (Intune)
675 OMA-URI:
676 ```
677 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
678 ```
679 Value (string):
680 ```
681 <enabled/> or <disabled/>
682 ```
683 #### macOS
684 ```
685 <dict>
686 <key>BlockAboutAddons</key>
687 <true/> | <false/>
688 </dict>
689 ```
690 #### policies.json
691 ```
692 {
693 "policies": {
694 "BlockAboutAddons": true | false
695 }
696 }
697 ```
698 ### BlockAboutConfig
699
700 Block access to about:config.
701
702 **Compatibility:** Firefox 60, Firefox ESR 60\
703 **CCK2 Equivalent:** `disableAboutConfig`\
704 **Preferences Affected:** N/A
705
706 #### Windows (GPO)
707 ```
708 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
709 ```
710 #### Windows (Intune)
711 OMA-URI:
712 ```
713 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
714 ```
715 Value (string):
716 ```
717 <enabled/> or <disabled/>
718 ```
719 #### macOS
720 ```
721 <dict>
722 <key>BlockAboutConfig</key>
723 <true/> | <false/>
724 </dict>
725 ```
726 #### policies.json
727 ```
728 {
729 "policies": {
730 "BlockAboutConfig": true | false
731 }
732 }
733 ```
734 ### BlockAboutProfiles
735
736 Block access to About Profiles (about:profiles).
737
738 **Compatibility:** Firefox 60, Firefox ESR 60\
739 **CCK2 Equivalent:** `disableAboutProfiles`\
740 **Preferences Affected:** N/A
741
742 #### Windows (GPO)
743 ```
744 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
745 ```
746 #### Windows (Intune)
747 OMA-URI:
748 ```
749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
750 ```
751 Value (string):
752 ```
753 <enabled/> or <disabled/>
754 ```
755 #### macOS
756 ```
757 <dict>
758 <key>BlockAboutProfiles</key>
759 <true/> | <false/>
760 </dict>
761 ```
762 #### policies.json
763 ```
764 {
765 "policies": {
766 "BlockAboutProfiles": true | false
767 }
768 }
769 ```
770 ### BlockAboutSupport
771
772 Block access to Troubleshooting Information (about:support).
773
774 **Compatibility:** Firefox 60, Firefox ESR 60\
775 **CCK2 Equivalent:** `disableAboutSupport`\
776 **Preferences Affected:** N/A
777
778 #### Windows (GPO)
779 ```
780 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
781 ```
782 #### Windows (Intune)
783 OMA-URI:
784 ```
785 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
786 ```
787 Value (string):
788 ```
789 <enabled/> or <disabled/>
790 ```
791 #### macOS
792 ```
793 <dict>
794 <key>BlockAboutSupport</key>
795 <true/> | <false/>
796 </dict>
797 ```
798 #### policies.json
799 ```
800 {
801 "policies": {
802 "BlockAboutSupport": true | false
803 }
804 }
805 ```
806 ### Bookmarks
807
808 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
809
810 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
811
812 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
813
814 **Compatibility:** Firefox 60, Firefox ESR 60\
815 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
816 **Preferences Affected:** N/A
817
818 #### Windows (GPO)
819 ```
820 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
821 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
822 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
823 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
824 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
825
826 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
827 ```
828 []
829 ```
830
831 ```
832 #### Windows (Intune)
833 OMA-URI:
834 ```
835 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
836 ```
837 Value (string):
838 ```
839 <enabled/>
840 <data id="BookmarkTitle" value="Example"/>
841 <data id="BookmarkURL" value="https://example.com"/>
842 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
843 <data id="BookmarkPlacement" value="toolbar | menu"/>
844 <data id="BookmarkFolder" value="FolderName"/>
845 ```
846 OMA-URI:
847 ```
848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
849 ```
850 Value (string):
851 ```
852 <enabled/>
853 <data id="JSON" value='[]'/>
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>Bookmarks</key>
859 <array>
860 <dict>
861 <key>Title</key>
862 <string>Example</string>
863 <key>URL</key>
864 <string>https://example.com</string>
865 <key>Favicon</key>
866 <string>https://example.com/favicon.ico</string>
867 <key>Placement</key>
868 <string>toolbar | menu</string>
869 <key>Folder</key>
870 <string>FolderName</string>
871 </dict>
872 </array>
873 </dict>
874 ```
875 #### policies.json
876 ```
877 {
878 "policies": {
879 "Bookmarks": [
880 {
881 "Title": "Example",
882 "URL": "https://example.com",
883 "Favicon": "https://example.com/favicon.ico",
884 "Placement": "toolbar" | "menu",
885 "Folder": "FolderName"
886 }
887 ]
888 }
889 }
890 ```
891 ### CaptivePortal
892 Enable or disable the detection of captive portals.
893
894 **Compatibility:** Firefox 67, Firefox ESR 60.7\
895 **CCK2 Equivalent:** N/A\
896 **Preferences Affected:** `network.captive-portal-service.enabled`
897
898 #### Windows (GPO)
899 ```
900 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
901 ```
902 #### Windows (Intune)
903 OMA-URI:
904 ```
905 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
906 ```
907 Value (string):
908 ```
909 <enabled/> or <disabled/>
910 ```
911 #### macOS
912 ```
913 <dict>
914 <key>CaptivePortal</key>
915 <true/> | <false/>
916 </dict>
917 ```
918 #### policies.json
919 ```
920 {
921 "policies": {
922 "CaptivePortal": true | false
923 }
924 }
925 ```
926 ### Certificates
927
928 ### Certificates | ImportEnterpriseRoots
929
930 Trust certificates that have been added to the operating system certificate store by a user or administrator.
931
932 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
933
934 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
935
936 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
937 **CCK2 Equivalent:** N/A\
938 **Preferences Affected:** `security.enterprise_roots.enabled`
939
940 #### Windows (GPO)
941 ```
942 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
943 ```
944 #### Windows (Intune)
945 OMA-URI:
946 ```
947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
948 ```
949 Value (string):
950 ```
951 <enabled/> or <disabled/>
952 ```
953 #### macOS
954 ```
955 <dict>
956 <key>Certificates</key>
957 <dict>
958 <key>ImportEnterpriseRoots</key>
959 <true/> | <false/>
960 </dict>
961 </dict>
962 ```
963 #### policies.json
964 ```
965 {
966 "policies": {
967 "Certificates": {
968 "ImportEnterpriseRoots": true | false
969 }
970 }
971 }
972 ```
973 ### Certificates | Install
974
975 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
976
977 - Windows
978 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
979 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
980 - macOS
981 - /Library/Application Support/Mozilla/Certificates
982 - ~/Library/Application Support/Mozilla/Certificates
983 - Linux
984 - /usr/lib/mozilla/certificates
985 - /usr/lib64/mozilla/certificates
986 - ~/.mozilla/certificates
987
988 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
989
990 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
991
992 Certificates are installed using the trust string `CT,CT,`.
993
994 Binary (DER) and ASCII (PEM) certificates are both supported.
995
996 **Compatibility:** Firefox 64, Firefox ESR 64\
997 **CCK2 Equivalent:** `certs.ca`\
998 **Preferences Affected:** N/A
999
1000 #### Windows (GPO)
1001 ```
1002 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
1003 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
1004 ```
1005 #### Windows (Intune)
1006 OMA-URI:
1007 ```
1008 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
1009 ```
1010 Value (string):
1011 ```
1012 <enabled/>
1013 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
1014 ```
1015 #### macOS
1016 ```
1017 <dict>
1018 <key>Certificates</key>
1019 <dict>
1020 <key>Install</key>
1021 <array>
1022 <string>cert1.der</string>
1023 <string>/Users/username/cert2.pem</string>
1024 </array>
1025 </dict>
1026 </dict>
1027 ```
1028 #### policies.json
1029 ```
1030 {
1031 "policies": {
1032 "Certificates": {
1033 "Install": ["cert1.der", "/home/username/cert2.pem"]
1034 }
1035 }
1036 }
1037 ```
1038 ### Containers
1039 Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
1040
1041 Currently you can set the initial set of containers.
1042
1043 For each container, you can specify the name, icon, and color.
1044
1045 | Name | Description |
1046 | --- | --- |
1047 | `name`| Name of container
1048 | `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence`
1049 | `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar`
1050
1051 **Compatibility:** Firefox 113\
1052 **CCK2 Equivalent:** N/A\
1053 **Preferences Affected:** N/A
1054
1055 #### Windows (GPO)
1056 Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) =
1057 ```
1058 {
1059 "Default": [
1060 {
1061 "name": "My container",
1062 "icon": "pet",
1063 "color": "turquoise"
1064 }
1065 ]
1066 }
1067 ```
1068 #### Windows (Intune)
1069 OMA-URI:
1070 ```
1071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers
1072 ```
1073 Value (string):
1074 ```
1075 <enabled/>
1076 <data id="JSON" value='
1077 {
1078 "Default": [
1079 {
1080 "name": "My container",
1081 "icon": "pet",
1082 "color": "turquoise"
1083 }
1084 ]
1085 }
1086 '/>
1087 ```
1088 #### macOS
1089 ```
1090 <dict>
1091 <key>Default</key>
1092 <dict>
1093 <key>Containers</key>
1094 <array>
1095 <dict>
1096 <key>name</key>
1097 <string>My container</string>
1098 <key>icon</key>
1099 <string>pet</string>
1100 <key>color</key>
1101 <string>turquoise</string>
1102 </dict>
1103 </array>
1104 </dict>
1105 </dict>
1106 ```
1107 #### policies.json
1108 ```
1109 {
1110 "policies": {
1111 "Containers": {
1112 "Default": [
1113 {
1114 "name": "My container",
1115 "icon": "pet",
1116 "color": "turquoise"
1117 }
1118 ]
1119 }
1120 }
1121 }
1122 ```
1123 ### Cookies
1124 Configure cookie preferences.
1125
1126 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
1127
1128 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
1129
1130 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
1131
1132 `Behavior` sets the default behavior for cookies based on the values below.
1133
1134 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
1135
1136 | Value | Description
1137 | --- | --- |
1138 | accept | Accept all cookies
1139 | reject-foreign | Reject third party cookies
1140 | reject | Reject all cookies
1141 | limit-foreign | Reject third party cookies for sites you haven't visited
1142 | reject-tracker | Reject cookies for known trackers (default)
1143 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
1144
1145 `Locked` prevents the user from changing cookie preferences.
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
1148 **CCK2 Equivalent:** N/A\
1149 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
1154 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
1155 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
1156 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
1157 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
1158 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
1159 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
1160 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1161 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1162 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1163 ```
1164 #### Windows (Intune)
1165 OMA-URI:
1166 ```
1167 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
1168 ```
1169 Value (string):
1170 ```
1171 <enabled/>
1172 <data id="Permissions" value="1&#xF000;https://example.com"/>
1173 ```
1174 OMA-URI:
1175 ```
1176 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1177 ```
1178 Value (string):
1179 ```
1180 <enabled/>
1181 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1182 ```
1183 OMA-URI:
1184 ```
1185 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1186 ```
1187 Value (string):
1188 ```
1189 <enabled/>
1190 <data id="Permissions" value="1&#xF000;https://example.org"/>
1191 ```
1192 OMA-URI:
1193 ```
1194 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
1195 ```
1196 Value (string):
1197 ```
1198 <enabled/> or <disabled/>
1199 ```
1200 OMA-URI:
1201 ```
1202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
1203 ```
1204 Value (string):
1205 ```
1206 <enabled/>
1207 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
1208 ```
1209 OMA-URI:
1210 ```
1211 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
1212 ```
1213 Value (string):
1214 ```
1215 <enabled/> or <disabled/>
1216 ```
1217 OMA-URI:
1218 ```
1219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
1220 ```
1221 Value (string):
1222 ```
1223 <enabled/> or <disabled/>
1224 ```
1225 OMA-URI:
1226 ```
1227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1228 ```
1229 Value (string):
1230 ```
1231 <enabled/> or <disabled/>
1232 ```
1233 OMA-URI:
1234 ```
1235 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1236 ```
1237 Value (string):
1238 ```
1239 <enabled/>
1240 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1241 ```
1242 OMA-URI:
1243 ```
1244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1245 ```
1246 Value (string):
1247 ```
1248 <enabled/>
1249 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1250 ```
1251 #### macOS
1252 ```
1253 <dict>
1254 <key>Cookies</key>
1255 <dict>
1256 <key>Allow</key>
1257 <array>
1258 <string>http://example.com</string>
1259 </array>
1260 <key>AllowSession</key>
1261 <array>
1262 <string>http://example.edu</string>
1263 </array>
1264 <key>Block</key>
1265 <array>
1266 <string>http://example.org</string>
1267 </array>
1268 <key>Default</key>
1269 <true/> | <false/>
1270 <key>AcceptThirdParty</key>
1271 <string>always | never | from-visited</string>
1272 <key>ExpireAtSessionEnd</key>
1273 <true/> | <false/>
1274 <key>RejectTracker</key>
1275 <true/> | <false/>
1276 <key>Locked</key>
1277 <true/> | <false/>
1278 <key>Behavior</key>
1279 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1280 <key>BehaviorPrivateBrowsing</key>
1281 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1282 </dict>
1283 </dict>
1284 ```
1285 #### policies.json
1286 ```
1287 {
1288 "policies": {
1289 "Cookies": {
1290 "Allow": ["http://example.org/"],
1291 "AllowSession": ["http://example.edu/"],
1292 "Block": ["http://example.edu/"],
1293 "Default": true | false,
1294 "AcceptThirdParty": "always" | "never" | "from-visited",
1295 "ExpireAtSessionEnd": true | false,
1296 "RejectTracker": true | false,
1297 "Locked": true | false,
1298 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1299 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1300 }
1301 }
1302 }
1303 ```
1304 ### DefaultDownloadDirectory
1305 Set the default download directory.
1306
1307 You can use ${home} for the native home directory.
1308
1309 **Compatibility:** Firefox 68, Firefox ESR 68\
1310 **CCK2 Equivalent:** N/A\
1311 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1312
1313 #### Windows (GPO)
1314 ```
1315 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1316 ```
1317 #### Windows (Intune)
1318 OMA-URI:
1319 ```
1320 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1321 ```
1322 Value (string):
1323 ```
1324 <enabled/>
1325 <data id="Preferences_String" value="${home}\Downloads"/>
1326 ```
1327 #### macOS
1328 ```
1329 <dict>
1330 <key>DefaultDownloadDirectory</key>
1331 <string>${home}/Downloads</string>
1332 </dict>
1333 ```
1334 #### policies.json (macOS and Linux)
1335 ```
1336 {
1337 "policies": {
1338 "DefaultDownloadDirectory": "${home}/Downloads"
1339 }
1340 }
1341 ```
1342 #### policies.json (Windows)
1343 ```
1344 {
1345 "policies": {
1346 "DefaultDownloadDirectory": "${home}\\Downloads"
1347 }
1348 }
1349 ```
1350 ### DisableAppUpdate
1351 Turn off application updates within Firefox.
1352
1353 **Compatibility:** Firefox 60, Firefox ESR 60\
1354 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1355 **Preferences Affected:** N/A
1356
1357 #### Windows (GPO)
1358 ```
1359 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1360 ```
1361 #### Windows (Intune)
1362 OMA-URI:
1363 ```
1364 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1365 ```
1366 Value (string):
1367 ```
1368 <enabled/> or <disabled/>
1369 ```
1370 #### macOS
1371 ```
1372 <dict>
1373 <key>DisableAppUpdate</key>
1374 <true/> | <false/>
1375 </dict>
1376 ```
1377 #### policies.json
1378 ```
1379 {
1380 "policies": {
1381 "DisableAppUpdate": true | false
1382 }
1383 }
1384 ```
1385 ### DisableBuiltinPDFViewer
1386 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1387
1388 **Compatibility:** Firefox 60, Firefox ESR 60\
1389 **CCK2 Equivalent:** `disablePDFjs`\
1390 **Preferences Affected:** `pdfjs.disabled`
1391
1392 #### Windows (GPO)
1393 ```
1394 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1395 ```
1396 #### Windows (Intune)
1397 OMA-URI:
1398 ```
1399 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1400 ```
1401 Value (string):
1402 ```
1403 <enabled/> or <disabled/>
1404 ```
1405 #### macOS
1406 ```
1407 <dict>
1408 <key>DisableBuiltinPDFViewer</key>
1409 <true/> | <false/>
1410 </dict>
1411 ```
1412 #### policies.json
1413 ```
1414 {
1415 "policies": {
1416 "DisableBuiltinPDFViewer": true | false
1417 }
1418 }
1419 ```
1420 ### DisabledCiphers
1421 Disable specific cryptographic ciphers, listed below.
1422
1423 ```
1424 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1425 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1426 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1427 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1428 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1429 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1430 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1431 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1432 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1433 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1434 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1435 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1436 TLS_RSA_WITH_AES_128_GCM_SHA256
1437 TLS_RSA_WITH_AES_256_GCM_SHA384
1438 TLS_RSA_WITH_AES_128_CBC_SHA
1439 TLS_RSA_WITH_AES_256_CBC_SHA
1440 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1441 ```
1442
1443 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1444
1445 ---
1446 **Note:**
1447
1448 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1449
1450 ---
1451 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1452 **CCK2 Equivalent:** N/A\
1453 **Preferences Affected:** N/A
1454
1455 #### Windows (GPO)
1456 ```
1457 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1458 ```
1459 #### Windows (Intune)
1460 OMA-URI:
1461 ```
1462 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1463
1464 ```
1465 Value (string):
1466 ```
1467 <enabled/> or <disabled/>
1468 ```
1469 #### macOS
1470 ```
1471 <dict>
1472 <key>DisabledCiphers</key>
1473 <dict>
1474 <key>CIPHER_NAME</key>
1475 <true/> | <false/>
1476 </dict>
1477 </dict>
1478 ```
1479 #### policies.json
1480 ```
1481 {
1482 "policies": {
1483 "DisabledCiphers": {
1484 "CIPHER_NAME": true | false,
1485 }
1486 }
1487 }
1488 ```
1489 ### DisableDefaultBrowserAgent
1490 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1491
1492 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1493
1494 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1495 **CCK2 Equivalent:** N/A\
1496 **Preferences Affected:** N/A
1497
1498 #### Windows (GPO)
1499 ```
1500 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1501 ```
1502 #### Windows (Intune)
1503 OMA-URI:
1504 ```
1505 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1506 ```
1507 Value (string):
1508 ```
1509 <enabled/> or <disabled/>
1510 ```
1511 #### policies.json
1512 ```
1513 {
1514 "policies": {
1515 "DisableDefaultBrowserAgent": true | false
1516 }
1517 }
1518 ```
1519 ### DisableDeveloperTools
1520 Remove access to all developer tools.
1521
1522 **Compatibility:** Firefox 60, Firefox ESR 60\
1523 **CCK2 Equivalent:** `removeDeveloperTools`\
1524 **Preferences Affected:** `devtools.policy.disabled`
1525
1526 #### Windows (GPO)
1527 ```
1528 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1529 ```
1530 #### Windows (Intune)
1531 OMA-URI:
1532 ```
1533 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1534 ```
1535 Value (string):
1536 ```
1537 <enabled/> or <disabled/>
1538 ```
1539 #### macOS
1540 ```
1541 <dict>
1542 <key>DisableDeveloperTools</key>
1543 <true/> | <false/>
1544 </dict>
1545 ```
1546 #### policies.json
1547 ```
1548 {
1549 "policies": {
1550 "DisableDeveloperTools": true | false
1551 }
1552 }
1553 ```
1554 ### DisableFeedbackCommands
1555 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1556
1557 **Compatibility:** Firefox 60, Firefox ESR 60\
1558 **CCK2 Equivalent:** N/A\
1559 **Preferences Affected:** N/A
1560
1561 #### Windows (GPO)
1562 ```
1563 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1564 ```
1565 #### Windows (Intune)
1566 OMA-URI:
1567 ```
1568 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1569 ```
1570 Value (string):
1571 ```
1572 <enabled/> or <disabled/>
1573 ```
1574 #### macOS
1575 ```
1576 <dict>
1577 <key>DisableFeedbackCommands</key>
1578 <true/> | <false/>
1579 </dict>
1580 ```
1581 #### policies.json
1582 ```
1583 {
1584 "policies": {
1585 "DisableFeedbackCommands": true | false
1586 }
1587 }
1588 ```
1589 ### DisableEncryptedClientHello
1590 Disable the TLS Feature for Encrypted Client Hello. Note that TLS Client Hellos will still contain an ECH extension, but this extension will not be used by Firefox during the TLS handshake.
1591
1592 **Compatibility:** Firefox 127, Firefox ESR 128\
1593 **CCK2 Equivalent:** N/A\
1594 **Preferences Affected:** `network.dns.echconfig.enabled`, `network.dns.http3_echconfig.enabled`
1595
1596 #### Windows (GPO)
1597 ```
1598 Software\Policies\Mozilla\Firefox\DisableEncryptedClientHello = 0x1 | 0x0
1599 ```
1600 #### Windows (Intune)
1601 OMA-URI:
1602 ```
1603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableEncryptedClientHello
1604 ```
1605 Value (string):
1606 ```
1607 <enabled/> or <disabled/>
1608 ```
1609 #### macOS
1610 ```
1611 <dict>
1612 <key>DisableEncryptedClientHello</key>
1613 <true/> | <false/>
1614 </dict>
1615 ```
1616 #### policies.json
1617 ```
1618 {
1619 "policies": {
1620 "DisableEncryptedClientHello": true | false
1621 }
1622 }
1623 ```
1624 ### DisableFirefoxAccounts
1625 Disable Firefox Accounts integration (Sync).
1626
1627 **Compatibility:** Firefox 60, Firefox ESR 60\
1628 **CCK2 Equivalent:** `disableSync`\
1629 **Preferences Affected:** `identity.fxaccounts.enabled`
1630
1631 #### Windows (GPO)
1632 ```
1633 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1634 ```
1635 #### Windows (Intune)
1636 OMA-URI:
1637 ```
1638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1639 ```
1640 Value (string):
1641 ```
1642 <enabled/> or <disabled/>
1643 ```
1644 #### macOS
1645 ```
1646 <dict>
1647 <key>DisableFirefoxAccounts</key>
1648 <true/> | <false/>
1649 </dict>
1650 ```
1651 #### policies.json
1652 ```
1653 {
1654 "policies": {
1655 "DisableFirefoxAccounts": true | false
1656 }
1657 }
1658 ```
1659 ### DisableFirefoxScreenshots
1660 Remove access to Firefox Screenshots.
1661
1662 **Compatibility:** Firefox 60, Firefox ESR 60\
1663 **CCK2 Equivalent:** N/A\
1664 **Preferences Affected:** `extensions.screenshots.disabled`
1665
1666 #### Windows (GPO)
1667 ```
1668 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1669 ```
1670 #### Windows (Intune)
1671 OMA-URI:
1672 ```
1673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1674 ```
1675 Value (string):
1676 ```
1677 <enabled/> or <disabled/>
1678 ```
1679 #### macOS
1680 ```
1681 <dict>
1682 <key>DisableFirefoxScreenshots</key>
1683 <true/> | <false/>
1684 </dict>
1685 ```
1686 #### policies.json
1687 ```
1688 {
1689 "policies": {
1690 "DisableFirefoxScreenshots": true | false
1691 }
1692 }
1693 ```
1694 ### DisableFirefoxStudies
1695 Disable Firefox studies (Shield).
1696
1697 **Compatibility:** Firefox 60, Firefox ESR 60\
1698 **CCK2 Equivalent:** N/A\
1699 **Preferences Affected:** N/A
1700
1701 #### Windows (GPO)
1702 ```
1703 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1704 ```
1705 #### Windows (Intune)
1706 OMA-URI:
1707 ```
1708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1709 ```
1710 Value (string):
1711 ```
1712 <enabled/> or <disabled/>
1713 ```
1714 #### macOS
1715 ```
1716 <dict>
1717 <key>DisableFirefoxStudies</key>
1718 <true/> | <false/>
1719 </dict>
1720 ```
1721 #### policies.json
1722 ```
1723 {
1724 "policies": {
1725 "DisableFirefoxStudies": true | false
1726 }
1727 }
1728 ```
1729 ### DisableForgetButton
1730 Disable the "Forget" button.
1731
1732 **Compatibility:** Firefox 60, Firefox ESR 60\
1733 **CCK2 Equivalent:** `disableForget`\
1734 **Preferences Affected:** N/A
1735
1736 #### Windows (GPO)
1737 ```
1738 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1739 ```
1740 #### Windows (Intune)
1741 OMA-URI:
1742 ```
1743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1744 ```
1745 Value (string):
1746 ```
1747 <enabled/> or <disabled/>
1748 ```
1749 #### macOS
1750 ```
1751 <dict>
1752 <key>DisableForgetButton</key>
1753 <true/> | <false/>
1754 </dict>
1755 ```
1756 #### policies.json
1757 ```
1758 {
1759 "policies": {
1760 "DisableForgetButton": true | false
1761 }
1762 }
1763 ```
1764 ### DisableFormHistory
1765 Turn off saving information on web forms and the search bar.
1766
1767 **Compatibility:** Firefox 60, Firefox ESR 60\
1768 **CCK2 Equivalent:** `disableFormFill`\
1769 **Preferences Affected:** `browser.formfill.enable`
1770
1771 #### Windows (GPO)
1772 ```
1773 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1774 ```
1775 #### Windows (Intune)
1776 OMA-URI:
1777 ```
1778 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1779 ```
1780 Value (string):
1781 ```
1782 <enabled/> or <disabled/>
1783 ```
1784 #### macOS
1785 ```
1786 <dict>
1787 <key>DisableFormHistory</key>
1788 <true/> | <false/>
1789 </dict>
1790 ```
1791 #### policies.json
1792 ```
1793 {
1794 "policies": {
1795 "DisableFormHistory": true | false
1796 }
1797 }
1798 ```
1799 ### DisableMasterPasswordCreation
1800 Remove the master password functionality.
1801
1802 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1803
1804 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1805
1806 **Compatibility:** Firefox 60, Firefox ESR 60\
1807 **CCK2 Equivalent:** `noMasterPassword`\
1808 **Preferences Affected:** N/A
1809
1810 #### Windows (GPO)
1811 ```
1812 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1813 ```
1814 #### Windows (Intune)
1815 OMA-URI:
1816 ```
1817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1818 ```
1819 Value (string):
1820 ```
1821 <enabled/> or <disabled/>
1822 ```
1823 #### macOS
1824 ```
1825 <dict>
1826 <key>DisableMasterPasswordCreation</key>
1827 <true/> | <false/>
1828 </dict>
1829 ```
1830 #### policies.json
1831 ```
1832 {
1833 "policies": {
1834 "DisableMasterPasswordCreation": true | false
1835 }
1836 }
1837 ```
1838 ### DisablePasswordReveal
1839 Do not allow passwords to be shown in saved logins
1840
1841 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1842 **CCK2 Equivalent:** N/A
1843 **Preferences Affected:** N/A
1844
1845 #### Windows (GPO)
1846 ```
1847 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1848 ```
1849 #### Windows (Intune)
1850 OMA-URI:
1851 ```
1852 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1853 ```
1854 Value (string):
1855 ```
1856 <enabled/> or <disabled/>
1857 ```
1858 #### macOS
1859 ```
1860 <dict>
1861 <key>DisablePasswordReveal</key>
1862 <true/> | <false/>
1863 </dict>
1864 ```
1865 #### policies.json
1866 ```
1867 {
1868 "policies": {
1869 "DisablePasswordReveal": true | false
1870 }
1871 }
1872 ```
1873 ### DisablePocket
1874 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1875
1876 **Compatibility:** Firefox 60, Firefox ESR 60\
1877 **CCK2 Equivalent:** `disablePocket`\
1878 **Preferences Affected:** `extensions.pocket.enabled`
1879
1880 #### Windows (GPO)
1881 ```
1882 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1883 ```
1884 #### Windows (Intune)
1885 OMA-URI:
1886 ```
1887 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1888 ```
1889 Value (string):
1890 ```
1891 <enabled/> or <disabled/>
1892 ```
1893 #### macOS
1894 ```
1895 <dict>
1896 <key>DisablePocket</key>
1897 <true/> | <false/>
1898 </dict>
1899 ```
1900 #### policies.json
1901 ```
1902 {
1903 "policies": {
1904 "DisablePocket": true | false
1905 }
1906 }
1907 ```
1908 ### DisablePrivateBrowsing
1909 Remove access to private browsing.
1910
1911 **Compatibility:** Firefox 60, Firefox ESR 60\
1912 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1913 **Preferences Affected:** N/A
1914
1915 #### Windows (GPO)
1916 ```
1917 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1918 ```
1919 #### Windows (Intune)
1920 OMA-URI:
1921 ```
1922 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1923 ```
1924 Value (string):
1925 ```
1926 <enabled/> or <disabled/>
1927 ```
1928 #### macOS
1929 ```
1930 <dict>
1931 <key>DisablePrivateBrowsing</key>
1932 <true/> | <false/>
1933 </dict>
1934 ```
1935 #### policies.json
1936 ```
1937 {
1938 "policies": {
1939 "DisablePrivateBrowsing": true | false
1940 }
1941 }
1942 ```
1943 ### DisableProfileImport
1944 Disables the "Import data from another browser" option in the bookmarks window.
1945
1946 **Compatibility:** Firefox 60, Firefox ESR 60\
1947 **CCK2 Equivalent:** N/A\
1948 **Preferences Affected:** N/A
1949
1950 #### Windows (GPO)
1951 ```
1952 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1953 ```
1954 #### Windows (Intune)
1955 OMA-URI:
1956 ```
1957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1958 ```
1959 Value (string):
1960 ```
1961 <enabled/> or <disabled/>
1962 ```
1963 #### macOS
1964 ```
1965 <dict>
1966 <key>DisableProfileImport</key>
1967 <true/> | <false/>
1968 </dict>
1969 ```
1970 #### policies.json
1971 ```
1972 {
1973 "policies": {
1974 "DisableProfileImport": true | false
1975 }
1976 }
1977 ```
1978 ### DisableProfileRefresh
1979 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1980
1981 **Compatibility:** Firefox 60, Firefox ESR 60\
1982 **CCK2 Equivalent:** `disableResetFirefox`\
1983 **Preferences Affected:** `browser.disableResetPrompt`
1984
1985 #### Windows (GPO)
1986 ```
1987 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1988 ```
1989 #### Windows (Intune)
1990 OMA-URI:
1991 ```
1992 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1993 ```
1994 Value (string):
1995 ```
1996 <enabled/> or <disabled/>
1997 ```
1998 #### macOS
1999 ```
2000 <dict>
2001 <key>DisableProfileRefresh</key>
2002 <true/> | <false/>
2003 </dict>
2004 ```
2005 #### policies.json
2006 ```
2007 {
2008 "policies": {
2009 "DisableProfileRefresh": true | false
2010 }
2011 }
2012 ```
2013 ### DisableSafeMode
2014 Disable safe mode within the browser.
2015
2016 On Windows, this disables safe mode via the command line as well.
2017
2018 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
2019 **CCK2 Equivalent:** `disableSafeMode`\
2020 **Preferences Affected:** N/A
2021
2022 #### Windows (GPO)
2023 ```
2024 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
2025 ```
2026 #### Windows (Intune)
2027 OMA-URI:
2028 ```
2029 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
2030 ```
2031 Value (string):
2032 ```
2033 <enabled/> or <disabled/>
2034 ```
2035 #### macOS
2036 ```
2037 <dict>
2038 <key>DisableSafeMode</key>
2039 <true/> | <false/>
2040 </dict>
2041 ```
2042 #### policies.json
2043 ```
2044 {
2045 "policies": {
2046 "DisableSafeMode": true | false
2047 }
2048 }
2049 ```
2050 ### DisableSecurityBypass
2051 Prevent the user from bypassing security in certain cases.
2052
2053 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
2054
2055 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
2056
2057 These policies only affect what happens when an error is shown, they do not affect any settings in preferences.
2058
2059 **Compatibility:** Firefox 60, Firefox ESR 60\
2060 **CCK2 Equivalent:** N/A\
2061 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
2062
2063 #### Windows (GPO)
2064 ```
2065 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
2066 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
2067 ```
2068 #### Windows (Intune)
2069 OMA-URI:
2070 ```
2071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
2072 ```
2073 Value (string):
2074 ```
2075 <enabled/> or <disabled/>
2076 ```
2077 OMA-URI:
2078 ```
2079 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
2080 ```
2081 Value (string):
2082 ```
2083 <enabled/> or <disabled/>
2084 ```
2085
2086 #### macOS
2087 ```
2088 <dict>
2089 <key>DisableSecurityBypass</key>
2090 <dict>
2091 <key>InvalidCertificate</key>
2092 <true/> | <false/>
2093 <key>SafeBrowsing</key>
2094 <true/> | <false/>
2095 </dict>
2096 </dict>
2097 ```
2098 #### policies.json
2099 ```
2100 {
2101 "policies": {
2102 "DisableSecurityBypass": {
2103 "InvalidCertificate": true | false,
2104 "SafeBrowsing": true | false
2105 }
2106 }
2107 }
2108 ```
2109 ### DisableSetDesktopBackground
2110 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
2111
2112 **Compatibility:** Firefox 60, Firefox ESR 60\
2113 **CCK2 Equivalent:** `removeSetDesktopBackground`\
2114 **Preferences Affected:** N/A
2115
2116 #### Windows (GPO)
2117 ```
2118 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
2119 ```
2120 #### Windows (Intune)
2121 OMA-URI:
2122 ```
2123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
2124 ```
2125 Value (string):
2126 ```
2127 <enabled/> or <disabled/>
2128 ```
2129 #### macOS
2130 ```
2131 <dict>
2132 <key>DisableSetDesktopBackground</key>
2133 <true/> | <false/>
2134 </dict>
2135 ```
2136 #### policies.json
2137 ```
2138 {
2139 "policies": {
2140 "DisableSetDesktopBackground": true | false
2141 }
2142 }
2143 ```
2144 ### DisableSystemAddonUpdate
2145 Prevent system add-ons from being installed or updated.
2146
2147 **Compatibility:** Firefox 60, Firefox ESR 60\
2148 **CCK2 Equivalent:** N/A\
2149 **Preferences Affected:** N/A
2150
2151 #### Windows (GPO)
2152 ```
2153 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
2154 ```
2155 #### Windows (Intune)
2156 OMA-URI:
2157 ```
2158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
2159 ```
2160 Value (string):
2161 ```
2162 <enabled/> or <disabled/>
2163 ```
2164 #### macOS
2165 ```
2166 <dict>
2167 <key>DisableSystemAddonUpdate</key>
2168 <true/> | <false/>
2169 </dict>
2170 ```
2171 #### policies.json
2172 ```
2173 {
2174 "policies": {
2175 "DisableSystemAddonUpdate": true | false
2176 }
2177 }
2178 ```
2179 ### DisableTelemetry
2180 Prevent the upload of telemetry data.
2181
2182 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
2183
2184 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
2185
2186 **Compatibility:** Firefox 60, Firefox ESR 60\
2187 **CCK2 Equivalent:** `disableTelemetry`\
2188 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
2189
2190 #### Windows (GPO)
2191 ```
2192 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
2193 ```
2194 #### Windows (Intune)
2195 OMA-URI:
2196 ```
2197 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
2198 ```
2199 Value (string):
2200 ```
2201 <enabled/> or <disabled/>
2202 ```
2203 #### macOS
2204 ```
2205 <dict>
2206 <key>DisableTelemetry</key>
2207 <true/> | <false/>
2208 </dict>
2209 ```
2210 #### policies.json
2211 ```
2212 {
2213 "policies": {
2214 "DisableTelemetry": true | false
2215 }
2216 }
2217 ```
2218 ### DisableThirdPartyModuleBlocking
2219 Do not allow blocking third-party modules from the `about:third-party` page.
2220
2221 This policy only works on Windows through GPO (not policies.json).
2222
2223 **Compatibility:** Firefox 110 (Windows only, GPO only)\
2224 **CCK2 Equivalent:** N/A\
2225 **Preferences Affected:** N/A
2226
2227 #### Windows (GPO)
2228 ```
2229 Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0
2230 ```
2231 #### Windows (Intune)
2232 OMA-URI:
2233 ```
2234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking
2235 ```
2236 Value (string):
2237 ```
2238 <enabled/> or <disabled/>
2239 ```
2240 ### DisplayBookmarksToolbar
2241 Set the initial state of the bookmarks toolbar. A user can still change how it is displayed.
2242
2243 `always` means the bookmarks toolbar is always shown.
2244
2245 `never` means the bookmarks toolbar is not shown.
2246
2247 `newtab` means the bookmarks toolbar is only shown on the new tab page.
2248
2249 **Compatibility:** Firefox 109, Firefox ESR 102.7\
2250 **CCK2 Equivalent:** N/A\
2251 **Preferences Affected:** N/A
2252
2253 #### Windows (GPO)
2254 ```
2255 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab"
2256 ```
2257 #### Windows (Intune)
2258 OMA-URI:
2259 ```
2260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum
2261 ```
2262 Value (string):
2263 ```
2264 <enabled/>
2265 <data id="DisplayBookmarksToolbar" value="always | never | newtab"/>
2266 ```
2267 #### macOS
2268 ```
2269 <dict>
2270 <key>DisplayBookmarksToolbar</key>
2271 <string>always | never | newtab</string>
2272 </dict>
2273 ```
2274 #### policies.json
2275 ```
2276 {
2277 "policies": {
2278 "DisplayBookmarksToolbar": "always" | "never" | "newtab"
2279 }
2280 }
2281 ```
2282 ### DisplayMenuBar
2283 Set the state of the menubar.
2284
2285 `always` means the menubar is shown and cannot be hidden.
2286
2287 `never` means the menubar is hidden and cannot be shown.
2288
2289 `default-on` means the menubar is on by default but can be hidden.
2290
2291 `default-off` means the menubar is off by default but can be shown.
2292
2293 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2294 **CCK2 Equivalent:** `displayMenuBar`\
2295 **Preferences Affected:** N/A
2296
2297 #### Windows (GPO)
2298 ```
2299 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2300 ```
2301 #### Windows (Intune)
2302 OMA-URI:
2303 ```
2304 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2305 ```
2306 Value (string):
2307 ```
2308 <enabled/>
2309 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2310 ```
2311 #### macOS
2312 ```
2313 <dict>
2314 <key>DisplayMenuBar</key>
2315 <string>always | never | default-on | default-off</string>
2316 </dict>
2317 ```
2318 #### policies.json
2319 ```
2320 {
2321 "policies": {
2322 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2323 }
2324 }
2325 ```
2326 ### DNSOverHTTPS
2327 Configure DNS over HTTPS.
2328
2329 `Enabled` determines whether DNS over HTTPS is enabled
2330
2331 `ProviderURL` is a URL to another provider.
2332
2333 `Locked` prevents the user from changing DNS over HTTPS preferences.
2334
2335 `ExcludedDomains` excludes domains from DNS over HTTPS.
2336
2337 `Fallback` determines whether or not Firefox will use your default DNS resolver if there is a problem with the secure DNS provider.
2338
2339 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7) (Fallback added in 124)\
2340 **CCK2 Equivalent:** N/A\
2341 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2342
2343 #### Windows (GPO)
2344 ```
2345 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2346 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2347 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2348 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2349 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Fallback = 0x1 | 0x0
2350 ```
2351 #### Windows (Intune)
2352 OMA-URI:
2353 ```
2354 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2355 ```
2356 Value (string):
2357 ```
2358 <enabled/> or <disabled/>
2359 ```
2360 OMA-URI:
2361 ```
2362 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2363 ```
2364 Value (string):
2365 ```
2366 <enabled/>
2367 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2368 ```
2369 OMA-URI:
2370 ```
2371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2372 ```
2373 Value (string):
2374 ```
2375 <enabled/> or <disabled/>
2376 ```
2377 OMA-URI:
2378 ```
2379 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2380 ```
2381 Value (string):
2382 ```
2383 <enabled/>
2384 <data id="List" value="1&#xF000;example.com"/>
2385 ```
2386 OMA-URI:
2387 ```
2388 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Fallback
2389 ```
2390 Value (string):
2391 ```
2392 <enabled/> or <disabled/>
2393 ```
2394 #### macOS
2395 ```
2396 <dict>
2397 <key>DNSOverHTTPS</key>
2398 <dict>
2399 <key>Enabled</key>
2400 <true/> | <false/>
2401 <key>ProviderURL</key>
2402 <string>URL_TO_ALTERNATE_PROVIDER</string>
2403 <key>Locked</key>
2404 <true/> | <false/>
2405 <key>ExcludedDomains</key>
2406 <array>
2407 <string>example.com</string>
2408 </array>
2409 <key>Fallback</key>
2410 <true/> | <false/>
2411 </dict>
2412 </dict>
2413 ```
2414 #### policies.json
2415 ```
2416 {
2417 "policies": {
2418 "DNSOverHTTPS": {
2419 "Enabled": true | false,
2420 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2421 "Locked": true | false,
2422 "ExcludedDomains": ["example.com"],
2423 "Fallback": true | false,
2424 }
2425 }
2426 }
2427 ```
2428 ### DontCheckDefaultBrowser
2429 Don't check if Firefox is the default browser at startup.
2430
2431 **Compatibility:** Firefox 60, Firefox ESR 60\
2432 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2433 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2434
2435 #### Windows (GPO)
2436 ```
2437 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2438 ```
2439 #### Windows (Intune)
2440 OMA-URI:
2441 ```
2442 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2443 ```
2444 Value (string):
2445 ```
2446 <enabled/> or <disabled/>
2447 ```
2448 #### macOS
2449 ```
2450 <dict>
2451 <key>DontCheckDefaultBrowser</key>
2452 <true/> | <false/>
2453 </dict>
2454 ```
2455 #### policies.json
2456 ```
2457 {
2458 "policies": {
2459 "DontCheckDefaultBrowser": true | false
2460 }
2461 }
2462 ```
2463 ### DownloadDirectory
2464 Set and lock the download directory.
2465
2466 You can use ${home} for the native home directory.
2467
2468 **Compatibility:** Firefox 68, Firefox ESR 68\
2469 **CCK2 Equivalent:** N/A\
2470 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2471
2472 #### Windows (GPO)
2473 ```
2474 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2475 ```
2476 #### Windows (Intune)
2477 OMA-URI:
2478 ```
2479 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2480 ```
2481 Value (string):
2482 ```
2483 <enabled/>
2484 <data id="Preferences_String" value="${home}\Downloads"/>
2485 ```
2486 #### macOS
2487 ```
2488 <dict>
2489 <key>DownloadDirectory</key>
2490 <string>${home}/Downloads</string>
2491 </dict>
2492 ```
2493 #### policies.json (macOS and Linux)
2494 ```
2495 {
2496 "policies": {
2497 "DownloadDirectory": "${home}/Downloads"
2498 }
2499 ```
2500 #### policies.json (Windows)
2501 ```
2502 {
2503 "policies": {
2504 "DownloadDirectory": "${home}\\Downloads"
2505 }
2506 ```
2507 ### EnableTrackingProtection
2508 Configure tracking protection.
2509
2510 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2511
2512 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2513
2514 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2515
2516 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2517
2518 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2519
2520 If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112)
2521
2522 `Exceptions` are origins for which tracking protection is not enabled.
2523
2524 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2525 **CCK2 Equivalent:** N/A\
2526 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2527
2528 #### Windows (GPO)
2529 ```
2530 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2531 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2532 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2533 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2534 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2535 ```
2536 #### Windows (Intune)
2537 OMA-URI:
2538 ```
2539 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2540 ```
2541 Value (string):
2542 ```
2543 <enabled/> or <disabled/>
2544 ```
2545 OMA-URI:
2546 ```
2547 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2548 ```
2549 Value (string):
2550 ```
2551 <enabled/> or <disabled/>
2552 ```
2553 OMA-URI:
2554 ```
2555 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2556 ```
2557 Value (string):
2558 ```
2559 <enabled/> or <disabled/>
2560 ```
2561 OMA-URI:
2562 ```
2563 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2564 ```
2565 Value (string):
2566 ```
2567 <enabled/>
2568 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2569 ```
2570 OMA-URI:
2571 ```
2572 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2573 ```
2574 Value (string):
2575 ```
2576 <enabled/> or <disabled/>
2577 ```
2578 #### macOS
2579 ```
2580 <dict>
2581 <key>EnableTrackingProtection</key>
2582 <dict>
2583 <key>Value</key>
2584 <true/> | <false/>
2585 <key>Locked</key>
2586 <true/> | <false/>
2587 <key>Cryptomining</key>
2588 <true/> | <false/>
2589 <key>Fingerprinting</key>
2590 <true/> | <false/>
2591 <key>Exceptions</key>
2592 <array>
2593 <string>https://example.com</string>
2594 </array>
2595 </dict>
2596 </dict>
2597 ```
2598 #### policies.json
2599 ```
2600 {
2601 "policies": {
2602 "EnableTrackingProtection": {
2603 "Value": true | false,
2604 "Locked": true | false,
2605 "Cryptomining": true | false,
2606 "Fingerprinting": true | false,
2607 "Exceptions": ["https://example.com"]
2608 }
2609 }
2610 }
2611 ```
2612 ### EncryptedMediaExtensions
2613 Enable or disable Encrypted Media Extensions and optionally lock it.
2614
2615 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2616
2617 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2618
2619 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2620 **CCK2 Equivalent:** N/A\
2621 **Preferences Affected:** `media.eme.enabled`
2622
2623 #### Windows (GPO)
2624 ```
2625 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2626 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2627 ```
2628 #### Windows (Intune)
2629 OMA-URI:
2630 ```
2631 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2632 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2633 ```
2634 Value (string):
2635 ```
2636 <enabled/>or <disabled/>
2637 ```
2638 #### macOS
2639 ```
2640 <dict>
2641 <key>EncryptedMediaExtensions</key>
2642 <dict>
2643 <key>Enabled</key>
2644 <true/> | <false/>
2645 <key>Locked</key>
2646 <true/> | <false/>
2647 </dict>
2648 </dict>
2649 ```
2650 #### policies.json
2651 ```
2652 {
2653 "policies": {
2654 "EncryptedMediaExtensions": {
2655 "Enabled": true | false,
2656 "Locked": true | false
2657 }
2658 }
2659 }
2660 ```
2661 ### EnterprisePoliciesEnabled
2662 Enable policy support on macOS.
2663
2664 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2665 **CCK2 Equivalent:** N/A\
2666 **Preferences Affected:** N/A
2667
2668 #### macOS
2669 ```
2670 <dict>
2671 <key>EnterprisePoliciesEnabled</key>
2672 <true/>
2673 </dict>
2674 ```
2675 ### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2676
2677 Disable warnings based on file extension for specific file types on domains.
2678
2679 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
2680
2681 Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
2682
2683 **Compatibility:** Firefox 102\
2684 **CCK2 Equivalent:** N/A\
2685 **Preferences Affected:** N/A
2686
2687 #### Windows (GPO)
2688 Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
2689 ```
2690 [
2691 {
2692 "file_extension": "jnlp",
2693 "domains": ["example.com"]
2694 }
2695 ]
2696 ```
2697 #### Windows (Intune)
2698 OMA-URI:
2699 ```
2700 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2701 ```
2702 Value (string):
2703 ```
2704 <enabled/>
2705 <data id="JSON" value='
2706 [
2707 {
2708 "file_extension": "jnlp",
2709 "domains": ["example.com"]
2710 }
2711 ]
2712 '/>
2713 ```
2714 #### macOS
2715 ```
2716 <dict>
2717 <key>ExemptDomainFileTypePairsFromFileTypeDownloadWarnings</key>
2718 <array>
2719 <dict>
2720 <key>file_extension</key>
2721 <string>jnlp</string>
2722 <key>domains</key>
2723 <array>
2724 <string>example.com</string>
2725 </array>
2726 </dict>
2727 </array>
2728 </dict>
2729 ```
2730 #### policies.json
2731 ```
2732 {
2733 "policies": {
2734 "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
2735 "file_extension": "jnlp",
2736 "domains": ["example.com"]
2737 }]
2738 }
2739 }
2740 ```
2741 ### Extensions
2742 Control the installation, uninstallation and locking of extensions.
2743
2744 We strongly recommend that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2745
2746 This method will be deprecated in the near future.
2747
2748 `Install` is a list of URLs or native paths for extensions to be installed.
2749
2750 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2751
2752 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2753
2754 **Compatibility:** Firefox 60, Firefox ESR 60\
2755 **CCK2 Equivalent:** `addons`\
2756 **Preferences Affected:** N/A
2757
2758 #### Windows (GPO)
2759 ```
2760 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2761 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2762 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2763 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2764 ```
2765 #### Windows (Intune)
2766 OMA-URI:
2767 ```
2768 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2769 ```
2770 Value (string):
2771 ```
2772 <enabled/>
2773 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2774 ```
2775 OMA-URI:
2776 ```
2777 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2778 ```
2779 Value (string):
2780 ```
2781 <enabled/>
2782 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2783 ```
2784 OMA-URI:
2785 ```
2786 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2787 ```
2788 Value (string):
2789 ```
2790 <enabled/>
2791 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2792 ```
2793 #### macOS
2794 ```
2795 <dict>
2796 <key>Extensions</key>
2797 <dict>
2798 <key>Install</key>
2799 <array>
2800 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2801 <string>//path/to/xpi</string>
2802 </array>
2803 <key>Uninstall</key>
2804 <array>
2805 <string>bad_addon_id@mozilla.org</string>
2806 </array>
2807 <key>Locked</key>
2808 <array>
2809 <string>addon_id@mozilla.org</string>
2810 </array>
2811 </dict>
2812 </dict>
2813 ```
2814 #### policies.json
2815 ```
2816 {
2817 "policies": {
2818 "Extensions": {
2819 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2820 "Uninstall": ["bad_addon_id@mozilla.org"],
2821 "Locked": ["addon_id@mozilla.org"]
2822 }
2823 }
2824 }
2825 ```
2826 ### ExtensionSettings
2827 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2828
2829 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2830
2831 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2832
2833 The configuration for each extension is another dictionary that can contain the fields documented below.
2834
2835 | Name | Description |
2836 | --- | --- |
2837 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2838 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2839 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2840 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2841 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2842 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2843 | `install_sources` | A list of sources from which installing extensions is allowed using URL match patterns. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2844 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2845 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2846 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2847 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2848 | `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`.
2849
2850 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2851 **CCK2 Equivalent:** N/A\
2852 **Preferences Affected:** N/A
2853
2854 #### Windows (GPO)
2855 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2856 ```
2857 {
2858 "*": {
2859 "blocked_install_message": "Custom error message.",
2860 "install_sources": ["https://yourwebsite.com/*"],
2861 "installation_mode": "blocked",
2862 "allowed_types": ["extension"]
2863 },
2864 "uBlock0@raymondhill.net": {
2865 "installation_mode": "force_installed",
2866 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2867 },
2868 "https-everywhere@eff.org": {
2869 "installation_mode": "allowed",
2870 "updates_disabled": false
2871 }
2872 }
2873 ```
2874 #### Windows (Intune)
2875 OMA-URI:
2876 ```
2877 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2878 ```
2879 Value (string):
2880 ```
2881 <enabled/>
2882 <data id="ExtensionSettings" value='
2883 {
2884 "*": {
2885 "blocked_install_message": "Custom error message.",
2886 "install_sources": ["https://yourwebsite.com/*"],
2887 "installation_mode": "blocked",
2888 "allowed_types": ["extension"]
2889 },
2890 "uBlock0@raymondhill.net": {
2891 "installation_mode": "force_installed",
2892 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2893 },
2894 "https-everywhere@eff.org": {
2895 "installation_mode": "allowed",
2896 "updates_disabled": false
2897 }
2898 }'/>
2899 ```
2900 #### macOS
2901 ```
2902 <dict>
2903 <key>ExtensionSettings</key>
2904 <dict>
2905 <key>*</key>
2906 <dict>
2907 <key>blocked_install_message</key>
2908 <string>Custom error message.</string>
2909 <key>install_sources</key>
2910 <array>
2911 <string>"https://yourwebsite.com/*"</string>
2912 </array>
2913 <key>installation_mode</key>
2914 <string>blocked</string>
2915 <key>allowed_types</key>
2916 <array>
2917 <string>extension</string>
2918 </array>
2919 </dict>
2920 <key>uBlock0@raymondhill.net</key>
2921 <dict>
2922 <key>installation_mode</key>
2923 <string>force_installed</string>
2924 <key>install_url</key>
2925 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2926 </dict>
2927 <key>https-everywhere@eff.org</key>
2928 <dict>
2929 <key>installation_mode</key>
2930 <string>allowed</string>
2931 <key>updates_disabled</key>
2932 <true/> | <false/>
2933 </dict>
2934 </dict>
2935 </dict>
2936 ```
2937 #### policies.json
2938 ```
2939 {
2940 "policies": {
2941 "ExtensionSettings": {
2942 "*": {
2943 "blocked_install_message": "Custom error message.",
2944 "install_sources": ["https://yourwebsite.com/*"],
2945 "installation_mode": "blocked",
2946 "allowed_types": ["extension"]
2947 },
2948 "uBlock0@raymondhill.net": {
2949 "installation_mode": "force_installed",
2950 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2951 },
2952 "https-everywhere@eff.org": {
2953 "installation_mode": "allowed",
2954 "updates_disabled": false
2955 }
2956 }
2957 }
2958 }
2959 ```
2960 ### ExtensionUpdate
2961 Control extension updates.
2962
2963 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2964 **CCK2 Equivalent:** N/A\
2965 **Preferences Affected:** `extensions.update.enabled`
2966
2967 #### Windows (GPO)
2968 ```
2969 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2970 ```
2971 #### Windows (Intune)
2972 OMA-URI:
2973 ```
2974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2975 ```
2976 Value (string):
2977 ```
2978 <enabled/> or <disabled/>
2979 ```
2980 #### macOS
2981 ```
2982 <dict>
2983 <key>ExtensionUpdate</key>
2984 <true/> | <false/>
2985 </dict>
2986 ```
2987 #### policies.json
2988 ```
2989 {
2990 "policies": {
2991 "ExtensionUpdate": true | false
2992 }
2993 }
2994 ```
2995 ### FirefoxHome
2996 Customize the Firefox Home page.
2997
2998 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4, Snippets was deprecated in Firefox 122)
2999 **CCK2 Equivalent:** N/A\
3000 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
3001
3002 #### Windows (GPO)
3003 ```
3004 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
3005 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
3006 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
3007 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
3008 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
3009 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
3010 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
3011 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
3012 ```
3013 #### Windows (Intune)
3014 OMA-URI:
3015 ```
3016 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
3017 ```
3018 Value (string):
3019 ```
3020 <enabled/>
3021 <data id="FirefoxHome_Search" value="true | false"/>
3022 <data id="FirefoxHome_TopSites" value="true | false"/>
3023 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
3024 <data id="FirefoxHome_Highlights" value="true | false"/>
3025 <data id="FirefoxHome_Pocket" value="true | false"/>
3026 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
3027 <data id="FirefoxHome_Snippets" value="true | false"/>
3028 <data id="FirefoxHome_Locked" value="true | false"/>
3029 ```
3030 #### macOS
3031 ```
3032 <dict>
3033 <key>FirefoxHome</key>
3034 <dict>
3035 <key>Search</key>
3036 <true/> | <false/>
3037 <key>TopSites</key>
3038 <true/> | <false/>
3039 <key>SponsoredTopSites</key>
3040 <true/> | <false/>
3041 <key>Highlights</key>
3042 <true/> | <false/>
3043 <key>Pocket</key>
3044 <true/> | <false/>
3045 <key>SponsoredPocket</key>
3046 <true/> | <false/>
3047 <key>Snippets</key>
3048 <true/> | <false/>
3049 <key>Locked</key>
3050 <true/> | <false/>
3051 </dict>
3052 </dict>
3053 ```
3054 #### policies.json
3055 ```
3056 {
3057 "policies": {
3058 "FirefoxHome": {
3059 "Search": true | false,
3060 "TopSites": true | false,
3061 "SponsoredTopSites": true | false,
3062 "Highlights": true | false,
3063 "Pocket": true | false,
3064 "SponsoredPocket": true | false,
3065 "Snippets": true | false,
3066 "Locked": true | false
3067 }
3068 }
3069 }
3070 ```
3071 ### FirefoxSuggest
3072 Customize Firefox Suggest (US only).
3073
3074 **Compatibility:** Firefox 118, Firefox ESR 115.3.
3075 **CCK2 Equivalent:** N/A\
3076 **Preferences Affected:** `browser.urlbar.suggest.quicksuggest.nonsponsored`, `browser.urlbar.suggest.quicksuggest.sponsored`, `browser.urlbar.quicksuggest.dataCollection.enabled`
3077
3078 #### Windows (GPO)
3079 ```
3080 Software\Policies\Mozilla\Firefox\FirefoxSuggest\WebSuggestions = 0x1 | 0x0
3081 Software\Policies\Mozilla\Firefox\FirefoxSuggest\SponsoredSuggestions = 0x1 | 0x0
3082 Software\Policies\Mozilla\Firefox\FirefoxSuggest\ImproveSuggest = 0x1 | 0x0
3083 Software\Policies\Mozilla\Firefox\FirefoxSuggest\Locked = 0x1 | 0x0
3084 ```
3085 #### Windows (Intune)
3086 OMA-URI:
3087 ```
3088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/WebSuggestions
3089 ```
3090 Value (string):
3091 ```
3092 <enabled/> or <disabled/>
3093 ```
3094 OMA-URI:
3095 ```
3096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/SponsoredSuggestions
3097 ```
3098 Value (string):
3099 ```
3100 <enabled/> or <disabled/>
3101 ```
3102 OMA-URI:
3103 ```
3104 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/ImproveSuggest
3105 ```
3106 Value (string):
3107 ```
3108 <enabled/> or <disabled/>
3109 ```
3110 OMA-URI:
3111 ```
3112 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/Locked
3113 ```
3114 Value (string):
3115 ```
3116 <enabled/> or <disabled/>
3117 ```
3118 #### macOS
3119 ```
3120 <dict>
3121 <key>FirefoxSuggest</key>
3122 <dict>
3123 <key>WebSuggestions</key>
3124 <true/> | <false/>
3125 <key>SponsoredSuggestions</key>
3126 <true/> | <false/>
3127 <key>ImproveSuggest</key>
3128 <true/> | <false/>
3129 <key>Locked</key>
3130 <true/> | <false/>
3131 </dict>
3132 </dict>
3133 ```
3134 #### policies.json
3135 ```
3136 {
3137 "policies": {
3138 "FirefoxSuggest": {
3139 "WebSuggestions": true | false,
3140 "SponsoredSuggestions": true | false,
3141 "ImproveSuggest": true | false,
3142 "Locked": true | false
3143 }
3144 }
3145 }
3146 ```
3147 ### GoToIntranetSiteForSingleWordEntryInAddressBar
3148 Whether to always go through the DNS server before sending a single word search string to a search engine.
3149
3150 If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
3151
3152 The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
3153
3154 If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
3155
3156 You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
3157
3158 Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
3159
3160 **Compatibility:** Firefox 104, Firefox ESR 102.2\
3161 **CCK2 Equivalent:** `N/A`\
3162 **Preferences Affected:** `browser.fixup.dns_first_for_single_words`
3163
3164 #### Windows (GPO)
3165 ```
3166 Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
3167 ```
3168 #### Windows (Intune)
3169 OMA-URI:
3170 ```
3171 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
3172 ```
3173 Value (string):
3174 ```
3175 <enabled/> or <disabled/>
3176 ```
3177 #### macOS
3178 ```
3179 <dict>
3180 <key>GoToIntranetSiteForSingleWordEntryInAddressBar</key>
3181 <true/> | <false/>
3182 </dict>
3183 ```
3184 #### policies.json
3185 ```
3186 {
3187 "policies": {
3188 "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
3189 }
3190 }
3191 ```
3192 ### Handlers
3193 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
3194
3195 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
3196
3197 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
3198
3199 | Name | Description |
3200 | --- | --- |
3201 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
3202 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
3203 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
3204 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
3205 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
3206 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
3207
3208 **Compatibility:** Firefox 78, Firefox ESR 78\
3209 **CCK2 Equivalent:** N/A\
3210 **Preferences Affected:** N/A
3211
3212 #### Windows (GPO)
3213 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
3214 ```
3215 {
3216 "mimeTypes": {
3217 "application/msword": {
3218 "action": "useSystemDefault",
3219 "ask": true | false
3220 }
3221 },
3222 "schemes": {
3223 "mailto": {
3224 "action": "useHelperApp",
3225 "ask": true | false,
3226 "handlers": [{
3227 "name": "Gmail",
3228 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3229 }]
3230 }
3231 },
3232 "extensions": {
3233 "pdf": {
3234 "action": "useHelperApp",
3235 "ask": true | false,
3236 "handlers": [{
3237 "name": "Adobe Acrobat",
3238 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3239 }]
3240 }
3241 }
3242 }
3243 ```
3244 #### Windows (Intune)
3245 OMA-URI:
3246 ```
3247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
3248 ```
3249 Value (string):
3250 ```
3251 <enabled/>
3252 <data id="Handlers" value='
3253 {
3254 "mimeTypes": {
3255 "application/msword": {
3256 "action": "useSystemDefault",
3257 "ask": true | false
3258 }
3259 },
3260 "schemes": {
3261 "mailto": {
3262 "action": "useHelperApp",
3263 "ask": true | false,
3264 "handlers": [{
3265 "name": "Gmail",
3266 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
3267 }]
3268 }
3269 },
3270 "extensions": {
3271 "pdf": {
3272 "action": "useHelperApp",
3273 "ask": true | false,
3274 "handlers": [{
3275 "name": "Adobe Acrobat",
3276 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3277 }]
3278 }
3279 }
3280 }
3281 '/>
3282 ```
3283 #### macOS
3284 ```
3285 <dict>
3286 <key>Handlers</key>
3287 <dict>
3288 <key>mimeTypes</key>
3289 <dict>
3290 <key>application/msword</key>
3291 <dict>
3292 <key>action</key>
3293 <string>useSystemDefault</string>
3294 <key>ask</key>
3295 <true/> | <false/>
3296 </dict>
3297 </dict>
3298 <key>schemes</key>
3299 <dict>
3300 <key>mailto</key>
3301 <dict>
3302 <key>action</key>
3303 <string>useHelperApp</string>
3304 <key>ask</key>
3305 <true/> | <false/>
3306 <key>handlers</key>
3307 <array>
3308 <dict>
3309 <key>name</key>
3310 <string>Gmail</string>
3311 <key>uriTemplate</key>
3312 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
3313 </dict>
3314 </array>
3315 </dict>
3316 </dict>
3317 <key>extensions</key>
3318 <dict>
3319 <key>pdf</key>
3320 <dict>
3321 <key>action</key>
3322 <string>useHelperApp</string>
3323 <key>ask</key>
3324 <true/> | <false/>
3325 <key>handlers</key>
3326 <array>
3327 <dict>
3328 <key>name</key>
3329 <string>Adobe Acrobat</string>
3330 <key>path</key>
3331 <string>/System/Applications/Preview.app</string>
3332 </dict>
3333 </array>
3334 </dict>
3335 </dict>
3336 </dict>
3337 </dict>
3338 ```
3339 #### policies.json
3340 ```
3341 {
3342 "policies": {
3343 "Handlers": {
3344 "mimeTypes": {
3345 "application/msword": {
3346 "action": "useSystemDefault",
3347 "ask": false
3348 }
3349 },
3350 "schemes": {
3351 "mailto": {
3352 "action": "useHelperApp",
3353 "ask": true | false,
3354 "handlers": [{
3355 "name": "Gmail",
3356 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3357 }]
3358 }
3359 },
3360 "extensions": {
3361 "pdf": {
3362 "action": "useHelperApp",
3363 "ask": true | false,
3364 "handlers": [{
3365 "name": "Adobe Acrobat",
3366 "path": "/usr/bin/acroread"
3367 }]
3368 }
3369 }
3370 }
3371 }
3372 }
3373 ```
3374 ### HardwareAcceleration
3375 Control hardware acceleration.
3376
3377 **Compatibility:** Firefox 60, Firefox ESR 60\
3378 **CCK2 Equivalent:** N/A\
3379 **Preferences Affected:** `layers.acceleration.disabled`
3380
3381 #### Windows (GPO)
3382 ```
3383 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3384 ```
3385 #### Windows (Intune)
3386 OMA-URI:
3387 ```
3388 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3389 ```
3390 Value (string):
3391 ```
3392 <enabled/> or <disabled/>
3393 ```
3394 #### macOS
3395 ```
3396 <dict>
3397 <key>HardwareAcceleration</key>
3398 <true/> | <false/>
3399 </dict>
3400 ```
3401 #### policies.json
3402 ```
3403 {
3404 "policies": {
3405 "HardwareAcceleration": true | false
3406 }
3407 }
3408 ```
3409 ### Homepage
3410 Configure the default homepage and how Firefox starts.
3411
3412 `URL` is the default homepage.
3413
3414 `Locked` prevents the user from changing homepage preferences.
3415
3416 `Additional` allows for more than one homepage.
3417
3418 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3419
3420 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3421
3422 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3423 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3424 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3425
3426 #### Windows (GPO)
3427 ```
3428 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3429 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3430 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3431 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3432 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3433 ```
3434 #### Windows (Intune)
3435 OMA-URI:
3436 ```
3437 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3438 ```
3439 Value (string):
3440 ```
3441 <enabled/>
3442
3443 <data id="HomepageURL" value="https://example.com"/>
3444 <data id="HomepageLocked" value="true | false"/>
3445 ```
3446 OMA-URI:
3447 ```
3448 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3449 ```
3450 Value (string):
3451 ```
3452 <enabled/>
3453
3454 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3455 ```
3456 OMA-URI:
3457 ```
3458 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3459 ```
3460 Value (string):
3461 ```
3462 <enabled/>
3463
3464 <data id="StartPage" value="none | homepage | previous-session"/>
3465 ```
3466 #### macOS
3467 ```
3468 <dict>
3469 <key>Homepage</key>
3470 <dict>
3471 <key>URL</key>
3472 <string>http://example.com</string>
3473 <key>Locked</key>
3474 <true/> | <false/>
3475 <key>Additional</key>
3476 <array>
3477 <string>http://example.org</string>
3478 <string>http://example.edu</string>
3479 </array>
3480 <key>StartPage</key>
3481 <string>none | homepage | previous-session | homepage-locked</string>
3482 </dict>
3483 </dict>
3484 ```
3485 #### policies.json
3486 ```
3487 {
3488 "policies": {
3489 "Homepage": {
3490 "URL": "http://example.com/",
3491 "Locked": true | false,
3492 "Additional": ["http://example.org/",
3493 "http://example.edu/"],
3494 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3495 }
3496 }
3497 }
3498 ```
3499 ### InstallAddonsPermission
3500 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3501
3502 `Allow` is a list of origins where extension installs are allowed.
3503
3504 `Default` determines whether or not extension installs are allowed by default.
3505
3506 **Compatibility:** Firefox 60, Firefox ESR 60\
3507 **CCK2 Equivalent:** `permissions.install`\
3508 **Preferences Affected:** `xpinstall.enabled`
3509
3510 #### Windows (GPO)
3511 ```
3512 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3513 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3514 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3515 ```
3516 #### Windows (Intune)
3517 OMA-URI:
3518 ```
3519 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3520 ```
3521 Value (string):
3522 ```
3523 <enabled/>
3524 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3525 ```
3526 OMA-URI:
3527 ```
3528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3529 ```
3530 Value (string):
3531 ```
3532 <enabled/>
3533 ```
3534 #### macOS
3535 ```
3536 <dict>
3537 <key>InstallAddonsPermission</key>
3538 <dict>
3539 <key>Allow</key>
3540 <array>
3541 <string>http://example.org</string>
3542 <string>http://example.edu</string>
3543 </array>
3544 <key>Default</key>
3545 <true/> | <false/>
3546 </dict>
3547 </dict>
3548 ```
3549 #### policies.json
3550 ```
3551 {
3552 "policies": {
3553 "InstallAddonsPermission": {
3554 "Allow": ["http://example.org/",
3555 "http://example.edu/"],
3556 "Default": true | false
3557 }
3558 }
3559 }
3560 ```
3561 ### LegacyProfiles
3562 Disable the feature enforcing a separate profile for each installation.
3563
3564 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3565
3566 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3567
3568 This policy only work on Windows via GPO (not policies.json).
3569
3570 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3571 **CCK2 Equivalent:** N/A\
3572 **Preferences Affected:** N/A
3573
3574 #### Windows (GPO)
3575 ```
3576 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3577 ```
3578 #### Windows (Intune)
3579 OMA-URI:
3580 ```
3581 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3582 ```
3583 Value (string):
3584 ```
3585 <enabled/> or <disabled/>
3586 ```
3587 ### LegacySameSiteCookieBehaviorEnabled
3588 Enable default legacy SameSite cookie behavior setting.
3589
3590 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3591
3592 **Compatibility:** Firefox 96\
3593 **CCK2 Equivalent:** N/A\
3594 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3595
3596 #### Windows (GPO)
3597 ```
3598 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3599 ```
3600 #### Windows (Intune)
3601 OMA-URI:
3602 ```
3603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3604 ```
3605 Value (string):
3606 ```
3607 <enabled/> or <disabled/>
3608 ```
3609 #### macOS
3610 ```
3611 <dict>
3612 <key>LegacySameSiteCookieBehaviorEnabled</key>
3613 <true/> | <false/>
3614 </dict>
3615 ```
3616 #### policies.json
3617 ```
3618 {
3619 "policies": {
3620 "LegacySameSiteCookieBehaviorEnabled": true | false
3621 }
3622 ```
3623 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3624 Revert to legacy SameSite behavior for cookies on specified sites.
3625
3626 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3627
3628 **Compatibility:** Firefox 96\
3629 **CCK2 Equivalent:** N/A\
3630 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3631
3632 #### Windows (GPO)
3633 ```
3634 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3635 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3636 ```
3637 #### Windows (Intune)
3638 OMA-URI:
3639 ```
3640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3641 ```
3642 Value (string):
3643 ```
3644 <enabled/>
3645 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3646 ```
3647 #### macOS
3648 ```
3649 <dict>
3650 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3651 <array>
3652 <string>example.org</string>
3653 <string>example.edu</string>
3654 </array>
3655 </dict>
3656 ```
3657 #### policies.json
3658 ```
3659 {
3660 "policies": {
3661 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3662 "example.edu"]
3663 }
3664 }
3665 ```
3666 ### LocalFileLinks
3667 Enable linking to local files by origin.
3668
3669 **Compatibility:** Firefox 68, Firefox ESR 68\
3670 **CCK2 Equivalent:** N/A\
3671 **Preferences Affected:** `capability.policy.localfilelinks.*`
3672
3673 #### Windows (GPO)
3674 ```
3675 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3676 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3677 ```
3678 #### Windows (Intune)
3679 OMA-URI:
3680 ```
3681 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3682 ```
3683 Value (string):
3684 ```
3685 <enabled/>
3686 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3687 ```
3688 #### macOS
3689 ```
3690 <dict>
3691 <key>LocalFileLinks</key>
3692 <array>
3693 <string>http://example.org</string>
3694 <string>http://example.edu</string>
3695 </array>
3696 </dict>
3697 ```
3698 #### policies.json
3699 ```
3700 {
3701 "policies": {
3702 "LocalFileLinks": ["http://example.org/",
3703 "http://example.edu/"]
3704 }
3705 }
3706 ```
3707 ### ManagedBookmarks
3708 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3709
3710 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3711
3712 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3713 ```
3714 {
3715 "items": {
3716 "id": "BookmarkType",
3717 "properties": {
3718 "children": {
3719 "items": {
3720 "$ref": "BookmarkType"
3721 },
3722 "type": "array"
3723 },
3724 "name": {
3725 "type": "string"
3726 },
3727 "toplevel_name": {
3728 "type": "string"
3729 },
3730 "url": {
3731 "type": "string"
3732 }
3733 },
3734 "type": "object"
3735 },
3736 "type": "array"
3737 }
3738 ```
3739 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3740 **CCK2 Equivalent:** N/A\
3741 **Preferences Affected:** N/A
3742
3743 #### Windows (GPO)
3744 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3745 ```
3746 [
3747 {
3748 "toplevel_name": "My managed bookmarks folder"
3749 },
3750 {
3751 "url": "example.com",
3752 "name": "Example"
3753 },
3754 {
3755 "name": "Mozilla links",
3756 "children": [
3757 {
3758 "url": "https://mozilla.org",
3759 "name": "Mozilla.org"
3760 },
3761 {
3762 "url": "https://support.mozilla.org/",
3763 "name": "SUMO"
3764 }
3765 ]
3766 }
3767 ]
3768 ```
3769 #### Windows (Intune)
3770 OMA-URI:
3771 ```
3772 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3773 ```
3774 Value (string):
3775 ```
3776 <enabled/>
3777 <data id="JSON" value='
3778 [
3779 {
3780 "toplevel_name": "My managed bookmarks folder"
3781 },
3782 {
3783 "url": "example.com",
3784 "name": "Example"
3785 },
3786 {
3787 "name": "Mozilla links",
3788 "children": [
3789 {
3790 "url": "https://mozilla.org",
3791 "name": "Mozilla.org"
3792 },
3793 {
3794 "url": "https://support.mozilla.org/",
3795 "name": "SUMO"
3796 }
3797 ]
3798 }
3799 ]'/>
3800 ```
3801 #### macOS
3802 ```
3803 <dict>
3804 <key>ManagedBookmarks</key>
3805 <array>
3806 <dict>
3807 <key>toplevel_name</key>
3808 <string>My managed bookmarks folder</string>
3809 <dict>
3810 <key>url</key>
3811 <string>example.com</string>
3812 <key>name</key>
3813 <string>Example</string>
3814 </dict>
3815 <dict>
3816 <key>name</key>
3817 <string>Mozilla links</string>
3818 <key>children</key>
3819 <array>
3820 <dict>
3821 <key>url</key>
3822 <string>https://mozilla.org</string>
3823 <key>name</key>
3824 <string>Mozilla</string>
3825 </dict>
3826 <dict>
3827 <key>url</key>
3828 <string>https://support.mozilla.org/</string>
3829 <key>name</key>
3830 <string>SUMO</string>
3831 </dict>
3832 </array>
3833 </dict>
3834 </array>
3835 </dict>
3836 ```
3837 #### policies.json
3838 ```
3839 {
3840 "policies": {
3841 "ManagedBookmarks": [
3842 {
3843 "toplevel_name": "My managed bookmarks folder"
3844 },
3845 {
3846 "url": "example.com",
3847 "name": "Example"
3848 },
3849 {
3850 "name": "Mozilla links",
3851 "children": [
3852 {
3853 "url": "https://mozilla.org",
3854 "name": "Mozilla.org"
3855 },
3856 {
3857 "url": "https://support.mozilla.org/",
3858 "name": "SUMO"
3859 }
3860 ]
3861 }
3862 ]
3863 }
3864 }
3865 ```
3866 ### ManualAppUpdateOnly
3867
3868 Switch to manual updates only.
3869
3870 If this policy is enabled:
3871 1. The user will never be prompted to install updates
3872 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3873 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3874
3875 This policy is primarily intended for advanced end users, not for enterprises, but it is available via GPO.
3876
3877 **Compatibility:** Firefox 87\
3878 **CCK2 Equivalent:** N/A\
3879 **Preferences Affected:** N/A
3880
3881 #### Windows (GPO)
3882 ```
3883 Software\Policies\Mozilla\Firefox\ManualAppUpdateOnly = 0x1 | 0x0
3884 ```
3885 #### Windows (Intune)
3886 OMA-URI:
3887 ```
3888 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManualAppUpdateOnly
3889 ```
3890 Value (string):
3891 ```
3892 <enabled/> or <disabled/>
3893 ```
3894 #### macOS
3895 ```
3896 <dict>
3897 <key>ManualAppUpdateOnly</key>
3898 <true/> | <false/>
3899 </dict>
3900 ```
3901 #### policies.json
3902 ```
3903 {
3904 "policies": {
3905 "ManualAppUpdateOnly": true | false
3906 }
3907 }
3908 ```
3909 ### NetworkPrediction
3910 Enable or disable network prediction (DNS prefetching).
3911
3912 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3913 **CCK2 Equivalent:** N/A\
3914 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3915
3916 #### Windows (GPO)
3917 ```
3918 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3919 ```
3920 #### Windows (Intune)
3921 OMA-URI:
3922 ```
3923 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3924 ```
3925 Value (string):
3926 ```
3927 <enabled/> or <disabled/>
3928 ```
3929 #### macOS
3930 ```
3931 <dict>
3932 <key>NetworkPrediction</key>
3933 <true/> | <false/>
3934 </dict>
3935 ```
3936 #### policies.json
3937 ```
3938 {
3939 "policies": {
3940 "NetworkPrediction": true | false
3941 }
3942 ```
3943 ### NewTabPage
3944 Enable or disable the New Tab page.
3945
3946 **Compatibility:** Firefox 68, Firefox ESR 68\
3947 **CCK2 Equivalent:** N/A\
3948 **Preferences Affected:** `browser.newtabpage.enabled`
3949
3950 #### Windows (GPO)
3951 ```
3952 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3953 ```
3954 #### Windows (Intune)
3955 OMA-URI:
3956 ```
3957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3958 ```
3959 Value (string):
3960 ```
3961 <enabled/> or <disabled/>
3962 ```
3963 #### macOS
3964 ```
3965 <dict>
3966 <key>NewTabPage</key>
3967 <true/> | <false/>
3968 </dict>
3969 ```
3970 #### policies.json
3971 ```
3972 {
3973 "policies": {
3974 "NewTabPage": true | false
3975 }
3976 ```
3977 ### NoDefaultBookmarks
3978 Disable the creation of default bookmarks.
3979
3980 This policy is only effective if the user profile has not been created yet.
3981
3982 **Compatibility:** Firefox 60, Firefox ESR 60\
3983 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3984 **Preferences Affected:** N/A
3985
3986 #### Windows (GPO)
3987 ```
3988 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3989 ```
3990 #### Windows (Intune)
3991 OMA-URI:
3992 ```
3993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3994 ```
3995 Value (string):
3996 ```
3997 <enabled/> or <disabled/>
3998 ```
3999 #### macOS
4000 ```
4001 <dict>
4002 <key>NoDefaultBookmarks</key>
4003 <true/> | <false/>
4004 </dict>
4005 ```
4006 #### policies.json
4007 ```
4008 {
4009 "policies": {
4010 "NoDefaultBookmarks": true | false
4011 }
4012 }
4013 ```
4014 ### OfferToSaveLogins
4015 Control whether or not Firefox offers to save passwords.
4016
4017 **Compatibility:** Firefox 60, Firefox ESR 60\
4018 **CCK2 Equivalent:** `dontRememberPasswords`\
4019 **Preferences Affected:** `signon.rememberSignons`
4020
4021 #### Windows (GPO)
4022 ```
4023 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
4024 ```
4025 #### Windows (Intune)
4026 OMA-URI:
4027 ```
4028 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
4029 ```
4030 Value (string):
4031 ```
4032 <enabled/> or <disabled/>
4033 ```
4034 #### macOS
4035 ```
4036 <dict>
4037 <key>OfferToSaveLogins</key>
4038 <true/> | <false/>
4039 </dict>
4040 ```
4041 #### policies.json
4042 ```
4043 {
4044 "policies": {
4045 "OfferToSaveLogins": true | false
4046 }
4047 }
4048 ```
4049 ### OfferToSaveLoginsDefault
4050 Sets the default value of signon.rememberSignons without locking it.
4051
4052 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4053 **CCK2 Equivalent:** `dontRememberPasswords`\
4054 **Preferences Affected:** `signon.rememberSignons`
4055
4056 #### Windows (GPO)
4057 ```
4058 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
4059 ```
4060 #### Windows (Intune)
4061 OMA-URI:
4062 ```
4063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
4064 ```
4065 Value (string):
4066 ```
4067 <enabled/> or <disabled/>
4068 ```
4069 #### macOS
4070 ```
4071 <dict>
4072 <key>OfferToSaveLoginsDefault</key>
4073 <true/> | <false/>
4074 </dict>
4075 ```
4076 #### policies.json
4077 ```
4078 {
4079 "policies": {
4080 "OfferToSaveLoginsDefault": true | false
4081 }
4082 }
4083 ```
4084 ### OverrideFirstRunPage
4085 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
4086
4087 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
4088
4089 **Compatibility:** Firefox 60, Firefox ESR 60\
4090 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
4091 **Preferences Affected:** `startup.homepage_welcome_url`
4092
4093 #### Windows (GPO)
4094 ```
4095 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
4096 ```
4097 #### Windows (Intune)
4098 OMA-URI:
4099 ```
4100 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
4101 ```
4102 Value (string):
4103 ```
4104 <enabled/>
4105 <data id="OverridePage" value="https://example.com"/>
4106 ```
4107 #### macOS
4108 ```
4109 <dict>
4110 <key>OverrideFirstRunPage</key>
4111 <string>http://example.org</string>
4112 </dict>
4113 ```
4114 #### policies.json
4115 ```
4116 {
4117 "policies": {
4118 "OverrideFirstRunPage": "http://example.org"
4119 }
4120 }
4121 ```
4122 ### OverridePostUpdatePage
4123 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
4124
4125 **Compatibility:** Firefox 60, Firefox ESR 60\
4126 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
4127 **Preferences Affected:** `startup.homepage_override_url`
4128
4129 #### Windows (GPO)
4130 ```
4131 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
4132 ```
4133 #### Windows (Intune)
4134 OMA-URI:
4135 ```
4136 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
4137 ```
4138 Value (string):
4139 ```
4140 <enabled/>
4141 <data id="OverridePage" value="https://example.com"/>
4142 ```
4143 #### macOS
4144 ```
4145 <dict>
4146 <key>OverridePostUpdatePage</key>
4147 <string>http://example.org</string>
4148 </dict>
4149 ```
4150 #### policies.json
4151 ```
4152 {
4153 "policies": {
4154 "OverridePostUpdatePage": "http://example.org"
4155 }
4156 }
4157 ```
4158 ### PasswordManagerEnabled
4159 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
4160
4161 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4162 **CCK2 Equivalent:** N/A\
4163 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
4164
4165 #### Windows (GPO)
4166 ```
4167 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
4168 ```
4169 #### Windows (Intune)
4170 OMA-URI:
4171 ```
4172 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
4173 ```
4174 Value (string):
4175 ```
4176 <enabled/> or <disabled/>
4177 ```
4178 #### macOS
4179 ```
4180 <dict>
4181 <key>PasswordManagerEnabled</key>
4182 <true/> | <false/>
4183 </dict>
4184 ```
4185 #### policies.json
4186 ```
4187 {
4188 "policies": {
4189 "PasswordManagerEnabled": true | false
4190 }
4191 }
4192 ```
4193 ### PasswordManagerExceptions
4194 Prevent Firefox from saving passwords for specific sites.
4195
4196 The sites are specified as a list of origins.
4197
4198 **Compatibility:** Firefox 101\
4199 **CCK2 Equivalent:** N/A\
4200 **Preferences Affected:** N/A
4201
4202 #### Windows (GPO)
4203 ```
4204 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
4205 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
4206 ```
4207 #### Windows (Intune)
4208 OMA-URI:
4209 ```
4210 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
4211 ```
4212 Value (string):
4213 ```
4214 <enabled/>
4215 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4216 ```
4217 #### macOS
4218 ```
4219 <dict>
4220 <key>PasswordManagerExceptions</key>
4221 <array>
4222 <string>https://example.org</string>
4223 <string>https://example.edu</string>
4224 </array>
4225 </dict>
4226 ```
4227 #### policies.json
4228 ```
4229 {
4230 "policies": {
4231 "PasswordManagerExceptions": ["https://example.org",
4232 "https://example.edu"]
4233 }
4234 }
4235 ```
4236
4237 ### PDFjs
4238 Disable or configure PDF.js, the built-in PDF viewer.
4239
4240 If `Enabled` is set to false, the built-in PDF viewer is disabled.
4241
4242 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
4243
4244 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
4245
4246 **Compatibility:** Firefox 77, Firefox ESR 68.9\
4247 **CCK2 Equivalent:** N/A\
4248 **Preferences Affected:** `pdfjs.disabled`, `pdfjs.enablePermissions`
4249
4250 #### Windows (GPO)
4251 ```
4252 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
4253 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
4254 ```
4255 #### Windows (Intune)
4256 OMA-URI:
4257 ```
4258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
4259 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
4260 ```
4261 Value (string):
4262 ```
4263 <enabled/>or <disabled/>
4264 ```
4265 #### macOS
4266 ```
4267 <dict>
4268 <key>PDFjs</key>
4269 <dict>
4270 <key>Enabled</key>
4271 <true/> | <false/>
4272 <key>EnablePermissions</key>
4273 <true/> | <false/>
4274 </dict>
4275 </dict>
4276 ```
4277 #### policies.json
4278 ```
4279 {
4280 "policies": {
4281 "PDFjs": {
4282 "Enabled": true | false,
4283 "EnablePermissions": true | false
4284 }
4285 }
4286 }
4287 ```
4288 ### Permissions
4289 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
4290
4291 `Allow` is a list of origins where the feature is allowed.
4292
4293 `Block` is a list of origins where the feature is not allowed.
4294
4295 `BlockNewRequests` determines whether or not new requests can be made for the feature.
4296
4297 `Locked` prevents the user from changing preferences for the feature.
4298
4299 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
4300
4301 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
4302 **CCK2 Equivalent:** N/A\
4303 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
4304
4305 #### Windows (GPO)
4306 ```
4307 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
4308 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
4309 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
4310 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
4311 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
4312 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
4313 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
4314 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
4315 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
4316 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
4317 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
4318 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
4319 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
4320 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
4321 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
4322 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
4323 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
4324 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
4325 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
4326 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
4327 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
4328 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
4329 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
4330 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
4331 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
4332 ```
4333 #### Windows (Intune)
4334 OMA-URI:
4335 ```
4336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
4337 ```
4338 Value (string):
4339 ```
4340 <enabled/> or <disabled/>
4341 ```
4342 OMA-URI:
4343 ```
4344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
4345 ```
4346 Value (string):
4347 ```
4348 <enabled/> or <disabled/>
4349 ```
4350 OMA-URI:
4351 ```
4352 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
4353 ```
4354 Value (string):
4355 ```
4356 <enabled/>
4357 <data id="Permissions" value="1&#xF000;https://example.org"/>
4358 ```
4359 OMA-URI:
4360 ```
4361 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
4362 ```
4363 Value (string):
4364 ```
4365 <enabled/> or <disabled/>
4366 ```
4367 OMA-URI:
4368 ```
4369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4370 ```
4371 Value (string):
4372 ```
4373 <enabled/> or <disabled/>
4374 ```
4375 OMA-URI:
4376 ```
4377 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4378 ```
4379 Value (string):
4380 ```
4381 <enabled/>
4382 <data id="Permissions" value="1&#xF000;https://example.org"/>
4383 ```
4384 OMA-URI:
4385 ```
4386 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4387 ```
4388 Value (string):
4389 ```
4390 <enabled/>
4391 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4392 ```
4393 OMA-URI:
4394 ```
4395 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4396 ```
4397 Value (string):
4398 ```
4399 <enabled/>
4400 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4401 ```
4402 OMA-URI:
4403 ```
4404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4405 ```
4406 Value (string):
4407 ```
4408 <enabled/> or <disabled/>
4409 ```
4410 OMA-URI:
4411 ```
4412 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4413 ```
4414 Value (string):
4415 ```
4416 <enabled/>
4417 <data id="Permissions" value="1&#xF000;https://example.org"/>
4418 ```
4419 OMA-URI:
4420 ```
4421 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4422 ```
4423 Value (string):
4424 ```
4425 <enabled/>
4426 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4427 ```
4428 OMA-URI:
4429 ```
4430 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4431 ```
4432 Value (string):
4433 ```
4434 <enabled/> or <disabled/>
4435 ```
4436 OMA-URI:
4437 ```
4438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4439 ```
4440 Value (string):
4441 ```
4442 <enabled/> or <disabled/>
4443 ```
4444 #### macOS
4445 ```
4446 <dict>
4447 <key>Permissions</key>
4448 <dict>
4449 <key>Camera</key>
4450 <dict>
4451 <key>Allow</key>
4452 <array>
4453 <string>https://example.org</string>
4454 <string>https://example.org:1234</string>
4455 </array>
4456 <key>Block</key>
4457 <array>
4458 <string>https://example.edu</string>
4459 </array>
4460 <key>BlockNewRequests</key>
4461 <true/> | <false/>
4462 <key>Locked</key>
4463 <true/> | <false/>
4464 </dict>
4465 <key>Microphone</key>
4466 <dict>
4467 <key>Allow</key>
4468 <array>
4469 <string>https://example.org</string>
4470 </array>
4471 <key>Block</key>
4472 <array>
4473 <string>https://example.edu</string>
4474 </array>
4475 <key>BlockNewRequests</key>
4476 <true/> | <false/>
4477 <key>Locked</key>
4478 <true/> | <false/>
4479 </dict>
4480 <key>Location</key>
4481 <dict>
4482 <key>Allow</key>
4483 <array>
4484 <string>https://example.org</string>
4485 </array>
4486 <key>Block</key>
4487 <array>
4488 <string>https://example.edu</string>
4489 </array>
4490 <key>BlockNewRequests</key>
4491 <true/> | <false/>
4492 <key>Locked</key>
4493 <true/> | <false/>
4494 </dict>
4495 <key>Notifications</key>
4496 <dict>
4497 <key>Allow</key>
4498 <array>
4499 <string>https://example.org</string>
4500 </array>
4501 <key>Block</key>
4502 <array>
4503 <string>https://example.edu</string>
4504 </array>
4505 <key>BlockNewRequests</key>
4506 <true/>
4507 <key>Locked</key>
4508 <true/>
4509 </dict>
4510 <key>Autoplay</key>
4511 <dict>
4512 <key>Allow</key>
4513 <array>
4514 <string>https://example.org</string>
4515 </array>
4516 <key>Block</key>
4517 <array>
4518 <string>https://example.edu</string>
4519 </array>
4520 <key>Default</key>
4521 <string>allow-audio-video | block-audio | block-audio-video</string>
4522 <key>Locked</key>
4523 <true/> | <false/>
4524 </dict>
4525 </dict>
4526 </dict>
4527 ```
4528 #### policies.json
4529 ```
4530 {
4531 "policies": {
4532 "Permissions": {
4533 "Camera": {
4534 "Allow": ["https://example.org","https://example.org:1234"],
4535 "Block": ["https://example.edu"],
4536 "BlockNewRequests": true | false,
4537 "Locked": true | false
4538 },
4539 "Microphone": {
4540 "Allow": ["https://example.org"],
4541 "Block": ["https://example.edu"],
4542 "BlockNewRequests": true | false,
4543 "Locked": true | false
4544 },
4545 "Location": {
4546 "Allow": ["https://example.org"],
4547 "Block": ["https://example.edu"],
4548 "BlockNewRequests": true | false,
4549 "Locked": true | false
4550 },
4551 "Notifications": {
4552 "Allow": ["https://example.org"],
4553 "Block": ["https://example.edu"],
4554 "BlockNewRequests": true | false,
4555 "Locked": true | false
4556 },
4557 "Autoplay": {
4558 "Allow": ["https://example.org"],
4559 "Block": ["https://example.edu"],
4560 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4561 "Locked": true | false
4562 }
4563 }
4564 }
4565 }
4566 ```
4567 ### PictureInPicture
4568
4569 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4570
4571 **Compatibility:** Firefox 78, Firefox ESR 78\
4572 **CCK2 Equivalent:** N/A\
4573 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4574
4575 #### Windows (GPO)
4576 ```
4577 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4578 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4579
4580 ```
4581 #### Windows (Intune)
4582 OMA-URI:
4583 ```
4584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4586 ```
4587 Value (string):
4588 ```
4589 <enabled/> or <disabled/>
4590 ```
4591 #### macOS
4592 ```
4593 <dict>
4594 <key>PictureInPicture</key>
4595 <dict>
4596 <key>Enabled</key>
4597 <true/> | <false/>
4598 <key>Locked</key>
4599 <true/> | <false/>
4600 </dict>
4601 </dict>
4602 ```
4603 #### policies.json
4604 ```
4605 {
4606 "policies": {
4607 "PictureInPicture": {
4608 "Enabled": true | false,
4609 "Locked": true | false
4610 }
4611 }
4612 }
4613 ```
4614 ### PopupBlocking
4615 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4616
4617 `Allow` is a list of origins where popup-windows are allowed.
4618
4619 `Default` determines whether or not pop-up windows are allowed by default.
4620
4621 `Locked` prevents the user from changing pop-up preferences.
4622
4623 **Compatibility:** Firefox 60, Firefox ESR 60\
4624 **CCK2 Equivalent:** `permissions.popup`\
4625 **Preferences Affected:** `dom.disable_open_during_load`
4626
4627 #### Windows (GPO)
4628 ```
4629 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4630 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4631 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4632 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4633 ```
4634 #### Windows (Intune)
4635 OMA-URI:
4636 ```
4637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4638 ```
4639 Value (string):
4640 ```
4641 <enabled/>
4642 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4643 ```
4644 OMA-URI:
4645 ```
4646 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4647 ```
4648 Value (string):
4649 ```
4650 <enabled/> or <disabled/>
4651 ```
4652 OMA-URI:
4653 ```
4654 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4655 ```
4656 Value (string):
4657 ```
4658 <enabled/> or <disabled/>
4659 ```
4660 #### macOS
4661 ```
4662 <dict>
4663 <key>PopupBlocking</key>
4664 <dict>
4665 <key>Allow</key>
4666 <array>
4667 <string>http://example.org</string>
4668 <string>http://example.edu</string>
4669 </array>
4670 <key>Default</key>
4671 <true/> | <false/>
4672 <key>Locked</key>
4673 <true/> | <false/>
4674 </dict>
4675 </dict>
4676 ```
4677 #### policies.json
4678 ```
4679 {
4680 "policies": {
4681 "PopupBlocking": {
4682 "Allow": ["http://example.org/",
4683 "http://example.edu/"],
4684 "Default": true | false,
4685 "Locked": true | false
4686 }
4687 }
4688 }
4689 ```
4690 ### Preferences
4691 Set and lock preferences.
4692
4693 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section in group policy.
4694
4695 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4696
4697 Preferences that start with the following prefixes are supported:
4698 ```
4699 accessibility.
4700 alerts.* (Firefox 122, Firefox ESR 115.7)
4701 app.update.* (Firefox 86, Firefox ESR 78.8)
4702 browser.
4703 datareporting.policy.
4704 dom.
4705 extensions.
4706 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4707 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4708 geo.
4709 gfx.
4710 intl.
4711 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4712 layers.
4713 layout.
4714 media.
4715 network.
4716 pdfjs. (Firefox 84, Firefox ESR 78.6)
4717 places.
4718 pref.
4719 print.
4720 signon. (Firefox 83, Firefox ESR 78.5)
4721 spellchecker. (Firefox 84, Firefox ESR 78.6)
4722 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4723 ui.
4724 widget.
4725 xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only)
4726 xpinstall.whitelist.required (Firefox 118, Firefox ESR 115.3)
4727 ```
4728 as well as the following security preferences:
4729
4730 | Preference | Type | Default
4731 | --- | --- | --- |
4732 | security.default_personal_cert | string | Ask Every Time
4733 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4734 | security.disable_button.openCertManager | string | N/A
4735 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4736 | security.disable_button.openDeviceManager | string | N/A
4737 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4738 | security.insecure_connection_text.enabled | bool | false
4739 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4740 | security.insecure_connection_text.pbmode.enabled | bool | false
4741 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4742 | security.mixed_content.block_active_content | boolean | true
4743 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4744 | security.osclientcerts.autoload | boolean | false
4745 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4746 | security.OCSP.enabled | integer | 1
4747 | &nbsp;&nbsp;&nbsp;&nbsp;If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates.
4748 | security.OCSP.require | boolean | false
4749 | &nbsp;&nbsp;&nbsp;&nbsp; If true, if an OCSP request times out, the connection fails.
4750 | security.osclientcerts.assume_rsa_pss_support | boolean | true
4751 | &nbsp;&nbsp;&nbsp;&nbsp; If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12)
4752 | security.ssl.enable_ocsp_stapling | boolean | true
4753 | &nbsp;&nbsp;&nbsp;&nbsp; If false, OCSP stapling is not enabled.
4754 | security.ssl.errorReporting.enabled | boolean | true
4755 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4756 | security.ssl.require_safe_negotiation | boolean | false
4757 | &nbsp;&nbsp;&nbsp;&nbsp;If true, Firefox will only negotiate TLS connections with servers that indicate they support secure renegotiation. (Firefox 118, Firefox ESR 115.3)
4758 | security.tls.enable_0rtt_data | boolean | true
4759 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off. (Firefox 93, Firefox 91.2, Firefox 78.15)
4760 | security.tls.hello_downgrade_check | boolean | true
4761 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4762 | security.tls.version.enable-deprecated | boolean | false
4763 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1. (Firefox 86, Firefox 78.8)
4764 | security.warn_submit_secure_to_insecure | boolean | true
4765 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4766
4767 Using the preference as the key, set the `Value` to the corresponding preference value.
4768
4769 `Status` can be "default", "locked", "user" or "clear"
4770
4771 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4772 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4773 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4774 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4775
4776 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4777
4778 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4779
4780 You can also set the `Type` starting in Firefox 123 and Firefox ESR 115.8. It can be `number`, `boolean` or `string`. This is especially useful if you are seeing 0 or 1 values being converted to booleans when set as user preferences.
4781
4782 See the examples below for more detail.
4783
4784 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4785
4786 Status
4787 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4788 **CCK2 Equivalent:** `preferences`\
4789 **Preferences Affected:** Many
4790
4791 #### Windows (GPO)
4792 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4793 ```
4794 {
4795 "accessibility.force_disabled": {
4796 "Value": 1,
4797 "Status": "default",
4798 "Type": "number"
4799
4800 },
4801 "browser.cache.disk.parent_directory": {
4802 "Value": "SOME_NATIVE_PATH",
4803 "Status": "user"
4804 },
4805 "browser.tabs.warnOnClose": {
4806 "Value": false,
4807 "Status": "locked"
4808 }
4809 }
4810 ```
4811 #### Windows (Intune)
4812 OMA-URI:
4813 ```
4814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4815 ```
4816 Value (string):
4817 ```
4818 <enabled/>
4819 <data id="JSON" value='
4820 {
4821 "accessibility.force_disabled": {
4822 "Value": 1,
4823 "Status": "default",
4824 "Type": "number"
4825 },
4826 "browser.cache.disk.parent_directory": {
4827 "Value": "SOME_NATIVE_PATH",
4828 "Status": "user"
4829 },
4830 "browser.tabs.warnOnClose": {
4831 "Value": false,
4832 "Status": "locked"
4833 }
4834 }'/>
4835 ```
4836 #### macOS
4837 ```
4838 <dict>
4839 <key>Preferences</key>
4840 <dict>
4841 <key>accessibility.force_disabled</key>
4842 <dict>
4843 <key>Value</key>
4844 <integer>1</integer>
4845 <key>Status</key>
4846 <string>default</string>
4847 <key>Type</key>
4848 <string>number</string>
4849 </dict>
4850 <key>browser.cache.disk.parent_directory</key>
4851 <dict>
4852 <key>Value</key>
4853 <string>SOME_NATIVE_PATH</string>
4854 <key>Status</key>
4855 <string>user</string>
4856 </dict>
4857 <key>browser.tabs.warnOnClose</key>
4858 <dict>
4859 <key>Value</key>
4860 <false/>
4861 <key>Status</key>
4862 <string>locked</string>
4863 </dict>
4864 </dict>
4865 </dict>
4866 ```
4867 #### policies.json
4868 ```
4869 {
4870 "policies": {
4871 "Preferences": {
4872 "accessibility.force_disabled": {
4873 "Value": 1,
4874 "Status": "default"
4875 "Type": "number"
4876 },
4877 "browser.cache.disk.parent_directory": {
4878 "Value": "SOME_NATIVE_PATH",
4879 "Status": "user"
4880 },
4881 "browser.tabs.warnOnClose": {
4882 "Value": false,
4883 "Status": "locked"
4884 }
4885 }
4886 }
4887 }
4888 ```
4889 ### PrimaryPassword
4890 Require or prevent using a primary (formerly master) password.
4891
4892 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4893
4894 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4895
4896 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4897 **CCK2 Equivalent:** `noMasterPassword`\
4898 **Preferences Affected:** N/A
4899
4900 #### Windows (GPO)
4901 ```
4902 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4903 ```
4904 #### Windows (Intune)
4905 OMA-URI:
4906 ```
4907 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4908 ```
4909 Value (string):
4910 ```
4911 <enabled/> or <disabled/>
4912 ```
4913 #### macOS
4914 ```
4915 <dict>
4916 <key>PrimaryPassword</key>
4917 <true/> | <false/>
4918 </dict>
4919 ```
4920 #### policies.json
4921 ```
4922 {
4923 "policies": {
4924 "PrimaryPassword": true | false
4925 }
4926 }
4927 ```
4928 ### PrintingEnabled
4929 Enable or disable printing.
4930
4931 **Compatibility:** Firefox 120, Firefox ESR 115.5\
4932 **CCK2 Equivalent:** N/A\
4933 **Preferences Affected:** `print.enabled`
4934
4935 #### Windows (GPO)
4936 ```
4937 Software\Policies\Mozilla\Firefox\PrintingEnabled = 0x1 | 0x0
4938 ```
4939 #### Windows (Intune)
4940 OMA-URI:
4941 ```
4942 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrintingEnabled
4943 ```
4944 Value (string):
4945 ```
4946 <enabled/> or <disabled/>
4947 ```
4948 #### macOS
4949 ```
4950 <dict>
4951 <key>PrintingEnabled</key>
4952 <true/> | <false/>
4953 </dict>
4954 ```
4955 #### policies.json
4956 ```
4957 {
4958 "policies": {
4959 "PrintingEnabled": true | false
4960 }
4961 }
4962 ```
4963 ### PromptForDownloadLocation
4964 Ask where to save each file before downloading.
4965
4966 **Compatibility:** Firefox 68, Firefox ESR 68\
4967 **CCK2 Equivalent:** N/A\
4968 **Preferences Affected:** `browser.download.useDownloadDir`
4969
4970 #### Windows (GPO)
4971 ```
4972 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4973 ```
4974 #### Windows (Intune)
4975 OMA-URI:
4976 ```
4977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4978 ```
4979 Value (string):
4980 ```
4981 <enabled/> or <disabled/>
4982 ```
4983 #### macOS
4984 ```
4985 <dict>
4986 <key>PromptForDownloadLocation</key>
4987 <true/> | <false/>
4988 </dict>
4989 ```
4990 #### policies.json
4991 ```
4992 {
4993 "policies": {
4994 "PromptForDownloadLocation": true | false
4995 }
4996 }
4997 ```
4998 ### Proxy
4999 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
5000 To specify ports, append them to the hostnames with a colon (:).
5001
5002 Unless you lock this policy, changes the user already has in place will take effect.
5003
5004 `Mode` is the proxy method being used.
5005
5006 `Locked` is whether or not proxy settings can be changed.
5007
5008 `HTTPProxy` is the HTTP proxy server.
5009
5010 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
5011
5012 `SSLProxy` is the SSL proxy server.
5013
5014 `FTPProxy` is the FTP proxy server.
5015
5016 `SOCKSProxy` is the SOCKS proxy server
5017
5018 `SOCKSVersion` is the SOCKS version (4 or 5)
5019
5020 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
5021
5022 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
5023
5024 `AutoLogin` means do not prompt for authentication if password is saved.
5025
5026 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
5027
5028 **Compatibility:** Firefox 60, Firefox ESR 60\
5029 **CCK2 Equivalent:** `networkProxy*`\
5030 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
5031
5032 #### Windows (GPO)
5033 ```
5034 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
5035 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
5036 Software\Policies\Mozilla\Firefox\Proxy\HTTPProxy = https://httpproxy.example.com
5037 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
5038 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
5039 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
5040 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
5041 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
5042 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
5043 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
5044 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
5045 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
5046 ```
5047 #### Windows (Intune)
5048 **Note**
5049 These setttings were moved to a category to make them easier to configure via Intune.
5050
5051 OMA-URI:
5052 ```
5053 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked
5054 ```
5055 Value (string):
5056 ```
5057 <enabled/> or <disabled/>
5058 ```
5059 OMA-URI:
5060 ```
5061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType
5062 ```
5063 Value (string):
5064 ```
5065 <enabled/>
5066 <data id="Proxy_ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5067 ```
5068 OMA-URI:
5069 ```
5070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy
5071 ```
5072 Value (string):
5073 ```
5074 <enabled/>
5075 <data id="Proxy_HTTPProxy" value="httpproxy.example.com"/>
5076 ```
5077 OMA-URI:
5078 ```
5079 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols
5080 ```
5081 Value (string):
5082 ```
5083 <enabled/> or <disabled/>
5084 ```
5085 OMA-URI:
5086 ```
5087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy
5088 ```
5089 Value (string):
5090 ```
5091 <enabled/>
5092 <data id="Proxy_SSLProxy" value="sslproxy.example.com"/>
5093 ```
5094 OMA-URI:
5095 ```
5096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy
5097 ```
5098 Value (string):
5099 ```
5100 <enabled/>
5101 <data id="Proxy_SOCKSProxy" value="socksproxy.example.com"/>
5102 <data id="Proxy_SOCKSVersion" value="4 | 5"/>
5103 ```
5104 OMA-URI:
5105 ```
5106 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL
5107 ```
5108 Value (string):
5109 ```
5110 <enabled/>
5111 <data id="Proxy_AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5112 ```
5113 OMA-URI:
5114 ```
5115 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough
5116 ```
5117 Value (string):
5118 ```
5119 <enabled/>
5120 <data id="Proxy_Passthrough" value="&lt;local&gt;"/>
5121 ```
5122 OMA-URI:
5123 ```
5124 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin
5125 ```
5126 Value (string):
5127 ```
5128 <enabled/> or <disabled/>
5129 ```
5130 OMA-URI:
5131 ```
5132 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS
5133 ```
5134 Value (string):
5135 ```
5136 <enabled/> or <disabled/>
5137 ```
5138 OMA-URI (Old way):
5139 ```
5140 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
5141 ```
5142 Value (string):
5143 ```
5144 <enabled/>
5145 <data id="ProxyLocked" value="true | false"/>
5146 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5147 <data id="HTTPProxy" value="httpproxy.example.com"/>
5148 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
5149 <data id="SSLProxy" value="sslproxy.example.com"/>
5150 <data id="FTPProxy" value="ftpproxy.example.com"/>
5151 <data id="SOCKSProxy" value="socksproxy.example.com"/>
5152 <data id="SOCKSVersion" value="4 | 5"/>
5153 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5154 <data id="Passthrough" value="<local>"/>
5155 <data id="AutoLogin" value="true | false"/>
5156 <data id="UseProxyForDNS" value="true | false"/>
5157 ```
5158 #### macOS
5159 ```
5160 <dict>
5161 <key>Proxy</key>
5162 <dict>
5163 <key>Mode</key>
5164 <string>none | system | manual | autoDetect | autoConfig</string>
5165 <key>Locked</key>
5166 <true> | </false>
5167 <key>HTTPProxy</key>
5168 <string>https://httpproxy.example.com</string>
5169 <key>UseHTTPProxyForAllProtocols</key>
5170 <true> | </false>
5171 <key>SSLProxy</key>
5172 <string>https://sslproxy.example.com</string>
5173 <key>FTPProxy</key>
5174 <string>https://ftpproxy.example.com</string>
5175 <key>SOCKSProxy</key>
5176 <string>https://socksproxy.example.com</string>
5177 <key>SOCKSVersion</key>
5178 <string>4 | 5</string>
5179 <key>Passthrough</key>
5180 <string>&lt;local>&gt;</string>
5181 <key>AutoConfigURL</key>
5182 <string>URL_TO_AUTOCONFIG</string>
5183 <key>AutoLogin</key>
5184 <true> | </false>
5185 <key>UseProxyForDNS</key>
5186 <true> | </false>
5187 </dict>
5188 </dict>
5189 ```
5190 #### policies.json
5191 ```
5192 {
5193 "policies": {
5194 "Proxy": {
5195 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
5196 "Locked": true | false,
5197 "HTTPProxy": "hostname",
5198 "UseHTTPProxyForAllProtocols": true | false,
5199 "SSLProxy": "hostname",
5200 "FTPProxy": "hostname",
5201 "SOCKSProxy": "hostname",
5202 "SOCKSVersion": 4 | 5,
5203 "Passthrough": "<local>",
5204 "AutoConfigURL": "URL_TO_AUTOCONFIG",
5205 "AutoLogin": true | false,
5206 "UseProxyForDNS": true | false
5207 }
5208 }
5209 }
5210 ```
5211 ### RequestedLocales
5212 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
5213
5214 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
5215
5216 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
5217 **CCK2 Equivalent:** N/A\
5218 **Preferences Affected:** N/A
5219 #### Windows (GPO)
5220 ```
5221 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
5222 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
5223
5224 or
5225
5226 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
5227 ```
5228 #### Windows (Intune)
5229 OMA-URI:
5230 ```
5231 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
5232 ```
5233 Value (string):
5234 ```
5235 <enabled/>
5236 <data id="Preferences_String" value="de,en-US"/>
5237 ```
5238 #### macOS
5239 ```
5240 <dict>
5241 <key>RequestedLocales</key>
5242 <array>
5243 <string>de</string>
5244 <string>en-US</string>
5245 </array>
5246 </dict>
5247
5248 or
5249
5250 <dict>
5251 <key>RequestedLocales</key>
5252 <string>de,en-US</string>
5253 </dict>
5254
5255 ```
5256 #### policies.json
5257 ```
5258 {
5259 "policies": {
5260 "RequestedLocales": ["de", "en-US"]
5261 }
5262 }
5263
5264 or
5265
5266 {
5267 "policies": {
5268 "RequestedLocales": "de,en-US"
5269 }
5270 }
5271 ```
5272 <a name="SanitizeOnShutdown"></a>
5273
5274 ### SanitizeOnShutdown (Selective)
5275 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
5276
5277 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
5278
5279 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
5280 **CCK2 Equivalent:** N/A\
5281 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5282 #### Windows (GPO)
5283 ```
5284 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
5285 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
5286 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
5287 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
5288 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
5289 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
5290 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
5291 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
5292 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
5293 ```
5294 #### Windows (Intune)
5295 OMA-URI:
5296 ```
5297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
5298 ```
5299 Value (string):
5300 ```
5301 <enabled/> or <disabled/>
5302 ```
5303 OMA-URI:
5304 ```
5305 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
5306 ```
5307 Value (string):
5308 ```
5309 <enabled/> or <disabled/>
5310 ```
5311 OMA-URI:
5312 ```
5313 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
5314 ```
5315 Value (string):
5316 ```
5317 <enabled/> or <disabled/>
5318 ```
5319 OMA-URI:
5320 ```
5321 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
5322 ```
5323 Value (string):
5324 ```
5325 <enabled/> or <disabled/>
5326 ```
5327 OMA-URI:
5328 ```
5329 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
5330 ```
5331 Value (string):
5332 ```
5333 <enabled/> or <disabled/>
5334 ```
5335 OMA-URI:
5336 ```
5337 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
5338 ```
5339 Value (string):
5340 ```
5341 <enabled/> or <disabled/>
5342 ```
5343 OMA-URI:
5344 ```
5345 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
5346 ```
5347 Value (string):
5348 ```
5349 <enabled/> or <disabled/>
5350 ```
5351 OMA-URI:
5352 ```
5353 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
5354 ```
5355 Value (string):
5356 ```
5357 <enabled/> or <disabled/>
5358 ```
5359 OMA-URI:
5360 ```
5361 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5362 ```
5363 Value (string):
5364 ```
5365 <enabled/> or <disabled/>
5366 ```
5367 #### macOS
5368 ```
5369 <dict>
5370 <key>SanitizeOnShutdown</key>
5371 <dict>
5372 <key>Cache</key>
5373 <true/> | <false/>
5374 <key>Cookies</key>
5375 <true/> | <false/>
5376 <key>Downloads</key>
5377 <true/> | <false/>
5378 <key>FormData</key>
5379 <true/> | <false/>
5380 <key>History</key>
5381 <true/> | <false/>
5382 <key>Sessions</key>
5383 <true/> | <false/>
5384 <key>SiteSettings</key>
5385 <true/> | <false/>
5386 <key>OfflineApps</key>
5387 <true/> | <false/>
5388 <key>Locked</key>
5389 <true/> | <false/>
5390 </dict>
5391 </dict>
5392 ```
5393 #### policies.json
5394 ```
5395 {
5396 "policies": {
5397 "SanitizeOnShutdown": {
5398 "Cache": true | false,
5399 "Cookies": true | false,
5400 "Downloads": true | false,
5401 "FormData": true | false,
5402 "History": true | false,
5403 "Sessions": true | false,
5404 "SiteSettings": true | false,
5405 "OfflineApps": true | false,
5406 "Locked": true | false
5407 }
5408 }
5409 }
5410 ```
5411 ### SanitizeOnShutdown (All)
5412 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5413
5414 **Compatibility:** Firefox 60, Firefox ESR 60\
5415 **CCK2 Equivalent:** N/A\
5416 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5417 #### Windows (GPO)
5418 ```
5419 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5420 ```
5421 #### Windows (Intune)
5422 OMA-URI:
5423 ```
5424 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5425 ```
5426 Value (string):
5427 ```
5428 <enabled/> or <disabled/>
5429 ```
5430 #### macOS
5431 ```
5432 <dict>
5433 <key>SanitizeOnShutdown</key>
5434 <true/> | <false/>
5435 </dict>
5436 ```
5437 #### policies.json
5438 ```
5439 {
5440 "policies": {
5441 "SanitizeOnShutdown": true | false
5442 }
5443 }
5444 ```
5445 ### SearchBar
5446 Set whether or not search bar is displayed.
5447
5448 **Compatibility:** Firefox 60, Firefox ESR 60\
5449 **CCK2 Equivalent:** `showSearchBar`\
5450 **Preferences Affected:** N/A
5451
5452 #### Windows (GPO)
5453 ```
5454 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5455 ```
5456
5457 #### Windows (Intune)
5458 OMA-URI:
5459 ```
5460 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5461 ```
5462 Value (string):
5463 ```
5464 <enabled/>
5465 <data id="SearchBar" value="unified | separate"/>
5466 ```
5467 #### macOS
5468 ```
5469 <dict>
5470 <key>SearchBar</key>
5471 <string>unified | separate</string>
5472 </dict>
5473 ```
5474 #### policies.json
5475 ```
5476 {
5477 "policies": {
5478 "SearchBar": "unified" | "separate"
5479 }
5480 }
5481 ```
5482 <a name="SearchEngines"></a>
5483
5484 ### SearchEngines (This policy is only available on the ESR.)
5485
5486 ### SearchEngines | Add
5487
5488 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5489
5490 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5491
5492 `Name` is the name of the search engine.
5493
5494 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5495
5496 `Method` is either GET or POST
5497
5498 `IconURL` is a URL for the icon to use.
5499
5500 `Alias` is a keyword to use for the engine.
5501
5502 `Description` is a description of the search engine.
5503
5504 `PostData` is the POST data as name value pairs separated by &.
5505
5506 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5507
5508 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5509
5510 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5511 **CCK2 Equivalent:** `searchplugins`\
5512 **Preferences Affected:** N/A
5513
5514 #### Windows (GPO)
5515 ```
5516 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5517 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5518 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5519 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5520 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5521 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5522 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5523 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5524 ```
5525 #### Windows (Intune)
5526 OMA-URI:
5527 ```
5528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5529 ```
5530 Value (string):
5531 ```
5532 <enabled/>
5533 <data id="SearchEngine_Name" value="Example1"/>
5534 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5535 <data id="SearchEngine_Method" value="GET | POST"/>
5536 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5537 <data id="SearchEngine_Alias" value="example"/>
5538 <data id="SearchEngine_Description" value="Example Description"/>
5539 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5540 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5541 ```
5542 #### macOS
5543 ```
5544 <dict>
5545 <key>SearchEngines</key>
5546 <dict>
5547 <key>Add</key>
5548 <array>
5549 <dict>
5550 <key>Name</key>
5551 <string>Example1</string>
5552 <key>URLTemplate</key>
5553 <string>https://www.example.org/q={searchTerms}</string>
5554 <key>Method</key>
5555 <string>GET | POST </string>
5556 <key>IconURL</key>
5557 <string>https://www.example.org/favicon.ico</string>
5558 <key>Alias</key>
5559 <string>example</string>
5560 <key>Description</key>
5561 <string>Example Description</string>
5562 <key>SuggestURLTemplate</key>
5563 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5564 <key>PostData</key>
5565 <string>name=value&q={searchTerms}</string>
5566 </dict>
5567 <array>
5568 </dict>
5569 </dict>
5570 ```
5571 #### policies.json
5572 ```
5573 {
5574 "policies": {
5575 "SearchEngines": {
5576 "Add": [
5577 {
5578 "Name": "Example1",
5579 "URLTemplate": "https://www.example.org/q={searchTerms}",
5580 "Method": "GET" | "POST",
5581 "IconURL": "https://www.example.org/favicon.ico",
5582 "Alias": "example",
5583 "Description": "Description",
5584 "PostData": "name=value&q={searchTerms}",
5585 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5586 }
5587 ]
5588 }
5589 }
5590 }
5591 ```
5592 ### SearchEngines | Default
5593
5594 Set the default search engine. This policy is only available on the ESR.
5595
5596 **Compatibility:** Firefox ESR 60\
5597 **CCK2 Equivalent:** `defaultSearchEngine`\
5598 **Preferences Affected:** N/A
5599
5600 #### Windows (GPO)
5601 ```
5602 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5603 ```
5604 #### Windows (Intune)
5605 OMA-URI:
5606 ```
5607 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5608 ```
5609 Value (string):
5610 ```
5611 <enabled/>
5612 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5613 ```
5614 #### macOS
5615 ```
5616 <dict>
5617 <key>SearchEngines</key>
5618 <dict>
5619 <key>Default</key>
5620 <string>NAME_OF_SEARCH_ENGINE</string>
5621 </dict>
5622 </dict>
5623 ```
5624 #### policies.json
5625 ```
5626 {
5627 "policies": {
5628 "SearchEngines": {
5629 "Default": "NAME_OF_SEARCH_ENGINE"
5630 }
5631 }
5632 }
5633 ```
5634 ### SearchEngines | PreventInstalls
5635
5636 Prevent installing search engines from webpages.
5637
5638 **Compatibility:** Firefox ESR 60\
5639 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5640 **Preferences Affected:** N/A
5641
5642 #### Windows (GPO)
5643 ```
5644 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5645 ```
5646 #### Windows (Intune)
5647 OMA-URI:
5648 ```
5649 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5650 ```
5651 Value (string):
5652 ```
5653 <enabled/> or <disabled/>
5654 ```
5655 #### macOS
5656 ```
5657 <dict>
5658 <key>SearchEngines</key>
5659 <dict>
5660 <key>PreventInstalls</key>
5661 <true/> | <false/>
5662 </dict>
5663 </dict>
5664 ```
5665 #### policies.json
5666 ```
5667 {
5668 "policies": {
5669 "SearchEngines": {
5670 "PreventInstalls": true | false
5671 }
5672 }
5673 }
5674 ```
5675 ### SearchEngines | Remove
5676
5677 Hide built-in search engines. This policy is only available on the ESR.
5678
5679 **Compatibility:** Firefox ESR 60.2\
5680 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5681 **Preferences Affected:** N/A
5682
5683 #### Windows (GPO)
5684 ```
5685 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5686 ```
5687 #### Windows (Intune)
5688 OMA-URI:
5689 ```
5690 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5691 ```
5692 Value (string):
5693 ```
5694 <enabled/>
5695 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5696 ```
5697 #### macOS
5698 ```
5699 <dict>
5700 <key>SearchEngines</key>
5701 <dict>
5702 <key>Remove</key>
5703 <array>
5704 <string>NAME_OF_SEARCH_ENGINE</string>
5705 </array>
5706 </dict>
5707 </dict>
5708 ```
5709 #### policies.json
5710 ```
5711 {
5712 "policies": {
5713 "SearchEngines": {
5714 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5715 }
5716 }
5717 }
5718 ```
5719 ### SearchSuggestEnabled
5720
5721 Enable search suggestions.
5722
5723 **Compatibility:** Firefox 68, Firefox ESR 68\
5724 **CCK2 Equivalent:** N/A\
5725 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5726
5727 #### Windows (GPO)
5728 ```
5729 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5730 ```
5731 #### Windows (Intune)
5732 OMA-URI:
5733 ```
5734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5735 ```
5736 Value (string):
5737 ```
5738 <enabled/> or <disabled/>
5739 ```
5740 #### macOS
5741 ```
5742 <dict>
5743 <key>SearchSuggestEnabled</key>
5744 <true/> | <false/>
5745 </dict>
5746 ```
5747 #### policies.json
5748 ```
5749 {
5750 "policies": {
5751 "SearchSuggestEnabled": true | false
5752 }
5753 }
5754 ```
5755 ### SecurityDevices
5756
5757 Add or delete PKCS #11 modules.
5758
5759 **Compatibility:** Firefox 114, Firefox ESR 112.12\
5760 **CCK2 Equivalent:** N/A\
5761 **Preferences Affected:** N/A
5762
5763 #### Windows (GPO)
5764 ```
5765 Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE
5766 Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE
5767 ```
5768 #### Windows (Intune)
5769 OMA-URI:
5770 ```
5771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add
5772 ```
5773 Value (string):
5774 ```
5775 <enabled/>
5776 <data id="SecurityDevices" value="NAME_OF_DEVICE_TO_ADD&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5777 ```
5778 OMA-URI:
5779 ```
5780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete
5781 ```
5782 Value (string):
5783 ```
5784 <enabled/>
5785 <data id="SecurityDevices" value="1&#xF000;NAME_OF_DEVICE_TO_REMOVE"/>
5786 ```
5787 #### macOS
5788 ```
5789 <dict>
5790 <key>SecurityDevices</key>
5791 <dict>
5792 <key>Add<key>
5793 <dict>
5794 <key>NAME_OF_DEVICE_TO_ADD</key>
5795 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5796 </dict>
5797 <key>Delete</add>
5798 <array>
5799 <string>NAME_OF_DEVICE_TO_DELETE</string>
5800 </array>
5801 </dict>
5802 </dict>
5803 ```
5804 #### policies.json
5805 ```
5806 {
5807 "policies": {
5808 "SecurityDevices": {
5809 "Add": {
5810 "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE"
5811 },
5812 "Delete": ["NAME_OF_DEVICE_TO_DELETE"]
5813 }
5814 }
5815 }
5816 ```
5817 ### SecurityDevices (Deprecated)
5818
5819 Install PKCS #11 modules.
5820
5821 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5822 **CCK2 Equivalent:** `certs.devices`\
5823 **Preferences Affected:** N/A
5824
5825 #### Windows (GPO)
5826 ```
5827 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5828 ```
5829 #### Windows (Intune)
5830 OMA-URI:
5831 ```
5832 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5833 ```
5834 Value (string):
5835 ```
5836 <enabled/>
5837 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5838 ```
5839 #### macOS
5840 ```
5841 <dict>
5842 <key>SecurityDevices</key>
5843 <dict>
5844 <key>NAME_OF_DEVICE</key>
5845 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5846 </dict>
5847 </dict>
5848 ```
5849 #### policies.json
5850 ```
5851 {
5852 "policies": {
5853 "SecurityDevices": {
5854 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5855 }
5856 }
5857 }
5858 ```
5859 ### ShowHomeButton
5860 Show the home button on the toolbar.
5861
5862 Future versions of Firefox will not show the home button by default.
5863
5864 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5865 **CCK2 Equivalent:** N/A\
5866 **Preferences Affected:** N/A
5867
5868 #### Windows (GPO)
5869 ```
5870 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5871 ```
5872 #### Windows (Intune)
5873 OMA-URI:
5874 ```
5875 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
5876 ```
5877 Value (string):
5878 ```
5879 <enabled/> or <disabled/>
5880 ```
5881 #### macOS
5882 ```
5883 <dict>
5884 <key>ShowHomeButton</key>
5885 <true/> | <false/>
5886 </dict>
5887 ```
5888 #### policies.json
5889 ```
5890 {
5891 "policies": {
5892 "ShowHomeButton": true | false
5893 }
5894 }
5895 ```
5896 ### SSLVersionMax
5897
5898 Set and lock the maximum version of TLS. (Firefox defaults to a maximum of TLS 1.3.)
5899
5900 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5901 **CCK2 Equivalent:** N/A\
5902 **Preferences Affected:** `security.tls.version.max`
5903
5904 #### Windows (GPO)
5905 ```
5906 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5907 ```
5908 #### Windows (Intune)
5909 OMA-URI:
5910 ```
5911 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5912 ```
5913 Value (string):
5914 ```
5915 <enabled/>
5916 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5917 ```
5918 #### macOS
5919 ```
5920 <dict>
5921 <key>SSLVersionMax</key>
5922 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5923 </dict>
5924 ```
5925
5926 #### policies.json
5927 ```
5928 {
5929 "policies": {
5930 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5931 }
5932 }
5933 ```
5934 ### SSLVersionMin
5935
5936 Set and lock the minimum version of TLS. (Firefox defaults to a minimum of TLS 1.2.)
5937
5938 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5939 **CCK2 Equivalent:** N/A\
5940 **Preferences Affected:** `security.tls.version.min`
5941
5942 #### Windows (GPO)
5943 ```
5944 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5945 ```
5946 #### Windows (Intune)
5947 OMA-URI:
5948 ```
5949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5950 ```
5951 Value (string):
5952 ```
5953 <enabled/>
5954 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5955 ```
5956 #### macOS
5957 ```
5958 <dict>
5959 <key>SSLVersionMin</key>
5960 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5961 </dict>
5962 ```
5963
5964 #### policies.json
5965 ```
5966 {
5967 "policies": {
5968 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5969 }
5970 }
5971 ```
5972 ### SupportMenu
5973 Add a menuitem to the help menu for specifying support information.
5974
5975 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5976 **CCK2 Equivalent:** helpMenu\
5977 **Preferences Affected:** N/A
5978
5979 #### Windows (GPO)
5980 ```
5981 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5982 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5983 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5984 ```
5985 #### Windows (Intune)
5986 OMA-URI:
5987 ```
5988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5989 ```
5990 Value (string):
5991 ```
5992 <enabled/>
5993 <data id="SupportMenuTitle" value="Support Menu"/>
5994 <data id="SupportMenuURL" value="http://example.com/support"/>
5995 <data id="SupportMenuAccessKey" value="S"/>
5996 ```
5997 #### macOS
5998 ```
5999 <dict>
6000 <key>SupportMenu</key>
6001 <dict>
6002 <key>Title</key>
6003 <string>SupportMenu</string>
6004 <key>URL</key>
6005 <string>http://example.com/support</string>
6006 <key>AccessKey</key>
6007 <string>S</string>
6008 </dict>
6009 </dict>
6010 ```
6011 #### policies.json
6012 ```
6013 {
6014 "policies": {
6015 "SupportMenu": {
6016 "Title": "Support Menu",
6017 "URL": "http://example.com/support",
6018 "AccessKey": "S"
6019 }
6020 }
6021 }
6022 ```
6023 ### StartDownloadsInTempDirectory
6024 Force downloads to start off in a local, temporary location rather than the default download directory.
6025
6026 **Compatibility:** Firefox 102\
6027 **CCK2 Equivalent:** N/A\
6028 **Preferences Affected:** `browser.download.start_downloads_in_tmp_dir`
6029
6030 #### Windows (GPO)
6031 ```
6032 Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
6033 ```
6034 #### Windows (Intune)
6035 OMA-URI:
6036 ```
6037 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
6038 ```
6039 Value (string):
6040 ```
6041 <enabled/> or <disabled/>
6042 ```
6043 #### macOS
6044 ```
6045 <dict>
6046 <key>StartDownloadsInTempDirectory</key>
6047 <true/> | <false/>
6048 </dict>
6049 ```
6050 #### policies.json
6051 ```
6052 {
6053 "policies": {
6054 "StartDownloadsInTempDirectory": true | false
6055 }
6056 ```
6057 ### UserMessaging
6058
6059 Prevent Firefox from messaging the user in certain situations.
6060
6061 `WhatsNew` Remove the "What's New" icon and menuitem.
6062
6063 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
6064
6065 `FeatureRecommendations` If false, don't recommend browser features.
6066
6067 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
6068
6069 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
6070
6071 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
6072
6073 `Locked` prevents the user from changing user messaging preferences.
6074
6075 **Compatibility:** Firefox 75, Firefox ESR 68.7\
6076 **CCK2 Equivalent:** N/A\
6077 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
6078
6079 #### Windows (GPO)
6080 ```
6081 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
6082 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
6083 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
6084 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
6085 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
6086 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
6087 Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0
6088 ```
6089 #### Windows (Intune)
6090 OMA-URI:
6091 ```
6092 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
6093 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
6094 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
6095 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
6096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
6097 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
6098 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_Locked
6099 ```
6100 Value (string):
6101 ```
6102 <enabled/> or <disabled/>
6103 ```
6104 #### macOS
6105 ```
6106 <dict>
6107 <key>UserMessaging</key>
6108 <dict>
6109 <key>WhatsNew</key>
6110 <true/> | <false/>
6111 <key>ExtensionRecommendations</key>
6112 <true/> | <false/>
6113 <key>FeatureRecommendations</key>
6114 <true/> | <false/>
6115 <key>UrlbarInterventions</key>
6116 <true/> | <false/>
6117 <key>SkipOnboarding</key>
6118 <true/> | <false/>
6119 <key>MoreFromMozilla</key>
6120 <true/> | <false/>
6121 <key>Locked</key>
6122 <true/> | <false/>
6123 </dict>
6124 </dict>
6125 ```
6126 #### policies.json
6127 ```
6128 {
6129 "policies": {
6130 "UserMessaging": {
6131 "WhatsNew": true | false,
6132 "ExtensionRecommendations": true | false,
6133 "FeatureRecommendations": true | false,
6134 "UrlbarInterventions": true | false,
6135 "SkipOnboarding": true | false,
6136 "MoreFromMozilla": true | false,
6137 "Locked": true | false
6138 }
6139 }
6140 }
6141 ```
6142 ### UseSystemPrintDialog
6143 Use the system print dialog instead of the print preview window.
6144
6145 **Compatibility:** Firefox 102\
6146 **CCK2 Equivalent:** N/A\
6147 **Preferences Affected:** `print.prefer_system_dialog`
6148
6149 #### Windows (GPO)
6150 ```
6151 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
6152 ```
6153 #### Windows (Intune)
6154 OMA-URI:
6155 ```
6156 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
6157 ```
6158 Value (string):
6159 ```
6160 <enabled/> or <disabled/>
6161 ```
6162 #### macOS
6163 ```
6164 <dict>
6165 <key>UseSystemPrintDialog</key>
6166 <true/> | <false/>
6167 </dict>
6168 ```
6169 #### policies.json
6170 ```
6171 {
6172 "policies": {
6173 "UseSystemPrintDialog": true | false
6174 }
6175 }
6176 ```
6177 ### WebsiteFilter
6178 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
6179 The arrays are limited to 1000 entries each.
6180
6181 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
6182
6183 For specific protocols, use `https://*/*` or `http://*/*`.
6184
6185 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
6186
6187 **Compatibility:** Firefox 60, Firefox ESR 60\
6188 **CCK2 Equivalent:** N/A\
6189 **Preferences Affected:** N/A
6190
6191 #### Windows (GPO)
6192 ```
6193 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
6194 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
6195 ```
6196 #### Windows (Intune)
6197 OMA-URI:
6198 ```
6199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
6200 ```
6201 Value (string):
6202 ```
6203 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
6204 ```
6205 OMA-URI:
6206 ```
6207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
6208 ```
6209 Value (string):
6210 ```
6211 <enabled/>
6212 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
6213 ```
6214 #### macOS
6215 ```
6216 <dict>
6217 <key>WebsiteFilter</key>
6218 <dict>
6219 <key>Block</key>
6220 <array>
6221 <string><all_urls></string>
6222 </array>
6223 <key>Exceptions</key>
6224 <array>
6225 <string>http://example.org/*</string>
6226 </array>
6227 </dict>
6228
6229 </dict>
6230 ```
6231 #### policies.json
6232 ```
6233 {
6234 "policies": {
6235 "WebsiteFilter": {
6236 "Block": ["<all_urls>"],
6237 "Exceptions": ["http://example.org/*"]
6238 }
6239 }
6240 }
6241 ```
6242 ### WindowsSSO
6243 Allow Windows single sign-on for Microsoft, work, and school accounts.
6244
6245 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
6246
6247 **Compatibility:** Firefox 91\
6248 **CCK2 Equivalent:** N/A\
6249 **Preferences Affected:** `network.http.windows-sso.enabled`
6250
6251 #### Windows (GPO)
6252 ```
6253 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
6254 ```
6255 #### Windows (Intune)
6256 OMA-URI:
6257 ```
6258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
6259 ```
6260 Value (string):
6261 ```
6262 <enabled/> or <disabled/>
6263 ```
6264 #### policies.json
6265 ```
6266 {
6267 "policies": {
6268 "WindowsSSO": true | false
6269 }
6270 }
6271 ```

patrick-canterino.de