]> git.p6c8.net - policy-templates.git/blob - README.md
Fix typo
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
53 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
54 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
55 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
56 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
57 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
58 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
59 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
60 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
61 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
62 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
63 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
64 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
65 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
66 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
67 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
68 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
69 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
70 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
71 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
72 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
73 | **[`Preferences`](#preferences)** | Set and lock some preferences.
74 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
75 | **[`Proxy`](#proxy)** | Configure proxy settings.
76 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
77 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
78 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
79 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
80 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
81 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
82 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
83 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
84 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
87 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
88 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
89 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
90 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
91 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
92
93 ### AppAutoUpdate
94
95 Enable or disable **automatic** application update.
96
97 If set to true, application updates are installed without user approval.
98
99 If set to false, application updates are downloaded but the user can choose when to install the update.
100
101 If you have disabled updates via DisableAppUpdate, this policy has no effect.
102
103 **Compatibility:** Firefox 75, Firefox ESR 68.7\
104 **CCK2 Equivalent:** N/A\
105 **Preferences Affected:** app.update.auto
106
107 #### Windows (GPO)
108 ```
109 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
110 ```
111 #### Windows (Intune)
112 OMA-URI:
113 ```
114 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
115 ```
116 Value (string):
117 ```
118 <enabled/> or <disabled/>
119 ```
120 #### macOS
121 ```
122 <dict>
123 <key>AppAutoUpdate</key>
124 <true/> | <false/>
125 </dict>
126 ```
127 #### policies.json
128 ```
129 {
130 "policies": {
131 "AppAutoUpdate": true | false
132 }
133 }
134 ```
135 ### AppUpdateURL
136
137 Change the URL for application update.
138
139 **Compatibility:** Firefox 62, Firefox ESR 60.2\
140 **CCK2 Equivalent:** N/A\
141 **Preferences Affected:** `app.update.url`
142
143 #### Windows (GPO)
144 ```
145 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
146 ```
147 #### Windows (Intune)
148 OMA-URI:
149 ```
150 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
151 ```
152 Value (string):
153 ```
154 <enabled/>
155 <data id="AppUpdateURL" value="https://yoursite.com"/>
156 ```
157 #### macOS
158 ```
159 <dict>
160 <key>AppUpdateURL</key>
161 <string>https://yoursite.com</string>
162 </dict>
163 ```
164 #### policies.json
165 ```
166 {
167 "policies": {
168 "AppUpdateURL": "https://yoursite.com"
169 }
170 }
171 ```
172 ### Authentication
173
174 Configure sites that support integrated authentication.
175
176 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
177
178 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
179 **CCK2 Equivalent:** N/A\
180 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
181
182 #### Windows (GPO)
183 ```
184 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
185 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
186 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
187 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
191 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
192 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
193 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
194 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
195 ```
196 #### Windows (Intune)
197 OMA-URI:
198 ```
199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
200 ```
201 Value (string):
202 ```
203 <enabled/>
204 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
205 ```
206 OMA-URI:
207 ```
208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
209 ```
210 Value (string):
211 ```
212 <enabled/>
213 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
214 ```
215 OMA-URI:
216 ```
217 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
218 ```
219 Value (string):
220 ```
221 <enabled/>
222 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
223 ```
224 OMA-URI:
225 ```
226 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
227 ```
228 Value (string):
229 ```
230 <enabled/>
231 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
232 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
233 ```
234 OMA-URI:
235 ```
236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
237 ```
238 Value (string):
239 ```
240 <enabled/>
241 <data id="StartPage" value="none | homepage | previous-session"/>
242 ```
243 #### macOS
244 ```
245 <dict>
246 <key>Authentication</key>
247 <dict>
248 <key>SPNEGO</key>
249 <array>
250 <string>mydomain.com</string>
251 <string>https://myotherdomain.com</string>
252 </array>
253 <key>Delegated</key>
254 <array>
255 <string>mydomain.com</string>
256 <string>https://myotherdomain.com</string>
257 </array>
258 <key>NTLM</key>
259 <array>
260 <string>mydomain.com</string>
261 <string>https://myotherdomain.com</string>
262 </array>
263 <key>AllowNonFQDN</key>
264 <dict>
265 <key>SPNEGO</key>
266 <true/> | <false/>
267 <key>NTLM</key>
268 <true/> | <false/>
269 </dict>
270 <key>AllowProxies</key>
271 <dict>
272 <key>SPNEGO</key>
273 <true/> | <false/>
274 <key>NTLM</key>
275 <true/> | <false/>
276 </dict>
277 <key>Locked</key>
278 <true/> | <false/>
279 </dict>
280 </dict>
281 ```
282 #### policies.json
283 ```
284 {
285 "policies": {
286 "Authentication": {
287 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
288 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
289 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
290 "AllowNonFQDN": {
291 "SPNEGO": true | false,
292 "NTLM": true | false
293 },
294 "AllowProxies": {
295 "SPNEGO": true | false,
296 "NTLM": true | false
297 },
298 "Locked": true | false
299 }
300 }
301 }
302 ```
303 ### BlockAboutAddons
304
305 Block access to the Add-ons Manager (about:addons).
306
307 **Compatibility:** Firefox 60, Firefox ESR 60\
308 **CCK2 Equivalent:** `disableAddonsManager`\
309 **Preferences Affected:** N/A
310
311 #### Windows (GPO)
312 ```
313 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
314 ```
315 #### Windows (Intune)
316 OMA-URI:
317 ```
318 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
319 ```
320 Value (string):
321 ```
322 <enabled/> or <disabled/>
323 ```
324 #### macOS
325 ```
326 <dict>
327 <key>BlockAboutAddons</key>
328 <true/> | <false/>
329 </dict>
330 ```
331 #### policies.json
332 ```
333 {
334 "policies": {
335 "BlockAboutAddons": true | false
336 }
337 }
338 ```
339 ### BlockAboutConfig
340
341 Block access to about:config.
342
343 **Compatibility:** Firefox 60, Firefox ESR 60\
344 **CCK2 Equivalent:** `disableAboutConfig`\
345 **Preferences Affected:** N/A
346
347 #### Windows (GPO)
348 ```
349 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
350 ```
351 #### Windows (Intune)
352 OMA-URI:
353 ```
354 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
355 ```
356 Value (string):
357 ```
358 <enabled/> or <disabled/>
359 ```
360 #### macOS
361 ```
362 <dict>
363 <key>BlockAboutConfig</key>
364 <true/> | <false/>
365 </dict>
366 ```
367 #### policies.json
368 ```
369 {
370 "policies": {
371 "BlockAboutConfig": true | false
372 }
373 }
374 ```
375 ### BlockAboutProfiles
376
377 Block access to About Profiles (about:profiles).
378
379 **Compatibility:** Firefox 60, Firefox ESR 60\
380 **CCK2 Equivalent:** `disableAboutProfiles`\
381 **Preferences Affected:** N/A
382
383 #### Windows (GPO)
384 ```
385 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
386 ```
387 #### Windows (Intune)
388 OMA-URI:
389 ```
390 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
391 ```
392 Value (string):
393 ```
394 <enabled/> or <disabled/>
395 ```
396 #### macOS
397 ```
398 <dict>
399 <key>BlockAboutProfiles</key>
400 <true/> | <false/>
401 </dict>
402 ```
403 #### policies.json
404 ```
405 {
406 "policies": {
407 "BlockAboutProfiles": true | false
408 }
409 }
410 ```
411 ### BlockAboutSupport
412
413 Block access to Troubleshooting Information (about:support).
414
415 **Compatibility:** Firefox 60, Firefox ESR 60\
416 **CCK2 Equivalent:** `disableAboutSupport`\
417 **Preferences Affected:** N/A
418
419 #### Windows (GPO)
420 ```
421 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
422 ```
423 #### Windows (Intune)
424 OMA-URI:
425 ```
426 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
427 ```
428 Value (string):
429 ```
430 <enabled/> or <disabled/>
431 ```
432 #### macOS
433 ```
434 <dict>
435 <key>BlockAboutSupport</key>
436 <true/> | <false/>
437 </dict>
438 ```
439 #### policies.json
440 ```
441 {
442 "policies": {
443 "BlockAboutSupport": true | false
444 }
445 }
446 ```
447 ### Bookmarks
448
449 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
450
451 **Compatibility:** Firefox 60, Firefox ESR 60\
452 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
453 **Preferences Affected:** N/A
454
455 #### Windows (GPO)
456 ```
457 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
458 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
459 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
460 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
461 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
462 ```
463 #### Windows (Intune)
464 OMA-URI:
465 ```
466 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
467 ```
468 Value (string):
469 ```
470 <enabled/>
471 <data id="BookmarkTitle" value="Example"/>
472 <data id="BookmarkURL" value="https://example.com"/>
473 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
474 <data id="BookmarkPlacement" value="toolbar | menu"/>
475 <data id="BookmarkFolder" value="FolderName"/>
476 ```
477 #### macOS
478 ```
479 <dict>
480 <key>Bookmarks</key>
481 <array>
482 <dict>
483 <key>Title</key>
484 <string>Example</string>
485 <key>URL</key>
486 <string>https://example.com</string>
487 <key>Favicon</key>
488 <string>https://example.com/favicon.ico</string>
489 <key>Placement</key>
490 <string>toolbar | menu</string>
491 <key>Folder</key>
492 <string>FolderName</string>
493 </dict>
494 </array>
495 </dict>
496 ```
497 #### policies.json
498 ```
499 {
500 "policies": {
501 "Bookmarks": [
502 {
503 "Title": "Example",
504 "URL": "https://example.com",
505 "Favicon": "https://example.com/favicon.ico",
506 "Placement": "toolbar" | "menu",
507 "Folder": "FolderName"
508 }
509 ]
510 }
511 }
512 ```
513 ### CaptivePortal
514 Enable or disable the detection of captive portals.
515
516 **Compatibility:** Firefox 67, Firefox ESR 60.7\
517 **CCK2 Equivalent:** N/A\
518 **Preferences Affected:** `network.captive-portal-service.enabled`
519
520 #### Windows (GPO)
521 ```
522 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
523 ```
524 #### Windows (Intune)
525 OMA-URI:
526 ```
527 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
528 ```
529 Value (string):
530 ```
531 <enabled/> or <disabled/>
532 ```
533 #### macOS
534 ```
535 <dict>
536 <key>CaptivePortal</key>
537 <true/> | <false/>
538 </dict>
539 ```
540 #### policies.json
541 ```
542 {
543 "policies": {
544 "CaptivePortal": true | false
545 }
546 }
547 ```
548 ### Certificates
549
550 ### Certificates | ImportEnterpriseRoots
551
552 Trust certificates that have been added to the operating system certificate store by a user or administrator.
553
554 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
555
556 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
557 **CCK2 Equivalent:** N/A\
558 **Preferences Affected:** `security.enterprise_roots.enabled`
559
560 #### Windows (GPO)
561 ```
562 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
563 ```
564 #### Windows (Intune)
565 OMA-URI:
566 ```
567 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
568 ```
569 Value (string):
570 ```
571 <enabled/> or <disabled/>
572 ```
573 #### macOS
574 ```
575 <dict>
576 <key>Certificates</key>
577 <dict>
578 <key>ImportEnterpriseRoots</key>
579 <true/> | <false/>
580 </dict>
581 </dict>
582 ```
583 #### policies.json
584 ```
585 {
586 "policies": {
587 "Certificates": {
588 "ImportEnterpriseRoots": true | false
589 }
590 }
591 }
592 ```
593 ### Certificates | Install
594
595 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
596
597 - Windows
598 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
599 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
600 - macOS
601 - /Library/Application Support/Mozilla/Certificates
602 - ~/Library/Application Support/Mozilla/Certificates
603 - Linux
604 - /usr/lib/mozilla/certificates
605 - /usr/lib64/mozilla/certificates
606 - ~/.mozilla/certificates
607
608 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
609
610 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
611
612 Certificates are installed using the trust string `CT,CT,`.
613
614 Binary (DER) and ASCII (PEM) certificates are both supported.
615
616 **Compatibility:** Firefox 64, Firefox ESR 64\
617 **CCK2 Equivalent:** `certs.ca`\
618 **Preferences Affected:** N/A
619
620 #### Windows (GPO)
621 ```
622 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
623 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
624 ```
625 #### Windows (Intune)
626 OMA-URI:
627 ```
628 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
629 ```
630 Value (string):
631 ```
632 <enabled/>
633 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
634 ```
635 #### macOS
636 ```
637 <dict>
638 <key>Certificates</key>
639 <dict>
640 <key>Install</key>
641 <array>
642 <string>cert1.der</string>
643 <string>/Users/username/cert2.pem</string>
644 </array>
645 </dict>
646 </dict>
647 ```
648 #### policies.json
649 ```
650 {
651 "policies": {
652 "Certificates": {
653 "Install": ["cert1.der", "/home/username/cert2.pem"]
654 }
655 }
656 }
657 ```
658 ### Cookies
659 Configure cookie preferences.
660
661 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
662
663 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
664
665 `Default` determines whether cookies are accepted at all.
666
667 `AcceptThirdParty` determines how third-party cookies are handled.
668
669 `ExpireAtSessionEnd` determines when cookies expire.
670
671 `RejectTracker` only rejects cookies for trackers.
672
673 `Locked` prevents the user from changing cookie preferences.
674
675 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
676 **CCK2 Equivalent:** N/A\
677 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
678
679 #### Windows (GPO)
680 ```
681 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
682 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
683 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
684 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
685 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
686 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
687 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
688 ```
689 #### Windows (Intune)
690 OMA-URI:
691 ```
692 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
693 ```
694 Value (string):
695 ```
696 <enabled/>
697 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
698 ```
699 OMA-URI:
700 ```
701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
702 ```
703 Value (string):
704 ```
705 <enabled/>
706 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
707 ```
708 OMA-URI:
709 ```
710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
711 ```
712 Value (string):
713 ```
714 <enabled/> or <disabled/>
715 ```
716 OMA-URI:
717 ```
718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
719 ```
720 Value (string):
721 ```
722 <enabled/>
723 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
724 ```
725 OMA-URI:
726 ```
727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
728 ```
729 Value (string):
730 ```
731 <enabled/> or <disabled/>
732 ```
733 OMA-URI:
734 ```
735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
736 ```
737 Value (string):
738 ```
739 <enabled/> or <disabled/>
740 ```
741 OMA-URI:
742 ```
743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
744 ```
745 Value (string):
746 ```
747 <enabled/> or <disabled/>
748 ```
749 #### macOS
750 ```
751 <dict>
752 <key>Cookies</key>
753 <dict>
754 <key>Allow</key>
755 <array>
756 <string>http://example.com</string>
757 </array>
758 <key>Block</key>
759 <array>
760 <string>http://example.org</string>
761 </array>
762 <key>Default</key>
763 <true/> | <false/>
764 <key>AcceptThirdParty</key>
765 <string>always | never | from-visited</string>
766 <key>ExpireAtSessionEnd</key>
767 <true/> | <false/>
768 <key>RejectTracker</key>
769 <true/> | <false/>
770 <key>Locked</key>
771 <true/> | <false/>
772 </dict>
773 </dict>
774 ```
775 #### policies.json
776 ```
777 {
778 "policies": {
779 "Cookies": {
780 "Allow": ["http://example.org/"],
781 "Block": ["http://example.edu/"],
782 "Default": true | false,
783 "AcceptThirdParty": "always" | "never" | "from-visited",
784 "ExpireAtSessionEnd": true | false,
785 "RejectTracker": true | false,
786 "Locked": true | false
787 }
788 }
789 }
790 ```
791 ### DisableSetDesktopBackground
792 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
793
794 **Compatibility:** Firefox 60, Firefox ESR 60\
795 **CCK2 Equivalent:** `removeSetDesktopBackground`\
796 **Preferences Affected:** N/A
797
798 #### Windows (GPO)
799 ```
800 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
801 ```
802 #### Windows (Intune)
803 OMA-URI:
804 ```
805 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
806 ```
807 Value (string):
808 ```
809 <enabled/> or <disabled/>
810 ```
811 #### macOS
812 ```
813 <dict>
814 <key>DisableSetDesktopBackground</key>
815 <true/> | <false/>
816 </dict>
817 ```
818 #### policies.json
819 ```
820 {
821 "policies": {
822 "DisableSetDesktopBackground": true | false
823 }
824 }
825 ```
826 ### DisableMasterPasswordCreation
827 Remove the master password functionality.
828
829 **Compatibility:** Firefox 60, Firefox ESR 60\
830 **CCK2 Equivalent:** `noMasterPassword`\
831 **Preferences Affected:** N/A
832
833 #### Windows (GPO)
834 ```
835 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
836 ```
837 #### Windows (Intune)
838 OMA-URI:
839 ```
840 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
841 ```
842 Value (string):
843 ```
844 <enabled/> or <disabled/>
845 ```
846 #### macOS
847 ```
848 <dict>
849 <key>DisableMasterPasswordCreation</key>
850 <true/> | <false/>
851 </dict>
852 ```
853 #### policies.json
854 ```
855 {
856 "policies": {
857 "DisableMasterPasswordCreation": true | false
858 }
859 }
860 ```
861 ### DisableAppUpdate
862 Turn off application updates.
863
864 **Compatibility:** Firefox 60, Firefox ESR 60\
865 **CCK2 Equivalent:** `disableFirefoxUpdates`\
866 **Preferences Affected:** N/A
867
868 #### Windows (GPO)
869 ```
870 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
871 ```
872 #### Windows (Intune)
873 OMA-URI:
874 ```
875 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
876 ```
877 Value (string):
878 ```
879 <enabled/> or <disabled/>
880 ```
881 #### macOS
882 ```
883 <dict>
884 <key>DisableAppUpdate</key>
885 <true/> | <false/>
886 </dict>
887 ```
888 #### policies.json
889 ```
890 {
891 "policies": {
892 "DisableAppUpdate": true | false
893 }
894 }
895 ```
896 ### DisableBuiltinPDFViewer
897 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
898
899 **Compatibility:** Firefox 60, Firefox ESR 60\
900 **CCK2 Equivalent:** `disablePDFjs`\
901 **Preferences Affected:** `pdfjs.disabled`
902
903 #### Windows (GPO)
904 ```
905 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
906 ```
907 #### Windows (Intune)
908 OMA-URI:
909 ```
910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
911 ```
912 Value (string):
913 ```
914 <enabled/> or <disabled/>
915 ```
916 #### macOS
917 ```
918 <dict>
919 <key>DisableBuiltinPDFViewer</key>
920 <true/> | <false/>
921 </dict>
922 ```
923 #### policies.json
924 ```
925 {
926 "policies": {
927 "DisableBuiltinPDFViewer": true | false
928 }
929 }
930 ```
931 ### DisabledCiphers
932 Disable specific cryptographic ciphers.
933
934 **Compatibility:** Firefox 76, Firefox ESR 68.8\
935 **CCK2 Equivalent:** N/A\
936 **Preferences Affected:** N/A
937
938 #### Windows (GPO)
939 ```
940 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
941 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
942 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
943 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
944 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
945 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
946 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
947 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
948 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
949 ```
950 #### Windows (Intune)
951 OMA-URI:
952 ```
953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
954 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
955 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
956 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
958 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
959 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
961 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
962 ```
963 Value (string):
964 ```
965 <enabled/> or <disabled/>
966 ```
967 #### macOS
968 ```
969 <dict>
970 <key>DisabledCiphers</key>
971 <dict>
972 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
973 <true/> | <false/>
974 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
975 <true/> | <false/>
976 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
977 <true/> | <false/>
978 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
979 <true/> | <false/>
980 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
981 <true/> | <false/>
982 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
983 <true/> | <false/>
984 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
985 <true/> | <false/>
986 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
987 <true/> | <false/>
988 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
989 <true/> | <false/>
990 </dict>
991 </dict>
992 ```
993 #### policies.json
994 ```
995 {
996 "policies": {
997 "DisabledCiphers" {
998 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
999 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1000 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1001 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1002 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1003 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1004 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1005 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1006 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1007 }
1008 }
1009 }
1010 ```
1011 ### DisableDefaultBrowserAgent
1012 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1013
1014 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1015 **CCK2 Equivalent:** N/A\
1016 **Preferences Affected:** N/A
1017
1018 #### Windows (GPO)
1019 ```
1020 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1021 ```
1022 #### Windows (Intune)
1023 OMA-URI:
1024 ```
1025 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1026 ```
1027 Value (string):
1028 ```
1029 <enabled/> or <disabled/>
1030 ```
1031 #### policies.json
1032 ```
1033 {
1034 "policies": {
1035 "DisableDefaultBrowserAgent": true | false
1036 }
1037 }
1038 ```
1039 ### DisableDeveloperTools
1040 Remove access to all developer tools.
1041
1042 **Compatibility:** Firefox 60, Firefox ESR 60\
1043 **CCK2 Equivalent:** `removeDeveloperTools`\
1044 **Preferences Affected:** `devtools.policy.disabled`
1045
1046 #### Windows (GPO)
1047 ```
1048 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1049 ```
1050 #### Windows (Intune)
1051 OMA-URI:
1052 ```
1053 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1054 ```
1055 Value (string):
1056 ```
1057 <enabled/> or <disabled/>
1058 ```
1059 #### macOS
1060 ```
1061 <dict>
1062 <key>DisableDeveloperTools</key>
1063 <true/> | <false/>
1064 </dict>
1065 ```
1066 #### policies.json
1067 ```
1068 {
1069 "policies": {
1070 "DisableDeveloperTools": true | false
1071 }
1072 }
1073 ```
1074 ### DisableFeedbackCommands
1075 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1076
1077 **Compatibility:** Firefox 60, Firefox ESR 60\
1078 **CCK2 Equivalent:** N/A\
1079 **Preferences Affected:** N/A
1080
1081 #### Windows (GPO)
1082 ```
1083 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1084 ```
1085 #### Windows (Intune)
1086 OMA-URI:
1087 ```
1088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1089 ```
1090 Value (string):
1091 ```
1092 <enabled/> or <disabled/>
1093 ```
1094 #### macOS
1095 ```
1096 <dict>
1097 <key>DisableFeedbackCommands</key>
1098 <true/> | <false/>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableFeedbackCommands": true | false
1106 }
1107 }
1108 ```
1109 ### DisableFirefoxScreenshots
1110 Remove access to Firefox Screenshots.
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** N/A\
1114 **Preferences Affected:** `extensions.screenshots.disabled`
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableFirefoxScreenshots</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableFirefoxScreenshots": true | false
1141 }
1142 }
1143 ```
1144 ### DisableFirefoxAccounts
1145 Disable Firefox Accounts integration (Sync).
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60\
1148 **CCK2 Equivalent:** `disableSync`\
1149 **Preferences Affected:** `identity.fxaccounts.enabled`
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1154 ```
1155 #### Windows (Intune)
1156 OMA-URI:
1157 ```
1158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1159 ```
1160 Value (string):
1161 ```
1162 <enabled/> or <disabled/>
1163 ```
1164 #### macOS
1165 ```
1166 <dict>
1167 <key>DisableFirefoxAccounts</key>
1168 <true/> | <false/>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableFirefoxAccounts": true | false
1176 }
1177 }
1178 ```
1179 ### DisableFirefoxStudies
1180 Disable Firefox studies (Shield).
1181
1182 **Compatibility:** Firefox 60, Firefox ESR 60\
1183 **CCK2 Equivalent:** N/A\
1184 **Preferences Affected:** N/A
1185
1186 #### Windows (GPO)
1187 ```
1188 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1189 ```
1190 #### Windows (Intune)
1191 OMA-URI:
1192 ```
1193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1194 ```
1195 Value (string):
1196 ```
1197 <enabled/> or <disabled/>
1198 ```
1199 #### macOS
1200 ```
1201 <dict>
1202 <key>DisableFirefoxStudies</key>
1203 <true/> | <false/>
1204 </dict>
1205 ```
1206 #### policies.json
1207 ```
1208 {
1209 "policies": {
1210 "DisableFirefoxStudies": true | false
1211 }
1212 }
1213 ```
1214 ### DisableForgetButton
1215 Disable the "Forget" button.
1216
1217 **Compatibility:** Firefox 60, Firefox ESR 60\
1218 **CCK2 Equivalent:** `disableForget`\
1219 **Preferences Affected:** N/A
1220
1221 #### Windows (GPO)
1222 ```
1223 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1224 ```
1225 #### Windows (Intune)
1226 OMA-URI:
1227 ```
1228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1229 ```
1230 Value (string):
1231 ```
1232 <enabled/> or <disabled/>
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DisableForgetButton</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DisableForgetButton": true | false
1246 }
1247 }
1248 ```
1249 ### DisableFormHistory
1250 Turn off saving information on web forms and the search bar.
1251
1252 **Compatibility:** Firefox 60, Firefox ESR 60\
1253 **CCK2 Equivalent:** `disableFormFill`\
1254 **Preferences Affected:** ` browser.formfill.enable`
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1259 ```
1260 #### Windows (Intune)
1261 OMA-URI:
1262 ```
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1264 ```
1265 Value (string):
1266 ```
1267 <enabled/> or <disabled/>
1268 ```
1269 #### macOS
1270 ```
1271 <dict>
1272 <key>DisableFormHistory</key>
1273 <true/> | <false/>
1274 </dict>
1275 ```
1276 #### policies.json
1277 ```
1278 {
1279 "policies": {
1280 "DisableFormHistory": true | false
1281 }
1282 }
1283 ```
1284 ### DisablePasswordReveal
1285 Do not allow passwords to be shown in saved logins
1286
1287 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1288 **CCK2 Equivalent:** N/A
1289 **Preferences Affected:** N/A
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1294 ```
1295 #### Windows (Intune)
1296 OMA-URI:
1297 ```
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1299 ```
1300 Value (string):
1301 ```
1302 <enabled/> or <disabled/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DisablePasswordReveal</key>
1308 <true/> | <false/>
1309 </dict>
1310 ```
1311 #### policies.json
1312 ```
1313 {
1314 "policies": {
1315 "DisablePasswordReveal": true | false
1316 }
1317 }
1318 ```
1319 ### DisablePocket
1320 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1321
1322 **Compatibility:** Firefox 60, Firefox ESR 60\
1323 **CCK2 Equivalent:** `disablePocket`\
1324 **Preferences Affected:** `extensions.pocket.enabled`
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisablePocket</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisablePocket": true | false
1351 }
1352 }
1353 ```
1354 ### DisablePrivateBrowsing
1355 Remove access to private browsing.
1356
1357 **Compatibility:** Firefox 60, Firefox ESR 60\
1358 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1359 **Preferences Affected:** N/A
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisablePrivateBrowsing</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisablePrivateBrowsing": true | false
1386 }
1387 }
1388 ```
1389 ### DisableProfileImport
1390 Disables the "Import data from another browser" option in the bookmarks window.
1391
1392 **Compatibility:** Firefox 60, Firefox ESR 60\
1393 **CCK2 Equivalent:** N/A\
1394 **Preferences Affected:** N/A
1395
1396 #### Windows (GPO)
1397 ```
1398 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1399 ```
1400 #### Windows (Intune)
1401 OMA-URI:
1402 ```
1403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1404 ```
1405 Value (string):
1406 ```
1407 <enabled/> or <disabled/>
1408 ```
1409 #### macOS
1410 ```
1411 <dict>
1412 <key>DisableProfileImport</key>
1413 <true/> | <false/>
1414 </dict>
1415 ```
1416 #### policies.json
1417 ```
1418 {
1419 "policies": {
1420 "DisableProfileImport": true | false
1421 }
1422 }
1423 ```
1424 ### DisableProfileRefresh
1425 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** `disableResetFirefox`\
1429 **Preferences Affected:** `browser.disableResetPrompt`
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1434 ```
1435 #### Windows (Intune)
1436 OMA-URI:
1437 ```
1438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1439 ```
1440 Value (string):
1441 ```
1442 <enabled/> or <disabled/>
1443 ```
1444 #### macOS
1445 ```
1446 <dict>
1447 <key>DisableProfileRefresh</key>
1448 <true/> | <false/>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "DisableProfileRefresh": true | false
1456 }
1457 }
1458 ```
1459 ### DisableSafeMode
1460 Disable safe mode within the browser.
1461
1462 On Windows, this disables safe mode via the command line as well.
1463
1464 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1465 **CCK2 Equivalent:** `disableSafeMode`\
1466 **Preferences Affected:** N/A
1467
1468 #### Windows (GPO)
1469 ```
1470 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1471 ```
1472 #### Windows (Intune)
1473 OMA-URI:
1474 ```
1475 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1476 ```
1477 Value (string):
1478 ```
1479 <enabled/> or <disabled/>
1480 ```
1481 #### macOS
1482 ```
1483 <dict>
1484 <key>DisableSafeMode</key>
1485 <true/> | <false/>
1486 </dict>
1487 ```
1488 #### policies.json
1489 ```
1490 {
1491 "policies": {
1492 "DisableSafeMode": true | false
1493 }
1494 }
1495 ```
1496 ### DisableSecurityBypass
1497 Prevent the user from bypassing security in certain cases.
1498
1499 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1500
1501 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1502
1503 **Compatibility:** Firefox 60, Firefox ESR 60\
1504 **CCK2 Equivalent:** N/A\
1505 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1506
1507 #### Windows (GPO)
1508 ```
1509 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1510 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1511 ```
1512 #### Windows (Intune)
1513 OMA-URI:
1514 ```
1515 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1516 ```
1517 Value (string):
1518 ```
1519 <enabled/> or <disabled/>
1520 ```
1521 OMA-URI:
1522 ```
1523 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1524 ```
1525 Value (string):
1526 ```
1527 <enabled/> or <disabled/>
1528 ```
1529
1530 #### macOS
1531 ```
1532 <dict>
1533 <key>DisableSecurityBypass</key>
1534 <dict>
1535 <key>InvalidCertificate</key>
1536 <true/> | <false/>
1537 <key><SafeBrowsing/key>
1538 <true/> | <false/>
1539 </dict>
1540 </dict>
1541 ```
1542 #### policies.json
1543 ```
1544 {
1545 "policies": {
1546 "DisableSecurityBypass": {
1547 "InvalidCertificate": true false,
1548 "SafeBrowsing": true false
1549 }
1550 }
1551 }
1552 ```
1553 ### DisableSystemAddonUpdate
1554 Prevent system add-ons from being installed or update.
1555
1556 **Compatibility:** Firefox 60, Firefox ESR 60\
1557 **CCK2 Equivalent:** N/A\
1558 **Preferences Affected:** N/A
1559
1560 #### Windows (GPO)
1561 ```
1562 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1563 ```
1564 #### Windows (Intune)
1565 OMA-URI:
1566 ```
1567 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1568 ```
1569 Value (string):
1570 ```
1571 <enabled/> or <disabled/>
1572 ```
1573 #### macOS
1574 ```
1575 <dict>
1576 <key>DisableSystemAddonUpdate</key>
1577 <true/> | <false/>
1578 </dict>
1579 ```
1580 #### policies.json
1581 ```
1582 {
1583 "policies": {
1584 "DisableSystemAddonUpdate": true | false
1585 }
1586 }
1587 ```
1588 ### DisableTelemetry
1589 Prevent the upload of telemetry data.
1590
1591 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1592
1593 **Compatibility:** Firefox 60, Firefox ESR 60\
1594 **CCK2 Equivalent:** `disableTelemetry`\
1595 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1596
1597 #### Windows (GPO)
1598 ```
1599 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1600 ```
1601 #### Windows (Intune)
1602 OMA-URI:
1603 ```
1604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1605 ```
1606 Value (string):
1607 ```
1608 <enabled/> or <disabled/>
1609 ```
1610 #### macOS
1611 ```
1612 <dict>
1613 <key>DisableTelemetry</key>
1614 <true/> | <false/>
1615 </dict>
1616 ```
1617 #### policies.json
1618 ```
1619 {
1620 "policies": {
1621 "DisableTelemetry": true | false
1622 }
1623 }
1624 ```
1625 ### DisplayBookmarksToolbar
1626 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1627
1628 **Compatibility:** Firefox 60, Firefox ESR 60\
1629 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1630 **Preferences Affected:** N/A
1631
1632 #### Windows (GPO)
1633 ```
1634 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1635 ```
1636 #### Windows (Intune)
1637 OMA-URI:
1638 ```
1639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1640 ```
1641 Value (string):
1642 ```
1643 <enabled/> or <disabled/>
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>DisplayBookmarksToolbar</key>
1649 <true/> | <false/>
1650 </dict>
1651 ```
1652 #### policies.json
1653 ```
1654 {
1655 "policies": {
1656 "DisplayBookmarksToolbar": true | false
1657 }
1658 }
1659 ```
1660 ### DisplayMenuBar (Deprecated)
1661 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1662
1663 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1664 **CCK2 Equivalent:** `displayMenuBar`\
1665 **Preferences Affected:** N/A
1666
1667 #### Windows (GPO)
1668 ```
1669 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1670 ```
1671 #### macOS
1672 ```
1673 <dict>
1674 <key>DisplayMenuBar</key>
1675 <true/> | <false/>
1676 </dict>
1677 ```
1678 #### policies.json
1679 ```
1680 {
1681 "policies": {
1682 "DisplayMenuBar": true | false
1683 }
1684 }
1685 ```
1686 ### DisplayMenuBar
1687 Set the state of the menubar.
1688
1689 `always` means the menubar is shown and cannot be hidden.
1690
1691 `never` means the menubar is hidden and cannot be shown.
1692
1693 `default-on` means the menubar is on by default but can be hidden.
1694
1695 `default-off` means the menubar is off by default but can be shown.
1696
1697 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1698 **CCK2 Equivalent:** `displayMenuBar`\
1699 **Preferences Affected:** N/A
1700
1701 #### Windows (GPO)
1702 ```
1703 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1704 ```
1705 #### Windows (Intune)
1706 OMA-URI:
1707 ```
1708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1709 ```
1710 Value (string):
1711 ```
1712 <enabled/>
1713 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1714 ```
1715 #### macOS
1716 ```
1717 <dict>
1718 <key>DisplayMenuBar</key>
1719 <string>always | never | default-on | default-off</string>
1720 </dict>
1721 ```
1722 #### policies.json
1723 ```
1724 {
1725 "policies": {
1726 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1727 }
1728 }
1729 ```
1730 ### DNSOverHTTPS
1731 Configure DNS over HTTPS.
1732
1733 `Enabled` determines whether DNS over HTTPS is enabled
1734
1735 `ProviderURL` is a URL to another provider.
1736
1737 `Locked` prevents the user from changing DNS over HTTPS preferences.
1738
1739 `ExcludedDomains` excludes domains from DNS over HTTPS.
1740
1741 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1742 **CCK2 Equivalent:** N/A\
1743 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1744
1745 #### Windows (GPO)
1746 ```
1747 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1748 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1749 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1750 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1751 ```
1752 #### Windows (Intune)
1753 OMA-URI:
1754 ```
1755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1756 ```
1757 Value (string):
1758 ```
1759 <enabled/> or <disabled/>
1760 ```
1761 OMA-URI:
1762 ```
1763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1764 ```
1765 Value (string):
1766 ```
1767 <enabled/>
1768 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1769 ```
1770 OMA-URI:
1771 ```
1772 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1773 ```
1774 Value (string):
1775 ```
1776 <enabled/> or <disabled/>
1777 ```
1778 OMA-URI:
1779 ```
1780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1781 ```
1782 Value (string):
1783 ```
1784 <enabled/>
1785 <data id="List" value="1&#xF000;example.com"/>
1786 ```
1787 #### macOS
1788 ```
1789 <dict>
1790 <key>DNSOverHTTPS</key>
1791 <dict>
1792 <key>Enabled</key>
1793 <true/> | <false/>
1794 <key>ProviderURL</key>
1795 <string>URL_TO_ALTERNATE_PROVIDER</string>
1796 <key>Locked</key>
1797 <true/> | <false/>
1798 <key>ExcludedDomains</key>
1799 <array>
1800 <string>example.com</string>
1801 </array>
1802 </dict>
1803 </dict>
1804 ```
1805 #### policies.json
1806 ```
1807 {
1808 "policies": {
1809 "DNSOverHTTPS": {
1810 "Enabled": true | false,
1811 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1812 "Locked": true | false,
1813 "ExcludedDomains": ["example.com"]
1814 }
1815 }
1816 }
1817 ```
1818 ### DontCheckDefaultBrowser
1819 Don't check if Firefox is the default browser at startup.
1820
1821 **Compatibility:** Firefox 60, Firefox ESR 60\
1822 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1823 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1824
1825 #### Windows (GPO)
1826 ```
1827 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1828 ```
1829 #### Windows (Intune)
1830 OMA-URI:
1831 ```
1832 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1833 ```
1834 Value (string):
1835 ```
1836 <enabled/> or <disabled/>
1837 ```
1838 #### macOS
1839 ```
1840 <dict>
1841 <key>DontCheckDefaultBrowser</key>
1842 <true/> | <false/>
1843 </dict>
1844 ```
1845 #### policies.json
1846 ```
1847 {
1848 "policies": {
1849 "DontCheckDefaultBrowser": true | false
1850 }
1851 }
1852 ```
1853 ### DefaultDownloadDirectory
1854 Set the default download directory.
1855
1856 You can use ${home} for the native home directory.
1857
1858 **Compatibility:** Firefox 68, Firefox ESR 68\
1859 **CCK2 Equivalent:** N/A\
1860 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1861
1862 #### Windows (GPO)
1863 ```
1864 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1865 ```
1866 #### Windows (Intune)
1867 OMA-URI:
1868 ```
1869 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1870 ```
1871 Value (string):
1872 ```
1873 <enabled/>
1874 <data id="Preferences_String" value="${home}\Downloads"/>
1875 ```
1876 #### macOS
1877 ```
1878 <dict>
1879 <key>DefaultDownloadDirectory</key>
1880 <string>${home}/Downloads</string>
1881 </dict>
1882 ```
1883 #### policies.json (macOS and Linux)
1884 ```
1885 {
1886 "policies": {
1887 "DefaultDownloadDirectory": "${home}/Downloads"
1888 }
1889 ```
1890 #### policies.json (Windows)
1891 ```
1892 {
1893 "policies": {
1894 "DefaultDownloadDirectory": "${home}\\Downloads"
1895 }
1896 ```
1897 ### DownloadDirectory
1898 Set and lock the download directory.
1899
1900 You can use ${home} for the native home directory.
1901
1902 **Compatibility:** Firefox 68, Firefox ESR 68\
1903 **CCK2 Equivalent:** N/A\
1904 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1905
1906 #### Windows (GPO)
1907 ```
1908 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1909 ```
1910 #### Windows (Intune)
1911 OMA-URI:
1912 ```
1913 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1914 ```
1915 Value (string):
1916 ```
1917 <enabled/>
1918 <data id="Preferences_String" value="${home}\Downloads"/>
1919 ```
1920 #### macOS
1921 ```
1922 <dict>
1923 <key>DownloadDirectory</key>
1924 <string>${home}/Downloads</string>
1925 </dict>
1926 ```
1927 #### policies.json (macOS and Linux)
1928 ```
1929 {
1930 "policies": {
1931 "DownloadDirectory": "${home}/Downloads"
1932 }
1933 ```
1934 #### policies.json (Windows)
1935 ```
1936 {
1937 "policies": {
1938 "DownloadDirectory": "${home}\\Downloads"
1939 }
1940 ```
1941 ### EnableTrackingProtection
1942 Configure tracking protection.
1943
1944 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1945
1946 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1947
1948 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1949
1950 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1951
1952 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1953
1954 `Exceptions` are origins for which tracking protection is not enabled.
1955
1956 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1957 **CCK2 Equivalent:** N/A\
1958 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1959
1960 #### Windows (GPO)
1961 ```
1962 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1963 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1964 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1965 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1966 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1967 ```
1968 #### Windows (Intune)
1969 OMA-URI:
1970 ```
1971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1972 ```
1973 Value (string):
1974 ```
1975 <enabled/>
1976 <data id="TrackingProtectionLocked" value="true | false"/>
1977 <data id="Cryptomining" value="true | false"/>
1978 <data id="Fingerprinting" value="true | false"/>
1979 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1980 ```
1981 #### macOS
1982 ```
1983 <dict>
1984 <key>EnableTrackingProtection</key>
1985 <dict>
1986 <key>Value</key>
1987 <true/> | <false/>
1988 <key><Locked</key>
1989 <true/> | <false/>
1990 <key><Cryptomining</key>
1991 <true/> | <false/>
1992 <key><Fingerprinting</key>
1993 <true/> | <false/>
1994 <key>Exceptions</key>
1995 <array>
1996 <string>https://example.com</string>
1997 </array>
1998 </dict>
1999 </dict>
2000 ```
2001 #### policies.json
2002 ```
2003 {
2004 "policies": {
2005 "EnableTrackingProtection": {
2006 "Value": [true, false],
2007 "Locked": [true, false],
2008 "Cryptomining": [true, false],
2009 "Fingerprinting": [true, false],
2010 "Exceptions": ["https://example.com"]
2011 }
2012 }
2013 ```
2014 ### EnterprisePoliciesEnabled
2015 Enable policy support on macOS.
2016
2017 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2018 **CCK2 Equivalent:** N/A\
2019 **Preferences Affected:** N/A
2020
2021 #### macOS
2022 ```
2023 <dict>
2024 <key>EnterprisePoliciesEnabled</key>
2025 <true/>
2026 </dict>
2027 ```
2028 ### Extensions
2029 Control the installation, uninstallation and locking of extensions.
2030
2031 `Install` is a list of URLs or native paths for extensions to be installed.
2032
2033 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2034
2035 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2036
2037 **Compatibility:** Firefox 60, Firefox ESR 60\
2038 **CCK2 Equivalent:** `addons`\
2039 **Preferences Affected:** N/A
2040
2041 #### Windows (GPO)
2042 ```
2043 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2044 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2045 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2046 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2047 ```
2048 #### macOS
2049 ```
2050 <dict>
2051 <key>Extensions</key>
2052 <dict>
2053 <key>Install</key>
2054 <array>
2055 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2056 <string>//path/to/xpi</string>
2057 </array>
2058 <key>Uninstall</key>
2059 <array>
2060 <string>bad_addon_id@mozilla.org</string>
2061 </array>
2062 <key>Locked</key>
2063 <array>
2064 <string>addon_id@mozilla.org</string>
2065 </array>
2066 </dict>
2067 </dict>
2068 ```
2069 #### policies.json
2070 ```
2071 {
2072 "policies": {
2073 "Extensions": {
2074 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2075 "Uninstall": ["bad_addon_id@mozilla.org"],
2076 "Locked": ["addon_id@mozilla.org"]
2077 }
2078 }
2079 }
2080 ```
2081 ### ExtensionSettings
2082 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2083
2084 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2085
2086 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2087
2088 The configuration for each extension is another dictionary that can contain the fields documented below.
2089
2090 | Name | Description |
2091 | --- | --- |
2092 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2093 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2094 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2095 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2096 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2097 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2098 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2099 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2100 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2101
2102 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2103 **CCK2 Equivalent:** N/A\
2104 **Preferences Affected:** N/A
2105
2106 #### Windows (GPO)
2107 ```
2108 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2109 {
2110 "*": {
2111 "blocked_install_message": "Custom error message.",
2112 "install_sources": ["https://addons.mozilla.org/"],
2113 "installation_mode": "blocked",
2114 "allowed_types": ["extension"]
2115 },
2116 "uBlock0@raymondhill.net": {
2117 "installation_mode": "force_installed",
2118 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2119 }
2120 }
2121 ```
2122 #### Windows (Intune)
2123 OMA-URI:
2124 ```
2125 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2126 ```
2127 Value (string):
2128 ```
2129 <enabled/>
2130 <data id="ExtensionSettings" value='
2131 "*": {
2132 "blocked_install_message": "Custom error message.",
2133 "install_sources": ["https://addons.mozilla.org/"],
2134 "installation_mode": "blocked",
2135 "allowed_types": ["extension"]
2136 },
2137 "uBlock0@raymondhill.net": {
2138 "installation_mode": "force_installed",
2139 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2140 }'/>
2141 ```
2142 #### macOS
2143 ```
2144 <dict>
2145 <key>ExtensionSettings</key>
2146 <dict>
2147 <key>*</key>
2148 <dict>
2149 <key>blocked_install_message</key>
2150 <string>Custom error message.</string>
2151 <key>install_sources</key>
2152 <array>
2153 <string>https://addons.mozilla.org/</string>
2154 </array>
2155 <key>installation_mode</key>
2156 <string>blocked</string>
2157 <key>allowed_types</key>
2158 <array>
2159 <string>extension</string>
2160 </array>
2161 </dict>
2162 <key>uBlock0@raymondhill.net</key>
2163 <dict>
2164 <key>installation_mode</key>
2165 <string>force_installed</string>
2166 <key>install_url</key>
2167 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2168 </dict>
2169 </dict>
2170 </dict>
2171 ```
2172 #### policies.json
2173 ```
2174 {
2175 "policies": {
2176 "ExtensionSettings": {
2177 "*": {
2178 "blocked_install_message": "Custom error message.",
2179 "install_sources": ["https://addons.mozilla.org/"],
2180 "installation_mode": "blocked",
2181 "allowed_types": ["extension"]
2182 },
2183 "uBlock0@raymondhill.net": {
2184 "installation_mode": "force_installed",
2185 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2186 }
2187 }
2188 }
2189 }
2190 ```
2191 ### ExtensionUpdate
2192 Control extension updates.
2193
2194 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2195 **CCK2 Equivalent:** N/A\
2196 **Preferences Affected:** `extensions.update.enabled`
2197
2198 #### Windows (GPO)
2199 ```
2200 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2201 ```
2202 #### Windows (Intune)
2203 OMA-URI:
2204 ```
2205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2206 ```
2207 Value (string):
2208 ```
2209 <enabled/> or <disabled/>
2210 ```
2211 #### macOS
2212 ```
2213 <dict>
2214 <key>ExtensionUpdate</key>
2215 <true/> | <false/>
2216 </dict>
2217 ```
2218 #### policies.json
2219 ```
2220 {
2221 "policies": {
2222 "ExtensionUpdate": true | false
2223 }
2224 }
2225 ```
2226 ### FlashPlugin
2227 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2228
2229 `Allow` is a list of origins where Flash are allowed.
2230
2231 `Block` is a list of origins where Flash is not allowed.
2232
2233 `Default` determines whether or not Flash is allowed by default.
2234
2235 `Locked` prevents the user from changing Flash preferences.
2236
2237 **Compatibility:** Firefox 60, Firefox ESR 60\
2238 **CCK2 Equivalent:** `permissions.plugin`\
2239 **Preferences Affected:** `plugin.state.flash`
2240
2241 #### Windows (GPO)
2242 ```
2243 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2244 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2245 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2246 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2247 ```
2248 #### Windows (Intune)
2249 OMA-URI:
2250 ```
2251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2252 ```
2253 Value (string):
2254 ```
2255 <enabled/>
2256 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2257 ```
2258 OMA-URI:
2259 ```
2260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2261 ```
2262 Value (string):
2263 ```
2264 <enabled/> or <disabled/>
2265 ```
2266 OMA-URI:
2267 ```
2268 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2269 ```
2270 Value (string):
2271 ```
2272 <enabled/> or <disabled/>
2273 ```
2274 #### macOS
2275 ```
2276 <dict>
2277 <key>FlashPlugin</key>
2278 <dict>
2279 <key>Allow</key>
2280 <array>
2281 <string>http://example.org</string>
2282 </array>
2283 <key>Block</key>
2284 <array>
2285 <string>http://example.edu</string>
2286 </array>
2287 <key>Default</key>
2288 <true/> | <false/>
2289 <key>Locked</key>
2290 <true/> | <false/>
2291 </dict>
2292 </dict>
2293 ```
2294 #### policies.json
2295 ```
2296 {
2297 "policies": {
2298 "FlashPlugin": {
2299 "Allow": ["http://example.org/"],
2300 "Block": ["http://example.edu/"],
2301 "Default": true | false,
2302 "Locked": true | false
2303 }
2304 }
2305 }
2306 ```
2307 ### FirefoxHome
2308 Customize the Firefox Home page.
2309
2310 **Compatibility:** Firefox 68, Firefox ESR 68\
2311 **CCK2 Equivalent:** N/A\
2312 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2313
2314 #### Windows (GPO)
2315 ```
2316 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2317 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2318 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2319 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2320 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2321 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2322 ```
2323 #### Windows (Intune)
2324 OMA-URI:
2325 ```
2326 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2327 ```
2328 Value (string):
2329 ```
2330 <enabled/>
2331 <data id="FirefoxHome_Search" value="true | false"/>
2332 <data id="FirefoxHome_TopSites" value="true | false"/>
2333 <data id="FirefoxHome_Highlights" value="true | false"/>
2334 <data id="FirefoxHome_Pocket" value="true | false"/>
2335 <data id="FirefoxHome_Snippets" value="true | false"/>
2336 <data id="FirefoxHome_Locked" value="true | false"/>
2337 ```
2338 #### macOS
2339 ```
2340 <dict>
2341 <key>FirefoxHome</key>
2342 <dict>
2343 <key>Search</key>
2344 <true/> | <false/>
2345 <key>TopSites</key>
2346 <true/> | <false/>
2347 <key>Highlights</key>
2348 <true/> | <false/>
2349 <key>Pocket</key>
2350 <true/> | <false/>
2351 <key>Snippets</key>
2352 <true/> | <false/>
2353 <key>Locked</key>
2354 <true/> | <false/>
2355 </dict>
2356 </dict>
2357 ```
2358 #### policies.json
2359 ```
2360 {
2361 "policies": {
2362 "FirefoxHome": {
2363 "Search": true | false,
2364 "TopSites": true | false,
2365 "Highlights": true | false,
2366 "Pocket": true | false,
2367 "Snippets": true | false,
2368 "Locked": true | false
2369 }
2370 }
2371 }
2372 ```
2373 ### HardwareAcceleration
2374 Control hardware acceleration.
2375
2376 **Compatibility:** Firefox 60, Firefox ESR 60\
2377 **CCK2 Equivalent:** N/A\
2378 **Preferences Affected:** `layers.acceleration.disabled`
2379
2380 #### Windows (GPO)
2381 ```
2382 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2383 ```
2384 #### Windows (Intune)
2385 OMA-URI:
2386 ```
2387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2388 ```
2389 Value (string):
2390 ```
2391 <enabled/> or <disabled/>
2392 ```
2393 #### macOS
2394 ```
2395 <dict>
2396 <key>HardwareAcceleration</key>
2397 <true/> | <false/>
2398 </dict>
2399 ```
2400 #### policies.json
2401 ```
2402 {
2403 "policies": {
2404 "HardwareAcceleration": true | false
2405 }
2406 }
2407 ```
2408 ### Homepage
2409 Configure the default homepage and how Firefox starts.
2410
2411 `URL` is the default homepage.
2412
2413 `Locked` prevents the user from changing homepage preferences.
2414
2415 `Additional` allows for more than one homepage.
2416
2417 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2418
2419 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2420 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2421 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2422
2423 #### Windows (GPO)
2424 ```
2425 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2426 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2427 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2428 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2429 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2430 ```
2431 #### Windows (Intune)
2432 OMA-URI:
2433 ```
2434 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2435 ```
2436 Value (string):
2437 ```
2438 <enabled/>
2439
2440 <data id="HomepageURL" value="https://example.com"/>
2441 <data id="HomepageLocked" value="true | false"/>
2442 ```
2443 OMA-URI:
2444 ```
2445 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2446 ```
2447 Value (string):
2448 ```
2449 <enabled/>
2450
2451 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2452 ```
2453 OMA-URI:
2454 ```
2455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2456 ```
2457 Value (string):
2458 ```
2459 <enabled/>
2460
2461 <data id="StartPage" value="none | homepage | previous-session"/>
2462 ```
2463 #### macOS
2464 ```
2465 <dict>
2466 <key>Homepage</key>
2467 <dict>
2468 <key>URL</key>
2469 <string>http://example.com</string>
2470 <key>Locked</key>
2471 <true/> | <false/>
2472 <key>Additional</key>
2473 <array>
2474 <string>http://example.org</string>
2475 <string>http://example.edu</string>
2476 </array>
2477 <key>StartPage</key>
2478 <string>none | homepage | previous-session</string>
2479 </dict>
2480 </dict>
2481 ```
2482 #### policies.json
2483 ```
2484 {
2485 "policies": {
2486 "Homepage": {
2487 "URL": "http://example.com/",
2488 "Locked": true | false,
2489 "Additional": ["http://example.org/",
2490 "http://example.edu/"],
2491 "StartPage": "none" | "homepage" | "previous-session"
2492 }
2493 }
2494 }
2495 ```
2496 ### InstallAddonsPermission
2497 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2498
2499 `Allow` is a list of origins where extension installs are allowed.
2500
2501 `Default` determines whether or not extension installs are allowed by default.
2502
2503 **Compatibility:** Firefox 60, Firefox ESR 60\
2504 **CCK2 Equivalent:** `permissions.install`\
2505 **Preferences Affected:** `xpinstall.enabled`
2506
2507 #### Windows (GPO)
2508 ```
2509 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2510 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2511 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2512 ```
2513 #### Windows (Intune)
2514 OMA-URI:
2515 ```
2516 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2517 ```
2518 Value (string):
2519 ```
2520 <enabled/>
2521 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2522 ```
2523 OMA-URI:
2524 ```
2525 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2526 ```
2527 Value (string):
2528 ```
2529 <enabled/>
2530 ```
2531 #### macOS
2532 ```
2533 <dict>
2534 <key>InstallAddonsPermission</key>
2535 <dict>
2536 <key>Allow</key>
2537 <array>
2538 <string>http://example.org</string>
2539 <string>http://example.edu</string>
2540 </array>
2541 <key>Default</key>
2542 <true/> | <false/>
2543 </dict>
2544 </dict>
2545 ```
2546 #### policies.json
2547 ```
2548 {
2549 "policies": {
2550 "InstallAddonsPermission": {
2551 "Allow": ["http://example.org/",
2552 "http://example.edu/"],
2553 "Default": true | false
2554 }
2555 }
2556 }
2557 ```
2558 ### LegacyProfiles
2559 Disable the feature enforcing a separate profile for each installation.
2560
2561 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2562
2563 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2564
2565 This policy only work on Windows via GPO (not policies.json).
2566
2567 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2568 **CCK2 Equivalent:** N/A\
2569 **Preferences Affected:** N/A
2570
2571 #### Windows (GPO)
2572 ```
2573 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2574 ```
2575 #### Windows (Intune)
2576 OMA-URI:
2577 ```
2578 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2579 ```
2580 Value (string):
2581 ```
2582 <enabled/> or <disabled/>
2583 ```
2584 ### LocalFileLinks
2585 Enable linking to local files by origin.
2586
2587 **Compatibility:** Firefox 68, Firefox ESR 68\
2588 **CCK2 Equivalent:** N/A\
2589 **Preferences Affected:** `capability.policy.localfilelinks.*`
2590
2591 #### Windows (GPO)
2592 ```
2593 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2594 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2595 ```
2596 #### Windows (Intune)
2597 OMA-URI:
2598 ```
2599 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2600 ```
2601 Value (string):
2602 ```
2603 <enabled/>
2604 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2605 ```
2606 #### macOS
2607 ```
2608 <dict>
2609 <key>LocalFileLinks</key>
2610 <array>
2611 <string>http://example.org</string>
2612 <string>http://example.edu</string>
2613 </array>
2614 </dict>
2615 ```
2616 #### policies.json
2617 ```
2618 {
2619 "policies": {
2620 "LocalFileLinks": ["http://example.org/",
2621 "http://example.edu/"]
2622 }
2623 }
2624 ```
2625 ### NetworkPrediction
2626 Enable or disable network prediction (DNS prefetching).
2627
2628 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2629 **CCK2 Equivalent:** N/A\
2630 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2631
2632 #### Windows (GPO)
2633 ```
2634 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2635 ```
2636 #### Windows (Intune)
2637 OMA-URI:
2638 ```
2639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2640 ```
2641 Value (string):
2642 ```
2643 <enabled/> or <disabled/>
2644 ```
2645 #### macOS
2646 ```
2647 <dict>
2648 <key>NetworkPrediction</key>
2649 <true/> | <false/>
2650 </dict>
2651 ```
2652 #### policies.json
2653 ```
2654 {
2655 "policies": {
2656 "NetworkPrediction": true | false
2657 }
2658 ```
2659 ### NewTabPage
2660 Enable or disable the New Tab page.
2661
2662 **Compatibility:** Firefox 68, Firefox ESR 68\
2663 **CCK2 Equivalent:** N/A\
2664 **Preferences Affected:** `browser.newtabpage.enabled`
2665
2666 #### Windows (GPO)
2667 ```
2668 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2669 ```
2670 #### Windows (Intune)
2671 OMA-URI:
2672 ```
2673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2674 ```
2675 Value (string):
2676 ```
2677 <enabled/> or <disabled/>
2678 ```
2679 #### macOS
2680 ```
2681 <dict>
2682 <key>NewTabPage</key>
2683 <true/> | <false/>
2684 </dict>
2685 ```
2686 #### policies.json
2687 ```
2688 {
2689 "policies": {
2690 "NewTabPage": true | false
2691 }
2692 ```
2693 ### NoDefaultBookmarks
2694 Disable the creation of default bookmarks.
2695
2696 This policy is only effective if the user profile has not been created yet.
2697
2698 **Compatibility:** Firefox 60, Firefox ESR 60\
2699 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2700 **Preferences Affected:** N/A
2701
2702 #### Windows (GPO)
2703 ```
2704 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2705 ```
2706 #### Windows (Intune)
2707 OMA-URI:
2708 ```
2709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2710 ```
2711 Value (string):
2712 ```
2713 <enabled/> or <disabled/>
2714 ```
2715 #### macOS
2716 ```
2717 <dict>
2718 <key>NoDefaultBookmarks</key>
2719 <true/> | <false/>
2720 </dict>
2721 ```
2722 #### policies.json
2723 ```
2724 {
2725 "policies": {
2726 "NoDefaultBookmarks": true | false
2727 }
2728 }
2729 ```
2730 ### OfferToSaveLogins
2731 Control whether or not Firefox offers to save passwords.
2732
2733 **Compatibility:** Firefox 60, Firefox ESR 60\
2734 **CCK2 Equivalent:** `dontRememberPasswords`\
2735 **Preferences Affected:** `signon.rememberSignons`
2736
2737 #### Windows (GPO)
2738 ```
2739 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2740 ```
2741 #### Windows (Intune)
2742 OMA-URI:
2743 ```
2744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2745 ```
2746 Value (string):
2747 ```
2748 <enabled/> or <disabled/>
2749 ```
2750 #### macOS
2751 ```
2752 <dict>
2753 <key>OfferToSaveLogins</key>
2754 <true/> | <false/>
2755 </dict>
2756 ```
2757 #### policies.json
2758 ```
2759 {
2760 "policies": {
2761 "OfferToSaveLogins": true | false
2762 }
2763 }
2764 ```
2765 ### OfferToSaveLoginsDefault
2766 Sets the default value of signon.rememberSignons without locking it.
2767
2768 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2769 **CCK2 Equivalent:** `dontRememberPasswords`\
2770 **Preferences Affected:** `signon.rememberSignons`
2771
2772 #### Windows (GPO)
2773 ```
2774 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2775 ```
2776 #### Windows (Intune)
2777 OMA-URI:
2778 ```
2779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2780 ```
2781 Value (string):
2782 ```
2783 <enabled/> or <disabled/>
2784 ```
2785 #### macOS
2786 ```
2787 <dict>
2788 <key>OfferToSaveLoginsDefault</key>
2789 <true/> | <false/>
2790 </dict>
2791 ```
2792 #### policies.json
2793 ```
2794 {
2795 "policies": {
2796 "OfferToSaveLoginsDefault": true | false
2797 }
2798 }
2799 ```
2800 ### OverrideFirstRunPage
2801 Override the first run page. If the value is blank, no first run page is displayed.
2802
2803 **Compatibility:** Firefox 60, Firefox ESR 60\
2804 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2805 **Preferences Affected:** `startup.homepage_welcome_url`
2806
2807 #### Windows (GPO)
2808 ```
2809 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2810 ```
2811 #### Windows (Intune)
2812 OMA-URI:
2813 ```
2814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2815 ```
2816 Value (string):
2817 ```
2818 <enabled/>
2819 <data id="OverridePage" value="https://example.com"/>
2820 ```
2821 #### macOS
2822 ```
2823 <dict>
2824 <key>OverrideFirstRunPage</key>
2825 <string>http://example.org</string>
2826 </dict>
2827 ```
2828 #### policies.json
2829 ```
2830 {
2831 "policies": {
2832 "OverrideFirstRunPage": "http://example.org"
2833 }
2834 ```
2835 ### OverridePostUpdatePage
2836 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2837
2838 **Compatibility:** Firefox 60, Firefox ESR 60\
2839 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2840 **Preferences Affected:** `startup.homepage_override_url`
2841
2842 #### Windows (GPO)
2843 ```
2844 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2845 ```
2846 #### Windows (Intune)
2847 OMA-URI:
2848 ```
2849 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2850 ```
2851 Value (string):
2852 ```
2853 <enabled/>
2854 <data id="OverridePage" value="https://example.com"/>
2855 ```
2856 #### macOS
2857 ```
2858 <dict>
2859 <key>OverridePostUpdatePage</key>
2860 <string>http://example.org</string>
2861 </dict>
2862 ```
2863 #### policies.json
2864 ```
2865 {
2866 "policies": {
2867 "OverridePostUpdatePage": "http://example.org"
2868 }
2869 ```
2870 ### PasswordManagerEnabled
2871 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2872
2873 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2874 **CCK2 Equivalent:** N/A\
2875 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2876
2877 #### Windows (GPO)
2878 ```
2879 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2880 ```
2881 #### Windows (Intune)
2882 OMA-URI:
2883 ```
2884 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2885 ```
2886 Value (string):
2887 ```
2888 <enabled/> or <disabled/>
2889 ```
2890 #### macOS
2891 ```
2892 <dict>
2893 <key>PasswordManagerEnabled</key>
2894 <true/> | <false/>
2895 </dict>
2896 ```
2897 #### policies.json
2898 ```
2899 {
2900 "policies": {
2901 "PasswordManagerEnabled": true | false
2902 }
2903 }
2904 ```
2905 ### Permissions
2906 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2907
2908 `Allow` is a list of origins where the feature is allowed.
2909
2910 `Block` is a list of origins where the feature is not allowed.
2911
2912 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2913
2914 `Locked` prevents the user from changing preferences for the feature.
2915
2916 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
2917
2918 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
2919 **CCK2 Equivalent:** N/A\
2920 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
2921
2922 #### Windows (GPO)
2923 ```
2924 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2925 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2926 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2927 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2928 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2929 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2930 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2931 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2932 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2933 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2934 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2935 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2936 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2937 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2938 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2939 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2940 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2941 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2942 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2943 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
2944 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
2945 ```
2946 #### Windows (Intune)
2947 OMA-URI:
2948 ```
2949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
2950 ```
2951 Value (string):
2952 ```
2953 <enabled/> or <disabled/>
2954 ```
2955 OMA-URI:
2956 ```
2957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
2958 ```
2959 Value (string):
2960 ```
2961 <enabled/> or <disabled/>
2962 ```
2963 OMA-URI:
2964 ```
2965 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
2966 ```
2967 Value (string):
2968 ```
2969 <enabled/>
2970 <data id="Permissions" value="1&#xF000;https://example.org"/>
2971 ```
2972 OMA-URI:
2973 ```
2974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
2975 ```
2976 Value (string):
2977 ```
2978 <enabled/> or <disabled/>
2979 ```
2980 OMA-URI:
2981 ```
2982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
2983 ```
2984 Value (string):
2985 ```
2986 <enabled/> or <disabled/>
2987 ```
2988 OMA-URI:
2989 ```
2990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
2991 ```
2992 Value (string):
2993 ```
2994 <enabled/>
2995 <data id="Permissions" value="1&#xF000;https://example.org"/>
2996 ```
2997 OMA-URI:
2998 ```
2999 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3000 ```
3001 Value (string):
3002 ```
3003 <enabled/>
3004 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3005 ```
3006 OMA-URI:
3007 ```
3008 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3009 ```
3010 Value (string):
3011 ```
3012 <enabled/>
3013 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3014 ```
3015 OMA-URI:
3016 ```
3017 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3018 ```
3019 Value (string):
3020 ```
3021 <enabled/> or <disabled/>
3022 ```
3023 #### macOS
3024 ```
3025 <dict>
3026 <key>Permissions</key>
3027 <dict>
3028 <key>Camera</key>
3029 <dict>
3030 <key>Allow</key>
3031 <array>
3032 <string>https://example.org</string>
3033 <string>https://example.org:1234</string>
3034 </array>
3035 <key>Block</key>
3036 <array>
3037 <string>https://example.edu</string>
3038 </array>
3039 <key>BlockNewRequests</key>
3040 <true/> | <false/>
3041 <key>Locked</key>
3042 <true/> | <false/>
3043 </dict>
3044 <key>Microphone</key>
3045 <dict>
3046 <key>Allow</key>
3047 <array>
3048 <string>https://example.org</string>
3049 </array>
3050 <key>Block</key>
3051 <array>
3052 <string>https://example.edu</string>
3053 </array>
3054 <key>BlockNewRequests</key>
3055 <true/> | <false/>
3056 <key>Locked</key>
3057 <true/> | <false/>
3058 </dict>
3059 <key>Location</key>
3060 <dict>
3061 <key>Allow</key>
3062 <array>
3063 <string>https://example.org</string>
3064 </array>
3065 <key>Block</key>
3066 <array>
3067 <string>https://example.edu</string>
3068 </array>
3069 <key>BlockNewRequests</key>
3070 <true/> | <false/>
3071 <key>Locked</key>
3072 <true/> | <false/>
3073 </dict>
3074 <key>Notifications</key>
3075 <dict>
3076 <key>Allow</key>
3077 <array>
3078 <string>https://example.org</string>
3079 </array>
3080 <key>Block</key>
3081 <array>
3082 <string>https://example.edu</string>
3083 </array>
3084 <key>BlockNewRequests</key>
3085 <true/>
3086 <key>Locked</key>
3087 <true/>
3088 </dict>
3089 <key>Autoplay</key>
3090 <dict>
3091 <key>Allow</key>
3092 <array>
3093 <string>https://example.org</string>
3094 </array>
3095 <key>Block</key>
3096 <array>
3097 <string>https://example.edu</string>
3098 </array>
3099 <key>Default</key>
3100 <string>allow-audio-video | block-audio | block-audio-video</string>
3101 <key>Locked</key>
3102 <true/> | <false/>
3103 </dict>
3104 </dict>
3105 </dict>
3106 ```
3107 #### policies.json
3108 ```
3109 {
3110 "policies": {
3111 "Permissions": {
3112 "Camera": {
3113 "Allow": ["https://example.org","https://example.org:1234"],
3114 "Block": ["https://example.edu"],
3115 "BlockNewRequests": true | false,
3116 "Locked": true | false
3117 },
3118 "Microphone": {
3119 "Allow": ["https://example.org"],
3120 "Block": ["https://example.edu"],
3121 "BlockNewRequests": true | false,
3122 "Locked": true | false
3123 },
3124 "Location": {
3125 "Allow": ["https://example.org"],
3126 "Block": ["https://example.edu"],
3127 "BlockNewRequests": true | false,
3128 "Locked": true | false
3129 },
3130 "Notifications": {
3131 "Allow": ["https://example.org"],
3132 "Block": ["https://example.edu"],
3133 "BlockNewRequests": true | false,
3134 "Locked": true | false
3135 },
3136 "Autoplay": {
3137 "Allow": ["https://example.org"],
3138 "Block": ["https://example.edu"],
3139 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3140 "Locked": true | false
3141 }
3142 }
3143 }
3144 }
3145 ```
3146 ### PopupBlocking
3147 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3148
3149 `Allow` is a list of origins where popup-windows are allowed.
3150
3151 `Default` determines whether or not pop-up windows are allowed by default.
3152
3153 `Locked` prevents the user from changing pop-up preferences.
3154
3155 **Compatibility:** Firefox 60, Firefox ESR 60\
3156 **CCK2 Equivalent:** `permissions.popup`\
3157 **Preferences Affected:** `dom.disable_open_during_load`
3158
3159 #### Windows (GPO)
3160 ```
3161 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3162 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3163 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3164 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3165 ```
3166 #### Windows (Intune)
3167 OMA-URI:
3168 ```
3169 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3170 ```
3171 Value (string):
3172 ```
3173 <enabled/>
3174 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3175 ```
3176 OMA-URI:
3177 ```
3178 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3179 ```
3180 Value (string):
3181 ```
3182 <enabled/> or <disabled/>
3183 ```
3184 OMA-URI:
3185 ```
3186 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3187 ```
3188 Value (string):
3189 ```
3190 <enabled/> or <disabled/>
3191 ```
3192 #### macOS
3193 ```
3194 <dict>
3195 <key>PopupBlocking</key>
3196 <dict>
3197 <key>Allow</key>
3198 <array>
3199 <string>http://example.org</string>
3200 <string>http://example.edu</string>
3201 </array>
3202 <key>Default</key>
3203 <true/> | <false/>
3204 <key>Locked</key>
3205 <true/> | <false/>
3206 </dict>
3207 </dict>
3208 ```
3209 #### policies.json
3210 ```
3211 {
3212 "policies": {
3213 "PopupBlocking": {
3214 "Allow": ["http://example.org/",
3215 "http://example.edu/"],
3216 "Default": true | false,
3217 "Locked": true | false
3218 }
3219 }
3220 }
3221 ```
3222 ### Preferences
3223 Set and lock certain preferences.
3224
3225 **Compatibility:** See below\
3226 **CCK2 Equivalent:** `preferences`\
3227 **Preferences Affected:** See below
3228
3229 | Preference | Type | Compatibility | Default
3230 | --- | --- | --- | ---
3231 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3232 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3233 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3234 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3235 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3236 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3237 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3238 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3239 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3240 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3241 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3242 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3243 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3244 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3245 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3246 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3247 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3248 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3249 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3250 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3251 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3252 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3253 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3254 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3255 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3256 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3257 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3258 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3259 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3260 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3261 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3262 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3263 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3264 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3265 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3266 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3267 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3268 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3269 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3270 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3271 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3272 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3273 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3274 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3275 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3276 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3277 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3278 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3279 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3280 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3281 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3282 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3283 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3284 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3285 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3286 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3287 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3288 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3289 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3290 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3291 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3292 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3293 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3294 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3295 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3296 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3297 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3298 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3299 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3300 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3301 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3302 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3303 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3304 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3305 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3306 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3307 disabled
3308 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3309 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3310 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3311 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3312 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3313 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3314 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3315 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3316 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3317 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3318 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3319 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3320 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3321 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3322 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3323 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3324 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3325 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3326 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3327 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3328 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3329 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3330 #### Windows (GPO)
3331 ```
3332 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3333 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3334 ```
3335 #### Windows (Intune)
3336 OMA-URI: (periods are replaced by underscores)
3337 ```
3338 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3339 ```
3340 Value (string):
3341 ```
3342 <enabled/> or <disabled/>
3343 ```
3344 #### macOS
3345 ```
3346 <dict>
3347 <key>Preferences</key>
3348 <dict>
3349 <key>boolean_preference_name</key>
3350 <true/> | <false/>
3351 <key>string_preference_name</key>
3352 <string>string_value</string>
3353 </dict>
3354 </dict>
3355 ```
3356 #### policies.json
3357 ```
3358 {
3359 "policies": {
3360 "Preferences": {
3361 "boolean_preference_name": true | false,
3362 "string_preference_name": "string_value"
3363 }
3364 }
3365 }
3366 ```
3367 ### PromptForDownloadLocation
3368 Ask where to save each file before downloading.
3369
3370 **Compatibility:** Firefox 68, Firefox ESR 68\
3371 **CCK2 Equivalent:** N/A\
3372 **Preferences Affected:** `browser.download.useDownloadDir`
3373
3374 #### Windows (GPO)
3375 ```
3376 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3377 ```
3378 #### Windows (Intune)
3379 OMA-URI:
3380 ```
3381 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3382 ```
3383 Value (string):
3384 ```
3385 <enabled/> or <disabled/>
3386 ```
3387 #### macOS
3388 ```
3389 <dict>
3390 <key>PromptForDownloadLocation</key>
3391 <true/> | <false/>
3392 </dict>
3393 ```
3394 #### policies.json
3395 ```
3396 {
3397 "policies": {
3398 "PromptForDownloadLocation": true | false
3399 }
3400 }
3401 ```
3402 ### Proxy
3403 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3404 To specify ports, append them to the hostnames with a colon (:).
3405
3406 `Mode` is the proxy method being used.
3407
3408 `Locked` is whether or not proxy settings can be changed.
3409
3410 `HTTPProxy` is the HTTP proxy server.
3411
3412 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3413
3414 `SSLProxy` is the SSL proxy server.
3415
3416 `FTPProxy` is the FTP proxy server.
3417
3418 `SOCKSProxy` is the SOCKS proxy server
3419
3420 `SOCKSVersion` is the SOCKS version (4 or 5)
3421
3422 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3423
3424 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3425
3426 `AutoLogin` means do not prompt for authentication if password is saved.
3427
3428 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3429
3430 **Compatibility:** Firefox 60, Firefox ESR 60\
3431 **CCK2 Equivalent:** `networkProxy*`\
3432 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3433
3434 #### Windows (GPO)
3435 ```
3436 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3437 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3438 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3439 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3440 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3441 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3442 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3443 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3444 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3445 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3446 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3447 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3448 ```
3449 #### Windows (Intune)
3450 OMA-URI:
3451 ```
3452 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3453 ```
3454 Value (string):
3455 ```
3456 <enabled/>
3457 <data id="ProxyLocked" value="true | false"/>
3458 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3459 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3460 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3461 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3462 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3463 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3464 <data id="SOCKSVersion" value="4 | 5"/>
3465 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3466 <data id="Passthrough" value="<local>"/>
3467 <data id="AutoLogin" value="true | false"/>
3468 <data id="UseProxyForDNS" value="true | false"/>
3469 ```
3470 #### macOS
3471 ```
3472 <dict>
3473 <key>Proxy</key>
3474 <dict>
3475 <key>Mode</key>
3476 <string>none | system | manual | autoDetect | autoConfig</string>
3477 <key>Locked</key>
3478 <true> | </false>
3479 <key>HTTPProxy</key>
3480 <string>https://httpproxy.example.com</string>
3481 <key>UseHTTPProxyForAllProtocols</key>
3482 <true> | </false>
3483 <key>SSLProxy</key>
3484 <string>https://sslproxy.example.com</string>
3485 <key>FTPProxy</key>
3486 <string>https://ftpproxy.example.com</string>
3487 <key>SOCKSProxy</key>
3488 <string>https://socksproxy.example.com</string>
3489 <key>SOCKSVersion</key>
3490 <string>4 | 5</string>
3491 <key>Passthrough</key>
3492 <string>&lt;local>&gt;</string>
3493 <key>AutoConfigURL</key>
3494 <string>URL_TO_AUTOCONFIG</string>
3495 <key>AutoLogin</key>
3496 <true> | </false>
3497 <key>UseProxyForDNS</key>
3498 <true> | </false>
3499 </dict>
3500 </dict>
3501 ```
3502 #### policies.json
3503 ```
3504 {
3505 "policies": {
3506 "Proxy": {
3507 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3508 "Locked": [true, false],
3509 "HTTPProxy": "hostname",
3510 "UseHTTPProxyForAllProtocols": [true, false],
3511 "SSLProxy": "hostname",
3512 "FTPProxy": "hostname",
3513 "SOCKSProxy": "hostname",
3514 "SOCKSVersion": 4 | 5
3515 "Passthrough": "<local>",
3516 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3517 "AutoLogin": [true, false],
3518 "UseProxyForDNS": [true, false]
3519 }
3520 }
3521 }
3522 ```
3523 ### RequestedLocales
3524 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3525
3526 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3527
3528 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3529 **CCK2 Equivalent:** N/A\
3530 **Preferences Affected:** N/A
3531 #### Windows (GPO)
3532 ```
3533 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3534 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3535
3536 or
3537
3538 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3539 ```
3540 #### Windows (Intune)
3541 OMA-URI:
3542 ```
3543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3544 ```
3545 Value (string):
3546 ```
3547 <enabled/>
3548 <data id="Preferences_String" value="de,en-US"/>
3549 ```
3550 #### macOS
3551 ```
3552 <dict>
3553 <key>RequestedLocales</key>
3554 <array>
3555 <string>de</string>
3556 <string>en-US</string>
3557 </array>
3558 </dict>
3559
3560 or
3561
3562 <dict>
3563 <key>RequestedLocales</key>
3564 <string>de,en-US</string>
3565 </dict>
3566
3567 ```
3568 #### policies.json
3569 ```
3570 {
3571 "policies": {
3572 "RequestedLocales": ["de", "en-US"]
3573 }
3574 }
3575
3576 or
3577
3578 {
3579 "policies": {
3580 "RequestedLocales": "de,en-US"
3581 }
3582 }
3583 ```
3584 <a name="SanitizeOnShutdown"></a>
3585
3586 ### SanitizeOnShutdown (Selective)
3587 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3588
3589 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3590
3591 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3592 **CCK2 Equivalent:** N/A\
3593 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3594 #### Windows (GPO)
3595 ```
3596 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3597 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3598 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3599 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3600 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3601 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3602 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3603 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3604 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3605 ```
3606 #### Windows (Intune)
3607 OMA-URI:
3608 ```
3609 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3610 ```
3611 Value (string):
3612 ```
3613 <enabled/> or <disabled/>
3614 ```
3615 #### macOS
3616 ```
3617 <dict>
3618 <key>SanitizeOnShutdown</key>
3619 <dict>
3620 <key>Cache</key>
3621 <true/> | <false/>
3622 <key>Cookies</key>
3623 <true/> | <false/>
3624 <key>Downloads</key>
3625 <true/> | <false/>
3626 <key>FormData</key>
3627 <true/> | <false/>
3628 <key>History</key>
3629 <true/> | <false/>
3630 <key>Sessions</key>
3631 <true/> | <false/>
3632 <key>SiteSettings</key>
3633 <true/> | <false/>
3634 <key>OfflineApps</key>
3635 <true/> | <false/>
3636 <key>Locked</key>
3637 <true/> | <false/>
3638 </dict>
3639 </dict>
3640 ```
3641 #### policies.json
3642 ```
3643 {
3644 "policies": {
3645 "SanitizeOnShutdown": {
3646 "Cache": true | false,
3647 "Cookies": true | false,
3648 "Downloads": true | false,
3649 "FormData": true | false,
3650 "History": true | false,
3651 "Sessions": true | false,
3652 "SiteSettings": true | false,
3653 "OfflineApps": true | false,
3654 "Locked": true | false
3655 }
3656 }
3657 }
3658 ```
3659 ### SanitizeOnShutdown (All)
3660 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3661
3662 **Compatibility:** Firefox 60, Firefox ESR 60\
3663 **CCK2 Equivalent:** N/A\
3664 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3665 #### Windows (GPO)
3666 ```
3667 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3668 ```
3669 #### Windows (Intune)
3670 OMA-URI:
3671 ```
3672 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3673 ```
3674 Value (string):
3675 ```
3676 <enabled/> or <disabled/>
3677 ```
3678 #### macOS
3679 ```
3680 <dict>
3681 <key>SanitizeOnShutdown</key>
3682 <true/> | <false/>
3683 </dict>
3684 ```
3685 #### policies.json
3686 ```
3687 {
3688 "policies": {
3689 "SanitizeOnShutdown": true | false
3690 }
3691 }
3692 ```
3693 ### SearchBar
3694 Set whether or not search bar is displayed.
3695
3696 **Compatibility:** Firefox 60, Firefox ESR 60\
3697 **CCK2 Equivalent:** `showSearchBar`\
3698 **Preferences Affected:** N/A
3699
3700 #### Windows (GPO)
3701 ```
3702 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3703 ```
3704
3705 #### Windows (Intune)
3706 OMA-URI:
3707 ```
3708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3709 ```
3710 Value (string):
3711 ```
3712 <enabled/>
3713 <data id="Permissions" value="unified | separate"/>
3714 #### macOS
3715 ```
3716 <dict>
3717 <key>SearchBar</key>
3718 <string>unified | separate</string>
3719 </dict>
3720 ```
3721 #### policies.json
3722 ```
3723 {
3724 "policies": {
3725 "SearchBar": "unified" | "separate"
3726 }
3727 }
3728 ```
3729 <a name="SearchEngines"></a>
3730
3731 ### SearchEngines (This policy is only available on the ESR.)
3732
3733 ### SearchEngines | Default
3734
3735 Set the default search engine. This policy is only available on the ESR.
3736
3737 **Compatibility:** Firefox ESR 60\
3738 **CCK2 Equivalent:** `defaultSearchEngine`\
3739 **Preferences Affected:** N/A
3740
3741 #### Windows (GPO)
3742 ```
3743 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3744 ```
3745 #### Windows (Intune)
3746 OMA-URI:
3747 ```
3748 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3749 ```
3750 Value (string):
3751 ```
3752 <enabled/>
3753 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3754 ```
3755 #### macOS
3756 ```
3757 <dict>
3758 <key>SearchEngines</key>
3759 <dict>
3760 <key>Default</key>
3761 <string>NAME_OF_SEARCH_ENGINE</string>
3762 </dict>
3763 </dict>
3764 ```
3765 #### policies.json
3766 ```
3767 {
3768 "policies": {
3769 "SearchEngines": {
3770 "Default": "NAME_OF_SEARCH_ENGINE"
3771 }
3772 }
3773 }
3774 ```
3775 ### SearchEngines | PreventInstalls
3776
3777 Prevent installing search engines from webpages.
3778
3779 **Compatibility:** Firefox ESR 60\
3780 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3781 **Preferences Affected:** N/A
3782
3783 #### Windows (GPO)
3784 ```
3785 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3786 ```
3787 #### Windows (Intune)
3788 OMA-URI:
3789 ```
3790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3791 ```
3792 Value (string):
3793 ```
3794 <enabled/> or <disabled/>
3795 ```
3796 #### macOS
3797 ```
3798 <dict>
3799 <key>SearchEngines</key>
3800 <dict>
3801 <key>PreventInstalls</key>
3802 <true/> | <false/>
3803 </dict>
3804 </dict>
3805 ```
3806 #### policies.json
3807 ```
3808 {
3809 "policies": {
3810 "SearchEngines": {
3811 "PreventInstalls": true | false
3812 }
3813 }
3814 }
3815 ```
3816 ### SearchEngines | Remove
3817
3818 Hide built-in search engines. This policy is only available on the ESR.
3819
3820 **Compatibility:** Firefox ESR 60.2\
3821 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3822 **Preferences Affected:** N/A
3823
3824 #### Windows (GPO)
3825 ```
3826 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3827 ```
3828 #### Windows (Intune)
3829 OMA-URI:
3830 ```
3831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
3832 ```
3833 Value (string):
3834 ```
3835 <enabled/>
3836 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
3837 ```
3838 #### macOS
3839 ```
3840 <dict>
3841 <key>SearchEngines</key>
3842 <dict>
3843 <key>Remove</key>
3844 <array>
3845 <string>NAME_OF_SEARCH_ENGINE</string>
3846 </array>
3847 </dict>
3848 </dict>
3849 ```
3850 #### policies.json
3851 ```
3852 {
3853 "policies": {
3854 "SearchEngines": {
3855 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3856 }
3857 }
3858 }
3859 ```
3860 ### SearchEngines | Add
3861
3862 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3863
3864 `Name` is the name of the search engine.
3865
3866 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3867
3868 `Method` is either GET or POST
3869
3870 `IconURL` is a URL for the icon to use.
3871
3872 `Alias` is a keyword to use for the engine.
3873
3874 `Description` is a description of the search engine.
3875
3876 `PostData` is the POST data as name value pairs separated by &.
3877
3878 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3879
3880 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3881 **CCK2 Equivalent:** `searchplugins`\
3882 **Preferences Affected:** N/A
3883
3884 #### Windows (GPO)
3885 ```
3886 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3887 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3888 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3889 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3890 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3891 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3892 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3893 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3894 ```
3895 #### Windows (Intune)
3896 OMA-URI:
3897 ```
3898 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
3899 ```
3900 Value (string):
3901 ```
3902 <enabled/>
3903 <data id="SearchEngine_Name" value="Example1"/>
3904 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
3905 <data id="SearchEngine_Method" value="GET | POST"/>
3906 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
3907 <data id="SearchEngine_Alias" value="example"/>
3908 <data id="SearchEngine_Description" value="Example Description"/>
3909 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
3910 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
3911 ```
3912 #### macOS
3913 ```
3914 <dict>
3915 <key>SearchEngines</key>
3916 <dict>
3917 <key>Add</key>
3918 <array>
3919 <dict>
3920 <key>Name</key>
3921 <string>Example1</string>
3922 <key>URLTemplate</key>
3923 <string>https://www.example.org/q={searchTerms}</string>
3924 <key>Method</key>
3925 <string>GET | POST </string>
3926 <key>IconURL</key>
3927 <string>https://www.example.org/favicon.ico</string>
3928 <key>Alias</key>
3929 <string>example</string>
3930 <key>Description</key>
3931 <string>Example Description</string>
3932 <key>SuggestURLTemplate</key>
3933 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3934 <key>PostData</key>
3935 <string>name=value&q={searchTerms}</string>
3936 </dict>
3937 <array>
3938 </dict>
3939 </dict>
3940 ```
3941 #### policies.json
3942 ```
3943 {
3944 "policies": {
3945 "SearchEngines": {
3946 "Add": [
3947 {
3948 "Name": "Example1",
3949 "URLTemplate": "https://www.example.org/q={searchTerms}",
3950 "Method": "GET" | "POST",
3951 "IconURL": "https://www.example.org/favicon.ico",
3952 "Alias": "example",
3953 "Description": "Description",
3954 "PostData": "name=value&q={searchTerms}",
3955 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3956 }
3957 ]
3958 }
3959 }
3960 }
3961 ```
3962 ### SearchSuggestEnabled
3963
3964 Enable search suggestions.
3965
3966 **Compatibility:** Firefox 68, Firefox ESR 68\
3967 **CCK2 Equivalent:** N/A\
3968 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3969
3970 #### Windows (GPO)
3971 ```
3972 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3973 ```
3974 #### Windows (Intune)
3975 OMA-URI:
3976 ```
3977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
3978 ```
3979 Value (string):
3980 ```
3981 <enabled/> or <disabled/>
3982 ```
3983 #### macOS
3984 ```
3985 <dict>
3986 <key>SearchSuggestEnabled</key>
3987 <true/> | <false/>
3988 </dict>
3989 ```
3990 #### policies.json
3991 ```
3992 {
3993 "policies": {
3994 "SearchSuggestEnabled": true | false
3995 }
3996 }
3997 ```
3998 ### SecurityDevices
3999
4000 Install PKCS #11 modules.
4001
4002 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4003 **CCK2 Equivalent:** `certs.devices`\
4004 **Preferences Affected:** N/A
4005
4006 #### Windows (GPO)
4007 ```
4008 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4009 ```
4010 #### Windows (Intune)
4011 OMA-URI:
4012 ```
4013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4014 ```
4015 Value (string):
4016 ```
4017 <enabled/>
4018 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4019 ```
4020 #### macOS
4021 ```
4022 <dict>
4023 <key>SecurityDevices</key>
4024 <dict>
4025 <key>NAME_OF_DEVICE</key>
4026 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4027 </dict>
4028 </dict>
4029 ```
4030
4031 #### policies.json
4032 ```
4033 {
4034 "policies": {
4035 "SecurityDevices": {
4036 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4037 }
4038 }
4039 }
4040 ```
4041 ### SSLVersionMax
4042
4043 Set and lock the maximum version of TLS.
4044
4045 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4046 **CCK2 Equivalent:** N/A\
4047 **Preferences Affected:** `security.tls.version.max`
4048
4049 #### Windows (GPO)
4050 ```
4051 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4052 ```
4053 #### Windows (Intune)
4054 OMA-URI:
4055 ```
4056 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4057 ```
4058 Value (string):
4059 ```
4060 <enabled/>
4061 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4062 ```
4063 #### macOS
4064 ```
4065 <dict>
4066 <key>SSLVersionMax</key>
4067 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4068 </dict>
4069 ```
4070
4071 #### policies.json
4072 ```
4073 {
4074 "policies": {
4075 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4076 }
4077 }
4078 ```
4079 ### SSLVersionMin
4080
4081 Set and lock the minimum version of TLS.
4082
4083 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4084 **CCK2 Equivalent:** N/A\
4085 **Preferences Affected:** `security.tls.version.min`
4086
4087 #### Windows (GPO)
4088 ```
4089 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4090 ```
4091 #### Windows (Intune)
4092 OMA-URI:
4093 ```
4094 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4095 ```
4096 Value (string):
4097 ```
4098 <enabled/>
4099 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4100 ```
4101 #### macOS
4102 ```
4103 <dict>
4104 <key>SSLVersionMin</key>
4105 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4106 </dict>
4107 ```
4108
4109 #### policies.json
4110 ```
4111 {
4112 "policies": {
4113 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4114 }
4115 }
4116 ```
4117 ### SupportMenu
4118 Add a menuitem to the help menu for specifying support information.
4119
4120 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4121 **CCK2 Equivalent:** helpMenu\
4122 **Preferences Affected:** N/A
4123
4124 #### Windows (GPO)
4125 ```
4126 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4127 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4128 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4129 ```
4130 #### Windows (Intune)
4131 OMA-URI:
4132 ```
4133 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4134 ```
4135 Value (string):
4136 ```
4137 <enabled/>
4138 <data id="SupportMenuTitle" value="Support Menu"/>
4139 <data id="SupportMenuURL" value="http://example.com/support"/>
4140 <data id="SupportMenuAccessKey" value="S">
4141 ```
4142 #### macOS
4143 ```
4144 <dict>
4145 <key>SupportMenu</key>
4146 <dict>
4147 <key>Title</key>
4148 <string>SupportMenu</string>
4149 <key>URL</key>
4150 <string>http://example.com/support</string>
4151 <key>AccessKey</key>
4152 <string>S</string>
4153 </dict>
4154 </dict>
4155 ```
4156 #### policies.json
4157 ```
4158 {
4159 "policies": {
4160 "SupportMenu": {
4161 "Title": "Support Menu",
4162 "URL": "http://example.com/support",
4163 "AccessKey": "S"
4164 }
4165 }
4166 }
4167 ```
4168 ### UserMessaging
4169
4170 Prevent installing search engines from webpages.
4171
4172 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4173
4174 `ExtensionRecommendations` Don't recommend extensions.
4175
4176 `FeatureRecommendations` Don't recommend browser features.
4177
4178 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4179
4180 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4181 **CCK2 Equivalent:** N/A\
4182 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4183
4184 #### Windows (GPO)
4185 ```
4186 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4187 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4188 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4189 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4190 ```
4191 #### Windows (Intune)
4192 OMA-URI:
4193 ```
4194 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4195 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4197 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4198 ```
4199 Value (string):
4200 ```
4201 <enabled/> or <disabled/>
4202 ```
4203 #### macOS
4204 ```
4205 <dict>
4206 <key>UserMessaging</key>
4207 <dict>
4208 <key>WhatsNew</key>
4209 <true/> | <false/>
4210 <key>ExtensionRecommendations</key>
4211 <true/> | <false/>
4212 <key>FeatureRecommendations</key>
4213 <true/> | <false/>
4214 <key>UrlbarInterventions</key>
4215 <true/> | <false/>
4216 </dict>
4217 </dict>
4218 ```
4219 #### policies.json
4220 ```
4221 {
4222 "policies": {
4223 "UserMessaging": {
4224 "WhatsNew": true | false,
4225 "ExtensionRecommendations": true | false,
4226 "FeatureRecommendations": true | false,
4227 "UrlbarInterventions": true | false
4228 }
4229 }
4230 }
4231 ```
4232 ### WebsiteFilter
4233 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4234
4235 **Compatibility:** Firefox 60, Firefox ESR 60\
4236 **CCK2 Equivalent:** N/A\
4237 **Preferences Affected:** N/A
4238
4239 #### Windows (GPO)
4240 ```
4241 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4242 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4243 ```
4244 #### Windows (Intune)
4245 OMA-URI:
4246 ```
4247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4248 ```
4249 Value (string):
4250 ```
4251 <enabled/>
4252 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4253 ```
4254 OMA-URI:
4255 ```
4256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4257 ```
4258 Value (string):
4259 ```
4260 <enabled/>
4261 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4262 ```
4263 #### macOS
4264 ```
4265 <dict>
4266 <key>WebsiteFilter</key>
4267 <dict>
4268 <key>Block</key>
4269 <array>
4270 <string><all_urls></string>
4271 </array>
4272 <key>Exceptions</key>
4273 <array>
4274 <string>http://example.org/*</string>
4275 </array>
4276 </dict>
4277
4278 </dict>
4279 ```
4280 #### policies.json
4281 ```
4282 {
4283 "policies": {
4284 "WebsiteFilter": {
4285 "Block": ["<all_urls>"],
4286 "Exceptions": ["http://example.org/*"]
4287 }
4288 }
4289 }
4290 ```

patrick-canterino.de