]> git.p6c8.net - policy-templates.git/blob - README.md
4810f5c7fdff542eadb9a837a39a25ea8f048fc7
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
35 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
38 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
39 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
40 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
41 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
42 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
43 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
44 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
45 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
46 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
47 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
48 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
49 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
50 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
51 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
52 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
53 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
54 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
55 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
56 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
57 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
58 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
59 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
60 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
61 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
62 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
63 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
64 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
65 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
66 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
67 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
68 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
69 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
70 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
71 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
72 | **[`Preferences`](#preferences)** | Set and lock some preferences.
73 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
74 | **[`Proxy`](#proxy)** | Configure proxy settings.
75 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
76 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
77 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
78 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
79 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
80 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
81 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
82 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
83 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
84 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
87 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
88 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
89 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
90 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
91
92 ### AppAutoUpdate
93
94 Enable or disable **automatic** application update.
95
96 If set to true, application updates are installed without user approval.
97
98 If set to false, application updates are downloaded but the user can choose when to install the update.
99
100 If you have disabled updates via DisableAppUpdate, this policy has no effect.
101
102 **Compatibility:** Firefox 75, Firefox ESR 68.7\
103 **CCK2 Equivalent:** N/A\
104 **Preferences Affected:** app.update.auto
105
106 #### Windows (GPO)
107 ```
108 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
109 ```
110 #### macOS
111 ```
112 <dict>
113 <key>AppAutoUpdate</key>
114 <true/> | <false/>
115 </dict>
116 ```
117 #### policies.json
118 ```
119 {
120 "policies": {
121 "AppAutoUpdate": true | false
122 }
123 }
124 ```
125 ### AppUpdateURL
126
127 Change the URL for application update.
128
129 **Compatibility:** Firefox 62, Firefox ESR 60.2\
130 **CCK2 Equivalent:** N/A\
131 **Preferences Affected:** `app.update.url`
132
133 #### Windows (GPO)
134 ```
135 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
136 ```
137 #### macOS
138 ```
139 <dict>
140 <key>AppUpdateURL</key>
141 <string>https://yoursite.com</string>
142 </dict>
143 ```
144 #### policies.json
145 ```
146 {
147 "policies": {
148 "AppUpdateURL": "https://yoursite.com"
149 }
150 }
151 ```
152 ### Authentication
153
154 Configure sites that support integrated authentication.
155
156 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
157
158 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
159 **CCK2 Equivalent:** N/A\
160 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
161
162 #### Windows (GPO)
163 ```
164 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
165 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
166 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
167 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
168 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
169 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
170 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
171 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
172 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
173 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
174 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
175 ```
176 #### Windows (Intune)
177 OMA-URI:
178 ```
179 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
180 ```
181 Value (string):
182 ```
183 <enabled/>
184
185 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
186 ```
187 OMA-URI:
188 ```
189 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
190 ```
191 Value (string):
192 ```
193 <enabled/>
194
195 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
196 ```
197 OMA-URI:
198 ```
199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
200 ```
201 Value (string):
202 ```
203 <enabled/>
204
205 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
206 ```
207 ```OMA-URI:
208 ```
209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
210 ```
211 Value (string):
212 ```
213 <enabled/>
214
215 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
216 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
217 ```
218 OMA-URI:
219 ```
220 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
221 ```
222 Value (string):
223 ```
224 <enabled/>
225
226 <data id="StartPage" value="none | homepage | previous-session"/>
227 ```
228 #### macOS
229 ```
230 <dict>
231 <key>Authentication</key>
232 <dict>
233 <key>SPNEGO</key>
234 <array>
235 <string>mydomain.com</string>
236 <string>https://myotherdomain.com</string>
237 </array>
238 <key>Delegated</key>
239 <array>
240 <string>mydomain.com</string>
241 <string>https://myotherdomain.com</string>
242 </array>
243 <key>NTLM</key>
244 <array>
245 <string>mydomain.com</string>
246 <string>https://myotherdomain.com</string>
247 </array>
248 <key>AllowNonFQDN</key>
249 <dict>
250 <key>SPNEGO</key>
251 <true/> | <false/>
252 <key>NTLM</key>
253 <true/> | <false/>
254 </dict>
255 <key>AllowProxies</key>
256 <dict>
257 <key>SPNEGO</key>
258 <true/> | <false/>
259 <key>NTLM</key>
260 <true/> | <false/>
261 </dict>
262 <key>Locked</key>
263 <true/> | <false/>
264 </dict>
265 </dict>
266 ```
267 #### policies.json
268 ```
269 {
270 "policies": {
271 "Authentication": {
272 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
273 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
274 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
275 "AllowNonFQDN": {
276 "SPNEGO": true | false,
277 "NTLM": true | false
278 },
279 "AllowProxies": {
280 "SPNEGO": true | false,
281 "NTLM": true | false
282 },
283 "Locked": true | false
284 }
285 }
286 }
287 ```
288 ### BlockAboutAddons
289
290 Block access to the Add-ons Manager (about:addons).
291
292 **Compatibility:** Firefox 60, Firefox ESR 60\
293 **CCK2 Equivalent:** `disableAddonsManager`\
294 **Preferences Affected:** N/A
295
296 #### Windows (GPO)
297 ```
298 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
299 ```
300 #### Windows (Intune)
301 OMA-URI:
302 ```
303 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
304 ```
305 Value (string):
306 ```
307 <enabled/>
308 ```
309 #### macOS
310 ```
311 <dict>
312 <key>BlockAboutAddons</key>
313 <true/> | <false/>
314 </dict>
315 ```
316 #### policies.json
317 ```
318 {
319 "policies": {
320 "BlockAboutAddons": true | false
321 }
322 }
323 ```
324 ### BlockAboutConfig
325
326 Block access to about:config.
327
328 **Compatibility:** Firefox 60, Firefox ESR 60\
329 **CCK2 Equivalent:** `disableAboutConfig`\
330 **Preferences Affected:** N/A
331
332 #### Windows (GPO)
333 ```
334 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
335 ```
336 #### Windows (Intune)
337 OMA-URI:
338 ```
339 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
340 ```
341 Value (string):
342 ```
343 <enabled/>
344 ```
345 #### macOS
346 ```
347 <dict>
348 <key>BlockAboutConfig</key>
349 <true/> | <false/>
350 </dict>
351 ```
352 #### policies.json
353 ```
354 {
355 "policies": {
356 "BlockAboutConfig": true | false
357 }
358 }
359 ```
360 ### BlockAboutProfiles
361
362 Block access to About Profiles (about:profiles).
363
364 **Compatibility:** Firefox 60, Firefox ESR 60\
365 **CCK2 Equivalent:** `disableAboutProfiles`\
366 **Preferences Affected:** N/A
367
368 #### Windows (GPO)
369 ```
370 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
371 ```
372 #### Windows (Intune)
373 OMA-URI:
374 ```
375 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
376 ```
377 Value (string):
378 ```
379 <enabled/>
380 ```
381 #### macOS
382 ```
383 <dict>
384 <key>BlockAboutProfiles</key>
385 <true/> | <false/>
386 </dict>
387 ```
388 #### policies.json
389 ```
390 {
391 "policies": {
392 "BlockAboutProfiles": true | false
393 }
394 }
395 ```
396 ### BlockAboutSupport
397
398 Block access to Troubleshooting Information (about:support).
399
400 **Compatibility:** Firefox 60, Firefox ESR 60\
401 **CCK2 Equivalent:** `disableAboutSupport`\
402 **Preferences Affected:** N/A
403
404 #### Windows (GPO)
405 ```
406 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
407 ```
408 #### Windows (Intune)
409 OMA-URI:
410 ```
411 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
412 ```
413 Value (string):
414 ```
415 <enabled/>
416 ```
417 #### macOS
418 ```
419 <dict>
420 <key>BlockAboutSupport</key>
421 <true/> | <false/>
422 </dict>
423 ```
424 #### policies.json
425 ```
426 {
427 "policies": {
428 "BlockAboutSupport": true | false
429 }
430 }
431 ```
432 ### Bookmarks
433
434 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
435
436 **Compatibility:** Firefox 60, Firefox ESR 60\
437 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
438 **Preferences Affected:** N/A
439
440 #### Windows (GPO)
441 ```
442 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
443 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
444 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
445 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
446 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
447 ```
448 #### macOS
449 ```
450 <dict>
451 <key>Bookmarks</key>
452 <array>
453 <dict>
454 <key>Title</key>
455 <string>Example</string>
456 <key>URL</key>
457 <string>https://example.com</string>
458 <key>Favicon</key>
459 <string>https://example.com/favicon.ico</string>
460 <key>Placement</key>
461 <string>toolbar | menu</string>
462 <key>Folder</key>
463 <string>FolderName</string>
464 </dict>
465 </array>
466 </dict>
467 ```
468 #### policies.json
469 ```
470 {
471 "policies": {
472 "Bookmarks": [
473 {
474 "Title": "Example",
475 "URL": "https://example.com",
476 "Favicon": "https://example.com/favicon.ico",
477 "Placement": "toolbar" | "menu",
478 "Folder": "FolderName"
479 }
480 ]
481 }
482 }
483 ```
484 ### CaptivePortal
485 Enable or disable the detection of captive portals.
486
487 **Compatibility:** Firefox 67, Firefox ESR 60.7\
488 **CCK2 Equivalent:** N/A\
489 **Preferences Affected:** `network.captive-portal-service.enabled`
490
491 #### Windows (GPO)
492 ```
493 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>CaptivePortal</key>
499 <true/> | <false/>
500 </dict>
501 ```
502 #### policies.json
503 ```
504 {
505 "policies": {
506 "CaptivePortal": true | false
507 }
508 }
509 ```
510 ### Certificates
511
512 ### Certificates | ImportEnterpriseRoots
513
514 Trust certificates that have been added to the operating system certificate store by a user or administrator.
515
516 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
517
518 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
519 **CCK2 Equivalent:** N/A\
520 **Preferences Affected:** `security.enterprise_roots.enabled`
521
522 #### Windows (GPO)
523 ```
524 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
525 ```
526 #### macOS
527 ```
528 <dict>
529 <key>Certificates</key>
530 <dict>
531 <key>ImportEnterpriseRoots</key>
532 <true/> | <false/>
533 </dict>
534 </dict>
535 ```
536 #### policies.json
537 ```
538 {
539 "policies": {
540 "Certificates": {
541 "ImportEnterpriseRoots": true | false
542 }
543 }
544 }
545 ```
546 ### Certificates | Install
547
548 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
549
550 - Windows
551 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
552 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
553 - macOS
554 - /Library/Application Support/Mozilla/Certificates
555 - ~/Library/Application Support/Mozilla/Certificates
556 - Linux
557 - /usr/lib/mozilla/certificates
558 - /usr/lib64/mozilla/certificates
559 - ~/.mozilla/certificates
560
561 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
562
563 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
564
565 Certificates are installed using the trust string `CT,CT,`.
566
567 Binary (DER) and ASCII (PEM) certificates are both supported.
568
569 **Compatibility:** Firefox 64, Firefox ESR 64\
570 **CCK2 Equivalent:** `certs.ca`\
571 **Preferences Affected:** N/A
572
573 #### Windows (GPO)
574 ```
575 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
576 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
577 ```
578 #### macOS
579 ```
580 <dict>
581 <key>Certificates</key>
582 <dict>
583 <key>Install</key>
584 <array>
585 <string>cert1.der</string>
586 <string>/Users/username/cert2.pem</string>
587 </array>
588 </dict>
589 </dict>
590 ```
591 #### policies.json
592 ```
593 {
594 "policies": {
595 "Certificates": {
596 "Install": ["cert1.der", "/home/username/cert2.pem"]
597 }
598 }
599 }
600 ```
601 ### Cookies
602 Configure cookie preferences.
603
604 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
605
606 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
607
608 `Default` determines whether cookies are accepted at all.
609
610 `AcceptThirdParty` determines how third-party cookies are handled.
611
612 `ExpireAtSessionEnd` determines when cookies expire.
613
614 `RejectTracker` only rejects cookies for trackers.
615
616 `Locked` prevents the user from changing cookie preferences.
617
618 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
619 **CCK2 Equivalent:** N/A\
620 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
621
622 #### Windows (GPO)
623 ```
624 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
625 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
626 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
627 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
628 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
629 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
630 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
631 ```
632 #### macOS
633 ```
634 <dict>
635 <key>Cookies</key>
636 <dict>
637 <key>Allow</key>
638 <array>
639 <string>http://example.com</string>
640 </array>
641 <key>Block</key>
642 <array>
643 <string>http://example.org</string>
644 </array>
645 <key>Default</key>
646 <true/> | <false/>
647 <key>AcceptThirdParty</key>
648 <string>always | never | from-visited</string>
649 <key>ExpireAtSessionEnd</key>
650 <true/> | <false/>
651 <key>RejectTracker</key>
652 <true/> | <false/>
653 <key>Locked</key>
654 <true/> | <false/>
655 </dict>
656 </dict>
657 ```
658 #### policies.json
659 ```
660 {
661 "policies": {
662 "Cookies": {
663 "Allow": ["http://example.org/"],
664 "Block": ["http://example.edu/"],
665 "Default": true | false,
666 "AcceptThirdParty": "always" | "never" | "from-visited",
667 "ExpireAtSessionEnd": true | false,
668 "RejectTracker": true | false,
669 "Locked": true | false
670 }
671 }
672 }
673 ```
674 ### DisableSetDesktopBackground
675 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
676
677 **Compatibility:** Firefox 60, Firefox ESR 60\
678 **CCK2 Equivalent:** `removeSetDesktopBackground`\
679 **Preferences Affected:** N/A
680
681 #### Windows (GPO)
682 ```
683 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
684 ```
685
686 #### macOS
687 ```
688 <dict>
689 <key>DisableSetDesktopBackground</key>
690 <true/> | <false/>
691 </dict>
692 ```
693 #### policies.json
694 ```
695 {
696 "policies": {
697 "DisableSetDesktopBackground": true | false
698 }
699 }
700 ```
701 ### DisableMasterPasswordCreation
702 Remove the master password functionality.
703
704 **Compatibility:** Firefox 60, Firefox ESR 60\
705 **CCK2 Equivalent:** `noMasterPassword`\
706 **Preferences Affected:** N/A
707
708 #### Windows (GPO)
709 ```
710 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
711 ```
712
713 #### macOS
714 ```
715 <dict>
716 <key>DisableMasterPasswordCreation</key>
717 <true/> | <false/>
718 </dict>
719 ```
720 #### policies.json
721 ```
722 {
723 "policies": {
724 "DisableMasterPasswordCreation": true | false
725 }
726 }
727 ```
728 ### DisableAppUpdate
729 Turn off application updates.
730
731 **Compatibility:** Firefox 60, Firefox ESR 60\
732 **CCK2 Equivalent:** `disableFirefoxUpdates`\
733 **Preferences Affected:** N/A
734
735 #### Windows (GPO)
736 ```
737 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
738 ```
739 #### macOS
740 ```
741 <dict>
742 <key>DisableAppUpdate</key>
743 <true/> | <false/>
744 </dict>
745 ```
746 #### policies.json
747 ```
748 {
749 "policies": {
750 "DisableAppUpdate": true | false
751 }
752 }
753 ```
754 ### DisableBuiltinPDFViewer
755 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
756
757 **Compatibility:** Firefox 60, Firefox ESR 60\
758 **CCK2 Equivalent:** `disablePDFjs`\
759 **Preferences Affected:** `pdfjs.disabled`
760
761 #### Windows (GPO)
762 ```
763 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
764 ```
765
766 #### macOS
767 ```
768 <dict>
769 <key>DisableBuiltinPDFViewer</key>
770 <true/> | <false/>
771 </dict>
772 ```
773 #### policies.json
774 ```
775 {
776 "policies": {
777 "DisableBuiltinPDFViewer": true | false
778 }
779 }
780 ```
781 ### DisableDefaultBrowserAgent
782 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
783
784 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
785 **CCK2 Equivalent:** N/A\
786 **Preferences Affected:** N/A
787
788 #### Windows (GPO)
789 ```
790 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
791 ```
792
793 #### policies.json
794 ```
795 {
796 "policies": {
797 "DisableDefaultBrowserAgent": true | false
798 }
799 }
800 ```
801 ### DisableDeveloperTools
802 Remove access to all developer tools.
803
804 **Compatibility:** Firefox 60, Firefox ESR 60\
805 **CCK2 Equivalent:** `removeDeveloperTools`\
806 **Preferences Affected:** `devtools.policy.disabled`
807
808 #### Windows (GPO)
809 ```
810 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
811 ```
812
813 #### macOS
814 ```
815 <dict>
816 <key>DisableDeveloperTools</key>
817 <true/> | <false/>
818 </dict>
819 ```
820 #### policies.json
821 ```
822 {
823 "policies": {
824 "DisableDeveloperTools": true | false
825 }
826 }
827 ```
828 ### DisableFeedbackCommands
829 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
830
831 **Compatibility:** Firefox 60, Firefox ESR 60\
832 **CCK2 Equivalent:** N/A\
833 **Preferences Affected:** N/A
834
835 #### Windows (GPO)
836 ```
837 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
838 ```
839 #### macOS
840 ```
841 <dict>
842 <key>DisableFeedbackCommands</key>
843 <true/> | <false/>
844 </dict>
845 ```
846 #### policies.json
847 ```
848 {
849 "policies": {
850 "DisableFeedbackCommands": true | false
851 }
852 }
853 ```
854 ### DisableFirefoxScreenshots
855 Remove access to Firefox Screenshots.
856
857 **Compatibility:** Firefox 60, Firefox ESR 60\
858 **CCK2 Equivalent:** N/A\
859 **Preferences Affected:** `extensions.screenshots.disabled`
860
861 #### Windows (GPO)
862 ```
863 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
864 ```
865 #### macOS
866 ```
867 <dict>
868 <key>DisableFirefoxScreenshots</key>
869 <true/> | <false/>
870 </dict>
871 ```
872 #### policies.json
873 ```
874 {
875 "policies": {
876 "DisableFirefoxScreenshots": true | false
877 }
878 }
879 ```
880 ### DisableFirefoxAccounts
881 Disable Firefox Accounts integration (Sync).
882
883 **Compatibility:** Firefox 60, Firefox ESR 60\
884 **CCK2 Equivalent:** `disableSync`\
885 **Preferences Affected:** `identity.fxaccounts.enabled`
886
887 #### Windows (GPO)
888 ```
889 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
890 ```
891 #### macOS
892 ```
893 <dict>
894 <key>DisableFirefoxAccounts</key>
895 <true/> | <false/>
896 </dict>
897 ```
898 #### policies.json
899 ```
900 {
901 "policies": {
902 "DisableFirefoxAccounts": true | false
903 }
904 }
905 ```
906 ### DisableFirefoxStudies
907 Disable Firefox studies (Shield).
908
909 **Compatibility:** Firefox 60, Firefox ESR 60\
910 **CCK2 Equivalent:** N/A\
911 **Preferences Affected:** N/A
912
913 #### Windows (GPO)
914 ```
915 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
916 ```
917 #### macOS
918 ```
919 <dict>
920 <key>DisableFirefoxStudies</key>
921 <true/> | <false/>
922 </dict>
923 ```
924 #### policies.json
925 ```
926 {
927 "policies": {
928 "DisableFirefoxStudies": true | false
929 }
930 }
931 ```
932 ### DisableForgetButton
933 Disable the "Forget" button.
934
935 **Compatibility:** Firefox 60, Firefox ESR 60\
936 **CCK2 Equivalent:** `disableForget`\
937 **Preferences Affected:** N/A
938
939 #### Windows (GPO)
940 ```
941 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
942 ```
943 #### macOS
944 ```
945 <dict>
946 <key>DisableForgetButton</key>
947 <true/> | <false/>
948 </dict>
949 ```
950 #### policies.json
951 ```
952 {
953 "policies": {
954 "DisableForgetButton": true | false
955 }
956 }
957 ```
958 ### DisableFormHistory
959 Turn off saving information on web forms and the search bar.
960
961 **Compatibility:** Firefox 60, Firefox ESR 60\
962 **CCK2 Equivalent:** `disableFormFill`\
963 **Preferences Affected:** ` browser.formfill.enable`
964
965 #### Windows (GPO)
966 ```
967 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
968 ```
969 #### macOS
970 ```
971 <dict>
972 <key>DisableFormHistory</key>
973 <true/> | <false/>
974 </dict>
975 ```
976 #### policies.json
977 ```
978 {
979 "policies": {
980 "DisableFormHistory": true | false
981 }
982 }
983 ```
984 ### DisablePasswordReveal
985 Do not allow passwords to be shown in saved logins
986
987 **Compatibility:** Firefox 71, Firefox ESR 68.3\
988 **CCK2 Equivalent:** N/A
989 **Preferences Affected:** N/A
990
991 #### Windows (GPO)
992 ```
993 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
994 ```
995
996 #### macOS
997 ```
998 <dict>
999 <key>DisablePasswordReveal</key>
1000 <true/> | <false/>
1001 </dict>
1002 ```
1003 #### policies.json
1004 ```
1005 {
1006 "policies": {
1007 "DisablePasswordReveal": true | false
1008 }
1009 }
1010 ```
1011 ### DisablePocket
1012 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1013
1014 **Compatibility:** Firefox 60, Firefox ESR 60\
1015 **CCK2 Equivalent:** `disablePocket`\
1016 **Preferences Affected:** `extensions.pocket.enabled`
1017
1018 #### Windows (GPO)
1019 ```
1020 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1021 ```
1022 #### macOS
1023 ```
1024 <dict>
1025 <key>DisablePocket</key>
1026 <true/> | <false/>
1027 </dict>
1028 ```
1029 #### policies.json
1030 ```
1031 {
1032 "policies": {
1033 "DisablePocket": true | false
1034 }
1035 }
1036 ```
1037 ### DisablePrivateBrowsing
1038 Remove access to private browsing.
1039
1040 **Compatibility:** Firefox 60, Firefox ESR 60\
1041 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1042 **Preferences Affected:** N/A
1043
1044 #### Windows (GPO)
1045 ```
1046 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1047 ```
1048 #### macOS
1049 ```
1050 <dict>
1051 <key>DisablePrivateBrowsing</key>
1052 <true/> | <false/>
1053 </dict>
1054 ```
1055 #### policies.json
1056 ```
1057 {
1058 "policies": {
1059 "DisablePrivateBrowsing": true | false
1060 }
1061 }
1062 ```
1063 ### DisableProfileImport
1064 Disables the "Import data from another browser" option in the bookmarks window.
1065
1066 **Compatibility:** Firefox 60, Firefox ESR 60\
1067 **CCK2 Equivalent:** N/A\
1068 **Preferences Affected:** N/A
1069
1070 #### Windows (GPO)
1071 ```
1072 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1073 ```
1074 #### macOS
1075 ```
1076 <dict>
1077 <key>DisableProfileImport</key>
1078 <true/> | <false/>
1079 </dict>
1080 ```
1081 #### policies.json
1082 ```
1083 {
1084 "policies": {
1085 "DisableProfileImport": true | false
1086 }
1087 }
1088 ```
1089 ### DisableProfileRefresh
1090 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1091
1092 **Compatibility:** Firefox 60, Firefox ESR 60\
1093 **CCK2 Equivalent:** `disableResetFirefox`\
1094 **Preferences Affected:** `browser.disableResetPrompt`
1095
1096 #### Windows (GPO)
1097 ```
1098 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1099 ```
1100 #### macOS
1101 ```
1102 <dict>
1103 <key>DisableProfileRefresh</key>
1104 <true/> | <false/>
1105 </dict>
1106 ```
1107 #### policies.json
1108 ```
1109 {
1110 "policies": {
1111 "DisableProfileRefresh": true | false
1112 }
1113 }
1114 ```
1115 ### DisableSafeMode
1116 Disable safe mode within the browser.
1117
1118 On Windows, this disables safe mode via the command line as well.
1119
1120 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1121 **CCK2 Equivalent:** `disableSafeMode`\
1122 **Preferences Affected:** N/A
1123
1124 #### Windows (GPO)
1125 ```
1126 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1127 ```
1128 #### macOS
1129 ```
1130 <dict>
1131 <key>DisableSafeMode</key>
1132 <true/> | <false/>
1133 </dict>
1134 ```
1135 #### policies.json
1136 ```
1137 {
1138 "policies": {
1139 "DisableSafeMode": true | false
1140 }
1141 }
1142 ```
1143 ### DisableSecurityBypass
1144 Prevent the user from bypassing security in certain cases.
1145
1146 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1147
1148 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1149
1150 **Compatibility:** Firefox 60, Firefox ESR 60\
1151 **CCK2 Equivalent:** N/A\
1152 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1153
1154 #### Windows (GPO)
1155 ```
1156 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1157 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1158 ```
1159 #### macOS
1160 ```
1161 <dict>
1162 <key>DisableSecurityBypass</key>
1163 <dict>
1164 <key>InvalidCertificate</key>
1165 <true/> | <false/>
1166 <key><SafeBrowsing/key>
1167 <true/> | <false/>
1168 </dict>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableSecurityBypass": {
1176 "InvalidCertificate": true false,
1177 "SafeBrowsing": true false
1178 }
1179 }
1180 }
1181 ```
1182 ### DisableSystemAddonUpdate
1183 Prevent system add-ons from being installed or update.
1184
1185 **Compatibility:** Firefox 60, Firefox ESR 60\
1186 **CCK2 Equivalent:** N/A\
1187 **Preferences Affected:** N/A
1188
1189 #### Windows (GPO)
1190 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1191 ```
1192 #### macOS
1193 ```
1194 <dict>
1195 <key>DisableSystemAddonUpdate</key>
1196 <true/> | <false/>
1197 </dict>
1198 ```
1199 #### policies.json
1200 ```
1201 {
1202 "policies": {
1203 "DisableSystemAddonUpdate": true | false
1204 }
1205 }
1206 ```
1207 ### DisableTelemetry
1208 Prevent the upload of telemetry data.
1209
1210 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1211
1212 **Compatibility:** Firefox 60, Firefox ESR 60\
1213 **CCK2 Equivalent:** `disableTelemetry`\
1214 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1215
1216 #### Windows (GPO)
1217 ```
1218 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1219 ```
1220 #### macOS
1221 ```
1222 <dict>
1223 <key>DisableTelemetry</key>
1224 <true/> | <false/>
1225 </dict>
1226 ```
1227 #### policies.json
1228 ```
1229 {
1230 "policies": {
1231 "DisableTelemetry": true | false
1232 }
1233 }
1234 ```
1235 ### DisplayBookmarksToolbar
1236 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1237
1238 **Compatibility:** Firefox 60, Firefox ESR 60\
1239 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1240 **Preferences Affected:** N/A
1241
1242 #### Windows (GPO)
1243 ```
1244 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1245 ```
1246 #### macOS
1247 ```
1248 <dict>
1249 <key>DisplayBookmarksToolbar</key>
1250 <true/> | <false/>
1251 </dict>
1252 ```
1253 #### policies.json
1254 ```
1255 {
1256 "policies": {
1257 "DisplayBookmarksToolbar": true | false
1258 }
1259 }
1260 ```
1261 ### DisplayMenuBar (Deprecated)
1262 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1263
1264 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1265 **CCK2 Equivalent:** `displayMenuBar`\
1266 **Preferences Affected:** N/A
1267
1268 #### Windows (GPO)
1269 ```
1270 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1271 ```
1272 #### macOS
1273 ```
1274 <dict>
1275 <key>DisplayMenuBar</key>
1276 <true/> | <false/>
1277 </dict>
1278 ```
1279 #### policies.json
1280 ```
1281 {
1282 "policies": {
1283 "DisplayMenuBar": true | false
1284 }
1285 }
1286 ```
1287 ### DisplayMenuBar
1288 Set the state of the menubar.
1289
1290 `always` means the menubar is shown and cannot be hidden.
1291
1292 `never` means the menubar is hidden and cannot be shown.
1293
1294 `default-on` means the menubar is on by default but can be hidden.
1295
1296 `default-off` means the menubar is off by default but can be shown.
1297
1298 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1299 **CCK2 Equivalent:** `displayMenuBar`\
1300 **Preferences Affected:** N/A
1301
1302 #### Windows (GPO)
1303 ```
1304 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1305 ```
1306 #### macOS
1307 ```
1308 <dict>
1309 <key>DisplayMenuBar</key>
1310 <string>always | never | default-on | default-off</string>
1311 </dict>
1312 ```
1313 #### policies.json
1314 ```
1315 {
1316 "policies": {
1317 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1318 }
1319 }
1320 ```
1321 ### DNSOverHTTPS
1322 Configure DNS over HTTPS.
1323
1324 `Enabled` determines whether DNS over HTTPS is enabled
1325
1326 `ProviderURL` is a URL to another provider.
1327
1328 `Locked` prevents the user from changing DNS over HTTPS preferences.
1329
1330 `ExcludedDomains` excludes domains from DNS over HTTPS.
1331
1332 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1333 **CCK2 Equivalent:** N/A\
1334 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1335
1336 #### Windows (GPO)
1337 ```
1338 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1339 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1340 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1341 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1342 ```
1343 #### macOS
1344 ```
1345 <dict>
1346 <key>DNSOverHTTPS</key>
1347 <dict>
1348 <key>Enabled</key>
1349 <true/> | <false/>
1350 <key>ProviderURL</key>
1351 <string>URL_TO_ALTERNATE_PROVIDER</string>
1352 <key>Locked</key>
1353 <true/> | <false/>
1354 <key>ExcludedDomains</key>
1355 <array>
1356 <string>example.com</string>
1357 </array>
1358 </dict>
1359 </dict>
1360 ```
1361 #### policies.json
1362 ```
1363 {
1364 "policies": {
1365 "DNSOverHTTPS": {
1366 "Enabled": true | false,
1367 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1368 "Locked": true | false,
1369 "ExcludedDomains": ["example.com"]
1370 }
1371 }
1372 }
1373 ```
1374 ### DontCheckDefaultBrowser
1375 Don't check if Firefox is the default browser at startup.
1376
1377 **Compatibility:** Firefox 60, Firefox ESR 60\
1378 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1379 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1380
1381 #### Windows (GPO)
1382 ```
1383 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1384 ```
1385 #### macOS
1386 ```
1387 <dict>
1388 <key>DontCheckDefaultBrowser</key>
1389 <true/> | <false/>
1390 </dict>
1391 ```
1392 #### policies.json
1393 ```
1394 {
1395 "policies": {
1396 "DontCheckDefaultBrowser": true | false
1397 }
1398 }
1399 ```
1400 ### DefaultDownloadDirectory
1401 Set the default download directory.
1402
1403 You can use ${home} for the native home directory.
1404
1405 **Compatibility:** Firefox 68, Firefox ESR 68\
1406 **CCK2 Equivalent:** N/A\
1407 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1408
1409 #### Windows (GPO)
1410 ```
1411 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1412 ```
1413 #### macOS
1414 ```
1415 <dict>
1416 <key>DefaultDownloadDirectory</key>
1417 <string>${home}/Downloads</string>
1418 </dict>
1419 ```
1420 #### policies.json (macOS and Linux)
1421 ```
1422 {
1423 "policies": {
1424 "DefaultDownloadDirectory": "${home}/Downloads"
1425 }
1426 ```
1427 #### policies.json (Windows)
1428 ```
1429 {
1430 "policies": {
1431 "DefaultDownloadDirectory": "${home}\\Downloads"
1432 }
1433 ```
1434 ### DownloadDirectory
1435 Set and lock the download directory.
1436
1437 You can use ${home} for the native home directory.
1438
1439 **Compatibility:** Firefox 68, Firefox ESR 68\
1440 **CCK2 Equivalent:** N/A\
1441 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1442
1443 #### Windows (GPO)
1444 ```
1445 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1446 ```
1447 #### macOS
1448 ```
1449 <dict>
1450 <key>DownloadDirectory</key>
1451 <string>${home}/Downloads</string>
1452 </dict>
1453 ```
1454 #### policies.json (macOS and Linux)
1455 ```
1456 {
1457 "policies": {
1458 "DownloadDirectory": "${home}/Downloads"
1459 }
1460 ```
1461 #### policies.json (Windows)
1462 ```
1463 {
1464 "policies": {
1465 "DownloadDirectory": "${home}\\Downloads"
1466 }
1467 ```
1468 ### EnableTrackingProtection
1469 Configure tracking protection.
1470
1471 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1472
1473 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1474
1475 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1476
1477 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1478
1479 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1480
1481 `Exceptions` are origins for which tracking protection is not enabled.
1482
1483 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1484 **CCK2 Equivalent:** N/A\
1485 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1486
1487 #### Windows (GPO)
1488 ```
1489 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1490 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1491 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1492 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1493 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1494 ```
1495 #### macOS
1496 ```
1497 <dict>
1498 <key>EnableTrackingProtection</key>
1499 <dict>
1500 <key>Value</key>
1501 <true/> | <false/>
1502 <key><Locked</key>
1503 <true/> | <false/>
1504 <key><Cryptomining</key>
1505 <true/> | <false/>
1506 <key><Fingerprinting</key>
1507 <true/> | <false/>
1508 <key>Exceptions</key>
1509 <array>
1510 <string>https://example.com</string>
1511 </array>
1512 </dict>
1513 </dict>
1514 ```
1515 #### policies.json
1516 ```
1517 {
1518 "policies": {
1519 "EnableTrackingProtection": {
1520 "Value": [true, false],
1521 "Locked": [true, false],
1522 "Cryptomining": [true, false],
1523 "Fingerprinting": [true, false],
1524 "Exceptions": ["https://example.com"]
1525 }
1526 }
1527 ```
1528 ### EnterprisePoliciesEnabled
1529 Enable policy support on macOS.
1530
1531 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1532 **CCK2 Equivalent:** N/A\
1533 **Preferences Affected:** N/A
1534
1535 #### macOS
1536 ```
1537 <dict>
1538 <key>EnterprisePoliciesEnabled</key>
1539 <true/>
1540 </dict>
1541 ```
1542 ### Extensions
1543 Control the installation, uninstallation and locking of extensions.
1544
1545 `Install` is a list of URLs or native paths for extensions to be installed.
1546
1547 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1548
1549 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1550
1551 **Compatibility:** Firefox 60, Firefox ESR 60\
1552 **CCK2 Equivalent:** `addons`\
1553 **Preferences Affected:** N/A
1554
1555 #### Windows (GPO)
1556 ```
1557 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1558 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1559 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1560 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1561 ```
1562 #### macOS
1563 ```
1564 <dict>
1565 <key>Extensions</key>
1566 <dict>
1567 <key>Install</key>
1568 <array>
1569 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1570 <string>//path/to/xpi</string>
1571 </array>
1572 <key>Uninstall</key>
1573 <array>
1574 <string>bad_addon_id@mozilla.org</string>
1575 </array>
1576 <key>Locked</key>
1577 <array>
1578 <string>addon_id@mozilla.org</string>
1579 </array>
1580 </dict>
1581 </dict>
1582 ```
1583 #### policies.json
1584 ```
1585 {
1586 "policies": {
1587 "Extensions": {
1588 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1589 "Uninstall": ["bad_addon_id@mozilla.org"],
1590 "Locked": ["addon_id@mozilla.org"]
1591 }
1592 }
1593 }
1594 ```
1595 ### ExtensionSettings
1596 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1597
1598 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1599
1600 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1601
1602 The configuration for each extension is another dictionary that can contain the fields documented below.
1603
1604 | Name | Description |
1605 | --- | --- |
1606 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1607 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1608 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1609 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1610 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1611 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1612 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1613 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1614 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1615
1616 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1617 **CCK2 Equivalent:** N/A\
1618 **Preferences Affected:** N/A
1619
1620 #### Windows (GPO)
1621 ```
1622 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1623 {
1624 "*": {
1625 "blocked_install_message": "Custom error message.",
1626 "install_sources": ["https://addons.mozilla.org/"],
1627 "installation_mode": "blocked",
1628 "allowed_types": ["extension"]
1629 },
1630 "uBlock0@raymondhill.net": {
1631 "installation_mode": "force_installed",
1632 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1633 }
1634 }
1635 ```
1636 #### macOS
1637 ```
1638 <dict>
1639 <key>ExtensionSettings</key>
1640 <dict>
1641 <key>*</key>
1642 <dict>
1643 <key>blocked_install_message</key>
1644 <string>Custom error message.</string>
1645 <key>install_sources</key>
1646 <array>
1647 <string>https://addons.mozilla.org/</string>
1648 </array>
1649 <key>installation_mode</key>
1650 <string>blocked</string>
1651 <key>allowed_types</key>
1652 <array>
1653 <string>extension</string>
1654 </array>
1655 </dict>
1656 <key>uBlock0@raymondhill.net</key>
1657 <dict>
1658 <key>installation_mode</key>
1659 <string>force_installed</string>
1660 <key>install_url</key>
1661 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1662 </dict>
1663 </dict>
1664 </dict>
1665 ```
1666 #### policies.json
1667 ```
1668 {
1669 "policies": {
1670 "ExtensionSettings": {
1671 "*": {
1672 "blocked_install_message": "Custom error message.",
1673 "install_sources": ["https://addons.mozilla.org/"],
1674 "installation_mode": "blocked",
1675 "allowed_types": ["extension"]
1676 },
1677 "uBlock0@raymondhill.net": {
1678 "installation_mode": "force_installed",
1679 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1680 }
1681 }
1682 }
1683 }
1684 ```
1685 ### ExtensionUpdate
1686 Control extension updates.
1687
1688 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1689 **CCK2 Equivalent:** N/A\
1690 **Preferences Affected:** `extensions.update.enabled`
1691
1692 #### Windows (GPO)
1693 ```
1694 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1695 ```
1696 #### macOS
1697 ```
1698 <dict>
1699 <key>ExtensionUpdate</key>
1700 <true/> | <false/>
1701 </dict>
1702 ```
1703 #### policies.json
1704 ```
1705 {
1706 "policies": {
1707 "ExtensionUpdate": true | false
1708 }
1709 }
1710 ```
1711 ### FlashPlugin
1712 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1713
1714 `Allow` is a list of origins where Flash are allowed.
1715
1716 `Block` is a list of origins where Flash is not allowed.
1717
1718 `Default` determines whether or not Flash is allowed by default.
1719
1720 `Locked` prevents the user from changing Flash preferences.
1721
1722 **Compatibility:** Firefox 60, Firefox ESR 60\
1723 **CCK2 Equivalent:** `permissions.plugin`\
1724 **Preferences Affected:** `plugin.state.flash`
1725
1726 #### Windows (GPO)
1727 ```
1728 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1729 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1730 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1731 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1732 ```
1733 #### macOS
1734 ```
1735 <dict>
1736 <key>FlashPlugin</key>
1737 <dict>
1738 <key>Allow</key>
1739 <array>
1740 <string>http://example.org</string>
1741 </array>
1742 <key>Block</key>
1743 <array>
1744 <string>http://example.edu</string>
1745 </array>
1746 <key>Default</key>
1747 <true/> | <false/>
1748 <key>Locked</key>
1749 <true/> | <false/>
1750 </dict>
1751 </dict>
1752 ```
1753 #### policies.json
1754 ```
1755 {
1756 "policies": {
1757 "FlashPlugin": {
1758 "Allow": ["http://example.org/"],
1759 "Block": ["http://example.edu/"],
1760 "Default": true | false,
1761 "Locked": true | false
1762 }
1763 }
1764 }
1765 ```
1766 ### FirefoxHome
1767 Customize the Firefox Home page.
1768
1769 **Compatibility:** Firefox 68, Firefox ESR 68\
1770 **CCK2 Equivalent:** N/A\
1771 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1772
1773 #### Windows (GPO)
1774 ```
1775 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1776 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1777 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1778 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1779 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1780 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1781 ```
1782 #### macOS
1783 ```
1784 <dict>
1785 <key>FirefoxHome</key>
1786 <dict>
1787 <key>Search</key>
1788 <true/> | <false/>
1789 <key>TopSites</key>
1790 <true/> | <false/>
1791 <key>Highlights</key>
1792 <true/> | <false/>
1793 <key>Pocket</key>
1794 <true/> | <false/>
1795 <key>Snippets</key>
1796 <true/> | <false/>
1797 <key>Locked</key>
1798 <true/> | <false/>
1799 </dict>
1800 </dict>
1801 ```
1802 #### policies.json
1803 ```
1804 {
1805 "policies": {
1806 "FirefoxHome": {
1807 "Search": true | false,
1808 "TopSites": true | false,
1809 "Highlights": true | false,
1810 "Pocket": true | false,
1811 "Snippets": true | false,
1812 "Locked": true | false
1813 }
1814 }
1815 }
1816 ```
1817 ### HardwareAcceleration
1818 Control hardware acceleration.
1819
1820 **Compatibility:** Firefox 60, Firefox ESR 60\
1821 **CCK2 Equivalent:** N/A\
1822 **Preferences Affected:** `layers.acceleration.disabled`
1823
1824 #### Windows (GPO)
1825 ```
1826 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>HardwareAcceleration</key>
1832 <true/> | <false/>
1833 </dict>
1834 ```
1835 #### policies.json
1836 ```
1837 {
1838 "policies": {
1839 "HardwareAcceleration": true | false
1840 }
1841 }
1842 ```
1843 ### Homepage
1844 Configure the default homepage and how Firefox starts.
1845
1846 `URL` is the default homepage.
1847
1848 `Locked` prevents the user from changing homepage preferences.
1849
1850 `Additional` allows for more than one homepage.
1851
1852 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1853
1854 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1855 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1856 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1857
1858 #### Windows (GPO)
1859 ```
1860 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1861 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1862 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1863 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1864 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1865 ```
1866 #### Windows (Intune)
1867 OMA-URI:
1868 ```
1869 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
1870 ```
1871 Value (string):
1872 ```
1873 <enabled/>
1874
1875 <data id="HomepageURL" value="https://example.com"/>
1876 <data id="HomepageLocked" value="true | false"/>
1877 ```
1878 OMA-URI:
1879 ```
1880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
1881 ```
1882 Value (string):
1883 ```
1884 <enabled/>
1885
1886 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
1887 ```
1888 OMA-URI:
1889 ```
1890 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
1891 ```
1892 Value (string):
1893 ```
1894 <enabled/>
1895
1896 <data id="StartPage" value="none | homepage | previous-session"/>
1897 ```
1898 #### macOS
1899 ```
1900 <dict>
1901 <key>Homepage</key>
1902 <dict>
1903 <key>URL</key>
1904 <string>http://example.com</string>
1905 <key>Locked</key>
1906 <true/> | <false/>
1907 <key>Additional</key>
1908 <array>
1909 <string>http://example.org</string>
1910 <string>http://example.edu</string>
1911 </array>
1912 <key>StartPage</key>
1913 <string>none | homepage | previous-session</string>
1914 </dict>
1915 </dict>
1916 ```
1917 #### policies.json
1918 ```
1919 {
1920 "policies": {
1921 "Homepage": {
1922 "URL": "http://example.com/",
1923 "Locked": true | false,
1924 "Additional": ["http://example.org/",
1925 "http://example.edu/"],
1926 "StartPage": "none" | "homepage" | "previous-session"
1927 }
1928 }
1929 }
1930 ```
1931 ### InstallAddonsPermission
1932 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1933
1934 `Allow` is a list of origins where extension installs are allowed.
1935
1936 `Default` determines whether or not extension installs are allowed by default.
1937
1938 **Compatibility:** Firefox 60, Firefox ESR 60\
1939 **CCK2 Equivalent:** `permissions.install`\
1940 **Preferences Affected:** `xpinstall.enabled`
1941
1942 #### Windows (GPO)
1943 ```
1944 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1945 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1946 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1947 ```
1948 #### macOS
1949 ```
1950 <dict>
1951 <key>InstallAddonsPermission</key>
1952 <dict>
1953 <key>Allow</key>
1954 <array>
1955 <string>http://example.org</string>
1956 <string>http://example.edu</string>
1957 </array>
1958 <key>Default</key>
1959 <true/> | <false/>
1960 </dict>
1961 </dict>
1962 ```
1963 #### policies.json
1964 ```
1965 {
1966 "policies": {
1967 "InstallAddonsPermission": {
1968 "Allow": ["http://example.org/",
1969 "http://example.edu/"],
1970 "Default": true | false
1971 }
1972 }
1973 }
1974 ```
1975 ### LegacyProfiles
1976 Disable the feature enforcing a separate profile for each installation.
1977
1978 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1979
1980 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1981
1982 This policy only work on Windows via GPO (not policies.json).
1983
1984 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1985 **CCK2 Equivalent:** N/A\
1986 **Preferences Affected:** N/A
1987
1988 #### Windows (GPO)
1989 ```
1990 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1991 ```
1992 ### LocalFileLinks
1993 Enable linking to local files by origin.
1994
1995 **Compatibility:** Firefox 68, Firefox ESR 68\
1996 **CCK2 Equivalent:** N/A\
1997 **Preferences Affected:** `capability.policy.localfilelinks.*`
1998
1999 #### Windows (GPO)
2000 ```
2001 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2002 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2003 ```
2004 #### macOS
2005 ```
2006 <dict>
2007 <key>LocalFileLinks</key>
2008 <array>
2009 <string>http://example.org</string>
2010 <string>http://example.edu</string>
2011 </array>
2012 </dict>
2013 ```
2014 #### policies.json
2015 ```
2016 {
2017 "policies": {
2018 "LocalFileLinks": ["http://example.org/",
2019 "http://example.edu/"]
2020 }
2021 }
2022 ```
2023 ### NoDefaultBookmarks
2024 Disable the creation of default bookmarks.
2025
2026 This policy is only effective if the user profile has not been created yet.
2027
2028 **Compatibility:** Firefox 60, Firefox ESR 60\
2029 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2030 **Preferences Affected:** N/A
2031
2032 #### Windows (GPO)
2033 ```
2034 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2035 ```
2036 #### macOS
2037 ```
2038 <dict>
2039 <key>NoDefaultBookmarks</key>
2040 <true/> | <false/>
2041 </dict>
2042 ```
2043 #### policies.json
2044 ```
2045 {
2046 "policies": {
2047 "NoDefaultBookmarks": true | false
2048 }
2049 }
2050 ```
2051 ### NetworkPrediction
2052 Enable or disable network prediction (DNS prefetching).
2053
2054 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2055 **CCK2 Equivalent:** N/A\
2056 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2057
2058 #### Windows (GPO)
2059 ```
2060 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2061 ```
2062 #### macOS
2063 ```
2064 <dict>
2065 <key>NetworkPrediction</key>
2066 <true/> | <false/>
2067 </dict>
2068 ```
2069 #### policies.json
2070 ```
2071 {
2072 "policies": {
2073 "NetworkPrediction": true | false
2074 }
2075 ```
2076 ### NewTabPage
2077 Enable or disable the New Tab page.
2078
2079 **Compatibility:** Firefox 68, Firefox ESR 68\
2080 **CCK2 Equivalent:** N/A\
2081 **Preferences Affected:** `browser.newtabpage.enabled`
2082
2083 #### Windows (GPO)
2084 ```
2085 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2086 ```
2087 #### macOS
2088 ```
2089 <dict>
2090 <key>NewTabPage</key>
2091 <true/> | <false/>
2092 </dict>
2093 ```
2094 #### policies.json
2095 ```
2096 {
2097 "policies": {
2098 "NewTabPage": true | false
2099 }
2100 ```
2101 ### OfferToSaveLogins
2102 Control whether or not Firefox offers to save passwords.
2103
2104 **Compatibility:** Firefox 60, Firefox ESR 60\
2105 **CCK2 Equivalent:** `dontRememberPasswords`\
2106 **Preferences Affected:** `signon.rememberSignons`
2107
2108 #### Windows (GPO)
2109 ```
2110 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2111 ```
2112 #### macOS
2113 ```
2114 <dict>
2115 <key>OfferToSaveLogins</key>
2116 <true/> | <false/>
2117 </dict>
2118 ```
2119 #### policies.json
2120 ```
2121 {
2122 "policies": {
2123 "OfferToSaveLogins": true | false
2124 }
2125 }
2126 ```
2127 ### OfferToSaveLoginsDefault
2128 Sets the default value of signon.rememberSignons without locking it.
2129
2130 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2131 **CCK2 Equivalent:** `dontRememberPasswords`\
2132 **Preferences Affected:** `signon.rememberSignons`
2133
2134 #### Windows (GPO)
2135 ```
2136 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2137 ```
2138 #### macOS
2139 ```
2140 <dict>
2141 <key>OfferToSaveLoginsDefault</key>
2142 <true/> | <false/>
2143 </dict>
2144 ```
2145 #### policies.json
2146 ```
2147 {
2148 "policies": {
2149 "OfferToSaveLoginsDefault": true | false
2150 }
2151 }
2152 ```
2153 ### OverrideFirstRunPage
2154 Override the first run page. If the value is blank, no first run page is displayed.
2155
2156 **Compatibility:** Firefox 60, Firefox ESR 60\
2157 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2158 **Preferences Affected:** `startup.homepage_welcome_url`
2159
2160 #### Windows (GPO)
2161 ```
2162 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2163 ```
2164 #### macOS
2165 ```
2166 <dict>
2167 <key>OverrideFirstRunPage</key>
2168 <string>http://example.org</string>
2169 </dict>
2170 ```
2171 #### policies.json
2172 ```
2173 {
2174 "policies": {
2175 "OverrideFirstRunPage": "http://example.org"
2176 }
2177 ```
2178 ### OverridePostUpdatePage
2179 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2180
2181 **Compatibility:** Firefox 60, Firefox ESR 60\
2182 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2183 **Preferences Affected:** `startup.homepage_override_url`
2184
2185 #### Windows (GPO)
2186 ```
2187 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2188 ```
2189 #### macOS
2190 ```
2191 <dict>
2192 <key>OverridePostUpdatePage</key>
2193 <string>http://example.org</string>
2194 </dict>
2195 ```
2196 #### policies.json
2197 ```
2198 {
2199 "policies": {
2200 "OverridePostUpdatePage": "http://example.org"
2201 }
2202 ```
2203 ### PasswordManagerEnabled
2204 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2205
2206 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2207 **CCK2 Equivalent:** N/A\
2208 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2209
2210 #### Windows (GPO)
2211 ```
2212 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2213 ```
2214 #### macOS
2215 ```
2216 <dict>
2217 <key>PasswordManagerEnabled</key>
2218 <true/> | <false/>
2219 </dict>
2220 ```
2221 #### policies.json
2222 ```
2223 {
2224 "policies": {
2225 "PasswordManagerEnabled": true | false
2226 }
2227 }
2228 ```
2229 ### Permissions
2230 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2231
2232 `Allow` is a list of origins where the feature is allowed.
2233
2234 `Block` is a list of origins where the feature is not allowed.
2235
2236 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2237
2238 `Locked` prevents the user from changing preferences for the feature.
2239
2240 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2241 **CCK2 Equivalent:** N/A\
2242 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2243
2244 #### Windows (GPO)
2245 ```
2246 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2247 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2248 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2249 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2250 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2251 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2252 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2253 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2254 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2255 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2256 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2257 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2258 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2259 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2260 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2261 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2262 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2263 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2264 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2265 ```
2266 #### macOS
2267 ```
2268 <dict>
2269 <key>Permissions</key>
2270 <dict>
2271 <key>Camera</key>
2272 <dict>
2273 <key>Allow</key>
2274 <array>
2275 <string>https://example.org</string>
2276 <string>https://example.org:1234</string>
2277 </array>
2278 <key>Block</key>
2279 <array>
2280 <string>https://example.edu</string>
2281 </array>
2282 <key>BlockNewRequests</key>
2283 <true/>
2284 <key>Locked</key>
2285 <true/>
2286 </dict>
2287 <key>Microphone</key>
2288 <dict>
2289 <key>Allow</key>
2290 <array>
2291 <string>https://example.org</string>
2292 </array>
2293 <key>Block</key>
2294 <array>
2295 <string>https://example.edu</string>
2296 </array>
2297 <key>BlockNewRequests</key>
2298 <true/>
2299 <key>Locked</key>
2300 <true/>
2301 </dict>
2302 <key>Location</key>
2303 <dict>
2304 <key>Allow</key>
2305 <array>
2306 <string>https://example.org</string>
2307 </array>
2308 <key>Block</key>
2309 <array>
2310 <string>https://example.edu</string>
2311 </array>
2312 <key>BlockNewRequests</key>
2313 <true/>
2314 <key>Locked</key>
2315 <true/>
2316 </dict>
2317 <key>Notifications</key>
2318 <dict>
2319 <key>Allow</key>
2320 <array>
2321 <string>https://example.org</string>
2322 </array>
2323 <key>Block</key>
2324 <array>
2325 <string>https://example.edu</string>
2326 </array>
2327 <key>BlockNewRequests</key>
2328 <true/>
2329 <key>Locked</key>
2330 <true/>
2331 </dict>
2332 <key>Autoplay</key>
2333 <dict>
2334 <key>Allow</key>
2335 <array>
2336 <string>https://example.org</string>
2337 </array>
2338 <key>Block</key>
2339 <array>
2340 <string>https://example.edu</string>
2341 </array>
2342 </dict>
2343 </dict>
2344 </dict>
2345 ```
2346 #### policies.json
2347 ```
2348 {
2349 "policies": {
2350 "Permissions": {
2351 "Camera": {
2352 "Allow": ["https://example.org","https://example.org:1234"],
2353 "Block": ["https://example.edu"],
2354 "BlockNewRequests": true | false,
2355 "Locked": true | false
2356 },
2357 "Microphone": {
2358 "Allow": ["https://example.org"],
2359 "Block": ["https://example.edu"],
2360 "BlockNewRequests": true | false,
2361 "Locked": true | false
2362 },
2363 "Location": {
2364 "Allow": ["https://example.org"],
2365 "Block": ["https://example.edu"],
2366 "BlockNewRequests": true | false,
2367 "Locked": true | false
2368 },
2369 "Notifications": {
2370 "Allow": ["https://example.org"],
2371 "Block": ["https://example.edu"],
2372 "BlockNewRequests": true | false,
2373 "Locked": true | false
2374 },
2375 "Autoplay": {
2376 "Allow": ["https://example.org"],
2377 "Block": ["https://example.edu"]
2378 }
2379 }
2380 }
2381 }
2382 ```
2383 ### PopupBlocking
2384 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2385
2386 `Allow` is a list of origins where popup-windows are allowed.
2387
2388 `Default` determines whether or not pop-up windows are allowed by default.
2389
2390 `Locked` prevents the user from changing pop-up preferences.
2391
2392 **Compatibility:** Firefox 60, Firefox ESR 60\
2393 **CCK2 Equivalent:** `permissions.popup`\
2394 **Preferences Affected:** `dom.disable_open_during_load`
2395
2396 #### Windows (GPO)
2397 ```
2398 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2399 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2400 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2401 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2402 ```
2403 #### macOS
2404 ```
2405 <dict>
2406 <key>PopupBlocking</key>
2407 <dict>
2408 <key>Allow</key>
2409 <array>
2410 <string>http://example.org</string>
2411 <string>http://example.edu</string>
2412 </array>
2413 <key>Default</key>
2414 <true/> | <false/>
2415 <key>Locked</key>
2416 <true/> | <false/>
2417 </dict>
2418 </dict>
2419 ```
2420 #### policies.json
2421 ```
2422 {
2423 "policies": {
2424 "PopupBlocking": {
2425 "Allow": ["http://example.org/",
2426 "http://example.edu/"],
2427 "Default": true | false,
2428 "Locked": true | false
2429 }
2430 }
2431 }
2432 ```
2433 ### Preferences
2434 Set and lock certain preferences.
2435
2436 **Compatibility:** See below\
2437 **CCK2 Equivalent:** `preferences`\
2438 **Preferences Affected:** See below
2439
2440 | Preference | Type | Compatibility | Default
2441 | --- | --- | --- | ---
2442 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2443 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2444 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2445 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2446 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2447 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2448 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2449 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2450 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2451 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2452 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2453 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2454 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2455 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2456 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2457 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2458 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2459 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2460 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2461 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2462 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2463 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2464 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2465 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2466 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2467 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2468 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2469 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2470 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2471 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2472 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2473 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2474 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2475 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2476 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2477 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2478 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2479 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2480 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2481 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2482 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2483 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2484 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2485 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2486 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2487 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2488 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2489 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2490 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2491 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2492 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2493 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2494 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2495 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2496 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2497 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2498 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2499 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2500 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2501 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2502 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2503 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2504 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2505 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2506 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2507 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2508 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2509 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2510 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2511 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2512 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2513 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2514 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2515 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2516 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2517 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2518 disabled
2519 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2520 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2521 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2522 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2523 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2524 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2525 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2526 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2527 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2528 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2529 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2530 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2531 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2532 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2533 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2534 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2535 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2536 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2537 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2538 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2539 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2540 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2541 #### Windows (GPO)
2542 ```
2543 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2544 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2545 ```
2546 #### macOS
2547 ```
2548 <dict>
2549 <key>Preferences</key>
2550 <dict>
2551 <key>boolean_preference_name</key>
2552 <true/> | <false/>
2553 <key>string_preference_name</key>
2554 <string>string_value</string>
2555 </dict>
2556 </dict>
2557 ```
2558 #### policies.json
2559 ```
2560 {
2561 "policies": {
2562 "Preferences": {
2563 "boolean_preference_name": true | false,
2564 "string_preference_name": "string_value"
2565 }
2566 }
2567 }
2568 ```
2569 ### PromptForDownloadLocation
2570 Ask where to save each file before downloading.
2571
2572 **Compatibility:** Firefox 68, Firefox ESR 68\
2573 **CCK2 Equivalent:** N/A\
2574 **Preferences Affected:** `browser.download.useDownloadDir`
2575
2576 #### Windows (GPO)
2577 ```
2578 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2579 ```
2580 #### macOS
2581 ```
2582 <dict>
2583 <key>PromptForDownloadLocation</key>
2584 <true/> | <false/>
2585 </dict>
2586 ```
2587 #### policies.json
2588 ```
2589 {
2590 "policies": {
2591 "PromptForDownloadLocation": true | false
2592 }
2593 }
2594 ```
2595 ### Proxy
2596 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2597 To specify ports, append them to the hostnames with a colon (:).
2598
2599 `Mode` is the proxy method being used.
2600
2601 `Locked` is whether or not proxy settings can be changed.
2602
2603 `HTTPProxy` is the HTTP proxy server.
2604
2605 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2606
2607 `SSLProxy` is the SSL proxy server.
2608
2609 `FTPProxy` is the FTP proxy server.
2610
2611 `SOCKSProxy` is the SOCKS proxy server
2612
2613 `SOCKSVersion` is the SOCKS version (4 or 5)
2614
2615 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2616
2617 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2618
2619 `AutoLogin` means do not prompt for authentication if password is saved.
2620
2621 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2622
2623 **Compatibility:** Firefox 60, Firefox ESR 60\
2624 **CCK2 Equivalent:** `networkProxy*`\
2625 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2626
2627 #### Windows (GPO)
2628 ```
2629 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2630 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2631 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2632 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2633 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2634 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2635 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2636 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2637 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2638 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2639 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2640 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2641 ```
2642 #### macOS
2643 ```
2644 <dict>
2645 <key>Proxy</key>
2646 <dict>
2647 <key>Mode</key>
2648 <string>none | system | manual | autoDetect | autoConfig</string>
2649 <key>Locked</key>
2650 <true> | </false>
2651 <key>HTTPProxy</key>
2652 <string>https://httpproxy.example.com</string>
2653 <key>UseHTTPProxyForAllProtocols</key>
2654 <true> | </false>
2655 <key>SSLProxy</key>
2656 <string>https://sslproxy.example.com</string>
2657 <key>FTPProxy</key>
2658 <string>https://ftpproxy.example.com</string>
2659 <key>SOCKSProxy</key>
2660 <string>https://socksproxy.example.com</string>
2661 <key>SOCKSVersion</key>
2662 <string>4 | 5</string>
2663 <key>Passthrough</key>
2664 <string>&lt;local>&gt;</string>
2665 <key>AutoConfigURL</key>
2666 <string>URL_TO_AUTOCONFIG</string>
2667 <key>AutoLogin</key>
2668 <true> | </false>
2669 <key>UseProxyForDNS</key>
2670 <true> | </false>
2671 </dict>
2672 </dict>
2673 ```
2674 #### policies.json
2675 ```
2676 {
2677 "policies": {
2678 "Proxy": {
2679 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2680 "Locked": [true, false],
2681 "HTTPProxy": "hostname",
2682 "UseHTTPProxyForAllProtocols": [true, false],
2683 "SSLProxy": "hostname",
2684 "FTPProxy": "hostname",
2685 "SOCKSProxy": "hostname",
2686 "SOCKSVersion": 4 | 5
2687 "Passthrough": "<local>",
2688 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2689 "AutoLogin": [true, false],
2690 "UseProxyForDNS": [true, false]
2691 }
2692 }
2693 }
2694 ```
2695 ### RequestedLocales
2696 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2697
2698 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2699
2700 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2701 **CCK2 Equivalent:** N/A\
2702 **Preferences Affected:** N/A
2703 #### Windows (GPO)
2704 ```
2705 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2706 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2707
2708 or
2709
2710 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2711 ```
2712 #### macOS
2713 ```
2714 <dict>
2715 <key>RequestedLocales</key>
2716 <array>
2717 <string>de</string>
2718 <string>en-US</string>
2719 </array>
2720 </dict>
2721
2722 or
2723
2724 <dict>
2725 <key>RequestedLocales</key>
2726 <string>de,en-US</string>
2727 </dict>
2728
2729 ```
2730 #### policies.json
2731 ```
2732 {
2733 "policies": {
2734 "RequestedLocales": ["de", "en-US"]
2735 }
2736 }
2737
2738 or
2739
2740 {
2741 "policies": {
2742 "RequestedLocales": "de,en-US"
2743 }
2744 }
2745 ```
2746 <a name="SanitizeOnShutdown"></a>
2747
2748 ### SanitizeOnShutdown (Selective)
2749 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2750
2751 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2752
2753 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2754 **CCK2 Equivalent:** N/A\
2755 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2756 #### Windows (GPO)
2757 ```
2758 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2759 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2760 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2761 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2762 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2763 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2764 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2765 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2766 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2767 ```
2768 #### macOS
2769 ```
2770 <dict>
2771 <key>SanitizeOnShutdown</key>
2772 <dict>
2773 <key>Cache</key>
2774 <true/> | <false/>
2775 <key>Cookies</key>
2776 <true/> | <false/>
2777 <key>Downloads</key>
2778 <true/> | <false/>
2779 <key>FormData</key>
2780 <true/> | <false/>
2781 <key>History</key>
2782 <true/> | <false/>
2783 <key>Sessions</key>
2784 <true/> | <false/>
2785 <key>SiteSettings</key>
2786 <true/> | <false/>
2787 <key>OfflineApps</key>
2788 <true/> | <false/>
2789 <key>Locked</key>
2790 <true/> | <false/>
2791 </dict>
2792 </dict>
2793 ```
2794 #### policies.json
2795 ```
2796 {
2797 "policies": {
2798 "SanitizeOnShutdown": {
2799 "Cache": true | false,
2800 "Cookies": true | false,
2801 "Downloads": true | false,
2802 "FormData": true | false,
2803 "History": true | false,
2804 "Sessions": true | false,
2805 "SiteSettings": true | false,
2806 "OfflineApps": true | false,
2807 "Locked": true | false
2808 }
2809 }
2810 }
2811 ```
2812 ### SanitizeOnShutdown (All)
2813 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2814
2815 **Compatibility:** Firefox 60, Firefox ESR 60\
2816 **CCK2 Equivalent:** N/A\
2817 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2818 #### Windows (GPO)
2819 ```
2820 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2821 ```
2822 #### macOS
2823 ```
2824 <dict>
2825 <key>SanitizeOnShutdown</key>
2826 <true/> | <false/>
2827 </dict>
2828 ```
2829 #### policies.json
2830 ```
2831 {
2832 "policies": {
2833 "SanitizeOnShutdown": true | false
2834 }
2835 }
2836 ```
2837 ### SearchBar
2838 Set whether or not search bar is displayed.
2839
2840 **Compatibility:** Firefox 60, Firefox ESR 60\
2841 **CCK2 Equivalent:** `showSearchBar`\
2842 **Preferences Affected:** N/A
2843
2844 #### Windows (GPO)
2845 ```
2846 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2847 ```
2848 #### macOS
2849 ```
2850 <dict>
2851 <key>SearchBar</key>
2852 <string>unified | separate</string>
2853 </dict>
2854 ```
2855
2856 #### policies.json
2857 ```
2858 {
2859 "policies": {
2860 "SearchBar": "unified" | "separate"
2861 }
2862 }
2863 ```
2864 <a name="SearchEngines"></a>
2865
2866 ### SearchEngines (This policy is only available on the ESR.)
2867
2868 ### SearchEngines | Default
2869
2870 Set the default search engine. This policy is only available on the ESR.
2871
2872 **Compatibility:** Firefox ESR 60\
2873 **CCK2 Equivalent:** `defaultSearchEngine`\
2874 **Preferences Affected:** N/A
2875
2876 #### Windows (GPO)
2877 ```
2878 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2879 ```
2880 #### macOS
2881 ```
2882 <dict>
2883 <key>SearchEngines</key>
2884 <dict>
2885 <key>Default</key>
2886 <string>NAME_OF_SEARCH_ENGINE</string>
2887 </dict>
2888 </dict>
2889 ```
2890 #### policies.json
2891 ```
2892 {
2893 "policies": {
2894 "SearchEngines": {
2895 "Default": "NAME_OF_SEARCH_ENGINE"
2896 }
2897 }
2898 }
2899 ```
2900 ### SearchEngines | PreventInstalls
2901
2902 Prevent installing search engines from webpages.
2903
2904 **Compatibility:** Firefox ESR 60\
2905 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2906 **Preferences Affected:** N/A
2907
2908 #### Windows (GPO)
2909 ```
2910 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2911 ```
2912 #### macOS
2913 ```
2914 <dict>
2915 <key>SearchEngines</key>
2916 <dict>
2917 <key>PreventInstalls</key>
2918 <true/> | <false/>
2919 </dict>
2920 </dict>
2921 ```
2922 #### policies.json
2923 ```
2924 {
2925 "policies": {
2926 "SearchEngines": {
2927 "PreventInstalls": true | false
2928 }
2929 }
2930 }
2931 ```
2932 ### SearchEngines | Remove
2933
2934 Hide built-in search engines. This policy is only available on the ESR.
2935
2936 **Compatibility:** Firefox ESR 60.2\
2937 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2938 **Preferences Affected:** N/A
2939
2940 #### Windows (GPO)
2941 ```
2942 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2943 ```
2944 #### macOS
2945 ```
2946 <dict>
2947 <key>SearchEngines</key>
2948 <dict>
2949 <key>Remove</key>
2950 <array>
2951 <string>NAME_OF_SEARCH_ENGINE</string>
2952 </array>
2953 </dict>
2954 </dict>
2955 ```
2956 #### policies.json
2957 ```
2958 {
2959 "policies": {
2960 "SearchEngines": {
2961 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2962 }
2963 }
2964 }
2965 ```
2966 ### SearchEngines | Add
2967
2968 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2969
2970 `Name` is the name of the search engine.
2971
2972 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2973
2974 `Method` is either GET or POST
2975
2976 `IconURL` is a URL for the icon to use.
2977
2978 `Alias` is a keyword to use for the engine.
2979
2980 `Description` is a description of the search engine.
2981
2982 `PostData` is the POST data as name value pairs separated by &.
2983
2984 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2985
2986 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2987 **CCK2 Equivalent:** `searchplugins`\
2988 **Preferences Affected:** N/A
2989
2990 #### Windows (GPO)
2991 ```
2992 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2993 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2994 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2995 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2996 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2997 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2998 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2999 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3000 ```
3001
3002 #### macOS
3003 ```
3004 <dict>
3005 <key>SearchEngines</key>
3006 <dict>
3007 <key>Add</key>
3008 <array>
3009 <dict>
3010 <key>Name</key>
3011 <string>Example1</string>
3012 <key>URLTemplate</key>
3013 <string>https://www.example.org/q={searchTerms}</string>
3014 <key>Method</key>
3015 <string>GET | POST </string>
3016 <key>IconURL</key>
3017 <string>https://www.example.org/favicon.ico</string>
3018 <key>Alias</key>
3019 <string>example</string>
3020 <key>Description</key>
3021 <string>Example Description</string>
3022 <key>SuggestURLTemplate</key>
3023 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3024 <key>PostData</key>
3025 <string>name=value&q={searchTerms}</string>
3026 </dict>
3027 <array>
3028 </dict>
3029 </dict>
3030 ```
3031 #### policies.json
3032 ```
3033 {
3034 "policies": {
3035 "SearchEngines": {
3036 "Add": [
3037 {
3038 "Name": "Example1",
3039 "URLTemplate": "https://www.example.org/q={searchTerms}",
3040 "Method": "GET" | "POST",
3041 "IconURL": "https://www.example.org/favicon.ico",
3042 "Alias": "example",
3043 "Description": "Description",
3044 "PostData": "name=value&q={searchTerms}",
3045 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3046 }
3047 ]
3048 }
3049 }
3050 }
3051 ```
3052 ### SearchSuggestEnabled
3053
3054 Enable search suggestions.
3055
3056 **Compatibility:** Firefox 68, Firefox ESR 68\
3057 **CCK2 Equivalent:** N/A\
3058 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3059
3060 #### Windows (GPO)
3061 ```
3062 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3063 ```
3064 #### macOS
3065 ```
3066 <dict>
3067 <key>SearchSuggestEnabled</key>
3068 <true/> | <false/>
3069 </dict>
3070 ```
3071 #### policies.json
3072 ```
3073 {
3074 "policies": {
3075 "SearchSuggestEnabled": true | false
3076 }
3077 }
3078 ```
3079 ### SecurityDevices
3080
3081 Install PKCS #11 modules.
3082
3083 **Compatibility:** Firefox 64, Firefox ESR 60.4\
3084 **CCK2 Equivalent:** `certs.devices`\
3085 **Preferences Affected:** N/A
3086
3087 #### Windows (GPO)
3088 ```
3089 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
3090 ```
3091 #### macOS
3092 ```
3093 <dict>
3094 <key>SecurityDevices</key>
3095 <dict>
3096 <key>NAME_OF_DEVICE</key>
3097 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
3098 </dict>
3099 </dict>
3100 ```
3101
3102 #### policies.json
3103 ```
3104 {
3105 "policies": {
3106 "SecurityDevices": {
3107 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
3108 }
3109 }
3110 }
3111 ```
3112 ### SSLVersionMax
3113
3114 Set and lock the maximum version of TLS.
3115
3116 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3117 **CCK2 Equivalent:** N/A\
3118 **Preferences Affected:** `security.tls.version.max`
3119
3120 #### Windows (GPO)
3121 ```
3122 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3123 ```
3124 #### macOS
3125 ```
3126 <dict>
3127 <key>SSLVersionMax</key>
3128 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3129 </dict>
3130 ```
3131
3132 #### policies.json
3133 ```
3134 {
3135 "policies": {
3136 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3137 }
3138 }
3139 ```
3140 ### SSLVersionMin
3141
3142 Set and lock the minimum version of TLS.
3143
3144 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3145 **CCK2 Equivalent:** N/A\
3146 **Preferences Affected:** `security.tls.version.min`
3147
3148 #### Windows (GPO)
3149 ```
3150 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3151 ```
3152 #### macOS
3153 ```
3154 <dict>
3155 <key>SSLVersionMin</key>
3156 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3157 </dict>
3158 ```
3159
3160 #### policies.json
3161 ```
3162 {
3163 "policies": {
3164 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3165 }
3166 }
3167 ```
3168 ### SupportMenu
3169 Add a menuitem to the help menu for specifying support information.
3170
3171 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3172 **CCK2 Equivalent:** helpMenu\
3173 **Preferences Affected:** N/A
3174
3175 #### Windows (GPO)
3176 ```
3177 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3178 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3179 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3180 ```
3181 #### macOS
3182 ```
3183 <dict>
3184 <key>SupportMenu</key>
3185 <dict>
3186 <key>Title</key>
3187 <string>SupportMenu</string>
3188 <key>URL</key>
3189 <string>http://example.com/support</string>
3190 <key>AccessKey</key>
3191 <string>S</string>
3192 </dict>
3193 </dict>
3194 ```
3195 #### policies.json
3196 ```
3197 {
3198 "policies": {
3199 "SupportMenu": {
3200 "Title": "Support Menu",
3201 "URL": "http://example.com/support",
3202 "AccessKey": "S"
3203 }
3204 }
3205 }
3206 ```
3207 ### UserMessaging
3208
3209 Prevent installing search engines from webpages.
3210
3211 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3212
3213 `ExtensionRecommendations` Don't recommend extensions.
3214
3215 `FeatureRecommendations` Don't recommend browser features.
3216
3217 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3218
3219 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3220 **CCK2 Equivalent:** N/A\
3221 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3222
3223 #### Windows (GPO)
3224 ```
3225 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3226 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3227 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3228 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3229 ```
3230 #### macOS
3231 ```
3232 <dict>
3233 <key>UserMessaging</key>
3234 <dict>
3235 <key>WhatsNew</key>
3236 <true/> | <false/>
3237 <key>ExtensionRecommendations</key>
3238 <true/> | <false/>
3239 <key>FeatureRecommendations</key>
3240 <true/> | <false/>
3241 <key>UrlbarInterventions</key>
3242 <true/> | <false/>
3243 </dict>
3244 </dict>
3245 ```
3246 #### policies.json
3247 ```
3248 {
3249 "policies": {
3250 "UserMessaging": {
3251 "WhatsNew": true | false,
3252 "ExtensionRecommendations": true | false,
3253 "FeatureRecommendations": true | false,
3254 "UrlbarInterventions": true | false
3255 }
3256 }
3257 }
3258 ```
3259 ### WebsiteFilter
3260 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3261
3262 **Compatibility:** Firefox 60, Firefox ESR 60\
3263 **CCK2 Equivalent:** N/A\
3264 **Preferences Affected:** N/A
3265
3266 #### Windows (GPO)
3267 ```
3268 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3269 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3270 ```
3271 #### macOS
3272 ```
3273 <dict>
3274 <key>WebsiteFilter</key>
3275 <dict>
3276 <key>Block</key>
3277 <array>
3278 <string><all_urls></string>
3279 </array>
3280 <key>Exceptions</key>
3281 <array>
3282 <string>http://example.org/*</string>
3283 </array>
3284 </dict>
3285
3286 </dict>
3287 ```
3288 #### policies.json
3289 ```
3290 {
3291 "policies": {
3292 "WebsiteFilter": {
3293 "Block": ["<all_urls>"],
3294 "Exceptions": ["http://example.org/*"]
3295 }
3296 }
3297 }
3298 ```

patrick-canterino.de