]> git.p6c8.net - policy-templates.git/blob - README.md
Forgot TOC entry.
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
61 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
62 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
63 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
64 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
65 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
66 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
67 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
68 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
69 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
70 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
71 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
72 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
73 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
74 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
75 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
76 | **[`Preferences`](#preferences)** | Set and lock some preferences.
77 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
78 | **[`Proxy`](#proxy)** | Configure proxy settings.
79 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
80 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
81 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
82 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
83 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
84 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
85 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
86 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
87 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
88 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
89 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
90 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
91 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
92 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
93 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
94 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
95
96 ### AppAutoUpdate
97
98 Enable or disable **automatic** application update.
99
100 If set to true, application updates are installed without user approval.
101
102 If set to false, application updates are downloaded but the user can choose when to install the update.
103
104 If you have disabled updates via DisableAppUpdate, this policy has no effect.
105
106 **Compatibility:** Firefox 75, Firefox ESR 68.7\
107 **CCK2 Equivalent:** N/A\
108 **Preferences Affected:** app.update.auto
109
110 #### Windows (GPO)
111 ```
112 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
113 ```
114 #### Windows (Intune)
115 OMA-URI:
116 ```
117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
118 ```
119 Value (string):
120 ```
121 <enabled/> or <disabled/>
122 ```
123 #### macOS
124 ```
125 <dict>
126 <key>AppAutoUpdate</key>
127 <true/> | <false/>
128 </dict>
129 ```
130 #### policies.json
131 ```
132 {
133 "policies": {
134 "AppAutoUpdate": true | false
135 }
136 }
137 ```
138 ### AppUpdateURL
139
140 Change the URL for application update.
141
142 **Compatibility:** Firefox 62, Firefox ESR 60.2\
143 **CCK2 Equivalent:** N/A\
144 **Preferences Affected:** `app.update.url`
145
146 #### Windows (GPO)
147 ```
148 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
149 ```
150 #### Windows (Intune)
151 OMA-URI:
152 ```
153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
154 ```
155 Value (string):
156 ```
157 <enabled/>
158 <data id="AppUpdateURL" value="https://yoursite.com"/>
159 ```
160 #### macOS
161 ```
162 <dict>
163 <key>AppUpdateURL</key>
164 <string>https://yoursite.com</string>
165 </dict>
166 ```
167 #### policies.json
168 ```
169 {
170 "policies": {
171 "AppUpdateURL": "https://yoursite.com"
172 }
173 }
174 ```
175 ### Authentication
176
177 Configure sites that support integrated authentication.
178
179 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
180
181 `PrivateBrowsing` enables integrated authentication in prviate browsing.
182
183 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
184 **CCK2 Equivalent:** N/A\
185 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
186
187 #### Windows (GPO)
188 ```
189 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
201 ```
202 #### Windows (Intune)
203 OMA-URI:
204 ```
205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
206 ```
207 Value (string):
208 ```
209 <enabled/>
210 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
211 ```
212 OMA-URI:
213 ```
214 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
215 ```
216 Value (string):
217 ```
218 <enabled/>
219 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
220 ```
221 OMA-URI:
222 ```
223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
224 ```
225 Value (string):
226 ```
227 <enabled/>
228 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
229 ```
230 OMA-URI:
231 ```
232 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
233 ```
234 Value (string):
235 ```
236 <enabled/>
237 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
238 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
239 ```
240 OMA-URI:
241 ```
242 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
243 ```
244 Value (string):
245 ```
246 <enabled/> or <disabled/>
247 ```
248 OMA-URI:
249 ```
250 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
251 ```
252 Value (string):
253 ```
254 <enabled/> or <disabled/>
255 ```
256 #### macOS
257 ```
258 <dict>
259 <key>Authentication</key>
260 <dict>
261 <key>SPNEGO</key>
262 <array>
263 <string>mydomain.com</string>
264 <string>https://myotherdomain.com</string>
265 </array>
266 <key>Delegated</key>
267 <array>
268 <string>mydomain.com</string>
269 <string>https://myotherdomain.com</string>
270 </array>
271 <key>NTLM</key>
272 <array>
273 <string>mydomain.com</string>
274 <string>https://myotherdomain.com</string>
275 </array>
276 <key>AllowNonFQDN</key>
277 <dict>
278 <key>SPNEGO</key>
279 <true/> | <false/>
280 <key>NTLM</key>
281 <true/> | <false/>
282 </dict>
283 <key>AllowProxies</key>
284 <dict>
285 <key>SPNEGO</key>
286 <true/> | <false/>
287 <key>NTLM</key>
288 <true/> | <false/>
289 </dict>
290 <key>Locked</key>
291 <true/> | <false/>
292 <key>PrivateBrowsing</key>
293 <true/> | <false/>
294 </dict>
295 </dict>
296 ```
297 #### policies.json
298 ```
299 {
300 "policies": {
301 "Authentication": {
302 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
303 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
304 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
305 "AllowNonFQDN": {
306 "SPNEGO": true | false,
307 "NTLM": true | false
308 },
309 "AllowProxies": {
310 "SPNEGO": true | false,
311 "NTLM": true | false
312 },
313 "Locked": true | false,
314 "PrivateBrowsing": true | false
315 }
316 }
317 }
318 ```
319 ### BlockAboutAddons
320
321 Block access to the Add-ons Manager (about:addons).
322
323 **Compatibility:** Firefox 60, Firefox ESR 60\
324 **CCK2 Equivalent:** `disableAddonsManager`\
325 **Preferences Affected:** N/A
326
327 #### Windows (GPO)
328 ```
329 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
330 ```
331 #### Windows (Intune)
332 OMA-URI:
333 ```
334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
335 ```
336 Value (string):
337 ```
338 <enabled/> or <disabled/>
339 ```
340 #### macOS
341 ```
342 <dict>
343 <key>BlockAboutAddons</key>
344 <true/> | <false/>
345 </dict>
346 ```
347 #### policies.json
348 ```
349 {
350 "policies": {
351 "BlockAboutAddons": true | false
352 }
353 }
354 ```
355 ### BlockAboutConfig
356
357 Block access to about:config.
358
359 **Compatibility:** Firefox 60, Firefox ESR 60\
360 **CCK2 Equivalent:** `disableAboutConfig`\
361 **Preferences Affected:** N/A
362
363 #### Windows (GPO)
364 ```
365 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
366 ```
367 #### Windows (Intune)
368 OMA-URI:
369 ```
370 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
371 ```
372 Value (string):
373 ```
374 <enabled/> or <disabled/>
375 ```
376 #### macOS
377 ```
378 <dict>
379 <key>BlockAboutConfig</key>
380 <true/> | <false/>
381 </dict>
382 ```
383 #### policies.json
384 ```
385 {
386 "policies": {
387 "BlockAboutConfig": true | false
388 }
389 }
390 ```
391 ### BlockAboutProfiles
392
393 Block access to About Profiles (about:profiles).
394
395 **Compatibility:** Firefox 60, Firefox ESR 60\
396 **CCK2 Equivalent:** `disableAboutProfiles`\
397 **Preferences Affected:** N/A
398
399 #### Windows (GPO)
400 ```
401 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
402 ```
403 #### Windows (Intune)
404 OMA-URI:
405 ```
406 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
407 ```
408 Value (string):
409 ```
410 <enabled/> or <disabled/>
411 ```
412 #### macOS
413 ```
414 <dict>
415 <key>BlockAboutProfiles</key>
416 <true/> | <false/>
417 </dict>
418 ```
419 #### policies.json
420 ```
421 {
422 "policies": {
423 "BlockAboutProfiles": true | false
424 }
425 }
426 ```
427 ### BlockAboutSupport
428
429 Block access to Troubleshooting Information (about:support).
430
431 **Compatibility:** Firefox 60, Firefox ESR 60\
432 **CCK2 Equivalent:** `disableAboutSupport`\
433 **Preferences Affected:** N/A
434
435 #### Windows (GPO)
436 ```
437 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
438 ```
439 #### Windows (Intune)
440 OMA-URI:
441 ```
442 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
443 ```
444 Value (string):
445 ```
446 <enabled/> or <disabled/>
447 ```
448 #### macOS
449 ```
450 <dict>
451 <key>BlockAboutSupport</key>
452 <true/> | <false/>
453 </dict>
454 ```
455 #### policies.json
456 ```
457 {
458 "policies": {
459 "BlockAboutSupport": true | false
460 }
461 }
462 ```
463 ### Bookmarks
464
465 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
466
467 **Compatibility:** Firefox 60, Firefox ESR 60\
468 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
469 **Preferences Affected:** N/A
470
471 #### Windows (GPO)
472 ```
473 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
478 ```
479 #### Windows (Intune)
480 OMA-URI:
481 ```
482 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
483 ```
484 Value (string):
485 ```
486 <enabled/>
487 <data id="BookmarkTitle" value="Example"/>
488 <data id="BookmarkURL" value="https://example.com"/>
489 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
490 <data id="BookmarkPlacement" value="toolbar | menu"/>
491 <data id="BookmarkFolder" value="FolderName"/>
492 ```
493 #### macOS
494 ```
495 <dict>
496 <key>Bookmarks</key>
497 <array>
498 <dict>
499 <key>Title</key>
500 <string>Example</string>
501 <key>URL</key>
502 <string>https://example.com</string>
503 <key>Favicon</key>
504 <string>https://example.com/favicon.ico</string>
505 <key>Placement</key>
506 <string>toolbar | menu</string>
507 <key>Folder</key>
508 <string>FolderName</string>
509 </dict>
510 </array>
511 </dict>
512 ```
513 #### policies.json
514 ```
515 {
516 "policies": {
517 "Bookmarks": [
518 {
519 "Title": "Example",
520 "URL": "https://example.com",
521 "Favicon": "https://example.com/favicon.ico",
522 "Placement": "toolbar" | "menu",
523 "Folder": "FolderName"
524 }
525 ]
526 }
527 }
528 ```
529 ### CaptivePortal
530 Enable or disable the detection of captive portals.
531
532 **Compatibility:** Firefox 67, Firefox ESR 60.7\
533 **CCK2 Equivalent:** N/A\
534 **Preferences Affected:** `network.captive-portal-service.enabled`
535
536 #### Windows (GPO)
537 ```
538 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
539 ```
540 #### Windows (Intune)
541 OMA-URI:
542 ```
543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
544 ```
545 Value (string):
546 ```
547 <enabled/> or <disabled/>
548 ```
549 #### macOS
550 ```
551 <dict>
552 <key>CaptivePortal</key>
553 <true/> | <false/>
554 </dict>
555 ```
556 #### policies.json
557 ```
558 {
559 "policies": {
560 "CaptivePortal": true | false
561 }
562 }
563 ```
564 ### Certificates
565
566 ### Certificates | ImportEnterpriseRoots
567
568 Trust certificates that have been added to the operating system certificate store by a user or administrator.
569
570 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
571
572 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
573 **CCK2 Equivalent:** N/A\
574 **Preferences Affected:** `security.enterprise_roots.enabled`
575
576 #### Windows (GPO)
577 ```
578 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
579 ```
580 #### Windows (Intune)
581 OMA-URI:
582 ```
583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
584 ```
585 Value (string):
586 ```
587 <enabled/> or <disabled/>
588 ```
589 #### macOS
590 ```
591 <dict>
592 <key>Certificates</key>
593 <dict>
594 <key>ImportEnterpriseRoots</key>
595 <true/> | <false/>
596 </dict>
597 </dict>
598 ```
599 #### policies.json
600 ```
601 {
602 "policies": {
603 "Certificates": {
604 "ImportEnterpriseRoots": true | false
605 }
606 }
607 }
608 ```
609 ### Certificates | Install
610
611 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
612
613 - Windows
614 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
615 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
616 - macOS
617 - /Library/Application Support/Mozilla/Certificates
618 - ~/Library/Application Support/Mozilla/Certificates
619 - Linux
620 - /usr/lib/mozilla/certificates
621 - /usr/lib64/mozilla/certificates
622 - ~/.mozilla/certificates
623
624 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
625
626 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
627
628 Certificates are installed using the trust string `CT,CT,`.
629
630 Binary (DER) and ASCII (PEM) certificates are both supported.
631
632 **Compatibility:** Firefox 64, Firefox ESR 64\
633 **CCK2 Equivalent:** `certs.ca`\
634 **Preferences Affected:** N/A
635
636 #### Windows (GPO)
637 ```
638 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
639 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
640 ```
641 #### Windows (Intune)
642 OMA-URI:
643 ```
644 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
645 ```
646 Value (string):
647 ```
648 <enabled/>
649 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
650 ```
651 #### macOS
652 ```
653 <dict>
654 <key>Certificates</key>
655 <dict>
656 <key>Install</key>
657 <array>
658 <string>cert1.der</string>
659 <string>/Users/username/cert2.pem</string>
660 </array>
661 </dict>
662 </dict>
663 ```
664 #### policies.json
665 ```
666 {
667 "policies": {
668 "Certificates": {
669 "Install": ["cert1.der", "/home/username/cert2.pem"]
670 }
671 }
672 }
673 ```
674 ### Cookies
675 Configure cookie preferences.
676
677 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
678
679 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
680
681 `Default` determines whether cookies are accepted at all.
682
683 `AcceptThirdParty` determines how third-party cookies are handled.
684
685 `ExpireAtSessionEnd` determines when cookies expire.
686
687 `RejectTracker` only rejects cookies for trackers.
688
689 `Locked` prevents the user from changing cookie preferences.
690
691 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
692 **CCK2 Equivalent:** N/A\
693 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
694
695 #### Windows (GPO)
696 ```
697 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
698 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
699 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
700 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
701 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
702 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
704 ```
705 #### Windows (Intune)
706 OMA-URI:
707 ```
708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
709 ```
710 Value (string):
711 ```
712 <enabled/>
713 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
714 ```
715 OMA-URI:
716 ```
717 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
718 ```
719 Value (string):
720 ```
721 <enabled/>
722 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
723 ```
724 OMA-URI:
725 ```
726 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
727 ```
728 Value (string):
729 ```
730 <enabled/> or <disabled/>
731 ```
732 OMA-URI:
733 ```
734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
735 ```
736 Value (string):
737 ```
738 <enabled/>
739 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
740 ```
741 OMA-URI:
742 ```
743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
744 ```
745 Value (string):
746 ```
747 <enabled/> or <disabled/>
748 ```
749 OMA-URI:
750 ```
751 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
752 ```
753 Value (string):
754 ```
755 <enabled/> or <disabled/>
756 ```
757 OMA-URI:
758 ```
759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
760 ```
761 Value (string):
762 ```
763 <enabled/> or <disabled/>
764 ```
765 #### macOS
766 ```
767 <dict>
768 <key>Cookies</key>
769 <dict>
770 <key>Allow</key>
771 <array>
772 <string>http://example.com</string>
773 </array>
774 <key>Block</key>
775 <array>
776 <string>http://example.org</string>
777 </array>
778 <key>Default</key>
779 <true/> | <false/>
780 <key>AcceptThirdParty</key>
781 <string>always | never | from-visited</string>
782 <key>ExpireAtSessionEnd</key>
783 <true/> | <false/>
784 <key>RejectTracker</key>
785 <true/> | <false/>
786 <key>Locked</key>
787 <true/> | <false/>
788 </dict>
789 </dict>
790 ```
791 #### policies.json
792 ```
793 {
794 "policies": {
795 "Cookies": {
796 "Allow": ["http://example.org/"],
797 "Block": ["http://example.edu/"],
798 "Default": true | false,
799 "AcceptThirdParty": "always" | "never" | "from-visited",
800 "ExpireAtSessionEnd": true | false,
801 "RejectTracker": true | false,
802 "Locked": true | false
803 }
804 }
805 }
806 ```
807 ### DisableSetDesktopBackground
808 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
809
810 **Compatibility:** Firefox 60, Firefox ESR 60\
811 **CCK2 Equivalent:** `removeSetDesktopBackground`\
812 **Preferences Affected:** N/A
813
814 #### Windows (GPO)
815 ```
816 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
817 ```
818 #### Windows (Intune)
819 OMA-URI:
820 ```
821 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
822 ```
823 Value (string):
824 ```
825 <enabled/> or <disabled/>
826 ```
827 #### macOS
828 ```
829 <dict>
830 <key>DisableSetDesktopBackground</key>
831 <true/> | <false/>
832 </dict>
833 ```
834 #### policies.json
835 ```
836 {
837 "policies": {
838 "DisableSetDesktopBackground": true | false
839 }
840 }
841 ```
842 ### DisableMasterPasswordCreation
843 Remove the master password functionality.
844
845 **Compatibility:** Firefox 60, Firefox ESR 60\
846 **CCK2 Equivalent:** `noMasterPassword`\
847 **Preferences Affected:** N/A
848
849 #### Windows (GPO)
850 ```
851 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
852 ```
853 #### Windows (Intune)
854 OMA-URI:
855 ```
856 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
857 ```
858 Value (string):
859 ```
860 <enabled/> or <disabled/>
861 ```
862 #### macOS
863 ```
864 <dict>
865 <key>DisableMasterPasswordCreation</key>
866 <true/> | <false/>
867 </dict>
868 ```
869 #### policies.json
870 ```
871 {
872 "policies": {
873 "DisableMasterPasswordCreation": true | false
874 }
875 }
876 ```
877 ### DisableAppUpdate
878 Turn off application updates.
879
880 **Compatibility:** Firefox 60, Firefox ESR 60\
881 **CCK2 Equivalent:** `disableFirefoxUpdates`\
882 **Preferences Affected:** N/A
883
884 #### Windows (GPO)
885 ```
886 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
887 ```
888 #### Windows (Intune)
889 OMA-URI:
890 ```
891 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
892 ```
893 Value (string):
894 ```
895 <enabled/> or <disabled/>
896 ```
897 #### macOS
898 ```
899 <dict>
900 <key>DisableAppUpdate</key>
901 <true/> | <false/>
902 </dict>
903 ```
904 #### policies.json
905 ```
906 {
907 "policies": {
908 "DisableAppUpdate": true | false
909 }
910 }
911 ```
912 ### DisableBuiltinPDFViewer
913 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
914
915 **Compatibility:** Firefox 60, Firefox ESR 60\
916 **CCK2 Equivalent:** `disablePDFjs`\
917 **Preferences Affected:** `pdfjs.disabled`
918
919 #### Windows (GPO)
920 ```
921 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
922 ```
923 #### Windows (Intune)
924 OMA-URI:
925 ```
926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
927 ```
928 Value (string):
929 ```
930 <enabled/> or <disabled/>
931 ```
932 #### macOS
933 ```
934 <dict>
935 <key>DisableBuiltinPDFViewer</key>
936 <true/> | <false/>
937 </dict>
938 ```
939 #### policies.json
940 ```
941 {
942 "policies": {
943 "DisableBuiltinPDFViewer": true | false
944 }
945 }
946 ```
947 ### DisabledCiphers
948 Disable specific cryptographic ciphers.
949
950 **Compatibility:** Firefox 76, Firefox ESR 68.8\
951 **CCK2 Equivalent:** N/A\
952 **Preferences Affected:** N/A
953
954 #### Windows (GPO)
955 ```
956 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
957 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
958 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
959 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
960 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
961 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
962 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
963 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
965 ```
966 #### Windows (Intune)
967 OMA-URI:
968 ```
969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
972 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
973 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
975 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
978 ```
979 Value (string):
980 ```
981 <enabled/> or <disabled/>
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisabledCiphers</key>
987 <dict>
988 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
989 <true/> | <false/>
990 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
991 <true/> | <false/>
992 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
993 <true/> | <false/>
994 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
995 <true/> | <false/>
996 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
997 <true/> | <false/>
998 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
999 <true/> | <false/>
1000 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1001 <true/> | <false/>
1002 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1005 <true/> | <false/>
1006 </dict>
1007 </dict>
1008 ```
1009 #### policies.json
1010 ```
1011 {
1012 "policies": {
1013 "DisabledCiphers" {
1014 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1015 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1016 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1017 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1018 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1019 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1020 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1021 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1022 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1023 }
1024 }
1025 }
1026 ```
1027 ### DisableDefaultBrowserAgent
1028 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1029
1030 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1031 **CCK2 Equivalent:** N/A\
1032 **Preferences Affected:** N/A
1033
1034 #### Windows (GPO)
1035 ```
1036 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1037 ```
1038 #### Windows (Intune)
1039 OMA-URI:
1040 ```
1041 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1042 ```
1043 Value (string):
1044 ```
1045 <enabled/> or <disabled/>
1046 ```
1047 #### policies.json
1048 ```
1049 {
1050 "policies": {
1051 "DisableDefaultBrowserAgent": true | false
1052 }
1053 }
1054 ```
1055 ### DisableDeveloperTools
1056 Remove access to all developer tools.
1057
1058 **Compatibility:** Firefox 60, Firefox ESR 60\
1059 **CCK2 Equivalent:** `removeDeveloperTools`\
1060 **Preferences Affected:** `devtools.policy.disabled`
1061
1062 #### Windows (GPO)
1063 ```
1064 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1065 ```
1066 #### Windows (Intune)
1067 OMA-URI:
1068 ```
1069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1070 ```
1071 Value (string):
1072 ```
1073 <enabled/> or <disabled/>
1074 ```
1075 #### macOS
1076 ```
1077 <dict>
1078 <key>DisableDeveloperTools</key>
1079 <true/> | <false/>
1080 </dict>
1081 ```
1082 #### policies.json
1083 ```
1084 {
1085 "policies": {
1086 "DisableDeveloperTools": true | false
1087 }
1088 }
1089 ```
1090 ### DisableFeedbackCommands
1091 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1092
1093 **Compatibility:** Firefox 60, Firefox ESR 60\
1094 **CCK2 Equivalent:** N/A\
1095 **Preferences Affected:** N/A
1096
1097 #### Windows (GPO)
1098 ```
1099 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1100 ```
1101 #### Windows (Intune)
1102 OMA-URI:
1103 ```
1104 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1105 ```
1106 Value (string):
1107 ```
1108 <enabled/> or <disabled/>
1109 ```
1110 #### macOS
1111 ```
1112 <dict>
1113 <key>DisableFeedbackCommands</key>
1114 <true/> | <false/>
1115 </dict>
1116 ```
1117 #### policies.json
1118 ```
1119 {
1120 "policies": {
1121 "DisableFeedbackCommands": true | false
1122 }
1123 }
1124 ```
1125 ### DisableFirefoxScreenshots
1126 Remove access to Firefox Screenshots.
1127
1128 **Compatibility:** Firefox 60, Firefox ESR 60\
1129 **CCK2 Equivalent:** N/A\
1130 **Preferences Affected:** `extensions.screenshots.disabled`
1131
1132 #### Windows (GPO)
1133 ```
1134 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1135 ```
1136 #### Windows (Intune)
1137 OMA-URI:
1138 ```
1139 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1140 ```
1141 Value (string):
1142 ```
1143 <enabled/> or <disabled/>
1144 ```
1145 #### macOS
1146 ```
1147 <dict>
1148 <key>DisableFirefoxScreenshots</key>
1149 <true/> | <false/>
1150 </dict>
1151 ```
1152 #### policies.json
1153 ```
1154 {
1155 "policies": {
1156 "DisableFirefoxScreenshots": true | false
1157 }
1158 }
1159 ```
1160 ### DisableFirefoxAccounts
1161 Disable Firefox Accounts integration (Sync).
1162
1163 **Compatibility:** Firefox 60, Firefox ESR 60\
1164 **CCK2 Equivalent:** `disableSync`\
1165 **Preferences Affected:** `identity.fxaccounts.enabled`
1166
1167 #### Windows (GPO)
1168 ```
1169 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1170 ```
1171 #### Windows (Intune)
1172 OMA-URI:
1173 ```
1174 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1175 ```
1176 Value (string):
1177 ```
1178 <enabled/> or <disabled/>
1179 ```
1180 #### macOS
1181 ```
1182 <dict>
1183 <key>DisableFirefoxAccounts</key>
1184 <true/> | <false/>
1185 </dict>
1186 ```
1187 #### policies.json
1188 ```
1189 {
1190 "policies": {
1191 "DisableFirefoxAccounts": true | false
1192 }
1193 }
1194 ```
1195 ### DisableFirefoxStudies
1196 Disable Firefox studies (Shield).
1197
1198 **Compatibility:** Firefox 60, Firefox ESR 60\
1199 **CCK2 Equivalent:** N/A\
1200 **Preferences Affected:** N/A
1201
1202 #### Windows (GPO)
1203 ```
1204 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1205 ```
1206 #### Windows (Intune)
1207 OMA-URI:
1208 ```
1209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1210 ```
1211 Value (string):
1212 ```
1213 <enabled/> or <disabled/>
1214 ```
1215 #### macOS
1216 ```
1217 <dict>
1218 <key>DisableFirefoxStudies</key>
1219 <true/> | <false/>
1220 </dict>
1221 ```
1222 #### policies.json
1223 ```
1224 {
1225 "policies": {
1226 "DisableFirefoxStudies": true | false
1227 }
1228 }
1229 ```
1230 ### DisableForgetButton
1231 Disable the "Forget" button.
1232
1233 **Compatibility:** Firefox 60, Firefox ESR 60\
1234 **CCK2 Equivalent:** `disableForget`\
1235 **Preferences Affected:** N/A
1236
1237 #### Windows (GPO)
1238 ```
1239 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1240 ```
1241 #### Windows (Intune)
1242 OMA-URI:
1243 ```
1244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1245 ```
1246 Value (string):
1247 ```
1248 <enabled/> or <disabled/>
1249 ```
1250 #### macOS
1251 ```
1252 <dict>
1253 <key>DisableForgetButton</key>
1254 <true/> | <false/>
1255 </dict>
1256 ```
1257 #### policies.json
1258 ```
1259 {
1260 "policies": {
1261 "DisableForgetButton": true | false
1262 }
1263 }
1264 ```
1265 ### DisableFormHistory
1266 Turn off saving information on web forms and the search bar.
1267
1268 **Compatibility:** Firefox 60, Firefox ESR 60\
1269 **CCK2 Equivalent:** `disableFormFill`\
1270 **Preferences Affected:** ` browser.formfill.enable`
1271
1272 #### Windows (GPO)
1273 ```
1274 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1275 ```
1276 #### Windows (Intune)
1277 OMA-URI:
1278 ```
1279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1280 ```
1281 Value (string):
1282 ```
1283 <enabled/> or <disabled/>
1284 ```
1285 #### macOS
1286 ```
1287 <dict>
1288 <key>DisableFormHistory</key>
1289 <true/> | <false/>
1290 </dict>
1291 ```
1292 #### policies.json
1293 ```
1294 {
1295 "policies": {
1296 "DisableFormHistory": true | false
1297 }
1298 }
1299 ```
1300 ### DisablePasswordReveal
1301 Do not allow passwords to be shown in saved logins
1302
1303 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1304 **CCK2 Equivalent:** N/A
1305 **Preferences Affected:** N/A
1306
1307 #### Windows (GPO)
1308 ```
1309 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1310 ```
1311 #### Windows (Intune)
1312 OMA-URI:
1313 ```
1314 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1315 ```
1316 Value (string):
1317 ```
1318 <enabled/> or <disabled/>
1319 ```
1320 #### macOS
1321 ```
1322 <dict>
1323 <key>DisablePasswordReveal</key>
1324 <true/> | <false/>
1325 </dict>
1326 ```
1327 #### policies.json
1328 ```
1329 {
1330 "policies": {
1331 "DisablePasswordReveal": true | false
1332 }
1333 }
1334 ```
1335 ### DisablePocket
1336 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1337
1338 **Compatibility:** Firefox 60, Firefox ESR 60\
1339 **CCK2 Equivalent:** `disablePocket`\
1340 **Preferences Affected:** `extensions.pocket.enabled`
1341
1342 #### Windows (GPO)
1343 ```
1344 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1345 ```
1346 #### Windows (Intune)
1347 OMA-URI:
1348 ```
1349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1350 ```
1351 Value (string):
1352 ```
1353 <enabled/> or <disabled/>
1354 ```
1355 #### macOS
1356 ```
1357 <dict>
1358 <key>DisablePocket</key>
1359 <true/> | <false/>
1360 </dict>
1361 ```
1362 #### policies.json
1363 ```
1364 {
1365 "policies": {
1366 "DisablePocket": true | false
1367 }
1368 }
1369 ```
1370 ### DisablePrivateBrowsing
1371 Remove access to private browsing.
1372
1373 **Compatibility:** Firefox 60, Firefox ESR 60\
1374 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1375 **Preferences Affected:** N/A
1376
1377 #### Windows (GPO)
1378 ```
1379 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1380 ```
1381 #### Windows (Intune)
1382 OMA-URI:
1383 ```
1384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1385 ```
1386 Value (string):
1387 ```
1388 <enabled/> or <disabled/>
1389 ```
1390 #### macOS
1391 ```
1392 <dict>
1393 <key>DisablePrivateBrowsing</key>
1394 <true/> | <false/>
1395 </dict>
1396 ```
1397 #### policies.json
1398 ```
1399 {
1400 "policies": {
1401 "DisablePrivateBrowsing": true | false
1402 }
1403 }
1404 ```
1405 ### DisableProfileImport
1406 Disables the "Import data from another browser" option in the bookmarks window.
1407
1408 **Compatibility:** Firefox 60, Firefox ESR 60\
1409 **CCK2 Equivalent:** N/A\
1410 **Preferences Affected:** N/A
1411
1412 #### Windows (GPO)
1413 ```
1414 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1415 ```
1416 #### Windows (Intune)
1417 OMA-URI:
1418 ```
1419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1420 ```
1421 Value (string):
1422 ```
1423 <enabled/> or <disabled/>
1424 ```
1425 #### macOS
1426 ```
1427 <dict>
1428 <key>DisableProfileImport</key>
1429 <true/> | <false/>
1430 </dict>
1431 ```
1432 #### policies.json
1433 ```
1434 {
1435 "policies": {
1436 "DisableProfileImport": true | false
1437 }
1438 }
1439 ```
1440 ### DisableProfileRefresh
1441 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1442
1443 **Compatibility:** Firefox 60, Firefox ESR 60\
1444 **CCK2 Equivalent:** `disableResetFirefox`\
1445 **Preferences Affected:** `browser.disableResetPrompt`
1446
1447 #### Windows (GPO)
1448 ```
1449 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1450 ```
1451 #### Windows (Intune)
1452 OMA-URI:
1453 ```
1454 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1455 ```
1456 Value (string):
1457 ```
1458 <enabled/> or <disabled/>
1459 ```
1460 #### macOS
1461 ```
1462 <dict>
1463 <key>DisableProfileRefresh</key>
1464 <true/> | <false/>
1465 </dict>
1466 ```
1467 #### policies.json
1468 ```
1469 {
1470 "policies": {
1471 "DisableProfileRefresh": true | false
1472 }
1473 }
1474 ```
1475 ### DisableSafeMode
1476 Disable safe mode within the browser.
1477
1478 On Windows, this disables safe mode via the command line as well.
1479
1480 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1481 **CCK2 Equivalent:** `disableSafeMode`\
1482 **Preferences Affected:** N/A
1483
1484 #### Windows (GPO)
1485 ```
1486 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1487 ```
1488 #### Windows (Intune)
1489 OMA-URI:
1490 ```
1491 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1492 ```
1493 Value (string):
1494 ```
1495 <enabled/> or <disabled/>
1496 ```
1497 #### macOS
1498 ```
1499 <dict>
1500 <key>DisableSafeMode</key>
1501 <true/> | <false/>
1502 </dict>
1503 ```
1504 #### policies.json
1505 ```
1506 {
1507 "policies": {
1508 "DisableSafeMode": true | false
1509 }
1510 }
1511 ```
1512 ### DisableSecurityBypass
1513 Prevent the user from bypassing security in certain cases.
1514
1515 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1516
1517 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1518
1519 **Compatibility:** Firefox 60, Firefox ESR 60\
1520 **CCK2 Equivalent:** N/A\
1521 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1522
1523 #### Windows (GPO)
1524 ```
1525 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1526 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1527 ```
1528 #### Windows (Intune)
1529 OMA-URI:
1530 ```
1531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1532 ```
1533 Value (string):
1534 ```
1535 <enabled/> or <disabled/>
1536 ```
1537 OMA-URI:
1538 ```
1539 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1540 ```
1541 Value (string):
1542 ```
1543 <enabled/> or <disabled/>
1544 ```
1545
1546 #### macOS
1547 ```
1548 <dict>
1549 <key>DisableSecurityBypass</key>
1550 <dict>
1551 <key>InvalidCertificate</key>
1552 <true/> | <false/>
1553 <key><SafeBrowsing/key>
1554 <true/> | <false/>
1555 </dict>
1556 </dict>
1557 ```
1558 #### policies.json
1559 ```
1560 {
1561 "policies": {
1562 "DisableSecurityBypass": {
1563 "InvalidCertificate": true | false,
1564 "SafeBrowsing": true | false
1565 }
1566 }
1567 }
1568 ```
1569 ### DisableSystemAddonUpdate
1570 Prevent system add-ons from being installed or update.
1571
1572 **Compatibility:** Firefox 60, Firefox ESR 60\
1573 **CCK2 Equivalent:** N/A\
1574 **Preferences Affected:** N/A
1575
1576 #### Windows (GPO)
1577 ```
1578 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1579 ```
1580 #### Windows (Intune)
1581 OMA-URI:
1582 ```
1583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1584 ```
1585 Value (string):
1586 ```
1587 <enabled/> or <disabled/>
1588 ```
1589 #### macOS
1590 ```
1591 <dict>
1592 <key>DisableSystemAddonUpdate</key>
1593 <true/> | <false/>
1594 </dict>
1595 ```
1596 #### policies.json
1597 ```
1598 {
1599 "policies": {
1600 "DisableSystemAddonUpdate": true | false
1601 }
1602 }
1603 ```
1604 ### DisableTelemetry
1605 Prevent the upload of telemetry data.
1606
1607 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1608
1609 **Compatibility:** Firefox 60, Firefox ESR 60\
1610 **CCK2 Equivalent:** `disableTelemetry`\
1611 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1612
1613 #### Windows (GPO)
1614 ```
1615 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1616 ```
1617 #### Windows (Intune)
1618 OMA-URI:
1619 ```
1620 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1621 ```
1622 Value (string):
1623 ```
1624 <enabled/> or <disabled/>
1625 ```
1626 #### macOS
1627 ```
1628 <dict>
1629 <key>DisableTelemetry</key>
1630 <true/> | <false/>
1631 </dict>
1632 ```
1633 #### policies.json
1634 ```
1635 {
1636 "policies": {
1637 "DisableTelemetry": true | false
1638 }
1639 }
1640 ```
1641 ### DisplayBookmarksToolbar
1642 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1643
1644 **Compatibility:** Firefox 60, Firefox ESR 60\
1645 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1646 **Preferences Affected:** N/A
1647
1648 #### Windows (GPO)
1649 ```
1650 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1651 ```
1652 #### Windows (Intune)
1653 OMA-URI:
1654 ```
1655 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1656 ```
1657 Value (string):
1658 ```
1659 <enabled/> or <disabled/>
1660 ```
1661 #### macOS
1662 ```
1663 <dict>
1664 <key>DisplayBookmarksToolbar</key>
1665 <true/> | <false/>
1666 </dict>
1667 ```
1668 #### policies.json
1669 ```
1670 {
1671 "policies": {
1672 "DisplayBookmarksToolbar": true | false
1673 }
1674 }
1675 ```
1676 ### DisplayMenuBar (Deprecated)
1677 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1678
1679 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1680 **CCK2 Equivalent:** `displayMenuBar`\
1681 **Preferences Affected:** N/A
1682
1683 #### Windows (GPO)
1684 ```
1685 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1686 ```
1687 #### macOS
1688 ```
1689 <dict>
1690 <key>DisplayMenuBar</key>
1691 <true/> | <false/>
1692 </dict>
1693 ```
1694 #### policies.json
1695 ```
1696 {
1697 "policies": {
1698 "DisplayMenuBar": true | false
1699 }
1700 }
1701 ```
1702 ### DisplayMenuBar
1703 Set the state of the menubar.
1704
1705 `always` means the menubar is shown and cannot be hidden.
1706
1707 `never` means the menubar is hidden and cannot be shown.
1708
1709 `default-on` means the menubar is on by default but can be hidden.
1710
1711 `default-off` means the menubar is off by default but can be shown.
1712
1713 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1714 **CCK2 Equivalent:** `displayMenuBar`\
1715 **Preferences Affected:** N/A
1716
1717 #### Windows (GPO)
1718 ```
1719 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1720 ```
1721 #### Windows (Intune)
1722 OMA-URI:
1723 ```
1724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1725 ```
1726 Value (string):
1727 ```
1728 <enabled/>
1729 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1730 ```
1731 #### macOS
1732 ```
1733 <dict>
1734 <key>DisplayMenuBar</key>
1735 <string>always | never | default-on | default-off</string>
1736 </dict>
1737 ```
1738 #### policies.json
1739 ```
1740 {
1741 "policies": {
1742 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1743 }
1744 }
1745 ```
1746 ### DNSOverHTTPS
1747 Configure DNS over HTTPS.
1748
1749 `Enabled` determines whether DNS over HTTPS is enabled
1750
1751 `ProviderURL` is a URL to another provider.
1752
1753 `Locked` prevents the user from changing DNS over HTTPS preferences.
1754
1755 `ExcludedDomains` excludes domains from DNS over HTTPS.
1756
1757 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1758 **CCK2 Equivalent:** N/A\
1759 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1760
1761 #### Windows (GPO)
1762 ```
1763 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1764 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1765 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1766 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1767 ```
1768 #### Windows (Intune)
1769 OMA-URI:
1770 ```
1771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1772 ```
1773 Value (string):
1774 ```
1775 <enabled/> or <disabled/>
1776 ```
1777 OMA-URI:
1778 ```
1779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1780 ```
1781 Value (string):
1782 ```
1783 <enabled/>
1784 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1785 ```
1786 OMA-URI:
1787 ```
1788 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1789 ```
1790 Value (string):
1791 ```
1792 <enabled/> or <disabled/>
1793 ```
1794 OMA-URI:
1795 ```
1796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1797 ```
1798 Value (string):
1799 ```
1800 <enabled/>
1801 <data id="List" value="1&#xF000;example.com"/>
1802 ```
1803 #### macOS
1804 ```
1805 <dict>
1806 <key>DNSOverHTTPS</key>
1807 <dict>
1808 <key>Enabled</key>
1809 <true/> | <false/>
1810 <key>ProviderURL</key>
1811 <string>URL_TO_ALTERNATE_PROVIDER</string>
1812 <key>Locked</key>
1813 <true/> | <false/>
1814 <key>ExcludedDomains</key>
1815 <array>
1816 <string>example.com</string>
1817 </array>
1818 </dict>
1819 </dict>
1820 ```
1821 #### policies.json
1822 ```
1823 {
1824 "policies": {
1825 "DNSOverHTTPS": {
1826 "Enabled": true | false,
1827 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1828 "Locked": true | false,
1829 "ExcludedDomains": ["example.com"]
1830 }
1831 }
1832 }
1833 ```
1834 ### DontCheckDefaultBrowser
1835 Don't check if Firefox is the default browser at startup.
1836
1837 **Compatibility:** Firefox 60, Firefox ESR 60\
1838 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1839 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1840
1841 #### Windows (GPO)
1842 ```
1843 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1844 ```
1845 #### Windows (Intune)
1846 OMA-URI:
1847 ```
1848 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1849 ```
1850 Value (string):
1851 ```
1852 <enabled/> or <disabled/>
1853 ```
1854 #### macOS
1855 ```
1856 <dict>
1857 <key>DontCheckDefaultBrowser</key>
1858 <true/> | <false/>
1859 </dict>
1860 ```
1861 #### policies.json
1862 ```
1863 {
1864 "policies": {
1865 "DontCheckDefaultBrowser": true | false
1866 }
1867 }
1868 ```
1869 ### DefaultDownloadDirectory
1870 Set the default download directory.
1871
1872 You can use ${home} for the native home directory.
1873
1874 **Compatibility:** Firefox 68, Firefox ESR 68\
1875 **CCK2 Equivalent:** N/A\
1876 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1877
1878 #### Windows (GPO)
1879 ```
1880 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1881 ```
1882 #### Windows (Intune)
1883 OMA-URI:
1884 ```
1885 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1886 ```
1887 Value (string):
1888 ```
1889 <enabled/>
1890 <data id="Preferences_String" value="${home}\Downloads"/>
1891 ```
1892 #### macOS
1893 ```
1894 <dict>
1895 <key>DefaultDownloadDirectory</key>
1896 <string>${home}/Downloads</string>
1897 </dict>
1898 ```
1899 #### policies.json (macOS and Linux)
1900 ```
1901 {
1902 "policies": {
1903 "DefaultDownloadDirectory": "${home}/Downloads"
1904 }
1905 ```
1906 #### policies.json (Windows)
1907 ```
1908 {
1909 "policies": {
1910 "DefaultDownloadDirectory": "${home}\\Downloads"
1911 }
1912 ```
1913 ### DownloadDirectory
1914 Set and lock the download directory.
1915
1916 You can use ${home} for the native home directory.
1917
1918 **Compatibility:** Firefox 68, Firefox ESR 68\
1919 **CCK2 Equivalent:** N/A\
1920 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1921
1922 #### Windows (GPO)
1923 ```
1924 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1925 ```
1926 #### Windows (Intune)
1927 OMA-URI:
1928 ```
1929 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1930 ```
1931 Value (string):
1932 ```
1933 <enabled/>
1934 <data id="Preferences_String" value="${home}\Downloads"/>
1935 ```
1936 #### macOS
1937 ```
1938 <dict>
1939 <key>DownloadDirectory</key>
1940 <string>${home}/Downloads</string>
1941 </dict>
1942 ```
1943 #### policies.json (macOS and Linux)
1944 ```
1945 {
1946 "policies": {
1947 "DownloadDirectory": "${home}/Downloads"
1948 }
1949 ```
1950 #### policies.json (Windows)
1951 ```
1952 {
1953 "policies": {
1954 "DownloadDirectory": "${home}\\Downloads"
1955 }
1956 ```
1957 ### EnableTrackingProtection
1958 Configure tracking protection.
1959
1960 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1961
1962 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1963
1964 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1965
1966 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1967
1968 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1969
1970 `Exceptions` are origins for which tracking protection is not enabled.
1971
1972 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1973 **CCK2 Equivalent:** N/A\
1974 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1975
1976 #### Windows (GPO)
1977 ```
1978 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1979 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1980 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1981 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1982 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1983 ```
1984 #### Windows (Intune)
1985 OMA-URI:
1986 ```
1987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1988 ```
1989 Value (string):
1990 ```
1991 <enabled/>
1992 <data id="TrackingProtectionLocked" value="true | false"/>
1993 <data id="Cryptomining" value="true | false"/>
1994 <data id="Fingerprinting" value="true | false"/>
1995 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1996 ```
1997 #### macOS
1998 ```
1999 <dict>
2000 <key>EnableTrackingProtection</key>
2001 <dict>
2002 <key>Value</key>
2003 <true/> | <false/>
2004 <key><Locked</key>
2005 <true/> | <false/>
2006 <key><Cryptomining</key>
2007 <true/> | <false/>
2008 <key><Fingerprinting</key>
2009 <true/> | <false/>
2010 <key>Exceptions</key>
2011 <array>
2012 <string>https://example.com</string>
2013 </array>
2014 </dict>
2015 </dict>
2016 ```
2017 #### policies.json
2018 ```
2019 {
2020 "policies": {
2021 "EnableTrackingProtection": {
2022 "Value": true | false,
2023 "Locked": true | false,
2024 "Cryptomining": true | false,
2025 "Fingerprinting": true | false,
2026 "Exceptions": ["https://example.com"]
2027 }
2028 }
2029 ```
2030 ### EncryptedMediaExtensions
2031 Enable or disable Encrypted Media Extensions and optionally lock it.
2032
2033 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2034
2035 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2036
2037 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2038 **CCK2 Equivalent:** N/A\
2039 **Preferences Affected:** `media.eme.enabled`
2040
2041 #### Windows (GPO)
2042 ```
2043 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2044 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2045 ```
2046 #### Windows (Intune)
2047 OMA-URI:
2048 ```
2049 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2050 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2051 ```
2052 Value (string):
2053 ```
2054 <enabled/>or <disabled/>
2055 ```
2056 #### macOS
2057 ```
2058 <dict>
2059 <key>EncryptedMediaExtensions</key>
2060 <dict>
2061 <key>Enabled</key>
2062 <true/> | <false/>
2063 <key><Locked</key>
2064 <true/> | <false/>
2065 </dict>
2066 </dict>
2067 ```
2068 #### policies.json
2069 ```
2070 {
2071 "policies": {
2072 "EncryptedMediaExtensions": {
2073 "Enabled": true | false,
2074 "Locked": true | false
2075 }
2076 }
2077 ```
2078 ### EnterprisePoliciesEnabled
2079 Enable policy support on macOS.
2080
2081 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2082 **CCK2 Equivalent:** N/A\
2083 **Preferences Affected:** N/A
2084
2085 #### macOS
2086 ```
2087 <dict>
2088 <key>EnterprisePoliciesEnabled</key>
2089 <true/>
2090 </dict>
2091 ```
2092 ### Extensions
2093 Control the installation, uninstallation and locking of extensions.
2094
2095 `Install` is a list of URLs or native paths for extensions to be installed.
2096
2097 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2098
2099 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2100
2101 **Compatibility:** Firefox 60, Firefox ESR 60\
2102 **CCK2 Equivalent:** `addons`\
2103 **Preferences Affected:** N/A
2104
2105 #### Windows (GPO)
2106 ```
2107 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2108 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2109 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2110 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2111 ```
2112 #### macOS
2113 ```
2114 <dict>
2115 <key>Extensions</key>
2116 <dict>
2117 <key>Install</key>
2118 <array>
2119 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2120 <string>//path/to/xpi</string>
2121 </array>
2122 <key>Uninstall</key>
2123 <array>
2124 <string>bad_addon_id@mozilla.org</string>
2125 </array>
2126 <key>Locked</key>
2127 <array>
2128 <string>addon_id@mozilla.org</string>
2129 </array>
2130 </dict>
2131 </dict>
2132 ```
2133 #### policies.json
2134 ```
2135 {
2136 "policies": {
2137 "Extensions": {
2138 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2139 "Uninstall": ["bad_addon_id@mozilla.org"],
2140 "Locked": ["addon_id@mozilla.org"]
2141 }
2142 }
2143 }
2144 ```
2145 ### ExtensionSettings
2146 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2147
2148 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2149
2150 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2151
2152 The configuration for each extension is another dictionary that can contain the fields documented below.
2153
2154 | Name | Description |
2155 | --- | --- |
2156 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2157 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2158 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2159 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2160 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2161 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2162 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2163 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2164 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2165
2166 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2167 **CCK2 Equivalent:** N/A\
2168 **Preferences Affected:** N/A
2169
2170 #### Windows (GPO)
2171 ```
2172 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2173 {
2174 "*": {
2175 "blocked_install_message": "Custom error message.",
2176 "install_sources": ["https://addons.mozilla.org/"],
2177 "installation_mode": "blocked",
2178 "allowed_types": ["extension"]
2179 },
2180 "uBlock0@raymondhill.net": {
2181 "installation_mode": "force_installed",
2182 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2183 }
2184 }
2185 ```
2186 #### Windows (Intune)
2187 OMA-URI:
2188 ```
2189 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2190 ```
2191 Value (string):
2192 ```
2193 <enabled/>
2194 <data id="ExtensionSettings" value='
2195 "*": {
2196 "blocked_install_message": "Custom error message.",
2197 "install_sources": ["https://addons.mozilla.org/"],
2198 "installation_mode": "blocked",
2199 "allowed_types": ["extension"]
2200 },
2201 "uBlock0@raymondhill.net": {
2202 "installation_mode": "force_installed",
2203 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2204 }'/>
2205 ```
2206 #### macOS
2207 ```
2208 <dict>
2209 <key>ExtensionSettings</key>
2210 <dict>
2211 <key>*</key>
2212 <dict>
2213 <key>blocked_install_message</key>
2214 <string>Custom error message.</string>
2215 <key>install_sources</key>
2216 <array>
2217 <string>https://addons.mozilla.org/</string>
2218 </array>
2219 <key>installation_mode</key>
2220 <string>blocked</string>
2221 <key>allowed_types</key>
2222 <array>
2223 <string>extension</string>
2224 </array>
2225 </dict>
2226 <key>uBlock0@raymondhill.net</key>
2227 <dict>
2228 <key>installation_mode</key>
2229 <string>force_installed</string>
2230 <key>install_url</key>
2231 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2232 </dict>
2233 </dict>
2234 </dict>
2235 ```
2236 #### policies.json
2237 ```
2238 {
2239 "policies": {
2240 "ExtensionSettings": {
2241 "*": {
2242 "blocked_install_message": "Custom error message.",
2243 "install_sources": ["https://addons.mozilla.org/"],
2244 "installation_mode": "blocked",
2245 "allowed_types": ["extension"]
2246 },
2247 "uBlock0@raymondhill.net": {
2248 "installation_mode": "force_installed",
2249 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2250 }
2251 }
2252 }
2253 }
2254 ```
2255 ### ExtensionUpdate
2256 Control extension updates.
2257
2258 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2259 **CCK2 Equivalent:** N/A\
2260 **Preferences Affected:** `extensions.update.enabled`
2261
2262 #### Windows (GPO)
2263 ```
2264 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2265 ```
2266 #### Windows (Intune)
2267 OMA-URI:
2268 ```
2269 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2270 ```
2271 Value (string):
2272 ```
2273 <enabled/> or <disabled/>
2274 ```
2275 #### macOS
2276 ```
2277 <dict>
2278 <key>ExtensionUpdate</key>
2279 <true/> | <false/>
2280 </dict>
2281 ```
2282 #### policies.json
2283 ```
2284 {
2285 "policies": {
2286 "ExtensionUpdate": true | false
2287 }
2288 }
2289 ```
2290 ### FlashPlugin
2291 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2292
2293 `Allow` is a list of origins where Flash are allowed.
2294
2295 `Block` is a list of origins where Flash is not allowed.
2296
2297 `Default` determines whether or not Flash is allowed by default.
2298
2299 `Locked` prevents the user from changing Flash preferences.
2300
2301 **Compatibility:** Firefox 60, Firefox ESR 60\
2302 **CCK2 Equivalent:** `permissions.plugin`\
2303 **Preferences Affected:** `plugin.state.flash`
2304
2305 #### Windows (GPO)
2306 ```
2307 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2308 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2309 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2310 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2311 ```
2312 #### Windows (Intune)
2313 OMA-URI:
2314 ```
2315 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2316 ```
2317 Value (string):
2318 ```
2319 <enabled/>
2320 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2321 ```
2322 OMA-URI:
2323 ```
2324 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2325 ```
2326 Value (string):
2327 ```
2328 <enabled/> or <disabled/>
2329 ```
2330 OMA-URI:
2331 ```
2332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2333 ```
2334 Value (string):
2335 ```
2336 <enabled/> or <disabled/>
2337 ```
2338 #### macOS
2339 ```
2340 <dict>
2341 <key>FlashPlugin</key>
2342 <dict>
2343 <key>Allow</key>
2344 <array>
2345 <string>http://example.org</string>
2346 </array>
2347 <key>Block</key>
2348 <array>
2349 <string>http://example.edu</string>
2350 </array>
2351 <key>Default</key>
2352 <true/> | <false/>
2353 <key>Locked</key>
2354 <true/> | <false/>
2355 </dict>
2356 </dict>
2357 ```
2358 #### policies.json
2359 ```
2360 {
2361 "policies": {
2362 "FlashPlugin": {
2363 "Allow": ["http://example.org/"],
2364 "Block": ["http://example.edu/"],
2365 "Default": true | false,
2366 "Locked": true | false
2367 }
2368 }
2369 }
2370 ```
2371 ### FirefoxHome
2372 Customize the Firefox Home page.
2373
2374 **Compatibility:** Firefox 68, Firefox ESR 68\
2375 **CCK2 Equivalent:** N/A\
2376 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2377
2378 #### Windows (GPO)
2379 ```
2380 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2381 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2382 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2383 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2384 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2385 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2386 ```
2387 #### Windows (Intune)
2388 OMA-URI:
2389 ```
2390 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2391 ```
2392 Value (string):
2393 ```
2394 <enabled/>
2395 <data id="FirefoxHome_Search" value="true | false"/>
2396 <data id="FirefoxHome_TopSites" value="true | false"/>
2397 <data id="FirefoxHome_Highlights" value="true | false"/>
2398 <data id="FirefoxHome_Pocket" value="true | false"/>
2399 <data id="FirefoxHome_Snippets" value="true | false"/>
2400 <data id="FirefoxHome_Locked" value="true | false"/>
2401 ```
2402 #### macOS
2403 ```
2404 <dict>
2405 <key>FirefoxHome</key>
2406 <dict>
2407 <key>Search</key>
2408 <true/> | <false/>
2409 <key>TopSites</key>
2410 <true/> | <false/>
2411 <key>Highlights</key>
2412 <true/> | <false/>
2413 <key>Pocket</key>
2414 <true/> | <false/>
2415 <key>Snippets</key>
2416 <true/> | <false/>
2417 <key>Locked</key>
2418 <true/> | <false/>
2419 </dict>
2420 </dict>
2421 ```
2422 #### policies.json
2423 ```
2424 {
2425 "policies": {
2426 "FirefoxHome": {
2427 "Search": true | false,
2428 "TopSites": true | false,
2429 "Highlights": true | false,
2430 "Pocket": true | false,
2431 "Snippets": true | false,
2432 "Locked": true | false
2433 }
2434 }
2435 }
2436 ```
2437 ### HardwareAcceleration
2438 Control hardware acceleration.
2439
2440 **Compatibility:** Firefox 60, Firefox ESR 60\
2441 **CCK2 Equivalent:** N/A\
2442 **Preferences Affected:** `layers.acceleration.disabled`
2443
2444 #### Windows (GPO)
2445 ```
2446 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2447 ```
2448 #### Windows (Intune)
2449 OMA-URI:
2450 ```
2451 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2452 ```
2453 Value (string):
2454 ```
2455 <enabled/> or <disabled/>
2456 ```
2457 #### macOS
2458 ```
2459 <dict>
2460 <key>HardwareAcceleration</key>
2461 <true/> | <false/>
2462 </dict>
2463 ```
2464 #### policies.json
2465 ```
2466 {
2467 "policies": {
2468 "HardwareAcceleration": true | false
2469 }
2470 }
2471 ```
2472 ### Homepage
2473 Configure the default homepage and how Firefox starts.
2474
2475 `URL` is the default homepage.
2476
2477 `Locked` prevents the user from changing homepage preferences.
2478
2479 `Additional` allows for more than one homepage.
2480
2481 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2482
2483 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2484 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2485 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2486
2487 #### Windows (GPO)
2488 ```
2489 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2490 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2491 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2492 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2493 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2494 ```
2495 #### Windows (Intune)
2496 OMA-URI:
2497 ```
2498 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2499 ```
2500 Value (string):
2501 ```
2502 <enabled/>
2503
2504 <data id="HomepageURL" value="https://example.com"/>
2505 <data id="HomepageLocked" value="true | false"/>
2506 ```
2507 OMA-URI:
2508 ```
2509 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2510 ```
2511 Value (string):
2512 ```
2513 <enabled/>
2514
2515 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2516 ```
2517 OMA-URI:
2518 ```
2519 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2520 ```
2521 Value (string):
2522 ```
2523 <enabled/>
2524
2525 <data id="StartPage" value="none | homepage | previous-session"/>
2526 ```
2527 #### macOS
2528 ```
2529 <dict>
2530 <key>Homepage</key>
2531 <dict>
2532 <key>URL</key>
2533 <string>http://example.com</string>
2534 <key>Locked</key>
2535 <true/> | <false/>
2536 <key>Additional</key>
2537 <array>
2538 <string>http://example.org</string>
2539 <string>http://example.edu</string>
2540 </array>
2541 <key>StartPage</key>
2542 <string>none | homepage | previous-session</string>
2543 </dict>
2544 </dict>
2545 ```
2546 #### policies.json
2547 ```
2548 {
2549 "policies": {
2550 "Homepage": {
2551 "URL": "http://example.com/",
2552 "Locked": true | false,
2553 "Additional": ["http://example.org/",
2554 "http://example.edu/"],
2555 "StartPage": "none" | "homepage" | "previous-session"
2556 }
2557 }
2558 }
2559 ```
2560 ### InstallAddonsPermission
2561 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2562
2563 `Allow` is a list of origins where extension installs are allowed.
2564
2565 `Default` determines whether or not extension installs are allowed by default.
2566
2567 **Compatibility:** Firefox 60, Firefox ESR 60\
2568 **CCK2 Equivalent:** `permissions.install`\
2569 **Preferences Affected:** `xpinstall.enabled`
2570
2571 #### Windows (GPO)
2572 ```
2573 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2574 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2575 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2576 ```
2577 #### Windows (Intune)
2578 OMA-URI:
2579 ```
2580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2581 ```
2582 Value (string):
2583 ```
2584 <enabled/>
2585 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2586 ```
2587 OMA-URI:
2588 ```
2589 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2590 ```
2591 Value (string):
2592 ```
2593 <enabled/>
2594 ```
2595 #### macOS
2596 ```
2597 <dict>
2598 <key>InstallAddonsPermission</key>
2599 <dict>
2600 <key>Allow</key>
2601 <array>
2602 <string>http://example.org</string>
2603 <string>http://example.edu</string>
2604 </array>
2605 <key>Default</key>
2606 <true/> | <false/>
2607 </dict>
2608 </dict>
2609 ```
2610 #### policies.json
2611 ```
2612 {
2613 "policies": {
2614 "InstallAddonsPermission": {
2615 "Allow": ["http://example.org/",
2616 "http://example.edu/"],
2617 "Default": true | false
2618 }
2619 }
2620 }
2621 ```
2622 ### LegacyProfiles
2623 Disable the feature enforcing a separate profile for each installation.
2624
2625 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2626
2627 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2628
2629 This policy only work on Windows via GPO (not policies.json).
2630
2631 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2632 **CCK2 Equivalent:** N/A\
2633 **Preferences Affected:** N/A
2634
2635 #### Windows (GPO)
2636 ```
2637 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2638 ```
2639 #### Windows (Intune)
2640 OMA-URI:
2641 ```
2642 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2643 ```
2644 Value (string):
2645 ```
2646 <enabled/> or <disabled/>
2647 ```
2648 ### LocalFileLinks
2649 Enable linking to local files by origin.
2650
2651 **Compatibility:** Firefox 68, Firefox ESR 68\
2652 **CCK2 Equivalent:** N/A\
2653 **Preferences Affected:** `capability.policy.localfilelinks.*`
2654
2655 #### Windows (GPO)
2656 ```
2657 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2658 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2659 ```
2660 #### Windows (Intune)
2661 OMA-URI:
2662 ```
2663 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2664 ```
2665 Value (string):
2666 ```
2667 <enabled/>
2668 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2669 ```
2670 #### macOS
2671 ```
2672 <dict>
2673 <key>LocalFileLinks</key>
2674 <array>
2675 <string>http://example.org</string>
2676 <string>http://example.edu</string>
2677 </array>
2678 </dict>
2679 ```
2680 #### policies.json
2681 ```
2682 {
2683 "policies": {
2684 "LocalFileLinks": ["http://example.org/",
2685 "http://example.edu/"]
2686 }
2687 }
2688 ```
2689 ### NetworkPrediction
2690 Enable or disable network prediction (DNS prefetching).
2691
2692 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2693 **CCK2 Equivalent:** N/A\
2694 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2695
2696 #### Windows (GPO)
2697 ```
2698 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2699 ```
2700 #### Windows (Intune)
2701 OMA-URI:
2702 ```
2703 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2704 ```
2705 Value (string):
2706 ```
2707 <enabled/> or <disabled/>
2708 ```
2709 #### macOS
2710 ```
2711 <dict>
2712 <key>NetworkPrediction</key>
2713 <true/> | <false/>
2714 </dict>
2715 ```
2716 #### policies.json
2717 ```
2718 {
2719 "policies": {
2720 "NetworkPrediction": true | false
2721 }
2722 ```
2723 ### NewTabPage
2724 Enable or disable the New Tab page.
2725
2726 **Compatibility:** Firefox 68, Firefox ESR 68\
2727 **CCK2 Equivalent:** N/A\
2728 **Preferences Affected:** `browser.newtabpage.enabled`
2729
2730 #### Windows (GPO)
2731 ```
2732 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2733 ```
2734 #### Windows (Intune)
2735 OMA-URI:
2736 ```
2737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2738 ```
2739 Value (string):
2740 ```
2741 <enabled/> or <disabled/>
2742 ```
2743 #### macOS
2744 ```
2745 <dict>
2746 <key>NewTabPage</key>
2747 <true/> | <false/>
2748 </dict>
2749 ```
2750 #### policies.json
2751 ```
2752 {
2753 "policies": {
2754 "NewTabPage": true | false
2755 }
2756 ```
2757 ### NoDefaultBookmarks
2758 Disable the creation of default bookmarks.
2759
2760 This policy is only effective if the user profile has not been created yet.
2761
2762 **Compatibility:** Firefox 60, Firefox ESR 60\
2763 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2764 **Preferences Affected:** N/A
2765
2766 #### Windows (GPO)
2767 ```
2768 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2769 ```
2770 #### Windows (Intune)
2771 OMA-URI:
2772 ```
2773 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2774 ```
2775 Value (string):
2776 ```
2777 <enabled/> or <disabled/>
2778 ```
2779 #### macOS
2780 ```
2781 <dict>
2782 <key>NoDefaultBookmarks</key>
2783 <true/> | <false/>
2784 </dict>
2785 ```
2786 #### policies.json
2787 ```
2788 {
2789 "policies": {
2790 "NoDefaultBookmarks": true | false
2791 }
2792 }
2793 ```
2794 ### OfferToSaveLogins
2795 Control whether or not Firefox offers to save passwords.
2796
2797 **Compatibility:** Firefox 60, Firefox ESR 60\
2798 **CCK2 Equivalent:** `dontRememberPasswords`\
2799 **Preferences Affected:** `signon.rememberSignons`
2800
2801 #### Windows (GPO)
2802 ```
2803 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2804 ```
2805 #### Windows (Intune)
2806 OMA-URI:
2807 ```
2808 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2809 ```
2810 Value (string):
2811 ```
2812 <enabled/> or <disabled/>
2813 ```
2814 #### macOS
2815 ```
2816 <dict>
2817 <key>OfferToSaveLogins</key>
2818 <true/> | <false/>
2819 </dict>
2820 ```
2821 #### policies.json
2822 ```
2823 {
2824 "policies": {
2825 "OfferToSaveLogins": true | false
2826 }
2827 }
2828 ```
2829 ### OfferToSaveLoginsDefault
2830 Sets the default value of signon.rememberSignons without locking it.
2831
2832 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2833 **CCK2 Equivalent:** `dontRememberPasswords`\
2834 **Preferences Affected:** `signon.rememberSignons`
2835
2836 #### Windows (GPO)
2837 ```
2838 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2839 ```
2840 #### Windows (Intune)
2841 OMA-URI:
2842 ```
2843 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2844 ```
2845 Value (string):
2846 ```
2847 <enabled/> or <disabled/>
2848 ```
2849 #### macOS
2850 ```
2851 <dict>
2852 <key>OfferToSaveLoginsDefault</key>
2853 <true/> | <false/>
2854 </dict>
2855 ```
2856 #### policies.json
2857 ```
2858 {
2859 "policies": {
2860 "OfferToSaveLoginsDefault": true | false
2861 }
2862 }
2863 ```
2864 ### OverrideFirstRunPage
2865 Override the first run page. If the value is blank, no first run page is displayed.
2866
2867 **Compatibility:** Firefox 60, Firefox ESR 60\
2868 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2869 **Preferences Affected:** `startup.homepage_welcome_url`
2870
2871 #### Windows (GPO)
2872 ```
2873 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2874 ```
2875 #### Windows (Intune)
2876 OMA-URI:
2877 ```
2878 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2879 ```
2880 Value (string):
2881 ```
2882 <enabled/>
2883 <data id="OverridePage" value="https://example.com"/>
2884 ```
2885 #### macOS
2886 ```
2887 <dict>
2888 <key>OverrideFirstRunPage</key>
2889 <string>http://example.org</string>
2890 </dict>
2891 ```
2892 #### policies.json
2893 ```
2894 {
2895 "policies": {
2896 "OverrideFirstRunPage": "http://example.org"
2897 }
2898 ```
2899 ### OverridePostUpdatePage
2900 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2901
2902 **Compatibility:** Firefox 60, Firefox ESR 60\
2903 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2904 **Preferences Affected:** `startup.homepage_override_url`
2905
2906 #### Windows (GPO)
2907 ```
2908 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2909 ```
2910 #### Windows (Intune)
2911 OMA-URI:
2912 ```
2913 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2914 ```
2915 Value (string):
2916 ```
2917 <enabled/>
2918 <data id="OverridePage" value="https://example.com"/>
2919 ```
2920 #### macOS
2921 ```
2922 <dict>
2923 <key>OverridePostUpdatePage</key>
2924 <string>http://example.org</string>
2925 </dict>
2926 ```
2927 #### policies.json
2928 ```
2929 {
2930 "policies": {
2931 "OverridePostUpdatePage": "http://example.org"
2932 }
2933 ```
2934 ### PasswordManagerEnabled
2935 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2936
2937 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2938 **CCK2 Equivalent:** N/A\
2939 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2940
2941 #### Windows (GPO)
2942 ```
2943 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2944 ```
2945 #### Windows (Intune)
2946 OMA-URI:
2947 ```
2948 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2949 ```
2950 Value (string):
2951 ```
2952 <enabled/> or <disabled/>
2953 ```
2954 #### macOS
2955 ```
2956 <dict>
2957 <key>PasswordManagerEnabled</key>
2958 <true/> | <false/>
2959 </dict>
2960 ```
2961 #### policies.json
2962 ```
2963 {
2964 "policies": {
2965 "PasswordManagerEnabled": true | false
2966 }
2967 }
2968 ```
2969 ### PDFjs
2970 Disable or configure PDF.js, the built-in PDF viewer.
2971
2972 If `Enabled` is set to false, the built-in PDF viewer is disabled.
2973
2974 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
2975
2976 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
2977
2978 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2979 **CCK2 Equivalent:** N/A\
2980 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
2981
2982 #### Windows (GPO)
2983 ```
2984 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
2985 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
2986 ```
2987 #### Windows (Intune)
2988 OMA-URI:
2989 ```
2990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
2991 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
2992 ```
2993 Value (string):
2994 ```
2995 <enabled/>or <disabled/>
2996 ```
2997 #### macOS
2998 ```
2999 <dict>
3000 <key>PDFjs</key>
3001 <dict>
3002 <key>Enabled</key>
3003 <true/> | <false/>
3004 <key><EnablePermissions</key>
3005 <true/> | <false/>
3006 </dict>
3007 </dict>
3008 ```
3009 #### policies.json
3010 ```
3011 {
3012 "policies": {
3013 "PSFjs": {
3014 "Enabled": true | false,
3015 "EnablePermissions": true | false
3016 }
3017 }
3018 ```
3019 ### Permissions
3020 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3021
3022 `Allow` is a list of origins where the feature is allowed.
3023
3024 `Block` is a list of origins where the feature is not allowed.
3025
3026 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3027
3028 `Locked` prevents the user from changing preferences for the feature.
3029
3030 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3031
3032 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3033 **CCK2 Equivalent:** N/A\
3034 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3035
3036 #### Windows (GPO)
3037 ```
3038 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3039 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3040 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3041 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3042 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3043 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3044 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3045 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3046 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3047 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3048 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3049 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3050 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3051 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3052 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3053 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3054 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3055 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3056 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3057 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3058 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3059 ```
3060 #### Windows (Intune)
3061 OMA-URI:
3062 ```
3063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3064 ```
3065 Value (string):
3066 ```
3067 <enabled/> or <disabled/>
3068 ```
3069 OMA-URI:
3070 ```
3071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3072 ```
3073 Value (string):
3074 ```
3075 <enabled/> or <disabled/>
3076 ```
3077 OMA-URI:
3078 ```
3079 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3080 ```
3081 Value (string):
3082 ```
3083 <enabled/>
3084 <data id="Permissions" value="1&#xF000;https://example.org"/>
3085 ```
3086 OMA-URI:
3087 ```
3088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3089 ```
3090 Value (string):
3091 ```
3092 <enabled/> or <disabled/>
3093 ```
3094 OMA-URI:
3095 ```
3096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3097 ```
3098 Value (string):
3099 ```
3100 <enabled/> or <disabled/>
3101 ```
3102 OMA-URI:
3103 ```
3104 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3105 ```
3106 Value (string):
3107 ```
3108 <enabled/>
3109 <data id="Permissions" value="1&#xF000;https://example.org"/>
3110 ```
3111 OMA-URI:
3112 ```
3113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3114 ```
3115 Value (string):
3116 ```
3117 <enabled/>
3118 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3119 ```
3120 OMA-URI:
3121 ```
3122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3123 ```
3124 Value (string):
3125 ```
3126 <enabled/>
3127 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3128 ```
3129 OMA-URI:
3130 ```
3131 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3132 ```
3133 Value (string):
3134 ```
3135 <enabled/> or <disabled/>
3136 ```
3137 #### macOS
3138 ```
3139 <dict>
3140 <key>Permissions</key>
3141 <dict>
3142 <key>Camera</key>
3143 <dict>
3144 <key>Allow</key>
3145 <array>
3146 <string>https://example.org</string>
3147 <string>https://example.org:1234</string>
3148 </array>
3149 <key>Block</key>
3150 <array>
3151 <string>https://example.edu</string>
3152 </array>
3153 <key>BlockNewRequests</key>
3154 <true/> | <false/>
3155 <key>Locked</key>
3156 <true/> | <false/>
3157 </dict>
3158 <key>Microphone</key>
3159 <dict>
3160 <key>Allow</key>
3161 <array>
3162 <string>https://example.org</string>
3163 </array>
3164 <key>Block</key>
3165 <array>
3166 <string>https://example.edu</string>
3167 </array>
3168 <key>BlockNewRequests</key>
3169 <true/> | <false/>
3170 <key>Locked</key>
3171 <true/> | <false/>
3172 </dict>
3173 <key>Location</key>
3174 <dict>
3175 <key>Allow</key>
3176 <array>
3177 <string>https://example.org</string>
3178 </array>
3179 <key>Block</key>
3180 <array>
3181 <string>https://example.edu</string>
3182 </array>
3183 <key>BlockNewRequests</key>
3184 <true/> | <false/>
3185 <key>Locked</key>
3186 <true/> | <false/>
3187 </dict>
3188 <key>Notifications</key>
3189 <dict>
3190 <key>Allow</key>
3191 <array>
3192 <string>https://example.org</string>
3193 </array>
3194 <key>Block</key>
3195 <array>
3196 <string>https://example.edu</string>
3197 </array>
3198 <key>BlockNewRequests</key>
3199 <true/>
3200 <key>Locked</key>
3201 <true/>
3202 </dict>
3203 <key>Autoplay</key>
3204 <dict>
3205 <key>Allow</key>
3206 <array>
3207 <string>https://example.org</string>
3208 </array>
3209 <key>Block</key>
3210 <array>
3211 <string>https://example.edu</string>
3212 </array>
3213 <key>Default</key>
3214 <string>allow-audio-video | block-audio | block-audio-video</string>
3215 <key>Locked</key>
3216 <true/> | <false/>
3217 </dict>
3218 </dict>
3219 </dict>
3220 ```
3221 #### policies.json
3222 ```
3223 {
3224 "policies": {
3225 "Permissions": {
3226 "Camera": {
3227 "Allow": ["https://example.org","https://example.org:1234"],
3228 "Block": ["https://example.edu"],
3229 "BlockNewRequests": true | false,
3230 "Locked": true | false
3231 },
3232 "Microphone": {
3233 "Allow": ["https://example.org"],
3234 "Block": ["https://example.edu"],
3235 "BlockNewRequests": true | false,
3236 "Locked": true | false
3237 },
3238 "Location": {
3239 "Allow": ["https://example.org"],
3240 "Block": ["https://example.edu"],
3241 "BlockNewRequests": true | false,
3242 "Locked": true | false
3243 },
3244 "Notifications": {
3245 "Allow": ["https://example.org"],
3246 "Block": ["https://example.edu"],
3247 "BlockNewRequests": true | false,
3248 "Locked": true | false
3249 },
3250 "Autoplay": {
3251 "Allow": ["https://example.org"],
3252 "Block": ["https://example.edu"],
3253 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3254 "Locked": true | false
3255 }
3256 }
3257 }
3258 }
3259 ```
3260 ### PictureInPicture
3261
3262 Enable or disable Picture-in-Picture.
3263
3264 **Compatibility:** Firefox 78, Firefox ESR 78\
3265 **CCK2 Equivalent:** N/A\
3266 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3267
3268 #### Windows (GPO)
3269 ```
3270 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3271 ```
3272 #### Windows (Intune)
3273 OMA-URI:
3274 ```
3275 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3276 ```
3277 Value (string):
3278 ```
3279 <enabled/> or <disabled/>
3280 ```
3281 #### macOS
3282 ```
3283 <dict>
3284 <key>PictureInPicture</key>
3285 <true/> | <false/>
3286 </dict>
3287 ```
3288 #### policies.json
3289 ```
3290 {
3291 "policies": {
3292 "PictureInPicture": true | false
3293 }
3294 }
3295 ```
3296 ### PopupBlocking
3297 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3298
3299 `Allow` is a list of origins where popup-windows are allowed.
3300
3301 `Default` determines whether or not pop-up windows are allowed by default.
3302
3303 `Locked` prevents the user from changing pop-up preferences.
3304
3305 **Compatibility:** Firefox 60, Firefox ESR 60\
3306 **CCK2 Equivalent:** `permissions.popup`\
3307 **Preferences Affected:** `dom.disable_open_during_load`
3308
3309 #### Windows (GPO)
3310 ```
3311 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3312 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3313 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3314 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3315 ```
3316 #### Windows (Intune)
3317 OMA-URI:
3318 ```
3319 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3320 ```
3321 Value (string):
3322 ```
3323 <enabled/>
3324 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3325 ```
3326 OMA-URI:
3327 ```
3328 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3329 ```
3330 Value (string):
3331 ```
3332 <enabled/> or <disabled/>
3333 ```
3334 OMA-URI:
3335 ```
3336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3337 ```
3338 Value (string):
3339 ```
3340 <enabled/> or <disabled/>
3341 ```
3342 #### macOS
3343 ```
3344 <dict>
3345 <key>PopupBlocking</key>
3346 <dict>
3347 <key>Allow</key>
3348 <array>
3349 <string>http://example.org</string>
3350 <string>http://example.edu</string>
3351 </array>
3352 <key>Default</key>
3353 <true/> | <false/>
3354 <key>Locked</key>
3355 <true/> | <false/>
3356 </dict>
3357 </dict>
3358 ```
3359 #### policies.json
3360 ```
3361 {
3362 "policies": {
3363 "PopupBlocking": {
3364 "Allow": ["http://example.org/",
3365 "http://example.edu/"],
3366 "Default": true | false,
3367 "Locked": true | false
3368 }
3369 }
3370 }
3371 ```
3372 ### Preferences
3373 Set and lock certain preferences.
3374
3375 **Compatibility:** See below\
3376 **CCK2 Equivalent:** `preferences`\
3377 **Preferences Affected:** See below
3378
3379 | Preference | Type | Compatibility | Default
3380 | --- | --- | --- | ---
3381 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3382 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3383 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3384 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3385 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3386 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3387 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3388 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3389 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3390 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3391 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3392 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3393 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3394 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3395 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3396 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3397 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3398 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3399 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3400 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3401 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3402 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3403 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3404 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3405 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3406 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3407 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3408 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3409 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3410 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3411 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3412 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3413 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3414 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3415 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3416 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3417 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3418 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3419 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3420 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3421 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3422 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3423 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3424 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3425 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3426 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3427 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3428 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3429 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3430 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3431 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3432 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3433 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3434 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3435 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3436 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3437 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3438 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3439 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3440 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3441 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3442 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3443 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3444 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3445 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3446 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3447 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3448 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3449 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3450 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3451 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3452 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3453 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3454 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3455 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3456 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3457 disabled
3458 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3459 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3460 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3461 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3462 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3463 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3464 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3465 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3466 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3467 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3468 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3469 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3470 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3471 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3472 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3473 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3474 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3475 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3476 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3477 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3478 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3479 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3480 #### Windows (GPO)
3481 ```
3482 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3483 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3484 ```
3485 #### Windows (Intune)
3486 OMA-URI: (periods are replaced by underscores)
3487 ```
3488 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3489 ```
3490 Value (string):
3491 ```
3492 <enabled/> or <disabled/>
3493 ```
3494 #### macOS
3495 ```
3496 <dict>
3497 <key>Preferences</key>
3498 <dict>
3499 <key>boolean_preference_name</key>
3500 <true/> | <false/>
3501 <key>string_preference_name</key>
3502 <string>string_value</string>
3503 </dict>
3504 </dict>
3505 ```
3506 #### policies.json
3507 ```
3508 {
3509 "policies": {
3510 "Preferences": {
3511 "boolean_preference_name": true | false,
3512 "string_preference_name": "string_value"
3513 }
3514 }
3515 }
3516 ```
3517 ### PromptForDownloadLocation
3518 Ask where to save each file before downloading.
3519
3520 **Compatibility:** Firefox 68, Firefox ESR 68\
3521 **CCK2 Equivalent:** N/A\
3522 **Preferences Affected:** `browser.download.useDownloadDir`
3523
3524 #### Windows (GPO)
3525 ```
3526 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3527 ```
3528 #### Windows (Intune)
3529 OMA-URI:
3530 ```
3531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3532 ```
3533 Value (string):
3534 ```
3535 <enabled/> or <disabled/>
3536 ```
3537 #### macOS
3538 ```
3539 <dict>
3540 <key>PromptForDownloadLocation</key>
3541 <true/> | <false/>
3542 </dict>
3543 ```
3544 #### policies.json
3545 ```
3546 {
3547 "policies": {
3548 "PromptForDownloadLocation": true | false
3549 }
3550 }
3551 ```
3552 ### Proxy
3553 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3554 To specify ports, append them to the hostnames with a colon (:).
3555
3556 `Mode` is the proxy method being used.
3557
3558 `Locked` is whether or not proxy settings can be changed.
3559
3560 `HTTPProxy` is the HTTP proxy server.
3561
3562 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3563
3564 `SSLProxy` is the SSL proxy server.
3565
3566 `FTPProxy` is the FTP proxy server.
3567
3568 `SOCKSProxy` is the SOCKS proxy server
3569
3570 `SOCKSVersion` is the SOCKS version (4 or 5)
3571
3572 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3573
3574 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3575
3576 `AutoLogin` means do not prompt for authentication if password is saved.
3577
3578 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3579
3580 **Compatibility:** Firefox 60, Firefox ESR 60\
3581 **CCK2 Equivalent:** `networkProxy*`\
3582 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3583
3584 #### Windows (GPO)
3585 ```
3586 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3587 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3588 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3589 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3590 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3591 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3592 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3593 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3594 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3595 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3596 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3597 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3598 ```
3599 #### Windows (Intune)
3600 OMA-URI:
3601 ```
3602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3603 ```
3604 Value (string):
3605 ```
3606 <enabled/>
3607 <data id="ProxyLocked" value="true | false"/>
3608 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3609 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3610 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3611 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3612 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3613 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3614 <data id="SOCKSVersion" value="4 | 5"/>
3615 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3616 <data id="Passthrough" value="<local>"/>
3617 <data id="AutoLogin" value="true | false"/>
3618 <data id="UseProxyForDNS" value="true | false"/>
3619 ```
3620 #### macOS
3621 ```
3622 <dict>
3623 <key>Proxy</key>
3624 <dict>
3625 <key>Mode</key>
3626 <string>none | system | manual | autoDetect | autoConfig</string>
3627 <key>Locked</key>
3628 <true> | </false>
3629 <key>HTTPProxy</key>
3630 <string>https://httpproxy.example.com</string>
3631 <key>UseHTTPProxyForAllProtocols</key>
3632 <true> | </false>
3633 <key>SSLProxy</key>
3634 <string>https://sslproxy.example.com</string>
3635 <key>FTPProxy</key>
3636 <string>https://ftpproxy.example.com</string>
3637 <key>SOCKSProxy</key>
3638 <string>https://socksproxy.example.com</string>
3639 <key>SOCKSVersion</key>
3640 <string>4 | 5</string>
3641 <key>Passthrough</key>
3642 <string>&lt;local>&gt;</string>
3643 <key>AutoConfigURL</key>
3644 <string>URL_TO_AUTOCONFIG</string>
3645 <key>AutoLogin</key>
3646 <true> | </false>
3647 <key>UseProxyForDNS</key>
3648 <true> | </false>
3649 </dict>
3650 </dict>
3651 ```
3652 #### policies.json
3653 ```
3654 {
3655 "policies": {
3656 "Proxy": {
3657 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3658 "Locked": true | false,
3659 "HTTPProxy": "hostname",
3660 "UseHTTPProxyForAllProtocols": true | false,
3661 "SSLProxy": "hostname",
3662 "FTPProxy": "hostname",
3663 "SOCKSProxy": "hostname",
3664 "SOCKSVersion": 4 | 5
3665 "Passthrough": "<local>",
3666 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3667 "AutoLogin": true | false,
3668 "UseProxyForDNS": true | false
3669 }
3670 }
3671 }
3672 ```
3673 ### RequestedLocales
3674 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3675
3676 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3677
3678 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3679 **CCK2 Equivalent:** N/A\
3680 **Preferences Affected:** N/A
3681 #### Windows (GPO)
3682 ```
3683 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3684 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3685
3686 or
3687
3688 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3689 ```
3690 #### Windows (Intune)
3691 OMA-URI:
3692 ```
3693 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3694 ```
3695 Value (string):
3696 ```
3697 <enabled/>
3698 <data id="Preferences_String" value="de,en-US"/>
3699 ```
3700 #### macOS
3701 ```
3702 <dict>
3703 <key>RequestedLocales</key>
3704 <array>
3705 <string>de</string>
3706 <string>en-US</string>
3707 </array>
3708 </dict>
3709
3710 or
3711
3712 <dict>
3713 <key>RequestedLocales</key>
3714 <string>de,en-US</string>
3715 </dict>
3716
3717 ```
3718 #### policies.json
3719 ```
3720 {
3721 "policies": {
3722 "RequestedLocales": ["de", "en-US"]
3723 }
3724 }
3725
3726 or
3727
3728 {
3729 "policies": {
3730 "RequestedLocales": "de,en-US"
3731 }
3732 }
3733 ```
3734 <a name="SanitizeOnShutdown"></a>
3735
3736 ### SanitizeOnShutdown (Selective)
3737 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3738
3739 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3740
3741 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3742 **CCK2 Equivalent:** N/A\
3743 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3744 #### Windows (GPO)
3745 ```
3746 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3747 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3748 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3749 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3750 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3751 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3752 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3753 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3754 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3755 ```
3756 #### Windows (Intune)
3757 OMA-URI:
3758 ```
3759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3760 ```
3761 Value (string):
3762 ```
3763 <enabled/> or <disabled/>
3764 ```
3765 #### macOS
3766 ```
3767 <dict>
3768 <key>SanitizeOnShutdown</key>
3769 <dict>
3770 <key>Cache</key>
3771 <true/> | <false/>
3772 <key>Cookies</key>
3773 <true/> | <false/>
3774 <key>Downloads</key>
3775 <true/> | <false/>
3776 <key>FormData</key>
3777 <true/> | <false/>
3778 <key>History</key>
3779 <true/> | <false/>
3780 <key>Sessions</key>
3781 <true/> | <false/>
3782 <key>SiteSettings</key>
3783 <true/> | <false/>
3784 <key>OfflineApps</key>
3785 <true/> | <false/>
3786 <key>Locked</key>
3787 <true/> | <false/>
3788 </dict>
3789 </dict>
3790 ```
3791 #### policies.json
3792 ```
3793 {
3794 "policies": {
3795 "SanitizeOnShutdown": {
3796 "Cache": true | false,
3797 "Cookies": true | false,
3798 "Downloads": true | false,
3799 "FormData": true | false,
3800 "History": true | false,
3801 "Sessions": true | false,
3802 "SiteSettings": true | false,
3803 "OfflineApps": true | false,
3804 "Locked": true | false
3805 }
3806 }
3807 }
3808 ```
3809 ### SanitizeOnShutdown (All)
3810 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3811
3812 **Compatibility:** Firefox 60, Firefox ESR 60\
3813 **CCK2 Equivalent:** N/A\
3814 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3815 #### Windows (GPO)
3816 ```
3817 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3818 ```
3819 #### Windows (Intune)
3820 OMA-URI:
3821 ```
3822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3823 ```
3824 Value (string):
3825 ```
3826 <enabled/> or <disabled/>
3827 ```
3828 #### macOS
3829 ```
3830 <dict>
3831 <key>SanitizeOnShutdown</key>
3832 <true/> | <false/>
3833 </dict>
3834 ```
3835 #### policies.json
3836 ```
3837 {
3838 "policies": {
3839 "SanitizeOnShutdown": true | false
3840 }
3841 }
3842 ```
3843 ### SearchBar
3844 Set whether or not search bar is displayed.
3845
3846 **Compatibility:** Firefox 60, Firefox ESR 60\
3847 **CCK2 Equivalent:** `showSearchBar`\
3848 **Preferences Affected:** N/A
3849
3850 #### Windows (GPO)
3851 ```
3852 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3853 ```
3854
3855 #### Windows (Intune)
3856 OMA-URI:
3857 ```
3858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3859 ```
3860 Value (string):
3861 ```
3862 <enabled/>
3863 <data id="Permissions" value="unified | separate"/>
3864 #### macOS
3865 ```
3866 <dict>
3867 <key>SearchBar</key>
3868 <string>unified | separate</string>
3869 </dict>
3870 ```
3871 #### policies.json
3872 ```
3873 {
3874 "policies": {
3875 "SearchBar": "unified" | "separate"
3876 }
3877 }
3878 ```
3879 <a name="SearchEngines"></a>
3880
3881 ### SearchEngines (This policy is only available on the ESR.)
3882
3883 ### SearchEngines | Default
3884
3885 Set the default search engine. This policy is only available on the ESR.
3886
3887 **Compatibility:** Firefox ESR 60\
3888 **CCK2 Equivalent:** `defaultSearchEngine`\
3889 **Preferences Affected:** N/A
3890
3891 #### Windows (GPO)
3892 ```
3893 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3894 ```
3895 #### Windows (Intune)
3896 OMA-URI:
3897 ```
3898 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3899 ```
3900 Value (string):
3901 ```
3902 <enabled/>
3903 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3904 ```
3905 #### macOS
3906 ```
3907 <dict>
3908 <key>SearchEngines</key>
3909 <dict>
3910 <key>Default</key>
3911 <string>NAME_OF_SEARCH_ENGINE</string>
3912 </dict>
3913 </dict>
3914 ```
3915 #### policies.json
3916 ```
3917 {
3918 "policies": {
3919 "SearchEngines": {
3920 "Default": "NAME_OF_SEARCH_ENGINE"
3921 }
3922 }
3923 }
3924 ```
3925 ### SearchEngines | PreventInstalls
3926
3927 Prevent installing search engines from webpages.
3928
3929 **Compatibility:** Firefox ESR 60\
3930 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3931 **Preferences Affected:** N/A
3932
3933 #### Windows (GPO)
3934 ```
3935 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3936 ```
3937 #### Windows (Intune)
3938 OMA-URI:
3939 ```
3940 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3941 ```
3942 Value (string):
3943 ```
3944 <enabled/> or <disabled/>
3945 ```
3946 #### macOS
3947 ```
3948 <dict>
3949 <key>SearchEngines</key>
3950 <dict>
3951 <key>PreventInstalls</key>
3952 <true/> | <false/>
3953 </dict>
3954 </dict>
3955 ```
3956 #### policies.json
3957 ```
3958 {
3959 "policies": {
3960 "SearchEngines": {
3961 "PreventInstalls": true | false
3962 }
3963 }
3964 }
3965 ```
3966 ### SearchEngines | Remove
3967
3968 Hide built-in search engines. This policy is only available on the ESR.
3969
3970 **Compatibility:** Firefox ESR 60.2\
3971 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3972 **Preferences Affected:** N/A
3973
3974 #### Windows (GPO)
3975 ```
3976 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3977 ```
3978 #### Windows (Intune)
3979 OMA-URI:
3980 ```
3981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
3982 ```
3983 Value (string):
3984 ```
3985 <enabled/>
3986 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
3987 ```
3988 #### macOS
3989 ```
3990 <dict>
3991 <key>SearchEngines</key>
3992 <dict>
3993 <key>Remove</key>
3994 <array>
3995 <string>NAME_OF_SEARCH_ENGINE</string>
3996 </array>
3997 </dict>
3998 </dict>
3999 ```
4000 #### policies.json
4001 ```
4002 {
4003 "policies": {
4004 "SearchEngines": {
4005 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4006 }
4007 }
4008 }
4009 ```
4010 ### SearchEngines | Add
4011
4012 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4013
4014 `Name` is the name of the search engine.
4015
4016 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4017
4018 `Method` is either GET or POST
4019
4020 `IconURL` is a URL for the icon to use.
4021
4022 `Alias` is a keyword to use for the engine.
4023
4024 `Description` is a description of the search engine.
4025
4026 `PostData` is the POST data as name value pairs separated by &.
4027
4028 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4029
4030 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4031 **CCK2 Equivalent:** `searchplugins`\
4032 **Preferences Affected:** N/A
4033
4034 #### Windows (GPO)
4035 ```
4036 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4037 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4038 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4039 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4040 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4041 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4042 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4043 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4044 ```
4045 #### Windows (Intune)
4046 OMA-URI:
4047 ```
4048 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4049 ```
4050 Value (string):
4051 ```
4052 <enabled/>
4053 <data id="SearchEngine_Name" value="Example1"/>
4054 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4055 <data id="SearchEngine_Method" value="GET | POST"/>
4056 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4057 <data id="SearchEngine_Alias" value="example"/>
4058 <data id="SearchEngine_Description" value="Example Description"/>
4059 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4060 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4061 ```
4062 #### macOS
4063 ```
4064 <dict>
4065 <key>SearchEngines</key>
4066 <dict>
4067 <key>Add</key>
4068 <array>
4069 <dict>
4070 <key>Name</key>
4071 <string>Example1</string>
4072 <key>URLTemplate</key>
4073 <string>https://www.example.org/q={searchTerms}</string>
4074 <key>Method</key>
4075 <string>GET | POST </string>
4076 <key>IconURL</key>
4077 <string>https://www.example.org/favicon.ico</string>
4078 <key>Alias</key>
4079 <string>example</string>
4080 <key>Description</key>
4081 <string>Example Description</string>
4082 <key>SuggestURLTemplate</key>
4083 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4084 <key>PostData</key>
4085 <string>name=value&q={searchTerms}</string>
4086 </dict>
4087 <array>
4088 </dict>
4089 </dict>
4090 ```
4091 #### policies.json
4092 ```
4093 {
4094 "policies": {
4095 "SearchEngines": {
4096 "Add": [
4097 {
4098 "Name": "Example1",
4099 "URLTemplate": "https://www.example.org/q={searchTerms}",
4100 "Method": "GET" | "POST",
4101 "IconURL": "https://www.example.org/favicon.ico",
4102 "Alias": "example",
4103 "Description": "Description",
4104 "PostData": "name=value&q={searchTerms}",
4105 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4106 }
4107 ]
4108 }
4109 }
4110 }
4111 ```
4112 ### SearchSuggestEnabled
4113
4114 Enable search suggestions.
4115
4116 **Compatibility:** Firefox 68, Firefox ESR 68\
4117 **CCK2 Equivalent:** N/A\
4118 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4119
4120 #### Windows (GPO)
4121 ```
4122 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4123 ```
4124 #### Windows (Intune)
4125 OMA-URI:
4126 ```
4127 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4128 ```
4129 Value (string):
4130 ```
4131 <enabled/> or <disabled/>
4132 ```
4133 #### macOS
4134 ```
4135 <dict>
4136 <key>SearchSuggestEnabled</key>
4137 <true/> | <false/>
4138 </dict>
4139 ```
4140 #### policies.json
4141 ```
4142 {
4143 "policies": {
4144 "SearchSuggestEnabled": true | false
4145 }
4146 }
4147 ```
4148 ### SecurityDevices
4149
4150 Install PKCS #11 modules.
4151
4152 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4153 **CCK2 Equivalent:** `certs.devices`\
4154 **Preferences Affected:** N/A
4155
4156 #### Windows (GPO)
4157 ```
4158 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4159 ```
4160 #### Windows (Intune)
4161 OMA-URI:
4162 ```
4163 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4164 ```
4165 Value (string):
4166 ```
4167 <enabled/>
4168 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4169 ```
4170 #### macOS
4171 ```
4172 <dict>
4173 <key>SecurityDevices</key>
4174 <dict>
4175 <key>NAME_OF_DEVICE</key>
4176 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4177 </dict>
4178 </dict>
4179 ```
4180
4181 #### policies.json
4182 ```
4183 {
4184 "policies": {
4185 "SecurityDevices": {
4186 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4187 }
4188 }
4189 }
4190 ```
4191 ### SSLVersionMax
4192
4193 Set and lock the maximum version of TLS.
4194
4195 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4196 **CCK2 Equivalent:** N/A\
4197 **Preferences Affected:** `security.tls.version.max`
4198
4199 #### Windows (GPO)
4200 ```
4201 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4202 ```
4203 #### Windows (Intune)
4204 OMA-URI:
4205 ```
4206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4207 ```
4208 Value (string):
4209 ```
4210 <enabled/>
4211 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4212 ```
4213 #### macOS
4214 ```
4215 <dict>
4216 <key>SSLVersionMax</key>
4217 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4218 </dict>
4219 ```
4220
4221 #### policies.json
4222 ```
4223 {
4224 "policies": {
4225 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4226 }
4227 }
4228 ```
4229 ### SSLVersionMin
4230
4231 Set and lock the minimum version of TLS.
4232
4233 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4234 **CCK2 Equivalent:** N/A\
4235 **Preferences Affected:** `security.tls.version.min`
4236
4237 #### Windows (GPO)
4238 ```
4239 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4240 ```
4241 #### Windows (Intune)
4242 OMA-URI:
4243 ```
4244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4245 ```
4246 Value (string):
4247 ```
4248 <enabled/>
4249 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4250 ```
4251 #### macOS
4252 ```
4253 <dict>
4254 <key>SSLVersionMin</key>
4255 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4256 </dict>
4257 ```
4258
4259 #### policies.json
4260 ```
4261 {
4262 "policies": {
4263 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4264 }
4265 }
4266 ```
4267 ### SupportMenu
4268 Add a menuitem to the help menu for specifying support information.
4269
4270 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4271 **CCK2 Equivalent:** helpMenu\
4272 **Preferences Affected:** N/A
4273
4274 #### Windows (GPO)
4275 ```
4276 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4277 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4278 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4279 ```
4280 #### Windows (Intune)
4281 OMA-URI:
4282 ```
4283 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4284 ```
4285 Value (string):
4286 ```
4287 <enabled/>
4288 <data id="SupportMenuTitle" value="Support Menu"/>
4289 <data id="SupportMenuURL" value="http://example.com/support"/>
4290 <data id="SupportMenuAccessKey" value="S">
4291 ```
4292 #### macOS
4293 ```
4294 <dict>
4295 <key>SupportMenu</key>
4296 <dict>
4297 <key>Title</key>
4298 <string>SupportMenu</string>
4299 <key>URL</key>
4300 <string>http://example.com/support</string>
4301 <key>AccessKey</key>
4302 <string>S</string>
4303 </dict>
4304 </dict>
4305 ```
4306 #### policies.json
4307 ```
4308 {
4309 "policies": {
4310 "SupportMenu": {
4311 "Title": "Support Menu",
4312 "URL": "http://example.com/support",
4313 "AccessKey": "S"
4314 }
4315 }
4316 }
4317 ```
4318 ### UserMessaging
4319
4320 Prevent installing search engines from webpages.
4321
4322 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4323
4324 `ExtensionRecommendations` Don't recommend extensions.
4325
4326 `FeatureRecommendations` Don't recommend browser features.
4327
4328 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4329
4330 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4331 **CCK2 Equivalent:** N/A\
4332 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4333
4334 #### Windows (GPO)
4335 ```
4336 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4337 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4338 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4339 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4340 ```
4341 #### Windows (Intune)
4342 OMA-URI:
4343 ```
4344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4345 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4346 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4348 ```
4349 Value (string):
4350 ```
4351 <enabled/> or <disabled/>
4352 ```
4353 #### macOS
4354 ```
4355 <dict>
4356 <key>UserMessaging</key>
4357 <dict>
4358 <key>WhatsNew</key>
4359 <true/> | <false/>
4360 <key>ExtensionRecommendations</key>
4361 <true/> | <false/>
4362 <key>FeatureRecommendations</key>
4363 <true/> | <false/>
4364 <key>UrlbarInterventions</key>
4365 <true/> | <false/>
4366 </dict>
4367 </dict>
4368 ```
4369 #### policies.json
4370 ```
4371 {
4372 "policies": {
4373 "UserMessaging": {
4374 "WhatsNew": true | false,
4375 "ExtensionRecommendations": true | false,
4376 "FeatureRecommendations": true | false,
4377 "UrlbarInterventions": true | false
4378 }
4379 }
4380 }
4381 ```
4382 ### WebsiteFilter
4383 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4384
4385 **Compatibility:** Firefox 60, Firefox ESR 60\
4386 **CCK2 Equivalent:** N/A\
4387 **Preferences Affected:** N/A
4388
4389 #### Windows (GPO)
4390 ```
4391 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4392 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4393 ```
4394 #### Windows (Intune)
4395 OMA-URI:
4396 ```
4397 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4398 ```
4399 Value (string):
4400 ```
4401 <enabled/>
4402 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4403 ```
4404 OMA-URI:
4405 ```
4406 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4407 ```
4408 Value (string):
4409 ```
4410 <enabled/>
4411 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4412 ```
4413 #### macOS
4414 ```
4415 <dict>
4416 <key>WebsiteFilter</key>
4417 <dict>
4418 <key>Block</key>
4419 <array>
4420 <string><all_urls></string>
4421 </array>
4422 <key>Exceptions</key>
4423 <array>
4424 <string>http://example.org/*</string>
4425 </array>
4426 </dict>
4427
4428 </dict>
4429 ```
4430 #### policies.json
4431 ```
4432 {
4433 "policies": {
4434 "WebsiteFilter": {
4435 "Block": ["<all_urls>"],
4436 "Exceptions": ["http://example.org/*"]
4437 }
4438 }
4439 }
4440 ```

patrick-canterino.de