]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #609 from mozilla/Authentication_PrivateBrowsing
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
53 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
54 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
55 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
56 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
57 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
58 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
59 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
60 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
61 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
62 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
63 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
64 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
65 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
66 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
67 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
68 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
69 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
70 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
71 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
72 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
73 | **[`Preferences`](#preferences)** | Set and lock some preferences.
74 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
75 | **[`Proxy`](#proxy)** | Configure proxy settings.
76 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
77 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
78 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
79 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
80 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
81 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
82 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
83 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
84 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
87 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
88 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
89 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
90 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
91 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
92
93 ### AppAutoUpdate
94
95 Enable or disable **automatic** application update.
96
97 If set to true, application updates are installed without user approval.
98
99 If set to false, application updates are downloaded but the user can choose when to install the update.
100
101 If you have disabled updates via DisableAppUpdate, this policy has no effect.
102
103 **Compatibility:** Firefox 75, Firefox ESR 68.7\
104 **CCK2 Equivalent:** N/A\
105 **Preferences Affected:** app.update.auto
106
107 #### Windows (GPO)
108 ```
109 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
110 ```
111 #### Windows (Intune)
112 OMA-URI:
113 ```
114 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
115 ```
116 Value (string):
117 ```
118 <enabled/> or <disabled/>
119 ```
120 #### macOS
121 ```
122 <dict>
123 <key>AppAutoUpdate</key>
124 <true/> | <false/>
125 </dict>
126 ```
127 #### policies.json
128 ```
129 {
130 "policies": {
131 "AppAutoUpdate": true | false
132 }
133 }
134 ```
135 ### AppUpdateURL
136
137 Change the URL for application update.
138
139 **Compatibility:** Firefox 62, Firefox ESR 60.2\
140 **CCK2 Equivalent:** N/A\
141 **Preferences Affected:** `app.update.url`
142
143 #### Windows (GPO)
144 ```
145 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
146 ```
147 #### Windows (Intune)
148 OMA-URI:
149 ```
150 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
151 ```
152 Value (string):
153 ```
154 <enabled/>
155 <data id="AppUpdateURL" value="https://yoursite.com"/>
156 ```
157 #### macOS
158 ```
159 <dict>
160 <key>AppUpdateURL</key>
161 <string>https://yoursite.com</string>
162 </dict>
163 ```
164 #### policies.json
165 ```
166 {
167 "policies": {
168 "AppUpdateURL": "https://yoursite.com"
169 }
170 }
171 ```
172 ### Authentication
173
174 Configure sites that support integrated authentication.
175
176 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
177
178 `PrivateBrowsing` enables integrated authentication in prviate browsing.
179
180 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
181 **CCK2 Equivalent:** N/A\
182 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
183
184 #### Windows (GPO)
185 ```
186 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
187 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
188 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
189 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
190 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
193 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
194 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
195 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
196 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
198 ```
199 #### Windows (Intune)
200 OMA-URI:
201 ```
202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
203 ```
204 Value (string):
205 ```
206 <enabled/>
207 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
208 ```
209 OMA-URI:
210 ```
211 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
212 ```
213 Value (string):
214 ```
215 <enabled/>
216 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
217 ```
218 OMA-URI:
219 ```
220 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
221 ```
222 Value (string):
223 ```
224 <enabled/>
225 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
226 ```
227 OMA-URI:
228 ```
229 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
230 ```
231 Value (string):
232 ```
233 <enabled/>
234 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
235 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
236 ```
237 OMA-URI:
238 ```
239 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
240 ```
241 Value (string):
242 ```
243 <enabled/> or <disabled/>
244 ```
245 OMA-URI:
246 ```
247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
248 ```
249 Value (string):
250 ```
251 <enabled/> or <disabled/>
252 ```
253 #### macOS
254 ```
255 <dict>
256 <key>Authentication</key>
257 <dict>
258 <key>SPNEGO</key>
259 <array>
260 <string>mydomain.com</string>
261 <string>https://myotherdomain.com</string>
262 </array>
263 <key>Delegated</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>NTLM</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>AllowNonFQDN</key>
274 <dict>
275 <key>SPNEGO</key>
276 <true/> | <false/>
277 <key>NTLM</key>
278 <true/> | <false/>
279 </dict>
280 <key>AllowProxies</key>
281 <dict>
282 <key>SPNEGO</key>
283 <true/> | <false/>
284 <key>NTLM</key>
285 <true/> | <false/>
286 </dict>
287 <key>Locked</key>
288 <true/> | <false/>
289 <key>PrivateBrowsing</key>
290 <true/> | <false/>
291 </dict>
292 </dict>
293 ```
294 #### policies.json
295 ```
296 {
297 "policies": {
298 "Authentication": {
299 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
300 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
301 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
302 "AllowNonFQDN": {
303 "SPNEGO": true | false,
304 "NTLM": true | false
305 },
306 "AllowProxies": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "Locked": true | false,
311 "PrivateBrowsing": true | false
312 }
313 }
314 }
315 ```
316 ### BlockAboutAddons
317
318 Block access to the Add-ons Manager (about:addons).
319
320 **Compatibility:** Firefox 60, Firefox ESR 60\
321 **CCK2 Equivalent:** `disableAddonsManager`\
322 **Preferences Affected:** N/A
323
324 #### Windows (GPO)
325 ```
326 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
327 ```
328 #### Windows (Intune)
329 OMA-URI:
330 ```
331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
332 ```
333 Value (string):
334 ```
335 <enabled/> or <disabled/>
336 ```
337 #### macOS
338 ```
339 <dict>
340 <key>BlockAboutAddons</key>
341 <true/> | <false/>
342 </dict>
343 ```
344 #### policies.json
345 ```
346 {
347 "policies": {
348 "BlockAboutAddons": true | false
349 }
350 }
351 ```
352 ### BlockAboutConfig
353
354 Block access to about:config.
355
356 **Compatibility:** Firefox 60, Firefox ESR 60\
357 **CCK2 Equivalent:** `disableAboutConfig`\
358 **Preferences Affected:** N/A
359
360 #### Windows (GPO)
361 ```
362 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
363 ```
364 #### Windows (Intune)
365 OMA-URI:
366 ```
367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
368 ```
369 Value (string):
370 ```
371 <enabled/> or <disabled/>
372 ```
373 #### macOS
374 ```
375 <dict>
376 <key>BlockAboutConfig</key>
377 <true/> | <false/>
378 </dict>
379 ```
380 #### policies.json
381 ```
382 {
383 "policies": {
384 "BlockAboutConfig": true | false
385 }
386 }
387 ```
388 ### BlockAboutProfiles
389
390 Block access to About Profiles (about:profiles).
391
392 **Compatibility:** Firefox 60, Firefox ESR 60\
393 **CCK2 Equivalent:** `disableAboutProfiles`\
394 **Preferences Affected:** N/A
395
396 #### Windows (GPO)
397 ```
398 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
399 ```
400 #### Windows (Intune)
401 OMA-URI:
402 ```
403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
404 ```
405 Value (string):
406 ```
407 <enabled/> or <disabled/>
408 ```
409 #### macOS
410 ```
411 <dict>
412 <key>BlockAboutProfiles</key>
413 <true/> | <false/>
414 </dict>
415 ```
416 #### policies.json
417 ```
418 {
419 "policies": {
420 "BlockAboutProfiles": true | false
421 }
422 }
423 ```
424 ### BlockAboutSupport
425
426 Block access to Troubleshooting Information (about:support).
427
428 **Compatibility:** Firefox 60, Firefox ESR 60\
429 **CCK2 Equivalent:** `disableAboutSupport`\
430 **Preferences Affected:** N/A
431
432 #### Windows (GPO)
433 ```
434 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
435 ```
436 #### Windows (Intune)
437 OMA-URI:
438 ```
439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
440 ```
441 Value (string):
442 ```
443 <enabled/> or <disabled/>
444 ```
445 #### macOS
446 ```
447 <dict>
448 <key>BlockAboutSupport</key>
449 <true/> | <false/>
450 </dict>
451 ```
452 #### policies.json
453 ```
454 {
455 "policies": {
456 "BlockAboutSupport": true | false
457 }
458 }
459 ```
460 ### Bookmarks
461
462 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
463
464 **Compatibility:** Firefox 60, Firefox ESR 60\
465 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
466 **Preferences Affected:** N/A
467
468 #### Windows (GPO)
469 ```
470 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
471 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
472 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
473 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
475 ```
476 #### Windows (Intune)
477 OMA-URI:
478 ```
479 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
480 ```
481 Value (string):
482 ```
483 <enabled/>
484 <data id="BookmarkTitle" value="Example"/>
485 <data id="BookmarkURL" value="https://example.com"/>
486 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
487 <data id="BookmarkPlacement" value="toolbar | menu"/>
488 <data id="BookmarkFolder" value="FolderName"/>
489 ```
490 #### macOS
491 ```
492 <dict>
493 <key>Bookmarks</key>
494 <array>
495 <dict>
496 <key>Title</key>
497 <string>Example</string>
498 <key>URL</key>
499 <string>https://example.com</string>
500 <key>Favicon</key>
501 <string>https://example.com/favicon.ico</string>
502 <key>Placement</key>
503 <string>toolbar | menu</string>
504 <key>Folder</key>
505 <string>FolderName</string>
506 </dict>
507 </array>
508 </dict>
509 ```
510 #### policies.json
511 ```
512 {
513 "policies": {
514 "Bookmarks": [
515 {
516 "Title": "Example",
517 "URL": "https://example.com",
518 "Favicon": "https://example.com/favicon.ico",
519 "Placement": "toolbar" | "menu",
520 "Folder": "FolderName"
521 }
522 ]
523 }
524 }
525 ```
526 ### CaptivePortal
527 Enable or disable the detection of captive portals.
528
529 **Compatibility:** Firefox 67, Firefox ESR 60.7\
530 **CCK2 Equivalent:** N/A\
531 **Preferences Affected:** `network.captive-portal-service.enabled`
532
533 #### Windows (GPO)
534 ```
535 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
536 ```
537 #### Windows (Intune)
538 OMA-URI:
539 ```
540 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
541 ```
542 Value (string):
543 ```
544 <enabled/> or <disabled/>
545 ```
546 #### macOS
547 ```
548 <dict>
549 <key>CaptivePortal</key>
550 <true/> | <false/>
551 </dict>
552 ```
553 #### policies.json
554 ```
555 {
556 "policies": {
557 "CaptivePortal": true | false
558 }
559 }
560 ```
561 ### Certificates
562
563 ### Certificates | ImportEnterpriseRoots
564
565 Trust certificates that have been added to the operating system certificate store by a user or administrator.
566
567 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
568
569 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
570 **CCK2 Equivalent:** N/A\
571 **Preferences Affected:** `security.enterprise_roots.enabled`
572
573 #### Windows (GPO)
574 ```
575 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
576 ```
577 #### Windows (Intune)
578 OMA-URI:
579 ```
580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
581 ```
582 Value (string):
583 ```
584 <enabled/> or <disabled/>
585 ```
586 #### macOS
587 ```
588 <dict>
589 <key>Certificates</key>
590 <dict>
591 <key>ImportEnterpriseRoots</key>
592 <true/> | <false/>
593 </dict>
594 </dict>
595 ```
596 #### policies.json
597 ```
598 {
599 "policies": {
600 "Certificates": {
601 "ImportEnterpriseRoots": true | false
602 }
603 }
604 }
605 ```
606 ### Certificates | Install
607
608 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
609
610 - Windows
611 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
612 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
613 - macOS
614 - /Library/Application Support/Mozilla/Certificates
615 - ~/Library/Application Support/Mozilla/Certificates
616 - Linux
617 - /usr/lib/mozilla/certificates
618 - /usr/lib64/mozilla/certificates
619 - ~/.mozilla/certificates
620
621 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
622
623 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
624
625 Certificates are installed using the trust string `CT,CT,`.
626
627 Binary (DER) and ASCII (PEM) certificates are both supported.
628
629 **Compatibility:** Firefox 64, Firefox ESR 64\
630 **CCK2 Equivalent:** `certs.ca`\
631 **Preferences Affected:** N/A
632
633 #### Windows (GPO)
634 ```
635 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
636 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
637 ```
638 #### Windows (Intune)
639 OMA-URI:
640 ```
641 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
642 ```
643 Value (string):
644 ```
645 <enabled/>
646 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
647 ```
648 #### macOS
649 ```
650 <dict>
651 <key>Certificates</key>
652 <dict>
653 <key>Install</key>
654 <array>
655 <string>cert1.der</string>
656 <string>/Users/username/cert2.pem</string>
657 </array>
658 </dict>
659 </dict>
660 ```
661 #### policies.json
662 ```
663 {
664 "policies": {
665 "Certificates": {
666 "Install": ["cert1.der", "/home/username/cert2.pem"]
667 }
668 }
669 }
670 ```
671 ### Cookies
672 Configure cookie preferences.
673
674 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
675
676 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
677
678 `Default` determines whether cookies are accepted at all.
679
680 `AcceptThirdParty` determines how third-party cookies are handled.
681
682 `ExpireAtSessionEnd` determines when cookies expire.
683
684 `RejectTracker` only rejects cookies for trackers.
685
686 `Locked` prevents the user from changing cookie preferences.
687
688 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
689 **CCK2 Equivalent:** N/A\
690 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
691
692 #### Windows (GPO)
693 ```
694 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
695 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
696 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
697 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
698 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
699 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
700 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
701 ```
702 #### Windows (Intune)
703 OMA-URI:
704 ```
705 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
706 ```
707 Value (string):
708 ```
709 <enabled/>
710 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
711 ```
712 OMA-URI:
713 ```
714 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
715 ```
716 Value (string):
717 ```
718 <enabled/>
719 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
720 ```
721 OMA-URI:
722 ```
723 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
724 ```
725 Value (string):
726 ```
727 <enabled/> or <disabled/>
728 ```
729 OMA-URI:
730 ```
731 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
732 ```
733 Value (string):
734 ```
735 <enabled/>
736 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
737 ```
738 OMA-URI:
739 ```
740 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
741 ```
742 Value (string):
743 ```
744 <enabled/> or <disabled/>
745 ```
746 OMA-URI:
747 ```
748 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
749 ```
750 Value (string):
751 ```
752 <enabled/> or <disabled/>
753 ```
754 OMA-URI:
755 ```
756 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
757 ```
758 Value (string):
759 ```
760 <enabled/> or <disabled/>
761 ```
762 #### macOS
763 ```
764 <dict>
765 <key>Cookies</key>
766 <dict>
767 <key>Allow</key>
768 <array>
769 <string>http://example.com</string>
770 </array>
771 <key>Block</key>
772 <array>
773 <string>http://example.org</string>
774 </array>
775 <key>Default</key>
776 <true/> | <false/>
777 <key>AcceptThirdParty</key>
778 <string>always | never | from-visited</string>
779 <key>ExpireAtSessionEnd</key>
780 <true/> | <false/>
781 <key>RejectTracker</key>
782 <true/> | <false/>
783 <key>Locked</key>
784 <true/> | <false/>
785 </dict>
786 </dict>
787 ```
788 #### policies.json
789 ```
790 {
791 "policies": {
792 "Cookies": {
793 "Allow": ["http://example.org/"],
794 "Block": ["http://example.edu/"],
795 "Default": true | false,
796 "AcceptThirdParty": "always" | "never" | "from-visited",
797 "ExpireAtSessionEnd": true | false,
798 "RejectTracker": true | false,
799 "Locked": true | false
800 }
801 }
802 }
803 ```
804 ### DisableSetDesktopBackground
805 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
806
807 **Compatibility:** Firefox 60, Firefox ESR 60\
808 **CCK2 Equivalent:** `removeSetDesktopBackground`\
809 **Preferences Affected:** N/A
810
811 #### Windows (GPO)
812 ```
813 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
814 ```
815 #### Windows (Intune)
816 OMA-URI:
817 ```
818 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
819 ```
820 Value (string):
821 ```
822 <enabled/> or <disabled/>
823 ```
824 #### macOS
825 ```
826 <dict>
827 <key>DisableSetDesktopBackground</key>
828 <true/> | <false/>
829 </dict>
830 ```
831 #### policies.json
832 ```
833 {
834 "policies": {
835 "DisableSetDesktopBackground": true | false
836 }
837 }
838 ```
839 ### DisableMasterPasswordCreation
840 Remove the master password functionality.
841
842 **Compatibility:** Firefox 60, Firefox ESR 60\
843 **CCK2 Equivalent:** `noMasterPassword`\
844 **Preferences Affected:** N/A
845
846 #### Windows (GPO)
847 ```
848 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
849 ```
850 #### Windows (Intune)
851 OMA-URI:
852 ```
853 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
854 ```
855 Value (string):
856 ```
857 <enabled/> or <disabled/>
858 ```
859 #### macOS
860 ```
861 <dict>
862 <key>DisableMasterPasswordCreation</key>
863 <true/> | <false/>
864 </dict>
865 ```
866 #### policies.json
867 ```
868 {
869 "policies": {
870 "DisableMasterPasswordCreation": true | false
871 }
872 }
873 ```
874 ### DisableAppUpdate
875 Turn off application updates.
876
877 **Compatibility:** Firefox 60, Firefox ESR 60\
878 **CCK2 Equivalent:** `disableFirefoxUpdates`\
879 **Preferences Affected:** N/A
880
881 #### Windows (GPO)
882 ```
883 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
884 ```
885 #### Windows (Intune)
886 OMA-URI:
887 ```
888 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
889 ```
890 Value (string):
891 ```
892 <enabled/> or <disabled/>
893 ```
894 #### macOS
895 ```
896 <dict>
897 <key>DisableAppUpdate</key>
898 <true/> | <false/>
899 </dict>
900 ```
901 #### policies.json
902 ```
903 {
904 "policies": {
905 "DisableAppUpdate": true | false
906 }
907 }
908 ```
909 ### DisableBuiltinPDFViewer
910 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
911
912 **Compatibility:** Firefox 60, Firefox ESR 60\
913 **CCK2 Equivalent:** `disablePDFjs`\
914 **Preferences Affected:** `pdfjs.disabled`
915
916 #### Windows (GPO)
917 ```
918 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
919 ```
920 #### Windows (Intune)
921 OMA-URI:
922 ```
923 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
924 ```
925 Value (string):
926 ```
927 <enabled/> or <disabled/>
928 ```
929 #### macOS
930 ```
931 <dict>
932 <key>DisableBuiltinPDFViewer</key>
933 <true/> | <false/>
934 </dict>
935 ```
936 #### policies.json
937 ```
938 {
939 "policies": {
940 "DisableBuiltinPDFViewer": true | false
941 }
942 }
943 ```
944 ### DisabledCiphers
945 Disable specific cryptographic ciphers.
946
947 **Compatibility:** Firefox 76, Firefox ESR 68.8\
948 **CCK2 Equivalent:** N/A\
949 **Preferences Affected:** N/A
950
951 #### Windows (GPO)
952 ```
953 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
954 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
955 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
956 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
957 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
958 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
959 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
960 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
961 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
962 ```
963 #### Windows (Intune)
964 OMA-URI:
965 ```
966 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
967 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
968 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
972 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
973 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
974 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
975 ```
976 Value (string):
977 ```
978 <enabled/> or <disabled/>
979 ```
980 #### macOS
981 ```
982 <dict>
983 <key>DisabledCiphers</key>
984 <dict>
985 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
986 <true/> | <false/>
987 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
988 <true/> | <false/>
989 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
990 <true/> | <false/>
991 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
992 <true/> | <false/>
993 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
994 <true/> | <false/>
995 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
996 <true/> | <false/>
997 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
998 <true/> | <false/>
999 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1000 <true/> | <false/>
1001 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1002 <true/> | <false/>
1003 </dict>
1004 </dict>
1005 ```
1006 #### policies.json
1007 ```
1008 {
1009 "policies": {
1010 "DisabledCiphers" {
1011 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1012 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1013 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1014 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1015 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1016 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1017 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1018 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1019 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1020 }
1021 }
1022 }
1023 ```
1024 ### DisableDefaultBrowserAgent
1025 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1026
1027 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1028 **CCK2 Equivalent:** N/A\
1029 **Preferences Affected:** N/A
1030
1031 #### Windows (GPO)
1032 ```
1033 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1034 ```
1035 #### Windows (Intune)
1036 OMA-URI:
1037 ```
1038 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1039 ```
1040 Value (string):
1041 ```
1042 <enabled/> or <disabled/>
1043 ```
1044 #### policies.json
1045 ```
1046 {
1047 "policies": {
1048 "DisableDefaultBrowserAgent": true | false
1049 }
1050 }
1051 ```
1052 ### DisableDeveloperTools
1053 Remove access to all developer tools.
1054
1055 **Compatibility:** Firefox 60, Firefox ESR 60\
1056 **CCK2 Equivalent:** `removeDeveloperTools`\
1057 **Preferences Affected:** `devtools.policy.disabled`
1058
1059 #### Windows (GPO)
1060 ```
1061 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1062 ```
1063 #### Windows (Intune)
1064 OMA-URI:
1065 ```
1066 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1067 ```
1068 Value (string):
1069 ```
1070 <enabled/> or <disabled/>
1071 ```
1072 #### macOS
1073 ```
1074 <dict>
1075 <key>DisableDeveloperTools</key>
1076 <true/> | <false/>
1077 </dict>
1078 ```
1079 #### policies.json
1080 ```
1081 {
1082 "policies": {
1083 "DisableDeveloperTools": true | false
1084 }
1085 }
1086 ```
1087 ### DisableFeedbackCommands
1088 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1089
1090 **Compatibility:** Firefox 60, Firefox ESR 60\
1091 **CCK2 Equivalent:** N/A\
1092 **Preferences Affected:** N/A
1093
1094 #### Windows (GPO)
1095 ```
1096 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1097 ```
1098 #### Windows (Intune)
1099 OMA-URI:
1100 ```
1101 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1102 ```
1103 Value (string):
1104 ```
1105 <enabled/> or <disabled/>
1106 ```
1107 #### macOS
1108 ```
1109 <dict>
1110 <key>DisableFeedbackCommands</key>
1111 <true/> | <false/>
1112 </dict>
1113 ```
1114 #### policies.json
1115 ```
1116 {
1117 "policies": {
1118 "DisableFeedbackCommands": true | false
1119 }
1120 }
1121 ```
1122 ### DisableFirefoxScreenshots
1123 Remove access to Firefox Screenshots.
1124
1125 **Compatibility:** Firefox 60, Firefox ESR 60\
1126 **CCK2 Equivalent:** N/A\
1127 **Preferences Affected:** `extensions.screenshots.disabled`
1128
1129 #### Windows (GPO)
1130 ```
1131 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1132 ```
1133 #### Windows (Intune)
1134 OMA-URI:
1135 ```
1136 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1137 ```
1138 Value (string):
1139 ```
1140 <enabled/> or <disabled/>
1141 ```
1142 #### macOS
1143 ```
1144 <dict>
1145 <key>DisableFirefoxScreenshots</key>
1146 <true/> | <false/>
1147 </dict>
1148 ```
1149 #### policies.json
1150 ```
1151 {
1152 "policies": {
1153 "DisableFirefoxScreenshots": true | false
1154 }
1155 }
1156 ```
1157 ### DisableFirefoxAccounts
1158 Disable Firefox Accounts integration (Sync).
1159
1160 **Compatibility:** Firefox 60, Firefox ESR 60\
1161 **CCK2 Equivalent:** `disableSync`\
1162 **Preferences Affected:** `identity.fxaccounts.enabled`
1163
1164 #### Windows (GPO)
1165 ```
1166 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1167 ```
1168 #### Windows (Intune)
1169 OMA-URI:
1170 ```
1171 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1172 ```
1173 Value (string):
1174 ```
1175 <enabled/> or <disabled/>
1176 ```
1177 #### macOS
1178 ```
1179 <dict>
1180 <key>DisableFirefoxAccounts</key>
1181 <true/> | <false/>
1182 </dict>
1183 ```
1184 #### policies.json
1185 ```
1186 {
1187 "policies": {
1188 "DisableFirefoxAccounts": true | false
1189 }
1190 }
1191 ```
1192 ### DisableFirefoxStudies
1193 Disable Firefox studies (Shield).
1194
1195 **Compatibility:** Firefox 60, Firefox ESR 60\
1196 **CCK2 Equivalent:** N/A\
1197 **Preferences Affected:** N/A
1198
1199 #### Windows (GPO)
1200 ```
1201 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1202 ```
1203 #### Windows (Intune)
1204 OMA-URI:
1205 ```
1206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1207 ```
1208 Value (string):
1209 ```
1210 <enabled/> or <disabled/>
1211 ```
1212 #### macOS
1213 ```
1214 <dict>
1215 <key>DisableFirefoxStudies</key>
1216 <true/> | <false/>
1217 </dict>
1218 ```
1219 #### policies.json
1220 ```
1221 {
1222 "policies": {
1223 "DisableFirefoxStudies": true | false
1224 }
1225 }
1226 ```
1227 ### DisableForgetButton
1228 Disable the "Forget" button.
1229
1230 **Compatibility:** Firefox 60, Firefox ESR 60\
1231 **CCK2 Equivalent:** `disableForget`\
1232 **Preferences Affected:** N/A
1233
1234 #### Windows (GPO)
1235 ```
1236 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1237 ```
1238 #### Windows (Intune)
1239 OMA-URI:
1240 ```
1241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1242 ```
1243 Value (string):
1244 ```
1245 <enabled/> or <disabled/>
1246 ```
1247 #### macOS
1248 ```
1249 <dict>
1250 <key>DisableForgetButton</key>
1251 <true/> | <false/>
1252 </dict>
1253 ```
1254 #### policies.json
1255 ```
1256 {
1257 "policies": {
1258 "DisableForgetButton": true | false
1259 }
1260 }
1261 ```
1262 ### DisableFormHistory
1263 Turn off saving information on web forms and the search bar.
1264
1265 **Compatibility:** Firefox 60, Firefox ESR 60\
1266 **CCK2 Equivalent:** `disableFormFill`\
1267 **Preferences Affected:** ` browser.formfill.enable`
1268
1269 #### Windows (GPO)
1270 ```
1271 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1272 ```
1273 #### Windows (Intune)
1274 OMA-URI:
1275 ```
1276 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1277 ```
1278 Value (string):
1279 ```
1280 <enabled/> or <disabled/>
1281 ```
1282 #### macOS
1283 ```
1284 <dict>
1285 <key>DisableFormHistory</key>
1286 <true/> | <false/>
1287 </dict>
1288 ```
1289 #### policies.json
1290 ```
1291 {
1292 "policies": {
1293 "DisableFormHistory": true | false
1294 }
1295 }
1296 ```
1297 ### DisablePasswordReveal
1298 Do not allow passwords to be shown in saved logins
1299
1300 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1301 **CCK2 Equivalent:** N/A
1302 **Preferences Affected:** N/A
1303
1304 #### Windows (GPO)
1305 ```
1306 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1307 ```
1308 #### Windows (Intune)
1309 OMA-URI:
1310 ```
1311 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1312 ```
1313 Value (string):
1314 ```
1315 <enabled/> or <disabled/>
1316 ```
1317 #### macOS
1318 ```
1319 <dict>
1320 <key>DisablePasswordReveal</key>
1321 <true/> | <false/>
1322 </dict>
1323 ```
1324 #### policies.json
1325 ```
1326 {
1327 "policies": {
1328 "DisablePasswordReveal": true | false
1329 }
1330 }
1331 ```
1332 ### DisablePocket
1333 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1334
1335 **Compatibility:** Firefox 60, Firefox ESR 60\
1336 **CCK2 Equivalent:** `disablePocket`\
1337 **Preferences Affected:** `extensions.pocket.enabled`
1338
1339 #### Windows (GPO)
1340 ```
1341 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1342 ```
1343 #### Windows (Intune)
1344 OMA-URI:
1345 ```
1346 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1347 ```
1348 Value (string):
1349 ```
1350 <enabled/> or <disabled/>
1351 ```
1352 #### macOS
1353 ```
1354 <dict>
1355 <key>DisablePocket</key>
1356 <true/> | <false/>
1357 </dict>
1358 ```
1359 #### policies.json
1360 ```
1361 {
1362 "policies": {
1363 "DisablePocket": true | false
1364 }
1365 }
1366 ```
1367 ### DisablePrivateBrowsing
1368 Remove access to private browsing.
1369
1370 **Compatibility:** Firefox 60, Firefox ESR 60\
1371 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1372 **Preferences Affected:** N/A
1373
1374 #### Windows (GPO)
1375 ```
1376 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1377 ```
1378 #### Windows (Intune)
1379 OMA-URI:
1380 ```
1381 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1382 ```
1383 Value (string):
1384 ```
1385 <enabled/> or <disabled/>
1386 ```
1387 #### macOS
1388 ```
1389 <dict>
1390 <key>DisablePrivateBrowsing</key>
1391 <true/> | <false/>
1392 </dict>
1393 ```
1394 #### policies.json
1395 ```
1396 {
1397 "policies": {
1398 "DisablePrivateBrowsing": true | false
1399 }
1400 }
1401 ```
1402 ### DisableProfileImport
1403 Disables the "Import data from another browser" option in the bookmarks window.
1404
1405 **Compatibility:** Firefox 60, Firefox ESR 60\
1406 **CCK2 Equivalent:** N/A\
1407 **Preferences Affected:** N/A
1408
1409 #### Windows (GPO)
1410 ```
1411 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1412 ```
1413 #### Windows (Intune)
1414 OMA-URI:
1415 ```
1416 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1417 ```
1418 Value (string):
1419 ```
1420 <enabled/> or <disabled/>
1421 ```
1422 #### macOS
1423 ```
1424 <dict>
1425 <key>DisableProfileImport</key>
1426 <true/> | <false/>
1427 </dict>
1428 ```
1429 #### policies.json
1430 ```
1431 {
1432 "policies": {
1433 "DisableProfileImport": true | false
1434 }
1435 }
1436 ```
1437 ### DisableProfileRefresh
1438 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1439
1440 **Compatibility:** Firefox 60, Firefox ESR 60\
1441 **CCK2 Equivalent:** `disableResetFirefox`\
1442 **Preferences Affected:** `browser.disableResetPrompt`
1443
1444 #### Windows (GPO)
1445 ```
1446 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1447 ```
1448 #### Windows (Intune)
1449 OMA-URI:
1450 ```
1451 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1452 ```
1453 Value (string):
1454 ```
1455 <enabled/> or <disabled/>
1456 ```
1457 #### macOS
1458 ```
1459 <dict>
1460 <key>DisableProfileRefresh</key>
1461 <true/> | <false/>
1462 </dict>
1463 ```
1464 #### policies.json
1465 ```
1466 {
1467 "policies": {
1468 "DisableProfileRefresh": true | false
1469 }
1470 }
1471 ```
1472 ### DisableSafeMode
1473 Disable safe mode within the browser.
1474
1475 On Windows, this disables safe mode via the command line as well.
1476
1477 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1478 **CCK2 Equivalent:** `disableSafeMode`\
1479 **Preferences Affected:** N/A
1480
1481 #### Windows (GPO)
1482 ```
1483 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1484 ```
1485 #### Windows (Intune)
1486 OMA-URI:
1487 ```
1488 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1489 ```
1490 Value (string):
1491 ```
1492 <enabled/> or <disabled/>
1493 ```
1494 #### macOS
1495 ```
1496 <dict>
1497 <key>DisableSafeMode</key>
1498 <true/> | <false/>
1499 </dict>
1500 ```
1501 #### policies.json
1502 ```
1503 {
1504 "policies": {
1505 "DisableSafeMode": true | false
1506 }
1507 }
1508 ```
1509 ### DisableSecurityBypass
1510 Prevent the user from bypassing security in certain cases.
1511
1512 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1513
1514 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1515
1516 **Compatibility:** Firefox 60, Firefox ESR 60\
1517 **CCK2 Equivalent:** N/A\
1518 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1519
1520 #### Windows (GPO)
1521 ```
1522 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1523 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1524 ```
1525 #### Windows (Intune)
1526 OMA-URI:
1527 ```
1528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1529 ```
1530 Value (string):
1531 ```
1532 <enabled/> or <disabled/>
1533 ```
1534 OMA-URI:
1535 ```
1536 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1537 ```
1538 Value (string):
1539 ```
1540 <enabled/> or <disabled/>
1541 ```
1542
1543 #### macOS
1544 ```
1545 <dict>
1546 <key>DisableSecurityBypass</key>
1547 <dict>
1548 <key>InvalidCertificate</key>
1549 <true/> | <false/>
1550 <key><SafeBrowsing/key>
1551 <true/> | <false/>
1552 </dict>
1553 </dict>
1554 ```
1555 #### policies.json
1556 ```
1557 {
1558 "policies": {
1559 "DisableSecurityBypass": {
1560 "InvalidCertificate": true false,
1561 "SafeBrowsing": true false
1562 }
1563 }
1564 }
1565 ```
1566 ### DisableSystemAddonUpdate
1567 Prevent system add-ons from being installed or update.
1568
1569 **Compatibility:** Firefox 60, Firefox ESR 60\
1570 **CCK2 Equivalent:** N/A\
1571 **Preferences Affected:** N/A
1572
1573 #### Windows (GPO)
1574 ```
1575 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1576 ```
1577 #### Windows (Intune)
1578 OMA-URI:
1579 ```
1580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1581 ```
1582 Value (string):
1583 ```
1584 <enabled/> or <disabled/>
1585 ```
1586 #### macOS
1587 ```
1588 <dict>
1589 <key>DisableSystemAddonUpdate</key>
1590 <true/> | <false/>
1591 </dict>
1592 ```
1593 #### policies.json
1594 ```
1595 {
1596 "policies": {
1597 "DisableSystemAddonUpdate": true | false
1598 }
1599 }
1600 ```
1601 ### DisableTelemetry
1602 Prevent the upload of telemetry data.
1603
1604 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1605
1606 **Compatibility:** Firefox 60, Firefox ESR 60\
1607 **CCK2 Equivalent:** `disableTelemetry`\
1608 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1609
1610 #### Windows (GPO)
1611 ```
1612 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1613 ```
1614 #### Windows (Intune)
1615 OMA-URI:
1616 ```
1617 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1618 ```
1619 Value (string):
1620 ```
1621 <enabled/> or <disabled/>
1622 ```
1623 #### macOS
1624 ```
1625 <dict>
1626 <key>DisableTelemetry</key>
1627 <true/> | <false/>
1628 </dict>
1629 ```
1630 #### policies.json
1631 ```
1632 {
1633 "policies": {
1634 "DisableTelemetry": true | false
1635 }
1636 }
1637 ```
1638 ### DisplayBookmarksToolbar
1639 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1640
1641 **Compatibility:** Firefox 60, Firefox ESR 60\
1642 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1643 **Preferences Affected:** N/A
1644
1645 #### Windows (GPO)
1646 ```
1647 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1648 ```
1649 #### Windows (Intune)
1650 OMA-URI:
1651 ```
1652 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1653 ```
1654 Value (string):
1655 ```
1656 <enabled/> or <disabled/>
1657 ```
1658 #### macOS
1659 ```
1660 <dict>
1661 <key>DisplayBookmarksToolbar</key>
1662 <true/> | <false/>
1663 </dict>
1664 ```
1665 #### policies.json
1666 ```
1667 {
1668 "policies": {
1669 "DisplayBookmarksToolbar": true | false
1670 }
1671 }
1672 ```
1673 ### DisplayMenuBar (Deprecated)
1674 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1675
1676 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1677 **CCK2 Equivalent:** `displayMenuBar`\
1678 **Preferences Affected:** N/A
1679
1680 #### Windows (GPO)
1681 ```
1682 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1683 ```
1684 #### macOS
1685 ```
1686 <dict>
1687 <key>DisplayMenuBar</key>
1688 <true/> | <false/>
1689 </dict>
1690 ```
1691 #### policies.json
1692 ```
1693 {
1694 "policies": {
1695 "DisplayMenuBar": true | false
1696 }
1697 }
1698 ```
1699 ### DisplayMenuBar
1700 Set the state of the menubar.
1701
1702 `always` means the menubar is shown and cannot be hidden.
1703
1704 `never` means the menubar is hidden and cannot be shown.
1705
1706 `default-on` means the menubar is on by default but can be hidden.
1707
1708 `default-off` means the menubar is off by default but can be shown.
1709
1710 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1711 **CCK2 Equivalent:** `displayMenuBar`\
1712 **Preferences Affected:** N/A
1713
1714 #### Windows (GPO)
1715 ```
1716 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1717 ```
1718 #### Windows (Intune)
1719 OMA-URI:
1720 ```
1721 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1722 ```
1723 Value (string):
1724 ```
1725 <enabled/>
1726 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1727 ```
1728 #### macOS
1729 ```
1730 <dict>
1731 <key>DisplayMenuBar</key>
1732 <string>always | never | default-on | default-off</string>
1733 </dict>
1734 ```
1735 #### policies.json
1736 ```
1737 {
1738 "policies": {
1739 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1740 }
1741 }
1742 ```
1743 ### DNSOverHTTPS
1744 Configure DNS over HTTPS.
1745
1746 `Enabled` determines whether DNS over HTTPS is enabled
1747
1748 `ProviderURL` is a URL to another provider.
1749
1750 `Locked` prevents the user from changing DNS over HTTPS preferences.
1751
1752 `ExcludedDomains` excludes domains from DNS over HTTPS.
1753
1754 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1755 **CCK2 Equivalent:** N/A\
1756 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1757
1758 #### Windows (GPO)
1759 ```
1760 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1761 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1762 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1763 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1764 ```
1765 #### Windows (Intune)
1766 OMA-URI:
1767 ```
1768 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1769 ```
1770 Value (string):
1771 ```
1772 <enabled/> or <disabled/>
1773 ```
1774 OMA-URI:
1775 ```
1776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1777 ```
1778 Value (string):
1779 ```
1780 <enabled/>
1781 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1782 ```
1783 OMA-URI:
1784 ```
1785 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1786 ```
1787 Value (string):
1788 ```
1789 <enabled/> or <disabled/>
1790 ```
1791 OMA-URI:
1792 ```
1793 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1794 ```
1795 Value (string):
1796 ```
1797 <enabled/>
1798 <data id="List" value="1&#xF000;example.com"/>
1799 ```
1800 #### macOS
1801 ```
1802 <dict>
1803 <key>DNSOverHTTPS</key>
1804 <dict>
1805 <key>Enabled</key>
1806 <true/> | <false/>
1807 <key>ProviderURL</key>
1808 <string>URL_TO_ALTERNATE_PROVIDER</string>
1809 <key>Locked</key>
1810 <true/> | <false/>
1811 <key>ExcludedDomains</key>
1812 <array>
1813 <string>example.com</string>
1814 </array>
1815 </dict>
1816 </dict>
1817 ```
1818 #### policies.json
1819 ```
1820 {
1821 "policies": {
1822 "DNSOverHTTPS": {
1823 "Enabled": true | false,
1824 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1825 "Locked": true | false,
1826 "ExcludedDomains": ["example.com"]
1827 }
1828 }
1829 }
1830 ```
1831 ### DontCheckDefaultBrowser
1832 Don't check if Firefox is the default browser at startup.
1833
1834 **Compatibility:** Firefox 60, Firefox ESR 60\
1835 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1836 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1837
1838 #### Windows (GPO)
1839 ```
1840 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1841 ```
1842 #### Windows (Intune)
1843 OMA-URI:
1844 ```
1845 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1846 ```
1847 Value (string):
1848 ```
1849 <enabled/> or <disabled/>
1850 ```
1851 #### macOS
1852 ```
1853 <dict>
1854 <key>DontCheckDefaultBrowser</key>
1855 <true/> | <false/>
1856 </dict>
1857 ```
1858 #### policies.json
1859 ```
1860 {
1861 "policies": {
1862 "DontCheckDefaultBrowser": true | false
1863 }
1864 }
1865 ```
1866 ### DefaultDownloadDirectory
1867 Set the default download directory.
1868
1869 You can use ${home} for the native home directory.
1870
1871 **Compatibility:** Firefox 68, Firefox ESR 68\
1872 **CCK2 Equivalent:** N/A\
1873 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1874
1875 #### Windows (GPO)
1876 ```
1877 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1878 ```
1879 #### Windows (Intune)
1880 OMA-URI:
1881 ```
1882 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1883 ```
1884 Value (string):
1885 ```
1886 <enabled/>
1887 <data id="Preferences_String" value="${home}\Downloads"/>
1888 ```
1889 #### macOS
1890 ```
1891 <dict>
1892 <key>DefaultDownloadDirectory</key>
1893 <string>${home}/Downloads</string>
1894 </dict>
1895 ```
1896 #### policies.json (macOS and Linux)
1897 ```
1898 {
1899 "policies": {
1900 "DefaultDownloadDirectory": "${home}/Downloads"
1901 }
1902 ```
1903 #### policies.json (Windows)
1904 ```
1905 {
1906 "policies": {
1907 "DefaultDownloadDirectory": "${home}\\Downloads"
1908 }
1909 ```
1910 ### DownloadDirectory
1911 Set and lock the download directory.
1912
1913 You can use ${home} for the native home directory.
1914
1915 **Compatibility:** Firefox 68, Firefox ESR 68\
1916 **CCK2 Equivalent:** N/A\
1917 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1918
1919 #### Windows (GPO)
1920 ```
1921 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1922 ```
1923 #### Windows (Intune)
1924 OMA-URI:
1925 ```
1926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1927 ```
1928 Value (string):
1929 ```
1930 <enabled/>
1931 <data id="Preferences_String" value="${home}\Downloads"/>
1932 ```
1933 #### macOS
1934 ```
1935 <dict>
1936 <key>DownloadDirectory</key>
1937 <string>${home}/Downloads</string>
1938 </dict>
1939 ```
1940 #### policies.json (macOS and Linux)
1941 ```
1942 {
1943 "policies": {
1944 "DownloadDirectory": "${home}/Downloads"
1945 }
1946 ```
1947 #### policies.json (Windows)
1948 ```
1949 {
1950 "policies": {
1951 "DownloadDirectory": "${home}\\Downloads"
1952 }
1953 ```
1954 ### EnableTrackingProtection
1955 Configure tracking protection.
1956
1957 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1958
1959 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1960
1961 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1962
1963 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1964
1965 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1966
1967 `Exceptions` are origins for which tracking protection is not enabled.
1968
1969 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1970 **CCK2 Equivalent:** N/A\
1971 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1972
1973 #### Windows (GPO)
1974 ```
1975 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1976 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1977 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1978 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1979 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1980 ```
1981 #### Windows (Intune)
1982 OMA-URI:
1983 ```
1984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
1985 ```
1986 Value (string):
1987 ```
1988 <enabled/>
1989 <data id="TrackingProtectionLocked" value="true | false"/>
1990 <data id="Cryptomining" value="true | false"/>
1991 <data id="Fingerprinting" value="true | false"/>
1992 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
1993 ```
1994 #### macOS
1995 ```
1996 <dict>
1997 <key>EnableTrackingProtection</key>
1998 <dict>
1999 <key>Value</key>
2000 <true/> | <false/>
2001 <key><Locked</key>
2002 <true/> | <false/>
2003 <key><Cryptomining</key>
2004 <true/> | <false/>
2005 <key><Fingerprinting</key>
2006 <true/> | <false/>
2007 <key>Exceptions</key>
2008 <array>
2009 <string>https://example.com</string>
2010 </array>
2011 </dict>
2012 </dict>
2013 ```
2014 #### policies.json
2015 ```
2016 {
2017 "policies": {
2018 "EnableTrackingProtection": {
2019 "Value": [true, false],
2020 "Locked": [true, false],
2021 "Cryptomining": [true, false],
2022 "Fingerprinting": [true, false],
2023 "Exceptions": ["https://example.com"]
2024 }
2025 }
2026 ```
2027 ### EnterprisePoliciesEnabled
2028 Enable policy support on macOS.
2029
2030 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2031 **CCK2 Equivalent:** N/A\
2032 **Preferences Affected:** N/A
2033
2034 #### macOS
2035 ```
2036 <dict>
2037 <key>EnterprisePoliciesEnabled</key>
2038 <true/>
2039 </dict>
2040 ```
2041 ### Extensions
2042 Control the installation, uninstallation and locking of extensions.
2043
2044 `Install` is a list of URLs or native paths for extensions to be installed.
2045
2046 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2047
2048 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2049
2050 **Compatibility:** Firefox 60, Firefox ESR 60\
2051 **CCK2 Equivalent:** `addons`\
2052 **Preferences Affected:** N/A
2053
2054 #### Windows (GPO)
2055 ```
2056 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2057 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2058 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2059 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2060 ```
2061 #### macOS
2062 ```
2063 <dict>
2064 <key>Extensions</key>
2065 <dict>
2066 <key>Install</key>
2067 <array>
2068 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2069 <string>//path/to/xpi</string>
2070 </array>
2071 <key>Uninstall</key>
2072 <array>
2073 <string>bad_addon_id@mozilla.org</string>
2074 </array>
2075 <key>Locked</key>
2076 <array>
2077 <string>addon_id@mozilla.org</string>
2078 </array>
2079 </dict>
2080 </dict>
2081 ```
2082 #### policies.json
2083 ```
2084 {
2085 "policies": {
2086 "Extensions": {
2087 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2088 "Uninstall": ["bad_addon_id@mozilla.org"],
2089 "Locked": ["addon_id@mozilla.org"]
2090 }
2091 }
2092 }
2093 ```
2094 ### ExtensionSettings
2095 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2096
2097 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2098
2099 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2100
2101 The configuration for each extension is another dictionary that can contain the fields documented below.
2102
2103 | Name | Description |
2104 | --- | --- |
2105 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2106 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2107 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2108 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2109 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2110 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2111 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2112 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2113 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2114
2115 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2116 **CCK2 Equivalent:** N/A\
2117 **Preferences Affected:** N/A
2118
2119 #### Windows (GPO)
2120 ```
2121 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2122 {
2123 "*": {
2124 "blocked_install_message": "Custom error message.",
2125 "install_sources": ["https://addons.mozilla.org/"],
2126 "installation_mode": "blocked",
2127 "allowed_types": ["extension"]
2128 },
2129 "uBlock0@raymondhill.net": {
2130 "installation_mode": "force_installed",
2131 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2132 }
2133 }
2134 ```
2135 #### Windows (Intune)
2136 OMA-URI:
2137 ```
2138 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2139 ```
2140 Value (string):
2141 ```
2142 <enabled/>
2143 <data id="ExtensionSettings" value='
2144 "*": {
2145 "blocked_install_message": "Custom error message.",
2146 "install_sources": ["https://addons.mozilla.org/"],
2147 "installation_mode": "blocked",
2148 "allowed_types": ["extension"]
2149 },
2150 "uBlock0@raymondhill.net": {
2151 "installation_mode": "force_installed",
2152 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2153 }'/>
2154 ```
2155 #### macOS
2156 ```
2157 <dict>
2158 <key>ExtensionSettings</key>
2159 <dict>
2160 <key>*</key>
2161 <dict>
2162 <key>blocked_install_message</key>
2163 <string>Custom error message.</string>
2164 <key>install_sources</key>
2165 <array>
2166 <string>https://addons.mozilla.org/</string>
2167 </array>
2168 <key>installation_mode</key>
2169 <string>blocked</string>
2170 <key>allowed_types</key>
2171 <array>
2172 <string>extension</string>
2173 </array>
2174 </dict>
2175 <key>uBlock0@raymondhill.net</key>
2176 <dict>
2177 <key>installation_mode</key>
2178 <string>force_installed</string>
2179 <key>install_url</key>
2180 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2181 </dict>
2182 </dict>
2183 </dict>
2184 ```
2185 #### policies.json
2186 ```
2187 {
2188 "policies": {
2189 "ExtensionSettings": {
2190 "*": {
2191 "blocked_install_message": "Custom error message.",
2192 "install_sources": ["https://addons.mozilla.org/"],
2193 "installation_mode": "blocked",
2194 "allowed_types": ["extension"]
2195 },
2196 "uBlock0@raymondhill.net": {
2197 "installation_mode": "force_installed",
2198 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2199 }
2200 }
2201 }
2202 }
2203 ```
2204 ### ExtensionUpdate
2205 Control extension updates.
2206
2207 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2208 **CCK2 Equivalent:** N/A\
2209 **Preferences Affected:** `extensions.update.enabled`
2210
2211 #### Windows (GPO)
2212 ```
2213 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2214 ```
2215 #### Windows (Intune)
2216 OMA-URI:
2217 ```
2218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2219 ```
2220 Value (string):
2221 ```
2222 <enabled/> or <disabled/>
2223 ```
2224 #### macOS
2225 ```
2226 <dict>
2227 <key>ExtensionUpdate</key>
2228 <true/> | <false/>
2229 </dict>
2230 ```
2231 #### policies.json
2232 ```
2233 {
2234 "policies": {
2235 "ExtensionUpdate": true | false
2236 }
2237 }
2238 ```
2239 ### FlashPlugin
2240 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2241
2242 `Allow` is a list of origins where Flash are allowed.
2243
2244 `Block` is a list of origins where Flash is not allowed.
2245
2246 `Default` determines whether or not Flash is allowed by default.
2247
2248 `Locked` prevents the user from changing Flash preferences.
2249
2250 **Compatibility:** Firefox 60, Firefox ESR 60\
2251 **CCK2 Equivalent:** `permissions.plugin`\
2252 **Preferences Affected:** `plugin.state.flash`
2253
2254 #### Windows (GPO)
2255 ```
2256 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2257 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2258 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2259 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2260 ```
2261 #### Windows (Intune)
2262 OMA-URI:
2263 ```
2264 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2265 ```
2266 Value (string):
2267 ```
2268 <enabled/>
2269 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2270 ```
2271 OMA-URI:
2272 ```
2273 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2274 ```
2275 Value (string):
2276 ```
2277 <enabled/> or <disabled/>
2278 ```
2279 OMA-URI:
2280 ```
2281 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2282 ```
2283 Value (string):
2284 ```
2285 <enabled/> or <disabled/>
2286 ```
2287 #### macOS
2288 ```
2289 <dict>
2290 <key>FlashPlugin</key>
2291 <dict>
2292 <key>Allow</key>
2293 <array>
2294 <string>http://example.org</string>
2295 </array>
2296 <key>Block</key>
2297 <array>
2298 <string>http://example.edu</string>
2299 </array>
2300 <key>Default</key>
2301 <true/> | <false/>
2302 <key>Locked</key>
2303 <true/> | <false/>
2304 </dict>
2305 </dict>
2306 ```
2307 #### policies.json
2308 ```
2309 {
2310 "policies": {
2311 "FlashPlugin": {
2312 "Allow": ["http://example.org/"],
2313 "Block": ["http://example.edu/"],
2314 "Default": true | false,
2315 "Locked": true | false
2316 }
2317 }
2318 }
2319 ```
2320 ### FirefoxHome
2321 Customize the Firefox Home page.
2322
2323 **Compatibility:** Firefox 68, Firefox ESR 68\
2324 **CCK2 Equivalent:** N/A\
2325 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2326
2327 #### Windows (GPO)
2328 ```
2329 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2330 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2331 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2332 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2333 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2334 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2335 ```
2336 #### Windows (Intune)
2337 OMA-URI:
2338 ```
2339 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2340 ```
2341 Value (string):
2342 ```
2343 <enabled/>
2344 <data id="FirefoxHome_Search" value="true | false"/>
2345 <data id="FirefoxHome_TopSites" value="true | false"/>
2346 <data id="FirefoxHome_Highlights" value="true | false"/>
2347 <data id="FirefoxHome_Pocket" value="true | false"/>
2348 <data id="FirefoxHome_Snippets" value="true | false"/>
2349 <data id="FirefoxHome_Locked" value="true | false"/>
2350 ```
2351 #### macOS
2352 ```
2353 <dict>
2354 <key>FirefoxHome</key>
2355 <dict>
2356 <key>Search</key>
2357 <true/> | <false/>
2358 <key>TopSites</key>
2359 <true/> | <false/>
2360 <key>Highlights</key>
2361 <true/> | <false/>
2362 <key>Pocket</key>
2363 <true/> | <false/>
2364 <key>Snippets</key>
2365 <true/> | <false/>
2366 <key>Locked</key>
2367 <true/> | <false/>
2368 </dict>
2369 </dict>
2370 ```
2371 #### policies.json
2372 ```
2373 {
2374 "policies": {
2375 "FirefoxHome": {
2376 "Search": true | false,
2377 "TopSites": true | false,
2378 "Highlights": true | false,
2379 "Pocket": true | false,
2380 "Snippets": true | false,
2381 "Locked": true | false
2382 }
2383 }
2384 }
2385 ```
2386 ### HardwareAcceleration
2387 Control hardware acceleration.
2388
2389 **Compatibility:** Firefox 60, Firefox ESR 60\
2390 **CCK2 Equivalent:** N/A\
2391 **Preferences Affected:** `layers.acceleration.disabled`
2392
2393 #### Windows (GPO)
2394 ```
2395 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2396 ```
2397 #### Windows (Intune)
2398 OMA-URI:
2399 ```
2400 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2401 ```
2402 Value (string):
2403 ```
2404 <enabled/> or <disabled/>
2405 ```
2406 #### macOS
2407 ```
2408 <dict>
2409 <key>HardwareAcceleration</key>
2410 <true/> | <false/>
2411 </dict>
2412 ```
2413 #### policies.json
2414 ```
2415 {
2416 "policies": {
2417 "HardwareAcceleration": true | false
2418 }
2419 }
2420 ```
2421 ### Homepage
2422 Configure the default homepage and how Firefox starts.
2423
2424 `URL` is the default homepage.
2425
2426 `Locked` prevents the user from changing homepage preferences.
2427
2428 `Additional` allows for more than one homepage.
2429
2430 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2431
2432 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
2433 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2434 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2435
2436 #### Windows (GPO)
2437 ```
2438 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2439 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2440 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2441 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2442 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
2443 ```
2444 #### Windows (Intune)
2445 OMA-URI:
2446 ```
2447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2448 ```
2449 Value (string):
2450 ```
2451 <enabled/>
2452
2453 <data id="HomepageURL" value="https://example.com"/>
2454 <data id="HomepageLocked" value="true | false"/>
2455 ```
2456 OMA-URI:
2457 ```
2458 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2459 ```
2460 Value (string):
2461 ```
2462 <enabled/>
2463
2464 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2465 ```
2466 OMA-URI:
2467 ```
2468 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2469 ```
2470 Value (string):
2471 ```
2472 <enabled/>
2473
2474 <data id="StartPage" value="none | homepage | previous-session"/>
2475 ```
2476 #### macOS
2477 ```
2478 <dict>
2479 <key>Homepage</key>
2480 <dict>
2481 <key>URL</key>
2482 <string>http://example.com</string>
2483 <key>Locked</key>
2484 <true/> | <false/>
2485 <key>Additional</key>
2486 <array>
2487 <string>http://example.org</string>
2488 <string>http://example.edu</string>
2489 </array>
2490 <key>StartPage</key>
2491 <string>none | homepage | previous-session</string>
2492 </dict>
2493 </dict>
2494 ```
2495 #### policies.json
2496 ```
2497 {
2498 "policies": {
2499 "Homepage": {
2500 "URL": "http://example.com/",
2501 "Locked": true | false,
2502 "Additional": ["http://example.org/",
2503 "http://example.edu/"],
2504 "StartPage": "none" | "homepage" | "previous-session"
2505 }
2506 }
2507 }
2508 ```
2509 ### InstallAddonsPermission
2510 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2511
2512 `Allow` is a list of origins where extension installs are allowed.
2513
2514 `Default` determines whether or not extension installs are allowed by default.
2515
2516 **Compatibility:** Firefox 60, Firefox ESR 60\
2517 **CCK2 Equivalent:** `permissions.install`\
2518 **Preferences Affected:** `xpinstall.enabled`
2519
2520 #### Windows (GPO)
2521 ```
2522 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2523 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2524 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2525 ```
2526 #### Windows (Intune)
2527 OMA-URI:
2528 ```
2529 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2530 ```
2531 Value (string):
2532 ```
2533 <enabled/>
2534 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2535 ```
2536 OMA-URI:
2537 ```
2538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2539 ```
2540 Value (string):
2541 ```
2542 <enabled/>
2543 ```
2544 #### macOS
2545 ```
2546 <dict>
2547 <key>InstallAddonsPermission</key>
2548 <dict>
2549 <key>Allow</key>
2550 <array>
2551 <string>http://example.org</string>
2552 <string>http://example.edu</string>
2553 </array>
2554 <key>Default</key>
2555 <true/> | <false/>
2556 </dict>
2557 </dict>
2558 ```
2559 #### policies.json
2560 ```
2561 {
2562 "policies": {
2563 "InstallAddonsPermission": {
2564 "Allow": ["http://example.org/",
2565 "http://example.edu/"],
2566 "Default": true | false
2567 }
2568 }
2569 }
2570 ```
2571 ### LegacyProfiles
2572 Disable the feature enforcing a separate profile for each installation.
2573
2574 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2575
2576 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2577
2578 This policy only work on Windows via GPO (not policies.json).
2579
2580 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2581 **CCK2 Equivalent:** N/A\
2582 **Preferences Affected:** N/A
2583
2584 #### Windows (GPO)
2585 ```
2586 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2587 ```
2588 #### Windows (Intune)
2589 OMA-URI:
2590 ```
2591 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2592 ```
2593 Value (string):
2594 ```
2595 <enabled/> or <disabled/>
2596 ```
2597 ### LocalFileLinks
2598 Enable linking to local files by origin.
2599
2600 **Compatibility:** Firefox 68, Firefox ESR 68\
2601 **CCK2 Equivalent:** N/A\
2602 **Preferences Affected:** `capability.policy.localfilelinks.*`
2603
2604 #### Windows (GPO)
2605 ```
2606 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2607 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2608 ```
2609 #### Windows (Intune)
2610 OMA-URI:
2611 ```
2612 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2613 ```
2614 Value (string):
2615 ```
2616 <enabled/>
2617 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2618 ```
2619 #### macOS
2620 ```
2621 <dict>
2622 <key>LocalFileLinks</key>
2623 <array>
2624 <string>http://example.org</string>
2625 <string>http://example.edu</string>
2626 </array>
2627 </dict>
2628 ```
2629 #### policies.json
2630 ```
2631 {
2632 "policies": {
2633 "LocalFileLinks": ["http://example.org/",
2634 "http://example.edu/"]
2635 }
2636 }
2637 ```
2638 ### NetworkPrediction
2639 Enable or disable network prediction (DNS prefetching).
2640
2641 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2642 **CCK2 Equivalent:** N/A\
2643 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2644
2645 #### Windows (GPO)
2646 ```
2647 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2648 ```
2649 #### Windows (Intune)
2650 OMA-URI:
2651 ```
2652 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2653 ```
2654 Value (string):
2655 ```
2656 <enabled/> or <disabled/>
2657 ```
2658 #### macOS
2659 ```
2660 <dict>
2661 <key>NetworkPrediction</key>
2662 <true/> | <false/>
2663 </dict>
2664 ```
2665 #### policies.json
2666 ```
2667 {
2668 "policies": {
2669 "NetworkPrediction": true | false
2670 }
2671 ```
2672 ### NewTabPage
2673 Enable or disable the New Tab page.
2674
2675 **Compatibility:** Firefox 68, Firefox ESR 68\
2676 **CCK2 Equivalent:** N/A\
2677 **Preferences Affected:** `browser.newtabpage.enabled`
2678
2679 #### Windows (GPO)
2680 ```
2681 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2682 ```
2683 #### Windows (Intune)
2684 OMA-URI:
2685 ```
2686 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2687 ```
2688 Value (string):
2689 ```
2690 <enabled/> or <disabled/>
2691 ```
2692 #### macOS
2693 ```
2694 <dict>
2695 <key>NewTabPage</key>
2696 <true/> | <false/>
2697 </dict>
2698 ```
2699 #### policies.json
2700 ```
2701 {
2702 "policies": {
2703 "NewTabPage": true | false
2704 }
2705 ```
2706 ### NoDefaultBookmarks
2707 Disable the creation of default bookmarks.
2708
2709 This policy is only effective if the user profile has not been created yet.
2710
2711 **Compatibility:** Firefox 60, Firefox ESR 60\
2712 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2713 **Preferences Affected:** N/A
2714
2715 #### Windows (GPO)
2716 ```
2717 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2718 ```
2719 #### Windows (Intune)
2720 OMA-URI:
2721 ```
2722 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2723 ```
2724 Value (string):
2725 ```
2726 <enabled/> or <disabled/>
2727 ```
2728 #### macOS
2729 ```
2730 <dict>
2731 <key>NoDefaultBookmarks</key>
2732 <true/> | <false/>
2733 </dict>
2734 ```
2735 #### policies.json
2736 ```
2737 {
2738 "policies": {
2739 "NoDefaultBookmarks": true | false
2740 }
2741 }
2742 ```
2743 ### OfferToSaveLogins
2744 Control whether or not Firefox offers to save passwords.
2745
2746 **Compatibility:** Firefox 60, Firefox ESR 60\
2747 **CCK2 Equivalent:** `dontRememberPasswords`\
2748 **Preferences Affected:** `signon.rememberSignons`
2749
2750 #### Windows (GPO)
2751 ```
2752 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2753 ```
2754 #### Windows (Intune)
2755 OMA-URI:
2756 ```
2757 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2758 ```
2759 Value (string):
2760 ```
2761 <enabled/> or <disabled/>
2762 ```
2763 #### macOS
2764 ```
2765 <dict>
2766 <key>OfferToSaveLogins</key>
2767 <true/> | <false/>
2768 </dict>
2769 ```
2770 #### policies.json
2771 ```
2772 {
2773 "policies": {
2774 "OfferToSaveLogins": true | false
2775 }
2776 }
2777 ```
2778 ### OfferToSaveLoginsDefault
2779 Sets the default value of signon.rememberSignons without locking it.
2780
2781 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2782 **CCK2 Equivalent:** `dontRememberPasswords`\
2783 **Preferences Affected:** `signon.rememberSignons`
2784
2785 #### Windows (GPO)
2786 ```
2787 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2788 ```
2789 #### Windows (Intune)
2790 OMA-URI:
2791 ```
2792 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2793 ```
2794 Value (string):
2795 ```
2796 <enabled/> or <disabled/>
2797 ```
2798 #### macOS
2799 ```
2800 <dict>
2801 <key>OfferToSaveLoginsDefault</key>
2802 <true/> | <false/>
2803 </dict>
2804 ```
2805 #### policies.json
2806 ```
2807 {
2808 "policies": {
2809 "OfferToSaveLoginsDefault": true | false
2810 }
2811 }
2812 ```
2813 ### OverrideFirstRunPage
2814 Override the first run page. If the value is blank, no first run page is displayed.
2815
2816 **Compatibility:** Firefox 60, Firefox ESR 60\
2817 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2818 **Preferences Affected:** `startup.homepage_welcome_url`
2819
2820 #### Windows (GPO)
2821 ```
2822 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2823 ```
2824 #### Windows (Intune)
2825 OMA-URI:
2826 ```
2827 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2828 ```
2829 Value (string):
2830 ```
2831 <enabled/>
2832 <data id="OverridePage" value="https://example.com"/>
2833 ```
2834 #### macOS
2835 ```
2836 <dict>
2837 <key>OverrideFirstRunPage</key>
2838 <string>http://example.org</string>
2839 </dict>
2840 ```
2841 #### policies.json
2842 ```
2843 {
2844 "policies": {
2845 "OverrideFirstRunPage": "http://example.org"
2846 }
2847 ```
2848 ### OverridePostUpdatePage
2849 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2850
2851 **Compatibility:** Firefox 60, Firefox ESR 60\
2852 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2853 **Preferences Affected:** `startup.homepage_override_url`
2854
2855 #### Windows (GPO)
2856 ```
2857 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2858 ```
2859 #### Windows (Intune)
2860 OMA-URI:
2861 ```
2862 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2863 ```
2864 Value (string):
2865 ```
2866 <enabled/>
2867 <data id="OverridePage" value="https://example.com"/>
2868 ```
2869 #### macOS
2870 ```
2871 <dict>
2872 <key>OverridePostUpdatePage</key>
2873 <string>http://example.org</string>
2874 </dict>
2875 ```
2876 #### policies.json
2877 ```
2878 {
2879 "policies": {
2880 "OverridePostUpdatePage": "http://example.org"
2881 }
2882 ```
2883 ### PasswordManagerEnabled
2884 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2885
2886 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2887 **CCK2 Equivalent:** N/A\
2888 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2889
2890 #### Windows (GPO)
2891 ```
2892 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2893 ```
2894 #### Windows (Intune)
2895 OMA-URI:
2896 ```
2897 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
2898 ```
2899 Value (string):
2900 ```
2901 <enabled/> or <disabled/>
2902 ```
2903 #### macOS
2904 ```
2905 <dict>
2906 <key>PasswordManagerEnabled</key>
2907 <true/> | <false/>
2908 </dict>
2909 ```
2910 #### policies.json
2911 ```
2912 {
2913 "policies": {
2914 "PasswordManagerEnabled": true | false
2915 }
2916 }
2917 ```
2918 ### Permissions
2919 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2920
2921 `Allow` is a list of origins where the feature is allowed.
2922
2923 `Block` is a list of origins where the feature is not allowed.
2924
2925 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2926
2927 `Locked` prevents the user from changing preferences for the feature.
2928
2929 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
2930
2931 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
2932 **CCK2 Equivalent:** N/A\
2933 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
2934
2935 #### Windows (GPO)
2936 ```
2937 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2938 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2939 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2940 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2941 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2942 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2943 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2944 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2945 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2946 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2947 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2948 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2949 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2950 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2951 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2952 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2953 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2954 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2955 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2956 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
2957 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
2958 ```
2959 #### Windows (Intune)
2960 OMA-URI:
2961 ```
2962 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
2963 ```
2964 Value (string):
2965 ```
2966 <enabled/> or <disabled/>
2967 ```
2968 OMA-URI:
2969 ```
2970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
2971 ```
2972 Value (string):
2973 ```
2974 <enabled/> or <disabled/>
2975 ```
2976 OMA-URI:
2977 ```
2978 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
2979 ```
2980 Value (string):
2981 ```
2982 <enabled/>
2983 <data id="Permissions" value="1&#xF000;https://example.org"/>
2984 ```
2985 OMA-URI:
2986 ```
2987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
2988 ```
2989 Value (string):
2990 ```
2991 <enabled/> or <disabled/>
2992 ```
2993 OMA-URI:
2994 ```
2995 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
2996 ```
2997 Value (string):
2998 ```
2999 <enabled/> or <disabled/>
3000 ```
3001 OMA-URI:
3002 ```
3003 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3004 ```
3005 Value (string):
3006 ```
3007 <enabled/>
3008 <data id="Permissions" value="1&#xF000;https://example.org"/>
3009 ```
3010 OMA-URI:
3011 ```
3012 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3013 ```
3014 Value (string):
3015 ```
3016 <enabled/>
3017 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3018 ```
3019 OMA-URI:
3020 ```
3021 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3022 ```
3023 Value (string):
3024 ```
3025 <enabled/>
3026 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3027 ```
3028 OMA-URI:
3029 ```
3030 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3031 ```
3032 Value (string):
3033 ```
3034 <enabled/> or <disabled/>
3035 ```
3036 #### macOS
3037 ```
3038 <dict>
3039 <key>Permissions</key>
3040 <dict>
3041 <key>Camera</key>
3042 <dict>
3043 <key>Allow</key>
3044 <array>
3045 <string>https://example.org</string>
3046 <string>https://example.org:1234</string>
3047 </array>
3048 <key>Block</key>
3049 <array>
3050 <string>https://example.edu</string>
3051 </array>
3052 <key>BlockNewRequests</key>
3053 <true/> | <false/>
3054 <key>Locked</key>
3055 <true/> | <false/>
3056 </dict>
3057 <key>Microphone</key>
3058 <dict>
3059 <key>Allow</key>
3060 <array>
3061 <string>https://example.org</string>
3062 </array>
3063 <key>Block</key>
3064 <array>
3065 <string>https://example.edu</string>
3066 </array>
3067 <key>BlockNewRequests</key>
3068 <true/> | <false/>
3069 <key>Locked</key>
3070 <true/> | <false/>
3071 </dict>
3072 <key>Location</key>
3073 <dict>
3074 <key>Allow</key>
3075 <array>
3076 <string>https://example.org</string>
3077 </array>
3078 <key>Block</key>
3079 <array>
3080 <string>https://example.edu</string>
3081 </array>
3082 <key>BlockNewRequests</key>
3083 <true/> | <false/>
3084 <key>Locked</key>
3085 <true/> | <false/>
3086 </dict>
3087 <key>Notifications</key>
3088 <dict>
3089 <key>Allow</key>
3090 <array>
3091 <string>https://example.org</string>
3092 </array>
3093 <key>Block</key>
3094 <array>
3095 <string>https://example.edu</string>
3096 </array>
3097 <key>BlockNewRequests</key>
3098 <true/>
3099 <key>Locked</key>
3100 <true/>
3101 </dict>
3102 <key>Autoplay</key>
3103 <dict>
3104 <key>Allow</key>
3105 <array>
3106 <string>https://example.org</string>
3107 </array>
3108 <key>Block</key>
3109 <array>
3110 <string>https://example.edu</string>
3111 </array>
3112 <key>Default</key>
3113 <string>allow-audio-video | block-audio | block-audio-video</string>
3114 <key>Locked</key>
3115 <true/> | <false/>
3116 </dict>
3117 </dict>
3118 </dict>
3119 ```
3120 #### policies.json
3121 ```
3122 {
3123 "policies": {
3124 "Permissions": {
3125 "Camera": {
3126 "Allow": ["https://example.org","https://example.org:1234"],
3127 "Block": ["https://example.edu"],
3128 "BlockNewRequests": true | false,
3129 "Locked": true | false
3130 },
3131 "Microphone": {
3132 "Allow": ["https://example.org"],
3133 "Block": ["https://example.edu"],
3134 "BlockNewRequests": true | false,
3135 "Locked": true | false
3136 },
3137 "Location": {
3138 "Allow": ["https://example.org"],
3139 "Block": ["https://example.edu"],
3140 "BlockNewRequests": true | false,
3141 "Locked": true | false
3142 },
3143 "Notifications": {
3144 "Allow": ["https://example.org"],
3145 "Block": ["https://example.edu"],
3146 "BlockNewRequests": true | false,
3147 "Locked": true | false
3148 },
3149 "Autoplay": {
3150 "Allow": ["https://example.org"],
3151 "Block": ["https://example.edu"],
3152 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3153 "Locked": true | false
3154 }
3155 }
3156 }
3157 }
3158 ```
3159 ### PopupBlocking
3160 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3161
3162 `Allow` is a list of origins where popup-windows are allowed.
3163
3164 `Default` determines whether or not pop-up windows are allowed by default.
3165
3166 `Locked` prevents the user from changing pop-up preferences.
3167
3168 **Compatibility:** Firefox 60, Firefox ESR 60\
3169 **CCK2 Equivalent:** `permissions.popup`\
3170 **Preferences Affected:** `dom.disable_open_during_load`
3171
3172 #### Windows (GPO)
3173 ```
3174 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3175 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3176 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3177 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3178 ```
3179 #### Windows (Intune)
3180 OMA-URI:
3181 ```
3182 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3183 ```
3184 Value (string):
3185 ```
3186 <enabled/>
3187 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3188 ```
3189 OMA-URI:
3190 ```
3191 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3192 ```
3193 Value (string):
3194 ```
3195 <enabled/> or <disabled/>
3196 ```
3197 OMA-URI:
3198 ```
3199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3200 ```
3201 Value (string):
3202 ```
3203 <enabled/> or <disabled/>
3204 ```
3205 #### macOS
3206 ```
3207 <dict>
3208 <key>PopupBlocking</key>
3209 <dict>
3210 <key>Allow</key>
3211 <array>
3212 <string>http://example.org</string>
3213 <string>http://example.edu</string>
3214 </array>
3215 <key>Default</key>
3216 <true/> | <false/>
3217 <key>Locked</key>
3218 <true/> | <false/>
3219 </dict>
3220 </dict>
3221 ```
3222 #### policies.json
3223 ```
3224 {
3225 "policies": {
3226 "PopupBlocking": {
3227 "Allow": ["http://example.org/",
3228 "http://example.edu/"],
3229 "Default": true | false,
3230 "Locked": true | false
3231 }
3232 }
3233 }
3234 ```
3235 ### Preferences
3236 Set and lock certain preferences.
3237
3238 **Compatibility:** See below\
3239 **CCK2 Equivalent:** `preferences`\
3240 **Preferences Affected:** See below
3241
3242 | Preference | Type | Compatibility | Default
3243 | --- | --- | --- | ---
3244 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3245 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3246 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3247 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3248 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3249 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3250 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3251 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3252 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3253 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3254 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3255 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3256 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3257 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3258 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3259 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3260 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3261 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3262 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3263 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3264 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3265 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3266 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3267 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3268 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3269 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3270 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3271 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3272 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3273 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3274 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3275 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3276 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3277 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3278 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3279 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3280 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3281 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3282 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3283 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3284 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3285 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3286 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3287 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3288 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3289 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3290 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3291 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3292 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3293 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3294 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3295 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3296 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3297 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3298 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3299 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3300 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3301 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3302 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3303 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3304 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3305 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3306 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3307 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3308 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3309 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3310 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3311 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3312 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3313 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3314 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3315 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3316 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3317 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3318 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3319 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3320 disabled
3321 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3322 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3323 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3324 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3325 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3326 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3327 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3328 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3329 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3330 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3331 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3332 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3333 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3334 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3335 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3336 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3337 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3338 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3339 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3340 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3341 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3342 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3343 #### Windows (GPO)
3344 ```
3345 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3346 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3347 ```
3348 #### Windows (Intune)
3349 OMA-URI: (periods are replaced by underscores)
3350 ```
3351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3352 ```
3353 Value (string):
3354 ```
3355 <enabled/> or <disabled/>
3356 ```
3357 #### macOS
3358 ```
3359 <dict>
3360 <key>Preferences</key>
3361 <dict>
3362 <key>boolean_preference_name</key>
3363 <true/> | <false/>
3364 <key>string_preference_name</key>
3365 <string>string_value</string>
3366 </dict>
3367 </dict>
3368 ```
3369 #### policies.json
3370 ```
3371 {
3372 "policies": {
3373 "Preferences": {
3374 "boolean_preference_name": true | false,
3375 "string_preference_name": "string_value"
3376 }
3377 }
3378 }
3379 ```
3380 ### PromptForDownloadLocation
3381 Ask where to save each file before downloading.
3382
3383 **Compatibility:** Firefox 68, Firefox ESR 68\
3384 **CCK2 Equivalent:** N/A\
3385 **Preferences Affected:** `browser.download.useDownloadDir`
3386
3387 #### Windows (GPO)
3388 ```
3389 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3390 ```
3391 #### Windows (Intune)
3392 OMA-URI:
3393 ```
3394 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3395 ```
3396 Value (string):
3397 ```
3398 <enabled/> or <disabled/>
3399 ```
3400 #### macOS
3401 ```
3402 <dict>
3403 <key>PromptForDownloadLocation</key>
3404 <true/> | <false/>
3405 </dict>
3406 ```
3407 #### policies.json
3408 ```
3409 {
3410 "policies": {
3411 "PromptForDownloadLocation": true | false
3412 }
3413 }
3414 ```
3415 ### Proxy
3416 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3417 To specify ports, append them to the hostnames with a colon (:).
3418
3419 `Mode` is the proxy method being used.
3420
3421 `Locked` is whether or not proxy settings can be changed.
3422
3423 `HTTPProxy` is the HTTP proxy server.
3424
3425 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3426
3427 `SSLProxy` is the SSL proxy server.
3428
3429 `FTPProxy` is the FTP proxy server.
3430
3431 `SOCKSProxy` is the SOCKS proxy server
3432
3433 `SOCKSVersion` is the SOCKS version (4 or 5)
3434
3435 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3436
3437 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3438
3439 `AutoLogin` means do not prompt for authentication if password is saved.
3440
3441 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3442
3443 **Compatibility:** Firefox 60, Firefox ESR 60\
3444 **CCK2 Equivalent:** `networkProxy*`\
3445 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3446
3447 #### Windows (GPO)
3448 ```
3449 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3450 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3451 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3452 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3453 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3454 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3455 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3456 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3457 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3458 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3459 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3460 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3461 ```
3462 #### Windows (Intune)
3463 OMA-URI:
3464 ```
3465 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3466 ```
3467 Value (string):
3468 ```
3469 <enabled/>
3470 <data id="ProxyLocked" value="true | false"/>
3471 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3472 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3473 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3474 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3475 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3476 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3477 <data id="SOCKSVersion" value="4 | 5"/>
3478 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3479 <data id="Passthrough" value="<local>"/>
3480 <data id="AutoLogin" value="true | false"/>
3481 <data id="UseProxyForDNS" value="true | false"/>
3482 ```
3483 #### macOS
3484 ```
3485 <dict>
3486 <key>Proxy</key>
3487 <dict>
3488 <key>Mode</key>
3489 <string>none | system | manual | autoDetect | autoConfig</string>
3490 <key>Locked</key>
3491 <true> | </false>
3492 <key>HTTPProxy</key>
3493 <string>https://httpproxy.example.com</string>
3494 <key>UseHTTPProxyForAllProtocols</key>
3495 <true> | </false>
3496 <key>SSLProxy</key>
3497 <string>https://sslproxy.example.com</string>
3498 <key>FTPProxy</key>
3499 <string>https://ftpproxy.example.com</string>
3500 <key>SOCKSProxy</key>
3501 <string>https://socksproxy.example.com</string>
3502 <key>SOCKSVersion</key>
3503 <string>4 | 5</string>
3504 <key>Passthrough</key>
3505 <string>&lt;local>&gt;</string>
3506 <key>AutoConfigURL</key>
3507 <string>URL_TO_AUTOCONFIG</string>
3508 <key>AutoLogin</key>
3509 <true> | </false>
3510 <key>UseProxyForDNS</key>
3511 <true> | </false>
3512 </dict>
3513 </dict>
3514 ```
3515 #### policies.json
3516 ```
3517 {
3518 "policies": {
3519 "Proxy": {
3520 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3521 "Locked": [true, false],
3522 "HTTPProxy": "hostname",
3523 "UseHTTPProxyForAllProtocols": [true, false],
3524 "SSLProxy": "hostname",
3525 "FTPProxy": "hostname",
3526 "SOCKSProxy": "hostname",
3527 "SOCKSVersion": 4 | 5
3528 "Passthrough": "<local>",
3529 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3530 "AutoLogin": [true, false],
3531 "UseProxyForDNS": [true, false]
3532 }
3533 }
3534 }
3535 ```
3536 ### RequestedLocales
3537 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3538
3539 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3540
3541 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3542 **CCK2 Equivalent:** N/A\
3543 **Preferences Affected:** N/A
3544 #### Windows (GPO)
3545 ```
3546 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3547 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3548
3549 or
3550
3551 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3552 ```
3553 #### Windows (Intune)
3554 OMA-URI:
3555 ```
3556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3557 ```
3558 Value (string):
3559 ```
3560 <enabled/>
3561 <data id="Preferences_String" value="de,en-US"/>
3562 ```
3563 #### macOS
3564 ```
3565 <dict>
3566 <key>RequestedLocales</key>
3567 <array>
3568 <string>de</string>
3569 <string>en-US</string>
3570 </array>
3571 </dict>
3572
3573 or
3574
3575 <dict>
3576 <key>RequestedLocales</key>
3577 <string>de,en-US</string>
3578 </dict>
3579
3580 ```
3581 #### policies.json
3582 ```
3583 {
3584 "policies": {
3585 "RequestedLocales": ["de", "en-US"]
3586 }
3587 }
3588
3589 or
3590
3591 {
3592 "policies": {
3593 "RequestedLocales": "de,en-US"
3594 }
3595 }
3596 ```
3597 <a name="SanitizeOnShutdown"></a>
3598
3599 ### SanitizeOnShutdown (Selective)
3600 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3601
3602 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3603
3604 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3605 **CCK2 Equivalent:** N/A\
3606 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3607 #### Windows (GPO)
3608 ```
3609 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3610 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3611 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3612 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3613 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3614 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3615 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3616 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3617 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3618 ```
3619 #### Windows (Intune)
3620 OMA-URI:
3621 ```
3622 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3623 ```
3624 Value (string):
3625 ```
3626 <enabled/> or <disabled/>
3627 ```
3628 #### macOS
3629 ```
3630 <dict>
3631 <key>SanitizeOnShutdown</key>
3632 <dict>
3633 <key>Cache</key>
3634 <true/> | <false/>
3635 <key>Cookies</key>
3636 <true/> | <false/>
3637 <key>Downloads</key>
3638 <true/> | <false/>
3639 <key>FormData</key>
3640 <true/> | <false/>
3641 <key>History</key>
3642 <true/> | <false/>
3643 <key>Sessions</key>
3644 <true/> | <false/>
3645 <key>SiteSettings</key>
3646 <true/> | <false/>
3647 <key>OfflineApps</key>
3648 <true/> | <false/>
3649 <key>Locked</key>
3650 <true/> | <false/>
3651 </dict>
3652 </dict>
3653 ```
3654 #### policies.json
3655 ```
3656 {
3657 "policies": {
3658 "SanitizeOnShutdown": {
3659 "Cache": true | false,
3660 "Cookies": true | false,
3661 "Downloads": true | false,
3662 "FormData": true | false,
3663 "History": true | false,
3664 "Sessions": true | false,
3665 "SiteSettings": true | false,
3666 "OfflineApps": true | false,
3667 "Locked": true | false
3668 }
3669 }
3670 }
3671 ```
3672 ### SanitizeOnShutdown (All)
3673 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3674
3675 **Compatibility:** Firefox 60, Firefox ESR 60\
3676 **CCK2 Equivalent:** N/A\
3677 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3678 #### Windows (GPO)
3679 ```
3680 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3681 ```
3682 #### Windows (Intune)
3683 OMA-URI:
3684 ```
3685 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3686 ```
3687 Value (string):
3688 ```
3689 <enabled/> or <disabled/>
3690 ```
3691 #### macOS
3692 ```
3693 <dict>
3694 <key>SanitizeOnShutdown</key>
3695 <true/> | <false/>
3696 </dict>
3697 ```
3698 #### policies.json
3699 ```
3700 {
3701 "policies": {
3702 "SanitizeOnShutdown": true | false
3703 }
3704 }
3705 ```
3706 ### SearchBar
3707 Set whether or not search bar is displayed.
3708
3709 **Compatibility:** Firefox 60, Firefox ESR 60\
3710 **CCK2 Equivalent:** `showSearchBar`\
3711 **Preferences Affected:** N/A
3712
3713 #### Windows (GPO)
3714 ```
3715 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3716 ```
3717
3718 #### Windows (Intune)
3719 OMA-URI:
3720 ```
3721 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3722 ```
3723 Value (string):
3724 ```
3725 <enabled/>
3726 <data id="Permissions" value="unified | separate"/>
3727 #### macOS
3728 ```
3729 <dict>
3730 <key>SearchBar</key>
3731 <string>unified | separate</string>
3732 </dict>
3733 ```
3734 #### policies.json
3735 ```
3736 {
3737 "policies": {
3738 "SearchBar": "unified" | "separate"
3739 }
3740 }
3741 ```
3742 <a name="SearchEngines"></a>
3743
3744 ### SearchEngines (This policy is only available on the ESR.)
3745
3746 ### SearchEngines | Default
3747
3748 Set the default search engine. This policy is only available on the ESR.
3749
3750 **Compatibility:** Firefox ESR 60\
3751 **CCK2 Equivalent:** `defaultSearchEngine`\
3752 **Preferences Affected:** N/A
3753
3754 #### Windows (GPO)
3755 ```
3756 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3757 ```
3758 #### Windows (Intune)
3759 OMA-URI:
3760 ```
3761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3762 ```
3763 Value (string):
3764 ```
3765 <enabled/>
3766 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3767 ```
3768 #### macOS
3769 ```
3770 <dict>
3771 <key>SearchEngines</key>
3772 <dict>
3773 <key>Default</key>
3774 <string>NAME_OF_SEARCH_ENGINE</string>
3775 </dict>
3776 </dict>
3777 ```
3778 #### policies.json
3779 ```
3780 {
3781 "policies": {
3782 "SearchEngines": {
3783 "Default": "NAME_OF_SEARCH_ENGINE"
3784 }
3785 }
3786 }
3787 ```
3788 ### SearchEngines | PreventInstalls
3789
3790 Prevent installing search engines from webpages.
3791
3792 **Compatibility:** Firefox ESR 60\
3793 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3794 **Preferences Affected:** N/A
3795
3796 #### Windows (GPO)
3797 ```
3798 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3799 ```
3800 #### Windows (Intune)
3801 OMA-URI:
3802 ```
3803 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3804 ```
3805 Value (string):
3806 ```
3807 <enabled/> or <disabled/>
3808 ```
3809 #### macOS
3810 ```
3811 <dict>
3812 <key>SearchEngines</key>
3813 <dict>
3814 <key>PreventInstalls</key>
3815 <true/> | <false/>
3816 </dict>
3817 </dict>
3818 ```
3819 #### policies.json
3820 ```
3821 {
3822 "policies": {
3823 "SearchEngines": {
3824 "PreventInstalls": true | false
3825 }
3826 }
3827 }
3828 ```
3829 ### SearchEngines | Remove
3830
3831 Hide built-in search engines. This policy is only available on the ESR.
3832
3833 **Compatibility:** Firefox ESR 60.2\
3834 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
3835 **Preferences Affected:** N/A
3836
3837 #### Windows (GPO)
3838 ```
3839 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
3840 ```
3841 #### Windows (Intune)
3842 OMA-URI:
3843 ```
3844 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
3845 ```
3846 Value (string):
3847 ```
3848 <enabled/>
3849 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
3850 ```
3851 #### macOS
3852 ```
3853 <dict>
3854 <key>SearchEngines</key>
3855 <dict>
3856 <key>Remove</key>
3857 <array>
3858 <string>NAME_OF_SEARCH_ENGINE</string>
3859 </array>
3860 </dict>
3861 </dict>
3862 ```
3863 #### policies.json
3864 ```
3865 {
3866 "policies": {
3867 "SearchEngines": {
3868 "Remove": ["NAME_OF_SEARCH_ENGINE"]
3869 }
3870 }
3871 }
3872 ```
3873 ### SearchEngines | Add
3874
3875 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
3876
3877 `Name` is the name of the search engine.
3878
3879 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
3880
3881 `Method` is either GET or POST
3882
3883 `IconURL` is a URL for the icon to use.
3884
3885 `Alias` is a keyword to use for the engine.
3886
3887 `Description` is a description of the search engine.
3888
3889 `PostData` is the POST data as name value pairs separated by &.
3890
3891 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
3892
3893 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
3894 **CCK2 Equivalent:** `searchplugins`\
3895 **Preferences Affected:** N/A
3896
3897 #### Windows (GPO)
3898 ```
3899 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
3900 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
3901 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
3902 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
3903 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
3904 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
3905 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
3906 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
3907 ```
3908 #### Windows (Intune)
3909 OMA-URI:
3910 ```
3911 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
3912 ```
3913 Value (string):
3914 ```
3915 <enabled/>
3916 <data id="SearchEngine_Name" value="Example1"/>
3917 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
3918 <data id="SearchEngine_Method" value="GET | POST"/>
3919 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
3920 <data id="SearchEngine_Alias" value="example"/>
3921 <data id="SearchEngine_Description" value="Example Description"/>
3922 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
3923 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
3924 ```
3925 #### macOS
3926 ```
3927 <dict>
3928 <key>SearchEngines</key>
3929 <dict>
3930 <key>Add</key>
3931 <array>
3932 <dict>
3933 <key>Name</key>
3934 <string>Example1</string>
3935 <key>URLTemplate</key>
3936 <string>https://www.example.org/q={searchTerms}</string>
3937 <key>Method</key>
3938 <string>GET | POST </string>
3939 <key>IconURL</key>
3940 <string>https://www.example.org/favicon.ico</string>
3941 <key>Alias</key>
3942 <string>example</string>
3943 <key>Description</key>
3944 <string>Example Description</string>
3945 <key>SuggestURLTemplate</key>
3946 <string>https://www.example.org/suggestions/q={searchTerms}</string>
3947 <key>PostData</key>
3948 <string>name=value&q={searchTerms}</string>
3949 </dict>
3950 <array>
3951 </dict>
3952 </dict>
3953 ```
3954 #### policies.json
3955 ```
3956 {
3957 "policies": {
3958 "SearchEngines": {
3959 "Add": [
3960 {
3961 "Name": "Example1",
3962 "URLTemplate": "https://www.example.org/q={searchTerms}",
3963 "Method": "GET" | "POST",
3964 "IconURL": "https://www.example.org/favicon.ico",
3965 "Alias": "example",
3966 "Description": "Description",
3967 "PostData": "name=value&q={searchTerms}",
3968 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
3969 }
3970 ]
3971 }
3972 }
3973 }
3974 ```
3975 ### SearchSuggestEnabled
3976
3977 Enable search suggestions.
3978
3979 **Compatibility:** Firefox 68, Firefox ESR 68\
3980 **CCK2 Equivalent:** N/A\
3981 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
3982
3983 #### Windows (GPO)
3984 ```
3985 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
3986 ```
3987 #### Windows (Intune)
3988 OMA-URI:
3989 ```
3990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
3991 ```
3992 Value (string):
3993 ```
3994 <enabled/> or <disabled/>
3995 ```
3996 #### macOS
3997 ```
3998 <dict>
3999 <key>SearchSuggestEnabled</key>
4000 <true/> | <false/>
4001 </dict>
4002 ```
4003 #### policies.json
4004 ```
4005 {
4006 "policies": {
4007 "SearchSuggestEnabled": true | false
4008 }
4009 }
4010 ```
4011 ### SecurityDevices
4012
4013 Install PKCS #11 modules.
4014
4015 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4016 **CCK2 Equivalent:** `certs.devices`\
4017 **Preferences Affected:** N/A
4018
4019 #### Windows (GPO)
4020 ```
4021 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4022 ```
4023 #### Windows (Intune)
4024 OMA-URI:
4025 ```
4026 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4027 ```
4028 Value (string):
4029 ```
4030 <enabled/>
4031 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4032 ```
4033 #### macOS
4034 ```
4035 <dict>
4036 <key>SecurityDevices</key>
4037 <dict>
4038 <key>NAME_OF_DEVICE</key>
4039 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4040 </dict>
4041 </dict>
4042 ```
4043
4044 #### policies.json
4045 ```
4046 {
4047 "policies": {
4048 "SecurityDevices": {
4049 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4050 }
4051 }
4052 }
4053 ```
4054 ### SSLVersionMax
4055
4056 Set and lock the maximum version of TLS.
4057
4058 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4059 **CCK2 Equivalent:** N/A\
4060 **Preferences Affected:** `security.tls.version.max`
4061
4062 #### Windows (GPO)
4063 ```
4064 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4065 ```
4066 #### Windows (Intune)
4067 OMA-URI:
4068 ```
4069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4070 ```
4071 Value (string):
4072 ```
4073 <enabled/>
4074 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4075 ```
4076 #### macOS
4077 ```
4078 <dict>
4079 <key>SSLVersionMax</key>
4080 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4081 </dict>
4082 ```
4083
4084 #### policies.json
4085 ```
4086 {
4087 "policies": {
4088 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4089 }
4090 }
4091 ```
4092 ### SSLVersionMin
4093
4094 Set and lock the minimum version of TLS.
4095
4096 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4097 **CCK2 Equivalent:** N/A\
4098 **Preferences Affected:** `security.tls.version.min`
4099
4100 #### Windows (GPO)
4101 ```
4102 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4103 ```
4104 #### Windows (Intune)
4105 OMA-URI:
4106 ```
4107 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4108 ```
4109 Value (string):
4110 ```
4111 <enabled/>
4112 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4113 ```
4114 #### macOS
4115 ```
4116 <dict>
4117 <key>SSLVersionMin</key>
4118 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4119 </dict>
4120 ```
4121
4122 #### policies.json
4123 ```
4124 {
4125 "policies": {
4126 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4127 }
4128 }
4129 ```
4130 ### SupportMenu
4131 Add a menuitem to the help menu for specifying support information.
4132
4133 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4134 **CCK2 Equivalent:** helpMenu\
4135 **Preferences Affected:** N/A
4136
4137 #### Windows (GPO)
4138 ```
4139 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4140 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4141 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4142 ```
4143 #### Windows (Intune)
4144 OMA-URI:
4145 ```
4146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4147 ```
4148 Value (string):
4149 ```
4150 <enabled/>
4151 <data id="SupportMenuTitle" value="Support Menu"/>
4152 <data id="SupportMenuURL" value="http://example.com/support"/>
4153 <data id="SupportMenuAccessKey" value="S">
4154 ```
4155 #### macOS
4156 ```
4157 <dict>
4158 <key>SupportMenu</key>
4159 <dict>
4160 <key>Title</key>
4161 <string>SupportMenu</string>
4162 <key>URL</key>
4163 <string>http://example.com/support</string>
4164 <key>AccessKey</key>
4165 <string>S</string>
4166 </dict>
4167 </dict>
4168 ```
4169 #### policies.json
4170 ```
4171 {
4172 "policies": {
4173 "SupportMenu": {
4174 "Title": "Support Menu",
4175 "URL": "http://example.com/support",
4176 "AccessKey": "S"
4177 }
4178 }
4179 }
4180 ```
4181 ### UserMessaging
4182
4183 Prevent installing search engines from webpages.
4184
4185 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4186
4187 `ExtensionRecommendations` Don't recommend extensions.
4188
4189 `FeatureRecommendations` Don't recommend browser features.
4190
4191 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4192
4193 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4194 **CCK2 Equivalent:** N/A\
4195 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4196
4197 #### Windows (GPO)
4198 ```
4199 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4200 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4201 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4202 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4203 ```
4204 #### Windows (Intune)
4205 OMA-URI:
4206 ```
4207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4210 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4211 ```
4212 Value (string):
4213 ```
4214 <enabled/> or <disabled/>
4215 ```
4216 #### macOS
4217 ```
4218 <dict>
4219 <key>UserMessaging</key>
4220 <dict>
4221 <key>WhatsNew</key>
4222 <true/> | <false/>
4223 <key>ExtensionRecommendations</key>
4224 <true/> | <false/>
4225 <key>FeatureRecommendations</key>
4226 <true/> | <false/>
4227 <key>UrlbarInterventions</key>
4228 <true/> | <false/>
4229 </dict>
4230 </dict>
4231 ```
4232 #### policies.json
4233 ```
4234 {
4235 "policies": {
4236 "UserMessaging": {
4237 "WhatsNew": true | false,
4238 "ExtensionRecommendations": true | false,
4239 "FeatureRecommendations": true | false,
4240 "UrlbarInterventions": true | false
4241 }
4242 }
4243 }
4244 ```
4245 ### WebsiteFilter
4246 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4247
4248 **Compatibility:** Firefox 60, Firefox ESR 60\
4249 **CCK2 Equivalent:** N/A\
4250 **Preferences Affected:** N/A
4251
4252 #### Windows (GPO)
4253 ```
4254 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4255 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4256 ```
4257 #### Windows (Intune)
4258 OMA-URI:
4259 ```
4260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4261 ```
4262 Value (string):
4263 ```
4264 <enabled/>
4265 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4266 ```
4267 OMA-URI:
4268 ```
4269 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4270 ```
4271 Value (string):
4272 ```
4273 <enabled/>
4274 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4275 ```
4276 #### macOS
4277 ```
4278 <dict>
4279 <key>WebsiteFilter</key>
4280 <dict>
4281 <key>Block</key>
4282 <array>
4283 <string><all_urls></string>
4284 </array>
4285 <key>Exceptions</key>
4286 <array>
4287 <string>http://example.org/*</string>
4288 </array>
4289 </dict>
4290
4291 </dict>
4292 ```
4293 #### policies.json
4294 ```
4295 {
4296 "policies": {
4297 "WebsiteFilter": {
4298 "Block": ["<all_urls>"],
4299 "Exceptions": ["http://example.org/*"]
4300 }
4301 }
4302 }
4303 ```

patrick-canterino.de