]> git.p6c8.net - policy-templates.git/blob - README.md
5791604efb16b41be322e437997a27e2ffa45ac6
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
35 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
38 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
39 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
40 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
41 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
42 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
43 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
44 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
45 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
46 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
47 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
48 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
49 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
50 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
51 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
52 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
53 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
54 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
55 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
56 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
57 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
58 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
59 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
60 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
61 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
62 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
63 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
64 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
65 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
66 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
67 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
68 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
69 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
70 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
71 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
72 | **[`Preferences`](#preferences)** | Set and lock some preferences.
73 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
74 | **[`Proxy`](#proxy)** | Configure proxy settings.
75 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
76 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
77 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
78 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
79 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
80 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
81 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
82 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
83 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
84 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
87 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
88 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
89 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
90 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
91
92 ### AppAutoUpdate
93
94 Enable or disable **automatic** application update.
95
96 If set to true, application updates are installed without user approval.
97
98 If set to false, application updates are downloaded but the user can choose when to install the update.
99
100 If you have disabled updates via DisableAppUpdate, this policy has no effect.
101
102 **Compatibility:** Firefox 75, Firefox ESR 68.7\
103 **CCK2 Equivalent:** N/A\
104 **Preferences Affected:** app.update.auto
105
106 #### Windows (GPO)
107 ```
108 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
109 ```
110 #### macOS
111 ```
112 <dict>
113 <key>AppAutoUpdate</key>
114 <true/> | <false/>
115 </dict>
116 ```
117 #### policies.json
118 ```
119 {
120 "policies": {
121 "AppAutoUpdate": true | false
122 }
123 }
124 ```
125 ### AppUpdateURL
126
127 Change the URL for application update.
128
129 **Compatibility:** Firefox 62, Firefox ESR 60.2\
130 **CCK2 Equivalent:** N/A\
131 **Preferences Affected:** `app.update.url`
132
133 #### Windows (GPO)
134 ```
135 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
136 ```
137 #### macOS
138 ```
139 <dict>
140 <key>AppUpdateURL</key>
141 <string>https://yoursite.com</string>
142 </dict>
143 ```
144 #### policies.json
145 ```
146 {
147 "policies": {
148 "AppUpdateURL": "https://yoursite.com"
149 }
150 }
151 ```
152 ### Authentication
153
154 Configure sites that support integrated authentication.
155
156 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
157
158 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
159 **CCK2 Equivalent:** N/A\
160 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
161
162 #### Windows (GPO)
163 ```
164 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
165 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
166 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
167 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
168 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
169 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
170 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
171 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
172 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
173 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
174 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
175 ```
176 #### macOS
177 ```
178 <dict>
179 <key>Authentication</key>
180 <dict>
181 <key>SPNEGO</key>
182 <array>
183 <string>mydomain.com</string>
184 <string>https://myotherdomain.com</string>
185 </array>
186 <key>Delegated</key>
187 <array>
188 <string>mydomain.com</string>
189 <string>https://myotherdomain.com</string>
190 </array>
191 <key>NTLM</key>
192 <array>
193 <string>mydomain.com</string>
194 <string>https://myotherdomain.com</string>
195 </array>
196 <key>AllowNonFQDN</key>
197 <dict>
198 <key>SPNEGO</key>
199 <true/> | <false/>
200 <key>NTLM</key>
201 <true/> | <false/>
202 </dict>
203 <key>AllowProxies</key>
204 <dict>
205 <key>SPNEGO</key>
206 <true/> | <false/>
207 <key>NTLM</key>
208 <true/> | <false/>
209 </dict>
210 <key>Locked</key>
211 <true/> | <false/>
212 </dict>
213 </dict>
214 ```
215 #### policies.json
216 ```
217 {
218 "policies": {
219 "Authentication": {
220 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
221 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
222 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
223 "AllowNonFQDN": {
224 "SPNEGO": true | false,
225 "NTLM": true | false
226 },
227 "AllowProxies": {
228 "SPNEGO": true | false,
229 "NTLM": true | false
230 },
231 "Locked": true | false
232 }
233 }
234 }
235 ```
236 ### BlockAboutAddons
237
238 Block access to the Add-ons Manager (about:addons).
239
240 **Compatibility:** Firefox 60, Firefox ESR 60\
241 **CCK2 Equivalent:** `disableAddonsManager`\
242 **Preferences Affected:** N/A
243
244 #### Windows (GPO)
245 ```
246 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
247 ```
248 #### macOS
249 ```
250 <dict>
251 <key>BlockAboutAddons</key>
252 <true/> | <false/>
253 </dict>
254 ```
255 #### policies.json
256 ```
257 {
258 "policies": {
259 "BlockAboutAddons": true | false
260 }
261 }
262 ```
263 ### BlockAboutConfig
264
265 Block access to about:config.
266
267 **Compatibility:** Firefox 60, Firefox ESR 60\
268 **CCK2 Equivalent:** `disableAboutConfig`\
269 **Preferences Affected:** N/A
270
271 #### Windows (GPO)
272 ```
273 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
274 ```
275 #### macOS
276 ```
277 <dict>
278 <key>BlockAboutConfig</key>
279 <true/> | <false/>
280 </dict>
281 ```
282 #### policies.json
283 ```
284 {
285 "policies": {
286 "BlockAboutConfig": true | false
287 }
288 }
289 ```
290 ### BlockAboutProfiles
291
292 Block access to About Profiles (about:profiles).
293
294 **Compatibility:** Firefox 60, Firefox ESR 60\
295 **CCK2 Equivalent:** `disableAboutProfiles`\
296 **Preferences Affected:** N/A
297
298 #### Windows (GPO)
299 ```
300 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
301 ```
302 #### macOS
303 ```
304 <dict>
305 <key>BlockAboutProfiles</key>
306 <true/> | <false/>
307 </dict>
308 ```
309 #### policies.json
310 ```
311 {
312 "policies": {
313 "BlockAboutProfiles": true | false
314 }
315 }
316 ```
317 ### BlockAboutSupport
318
319 Block access to Troubleshooting Information (about:support).
320
321 **Compatibility:** Firefox 60, Firefox ESR 60\
322 **CCK2 Equivalent:** `disableAboutSupport`\
323 **Preferences Affected:** N/A
324
325 #### Windows (GPO)
326 ```
327 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
328 ```
329 #### macOS
330 ```
331 <dict>
332 <key>BlockAboutSupport</key>
333 <true/> | <false/>
334 </dict>
335 ```
336 #### policies.json
337 ```
338 {
339 "policies": {
340 "BlockAboutSupport": true | false
341 }
342 }
343 ```
344 ### Bookmarks
345
346 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
347
348 **Compatibility:** Firefox 60, Firefox ESR 60\
349 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
350 **Preferences Affected:** N/A
351
352 #### Windows (GPO)
353 ```
354 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
355 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
356 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
357 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
358 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
359 ```
360 #### macOS
361 ```
362 <dict>
363 <key>Bookmarks</key>
364 <array>
365 <dict>
366 <key>Title</key>
367 <string>Example</string>
368 <key>URL</key>
369 <string>https://example.com</string>
370 <key>Favicon</key>
371 <string>https://example.com/favicon.ico</string>
372 <key>Placement</key>
373 <string>toolbar | menu</string>
374 <key>Folder</key>
375 <string>FolderName</string>
376 </dict>
377 </array>
378 </dict>
379 ```
380 #### policies.json
381 ```
382 {
383 "policies": {
384 "Bookmarks": [
385 {
386 "Title": "Example",
387 "URL": "https://example.com",
388 "Favicon": "https://example.com/favicon.ico",
389 "Placement": "toolbar" | "menu",
390 "Folder": "FolderName"
391 }
392 ]
393 }
394 }
395 ```
396 ### CaptivePortal
397 Enable or disable the detection of captive portals.
398
399 **Compatibility:** Firefox 67, Firefox ESR 60.7\
400 **CCK2 Equivalent:** N/A\
401 **Preferences Affected:** `network.captive-portal-service.enabled`
402
403 #### Windows (GPO)
404 ```
405 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
406 ```
407 #### macOS
408 ```
409 <dict>
410 <key>CaptivePortal</key>
411 <true/> | <false/>
412 </dict>
413 ```
414 #### policies.json
415 ```
416 {
417 "policies": {
418 "CaptivePortal": true | false
419 }
420 }
421 ```
422 ### Certificates
423
424 ### Certificates | ImportEnterpriseRoots
425
426 Trust certificates that have been added to the operating system certificate store by a user or administrator.
427
428 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
429
430 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
431 **CCK2 Equivalent:** N/A\
432 **Preferences Affected:** `security.enterprise_roots.enabled`
433
434 #### Windows (GPO)
435 ```
436 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
437 ```
438 #### macOS
439 ```
440 <dict>
441 <key>Certificates</key>
442 <dict>
443 <key>ImportEnterpriseRoots</key>
444 <true/> | <false/>
445 </dict>
446 </dict>
447 ```
448 #### policies.json
449 ```
450 {
451 "policies": {
452 "Certificates": {
453 "ImportEnterpriseRoots": true | false
454 }
455 }
456 }
457 ```
458 ### Certificates | Install
459
460 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
461
462 - Windows
463 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
464 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
465 - macOS
466 - /Library/Application Support/Mozilla/Certificates
467 - ~/Library/Application Support/Mozilla/Certificates
468 - Linux
469 - /usr/lib/mozilla/certificates
470 - /usr/lib64/mozilla/certificates
471 - ~/.mozilla/certificates
472
473 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
474
475 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
476
477 Certificates are installed using the trust string `CT,CT,`.
478
479 Binary (DER) and ASCII (PEM) certificates are both supported.
480
481 **Compatibility:** Firefox 64, Firefox ESR 64\
482 **CCK2 Equivalent:** `certs.ca`\
483 **Preferences Affected:** N/A
484
485 #### Windows (GPO)
486 ```
487 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
488 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
489 ```
490 #### macOS
491 ```
492 <dict>
493 <key>Certificates</key>
494 <dict>
495 <key>Install</key>
496 <array>
497 <string>cert1.der</string>
498 <string>/Users/username/cert2.pem</string>
499 </array>
500 </dict>
501 </dict>
502 ```
503 #### policies.json
504 ```
505 {
506 "policies": {
507 "Certificates": {
508 "Install": ["cert1.der", "/home/username/cert2.pem"]
509 }
510 }
511 }
512 ```
513 ### Cookies
514 Configure cookie preferences.
515
516 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
517
518 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
519
520 `Default` determines whether cookies are accepted at all.
521
522 `AcceptThirdParty` determines how third-party cookies are handled.
523
524 `ExpireAtSessionEnd` determines when cookies expire.
525
526 `RejectTracker` only rejects cookies for trackers.
527
528 `Locked` prevents the user from changing cookie preferences.
529
530 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
531 **CCK2 Equivalent:** N/A\
532 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
533
534 #### Windows (GPO)
535 ```
536 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
537 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
538 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
539 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
540 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
541 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
542 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
543 ```
544 #### macOS
545 ```
546 <dict>
547 <key>Cookies</key>
548 <dict>
549 <key>Allow</key>
550 <array>
551 <string>http://example.com</string>
552 </array>
553 <key>Block</key>
554 <array>
555 <string>http://example.org</string>
556 </array>
557 <key>Default</key>
558 <true/> | <false/>
559 <key>AcceptThirdParty</key>
560 <string>always | never | from-visited</string>
561 <key>ExpireAtSessionEnd</key>
562 <true/> | <false/>
563 <key>RejectTracker</key>
564 <true/> | <false/>
565 <key>Locked</key>
566 <true/> | <false/>
567 </dict>
568 </dict>
569 ```
570 #### policies.json
571 ```
572 {
573 "policies": {
574 "Cookies": {
575 "Allow": ["http://example.org/"],
576 "Block": ["http://example.edu/"],
577 "Default": true | false,
578 "AcceptThirdParty": "always" | "never" | "from-visited",
579 "ExpireAtSessionEnd": true | false,
580 "RejectTracker": true | false,
581 "Locked": true | false
582 }
583 }
584 }
585 ```
586 ### DisableSetDesktopBackground
587 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
588
589 **Compatibility:** Firefox 60, Firefox ESR 60\
590 **CCK2 Equivalent:** `removeSetDesktopBackground`\
591 **Preferences Affected:** N/A
592
593 #### Windows (GPO)
594 ```
595 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
596 ```
597
598 #### macOS
599 ```
600 <dict>
601 <key>DisableSetDesktopBackground</key>
602 <true/> | <false/>
603 </dict>
604 ```
605 #### policies.json
606 ```
607 {
608 "policies": {
609 "DisableSetDesktopBackground": true | false
610 }
611 }
612 ```
613 ### DisableMasterPasswordCreation
614 Remove the master password functionality.
615
616 **Compatibility:** Firefox 60, Firefox ESR 60\
617 **CCK2 Equivalent:** `noMasterPassword`\
618 **Preferences Affected:** N/A
619
620 #### Windows (GPO)
621 ```
622 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
623 ```
624
625 #### macOS
626 ```
627 <dict>
628 <key>DisableMasterPasswordCreation</key>
629 <true/> | <false/>
630 </dict>
631 ```
632 #### policies.json
633 ```
634 {
635 "policies": {
636 "DisableMasterPasswordCreation": true | false
637 }
638 }
639 ```
640 ### DisableAppUpdate
641 Turn off application updates.
642
643 **Compatibility:** Firefox 60, Firefox ESR 60\
644 **CCK2 Equivalent:** `disableFirefoxUpdates`\
645 **Preferences Affected:** N/A
646
647 #### Windows (GPO)
648 ```
649 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
650 ```
651 #### macOS
652 ```
653 <dict>
654 <key>DisableAppUpdate</key>
655 <true/> | <false/>
656 </dict>
657 ```
658 #### policies.json
659 ```
660 {
661 "policies": {
662 "DisableAppUpdate": true | false
663 }
664 }
665 ```
666 ### DisableBuiltinPDFViewer
667 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
668
669 **Compatibility:** Firefox 60, Firefox ESR 60\
670 **CCK2 Equivalent:** `disablePDFjs`\
671 **Preferences Affected:** `pdfjs.disabled`
672
673 #### Windows (GPO)
674 ```
675 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
676 ```
677
678 #### macOS
679 ```
680 <dict>
681 <key>DisableBuiltinPDFViewer</key>
682 <true/> | <false/>
683 </dict>
684 ```
685 #### policies.json
686 ```
687 {
688 "policies": {
689 "DisableBuiltinPDFViewer": true | false
690 }
691 }
692 ```
693 ### DisableDefaultBrowserAgent
694 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
695
696 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
697 **CCK2 Equivalent:** N/A\
698 **Preferences Affected:** N/A
699
700 #### Windows (GPO)
701 ```
702 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
703 ```
704
705 #### policies.json
706 ```
707 {
708 "policies": {
709 "DisableDefaultBrowserAgent": true | false
710 }
711 }
712 ```
713 ### DisableDeveloperTools
714 Remove access to all developer tools.
715
716 **Compatibility:** Firefox 60, Firefox ESR 60\
717 **CCK2 Equivalent:** `removeDeveloperTools`\
718 **Preferences Affected:** `devtools.policy.disabled`
719
720 #### Windows (GPO)
721 ```
722 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
723 ```
724
725 #### macOS
726 ```
727 <dict>
728 <key>DisableDeveloperTools</key>
729 <true/> | <false/>
730 </dict>
731 ```
732 #### policies.json
733 ```
734 {
735 "policies": {
736 "DisableDeveloperTools": true | false
737 }
738 }
739 ```
740 ### DisableFeedbackCommands
741 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
742
743 **Compatibility:** Firefox 60, Firefox ESR 60\
744 **CCK2 Equivalent:** N/A\
745 **Preferences Affected:** N/A
746
747 #### Windows (GPO)
748 ```
749 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
750 ```
751 #### macOS
752 ```
753 <dict>
754 <key>DisableFeedbackCommands</key>
755 <true/> | <false/>
756 </dict>
757 ```
758 #### policies.json
759 ```
760 {
761 "policies": {
762 "DisableFeedbackCommands": true | false
763 }
764 }
765 ```
766 ### DisableFirefoxScreenshots
767 Remove access to Firefox Screenshots.
768
769 **Compatibility:** Firefox 60, Firefox ESR 60\
770 **CCK2 Equivalent:** N/A\
771 **Preferences Affected:** `extensions.screenshots.disabled`
772
773 #### Windows (GPO)
774 ```
775 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
776 ```
777 #### macOS
778 ```
779 <dict>
780 <key>DisableFirefoxScreenshots</key>
781 <true/> | <false/>
782 </dict>
783 ```
784 #### policies.json
785 ```
786 {
787 "policies": {
788 "DisableFirefoxScreenshots": true | false
789 }
790 }
791 ```
792 ### DisableFirefoxAccounts
793 Disable Firefox Accounts integration (Sync).
794
795 **Compatibility:** Firefox 60, Firefox ESR 60\
796 **CCK2 Equivalent:** `disableSync`\
797 **Preferences Affected:** `identity.fxaccounts.enabled`
798
799 #### Windows (GPO)
800 ```
801 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
802 ```
803 #### macOS
804 ```
805 <dict>
806 <key>DisableFirefoxAccounts</key>
807 <true/> | <false/>
808 </dict>
809 ```
810 #### policies.json
811 ```
812 {
813 "policies": {
814 "DisableFirefoxAccounts": true | false
815 }
816 }
817 ```
818 ### DisableFirefoxStudies
819 Disable Firefox studies (Shield).
820
821 **Compatibility:** Firefox 60, Firefox ESR 60\
822 **CCK2 Equivalent:** N/A\
823 **Preferences Affected:** N/A
824
825 #### Windows (GPO)
826 ```
827 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisableFirefoxStudies</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "DisableFirefoxStudies": true | false
841 }
842 }
843 ```
844 ### DisableForgetButton
845 Disable the "Forget" button.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `disableForget`\
849 **Preferences Affected:** N/A
850
851 #### Windows (GPO)
852 ```
853 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>DisableForgetButton</key>
859 <true/> | <false/>
860 </dict>
861 ```
862 #### policies.json
863 ```
864 {
865 "policies": {
866 "DisableForgetButton": true | false
867 }
868 }
869 ```
870 ### DisableFormHistory
871 Turn off saving information on web forms and the search bar.
872
873 **Compatibility:** Firefox 60, Firefox ESR 60\
874 **CCK2 Equivalent:** `disableFormFill`\
875 **Preferences Affected:** ` browser.formfill.enable`
876
877 #### Windows (GPO)
878 ```
879 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
880 ```
881 #### macOS
882 ```
883 <dict>
884 <key>DisableFormHistory</key>
885 <true/> | <false/>
886 </dict>
887 ```
888 #### policies.json
889 ```
890 {
891 "policies": {
892 "DisableFormHistory": true | false
893 }
894 }
895 ```
896 ### DisablePasswordReveal
897 Do not allow passwords to be shown in saved logins
898
899 **Compatibility:** Firefox 71, Firefox ESR 68.3\
900 **CCK2 Equivalent:** N/A
901 **Preferences Affected:** N/A
902
903 #### Windows (GPO)
904 ```
905 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
906 ```
907
908 #### macOS
909 ```
910 <dict>
911 <key>DisablePasswordReveal</key>
912 <true/> | <false/>
913 </dict>
914 ```
915 #### policies.json
916 ```
917 {
918 "policies": {
919 "DisablePasswordReveal": true | false
920 }
921 }
922 ```
923 ### DisablePocket
924 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
925
926 **Compatibility:** Firefox 60, Firefox ESR 60\
927 **CCK2 Equivalent:** `disablePocket`\
928 **Preferences Affected:** `extensions.pocket.enabled`
929
930 #### Windows (GPO)
931 ```
932 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
933 ```
934 #### macOS
935 ```
936 <dict>
937 <key>DisablePocket</key>
938 <true/> | <false/>
939 </dict>
940 ```
941 #### policies.json
942 ```
943 {
944 "policies": {
945 "DisablePocket": true | false
946 }
947 }
948 ```
949 ### DisablePrivateBrowsing
950 Remove access to private browsing.
951
952 **Compatibility:** Firefox 60, Firefox ESR 60\
953 **CCK2 Equivalent:** `disablePrivateBrowsing`\
954 **Preferences Affected:** N/A
955
956 #### Windows (GPO)
957 ```
958 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
959 ```
960 #### macOS
961 ```
962 <dict>
963 <key>DisablePrivateBrowsing</key>
964 <true/> | <false/>
965 </dict>
966 ```
967 #### policies.json
968 ```
969 {
970 "policies": {
971 "DisablePrivateBrowsing": true | false
972 }
973 }
974 ```
975 ### DisableProfileImport
976 Disables the "Import data from another browser" option in the bookmarks window.
977
978 **Compatibility:** Firefox 60, Firefox ESR 60\
979 **CCK2 Equivalent:** N/A\
980 **Preferences Affected:** N/A
981
982 #### Windows (GPO)
983 ```
984 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
985 ```
986 #### macOS
987 ```
988 <dict>
989 <key>DisableProfileImport</key>
990 <true/> | <false/>
991 </dict>
992 ```
993 #### policies.json
994 ```
995 {
996 "policies": {
997 "DisableProfileImport": true | false
998 }
999 }
1000 ```
1001 ### DisableProfileRefresh
1002 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1003
1004 **Compatibility:** Firefox 60, Firefox ESR 60\
1005 **CCK2 Equivalent:** `disableResetFirefox`\
1006 **Preferences Affected:** `browser.disableResetPrompt`
1007
1008 #### Windows (GPO)
1009 ```
1010 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1011 ```
1012 #### macOS
1013 ```
1014 <dict>
1015 <key>DisableProfileRefresh</key>
1016 <true/> | <false/>
1017 </dict>
1018 ```
1019 #### policies.json
1020 ```
1021 {
1022 "policies": {
1023 "DisableProfileRefresh": true | false
1024 }
1025 }
1026 ```
1027 ### DisableSafeMode
1028 Disable safe mode within the browser.
1029
1030 On Windows, this disables safe mode via the command line as well.
1031
1032 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1033 **CCK2 Equivalent:** `disableSafeMode`\
1034 **Preferences Affected:** N/A
1035
1036 #### Windows (GPO)
1037 ```
1038 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1039 ```
1040 #### macOS
1041 ```
1042 <dict>
1043 <key>DisableSafeMode</key>
1044 <true/> | <false/>
1045 </dict>
1046 ```
1047 #### policies.json
1048 ```
1049 {
1050 "policies": {
1051 "DisableSafeMode": true | false
1052 }
1053 }
1054 ```
1055 ### DisableSecurityBypass
1056 Prevent the user from bypassing security in certain cases.
1057
1058 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1059
1060 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1061
1062 **Compatibility:** Firefox 60, Firefox ESR 60\
1063 **CCK2 Equivalent:** N/A\
1064 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1065
1066 #### Windows (GPO)
1067 ```
1068 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1069 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1070 ```
1071 #### macOS
1072 ```
1073 <dict>
1074 <key>DisableSecurityBypass</key>
1075 <dict>
1076 <key>InvalidCertificate</key>
1077 <true/> | <false/>
1078 <key><SafeBrowsing/key>
1079 <true/> | <false/>
1080 </dict>
1081 </dict>
1082 ```
1083 #### policies.json
1084 ```
1085 {
1086 "policies": {
1087 "DisableSecurityBypass": {
1088 "InvalidCertificate": true false,
1089 "SafeBrowsing": true false
1090 }
1091 }
1092 }
1093 ```
1094 ### DisableSystemAddonUpdate
1095 Prevent system add-ons from being installed or update.
1096
1097 **Compatibility:** Firefox 60, Firefox ESR 60\
1098 **CCK2 Equivalent:** N/A\
1099 **Preferences Affected:** N/A
1100
1101 #### Windows (GPO)
1102 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1103 ```
1104 #### macOS
1105 ```
1106 <dict>
1107 <key>DisableSystemAddonUpdate</key>
1108 <true/> | <false/>
1109 </dict>
1110 ```
1111 #### policies.json
1112 ```
1113 {
1114 "policies": {
1115 "DisableSystemAddonUpdate": true | false
1116 }
1117 }
1118 ```
1119 ### DisableTelemetry
1120 Prevent the upload of telemetry data.
1121
1122 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1123
1124 **Compatibility:** Firefox 60, Firefox ESR 60\
1125 **CCK2 Equivalent:** `disableTelemetry`\
1126 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1127
1128 #### Windows (GPO)
1129 ```
1130 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1131 ```
1132 #### macOS
1133 ```
1134 <dict>
1135 <key>DisableTelemetry</key>
1136 <true/> | <false/>
1137 </dict>
1138 ```
1139 #### policies.json
1140 ```
1141 {
1142 "policies": {
1143 "DisableTelemetry": true | false
1144 }
1145 }
1146 ```
1147 ### DisplayBookmarksToolbar
1148 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1149
1150 **Compatibility:** Firefox 60, Firefox ESR 60\
1151 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1152 **Preferences Affected:** N/A
1153
1154 #### Windows (GPO)
1155 ```
1156 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1157 ```
1158 #### macOS
1159 ```
1160 <dict>
1161 <key>DisplayBookmarksToolbar</key>
1162 <true/> | <false/>
1163 </dict>
1164 ```
1165 #### policies.json
1166 ```
1167 {
1168 "policies": {
1169 "DisplayBookmarksToolbar": true | false
1170 }
1171 }
1172 ```
1173 ### DisplayMenuBar (Deprecated)
1174 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1175
1176 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1177 **CCK2 Equivalent:** `displayMenuBar`\
1178 **Preferences Affected:** N/A
1179
1180 #### Windows (GPO)
1181 ```
1182 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1183 ```
1184 #### macOS
1185 ```
1186 <dict>
1187 <key>DisplayMenuBar</key>
1188 <true/> | <false/>
1189 </dict>
1190 ```
1191 #### policies.json
1192 ```
1193 {
1194 "policies": {
1195 "DisplayMenuBar": true | false
1196 }
1197 }
1198 ```
1199 ### DisplayMenuBar
1200 Set the state of the menubar.
1201
1202 `always` means the menubar is shown and cannot be hidden.
1203
1204 `never` means the menubar is hidden and cannot be shown.
1205
1206 `default-on` means the menubar is on by default but can be hidden.
1207
1208 `default-off` means the menubar is off by default but can be shown.
1209
1210 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1211 **CCK2 Equivalent:** `displayMenuBar`\
1212 **Preferences Affected:** N/A
1213
1214 #### Windows (GPO)
1215 ```
1216 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1217 ```
1218 #### macOS
1219 ```
1220 <dict>
1221 <key>DisplayMenuBar</key>
1222 <string>always | never | default-on | default-off</string>
1223 </dict>
1224 ```
1225 #### policies.json
1226 ```
1227 {
1228 "policies": {
1229 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1230 }
1231 }
1232 ```
1233 ### DNSOverHTTPS
1234 Configure DNS over HTTPS.
1235
1236 `Enabled` determines whether DNS over HTTPS is enabled
1237
1238 `ProviderURL` is a URL to another provider.
1239
1240 `Locked` prevents the user from changing DNS over HTTPS preferences.
1241
1242 `ExcludedDomains` excludes domains from DNS over HTTPS.
1243
1244 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1245 **CCK2 Equivalent:** N/A\
1246 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1247
1248 #### Windows (GPO)
1249 ```
1250 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1251 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1252 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1253 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1254 ```
1255 #### macOS
1256 ```
1257 <dict>
1258 <key>DNSOverHTTPS</key>
1259 <dict>
1260 <key>Enabled</key>
1261 <true/> | <false/>
1262 <key>ProviderURL</key>
1263 <string>URL_TO_ALTERNATE_PROVIDER</string>
1264 <key>Locked</key>
1265 <true/> | <false/>
1266 <key>ExcludedDomains</key>
1267 <array>
1268 <string>example.com</string>
1269 </array>
1270 </dict>
1271 </dict>
1272 ```
1273 #### policies.json
1274 ```
1275 {
1276 "policies": {
1277 "DNSOverHTTPS": {
1278 "Enabled": true | false,
1279 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1280 "Locked": true | false,
1281 "ExcludedDomains": ["example.com"]
1282 }
1283 }
1284 }
1285 ```
1286 ### DontCheckDefaultBrowser
1287 Don't check if Firefox is the default browser at startup.
1288
1289 **Compatibility:** Firefox 60, Firefox ESR 60\
1290 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1291 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1292
1293 #### Windows (GPO)
1294 ```
1295 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1296 ```
1297 #### macOS
1298 ```
1299 <dict>
1300 <key>DontCheckDefaultBrowser</key>
1301 <true/> | <false/>
1302 </dict>
1303 ```
1304 #### policies.json
1305 ```
1306 {
1307 "policies": {
1308 "DontCheckDefaultBrowser": true | false
1309 }
1310 }
1311 ```
1312 ### DefaultDownloadDirectory
1313 Set the default download directory.
1314
1315 You can use ${home} for the native home directory.
1316
1317 **Compatibility:** Firefox 68, Firefox ESR 68\
1318 **CCK2 Equivalent:** N/A\
1319 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1320
1321 #### Windows (GPO)
1322 ```
1323 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1324 ```
1325 #### macOS
1326 ```
1327 <dict>
1328 <key>DefaultDownloadDirectory</key>
1329 <string>${home}/Downloads</string>
1330 </dict>
1331 ```
1332 #### policies.json (macOS and Linux)
1333 ```
1334 {
1335 "policies": {
1336 "DefaultDownloadDirectory": "${home}/Downloads"
1337 }
1338 ```
1339 #### policies.json (Windows)
1340 ```
1341 {
1342 "policies": {
1343 "DefaultDownloadDirectory": "${home}\\Downloads"
1344 }
1345 ```
1346 ### DownloadDirectory
1347 Set and lock the download directory.
1348
1349 You can use ${home} for the native home directory.
1350
1351 **Compatibility:** Firefox 68, Firefox ESR 68\
1352 **CCK2 Equivalent:** N/A\
1353 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1354
1355 #### Windows (GPO)
1356 ```
1357 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1358 ```
1359 #### macOS
1360 ```
1361 <dict>
1362 <key>DownloadDirectory</key>
1363 <string>${home}/Downloads</string>
1364 </dict>
1365 ```
1366 #### policies.json (macOS and Linux)
1367 ```
1368 {
1369 "policies": {
1370 "DownloadDirectory": "${home}/Downloads"
1371 }
1372 ```
1373 #### policies.json (Windows)
1374 ```
1375 {
1376 "policies": {
1377 "DownloadDirectory": "${home}\\Downloads"
1378 }
1379 ```
1380 ### EnableTrackingProtection
1381 Configure tracking protection.
1382
1383 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1384
1385 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1386
1387 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1388
1389 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1390
1391 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1392
1393 `Exceptions` are origins for which tracking protection is not enabled.
1394
1395 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1396 **CCK2 Equivalent:** N/A\
1397 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1398
1399 #### Windows (GPO)
1400 ```
1401 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1402 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1403 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1404 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1405 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1406 ```
1407 #### macOS
1408 ```
1409 <dict>
1410 <key>EnableTrackingProtection</key>
1411 <dict>
1412 <key>Value</key>
1413 <true/> | <false/>
1414 <key><Locked</key>
1415 <true/> | <false/>
1416 <key><Cryptomining</key>
1417 <true/> | <false/>
1418 <key><Fingerprinting</key>
1419 <true/> | <false/>
1420 <key>Exceptions</key>
1421 <array>
1422 <string>https://example.com</string>
1423 </array>
1424 </dict>
1425 </dict>
1426 ```
1427 #### policies.json
1428 ```
1429 {
1430 "policies": {
1431 "EnableTrackingProtection": {
1432 "Value": [true, false],
1433 "Locked": [true, false],
1434 "Cryptomining": [true, false],
1435 "Fingerprinting": [true, false],
1436 "Exceptions": ["https://example.com"]
1437 }
1438 }
1439 ```
1440 ### EnterprisePoliciesEnabled
1441 Enable policy support on macOS.
1442
1443 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1444 **CCK2 Equivalent:** N/A\
1445 **Preferences Affected:** N/A
1446
1447 #### macOS
1448 ```
1449 <dict>
1450 <key>EnterprisePoliciesEnabled</key>
1451 <true/>
1452 </dict>
1453 ```
1454 ### Extensions
1455 Control the installation, uninstallation and locking of extensions.
1456
1457 `Install` is a list of URLs or native paths for extensions to be installed.
1458
1459 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1460
1461 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1462
1463 **Compatibility:** Firefox 60, Firefox ESR 60\
1464 **CCK2 Equivalent:** `addons`\
1465 **Preferences Affected:** N/A
1466
1467 #### Windows (GPO)
1468 ```
1469 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1470 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1471 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1472 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1473 ```
1474 #### macOS
1475 ```
1476 <dict>
1477 <key>Extensions</key>
1478 <dict>
1479 <key>Install</key>
1480 <array>
1481 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1482 <string>//path/to/xpi</string>
1483 </array>
1484 <key>Uninstall</key>
1485 <array>
1486 <string>bad_addon_id@mozilla.org</string>
1487 </array>
1488 <key>Locked</key>
1489 <array>
1490 <string>addon_id@mozilla.org</string>
1491 </array>
1492 </dict>
1493 </dict>
1494 ```
1495 #### policies.json
1496 ```
1497 {
1498 "policies": {
1499 "Extensions": {
1500 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1501 "Uninstall": ["bad_addon_id@mozilla.org"],
1502 "Locked": ["addon_id@mozilla.org"]
1503 }
1504 }
1505 }
1506 ```
1507 ### ExtensionSettings
1508 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1509
1510 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1511
1512 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1513
1514 The configuration for each extension is another dictionary that can contain the fields documented below.
1515
1516 | Name | Description |
1517 | --- | --- |
1518 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1519 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1520 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1521 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1522 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1523 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1524 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1525 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1526 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1527
1528 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1529 **CCK2 Equivalent:** N/A\
1530 **Preferences Affected:** N/A
1531
1532 #### Windows (GPO)
1533 ```
1534 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1535 {
1536 "*": {
1537 "blocked_install_message": "Custom error message.",
1538 "install_sources": ["https://addons.mozilla.org/"],
1539 "installation_mode": "blocked",
1540 "allowed_types": ["extension"]
1541 },
1542 "uBlock0@raymondhill.net": {
1543 "installation_mode": "force_installed",
1544 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1545 }
1546 }
1547 ```
1548 #### macOS
1549 ```
1550 <dict>
1551 <key>ExtensionSettings</key>
1552 <dict>
1553 <key>*</key>
1554 <dict>
1555 <key>blocked_install_message</key>
1556 <string>Custom error message.</string>
1557 <key>install_sources</key>
1558 <array>
1559 <string>https://addons.mozilla.org/</string>
1560 </array>
1561 <key>installation_mode</key>
1562 <string>blocked</string>
1563 <key>allowed_types</key>
1564 <array>
1565 <string>extension</string>
1566 </array>
1567 </dict>
1568 <key>uBlock0@raymondhill.net</key>
1569 <dict>
1570 <key>installation_mode</key>
1571 <string>force_installed</string>
1572 <key>install_url</key>
1573 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1574 </dict>
1575 </dict>
1576 </dict>
1577 ```
1578 #### policies.json
1579 ```
1580 {
1581 "policies": {
1582 "ExtensionSettings": {
1583 "*": {
1584 "blocked_install_message": "Custom error message.",
1585 "install_sources": ["https://addons.mozilla.org/"],
1586 "installation_mode": "blocked",
1587 "allowed_types": ["extension"]
1588 },
1589 "uBlock0@raymondhill.net": {
1590 "installation_mode": "force_installed",
1591 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1592 }
1593 }
1594 }
1595 }
1596 ```
1597 ### ExtensionUpdate
1598 Control extension updates.
1599
1600 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1601 **CCK2 Equivalent:** N/A\
1602 **Preferences Affected:** `extensions.update.enabled`
1603
1604 #### Windows (GPO)
1605 ```
1606 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1607 ```
1608 #### macOS
1609 ```
1610 <dict>
1611 <key>ExtensionUpdate</key>
1612 <true/> | <false/>
1613 </dict>
1614 ```
1615 #### policies.json
1616 ```
1617 {
1618 "policies": {
1619 "ExtensionUpdate": true | false
1620 }
1621 }
1622 ```
1623 ### FlashPlugin
1624 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1625
1626 `Allow` is a list of origins where Flash are allowed.
1627
1628 `Block` is a list of origins where Flash is not allowed.
1629
1630 `Default` determines whether or not Flash is allowed by default.
1631
1632 `Locked` prevents the user from changing Flash preferences.
1633
1634 **Compatibility:** Firefox 60, Firefox ESR 60\
1635 **CCK2 Equivalent:** `permissions.plugin`\
1636 **Preferences Affected:** `plugin.state.flash`
1637
1638 #### Windows (GPO)
1639 ```
1640 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1641 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1642 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1643 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>FlashPlugin</key>
1649 <dict>
1650 <key>Allow</key>
1651 <array>
1652 <string>http://example.org</string>
1653 </array>
1654 <key>Block</key>
1655 <array>
1656 <string>http://example.edu</string>
1657 </array>
1658 <key>Default</key>
1659 <true/> | <false/>
1660 <key>Locked</key>
1661 <true/> | <false/>
1662 </dict>
1663 </dict>
1664 ```
1665 #### policies.json
1666 ```
1667 {
1668 "policies": {
1669 "FlashPlugin": {
1670 "Allow": ["http://example.org/"],
1671 "Block": ["http://example.edu/"],
1672 "Default": true | false,
1673 "Locked": true | false
1674 }
1675 }
1676 }
1677 ```
1678 ### FirefoxHome
1679 Customize the Firefox Home page.
1680
1681 **Compatibility:** Firefox 68, Firefox ESR 68\
1682 **CCK2 Equivalent:** N/A\
1683 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1684
1685 #### Windows (GPO)
1686 ```
1687 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1688 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1689 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1690 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1691 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1692 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1693 ```
1694 #### macOS
1695 ```
1696 <dict>
1697 <key>FirefoxHome</key>
1698 <dict>
1699 <key>Search</key>
1700 <true/> | <false/>
1701 <key>TopSites</key>
1702 <true/> | <false/>
1703 <key>Highlights</key>
1704 <true/> | <false/>
1705 <key>Pocket</key>
1706 <true/> | <false/>
1707 <key>Snippets</key>
1708 <true/> | <false/>
1709 <key>Locked</key>
1710 <true/> | <false/>
1711 </dict>
1712 </dict>
1713 ```
1714 #### policies.json
1715 ```
1716 {
1717 "policies": {
1718 "FirefoxHome": {
1719 "Search": true | false,
1720 "TopSites": true | false,
1721 "Highlights": true | false,
1722 "Pocket": true | false,
1723 "Snippets": true | false,
1724 "Locked": true | false
1725 }
1726 }
1727 }
1728 ```
1729 ### HardwareAcceleration
1730 Control hardware acceleration.
1731
1732 **Compatibility:** Firefox 60, Firefox ESR 60\
1733 **CCK2 Equivalent:** N/A\
1734 **Preferences Affected:** `layers.acceleration.disabled`
1735
1736 #### Windows (GPO)
1737 ```
1738 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1739 ```
1740 #### macOS
1741 ```
1742 <dict>
1743 <key>HardwareAcceleration</key>
1744 <true/> | <false/>
1745 </dict>
1746 ```
1747 #### policies.json
1748 ```
1749 {
1750 "policies": {
1751 "HardwareAcceleration": true | false
1752 }
1753 }
1754 ```
1755 ### Homepage
1756 Configure the default homepage and how Firefox starts.
1757
1758 `URL` is the default homepage.
1759
1760 `Locked` prevents the user from changing homepage preferences.
1761
1762 `Additional` allows for more than one homepage.
1763
1764 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1765
1766 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1767 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1768 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1769
1770 #### Windows (GPO)
1771 ```
1772 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1773 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1774 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1775 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1776 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1777 ```
1778 #### macOS
1779 ```
1780 <dict>
1781 <key>Homepage</key>
1782 <dict>
1783 <key>URL</key>
1784 <string>http://example.com</string>
1785 <key>Locked</key>
1786 <true/> | <false/>
1787 <key>Additional</key>
1788 <array>
1789 <string>http://example.org</string>
1790 <string>http://example.edu</string>
1791 </array>
1792 <key>StartPage</key>
1793 <string>none | homepage | previous-session</string>
1794 </dict>
1795 </dict>
1796 ```
1797 #### policies.json
1798 ```
1799 {
1800 "policies": {
1801 "Homepage": {
1802 "URL": "http://example.com/",
1803 "Locked": true | false,
1804 "Additional": ["http://example.org/",
1805 "http://example.edu/"],
1806 "StartPage": "none" | "homepage" | "previous-session"
1807 }
1808 }
1809 }
1810 ```
1811 ### InstallAddonsPermission
1812 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1813
1814 `Allow` is a list of origins where extension installs are allowed.
1815
1816 `Default` determines whether or not extension installs are allowed by default.
1817
1818 **Compatibility:** Firefox 60, Firefox ESR 60\
1819 **CCK2 Equivalent:** `permissions.install`\
1820 **Preferences Affected:** `xpinstall.enabled`
1821
1822 #### Windows (GPO)
1823 ```
1824 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1825 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1826 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>InstallAddonsPermission</key>
1832 <dict>
1833 <key>Allow</key>
1834 <array>
1835 <string>http://example.org</string>
1836 <string>http://example.edu</string>
1837 </array>
1838 <key>Default</key>
1839 <true/> | <false/>
1840 </dict>
1841 </dict>
1842 ```
1843 #### policies.json
1844 ```
1845 {
1846 "policies": {
1847 "InstallAddonsPermission": {
1848 "Allow": ["http://example.org/",
1849 "http://example.edu/"],
1850 "Default": true | false
1851 }
1852 }
1853 }
1854 ```
1855 ### LegacyProfiles
1856 Disable the feature enforcing a separate profile for each installation.
1857
1858 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1859
1860 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1861
1862 This policy only work on Windows via GPO (not policies.json).
1863
1864 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1865 **CCK2 Equivalent:** N/A\
1866 **Preferences Affected:** N/A
1867
1868 #### Windows (GPO)
1869 ```
1870 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1871 ```
1872 ### LocalFileLinks
1873 Enable linking to local files by origin.
1874
1875 **Compatibility:** Firefox 68, Firefox ESR 68\
1876 **CCK2 Equivalent:** N/A\
1877 **Preferences Affected:** `capability.policy.localfilelinks.*`
1878
1879 #### Windows (GPO)
1880 ```
1881 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1882 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1883 ```
1884 #### macOS
1885 ```
1886 <dict>
1887 <key>LocalFileLinks</key>
1888 <array>
1889 <string>http://example.org</string>
1890 <string>http://example.edu</string>
1891 </array>
1892 </dict>
1893 ```
1894 #### policies.json
1895 ```
1896 {
1897 "policies": {
1898 "LocalFileLinks": ["http://example.org/",
1899 "http://example.edu/"]
1900 }
1901 }
1902 ```
1903 ### NoDefaultBookmarks
1904 Disable the creation of default bookmarks.
1905
1906 This policy is only effective if the user profile has not been created yet.
1907
1908 **Compatibility:** Firefox 60, Firefox ESR 60\
1909 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1910 **Preferences Affected:** N/A
1911
1912 #### Windows (GPO)
1913 ```
1914 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1915 ```
1916 #### macOS
1917 ```
1918 <dict>
1919 <key>NoDefaultBookmarks</key>
1920 <true/> | <false/>
1921 </dict>
1922 ```
1923 #### policies.json
1924 ```
1925 {
1926 "policies": {
1927 "NoDefaultBookmarks": true | false
1928 }
1929 }
1930 ```
1931 ### NetworkPrediction
1932 Enable or disable network prediction (DNS prefetching).
1933
1934 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1935 **CCK2 Equivalent:** N/A\
1936 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1937
1938 #### Windows (GPO)
1939 ```
1940 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1941 ```
1942 #### macOS
1943 ```
1944 <dict>
1945 <key>NetworkPrediction</key>
1946 <true/> | <false/>
1947 </dict>
1948 ```
1949 #### policies.json
1950 ```
1951 {
1952 "policies": {
1953 "NetworkPrediction": true | false
1954 }
1955 ```
1956 ### NewTabPage
1957 Enable or disable the New Tab page.
1958
1959 **Compatibility:** Firefox 68, Firefox ESR 68\
1960 **CCK2 Equivalent:** N/A\
1961 **Preferences Affected:** `browser.newtabpage.enabled`
1962
1963 #### Windows (GPO)
1964 ```
1965 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1966 ```
1967 #### macOS
1968 ```
1969 <dict>
1970 <key>NewTabPage</key>
1971 <true/> | <false/>
1972 </dict>
1973 ```
1974 #### policies.json
1975 ```
1976 {
1977 "policies": {
1978 "NewTabPage": true | false
1979 }
1980 ```
1981 ### OfferToSaveLogins
1982 Control whether or not Firefox offers to save passwords.
1983
1984 **Compatibility:** Firefox 60, Firefox ESR 60\
1985 **CCK2 Equivalent:** `dontRememberPasswords`\
1986 **Preferences Affected:** `signon.rememberSignons`
1987
1988 #### Windows (GPO)
1989 ```
1990 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1991 ```
1992 #### macOS
1993 ```
1994 <dict>
1995 <key>OfferToSaveLogins</key>
1996 <true/> | <false/>
1997 </dict>
1998 ```
1999 #### policies.json
2000 ```
2001 {
2002 "policies": {
2003 "OfferToSaveLogins": true | false
2004 }
2005 }
2006 ```
2007 ### OfferToSaveLoginsDefault
2008 Sets the default value of signon.rememberSignons without locking it.
2009
2010 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2011 **CCK2 Equivalent:** `dontRememberPasswords`\
2012 **Preferences Affected:** `signon.rememberSignons`
2013
2014 #### Windows (GPO)
2015 ```
2016 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2017 ```
2018 #### macOS
2019 ```
2020 <dict>
2021 <key>OfferToSaveLoginsDefault</key>
2022 <true/> | <false/>
2023 </dict>
2024 ```
2025 #### policies.json
2026 ```
2027 {
2028 "policies": {
2029 "OfferToSaveLoginsDefault": true | false
2030 }
2031 }
2032 ```
2033 ### OverrideFirstRunPage
2034 Override the first run page. If the value is blank, no first run page is displayed.
2035
2036 **Compatibility:** Firefox 60, Firefox ESR 60\
2037 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2038 **Preferences Affected:** `startup.homepage_welcome_url`
2039
2040 #### Windows (GPO)
2041 ```
2042 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2043 ```
2044 #### macOS
2045 ```
2046 <dict>
2047 <key>OverrideFirstRunPage</key>
2048 <string>http://example.org</string>
2049 </dict>
2050 ```
2051 #### policies.json
2052 ```
2053 {
2054 "policies": {
2055 "OverrideFirstRunPage": "http://example.org"
2056 }
2057 ```
2058 ### OverridePostUpdatePage
2059 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2060
2061 **Compatibility:** Firefox 60, Firefox ESR 60\
2062 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2063 **Preferences Affected:** `startup.homepage_override_url`
2064
2065 #### Windows (GPO)
2066 ```
2067 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2068 ```
2069 #### macOS
2070 ```
2071 <dict>
2072 <key>OverridePostUpdatePage</key>
2073 <string>http://example.org</string>
2074 </dict>
2075 ```
2076 #### policies.json
2077 ```
2078 {
2079 "policies": {
2080 "OverridePostUpdatePage": "http://example.org"
2081 }
2082 ```
2083 ### PasswordManagerEnabled
2084 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2085
2086 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2087 **CCK2 Equivalent:** N/A\
2088 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2089
2090 #### Windows (GPO)
2091 ```
2092 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2093 ```
2094 #### macOS
2095 ```
2096 <dict>
2097 <key>PasswordManagerEnabled</key>
2098 <true/> | <false/>
2099 </dict>
2100 ```
2101 #### policies.json
2102 ```
2103 {
2104 "policies": {
2105 "PasswordManagerEnabled": true | false
2106 }
2107 }
2108 ```
2109 ### Permissions
2110 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2111
2112 `Allow` is a list of origins where the feature is allowed.
2113
2114 `Block` is a list of origins where the feature is not allowed.
2115
2116 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2117
2118 `Locked` prevents the user from changing preferences for the feature.
2119
2120 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2121 **CCK2 Equivalent:** N/A\
2122 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2123
2124 #### Windows (GPO)
2125 ```
2126 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2127 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2128 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2129 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2130 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2131 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2132 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2133 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2134 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2135 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2136 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2137 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2138 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2139 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2140 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2141 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2142 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2143 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2144 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2145 ```
2146 #### macOS
2147 ```
2148 <dict>
2149 <key>Permissions</key>
2150 <dict>
2151 <key>Camera</key>
2152 <dict>
2153 <key>Allow</key>
2154 <array>
2155 <string>https://example.org</string>
2156 <string>https://example.org:1234</string>
2157 </array>
2158 <key>Block</key>
2159 <array>
2160 <string>https://example.edu</string>
2161 </array>
2162 <key>BlockNewRequests</key>
2163 <true/>
2164 <key>Locked</key>
2165 <true/>
2166 </dict>
2167 <key>Microphone</key>
2168 <dict>
2169 <key>Allow</key>
2170 <array>
2171 <string>https://example.org</string>
2172 </array>
2173 <key>Block</key>
2174 <array>
2175 <string>https://example.edu</string>
2176 </array>
2177 <key>BlockNewRequests</key>
2178 <true/>
2179 <key>Locked</key>
2180 <true/>
2181 </dict>
2182 <key>Location</key>
2183 <dict>
2184 <key>Allow</key>
2185 <array>
2186 <string>https://example.org</string>
2187 </array>
2188 <key>Block</key>
2189 <array>
2190 <string>https://example.edu</string>
2191 </array>
2192 <key>BlockNewRequests</key>
2193 <true/>
2194 <key>Locked</key>
2195 <true/>
2196 </dict>
2197 <key>Notifications</key>
2198 <dict>
2199 <key>Allow</key>
2200 <array>
2201 <string>https://example.org</string>
2202 </array>
2203 <key>Block</key>
2204 <array>
2205 <string>https://example.edu</string>
2206 </array>
2207 <key>BlockNewRequests</key>
2208 <true/>
2209 <key>Locked</key>
2210 <true/>
2211 </dict>
2212 <key>Autoplay</key>
2213 <dict>
2214 <key>Allow</key>
2215 <array>
2216 <string>https://example.org</string>
2217 </array>
2218 <key>Block</key>
2219 <array>
2220 <string>https://example.edu</string>
2221 </array>
2222 </dict>
2223 </dict>
2224 </dict>
2225 ```
2226 #### policies.json
2227 ```
2228 {
2229 "policies": {
2230 "Permissions": {
2231 "Camera": {
2232 "Allow": ["https://example.org","https://example.org:1234"],
2233 "Block": ["https://example.edu"],
2234 "BlockNewRequests": true | false,
2235 "Locked": true | false
2236 },
2237 "Microphone": {
2238 "Allow": ["https://example.org"],
2239 "Block": ["https://example.edu"],
2240 "BlockNewRequests": true | false,
2241 "Locked": true | false
2242 },
2243 "Location": {
2244 "Allow": ["https://example.org"],
2245 "Block": ["https://example.edu"],
2246 "BlockNewRequests": true | false,
2247 "Locked": true | false
2248 },
2249 "Notifications": {
2250 "Allow": ["https://example.org"],
2251 "Block": ["https://example.edu"],
2252 "BlockNewRequests": true | false,
2253 "Locked": true | false
2254 },
2255 "Autoplay": {
2256 "Allow": ["https://example.org"],
2257 "Block": ["https://example.edu"]
2258 }
2259 }
2260 }
2261 }
2262 ```
2263 ### PopupBlocking
2264 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2265
2266 `Allow` is a list of origins where popup-windows are allowed.
2267
2268 `Default` determines whether or not pop-up windows are allowed by default.
2269
2270 `Locked` prevents the user from changing pop-up preferences.
2271
2272 **Compatibility:** Firefox 60, Firefox ESR 60\
2273 **CCK2 Equivalent:** `permissions.popup`\
2274 **Preferences Affected:** `dom.disable_open_during_load`
2275
2276 #### Windows (GPO)
2277 ```
2278 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2279 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2280 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2281 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2282 ```
2283 #### macOS
2284 ```
2285 <dict>
2286 <key>PopupBlocking</key>
2287 <dict>
2288 <key>Allow</key>
2289 <array>
2290 <string>http://example.org</string>
2291 <string>http://example.edu</string>
2292 </array>
2293 <key>Default</key>
2294 <true/> | <false/>
2295 <key>Locked</key>
2296 <true/> | <false/>
2297 </dict>
2298 </dict>
2299 ```
2300 #### policies.json
2301 ```
2302 {
2303 "policies": {
2304 "PopupBlocking": {
2305 "Allow": ["http://example.org/",
2306 "http://example.edu/"],
2307 "Default": true | false,
2308 "Locked": true | false
2309 }
2310 }
2311 }
2312 ```
2313 ### Preferences
2314 Set and lock certain preferences.
2315
2316 **Compatibility:** See below\
2317 **CCK2 Equivalent:** `preferences`\
2318 **Preferences Affected:** See below
2319
2320 | Preference | Type | Compatibility | Default
2321 | --- | --- | --- | ---
2322 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2323 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2324 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2325 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2326 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2327 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2328 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2329 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2330 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2331 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2332 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2333 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2334 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2335 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2336 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2337 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2338 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2339 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2340 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2341 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2342 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2343 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2344 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2345 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2346 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2347 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2348 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2349 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2350 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2351 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2352 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2353 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2354 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2355 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2356 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2357 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2358 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2359 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2360 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2361 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2362 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2363 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2364 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2365 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2366 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2367 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2368 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2369 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2370 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2371 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2372 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2373 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2374 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2376 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2377 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2378 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2379 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2380 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2381 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2382 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2383 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2384 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2385 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2386 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2387 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2388 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2389 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2390 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2391 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2392 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2393 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2394 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2395 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2396 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2397 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2398 disabled
2399 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2400 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2401 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2402 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2403 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2404 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2405 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2406 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2407 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2408 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2409 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2410 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2411 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2412 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2413 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2414 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2415 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2416 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2417 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2418 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2419 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2420 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2421 #### Windows (GPO)
2422 ```
2423 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2424 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2425 ```
2426 #### macOS
2427 ```
2428 <dict>
2429 <key>Preferences</key>
2430 <dict>
2431 <key>boolean_preference_name</key>
2432 <true/> | <false/>
2433 <key>string_preference_name</key>
2434 <string>string_value</string>
2435 </dict>
2436 </dict>
2437 ```
2438 #### policies.json
2439 ```
2440 {
2441 "policies": {
2442 "Preferences": {
2443 "boolean_preference_name": true | false,
2444 "string_preference_name": "string_value"
2445 }
2446 }
2447 }
2448 ```
2449 ### PromptForDownloadLocation
2450 Ask where to save each file before downloading.
2451
2452 **Compatibility:** Firefox 68, Firefox ESR 68\
2453 **CCK2 Equivalent:** N/A\
2454 **Preferences Affected:** `browser.download.useDownloadDir`
2455
2456 #### Windows (GPO)
2457 ```
2458 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2459 ```
2460 #### macOS
2461 ```
2462 <dict>
2463 <key>PromptForDownloadLocation</key>
2464 <true/> | <false/>
2465 </dict>
2466 ```
2467 #### policies.json
2468 ```
2469 {
2470 "policies": {
2471 "PromptForDownloadLocation": true | false
2472 }
2473 }
2474 ```
2475 ### Proxy
2476 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2477 To specify ports, append them to the hostnames with a colon (:).
2478
2479 `Mode` is the proxy method being used.
2480
2481 `Locked` is whether or not proxy settings can be changed.
2482
2483 `HTTPProxy` is the HTTP proxy server.
2484
2485 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2486
2487 `SSLProxy` is the SSL proxy server.
2488
2489 `FTPProxy` is the FTP proxy server.
2490
2491 `SOCKSProxy` is the SOCKS proxy server
2492
2493 `SOCKSVersion` is the SOCKS version (4 or 5)
2494
2495 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2496
2497 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2498
2499 `AutoLogin` means do not prompt for authentication if password is saved.
2500
2501 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2502
2503 **Compatibility:** Firefox 60, Firefox ESR 60\
2504 **CCK2 Equivalent:** `networkProxy*`\
2505 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2506
2507 #### Windows (GPO)
2508 ```
2509 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2510 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2511 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2512 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2513 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2514 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2515 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2516 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2517 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2518 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2519 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2520 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2521 ```
2522 #### macOS
2523 ```
2524 <dict>
2525 <key>Proxy</key>
2526 <dict>
2527 <key>Mode</key>
2528 <string>none | system | manual | autoDetect | autoConfig</string>
2529 <key>Locked</key>
2530 <true> | </false>
2531 <key>HTTPProxy</key>
2532 <string>https://httpproxy.example.com</string>
2533 <key>UseHTTPProxyForAllProtocols</key>
2534 <true> | </false>
2535 <key>SSLProxy</key>
2536 <string>https://sslproxy.example.com</string>
2537 <key>FTPProxy</key>
2538 <string>https://ftpproxy.example.com</string>
2539 <key>SOCKSProxy</key>
2540 <string>https://socksproxy.example.com</string>
2541 <key>SOCKSVersion</key>
2542 <string>4 | 5</string>
2543 <key>Passthrough</key>
2544 <string>&lt;local>&gt;</string>
2545 <key>AutoConfigURL</key>
2546 <string>URL_TO_AUTOCONFIG</string>
2547 <key>AutoLogin</key>
2548 <true> | </false>
2549 <key>UseProxyForDNS</key>
2550 <true> | </false>
2551 </dict>
2552 </dict>
2553 ```
2554 #### policies.json
2555 ```
2556 {
2557 "policies": {
2558 "Proxy": {
2559 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2560 "Locked": [true, false],
2561 "HTTPProxy": "hostname",
2562 "UseHTTPProxyForAllProtocols": [true, false],
2563 "SSLProxy": "hostname",
2564 "FTPProxy": "hostname",
2565 "SOCKSProxy": "hostname",
2566 "SOCKSVersion": 4 | 5
2567 "Passthrough": "<local>",
2568 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2569 "AutoLogin": [true, false],
2570 "UseProxyForDNS": [true, false]
2571 }
2572 }
2573 }
2574 ```
2575 ### RequestedLocales
2576 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2577
2578 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2579
2580 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2581 **CCK2 Equivalent:** N/A\
2582 **Preferences Affected:** N/A
2583 #### Windows (GPO)
2584 ```
2585 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2586 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2587
2588 or
2589
2590 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2591 ```
2592 #### macOS
2593 ```
2594 <dict>
2595 <key>RequestedLocales</key>
2596 <array>
2597 <string>de</string>
2598 <string>en-US</string>
2599 </array>
2600 </dict>
2601
2602 or
2603
2604 <dict>
2605 <key>RequestedLocales</key>
2606 <string>de,en-US</string>
2607 </dict>
2608
2609 ```
2610 #### policies.json
2611 ```
2612 {
2613 "policies": {
2614 "RequestedLocales": ["de", "en-US"]
2615 }
2616 }
2617
2618 or
2619
2620 {
2621 "policies": {
2622 "RequestedLocales": "de,en-US"
2623 }
2624 }
2625 ```
2626 <a name="SanitizeOnShutdown"></a>
2627
2628 ### SanitizeOnShutdown (Selective)
2629 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2630
2631 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2632
2633 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2634 **CCK2 Equivalent:** N/A\
2635 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2636 #### Windows (GPO)
2637 ```
2638 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2639 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2640 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2641 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2642 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2643 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2644 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2645 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2646 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2647 ```
2648 #### macOS
2649 ```
2650 <dict>
2651 <key>SanitizeOnShutdown</key>
2652 <dict>
2653 <key>Cache</key>
2654 <true/> | <false/>
2655 <key>Cookies</key>
2656 <true/> | <false/>
2657 <key>Downloads</key>
2658 <true/> | <false/>
2659 <key>FormData</key>
2660 <true/> | <false/>
2661 <key>History</key>
2662 <true/> | <false/>
2663 <key>Sessions</key>
2664 <true/> | <false/>
2665 <key>SiteSettings</key>
2666 <true/> | <false/>
2667 <key>OfflineApps</key>
2668 <true/> | <false/>
2669 <key>Locked</key>
2670 <true/> | <false/>
2671 </dict>
2672 </dict>
2673 ```
2674 #### policies.json
2675 ```
2676 {
2677 "policies": {
2678 "SanitizeOnShutdown": {
2679 "Cache": true | false,
2680 "Cookies": true | false,
2681 "Downloads": true | false,
2682 "FormData": true | false,
2683 "History": true | false,
2684 "Sessions": true | false,
2685 "SiteSettings": true | false,
2686 "OfflineApps": true | false,
2687 "Locked": true | false
2688 }
2689 }
2690 }
2691 ```
2692 ### SanitizeOnShutdown (All)
2693 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2694
2695 **Compatibility:** Firefox 60, Firefox ESR 60\
2696 **CCK2 Equivalent:** N/A\
2697 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2698 #### Windows (GPO)
2699 ```
2700 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2701 ```
2702 #### macOS
2703 ```
2704 <dict>
2705 <key>SanitizeOnShutdown</key>
2706 <true/> | <false/>
2707 </dict>
2708 ```
2709 #### policies.json
2710 ```
2711 {
2712 "policies": {
2713 "SanitizeOnShutdown": true | false
2714 }
2715 }
2716 ```
2717 ### SearchBar
2718 Set whether or not search bar is displayed.
2719
2720 **Compatibility:** Firefox 60, Firefox ESR 60\
2721 **CCK2 Equivalent:** `showSearchBar`\
2722 **Preferences Affected:** N/A
2723
2724 #### Windows (GPO)
2725 ```
2726 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2727 ```
2728 #### macOS
2729 ```
2730 <dict>
2731 <key>SearchBar</key>
2732 <string>unified | separate</string>
2733 </dict>
2734 ```
2735
2736 #### policies.json
2737 ```
2738 {
2739 "policies": {
2740 "SearchBar": "unified" | "separate"
2741 }
2742 }
2743 ```
2744 <a name="SearchEngines"></a>
2745
2746 ### SearchEngines (This policy is only available on the ESR.)
2747
2748 ### SearchEngines | Default
2749
2750 Set the default search engine. This policy is only available on the ESR.
2751
2752 **Compatibility:** Firefox ESR 60\
2753 **CCK2 Equivalent:** `defaultSearchEngine`\
2754 **Preferences Affected:** N/A
2755
2756 #### Windows (GPO)
2757 ```
2758 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2759 ```
2760 #### macOS
2761 ```
2762 <dict>
2763 <key>SearchEngines</key>
2764 <dict>
2765 <key>Default</key>
2766 <string>NAME_OF_SEARCH_ENGINE</string>
2767 </dict>
2768 </dict>
2769 ```
2770 #### policies.json
2771 ```
2772 {
2773 "policies": {
2774 "SearchEngines": {
2775 "Default": "NAME_OF_SEARCH_ENGINE"
2776 }
2777 }
2778 }
2779 ```
2780 ### SearchEngines | PreventInstalls
2781
2782 Prevent installing search engines from webpages.
2783
2784 **Compatibility:** Firefox ESR 60\
2785 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2786 **Preferences Affected:** N/A
2787
2788 #### Windows (GPO)
2789 ```
2790 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2791 ```
2792 #### macOS
2793 ```
2794 <dict>
2795 <key>SearchEngines</key>
2796 <dict>
2797 <key>PreventInstalls</key>
2798 <true/> | <false/>
2799 </dict>
2800 </dict>
2801 ```
2802 #### policies.json
2803 ```
2804 {
2805 "policies": {
2806 "SearchEngines": {
2807 "PreventInstalls": true | false
2808 }
2809 }
2810 }
2811 ```
2812 ### SearchEngines | Remove
2813
2814 Hide built-in search engines. This policy is only available on the ESR.
2815
2816 **Compatibility:** Firefox ESR 60.2\
2817 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2818 **Preferences Affected:** N/A
2819
2820 #### Windows (GPO)
2821 ```
2822 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2823 ```
2824 #### macOS
2825 ```
2826 <dict>
2827 <key>SearchEngines</key>
2828 <dict>
2829 <key>Remove</key>
2830 <array>
2831 <string>NAME_OF_SEARCH_ENGINE</string>
2832 </array>
2833 </dict>
2834 </dict>
2835 ```
2836 #### policies.json
2837 ```
2838 {
2839 "policies": {
2840 "SearchEngines": {
2841 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2842 }
2843 }
2844 }
2845 ```
2846 ### SearchEngines | Add
2847
2848 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2849
2850 `Name` is the name of the search engine.
2851
2852 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2853
2854 `Method` is either GET or POST
2855
2856 `IconURL` is a URL for the icon to use.
2857
2858 `Alias` is a keyword to use for the engine.
2859
2860 `Description` is a description of the search engine.
2861
2862 `PostData` is the POST data as name value pairs separated by &.
2863
2864 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2865
2866 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2867 **CCK2 Equivalent:** `searchplugins`\
2868 **Preferences Affected:** N/A
2869
2870 #### Windows (GPO)
2871 ```
2872 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2873 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2874 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2875 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2876 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2877 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2878 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2879 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2880 ```
2881
2882 #### macOS
2883 ```
2884 <dict>
2885 <key>SearchEngines</key>
2886 <dict>
2887 <key>Add</key>
2888 <array>
2889 <dict>
2890 <key>Name</key>
2891 <string>Example1</string>
2892 <key>URLTemplate</key>
2893 <string>https://www.example.org/q={searchTerms}</string>
2894 <key>Method</key>
2895 <string>GET | POST </string>
2896 <key>IconURL</key>
2897 <string>https://www.example.org/favicon.ico</string>
2898 <key>Alias</key>
2899 <string>example</string>
2900 <key>Description</key>
2901 <string>Example Description</string>
2902 <key>SuggestURLTemplate</key>
2903 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2904 <key>PostData</key>
2905 <string>name=value&q={searchTerms}</string>
2906 </dict>
2907 <array>
2908 </dict>
2909 </dict>
2910 ```
2911 #### policies.json
2912 ```
2913 {
2914 "policies": {
2915 "SearchEngines": {
2916 "Add": [
2917 {
2918 "Name": "Example1",
2919 "URLTemplate": "https://www.example.org/q={searchTerms}",
2920 "Method": "GET" | "POST",
2921 "IconURL": "https://www.example.org/favicon.ico",
2922 "Alias": "example",
2923 "Description": "Description",
2924 "PostData": "name=value&q={searchTerms}",
2925 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2926 }
2927 ]
2928 }
2929 }
2930 }
2931 ```
2932 ### SearchSuggestEnabled
2933
2934 Enable search suggestions.
2935
2936 **Compatibility:** Firefox 68, Firefox ESR 68\
2937 **CCK2 Equivalent:** N/A\
2938 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2939
2940 #### Windows (GPO)
2941 ```
2942 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2943 ```
2944 #### macOS
2945 ```
2946 <dict>
2947 <key>SearchSuggestEnabled</key>
2948 <true/> | <false/>
2949 </dict>
2950 ```
2951 #### policies.json
2952 ```
2953 {
2954 "policies": {
2955 "SearchSuggestEnabled": true | false
2956 }
2957 }
2958 ```
2959 ### SecurityDevices
2960
2961 Install PKCS #11 modules.
2962
2963 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2964 **CCK2 Equivalent:** `certs.devices`\
2965 **Preferences Affected:** N/A
2966
2967 #### Windows (GPO)
2968 ```
2969 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2970 ```
2971 #### macOS
2972 ```
2973 <dict>
2974 <key>SecurityDevices</key>
2975 <dict>
2976 <key>NAME_OF_DEVICE</key>
2977 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2978 </dict>
2979 </dict>
2980 ```
2981
2982 #### policies.json
2983 ```
2984 {
2985 "policies": {
2986 "SecurityDevices": {
2987 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2988 }
2989 }
2990 }
2991 ```
2992 ### SSLVersionMax
2993
2994 Set and lock the maximum version of TLS.
2995
2996 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2997 **CCK2 Equivalent:** N/A\
2998 **Preferences Affected:** `security.tls.version.max`
2999
3000 #### Windows (GPO)
3001 ```
3002 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3003 ```
3004 #### macOS
3005 ```
3006 <dict>
3007 <key>SSLVersionMax</key>
3008 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3009 </dict>
3010 ```
3011
3012 #### policies.json
3013 ```
3014 {
3015 "policies": {
3016 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3017 }
3018 }
3019 ```
3020 ### SSLVersionMin
3021
3022 Set and lock the minimum version of TLS.
3023
3024 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3025 **CCK2 Equivalent:** N/A\
3026 **Preferences Affected:** `security.tls.version.min`
3027
3028 #### Windows (GPO)
3029 ```
3030 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3031 ```
3032 #### macOS
3033 ```
3034 <dict>
3035 <key>SSLVersionMin</key>
3036 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3037 </dict>
3038 ```
3039
3040 #### policies.json
3041 ```
3042 {
3043 "policies": {
3044 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3045 }
3046 }
3047 ```
3048 ### SupportMenu
3049 Add a menuitem to the help menu for specifying support information.
3050
3051 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3052 **CCK2 Equivalent:** helpMenu\
3053 **Preferences Affected:** N/A
3054
3055 #### Windows (GPO)
3056 ```
3057 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3058 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3059 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3060 ```
3061 #### macOS
3062 ```
3063 <dict>
3064 <key>SupportMenu</key>
3065 <dict>
3066 <key>Title</key>
3067 <string>SupportMenu</string>
3068 <key>URL</key>
3069 <string>http://example.com/support</string>
3070 <key>AccessKey</key>
3071 <string>S</string>
3072 </dict>
3073 </dict>
3074 ```
3075 #### policies.json
3076 ```
3077 {
3078 "policies": {
3079 "SupportMenu": {
3080 "Title": "Support Menu",
3081 "URL": "http://example.com/support",
3082 "AccessKey": "S"
3083 }
3084 }
3085 }
3086 ```
3087 ### UserMessaging
3088
3089 Prevent installing search engines from webpages.
3090
3091 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3092
3093 `ExtensionRecommendations` Don't recommend extensions.
3094
3095 `FeatureRecommendations` Don't recommend browser features.
3096
3097 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3098
3099 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3100 **CCK2 Equivalent:** N/A\
3101 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3102
3103 #### Windows (GPO)
3104 ```
3105 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3106 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3107 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3108 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3109 ```
3110 #### macOS
3111 ```
3112 <dict>
3113 <key>UserMessaging</key>
3114 <dict>
3115 <key>WhatsNew</key>
3116 <true/> | <false/>
3117 <key>ExtensionRecommendations</key>
3118 <true/> | <false/>
3119 <key>FeatureRecommendations</key>
3120 <true/> | <false/>
3121 <key>UrlbarInterventions</key>
3122 <true/> | <false/>
3123 </dict>
3124 </dict>
3125 ```
3126 #### policies.json
3127 ```
3128 {
3129 "policies": {
3130 "UserMessaging": {
3131 "WhatsNew": true | false,
3132 "ExtensionRecommendations": true | false,
3133 "FeatureRecommendations": true | false,
3134 "UrlbarInterventions": true | false
3135 }
3136 }
3137 }
3138 ```
3139 ### WebsiteFilter
3140 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3141
3142 **Compatibility:** Firefox 60, Firefox ESR 60\
3143 **CCK2 Equivalent:** N/A\
3144 **Preferences Affected:** N/A
3145
3146 #### Windows (GPO)
3147 ```
3148 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3149 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3150 ```
3151 #### macOS
3152 ```
3153 <dict>
3154 <key>WebsiteFilter</key>
3155 <dict>
3156 <key>Block</key>
3157 <array>
3158 <string><all_urls></string>
3159 </array>
3160 <key>Exceptions</key>
3161 <array>
3162 <string>http://example.org/*</string>
3163 </array>
3164 </dict>
3165
3166 </dict>
3167 ```
3168 #### policies.json
3169 ```
3170 {
3171 "policies": {
3172 "WebsiteFilter": {
3173 "Block": ["<all_urls>"],
3174 "Exceptions": ["http://example.org/*"]
3175 }
3176 }
3177 }
3178 ```

patrick-canterino.de