]> git.p6c8.net - policy-templates.git/blob - README.md
Add support for DisableDefaultBrowserAgent
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
26 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
27 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
28 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
29 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
30 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
31 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
32 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
33 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
34 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
35 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
36 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
37 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
38 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
39 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
40 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
41 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
42 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
43 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
44 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
45 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
46 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
47 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
48 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
49 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
50 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
51 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
52 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
53 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
54 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
55 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
56 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
57 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
58 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
59 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
60 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
61 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
62 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
63 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
64 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
65 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
66 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
67 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
68 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
69 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
70 | **[`Preferences`](#preferences)** | Set and lock some preferences.
71 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
72 | **[`Proxy`](#proxy)** | Configure proxy settings.
73 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
74 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
75 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
76 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
77 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
78 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
79 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
80 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
81 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
82 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
83 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
84 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
85 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
86 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
87 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
88
89 ### AppUpdateURL
90
91 Change the URL for application update.
92
93 **Compatibility:** Firefox 62, Firefox ESR 60.2\
94 **CCK2 Equivalent:** N/A\
95 **Preferences Affected:** `app.update.url`
96
97 #### Windows (GPO)
98 ```
99 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
100 ```
101 #### macOS
102 ```
103 <dict>
104 <key>AppUpdateURL</key>
105 <string>https://yoursite.com</string>
106 </dict>
107 ```
108 #### policies.json
109 ```
110 {
111 "policies": {
112 "AppUpdateURL": "https://yoursite.com"
113 }
114 }
115 ```
116 ### Authentication
117
118 Configure sites that support integrated authentication.
119
120 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
121
122 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
123 **CCK2 Equivalent:** N/A\
124 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
125
126 #### Windows (GPO)
127 ```
128 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
133 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
134 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
135 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
136 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
137 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
138 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
139 ```
140 #### macOS
141 ```
142 <dict>
143 <key>Authentication</key>
144 <dict>
145 <key>SPNEGO</key>
146 <array>
147 <string>mydomain.com</string>
148 <string>https://myotherdomain.com</string>
149 </array>
150 <key>Delegated</key>
151 <array>
152 <string>mydomain.com</string>
153 <string>https://myotherdomain.com</string>
154 </array>
155 <key>NTLM</key>
156 <array>
157 <string>mydomain.com</string>
158 <string>https://myotherdomain.com</string>
159 </array>
160 <key>AllowNonFQDN</key>
161 <dict>
162 <key>SPNEGO</key>
163 <true/> | <false/>
164 <key>NTLM</key>
165 <true/> | <false/>
166 </dict>
167 <key>AllowProxies</key>
168 <dict>
169 <key>SPNEGO</key>
170 <true/> | <false/>
171 <key>NTLM</key>
172 <true/> | <false/>
173 </dict>
174 <key>Locked</key>
175 <true/> | <false/>
176 </dict>
177 </dict>
178 ```
179 #### policies.json
180 ```
181 {
182 "policies": {
183 "Authentication": {
184 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
185 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
186 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
187 "AllowNonFQDN": {
188 "SPNEGO": true | false,
189 "NTLM": true | false
190 },
191 "AllowProxies": {
192 "SPNEGO": true | false,
193 "NTLM": true | false
194 },
195 "Locked": true | false
196 }
197 }
198 }
199 ```
200 ### BlockAboutAddons
201
202 Block access to the Add-ons Manager (about:addons).
203
204 **Compatibility:** Firefox 60, Firefox ESR 60\
205 **CCK2 Equivalent:** `disableAddonsManager`\
206 **Preferences Affected:** N/A
207
208 #### Windows (GPO)
209 ```
210 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
211 ```
212 #### macOS
213 ```
214 <dict>
215 <key>BlockAboutAddons</key>
216 <true/> | <false/>
217 </dict>
218 ```
219 #### policies.json
220 ```
221 {
222 "policies": {
223 "BlockAboutAddons": true | false
224 }
225 }
226 ```
227 ### BlockAboutConfig
228
229 Block access to about:config.
230
231 **Compatibility:** Firefox 60, Firefox ESR 60\
232 **CCK2 Equivalent:** `disableAboutConfig`\
233 **Preferences Affected:** N/A
234
235 #### Windows (GPO)
236 ```
237 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
238 ```
239 #### macOS
240 ```
241 <dict>
242 <key>BlockAboutConfig</key>
243 <true/> | <false/>
244 </dict>
245 ```
246 #### policies.json
247 ```
248 {
249 "policies": {
250 "BlockAboutConfig": true | false
251 }
252 }
253 ```
254 ### BlockAboutProfiles
255
256 Block access to About Profiles (about:profiles).
257
258 **Compatibility:** Firefox 60, Firefox ESR 60\
259 **CCK2 Equivalent:** `disableAboutProfiles`\
260 **Preferences Affected:** N/A
261
262 #### Windows (GPO)
263 ```
264 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
265 ```
266 #### macOS
267 ```
268 <dict>
269 <key>BlockAboutProfiles</key>
270 <true/> | <false/>
271 </dict>
272 ```
273 #### policies.json
274 ```
275 {
276 "policies": {
277 "BlockAboutProfiles": true | false
278 }
279 }
280 ```
281 ### BlockAboutSupport
282
283 Block access to Troubleshooting Information (about:support).
284
285 **Compatibility:** Firefox 60, Firefox ESR 60\
286 **CCK2 Equivalent:** `disableAboutSupport`\
287 **Preferences Affected:** N/A
288
289 #### Windows (GPO)
290 ```
291 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
292 ```
293 #### macOS
294 ```
295 <dict>
296 <key>BlockAboutSupport</key>
297 <true/> | <false/>
298 </dict>
299 ```
300 #### policies.json
301 ```
302 {
303 "policies": {
304 "BlockAboutSupport": true | false
305 }
306 }
307 ```
308 ### Bookmarks
309
310 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
311
312 **Compatibility:** Firefox 60, Firefox ESR 60\
313 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
314 **Preferences Affected:** N/A
315
316 #### Windows (GPO)
317 ```
318 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
319 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
320 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
321 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
322 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
323 ```
324 #### macOS
325 ```
326 <dict>
327 <key>Bookmarks</key>
328 <array>
329 <dict>
330 <key>Title</key>
331 <string>Example</string>
332 <key>URL</key>
333 <string>https://example.com</string>
334 <key>Favicon</key>
335 <string>https://example.com/favicon.ico</string>
336 <key>Placement</key>
337 <string>toolbar | menu</string>
338 <key>Folder</key>
339 <string>FolderName</string>
340 </dict>
341 </array>
342 </dict>
343 ```
344 #### policies.json
345 ```
346 {
347 "policies": {
348 "Bookmarks": [
349 {
350 "Title": "Example",
351 "URL": "https://example.com",
352 "Favicon": "https://example.com/favicon.ico",
353 "Placement": "toolbar" | "menu",
354 "Folder": "FolderName"
355 }
356 ]
357 }
358 }
359 ```
360 ### CaptivePortal
361 Enable or disable the detection of captive portals.
362
363 **Compatibility:** Firefox 67, Firefox ESR 60.7\
364 **CCK2 Equivalent:** N/A\
365 **Preferences Affected:** `network.captive-portal-service.enabled`
366
367 #### Windows (GPO)
368 ```
369 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
370 ```
371 #### macOS
372 ```
373 <dict>
374 <key>CaptivePortal</key>
375 <true/> | <false/>
376 </dict>
377 ```
378 #### policies.json
379 ```
380 {
381 "policies": {
382 "CaptivePortal": true | false
383 }
384 }
385 ```
386 ### Certificates
387
388 ### Certificates | ImportEnterpriseRoots
389
390 Trust certificates that have been added to the operating system certificate store by a user or administrator.
391
392 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
393
394 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
395 **CCK2 Equivalent:** N/A\
396 **Preferences Affected:** `security.enterprise_roots.enabled`
397
398 #### Windows (GPO)
399 ```
400 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
401 ```
402 #### macOS
403 ```
404 <dict>
405 <key>Certificates</key>
406 <dict>
407 <key>ImportEnterpriseRoots</key>
408 <true/> | <false/>
409 </dict>
410 </dict>
411 ```
412 #### policies.json
413 ```
414 {
415 "policies": {
416 "Certificates": {
417 "ImportEnterpriseRoots": true | false
418 }
419 }
420 }
421 ```
422 ### Certificates | Install
423
424 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
425
426 - Windows
427 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
428 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
429 - macOS
430 - /Library/Application Support/Mozilla/Certificates
431 - ~/Library/Application Support/Mozilla/Certificates
432 - Linux
433 - /usr/lib/mozilla/certificates
434 - /usr/lib64/mozilla/certificates
435 - ~/.mozilla/certificates
436
437 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
438
439 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
440
441 Certificates are installed using the trust string `CT,CT,`.
442
443 Binary (DER) and ASCII (PEM) certificates are both supported.
444
445 **Compatibility:** Firefox 64, Firefox ESR 64\
446 **CCK2 Equivalent:** `certs.ca`\
447 **Preferences Affected:** N/A
448
449 #### Windows (GPO)
450 ```
451 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
452 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
453 ```
454 #### macOS
455 ```
456 <dict>
457 <key>Certificates</key>
458 <dict>
459 <key>Install</key>
460 <array>
461 <string>cert1.der</string>
462 <string>/Users/username/cert2.pem</string>
463 </array>
464 </dict>
465 </dict>
466 ```
467 #### policies.json
468 ```
469 {
470 "policies": {
471 "Certificates": {
472 "Install": ["cert1.der", "/home/username/cert2.pem"]
473 }
474 }
475 }
476 ```
477 ### Cookies
478 Configure cookie preferences.
479
480 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
481
482 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
483
484 `Default` determines whether cookies are accepted at all.
485
486 `AcceptThirdParty` determines how third-party cookies are handled.
487
488 `ExpireAtSessionEnd` determines when cookies expire.
489
490 `RejectTracker` only rejects cookies for trackers.
491
492 `Locked` prevents the user from changing cookie preferences.
493
494 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
495 **CCK2 Equivalent:** N/A\
496 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
497
498 #### Windows (GPO)
499 ```
500 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
501 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
502 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
503 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
504 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
505 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
506 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
507 ```
508 #### macOS
509 ```
510 <dict>
511 <key>Cookies</key>
512 <dict>
513 <key>Allow</key>
514 <array>
515 <string>http://example.com</string>
516 </array>
517 <key>Block</key>
518 <array>
519 <string>http://example.org</string>
520 </array>
521 <key>Default</key>
522 <true/> | <false/>
523 <key>AcceptThirdParty</key>
524 <string>always | never | from-visited</string>
525 <key>ExpireAtSessionEnd</key>
526 <true/> | <false/>
527 <key>RejectTracker</key>
528 <true/> | <false/>
529 <key>Locked</key>
530 <true/> | <false/>
531 </dict>
532 </dict>
533 ```
534 #### policies.json
535 ```
536 {
537 "policies": {
538 "Cookies": {
539 "Allow": ["http://example.org/"],
540 "Block": ["http://example.edu/"],
541 "Default": true | false,
542 "AcceptThirdParty": "always" | "never" | "from-visited",
543 "ExpireAtSessionEnd": true | false,
544 "RejectTracker": true | false,
545 "Locked": true | false
546 }
547 }
548 }
549 ```
550 ### DisableSetDesktopBackground
551 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
552
553 **Compatibility:** Firefox 60, Firefox ESR 60\
554 **CCK2 Equivalent:** `removeSetDesktopBackground`\
555 **Preferences Affected:** N/A
556
557 #### Windows (GPO)
558 ```
559 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
560 ```
561
562 #### macOS
563 ```
564 <dict>
565 <key>DisableSetDesktopBackground</key>
566 <true/> | <false/>
567 </dict>
568 ```
569 #### policies.json
570 ```
571 {
572 "policies": {
573 "DisableSetDesktopBackground": true | false
574 }
575 }
576 ```
577 ### DisableMasterPasswordCreation
578 Remove the master password functionality.
579
580 **Compatibility:** Firefox 60, Firefox ESR 60\
581 **CCK2 Equivalent:** `noMasterPassword`\
582 **Preferences Affected:** N/A
583
584 #### Windows (GPO)
585 ```
586 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
587 ```
588
589 #### macOS
590 ```
591 <dict>
592 <key>DisableMasterPasswordCreation</key>
593 <true/> | <false/>
594 </dict>
595 ```
596 #### policies.json
597 ```
598 {
599 "policies": {
600 "DisableMasterPasswordCreation": true | false
601 }
602 }
603 ```
604 ### DisableAppUpdate
605 Turn off application updates.
606
607 **Compatibility:** Firefox 60, Firefox ESR 60\
608 **CCK2 Equivalent:** `disableFirefoxUpdates`\
609 **Preferences Affected:** N/A
610
611 #### Windows (GPO)
612 ```
613 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
614 ```
615 #### macOS
616 ```
617 <dict>
618 <key>DisableAppUpdate</key>
619 <true/> | <false/>
620 </dict>
621 ```
622 #### policies.json
623 ```
624 {
625 "policies": {
626 "DisableAppUpdate": true | false
627 }
628 }
629 ```
630 ### DisableBuiltinPDFViewer
631 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
632
633 **Compatibility:** Firefox 60, Firefox ESR 60\
634 **CCK2 Equivalent:** `disablePDFjs`\
635 **Preferences Affected:** `pdfjs.disabled`
636
637 #### Windows (GPO)
638 ```
639 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
640 ```
641
642 #### macOS
643 ```
644 <dict>
645 <key>DisableBuiltinPDFViewer</key>
646 <true/> | <false/>
647 </dict>
648 ```
649 #### policies.json
650 ```
651 {
652 "policies": {
653 "DisableBuiltinPDFViewer": true | false
654 }
655 }
656 ```
657 ### DisableDefaultBrowserAgent
658 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
659
660 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
661 **CCK2 Equivalent:** N/A\
662 **Preferences Affected:** N/A
663
664 #### Windows (GPO)
665 ```
666 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
667 ```
668
669 #### policies.json
670 ```
671 {
672 "policies": {
673 "DisableDefaultBrowserAgent": true | false
674 }
675 }
676 ```
677 ### DisableDeveloperTools
678 Remove access to all developer tools.
679
680 **Compatibility:** Firefox 60, Firefox ESR 60\
681 **CCK2 Equivalent:** `removeDeveloperTools`\
682 **Preferences Affected:** `devtools.policy.disabled`
683
684 #### Windows (GPO)
685 ```
686 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
687 ```
688
689 #### macOS
690 ```
691 <dict>
692 <key>DisableDeveloperTools</key>
693 <true/> | <false/>
694 </dict>
695 ```
696 #### policies.json
697 ```
698 {
699 "policies": {
700 "DisableDeveloperTools": true | false
701 }
702 }
703 ```
704 ### DisableFeedbackCommands
705 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
706
707 **Compatibility:** Firefox 60, Firefox ESR 60\
708 **CCK2 Equivalent:** N/A\
709 **Preferences Affected:** N/A
710
711 #### Windows (GPO)
712 ```
713 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
714 ```
715 #### macOS
716 ```
717 <dict>
718 <key>DisableFeedbackCommands</key>
719 <true/> | <false/>
720 </dict>
721 ```
722 #### policies.json
723 ```
724 {
725 "policies": {
726 "DisableFeedbackCommands": true | false
727 }
728 }
729 ```
730 ### DisableFirefoxScreenshots
731 Remove access to Firefox Screenshots.
732
733 **Compatibility:** Firefox 60, Firefox ESR 60\
734 **CCK2 Equivalent:** N/A\
735 **Preferences Affected:** `extensions.screenshots.disabled`
736
737 #### Windows (GPO)
738 ```
739 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
740 ```
741 #### macOS
742 ```
743 <dict>
744 <key>DisableFirefoxScreenshots</key>
745 <true/> | <false/>
746 </dict>
747 ```
748 #### policies.json
749 ```
750 {
751 "policies": {
752 "DisableFirefoxScreenshots": true | false
753 }
754 }
755 ```
756 ### DisableFirefoxAccounts
757 Disable Firefox Accounts integration (Sync).
758
759 **Compatibility:** Firefox 60, Firefox ESR 60\
760 **CCK2 Equivalent:** `disableSync`\
761 **Preferences Affected:** `identity.fxaccounts.enabled`
762
763 #### Windows (GPO)
764 ```
765 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
766 ```
767 #### macOS
768 ```
769 <dict>
770 <key>DisableFirefoxAccounts</key>
771 <true/> | <false/>
772 </dict>
773 ```
774 #### policies.json
775 ```
776 {
777 "policies": {
778 "DisableFirefoxAccounts": true | false
779 }
780 }
781 ```
782 ### DisableFirefoxStudies
783 Disable Firefox studies (Shield).
784
785 **Compatibility:** Firefox 60, Firefox ESR 60\
786 **CCK2 Equivalent:** N/A\
787 **Preferences Affected:** N/A
788
789 #### Windows (GPO)
790 ```
791 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
792 ```
793 #### macOS
794 ```
795 <dict>
796 <key>DisableFirefoxStudies</key>
797 <true/> | <false/>
798 </dict>
799 ```
800 #### policies.json
801 ```
802 {
803 "policies": {
804 "DisableFirefoxStudies": true | false
805 }
806 }
807 ```
808 ### DisableForgetButton
809 Disable the "Forget" button.
810
811 **Compatibility:** Firefox 60, Firefox ESR 60\
812 **CCK2 Equivalent:** `disableForget`\
813 **Preferences Affected:** N/A
814
815 #### Windows (GPO)
816 ```
817 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
818 ```
819 #### macOS
820 ```
821 <dict>
822 <key>DisableForgetButton</key>
823 <true/> | <false/>
824 </dict>
825 ```
826 #### policies.json
827 ```
828 {
829 "policies": {
830 "DisableForgetButton": true | false
831 }
832 }
833 ```
834 ### DisableFormHistory
835 Turn off saving information on web forms and the search bar.
836
837 **Compatibility:** Firefox 60, Firefox ESR 60\
838 **CCK2 Equivalent:** `disableFormFill`\
839 **Preferences Affected:** ` browser.formfill.enable`
840
841 #### Windows (GPO)
842 ```
843 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
844 ```
845 #### macOS
846 ```
847 <dict>
848 <key>DisableFormHistory</key>
849 <true/> | <false/>
850 </dict>
851 ```
852 #### policies.json
853 ```
854 {
855 "policies": {
856 "DisableFormHistory": true | false
857 }
858 }
859 ```
860 ### DisablePasswordReveal
861 Do not allow passwords to be shown in saved logins
862
863 **Compatibility:** Firefox 71, Firefox ESR 68.3\
864 **CCK2 Equivalent:** N/A
865 **Preferences Affected:** N/A
866
867 #### Windows (GPO)
868 ```
869 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
870 ```
871
872 #### macOS
873 ```
874 <dict>
875 <key>DisablePasswordReveal</key>
876 <true/> | <false/>
877 </dict>
878 ```
879 #### policies.json
880 ```
881 {
882 "policies": {
883 "DisablePasswordReveal": true | false
884 }
885 }
886 ```
887 ### DisablePocket
888 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
889
890 **Compatibility:** Firefox 60, Firefox ESR 60\
891 **CCK2 Equivalent:** `disablePocket`\
892 **Preferences Affected:** `extensions.pocket.enabled`
893
894 #### Windows (GPO)
895 ```
896 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
897 ```
898 #### macOS
899 ```
900 <dict>
901 <key>DisablePocket</key>
902 <true/> | <false/>
903 </dict>
904 ```
905 #### policies.json
906 ```
907 {
908 "policies": {
909 "DisablePocket": true | false
910 }
911 }
912 ```
913 ### DisablePrivateBrowsing
914 Remove access to private browsing.
915
916 **Compatibility:** Firefox 60, Firefox ESR 60\
917 **CCK2 Equivalent:** `disablePrivateBrowsing`\
918 **Preferences Affected:** N/A
919
920 #### Windows (GPO)
921 ```
922 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
923 ```
924 #### macOS
925 ```
926 <dict>
927 <key>DisablePrivateBrowsing</key>
928 <true/> | <false/>
929 </dict>
930 ```
931 #### policies.json
932 ```
933 {
934 "policies": {
935 "DisablePrivateBrowsing": true | false
936 }
937 }
938 ```
939 ### DisableProfileImport
940 Disables the "Import data from another browser" option in the bookmarks window.
941
942 **Compatibility:** Firefox 60, Firefox ESR 60\
943 **CCK2 Equivalent:** N/A\
944 **Preferences Affected:** N/A
945
946 #### Windows (GPO)
947 ```
948 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
949 ```
950 #### macOS
951 ```
952 <dict>
953 <key>DisableProfileImport</key>
954 <true/> | <false/>
955 </dict>
956 ```
957 #### policies.json
958 ```
959 {
960 "policies": {
961 "DisableProfileImport": true | false
962 }
963 }
964 ```
965 ### DisableProfileRefresh
966 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
967
968 **Compatibility:** Firefox 60, Firefox ESR 60\
969 **CCK2 Equivalent:** `disableResetFirefox`\
970 **Preferences Affected:** `browser.disableResetPrompt`
971
972 #### Windows (GPO)
973 ```
974 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
975 ```
976 #### macOS
977 ```
978 <dict>
979 <key>DisableProfileRefresh</key>
980 <true/> | <false/>
981 </dict>
982 ```
983 #### policies.json
984 ```
985 {
986 "policies": {
987 "DisableProfileRefresh": true | false
988 }
989 }
990 ```
991 ### DisableSafeMode
992 Disable safe mode within the browser.
993
994 On Windows, this disables safe mode via the command line as well.
995
996 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
997 **CCK2 Equivalent:** `disableSafeMode`\
998 **Preferences Affected:** N/A
999
1000 #### Windows (GPO)
1001 ```
1002 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1003 ```
1004 #### macOS
1005 ```
1006 <dict>
1007 <key>DisableSafeMode</key>
1008 <true/> | <false/>
1009 </dict>
1010 ```
1011 #### policies.json
1012 ```
1013 {
1014 "policies": {
1015 "DisableSafeMode": true | false
1016 }
1017 }
1018 ```
1019 ### DisableSecurityBypass
1020 Prevent the user from bypassing security in certain cases.
1021
1022 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1023
1024 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1025
1026 **Compatibility:** Firefox 60, Firefox ESR 60\
1027 **CCK2 Equivalent:** N/A\
1028 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1029
1030 #### Windows (GPO)
1031 ```
1032 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1033 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1034 ```
1035 #### macOS
1036 ```
1037 <dict>
1038 <key>DisableSecurityBypass</key>
1039 <dict>
1040 <key>InvalidCertificate</key>
1041 <true/> | <false/>
1042 <key><SafeBrowsing/key>
1043 <true/> | <false/>
1044 </dict>
1045 </dict>
1046 ```
1047 #### policies.json
1048 ```
1049 {
1050 "policies": {
1051 "DisableSecurityBypass": {
1052 "InvalidCertificate": true false,
1053 "SafeBrowsing": true false
1054 }
1055 }
1056 }
1057 ```
1058 ### DisableSystemAddonUpdate
1059 Prevent system add-ons from being installed or update.
1060
1061 **Compatibility:** Firefox 60, Firefox ESR 60\
1062 **CCK2 Equivalent:** N/A\
1063 **Preferences Affected:** N/A
1064
1065 #### Windows (GPO)
1066 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1067 ```
1068 #### macOS
1069 ```
1070 <dict>
1071 <key>DisableSystemAddonUpdate</key>
1072 <true/> | <false/>
1073 </dict>
1074 ```
1075 #### policies.json
1076 ```
1077 {
1078 "policies": {
1079 "DisableSystemAddonUpdate": true | false
1080 }
1081 }
1082 ```
1083 ### DisableTelemetry
1084 Prevent the upload of telemetry data.
1085
1086 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1087
1088 **Compatibility:** Firefox 60, Firefox ESR 60\
1089 **CCK2 Equivalent:** `disableTelemetry`\
1090 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1091
1092 #### Windows (GPO)
1093 ```
1094 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1095 ```
1096 #### macOS
1097 ```
1098 <dict>
1099 <key>DisableTelemetry</key>
1100 <true/> | <false/>
1101 </dict>
1102 ```
1103 #### policies.json
1104 ```
1105 {
1106 "policies": {
1107 "DisableTelemetry": true | false
1108 }
1109 }
1110 ```
1111 ### DisplayBookmarksToolbar
1112 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1113
1114 **Compatibility:** Firefox 60, Firefox ESR 60\
1115 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1116 **Preferences Affected:** N/A
1117
1118 #### Windows (GPO)
1119 ```
1120 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1121 ```
1122 #### macOS
1123 ```
1124 <dict>
1125 <key>DisplayBookmarksToolbar</key>
1126 <true/> | <false/>
1127 </dict>
1128 ```
1129 #### policies.json
1130 ```
1131 {
1132 "policies": {
1133 "DisplayBookmarksToolbar": true | false
1134 }
1135 }
1136 ```
1137 ### DisplayMenuBar (Deprecated)
1138 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1139
1140 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1141 **CCK2 Equivalent:** `displayMenuBar`\
1142 **Preferences Affected:** N/A
1143
1144 #### Windows (GPO)
1145 ```
1146 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1147 ```
1148 #### macOS
1149 ```
1150 <dict>
1151 <key>DisplayMenuBar</key>
1152 <true/> | <false/>
1153 </dict>
1154 ```
1155 #### policies.json
1156 ```
1157 {
1158 "policies": {
1159 "DisplayMenuBar": true | false
1160 }
1161 }
1162 ```
1163 ### DisplayMenuBar
1164 Set the state of the menubar.
1165
1166 `always` means the menubar is shown and cannot be hidden.
1167
1168 `never` means the menubar is hidden and cannot be shown.
1169
1170 `default-on` means the menubar is on by default but can be hidden.
1171
1172 `default-off` means the menubar is off by default but can be shown.
1173
1174 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1175 **CCK2 Equivalent:** `displayMenuBar`\
1176 **Preferences Affected:** N/A
1177
1178 #### Windows (GPO)
1179 ```
1180 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1181 ```
1182 #### macOS
1183 ```
1184 <dict>
1185 <key>DisplayMenuBar</key>
1186 <string>always | never | default-on | default-off</string>
1187 </dict>
1188 ```
1189 #### policies.json
1190 ```
1191 {
1192 "policies": {
1193 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1194 }
1195 }
1196 ```
1197 ### DNSOverHTTPS
1198 Configure DNS over HTTPS.
1199
1200 `Enabled` determines whether DNS over HTTPS is enabled
1201
1202 `ProviderURL` is a URL to another provider.
1203
1204 `Locked` prevents the user from changing DNS over HTTPS preferences.
1205
1206 **Compatibility:** Firefox 63, Firefox ESR 68\
1207 **CCK2 Equivalent:** N/A\
1208 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1209
1210 #### Windows (GPO)
1211 ```
1212 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1213 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1214 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1215 ```
1216 #### macOS
1217 ```
1218 <dict>
1219 <key>DNSOverHTTPS</key>
1220 <dict>
1221 <key>Enabled</key>
1222 <true/> | <false/>
1223 <key>ProviderURL</key>
1224 <string>URL_TO_ALTERNATE_PROVIDER</string>
1225 <key>Locked</key>
1226 <true/> | <false/>
1227 </dict>
1228 </dict>
1229 ```
1230 #### policies.json
1231 ```
1232 {
1233 "policies": {
1234 "DNSOverHTTPS": {
1235 "Enabled": true | false,
1236 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1237 "Locked": true | false
1238 }
1239 }
1240 }
1241 ```
1242 ### DontCheckDefaultBrowser
1243 Don't check if Firefox is the default browser at startup.
1244
1245 **Compatibility:** Firefox 60, Firefox ESR 60\
1246 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1247 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1248
1249 #### Windows (GPO)
1250 ```
1251 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1252 ```
1253 #### macOS
1254 ```
1255 <dict>
1256 <key>DontCheckDefaultBrowser</key>
1257 <true/> | <false/>
1258 </dict>
1259 ```
1260 #### policies.json
1261 ```
1262 {
1263 "policies": {
1264 "DontCheckDefaultBrowser": true | false
1265 }
1266 }
1267 ```
1268 ### DefaultDownloadDirectory
1269 Set the default download directory.
1270
1271 You can use ${home} for the native home directory.
1272
1273 **Compatibility:** Firefox 68, Firefox ESR 68\
1274 **CCK2 Equivalent:** N/A\
1275 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1276
1277 #### Windows (GPO)
1278 ```
1279 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1280 ```
1281 #### macOS
1282 ```
1283 <dict>
1284 <key>DefaultDownloadDirectory</key>
1285 <string>${home}/Downloads</string>
1286 </dict>
1287 ```
1288 #### policies.json (macOS and Linux)
1289 ```
1290 {
1291 "policies": {
1292 "DefaultDownloadDirectory": "${home}/Downloads"
1293 }
1294 ```
1295 #### policies.json (Windows)
1296 ```
1297 {
1298 "policies": {
1299 "DefaultDownloadDirectory": "${home}\\Downloads"
1300 }
1301 ```
1302 ### DownloadDirectory
1303 Set and lock the download directory.
1304
1305 You can use ${home} for the native home directory.
1306
1307 **Compatibility:** Firefox 68, Firefox ESR 68\
1308 **CCK2 Equivalent:** N/A\
1309 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1310
1311 #### Windows (GPO)
1312 ```
1313 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1314 ```
1315 #### macOS
1316 ```
1317 <dict>
1318 <key>DownloadDirectory</key>
1319 <string>${home}/Downloads</string>
1320 </dict>
1321 ```
1322 #### policies.json (macOS and Linux)
1323 ```
1324 {
1325 "policies": {
1326 "DownloadDirectory": "${home}/Downloads"
1327 }
1328 ```
1329 #### policies.json (Windows)
1330 ```
1331 {
1332 "policies": {
1333 "DownloadDirectory": "${home}\\Downloads"
1334 }
1335 ```
1336 ### EnableTrackingProtection
1337 Configure tracking protection.
1338
1339 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1340
1341 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1342
1343 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1344
1345 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1346
1347 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1348
1349 `Exceptions` are origins for which tracking protection is not enabled.
1350
1351 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1352 **CCK2 Equivalent:** N/A\
1353 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1354
1355 #### Windows (GPO)
1356 ```
1357 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1358 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1359 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1360 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1361 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1362 ```
1363 #### macOS
1364 ```
1365 <dict>
1366 <key>EnableTrackingProtection</key>
1367 <dict>
1368 <key>Value</key>
1369 <true/> | <false/>
1370 <key><Locked</key>
1371 <true/> | <false/>
1372 <key><Cryptomining</key>
1373 <true/> | <false/>
1374 <key><Fingerprinting</key>
1375 <true/> | <false/>
1376 <key>Exceptions</key>
1377 <array>
1378 <string>https://example.com</string>
1379 </array>
1380 </dict>
1381 </dict>
1382 ```
1383 #### policies.json
1384 ```
1385 {
1386 "policies": {
1387 "EnableTrackingProtection": {
1388 "Value": [true, false],
1389 "Locked": [true, false],
1390 "Cryptomining": [true, false],
1391 "Fingerprinting": [true, false],
1392 "Exceptions": ["https://example.com"]
1393 }
1394 }
1395 ```
1396 ### EnterprisePoliciesEnabled
1397 Enable policy support on macOS.
1398
1399 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1400 **CCK2 Equivalent:** N/A\
1401 **Preferences Affected:** N/A
1402
1403 #### macOS
1404 ```
1405 <dict>
1406 <key>EnterprisePoliciesEnabled</key>
1407 <true/>
1408 </dict>
1409 ```
1410 ### Extensions
1411 Control the installation, uninstallation and locking of extensions.
1412
1413 `Install` is a list of URLs or native paths for extensions to be installed.
1414
1415 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1416
1417 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1418
1419 **Compatibility:** Firefox 60, Firefox ESR 60\
1420 **CCK2 Equivalent:** `addons`\
1421 **Preferences Affected:** N/A
1422
1423 #### Windows (GPO)
1424 ```
1425 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1426 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1427 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1428 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1429 ```
1430 #### macOS
1431 ```
1432 <dict>
1433 <key>Extensions</key>
1434 <dict>
1435 <key>Install</key>
1436 <array>
1437 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1438 <string>//path/to/xpi</string>
1439 </array>
1440 <key>Uninstall</key>
1441 <array>
1442 <string>bad_addon_id@mozilla.org</string>
1443 </array>
1444 <key>Locked</key>
1445 <array>
1446 <string>addon_id@mozilla.org</string>
1447 </array>
1448 </dict>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "Extensions": {
1456 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1457 "Uninstall": ["bad_addon_id@mozilla.org"],
1458 "Locked": ["addon_id@mozilla.org"]
1459 }
1460 }
1461 }
1462 ```
1463 ### ExtensionSettings
1464 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1465
1466 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1467
1468 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1469
1470 The configuration for each extension is another dictionary that can contain the fields documented below.
1471
1472 | Name | Description |
1473 | --- | --- |
1474 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1475 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1476 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1477 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1478 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1479 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1480 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1481 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1482 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1483
1484 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1485 **CCK2 Equivalent:** N/A\
1486 **Preferences Affected:** N/A
1487
1488 #### Windows (GPO)
1489 ```
1490 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1491 {
1492 "*": {
1493 "blocked_install_message": "Custom error message.",
1494 "install_sources": ["https://addons.mozilla.org/"],
1495 "installation_mode": "blocked",
1496 "allowed_types": ["extension"]
1497 },
1498 "uBlock0@raymondhill.net": {
1499 "installation_mode": "force_installed",
1500 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1501 }
1502 }
1503 ```
1504 #### macOS
1505 ```
1506 <dict>
1507 <key>ExtensionSettings</key>
1508 <dict>
1509 <key>*</key>
1510 <dict>
1511 <key>blocked_install_message</key>
1512 <string>Custom error message.</string>
1513 <key>install_sources</key>
1514 <array>
1515 <string>https://addons.mozilla.org/</string>
1516 </array>
1517 <key>installation_mode</key>
1518 <string>blocked</string>
1519 <key>allowed_types</key>
1520 <array>
1521 <string>extension</string>
1522 </array>
1523 </dict>
1524 <key>uBlock0@raymondhill.net</key>
1525 <dict>
1526 <key>installation_mode</key>
1527 <string>force_installed</string>
1528 <key>install_url</key>
1529 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1530 </dict>
1531 </dict>
1532 </dict>
1533 ```
1534 #### policies.json
1535 ```
1536 {
1537 "policies": {
1538 "ExtensionSettings": {
1539 "*": {
1540 "blocked_install_message": "Custom error message.",
1541 "install_sources": ["https://addons.mozilla.org/"],
1542 "installation_mode": "blocked",
1543 "allowed_types": ["extension"]
1544 },
1545 "uBlock0@raymondhill.net": {
1546 "installation_mode": "force_installed",
1547 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1548 }
1549 }
1550 }
1551 }
1552 ```
1553 ### ExtensionUpdate
1554 Control extension updates.
1555
1556 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1557 **CCK2 Equivalent:** N/A\
1558 **Preferences Affected:** `extensions.update.enabled`
1559
1560 #### Windows (GPO)
1561 ```
1562 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1563 ```
1564 #### macOS
1565 ```
1566 <dict>
1567 <key>ExtensionUpdate</key>
1568 <true/> | <false/>
1569 </dict>
1570 ```
1571 #### policies.json
1572 ```
1573 {
1574 "policies": {
1575 "ExtensionUpdate": true | false
1576 }
1577 }
1578 ```
1579 ### FlashPlugin
1580 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1581
1582 `Allow` is a list of origins where Flash are allowed.
1583
1584 `Block` is a list of origins where Flash is not allowed.
1585
1586 `Default` determines whether or not Flash is allowed by default.
1587
1588 `Locked` prevents the user from changing Flash preferences.
1589
1590 **Compatibility:** Firefox 60, Firefox ESR 60\
1591 **CCK2 Equivalent:** `permissions.plugin`\
1592 **Preferences Affected:** `plugin.state.flash`
1593
1594 #### Windows (GPO)
1595 ```
1596 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1597 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1598 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1599 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1600 ```
1601 #### macOS
1602 ```
1603 <dict>
1604 <key>FlashPlugin</key>
1605 <dict>
1606 <key>Allow</key>
1607 <array>
1608 <string>http://example.org</string>
1609 </array>
1610 <key>Block</key>
1611 <array>
1612 <string>http://example.edu</string>
1613 </array>
1614 <key>Default</key>
1615 <true/> | <false/>
1616 <key>Locked</key>
1617 <true/> | <false/>
1618 </dict>
1619 </dict>
1620 ```
1621 #### policies.json
1622 ```
1623 {
1624 "policies": {
1625 "FlashPlugin": {
1626 "Allow": ["http://example.org/"],
1627 "Block": ["http://example.edu/"],
1628 "Default": true | false,
1629 "Locked": true | false
1630 }
1631 }
1632 }
1633 ```
1634 ### FirefoxHome
1635 Customize the Firefox Home page.
1636
1637 **Compatibility:** Firefox 68, Firefox ESR 68\
1638 **CCK2 Equivalent:** N/A\
1639 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1640
1641 #### Windows (GPO)
1642 ```
1643 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1644 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1645 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1646 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1647 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1648 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1649 ```
1650 #### macOS
1651 ```
1652 <dict>
1653 <key>FirefoxHome</key>
1654 <dict>
1655 <key>Search</key>
1656 <true/> | <false/>
1657 <key>TopSites</key>
1658 <true/> | <false/>
1659 <key>Highlights</key>
1660 <true/> | <false/>
1661 <key>Pocket</key>
1662 <true/> | <false/>
1663 <key>Snippets</key>
1664 <true/> | <false/>
1665 <key>Locked</key>
1666 <true/> | <false/>
1667 </dict>
1668 </dict>
1669 ```
1670 #### policies.json
1671 ```
1672 {
1673 "policies": {
1674 "FirefoxHome": {
1675 "Search": true | false,
1676 "TopSites": true | false,
1677 "Highlights": true | false,
1678 "Pocket": true | false,
1679 "Snippets": true | false,
1680 "Locked": true | false
1681 }
1682 }
1683 }
1684 ```
1685 ### HardwareAcceleration
1686 Control hardware acceleration.
1687
1688 **Compatibility:** Firefox 60, Firefox ESR 60\
1689 **CCK2 Equivalent:** N/A\
1690 **Preferences Affected:** `layers.acceleration.disabled`
1691
1692 #### Windows (GPO)
1693 ```
1694 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1695 ```
1696 #### macOS
1697 ```
1698 <dict>
1699 <key>HardwareAcceleration</key>
1700 <true/> | <false/>
1701 </dict>
1702 ```
1703 #### policies.json
1704 ```
1705 {
1706 "policies": {
1707 "HardwareAcceleration": true | false
1708 }
1709 }
1710 ```
1711 ### Homepage
1712 Configure the default homepage and how Firefox starts.
1713
1714 `URL` is the default homepage.
1715
1716 `Locked` prevents the user from changing homepage preferences.
1717
1718 `Additional` allows for more than one homepage.
1719
1720 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1721
1722 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1723 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1724 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1725
1726 #### Windows (GPO)
1727 ```
1728 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1729 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1730 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1731 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1732 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1733 ```
1734 #### macOS
1735 ```
1736 <dict>
1737 <key>Homepage</key>
1738 <dict>
1739 <key>URL</key>
1740 <string>http://example.com</string>
1741 <key>Locked</key>
1742 <true/> | <false/>
1743 <key>Additional</key>
1744 <array>
1745 <string>http://example.org</string>
1746 <string>http://example.edu</string>
1747 </array>
1748 <key>StartPage</key>
1749 <string>none | homepage | previous-session</string>
1750 </dict>
1751 </dict>
1752 ```
1753 #### policies.json
1754 ```
1755 {
1756 "policies": {
1757 "Homepage": {
1758 "URL": "http://example.com/",
1759 "Locked": true | false,
1760 "Additional": ["http://example.org/",
1761 "http://example.edu/"],
1762 "StartPage": "none" | "homepage" | "previous-session"
1763 }
1764 }
1765 }
1766 ```
1767 ### InstallAddonsPermission
1768 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1769
1770 `Allow` is a list of origins where extension installs are allowed.
1771
1772 `Default` determines whether or not extension installs are allowed by default.
1773
1774 **Compatibility:** Firefox 60, Firefox ESR 60\
1775 **CCK2 Equivalent:** `permissions.install`\
1776 **Preferences Affected:** `xpinstall.enabled`
1777
1778 #### Windows (GPO)
1779 ```
1780 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1781 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1782 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1783 ```
1784 #### macOS
1785 ```
1786 <dict>
1787 <key>InstallAddonsPermission</key>
1788 <dict>
1789 <key>Allow</key>
1790 <array>
1791 <string>http://example.org</string>
1792 <string>http://example.edu</string>
1793 </array>
1794 <key>Default</key>
1795 <true/> | <false/>
1796 </dict>
1797 </dict>
1798 ```
1799 #### policies.json
1800 ```
1801 {
1802 "policies": {
1803 "InstallAddonsPermission": {
1804 "Allow": ["http://example.org/",
1805 "http://example.edu/"],
1806 "Default": true | false
1807 }
1808 }
1809 }
1810 ```
1811 ### LegacyProfiles
1812 Disable the feature enforcing a separate profile for each installation.
1813
1814 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1815
1816 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1817
1818 This policy only work on Windows via GPO (not policies.json).
1819
1820 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1821 **CCK2 Equivalent:** N/A\
1822 **Preferences Affected:** N/A
1823
1824 #### Windows (GPO)
1825 ```
1826 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1827 ```
1828 ### LocalFileLinks
1829 Enable linking to local files by origin.
1830
1831 **Compatibility:** Firefox 68, Firefox ESR 68\
1832 **CCK2 Equivalent:** N/A\
1833 **Preferences Affected:** `capability.policy.localfilelinks.*`
1834
1835 #### Windows (GPO)
1836 ```
1837 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1838 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1839 ```
1840 #### macOS
1841 ```
1842 <dict>
1843 <key>LocalFileLinks</key>
1844 <array>
1845 <string>http://example.org</string>
1846 <string>http://example.edu</string>
1847 </array>
1848 </dict>
1849 ```
1850 #### policies.json
1851 ```
1852 {
1853 "policies": {
1854 "LocalFileLinks": ["http://example.org/",
1855 "http://example.edu/"]
1856 }
1857 }
1858 ```
1859 ### NoDefaultBookmarks
1860 Disable the creation of default bookmarks.
1861
1862 This policy is only effective if the user profile has not been created yet.
1863
1864 **Compatibility:** Firefox 60, Firefox ESR 60\
1865 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1866 **Preferences Affected:** N/A
1867
1868 #### Windows (GPO)
1869 ```
1870 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1871 ```
1872 #### macOS
1873 ```
1874 <dict>
1875 <key>NoDefaultBookmarks</key>
1876 <true/> | <false/>
1877 </dict>
1878 ```
1879 #### policies.json
1880 ```
1881 {
1882 "policies": {
1883 "NoDefaultBookmarks": true | false
1884 }
1885 }
1886 ```
1887 ### NetworkPrediction
1888 Enable or disable network prediction (DNS prefetching).
1889
1890 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1891 **CCK2 Equivalent:** N/A\
1892 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1893
1894 #### Windows (GPO)
1895 ```
1896 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1897 ```
1898 #### macOS
1899 ```
1900 <dict>
1901 <key>NetworkPrediction</key>
1902 <true/> | <false/>
1903 </dict>
1904 ```
1905 #### policies.json
1906 ```
1907 {
1908 "policies": {
1909 "NetworkPrediction": true | false
1910 }
1911 ```
1912 ### NewTabPage
1913 Enable or disable the New Tab page.
1914
1915 **Compatibility:** Firefox 68, Firefox ESR 68\
1916 **CCK2 Equivalent:** N/A\
1917 **Preferences Affected:** `browser.newtabpage.enabled`
1918
1919 #### Windows (GPO)
1920 ```
1921 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1922 ```
1923 #### macOS
1924 ```
1925 <dict>
1926 <key>NewTabPage</key>
1927 <true/> | <false/>
1928 </dict>
1929 ```
1930 #### policies.json
1931 ```
1932 {
1933 "policies": {
1934 "NewTabPage": true | false
1935 }
1936 ```
1937 ### OfferToSaveLogins
1938 Control whether or not Firefox offers to save passwords.
1939
1940 **Compatibility:** Firefox 60, Firefox ESR 60\
1941 **CCK2 Equivalent:** `dontRememberPasswords`\
1942 **Preferences Affected:** `signon.rememberSignons`
1943
1944 #### Windows (GPO)
1945 ```
1946 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1947 ```
1948 #### macOS
1949 ```
1950 <dict>
1951 <key>OfferToSaveLogins</key>
1952 <true/> | <false/>
1953 </dict>
1954 ```
1955 #### policies.json
1956 ```
1957 {
1958 "policies": {
1959 "OfferToSaveLogins": true | false
1960 }
1961 }
1962 ```
1963 ### OfferToSaveLoginsDefault
1964 Sets the default value of signon.rememberSignons without locking it.
1965
1966 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1967 **CCK2 Equivalent:** `dontRememberPasswords`\
1968 **Preferences Affected:** `signon.rememberSignons`
1969
1970 #### Windows (GPO)
1971 ```
1972 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1973 ```
1974 #### macOS
1975 ```
1976 <dict>
1977 <key>OfferToSaveLoginsDefault</key>
1978 <true/> | <false/>
1979 </dict>
1980 ```
1981 #### policies.json
1982 ```
1983 {
1984 "policies": {
1985 "OfferToSaveLoginsDefault": true | false
1986 }
1987 }
1988 ```
1989 ### OverrideFirstRunPage
1990 Override the first run page. If the value is blank, no first run page is displayed.
1991
1992 **Compatibility:** Firefox 60, Firefox ESR 60\
1993 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1994 **Preferences Affected:** `startup.homepage_welcome_url`
1995
1996 #### Windows (GPO)
1997 ```
1998 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1999 ```
2000 #### macOS
2001 ```
2002 <dict>
2003 <key>OverrideFirstRunPage</key>
2004 <string>http://example.org</string>
2005 </dict>
2006 ```
2007 #### policies.json
2008 ```
2009 {
2010 "policies": {
2011 "OverrideFirstRunPage": "http://example.org"
2012 }
2013 ```
2014 ### OverridePostUpdatePage
2015 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2016
2017 **Compatibility:** Firefox 60, Firefox ESR 60\
2018 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2019 **Preferences Affected:** `startup.homepage_override_url`
2020
2021 #### Windows (GPO)
2022 ```
2023 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2024 ```
2025 #### macOS
2026 ```
2027 <dict>
2028 <key>OverridePostUpdatePage</key>
2029 <string>http://example.org</string>
2030 </dict>
2031 ```
2032 #### policies.json
2033 ```
2034 {
2035 "policies": {
2036 "OverridePostUpdatePage": "http://example.org"
2037 }
2038 ```
2039 ### PasswordManagerEnabled
2040 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2041
2042 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2043 **CCK2 Equivalent:** N/A\
2044 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2045
2046 #### Windows (GPO)
2047 ```
2048 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2049 ```
2050 #### macOS
2051 ```
2052 <dict>
2053 <key>PasswordManagerEnabled</key>
2054 <true/> | <false/>
2055 </dict>
2056 ```
2057 #### policies.json
2058 ```
2059 {
2060 "policies": {
2061 "PasswordManagerEnabled": true | false
2062 }
2063 }
2064 ```
2065 ### Permissions
2066 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2067
2068 `Allow` is a list of origins where the feature is allowed.
2069
2070 `Block` is a list of origins where the feature is not allowed.
2071
2072 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2073
2074 `Locked` prevents the user from changing preferences for the feature.
2075
2076 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2077 **CCK2 Equivalent:** N/A\
2078 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2079
2080 #### Windows (GPO)
2081 ```
2082 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2083 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2084 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2085 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2086 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2087 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2088 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2089 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2090 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2091 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2092 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2093 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2094 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2095 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2096 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2097 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2098 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2099 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2100 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2101 ```
2102 #### macOS
2103 ```
2104 <dict>
2105 <key>Permissions</key>
2106 <dict>
2107 <key>Camera</key>
2108 <dict>
2109 <key>Allow</key>
2110 <array>
2111 <string>https://example.org</string>
2112 <string>https://example.org:1234</string>
2113 </array>
2114 <key>Block</key>
2115 <array>
2116 <string>https://example.edu</string>
2117 </array>
2118 <key>BlockNewRequests</key>
2119 <true/>
2120 <key>Locked</key>
2121 <true/>
2122 </dict>
2123 <key>Microphone</key>
2124 <dict>
2125 <key>Allow</key>
2126 <array>
2127 <string>https://example.org</string>
2128 </array>
2129 <key>Block</key>
2130 <array>
2131 <string>https://example.edu</string>
2132 </array>
2133 <key>BlockNewRequests</key>
2134 <true/>
2135 <key>Locked</key>
2136 <true/>
2137 </dict>
2138 <key>Location</key>
2139 <dict>
2140 <key>Allow</key>
2141 <array>
2142 <string>https://example.org</string>
2143 </array>
2144 <key>Block</key>
2145 <array>
2146 <string>https://example.edu</string>
2147 </array>
2148 <key>BlockNewRequests</key>
2149 <true/>
2150 <key>Locked</key>
2151 <true/>
2152 </dict>
2153 <key>Notifications</key>
2154 <dict>
2155 <key>Allow</key>
2156 <array>
2157 <string>https://example.org</string>
2158 </array>
2159 <key>Block</key>
2160 <array>
2161 <string>https://example.edu</string>
2162 </array>
2163 <key>BlockNewRequests</key>
2164 <true/>
2165 <key>Locked</key>
2166 <true/>
2167 </dict>
2168 <key>Autoplay</key>
2169 <dict>
2170 <key>Allow</key>
2171 <array>
2172 <string>https://example.org</string>
2173 </array>
2174 <key>Block</key>
2175 <array>
2176 <string>https://example.edu</string>
2177 </array>
2178 </dict>
2179 </dict>
2180 </dict>
2181 ```
2182 #### policies.json
2183 ```
2184 {
2185 "policies": {
2186 "Permissions": {
2187 "Camera": {
2188 "Allow": ["https://example.org","https://example.org:1234"],
2189 "Block": ["https://example.edu"],
2190 "BlockNewRequests": true | false,
2191 "Locked": true | false
2192 },
2193 "Microphone": {
2194 "Allow": ["https://example.org"],
2195 "Block": ["https://example.edu"],
2196 "BlockNewRequests": true | false,
2197 "Locked": true | false
2198 },
2199 "Location": {
2200 "Allow": ["https://example.org"],
2201 "Block": ["https://example.edu"],
2202 "BlockNewRequests": true | false,
2203 "Locked": true | false
2204 },
2205 "Notifications": {
2206 "Allow": ["https://example.org"],
2207 "Block": ["https://example.edu"],
2208 "BlockNewRequests": true | false,
2209 "Locked": true | false
2210 },
2211 "Autoplay": {
2212 "Allow": ["https://example.org"],
2213 "Block": ["https://example.edu"]
2214 }
2215 }
2216 }
2217 }
2218 ```
2219 ### PopupBlocking
2220 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2221
2222 `Allow` is a list of origins where popup-windows are allowed.
2223
2224 `Default` determines whether or not pop-up windows are allowed by default.
2225
2226 `Locked` prevents the user from changing pop-up preferences.
2227
2228 **Compatibility:** Firefox 60, Firefox ESR 60\
2229 **CCK2 Equivalent:** `permissions.popup`\
2230 **Preferences Affected:** `dom.disable_open_during_load`
2231
2232 #### Windows (GPO)
2233 ```
2234 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2235 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2236 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2237 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2238 ```
2239 #### macOS
2240 ```
2241 <dict>
2242 <key>PopupBlocking</key>
2243 <dict>
2244 <key>Allow</key>
2245 <array>
2246 <string>http://example.org</string>
2247 <string>http://example.edu</string>
2248 </array>
2249 <key>Default</key>
2250 <true/> | <false/>
2251 <key>Locked</key>
2252 <true/> | <false/>
2253 </dict>
2254 </dict>
2255 ```
2256 #### policies.json
2257 ```
2258 {
2259 "policies": {
2260 "PopupBlocking": {
2261 "Allow": ["http://example.org/",
2262 "http://example.edu/"],
2263 "Default": true | false,
2264 "Locked": true | false
2265 }
2266 }
2267 }
2268 ```
2269 ### Preferences
2270 Set and lock certain preferences.
2271
2272 **Compatibility:** See below\
2273 **CCK2 Equivalent:** `preferences`\
2274 **Preferences Affected:** See below
2275
2276 | Preference | Type | Compatibility | Default
2277 | --- | --- | --- | ---
2278 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2279 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2280 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2281 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2282 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2283 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2284 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2285 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2286 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2287 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2288 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2289 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2290 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2291 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2292 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2293 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2294 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2295 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2296 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2297 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2298 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2299 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2300 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2301 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2302 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2303 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2304 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2305 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2306 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2307 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2308 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2309 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2310 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2311 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2312 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2313 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2314 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2315 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2316 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2317 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2318 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2319 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2320 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2321 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2322 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2323 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2324 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2325 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2326 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2327 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2328 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2329 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2330 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2331 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2332 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2333 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2334 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2335 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2336 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2337 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2338 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2339 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2340 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2341 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2342 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2343 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2344 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2345 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2346 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2347 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2348 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2349 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2350 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2351 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2352 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2353 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2354 disabled
2355 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2356 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2357 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2358 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2359 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2360 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2361 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2362 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2363 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2364 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2365 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2366 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2367 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2368 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2369 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2370 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2371 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2372 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2373 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2374 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2375 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2376 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2377 #### Windows (GPO)
2378 ```
2379 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2380 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2381 ```
2382 #### macOS
2383 ```
2384 <dict>
2385 <key>Preferences</key>
2386 <dict>
2387 <key>boolean_preference_name</key>
2388 <true/> | <false/>
2389 <key>string_preference_name</key>
2390 <string>string_value</string>
2391 </dict>
2392 </dict>
2393 ```
2394 #### policies.json
2395 ```
2396 {
2397 "policies": {
2398 "Preferences": {
2399 "boolean_preference_name": true | false,
2400 "string_preference_name": "string_value"
2401 }
2402 }
2403 }
2404 ```
2405 ### PromptForDownloadLocation
2406 Ask where to save each file before downloading.
2407
2408 **Compatibility:** Firefox 68, Firefox ESR 68\
2409 **CCK2 Equivalent:** N/A\
2410 **Preferences Affected:** `browser.download.useDownloadDir`
2411
2412 #### Windows (GPO)
2413 ```
2414 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2415 ```
2416 #### macOS
2417 ```
2418 <dict>
2419 <key>PromptForDownloadLocation</key>
2420 <true/> | <false/>
2421 </dict>
2422 ```
2423 #### policies.json
2424 ```
2425 {
2426 "policies": {
2427 "PromptForDownloadLocation": true | false
2428 }
2429 }
2430 ```
2431 ### Proxy
2432 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2433 To specify ports, append them to the hostnames with a colon (:).
2434
2435 `Mode` is the proxy method being used.
2436
2437 `Locked` is whether or not proxy settings can be changed.
2438
2439 `HTTPProxy` is the HTTP proxy server.
2440
2441 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2442
2443 `SSLProxy` is the SSL proxy server.
2444
2445 `FTPProxy` is the FTP proxy server.
2446
2447 `SOCKSProxy` is the SOCKS proxy server
2448
2449 `SOCKSVersion` is the SOCKS version (4 or 5)
2450
2451 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2452
2453 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2454
2455 `AutoLogin` means do not prompt for authentication if password is saved.
2456
2457 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2458
2459 **Compatibility:** Firefox 60, Firefox ESR 60\
2460 **CCK2 Equivalent:** `networkProxy*`\
2461 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2462
2463 #### Windows (GPO)
2464 ```
2465 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2466 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2467 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2468 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2469 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2470 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2471 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2472 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2473 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2474 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2475 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2476 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2477 ```
2478 #### macOS
2479 ```
2480 <dict>
2481 <key>Proxy</key>
2482 <dict>
2483 <key>Mode</key>
2484 <string>none | system | manual | autoDetect | autoConfig</string>
2485 <key>Locked</key>
2486 <true> | </false>
2487 <key>HTTPProxy</key>
2488 <string>https://httpproxy.example.com</string>
2489 <key>UseHTTPProxyForAllProtocols</key>
2490 <true> | </false>
2491 <key>SSLProxy</key>
2492 <string>https://sslproxy.example.com</string>
2493 <key>FTPProxy</key>
2494 <string>https://ftpproxy.example.com</string>
2495 <key>SOCKSProxy</key>
2496 <string>https://socksproxy.example.com</string>
2497 <key>SOCKSVersion</key>
2498 <string>4 | 5</string>
2499 <key>Passthrough</key>
2500 <string>&lt;local>&gt;</string>
2501 <key>AutoConfigURL</key>
2502 <string>URL_TO_AUTOCONFIG</string>
2503 <key>AutoLogin</key>
2504 <true> | </false>
2505 <key>UseProxyForDNS</key>
2506 <true> | </false>
2507 </dict>
2508 </dict>
2509 ```
2510 #### policies.json
2511 ```
2512 {
2513 "policies": {
2514 "Proxy": {
2515 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2516 "Locked": [true, false],
2517 "HTTPProxy": "hostname",
2518 "UseHTTPProxyForAllProtocols": [true, false],
2519 "SSLProxy": "hostname",
2520 "FTPProxy": "hostname",
2521 "SOCKSProxy": "hostname",
2522 "SOCKSVersion": 4 | 5
2523 "Passthrough": "<local>",
2524 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2525 "AutoLogin": [true, false],
2526 "UseProxyForDNS": [true, false]
2527 }
2528 }
2529 }
2530 ```
2531 ### RequestedLocales
2532 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2533
2534 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2535
2536 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2537 **CCK2 Equivalent:** N/A\
2538 **Preferences Affected:** N/A
2539 #### Windows (GPO)
2540 ```
2541 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2542 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2543
2544 or
2545
2546 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2547 ```
2548 #### macOS
2549 ```
2550 <dict>
2551 <key>RequestedLocales</key>
2552 <array>
2553 <string>de</string>
2554 <string>en-US</string>
2555 </array>
2556 </dict>
2557
2558 or
2559
2560 <dict>
2561 <key>RequestedLocales</key>
2562 <string>de,en-US</string>
2563 </dict>
2564
2565 ```
2566 #### policies.json
2567 ```
2568 {
2569 "policies": {
2570 "RequestedLocales": ["de", "en-US"]
2571 }
2572 }
2573
2574 or
2575
2576 {
2577 "policies": {
2578 "RequestedLocales": "de,en-US"
2579 }
2580 }
2581 ```
2582 ### SanitizeOnShutdown (Selective)
2583 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2584
2585 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2586
2587 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2588 **CCK2 Equivalent:** N/A\
2589 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2590 #### Windows (GPO)
2591 ```
2592 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2593 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2594 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2595 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2596 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2597 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2598 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2599 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2600 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2601 ```
2602 #### macOS
2603 ```
2604 <dict>
2605 <key>SanitizeOnShutdown</key>
2606 <dict>
2607 <key>Cache</key>
2608 <true/> | <false/>
2609 <key>Cookies</key>
2610 <true/> | <false/>
2611 <key>Downloads</key>
2612 <true/> | <false/>
2613 <key>FormData</key>
2614 <true/> | <false/>
2615 <key>History</key>
2616 <true/> | <false/>
2617 <key>Sessions</key>
2618 <true/> | <false/>
2619 <key>SiteSettings</key>
2620 <true/> | <false/>
2621 <key>OfflineApps</key>
2622 <true/> | <false/>
2623 <key>Locked</key>
2624 <true/> | <false/>
2625 </dict>
2626 </dict>
2627 ```
2628 #### policies.json
2629 ```
2630 {
2631 "policies": {
2632 "SanitizeOnShutdown": {
2633 "Cache": true | false,
2634 "Cookies": true | false,
2635 "Downloads": true | false,
2636 "FormData": true | false,
2637 "History": true | false,
2638 "Sessions": true | false,
2639 "SiteSettings": true | false,
2640 "OfflineApps": true | false,
2641 "Locked": true | false
2642 }
2643 }
2644 }
2645 ```
2646 ### SanitizeOnShutdown (All)
2647 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2648
2649 **Compatibility:** Firefox 60, Firefox ESR 60\
2650 **CCK2 Equivalent:** N/A\
2651 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2652 #### Windows (GPO)
2653 ```
2654 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2655 ```
2656 #### macOS
2657 ```
2658 <dict>
2659 <key>SanitizeOnShutdown</key>
2660 <true/> | <false/>
2661 </dict>
2662 ```
2663 #### policies.json
2664 ```
2665 {
2666 "policies": {
2667 "SanitizeOnShutdown": true | false
2668 }
2669 }
2670 ```
2671 ### SearchBar
2672 Set whether or not search bar is displayed.
2673
2674 **Compatibility:** Firefox 60, Firefox ESR 60\
2675 **CCK2 Equivalent:** `showSearchBar`\
2676 **Preferences Affected:** N/A
2677
2678 #### Windows (GPO)
2679 ```
2680 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2681 ```
2682 #### macOS
2683 ```
2684 <dict>
2685 <key>SearchBar</key>
2686 <string>unified | separate</string>
2687 </dict>
2688 ```
2689
2690 #### policies.json
2691 ```
2692 {
2693 "policies": {
2694 "SearchBar": "unified" | "separate"
2695 }
2696 }
2697 ```
2698
2699
2700
2701
2702
2703 ### SearchEngines (This policy is only available on the ESR.)
2704
2705 ### SearchEngines | Default
2706
2707 Set the default search engine. This policy is only available on the ESR.
2708
2709 **Compatibility:** Firefox ESR 60\
2710 **CCK2 Equivalent:** `defaultSearchEngine`\
2711 **Preferences Affected:** N/A
2712
2713 #### Windows (GPO)
2714 ```
2715 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2716 ```
2717 #### macOS
2718 ```
2719 <dict>
2720 <key>SearchEngines</key>
2721 <dict>
2722 <key>Default</key>
2723 <string>NAME_OF_SEARCH_ENGINE</string>
2724 </dict>
2725 </dict>
2726 ```
2727 #### policies.json
2728 ```
2729 {
2730 "policies": {
2731 "SearchEngines": {
2732 "Default": "NAME_OF_SEARCH_ENGINE"
2733 }
2734 }
2735 }
2736 ```
2737 ### SearchEngines | PreventInstalls
2738
2739 Prevent installing search engines from webpages.
2740
2741 **Compatibility:** Firefox ESR 60\
2742 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2743 **Preferences Affected:** N/A
2744
2745 #### Windows (GPO)
2746 ```
2747 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2748 ```
2749 #### macOS
2750 ```
2751 <dict>
2752 <key>SearchEngines</key>
2753 <dict>
2754 <key>PreventInstalls</key>
2755 <true/> | <false/>
2756 </dict>
2757 </dict>
2758 ```
2759 #### policies.json
2760 ```
2761 {
2762 "policies": {
2763 "SearchEngines": {
2764 "PreventInstalls": true | false
2765 }
2766 }
2767 }
2768 ```
2769 ### SearchEngines | Remove
2770
2771 Hide built-in search engines. This policy is only available on the ESR.
2772
2773 **Compatibility:** Firefox ESR 60.2\
2774 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2775 **Preferences Affected:** N/A
2776
2777 #### Windows (GPO)
2778 ```
2779 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2780 ```
2781 #### macOS
2782 ```
2783 <dict>
2784 <key>SearchEngines</key>
2785 <dict>
2786 <key>Remove</key>
2787 <array>
2788 <string>NAME_OF_SEARCH_ENGINE</string>
2789 </array>
2790 </dict>
2791 </dict>
2792 ```
2793 #### policies.json
2794 ```
2795 {
2796 "policies": {
2797 "SearchEngines": {
2798 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2799 }
2800 }
2801 }
2802 ```
2803 ### SearchEngines | Add
2804
2805 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2806
2807 `Name` is the name of the search engine.
2808
2809 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2810
2811 `Method` is either GET or POST
2812
2813 `IconURL` is a URL for the icon to use.
2814
2815 `Alias` is a keyword to use for the engine.
2816
2817 `Description` is a description of the search engine.
2818
2819 `PostData` is the POST data as name value pairs separated by &.
2820
2821 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2822
2823 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2824 **CCK2 Equivalent:** `searchplugins`\
2825 **Preferences Affected:** N/A
2826
2827 #### Windows (GPO)
2828 ```
2829 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2830 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2831 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2832 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2833 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2834 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2835 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2836 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2837 ```
2838
2839 #### macOS
2840 ```
2841 <dict>
2842 <key>SearchEngines</key>
2843 <dict>
2844 <key>Add</key>
2845 <array>
2846 <dict>
2847 <key>Name</key>
2848 <string>Example1</string>
2849 <key>URLTemplate</key>
2850 <string>https://www.example.org/q={searchTerms}</string>
2851 <key>Method</key>
2852 <string>GET | POST </string>
2853 <key>IconURL</key>
2854 <string>https://www.example.org/favicon.ico</string>
2855 <key>Alias</key>
2856 <string>example</string>
2857 <key>Description</key>
2858 <string>Example Description</string>
2859 <key>SuggestURLTemplate</key>
2860 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2861 <key>PostData</key>
2862 <string>name=value&q={searchTerms}</string>
2863 </dict>
2864 <array>
2865 </dict>
2866 </dict>
2867 ```
2868 #### policies.json
2869 ```
2870 {
2871 "policies": {
2872 "SearchEngines": {
2873 "Add": [
2874 {
2875 "Name": "Example1",
2876 "URLTemplate": "https://www.example.org/q={searchTerms}",
2877 "Method": "GET" | "POST",
2878 "IconURL": "https://www.example.org/favicon.ico",
2879 "Alias": "example",
2880 "Description": "Description",
2881 "PostData": "name=value&q={searchTerms}",
2882 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2883 }
2884 ]
2885 }
2886 }
2887 }
2888 ```
2889 ### SearchSuggestEnabled
2890
2891 Enable search suggestions.
2892
2893 **Compatibility:** Firefox 68, Firefox ESR 68\
2894 **CCK2 Equivalent:** N/A\
2895 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2896
2897 #### Windows (GPO)
2898 ```
2899 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2900 ```
2901 #### macOS
2902 ```
2903 <dict>
2904 <key>SearchSuggestEnabled</key>
2905 <true/> | <false/>
2906 </dict>
2907 ```
2908 #### policies.json
2909 ```
2910 {
2911 "policies": {
2912 "SearchSuggestEnabled": true | false
2913 }
2914 }
2915 ```
2916 ### SecurityDevices
2917
2918 Install PKCS #11 modules.
2919
2920 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2921 **CCK2 Equivalent:** `certs.devices`\
2922 **Preferences Affected:** N/A
2923
2924 #### Windows (GPO)
2925 ```
2926 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2927 ```
2928 #### macOS
2929 ```
2930 <dict>
2931 <key>SecurityDevices</key>
2932 <dict>
2933 <key>NAME_OF_DEVICE</key>
2934 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2935 </dict>
2936 </dict>
2937 ```
2938
2939 #### policies.json
2940 ```
2941 {
2942 "policies": {
2943 "SecurityDevices": {
2944 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2945 }
2946 }
2947 }
2948 ```
2949 ### SSLVersionMax
2950
2951 Set and lock the maximum version of TLS.
2952
2953 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2954 **CCK2 Equivalent:** N/A\
2955 **Preferences Affected:** `security.tls.version.max`
2956
2957 #### Windows (GPO)
2958 ```
2959 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2960 ```
2961 #### macOS
2962 ```
2963 <dict>
2964 <key>SSLVersionMax</key>
2965 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2966 </dict>
2967 ```
2968
2969 #### policies.json
2970 ```
2971 {
2972 "policies": {
2973 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2974 }
2975 }
2976 ```
2977 ### SSLVersionMin
2978
2979 Set and lock the minimum version of TLS.
2980
2981 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2982 **CCK2 Equivalent:** N/A\
2983 **Preferences Affected:** `security.tls.version.min`
2984
2985 #### Windows (GPO)
2986 ```
2987 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2988 ```
2989 #### macOS
2990 ```
2991 <dict>
2992 <key>SSLVersionMin</key>
2993 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2994 </dict>
2995 ```
2996
2997 #### policies.json
2998 ```
2999 {
3000 "policies": {
3001 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3002 }
3003 }
3004 ```
3005 ### SupportMenu
3006 Add a menuitem to the help menu for specifying support information.
3007
3008 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3009 **CCK2 Equivalent:** helpMenu\
3010 **Preferences Affected:** N/A
3011
3012 #### Windows (GPO)
3013 ```
3014 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3015 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3016 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3017 ```
3018 #### macOS
3019 ```
3020 <dict>
3021 <key>SupportMenu</key>
3022 <dict>
3023 <key>Title</key>
3024 <string>SupportMenu</string>
3025 <key>URL</key>
3026 <string>http://example.com/support</string>
3027 <key>AccessKey</key>
3028 <string>S</string>
3029 </dict>
3030 </dict>
3031 ```
3032 #### policies.json
3033 ```
3034 {
3035 "policies": {
3036 "SupportMenu": {
3037 "Title": "Support Menu",
3038 "URL": "http://example.com/support",
3039 "AccessKey": "S"
3040 }
3041 }
3042 }
3043 ```
3044 ### WebsiteFilter
3045 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3046
3047 **Compatibility:** Firefox 60, Firefox ESR 60\
3048 **CCK2 Equivalent:** N/A\
3049 **Preferences Affected:** N/A
3050
3051 #### Windows (GPO)
3052 ```
3053 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
3054 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
3055 ```
3056 #### macOS
3057 ```
3058 <dict>
3059 <key>WebsiteFilter</key>
3060 <dict>
3061 <key>Block</key>
3062 <array>
3063 <string><all_urls></string>
3064 </array>
3065 <key>Exceptions</key>
3066 <array>
3067 <string>http://example.org/*</string>
3068 </array>
3069 </dict>
3070
3071 </dict>
3072 ```
3073 #### policies.json
3074 ```
3075 {
3076 "policies": {
3077 "WebsiteFilter": {
3078 "Block": ["<all_urls>"],
3079 "Exceptions": ["http://example.org/*"]
3080 }
3081 }
3082 }
3083 ```

patrick-canterino.de