]> git.p6c8.net - policy-templates.git/blob - README.md
Add restricted domains and cleanup install sources
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
61 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
62 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
63 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
64 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
65 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
66 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
67 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
68 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
69 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
70 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
71 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
72 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
73 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
74 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
75 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
76 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
77 | **[`Preferences`](#preferences)** | Set and lock some preferences.
78 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
79 | **[`Proxy`](#proxy)** | Configure proxy settings.
80 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
81 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
82 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
83 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
84 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
85 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
86 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
87 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
88 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
89 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
90 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
91 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
92 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
93 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
94 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
95 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
96
97 ### AppAutoUpdate
98
99 Enable or disable **automatic** application update.
100
101 If set to true, application updates are installed without user approval.
102
103 If set to false, application updates are downloaded but the user can choose when to install the update.
104
105 If you have disabled updates via DisableAppUpdate, this policy has no effect.
106
107 **Compatibility:** Firefox 75, Firefox ESR 68.7\
108 **CCK2 Equivalent:** N/A\
109 **Preferences Affected:** app.update.auto
110
111 #### Windows (GPO)
112 ```
113 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
114 ```
115 #### Windows (Intune)
116 OMA-URI:
117 ```
118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
119 ```
120 Value (string):
121 ```
122 <enabled/> or <disabled/>
123 ```
124 #### macOS
125 ```
126 <dict>
127 <key>AppAutoUpdate</key>
128 <true/> | <false/>
129 </dict>
130 ```
131 #### policies.json
132 ```
133 {
134 "policies": {
135 "AppAutoUpdate": true | false
136 }
137 }
138 ```
139 ### AppUpdateURL
140
141 Change the URL for application update.
142
143 **Compatibility:** Firefox 62, Firefox ESR 60.2\
144 **CCK2 Equivalent:** N/A\
145 **Preferences Affected:** `app.update.url`
146
147 #### Windows (GPO)
148 ```
149 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
150 ```
151 #### Windows (Intune)
152 OMA-URI:
153 ```
154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
155 ```
156 Value (string):
157 ```
158 <enabled/>
159 <data id="AppUpdateURL" value="https://yoursite.com"/>
160 ```
161 #### macOS
162 ```
163 <dict>
164 <key>AppUpdateURL</key>
165 <string>https://yoursite.com</string>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "AppUpdateURL": "https://yoursite.com"
173 }
174 }
175 ```
176 ### Authentication
177
178 Configure sites that support integrated authentication.
179
180 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
181
182 `PrivateBrowsing` enables integrated authentication in prviate browsing.
183
184 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
185 **CCK2 Equivalent:** N/A\
186 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
187
188 #### Windows (GPO)
189 ```
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
202 ```
203 #### Windows (Intune)
204 OMA-URI:
205 ```
206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
207 ```
208 Value (string):
209 ```
210 <enabled/>
211 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
212 ```
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
239 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
244 ```
245 Value (string):
246 ```
247 <enabled/> or <disabled/>
248 ```
249 OMA-URI:
250 ```
251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
252 ```
253 Value (string):
254 ```
255 <enabled/> or <disabled/>
256 ```
257 #### macOS
258 ```
259 <dict>
260 <key>Authentication</key>
261 <dict>
262 <key>SPNEGO</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>Delegated</key>
268 <array>
269 <string>mydomain.com</string>
270 <string>https://myotherdomain.com</string>
271 </array>
272 <key>NTLM</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>AllowNonFQDN</key>
278 <dict>
279 <key>SPNEGO</key>
280 <true/> | <false/>
281 <key>NTLM</key>
282 <true/> | <false/>
283 </dict>
284 <key>AllowProxies</key>
285 <dict>
286 <key>SPNEGO</key>
287 <true/> | <false/>
288 <key>NTLM</key>
289 <true/> | <false/>
290 </dict>
291 <key>Locked</key>
292 <true/> | <false/>
293 <key>PrivateBrowsing</key>
294 <true/> | <false/>
295 </dict>
296 </dict>
297 ```
298 #### policies.json
299 ```
300 {
301 "policies": {
302 "Authentication": {
303 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
304 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
305 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
306 "AllowNonFQDN": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "AllowProxies": {
311 "SPNEGO": true | false,
312 "NTLM": true | false
313 },
314 "Locked": true | false,
315 "PrivateBrowsing": true | false
316 }
317 }
318 }
319 ```
320 ### BlockAboutAddons
321
322 Block access to the Add-ons Manager (about:addons).
323
324 **Compatibility:** Firefox 60, Firefox ESR 60\
325 **CCK2 Equivalent:** `disableAddonsManager`\
326 **Preferences Affected:** N/A
327
328 #### Windows (GPO)
329 ```
330 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
331 ```
332 #### Windows (Intune)
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
336 ```
337 Value (string):
338 ```
339 <enabled/> or <disabled/>
340 ```
341 #### macOS
342 ```
343 <dict>
344 <key>BlockAboutAddons</key>
345 <true/> | <false/>
346 </dict>
347 ```
348 #### policies.json
349 ```
350 {
351 "policies": {
352 "BlockAboutAddons": true | false
353 }
354 }
355 ```
356 ### BlockAboutConfig
357
358 Block access to about:config.
359
360 **Compatibility:** Firefox 60, Firefox ESR 60\
361 **CCK2 Equivalent:** `disableAboutConfig`\
362 **Preferences Affected:** N/A
363
364 #### Windows (GPO)
365 ```
366 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
367 ```
368 #### Windows (Intune)
369 OMA-URI:
370 ```
371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
372 ```
373 Value (string):
374 ```
375 <enabled/> or <disabled/>
376 ```
377 #### macOS
378 ```
379 <dict>
380 <key>BlockAboutConfig</key>
381 <true/> | <false/>
382 </dict>
383 ```
384 #### policies.json
385 ```
386 {
387 "policies": {
388 "BlockAboutConfig": true | false
389 }
390 }
391 ```
392 ### BlockAboutProfiles
393
394 Block access to About Profiles (about:profiles).
395
396 **Compatibility:** Firefox 60, Firefox ESR 60\
397 **CCK2 Equivalent:** `disableAboutProfiles`\
398 **Preferences Affected:** N/A
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
403 ```
404 #### Windows (Intune)
405 OMA-URI:
406 ```
407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
408 ```
409 Value (string):
410 ```
411 <enabled/> or <disabled/>
412 ```
413 #### macOS
414 ```
415 <dict>
416 <key>BlockAboutProfiles</key>
417 <true/> | <false/>
418 </dict>
419 ```
420 #### policies.json
421 ```
422 {
423 "policies": {
424 "BlockAboutProfiles": true | false
425 }
426 }
427 ```
428 ### BlockAboutSupport
429
430 Block access to Troubleshooting Information (about:support).
431
432 **Compatibility:** Firefox 60, Firefox ESR 60\
433 **CCK2 Equivalent:** `disableAboutSupport`\
434 **Preferences Affected:** N/A
435
436 #### Windows (GPO)
437 ```
438 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
439 ```
440 #### Windows (Intune)
441 OMA-URI:
442 ```
443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
444 ```
445 Value (string):
446 ```
447 <enabled/> or <disabled/>
448 ```
449 #### macOS
450 ```
451 <dict>
452 <key>BlockAboutSupport</key>
453 <true/> | <false/>
454 </dict>
455 ```
456 #### policies.json
457 ```
458 {
459 "policies": {
460 "BlockAboutSupport": true | false
461 }
462 }
463 ```
464 ### Bookmarks
465
466 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60\
469 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
470 **Preferences Affected:** N/A
471
472 #### Windows (GPO)
473 ```
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
479 ```
480 #### Windows (Intune)
481 OMA-URI:
482 ```
483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
484 ```
485 Value (string):
486 ```
487 <enabled/>
488 <data id="BookmarkTitle" value="Example"/>
489 <data id="BookmarkURL" value="https://example.com"/>
490 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
491 <data id="BookmarkPlacement" value="toolbar | menu"/>
492 <data id="BookmarkFolder" value="FolderName"/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>Bookmarks</key>
498 <array>
499 <dict>
500 <key>Title</key>
501 <string>Example</string>
502 <key>URL</key>
503 <string>https://example.com</string>
504 <key>Favicon</key>
505 <string>https://example.com/favicon.ico</string>
506 <key>Placement</key>
507 <string>toolbar | menu</string>
508 <key>Folder</key>
509 <string>FolderName</string>
510 </dict>
511 </array>
512 </dict>
513 ```
514 #### policies.json
515 ```
516 {
517 "policies": {
518 "Bookmarks": [
519 {
520 "Title": "Example",
521 "URL": "https://example.com",
522 "Favicon": "https://example.com/favicon.ico",
523 "Placement": "toolbar" | "menu",
524 "Folder": "FolderName"
525 }
526 ]
527 }
528 }
529 ```
530 ### CaptivePortal
531 Enable or disable the detection of captive portals.
532
533 **Compatibility:** Firefox 67, Firefox ESR 60.7\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `network.captive-portal-service.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>CaptivePortal</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "CaptivePortal": true | false
562 }
563 }
564 ```
565 ### Certificates
566
567 ### Certificates | ImportEnterpriseRoots
568
569 Trust certificates that have been added to the operating system certificate store by a user or administrator.
570
571 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
572
573 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
574 **CCK2 Equivalent:** N/A\
575 **Preferences Affected:** `security.enterprise_roots.enabled`
576
577 #### Windows (GPO)
578 ```
579 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
580 ```
581 #### Windows (Intune)
582 OMA-URI:
583 ```
584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
585 ```
586 Value (string):
587 ```
588 <enabled/> or <disabled/>
589 ```
590 #### macOS
591 ```
592 <dict>
593 <key>Certificates</key>
594 <dict>
595 <key>ImportEnterpriseRoots</key>
596 <true/> | <false/>
597 </dict>
598 </dict>
599 ```
600 #### policies.json
601 ```
602 {
603 "policies": {
604 "Certificates": {
605 "ImportEnterpriseRoots": true | false
606 }
607 }
608 }
609 ```
610 ### Certificates | Install
611
612 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
613
614 - Windows
615 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
616 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
617 - macOS
618 - /Library/Application Support/Mozilla/Certificates
619 - ~/Library/Application Support/Mozilla/Certificates
620 - Linux
621 - /usr/lib/mozilla/certificates
622 - /usr/lib64/mozilla/certificates
623 - ~/.mozilla/certificates
624
625 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
626
627 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
628
629 Certificates are installed using the trust string `CT,CT,`.
630
631 Binary (DER) and ASCII (PEM) certificates are both supported.
632
633 **Compatibility:** Firefox 64, Firefox ESR 64\
634 **CCK2 Equivalent:** `certs.ca`\
635 **Preferences Affected:** N/A
636
637 #### Windows (GPO)
638 ```
639 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
640 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
641 ```
642 #### Windows (Intune)
643 OMA-URI:
644 ```
645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
646 ```
647 Value (string):
648 ```
649 <enabled/>
650 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
651 ```
652 #### macOS
653 ```
654 <dict>
655 <key>Certificates</key>
656 <dict>
657 <key>Install</key>
658 <array>
659 <string>cert1.der</string>
660 <string>/Users/username/cert2.pem</string>
661 </array>
662 </dict>
663 </dict>
664 ```
665 #### policies.json
666 ```
667 {
668 "policies": {
669 "Certificates": {
670 "Install": ["cert1.der", "/home/username/cert2.pem"]
671 }
672 }
673 }
674 ```
675 ### Cookies
676 Configure cookie preferences.
677
678 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
679
680 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
681
682 `Default` determines whether cookies are accepted at all.
683
684 `AcceptThirdParty` determines how third-party cookies are handled.
685
686 `ExpireAtSessionEnd` determines when cookies expire.
687
688 `RejectTracker` only rejects cookies for trackers.
689
690 `Locked` prevents the user from changing cookie preferences.
691
692 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
693 **CCK2 Equivalent:** N/A\
694 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
695
696 #### Windows (GPO)
697 ```
698 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
699 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
700 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
701 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
702 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
705 ```
706 #### Windows (Intune)
707 OMA-URI:
708 ```
709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
710 ```
711 Value (string):
712 ```
713 <enabled/>
714 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
715 ```
716 OMA-URI:
717 ```
718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
719 ```
720 Value (string):
721 ```
722 <enabled/>
723 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
724 ```
725 OMA-URI:
726 ```
727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
728 ```
729 Value (string):
730 ```
731 <enabled/> or <disabled/>
732 ```
733 OMA-URI:
734 ```
735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
736 ```
737 Value (string):
738 ```
739 <enabled/>
740 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
741 ```
742 OMA-URI:
743 ```
744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
745 ```
746 Value (string):
747 ```
748 <enabled/> or <disabled/>
749 ```
750 OMA-URI:
751 ```
752 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
753 ```
754 Value (string):
755 ```
756 <enabled/> or <disabled/>
757 ```
758 OMA-URI:
759 ```
760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
761 ```
762 Value (string):
763 ```
764 <enabled/> or <disabled/>
765 ```
766 #### macOS
767 ```
768 <dict>
769 <key>Cookies</key>
770 <dict>
771 <key>Allow</key>
772 <array>
773 <string>http://example.com</string>
774 </array>
775 <key>Block</key>
776 <array>
777 <string>http://example.org</string>
778 </array>
779 <key>Default</key>
780 <true/> | <false/>
781 <key>AcceptThirdParty</key>
782 <string>always | never | from-visited</string>
783 <key>ExpireAtSessionEnd</key>
784 <true/> | <false/>
785 <key>RejectTracker</key>
786 <true/> | <false/>
787 <key>Locked</key>
788 <true/> | <false/>
789 </dict>
790 </dict>
791 ```
792 #### policies.json
793 ```
794 {
795 "policies": {
796 "Cookies": {
797 "Allow": ["http://example.org/"],
798 "Block": ["http://example.edu/"],
799 "Default": true | false,
800 "AcceptThirdParty": "always" | "never" | "from-visited",
801 "ExpireAtSessionEnd": true | false,
802 "RejectTracker": true | false,
803 "Locked": true | false
804 }
805 }
806 }
807 ```
808 ### DisableSetDesktopBackground
809 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
810
811 **Compatibility:** Firefox 60, Firefox ESR 60\
812 **CCK2 Equivalent:** `removeSetDesktopBackground`\
813 **Preferences Affected:** N/A
814
815 #### Windows (GPO)
816 ```
817 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
818 ```
819 #### Windows (Intune)
820 OMA-URI:
821 ```
822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
823 ```
824 Value (string):
825 ```
826 <enabled/> or <disabled/>
827 ```
828 #### macOS
829 ```
830 <dict>
831 <key>DisableSetDesktopBackground</key>
832 <true/> | <false/>
833 </dict>
834 ```
835 #### policies.json
836 ```
837 {
838 "policies": {
839 "DisableSetDesktopBackground": true | false
840 }
841 }
842 ```
843 ### DisableMasterPasswordCreation
844 Remove the master password functionality.
845
846 **Compatibility:** Firefox 60, Firefox ESR 60\
847 **CCK2 Equivalent:** `noMasterPassword`\
848 **Preferences Affected:** N/A
849
850 #### Windows (GPO)
851 ```
852 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
853 ```
854 #### Windows (Intune)
855 OMA-URI:
856 ```
857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
858 ```
859 Value (string):
860 ```
861 <enabled/> or <disabled/>
862 ```
863 #### macOS
864 ```
865 <dict>
866 <key>DisableMasterPasswordCreation</key>
867 <true/> | <false/>
868 </dict>
869 ```
870 #### policies.json
871 ```
872 {
873 "policies": {
874 "DisableMasterPasswordCreation": true | false
875 }
876 }
877 ```
878 ### DisableAppUpdate
879 Turn off application updates.
880
881 **Compatibility:** Firefox 60, Firefox ESR 60\
882 **CCK2 Equivalent:** `disableFirefoxUpdates`\
883 **Preferences Affected:** N/A
884
885 #### Windows (GPO)
886 ```
887 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
888 ```
889 #### Windows (Intune)
890 OMA-URI:
891 ```
892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
893 ```
894 Value (string):
895 ```
896 <enabled/> or <disabled/>
897 ```
898 #### macOS
899 ```
900 <dict>
901 <key>DisableAppUpdate</key>
902 <true/> | <false/>
903 </dict>
904 ```
905 #### policies.json
906 ```
907 {
908 "policies": {
909 "DisableAppUpdate": true | false
910 }
911 }
912 ```
913 ### DisableBuiltinPDFViewer
914 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
915
916 **Compatibility:** Firefox 60, Firefox ESR 60\
917 **CCK2 Equivalent:** `disablePDFjs`\
918 **Preferences Affected:** `pdfjs.disabled`
919
920 #### Windows (GPO)
921 ```
922 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
923 ```
924 #### Windows (Intune)
925 OMA-URI:
926 ```
927 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
928 ```
929 Value (string):
930 ```
931 <enabled/> or <disabled/>
932 ```
933 #### macOS
934 ```
935 <dict>
936 <key>DisableBuiltinPDFViewer</key>
937 <true/> | <false/>
938 </dict>
939 ```
940 #### policies.json
941 ```
942 {
943 "policies": {
944 "DisableBuiltinPDFViewer": true | false
945 }
946 }
947 ```
948 ### DisabledCiphers
949 Disable specific cryptographic ciphers.
950
951 ---
952 **Note:**
953
954 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
955
956 ---
957 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
958 **CCK2 Equivalent:** N/A\
959 **Preferences Affected:** N/A
960
961 #### Windows (GPO)
962 ```
963 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
974 ```
975 #### Windows (Intune)
976 OMA-URI:
977 ```
978 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
979 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
989 ```
990 Value (string):
991 ```
992 <enabled/> or <disabled/>
993 ```
994 #### macOS
995 ```
996 <dict>
997 <key>DisabledCiphers</key>
998 <dict>
999 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1000 <true/> | <false/>
1001 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1002 <true/> | <false/>
1003 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1004 <true/> | <false/>
1005 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1006 <true/> | <false/>
1007 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1008 <true/> | <false/>
1009 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1010 <true/> | <false/>
1011 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1012 <true/> | <false/>
1013 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1014 <true/> | <false/>
1015 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1016 <true/> | <false/>
1017 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1018 <true/> | <false/>
1019 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1020 <true/> | <false/>
1021 </dict>
1022 </dict>
1023 ```
1024 #### policies.json
1025 ```
1026 {
1027 "policies": {
1028 "DisabledCiphers" {
1029 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1030 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1031 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1032 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1034 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1035 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1036 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1037 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1038 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1039 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1040 }
1041 }
1042 }
1043 ```
1044 ### DisableDefaultBrowserAgent
1045 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1046
1047 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1048 **CCK2 Equivalent:** N/A\
1049 **Preferences Affected:** N/A
1050
1051 #### Windows (GPO)
1052 ```
1053 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1054 ```
1055 #### Windows (Intune)
1056 OMA-URI:
1057 ```
1058 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1059 ```
1060 Value (string):
1061 ```
1062 <enabled/> or <disabled/>
1063 ```
1064 #### policies.json
1065 ```
1066 {
1067 "policies": {
1068 "DisableDefaultBrowserAgent": true | false
1069 }
1070 }
1071 ```
1072 ### DisableDeveloperTools
1073 Remove access to all developer tools.
1074
1075 **Compatibility:** Firefox 60, Firefox ESR 60\
1076 **CCK2 Equivalent:** `removeDeveloperTools`\
1077 **Preferences Affected:** `devtools.policy.disabled`
1078
1079 #### Windows (GPO)
1080 ```
1081 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1082 ```
1083 #### Windows (Intune)
1084 OMA-URI:
1085 ```
1086 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1087 ```
1088 Value (string):
1089 ```
1090 <enabled/> or <disabled/>
1091 ```
1092 #### macOS
1093 ```
1094 <dict>
1095 <key>DisableDeveloperTools</key>
1096 <true/> | <false/>
1097 </dict>
1098 ```
1099 #### policies.json
1100 ```
1101 {
1102 "policies": {
1103 "DisableDeveloperTools": true | false
1104 }
1105 }
1106 ```
1107 ### DisableFeedbackCommands
1108 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1109
1110 **Compatibility:** Firefox 60, Firefox ESR 60\
1111 **CCK2 Equivalent:** N/A\
1112 **Preferences Affected:** N/A
1113
1114 #### Windows (GPO)
1115 ```
1116 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1117 ```
1118 #### Windows (Intune)
1119 OMA-URI:
1120 ```
1121 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1122 ```
1123 Value (string):
1124 ```
1125 <enabled/> or <disabled/>
1126 ```
1127 #### macOS
1128 ```
1129 <dict>
1130 <key>DisableFeedbackCommands</key>
1131 <true/> | <false/>
1132 </dict>
1133 ```
1134 #### policies.json
1135 ```
1136 {
1137 "policies": {
1138 "DisableFeedbackCommands": true | false
1139 }
1140 }
1141 ```
1142 ### DisableFirefoxScreenshots
1143 Remove access to Firefox Screenshots.
1144
1145 **Compatibility:** Firefox 60, Firefox ESR 60\
1146 **CCK2 Equivalent:** N/A\
1147 **Preferences Affected:** `extensions.screenshots.disabled`
1148
1149 #### Windows (GPO)
1150 ```
1151 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1152 ```
1153 #### Windows (Intune)
1154 OMA-URI:
1155 ```
1156 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1157 ```
1158 Value (string):
1159 ```
1160 <enabled/> or <disabled/>
1161 ```
1162 #### macOS
1163 ```
1164 <dict>
1165 <key>DisableFirefoxScreenshots</key>
1166 <true/> | <false/>
1167 </dict>
1168 ```
1169 #### policies.json
1170 ```
1171 {
1172 "policies": {
1173 "DisableFirefoxScreenshots": true | false
1174 }
1175 }
1176 ```
1177 ### DisableFirefoxAccounts
1178 Disable Firefox Accounts integration (Sync).
1179
1180 **Compatibility:** Firefox 60, Firefox ESR 60\
1181 **CCK2 Equivalent:** `disableSync`\
1182 **Preferences Affected:** `identity.fxaccounts.enabled`
1183
1184 #### Windows (GPO)
1185 ```
1186 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1187 ```
1188 #### Windows (Intune)
1189 OMA-URI:
1190 ```
1191 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1192 ```
1193 Value (string):
1194 ```
1195 <enabled/> or <disabled/>
1196 ```
1197 #### macOS
1198 ```
1199 <dict>
1200 <key>DisableFirefoxAccounts</key>
1201 <true/> | <false/>
1202 </dict>
1203 ```
1204 #### policies.json
1205 ```
1206 {
1207 "policies": {
1208 "DisableFirefoxAccounts": true | false
1209 }
1210 }
1211 ```
1212 ### DisableFirefoxStudies
1213 Disable Firefox studies (Shield).
1214
1215 **Compatibility:** Firefox 60, Firefox ESR 60\
1216 **CCK2 Equivalent:** N/A\
1217 **Preferences Affected:** N/A
1218
1219 #### Windows (GPO)
1220 ```
1221 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1222 ```
1223 #### Windows (Intune)
1224 OMA-URI:
1225 ```
1226 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1227 ```
1228 Value (string):
1229 ```
1230 <enabled/> or <disabled/>
1231 ```
1232 #### macOS
1233 ```
1234 <dict>
1235 <key>DisableFirefoxStudies</key>
1236 <true/> | <false/>
1237 </dict>
1238 ```
1239 #### policies.json
1240 ```
1241 {
1242 "policies": {
1243 "DisableFirefoxStudies": true | false
1244 }
1245 }
1246 ```
1247 ### DisableForgetButton
1248 Disable the "Forget" button.
1249
1250 **Compatibility:** Firefox 60, Firefox ESR 60\
1251 **CCK2 Equivalent:** `disableForget`\
1252 **Preferences Affected:** N/A
1253
1254 #### Windows (GPO)
1255 ```
1256 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1257 ```
1258 #### Windows (Intune)
1259 OMA-URI:
1260 ```
1261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1262 ```
1263 Value (string):
1264 ```
1265 <enabled/> or <disabled/>
1266 ```
1267 #### macOS
1268 ```
1269 <dict>
1270 <key>DisableForgetButton</key>
1271 <true/> | <false/>
1272 </dict>
1273 ```
1274 #### policies.json
1275 ```
1276 {
1277 "policies": {
1278 "DisableForgetButton": true | false
1279 }
1280 }
1281 ```
1282 ### DisableFormHistory
1283 Turn off saving information on web forms and the search bar.
1284
1285 **Compatibility:** Firefox 60, Firefox ESR 60\
1286 **CCK2 Equivalent:** `disableFormFill`\
1287 **Preferences Affected:** ` browser.formfill.enable`
1288
1289 #### Windows (GPO)
1290 ```
1291 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1292 ```
1293 #### Windows (Intune)
1294 OMA-URI:
1295 ```
1296 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1297 ```
1298 Value (string):
1299 ```
1300 <enabled/> or <disabled/>
1301 ```
1302 #### macOS
1303 ```
1304 <dict>
1305 <key>DisableFormHistory</key>
1306 <true/> | <false/>
1307 </dict>
1308 ```
1309 #### policies.json
1310 ```
1311 {
1312 "policies": {
1313 "DisableFormHistory": true | false
1314 }
1315 }
1316 ```
1317 ### DisablePasswordReveal
1318 Do not allow passwords to be shown in saved logins
1319
1320 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1321 **CCK2 Equivalent:** N/A
1322 **Preferences Affected:** N/A
1323
1324 #### Windows (GPO)
1325 ```
1326 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1327 ```
1328 #### Windows (Intune)
1329 OMA-URI:
1330 ```
1331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1332 ```
1333 Value (string):
1334 ```
1335 <enabled/> or <disabled/>
1336 ```
1337 #### macOS
1338 ```
1339 <dict>
1340 <key>DisablePasswordReveal</key>
1341 <true/> | <false/>
1342 </dict>
1343 ```
1344 #### policies.json
1345 ```
1346 {
1347 "policies": {
1348 "DisablePasswordReveal": true | false
1349 }
1350 }
1351 ```
1352 ### DisablePocket
1353 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1354
1355 **Compatibility:** Firefox 60, Firefox ESR 60\
1356 **CCK2 Equivalent:** `disablePocket`\
1357 **Preferences Affected:** `extensions.pocket.enabled`
1358
1359 #### Windows (GPO)
1360 ```
1361 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1362 ```
1363 #### Windows (Intune)
1364 OMA-URI:
1365 ```
1366 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1367 ```
1368 Value (string):
1369 ```
1370 <enabled/> or <disabled/>
1371 ```
1372 #### macOS
1373 ```
1374 <dict>
1375 <key>DisablePocket</key>
1376 <true/> | <false/>
1377 </dict>
1378 ```
1379 #### policies.json
1380 ```
1381 {
1382 "policies": {
1383 "DisablePocket": true | false
1384 }
1385 }
1386 ```
1387 ### DisablePrivateBrowsing
1388 Remove access to private browsing.
1389
1390 **Compatibility:** Firefox 60, Firefox ESR 60\
1391 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1392 **Preferences Affected:** N/A
1393
1394 #### Windows (GPO)
1395 ```
1396 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1397 ```
1398 #### Windows (Intune)
1399 OMA-URI:
1400 ```
1401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1402 ```
1403 Value (string):
1404 ```
1405 <enabled/> or <disabled/>
1406 ```
1407 #### macOS
1408 ```
1409 <dict>
1410 <key>DisablePrivateBrowsing</key>
1411 <true/> | <false/>
1412 </dict>
1413 ```
1414 #### policies.json
1415 ```
1416 {
1417 "policies": {
1418 "DisablePrivateBrowsing": true | false
1419 }
1420 }
1421 ```
1422 ### DisableProfileImport
1423 Disables the "Import data from another browser" option in the bookmarks window.
1424
1425 **Compatibility:** Firefox 60, Firefox ESR 60\
1426 **CCK2 Equivalent:** N/A\
1427 **Preferences Affected:** N/A
1428
1429 #### Windows (GPO)
1430 ```
1431 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1432 ```
1433 #### Windows (Intune)
1434 OMA-URI:
1435 ```
1436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1437 ```
1438 Value (string):
1439 ```
1440 <enabled/> or <disabled/>
1441 ```
1442 #### macOS
1443 ```
1444 <dict>
1445 <key>DisableProfileImport</key>
1446 <true/> | <false/>
1447 </dict>
1448 ```
1449 #### policies.json
1450 ```
1451 {
1452 "policies": {
1453 "DisableProfileImport": true | false
1454 }
1455 }
1456 ```
1457 ### DisableProfileRefresh
1458 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1459
1460 **Compatibility:** Firefox 60, Firefox ESR 60\
1461 **CCK2 Equivalent:** `disableResetFirefox`\
1462 **Preferences Affected:** `browser.disableResetPrompt`
1463
1464 #### Windows (GPO)
1465 ```
1466 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1467 ```
1468 #### Windows (Intune)
1469 OMA-URI:
1470 ```
1471 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1472 ```
1473 Value (string):
1474 ```
1475 <enabled/> or <disabled/>
1476 ```
1477 #### macOS
1478 ```
1479 <dict>
1480 <key>DisableProfileRefresh</key>
1481 <true/> | <false/>
1482 </dict>
1483 ```
1484 #### policies.json
1485 ```
1486 {
1487 "policies": {
1488 "DisableProfileRefresh": true | false
1489 }
1490 }
1491 ```
1492 ### DisableSafeMode
1493 Disable safe mode within the browser.
1494
1495 On Windows, this disables safe mode via the command line as well.
1496
1497 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1498 **CCK2 Equivalent:** `disableSafeMode`\
1499 **Preferences Affected:** N/A
1500
1501 #### Windows (GPO)
1502 ```
1503 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1504 ```
1505 #### Windows (Intune)
1506 OMA-URI:
1507 ```
1508 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1509 ```
1510 Value (string):
1511 ```
1512 <enabled/> or <disabled/>
1513 ```
1514 #### macOS
1515 ```
1516 <dict>
1517 <key>DisableSafeMode</key>
1518 <true/> | <false/>
1519 </dict>
1520 ```
1521 #### policies.json
1522 ```
1523 {
1524 "policies": {
1525 "DisableSafeMode": true | false
1526 }
1527 }
1528 ```
1529 ### DisableSecurityBypass
1530 Prevent the user from bypassing security in certain cases.
1531
1532 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1533
1534 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1535
1536 **Compatibility:** Firefox 60, Firefox ESR 60\
1537 **CCK2 Equivalent:** N/A\
1538 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1539
1540 #### Windows (GPO)
1541 ```
1542 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1543 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1544 ```
1545 #### Windows (Intune)
1546 OMA-URI:
1547 ```
1548 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1549 ```
1550 Value (string):
1551 ```
1552 <enabled/> or <disabled/>
1553 ```
1554 OMA-URI:
1555 ```
1556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1557 ```
1558 Value (string):
1559 ```
1560 <enabled/> or <disabled/>
1561 ```
1562
1563 #### macOS
1564 ```
1565 <dict>
1566 <key>DisableSecurityBypass</key>
1567 <dict>
1568 <key>InvalidCertificate</key>
1569 <true/> | <false/>
1570 <key><SafeBrowsing/key>
1571 <true/> | <false/>
1572 </dict>
1573 </dict>
1574 ```
1575 #### policies.json
1576 ```
1577 {
1578 "policies": {
1579 "DisableSecurityBypass": {
1580 "InvalidCertificate": true | false,
1581 "SafeBrowsing": true | false
1582 }
1583 }
1584 }
1585 ```
1586 ### DisableSystemAddonUpdate
1587 Prevent system add-ons from being installed or update.
1588
1589 **Compatibility:** Firefox 60, Firefox ESR 60\
1590 **CCK2 Equivalent:** N/A\
1591 **Preferences Affected:** N/A
1592
1593 #### Windows (GPO)
1594 ```
1595 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1596 ```
1597 #### Windows (Intune)
1598 OMA-URI:
1599 ```
1600 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1601 ```
1602 Value (string):
1603 ```
1604 <enabled/> or <disabled/>
1605 ```
1606 #### macOS
1607 ```
1608 <dict>
1609 <key>DisableSystemAddonUpdate</key>
1610 <true/> | <false/>
1611 </dict>
1612 ```
1613 #### policies.json
1614 ```
1615 {
1616 "policies": {
1617 "DisableSystemAddonUpdate": true | false
1618 }
1619 }
1620 ```
1621 ### DisableTelemetry
1622 Prevent the upload of telemetry data.
1623
1624 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1625
1626 **Compatibility:** Firefox 60, Firefox ESR 60\
1627 **CCK2 Equivalent:** `disableTelemetry`\
1628 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1629
1630 #### Windows (GPO)
1631 ```
1632 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1633 ```
1634 #### Windows (Intune)
1635 OMA-URI:
1636 ```
1637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1638 ```
1639 Value (string):
1640 ```
1641 <enabled/> or <disabled/>
1642 ```
1643 #### macOS
1644 ```
1645 <dict>
1646 <key>DisableTelemetry</key>
1647 <true/> | <false/>
1648 </dict>
1649 ```
1650 #### policies.json
1651 ```
1652 {
1653 "policies": {
1654 "DisableTelemetry": true | false
1655 }
1656 }
1657 ```
1658 ### DisplayBookmarksToolbar
1659 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1660
1661 **Compatibility:** Firefox 60, Firefox ESR 60\
1662 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1663 **Preferences Affected:** N/A
1664
1665 #### Windows (GPO)
1666 ```
1667 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1668 ```
1669 #### Windows (Intune)
1670 OMA-URI:
1671 ```
1672 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1673 ```
1674 Value (string):
1675 ```
1676 <enabled/> or <disabled/>
1677 ```
1678 #### macOS
1679 ```
1680 <dict>
1681 <key>DisplayBookmarksToolbar</key>
1682 <true/> | <false/>
1683 </dict>
1684 ```
1685 #### policies.json
1686 ```
1687 {
1688 "policies": {
1689 "DisplayBookmarksToolbar": true | false
1690 }
1691 }
1692 ```
1693 ### DisplayMenuBar (Deprecated)
1694 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1695
1696 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1697 **CCK2 Equivalent:** `displayMenuBar`\
1698 **Preferences Affected:** N/A
1699
1700 #### Windows (GPO)
1701 ```
1702 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1703 ```
1704 #### macOS
1705 ```
1706 <dict>
1707 <key>DisplayMenuBar</key>
1708 <true/> | <false/>
1709 </dict>
1710 ```
1711 #### policies.json
1712 ```
1713 {
1714 "policies": {
1715 "DisplayMenuBar": true | false
1716 }
1717 }
1718 ```
1719 ### DisplayMenuBar
1720 Set the state of the menubar.
1721
1722 `always` means the menubar is shown and cannot be hidden.
1723
1724 `never` means the menubar is hidden and cannot be shown.
1725
1726 `default-on` means the menubar is on by default but can be hidden.
1727
1728 `default-off` means the menubar is off by default but can be shown.
1729
1730 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1731 **CCK2 Equivalent:** `displayMenuBar`\
1732 **Preferences Affected:** N/A
1733
1734 #### Windows (GPO)
1735 ```
1736 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1737 ```
1738 #### Windows (Intune)
1739 OMA-URI:
1740 ```
1741 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1742 ```
1743 Value (string):
1744 ```
1745 <enabled/>
1746 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1747 ```
1748 #### macOS
1749 ```
1750 <dict>
1751 <key>DisplayMenuBar</key>
1752 <string>always | never | default-on | default-off</string>
1753 </dict>
1754 ```
1755 #### policies.json
1756 ```
1757 {
1758 "policies": {
1759 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1760 }
1761 }
1762 ```
1763 ### DNSOverHTTPS
1764 Configure DNS over HTTPS.
1765
1766 `Enabled` determines whether DNS over HTTPS is enabled
1767
1768 `ProviderURL` is a URL to another provider.
1769
1770 `Locked` prevents the user from changing DNS over HTTPS preferences.
1771
1772 `ExcludedDomains` excludes domains from DNS over HTTPS.
1773
1774 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1775 **CCK2 Equivalent:** N/A\
1776 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1777
1778 #### Windows (GPO)
1779 ```
1780 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1781 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1784 ```
1785 #### Windows (Intune)
1786 OMA-URI:
1787 ```
1788 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1789 ```
1790 Value (string):
1791 ```
1792 <enabled/> or <disabled/>
1793 ```
1794 OMA-URI:
1795 ```
1796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1797 ```
1798 Value (string):
1799 ```
1800 <enabled/>
1801 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1802 ```
1803 OMA-URI:
1804 ```
1805 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1806 ```
1807 Value (string):
1808 ```
1809 <enabled/> or <disabled/>
1810 ```
1811 OMA-URI:
1812 ```
1813 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1814 ```
1815 Value (string):
1816 ```
1817 <enabled/>
1818 <data id="List" value="1&#xF000;example.com"/>
1819 ```
1820 #### macOS
1821 ```
1822 <dict>
1823 <key>DNSOverHTTPS</key>
1824 <dict>
1825 <key>Enabled</key>
1826 <true/> | <false/>
1827 <key>ProviderURL</key>
1828 <string>URL_TO_ALTERNATE_PROVIDER</string>
1829 <key>Locked</key>
1830 <true/> | <false/>
1831 <key>ExcludedDomains</key>
1832 <array>
1833 <string>example.com</string>
1834 </array>
1835 </dict>
1836 </dict>
1837 ```
1838 #### policies.json
1839 ```
1840 {
1841 "policies": {
1842 "DNSOverHTTPS": {
1843 "Enabled": true | false,
1844 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1845 "Locked": true | false,
1846 "ExcludedDomains": ["example.com"]
1847 }
1848 }
1849 }
1850 ```
1851 ### DontCheckDefaultBrowser
1852 Don't check if Firefox is the default browser at startup.
1853
1854 **Compatibility:** Firefox 60, Firefox ESR 60\
1855 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1856 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1857
1858 #### Windows (GPO)
1859 ```
1860 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1861 ```
1862 #### Windows (Intune)
1863 OMA-URI:
1864 ```
1865 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1866 ```
1867 Value (string):
1868 ```
1869 <enabled/> or <disabled/>
1870 ```
1871 #### macOS
1872 ```
1873 <dict>
1874 <key>DontCheckDefaultBrowser</key>
1875 <true/> | <false/>
1876 </dict>
1877 ```
1878 #### policies.json
1879 ```
1880 {
1881 "policies": {
1882 "DontCheckDefaultBrowser": true | false
1883 }
1884 }
1885 ```
1886 ### DefaultDownloadDirectory
1887 Set the default download directory.
1888
1889 You can use ${home} for the native home directory.
1890
1891 **Compatibility:** Firefox 68, Firefox ESR 68\
1892 **CCK2 Equivalent:** N/A\
1893 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1894
1895 #### Windows (GPO)
1896 ```
1897 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1898 ```
1899 #### Windows (Intune)
1900 OMA-URI:
1901 ```
1902 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1903 ```
1904 Value (string):
1905 ```
1906 <enabled/>
1907 <data id="Preferences_String" value="${home}\Downloads"/>
1908 ```
1909 #### macOS
1910 ```
1911 <dict>
1912 <key>DefaultDownloadDirectory</key>
1913 <string>${home}/Downloads</string>
1914 </dict>
1915 ```
1916 #### policies.json (macOS and Linux)
1917 ```
1918 {
1919 "policies": {
1920 "DefaultDownloadDirectory": "${home}/Downloads"
1921 }
1922 ```
1923 #### policies.json (Windows)
1924 ```
1925 {
1926 "policies": {
1927 "DefaultDownloadDirectory": "${home}\\Downloads"
1928 }
1929 ```
1930 ### DownloadDirectory
1931 Set and lock the download directory.
1932
1933 You can use ${home} for the native home directory.
1934
1935 **Compatibility:** Firefox 68, Firefox ESR 68\
1936 **CCK2 Equivalent:** N/A\
1937 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1938
1939 #### Windows (GPO)
1940 ```
1941 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1942 ```
1943 #### Windows (Intune)
1944 OMA-URI:
1945 ```
1946 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1947 ```
1948 Value (string):
1949 ```
1950 <enabled/>
1951 <data id="Preferences_String" value="${home}\Downloads"/>
1952 ```
1953 #### macOS
1954 ```
1955 <dict>
1956 <key>DownloadDirectory</key>
1957 <string>${home}/Downloads</string>
1958 </dict>
1959 ```
1960 #### policies.json (macOS and Linux)
1961 ```
1962 {
1963 "policies": {
1964 "DownloadDirectory": "${home}/Downloads"
1965 }
1966 ```
1967 #### policies.json (Windows)
1968 ```
1969 {
1970 "policies": {
1971 "DownloadDirectory": "${home}\\Downloads"
1972 }
1973 ```
1974 ### EnableTrackingProtection
1975 Configure tracking protection.
1976
1977 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1978
1979 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1980
1981 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1982
1983 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1984
1985 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1986
1987 `Exceptions` are origins for which tracking protection is not enabled.
1988
1989 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1990 **CCK2 Equivalent:** N/A\
1991 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1992
1993 #### Windows (GPO)
1994 ```
1995 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1996 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2000 ```
2001 #### Windows (Intune)
2002 OMA-URI:
2003 ```
2004 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2005 ```
2006 Value (string):
2007 ```
2008 <enabled/>
2009 <data id="TrackingProtectionLocked" value="true | false"/>
2010 <data id="Cryptomining" value="true | false"/>
2011 <data id="Fingerprinting" value="true | false"/>
2012 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2013 ```
2014 #### macOS
2015 ```
2016 <dict>
2017 <key>EnableTrackingProtection</key>
2018 <dict>
2019 <key>Value</key>
2020 <true/> | <false/>
2021 <key><Locked</key>
2022 <true/> | <false/>
2023 <key><Cryptomining</key>
2024 <true/> | <false/>
2025 <key><Fingerprinting</key>
2026 <true/> | <false/>
2027 <key>Exceptions</key>
2028 <array>
2029 <string>https://example.com</string>
2030 </array>
2031 </dict>
2032 </dict>
2033 ```
2034 #### policies.json
2035 ```
2036 {
2037 "policies": {
2038 "EnableTrackingProtection": {
2039 "Value": true | false,
2040 "Locked": true | false,
2041 "Cryptomining": true | false,
2042 "Fingerprinting": true | false,
2043 "Exceptions": ["https://example.com"]
2044 }
2045 }
2046 ```
2047 ### EncryptedMediaExtensions
2048 Enable or disable Encrypted Media Extensions and optionally lock it.
2049
2050 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2051
2052 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2053
2054 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2055 **CCK2 Equivalent:** N/A\
2056 **Preferences Affected:** `media.eme.enabled`
2057
2058 #### Windows (GPO)
2059 ```
2060 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2061 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2062 ```
2063 #### Windows (Intune)
2064 OMA-URI:
2065 ```
2066 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2068 ```
2069 Value (string):
2070 ```
2071 <enabled/>or <disabled/>
2072 ```
2073 #### macOS
2074 ```
2075 <dict>
2076 <key>EncryptedMediaExtensions</key>
2077 <dict>
2078 <key>Enabled</key>
2079 <true/> | <false/>
2080 <key><Locked</key>
2081 <true/> | <false/>
2082 </dict>
2083 </dict>
2084 ```
2085 #### policies.json
2086 ```
2087 {
2088 "policies": {
2089 "EncryptedMediaExtensions": {
2090 "Enabled": true | false,
2091 "Locked": true | false
2092 }
2093 }
2094 ```
2095 ### EnterprisePoliciesEnabled
2096 Enable policy support on macOS.
2097
2098 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2099 **CCK2 Equivalent:** N/A\
2100 **Preferences Affected:** N/A
2101
2102 #### macOS
2103 ```
2104 <dict>
2105 <key>EnterprisePoliciesEnabled</key>
2106 <true/>
2107 </dict>
2108 ```
2109 ### Extensions
2110 Control the installation, uninstallation and locking of extensions.
2111
2112 `Install` is a list of URLs or native paths for extensions to be installed.
2113
2114 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2115
2116 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2117
2118 **Compatibility:** Firefox 60, Firefox ESR 60\
2119 **CCK2 Equivalent:** `addons`\
2120 **Preferences Affected:** N/A
2121
2122 #### Windows (GPO)
2123 ```
2124 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2125 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2126 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2127 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2128 ```
2129 #### macOS
2130 ```
2131 <dict>
2132 <key>Extensions</key>
2133 <dict>
2134 <key>Install</key>
2135 <array>
2136 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2137 <string>//path/to/xpi</string>
2138 </array>
2139 <key>Uninstall</key>
2140 <array>
2141 <string>bad_addon_id@mozilla.org</string>
2142 </array>
2143 <key>Locked</key>
2144 <array>
2145 <string>addon_id@mozilla.org</string>
2146 </array>
2147 </dict>
2148 </dict>
2149 ```
2150 #### policies.json
2151 ```
2152 {
2153 "policies": {
2154 "Extensions": {
2155 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2156 "Uninstall": ["bad_addon_id@mozilla.org"],
2157 "Locked": ["addon_id@mozilla.org"]
2158 }
2159 }
2160 }
2161 ```
2162 ### ExtensionSettings
2163 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2164
2165 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2166
2167 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2168
2169 The configuration for each extension is another dictionary that can contain the fields documented below.
2170
2171 | Name | Description |
2172 | --- | --- |
2173 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2174 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2175 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2176 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2178 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2179 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2180 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2181 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2182 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2183
2184 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2185 **CCK2 Equivalent:** N/A\
2186 **Preferences Affected:** N/A
2187
2188 #### Windows (GPO)
2189 ```
2190 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2191 {
2192 "*": {
2193 "blocked_install_message": "Custom error message.",
2194 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2195 "installation_mode": "blocked",
2196 "allowed_types": ["extension"]
2197 },
2198 "uBlock0@raymondhill.net": {
2199 "installation_mode": "force_installed",
2200 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2201 }
2202 }
2203 ```
2204 #### Windows (Intune)
2205 OMA-URI:
2206 ```
2207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2208 ```
2209 Value (string):
2210 ```
2211 <enabled/>
2212 <data id="ExtensionSettings" value='
2213 "*": {
2214 "blocked_install_message": "Custom error message.",
2215 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2216 "installation_mode": "blocked",
2217 "allowed_types": ["extension"]
2218 },
2219 "uBlock0@raymondhill.net": {
2220 "installation_mode": "force_installed",
2221 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2222 }'/>
2223 ```
2224 #### macOS
2225 ```
2226 <dict>
2227 <key>ExtensionSettings</key>
2228 <dict>
2229 <key>*</key>
2230 <dict>
2231 <key>blocked_install_message</key>
2232 <string>Custom error message.</string>
2233 <key>install_sources</key>
2234 <array>
2235 <string>about:addons</string>
2236 <string>https://addons.mozilla.org/</string>
2237 </array>
2238 <key>installation_mode</key>
2239 <string>blocked</string>
2240 <key>allowed_types</key>
2241 <array>
2242 <string>extension</string>
2243 </array>
2244 </dict>
2245 <key>uBlock0@raymondhill.net</key>
2246 <dict>
2247 <key>installation_mode</key>
2248 <string>force_installed</string>
2249 <key>install_url</key>
2250 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2251 </dict>
2252 </dict>
2253 </dict>
2254 ```
2255 #### policies.json
2256 ```
2257 {
2258 "policies": {
2259 "ExtensionSettings": {
2260 "*": {
2261 "blocked_install_message": "Custom error message.",
2262 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2263 "installation_mode": "blocked",
2264 "allowed_types": ["extension"]
2265 },
2266 "uBlock0@raymondhill.net": {
2267 "installation_mode": "force_installed",
2268 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2269 }
2270 }
2271 }
2272 }
2273 ```
2274 ### ExtensionUpdate
2275 Control extension updates.
2276
2277 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2278 **CCK2 Equivalent:** N/A\
2279 **Preferences Affected:** `extensions.update.enabled`
2280
2281 #### Windows (GPO)
2282 ```
2283 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2284 ```
2285 #### Windows (Intune)
2286 OMA-URI:
2287 ```
2288 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2289 ```
2290 Value (string):
2291 ```
2292 <enabled/> or <disabled/>
2293 ```
2294 #### macOS
2295 ```
2296 <dict>
2297 <key>ExtensionUpdate</key>
2298 <true/> | <false/>
2299 </dict>
2300 ```
2301 #### policies.json
2302 ```
2303 {
2304 "policies": {
2305 "ExtensionUpdate": true | false
2306 }
2307 }
2308 ```
2309 ### FlashPlugin
2310 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2311
2312 `Allow` is a list of origins where Flash are allowed.
2313
2314 `Block` is a list of origins where Flash is not allowed.
2315
2316 `Default` determines whether or not Flash is allowed by default.
2317
2318 `Locked` prevents the user from changing Flash preferences.
2319
2320 **Compatibility:** Firefox 60, Firefox ESR 60\
2321 **CCK2 Equivalent:** `permissions.plugin`\
2322 **Preferences Affected:** `plugin.state.flash`
2323
2324 #### Windows (GPO)
2325 ```
2326 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2327 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2328 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2329 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2330 ```
2331 #### Windows (Intune)
2332 OMA-URI:
2333 ```
2334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2335 ```
2336 Value (string):
2337 ```
2338 <enabled/>
2339 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2340 ```
2341 OMA-URI:
2342 ```
2343 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2344 ```
2345 Value (string):
2346 ```
2347 <enabled/> or <disabled/>
2348 ```
2349 OMA-URI:
2350 ```
2351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2352 ```
2353 Value (string):
2354 ```
2355 <enabled/> or <disabled/>
2356 ```
2357 #### macOS
2358 ```
2359 <dict>
2360 <key>FlashPlugin</key>
2361 <dict>
2362 <key>Allow</key>
2363 <array>
2364 <string>http://example.org</string>
2365 </array>
2366 <key>Block</key>
2367 <array>
2368 <string>http://example.edu</string>
2369 </array>
2370 <key>Default</key>
2371 <true/> | <false/>
2372 <key>Locked</key>
2373 <true/> | <false/>
2374 </dict>
2375 </dict>
2376 ```
2377 #### policies.json
2378 ```
2379 {
2380 "policies": {
2381 "FlashPlugin": {
2382 "Allow": ["http://example.org/"],
2383 "Block": ["http://example.edu/"],
2384 "Default": true | false,
2385 "Locked": true | false
2386 }
2387 }
2388 }
2389 ```
2390 ### FirefoxHome
2391 Customize the Firefox Home page.
2392
2393 **Compatibility:** Firefox 68, Firefox ESR 68\
2394 **CCK2 Equivalent:** N/A\
2395 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2396
2397 #### Windows (GPO)
2398 ```
2399 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2400 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2401 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2402 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2403 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2404 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2405 ```
2406 #### Windows (Intune)
2407 OMA-URI:
2408 ```
2409 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2410 ```
2411 Value (string):
2412 ```
2413 <enabled/>
2414 <data id="FirefoxHome_Search" value="true | false"/>
2415 <data id="FirefoxHome_TopSites" value="true | false"/>
2416 <data id="FirefoxHome_Highlights" value="true | false"/>
2417 <data id="FirefoxHome_Pocket" value="true | false"/>
2418 <data id="FirefoxHome_Snippets" value="true | false"/>
2419 <data id="FirefoxHome_Locked" value="true | false"/>
2420 ```
2421 #### macOS
2422 ```
2423 <dict>
2424 <key>FirefoxHome</key>
2425 <dict>
2426 <key>Search</key>
2427 <true/> | <false/>
2428 <key>TopSites</key>
2429 <true/> | <false/>
2430 <key>Highlights</key>
2431 <true/> | <false/>
2432 <key>Pocket</key>
2433 <true/> | <false/>
2434 <key>Snippets</key>
2435 <true/> | <false/>
2436 <key>Locked</key>
2437 <true/> | <false/>
2438 </dict>
2439 </dict>
2440 ```
2441 #### policies.json
2442 ```
2443 {
2444 "policies": {
2445 "FirefoxHome": {
2446 "Search": true | false,
2447 "TopSites": true | false,
2448 "Highlights": true | false,
2449 "Pocket": true | false,
2450 "Snippets": true | false,
2451 "Locked": true | false
2452 }
2453 }
2454 }
2455 ```
2456 ### HardwareAcceleration
2457 Control hardware acceleration.
2458
2459 **Compatibility:** Firefox 60, Firefox ESR 60\
2460 **CCK2 Equivalent:** N/A\
2461 **Preferences Affected:** `layers.acceleration.disabled`
2462
2463 #### Windows (GPO)
2464 ```
2465 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2466 ```
2467 #### Windows (Intune)
2468 OMA-URI:
2469 ```
2470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2471 ```
2472 Value (string):
2473 ```
2474 <enabled/> or <disabled/>
2475 ```
2476 #### macOS
2477 ```
2478 <dict>
2479 <key>HardwareAcceleration</key>
2480 <true/> | <false/>
2481 </dict>
2482 ```
2483 #### policies.json
2484 ```
2485 {
2486 "policies": {
2487 "HardwareAcceleration": true | false
2488 }
2489 }
2490 ```
2491 ### Homepage
2492 Configure the default homepage and how Firefox starts.
2493
2494 `URL` is the default homepage.
2495
2496 `Locked` prevents the user from changing homepage preferences.
2497
2498 `Additional` allows for more than one homepage.
2499
2500 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2501
2502 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2503
2504 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2505 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2506 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2507
2508 #### Windows (GPO)
2509 ```
2510 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2511 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2512 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2513 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2514 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2515 ```
2516 #### Windows (Intune)
2517 OMA-URI:
2518 ```
2519 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2520 ```
2521 Value (string):
2522 ```
2523 <enabled/>
2524
2525 <data id="HomepageURL" value="https://example.com"/>
2526 <data id="HomepageLocked" value="true | false"/>
2527 ```
2528 OMA-URI:
2529 ```
2530 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2531 ```
2532 Value (string):
2533 ```
2534 <enabled/>
2535
2536 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2537 ```
2538 OMA-URI:
2539 ```
2540 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2541 ```
2542 Value (string):
2543 ```
2544 <enabled/>
2545
2546 <data id="StartPage" value="none | homepage | previous-session"/>
2547 ```
2548 #### macOS
2549 ```
2550 <dict>
2551 <key>Homepage</key>
2552 <dict>
2553 <key>URL</key>
2554 <string>http://example.com</string>
2555 <key>Locked</key>
2556 <true/> | <false/>
2557 <key>Additional</key>
2558 <array>
2559 <string>http://example.org</string>
2560 <string>http://example.edu</string>
2561 </array>
2562 <key>StartPage</key>
2563 <string>none | homepage | previous-session | homepage-locked</string>
2564 </dict>
2565 </dict>
2566 ```
2567 #### policies.json
2568 ```
2569 {
2570 "policies": {
2571 "Homepage": {
2572 "URL": "http://example.com/",
2573 "Locked": true | false,
2574 "Additional": ["http://example.org/",
2575 "http://example.edu/"],
2576 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2577 }
2578 }
2579 }
2580 ```
2581 ### InstallAddonsPermission
2582 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2583
2584 `Allow` is a list of origins where extension installs are allowed.
2585
2586 `Default` determines whether or not extension installs are allowed by default.
2587
2588 **Compatibility:** Firefox 60, Firefox ESR 60\
2589 **CCK2 Equivalent:** `permissions.install`\
2590 **Preferences Affected:** `xpinstall.enabled`
2591
2592 #### Windows (GPO)
2593 ```
2594 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2595 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2596 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2597 ```
2598 #### Windows (Intune)
2599 OMA-URI:
2600 ```
2601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2602 ```
2603 Value (string):
2604 ```
2605 <enabled/>
2606 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2607 ```
2608 OMA-URI:
2609 ```
2610 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2611 ```
2612 Value (string):
2613 ```
2614 <enabled/>
2615 ```
2616 #### macOS
2617 ```
2618 <dict>
2619 <key>InstallAddonsPermission</key>
2620 <dict>
2621 <key>Allow</key>
2622 <array>
2623 <string>http://example.org</string>
2624 <string>http://example.edu</string>
2625 </array>
2626 <key>Default</key>
2627 <true/> | <false/>
2628 </dict>
2629 </dict>
2630 ```
2631 #### policies.json
2632 ```
2633 {
2634 "policies": {
2635 "InstallAddonsPermission": {
2636 "Allow": ["http://example.org/",
2637 "http://example.edu/"],
2638 "Default": true | false
2639 }
2640 }
2641 }
2642 ```
2643 ### LegacyProfiles
2644 Disable the feature enforcing a separate profile for each installation.
2645
2646 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2647
2648 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2649
2650 This policy only work on Windows via GPO (not policies.json).
2651
2652 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2653 **CCK2 Equivalent:** N/A\
2654 **Preferences Affected:** N/A
2655
2656 #### Windows (GPO)
2657 ```
2658 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2659 ```
2660 #### Windows (Intune)
2661 OMA-URI:
2662 ```
2663 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2664 ```
2665 Value (string):
2666 ```
2667 <enabled/> or <disabled/>
2668 ```
2669 ### LocalFileLinks
2670 Enable linking to local files by origin.
2671
2672 **Compatibility:** Firefox 68, Firefox ESR 68\
2673 **CCK2 Equivalent:** N/A\
2674 **Preferences Affected:** `capability.policy.localfilelinks.*`
2675
2676 #### Windows (GPO)
2677 ```
2678 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2679 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2680 ```
2681 #### Windows (Intune)
2682 OMA-URI:
2683 ```
2684 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2685 ```
2686 Value (string):
2687 ```
2688 <enabled/>
2689 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2690 ```
2691 #### macOS
2692 ```
2693 <dict>
2694 <key>LocalFileLinks</key>
2695 <array>
2696 <string>http://example.org</string>
2697 <string>http://example.edu</string>
2698 </array>
2699 </dict>
2700 ```
2701 #### policies.json
2702 ```
2703 {
2704 "policies": {
2705 "LocalFileLinks": ["http://example.org/",
2706 "http://example.edu/"]
2707 }
2708 }
2709 ```
2710 ### MasterPassword
2711 Require or prevent using a master password.
2712
2713 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2714
2715 **Compatibility:** Firefox 78, Firefox ESR 78\
2716 **CCK2 Equivalent:** `noMasterPassword`\
2717 **Preferences Affected:** N/A
2718
2719 #### Windows (GPO)
2720 ```
2721 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2722 ```
2723 #### Windows (Intune)
2724 OMA-URI:
2725 ```
2726 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2727 ```
2728 Value (string):
2729 ```
2730 <enabled/> or <disabled/>
2731 ```
2732 #### macOS
2733 ```
2734 <dict>
2735 <key>MasterPassword</key>
2736 <true/> | <false/>
2737 </dict>
2738 ```
2739 #### policies.json
2740 ```
2741 {
2742 "policies": {
2743 "MasterPassword": true | false
2744 }
2745 }
2746 ```
2747 ### NetworkPrediction
2748 Enable or disable network prediction (DNS prefetching).
2749
2750 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2751 **CCK2 Equivalent:** N/A\
2752 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2753
2754 #### Windows (GPO)
2755 ```
2756 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2757 ```
2758 #### Windows (Intune)
2759 OMA-URI:
2760 ```
2761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2762 ```
2763 Value (string):
2764 ```
2765 <enabled/> or <disabled/>
2766 ```
2767 #### macOS
2768 ```
2769 <dict>
2770 <key>NetworkPrediction</key>
2771 <true/> | <false/>
2772 </dict>
2773 ```
2774 #### policies.json
2775 ```
2776 {
2777 "policies": {
2778 "NetworkPrediction": true | false
2779 }
2780 ```
2781 ### NewTabPage
2782 Enable or disable the New Tab page.
2783
2784 **Compatibility:** Firefox 68, Firefox ESR 68\
2785 **CCK2 Equivalent:** N/A\
2786 **Preferences Affected:** `browser.newtabpage.enabled`
2787
2788 #### Windows (GPO)
2789 ```
2790 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2791 ```
2792 #### Windows (Intune)
2793 OMA-URI:
2794 ```
2795 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2796 ```
2797 Value (string):
2798 ```
2799 <enabled/> or <disabled/>
2800 ```
2801 #### macOS
2802 ```
2803 <dict>
2804 <key>NewTabPage</key>
2805 <true/> | <false/>
2806 </dict>
2807 ```
2808 #### policies.json
2809 ```
2810 {
2811 "policies": {
2812 "NewTabPage": true | false
2813 }
2814 ```
2815 ### NoDefaultBookmarks
2816 Disable the creation of default bookmarks.
2817
2818 This policy is only effective if the user profile has not been created yet.
2819
2820 **Compatibility:** Firefox 60, Firefox ESR 60\
2821 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2822 **Preferences Affected:** N/A
2823
2824 #### Windows (GPO)
2825 ```
2826 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2827 ```
2828 #### Windows (Intune)
2829 OMA-URI:
2830 ```
2831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2832 ```
2833 Value (string):
2834 ```
2835 <enabled/> or <disabled/>
2836 ```
2837 #### macOS
2838 ```
2839 <dict>
2840 <key>NoDefaultBookmarks</key>
2841 <true/> | <false/>
2842 </dict>
2843 ```
2844 #### policies.json
2845 ```
2846 {
2847 "policies": {
2848 "NoDefaultBookmarks": true | false
2849 }
2850 }
2851 ```
2852 ### OfferToSaveLogins
2853 Control whether or not Firefox offers to save passwords.
2854
2855 **Compatibility:** Firefox 60, Firefox ESR 60\
2856 **CCK2 Equivalent:** `dontRememberPasswords`\
2857 **Preferences Affected:** `signon.rememberSignons`
2858
2859 #### Windows (GPO)
2860 ```
2861 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2862 ```
2863 #### Windows (Intune)
2864 OMA-URI:
2865 ```
2866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2867 ```
2868 Value (string):
2869 ```
2870 <enabled/> or <disabled/>
2871 ```
2872 #### macOS
2873 ```
2874 <dict>
2875 <key>OfferToSaveLogins</key>
2876 <true/> | <false/>
2877 </dict>
2878 ```
2879 #### policies.json
2880 ```
2881 {
2882 "policies": {
2883 "OfferToSaveLogins": true | false
2884 }
2885 }
2886 ```
2887 ### OfferToSaveLoginsDefault
2888 Sets the default value of signon.rememberSignons without locking it.
2889
2890 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2891 **CCK2 Equivalent:** `dontRememberPasswords`\
2892 **Preferences Affected:** `signon.rememberSignons`
2893
2894 #### Windows (GPO)
2895 ```
2896 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2897 ```
2898 #### Windows (Intune)
2899 OMA-URI:
2900 ```
2901 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2902 ```
2903 Value (string):
2904 ```
2905 <enabled/> or <disabled/>
2906 ```
2907 #### macOS
2908 ```
2909 <dict>
2910 <key>OfferToSaveLoginsDefault</key>
2911 <true/> | <false/>
2912 </dict>
2913 ```
2914 #### policies.json
2915 ```
2916 {
2917 "policies": {
2918 "OfferToSaveLoginsDefault": true | false
2919 }
2920 }
2921 ```
2922 ### OverrideFirstRunPage
2923 Override the first run page. If the value is blank, no first run page is displayed.
2924
2925 **Compatibility:** Firefox 60, Firefox ESR 60\
2926 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2927 **Preferences Affected:** `startup.homepage_welcome_url`
2928
2929 #### Windows (GPO)
2930 ```
2931 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2932 ```
2933 #### Windows (Intune)
2934 OMA-URI:
2935 ```
2936 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2937 ```
2938 Value (string):
2939 ```
2940 <enabled/>
2941 <data id="OverridePage" value="https://example.com"/>
2942 ```
2943 #### macOS
2944 ```
2945 <dict>
2946 <key>OverrideFirstRunPage</key>
2947 <string>http://example.org</string>
2948 </dict>
2949 ```
2950 #### policies.json
2951 ```
2952 {
2953 "policies": {
2954 "OverrideFirstRunPage": "http://example.org"
2955 }
2956 ```
2957 ### OverridePostUpdatePage
2958 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2959
2960 **Compatibility:** Firefox 60, Firefox ESR 60\
2961 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2962 **Preferences Affected:** `startup.homepage_override_url`
2963
2964 #### Windows (GPO)
2965 ```
2966 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2967 ```
2968 #### Windows (Intune)
2969 OMA-URI:
2970 ```
2971 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2972 ```
2973 Value (string):
2974 ```
2975 <enabled/>
2976 <data id="OverridePage" value="https://example.com"/>
2977 ```
2978 #### macOS
2979 ```
2980 <dict>
2981 <key>OverridePostUpdatePage</key>
2982 <string>http://example.org</string>
2983 </dict>
2984 ```
2985 #### policies.json
2986 ```
2987 {
2988 "policies": {
2989 "OverridePostUpdatePage": "http://example.org"
2990 }
2991 ```
2992 ### PasswordManagerEnabled
2993 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2994
2995 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2996 **CCK2 Equivalent:** N/A\
2997 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2998
2999 #### Windows (GPO)
3000 ```
3001 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3002 ```
3003 #### Windows (Intune)
3004 OMA-URI:
3005 ```
3006 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3007 ```
3008 Value (string):
3009 ```
3010 <enabled/> or <disabled/>
3011 ```
3012 #### macOS
3013 ```
3014 <dict>
3015 <key>PasswordManagerEnabled</key>
3016 <true/> | <false/>
3017 </dict>
3018 ```
3019 #### policies.json
3020 ```
3021 {
3022 "policies": {
3023 "PasswordManagerEnabled": true | false
3024 }
3025 }
3026 ```
3027 ### PDFjs
3028 Disable or configure PDF.js, the built-in PDF viewer.
3029
3030 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3031
3032 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3033
3034 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3035
3036 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3037 **CCK2 Equivalent:** N/A\
3038 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3039
3040 #### Windows (GPO)
3041 ```
3042 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3043 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3044 ```
3045 #### Windows (Intune)
3046 OMA-URI:
3047 ```
3048 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3049 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3050 ```
3051 Value (string):
3052 ```
3053 <enabled/>or <disabled/>
3054 ```
3055 #### macOS
3056 ```
3057 <dict>
3058 <key>PDFjs</key>
3059 <dict>
3060 <key>Enabled</key>
3061 <true/> | <false/>
3062 <key><EnablePermissions</key>
3063 <true/> | <false/>
3064 </dict>
3065 </dict>
3066 ```
3067 #### policies.json
3068 ```
3069 {
3070 "policies": {
3071 "PSFjs": {
3072 "Enabled": true | false,
3073 "EnablePermissions": true | false
3074 }
3075 }
3076 ```
3077 ### Permissions
3078 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3079
3080 `Allow` is a list of origins where the feature is allowed.
3081
3082 `Block` is a list of origins where the feature is not allowed.
3083
3084 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3085
3086 `Locked` prevents the user from changing preferences for the feature.
3087
3088 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3089
3090 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3091 **CCK2 Equivalent:** N/A\
3092 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3093
3094 #### Windows (GPO)
3095 ```
3096 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3097 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3098 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3099 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3100 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3101 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3102 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3103 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3104 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3105 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3106 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3107 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3108 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3109 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3110 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3111 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3112 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3113 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3114 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3115 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3116 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3117 ```
3118 #### Windows (Intune)
3119 OMA-URI:
3120 ```
3121 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3122 ```
3123 Value (string):
3124 ```
3125 <enabled/> or <disabled/>
3126 ```
3127 OMA-URI:
3128 ```
3129 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3130 ```
3131 Value (string):
3132 ```
3133 <enabled/> or <disabled/>
3134 ```
3135 OMA-URI:
3136 ```
3137 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3138 ```
3139 Value (string):
3140 ```
3141 <enabled/>
3142 <data id="Permissions" value="1&#xF000;https://example.org"/>
3143 ```
3144 OMA-URI:
3145 ```
3146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3147 ```
3148 Value (string):
3149 ```
3150 <enabled/> or <disabled/>
3151 ```
3152 OMA-URI:
3153 ```
3154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3155 ```
3156 Value (string):
3157 ```
3158 <enabled/> or <disabled/>
3159 ```
3160 OMA-URI:
3161 ```
3162 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3163 ```
3164 Value (string):
3165 ```
3166 <enabled/>
3167 <data id="Permissions" value="1&#xF000;https://example.org"/>
3168 ```
3169 OMA-URI:
3170 ```
3171 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3172 ```
3173 Value (string):
3174 ```
3175 <enabled/>
3176 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3177 ```
3178 OMA-URI:
3179 ```
3180 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3181 ```
3182 Value (string):
3183 ```
3184 <enabled/>
3185 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3186 ```
3187 OMA-URI:
3188 ```
3189 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3190 ```
3191 Value (string):
3192 ```
3193 <enabled/> or <disabled/>
3194 ```
3195 #### macOS
3196 ```
3197 <dict>
3198 <key>Permissions</key>
3199 <dict>
3200 <key>Camera</key>
3201 <dict>
3202 <key>Allow</key>
3203 <array>
3204 <string>https://example.org</string>
3205 <string>https://example.org:1234</string>
3206 </array>
3207 <key>Block</key>
3208 <array>
3209 <string>https://example.edu</string>
3210 </array>
3211 <key>BlockNewRequests</key>
3212 <true/> | <false/>
3213 <key>Locked</key>
3214 <true/> | <false/>
3215 </dict>
3216 <key>Microphone</key>
3217 <dict>
3218 <key>Allow</key>
3219 <array>
3220 <string>https://example.org</string>
3221 </array>
3222 <key>Block</key>
3223 <array>
3224 <string>https://example.edu</string>
3225 </array>
3226 <key>BlockNewRequests</key>
3227 <true/> | <false/>
3228 <key>Locked</key>
3229 <true/> | <false/>
3230 </dict>
3231 <key>Location</key>
3232 <dict>
3233 <key>Allow</key>
3234 <array>
3235 <string>https://example.org</string>
3236 </array>
3237 <key>Block</key>
3238 <array>
3239 <string>https://example.edu</string>
3240 </array>
3241 <key>BlockNewRequests</key>
3242 <true/> | <false/>
3243 <key>Locked</key>
3244 <true/> | <false/>
3245 </dict>
3246 <key>Notifications</key>
3247 <dict>
3248 <key>Allow</key>
3249 <array>
3250 <string>https://example.org</string>
3251 </array>
3252 <key>Block</key>
3253 <array>
3254 <string>https://example.edu</string>
3255 </array>
3256 <key>BlockNewRequests</key>
3257 <true/>
3258 <key>Locked</key>
3259 <true/>
3260 </dict>
3261 <key>Autoplay</key>
3262 <dict>
3263 <key>Allow</key>
3264 <array>
3265 <string>https://example.org</string>
3266 </array>
3267 <key>Block</key>
3268 <array>
3269 <string>https://example.edu</string>
3270 </array>
3271 <key>Default</key>
3272 <string>allow-audio-video | block-audio | block-audio-video</string>
3273 <key>Locked</key>
3274 <true/> | <false/>
3275 </dict>
3276 </dict>
3277 </dict>
3278 ```
3279 #### policies.json
3280 ```
3281 {
3282 "policies": {
3283 "Permissions": {
3284 "Camera": {
3285 "Allow": ["https://example.org","https://example.org:1234"],
3286 "Block": ["https://example.edu"],
3287 "BlockNewRequests": true | false,
3288 "Locked": true | false
3289 },
3290 "Microphone": {
3291 "Allow": ["https://example.org"],
3292 "Block": ["https://example.edu"],
3293 "BlockNewRequests": true | false,
3294 "Locked": true | false
3295 },
3296 "Location": {
3297 "Allow": ["https://example.org"],
3298 "Block": ["https://example.edu"],
3299 "BlockNewRequests": true | false,
3300 "Locked": true | false
3301 },
3302 "Notifications": {
3303 "Allow": ["https://example.org"],
3304 "Block": ["https://example.edu"],
3305 "BlockNewRequests": true | false,
3306 "Locked": true | false
3307 },
3308 "Autoplay": {
3309 "Allow": ["https://example.org"],
3310 "Block": ["https://example.edu"],
3311 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3312 "Locked": true | false
3313 }
3314 }
3315 }
3316 }
3317 ```
3318 ### PictureInPicture
3319
3320 Enable or disable Picture-in-Picture.
3321
3322 **Compatibility:** Firefox 78, Firefox ESR 78\
3323 **CCK2 Equivalent:** N/A\
3324 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3325
3326 #### Windows (GPO)
3327 ```
3328 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3329 ```
3330 #### Windows (Intune)
3331 OMA-URI:
3332 ```
3333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3334 ```
3335 Value (string):
3336 ```
3337 <enabled/> or <disabled/>
3338 ```
3339 #### macOS
3340 ```
3341 <dict>
3342 <key>PictureInPicture</key>
3343 <true/> | <false/>
3344 </dict>
3345 ```
3346 #### policies.json
3347 ```
3348 {
3349 "policies": {
3350 "PictureInPicture": true | false
3351 }
3352 }
3353 ```
3354 ### PopupBlocking
3355 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3356
3357 `Allow` is a list of origins where popup-windows are allowed.
3358
3359 `Default` determines whether or not pop-up windows are allowed by default.
3360
3361 `Locked` prevents the user from changing pop-up preferences.
3362
3363 **Compatibility:** Firefox 60, Firefox ESR 60\
3364 **CCK2 Equivalent:** `permissions.popup`\
3365 **Preferences Affected:** `dom.disable_open_during_load`
3366
3367 #### Windows (GPO)
3368 ```
3369 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3370 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3371 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3372 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3373 ```
3374 #### Windows (Intune)
3375 OMA-URI:
3376 ```
3377 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3378 ```
3379 Value (string):
3380 ```
3381 <enabled/>
3382 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3383 ```
3384 OMA-URI:
3385 ```
3386 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3387 ```
3388 Value (string):
3389 ```
3390 <enabled/> or <disabled/>
3391 ```
3392 OMA-URI:
3393 ```
3394 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3395 ```
3396 Value (string):
3397 ```
3398 <enabled/> or <disabled/>
3399 ```
3400 #### macOS
3401 ```
3402 <dict>
3403 <key>PopupBlocking</key>
3404 <dict>
3405 <key>Allow</key>
3406 <array>
3407 <string>http://example.org</string>
3408 <string>http://example.edu</string>
3409 </array>
3410 <key>Default</key>
3411 <true/> | <false/>
3412 <key>Locked</key>
3413 <true/> | <false/>
3414 </dict>
3415 </dict>
3416 ```
3417 #### policies.json
3418 ```
3419 {
3420 "policies": {
3421 "PopupBlocking": {
3422 "Allow": ["http://example.org/",
3423 "http://example.edu/"],
3424 "Default": true | false,
3425 "Locked": true | false
3426 }
3427 }
3428 }
3429 ```
3430 ### Preferences
3431 Set and lock certain preferences.
3432
3433 **Compatibility:** See below\
3434 **CCK2 Equivalent:** `preferences`\
3435 **Preferences Affected:** See below
3436
3437 | Preference | Type | Compatibility | Default
3438 | --- | --- | --- | ---
3439 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3440 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3441 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3442 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3443 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3444 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3445 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3446 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3447 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3448 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3449 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3450 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3451 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3452 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3453 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3454 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3455 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3456 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3457 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3458 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3459 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3460 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3461 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3462 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3463 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3464 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3465 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3466 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3467 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3468 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3469 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3470 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3471 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3472 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3473 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3474 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3475 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3476 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3477 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3478 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3479 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3480 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3481 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3482 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3483 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3484 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3485 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3486 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3487 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3488 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3489 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3490 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3491 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3492 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3493 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3494 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3495 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3496 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3497 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3498 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3499 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3500 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3501 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3502 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3503 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3504 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3505 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3506 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3507 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3508 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3509 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3510 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3511 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3512 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3513 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3514 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3515 disabled
3516 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3517 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3518 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3519 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3520 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3521 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3522 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3523 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3524 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3525 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3526 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3527 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3528 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3529 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3530 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3531 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3532 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3533 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3534 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3535 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3536 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3537 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3538 #### Windows (GPO)
3539 ```
3540 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3541 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3542 ```
3543 #### Windows (Intune)
3544 OMA-URI: (periods are replaced by underscores)
3545 ```
3546 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3547 ```
3548 Value (string):
3549 ```
3550 <enabled/> or <disabled/>
3551 ```
3552 #### macOS
3553 ```
3554 <dict>
3555 <key>Preferences</key>
3556 <dict>
3557 <key>boolean_preference_name</key>
3558 <true/> | <false/>
3559 <key>string_preference_name</key>
3560 <string>string_value</string>
3561 </dict>
3562 </dict>
3563 ```
3564 #### policies.json
3565 ```
3566 {
3567 "policies": {
3568 "Preferences": {
3569 "boolean_preference_name": true | false,
3570 "string_preference_name": "string_value"
3571 }
3572 }
3573 }
3574 ```
3575 ### PromptForDownloadLocation
3576 Ask where to save each file before downloading.
3577
3578 **Compatibility:** Firefox 68, Firefox ESR 68\
3579 **CCK2 Equivalent:** N/A\
3580 **Preferences Affected:** `browser.download.useDownloadDir`
3581
3582 #### Windows (GPO)
3583 ```
3584 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3585 ```
3586 #### Windows (Intune)
3587 OMA-URI:
3588 ```
3589 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3590 ```
3591 Value (string):
3592 ```
3593 <enabled/> or <disabled/>
3594 ```
3595 #### macOS
3596 ```
3597 <dict>
3598 <key>PromptForDownloadLocation</key>
3599 <true/> | <false/>
3600 </dict>
3601 ```
3602 #### policies.json
3603 ```
3604 {
3605 "policies": {
3606 "PromptForDownloadLocation": true | false
3607 }
3608 }
3609 ```
3610 ### Proxy
3611 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3612 To specify ports, append them to the hostnames with a colon (:).
3613
3614 `Mode` is the proxy method being used.
3615
3616 `Locked` is whether or not proxy settings can be changed.
3617
3618 `HTTPProxy` is the HTTP proxy server.
3619
3620 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3621
3622 `SSLProxy` is the SSL proxy server.
3623
3624 `FTPProxy` is the FTP proxy server.
3625
3626 `SOCKSProxy` is the SOCKS proxy server
3627
3628 `SOCKSVersion` is the SOCKS version (4 or 5)
3629
3630 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3631
3632 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3633
3634 `AutoLogin` means do not prompt for authentication if password is saved.
3635
3636 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3637
3638 **Compatibility:** Firefox 60, Firefox ESR 60\
3639 **CCK2 Equivalent:** `networkProxy*`\
3640 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3641
3642 #### Windows (GPO)
3643 ```
3644 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3645 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3646 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3647 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3648 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3649 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3650 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3651 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3652 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3653 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3654 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3655 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3656 ```
3657 #### Windows (Intune)
3658 OMA-URI:
3659 ```
3660 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3661 ```
3662 Value (string):
3663 ```
3664 <enabled/>
3665 <data id="ProxyLocked" value="true | false"/>
3666 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3667 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3668 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3669 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3670 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3671 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3672 <data id="SOCKSVersion" value="4 | 5"/>
3673 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3674 <data id="Passthrough" value="<local>"/>
3675 <data id="AutoLogin" value="true | false"/>
3676 <data id="UseProxyForDNS" value="true | false"/>
3677 ```
3678 #### macOS
3679 ```
3680 <dict>
3681 <key>Proxy</key>
3682 <dict>
3683 <key>Mode</key>
3684 <string>none | system | manual | autoDetect | autoConfig</string>
3685 <key>Locked</key>
3686 <true> | </false>
3687 <key>HTTPProxy</key>
3688 <string>https://httpproxy.example.com</string>
3689 <key>UseHTTPProxyForAllProtocols</key>
3690 <true> | </false>
3691 <key>SSLProxy</key>
3692 <string>https://sslproxy.example.com</string>
3693 <key>FTPProxy</key>
3694 <string>https://ftpproxy.example.com</string>
3695 <key>SOCKSProxy</key>
3696 <string>https://socksproxy.example.com</string>
3697 <key>SOCKSVersion</key>
3698 <string>4 | 5</string>
3699 <key>Passthrough</key>
3700 <string>&lt;local>&gt;</string>
3701 <key>AutoConfigURL</key>
3702 <string>URL_TO_AUTOCONFIG</string>
3703 <key>AutoLogin</key>
3704 <true> | </false>
3705 <key>UseProxyForDNS</key>
3706 <true> | </false>
3707 </dict>
3708 </dict>
3709 ```
3710 #### policies.json
3711 ```
3712 {
3713 "policies": {
3714 "Proxy": {
3715 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3716 "Locked": true | false,
3717 "HTTPProxy": "hostname",
3718 "UseHTTPProxyForAllProtocols": true | false,
3719 "SSLProxy": "hostname",
3720 "FTPProxy": "hostname",
3721 "SOCKSProxy": "hostname",
3722 "SOCKSVersion": 4 | 5
3723 "Passthrough": "<local>",
3724 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3725 "AutoLogin": true | false,
3726 "UseProxyForDNS": true | false
3727 }
3728 }
3729 }
3730 ```
3731 ### RequestedLocales
3732 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3733
3734 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3735
3736 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3737 **CCK2 Equivalent:** N/A\
3738 **Preferences Affected:** N/A
3739 #### Windows (GPO)
3740 ```
3741 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3742 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3743
3744 or
3745
3746 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3747 ```
3748 #### Windows (Intune)
3749 OMA-URI:
3750 ```
3751 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3752 ```
3753 Value (string):
3754 ```
3755 <enabled/>
3756 <data id="Preferences_String" value="de,en-US"/>
3757 ```
3758 #### macOS
3759 ```
3760 <dict>
3761 <key>RequestedLocales</key>
3762 <array>
3763 <string>de</string>
3764 <string>en-US</string>
3765 </array>
3766 </dict>
3767
3768 or
3769
3770 <dict>
3771 <key>RequestedLocales</key>
3772 <string>de,en-US</string>
3773 </dict>
3774
3775 ```
3776 #### policies.json
3777 ```
3778 {
3779 "policies": {
3780 "RequestedLocales": ["de", "en-US"]
3781 }
3782 }
3783
3784 or
3785
3786 {
3787 "policies": {
3788 "RequestedLocales": "de,en-US"
3789 }
3790 }
3791 ```
3792 <a name="SanitizeOnShutdown"></a>
3793
3794 ### SanitizeOnShutdown (Selective)
3795 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3796
3797 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3798
3799 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3800 **CCK2 Equivalent:** N/A\
3801 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3802 #### Windows (GPO)
3803 ```
3804 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3805 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3806 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3807 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3808 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3809 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3810 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3811 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3812 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3813 ```
3814 #### Windows (Intune)
3815 OMA-URI:
3816 ```
3817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3818 ```
3819 Value (string):
3820 ```
3821 <enabled/> or <disabled/>
3822 ```
3823 #### macOS
3824 ```
3825 <dict>
3826 <key>SanitizeOnShutdown</key>
3827 <dict>
3828 <key>Cache</key>
3829 <true/> | <false/>
3830 <key>Cookies</key>
3831 <true/> | <false/>
3832 <key>Downloads</key>
3833 <true/> | <false/>
3834 <key>FormData</key>
3835 <true/> | <false/>
3836 <key>History</key>
3837 <true/> | <false/>
3838 <key>Sessions</key>
3839 <true/> | <false/>
3840 <key>SiteSettings</key>
3841 <true/> | <false/>
3842 <key>OfflineApps</key>
3843 <true/> | <false/>
3844 <key>Locked</key>
3845 <true/> | <false/>
3846 </dict>
3847 </dict>
3848 ```
3849 #### policies.json
3850 ```
3851 {
3852 "policies": {
3853 "SanitizeOnShutdown": {
3854 "Cache": true | false,
3855 "Cookies": true | false,
3856 "Downloads": true | false,
3857 "FormData": true | false,
3858 "History": true | false,
3859 "Sessions": true | false,
3860 "SiteSettings": true | false,
3861 "OfflineApps": true | false,
3862 "Locked": true | false
3863 }
3864 }
3865 }
3866 ```
3867 ### SanitizeOnShutdown (All)
3868 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3869
3870 **Compatibility:** Firefox 60, Firefox ESR 60\
3871 **CCK2 Equivalent:** N/A\
3872 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3873 #### Windows (GPO)
3874 ```
3875 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3876 ```
3877 #### Windows (Intune)
3878 OMA-URI:
3879 ```
3880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3881 ```
3882 Value (string):
3883 ```
3884 <enabled/> or <disabled/>
3885 ```
3886 #### macOS
3887 ```
3888 <dict>
3889 <key>SanitizeOnShutdown</key>
3890 <true/> | <false/>
3891 </dict>
3892 ```
3893 #### policies.json
3894 ```
3895 {
3896 "policies": {
3897 "SanitizeOnShutdown": true | false
3898 }
3899 }
3900 ```
3901 ### SearchBar
3902 Set whether or not search bar is displayed.
3903
3904 **Compatibility:** Firefox 60, Firefox ESR 60\
3905 **CCK2 Equivalent:** `showSearchBar`\
3906 **Preferences Affected:** N/A
3907
3908 #### Windows (GPO)
3909 ```
3910 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3911 ```
3912
3913 #### Windows (Intune)
3914 OMA-URI:
3915 ```
3916 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3917 ```
3918 Value (string):
3919 ```
3920 <enabled/>
3921 <data id="Permissions" value="unified | separate"/>
3922 ```
3923 #### macOS
3924 ```
3925 <dict>
3926 <key>SearchBar</key>
3927 <string>unified | separate</string>
3928 </dict>
3929 ```
3930 #### policies.json
3931 ```
3932 {
3933 "policies": {
3934 "SearchBar": "unified" | "separate"
3935 }
3936 }
3937 ```
3938 <a name="SearchEngines"></a>
3939
3940 ### SearchEngines (This policy is only available on the ESR.)
3941
3942 ### SearchEngines | Default
3943
3944 Set the default search engine. This policy is only available on the ESR.
3945
3946 **Compatibility:** Firefox ESR 60\
3947 **CCK2 Equivalent:** `defaultSearchEngine`\
3948 **Preferences Affected:** N/A
3949
3950 #### Windows (GPO)
3951 ```
3952 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3953 ```
3954 #### Windows (Intune)
3955 OMA-URI:
3956 ```
3957 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3958 ```
3959 Value (string):
3960 ```
3961 <enabled/>
3962 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3963 ```
3964 #### macOS
3965 ```
3966 <dict>
3967 <key>SearchEngines</key>
3968 <dict>
3969 <key>Default</key>
3970 <string>NAME_OF_SEARCH_ENGINE</string>
3971 </dict>
3972 </dict>
3973 ```
3974 #### policies.json
3975 ```
3976 {
3977 "policies": {
3978 "SearchEngines": {
3979 "Default": "NAME_OF_SEARCH_ENGINE"
3980 }
3981 }
3982 }
3983 ```
3984 ### SearchEngines | PreventInstalls
3985
3986 Prevent installing search engines from webpages.
3987
3988 **Compatibility:** Firefox ESR 60\
3989 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3990 **Preferences Affected:** N/A
3991
3992 #### Windows (GPO)
3993 ```
3994 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3995 ```
3996 #### Windows (Intune)
3997 OMA-URI:
3998 ```
3999 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4000 ```
4001 Value (string):
4002 ```
4003 <enabled/> or <disabled/>
4004 ```
4005 #### macOS
4006 ```
4007 <dict>
4008 <key>SearchEngines</key>
4009 <dict>
4010 <key>PreventInstalls</key>
4011 <true/> | <false/>
4012 </dict>
4013 </dict>
4014 ```
4015 #### policies.json
4016 ```
4017 {
4018 "policies": {
4019 "SearchEngines": {
4020 "PreventInstalls": true | false
4021 }
4022 }
4023 }
4024 ```
4025 ### SearchEngines | Remove
4026
4027 Hide built-in search engines. This policy is only available on the ESR.
4028
4029 **Compatibility:** Firefox ESR 60.2\
4030 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4031 **Preferences Affected:** N/A
4032
4033 #### Windows (GPO)
4034 ```
4035 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4036 ```
4037 #### Windows (Intune)
4038 OMA-URI:
4039 ```
4040 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4041 ```
4042 Value (string):
4043 ```
4044 <enabled/>
4045 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4046 ```
4047 #### macOS
4048 ```
4049 <dict>
4050 <key>SearchEngines</key>
4051 <dict>
4052 <key>Remove</key>
4053 <array>
4054 <string>NAME_OF_SEARCH_ENGINE</string>
4055 </array>
4056 </dict>
4057 </dict>
4058 ```
4059 #### policies.json
4060 ```
4061 {
4062 "policies": {
4063 "SearchEngines": {
4064 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4065 }
4066 }
4067 }
4068 ```
4069 ### SearchEngines | Add
4070
4071 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4072
4073 `Name` is the name of the search engine.
4074
4075 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4076
4077 `Method` is either GET or POST
4078
4079 `IconURL` is a URL for the icon to use.
4080
4081 `Alias` is a keyword to use for the engine.
4082
4083 `Description` is a description of the search engine.
4084
4085 `PostData` is the POST data as name value pairs separated by &.
4086
4087 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4088
4089 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4090 **CCK2 Equivalent:** `searchplugins`\
4091 **Preferences Affected:** N/A
4092
4093 #### Windows (GPO)
4094 ```
4095 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4096 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4097 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4098 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4099 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4100 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4101 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4102 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4103 ```
4104 #### Windows (Intune)
4105 OMA-URI:
4106 ```
4107 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4108 ```
4109 Value (string):
4110 ```
4111 <enabled/>
4112 <data id="SearchEngine_Name" value="Example1"/>
4113 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4114 <data id="SearchEngine_Method" value="GET | POST"/>
4115 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4116 <data id="SearchEngine_Alias" value="example"/>
4117 <data id="SearchEngine_Description" value="Example Description"/>
4118 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4119 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4120 ```
4121 #### macOS
4122 ```
4123 <dict>
4124 <key>SearchEngines</key>
4125 <dict>
4126 <key>Add</key>
4127 <array>
4128 <dict>
4129 <key>Name</key>
4130 <string>Example1</string>
4131 <key>URLTemplate</key>
4132 <string>https://www.example.org/q={searchTerms}</string>
4133 <key>Method</key>
4134 <string>GET | POST </string>
4135 <key>IconURL</key>
4136 <string>https://www.example.org/favicon.ico</string>
4137 <key>Alias</key>
4138 <string>example</string>
4139 <key>Description</key>
4140 <string>Example Description</string>
4141 <key>SuggestURLTemplate</key>
4142 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4143 <key>PostData</key>
4144 <string>name=value&q={searchTerms}</string>
4145 </dict>
4146 <array>
4147 </dict>
4148 </dict>
4149 ```
4150 #### policies.json
4151 ```
4152 {
4153 "policies": {
4154 "SearchEngines": {
4155 "Add": [
4156 {
4157 "Name": "Example1",
4158 "URLTemplate": "https://www.example.org/q={searchTerms}",
4159 "Method": "GET" | "POST",
4160 "IconURL": "https://www.example.org/favicon.ico",
4161 "Alias": "example",
4162 "Description": "Description",
4163 "PostData": "name=value&q={searchTerms}",
4164 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4165 }
4166 ]
4167 }
4168 }
4169 }
4170 ```
4171 ### SearchSuggestEnabled
4172
4173 Enable search suggestions.
4174
4175 **Compatibility:** Firefox 68, Firefox ESR 68\
4176 **CCK2 Equivalent:** N/A\
4177 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4178
4179 #### Windows (GPO)
4180 ```
4181 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4182 ```
4183 #### Windows (Intune)
4184 OMA-URI:
4185 ```
4186 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4187 ```
4188 Value (string):
4189 ```
4190 <enabled/> or <disabled/>
4191 ```
4192 #### macOS
4193 ```
4194 <dict>
4195 <key>SearchSuggestEnabled</key>
4196 <true/> | <false/>
4197 </dict>
4198 ```
4199 #### policies.json
4200 ```
4201 {
4202 "policies": {
4203 "SearchSuggestEnabled": true | false
4204 }
4205 }
4206 ```
4207 ### SecurityDevices
4208
4209 Install PKCS #11 modules.
4210
4211 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4212 **CCK2 Equivalent:** `certs.devices`\
4213 **Preferences Affected:** N/A
4214
4215 #### Windows (GPO)
4216 ```
4217 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4218 ```
4219 #### Windows (Intune)
4220 OMA-URI:
4221 ```
4222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4223 ```
4224 Value (string):
4225 ```
4226 <enabled/>
4227 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4228 ```
4229 #### macOS
4230 ```
4231 <dict>
4232 <key>SecurityDevices</key>
4233 <dict>
4234 <key>NAME_OF_DEVICE</key>
4235 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4236 </dict>
4237 </dict>
4238 ```
4239
4240 #### policies.json
4241 ```
4242 {
4243 "policies": {
4244 "SecurityDevices": {
4245 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4246 }
4247 }
4248 }
4249 ```
4250 ### SSLVersionMax
4251
4252 Set and lock the maximum version of TLS.
4253
4254 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4255 **CCK2 Equivalent:** N/A\
4256 **Preferences Affected:** `security.tls.version.max`
4257
4258 #### Windows (GPO)
4259 ```
4260 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4261 ```
4262 #### Windows (Intune)
4263 OMA-URI:
4264 ```
4265 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4266 ```
4267 Value (string):
4268 ```
4269 <enabled/>
4270 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4271 ```
4272 #### macOS
4273 ```
4274 <dict>
4275 <key>SSLVersionMax</key>
4276 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4277 </dict>
4278 ```
4279
4280 #### policies.json
4281 ```
4282 {
4283 "policies": {
4284 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4285 }
4286 }
4287 ```
4288 ### SSLVersionMin
4289
4290 Set and lock the minimum version of TLS.
4291
4292 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4293 **CCK2 Equivalent:** N/A\
4294 **Preferences Affected:** `security.tls.version.min`
4295
4296 #### Windows (GPO)
4297 ```
4298 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4299 ```
4300 #### Windows (Intune)
4301 OMA-URI:
4302 ```
4303 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4304 ```
4305 Value (string):
4306 ```
4307 <enabled/>
4308 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4309 ```
4310 #### macOS
4311 ```
4312 <dict>
4313 <key>SSLVersionMin</key>
4314 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4315 </dict>
4316 ```
4317
4318 #### policies.json
4319 ```
4320 {
4321 "policies": {
4322 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4323 }
4324 }
4325 ```
4326 ### SupportMenu
4327 Add a menuitem to the help menu for specifying support information.
4328
4329 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4330 **CCK2 Equivalent:** helpMenu\
4331 **Preferences Affected:** N/A
4332
4333 #### Windows (GPO)
4334 ```
4335 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4336 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4337 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4338 ```
4339 #### Windows (Intune)
4340 OMA-URI:
4341 ```
4342 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4343 ```
4344 Value (string):
4345 ```
4346 <enabled/>
4347 <data id="SupportMenuTitle" value="Support Menu"/>
4348 <data id="SupportMenuURL" value="http://example.com/support"/>
4349 <data id="SupportMenuAccessKey" value="S">
4350 ```
4351 #### macOS
4352 ```
4353 <dict>
4354 <key>SupportMenu</key>
4355 <dict>
4356 <key>Title</key>
4357 <string>SupportMenu</string>
4358 <key>URL</key>
4359 <string>http://example.com/support</string>
4360 <key>AccessKey</key>
4361 <string>S</string>
4362 </dict>
4363 </dict>
4364 ```
4365 #### policies.json
4366 ```
4367 {
4368 "policies": {
4369 "SupportMenu": {
4370 "Title": "Support Menu",
4371 "URL": "http://example.com/support",
4372 "AccessKey": "S"
4373 }
4374 }
4375 }
4376 ```
4377 ### UserMessaging
4378
4379 Prevent installing search engines from webpages.
4380
4381 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4382
4383 `ExtensionRecommendations` Don't recommend extensions.
4384
4385 `FeatureRecommendations` Don't recommend browser features.
4386
4387 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4388
4389 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4390 **CCK2 Equivalent:** N/A\
4391 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4392
4393 #### Windows (GPO)
4394 ```
4395 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4396 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4397 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4398 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4399 ```
4400 #### Windows (Intune)
4401 OMA-URI:
4402 ```
4403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4405 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4406 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4407 ```
4408 Value (string):
4409 ```
4410 <enabled/> or <disabled/>
4411 ```
4412 #### macOS
4413 ```
4414 <dict>
4415 <key>UserMessaging</key>
4416 <dict>
4417 <key>WhatsNew</key>
4418 <true/> | <false/>
4419 <key>ExtensionRecommendations</key>
4420 <true/> | <false/>
4421 <key>FeatureRecommendations</key>
4422 <true/> | <false/>
4423 <key>UrlbarInterventions</key>
4424 <true/> | <false/>
4425 </dict>
4426 </dict>
4427 ```
4428 #### policies.json
4429 ```
4430 {
4431 "policies": {
4432 "UserMessaging": {
4433 "WhatsNew": true | false,
4434 "ExtensionRecommendations": true | false,
4435 "FeatureRecommendations": true | false,
4436 "UrlbarInterventions": true | false
4437 }
4438 }
4439 }
4440 ```
4441 ### WebsiteFilter
4442 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4443
4444 **Compatibility:** Firefox 60, Firefox ESR 60\
4445 **CCK2 Equivalent:** N/A\
4446 **Preferences Affected:** N/A
4447
4448 #### Windows (GPO)
4449 ```
4450 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4451 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4452 ```
4453 #### Windows (Intune)
4454 OMA-URI:
4455 ```
4456 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4457 ```
4458 Value (string):
4459 ```
4460 <enabled/>
4461 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4462 ```
4463 OMA-URI:
4464 ```
4465 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4466 ```
4467 Value (string):
4468 ```
4469 <enabled/>
4470 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4471 ```
4472 #### macOS
4473 ```
4474 <dict>
4475 <key>WebsiteFilter</key>
4476 <dict>
4477 <key>Block</key>
4478 <array>
4479 <string><all_urls></string>
4480 </array>
4481 <key>Exceptions</key>
4482 <array>
4483 <string>http://example.org/*</string>
4484 </array>
4485 </dict>
4486
4487 </dict>
4488 ```
4489 #### policies.json
4490 ```
4491 {
4492 "policies": {
4493 "WebsiteFilter": {
4494 "Block": ["<all_urls>"],
4495 "Exceptions": ["http://example.org/*"]
4496 }
4497 }
4498 }
4499 ```

patrick-canterino.de