]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #653 from mozilla/PrimaryPassword
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
66 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
67 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
68 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
69 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
70 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
71 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
72 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
73 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
74 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
75 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
76 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
77 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
78 | **[`Preferences`](#preferences)** | Set and lock some preferences.
79 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
80 | **[`Proxy`](#proxy)** | Configure proxy settings.
81 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
82 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
83 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
84 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
85 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
86 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
87 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
88 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
91 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
92 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
93 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
94 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
95 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
96 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
97
98 ### AppAutoUpdate
99
100 Enable or disable **automatic** application update.
101
102 If set to true, application updates are installed without user approval.
103
104 If set to false, application updates are downloaded but the user can choose when to install the update.
105
106 If you have disabled updates via DisableAppUpdate, this policy has no effect.
107
108 **Compatibility:** Firefox 75, Firefox ESR 68.7\
109 **CCK2 Equivalent:** N/A\
110 **Preferences Affected:** app.update.auto
111
112 #### Windows (GPO)
113 ```
114 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
115 ```
116 #### Windows (Intune)
117 OMA-URI:
118 ```
119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
120 ```
121 Value (string):
122 ```
123 <enabled/> or <disabled/>
124 ```
125 #### macOS
126 ```
127 <dict>
128 <key>AppAutoUpdate</key>
129 <true/> | <false/>
130 </dict>
131 ```
132 #### policies.json
133 ```
134 {
135 "policies": {
136 "AppAutoUpdate": true | false
137 }
138 }
139 ```
140 ### AppUpdateURL
141
142 Change the URL for application update.
143
144 **Compatibility:** Firefox 62, Firefox ESR 60.2\
145 **CCK2 Equivalent:** N/A\
146 **Preferences Affected:** `app.update.url`
147
148 #### Windows (GPO)
149 ```
150 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
151 ```
152 #### Windows (Intune)
153 OMA-URI:
154 ```
155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
156 ```
157 Value (string):
158 ```
159 <enabled/>
160 <data id="AppUpdateURL" value="https://yoursite.com"/>
161 ```
162 #### macOS
163 ```
164 <dict>
165 <key>AppUpdateURL</key>
166 <string>https://yoursite.com</string>
167 </dict>
168 ```
169 #### policies.json
170 ```
171 {
172 "policies": {
173 "AppUpdateURL": "https://yoursite.com"
174 }
175 }
176 ```
177 ### Authentication
178
179 Configure sites that support integrated authentication.
180
181 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
182
183 `PrivateBrowsing` enables integrated authentication in prviate browsing.
184
185 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
186 **CCK2 Equivalent:** N/A\
187 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
188
189 #### Windows (GPO)
190 ```
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
202 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
203 ```
204 #### Windows (Intune)
205 OMA-URI:
206 ```
207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
208 ```
209 Value (string):
210 ```
211 <enabled/>
212 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
213 ```
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
240 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
241 ```
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>Authentication</key>
262 <dict>
263 <key>SPNEGO</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>Delegated</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>NTLM</key>
274 <array>
275 <string>mydomain.com</string>
276 <string>https://myotherdomain.com</string>
277 </array>
278 <key>AllowNonFQDN</key>
279 <dict>
280 <key>SPNEGO</key>
281 <true/> | <false/>
282 <key>NTLM</key>
283 <true/> | <false/>
284 </dict>
285 <key>AllowProxies</key>
286 <dict>
287 <key>SPNEGO</key>
288 <true/> | <false/>
289 <key>NTLM</key>
290 <true/> | <false/>
291 </dict>
292 <key>Locked</key>
293 <true/> | <false/>
294 <key>PrivateBrowsing</key>
295 <true/> | <false/>
296 </dict>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "Authentication": {
304 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
305 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
306 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
307 "AllowNonFQDN": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "AllowProxies": {
312 "SPNEGO": true | false,
313 "NTLM": true | false
314 },
315 "Locked": true | false,
316 "PrivateBrowsing": true | false
317 }
318 }
319 }
320 ```
321 ### BlockAboutAddons
322
323 Block access to the Add-ons Manager (about:addons).
324
325 **Compatibility:** Firefox 60, Firefox ESR 60\
326 **CCK2 Equivalent:** `disableAddonsManager`\
327 **Preferences Affected:** N/A
328
329 #### Windows (GPO)
330 ```
331 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
332 ```
333 #### Windows (Intune)
334 OMA-URI:
335 ```
336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
337 ```
338 Value (string):
339 ```
340 <enabled/> or <disabled/>
341 ```
342 #### macOS
343 ```
344 <dict>
345 <key>BlockAboutAddons</key>
346 <true/> | <false/>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "BlockAboutAddons": true | false
354 }
355 }
356 ```
357 ### BlockAboutConfig
358
359 Block access to about:config.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60\
362 **CCK2 Equivalent:** `disableAboutConfig`\
363 **Preferences Affected:** N/A
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
368 ```
369 #### Windows (Intune)
370 OMA-URI:
371 ```
372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
373 ```
374 Value (string):
375 ```
376 <enabled/> or <disabled/>
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>BlockAboutConfig</key>
382 <true/> | <false/>
383 </dict>
384 ```
385 #### policies.json
386 ```
387 {
388 "policies": {
389 "BlockAboutConfig": true | false
390 }
391 }
392 ```
393 ### BlockAboutProfiles
394
395 Block access to About Profiles (about:profiles).
396
397 **Compatibility:** Firefox 60, Firefox ESR 60\
398 **CCK2 Equivalent:** `disableAboutProfiles`\
399 **Preferences Affected:** N/A
400
401 #### Windows (GPO)
402 ```
403 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
404 ```
405 #### Windows (Intune)
406 OMA-URI:
407 ```
408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
409 ```
410 Value (string):
411 ```
412 <enabled/> or <disabled/>
413 ```
414 #### macOS
415 ```
416 <dict>
417 <key>BlockAboutProfiles</key>
418 <true/> | <false/>
419 </dict>
420 ```
421 #### policies.json
422 ```
423 {
424 "policies": {
425 "BlockAboutProfiles": true | false
426 }
427 }
428 ```
429 ### BlockAboutSupport
430
431 Block access to Troubleshooting Information (about:support).
432
433 **Compatibility:** Firefox 60, Firefox ESR 60\
434 **CCK2 Equivalent:** `disableAboutSupport`\
435 **Preferences Affected:** N/A
436
437 #### Windows (GPO)
438 ```
439 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
440 ```
441 #### Windows (Intune)
442 OMA-URI:
443 ```
444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
445 ```
446 Value (string):
447 ```
448 <enabled/> or <disabled/>
449 ```
450 #### macOS
451 ```
452 <dict>
453 <key>BlockAboutSupport</key>
454 <true/> | <false/>
455 </dict>
456 ```
457 #### policies.json
458 ```
459 {
460 "policies": {
461 "BlockAboutSupport": true | false
462 }
463 }
464 ```
465 ### Bookmarks
466
467 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
468
469 **Compatibility:** Firefox 60, Firefox ESR 60\
470 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
471 **Preferences Affected:** N/A
472
473 #### Windows (GPO)
474 ```
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
479 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
485 ```
486 Value (string):
487 ```
488 <enabled/>
489 <data id="BookmarkTitle" value="Example"/>
490 <data id="BookmarkURL" value="https://example.com"/>
491 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
492 <data id="BookmarkPlacement" value="toolbar | menu"/>
493 <data id="BookmarkFolder" value="FolderName"/>
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>Bookmarks</key>
499 <array>
500 <dict>
501 <key>Title</key>
502 <string>Example</string>
503 <key>URL</key>
504 <string>https://example.com</string>
505 <key>Favicon</key>
506 <string>https://example.com/favicon.ico</string>
507 <key>Placement</key>
508 <string>toolbar | menu</string>
509 <key>Folder</key>
510 <string>FolderName</string>
511 </dict>
512 </array>
513 </dict>
514 ```
515 #### policies.json
516 ```
517 {
518 "policies": {
519 "Bookmarks": [
520 {
521 "Title": "Example",
522 "URL": "https://example.com",
523 "Favicon": "https://example.com/favicon.ico",
524 "Placement": "toolbar" | "menu",
525 "Folder": "FolderName"
526 }
527 ]
528 }
529 }
530 ```
531 ### CaptivePortal
532 Enable or disable the detection of captive portals.
533
534 **Compatibility:** Firefox 67, Firefox ESR 60.7\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `network.captive-portal-service.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>CaptivePortal</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "CaptivePortal": true | false
563 }
564 }
565 ```
566 ### Certificates
567
568 ### Certificates | ImportEnterpriseRoots
569
570 Trust certificates that have been added to the operating system certificate store by a user or administrator.
571
572 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
573
574 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
575
576 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
577 **CCK2 Equivalent:** N/A\
578 **Preferences Affected:** `security.enterprise_roots.enabled`
579
580 #### Windows (GPO)
581 ```
582 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
583 ```
584 #### Windows (Intune)
585 OMA-URI:
586 ```
587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
588 ```
589 Value (string):
590 ```
591 <enabled/> or <disabled/>
592 ```
593 #### macOS
594 ```
595 <dict>
596 <key>Certificates</key>
597 <dict>
598 <key>ImportEnterpriseRoots</key>
599 <true/> | <false/>
600 </dict>
601 </dict>
602 ```
603 #### policies.json
604 ```
605 {
606 "policies": {
607 "Certificates": {
608 "ImportEnterpriseRoots": true | false
609 }
610 }
611 }
612 ```
613 ### Certificates | Install
614
615 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
616
617 - Windows
618 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
619 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
620 - macOS
621 - /Library/Application Support/Mozilla/Certificates
622 - ~/Library/Application Support/Mozilla/Certificates
623 - Linux
624 - /usr/lib/mozilla/certificates
625 - /usr/lib64/mozilla/certificates
626 - ~/.mozilla/certificates
627
628 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
629
630 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
631
632 Certificates are installed using the trust string `CT,CT,`.
633
634 Binary (DER) and ASCII (PEM) certificates are both supported.
635
636 **Compatibility:** Firefox 64, Firefox ESR 64\
637 **CCK2 Equivalent:** `certs.ca`\
638 **Preferences Affected:** N/A
639
640 #### Windows (GPO)
641 ```
642 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
643 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
644 ```
645 #### Windows (Intune)
646 OMA-URI:
647 ```
648 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
649 ```
650 Value (string):
651 ```
652 <enabled/>
653 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
654 ```
655 #### macOS
656 ```
657 <dict>
658 <key>Certificates</key>
659 <dict>
660 <key>Install</key>
661 <array>
662 <string>cert1.der</string>
663 <string>/Users/username/cert2.pem</string>
664 </array>
665 </dict>
666 </dict>
667 ```
668 #### policies.json
669 ```
670 {
671 "policies": {
672 "Certificates": {
673 "Install": ["cert1.der", "/home/username/cert2.pem"]
674 }
675 }
676 }
677 ```
678 ### Cookies
679 Configure cookie preferences.
680
681 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
682
683 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
684
685 `Default` determines whether cookies are accepted at all.
686
687 `AcceptThirdParty` determines how third-party cookies are handled.
688
689 `ExpireAtSessionEnd` determines when cookies expire.
690
691 `RejectTracker` only rejects cookies for trackers.
692
693 `Locked` prevents the user from changing cookie preferences.
694
695 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
696 **CCK2 Equivalent:** N/A\
697 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
698
699 #### Windows (GPO)
700 ```
701 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
702 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
703 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
705 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
706 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
707 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
708 ```
709 #### Windows (Intune)
710 OMA-URI:
711 ```
712 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
713 ```
714 Value (string):
715 ```
716 <enabled/>
717 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
718 ```
719 OMA-URI:
720 ```
721 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
722 ```
723 Value (string):
724 ```
725 <enabled/>
726 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
727 ```
728 OMA-URI:
729 ```
730 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
731 ```
732 Value (string):
733 ```
734 <enabled/> or <disabled/>
735 ```
736 OMA-URI:
737 ```
738 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
739 ```
740 Value (string):
741 ```
742 <enabled/>
743 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
744 ```
745 OMA-URI:
746 ```
747 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
748 ```
749 Value (string):
750 ```
751 <enabled/> or <disabled/>
752 ```
753 OMA-URI:
754 ```
755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
756 ```
757 Value (string):
758 ```
759 <enabled/> or <disabled/>
760 ```
761 OMA-URI:
762 ```
763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
764 ```
765 Value (string):
766 ```
767 <enabled/> or <disabled/>
768 ```
769 #### macOS
770 ```
771 <dict>
772 <key>Cookies</key>
773 <dict>
774 <key>Allow</key>
775 <array>
776 <string>http://example.com</string>
777 </array>
778 <key>Block</key>
779 <array>
780 <string>http://example.org</string>
781 </array>
782 <key>Default</key>
783 <true/> | <false/>
784 <key>AcceptThirdParty</key>
785 <string>always | never | from-visited</string>
786 <key>ExpireAtSessionEnd</key>
787 <true/> | <false/>
788 <key>RejectTracker</key>
789 <true/> | <false/>
790 <key>Locked</key>
791 <true/> | <false/>
792 </dict>
793 </dict>
794 ```
795 #### policies.json
796 ```
797 {
798 "policies": {
799 "Cookies": {
800 "Allow": ["http://example.org/"],
801 "Block": ["http://example.edu/"],
802 "Default": true | false,
803 "AcceptThirdParty": "always" | "never" | "from-visited",
804 "ExpireAtSessionEnd": true | false,
805 "RejectTracker": true | false,
806 "Locked": true | false
807 }
808 }
809 }
810 ```
811 ### DisableSetDesktopBackground
812 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
813
814 **Compatibility:** Firefox 60, Firefox ESR 60\
815 **CCK2 Equivalent:** `removeSetDesktopBackground`\
816 **Preferences Affected:** N/A
817
818 #### Windows (GPO)
819 ```
820 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
821 ```
822 #### Windows (Intune)
823 OMA-URI:
824 ```
825 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
826 ```
827 Value (string):
828 ```
829 <enabled/> or <disabled/>
830 ```
831 #### macOS
832 ```
833 <dict>
834 <key>DisableSetDesktopBackground</key>
835 <true/> | <false/>
836 </dict>
837 ```
838 #### policies.json
839 ```
840 {
841 "policies": {
842 "DisableSetDesktopBackground": true | false
843 }
844 }
845 ```
846 ### DisableMasterPasswordCreation
847 Remove the master password functionality.
848
849 **Compatibility:** Firefox 60, Firefox ESR 60\
850 **CCK2 Equivalent:** `noMasterPassword`\
851 **Preferences Affected:** N/A
852
853 #### Windows (GPO)
854 ```
855 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
856 ```
857 #### Windows (Intune)
858 OMA-URI:
859 ```
860 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
861 ```
862 Value (string):
863 ```
864 <enabled/> or <disabled/>
865 ```
866 #### macOS
867 ```
868 <dict>
869 <key>DisableMasterPasswordCreation</key>
870 <true/> | <false/>
871 </dict>
872 ```
873 #### policies.json
874 ```
875 {
876 "policies": {
877 "DisableMasterPasswordCreation": true | false
878 }
879 }
880 ```
881 ### DisableAppUpdate
882 Turn off application updates.
883
884 **Compatibility:** Firefox 60, Firefox ESR 60\
885 **CCK2 Equivalent:** `disableFirefoxUpdates`\
886 **Preferences Affected:** N/A
887
888 #### Windows (GPO)
889 ```
890 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
891 ```
892 #### Windows (Intune)
893 OMA-URI:
894 ```
895 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
896 ```
897 Value (string):
898 ```
899 <enabled/> or <disabled/>
900 ```
901 #### macOS
902 ```
903 <dict>
904 <key>DisableAppUpdate</key>
905 <true/> | <false/>
906 </dict>
907 ```
908 #### policies.json
909 ```
910 {
911 "policies": {
912 "DisableAppUpdate": true | false
913 }
914 }
915 ```
916 ### DisableBuiltinPDFViewer
917 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
918
919 **Compatibility:** Firefox 60, Firefox ESR 60\
920 **CCK2 Equivalent:** `disablePDFjs`\
921 **Preferences Affected:** `pdfjs.disabled`
922
923 #### Windows (GPO)
924 ```
925 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
926 ```
927 #### Windows (Intune)
928 OMA-URI:
929 ```
930 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
931 ```
932 Value (string):
933 ```
934 <enabled/> or <disabled/>
935 ```
936 #### macOS
937 ```
938 <dict>
939 <key>DisableBuiltinPDFViewer</key>
940 <true/> | <false/>
941 </dict>
942 ```
943 #### policies.json
944 ```
945 {
946 "policies": {
947 "DisableBuiltinPDFViewer": true | false
948 }
949 }
950 ```
951 ### DisabledCiphers
952 Disable specific cryptographic ciphers.
953
954 ---
955 **Note:**
956
957 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
958
959 ---
960 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
961 **CCK2 Equivalent:** N/A\
962 **Preferences Affected:** N/A
963
964 #### Windows (GPO)
965 ```
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
975 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
976 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
977 ```
978 #### Windows (Intune)
979 OMA-URI:
980 ```
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
991 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
992 ```
993 Value (string):
994 ```
995 <enabled/> or <disabled/>
996 ```
997 #### macOS
998 ```
999 <dict>
1000 <key>DisabledCiphers</key>
1001 <dict>
1002 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1005 <true/> | <false/>
1006 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1007 <true/> | <false/>
1008 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1009 <true/> | <false/>
1010 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1011 <true/> | <false/>
1012 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1013 <true/> | <false/>
1014 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1015 <true/> | <false/>
1016 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1017 <true/> | <false/>
1018 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1019 <true/> | <false/>
1020 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1021 <true/> | <false/>
1022 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1023 <true/> | <false/>
1024 </dict>
1025 </dict>
1026 ```
1027 #### policies.json
1028 ```
1029 {
1030 "policies": {
1031 "DisabledCiphers" {
1032 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1033 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1035 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1036 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1037 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1038 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1039 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1040 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1041 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1042 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1043 }
1044 }
1045 }
1046 ```
1047 ### DisableDefaultBrowserAgent
1048 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1049
1050 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1051 **CCK2 Equivalent:** N/A\
1052 **Preferences Affected:** N/A
1053
1054 #### Windows (GPO)
1055 ```
1056 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1057 ```
1058 #### Windows (Intune)
1059 OMA-URI:
1060 ```
1061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1062 ```
1063 Value (string):
1064 ```
1065 <enabled/> or <disabled/>
1066 ```
1067 #### policies.json
1068 ```
1069 {
1070 "policies": {
1071 "DisableDefaultBrowserAgent": true | false
1072 }
1073 }
1074 ```
1075 ### DisableDeveloperTools
1076 Remove access to all developer tools.
1077
1078 **Compatibility:** Firefox 60, Firefox ESR 60\
1079 **CCK2 Equivalent:** `removeDeveloperTools`\
1080 **Preferences Affected:** `devtools.policy.disabled`
1081
1082 #### Windows (GPO)
1083 ```
1084 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1085 ```
1086 #### Windows (Intune)
1087 OMA-URI:
1088 ```
1089 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1090 ```
1091 Value (string):
1092 ```
1093 <enabled/> or <disabled/>
1094 ```
1095 #### macOS
1096 ```
1097 <dict>
1098 <key>DisableDeveloperTools</key>
1099 <true/> | <false/>
1100 </dict>
1101 ```
1102 #### policies.json
1103 ```
1104 {
1105 "policies": {
1106 "DisableDeveloperTools": true | false
1107 }
1108 }
1109 ```
1110 ### DisableFeedbackCommands
1111 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1112
1113 **Compatibility:** Firefox 60, Firefox ESR 60\
1114 **CCK2 Equivalent:** N/A\
1115 **Preferences Affected:** N/A
1116
1117 #### Windows (GPO)
1118 ```
1119 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1120 ```
1121 #### Windows (Intune)
1122 OMA-URI:
1123 ```
1124 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1125 ```
1126 Value (string):
1127 ```
1128 <enabled/> or <disabled/>
1129 ```
1130 #### macOS
1131 ```
1132 <dict>
1133 <key>DisableFeedbackCommands</key>
1134 <true/> | <false/>
1135 </dict>
1136 ```
1137 #### policies.json
1138 ```
1139 {
1140 "policies": {
1141 "DisableFeedbackCommands": true | false
1142 }
1143 }
1144 ```
1145 ### DisableFirefoxScreenshots
1146 Remove access to Firefox Screenshots.
1147
1148 **Compatibility:** Firefox 60, Firefox ESR 60\
1149 **CCK2 Equivalent:** N/A\
1150 **Preferences Affected:** `extensions.screenshots.disabled`
1151
1152 #### Windows (GPO)
1153 ```
1154 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1155 ```
1156 #### Windows (Intune)
1157 OMA-URI:
1158 ```
1159 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1160 ```
1161 Value (string):
1162 ```
1163 <enabled/> or <disabled/>
1164 ```
1165 #### macOS
1166 ```
1167 <dict>
1168 <key>DisableFirefoxScreenshots</key>
1169 <true/> | <false/>
1170 </dict>
1171 ```
1172 #### policies.json
1173 ```
1174 {
1175 "policies": {
1176 "DisableFirefoxScreenshots": true | false
1177 }
1178 }
1179 ```
1180 ### DisableFirefoxAccounts
1181 Disable Firefox Accounts integration (Sync).
1182
1183 **Compatibility:** Firefox 60, Firefox ESR 60\
1184 **CCK2 Equivalent:** `disableSync`\
1185 **Preferences Affected:** `identity.fxaccounts.enabled`
1186
1187 #### Windows (GPO)
1188 ```
1189 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1190 ```
1191 #### Windows (Intune)
1192 OMA-URI:
1193 ```
1194 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1195 ```
1196 Value (string):
1197 ```
1198 <enabled/> or <disabled/>
1199 ```
1200 #### macOS
1201 ```
1202 <dict>
1203 <key>DisableFirefoxAccounts</key>
1204 <true/> | <false/>
1205 </dict>
1206 ```
1207 #### policies.json
1208 ```
1209 {
1210 "policies": {
1211 "DisableFirefoxAccounts": true | false
1212 }
1213 }
1214 ```
1215 ### DisableFirefoxStudies
1216 Disable Firefox studies (Shield).
1217
1218 **Compatibility:** Firefox 60, Firefox ESR 60\
1219 **CCK2 Equivalent:** N/A\
1220 **Preferences Affected:** N/A
1221
1222 #### Windows (GPO)
1223 ```
1224 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1225 ```
1226 #### Windows (Intune)
1227 OMA-URI:
1228 ```
1229 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1230 ```
1231 Value (string):
1232 ```
1233 <enabled/> or <disabled/>
1234 ```
1235 #### macOS
1236 ```
1237 <dict>
1238 <key>DisableFirefoxStudies</key>
1239 <true/> | <false/>
1240 </dict>
1241 ```
1242 #### policies.json
1243 ```
1244 {
1245 "policies": {
1246 "DisableFirefoxStudies": true | false
1247 }
1248 }
1249 ```
1250 ### DisableForgetButton
1251 Disable the "Forget" button.
1252
1253 **Compatibility:** Firefox 60, Firefox ESR 60\
1254 **CCK2 Equivalent:** `disableForget`\
1255 **Preferences Affected:** N/A
1256
1257 #### Windows (GPO)
1258 ```
1259 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1260 ```
1261 #### Windows (Intune)
1262 OMA-URI:
1263 ```
1264 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1265 ```
1266 Value (string):
1267 ```
1268 <enabled/> or <disabled/>
1269 ```
1270 #### macOS
1271 ```
1272 <dict>
1273 <key>DisableForgetButton</key>
1274 <true/> | <false/>
1275 </dict>
1276 ```
1277 #### policies.json
1278 ```
1279 {
1280 "policies": {
1281 "DisableForgetButton": true | false
1282 }
1283 }
1284 ```
1285 ### DisableFormHistory
1286 Turn off saving information on web forms and the search bar.
1287
1288 **Compatibility:** Firefox 60, Firefox ESR 60\
1289 **CCK2 Equivalent:** `disableFormFill`\
1290 **Preferences Affected:** ` browser.formfill.enable`
1291
1292 #### Windows (GPO)
1293 ```
1294 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1295 ```
1296 #### Windows (Intune)
1297 OMA-URI:
1298 ```
1299 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1300 ```
1301 Value (string):
1302 ```
1303 <enabled/> or <disabled/>
1304 ```
1305 #### macOS
1306 ```
1307 <dict>
1308 <key>DisableFormHistory</key>
1309 <true/> | <false/>
1310 </dict>
1311 ```
1312 #### policies.json
1313 ```
1314 {
1315 "policies": {
1316 "DisableFormHistory": true | false
1317 }
1318 }
1319 ```
1320 ### DisablePasswordReveal
1321 Do not allow passwords to be shown in saved logins
1322
1323 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1324 **CCK2 Equivalent:** N/A
1325 **Preferences Affected:** N/A
1326
1327 #### Windows (GPO)
1328 ```
1329 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1330 ```
1331 #### Windows (Intune)
1332 OMA-URI:
1333 ```
1334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1335 ```
1336 Value (string):
1337 ```
1338 <enabled/> or <disabled/>
1339 ```
1340 #### macOS
1341 ```
1342 <dict>
1343 <key>DisablePasswordReveal</key>
1344 <true/> | <false/>
1345 </dict>
1346 ```
1347 #### policies.json
1348 ```
1349 {
1350 "policies": {
1351 "DisablePasswordReveal": true | false
1352 }
1353 }
1354 ```
1355 ### DisablePocket
1356 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1357
1358 **Compatibility:** Firefox 60, Firefox ESR 60\
1359 **CCK2 Equivalent:** `disablePocket`\
1360 **Preferences Affected:** `extensions.pocket.enabled`
1361
1362 #### Windows (GPO)
1363 ```
1364 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1365 ```
1366 #### Windows (Intune)
1367 OMA-URI:
1368 ```
1369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1370 ```
1371 Value (string):
1372 ```
1373 <enabled/> or <disabled/>
1374 ```
1375 #### macOS
1376 ```
1377 <dict>
1378 <key>DisablePocket</key>
1379 <true/> | <false/>
1380 </dict>
1381 ```
1382 #### policies.json
1383 ```
1384 {
1385 "policies": {
1386 "DisablePocket": true | false
1387 }
1388 }
1389 ```
1390 ### DisablePrivateBrowsing
1391 Remove access to private browsing.
1392
1393 **Compatibility:** Firefox 60, Firefox ESR 60\
1394 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1395 **Preferences Affected:** N/A
1396
1397 #### Windows (GPO)
1398 ```
1399 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1400 ```
1401 #### Windows (Intune)
1402 OMA-URI:
1403 ```
1404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1405 ```
1406 Value (string):
1407 ```
1408 <enabled/> or <disabled/>
1409 ```
1410 #### macOS
1411 ```
1412 <dict>
1413 <key>DisablePrivateBrowsing</key>
1414 <true/> | <false/>
1415 </dict>
1416 ```
1417 #### policies.json
1418 ```
1419 {
1420 "policies": {
1421 "DisablePrivateBrowsing": true | false
1422 }
1423 }
1424 ```
1425 ### DisableProfileImport
1426 Disables the "Import data from another browser" option in the bookmarks window.
1427
1428 **Compatibility:** Firefox 60, Firefox ESR 60\
1429 **CCK2 Equivalent:** N/A\
1430 **Preferences Affected:** N/A
1431
1432 #### Windows (GPO)
1433 ```
1434 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1435 ```
1436 #### Windows (Intune)
1437 OMA-URI:
1438 ```
1439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1440 ```
1441 Value (string):
1442 ```
1443 <enabled/> or <disabled/>
1444 ```
1445 #### macOS
1446 ```
1447 <dict>
1448 <key>DisableProfileImport</key>
1449 <true/> | <false/>
1450 </dict>
1451 ```
1452 #### policies.json
1453 ```
1454 {
1455 "policies": {
1456 "DisableProfileImport": true | false
1457 }
1458 }
1459 ```
1460 ### DisableProfileRefresh
1461 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1462
1463 **Compatibility:** Firefox 60, Firefox ESR 60\
1464 **CCK2 Equivalent:** `disableResetFirefox`\
1465 **Preferences Affected:** `browser.disableResetPrompt`
1466
1467 #### Windows (GPO)
1468 ```
1469 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1470 ```
1471 #### Windows (Intune)
1472 OMA-URI:
1473 ```
1474 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1475 ```
1476 Value (string):
1477 ```
1478 <enabled/> or <disabled/>
1479 ```
1480 #### macOS
1481 ```
1482 <dict>
1483 <key>DisableProfileRefresh</key>
1484 <true/> | <false/>
1485 </dict>
1486 ```
1487 #### policies.json
1488 ```
1489 {
1490 "policies": {
1491 "DisableProfileRefresh": true | false
1492 }
1493 }
1494 ```
1495 ### DisableSafeMode
1496 Disable safe mode within the browser.
1497
1498 On Windows, this disables safe mode via the command line as well.
1499
1500 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1501 **CCK2 Equivalent:** `disableSafeMode`\
1502 **Preferences Affected:** N/A
1503
1504 #### Windows (GPO)
1505 ```
1506 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1507 ```
1508 #### Windows (Intune)
1509 OMA-URI:
1510 ```
1511 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1512 ```
1513 Value (string):
1514 ```
1515 <enabled/> or <disabled/>
1516 ```
1517 #### macOS
1518 ```
1519 <dict>
1520 <key>DisableSafeMode</key>
1521 <true/> | <false/>
1522 </dict>
1523 ```
1524 #### policies.json
1525 ```
1526 {
1527 "policies": {
1528 "DisableSafeMode": true | false
1529 }
1530 }
1531 ```
1532 ### DisableSecurityBypass
1533 Prevent the user from bypassing security in certain cases.
1534
1535 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1536
1537 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1538
1539 **Compatibility:** Firefox 60, Firefox ESR 60\
1540 **CCK2 Equivalent:** N/A\
1541 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1542
1543 #### Windows (GPO)
1544 ```
1545 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1546 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1547 ```
1548 #### Windows (Intune)
1549 OMA-URI:
1550 ```
1551 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1552 ```
1553 Value (string):
1554 ```
1555 <enabled/> or <disabled/>
1556 ```
1557 OMA-URI:
1558 ```
1559 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1560 ```
1561 Value (string):
1562 ```
1563 <enabled/> or <disabled/>
1564 ```
1565
1566 #### macOS
1567 ```
1568 <dict>
1569 <key>DisableSecurityBypass</key>
1570 <dict>
1571 <key>InvalidCertificate</key>
1572 <true/> | <false/>
1573 <key><SafeBrowsing/key>
1574 <true/> | <false/>
1575 </dict>
1576 </dict>
1577 ```
1578 #### policies.json
1579 ```
1580 {
1581 "policies": {
1582 "DisableSecurityBypass": {
1583 "InvalidCertificate": true | false,
1584 "SafeBrowsing": true | false
1585 }
1586 }
1587 }
1588 ```
1589 ### DisableSystemAddonUpdate
1590 Prevent system add-ons from being installed or update.
1591
1592 **Compatibility:** Firefox 60, Firefox ESR 60\
1593 **CCK2 Equivalent:** N/A\
1594 **Preferences Affected:** N/A
1595
1596 #### Windows (GPO)
1597 ```
1598 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1599 ```
1600 #### Windows (Intune)
1601 OMA-URI:
1602 ```
1603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1604 ```
1605 Value (string):
1606 ```
1607 <enabled/> or <disabled/>
1608 ```
1609 #### macOS
1610 ```
1611 <dict>
1612 <key>DisableSystemAddonUpdate</key>
1613 <true/> | <false/>
1614 </dict>
1615 ```
1616 #### policies.json
1617 ```
1618 {
1619 "policies": {
1620 "DisableSystemAddonUpdate": true | false
1621 }
1622 }
1623 ```
1624 ### DisableTelemetry
1625 Prevent the upload of telemetry data.
1626
1627 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1628
1629 **Compatibility:** Firefox 60, Firefox ESR 60\
1630 **CCK2 Equivalent:** `disableTelemetry`\
1631 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1632
1633 #### Windows (GPO)
1634 ```
1635 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1636 ```
1637 #### Windows (Intune)
1638 OMA-URI:
1639 ```
1640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1641 ```
1642 Value (string):
1643 ```
1644 <enabled/> or <disabled/>
1645 ```
1646 #### macOS
1647 ```
1648 <dict>
1649 <key>DisableTelemetry</key>
1650 <true/> | <false/>
1651 </dict>
1652 ```
1653 #### policies.json
1654 ```
1655 {
1656 "policies": {
1657 "DisableTelemetry": true | false
1658 }
1659 }
1660 ```
1661 ### DisplayBookmarksToolbar
1662 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1663
1664 **Compatibility:** Firefox 60, Firefox ESR 60\
1665 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1666 **Preferences Affected:** N/A
1667
1668 #### Windows (GPO)
1669 ```
1670 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1671 ```
1672 #### Windows (Intune)
1673 OMA-URI:
1674 ```
1675 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1676 ```
1677 Value (string):
1678 ```
1679 <enabled/> or <disabled/>
1680 ```
1681 #### macOS
1682 ```
1683 <dict>
1684 <key>DisplayBookmarksToolbar</key>
1685 <true/> | <false/>
1686 </dict>
1687 ```
1688 #### policies.json
1689 ```
1690 {
1691 "policies": {
1692 "DisplayBookmarksToolbar": true | false
1693 }
1694 }
1695 ```
1696 ### DisplayMenuBar (Deprecated)
1697 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1698
1699 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1700 **CCK2 Equivalent:** `displayMenuBar`\
1701 **Preferences Affected:** N/A
1702
1703 #### Windows (GPO)
1704 ```
1705 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1706 ```
1707 #### macOS
1708 ```
1709 <dict>
1710 <key>DisplayMenuBar</key>
1711 <true/> | <false/>
1712 </dict>
1713 ```
1714 #### policies.json
1715 ```
1716 {
1717 "policies": {
1718 "DisplayMenuBar": true | false
1719 }
1720 }
1721 ```
1722 ### DisplayMenuBar
1723 Set the state of the menubar.
1724
1725 `always` means the menubar is shown and cannot be hidden.
1726
1727 `never` means the menubar is hidden and cannot be shown.
1728
1729 `default-on` means the menubar is on by default but can be hidden.
1730
1731 `default-off` means the menubar is off by default but can be shown.
1732
1733 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1734 **CCK2 Equivalent:** `displayMenuBar`\
1735 **Preferences Affected:** N/A
1736
1737 #### Windows (GPO)
1738 ```
1739 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1740 ```
1741 #### Windows (Intune)
1742 OMA-URI:
1743 ```
1744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1745 ```
1746 Value (string):
1747 ```
1748 <enabled/>
1749 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1750 ```
1751 #### macOS
1752 ```
1753 <dict>
1754 <key>DisplayMenuBar</key>
1755 <string>always | never | default-on | default-off</string>
1756 </dict>
1757 ```
1758 #### policies.json
1759 ```
1760 {
1761 "policies": {
1762 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1763 }
1764 }
1765 ```
1766 ### DNSOverHTTPS
1767 Configure DNS over HTTPS.
1768
1769 `Enabled` determines whether DNS over HTTPS is enabled
1770
1771 `ProviderURL` is a URL to another provider.
1772
1773 `Locked` prevents the user from changing DNS over HTTPS preferences.
1774
1775 `ExcludedDomains` excludes domains from DNS over HTTPS.
1776
1777 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1778 **CCK2 Equivalent:** N/A\
1779 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1780
1781 #### Windows (GPO)
1782 ```
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1785 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1786 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1787 ```
1788 #### Windows (Intune)
1789 OMA-URI:
1790 ```
1791 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1792 ```
1793 Value (string):
1794 ```
1795 <enabled/> or <disabled/>
1796 ```
1797 OMA-URI:
1798 ```
1799 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1800 ```
1801 Value (string):
1802 ```
1803 <enabled/>
1804 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1805 ```
1806 OMA-URI:
1807 ```
1808 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1809 ```
1810 Value (string):
1811 ```
1812 <enabled/> or <disabled/>
1813 ```
1814 OMA-URI:
1815 ```
1816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1817 ```
1818 Value (string):
1819 ```
1820 <enabled/>
1821 <data id="List" value="1&#xF000;example.com"/>
1822 ```
1823 #### macOS
1824 ```
1825 <dict>
1826 <key>DNSOverHTTPS</key>
1827 <dict>
1828 <key>Enabled</key>
1829 <true/> | <false/>
1830 <key>ProviderURL</key>
1831 <string>URL_TO_ALTERNATE_PROVIDER</string>
1832 <key>Locked</key>
1833 <true/> | <false/>
1834 <key>ExcludedDomains</key>
1835 <array>
1836 <string>example.com</string>
1837 </array>
1838 </dict>
1839 </dict>
1840 ```
1841 #### policies.json
1842 ```
1843 {
1844 "policies": {
1845 "DNSOverHTTPS": {
1846 "Enabled": true | false,
1847 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1848 "Locked": true | false,
1849 "ExcludedDomains": ["example.com"]
1850 }
1851 }
1852 }
1853 ```
1854 ### DontCheckDefaultBrowser
1855 Don't check if Firefox is the default browser at startup.
1856
1857 **Compatibility:** Firefox 60, Firefox ESR 60\
1858 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1859 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1860
1861 #### Windows (GPO)
1862 ```
1863 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1864 ```
1865 #### Windows (Intune)
1866 OMA-URI:
1867 ```
1868 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1869 ```
1870 Value (string):
1871 ```
1872 <enabled/> or <disabled/>
1873 ```
1874 #### macOS
1875 ```
1876 <dict>
1877 <key>DontCheckDefaultBrowser</key>
1878 <true/> | <false/>
1879 </dict>
1880 ```
1881 #### policies.json
1882 ```
1883 {
1884 "policies": {
1885 "DontCheckDefaultBrowser": true | false
1886 }
1887 }
1888 ```
1889 ### DefaultDownloadDirectory
1890 Set the default download directory.
1891
1892 You can use ${home} for the native home directory.
1893
1894 **Compatibility:** Firefox 68, Firefox ESR 68\
1895 **CCK2 Equivalent:** N/A\
1896 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1897
1898 #### Windows (GPO)
1899 ```
1900 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1901 ```
1902 #### Windows (Intune)
1903 OMA-URI:
1904 ```
1905 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1906 ```
1907 Value (string):
1908 ```
1909 <enabled/>
1910 <data id="Preferences_String" value="${home}\Downloads"/>
1911 ```
1912 #### macOS
1913 ```
1914 <dict>
1915 <key>DefaultDownloadDirectory</key>
1916 <string>${home}/Downloads</string>
1917 </dict>
1918 ```
1919 #### policies.json (macOS and Linux)
1920 ```
1921 {
1922 "policies": {
1923 "DefaultDownloadDirectory": "${home}/Downloads"
1924 }
1925 ```
1926 #### policies.json (Windows)
1927 ```
1928 {
1929 "policies": {
1930 "DefaultDownloadDirectory": "${home}\\Downloads"
1931 }
1932 ```
1933 ### DownloadDirectory
1934 Set and lock the download directory.
1935
1936 You can use ${home} for the native home directory.
1937
1938 **Compatibility:** Firefox 68, Firefox ESR 68\
1939 **CCK2 Equivalent:** N/A\
1940 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1941
1942 #### Windows (GPO)
1943 ```
1944 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1945 ```
1946 #### Windows (Intune)
1947 OMA-URI:
1948 ```
1949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1950 ```
1951 Value (string):
1952 ```
1953 <enabled/>
1954 <data id="Preferences_String" value="${home}\Downloads"/>
1955 ```
1956 #### macOS
1957 ```
1958 <dict>
1959 <key>DownloadDirectory</key>
1960 <string>${home}/Downloads</string>
1961 </dict>
1962 ```
1963 #### policies.json (macOS and Linux)
1964 ```
1965 {
1966 "policies": {
1967 "DownloadDirectory": "${home}/Downloads"
1968 }
1969 ```
1970 #### policies.json (Windows)
1971 ```
1972 {
1973 "policies": {
1974 "DownloadDirectory": "${home}\\Downloads"
1975 }
1976 ```
1977 ### EnableTrackingProtection
1978 Configure tracking protection.
1979
1980 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1981
1982 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1983
1984 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1985
1986 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1987
1988 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1989
1990 `Exceptions` are origins for which tracking protection is not enabled.
1991
1992 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1993 **CCK2 Equivalent:** N/A\
1994 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1995
1996 #### Windows (GPO)
1997 ```
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2001 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2002 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2003 ```
2004 #### Windows (Intune)
2005 OMA-URI:
2006 ```
2007 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2008 ```
2009 Value (string):
2010 ```
2011 <enabled/>
2012 <data id="TrackingProtectionLocked" value="true | false"/>
2013 <data id="Cryptomining" value="true | false"/>
2014 <data id="Fingerprinting" value="true | false"/>
2015 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2016 ```
2017 #### macOS
2018 ```
2019 <dict>
2020 <key>EnableTrackingProtection</key>
2021 <dict>
2022 <key>Value</key>
2023 <true/> | <false/>
2024 <key><Locked</key>
2025 <true/> | <false/>
2026 <key><Cryptomining</key>
2027 <true/> | <false/>
2028 <key><Fingerprinting</key>
2029 <true/> | <false/>
2030 <key>Exceptions</key>
2031 <array>
2032 <string>https://example.com</string>
2033 </array>
2034 </dict>
2035 </dict>
2036 ```
2037 #### policies.json
2038 ```
2039 {
2040 "policies": {
2041 "EnableTrackingProtection": {
2042 "Value": true | false,
2043 "Locked": true | false,
2044 "Cryptomining": true | false,
2045 "Fingerprinting": true | false,
2046 "Exceptions": ["https://example.com"]
2047 }
2048 }
2049 ```
2050 ### EncryptedMediaExtensions
2051 Enable or disable Encrypted Media Extensions and optionally lock it.
2052
2053 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2054
2055 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2056
2057 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2058 **CCK2 Equivalent:** N/A\
2059 **Preferences Affected:** `media.eme.enabled`
2060
2061 #### Windows (GPO)
2062 ```
2063 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2064 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2065 ```
2066 #### Windows (Intune)
2067 OMA-URI:
2068 ```
2069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2071 ```
2072 Value (string):
2073 ```
2074 <enabled/>or <disabled/>
2075 ```
2076 #### macOS
2077 ```
2078 <dict>
2079 <key>EncryptedMediaExtensions</key>
2080 <dict>
2081 <key>Enabled</key>
2082 <true/> | <false/>
2083 <key><Locked</key>
2084 <true/> | <false/>
2085 </dict>
2086 </dict>
2087 ```
2088 #### policies.json
2089 ```
2090 {
2091 "policies": {
2092 "EncryptedMediaExtensions": {
2093 "Enabled": true | false,
2094 "Locked": true | false
2095 }
2096 }
2097 ```
2098 ### EnterprisePoliciesEnabled
2099 Enable policy support on macOS.
2100
2101 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2102 **CCK2 Equivalent:** N/A\
2103 **Preferences Affected:** N/A
2104
2105 #### macOS
2106 ```
2107 <dict>
2108 <key>EnterprisePoliciesEnabled</key>
2109 <true/>
2110 </dict>
2111 ```
2112 ### Extensions
2113 Control the installation, uninstallation and locking of extensions.
2114
2115 `Install` is a list of URLs or native paths for extensions to be installed.
2116
2117 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2118
2119 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2120
2121 **Compatibility:** Firefox 60, Firefox ESR 60\
2122 **CCK2 Equivalent:** `addons`\
2123 **Preferences Affected:** N/A
2124
2125 #### Windows (GPO)
2126 ```
2127 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2128 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2129 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2130 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2131 ```
2132 #### Windows (Intune)
2133 OMA-URI:
2134 ```
2135 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2136 ```
2137 Value (string):
2138 ```
2139 <enabled/>
2140 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2141 ```
2142 OMA-URI:
2143 ```
2144 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2145 ```
2146 Value (string):
2147 ```
2148 <enabled/>
2149 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2150 ```
2151 OMA-URI:
2152 ```
2153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2154 ```
2155 Value (string):
2156 ```
2157 <enabled/>
2158 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2159 ```
2160 #### macOS
2161 ```
2162 <dict>
2163 <key>Extensions</key>
2164 <dict>
2165 <key>Install</key>
2166 <array>
2167 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2168 <string>//path/to/xpi</string>
2169 </array>
2170 <key>Uninstall</key>
2171 <array>
2172 <string>bad_addon_id@mozilla.org</string>
2173 </array>
2174 <key>Locked</key>
2175 <array>
2176 <string>addon_id@mozilla.org</string>
2177 </array>
2178 </dict>
2179 </dict>
2180 ```
2181 #### policies.json
2182 ```
2183 {
2184 "policies": {
2185 "Extensions": {
2186 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2187 "Uninstall": ["bad_addon_id@mozilla.org"],
2188 "Locked": ["addon_id@mozilla.org"]
2189 }
2190 }
2191 }
2192 ```
2193 ### ExtensionSettings
2194 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2195
2196 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2197
2198 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2199
2200 The configuration for each extension is another dictionary that can contain the fields documented below.
2201
2202 | Name | Description |
2203 | --- | --- |
2204 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2205 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2206 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2207 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2208 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2209 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2210 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2211 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2212 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2213 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2214
2215 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2216 **CCK2 Equivalent:** N/A\
2217 **Preferences Affected:** N/A
2218
2219 #### Windows (GPO)
2220 ```
2221 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2222 {
2223 "*": {
2224 "blocked_install_message": "Custom error message.",
2225 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2226 "installation_mode": "blocked",
2227 "allowed_types": ["extension"]
2228 },
2229 "uBlock0@raymondhill.net": {
2230 "installation_mode": "force_installed",
2231 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2232 },
2233 "https-everywhere@eff.org": {
2234 "installation_mode": "allowed",
2235 }
2236 }
2237 ```
2238 #### Windows (Intune)
2239 OMA-URI:
2240 ```
2241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2242 ```
2243 Value (string):
2244 ```
2245 <enabled/>
2246 <data id="ExtensionSettings" value='
2247 "*": {
2248 "blocked_install_message": "Custom error message.",
2249 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2250 "installation_mode": "blocked",
2251 "allowed_types": ["extension"]
2252 },
2253 "uBlock0@raymondhill.net": {
2254 "installation_mode": "force_installed",
2255 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2256 },
2257 "https-everywhere@eff.org": {
2258 "installation_mode": "allowed",
2259 }'/>
2260 ```
2261 #### macOS
2262 ```
2263 <dict>
2264 <key>ExtensionSettings</key>
2265 <dict>
2266 <key>*</key>
2267 <dict>
2268 <key>blocked_install_message</key>
2269 <string>Custom error message.</string>
2270 <key>install_sources</key>
2271 <array>
2272 <string>about:addons</string>
2273 <string>https://addons.mozilla.org/</string>
2274 </array>
2275 <key>installation_mode</key>
2276 <string>blocked</string>
2277 <key>allowed_types</key>
2278 <array>
2279 <string>extension</string>
2280 </array>
2281 </dict>
2282 <key>uBlock0@raymondhill.net</key>
2283 <dict>
2284 <key>installation_mode</key>
2285 <string>force_installed</string>
2286 <key>install_url</key>
2287 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2288 </dict>
2289 <key>https-everywhere@eff.org</key>
2290 <dict>
2291 <key>installation_mode</key>
2292 <string>allowed</string>
2293 </dict>
2294 </dict>
2295 </dict>
2296 ```
2297 #### policies.json
2298 ```
2299 {
2300 "policies": {
2301 "ExtensionSettings": {
2302 "*": {
2303 "blocked_install_message": "Custom error message.",
2304 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2305 "installation_mode": "blocked",
2306 "allowed_types": ["extension"]
2307 },
2308 "uBlock0@raymondhill.net": {
2309 "installation_mode": "force_installed",
2310 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2311 },
2312 "https-everywhere@eff.org": {
2313 "installation_mode": "allowed"
2314 }
2315 }
2316 }
2317 }
2318 ```
2319 ### ExtensionUpdate
2320 Control extension updates.
2321
2322 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2323 **CCK2 Equivalent:** N/A\
2324 **Preferences Affected:** `extensions.update.enabled`
2325
2326 #### Windows (GPO)
2327 ```
2328 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2329 ```
2330 #### Windows (Intune)
2331 OMA-URI:
2332 ```
2333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2334 ```
2335 Value (string):
2336 ```
2337 <enabled/> or <disabled/>
2338 ```
2339 #### macOS
2340 ```
2341 <dict>
2342 <key>ExtensionUpdate</key>
2343 <true/> | <false/>
2344 </dict>
2345 ```
2346 #### policies.json
2347 ```
2348 {
2349 "policies": {
2350 "ExtensionUpdate": true | false
2351 }
2352 }
2353 ```
2354 ### FlashPlugin
2355 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2356
2357 `Allow` is a list of origins where Flash are allowed.
2358
2359 `Block` is a list of origins where Flash is not allowed.
2360
2361 `Default` determines whether or not Flash is allowed by default.
2362
2363 `Locked` prevents the user from changing Flash preferences.
2364
2365 **Compatibility:** Firefox 60, Firefox ESR 60\
2366 **CCK2 Equivalent:** `permissions.plugin`\
2367 **Preferences Affected:** `plugin.state.flash`
2368
2369 #### Windows (GPO)
2370 ```
2371 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2372 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2373 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2374 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2375 ```
2376 #### Windows (Intune)
2377 OMA-URI:
2378 ```
2379 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2380 ```
2381 Value (string):
2382 ```
2383 <enabled/>
2384 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2385 ```
2386 OMA-URI:
2387 ```
2388 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2389 ```
2390 Value (string):
2391 ```
2392 <enabled/> or <disabled/>
2393 ```
2394 OMA-URI:
2395 ```
2396 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2397 ```
2398 Value (string):
2399 ```
2400 <enabled/> or <disabled/>
2401 ```
2402 #### macOS
2403 ```
2404 <dict>
2405 <key>FlashPlugin</key>
2406 <dict>
2407 <key>Allow</key>
2408 <array>
2409 <string>http://example.org</string>
2410 </array>
2411 <key>Block</key>
2412 <array>
2413 <string>http://example.edu</string>
2414 </array>
2415 <key>Default</key>
2416 <true/> | <false/>
2417 <key>Locked</key>
2418 <true/> | <false/>
2419 </dict>
2420 </dict>
2421 ```
2422 #### policies.json
2423 ```
2424 {
2425 "policies": {
2426 "FlashPlugin": {
2427 "Allow": ["http://example.org/"],
2428 "Block": ["http://example.edu/"],
2429 "Default": true | false,
2430 "Locked": true | false
2431 }
2432 }
2433 }
2434 ```
2435
2436
2437
2438 ### Handlers
2439 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2440
2441 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2442
2443 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2444
2445 | Name | Description |
2446 | --- | --- |
2447 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2448 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2449 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2450 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2451 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2452 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2453
2454 **Compatibility:** Firefox 78, Firefox ESR 78\
2455 **CCK2 Equivalent:** N/A\
2456 **Preferences Affected:** N/A
2457
2458 #### Windows (GPO)
2459 ```
2460 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2461 {
2462 "mimeTypes": {
2463 "application/msword": {
2464 "action": "useSystemDefault",
2465 "ask": true | false
2466 }
2467 },
2468 "schemes": {
2469 "mailto": {
2470 "action": "useHelperApp",
2471 "ask": true | false,
2472 "handlers": [{
2473 "name": "Gmail",
2474 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2475 }]
2476 }
2477 },
2478 "extensions": {
2479 "pdf": {
2480 "action": "useHelperApp",
2481 "ask": true | false,
2482 "handlers": [{
2483 "name": "Adobe Acrobat",
2484 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2485 }]
2486 }
2487 }
2488 }
2489 ```
2490 #### Windows (Intune)
2491 OMA-URI:
2492 ```
2493 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2494 ```
2495 Value (string):
2496 ```
2497 <enabled/>
2498 <data id="Handlers" value='
2499 {
2500 "mimeTypes": {
2501 "application/msword": {
2502 "action": "useSystemDefault",
2503 "ask": true | false
2504 }
2505 },
2506 "schemes": {
2507 "mailto": {
2508 "action": "useHelperApp",
2509 "ask": true | false,
2510 "handlers": [{
2511 "name": "Gmail",
2512 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2513 }]
2514 }
2515 },
2516 "extensions": {
2517 "pdf": {
2518 "action": "useHelperApp",
2519 "ask": true | false,
2520 "handlers": [{
2521 "name": "Adobe Acrobat",
2522 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2523 }]
2524 }
2525 }
2526 }
2527 '/>
2528 ```
2529 #### macOS
2530 ```
2531 <dict>
2532 <key>Handlers</key>
2533 <dict>
2534 <key>mimeTypes</key>
2535 <dict>
2536 <key>application/msword</key>
2537 <dict>
2538 <key>action</key>
2539 <string>useSystemDefault</string>
2540 <key>ask</key>
2541 <true/> | <false/>
2542 </dict>
2543 </dict>
2544 <key>schemes</key>
2545 <dict>
2546 <key>mailto</key>
2547 <dict>
2548 <key>action</key>
2549 <string>useHelperApp</string>
2550 <key>ask</key>
2551 <true/> | <false/>
2552 <key>handlers</key>
2553 <array>
2554 <dict>
2555 <key>name</key>
2556 <string>Gmail</string>
2557 <key>uriTemplate</key>
2558 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2559 </dict>
2560 </array>
2561 </dict>
2562 </dict>
2563 <key>extensions</key>
2564 <dict>
2565 <key>pdf</key>
2566 <dict>
2567 <key>action</key>
2568 <string>useHelperApp</string>
2569 <key>ask</key>
2570 <true/> | <false/>
2571 <key>handlers</key>
2572 <array>
2573 <dict>
2574 <key>name</key>
2575 <string>Adobe Acrobat</string>
2576 <key>path</key>
2577 <string>/System/Applications/Preview.app</string>
2578 </dict>
2579 </array>
2580 </dict>
2581 </dict>
2582 </dict>
2583 </dict>
2584 ```
2585 #### policies.json
2586 ```
2587 {
2588 "policies": {
2589 "Handlers": {
2590 "mimeTypes": {
2591 "application/msword": {
2592 "action": "useSystemDefault",
2593 "ask": false
2594 }
2595 },
2596 "schemes": {
2597 "mailto": {
2598 "action": "useHelperApp",
2599 "ask": true | false,
2600 "handlers": [{
2601 "name": "Gmail",
2602 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2603 }]
2604 }
2605 },
2606 "extensions": {
2607 "pdf": {
2608 "action": "useHelperApp",
2609 "ask": true | false,
2610 "handlers": [{
2611 "name": "Adobe Acrobat",
2612 "path": "/usr/bin/acroread"
2613 }]
2614 }
2615 }
2616 }
2617 }
2618 }
2619 ```
2620 ### FirefoxHome
2621 Customize the Firefox Home page.
2622
2623 **Compatibility:** Firefox 68, Firefox ESR 68\
2624 **CCK2 Equivalent:** N/A\
2625 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2626
2627 #### Windows (GPO)
2628 ```
2629 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2630 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2631 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2632 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2633 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2634 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2635 ```
2636 #### Windows (Intune)
2637 OMA-URI:
2638 ```
2639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2640 ```
2641 Value (string):
2642 ```
2643 <enabled/>
2644 <data id="FirefoxHome_Search" value="true | false"/>
2645 <data id="FirefoxHome_TopSites" value="true | false"/>
2646 <data id="FirefoxHome_Highlights" value="true | false"/>
2647 <data id="FirefoxHome_Pocket" value="true | false"/>
2648 <data id="FirefoxHome_Snippets" value="true | false"/>
2649 <data id="FirefoxHome_Locked" value="true | false"/>
2650 ```
2651 #### macOS
2652 ```
2653 <dict>
2654 <key>FirefoxHome</key>
2655 <dict>
2656 <key>Search</key>
2657 <true/> | <false/>
2658 <key>TopSites</key>
2659 <true/> | <false/>
2660 <key>Highlights</key>
2661 <true/> | <false/>
2662 <key>Pocket</key>
2663 <true/> | <false/>
2664 <key>Snippets</key>
2665 <true/> | <false/>
2666 <key>Locked</key>
2667 <true/> | <false/>
2668 </dict>
2669 </dict>
2670 ```
2671 #### policies.json
2672 ```
2673 {
2674 "policies": {
2675 "FirefoxHome": {
2676 "Search": true | false,
2677 "TopSites": true | false,
2678 "Highlights": true | false,
2679 "Pocket": true | false,
2680 "Snippets": true | false,
2681 "Locked": true | false
2682 }
2683 }
2684 }
2685 ```
2686 ### HardwareAcceleration
2687 Control hardware acceleration.
2688
2689 **Compatibility:** Firefox 60, Firefox ESR 60\
2690 **CCK2 Equivalent:** N/A\
2691 **Preferences Affected:** `layers.acceleration.disabled`
2692
2693 #### Windows (GPO)
2694 ```
2695 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2696 ```
2697 #### Windows (Intune)
2698 OMA-URI:
2699 ```
2700 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2701 ```
2702 Value (string):
2703 ```
2704 <enabled/> or <disabled/>
2705 ```
2706 #### macOS
2707 ```
2708 <dict>
2709 <key>HardwareAcceleration</key>
2710 <true/> | <false/>
2711 </dict>
2712 ```
2713 #### policies.json
2714 ```
2715 {
2716 "policies": {
2717 "HardwareAcceleration": true | false
2718 }
2719 }
2720 ```
2721 ### Homepage
2722 Configure the default homepage and how Firefox starts.
2723
2724 `URL` is the default homepage.
2725
2726 `Locked` prevents the user from changing homepage preferences.
2727
2728 `Additional` allows for more than one homepage.
2729
2730 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2731
2732 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2733
2734 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2735 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2736 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2737
2738 #### Windows (GPO)
2739 ```
2740 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2741 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2742 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2743 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2744 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2745 ```
2746 #### Windows (Intune)
2747 OMA-URI:
2748 ```
2749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2750 ```
2751 Value (string):
2752 ```
2753 <enabled/>
2754
2755 <data id="HomepageURL" value="https://example.com"/>
2756 <data id="HomepageLocked" value="true | false"/>
2757 ```
2758 OMA-URI:
2759 ```
2760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2761 ```
2762 Value (string):
2763 ```
2764 <enabled/>
2765
2766 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2767 ```
2768 OMA-URI:
2769 ```
2770 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2771 ```
2772 Value (string):
2773 ```
2774 <enabled/>
2775
2776 <data id="StartPage" value="none | homepage | previous-session"/>
2777 ```
2778 #### macOS
2779 ```
2780 <dict>
2781 <key>Homepage</key>
2782 <dict>
2783 <key>URL</key>
2784 <string>http://example.com</string>
2785 <key>Locked</key>
2786 <true/> | <false/>
2787 <key>Additional</key>
2788 <array>
2789 <string>http://example.org</string>
2790 <string>http://example.edu</string>
2791 </array>
2792 <key>StartPage</key>
2793 <string>none | homepage | previous-session | homepage-locked</string>
2794 </dict>
2795 </dict>
2796 ```
2797 #### policies.json
2798 ```
2799 {
2800 "policies": {
2801 "Homepage": {
2802 "URL": "http://example.com/",
2803 "Locked": true | false,
2804 "Additional": ["http://example.org/",
2805 "http://example.edu/"],
2806 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2807 }
2808 }
2809 }
2810 ```
2811 ### InstallAddonsPermission
2812 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2813
2814 `Allow` is a list of origins where extension installs are allowed.
2815
2816 `Default` determines whether or not extension installs are allowed by default.
2817
2818 **Compatibility:** Firefox 60, Firefox ESR 60\
2819 **CCK2 Equivalent:** `permissions.install`\
2820 **Preferences Affected:** `xpinstall.enabled`
2821
2822 #### Windows (GPO)
2823 ```
2824 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2825 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2826 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2827 ```
2828 #### Windows (Intune)
2829 OMA-URI:
2830 ```
2831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2832 ```
2833 Value (string):
2834 ```
2835 <enabled/>
2836 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2837 ```
2838 OMA-URI:
2839 ```
2840 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2841 ```
2842 Value (string):
2843 ```
2844 <enabled/>
2845 ```
2846 #### macOS
2847 ```
2848 <dict>
2849 <key>InstallAddonsPermission</key>
2850 <dict>
2851 <key>Allow</key>
2852 <array>
2853 <string>http://example.org</string>
2854 <string>http://example.edu</string>
2855 </array>
2856 <key>Default</key>
2857 <true/> | <false/>
2858 </dict>
2859 </dict>
2860 ```
2861 #### policies.json
2862 ```
2863 {
2864 "policies": {
2865 "InstallAddonsPermission": {
2866 "Allow": ["http://example.org/",
2867 "http://example.edu/"],
2868 "Default": true | false
2869 }
2870 }
2871 }
2872 ```
2873 ### LegacyProfiles
2874 Disable the feature enforcing a separate profile for each installation.
2875
2876 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2877
2878 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2879
2880 This policy only work on Windows via GPO (not policies.json).
2881
2882 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2883 **CCK2 Equivalent:** N/A\
2884 **Preferences Affected:** N/A
2885
2886 #### Windows (GPO)
2887 ```
2888 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2889 ```
2890 #### Windows (Intune)
2891 OMA-URI:
2892 ```
2893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2894 ```
2895 Value (string):
2896 ```
2897 <enabled/> or <disabled/>
2898 ```
2899 ### LocalFileLinks
2900 Enable linking to local files by origin.
2901
2902 **Compatibility:** Firefox 68, Firefox ESR 68\
2903 **CCK2 Equivalent:** N/A\
2904 **Preferences Affected:** `capability.policy.localfilelinks.*`
2905
2906 #### Windows (GPO)
2907 ```
2908 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2909 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2910 ```
2911 #### Windows (Intune)
2912 OMA-URI:
2913 ```
2914 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2915 ```
2916 Value (string):
2917 ```
2918 <enabled/>
2919 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2920 ```
2921 #### macOS
2922 ```
2923 <dict>
2924 <key>LocalFileLinks</key>
2925 <array>
2926 <string>http://example.org</string>
2927 <string>http://example.edu</string>
2928 </array>
2929 </dict>
2930 ```
2931 #### policies.json
2932 ```
2933 {
2934 "policies": {
2935 "LocalFileLinks": ["http://example.org/",
2936 "http://example.edu/"]
2937 }
2938 }
2939 ```
2940 ### PrimaryPassword
2941 Require or prevent using a primary (formerly master) password.
2942
2943 If this value is true, a primary password is required. If this value is false, it works the same as `DisableMasterPasswordCreation` and removes the primary password functionality.
2944
2945 **Compatibility:** Firefox 79, Firefox ESR 78.1\
2946 **CCK2 Equivalent:** `noMasterPassword`\
2947 **Preferences Affected:** N/A
2948
2949 #### Windows (GPO)
2950 ```
2951 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
2952 ```
2953 #### Windows (Intune)
2954 OMA-URI:
2955 ```
2956 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
2957 ```
2958 Value (string):
2959 ```
2960 <enabled/> or <disabled/>
2961 ```
2962 #### macOS
2963 ```
2964 <dict>
2965 <key>PrimaryPassword</key>
2966 <true/> | <false/>
2967 </dict>
2968 ```
2969 #### policies.json
2970 ```
2971 {
2972 "policies": {
2973 "PrimaryPassword": true | false
2974 }
2975 }
2976 ```
2977 ### NetworkPrediction
2978 Enable or disable network prediction (DNS prefetching).
2979
2980 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2981 **CCK2 Equivalent:** N/A\
2982 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2983
2984 #### Windows (GPO)
2985 ```
2986 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2987 ```
2988 #### Windows (Intune)
2989 OMA-URI:
2990 ```
2991 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2992 ```
2993 Value (string):
2994 ```
2995 <enabled/> or <disabled/>
2996 ```
2997 #### macOS
2998 ```
2999 <dict>
3000 <key>NetworkPrediction</key>
3001 <true/> | <false/>
3002 </dict>
3003 ```
3004 #### policies.json
3005 ```
3006 {
3007 "policies": {
3008 "NetworkPrediction": true | false
3009 }
3010 ```
3011 ### NewTabPage
3012 Enable or disable the New Tab page.
3013
3014 **Compatibility:** Firefox 68, Firefox ESR 68\
3015 **CCK2 Equivalent:** N/A\
3016 **Preferences Affected:** `browser.newtabpage.enabled`
3017
3018 #### Windows (GPO)
3019 ```
3020 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3021 ```
3022 #### Windows (Intune)
3023 OMA-URI:
3024 ```
3025 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3026 ```
3027 Value (string):
3028 ```
3029 <enabled/> or <disabled/>
3030 ```
3031 #### macOS
3032 ```
3033 <dict>
3034 <key>NewTabPage</key>
3035 <true/> | <false/>
3036 </dict>
3037 ```
3038 #### policies.json
3039 ```
3040 {
3041 "policies": {
3042 "NewTabPage": true | false
3043 }
3044 ```
3045 ### NoDefaultBookmarks
3046 Disable the creation of default bookmarks.
3047
3048 This policy is only effective if the user profile has not been created yet.
3049
3050 **Compatibility:** Firefox 60, Firefox ESR 60\
3051 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3052 **Preferences Affected:** N/A
3053
3054 #### Windows (GPO)
3055 ```
3056 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3057 ```
3058 #### Windows (Intune)
3059 OMA-URI:
3060 ```
3061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3062 ```
3063 Value (string):
3064 ```
3065 <enabled/> or <disabled/>
3066 ```
3067 #### macOS
3068 ```
3069 <dict>
3070 <key>NoDefaultBookmarks</key>
3071 <true/> | <false/>
3072 </dict>
3073 ```
3074 #### policies.json
3075 ```
3076 {
3077 "policies": {
3078 "NoDefaultBookmarks": true | false
3079 }
3080 }
3081 ```
3082 ### OfferToSaveLogins
3083 Control whether or not Firefox offers to save passwords.
3084
3085 **Compatibility:** Firefox 60, Firefox ESR 60\
3086 **CCK2 Equivalent:** `dontRememberPasswords`\
3087 **Preferences Affected:** `signon.rememberSignons`
3088
3089 #### Windows (GPO)
3090 ```
3091 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3092 ```
3093 #### Windows (Intune)
3094 OMA-URI:
3095 ```
3096 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3097 ```
3098 Value (string):
3099 ```
3100 <enabled/> or <disabled/>
3101 ```
3102 #### macOS
3103 ```
3104 <dict>
3105 <key>OfferToSaveLogins</key>
3106 <true/> | <false/>
3107 </dict>
3108 ```
3109 #### policies.json
3110 ```
3111 {
3112 "policies": {
3113 "OfferToSaveLogins": true | false
3114 }
3115 }
3116 ```
3117 ### OfferToSaveLoginsDefault
3118 Sets the default value of signon.rememberSignons without locking it.
3119
3120 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3121 **CCK2 Equivalent:** `dontRememberPasswords`\
3122 **Preferences Affected:** `signon.rememberSignons`
3123
3124 #### Windows (GPO)
3125 ```
3126 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3127 ```
3128 #### Windows (Intune)
3129 OMA-URI:
3130 ```
3131 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3132 ```
3133 Value (string):
3134 ```
3135 <enabled/> or <disabled/>
3136 ```
3137 #### macOS
3138 ```
3139 <dict>
3140 <key>OfferToSaveLoginsDefault</key>
3141 <true/> | <false/>
3142 </dict>
3143 ```
3144 #### policies.json
3145 ```
3146 {
3147 "policies": {
3148 "OfferToSaveLoginsDefault": true | false
3149 }
3150 }
3151 ```
3152 ### OverrideFirstRunPage
3153 Override the first run page. If the value is blank, no first run page is displayed.
3154
3155 **Compatibility:** Firefox 60, Firefox ESR 60\
3156 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3157 **Preferences Affected:** `startup.homepage_welcome_url`
3158
3159 #### Windows (GPO)
3160 ```
3161 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3162 ```
3163 #### Windows (Intune)
3164 OMA-URI:
3165 ```
3166 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3167 ```
3168 Value (string):
3169 ```
3170 <enabled/>
3171 <data id="OverridePage" value="https://example.com"/>
3172 ```
3173 #### macOS
3174 ```
3175 <dict>
3176 <key>OverrideFirstRunPage</key>
3177 <string>http://example.org</string>
3178 </dict>
3179 ```
3180 #### policies.json
3181 ```
3182 {
3183 "policies": {
3184 "OverrideFirstRunPage": "http://example.org"
3185 }
3186 ```
3187 ### OverridePostUpdatePage
3188 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3189
3190 **Compatibility:** Firefox 60, Firefox ESR 60\
3191 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3192 **Preferences Affected:** `startup.homepage_override_url`
3193
3194 #### Windows (GPO)
3195 ```
3196 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3197 ```
3198 #### Windows (Intune)
3199 OMA-URI:
3200 ```
3201 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3202 ```
3203 Value (string):
3204 ```
3205 <enabled/>
3206 <data id="OverridePage" value="https://example.com"/>
3207 ```
3208 #### macOS
3209 ```
3210 <dict>
3211 <key>OverridePostUpdatePage</key>
3212 <string>http://example.org</string>
3213 </dict>
3214 ```
3215 #### policies.json
3216 ```
3217 {
3218 "policies": {
3219 "OverridePostUpdatePage": "http://example.org"
3220 }
3221 ```
3222 ### PasswordManagerEnabled
3223 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3224
3225 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3226 **CCK2 Equivalent:** N/A\
3227 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3228
3229 #### Windows (GPO)
3230 ```
3231 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3232 ```
3233 #### Windows (Intune)
3234 OMA-URI:
3235 ```
3236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3237 ```
3238 Value (string):
3239 ```
3240 <enabled/> or <disabled/>
3241 ```
3242 #### macOS
3243 ```
3244 <dict>
3245 <key>PasswordManagerEnabled</key>
3246 <true/> | <false/>
3247 </dict>
3248 ```
3249 #### policies.json
3250 ```
3251 {
3252 "policies": {
3253 "PasswordManagerEnabled": true | false
3254 }
3255 }
3256 ```
3257 ### PDFjs
3258 Disable or configure PDF.js, the built-in PDF viewer.
3259
3260 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3261
3262 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3263
3264 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3265
3266 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3267 **CCK2 Equivalent:** N/A\
3268 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3269
3270 #### Windows (GPO)
3271 ```
3272 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3273 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3274 ```
3275 #### Windows (Intune)
3276 OMA-URI:
3277 ```
3278 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3280 ```
3281 Value (string):
3282 ```
3283 <enabled/>or <disabled/>
3284 ```
3285 #### macOS
3286 ```
3287 <dict>
3288 <key>PDFjs</key>
3289 <dict>
3290 <key>Enabled</key>
3291 <true/> | <false/>
3292 <key><EnablePermissions</key>
3293 <true/> | <false/>
3294 </dict>
3295 </dict>
3296 ```
3297 #### policies.json
3298 ```
3299 {
3300 "policies": {
3301 "PSFjs": {
3302 "Enabled": true | false,
3303 "EnablePermissions": true | false
3304 }
3305 }
3306 ```
3307 ### Permissions
3308 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3309
3310 `Allow` is a list of origins where the feature is allowed.
3311
3312 `Block` is a list of origins where the feature is not allowed.
3313
3314 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3315
3316 `Locked` prevents the user from changing preferences for the feature.
3317
3318 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3319
3320 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3321 **CCK2 Equivalent:** N/A\
3322 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3323
3324 #### Windows (GPO)
3325 ```
3326 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3327 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3328 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3329 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3330 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3331 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3332 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3333 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3334 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3335 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3336 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3337 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3338 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3339 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3340 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3341 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3342 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3343 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3344 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3345 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3346 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3347 ```
3348 #### Windows (Intune)
3349 OMA-URI:
3350 ```
3351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3352 ```
3353 Value (string):
3354 ```
3355 <enabled/> or <disabled/>
3356 ```
3357 OMA-URI:
3358 ```
3359 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3360 ```
3361 Value (string):
3362 ```
3363 <enabled/> or <disabled/>
3364 ```
3365 OMA-URI:
3366 ```
3367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3368 ```
3369 Value (string):
3370 ```
3371 <enabled/>
3372 <data id="Permissions" value="1&#xF000;https://example.org"/>
3373 ```
3374 OMA-URI:
3375 ```
3376 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3377 ```
3378 Value (string):
3379 ```
3380 <enabled/> or <disabled/>
3381 ```
3382 OMA-URI:
3383 ```
3384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3385 ```
3386 Value (string):
3387 ```
3388 <enabled/> or <disabled/>
3389 ```
3390 OMA-URI:
3391 ```
3392 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3393 ```
3394 Value (string):
3395 ```
3396 <enabled/>
3397 <data id="Permissions" value="1&#xF000;https://example.org"/>
3398 ```
3399 OMA-URI:
3400 ```
3401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3402 ```
3403 Value (string):
3404 ```
3405 <enabled/>
3406 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3407 ```
3408 OMA-URI:
3409 ```
3410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3411 ```
3412 Value (string):
3413 ```
3414 <enabled/>
3415 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3416 ```
3417 OMA-URI:
3418 ```
3419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3420 ```
3421 Value (string):
3422 ```
3423 <enabled/> or <disabled/>
3424 ```
3425 #### macOS
3426 ```
3427 <dict>
3428 <key>Permissions</key>
3429 <dict>
3430 <key>Camera</key>
3431 <dict>
3432 <key>Allow</key>
3433 <array>
3434 <string>https://example.org</string>
3435 <string>https://example.org:1234</string>
3436 </array>
3437 <key>Block</key>
3438 <array>
3439 <string>https://example.edu</string>
3440 </array>
3441 <key>BlockNewRequests</key>
3442 <true/> | <false/>
3443 <key>Locked</key>
3444 <true/> | <false/>
3445 </dict>
3446 <key>Microphone</key>
3447 <dict>
3448 <key>Allow</key>
3449 <array>
3450 <string>https://example.org</string>
3451 </array>
3452 <key>Block</key>
3453 <array>
3454 <string>https://example.edu</string>
3455 </array>
3456 <key>BlockNewRequests</key>
3457 <true/> | <false/>
3458 <key>Locked</key>
3459 <true/> | <false/>
3460 </dict>
3461 <key>Location</key>
3462 <dict>
3463 <key>Allow</key>
3464 <array>
3465 <string>https://example.org</string>
3466 </array>
3467 <key>Block</key>
3468 <array>
3469 <string>https://example.edu</string>
3470 </array>
3471 <key>BlockNewRequests</key>
3472 <true/> | <false/>
3473 <key>Locked</key>
3474 <true/> | <false/>
3475 </dict>
3476 <key>Notifications</key>
3477 <dict>
3478 <key>Allow</key>
3479 <array>
3480 <string>https://example.org</string>
3481 </array>
3482 <key>Block</key>
3483 <array>
3484 <string>https://example.edu</string>
3485 </array>
3486 <key>BlockNewRequests</key>
3487 <true/>
3488 <key>Locked</key>
3489 <true/>
3490 </dict>
3491 <key>Autoplay</key>
3492 <dict>
3493 <key>Allow</key>
3494 <array>
3495 <string>https://example.org</string>
3496 </array>
3497 <key>Block</key>
3498 <array>
3499 <string>https://example.edu</string>
3500 </array>
3501 <key>Default</key>
3502 <string>allow-audio-video | block-audio | block-audio-video</string>
3503 <key>Locked</key>
3504 <true/> | <false/>
3505 </dict>
3506 </dict>
3507 </dict>
3508 ```
3509 #### policies.json
3510 ```
3511 {
3512 "policies": {
3513 "Permissions": {
3514 "Camera": {
3515 "Allow": ["https://example.org","https://example.org:1234"],
3516 "Block": ["https://example.edu"],
3517 "BlockNewRequests": true | false,
3518 "Locked": true | false
3519 },
3520 "Microphone": {
3521 "Allow": ["https://example.org"],
3522 "Block": ["https://example.edu"],
3523 "BlockNewRequests": true | false,
3524 "Locked": true | false
3525 },
3526 "Location": {
3527 "Allow": ["https://example.org"],
3528 "Block": ["https://example.edu"],
3529 "BlockNewRequests": true | false,
3530 "Locked": true | false
3531 },
3532 "Notifications": {
3533 "Allow": ["https://example.org"],
3534 "Block": ["https://example.edu"],
3535 "BlockNewRequests": true | false,
3536 "Locked": true | false
3537 },
3538 "Autoplay": {
3539 "Allow": ["https://example.org"],
3540 "Block": ["https://example.edu"],
3541 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3542 "Locked": true | false
3543 }
3544 }
3545 }
3546 }
3547 ```
3548 ### PictureInPicture
3549
3550 Enable or disable Picture-in-Picture.
3551
3552 **Compatibility:** Firefox 78, Firefox ESR 78\
3553 **CCK2 Equivalent:** N/A\
3554 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3555
3556 #### Windows (GPO)
3557 ```
3558 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3559 ```
3560 #### Windows (Intune)
3561 OMA-URI:
3562 ```
3563 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3564 ```
3565 Value (string):
3566 ```
3567 <enabled/> or <disabled/>
3568 ```
3569 #### macOS
3570 ```
3571 <dict>
3572 <key>PictureInPicture</key>
3573 <true/> | <false/>
3574 </dict>
3575 ```
3576 #### policies.json
3577 ```
3578 {
3579 "policies": {
3580 "PictureInPicture": true | false
3581 }
3582 }
3583 ```
3584 ### PopupBlocking
3585 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3586
3587 `Allow` is a list of origins where popup-windows are allowed.
3588
3589 `Default` determines whether or not pop-up windows are allowed by default.
3590
3591 `Locked` prevents the user from changing pop-up preferences.
3592
3593 **Compatibility:** Firefox 60, Firefox ESR 60\
3594 **CCK2 Equivalent:** `permissions.popup`\
3595 **Preferences Affected:** `dom.disable_open_during_load`
3596
3597 #### Windows (GPO)
3598 ```
3599 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3600 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3601 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3602 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3603 ```
3604 #### Windows (Intune)
3605 OMA-URI:
3606 ```
3607 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3608 ```
3609 Value (string):
3610 ```
3611 <enabled/>
3612 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3613 ```
3614 OMA-URI:
3615 ```
3616 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3617 ```
3618 Value (string):
3619 ```
3620 <enabled/> or <disabled/>
3621 ```
3622 OMA-URI:
3623 ```
3624 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3625 ```
3626 Value (string):
3627 ```
3628 <enabled/> or <disabled/>
3629 ```
3630 #### macOS
3631 ```
3632 <dict>
3633 <key>PopupBlocking</key>
3634 <dict>
3635 <key>Allow</key>
3636 <array>
3637 <string>http://example.org</string>
3638 <string>http://example.edu</string>
3639 </array>
3640 <key>Default</key>
3641 <true/> | <false/>
3642 <key>Locked</key>
3643 <true/> | <false/>
3644 </dict>
3645 </dict>
3646 ```
3647 #### policies.json
3648 ```
3649 {
3650 "policies": {
3651 "PopupBlocking": {
3652 "Allow": ["http://example.org/",
3653 "http://example.edu/"],
3654 "Default": true | false,
3655 "Locked": true | false
3656 }
3657 }
3658 }
3659 ```
3660 ### Preferences
3661 Set and lock certain preferences.
3662
3663 **Compatibility:** See below\
3664 **CCK2 Equivalent:** `preferences`\
3665 **Preferences Affected:** See below
3666
3667 | Preference | Type | Compatibility | Default
3668 | --- | --- | --- | ---
3669 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3670 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3671 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3673 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3675 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3676 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3677 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3678 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3679 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3680 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3681 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3682 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3683 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3684 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3685 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3686 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3687 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3688 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3689 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3691 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3693 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3695 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3696 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3697 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3698 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3699 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3700 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3701 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3702 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3703 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3704 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3705 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3706 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3707 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3708 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3709 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3710 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3711 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3712 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3713 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3714 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3715 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3716 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3717 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3718 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3719 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3720 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3721 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3722 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3723 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3724 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3725 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3726 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3727 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3728 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3729 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3730 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3731 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3732 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3733 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3734 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3735 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3736 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3737 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3738 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3739 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3740 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3741 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3742 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3743 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
3744 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3745 disabled
3746 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
3747 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3748 disabled
3749 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3750 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3751 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3752 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3753 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3754 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3755 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3756 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3757 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3758 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3759 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3760 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3761 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3762 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3763 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3764 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3765 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3766 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3767 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3768 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3769 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3770 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3771 #### Windows (GPO)
3772 ```
3773 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3774 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3775 ```
3776 #### Windows (Intune)
3777 OMA-URI: (periods are replaced by underscores)
3778 ```
3779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3780 ```
3781 Value (string):
3782 ```
3783 <enabled/> or <disabled/>
3784 ```
3785 OMA-URI: (periods are replaced by underscores)
3786 ```
3787 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
3788 ```
3789 Value (string):
3790 ```
3791 <enabled/>
3792 <data id="Preferences_String" value="string_value"/>
3793 ```
3794 #### macOS
3795 ```
3796 <dict>
3797 <key>Preferences</key>
3798 <dict>
3799 <key>boolean_preference_name</key>
3800 <true/> | <false/>
3801 <key>string_preference_name</key>
3802 <string>string_value</string>
3803 </dict>
3804 </dict>
3805 ```
3806 #### policies.json
3807 ```
3808 {
3809 "policies": {
3810 "Preferences": {
3811 "boolean_preference_name": true | false,
3812 "string_preference_name": "string_value"
3813 }
3814 }
3815 }
3816 ```
3817 ### PromptForDownloadLocation
3818 Ask where to save each file before downloading.
3819
3820 **Compatibility:** Firefox 68, Firefox ESR 68\
3821 **CCK2 Equivalent:** N/A\
3822 **Preferences Affected:** `browser.download.useDownloadDir`
3823
3824 #### Windows (GPO)
3825 ```
3826 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3827 ```
3828 #### Windows (Intune)
3829 OMA-URI:
3830 ```
3831 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3832 ```
3833 Value (string):
3834 ```
3835 <enabled/> or <disabled/>
3836 ```
3837 #### macOS
3838 ```
3839 <dict>
3840 <key>PromptForDownloadLocation</key>
3841 <true/> | <false/>
3842 </dict>
3843 ```
3844 #### policies.json
3845 ```
3846 {
3847 "policies": {
3848 "PromptForDownloadLocation": true | false
3849 }
3850 }
3851 ```
3852 ### Proxy
3853 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3854 To specify ports, append them to the hostnames with a colon (:).
3855
3856 `Mode` is the proxy method being used.
3857
3858 `Locked` is whether or not proxy settings can be changed.
3859
3860 `HTTPProxy` is the HTTP proxy server.
3861
3862 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3863
3864 `SSLProxy` is the SSL proxy server.
3865
3866 `FTPProxy` is the FTP proxy server.
3867
3868 `SOCKSProxy` is the SOCKS proxy server
3869
3870 `SOCKSVersion` is the SOCKS version (4 or 5)
3871
3872 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3873
3874 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3875
3876 `AutoLogin` means do not prompt for authentication if password is saved.
3877
3878 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3879
3880 **Compatibility:** Firefox 60, Firefox ESR 60\
3881 **CCK2 Equivalent:** `networkProxy*`\
3882 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3883
3884 #### Windows (GPO)
3885 ```
3886 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3887 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3888 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3889 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3890 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3891 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3892 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3893 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3894 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3895 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3896 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3897 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3898 ```
3899 #### Windows (Intune)
3900 OMA-URI:
3901 ```
3902 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3903 ```
3904 Value (string):
3905 ```
3906 <enabled/>
3907 <data id="ProxyLocked" value="true | false"/>
3908 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3909 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3910 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3911 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3912 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3913 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3914 <data id="SOCKSVersion" value="4 | 5"/>
3915 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3916 <data id="Passthrough" value="<local>"/>
3917 <data id="AutoLogin" value="true | false"/>
3918 <data id="UseProxyForDNS" value="true | false"/>
3919 ```
3920 #### macOS
3921 ```
3922 <dict>
3923 <key>Proxy</key>
3924 <dict>
3925 <key>Mode</key>
3926 <string>none | system | manual | autoDetect | autoConfig</string>
3927 <key>Locked</key>
3928 <true> | </false>
3929 <key>HTTPProxy</key>
3930 <string>https://httpproxy.example.com</string>
3931 <key>UseHTTPProxyForAllProtocols</key>
3932 <true> | </false>
3933 <key>SSLProxy</key>
3934 <string>https://sslproxy.example.com</string>
3935 <key>FTPProxy</key>
3936 <string>https://ftpproxy.example.com</string>
3937 <key>SOCKSProxy</key>
3938 <string>https://socksproxy.example.com</string>
3939 <key>SOCKSVersion</key>
3940 <string>4 | 5</string>
3941 <key>Passthrough</key>
3942 <string>&lt;local>&gt;</string>
3943 <key>AutoConfigURL</key>
3944 <string>URL_TO_AUTOCONFIG</string>
3945 <key>AutoLogin</key>
3946 <true> | </false>
3947 <key>UseProxyForDNS</key>
3948 <true> | </false>
3949 </dict>
3950 </dict>
3951 ```
3952 #### policies.json
3953 ```
3954 {
3955 "policies": {
3956 "Proxy": {
3957 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3958 "Locked": true | false,
3959 "HTTPProxy": "hostname",
3960 "UseHTTPProxyForAllProtocols": true | false,
3961 "SSLProxy": "hostname",
3962 "FTPProxy": "hostname",
3963 "SOCKSProxy": "hostname",
3964 "SOCKSVersion": 4 | 5
3965 "Passthrough": "<local>",
3966 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3967 "AutoLogin": true | false,
3968 "UseProxyForDNS": true | false
3969 }
3970 }
3971 }
3972 ```
3973 ### RequestedLocales
3974 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3975
3976 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3977
3978 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3979 **CCK2 Equivalent:** N/A\
3980 **Preferences Affected:** N/A
3981 #### Windows (GPO)
3982 ```
3983 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3984 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3985
3986 or
3987
3988 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3989 ```
3990 #### Windows (Intune)
3991 OMA-URI:
3992 ```
3993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3994 ```
3995 Value (string):
3996 ```
3997 <enabled/>
3998 <data id="Preferences_String" value="de,en-US"/>
3999 ```
4000 #### macOS
4001 ```
4002 <dict>
4003 <key>RequestedLocales</key>
4004 <array>
4005 <string>de</string>
4006 <string>en-US</string>
4007 </array>
4008 </dict>
4009
4010 or
4011
4012 <dict>
4013 <key>RequestedLocales</key>
4014 <string>de,en-US</string>
4015 </dict>
4016
4017 ```
4018 #### policies.json
4019 ```
4020 {
4021 "policies": {
4022 "RequestedLocales": ["de", "en-US"]
4023 }
4024 }
4025
4026 or
4027
4028 {
4029 "policies": {
4030 "RequestedLocales": "de,en-US"
4031 }
4032 }
4033 ```
4034 <a name="SanitizeOnShutdown"></a>
4035
4036 ### SanitizeOnShutdown (Selective)
4037 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4038
4039 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4040
4041 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4042 **CCK2 Equivalent:** N/A\
4043 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4044 #### Windows (GPO)
4045 ```
4046 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4047 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4048 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4049 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4050 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4051 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4052 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4053 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4054 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4055 ```
4056 #### Windows (Intune)
4057 OMA-URI:
4058 ```
4059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4060 ```
4061 Value (string):
4062 ```
4063 <enabled/> or <disabled/>
4064 ```
4065 #### macOS
4066 ```
4067 <dict>
4068 <key>SanitizeOnShutdown</key>
4069 <dict>
4070 <key>Cache</key>
4071 <true/> | <false/>
4072 <key>Cookies</key>
4073 <true/> | <false/>
4074 <key>Downloads</key>
4075 <true/> | <false/>
4076 <key>FormData</key>
4077 <true/> | <false/>
4078 <key>History</key>
4079 <true/> | <false/>
4080 <key>Sessions</key>
4081 <true/> | <false/>
4082 <key>SiteSettings</key>
4083 <true/> | <false/>
4084 <key>OfflineApps</key>
4085 <true/> | <false/>
4086 <key>Locked</key>
4087 <true/> | <false/>
4088 </dict>
4089 </dict>
4090 ```
4091 #### policies.json
4092 ```
4093 {
4094 "policies": {
4095 "SanitizeOnShutdown": {
4096 "Cache": true | false,
4097 "Cookies": true | false,
4098 "Downloads": true | false,
4099 "FormData": true | false,
4100 "History": true | false,
4101 "Sessions": true | false,
4102 "SiteSettings": true | false,
4103 "OfflineApps": true | false,
4104 "Locked": true | false
4105 }
4106 }
4107 }
4108 ```
4109 ### SanitizeOnShutdown (All)
4110 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4111
4112 **Compatibility:** Firefox 60, Firefox ESR 60\
4113 **CCK2 Equivalent:** N/A\
4114 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4115 #### Windows (GPO)
4116 ```
4117 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4118 ```
4119 #### Windows (Intune)
4120 OMA-URI:
4121 ```
4122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4123 ```
4124 Value (string):
4125 ```
4126 <enabled/> or <disabled/>
4127 ```
4128 #### macOS
4129 ```
4130 <dict>
4131 <key>SanitizeOnShutdown</key>
4132 <true/> | <false/>
4133 </dict>
4134 ```
4135 #### policies.json
4136 ```
4137 {
4138 "policies": {
4139 "SanitizeOnShutdown": true | false
4140 }
4141 }
4142 ```
4143 ### SearchBar
4144 Set whether or not search bar is displayed.
4145
4146 **Compatibility:** Firefox 60, Firefox ESR 60\
4147 **CCK2 Equivalent:** `showSearchBar`\
4148 **Preferences Affected:** N/A
4149
4150 #### Windows (GPO)
4151 ```
4152 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4153 ```
4154
4155 #### Windows (Intune)
4156 OMA-URI:
4157 ```
4158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4159 ```
4160 Value (string):
4161 ```
4162 <enabled/>
4163 <data id="Permissions" value="unified | separate"/>
4164 ```
4165 #### macOS
4166 ```
4167 <dict>
4168 <key>SearchBar</key>
4169 <string>unified | separate</string>
4170 </dict>
4171 ```
4172 #### policies.json
4173 ```
4174 {
4175 "policies": {
4176 "SearchBar": "unified" | "separate"
4177 }
4178 }
4179 ```
4180 <a name="SearchEngines"></a>
4181
4182 ### SearchEngines (This policy is only available on the ESR.)
4183
4184 ### SearchEngines | Default
4185
4186 Set the default search engine. This policy is only available on the ESR.
4187
4188 **Compatibility:** Firefox ESR 60\
4189 **CCK2 Equivalent:** `defaultSearchEngine`\
4190 **Preferences Affected:** N/A
4191
4192 #### Windows (GPO)
4193 ```
4194 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4195 ```
4196 #### Windows (Intune)
4197 OMA-URI:
4198 ```
4199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4200 ```
4201 Value (string):
4202 ```
4203 <enabled/>
4204 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4205 ```
4206 #### macOS
4207 ```
4208 <dict>
4209 <key>SearchEngines</key>
4210 <dict>
4211 <key>Default</key>
4212 <string>NAME_OF_SEARCH_ENGINE</string>
4213 </dict>
4214 </dict>
4215 ```
4216 #### policies.json
4217 ```
4218 {
4219 "policies": {
4220 "SearchEngines": {
4221 "Default": "NAME_OF_SEARCH_ENGINE"
4222 }
4223 }
4224 }
4225 ```
4226 ### SearchEngines | PreventInstalls
4227
4228 Prevent installing search engines from webpages.
4229
4230 **Compatibility:** Firefox ESR 60\
4231 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4232 **Preferences Affected:** N/A
4233
4234 #### Windows (GPO)
4235 ```
4236 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4237 ```
4238 #### Windows (Intune)
4239 OMA-URI:
4240 ```
4241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4242 ```
4243 Value (string):
4244 ```
4245 <enabled/> or <disabled/>
4246 ```
4247 #### macOS
4248 ```
4249 <dict>
4250 <key>SearchEngines</key>
4251 <dict>
4252 <key>PreventInstalls</key>
4253 <true/> | <false/>
4254 </dict>
4255 </dict>
4256 ```
4257 #### policies.json
4258 ```
4259 {
4260 "policies": {
4261 "SearchEngines": {
4262 "PreventInstalls": true | false
4263 }
4264 }
4265 }
4266 ```
4267 ### SearchEngines | Remove
4268
4269 Hide built-in search engines. This policy is only available on the ESR.
4270
4271 **Compatibility:** Firefox ESR 60.2\
4272 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4273 **Preferences Affected:** N/A
4274
4275 #### Windows (GPO)
4276 ```
4277 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4278 ```
4279 #### Windows (Intune)
4280 OMA-URI:
4281 ```
4282 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4283 ```
4284 Value (string):
4285 ```
4286 <enabled/>
4287 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4288 ```
4289 #### macOS
4290 ```
4291 <dict>
4292 <key>SearchEngines</key>
4293 <dict>
4294 <key>Remove</key>
4295 <array>
4296 <string>NAME_OF_SEARCH_ENGINE</string>
4297 </array>
4298 </dict>
4299 </dict>
4300 ```
4301 #### policies.json
4302 ```
4303 {
4304 "policies": {
4305 "SearchEngines": {
4306 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4307 }
4308 }
4309 }
4310 ```
4311 ### SearchEngines | Add
4312
4313 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4314
4315 `Name` is the name of the search engine.
4316
4317 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4318
4319 `Method` is either GET or POST
4320
4321 `IconURL` is a URL for the icon to use.
4322
4323 `Alias` is a keyword to use for the engine.
4324
4325 `Description` is a description of the search engine.
4326
4327 `PostData` is the POST data as name value pairs separated by &.
4328
4329 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4330
4331 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4332 **CCK2 Equivalent:** `searchplugins`\
4333 **Preferences Affected:** N/A
4334
4335 #### Windows (GPO)
4336 ```
4337 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4338 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4339 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4340 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4341 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4342 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4343 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4344 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4345 ```
4346 #### Windows (Intune)
4347 OMA-URI:
4348 ```
4349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4350 ```
4351 Value (string):
4352 ```
4353 <enabled/>
4354 <data id="SearchEngine_Name" value="Example1"/>
4355 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4356 <data id="SearchEngine_Method" value="GET | POST"/>
4357 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4358 <data id="SearchEngine_Alias" value="example"/>
4359 <data id="SearchEngine_Description" value="Example Description"/>
4360 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4361 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4362 ```
4363 #### macOS
4364 ```
4365 <dict>
4366 <key>SearchEngines</key>
4367 <dict>
4368 <key>Add</key>
4369 <array>
4370 <dict>
4371 <key>Name</key>
4372 <string>Example1</string>
4373 <key>URLTemplate</key>
4374 <string>https://www.example.org/q={searchTerms}</string>
4375 <key>Method</key>
4376 <string>GET | POST </string>
4377 <key>IconURL</key>
4378 <string>https://www.example.org/favicon.ico</string>
4379 <key>Alias</key>
4380 <string>example</string>
4381 <key>Description</key>
4382 <string>Example Description</string>
4383 <key>SuggestURLTemplate</key>
4384 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4385 <key>PostData</key>
4386 <string>name=value&q={searchTerms}</string>
4387 </dict>
4388 <array>
4389 </dict>
4390 </dict>
4391 ```
4392 #### policies.json
4393 ```
4394 {
4395 "policies": {
4396 "SearchEngines": {
4397 "Add": [
4398 {
4399 "Name": "Example1",
4400 "URLTemplate": "https://www.example.org/q={searchTerms}",
4401 "Method": "GET" | "POST",
4402 "IconURL": "https://www.example.org/favicon.ico",
4403 "Alias": "example",
4404 "Description": "Description",
4405 "PostData": "name=value&q={searchTerms}",
4406 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4407 }
4408 ]
4409 }
4410 }
4411 }
4412 ```
4413 ### SearchSuggestEnabled
4414
4415 Enable search suggestions.
4416
4417 **Compatibility:** Firefox 68, Firefox ESR 68\
4418 **CCK2 Equivalent:** N/A\
4419 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4420
4421 #### Windows (GPO)
4422 ```
4423 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4424 ```
4425 #### Windows (Intune)
4426 OMA-URI:
4427 ```
4428 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4429 ```
4430 Value (string):
4431 ```
4432 <enabled/> or <disabled/>
4433 ```
4434 #### macOS
4435 ```
4436 <dict>
4437 <key>SearchSuggestEnabled</key>
4438 <true/> | <false/>
4439 </dict>
4440 ```
4441 #### policies.json
4442 ```
4443 {
4444 "policies": {
4445 "SearchSuggestEnabled": true | false
4446 }
4447 }
4448 ```
4449 ### SecurityDevices
4450
4451 Install PKCS #11 modules.
4452
4453 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4454 **CCK2 Equivalent:** `certs.devices`\
4455 **Preferences Affected:** N/A
4456
4457 #### Windows (GPO)
4458 ```
4459 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4460 ```
4461 #### Windows (Intune)
4462 OMA-URI:
4463 ```
4464 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4465 ```
4466 Value (string):
4467 ```
4468 <enabled/>
4469 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4470 ```
4471 #### macOS
4472 ```
4473 <dict>
4474 <key>SecurityDevices</key>
4475 <dict>
4476 <key>NAME_OF_DEVICE</key>
4477 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4478 </dict>
4479 </dict>
4480 ```
4481
4482 #### policies.json
4483 ```
4484 {
4485 "policies": {
4486 "SecurityDevices": {
4487 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4488 }
4489 }
4490 }
4491 ```
4492 ### SSLVersionMax
4493
4494 Set and lock the maximum version of TLS.
4495
4496 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4497 **CCK2 Equivalent:** N/A\
4498 **Preferences Affected:** `security.tls.version.max`
4499
4500 #### Windows (GPO)
4501 ```
4502 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4503 ```
4504 #### Windows (Intune)
4505 OMA-URI:
4506 ```
4507 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4508 ```
4509 Value (string):
4510 ```
4511 <enabled/>
4512 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4513 ```
4514 #### macOS
4515 ```
4516 <dict>
4517 <key>SSLVersionMax</key>
4518 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4519 </dict>
4520 ```
4521
4522 #### policies.json
4523 ```
4524 {
4525 "policies": {
4526 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4527 }
4528 }
4529 ```
4530 ### SSLVersionMin
4531
4532 Set and lock the minimum version of TLS.
4533
4534 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4535 **CCK2 Equivalent:** N/A\
4536 **Preferences Affected:** `security.tls.version.min`
4537
4538 #### Windows (GPO)
4539 ```
4540 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4541 ```
4542 #### Windows (Intune)
4543 OMA-URI:
4544 ```
4545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4546 ```
4547 Value (string):
4548 ```
4549 <enabled/>
4550 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4551 ```
4552 #### macOS
4553 ```
4554 <dict>
4555 <key>SSLVersionMin</key>
4556 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4557 </dict>
4558 ```
4559
4560 #### policies.json
4561 ```
4562 {
4563 "policies": {
4564 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4565 }
4566 }
4567 ```
4568 ### SupportMenu
4569 Add a menuitem to the help menu for specifying support information.
4570
4571 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4572 **CCK2 Equivalent:** helpMenu\
4573 **Preferences Affected:** N/A
4574
4575 #### Windows (GPO)
4576 ```
4577 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4578 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4579 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4580 ```
4581 #### Windows (Intune)
4582 OMA-URI:
4583 ```
4584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4585 ```
4586 Value (string):
4587 ```
4588 <enabled/>
4589 <data id="SupportMenuTitle" value="Support Menu"/>
4590 <data id="SupportMenuURL" value="http://example.com/support"/>
4591 <data id="SupportMenuAccessKey" value="S">
4592 ```
4593 #### macOS
4594 ```
4595 <dict>
4596 <key>SupportMenu</key>
4597 <dict>
4598 <key>Title</key>
4599 <string>SupportMenu</string>
4600 <key>URL</key>
4601 <string>http://example.com/support</string>
4602 <key>AccessKey</key>
4603 <string>S</string>
4604 </dict>
4605 </dict>
4606 ```
4607 #### policies.json
4608 ```
4609 {
4610 "policies": {
4611 "SupportMenu": {
4612 "Title": "Support Menu",
4613 "URL": "http://example.com/support",
4614 "AccessKey": "S"
4615 }
4616 }
4617 }
4618 ```
4619 ### UserMessaging
4620
4621 Prevent installing search engines from webpages.
4622
4623 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4624
4625 `ExtensionRecommendations` Don't recommend extensions.
4626
4627 `FeatureRecommendations` Don't recommend browser features.
4628
4629 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4630
4631 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4632 **CCK2 Equivalent:** N/A\
4633 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4634
4635 #### Windows (GPO)
4636 ```
4637 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4638 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4639 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4640 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4641 ```
4642 #### Windows (Intune)
4643 OMA-URI:
4644 ```
4645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4646 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4648 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4649 ```
4650 Value (string):
4651 ```
4652 <enabled/> or <disabled/>
4653 ```
4654 #### macOS
4655 ```
4656 <dict>
4657 <key>UserMessaging</key>
4658 <dict>
4659 <key>WhatsNew</key>
4660 <true/> | <false/>
4661 <key>ExtensionRecommendations</key>
4662 <true/> | <false/>
4663 <key>FeatureRecommendations</key>
4664 <true/> | <false/>
4665 <key>UrlbarInterventions</key>
4666 <true/> | <false/>
4667 </dict>
4668 </dict>
4669 ```
4670 #### policies.json
4671 ```
4672 {
4673 "policies": {
4674 "UserMessaging": {
4675 "WhatsNew": true | false,
4676 "ExtensionRecommendations": true | false,
4677 "FeatureRecommendations": true | false,
4678 "UrlbarInterventions": true | false
4679 }
4680 }
4681 }
4682 ```
4683 ### WebsiteFilter
4684 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4685
4686 **Compatibility:** Firefox 60, Firefox ESR 60\
4687 **CCK2 Equivalent:** N/A\
4688 **Preferences Affected:** N/A
4689
4690 #### Windows (GPO)
4691 ```
4692 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4693 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4694 ```
4695 #### Windows (Intune)
4696 OMA-URI:
4697 ```
4698 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4699 ```
4700 Value (string):
4701 ```
4702 <enabled/>
4703 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4704 ```
4705 OMA-URI:
4706 ```
4707 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4708 ```
4709 Value (string):
4710 ```
4711 <enabled/>
4712 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4713 ```
4714 #### macOS
4715 ```
4716 <dict>
4717 <key>WebsiteFilter</key>
4718 <dict>
4719 <key>Block</key>
4720 <array>
4721 <string><all_urls></string>
4722 </array>
4723 <key>Exceptions</key>
4724 <array>
4725 <string>http://example.org/*</string>
4726 </array>
4727 </dict>
4728
4729 </dict>
4730 ```
4731 #### policies.json
4732 ```
4733 {
4734 "policies": {
4735 "WebsiteFilter": {
4736 "Block": ["<all_urls>"],
4737 "Exceptions": ["http://example.org/*"]
4738 }
4739 }
4740 }
4741 ```

patrick-canterino.de