]> git.p6c8.net - policy-templates.git/blob - README.md
7620f91af62c9553b7aa35c985c45584bcb96f2b
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
66 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
67 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
68 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
69 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
70 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
71 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
72 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
73 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
74 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
75 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
76 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
77 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
78 | **[`Preferences`](#preferences)** | Set and lock some preferences.
79 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
80 | **[`Proxy`](#proxy)** | Configure proxy settings.
81 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
82 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
83 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
84 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
85 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
86 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
87 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
88 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
91 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
92 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
93 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
94 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
95 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
96 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
97
98 ### AppAutoUpdate
99
100 Enable or disable **automatic** application update.
101
102 If set to true, application updates are installed without user approval.
103
104 If set to false, application updates are downloaded but the user can choose when to install the update.
105
106 If you have disabled updates via DisableAppUpdate, this policy has no effect.
107
108 **Compatibility:** Firefox 75, Firefox ESR 68.7\
109 **CCK2 Equivalent:** N/A\
110 **Preferences Affected:** app.update.auto
111
112 #### Windows (GPO)
113 ```
114 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
115 ```
116 #### Windows (Intune)
117 OMA-URI:
118 ```
119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
120 ```
121 Value (string):
122 ```
123 <enabled/> or <disabled/>
124 ```
125 #### macOS
126 ```
127 <dict>
128 <key>AppAutoUpdate</key>
129 <true/> | <false/>
130 </dict>
131 ```
132 #### policies.json
133 ```
134 {
135 "policies": {
136 "AppAutoUpdate": true | false
137 }
138 }
139 ```
140 ### AppUpdateURL
141
142 Change the URL for application update.
143
144 **Compatibility:** Firefox 62, Firefox ESR 60.2\
145 **CCK2 Equivalent:** N/A\
146 **Preferences Affected:** `app.update.url`
147
148 #### Windows (GPO)
149 ```
150 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
151 ```
152 #### Windows (Intune)
153 OMA-URI:
154 ```
155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
156 ```
157 Value (string):
158 ```
159 <enabled/>
160 <data id="AppUpdateURL" value="https://yoursite.com"/>
161 ```
162 #### macOS
163 ```
164 <dict>
165 <key>AppUpdateURL</key>
166 <string>https://yoursite.com</string>
167 </dict>
168 ```
169 #### policies.json
170 ```
171 {
172 "policies": {
173 "AppUpdateURL": "https://yoursite.com"
174 }
175 }
176 ```
177 ### Authentication
178
179 Configure sites that support integrated authentication.
180
181 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
182
183 `PrivateBrowsing` enables integrated authentication in prviate browsing.
184
185 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
186 **CCK2 Equivalent:** N/A\
187 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
188
189 #### Windows (GPO)
190 ```
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
202 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
203 ```
204 #### Windows (Intune)
205 OMA-URI:
206 ```
207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
208 ```
209 Value (string):
210 ```
211 <enabled/>
212 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
213 ```
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
240 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
241 ```
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>Authentication</key>
262 <dict>
263 <key>SPNEGO</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>Delegated</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>NTLM</key>
274 <array>
275 <string>mydomain.com</string>
276 <string>https://myotherdomain.com</string>
277 </array>
278 <key>AllowNonFQDN</key>
279 <dict>
280 <key>SPNEGO</key>
281 <true/> | <false/>
282 <key>NTLM</key>
283 <true/> | <false/>
284 </dict>
285 <key>AllowProxies</key>
286 <dict>
287 <key>SPNEGO</key>
288 <true/> | <false/>
289 <key>NTLM</key>
290 <true/> | <false/>
291 </dict>
292 <key>Locked</key>
293 <true/> | <false/>
294 <key>PrivateBrowsing</key>
295 <true/> | <false/>
296 </dict>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "Authentication": {
304 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
305 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
306 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
307 "AllowNonFQDN": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "AllowProxies": {
312 "SPNEGO": true | false,
313 "NTLM": true | false
314 },
315 "Locked": true | false,
316 "PrivateBrowsing": true | false
317 }
318 }
319 }
320 ```
321 ### BlockAboutAddons
322
323 Block access to the Add-ons Manager (about:addons).
324
325 **Compatibility:** Firefox 60, Firefox ESR 60\
326 **CCK2 Equivalent:** `disableAddonsManager`\
327 **Preferences Affected:** N/A
328
329 #### Windows (GPO)
330 ```
331 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
332 ```
333 #### Windows (Intune)
334 OMA-URI:
335 ```
336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
337 ```
338 Value (string):
339 ```
340 <enabled/> or <disabled/>
341 ```
342 #### macOS
343 ```
344 <dict>
345 <key>BlockAboutAddons</key>
346 <true/> | <false/>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "BlockAboutAddons": true | false
354 }
355 }
356 ```
357 ### BlockAboutConfig
358
359 Block access to about:config.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60\
362 **CCK2 Equivalent:** `disableAboutConfig`\
363 **Preferences Affected:** N/A
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
368 ```
369 #### Windows (Intune)
370 OMA-URI:
371 ```
372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
373 ```
374 Value (string):
375 ```
376 <enabled/> or <disabled/>
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>BlockAboutConfig</key>
382 <true/> | <false/>
383 </dict>
384 ```
385 #### policies.json
386 ```
387 {
388 "policies": {
389 "BlockAboutConfig": true | false
390 }
391 }
392 ```
393 ### BlockAboutProfiles
394
395 Block access to About Profiles (about:profiles).
396
397 **Compatibility:** Firefox 60, Firefox ESR 60\
398 **CCK2 Equivalent:** `disableAboutProfiles`\
399 **Preferences Affected:** N/A
400
401 #### Windows (GPO)
402 ```
403 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
404 ```
405 #### Windows (Intune)
406 OMA-URI:
407 ```
408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
409 ```
410 Value (string):
411 ```
412 <enabled/> or <disabled/>
413 ```
414 #### macOS
415 ```
416 <dict>
417 <key>BlockAboutProfiles</key>
418 <true/> | <false/>
419 </dict>
420 ```
421 #### policies.json
422 ```
423 {
424 "policies": {
425 "BlockAboutProfiles": true | false
426 }
427 }
428 ```
429 ### BlockAboutSupport
430
431 Block access to Troubleshooting Information (about:support).
432
433 **Compatibility:** Firefox 60, Firefox ESR 60\
434 **CCK2 Equivalent:** `disableAboutSupport`\
435 **Preferences Affected:** N/A
436
437 #### Windows (GPO)
438 ```
439 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
440 ```
441 #### Windows (Intune)
442 OMA-URI:
443 ```
444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
445 ```
446 Value (string):
447 ```
448 <enabled/> or <disabled/>
449 ```
450 #### macOS
451 ```
452 <dict>
453 <key>BlockAboutSupport</key>
454 <true/> | <false/>
455 </dict>
456 ```
457 #### policies.json
458 ```
459 {
460 "policies": {
461 "BlockAboutSupport": true | false
462 }
463 }
464 ```
465 ### Bookmarks
466
467 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
468
469 **Compatibility:** Firefox 60, Firefox ESR 60\
470 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
471 **Preferences Affected:** N/A
472
473 #### Windows (GPO)
474 ```
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
479 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
485 ```
486 Value (string):
487 ```
488 <enabled/>
489 <data id="BookmarkTitle" value="Example"/>
490 <data id="BookmarkURL" value="https://example.com"/>
491 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
492 <data id="BookmarkPlacement" value="toolbar | menu"/>
493 <data id="BookmarkFolder" value="FolderName"/>
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>Bookmarks</key>
499 <array>
500 <dict>
501 <key>Title</key>
502 <string>Example</string>
503 <key>URL</key>
504 <string>https://example.com</string>
505 <key>Favicon</key>
506 <string>https://example.com/favicon.ico</string>
507 <key>Placement</key>
508 <string>toolbar | menu</string>
509 <key>Folder</key>
510 <string>FolderName</string>
511 </dict>
512 </array>
513 </dict>
514 ```
515 #### policies.json
516 ```
517 {
518 "policies": {
519 "Bookmarks": [
520 {
521 "Title": "Example",
522 "URL": "https://example.com",
523 "Favicon": "https://example.com/favicon.ico",
524 "Placement": "toolbar" | "menu",
525 "Folder": "FolderName"
526 }
527 ]
528 }
529 }
530 ```
531 ### CaptivePortal
532 Enable or disable the detection of captive portals.
533
534 **Compatibility:** Firefox 67, Firefox ESR 60.7\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `network.captive-portal-service.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>CaptivePortal</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "CaptivePortal": true | false
563 }
564 }
565 ```
566 ### Certificates
567
568 ### Certificates | ImportEnterpriseRoots
569
570 Trust certificates that have been added to the operating system certificate store by a user or administrator.
571
572 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
573
574 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
575 **CCK2 Equivalent:** N/A\
576 **Preferences Affected:** `security.enterprise_roots.enabled`
577
578 #### Windows (GPO)
579 ```
580 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
581 ```
582 #### Windows (Intune)
583 OMA-URI:
584 ```
585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
586 ```
587 Value (string):
588 ```
589 <enabled/> or <disabled/>
590 ```
591 #### macOS
592 ```
593 <dict>
594 <key>Certificates</key>
595 <dict>
596 <key>ImportEnterpriseRoots</key>
597 <true/> | <false/>
598 </dict>
599 </dict>
600 ```
601 #### policies.json
602 ```
603 {
604 "policies": {
605 "Certificates": {
606 "ImportEnterpriseRoots": true | false
607 }
608 }
609 }
610 ```
611 ### Certificates | Install
612
613 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
614
615 - Windows
616 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
617 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
618 - macOS
619 - /Library/Application Support/Mozilla/Certificates
620 - ~/Library/Application Support/Mozilla/Certificates
621 - Linux
622 - /usr/lib/mozilla/certificates
623 - /usr/lib64/mozilla/certificates
624 - ~/.mozilla/certificates
625
626 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
627
628 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
629
630 Certificates are installed using the trust string `CT,CT,`.
631
632 Binary (DER) and ASCII (PEM) certificates are both supported.
633
634 **Compatibility:** Firefox 64, Firefox ESR 64\
635 **CCK2 Equivalent:** `certs.ca`\
636 **Preferences Affected:** N/A
637
638 #### Windows (GPO)
639 ```
640 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
641 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
642 ```
643 #### Windows (Intune)
644 OMA-URI:
645 ```
646 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
647 ```
648 Value (string):
649 ```
650 <enabled/>
651 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
652 ```
653 #### macOS
654 ```
655 <dict>
656 <key>Certificates</key>
657 <dict>
658 <key>Install</key>
659 <array>
660 <string>cert1.der</string>
661 <string>/Users/username/cert2.pem</string>
662 </array>
663 </dict>
664 </dict>
665 ```
666 #### policies.json
667 ```
668 {
669 "policies": {
670 "Certificates": {
671 "Install": ["cert1.der", "/home/username/cert2.pem"]
672 }
673 }
674 }
675 ```
676 ### Cookies
677 Configure cookie preferences.
678
679 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
680
681 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
682
683 `Default` determines whether cookies are accepted at all.
684
685 `AcceptThirdParty` determines how third-party cookies are handled.
686
687 `ExpireAtSessionEnd` determines when cookies expire.
688
689 `RejectTracker` only rejects cookies for trackers.
690
691 `Locked` prevents the user from changing cookie preferences.
692
693 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
694 **CCK2 Equivalent:** N/A\
695 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
696
697 #### Windows (GPO)
698 ```
699 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
700 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
701 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
702 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
703 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
705 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
706 ```
707 #### Windows (Intune)
708 OMA-URI:
709 ```
710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
711 ```
712 Value (string):
713 ```
714 <enabled/>
715 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
716 ```
717 OMA-URI:
718 ```
719 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
720 ```
721 Value (string):
722 ```
723 <enabled/>
724 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
725 ```
726 OMA-URI:
727 ```
728 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
729 ```
730 Value (string):
731 ```
732 <enabled/> or <disabled/>
733 ```
734 OMA-URI:
735 ```
736 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
737 ```
738 Value (string):
739 ```
740 <enabled/>
741 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
742 ```
743 OMA-URI:
744 ```
745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
746 ```
747 Value (string):
748 ```
749 <enabled/> or <disabled/>
750 ```
751 OMA-URI:
752 ```
753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
754 ```
755 Value (string):
756 ```
757 <enabled/> or <disabled/>
758 ```
759 OMA-URI:
760 ```
761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
762 ```
763 Value (string):
764 ```
765 <enabled/> or <disabled/>
766 ```
767 #### macOS
768 ```
769 <dict>
770 <key>Cookies</key>
771 <dict>
772 <key>Allow</key>
773 <array>
774 <string>http://example.com</string>
775 </array>
776 <key>Block</key>
777 <array>
778 <string>http://example.org</string>
779 </array>
780 <key>Default</key>
781 <true/> | <false/>
782 <key>AcceptThirdParty</key>
783 <string>always | never | from-visited</string>
784 <key>ExpireAtSessionEnd</key>
785 <true/> | <false/>
786 <key>RejectTracker</key>
787 <true/> | <false/>
788 <key>Locked</key>
789 <true/> | <false/>
790 </dict>
791 </dict>
792 ```
793 #### policies.json
794 ```
795 {
796 "policies": {
797 "Cookies": {
798 "Allow": ["http://example.org/"],
799 "Block": ["http://example.edu/"],
800 "Default": true | false,
801 "AcceptThirdParty": "always" | "never" | "from-visited",
802 "ExpireAtSessionEnd": true | false,
803 "RejectTracker": true | false,
804 "Locked": true | false
805 }
806 }
807 }
808 ```
809 ### DisableSetDesktopBackground
810 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
811
812 **Compatibility:** Firefox 60, Firefox ESR 60\
813 **CCK2 Equivalent:** `removeSetDesktopBackground`\
814 **Preferences Affected:** N/A
815
816 #### Windows (GPO)
817 ```
818 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
819 ```
820 #### Windows (Intune)
821 OMA-URI:
822 ```
823 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
824 ```
825 Value (string):
826 ```
827 <enabled/> or <disabled/>
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisableSetDesktopBackground</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "DisableSetDesktopBackground": true | false
841 }
842 }
843 ```
844 ### DisableMasterPasswordCreation
845 Remove the master password functionality.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `noMasterPassword`\
849 **Preferences Affected:** N/A
850
851 #### Windows (GPO)
852 ```
853 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
854 ```
855 #### Windows (Intune)
856 OMA-URI:
857 ```
858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
859 ```
860 Value (string):
861 ```
862 <enabled/> or <disabled/>
863 ```
864 #### macOS
865 ```
866 <dict>
867 <key>DisableMasterPasswordCreation</key>
868 <true/> | <false/>
869 </dict>
870 ```
871 #### policies.json
872 ```
873 {
874 "policies": {
875 "DisableMasterPasswordCreation": true | false
876 }
877 }
878 ```
879 ### DisableAppUpdate
880 Turn off application updates.
881
882 **Compatibility:** Firefox 60, Firefox ESR 60\
883 **CCK2 Equivalent:** `disableFirefoxUpdates`\
884 **Preferences Affected:** N/A
885
886 #### Windows (GPO)
887 ```
888 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
889 ```
890 #### Windows (Intune)
891 OMA-URI:
892 ```
893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
894 ```
895 Value (string):
896 ```
897 <enabled/> or <disabled/>
898 ```
899 #### macOS
900 ```
901 <dict>
902 <key>DisableAppUpdate</key>
903 <true/> | <false/>
904 </dict>
905 ```
906 #### policies.json
907 ```
908 {
909 "policies": {
910 "DisableAppUpdate": true | false
911 }
912 }
913 ```
914 ### DisableBuiltinPDFViewer
915 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
916
917 **Compatibility:** Firefox 60, Firefox ESR 60\
918 **CCK2 Equivalent:** `disablePDFjs`\
919 **Preferences Affected:** `pdfjs.disabled`
920
921 #### Windows (GPO)
922 ```
923 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
924 ```
925 #### Windows (Intune)
926 OMA-URI:
927 ```
928 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
929 ```
930 Value (string):
931 ```
932 <enabled/> or <disabled/>
933 ```
934 #### macOS
935 ```
936 <dict>
937 <key>DisableBuiltinPDFViewer</key>
938 <true/> | <false/>
939 </dict>
940 ```
941 #### policies.json
942 ```
943 {
944 "policies": {
945 "DisableBuiltinPDFViewer": true | false
946 }
947 }
948 ```
949 ### DisabledCiphers
950 Disable specific cryptographic ciphers.
951
952 ---
953 **Note:**
954
955 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
956
957 ---
958 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
959 **CCK2 Equivalent:** N/A\
960 **Preferences Affected:** N/A
961
962 #### Windows (GPO)
963 ```
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
975 ```
976 #### Windows (Intune)
977 OMA-URI:
978 ```
979 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
990 ```
991 Value (string):
992 ```
993 <enabled/> or <disabled/>
994 ```
995 #### macOS
996 ```
997 <dict>
998 <key>DisabledCiphers</key>
999 <dict>
1000 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1001 <true/> | <false/>
1002 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1005 <true/> | <false/>
1006 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1007 <true/> | <false/>
1008 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1009 <true/> | <false/>
1010 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1011 <true/> | <false/>
1012 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1013 <true/> | <false/>
1014 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1015 <true/> | <false/>
1016 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1017 <true/> | <false/>
1018 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1019 <true/> | <false/>
1020 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1021 <true/> | <false/>
1022 </dict>
1023 </dict>
1024 ```
1025 #### policies.json
1026 ```
1027 {
1028 "policies": {
1029 "DisabledCiphers" {
1030 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1031 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1032 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1035 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1036 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1037 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1038 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1039 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1040 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1041 }
1042 }
1043 }
1044 ```
1045 ### DisableDefaultBrowserAgent
1046 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1047
1048 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1049 **CCK2 Equivalent:** N/A\
1050 **Preferences Affected:** N/A
1051
1052 #### Windows (GPO)
1053 ```
1054 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1055 ```
1056 #### Windows (Intune)
1057 OMA-URI:
1058 ```
1059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1060 ```
1061 Value (string):
1062 ```
1063 <enabled/> or <disabled/>
1064 ```
1065 #### policies.json
1066 ```
1067 {
1068 "policies": {
1069 "DisableDefaultBrowserAgent": true | false
1070 }
1071 }
1072 ```
1073 ### DisableDeveloperTools
1074 Remove access to all developer tools.
1075
1076 **Compatibility:** Firefox 60, Firefox ESR 60\
1077 **CCK2 Equivalent:** `removeDeveloperTools`\
1078 **Preferences Affected:** `devtools.policy.disabled`
1079
1080 #### Windows (GPO)
1081 ```
1082 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1083 ```
1084 #### Windows (Intune)
1085 OMA-URI:
1086 ```
1087 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1088 ```
1089 Value (string):
1090 ```
1091 <enabled/> or <disabled/>
1092 ```
1093 #### macOS
1094 ```
1095 <dict>
1096 <key>DisableDeveloperTools</key>
1097 <true/> | <false/>
1098 </dict>
1099 ```
1100 #### policies.json
1101 ```
1102 {
1103 "policies": {
1104 "DisableDeveloperTools": true | false
1105 }
1106 }
1107 ```
1108 ### DisableFeedbackCommands
1109 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1110
1111 **Compatibility:** Firefox 60, Firefox ESR 60\
1112 **CCK2 Equivalent:** N/A\
1113 **Preferences Affected:** N/A
1114
1115 #### Windows (GPO)
1116 ```
1117 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1118 ```
1119 #### Windows (Intune)
1120 OMA-URI:
1121 ```
1122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1123 ```
1124 Value (string):
1125 ```
1126 <enabled/> or <disabled/>
1127 ```
1128 #### macOS
1129 ```
1130 <dict>
1131 <key>DisableFeedbackCommands</key>
1132 <true/> | <false/>
1133 </dict>
1134 ```
1135 #### policies.json
1136 ```
1137 {
1138 "policies": {
1139 "DisableFeedbackCommands": true | false
1140 }
1141 }
1142 ```
1143 ### DisableFirefoxScreenshots
1144 Remove access to Firefox Screenshots.
1145
1146 **Compatibility:** Firefox 60, Firefox ESR 60\
1147 **CCK2 Equivalent:** N/A\
1148 **Preferences Affected:** `extensions.screenshots.disabled`
1149
1150 #### Windows (GPO)
1151 ```
1152 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1153 ```
1154 #### Windows (Intune)
1155 OMA-URI:
1156 ```
1157 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1158 ```
1159 Value (string):
1160 ```
1161 <enabled/> or <disabled/>
1162 ```
1163 #### macOS
1164 ```
1165 <dict>
1166 <key>DisableFirefoxScreenshots</key>
1167 <true/> | <false/>
1168 </dict>
1169 ```
1170 #### policies.json
1171 ```
1172 {
1173 "policies": {
1174 "DisableFirefoxScreenshots": true | false
1175 }
1176 }
1177 ```
1178 ### DisableFirefoxAccounts
1179 Disable Firefox Accounts integration (Sync).
1180
1181 **Compatibility:** Firefox 60, Firefox ESR 60\
1182 **CCK2 Equivalent:** `disableSync`\
1183 **Preferences Affected:** `identity.fxaccounts.enabled`
1184
1185 #### Windows (GPO)
1186 ```
1187 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1188 ```
1189 #### Windows (Intune)
1190 OMA-URI:
1191 ```
1192 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1193 ```
1194 Value (string):
1195 ```
1196 <enabled/> or <disabled/>
1197 ```
1198 #### macOS
1199 ```
1200 <dict>
1201 <key>DisableFirefoxAccounts</key>
1202 <true/> | <false/>
1203 </dict>
1204 ```
1205 #### policies.json
1206 ```
1207 {
1208 "policies": {
1209 "DisableFirefoxAccounts": true | false
1210 }
1211 }
1212 ```
1213 ### DisableFirefoxStudies
1214 Disable Firefox studies (Shield).
1215
1216 **Compatibility:** Firefox 60, Firefox ESR 60\
1217 **CCK2 Equivalent:** N/A\
1218 **Preferences Affected:** N/A
1219
1220 #### Windows (GPO)
1221 ```
1222 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1223 ```
1224 #### Windows (Intune)
1225 OMA-URI:
1226 ```
1227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1228 ```
1229 Value (string):
1230 ```
1231 <enabled/> or <disabled/>
1232 ```
1233 #### macOS
1234 ```
1235 <dict>
1236 <key>DisableFirefoxStudies</key>
1237 <true/> | <false/>
1238 </dict>
1239 ```
1240 #### policies.json
1241 ```
1242 {
1243 "policies": {
1244 "DisableFirefoxStudies": true | false
1245 }
1246 }
1247 ```
1248 ### DisableForgetButton
1249 Disable the "Forget" button.
1250
1251 **Compatibility:** Firefox 60, Firefox ESR 60\
1252 **CCK2 Equivalent:** `disableForget`\
1253 **Preferences Affected:** N/A
1254
1255 #### Windows (GPO)
1256 ```
1257 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1258 ```
1259 #### Windows (Intune)
1260 OMA-URI:
1261 ```
1262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1263 ```
1264 Value (string):
1265 ```
1266 <enabled/> or <disabled/>
1267 ```
1268 #### macOS
1269 ```
1270 <dict>
1271 <key>DisableForgetButton</key>
1272 <true/> | <false/>
1273 </dict>
1274 ```
1275 #### policies.json
1276 ```
1277 {
1278 "policies": {
1279 "DisableForgetButton": true | false
1280 }
1281 }
1282 ```
1283 ### DisableFormHistory
1284 Turn off saving information on web forms and the search bar.
1285
1286 **Compatibility:** Firefox 60, Firefox ESR 60\
1287 **CCK2 Equivalent:** `disableFormFill`\
1288 **Preferences Affected:** ` browser.formfill.enable`
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1293 ```
1294 #### Windows (Intune)
1295 OMA-URI:
1296 ```
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1298 ```
1299 Value (string):
1300 ```
1301 <enabled/> or <disabled/>
1302 ```
1303 #### macOS
1304 ```
1305 <dict>
1306 <key>DisableFormHistory</key>
1307 <true/> | <false/>
1308 </dict>
1309 ```
1310 #### policies.json
1311 ```
1312 {
1313 "policies": {
1314 "DisableFormHistory": true | false
1315 }
1316 }
1317 ```
1318 ### DisablePasswordReveal
1319 Do not allow passwords to be shown in saved logins
1320
1321 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1322 **CCK2 Equivalent:** N/A
1323 **Preferences Affected:** N/A
1324
1325 #### Windows (GPO)
1326 ```
1327 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1328 ```
1329 #### Windows (Intune)
1330 OMA-URI:
1331 ```
1332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1333 ```
1334 Value (string):
1335 ```
1336 <enabled/> or <disabled/>
1337 ```
1338 #### macOS
1339 ```
1340 <dict>
1341 <key>DisablePasswordReveal</key>
1342 <true/> | <false/>
1343 </dict>
1344 ```
1345 #### policies.json
1346 ```
1347 {
1348 "policies": {
1349 "DisablePasswordReveal": true | false
1350 }
1351 }
1352 ```
1353 ### DisablePocket
1354 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1355
1356 **Compatibility:** Firefox 60, Firefox ESR 60\
1357 **CCK2 Equivalent:** `disablePocket`\
1358 **Preferences Affected:** `extensions.pocket.enabled`
1359
1360 #### Windows (GPO)
1361 ```
1362 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1363 ```
1364 #### Windows (Intune)
1365 OMA-URI:
1366 ```
1367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1368 ```
1369 Value (string):
1370 ```
1371 <enabled/> or <disabled/>
1372 ```
1373 #### macOS
1374 ```
1375 <dict>
1376 <key>DisablePocket</key>
1377 <true/> | <false/>
1378 </dict>
1379 ```
1380 #### policies.json
1381 ```
1382 {
1383 "policies": {
1384 "DisablePocket": true | false
1385 }
1386 }
1387 ```
1388 ### DisablePrivateBrowsing
1389 Remove access to private browsing.
1390
1391 **Compatibility:** Firefox 60, Firefox ESR 60\
1392 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1393 **Preferences Affected:** N/A
1394
1395 #### Windows (GPO)
1396 ```
1397 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1398 ```
1399 #### Windows (Intune)
1400 OMA-URI:
1401 ```
1402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1403 ```
1404 Value (string):
1405 ```
1406 <enabled/> or <disabled/>
1407 ```
1408 #### macOS
1409 ```
1410 <dict>
1411 <key>DisablePrivateBrowsing</key>
1412 <true/> | <false/>
1413 </dict>
1414 ```
1415 #### policies.json
1416 ```
1417 {
1418 "policies": {
1419 "DisablePrivateBrowsing": true | false
1420 }
1421 }
1422 ```
1423 ### DisableProfileImport
1424 Disables the "Import data from another browser" option in the bookmarks window.
1425
1426 **Compatibility:** Firefox 60, Firefox ESR 60\
1427 **CCK2 Equivalent:** N/A\
1428 **Preferences Affected:** N/A
1429
1430 #### Windows (GPO)
1431 ```
1432 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1433 ```
1434 #### Windows (Intune)
1435 OMA-URI:
1436 ```
1437 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1438 ```
1439 Value (string):
1440 ```
1441 <enabled/> or <disabled/>
1442 ```
1443 #### macOS
1444 ```
1445 <dict>
1446 <key>DisableProfileImport</key>
1447 <true/> | <false/>
1448 </dict>
1449 ```
1450 #### policies.json
1451 ```
1452 {
1453 "policies": {
1454 "DisableProfileImport": true | false
1455 }
1456 }
1457 ```
1458 ### DisableProfileRefresh
1459 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1460
1461 **Compatibility:** Firefox 60, Firefox ESR 60\
1462 **CCK2 Equivalent:** `disableResetFirefox`\
1463 **Preferences Affected:** `browser.disableResetPrompt`
1464
1465 #### Windows (GPO)
1466 ```
1467 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1468 ```
1469 #### Windows (Intune)
1470 OMA-URI:
1471 ```
1472 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1473 ```
1474 Value (string):
1475 ```
1476 <enabled/> or <disabled/>
1477 ```
1478 #### macOS
1479 ```
1480 <dict>
1481 <key>DisableProfileRefresh</key>
1482 <true/> | <false/>
1483 </dict>
1484 ```
1485 #### policies.json
1486 ```
1487 {
1488 "policies": {
1489 "DisableProfileRefresh": true | false
1490 }
1491 }
1492 ```
1493 ### DisableSafeMode
1494 Disable safe mode within the browser.
1495
1496 On Windows, this disables safe mode via the command line as well.
1497
1498 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1499 **CCK2 Equivalent:** `disableSafeMode`\
1500 **Preferences Affected:** N/A
1501
1502 #### Windows (GPO)
1503 ```
1504 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1505 ```
1506 #### Windows (Intune)
1507 OMA-URI:
1508 ```
1509 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1510 ```
1511 Value (string):
1512 ```
1513 <enabled/> or <disabled/>
1514 ```
1515 #### macOS
1516 ```
1517 <dict>
1518 <key>DisableSafeMode</key>
1519 <true/> | <false/>
1520 </dict>
1521 ```
1522 #### policies.json
1523 ```
1524 {
1525 "policies": {
1526 "DisableSafeMode": true | false
1527 }
1528 }
1529 ```
1530 ### DisableSecurityBypass
1531 Prevent the user from bypassing security in certain cases.
1532
1533 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1534
1535 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1536
1537 **Compatibility:** Firefox 60, Firefox ESR 60\
1538 **CCK2 Equivalent:** N/A\
1539 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1540
1541 #### Windows (GPO)
1542 ```
1543 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1544 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1545 ```
1546 #### Windows (Intune)
1547 OMA-URI:
1548 ```
1549 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1550 ```
1551 Value (string):
1552 ```
1553 <enabled/> or <disabled/>
1554 ```
1555 OMA-URI:
1556 ```
1557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1558 ```
1559 Value (string):
1560 ```
1561 <enabled/> or <disabled/>
1562 ```
1563
1564 #### macOS
1565 ```
1566 <dict>
1567 <key>DisableSecurityBypass</key>
1568 <dict>
1569 <key>InvalidCertificate</key>
1570 <true/> | <false/>
1571 <key><SafeBrowsing/key>
1572 <true/> | <false/>
1573 </dict>
1574 </dict>
1575 ```
1576 #### policies.json
1577 ```
1578 {
1579 "policies": {
1580 "DisableSecurityBypass": {
1581 "InvalidCertificate": true | false,
1582 "SafeBrowsing": true | false
1583 }
1584 }
1585 }
1586 ```
1587 ### DisableSystemAddonUpdate
1588 Prevent system add-ons from being installed or update.
1589
1590 **Compatibility:** Firefox 60, Firefox ESR 60\
1591 **CCK2 Equivalent:** N/A\
1592 **Preferences Affected:** N/A
1593
1594 #### Windows (GPO)
1595 ```
1596 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1597 ```
1598 #### Windows (Intune)
1599 OMA-URI:
1600 ```
1601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1602 ```
1603 Value (string):
1604 ```
1605 <enabled/> or <disabled/>
1606 ```
1607 #### macOS
1608 ```
1609 <dict>
1610 <key>DisableSystemAddonUpdate</key>
1611 <true/> | <false/>
1612 </dict>
1613 ```
1614 #### policies.json
1615 ```
1616 {
1617 "policies": {
1618 "DisableSystemAddonUpdate": true | false
1619 }
1620 }
1621 ```
1622 ### DisableTelemetry
1623 Prevent the upload of telemetry data.
1624
1625 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1626
1627 **Compatibility:** Firefox 60, Firefox ESR 60\
1628 **CCK2 Equivalent:** `disableTelemetry`\
1629 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1630
1631 #### Windows (GPO)
1632 ```
1633 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1634 ```
1635 #### Windows (Intune)
1636 OMA-URI:
1637 ```
1638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1639 ```
1640 Value (string):
1641 ```
1642 <enabled/> or <disabled/>
1643 ```
1644 #### macOS
1645 ```
1646 <dict>
1647 <key>DisableTelemetry</key>
1648 <true/> | <false/>
1649 </dict>
1650 ```
1651 #### policies.json
1652 ```
1653 {
1654 "policies": {
1655 "DisableTelemetry": true | false
1656 }
1657 }
1658 ```
1659 ### DisplayBookmarksToolbar
1660 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1661
1662 **Compatibility:** Firefox 60, Firefox ESR 60\
1663 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1664 **Preferences Affected:** N/A
1665
1666 #### Windows (GPO)
1667 ```
1668 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1669 ```
1670 #### Windows (Intune)
1671 OMA-URI:
1672 ```
1673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1674 ```
1675 Value (string):
1676 ```
1677 <enabled/> or <disabled/>
1678 ```
1679 #### macOS
1680 ```
1681 <dict>
1682 <key>DisplayBookmarksToolbar</key>
1683 <true/> | <false/>
1684 </dict>
1685 ```
1686 #### policies.json
1687 ```
1688 {
1689 "policies": {
1690 "DisplayBookmarksToolbar": true | false
1691 }
1692 }
1693 ```
1694 ### DisplayMenuBar (Deprecated)
1695 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1696
1697 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1698 **CCK2 Equivalent:** `displayMenuBar`\
1699 **Preferences Affected:** N/A
1700
1701 #### Windows (GPO)
1702 ```
1703 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1704 ```
1705 #### macOS
1706 ```
1707 <dict>
1708 <key>DisplayMenuBar</key>
1709 <true/> | <false/>
1710 </dict>
1711 ```
1712 #### policies.json
1713 ```
1714 {
1715 "policies": {
1716 "DisplayMenuBar": true | false
1717 }
1718 }
1719 ```
1720 ### DisplayMenuBar
1721 Set the state of the menubar.
1722
1723 `always` means the menubar is shown and cannot be hidden.
1724
1725 `never` means the menubar is hidden and cannot be shown.
1726
1727 `default-on` means the menubar is on by default but can be hidden.
1728
1729 `default-off` means the menubar is off by default but can be shown.
1730
1731 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1732 **CCK2 Equivalent:** `displayMenuBar`\
1733 **Preferences Affected:** N/A
1734
1735 #### Windows (GPO)
1736 ```
1737 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1738 ```
1739 #### Windows (Intune)
1740 OMA-URI:
1741 ```
1742 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1743 ```
1744 Value (string):
1745 ```
1746 <enabled/>
1747 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1748 ```
1749 #### macOS
1750 ```
1751 <dict>
1752 <key>DisplayMenuBar</key>
1753 <string>always | never | default-on | default-off</string>
1754 </dict>
1755 ```
1756 #### policies.json
1757 ```
1758 {
1759 "policies": {
1760 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1761 }
1762 }
1763 ```
1764 ### DNSOverHTTPS
1765 Configure DNS over HTTPS.
1766
1767 `Enabled` determines whether DNS over HTTPS is enabled
1768
1769 `ProviderURL` is a URL to another provider.
1770
1771 `Locked` prevents the user from changing DNS over HTTPS preferences.
1772
1773 `ExcludedDomains` excludes domains from DNS over HTTPS.
1774
1775 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1776 **CCK2 Equivalent:** N/A\
1777 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1778
1779 #### Windows (GPO)
1780 ```
1781 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1785 ```
1786 #### Windows (Intune)
1787 OMA-URI:
1788 ```
1789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1790 ```
1791 Value (string):
1792 ```
1793 <enabled/> or <disabled/>
1794 ```
1795 OMA-URI:
1796 ```
1797 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1798 ```
1799 Value (string):
1800 ```
1801 <enabled/>
1802 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1803 ```
1804 OMA-URI:
1805 ```
1806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1807 ```
1808 Value (string):
1809 ```
1810 <enabled/> or <disabled/>
1811 ```
1812 OMA-URI:
1813 ```
1814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1815 ```
1816 Value (string):
1817 ```
1818 <enabled/>
1819 <data id="List" value="1&#xF000;example.com"/>
1820 ```
1821 #### macOS
1822 ```
1823 <dict>
1824 <key>DNSOverHTTPS</key>
1825 <dict>
1826 <key>Enabled</key>
1827 <true/> | <false/>
1828 <key>ProviderURL</key>
1829 <string>URL_TO_ALTERNATE_PROVIDER</string>
1830 <key>Locked</key>
1831 <true/> | <false/>
1832 <key>ExcludedDomains</key>
1833 <array>
1834 <string>example.com</string>
1835 </array>
1836 </dict>
1837 </dict>
1838 ```
1839 #### policies.json
1840 ```
1841 {
1842 "policies": {
1843 "DNSOverHTTPS": {
1844 "Enabled": true | false,
1845 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1846 "Locked": true | false,
1847 "ExcludedDomains": ["example.com"]
1848 }
1849 }
1850 }
1851 ```
1852 ### DontCheckDefaultBrowser
1853 Don't check if Firefox is the default browser at startup.
1854
1855 **Compatibility:** Firefox 60, Firefox ESR 60\
1856 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1857 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1858
1859 #### Windows (GPO)
1860 ```
1861 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1862 ```
1863 #### Windows (Intune)
1864 OMA-URI:
1865 ```
1866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1867 ```
1868 Value (string):
1869 ```
1870 <enabled/> or <disabled/>
1871 ```
1872 #### macOS
1873 ```
1874 <dict>
1875 <key>DontCheckDefaultBrowser</key>
1876 <true/> | <false/>
1877 </dict>
1878 ```
1879 #### policies.json
1880 ```
1881 {
1882 "policies": {
1883 "DontCheckDefaultBrowser": true | false
1884 }
1885 }
1886 ```
1887 ### DefaultDownloadDirectory
1888 Set the default download directory.
1889
1890 You can use ${home} for the native home directory.
1891
1892 **Compatibility:** Firefox 68, Firefox ESR 68\
1893 **CCK2 Equivalent:** N/A\
1894 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1895
1896 #### Windows (GPO)
1897 ```
1898 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1899 ```
1900 #### Windows (Intune)
1901 OMA-URI:
1902 ```
1903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1904 ```
1905 Value (string):
1906 ```
1907 <enabled/>
1908 <data id="Preferences_String" value="${home}\Downloads"/>
1909 ```
1910 #### macOS
1911 ```
1912 <dict>
1913 <key>DefaultDownloadDirectory</key>
1914 <string>${home}/Downloads</string>
1915 </dict>
1916 ```
1917 #### policies.json (macOS and Linux)
1918 ```
1919 {
1920 "policies": {
1921 "DefaultDownloadDirectory": "${home}/Downloads"
1922 }
1923 ```
1924 #### policies.json (Windows)
1925 ```
1926 {
1927 "policies": {
1928 "DefaultDownloadDirectory": "${home}\\Downloads"
1929 }
1930 ```
1931 ### DownloadDirectory
1932 Set and lock the download directory.
1933
1934 You can use ${home} for the native home directory.
1935
1936 **Compatibility:** Firefox 68, Firefox ESR 68\
1937 **CCK2 Equivalent:** N/A\
1938 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1939
1940 #### Windows (GPO)
1941 ```
1942 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1943 ```
1944 #### Windows (Intune)
1945 OMA-URI:
1946 ```
1947 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1948 ```
1949 Value (string):
1950 ```
1951 <enabled/>
1952 <data id="Preferences_String" value="${home}\Downloads"/>
1953 ```
1954 #### macOS
1955 ```
1956 <dict>
1957 <key>DownloadDirectory</key>
1958 <string>${home}/Downloads</string>
1959 </dict>
1960 ```
1961 #### policies.json (macOS and Linux)
1962 ```
1963 {
1964 "policies": {
1965 "DownloadDirectory": "${home}/Downloads"
1966 }
1967 ```
1968 #### policies.json (Windows)
1969 ```
1970 {
1971 "policies": {
1972 "DownloadDirectory": "${home}\\Downloads"
1973 }
1974 ```
1975 ### EnableTrackingProtection
1976 Configure tracking protection.
1977
1978 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1979
1980 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1981
1982 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1983
1984 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1985
1986 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1987
1988 `Exceptions` are origins for which tracking protection is not enabled.
1989
1990 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1991 **CCK2 Equivalent:** N/A\
1992 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1993
1994 #### Windows (GPO)
1995 ```
1996 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2001 ```
2002 #### Windows (Intune)
2003 OMA-URI:
2004 ```
2005 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2006 ```
2007 Value (string):
2008 ```
2009 <enabled/>
2010 <data id="TrackingProtectionLocked" value="true | false"/>
2011 <data id="Cryptomining" value="true | false"/>
2012 <data id="Fingerprinting" value="true | false"/>
2013 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2014 ```
2015 #### macOS
2016 ```
2017 <dict>
2018 <key>EnableTrackingProtection</key>
2019 <dict>
2020 <key>Value</key>
2021 <true/> | <false/>
2022 <key><Locked</key>
2023 <true/> | <false/>
2024 <key><Cryptomining</key>
2025 <true/> | <false/>
2026 <key><Fingerprinting</key>
2027 <true/> | <false/>
2028 <key>Exceptions</key>
2029 <array>
2030 <string>https://example.com</string>
2031 </array>
2032 </dict>
2033 </dict>
2034 ```
2035 #### policies.json
2036 ```
2037 {
2038 "policies": {
2039 "EnableTrackingProtection": {
2040 "Value": true | false,
2041 "Locked": true | false,
2042 "Cryptomining": true | false,
2043 "Fingerprinting": true | false,
2044 "Exceptions": ["https://example.com"]
2045 }
2046 }
2047 ```
2048 ### EncryptedMediaExtensions
2049 Enable or disable Encrypted Media Extensions and optionally lock it.
2050
2051 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2052
2053 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2054
2055 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2056 **CCK2 Equivalent:** N/A\
2057 **Preferences Affected:** `media.eme.enabled`
2058
2059 #### Windows (GPO)
2060 ```
2061 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2062 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2063 ```
2064 #### Windows (Intune)
2065 OMA-URI:
2066 ```
2067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2069 ```
2070 Value (string):
2071 ```
2072 <enabled/>or <disabled/>
2073 ```
2074 #### macOS
2075 ```
2076 <dict>
2077 <key>EncryptedMediaExtensions</key>
2078 <dict>
2079 <key>Enabled</key>
2080 <true/> | <false/>
2081 <key><Locked</key>
2082 <true/> | <false/>
2083 </dict>
2084 </dict>
2085 ```
2086 #### policies.json
2087 ```
2088 {
2089 "policies": {
2090 "EncryptedMediaExtensions": {
2091 "Enabled": true | false,
2092 "Locked": true | false
2093 }
2094 }
2095 ```
2096 ### EnterprisePoliciesEnabled
2097 Enable policy support on macOS.
2098
2099 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2100 **CCK2 Equivalent:** N/A\
2101 **Preferences Affected:** N/A
2102
2103 #### macOS
2104 ```
2105 <dict>
2106 <key>EnterprisePoliciesEnabled</key>
2107 <true/>
2108 </dict>
2109 ```
2110 ### Extensions
2111 Control the installation, uninstallation and locking of extensions.
2112
2113 `Install` is a list of URLs or native paths for extensions to be installed.
2114
2115 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2116
2117 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2118
2119 **Compatibility:** Firefox 60, Firefox ESR 60\
2120 **CCK2 Equivalent:** `addons`\
2121 **Preferences Affected:** N/A
2122
2123 #### Windows (GPO)
2124 ```
2125 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2126 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2127 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2128 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2129 ```
2130 #### macOS
2131 ```
2132 <dict>
2133 <key>Extensions</key>
2134 <dict>
2135 <key>Install</key>
2136 <array>
2137 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2138 <string>//path/to/xpi</string>
2139 </array>
2140 <key>Uninstall</key>
2141 <array>
2142 <string>bad_addon_id@mozilla.org</string>
2143 </array>
2144 <key>Locked</key>
2145 <array>
2146 <string>addon_id@mozilla.org</string>
2147 </array>
2148 </dict>
2149 </dict>
2150 ```
2151 #### policies.json
2152 ```
2153 {
2154 "policies": {
2155 "Extensions": {
2156 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2157 "Uninstall": ["bad_addon_id@mozilla.org"],
2158 "Locked": ["addon_id@mozilla.org"]
2159 }
2160 }
2161 }
2162 ```
2163 ### ExtensionSettings
2164 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2165
2166 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2167
2168 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2169
2170 The configuration for each extension is another dictionary that can contain the fields documented below.
2171
2172 | Name | Description |
2173 | --- | --- |
2174 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2175 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2176 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2178 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2179 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2180 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2181 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2182 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2183 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2184
2185 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2186 **CCK2 Equivalent:** N/A\
2187 **Preferences Affected:** N/A
2188
2189 #### Windows (GPO)
2190 ```
2191 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2192 {
2193 "*": {
2194 "blocked_install_message": "Custom error message.",
2195 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2196 "installation_mode": "blocked",
2197 "allowed_types": ["extension"]
2198 },
2199 "uBlock0@raymondhill.net": {
2200 "installation_mode": "force_installed",
2201 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2202 }
2203 }
2204 ```
2205 #### Windows (Intune)
2206 OMA-URI:
2207 ```
2208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2209 ```
2210 Value (string):
2211 ```
2212 <enabled/>
2213 <data id="ExtensionSettings" value='
2214 "*": {
2215 "blocked_install_message": "Custom error message.",
2216 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2217 "installation_mode": "blocked",
2218 "allowed_types": ["extension"]
2219 },
2220 "uBlock0@raymondhill.net": {
2221 "installation_mode": "force_installed",
2222 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2223 }'/>
2224 ```
2225 #### macOS
2226 ```
2227 <dict>
2228 <key>ExtensionSettings</key>
2229 <dict>
2230 <key>*</key>
2231 <dict>
2232 <key>blocked_install_message</key>
2233 <string>Custom error message.</string>
2234 <key>install_sources</key>
2235 <array>
2236 <string>about:addons</string>
2237 <string>https://addons.mozilla.org/</string>
2238 </array>
2239 <key>installation_mode</key>
2240 <string>blocked</string>
2241 <key>allowed_types</key>
2242 <array>
2243 <string>extension</string>
2244 </array>
2245 </dict>
2246 <key>uBlock0@raymondhill.net</key>
2247 <dict>
2248 <key>installation_mode</key>
2249 <string>force_installed</string>
2250 <key>install_url</key>
2251 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2252 </dict>
2253 </dict>
2254 </dict>
2255 ```
2256 #### policies.json
2257 ```
2258 {
2259 "policies": {
2260 "ExtensionSettings": {
2261 "*": {
2262 "blocked_install_message": "Custom error message.",
2263 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2264 "installation_mode": "blocked",
2265 "allowed_types": ["extension"]
2266 },
2267 "uBlock0@raymondhill.net": {
2268 "installation_mode": "force_installed",
2269 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2270 }
2271 }
2272 }
2273 }
2274 ```
2275 ### ExtensionUpdate
2276 Control extension updates.
2277
2278 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2279 **CCK2 Equivalent:** N/A\
2280 **Preferences Affected:** `extensions.update.enabled`
2281
2282 #### Windows (GPO)
2283 ```
2284 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2285 ```
2286 #### Windows (Intune)
2287 OMA-URI:
2288 ```
2289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2290 ```
2291 Value (string):
2292 ```
2293 <enabled/> or <disabled/>
2294 ```
2295 #### macOS
2296 ```
2297 <dict>
2298 <key>ExtensionUpdate</key>
2299 <true/> | <false/>
2300 </dict>
2301 ```
2302 #### policies.json
2303 ```
2304 {
2305 "policies": {
2306 "ExtensionUpdate": true | false
2307 }
2308 }
2309 ```
2310 ### FlashPlugin
2311 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2312
2313 `Allow` is a list of origins where Flash are allowed.
2314
2315 `Block` is a list of origins where Flash is not allowed.
2316
2317 `Default` determines whether or not Flash is allowed by default.
2318
2319 `Locked` prevents the user from changing Flash preferences.
2320
2321 **Compatibility:** Firefox 60, Firefox ESR 60\
2322 **CCK2 Equivalent:** `permissions.plugin`\
2323 **Preferences Affected:** `plugin.state.flash`
2324
2325 #### Windows (GPO)
2326 ```
2327 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2328 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2329 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2330 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2331 ```
2332 #### Windows (Intune)
2333 OMA-URI:
2334 ```
2335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2336 ```
2337 Value (string):
2338 ```
2339 <enabled/>
2340 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2341 ```
2342 OMA-URI:
2343 ```
2344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2345 ```
2346 Value (string):
2347 ```
2348 <enabled/> or <disabled/>
2349 ```
2350 OMA-URI:
2351 ```
2352 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2353 ```
2354 Value (string):
2355 ```
2356 <enabled/> or <disabled/>
2357 ```
2358 #### macOS
2359 ```
2360 <dict>
2361 <key>FlashPlugin</key>
2362 <dict>
2363 <key>Allow</key>
2364 <array>
2365 <string>http://example.org</string>
2366 </array>
2367 <key>Block</key>
2368 <array>
2369 <string>http://example.edu</string>
2370 </array>
2371 <key>Default</key>
2372 <true/> | <false/>
2373 <key>Locked</key>
2374 <true/> | <false/>
2375 </dict>
2376 </dict>
2377 ```
2378 #### policies.json
2379 ```
2380 {
2381 "policies": {
2382 "FlashPlugin": {
2383 "Allow": ["http://example.org/"],
2384 "Block": ["http://example.edu/"],
2385 "Default": true | false,
2386 "Locked": true | false
2387 }
2388 }
2389 }
2390 ```
2391
2392
2393
2394 ### Handlers
2395 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2396
2397 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2398
2399 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2400
2401 | Name | Description |
2402 | --- | --- |
2403 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2404 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2405 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2406 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2407 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2408 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2409
2410 **Compatibility:** Firefox 78, Firefox ESR 78\
2411 **CCK2 Equivalent:** N/A\
2412 **Preferences Affected:** N/A
2413
2414 #### Windows (GPO)
2415 ```
2416 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2417 {
2418 "mimeTypes": {
2419 "application/msword": {
2420 "action": "useSystemDefault",
2421 "ask": true | false
2422 }
2423 },
2424 "schemes": {
2425 "mailto": {
2426 "action": "useHelperApp",
2427 "ask": true | false,
2428 "handlers": [{
2429 "name": "Gmail",
2430 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2431 }]
2432 }
2433 },
2434 "extensions": {
2435 "pdf": {
2436 "action": "useHelperApp",
2437 "ask": true | false,
2438 "handlers": [{
2439 "name": "Adobe Acrobat",
2440 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2441 }]
2442 }
2443 }
2444 }
2445 ```
2446 #### Windows (Intune)
2447 OMA-URI:
2448 ```
2449 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2450 ```
2451 Value (string):
2452 ```
2453 <enabled/>
2454 <data id="Handlers" value='
2455 {
2456 "mimeTypes": {
2457 "application/msword": {
2458 "action": "useSystemDefault",
2459 "ask": true | false
2460 }
2461 },
2462 "schemes": {
2463 "mailto": {
2464 "action": "useHelperApp",
2465 "ask": true | false,
2466 "handlers": [{
2467 "name": "Gmail",
2468 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2469 }]
2470 }
2471 },
2472 "extensions": {
2473 "pdf": {
2474 "action": "useHelperApp",
2475 "ask": true | false,
2476 "handlers": [{
2477 "name": "Adobe Acrobat",
2478 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2479 }]
2480 }
2481 }
2482 }
2483 '/>
2484 ```
2485 #### macOS
2486 ```
2487 <dict>
2488 <key>Handlers</key>
2489 <dict>
2490 <key>mimeTypes</key>
2491 <dict>
2492 <key>application/msword</key>
2493 <dict>
2494 <key>action</key>
2495 <string>useSystemDefault</string>
2496 <key>ask</key>
2497 <true/> | <false/>
2498 </dict>
2499 </dict>
2500 <key>schemes</key>
2501 <dict>
2502 <key>mailto</key>
2503 <dict>
2504 <key>action</key>
2505 <string>useHelperApp</string>
2506 <key>ask</key>
2507 <true/> | <false/>
2508 <key>handlers</key>
2509 <array>
2510 <dict>
2511 <key>name</key>
2512 <string>Gmail</string>
2513 <key>uriTemplate</key>
2514 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2515 </dict>
2516 </array>
2517 </dict>
2518 </dict>
2519 <key>extensions</key>
2520 <dict>
2521 <key>pdf</key>
2522 <dict>
2523 <key>action</key>
2524 <string>useHelperApp</string>
2525 <key>ask</key>
2526 <true/> | <false/>
2527 <key>handlers</key>
2528 <array>
2529 <dict>
2530 <key>name</key>
2531 <string>Adobe Acrobat</string>
2532 <key>path</key>
2533 <string>/System/Applications/Preview.app</string>
2534 </dict>
2535 </array>
2536 </dict>
2537 </dict>
2538 </dict>
2539 </dict>
2540 ```
2541 #### policies.json
2542 ```
2543 {
2544 "mimeTypes": {
2545 "application/msword": {
2546 "action": "useSystemDefault",
2547 "ask": false
2548 }
2549 },
2550 "schemes": {
2551 "mailto": {
2552 "action": "useHelperApp",
2553 "ask": true | false,
2554 "handlers": [{
2555 "name": "Gmail",
2556 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2557 }]
2558 }
2559 },
2560 "extensions": {
2561 "pdf": {
2562 "action": "useHelperApp",
2563 "ask": true | false,
2564 "handlers": [{
2565 "name": "Adobe Acrobat",
2566 "path": "/usr/bin/acroread"
2567 }]
2568 }
2569 }
2570 }
2571 ```
2572 ### FirefoxHome
2573 Customize the Firefox Home page.
2574
2575 **Compatibility:** Firefox 68, Firefox ESR 68\
2576 **CCK2 Equivalent:** N/A\
2577 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2578
2579 #### Windows (GPO)
2580 ```
2581 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2582 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2583 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2584 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2585 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2586 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2587 ```
2588 #### Windows (Intune)
2589 OMA-URI:
2590 ```
2591 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2592 ```
2593 Value (string):
2594 ```
2595 <enabled/>
2596 <data id="FirefoxHome_Search" value="true | false"/>
2597 <data id="FirefoxHome_TopSites" value="true | false"/>
2598 <data id="FirefoxHome_Highlights" value="true | false"/>
2599 <data id="FirefoxHome_Pocket" value="true | false"/>
2600 <data id="FirefoxHome_Snippets" value="true | false"/>
2601 <data id="FirefoxHome_Locked" value="true | false"/>
2602 ```
2603 #### macOS
2604 ```
2605 <dict>
2606 <key>FirefoxHome</key>
2607 <dict>
2608 <key>Search</key>
2609 <true/> | <false/>
2610 <key>TopSites</key>
2611 <true/> | <false/>
2612 <key>Highlights</key>
2613 <true/> | <false/>
2614 <key>Pocket</key>
2615 <true/> | <false/>
2616 <key>Snippets</key>
2617 <true/> | <false/>
2618 <key>Locked</key>
2619 <true/> | <false/>
2620 </dict>
2621 </dict>
2622 ```
2623 #### policies.json
2624 ```
2625 {
2626 "policies": {
2627 "FirefoxHome": {
2628 "Search": true | false,
2629 "TopSites": true | false,
2630 "Highlights": true | false,
2631 "Pocket": true | false,
2632 "Snippets": true | false,
2633 "Locked": true | false
2634 }
2635 }
2636 }
2637 ```
2638 ### HardwareAcceleration
2639 Control hardware acceleration.
2640
2641 **Compatibility:** Firefox 60, Firefox ESR 60\
2642 **CCK2 Equivalent:** N/A\
2643 **Preferences Affected:** `layers.acceleration.disabled`
2644
2645 #### Windows (GPO)
2646 ```
2647 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2648 ```
2649 #### Windows (Intune)
2650 OMA-URI:
2651 ```
2652 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2653 ```
2654 Value (string):
2655 ```
2656 <enabled/> or <disabled/>
2657 ```
2658 #### macOS
2659 ```
2660 <dict>
2661 <key>HardwareAcceleration</key>
2662 <true/> | <false/>
2663 </dict>
2664 ```
2665 #### policies.json
2666 ```
2667 {
2668 "policies": {
2669 "HardwareAcceleration": true | false
2670 }
2671 }
2672 ```
2673 ### Homepage
2674 Configure the default homepage and how Firefox starts.
2675
2676 `URL` is the default homepage.
2677
2678 `Locked` prevents the user from changing homepage preferences.
2679
2680 `Additional` allows for more than one homepage.
2681
2682 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2683
2684 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2685
2686 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2687 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2688 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2689
2690 #### Windows (GPO)
2691 ```
2692 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2693 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2694 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2695 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2696 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2697 ```
2698 #### Windows (Intune)
2699 OMA-URI:
2700 ```
2701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2702 ```
2703 Value (string):
2704 ```
2705 <enabled/>
2706
2707 <data id="HomepageURL" value="https://example.com"/>
2708 <data id="HomepageLocked" value="true | false"/>
2709 ```
2710 OMA-URI:
2711 ```
2712 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2713 ```
2714 Value (string):
2715 ```
2716 <enabled/>
2717
2718 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2719 ```
2720 OMA-URI:
2721 ```
2722 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2723 ```
2724 Value (string):
2725 ```
2726 <enabled/>
2727
2728 <data id="StartPage" value="none | homepage | previous-session"/>
2729 ```
2730 #### macOS
2731 ```
2732 <dict>
2733 <key>Homepage</key>
2734 <dict>
2735 <key>URL</key>
2736 <string>http://example.com</string>
2737 <key>Locked</key>
2738 <true/> | <false/>
2739 <key>Additional</key>
2740 <array>
2741 <string>http://example.org</string>
2742 <string>http://example.edu</string>
2743 </array>
2744 <key>StartPage</key>
2745 <string>none | homepage | previous-session | homepage-locked</string>
2746 </dict>
2747 </dict>
2748 ```
2749 #### policies.json
2750 ```
2751 {
2752 "policies": {
2753 "Homepage": {
2754 "URL": "http://example.com/",
2755 "Locked": true | false,
2756 "Additional": ["http://example.org/",
2757 "http://example.edu/"],
2758 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2759 }
2760 }
2761 }
2762 ```
2763 ### InstallAddonsPermission
2764 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2765
2766 `Allow` is a list of origins where extension installs are allowed.
2767
2768 `Default` determines whether or not extension installs are allowed by default.
2769
2770 **Compatibility:** Firefox 60, Firefox ESR 60\
2771 **CCK2 Equivalent:** `permissions.install`\
2772 **Preferences Affected:** `xpinstall.enabled`
2773
2774 #### Windows (GPO)
2775 ```
2776 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2777 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2778 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2779 ```
2780 #### Windows (Intune)
2781 OMA-URI:
2782 ```
2783 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2784 ```
2785 Value (string):
2786 ```
2787 <enabled/>
2788 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2789 ```
2790 OMA-URI:
2791 ```
2792 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2793 ```
2794 Value (string):
2795 ```
2796 <enabled/>
2797 ```
2798 #### macOS
2799 ```
2800 <dict>
2801 <key>InstallAddonsPermission</key>
2802 <dict>
2803 <key>Allow</key>
2804 <array>
2805 <string>http://example.org</string>
2806 <string>http://example.edu</string>
2807 </array>
2808 <key>Default</key>
2809 <true/> | <false/>
2810 </dict>
2811 </dict>
2812 ```
2813 #### policies.json
2814 ```
2815 {
2816 "policies": {
2817 "InstallAddonsPermission": {
2818 "Allow": ["http://example.org/",
2819 "http://example.edu/"],
2820 "Default": true | false
2821 }
2822 }
2823 }
2824 ```
2825 ### LegacyProfiles
2826 Disable the feature enforcing a separate profile for each installation.
2827
2828 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2829
2830 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2831
2832 This policy only work on Windows via GPO (not policies.json).
2833
2834 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2835 **CCK2 Equivalent:** N/A\
2836 **Preferences Affected:** N/A
2837
2838 #### Windows (GPO)
2839 ```
2840 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2841 ```
2842 #### Windows (Intune)
2843 OMA-URI:
2844 ```
2845 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2846 ```
2847 Value (string):
2848 ```
2849 <enabled/> or <disabled/>
2850 ```
2851 ### LocalFileLinks
2852 Enable linking to local files by origin.
2853
2854 **Compatibility:** Firefox 68, Firefox ESR 68\
2855 **CCK2 Equivalent:** N/A\
2856 **Preferences Affected:** `capability.policy.localfilelinks.*`
2857
2858 #### Windows (GPO)
2859 ```
2860 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2861 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2862 ```
2863 #### Windows (Intune)
2864 OMA-URI:
2865 ```
2866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2867 ```
2868 Value (string):
2869 ```
2870 <enabled/>
2871 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2872 ```
2873 #### macOS
2874 ```
2875 <dict>
2876 <key>LocalFileLinks</key>
2877 <array>
2878 <string>http://example.org</string>
2879 <string>http://example.edu</string>
2880 </array>
2881 </dict>
2882 ```
2883 #### policies.json
2884 ```
2885 {
2886 "policies": {
2887 "LocalFileLinks": ["http://example.org/",
2888 "http://example.edu/"]
2889 }
2890 }
2891 ```
2892 ### MasterPassword
2893 Require or prevent using a master password.
2894
2895 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2896
2897 **Compatibility:** Firefox 78, Firefox ESR 78\
2898 **CCK2 Equivalent:** `noMasterPassword`\
2899 **Preferences Affected:** N/A
2900
2901 #### Windows (GPO)
2902 ```
2903 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2904 ```
2905 #### Windows (Intune)
2906 OMA-URI:
2907 ```
2908 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2909 ```
2910 Value (string):
2911 ```
2912 <enabled/> or <disabled/>
2913 ```
2914 #### macOS
2915 ```
2916 <dict>
2917 <key>MasterPassword</key>
2918 <true/> | <false/>
2919 </dict>
2920 ```
2921 #### policies.json
2922 ```
2923 {
2924 "policies": {
2925 "MasterPassword": true | false
2926 }
2927 }
2928 ```
2929 ### NetworkPrediction
2930 Enable or disable network prediction (DNS prefetching).
2931
2932 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2933 **CCK2 Equivalent:** N/A\
2934 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2935
2936 #### Windows (GPO)
2937 ```
2938 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2939 ```
2940 #### Windows (Intune)
2941 OMA-URI:
2942 ```
2943 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2944 ```
2945 Value (string):
2946 ```
2947 <enabled/> or <disabled/>
2948 ```
2949 #### macOS
2950 ```
2951 <dict>
2952 <key>NetworkPrediction</key>
2953 <true/> | <false/>
2954 </dict>
2955 ```
2956 #### policies.json
2957 ```
2958 {
2959 "policies": {
2960 "NetworkPrediction": true | false
2961 }
2962 ```
2963 ### NewTabPage
2964 Enable or disable the New Tab page.
2965
2966 **Compatibility:** Firefox 68, Firefox ESR 68\
2967 **CCK2 Equivalent:** N/A\
2968 **Preferences Affected:** `browser.newtabpage.enabled`
2969
2970 #### Windows (GPO)
2971 ```
2972 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2973 ```
2974 #### Windows (Intune)
2975 OMA-URI:
2976 ```
2977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2978 ```
2979 Value (string):
2980 ```
2981 <enabled/> or <disabled/>
2982 ```
2983 #### macOS
2984 ```
2985 <dict>
2986 <key>NewTabPage</key>
2987 <true/> | <false/>
2988 </dict>
2989 ```
2990 #### policies.json
2991 ```
2992 {
2993 "policies": {
2994 "NewTabPage": true | false
2995 }
2996 ```
2997 ### NoDefaultBookmarks
2998 Disable the creation of default bookmarks.
2999
3000 This policy is only effective if the user profile has not been created yet.
3001
3002 **Compatibility:** Firefox 60, Firefox ESR 60\
3003 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3004 **Preferences Affected:** N/A
3005
3006 #### Windows (GPO)
3007 ```
3008 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3009 ```
3010 #### Windows (Intune)
3011 OMA-URI:
3012 ```
3013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3014 ```
3015 Value (string):
3016 ```
3017 <enabled/> or <disabled/>
3018 ```
3019 #### macOS
3020 ```
3021 <dict>
3022 <key>NoDefaultBookmarks</key>
3023 <true/> | <false/>
3024 </dict>
3025 ```
3026 #### policies.json
3027 ```
3028 {
3029 "policies": {
3030 "NoDefaultBookmarks": true | false
3031 }
3032 }
3033 ```
3034 ### OfferToSaveLogins
3035 Control whether or not Firefox offers to save passwords.
3036
3037 **Compatibility:** Firefox 60, Firefox ESR 60\
3038 **CCK2 Equivalent:** `dontRememberPasswords`\
3039 **Preferences Affected:** `signon.rememberSignons`
3040
3041 #### Windows (GPO)
3042 ```
3043 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3044 ```
3045 #### Windows (Intune)
3046 OMA-URI:
3047 ```
3048 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3049 ```
3050 Value (string):
3051 ```
3052 <enabled/> or <disabled/>
3053 ```
3054 #### macOS
3055 ```
3056 <dict>
3057 <key>OfferToSaveLogins</key>
3058 <true/> | <false/>
3059 </dict>
3060 ```
3061 #### policies.json
3062 ```
3063 {
3064 "policies": {
3065 "OfferToSaveLogins": true | false
3066 }
3067 }
3068 ```
3069 ### OfferToSaveLoginsDefault
3070 Sets the default value of signon.rememberSignons without locking it.
3071
3072 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3073 **CCK2 Equivalent:** `dontRememberPasswords`\
3074 **Preferences Affected:** `signon.rememberSignons`
3075
3076 #### Windows (GPO)
3077 ```
3078 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3079 ```
3080 #### Windows (Intune)
3081 OMA-URI:
3082 ```
3083 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3084 ```
3085 Value (string):
3086 ```
3087 <enabled/> or <disabled/>
3088 ```
3089 #### macOS
3090 ```
3091 <dict>
3092 <key>OfferToSaveLoginsDefault</key>
3093 <true/> | <false/>
3094 </dict>
3095 ```
3096 #### policies.json
3097 ```
3098 {
3099 "policies": {
3100 "OfferToSaveLoginsDefault": true | false
3101 }
3102 }
3103 ```
3104 ### OverrideFirstRunPage
3105 Override the first run page. If the value is blank, no first run page is displayed.
3106
3107 **Compatibility:** Firefox 60, Firefox ESR 60\
3108 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3109 **Preferences Affected:** `startup.homepage_welcome_url`
3110
3111 #### Windows (GPO)
3112 ```
3113 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3114 ```
3115 #### Windows (Intune)
3116 OMA-URI:
3117 ```
3118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3119 ```
3120 Value (string):
3121 ```
3122 <enabled/>
3123 <data id="OverridePage" value="https://example.com"/>
3124 ```
3125 #### macOS
3126 ```
3127 <dict>
3128 <key>OverrideFirstRunPage</key>
3129 <string>http://example.org</string>
3130 </dict>
3131 ```
3132 #### policies.json
3133 ```
3134 {
3135 "policies": {
3136 "OverrideFirstRunPage": "http://example.org"
3137 }
3138 ```
3139 ### OverridePostUpdatePage
3140 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3141
3142 **Compatibility:** Firefox 60, Firefox ESR 60\
3143 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3144 **Preferences Affected:** `startup.homepage_override_url`
3145
3146 #### Windows (GPO)
3147 ```
3148 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3149 ```
3150 #### Windows (Intune)
3151 OMA-URI:
3152 ```
3153 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3154 ```
3155 Value (string):
3156 ```
3157 <enabled/>
3158 <data id="OverridePage" value="https://example.com"/>
3159 ```
3160 #### macOS
3161 ```
3162 <dict>
3163 <key>OverridePostUpdatePage</key>
3164 <string>http://example.org</string>
3165 </dict>
3166 ```
3167 #### policies.json
3168 ```
3169 {
3170 "policies": {
3171 "OverridePostUpdatePage": "http://example.org"
3172 }
3173 ```
3174 ### PasswordManagerEnabled
3175 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3176
3177 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3178 **CCK2 Equivalent:** N/A\
3179 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3180
3181 #### Windows (GPO)
3182 ```
3183 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3184 ```
3185 #### Windows (Intune)
3186 OMA-URI:
3187 ```
3188 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3189 ```
3190 Value (string):
3191 ```
3192 <enabled/> or <disabled/>
3193 ```
3194 #### macOS
3195 ```
3196 <dict>
3197 <key>PasswordManagerEnabled</key>
3198 <true/> | <false/>
3199 </dict>
3200 ```
3201 #### policies.json
3202 ```
3203 {
3204 "policies": {
3205 "PasswordManagerEnabled": true | false
3206 }
3207 }
3208 ```
3209 ### PDFjs
3210 Disable or configure PDF.js, the built-in PDF viewer.
3211
3212 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3213
3214 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3215
3216 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3217
3218 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3219 **CCK2 Equivalent:** N/A\
3220 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3221
3222 #### Windows (GPO)
3223 ```
3224 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3225 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3226 ```
3227 #### Windows (Intune)
3228 OMA-URI:
3229 ```
3230 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3231 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3232 ```
3233 Value (string):
3234 ```
3235 <enabled/>or <disabled/>
3236 ```
3237 #### macOS
3238 ```
3239 <dict>
3240 <key>PDFjs</key>
3241 <dict>
3242 <key>Enabled</key>
3243 <true/> | <false/>
3244 <key><EnablePermissions</key>
3245 <true/> | <false/>
3246 </dict>
3247 </dict>
3248 ```
3249 #### policies.json
3250 ```
3251 {
3252 "policies": {
3253 "PSFjs": {
3254 "Enabled": true | false,
3255 "EnablePermissions": true | false
3256 }
3257 }
3258 ```
3259 ### Permissions
3260 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3261
3262 `Allow` is a list of origins where the feature is allowed.
3263
3264 `Block` is a list of origins where the feature is not allowed.
3265
3266 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3267
3268 `Locked` prevents the user from changing preferences for the feature.
3269
3270 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3271
3272 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3273 **CCK2 Equivalent:** N/A\
3274 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3275
3276 #### Windows (GPO)
3277 ```
3278 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3279 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3280 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3281 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3282 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3283 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3284 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3285 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3286 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3287 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3288 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3289 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3290 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3291 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3292 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3293 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3294 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3295 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3296 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3297 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3298 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3299 ```
3300 #### Windows (Intune)
3301 OMA-URI:
3302 ```
3303 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3304 ```
3305 Value (string):
3306 ```
3307 <enabled/> or <disabled/>
3308 ```
3309 OMA-URI:
3310 ```
3311 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3312 ```
3313 Value (string):
3314 ```
3315 <enabled/> or <disabled/>
3316 ```
3317 OMA-URI:
3318 ```
3319 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3320 ```
3321 Value (string):
3322 ```
3323 <enabled/>
3324 <data id="Permissions" value="1&#xF000;https://example.org"/>
3325 ```
3326 OMA-URI:
3327 ```
3328 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3329 ```
3330 Value (string):
3331 ```
3332 <enabled/> or <disabled/>
3333 ```
3334 OMA-URI:
3335 ```
3336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3337 ```
3338 Value (string):
3339 ```
3340 <enabled/> or <disabled/>
3341 ```
3342 OMA-URI:
3343 ```
3344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3345 ```
3346 Value (string):
3347 ```
3348 <enabled/>
3349 <data id="Permissions" value="1&#xF000;https://example.org"/>
3350 ```
3351 OMA-URI:
3352 ```
3353 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3354 ```
3355 Value (string):
3356 ```
3357 <enabled/>
3358 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3359 ```
3360 OMA-URI:
3361 ```
3362 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3363 ```
3364 Value (string):
3365 ```
3366 <enabled/>
3367 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3368 ```
3369 OMA-URI:
3370 ```
3371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3372 ```
3373 Value (string):
3374 ```
3375 <enabled/> or <disabled/>
3376 ```
3377 #### macOS
3378 ```
3379 <dict>
3380 <key>Permissions</key>
3381 <dict>
3382 <key>Camera</key>
3383 <dict>
3384 <key>Allow</key>
3385 <array>
3386 <string>https://example.org</string>
3387 <string>https://example.org:1234</string>
3388 </array>
3389 <key>Block</key>
3390 <array>
3391 <string>https://example.edu</string>
3392 </array>
3393 <key>BlockNewRequests</key>
3394 <true/> | <false/>
3395 <key>Locked</key>
3396 <true/> | <false/>
3397 </dict>
3398 <key>Microphone</key>
3399 <dict>
3400 <key>Allow</key>
3401 <array>
3402 <string>https://example.org</string>
3403 </array>
3404 <key>Block</key>
3405 <array>
3406 <string>https://example.edu</string>
3407 </array>
3408 <key>BlockNewRequests</key>
3409 <true/> | <false/>
3410 <key>Locked</key>
3411 <true/> | <false/>
3412 </dict>
3413 <key>Location</key>
3414 <dict>
3415 <key>Allow</key>
3416 <array>
3417 <string>https://example.org</string>
3418 </array>
3419 <key>Block</key>
3420 <array>
3421 <string>https://example.edu</string>
3422 </array>
3423 <key>BlockNewRequests</key>
3424 <true/> | <false/>
3425 <key>Locked</key>
3426 <true/> | <false/>
3427 </dict>
3428 <key>Notifications</key>
3429 <dict>
3430 <key>Allow</key>
3431 <array>
3432 <string>https://example.org</string>
3433 </array>
3434 <key>Block</key>
3435 <array>
3436 <string>https://example.edu</string>
3437 </array>
3438 <key>BlockNewRequests</key>
3439 <true/>
3440 <key>Locked</key>
3441 <true/>
3442 </dict>
3443 <key>Autoplay</key>
3444 <dict>
3445 <key>Allow</key>
3446 <array>
3447 <string>https://example.org</string>
3448 </array>
3449 <key>Block</key>
3450 <array>
3451 <string>https://example.edu</string>
3452 </array>
3453 <key>Default</key>
3454 <string>allow-audio-video | block-audio | block-audio-video</string>
3455 <key>Locked</key>
3456 <true/> | <false/>
3457 </dict>
3458 </dict>
3459 </dict>
3460 ```
3461 #### policies.json
3462 ```
3463 {
3464 "policies": {
3465 "Permissions": {
3466 "Camera": {
3467 "Allow": ["https://example.org","https://example.org:1234"],
3468 "Block": ["https://example.edu"],
3469 "BlockNewRequests": true | false,
3470 "Locked": true | false
3471 },
3472 "Microphone": {
3473 "Allow": ["https://example.org"],
3474 "Block": ["https://example.edu"],
3475 "BlockNewRequests": true | false,
3476 "Locked": true | false
3477 },
3478 "Location": {
3479 "Allow": ["https://example.org"],
3480 "Block": ["https://example.edu"],
3481 "BlockNewRequests": true | false,
3482 "Locked": true | false
3483 },
3484 "Notifications": {
3485 "Allow": ["https://example.org"],
3486 "Block": ["https://example.edu"],
3487 "BlockNewRequests": true | false,
3488 "Locked": true | false
3489 },
3490 "Autoplay": {
3491 "Allow": ["https://example.org"],
3492 "Block": ["https://example.edu"],
3493 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3494 "Locked": true | false
3495 }
3496 }
3497 }
3498 }
3499 ```
3500 ### PictureInPicture
3501
3502 Enable or disable Picture-in-Picture.
3503
3504 **Compatibility:** Firefox 78, Firefox ESR 78\
3505 **CCK2 Equivalent:** N/A\
3506 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3507
3508 #### Windows (GPO)
3509 ```
3510 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3511 ```
3512 #### Windows (Intune)
3513 OMA-URI:
3514 ```
3515 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3516 ```
3517 Value (string):
3518 ```
3519 <enabled/> or <disabled/>
3520 ```
3521 #### macOS
3522 ```
3523 <dict>
3524 <key>PictureInPicture</key>
3525 <true/> | <false/>
3526 </dict>
3527 ```
3528 #### policies.json
3529 ```
3530 {
3531 "policies": {
3532 "PictureInPicture": true | false
3533 }
3534 }
3535 ```
3536 ### PopupBlocking
3537 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3538
3539 `Allow` is a list of origins where popup-windows are allowed.
3540
3541 `Default` determines whether or not pop-up windows are allowed by default.
3542
3543 `Locked` prevents the user from changing pop-up preferences.
3544
3545 **Compatibility:** Firefox 60, Firefox ESR 60\
3546 **CCK2 Equivalent:** `permissions.popup`\
3547 **Preferences Affected:** `dom.disable_open_during_load`
3548
3549 #### Windows (GPO)
3550 ```
3551 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3552 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3553 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3554 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3555 ```
3556 #### Windows (Intune)
3557 OMA-URI:
3558 ```
3559 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3560 ```
3561 Value (string):
3562 ```
3563 <enabled/>
3564 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3565 ```
3566 OMA-URI:
3567 ```
3568 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3569 ```
3570 Value (string):
3571 ```
3572 <enabled/> or <disabled/>
3573 ```
3574 OMA-URI:
3575 ```
3576 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3577 ```
3578 Value (string):
3579 ```
3580 <enabled/> or <disabled/>
3581 ```
3582 #### macOS
3583 ```
3584 <dict>
3585 <key>PopupBlocking</key>
3586 <dict>
3587 <key>Allow</key>
3588 <array>
3589 <string>http://example.org</string>
3590 <string>http://example.edu</string>
3591 </array>
3592 <key>Default</key>
3593 <true/> | <false/>
3594 <key>Locked</key>
3595 <true/> | <false/>
3596 </dict>
3597 </dict>
3598 ```
3599 #### policies.json
3600 ```
3601 {
3602 "policies": {
3603 "PopupBlocking": {
3604 "Allow": ["http://example.org/",
3605 "http://example.edu/"],
3606 "Default": true | false,
3607 "Locked": true | false
3608 }
3609 }
3610 }
3611 ```
3612 ### Preferences
3613 Set and lock certain preferences.
3614
3615 **Compatibility:** See below\
3616 **CCK2 Equivalent:** `preferences`\
3617 **Preferences Affected:** See below
3618
3619 | Preference | Type | Compatibility | Default
3620 | --- | --- | --- | ---
3621 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3622 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3623 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3624 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3625 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3626 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3627 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3628 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3629 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3630 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3631 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3632 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3633 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3634 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3635 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3636 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3637 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3639 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3640 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3641 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3643 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3644 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3645 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3647 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3648 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3649 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3650 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3651 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3653 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3655 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3657 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3659 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3661 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3663 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3665 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3667 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3668 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3669 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3670 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3671 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3672 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3673 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3675 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3676 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3677 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3678 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3679 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3680 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3681 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3682 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3683 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3684 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3685 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3686 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3687 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3688 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3689 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3691 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3693 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3695 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3696 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3697 disabled
3698 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3699 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3700 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3701 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3702 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3703 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3704 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3705 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3706 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3707 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3708 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3709 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3710 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3711 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3712 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3713 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3714 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3716 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3718 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3719 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3720 #### Windows (GPO)
3721 ```
3722 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3723 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3724 ```
3725 #### Windows (Intune)
3726 OMA-URI: (periods are replaced by underscores)
3727 ```
3728 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3729 ```
3730 Value (string):
3731 ```
3732 <enabled/> or <disabled/>
3733 ```
3734 #### macOS
3735 ```
3736 <dict>
3737 <key>Preferences</key>
3738 <dict>
3739 <key>boolean_preference_name</key>
3740 <true/> | <false/>
3741 <key>string_preference_name</key>
3742 <string>string_value</string>
3743 </dict>
3744 </dict>
3745 ```
3746 #### policies.json
3747 ```
3748 {
3749 "policies": {
3750 "Preferences": {
3751 "boolean_preference_name": true | false,
3752 "string_preference_name": "string_value"
3753 }
3754 }
3755 }
3756 ```
3757 ### PromptForDownloadLocation
3758 Ask where to save each file before downloading.
3759
3760 **Compatibility:** Firefox 68, Firefox ESR 68\
3761 **CCK2 Equivalent:** N/A\
3762 **Preferences Affected:** `browser.download.useDownloadDir`
3763
3764 #### Windows (GPO)
3765 ```
3766 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3767 ```
3768 #### Windows (Intune)
3769 OMA-URI:
3770 ```
3771 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3772 ```
3773 Value (string):
3774 ```
3775 <enabled/> or <disabled/>
3776 ```
3777 #### macOS
3778 ```
3779 <dict>
3780 <key>PromptForDownloadLocation</key>
3781 <true/> | <false/>
3782 </dict>
3783 ```
3784 #### policies.json
3785 ```
3786 {
3787 "policies": {
3788 "PromptForDownloadLocation": true | false
3789 }
3790 }
3791 ```
3792 ### Proxy
3793 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3794 To specify ports, append them to the hostnames with a colon (:).
3795
3796 `Mode` is the proxy method being used.
3797
3798 `Locked` is whether or not proxy settings can be changed.
3799
3800 `HTTPProxy` is the HTTP proxy server.
3801
3802 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3803
3804 `SSLProxy` is the SSL proxy server.
3805
3806 `FTPProxy` is the FTP proxy server.
3807
3808 `SOCKSProxy` is the SOCKS proxy server
3809
3810 `SOCKSVersion` is the SOCKS version (4 or 5)
3811
3812 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3813
3814 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3815
3816 `AutoLogin` means do not prompt for authentication if password is saved.
3817
3818 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3819
3820 **Compatibility:** Firefox 60, Firefox ESR 60\
3821 **CCK2 Equivalent:** `networkProxy*`\
3822 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3823
3824 #### Windows (GPO)
3825 ```
3826 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3827 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3828 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3829 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3830 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3831 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3832 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3833 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3834 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3835 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3836 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3837 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3838 ```
3839 #### Windows (Intune)
3840 OMA-URI:
3841 ```
3842 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3843 ```
3844 Value (string):
3845 ```
3846 <enabled/>
3847 <data id="ProxyLocked" value="true | false"/>
3848 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3849 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3850 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3851 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3852 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3853 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3854 <data id="SOCKSVersion" value="4 | 5"/>
3855 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3856 <data id="Passthrough" value="<local>"/>
3857 <data id="AutoLogin" value="true | false"/>
3858 <data id="UseProxyForDNS" value="true | false"/>
3859 ```
3860 #### macOS
3861 ```
3862 <dict>
3863 <key>Proxy</key>
3864 <dict>
3865 <key>Mode</key>
3866 <string>none | system | manual | autoDetect | autoConfig</string>
3867 <key>Locked</key>
3868 <true> | </false>
3869 <key>HTTPProxy</key>
3870 <string>https://httpproxy.example.com</string>
3871 <key>UseHTTPProxyForAllProtocols</key>
3872 <true> | </false>
3873 <key>SSLProxy</key>
3874 <string>https://sslproxy.example.com</string>
3875 <key>FTPProxy</key>
3876 <string>https://ftpproxy.example.com</string>
3877 <key>SOCKSProxy</key>
3878 <string>https://socksproxy.example.com</string>
3879 <key>SOCKSVersion</key>
3880 <string>4 | 5</string>
3881 <key>Passthrough</key>
3882 <string>&lt;local>&gt;</string>
3883 <key>AutoConfigURL</key>
3884 <string>URL_TO_AUTOCONFIG</string>
3885 <key>AutoLogin</key>
3886 <true> | </false>
3887 <key>UseProxyForDNS</key>
3888 <true> | </false>
3889 </dict>
3890 </dict>
3891 ```
3892 #### policies.json
3893 ```
3894 {
3895 "policies": {
3896 "Proxy": {
3897 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3898 "Locked": true | false,
3899 "HTTPProxy": "hostname",
3900 "UseHTTPProxyForAllProtocols": true | false,
3901 "SSLProxy": "hostname",
3902 "FTPProxy": "hostname",
3903 "SOCKSProxy": "hostname",
3904 "SOCKSVersion": 4 | 5
3905 "Passthrough": "<local>",
3906 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3907 "AutoLogin": true | false,
3908 "UseProxyForDNS": true | false
3909 }
3910 }
3911 }
3912 ```
3913 ### RequestedLocales
3914 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3915
3916 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3917
3918 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3919 **CCK2 Equivalent:** N/A\
3920 **Preferences Affected:** N/A
3921 #### Windows (GPO)
3922 ```
3923 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3924 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3925
3926 or
3927
3928 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3929 ```
3930 #### Windows (Intune)
3931 OMA-URI:
3932 ```
3933 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3934 ```
3935 Value (string):
3936 ```
3937 <enabled/>
3938 <data id="Preferences_String" value="de,en-US"/>
3939 ```
3940 #### macOS
3941 ```
3942 <dict>
3943 <key>RequestedLocales</key>
3944 <array>
3945 <string>de</string>
3946 <string>en-US</string>
3947 </array>
3948 </dict>
3949
3950 or
3951
3952 <dict>
3953 <key>RequestedLocales</key>
3954 <string>de,en-US</string>
3955 </dict>
3956
3957 ```
3958 #### policies.json
3959 ```
3960 {
3961 "policies": {
3962 "RequestedLocales": ["de", "en-US"]
3963 }
3964 }
3965
3966 or
3967
3968 {
3969 "policies": {
3970 "RequestedLocales": "de,en-US"
3971 }
3972 }
3973 ```
3974 <a name="SanitizeOnShutdown"></a>
3975
3976 ### SanitizeOnShutdown (Selective)
3977 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3978
3979 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3980
3981 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3982 **CCK2 Equivalent:** N/A\
3983 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3984 #### Windows (GPO)
3985 ```
3986 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3987 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3988 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3989 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3990 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3991 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3992 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3993 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3994 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3995 ```
3996 #### Windows (Intune)
3997 OMA-URI:
3998 ```
3999 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4000 ```
4001 Value (string):
4002 ```
4003 <enabled/> or <disabled/>
4004 ```
4005 #### macOS
4006 ```
4007 <dict>
4008 <key>SanitizeOnShutdown</key>
4009 <dict>
4010 <key>Cache</key>
4011 <true/> | <false/>
4012 <key>Cookies</key>
4013 <true/> | <false/>
4014 <key>Downloads</key>
4015 <true/> | <false/>
4016 <key>FormData</key>
4017 <true/> | <false/>
4018 <key>History</key>
4019 <true/> | <false/>
4020 <key>Sessions</key>
4021 <true/> | <false/>
4022 <key>SiteSettings</key>
4023 <true/> | <false/>
4024 <key>OfflineApps</key>
4025 <true/> | <false/>
4026 <key>Locked</key>
4027 <true/> | <false/>
4028 </dict>
4029 </dict>
4030 ```
4031 #### policies.json
4032 ```
4033 {
4034 "policies": {
4035 "SanitizeOnShutdown": {
4036 "Cache": true | false,
4037 "Cookies": true | false,
4038 "Downloads": true | false,
4039 "FormData": true | false,
4040 "History": true | false,
4041 "Sessions": true | false,
4042 "SiteSettings": true | false,
4043 "OfflineApps": true | false,
4044 "Locked": true | false
4045 }
4046 }
4047 }
4048 ```
4049 ### SanitizeOnShutdown (All)
4050 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4051
4052 **Compatibility:** Firefox 60, Firefox ESR 60\
4053 **CCK2 Equivalent:** N/A\
4054 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4055 #### Windows (GPO)
4056 ```
4057 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4058 ```
4059 #### Windows (Intune)
4060 OMA-URI:
4061 ```
4062 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4063 ```
4064 Value (string):
4065 ```
4066 <enabled/> or <disabled/>
4067 ```
4068 #### macOS
4069 ```
4070 <dict>
4071 <key>SanitizeOnShutdown</key>
4072 <true/> | <false/>
4073 </dict>
4074 ```
4075 #### policies.json
4076 ```
4077 {
4078 "policies": {
4079 "SanitizeOnShutdown": true | false
4080 }
4081 }
4082 ```
4083 ### SearchBar
4084 Set whether or not search bar is displayed.
4085
4086 **Compatibility:** Firefox 60, Firefox ESR 60\
4087 **CCK2 Equivalent:** `showSearchBar`\
4088 **Preferences Affected:** N/A
4089
4090 #### Windows (GPO)
4091 ```
4092 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4093 ```
4094
4095 #### Windows (Intune)
4096 OMA-URI:
4097 ```
4098 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4099 ```
4100 Value (string):
4101 ```
4102 <enabled/>
4103 <data id="Permissions" value="unified | separate"/>
4104 ```
4105 #### macOS
4106 ```
4107 <dict>
4108 <key>SearchBar</key>
4109 <string>unified | separate</string>
4110 </dict>
4111 ```
4112 #### policies.json
4113 ```
4114 {
4115 "policies": {
4116 "SearchBar": "unified" | "separate"
4117 }
4118 }
4119 ```
4120 <a name="SearchEngines"></a>
4121
4122 ### SearchEngines (This policy is only available on the ESR.)
4123
4124 ### SearchEngines | Default
4125
4126 Set the default search engine. This policy is only available on the ESR.
4127
4128 **Compatibility:** Firefox ESR 60\
4129 **CCK2 Equivalent:** `defaultSearchEngine`\
4130 **Preferences Affected:** N/A
4131
4132 #### Windows (GPO)
4133 ```
4134 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4135 ```
4136 #### Windows (Intune)
4137 OMA-URI:
4138 ```
4139 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4140 ```
4141 Value (string):
4142 ```
4143 <enabled/>
4144 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4145 ```
4146 #### macOS
4147 ```
4148 <dict>
4149 <key>SearchEngines</key>
4150 <dict>
4151 <key>Default</key>
4152 <string>NAME_OF_SEARCH_ENGINE</string>
4153 </dict>
4154 </dict>
4155 ```
4156 #### policies.json
4157 ```
4158 {
4159 "policies": {
4160 "SearchEngines": {
4161 "Default": "NAME_OF_SEARCH_ENGINE"
4162 }
4163 }
4164 }
4165 ```
4166 ### SearchEngines | PreventInstalls
4167
4168 Prevent installing search engines from webpages.
4169
4170 **Compatibility:** Firefox ESR 60\
4171 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4172 **Preferences Affected:** N/A
4173
4174 #### Windows (GPO)
4175 ```
4176 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4177 ```
4178 #### Windows (Intune)
4179 OMA-URI:
4180 ```
4181 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4182 ```
4183 Value (string):
4184 ```
4185 <enabled/> or <disabled/>
4186 ```
4187 #### macOS
4188 ```
4189 <dict>
4190 <key>SearchEngines</key>
4191 <dict>
4192 <key>PreventInstalls</key>
4193 <true/> | <false/>
4194 </dict>
4195 </dict>
4196 ```
4197 #### policies.json
4198 ```
4199 {
4200 "policies": {
4201 "SearchEngines": {
4202 "PreventInstalls": true | false
4203 }
4204 }
4205 }
4206 ```
4207 ### SearchEngines | Remove
4208
4209 Hide built-in search engines. This policy is only available on the ESR.
4210
4211 **Compatibility:** Firefox ESR 60.2\
4212 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4213 **Preferences Affected:** N/A
4214
4215 #### Windows (GPO)
4216 ```
4217 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4218 ```
4219 #### Windows (Intune)
4220 OMA-URI:
4221 ```
4222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4223 ```
4224 Value (string):
4225 ```
4226 <enabled/>
4227 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4228 ```
4229 #### macOS
4230 ```
4231 <dict>
4232 <key>SearchEngines</key>
4233 <dict>
4234 <key>Remove</key>
4235 <array>
4236 <string>NAME_OF_SEARCH_ENGINE</string>
4237 </array>
4238 </dict>
4239 </dict>
4240 ```
4241 #### policies.json
4242 ```
4243 {
4244 "policies": {
4245 "SearchEngines": {
4246 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4247 }
4248 }
4249 }
4250 ```
4251 ### SearchEngines | Add
4252
4253 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4254
4255 `Name` is the name of the search engine.
4256
4257 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4258
4259 `Method` is either GET or POST
4260
4261 `IconURL` is a URL for the icon to use.
4262
4263 `Alias` is a keyword to use for the engine.
4264
4265 `Description` is a description of the search engine.
4266
4267 `PostData` is the POST data as name value pairs separated by &.
4268
4269 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4270
4271 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4272 **CCK2 Equivalent:** `searchplugins`\
4273 **Preferences Affected:** N/A
4274
4275 #### Windows (GPO)
4276 ```
4277 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4278 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4279 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4280 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4281 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4282 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4283 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4284 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4285 ```
4286 #### Windows (Intune)
4287 OMA-URI:
4288 ```
4289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4290 ```
4291 Value (string):
4292 ```
4293 <enabled/>
4294 <data id="SearchEngine_Name" value="Example1"/>
4295 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4296 <data id="SearchEngine_Method" value="GET | POST"/>
4297 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4298 <data id="SearchEngine_Alias" value="example"/>
4299 <data id="SearchEngine_Description" value="Example Description"/>
4300 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4301 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4302 ```
4303 #### macOS
4304 ```
4305 <dict>
4306 <key>SearchEngines</key>
4307 <dict>
4308 <key>Add</key>
4309 <array>
4310 <dict>
4311 <key>Name</key>
4312 <string>Example1</string>
4313 <key>URLTemplate</key>
4314 <string>https://www.example.org/q={searchTerms}</string>
4315 <key>Method</key>
4316 <string>GET | POST </string>
4317 <key>IconURL</key>
4318 <string>https://www.example.org/favicon.ico</string>
4319 <key>Alias</key>
4320 <string>example</string>
4321 <key>Description</key>
4322 <string>Example Description</string>
4323 <key>SuggestURLTemplate</key>
4324 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4325 <key>PostData</key>
4326 <string>name=value&q={searchTerms}</string>
4327 </dict>
4328 <array>
4329 </dict>
4330 </dict>
4331 ```
4332 #### policies.json
4333 ```
4334 {
4335 "policies": {
4336 "SearchEngines": {
4337 "Add": [
4338 {
4339 "Name": "Example1",
4340 "URLTemplate": "https://www.example.org/q={searchTerms}",
4341 "Method": "GET" | "POST",
4342 "IconURL": "https://www.example.org/favicon.ico",
4343 "Alias": "example",
4344 "Description": "Description",
4345 "PostData": "name=value&q={searchTerms}",
4346 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4347 }
4348 ]
4349 }
4350 }
4351 }
4352 ```
4353 ### SearchSuggestEnabled
4354
4355 Enable search suggestions.
4356
4357 **Compatibility:** Firefox 68, Firefox ESR 68\
4358 **CCK2 Equivalent:** N/A\
4359 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4360
4361 #### Windows (GPO)
4362 ```
4363 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4364 ```
4365 #### Windows (Intune)
4366 OMA-URI:
4367 ```
4368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4369 ```
4370 Value (string):
4371 ```
4372 <enabled/> or <disabled/>
4373 ```
4374 #### macOS
4375 ```
4376 <dict>
4377 <key>SearchSuggestEnabled</key>
4378 <true/> | <false/>
4379 </dict>
4380 ```
4381 #### policies.json
4382 ```
4383 {
4384 "policies": {
4385 "SearchSuggestEnabled": true | false
4386 }
4387 }
4388 ```
4389 ### SecurityDevices
4390
4391 Install PKCS #11 modules.
4392
4393 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4394 **CCK2 Equivalent:** `certs.devices`\
4395 **Preferences Affected:** N/A
4396
4397 #### Windows (GPO)
4398 ```
4399 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4400 ```
4401 #### Windows (Intune)
4402 OMA-URI:
4403 ```
4404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4405 ```
4406 Value (string):
4407 ```
4408 <enabled/>
4409 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4410 ```
4411 #### macOS
4412 ```
4413 <dict>
4414 <key>SecurityDevices</key>
4415 <dict>
4416 <key>NAME_OF_DEVICE</key>
4417 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4418 </dict>
4419 </dict>
4420 ```
4421
4422 #### policies.json
4423 ```
4424 {
4425 "policies": {
4426 "SecurityDevices": {
4427 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4428 }
4429 }
4430 }
4431 ```
4432 ### SSLVersionMax
4433
4434 Set and lock the maximum version of TLS.
4435
4436 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4437 **CCK2 Equivalent:** N/A\
4438 **Preferences Affected:** `security.tls.version.max`
4439
4440 #### Windows (GPO)
4441 ```
4442 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4443 ```
4444 #### Windows (Intune)
4445 OMA-URI:
4446 ```
4447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4448 ```
4449 Value (string):
4450 ```
4451 <enabled/>
4452 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4453 ```
4454 #### macOS
4455 ```
4456 <dict>
4457 <key>SSLVersionMax</key>
4458 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4459 </dict>
4460 ```
4461
4462 #### policies.json
4463 ```
4464 {
4465 "policies": {
4466 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4467 }
4468 }
4469 ```
4470 ### SSLVersionMin
4471
4472 Set and lock the minimum version of TLS.
4473
4474 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4475 **CCK2 Equivalent:** N/A\
4476 **Preferences Affected:** `security.tls.version.min`
4477
4478 #### Windows (GPO)
4479 ```
4480 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4481 ```
4482 #### Windows (Intune)
4483 OMA-URI:
4484 ```
4485 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4486 ```
4487 Value (string):
4488 ```
4489 <enabled/>
4490 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4491 ```
4492 #### macOS
4493 ```
4494 <dict>
4495 <key>SSLVersionMin</key>
4496 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4497 </dict>
4498 ```
4499
4500 #### policies.json
4501 ```
4502 {
4503 "policies": {
4504 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4505 }
4506 }
4507 ```
4508 ### SupportMenu
4509 Add a menuitem to the help menu for specifying support information.
4510
4511 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4512 **CCK2 Equivalent:** helpMenu\
4513 **Preferences Affected:** N/A
4514
4515 #### Windows (GPO)
4516 ```
4517 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4518 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4519 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4520 ```
4521 #### Windows (Intune)
4522 OMA-URI:
4523 ```
4524 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4525 ```
4526 Value (string):
4527 ```
4528 <enabled/>
4529 <data id="SupportMenuTitle" value="Support Menu"/>
4530 <data id="SupportMenuURL" value="http://example.com/support"/>
4531 <data id="SupportMenuAccessKey" value="S">
4532 ```
4533 #### macOS
4534 ```
4535 <dict>
4536 <key>SupportMenu</key>
4537 <dict>
4538 <key>Title</key>
4539 <string>SupportMenu</string>
4540 <key>URL</key>
4541 <string>http://example.com/support</string>
4542 <key>AccessKey</key>
4543 <string>S</string>
4544 </dict>
4545 </dict>
4546 ```
4547 #### policies.json
4548 ```
4549 {
4550 "policies": {
4551 "SupportMenu": {
4552 "Title": "Support Menu",
4553 "URL": "http://example.com/support",
4554 "AccessKey": "S"
4555 }
4556 }
4557 }
4558 ```
4559 ### UserMessaging
4560
4561 Prevent installing search engines from webpages.
4562
4563 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4564
4565 `ExtensionRecommendations` Don't recommend extensions.
4566
4567 `FeatureRecommendations` Don't recommend browser features.
4568
4569 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4570
4571 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4572 **CCK2 Equivalent:** N/A\
4573 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4574
4575 #### Windows (GPO)
4576 ```
4577 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4578 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4579 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4580 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4581 ```
4582 #### Windows (Intune)
4583 OMA-URI:
4584 ```
4585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4588 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4589 ```
4590 Value (string):
4591 ```
4592 <enabled/> or <disabled/>
4593 ```
4594 #### macOS
4595 ```
4596 <dict>
4597 <key>UserMessaging</key>
4598 <dict>
4599 <key>WhatsNew</key>
4600 <true/> | <false/>
4601 <key>ExtensionRecommendations</key>
4602 <true/> | <false/>
4603 <key>FeatureRecommendations</key>
4604 <true/> | <false/>
4605 <key>UrlbarInterventions</key>
4606 <true/> | <false/>
4607 </dict>
4608 </dict>
4609 ```
4610 #### policies.json
4611 ```
4612 {
4613 "policies": {
4614 "UserMessaging": {
4615 "WhatsNew": true | false,
4616 "ExtensionRecommendations": true | false,
4617 "FeatureRecommendations": true | false,
4618 "UrlbarInterventions": true | false
4619 }
4620 }
4621 }
4622 ```
4623 ### WebsiteFilter
4624 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4625
4626 **Compatibility:** Firefox 60, Firefox ESR 60\
4627 **CCK2 Equivalent:** N/A\
4628 **Preferences Affected:** N/A
4629
4630 #### Windows (GPO)
4631 ```
4632 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4633 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4634 ```
4635 #### Windows (Intune)
4636 OMA-URI:
4637 ```
4638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4639 ```
4640 Value (string):
4641 ```
4642 <enabled/>
4643 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4644 ```
4645 OMA-URI:
4646 ```
4647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4648 ```
4649 Value (string):
4650 ```
4651 <enabled/>
4652 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4653 ```
4654 #### macOS
4655 ```
4656 <dict>
4657 <key>WebsiteFilter</key>
4658 <dict>
4659 <key>Block</key>
4660 <array>
4661 <string><all_urls></string>
4662 </array>
4663 <key>Exceptions</key>
4664 <array>
4665 <string>http://example.org/*</string>
4666 </array>
4667 </dict>
4668
4669 </dict>
4670 ```
4671 #### policies.json
4672 ```
4673 {
4674 "policies": {
4675 "WebsiteFilter": {
4676 "Block": ["<all_urls>"],
4677 "Exceptions": ["http://example.org/*"]
4678 }
4679 }
4680 }
4681 ```

patrick-canterino.de