]> git.p6c8.net - policy-templates.git/blob - README.md
76bc17af46854b6fc73c3bc9bb0a104438054f72
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
61 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
62 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
63 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
64 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
65 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
66 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
67 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
68 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
69 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
70 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
71 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
72 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
73 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
74 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
75 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
76 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
77 | **[`Preferences`](#preferences)** | Set and lock some preferences.
78 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
79 | **[`Proxy`](#proxy)** | Configure proxy settings.
80 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
81 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
82 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
83 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
84 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
85 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
86 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
87 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
88 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
89 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
90 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
91 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
92 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
93 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
94 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
95 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
96
97 ### AppAutoUpdate
98
99 Enable or disable **automatic** application update.
100
101 If set to true, application updates are installed without user approval.
102
103 If set to false, application updates are downloaded but the user can choose when to install the update.
104
105 If you have disabled updates via DisableAppUpdate, this policy has no effect.
106
107 **Compatibility:** Firefox 75, Firefox ESR 68.7\
108 **CCK2 Equivalent:** N/A\
109 **Preferences Affected:** app.update.auto
110
111 #### Windows (GPO)
112 ```
113 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
114 ```
115 #### Windows (Intune)
116 OMA-URI:
117 ```
118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
119 ```
120 Value (string):
121 ```
122 <enabled/> or <disabled/>
123 ```
124 #### macOS
125 ```
126 <dict>
127 <key>AppAutoUpdate</key>
128 <true/> | <false/>
129 </dict>
130 ```
131 #### policies.json
132 ```
133 {
134 "policies": {
135 "AppAutoUpdate": true | false
136 }
137 }
138 ```
139 ### AppUpdateURL
140
141 Change the URL for application update.
142
143 **Compatibility:** Firefox 62, Firefox ESR 60.2\
144 **CCK2 Equivalent:** N/A\
145 **Preferences Affected:** `app.update.url`
146
147 #### Windows (GPO)
148 ```
149 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
150 ```
151 #### Windows (Intune)
152 OMA-URI:
153 ```
154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
155 ```
156 Value (string):
157 ```
158 <enabled/>
159 <data id="AppUpdateURL" value="https://yoursite.com"/>
160 ```
161 #### macOS
162 ```
163 <dict>
164 <key>AppUpdateURL</key>
165 <string>https://yoursite.com</string>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "AppUpdateURL": "https://yoursite.com"
173 }
174 }
175 ```
176 ### Authentication
177
178 Configure sites that support integrated authentication.
179
180 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
181
182 `PrivateBrowsing` enables integrated authentication in prviate browsing.
183
184 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
185 **CCK2 Equivalent:** N/A\
186 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
187
188 #### Windows (GPO)
189 ```
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
202 ```
203 #### Windows (Intune)
204 OMA-URI:
205 ```
206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
207 ```
208 Value (string):
209 ```
210 <enabled/>
211 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
212 ```
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
239 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
244 ```
245 Value (string):
246 ```
247 <enabled/> or <disabled/>
248 ```
249 OMA-URI:
250 ```
251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
252 ```
253 Value (string):
254 ```
255 <enabled/> or <disabled/>
256 ```
257 #### macOS
258 ```
259 <dict>
260 <key>Authentication</key>
261 <dict>
262 <key>SPNEGO</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>Delegated</key>
268 <array>
269 <string>mydomain.com</string>
270 <string>https://myotherdomain.com</string>
271 </array>
272 <key>NTLM</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>AllowNonFQDN</key>
278 <dict>
279 <key>SPNEGO</key>
280 <true/> | <false/>
281 <key>NTLM</key>
282 <true/> | <false/>
283 </dict>
284 <key>AllowProxies</key>
285 <dict>
286 <key>SPNEGO</key>
287 <true/> | <false/>
288 <key>NTLM</key>
289 <true/> | <false/>
290 </dict>
291 <key>Locked</key>
292 <true/> | <false/>
293 <key>PrivateBrowsing</key>
294 <true/> | <false/>
295 </dict>
296 </dict>
297 ```
298 #### policies.json
299 ```
300 {
301 "policies": {
302 "Authentication": {
303 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
304 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
305 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
306 "AllowNonFQDN": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "AllowProxies": {
311 "SPNEGO": true | false,
312 "NTLM": true | false
313 },
314 "Locked": true | false,
315 "PrivateBrowsing": true | false
316 }
317 }
318 }
319 ```
320 ### BlockAboutAddons
321
322 Block access to the Add-ons Manager (about:addons).
323
324 **Compatibility:** Firefox 60, Firefox ESR 60\
325 **CCK2 Equivalent:** `disableAddonsManager`\
326 **Preferences Affected:** N/A
327
328 #### Windows (GPO)
329 ```
330 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
331 ```
332 #### Windows (Intune)
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
336 ```
337 Value (string):
338 ```
339 <enabled/> or <disabled/>
340 ```
341 #### macOS
342 ```
343 <dict>
344 <key>BlockAboutAddons</key>
345 <true/> | <false/>
346 </dict>
347 ```
348 #### policies.json
349 ```
350 {
351 "policies": {
352 "BlockAboutAddons": true | false
353 }
354 }
355 ```
356 ### BlockAboutConfig
357
358 Block access to about:config.
359
360 **Compatibility:** Firefox 60, Firefox ESR 60\
361 **CCK2 Equivalent:** `disableAboutConfig`\
362 **Preferences Affected:** N/A
363
364 #### Windows (GPO)
365 ```
366 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
367 ```
368 #### Windows (Intune)
369 OMA-URI:
370 ```
371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
372 ```
373 Value (string):
374 ```
375 <enabled/> or <disabled/>
376 ```
377 #### macOS
378 ```
379 <dict>
380 <key>BlockAboutConfig</key>
381 <true/> | <false/>
382 </dict>
383 ```
384 #### policies.json
385 ```
386 {
387 "policies": {
388 "BlockAboutConfig": true | false
389 }
390 }
391 ```
392 ### BlockAboutProfiles
393
394 Block access to About Profiles (about:profiles).
395
396 **Compatibility:** Firefox 60, Firefox ESR 60\
397 **CCK2 Equivalent:** `disableAboutProfiles`\
398 **Preferences Affected:** N/A
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
403 ```
404 #### Windows (Intune)
405 OMA-URI:
406 ```
407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
408 ```
409 Value (string):
410 ```
411 <enabled/> or <disabled/>
412 ```
413 #### macOS
414 ```
415 <dict>
416 <key>BlockAboutProfiles</key>
417 <true/> | <false/>
418 </dict>
419 ```
420 #### policies.json
421 ```
422 {
423 "policies": {
424 "BlockAboutProfiles": true | false
425 }
426 }
427 ```
428 ### BlockAboutSupport
429
430 Block access to Troubleshooting Information (about:support).
431
432 **Compatibility:** Firefox 60, Firefox ESR 60\
433 **CCK2 Equivalent:** `disableAboutSupport`\
434 **Preferences Affected:** N/A
435
436 #### Windows (GPO)
437 ```
438 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
439 ```
440 #### Windows (Intune)
441 OMA-URI:
442 ```
443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
444 ```
445 Value (string):
446 ```
447 <enabled/> or <disabled/>
448 ```
449 #### macOS
450 ```
451 <dict>
452 <key>BlockAboutSupport</key>
453 <true/> | <false/>
454 </dict>
455 ```
456 #### policies.json
457 ```
458 {
459 "policies": {
460 "BlockAboutSupport": true | false
461 }
462 }
463 ```
464 ### Bookmarks
465
466 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60\
469 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
470 **Preferences Affected:** N/A
471
472 #### Windows (GPO)
473 ```
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
479 ```
480 #### Windows (Intune)
481 OMA-URI:
482 ```
483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
484 ```
485 Value (string):
486 ```
487 <enabled/>
488 <data id="BookmarkTitle" value="Example"/>
489 <data id="BookmarkURL" value="https://example.com"/>
490 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
491 <data id="BookmarkPlacement" value="toolbar | menu"/>
492 <data id="BookmarkFolder" value="FolderName"/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>Bookmarks</key>
498 <array>
499 <dict>
500 <key>Title</key>
501 <string>Example</string>
502 <key>URL</key>
503 <string>https://example.com</string>
504 <key>Favicon</key>
505 <string>https://example.com/favicon.ico</string>
506 <key>Placement</key>
507 <string>toolbar | menu</string>
508 <key>Folder</key>
509 <string>FolderName</string>
510 </dict>
511 </array>
512 </dict>
513 ```
514 #### policies.json
515 ```
516 {
517 "policies": {
518 "Bookmarks": [
519 {
520 "Title": "Example",
521 "URL": "https://example.com",
522 "Favicon": "https://example.com/favicon.ico",
523 "Placement": "toolbar" | "menu",
524 "Folder": "FolderName"
525 }
526 ]
527 }
528 }
529 ```
530 ### CaptivePortal
531 Enable or disable the detection of captive portals.
532
533 **Compatibility:** Firefox 67, Firefox ESR 60.7\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `network.captive-portal-service.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>CaptivePortal</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "CaptivePortal": true | false
562 }
563 }
564 ```
565 ### Certificates
566
567 ### Certificates | ImportEnterpriseRoots
568
569 Trust certificates that have been added to the operating system certificate store by a user or administrator.
570
571 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
572
573 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
574 **CCK2 Equivalent:** N/A\
575 **Preferences Affected:** `security.enterprise_roots.enabled`
576
577 #### Windows (GPO)
578 ```
579 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
580 ```
581 #### Windows (Intune)
582 OMA-URI:
583 ```
584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
585 ```
586 Value (string):
587 ```
588 <enabled/> or <disabled/>
589 ```
590 #### macOS
591 ```
592 <dict>
593 <key>Certificates</key>
594 <dict>
595 <key>ImportEnterpriseRoots</key>
596 <true/> | <false/>
597 </dict>
598 </dict>
599 ```
600 #### policies.json
601 ```
602 {
603 "policies": {
604 "Certificates": {
605 "ImportEnterpriseRoots": true | false
606 }
607 }
608 }
609 ```
610 ### Certificates | Install
611
612 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
613
614 - Windows
615 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
616 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
617 - macOS
618 - /Library/Application Support/Mozilla/Certificates
619 - ~/Library/Application Support/Mozilla/Certificates
620 - Linux
621 - /usr/lib/mozilla/certificates
622 - /usr/lib64/mozilla/certificates
623 - ~/.mozilla/certificates
624
625 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
626
627 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
628
629 Certificates are installed using the trust string `CT,CT,`.
630
631 Binary (DER) and ASCII (PEM) certificates are both supported.
632
633 **Compatibility:** Firefox 64, Firefox ESR 64\
634 **CCK2 Equivalent:** `certs.ca`\
635 **Preferences Affected:** N/A
636
637 #### Windows (GPO)
638 ```
639 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
640 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
641 ```
642 #### Windows (Intune)
643 OMA-URI:
644 ```
645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
646 ```
647 Value (string):
648 ```
649 <enabled/>
650 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
651 ```
652 #### macOS
653 ```
654 <dict>
655 <key>Certificates</key>
656 <dict>
657 <key>Install</key>
658 <array>
659 <string>cert1.der</string>
660 <string>/Users/username/cert2.pem</string>
661 </array>
662 </dict>
663 </dict>
664 ```
665 #### policies.json
666 ```
667 {
668 "policies": {
669 "Certificates": {
670 "Install": ["cert1.der", "/home/username/cert2.pem"]
671 }
672 }
673 }
674 ```
675 ### Cookies
676 Configure cookie preferences.
677
678 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
679
680 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
681
682 `Default` determines whether cookies are accepted at all.
683
684 `AcceptThirdParty` determines how third-party cookies are handled.
685
686 `ExpireAtSessionEnd` determines when cookies expire.
687
688 `RejectTracker` only rejects cookies for trackers.
689
690 `Locked` prevents the user from changing cookie preferences.
691
692 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
693 **CCK2 Equivalent:** N/A\
694 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
695
696 #### Windows (GPO)
697 ```
698 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
699 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
700 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
701 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
702 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
705 ```
706 #### Windows (Intune)
707 OMA-URI:
708 ```
709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
710 ```
711 Value (string):
712 ```
713 <enabled/>
714 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
715 ```
716 OMA-URI:
717 ```
718 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
719 ```
720 Value (string):
721 ```
722 <enabled/>
723 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
724 ```
725 OMA-URI:
726 ```
727 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
728 ```
729 Value (string):
730 ```
731 <enabled/> or <disabled/>
732 ```
733 OMA-URI:
734 ```
735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
736 ```
737 Value (string):
738 ```
739 <enabled/>
740 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
741 ```
742 OMA-URI:
743 ```
744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
745 ```
746 Value (string):
747 ```
748 <enabled/> or <disabled/>
749 ```
750 OMA-URI:
751 ```
752 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
753 ```
754 Value (string):
755 ```
756 <enabled/> or <disabled/>
757 ```
758 OMA-URI:
759 ```
760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
761 ```
762 Value (string):
763 ```
764 <enabled/> or <disabled/>
765 ```
766 #### macOS
767 ```
768 <dict>
769 <key>Cookies</key>
770 <dict>
771 <key>Allow</key>
772 <array>
773 <string>http://example.com</string>
774 </array>
775 <key>Block</key>
776 <array>
777 <string>http://example.org</string>
778 </array>
779 <key>Default</key>
780 <true/> | <false/>
781 <key>AcceptThirdParty</key>
782 <string>always | never | from-visited</string>
783 <key>ExpireAtSessionEnd</key>
784 <true/> | <false/>
785 <key>RejectTracker</key>
786 <true/> | <false/>
787 <key>Locked</key>
788 <true/> | <false/>
789 </dict>
790 </dict>
791 ```
792 #### policies.json
793 ```
794 {
795 "policies": {
796 "Cookies": {
797 "Allow": ["http://example.org/"],
798 "Block": ["http://example.edu/"],
799 "Default": true | false,
800 "AcceptThirdParty": "always" | "never" | "from-visited",
801 "ExpireAtSessionEnd": true | false,
802 "RejectTracker": true | false,
803 "Locked": true | false
804 }
805 }
806 }
807 ```
808 ### DisableSetDesktopBackground
809 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
810
811 **Compatibility:** Firefox 60, Firefox ESR 60\
812 **CCK2 Equivalent:** `removeSetDesktopBackground`\
813 **Preferences Affected:** N/A
814
815 #### Windows (GPO)
816 ```
817 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
818 ```
819 #### Windows (Intune)
820 OMA-URI:
821 ```
822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
823 ```
824 Value (string):
825 ```
826 <enabled/> or <disabled/>
827 ```
828 #### macOS
829 ```
830 <dict>
831 <key>DisableSetDesktopBackground</key>
832 <true/> | <false/>
833 </dict>
834 ```
835 #### policies.json
836 ```
837 {
838 "policies": {
839 "DisableSetDesktopBackground": true | false
840 }
841 }
842 ```
843 ### DisableMasterPasswordCreation
844 Remove the master password functionality.
845
846 **Compatibility:** Firefox 60, Firefox ESR 60\
847 **CCK2 Equivalent:** `noMasterPassword`\
848 **Preferences Affected:** N/A
849
850 #### Windows (GPO)
851 ```
852 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
853 ```
854 #### Windows (Intune)
855 OMA-URI:
856 ```
857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
858 ```
859 Value (string):
860 ```
861 <enabled/> or <disabled/>
862 ```
863 #### macOS
864 ```
865 <dict>
866 <key>DisableMasterPasswordCreation</key>
867 <true/> | <false/>
868 </dict>
869 ```
870 #### policies.json
871 ```
872 {
873 "policies": {
874 "DisableMasterPasswordCreation": true | false
875 }
876 }
877 ```
878 ### DisableAppUpdate
879 Turn off application updates.
880
881 **Compatibility:** Firefox 60, Firefox ESR 60\
882 **CCK2 Equivalent:** `disableFirefoxUpdates`\
883 **Preferences Affected:** N/A
884
885 #### Windows (GPO)
886 ```
887 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
888 ```
889 #### Windows (Intune)
890 OMA-URI:
891 ```
892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
893 ```
894 Value (string):
895 ```
896 <enabled/> or <disabled/>
897 ```
898 #### macOS
899 ```
900 <dict>
901 <key>DisableAppUpdate</key>
902 <true/> | <false/>
903 </dict>
904 ```
905 #### policies.json
906 ```
907 {
908 "policies": {
909 "DisableAppUpdate": true | false
910 }
911 }
912 ```
913 ### DisableBuiltinPDFViewer
914 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
915
916 **Compatibility:** Firefox 60, Firefox ESR 60\
917 **CCK2 Equivalent:** `disablePDFjs`\
918 **Preferences Affected:** `pdfjs.disabled`
919
920 #### Windows (GPO)
921 ```
922 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
923 ```
924 #### Windows (Intune)
925 OMA-URI:
926 ```
927 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
928 ```
929 Value (string):
930 ```
931 <enabled/> or <disabled/>
932 ```
933 #### macOS
934 ```
935 <dict>
936 <key>DisableBuiltinPDFViewer</key>
937 <true/> | <false/>
938 </dict>
939 ```
940 #### policies.json
941 ```
942 {
943 "policies": {
944 "DisableBuiltinPDFViewer": true | false
945 }
946 }
947 ```
948 ### DisabledCiphers
949 Disable specific cryptographic ciphers.
950
951 ---
952 **Note:**
953
954 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
955
956 ---
957 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
958 **CCK2 Equivalent:** N/A\
959 **Preferences Affected:** N/A
960
961 #### Windows (GPO)
962 ```
963 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
964 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
974 ```
975 #### Windows (Intune)
976 OMA-URI:
977 ```
978 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
979 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
989 ```
990 Value (string):
991 ```
992 <enabled/> or <disabled/>
993 ```
994 #### macOS
995 ```
996 <dict>
997 <key>DisabledCiphers</key>
998 <dict>
999 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1000 <true/> | <false/>
1001 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1002 <true/> | <false/>
1003 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1004 <true/> | <false/>
1005 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1006 <true/> | <false/>
1007 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1008 <true/> | <false/>
1009 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1010 <true/> | <false/>
1011 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1012 <true/> | <false/>
1013 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1014 <true/> | <false/>
1015 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1016 <true/> | <false/>
1017 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1018 <true/> | <false/>
1019 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1020 <true/> | <false/>
1021 </dict>
1022 </dict>
1023 ```
1024 #### policies.json
1025 ```
1026 {
1027 "policies": {
1028 "DisabledCiphers" {
1029 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1030 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1031 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1032 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1034 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1035 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1036 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1037 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1038 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1039 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1040 }
1041 }
1042 }
1043 ```
1044 ### DisableDefaultBrowserAgent
1045 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1046
1047 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1048 **CCK2 Equivalent:** N/A\
1049 **Preferences Affected:** N/A
1050
1051 #### Windows (GPO)
1052 ```
1053 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1054 ```
1055 #### Windows (Intune)
1056 OMA-URI:
1057 ```
1058 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1059 ```
1060 Value (string):
1061 ```
1062 <enabled/> or <disabled/>
1063 ```
1064 #### policies.json
1065 ```
1066 {
1067 "policies": {
1068 "DisableDefaultBrowserAgent": true | false
1069 }
1070 }
1071 ```
1072 ### DisableDeveloperTools
1073 Remove access to all developer tools.
1074
1075 **Compatibility:** Firefox 60, Firefox ESR 60\
1076 **CCK2 Equivalent:** `removeDeveloperTools`\
1077 **Preferences Affected:** `devtools.policy.disabled`
1078
1079 #### Windows (GPO)
1080 ```
1081 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1082 ```
1083 #### Windows (Intune)
1084 OMA-URI:
1085 ```
1086 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1087 ```
1088 Value (string):
1089 ```
1090 <enabled/> or <disabled/>
1091 ```
1092 #### macOS
1093 ```
1094 <dict>
1095 <key>DisableDeveloperTools</key>
1096 <true/> | <false/>
1097 </dict>
1098 ```
1099 #### policies.json
1100 ```
1101 {
1102 "policies": {
1103 "DisableDeveloperTools": true | false
1104 }
1105 }
1106 ```
1107 ### DisableFeedbackCommands
1108 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1109
1110 **Compatibility:** Firefox 60, Firefox ESR 60\
1111 **CCK2 Equivalent:** N/A\
1112 **Preferences Affected:** N/A
1113
1114 #### Windows (GPO)
1115 ```
1116 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1117 ```
1118 #### Windows (Intune)
1119 OMA-URI:
1120 ```
1121 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1122 ```
1123 Value (string):
1124 ```
1125 <enabled/> or <disabled/>
1126 ```
1127 #### macOS
1128 ```
1129 <dict>
1130 <key>DisableFeedbackCommands</key>
1131 <true/> | <false/>
1132 </dict>
1133 ```
1134 #### policies.json
1135 ```
1136 {
1137 "policies": {
1138 "DisableFeedbackCommands": true | false
1139 }
1140 }
1141 ```
1142 ### DisableFirefoxScreenshots
1143 Remove access to Firefox Screenshots.
1144
1145 **Compatibility:** Firefox 60, Firefox ESR 60\
1146 **CCK2 Equivalent:** N/A\
1147 **Preferences Affected:** `extensions.screenshots.disabled`
1148
1149 #### Windows (GPO)
1150 ```
1151 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1152 ```
1153 #### Windows (Intune)
1154 OMA-URI:
1155 ```
1156 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1157 ```
1158 Value (string):
1159 ```
1160 <enabled/> or <disabled/>
1161 ```
1162 #### macOS
1163 ```
1164 <dict>
1165 <key>DisableFirefoxScreenshots</key>
1166 <true/> | <false/>
1167 </dict>
1168 ```
1169 #### policies.json
1170 ```
1171 {
1172 "policies": {
1173 "DisableFirefoxScreenshots": true | false
1174 }
1175 }
1176 ```
1177 ### DisableFirefoxAccounts
1178 Disable Firefox Accounts integration (Sync).
1179
1180 **Compatibility:** Firefox 60, Firefox ESR 60\
1181 **CCK2 Equivalent:** `disableSync`\
1182 **Preferences Affected:** `identity.fxaccounts.enabled`
1183
1184 #### Windows (GPO)
1185 ```
1186 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1187 ```
1188 #### Windows (Intune)
1189 OMA-URI:
1190 ```
1191 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1192 ```
1193 Value (string):
1194 ```
1195 <enabled/> or <disabled/>
1196 ```
1197 #### macOS
1198 ```
1199 <dict>
1200 <key>DisableFirefoxAccounts</key>
1201 <true/> | <false/>
1202 </dict>
1203 ```
1204 #### policies.json
1205 ```
1206 {
1207 "policies": {
1208 "DisableFirefoxAccounts": true | false
1209 }
1210 }
1211 ```
1212 ### DisableFirefoxStudies
1213 Disable Firefox studies (Shield).
1214
1215 **Compatibility:** Firefox 60, Firefox ESR 60\
1216 **CCK2 Equivalent:** N/A\
1217 **Preferences Affected:** N/A
1218
1219 #### Windows (GPO)
1220 ```
1221 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1222 ```
1223 #### Windows (Intune)
1224 OMA-URI:
1225 ```
1226 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1227 ```
1228 Value (string):
1229 ```
1230 <enabled/> or <disabled/>
1231 ```
1232 #### macOS
1233 ```
1234 <dict>
1235 <key>DisableFirefoxStudies</key>
1236 <true/> | <false/>
1237 </dict>
1238 ```
1239 #### policies.json
1240 ```
1241 {
1242 "policies": {
1243 "DisableFirefoxStudies": true | false
1244 }
1245 }
1246 ```
1247 ### DisableForgetButton
1248 Disable the "Forget" button.
1249
1250 **Compatibility:** Firefox 60, Firefox ESR 60\
1251 **CCK2 Equivalent:** `disableForget`\
1252 **Preferences Affected:** N/A
1253
1254 #### Windows (GPO)
1255 ```
1256 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1257 ```
1258 #### Windows (Intune)
1259 OMA-URI:
1260 ```
1261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1262 ```
1263 Value (string):
1264 ```
1265 <enabled/> or <disabled/>
1266 ```
1267 #### macOS
1268 ```
1269 <dict>
1270 <key>DisableForgetButton</key>
1271 <true/> | <false/>
1272 </dict>
1273 ```
1274 #### policies.json
1275 ```
1276 {
1277 "policies": {
1278 "DisableForgetButton": true | false
1279 }
1280 }
1281 ```
1282 ### DisableFormHistory
1283 Turn off saving information on web forms and the search bar.
1284
1285 **Compatibility:** Firefox 60, Firefox ESR 60\
1286 **CCK2 Equivalent:** `disableFormFill`\
1287 **Preferences Affected:** ` browser.formfill.enable`
1288
1289 #### Windows (GPO)
1290 ```
1291 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1292 ```
1293 #### Windows (Intune)
1294 OMA-URI:
1295 ```
1296 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1297 ```
1298 Value (string):
1299 ```
1300 <enabled/> or <disabled/>
1301 ```
1302 #### macOS
1303 ```
1304 <dict>
1305 <key>DisableFormHistory</key>
1306 <true/> | <false/>
1307 </dict>
1308 ```
1309 #### policies.json
1310 ```
1311 {
1312 "policies": {
1313 "DisableFormHistory": true | false
1314 }
1315 }
1316 ```
1317 ### DisablePasswordReveal
1318 Do not allow passwords to be shown in saved logins
1319
1320 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1321 **CCK2 Equivalent:** N/A
1322 **Preferences Affected:** N/A
1323
1324 #### Windows (GPO)
1325 ```
1326 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1327 ```
1328 #### Windows (Intune)
1329 OMA-URI:
1330 ```
1331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1332 ```
1333 Value (string):
1334 ```
1335 <enabled/> or <disabled/>
1336 ```
1337 #### macOS
1338 ```
1339 <dict>
1340 <key>DisablePasswordReveal</key>
1341 <true/> | <false/>
1342 </dict>
1343 ```
1344 #### policies.json
1345 ```
1346 {
1347 "policies": {
1348 "DisablePasswordReveal": true | false
1349 }
1350 }
1351 ```
1352 ### DisablePocket
1353 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1354
1355 **Compatibility:** Firefox 60, Firefox ESR 60\
1356 **CCK2 Equivalent:** `disablePocket`\
1357 **Preferences Affected:** `extensions.pocket.enabled`
1358
1359 #### Windows (GPO)
1360 ```
1361 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1362 ```
1363 #### Windows (Intune)
1364 OMA-URI:
1365 ```
1366 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1367 ```
1368 Value (string):
1369 ```
1370 <enabled/> or <disabled/>
1371 ```
1372 #### macOS
1373 ```
1374 <dict>
1375 <key>DisablePocket</key>
1376 <true/> | <false/>
1377 </dict>
1378 ```
1379 #### policies.json
1380 ```
1381 {
1382 "policies": {
1383 "DisablePocket": true | false
1384 }
1385 }
1386 ```
1387 ### DisablePrivateBrowsing
1388 Remove access to private browsing.
1389
1390 **Compatibility:** Firefox 60, Firefox ESR 60\
1391 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1392 **Preferences Affected:** N/A
1393
1394 #### Windows (GPO)
1395 ```
1396 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1397 ```
1398 #### Windows (Intune)
1399 OMA-URI:
1400 ```
1401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1402 ```
1403 Value (string):
1404 ```
1405 <enabled/> or <disabled/>
1406 ```
1407 #### macOS
1408 ```
1409 <dict>
1410 <key>DisablePrivateBrowsing</key>
1411 <true/> | <false/>
1412 </dict>
1413 ```
1414 #### policies.json
1415 ```
1416 {
1417 "policies": {
1418 "DisablePrivateBrowsing": true | false
1419 }
1420 }
1421 ```
1422 ### DisableProfileImport
1423 Disables the "Import data from another browser" option in the bookmarks window.
1424
1425 **Compatibility:** Firefox 60, Firefox ESR 60\
1426 **CCK2 Equivalent:** N/A\
1427 **Preferences Affected:** N/A
1428
1429 #### Windows (GPO)
1430 ```
1431 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1432 ```
1433 #### Windows (Intune)
1434 OMA-URI:
1435 ```
1436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1437 ```
1438 Value (string):
1439 ```
1440 <enabled/> or <disabled/>
1441 ```
1442 #### macOS
1443 ```
1444 <dict>
1445 <key>DisableProfileImport</key>
1446 <true/> | <false/>
1447 </dict>
1448 ```
1449 #### policies.json
1450 ```
1451 {
1452 "policies": {
1453 "DisableProfileImport": true | false
1454 }
1455 }
1456 ```
1457 ### DisableProfileRefresh
1458 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1459
1460 **Compatibility:** Firefox 60, Firefox ESR 60\
1461 **CCK2 Equivalent:** `disableResetFirefox`\
1462 **Preferences Affected:** `browser.disableResetPrompt`
1463
1464 #### Windows (GPO)
1465 ```
1466 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1467 ```
1468 #### Windows (Intune)
1469 OMA-URI:
1470 ```
1471 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1472 ```
1473 Value (string):
1474 ```
1475 <enabled/> or <disabled/>
1476 ```
1477 #### macOS
1478 ```
1479 <dict>
1480 <key>DisableProfileRefresh</key>
1481 <true/> | <false/>
1482 </dict>
1483 ```
1484 #### policies.json
1485 ```
1486 {
1487 "policies": {
1488 "DisableProfileRefresh": true | false
1489 }
1490 }
1491 ```
1492 ### DisableSafeMode
1493 Disable safe mode within the browser.
1494
1495 On Windows, this disables safe mode via the command line as well.
1496
1497 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1498 **CCK2 Equivalent:** `disableSafeMode`\
1499 **Preferences Affected:** N/A
1500
1501 #### Windows (GPO)
1502 ```
1503 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1504 ```
1505 #### Windows (Intune)
1506 OMA-URI:
1507 ```
1508 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1509 ```
1510 Value (string):
1511 ```
1512 <enabled/> or <disabled/>
1513 ```
1514 #### macOS
1515 ```
1516 <dict>
1517 <key>DisableSafeMode</key>
1518 <true/> | <false/>
1519 </dict>
1520 ```
1521 #### policies.json
1522 ```
1523 {
1524 "policies": {
1525 "DisableSafeMode": true | false
1526 }
1527 }
1528 ```
1529 ### DisableSecurityBypass
1530 Prevent the user from bypassing security in certain cases.
1531
1532 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1533
1534 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1535
1536 **Compatibility:** Firefox 60, Firefox ESR 60\
1537 **CCK2 Equivalent:** N/A\
1538 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1539
1540 #### Windows (GPO)
1541 ```
1542 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1543 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1544 ```
1545 #### Windows (Intune)
1546 OMA-URI:
1547 ```
1548 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1549 ```
1550 Value (string):
1551 ```
1552 <enabled/> or <disabled/>
1553 ```
1554 OMA-URI:
1555 ```
1556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1557 ```
1558 Value (string):
1559 ```
1560 <enabled/> or <disabled/>
1561 ```
1562
1563 #### macOS
1564 ```
1565 <dict>
1566 <key>DisableSecurityBypass</key>
1567 <dict>
1568 <key>InvalidCertificate</key>
1569 <true/> | <false/>
1570 <key><SafeBrowsing/key>
1571 <true/> | <false/>
1572 </dict>
1573 </dict>
1574 ```
1575 #### policies.json
1576 ```
1577 {
1578 "policies": {
1579 "DisableSecurityBypass": {
1580 "InvalidCertificate": true | false,
1581 "SafeBrowsing": true | false
1582 }
1583 }
1584 }
1585 ```
1586 ### DisableSystemAddonUpdate
1587 Prevent system add-ons from being installed or update.
1588
1589 **Compatibility:** Firefox 60, Firefox ESR 60\
1590 **CCK2 Equivalent:** N/A\
1591 **Preferences Affected:** N/A
1592
1593 #### Windows (GPO)
1594 ```
1595 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1596 ```
1597 #### Windows (Intune)
1598 OMA-URI:
1599 ```
1600 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1601 ```
1602 Value (string):
1603 ```
1604 <enabled/> or <disabled/>
1605 ```
1606 #### macOS
1607 ```
1608 <dict>
1609 <key>DisableSystemAddonUpdate</key>
1610 <true/> | <false/>
1611 </dict>
1612 ```
1613 #### policies.json
1614 ```
1615 {
1616 "policies": {
1617 "DisableSystemAddonUpdate": true | false
1618 }
1619 }
1620 ```
1621 ### DisableTelemetry
1622 Prevent the upload of telemetry data.
1623
1624 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1625
1626 **Compatibility:** Firefox 60, Firefox ESR 60\
1627 **CCK2 Equivalent:** `disableTelemetry`\
1628 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1629
1630 #### Windows (GPO)
1631 ```
1632 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1633 ```
1634 #### Windows (Intune)
1635 OMA-URI:
1636 ```
1637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1638 ```
1639 Value (string):
1640 ```
1641 <enabled/> or <disabled/>
1642 ```
1643 #### macOS
1644 ```
1645 <dict>
1646 <key>DisableTelemetry</key>
1647 <true/> | <false/>
1648 </dict>
1649 ```
1650 #### policies.json
1651 ```
1652 {
1653 "policies": {
1654 "DisableTelemetry": true | false
1655 }
1656 }
1657 ```
1658 ### DisplayBookmarksToolbar
1659 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1660
1661 **Compatibility:** Firefox 60, Firefox ESR 60\
1662 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1663 **Preferences Affected:** N/A
1664
1665 #### Windows (GPO)
1666 ```
1667 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1668 ```
1669 #### Windows (Intune)
1670 OMA-URI:
1671 ```
1672 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1673 ```
1674 Value (string):
1675 ```
1676 <enabled/> or <disabled/>
1677 ```
1678 #### macOS
1679 ```
1680 <dict>
1681 <key>DisplayBookmarksToolbar</key>
1682 <true/> | <false/>
1683 </dict>
1684 ```
1685 #### policies.json
1686 ```
1687 {
1688 "policies": {
1689 "DisplayBookmarksToolbar": true | false
1690 }
1691 }
1692 ```
1693 ### DisplayMenuBar (Deprecated)
1694 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1695
1696 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1697 **CCK2 Equivalent:** `displayMenuBar`\
1698 **Preferences Affected:** N/A
1699
1700 #### Windows (GPO)
1701 ```
1702 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1703 ```
1704 #### macOS
1705 ```
1706 <dict>
1707 <key>DisplayMenuBar</key>
1708 <true/> | <false/>
1709 </dict>
1710 ```
1711 #### policies.json
1712 ```
1713 {
1714 "policies": {
1715 "DisplayMenuBar": true | false
1716 }
1717 }
1718 ```
1719 ### DisplayMenuBar
1720 Set the state of the menubar.
1721
1722 `always` means the menubar is shown and cannot be hidden.
1723
1724 `never` means the menubar is hidden and cannot be shown.
1725
1726 `default-on` means the menubar is on by default but can be hidden.
1727
1728 `default-off` means the menubar is off by default but can be shown.
1729
1730 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1731 **CCK2 Equivalent:** `displayMenuBar`\
1732 **Preferences Affected:** N/A
1733
1734 #### Windows (GPO)
1735 ```
1736 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1737 ```
1738 #### Windows (Intune)
1739 OMA-URI:
1740 ```
1741 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1742 ```
1743 Value (string):
1744 ```
1745 <enabled/>
1746 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1747 ```
1748 #### macOS
1749 ```
1750 <dict>
1751 <key>DisplayMenuBar</key>
1752 <string>always | never | default-on | default-off</string>
1753 </dict>
1754 ```
1755 #### policies.json
1756 ```
1757 {
1758 "policies": {
1759 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1760 }
1761 }
1762 ```
1763 ### DNSOverHTTPS
1764 Configure DNS over HTTPS.
1765
1766 `Enabled` determines whether DNS over HTTPS is enabled
1767
1768 `ProviderURL` is a URL to another provider.
1769
1770 `Locked` prevents the user from changing DNS over HTTPS preferences.
1771
1772 `ExcludedDomains` excludes domains from DNS over HTTPS.
1773
1774 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1775 **CCK2 Equivalent:** N/A\
1776 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1777
1778 #### Windows (GPO)
1779 ```
1780 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1781 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1784 ```
1785 #### Windows (Intune)
1786 OMA-URI:
1787 ```
1788 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1789 ```
1790 Value (string):
1791 ```
1792 <enabled/> or <disabled/>
1793 ```
1794 OMA-URI:
1795 ```
1796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1797 ```
1798 Value (string):
1799 ```
1800 <enabled/>
1801 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1802 ```
1803 OMA-URI:
1804 ```
1805 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1806 ```
1807 Value (string):
1808 ```
1809 <enabled/> or <disabled/>
1810 ```
1811 OMA-URI:
1812 ```
1813 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1814 ```
1815 Value (string):
1816 ```
1817 <enabled/>
1818 <data id="List" value="1&#xF000;example.com"/>
1819 ```
1820 #### macOS
1821 ```
1822 <dict>
1823 <key>DNSOverHTTPS</key>
1824 <dict>
1825 <key>Enabled</key>
1826 <true/> | <false/>
1827 <key>ProviderURL</key>
1828 <string>URL_TO_ALTERNATE_PROVIDER</string>
1829 <key>Locked</key>
1830 <true/> | <false/>
1831 <key>ExcludedDomains</key>
1832 <array>
1833 <string>example.com</string>
1834 </array>
1835 </dict>
1836 </dict>
1837 ```
1838 #### policies.json
1839 ```
1840 {
1841 "policies": {
1842 "DNSOverHTTPS": {
1843 "Enabled": true | false,
1844 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1845 "Locked": true | false,
1846 "ExcludedDomains": ["example.com"]
1847 }
1848 }
1849 }
1850 ```
1851 ### DontCheckDefaultBrowser
1852 Don't check if Firefox is the default browser at startup.
1853
1854 **Compatibility:** Firefox 60, Firefox ESR 60\
1855 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1856 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1857
1858 #### Windows (GPO)
1859 ```
1860 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1861 ```
1862 #### Windows (Intune)
1863 OMA-URI:
1864 ```
1865 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1866 ```
1867 Value (string):
1868 ```
1869 <enabled/> or <disabled/>
1870 ```
1871 #### macOS
1872 ```
1873 <dict>
1874 <key>DontCheckDefaultBrowser</key>
1875 <true/> | <false/>
1876 </dict>
1877 ```
1878 #### policies.json
1879 ```
1880 {
1881 "policies": {
1882 "DontCheckDefaultBrowser": true | false
1883 }
1884 }
1885 ```
1886 ### DefaultDownloadDirectory
1887 Set the default download directory.
1888
1889 You can use ${home} for the native home directory.
1890
1891 **Compatibility:** Firefox 68, Firefox ESR 68\
1892 **CCK2 Equivalent:** N/A\
1893 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1894
1895 #### Windows (GPO)
1896 ```
1897 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1898 ```
1899 #### Windows (Intune)
1900 OMA-URI:
1901 ```
1902 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1903 ```
1904 Value (string):
1905 ```
1906 <enabled/>
1907 <data id="Preferences_String" value="${home}\Downloads"/>
1908 ```
1909 #### macOS
1910 ```
1911 <dict>
1912 <key>DefaultDownloadDirectory</key>
1913 <string>${home}/Downloads</string>
1914 </dict>
1915 ```
1916 #### policies.json (macOS and Linux)
1917 ```
1918 {
1919 "policies": {
1920 "DefaultDownloadDirectory": "${home}/Downloads"
1921 }
1922 ```
1923 #### policies.json (Windows)
1924 ```
1925 {
1926 "policies": {
1927 "DefaultDownloadDirectory": "${home}\\Downloads"
1928 }
1929 ```
1930 ### DownloadDirectory
1931 Set and lock the download directory.
1932
1933 You can use ${home} for the native home directory.
1934
1935 **Compatibility:** Firefox 68, Firefox ESR 68\
1936 **CCK2 Equivalent:** N/A\
1937 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1938
1939 #### Windows (GPO)
1940 ```
1941 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1942 ```
1943 #### Windows (Intune)
1944 OMA-URI:
1945 ```
1946 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1947 ```
1948 Value (string):
1949 ```
1950 <enabled/>
1951 <data id="Preferences_String" value="${home}\Downloads"/>
1952 ```
1953 #### macOS
1954 ```
1955 <dict>
1956 <key>DownloadDirectory</key>
1957 <string>${home}/Downloads</string>
1958 </dict>
1959 ```
1960 #### policies.json (macOS and Linux)
1961 ```
1962 {
1963 "policies": {
1964 "DownloadDirectory": "${home}/Downloads"
1965 }
1966 ```
1967 #### policies.json (Windows)
1968 ```
1969 {
1970 "policies": {
1971 "DownloadDirectory": "${home}\\Downloads"
1972 }
1973 ```
1974 ### EnableTrackingProtection
1975 Configure tracking protection.
1976
1977 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1978
1979 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1980
1981 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1982
1983 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1984
1985 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1986
1987 `Exceptions` are origins for which tracking protection is not enabled.
1988
1989 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1990 **CCK2 Equivalent:** N/A\
1991 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1992
1993 #### Windows (GPO)
1994 ```
1995 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1996 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2000 ```
2001 #### Windows (Intune)
2002 OMA-URI:
2003 ```
2004 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2005 ```
2006 Value (string):
2007 ```
2008 <enabled/>
2009 <data id="TrackingProtectionLocked" value="true | false"/>
2010 <data id="Cryptomining" value="true | false"/>
2011 <data id="Fingerprinting" value="true | false"/>
2012 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2013 ```
2014 #### macOS
2015 ```
2016 <dict>
2017 <key>EnableTrackingProtection</key>
2018 <dict>
2019 <key>Value</key>
2020 <true/> | <false/>
2021 <key><Locked</key>
2022 <true/> | <false/>
2023 <key><Cryptomining</key>
2024 <true/> | <false/>
2025 <key><Fingerprinting</key>
2026 <true/> | <false/>
2027 <key>Exceptions</key>
2028 <array>
2029 <string>https://example.com</string>
2030 </array>
2031 </dict>
2032 </dict>
2033 ```
2034 #### policies.json
2035 ```
2036 {
2037 "policies": {
2038 "EnableTrackingProtection": {
2039 "Value": true | false,
2040 "Locked": true | false,
2041 "Cryptomining": true | false,
2042 "Fingerprinting": true | false,
2043 "Exceptions": ["https://example.com"]
2044 }
2045 }
2046 ```
2047 ### EncryptedMediaExtensions
2048 Enable or disable Encrypted Media Extensions and optionally lock it.
2049
2050 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2051
2052 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2053
2054 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2055 **CCK2 Equivalent:** N/A\
2056 **Preferences Affected:** `media.eme.enabled`
2057
2058 #### Windows (GPO)
2059 ```
2060 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2061 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2062 ```
2063 #### Windows (Intune)
2064 OMA-URI:
2065 ```
2066 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2068 ```
2069 Value (string):
2070 ```
2071 <enabled/>or <disabled/>
2072 ```
2073 #### macOS
2074 ```
2075 <dict>
2076 <key>EncryptedMediaExtensions</key>
2077 <dict>
2078 <key>Enabled</key>
2079 <true/> | <false/>
2080 <key><Locked</key>
2081 <true/> | <false/>
2082 </dict>
2083 </dict>
2084 ```
2085 #### policies.json
2086 ```
2087 {
2088 "policies": {
2089 "EncryptedMediaExtensions": {
2090 "Enabled": true | false,
2091 "Locked": true | false
2092 }
2093 }
2094 ```
2095 ### EnterprisePoliciesEnabled
2096 Enable policy support on macOS.
2097
2098 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2099 **CCK2 Equivalent:** N/A\
2100 **Preferences Affected:** N/A
2101
2102 #### macOS
2103 ```
2104 <dict>
2105 <key>EnterprisePoliciesEnabled</key>
2106 <true/>
2107 </dict>
2108 ```
2109 ### Extensions
2110 Control the installation, uninstallation and locking of extensions.
2111
2112 `Install` is a list of URLs or native paths for extensions to be installed.
2113
2114 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2115
2116 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2117
2118 **Compatibility:** Firefox 60, Firefox ESR 60\
2119 **CCK2 Equivalent:** `addons`\
2120 **Preferences Affected:** N/A
2121
2122 #### Windows (GPO)
2123 ```
2124 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2125 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2126 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2127 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2128 ```
2129 #### macOS
2130 ```
2131 <dict>
2132 <key>Extensions</key>
2133 <dict>
2134 <key>Install</key>
2135 <array>
2136 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2137 <string>//path/to/xpi</string>
2138 </array>
2139 <key>Uninstall</key>
2140 <array>
2141 <string>bad_addon_id@mozilla.org</string>
2142 </array>
2143 <key>Locked</key>
2144 <array>
2145 <string>addon_id@mozilla.org</string>
2146 </array>
2147 </dict>
2148 </dict>
2149 ```
2150 #### policies.json
2151 ```
2152 {
2153 "policies": {
2154 "Extensions": {
2155 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2156 "Uninstall": ["bad_addon_id@mozilla.org"],
2157 "Locked": ["addon_id@mozilla.org"]
2158 }
2159 }
2160 }
2161 ```
2162 ### ExtensionSettings
2163 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2164
2165 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2166
2167 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
2168
2169 The configuration for each extension is another dictionary that can contain the fields documented below.
2170
2171 | Name | Description |
2172 | --- | --- |
2173 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2174 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
2175 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2176 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2178 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
2179 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2180 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2181 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
2182
2183 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2184 **CCK2 Equivalent:** N/A\
2185 **Preferences Affected:** N/A
2186
2187 #### Windows (GPO)
2188 ```
2189 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2190 {
2191 "*": {
2192 "blocked_install_message": "Custom error message.",
2193 "install_sources": ["https://addons.mozilla.org/"],
2194 "installation_mode": "blocked",
2195 "allowed_types": ["extension"]
2196 },
2197 "uBlock0@raymondhill.net": {
2198 "installation_mode": "force_installed",
2199 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2200 }
2201 }
2202 ```
2203 #### Windows (Intune)
2204 OMA-URI:
2205 ```
2206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2207 ```
2208 Value (string):
2209 ```
2210 <enabled/>
2211 <data id="ExtensionSettings" value='
2212 "*": {
2213 "blocked_install_message": "Custom error message.",
2214 "install_sources": ["https://addons.mozilla.org/"],
2215 "installation_mode": "blocked",
2216 "allowed_types": ["extension"]
2217 },
2218 "uBlock0@raymondhill.net": {
2219 "installation_mode": "force_installed",
2220 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2221 }'/>
2222 ```
2223 #### macOS
2224 ```
2225 <dict>
2226 <key>ExtensionSettings</key>
2227 <dict>
2228 <key>*</key>
2229 <dict>
2230 <key>blocked_install_message</key>
2231 <string>Custom error message.</string>
2232 <key>install_sources</key>
2233 <array>
2234 <string>https://addons.mozilla.org/</string>
2235 </array>
2236 <key>installation_mode</key>
2237 <string>blocked</string>
2238 <key>allowed_types</key>
2239 <array>
2240 <string>extension</string>
2241 </array>
2242 </dict>
2243 <key>uBlock0@raymondhill.net</key>
2244 <dict>
2245 <key>installation_mode</key>
2246 <string>force_installed</string>
2247 <key>install_url</key>
2248 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2249 </dict>
2250 </dict>
2251 </dict>
2252 ```
2253 #### policies.json
2254 ```
2255 {
2256 "policies": {
2257 "ExtensionSettings": {
2258 "*": {
2259 "blocked_install_message": "Custom error message.",
2260 "install_sources": ["https://addons.mozilla.org/"],
2261 "installation_mode": "blocked",
2262 "allowed_types": ["extension"]
2263 },
2264 "uBlock0@raymondhill.net": {
2265 "installation_mode": "force_installed",
2266 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2267 }
2268 }
2269 }
2270 }
2271 ```
2272 ### ExtensionUpdate
2273 Control extension updates.
2274
2275 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2276 **CCK2 Equivalent:** N/A\
2277 **Preferences Affected:** `extensions.update.enabled`
2278
2279 #### Windows (GPO)
2280 ```
2281 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2282 ```
2283 #### Windows (Intune)
2284 OMA-URI:
2285 ```
2286 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2287 ```
2288 Value (string):
2289 ```
2290 <enabled/> or <disabled/>
2291 ```
2292 #### macOS
2293 ```
2294 <dict>
2295 <key>ExtensionUpdate</key>
2296 <true/> | <false/>
2297 </dict>
2298 ```
2299 #### policies.json
2300 ```
2301 {
2302 "policies": {
2303 "ExtensionUpdate": true | false
2304 }
2305 }
2306 ```
2307 ### FlashPlugin
2308 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2309
2310 `Allow` is a list of origins where Flash are allowed.
2311
2312 `Block` is a list of origins where Flash is not allowed.
2313
2314 `Default` determines whether or not Flash is allowed by default.
2315
2316 `Locked` prevents the user from changing Flash preferences.
2317
2318 **Compatibility:** Firefox 60, Firefox ESR 60\
2319 **CCK2 Equivalent:** `permissions.plugin`\
2320 **Preferences Affected:** `plugin.state.flash`
2321
2322 #### Windows (GPO)
2323 ```
2324 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2325 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2326 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2327 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2328 ```
2329 #### Windows (Intune)
2330 OMA-URI:
2331 ```
2332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2333 ```
2334 Value (string):
2335 ```
2336 <enabled/>
2337 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2338 ```
2339 OMA-URI:
2340 ```
2341 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2342 ```
2343 Value (string):
2344 ```
2345 <enabled/> or <disabled/>
2346 ```
2347 OMA-URI:
2348 ```
2349 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2350 ```
2351 Value (string):
2352 ```
2353 <enabled/> or <disabled/>
2354 ```
2355 #### macOS
2356 ```
2357 <dict>
2358 <key>FlashPlugin</key>
2359 <dict>
2360 <key>Allow</key>
2361 <array>
2362 <string>http://example.org</string>
2363 </array>
2364 <key>Block</key>
2365 <array>
2366 <string>http://example.edu</string>
2367 </array>
2368 <key>Default</key>
2369 <true/> | <false/>
2370 <key>Locked</key>
2371 <true/> | <false/>
2372 </dict>
2373 </dict>
2374 ```
2375 #### policies.json
2376 ```
2377 {
2378 "policies": {
2379 "FlashPlugin": {
2380 "Allow": ["http://example.org/"],
2381 "Block": ["http://example.edu/"],
2382 "Default": true | false,
2383 "Locked": true | false
2384 }
2385 }
2386 }
2387 ```
2388 ### FirefoxHome
2389 Customize the Firefox Home page.
2390
2391 **Compatibility:** Firefox 68, Firefox ESR 68\
2392 **CCK2 Equivalent:** N/A\
2393 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2394
2395 #### Windows (GPO)
2396 ```
2397 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2398 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2399 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2400 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2401 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2402 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2403 ```
2404 #### Windows (Intune)
2405 OMA-URI:
2406 ```
2407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2408 ```
2409 Value (string):
2410 ```
2411 <enabled/>
2412 <data id="FirefoxHome_Search" value="true | false"/>
2413 <data id="FirefoxHome_TopSites" value="true | false"/>
2414 <data id="FirefoxHome_Highlights" value="true | false"/>
2415 <data id="FirefoxHome_Pocket" value="true | false"/>
2416 <data id="FirefoxHome_Snippets" value="true | false"/>
2417 <data id="FirefoxHome_Locked" value="true | false"/>
2418 ```
2419 #### macOS
2420 ```
2421 <dict>
2422 <key>FirefoxHome</key>
2423 <dict>
2424 <key>Search</key>
2425 <true/> | <false/>
2426 <key>TopSites</key>
2427 <true/> | <false/>
2428 <key>Highlights</key>
2429 <true/> | <false/>
2430 <key>Pocket</key>
2431 <true/> | <false/>
2432 <key>Snippets</key>
2433 <true/> | <false/>
2434 <key>Locked</key>
2435 <true/> | <false/>
2436 </dict>
2437 </dict>
2438 ```
2439 #### policies.json
2440 ```
2441 {
2442 "policies": {
2443 "FirefoxHome": {
2444 "Search": true | false,
2445 "TopSites": true | false,
2446 "Highlights": true | false,
2447 "Pocket": true | false,
2448 "Snippets": true | false,
2449 "Locked": true | false
2450 }
2451 }
2452 }
2453 ```
2454 ### HardwareAcceleration
2455 Control hardware acceleration.
2456
2457 **Compatibility:** Firefox 60, Firefox ESR 60\
2458 **CCK2 Equivalent:** N/A\
2459 **Preferences Affected:** `layers.acceleration.disabled`
2460
2461 #### Windows (GPO)
2462 ```
2463 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2464 ```
2465 #### Windows (Intune)
2466 OMA-URI:
2467 ```
2468 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2469 ```
2470 Value (string):
2471 ```
2472 <enabled/> or <disabled/>
2473 ```
2474 #### macOS
2475 ```
2476 <dict>
2477 <key>HardwareAcceleration</key>
2478 <true/> | <false/>
2479 </dict>
2480 ```
2481 #### policies.json
2482 ```
2483 {
2484 "policies": {
2485 "HardwareAcceleration": true | false
2486 }
2487 }
2488 ```
2489 ### Homepage
2490 Configure the default homepage and how Firefox starts.
2491
2492 `URL` is the default homepage.
2493
2494 `Locked` prevents the user from changing homepage preferences.
2495
2496 `Additional` allows for more than one homepage.
2497
2498 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2499
2500 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2501
2502 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2503 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2504 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2505
2506 #### Windows (GPO)
2507 ```
2508 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2509 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2510 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2511 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2512 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2513 ```
2514 #### Windows (Intune)
2515 OMA-URI:
2516 ```
2517 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2518 ```
2519 Value (string):
2520 ```
2521 <enabled/>
2522
2523 <data id="HomepageURL" value="https://example.com"/>
2524 <data id="HomepageLocked" value="true | false"/>
2525 ```
2526 OMA-URI:
2527 ```
2528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2529 ```
2530 Value (string):
2531 ```
2532 <enabled/>
2533
2534 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2535 ```
2536 OMA-URI:
2537 ```
2538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2539 ```
2540 Value (string):
2541 ```
2542 <enabled/>
2543
2544 <data id="StartPage" value="none | homepage | previous-session"/>
2545 ```
2546 #### macOS
2547 ```
2548 <dict>
2549 <key>Homepage</key>
2550 <dict>
2551 <key>URL</key>
2552 <string>http://example.com</string>
2553 <key>Locked</key>
2554 <true/> | <false/>
2555 <key>Additional</key>
2556 <array>
2557 <string>http://example.org</string>
2558 <string>http://example.edu</string>
2559 </array>
2560 <key>StartPage</key>
2561 <string>none | homepage | previous-session | homepage-locked</string>
2562 </dict>
2563 </dict>
2564 ```
2565 #### policies.json
2566 ```
2567 {
2568 "policies": {
2569 "Homepage": {
2570 "URL": "http://example.com/",
2571 "Locked": true | false,
2572 "Additional": ["http://example.org/",
2573 "http://example.edu/"],
2574 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2575 }
2576 }
2577 }
2578 ```
2579 ### InstallAddonsPermission
2580 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2581
2582 `Allow` is a list of origins where extension installs are allowed.
2583
2584 `Default` determines whether or not extension installs are allowed by default.
2585
2586 **Compatibility:** Firefox 60, Firefox ESR 60\
2587 **CCK2 Equivalent:** `permissions.install`\
2588 **Preferences Affected:** `xpinstall.enabled`
2589
2590 #### Windows (GPO)
2591 ```
2592 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2593 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2594 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2595 ```
2596 #### Windows (Intune)
2597 OMA-URI:
2598 ```
2599 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2600 ```
2601 Value (string):
2602 ```
2603 <enabled/>
2604 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2605 ```
2606 OMA-URI:
2607 ```
2608 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2609 ```
2610 Value (string):
2611 ```
2612 <enabled/>
2613 ```
2614 #### macOS
2615 ```
2616 <dict>
2617 <key>InstallAddonsPermission</key>
2618 <dict>
2619 <key>Allow</key>
2620 <array>
2621 <string>http://example.org</string>
2622 <string>http://example.edu</string>
2623 </array>
2624 <key>Default</key>
2625 <true/> | <false/>
2626 </dict>
2627 </dict>
2628 ```
2629 #### policies.json
2630 ```
2631 {
2632 "policies": {
2633 "InstallAddonsPermission": {
2634 "Allow": ["http://example.org/",
2635 "http://example.edu/"],
2636 "Default": true | false
2637 }
2638 }
2639 }
2640 ```
2641 ### LegacyProfiles
2642 Disable the feature enforcing a separate profile for each installation.
2643
2644 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2645
2646 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2647
2648 This policy only work on Windows via GPO (not policies.json).
2649
2650 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2651 **CCK2 Equivalent:** N/A\
2652 **Preferences Affected:** N/A
2653
2654 #### Windows (GPO)
2655 ```
2656 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2657 ```
2658 #### Windows (Intune)
2659 OMA-URI:
2660 ```
2661 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2662 ```
2663 Value (string):
2664 ```
2665 <enabled/> or <disabled/>
2666 ```
2667 ### LocalFileLinks
2668 Enable linking to local files by origin.
2669
2670 **Compatibility:** Firefox 68, Firefox ESR 68\
2671 **CCK2 Equivalent:** N/A\
2672 **Preferences Affected:** `capability.policy.localfilelinks.*`
2673
2674 #### Windows (GPO)
2675 ```
2676 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2677 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2678 ```
2679 #### Windows (Intune)
2680 OMA-URI:
2681 ```
2682 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2683 ```
2684 Value (string):
2685 ```
2686 <enabled/>
2687 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2688 ```
2689 #### macOS
2690 ```
2691 <dict>
2692 <key>LocalFileLinks</key>
2693 <array>
2694 <string>http://example.org</string>
2695 <string>http://example.edu</string>
2696 </array>
2697 </dict>
2698 ```
2699 #### policies.json
2700 ```
2701 {
2702 "policies": {
2703 "LocalFileLinks": ["http://example.org/",
2704 "http://example.edu/"]
2705 }
2706 }
2707 ```
2708 ### MasterPassword
2709 Require or prevent using a master password.
2710
2711 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2712
2713 **Compatibility:** Firefox 78, Firefox ESR 78\
2714 **CCK2 Equivalent:** `noMasterPassword`\
2715 **Preferences Affected:** N/A
2716
2717 #### Windows (GPO)
2718 ```
2719 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2720 ```
2721 #### Windows (Intune)
2722 OMA-URI:
2723 ```
2724 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2725 ```
2726 Value (string):
2727 ```
2728 <enabled/> or <disabled/>
2729 ```
2730 #### macOS
2731 ```
2732 <dict>
2733 <key>MasterPassword</key>
2734 <true/> | <false/>
2735 </dict>
2736 ```
2737 #### policies.json
2738 ```
2739 {
2740 "policies": {
2741 "MasterPassword": true | false
2742 }
2743 }
2744 ```
2745 ### NetworkPrediction
2746 Enable or disable network prediction (DNS prefetching).
2747
2748 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2749 **CCK2 Equivalent:** N/A\
2750 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2751
2752 #### Windows (GPO)
2753 ```
2754 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2755 ```
2756 #### Windows (Intune)
2757 OMA-URI:
2758 ```
2759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2760 ```
2761 Value (string):
2762 ```
2763 <enabled/> or <disabled/>
2764 ```
2765 #### macOS
2766 ```
2767 <dict>
2768 <key>NetworkPrediction</key>
2769 <true/> | <false/>
2770 </dict>
2771 ```
2772 #### policies.json
2773 ```
2774 {
2775 "policies": {
2776 "NetworkPrediction": true | false
2777 }
2778 ```
2779 ### NewTabPage
2780 Enable or disable the New Tab page.
2781
2782 **Compatibility:** Firefox 68, Firefox ESR 68\
2783 **CCK2 Equivalent:** N/A\
2784 **Preferences Affected:** `browser.newtabpage.enabled`
2785
2786 #### Windows (GPO)
2787 ```
2788 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2789 ```
2790 #### Windows (Intune)
2791 OMA-URI:
2792 ```
2793 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2794 ```
2795 Value (string):
2796 ```
2797 <enabled/> or <disabled/>
2798 ```
2799 #### macOS
2800 ```
2801 <dict>
2802 <key>NewTabPage</key>
2803 <true/> | <false/>
2804 </dict>
2805 ```
2806 #### policies.json
2807 ```
2808 {
2809 "policies": {
2810 "NewTabPage": true | false
2811 }
2812 ```
2813 ### NoDefaultBookmarks
2814 Disable the creation of default bookmarks.
2815
2816 This policy is only effective if the user profile has not been created yet.
2817
2818 **Compatibility:** Firefox 60, Firefox ESR 60\
2819 **CCK2 Equivalent:** `removeDefaultBookmarks`\
2820 **Preferences Affected:** N/A
2821
2822 #### Windows (GPO)
2823 ```
2824 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
2825 ```
2826 #### Windows (Intune)
2827 OMA-URI:
2828 ```
2829 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
2830 ```
2831 Value (string):
2832 ```
2833 <enabled/> or <disabled/>
2834 ```
2835 #### macOS
2836 ```
2837 <dict>
2838 <key>NoDefaultBookmarks</key>
2839 <true/> | <false/>
2840 </dict>
2841 ```
2842 #### policies.json
2843 ```
2844 {
2845 "policies": {
2846 "NoDefaultBookmarks": true | false
2847 }
2848 }
2849 ```
2850 ### OfferToSaveLogins
2851 Control whether or not Firefox offers to save passwords.
2852
2853 **Compatibility:** Firefox 60, Firefox ESR 60\
2854 **CCK2 Equivalent:** `dontRememberPasswords`\
2855 **Preferences Affected:** `signon.rememberSignons`
2856
2857 #### Windows (GPO)
2858 ```
2859 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
2860 ```
2861 #### Windows (Intune)
2862 OMA-URI:
2863 ```
2864 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
2865 ```
2866 Value (string):
2867 ```
2868 <enabled/> or <disabled/>
2869 ```
2870 #### macOS
2871 ```
2872 <dict>
2873 <key>OfferToSaveLogins</key>
2874 <true/> | <false/>
2875 </dict>
2876 ```
2877 #### policies.json
2878 ```
2879 {
2880 "policies": {
2881 "OfferToSaveLogins": true | false
2882 }
2883 }
2884 ```
2885 ### OfferToSaveLoginsDefault
2886 Sets the default value of signon.rememberSignons without locking it.
2887
2888 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2889 **CCK2 Equivalent:** `dontRememberPasswords`\
2890 **Preferences Affected:** `signon.rememberSignons`
2891
2892 #### Windows (GPO)
2893 ```
2894 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2895 ```
2896 #### Windows (Intune)
2897 OMA-URI:
2898 ```
2899 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
2900 ```
2901 Value (string):
2902 ```
2903 <enabled/> or <disabled/>
2904 ```
2905 #### macOS
2906 ```
2907 <dict>
2908 <key>OfferToSaveLoginsDefault</key>
2909 <true/> | <false/>
2910 </dict>
2911 ```
2912 #### policies.json
2913 ```
2914 {
2915 "policies": {
2916 "OfferToSaveLoginsDefault": true | false
2917 }
2918 }
2919 ```
2920 ### OverrideFirstRunPage
2921 Override the first run page. If the value is blank, no first run page is displayed.
2922
2923 **Compatibility:** Firefox 60, Firefox ESR 60\
2924 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2925 **Preferences Affected:** `startup.homepage_welcome_url`
2926
2927 #### Windows (GPO)
2928 ```
2929 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2930 ```
2931 #### Windows (Intune)
2932 OMA-URI:
2933 ```
2934 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
2935 ```
2936 Value (string):
2937 ```
2938 <enabled/>
2939 <data id="OverridePage" value="https://example.com"/>
2940 ```
2941 #### macOS
2942 ```
2943 <dict>
2944 <key>OverrideFirstRunPage</key>
2945 <string>http://example.org</string>
2946 </dict>
2947 ```
2948 #### policies.json
2949 ```
2950 {
2951 "policies": {
2952 "OverrideFirstRunPage": "http://example.org"
2953 }
2954 ```
2955 ### OverridePostUpdatePage
2956 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2957
2958 **Compatibility:** Firefox 60, Firefox ESR 60\
2959 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2960 **Preferences Affected:** `startup.homepage_override_url`
2961
2962 #### Windows (GPO)
2963 ```
2964 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2965 ```
2966 #### Windows (Intune)
2967 OMA-URI:
2968 ```
2969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
2970 ```
2971 Value (string):
2972 ```
2973 <enabled/>
2974 <data id="OverridePage" value="https://example.com"/>
2975 ```
2976 #### macOS
2977 ```
2978 <dict>
2979 <key>OverridePostUpdatePage</key>
2980 <string>http://example.org</string>
2981 </dict>
2982 ```
2983 #### policies.json
2984 ```
2985 {
2986 "policies": {
2987 "OverridePostUpdatePage": "http://example.org"
2988 }
2989 ```
2990 ### PasswordManagerEnabled
2991 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2992
2993 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2994 **CCK2 Equivalent:** N/A\
2995 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2996
2997 #### Windows (GPO)
2998 ```
2999 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3000 ```
3001 #### Windows (Intune)
3002 OMA-URI:
3003 ```
3004 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3005 ```
3006 Value (string):
3007 ```
3008 <enabled/> or <disabled/>
3009 ```
3010 #### macOS
3011 ```
3012 <dict>
3013 <key>PasswordManagerEnabled</key>
3014 <true/> | <false/>
3015 </dict>
3016 ```
3017 #### policies.json
3018 ```
3019 {
3020 "policies": {
3021 "PasswordManagerEnabled": true | false
3022 }
3023 }
3024 ```
3025 ### PDFjs
3026 Disable or configure PDF.js, the built-in PDF viewer.
3027
3028 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3029
3030 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3031
3032 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3033
3034 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3035 **CCK2 Equivalent:** N/A\
3036 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3037
3038 #### Windows (GPO)
3039 ```
3040 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3041 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3042 ```
3043 #### Windows (Intune)
3044 OMA-URI:
3045 ```
3046 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3047 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3048 ```
3049 Value (string):
3050 ```
3051 <enabled/>or <disabled/>
3052 ```
3053 #### macOS
3054 ```
3055 <dict>
3056 <key>PDFjs</key>
3057 <dict>
3058 <key>Enabled</key>
3059 <true/> | <false/>
3060 <key><EnablePermissions</key>
3061 <true/> | <false/>
3062 </dict>
3063 </dict>
3064 ```
3065 #### policies.json
3066 ```
3067 {
3068 "policies": {
3069 "PSFjs": {
3070 "Enabled": true | false,
3071 "EnablePermissions": true | false
3072 }
3073 }
3074 ```
3075 ### Permissions
3076 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3077
3078 `Allow` is a list of origins where the feature is allowed.
3079
3080 `Block` is a list of origins where the feature is not allowed.
3081
3082 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3083
3084 `Locked` prevents the user from changing preferences for the feature.
3085
3086 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3087
3088 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3089 **CCK2 Equivalent:** N/A\
3090 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3091
3092 #### Windows (GPO)
3093 ```
3094 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3095 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3096 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3097 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3098 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3099 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3100 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3101 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3102 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3103 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3104 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3105 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3106 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3107 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3108 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3109 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3110 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3111 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3112 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3113 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3114 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3115 ```
3116 #### Windows (Intune)
3117 OMA-URI:
3118 ```
3119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3120 ```
3121 Value (string):
3122 ```
3123 <enabled/> or <disabled/>
3124 ```
3125 OMA-URI:
3126 ```
3127 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3128 ```
3129 Value (string):
3130 ```
3131 <enabled/> or <disabled/>
3132 ```
3133 OMA-URI:
3134 ```
3135 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3136 ```
3137 Value (string):
3138 ```
3139 <enabled/>
3140 <data id="Permissions" value="1&#xF000;https://example.org"/>
3141 ```
3142 OMA-URI:
3143 ```
3144 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3145 ```
3146 Value (string):
3147 ```
3148 <enabled/> or <disabled/>
3149 ```
3150 OMA-URI:
3151 ```
3152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3153 ```
3154 Value (string):
3155 ```
3156 <enabled/> or <disabled/>
3157 ```
3158 OMA-URI:
3159 ```
3160 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3161 ```
3162 Value (string):
3163 ```
3164 <enabled/>
3165 <data id="Permissions" value="1&#xF000;https://example.org"/>
3166 ```
3167 OMA-URI:
3168 ```
3169 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3170 ```
3171 Value (string):
3172 ```
3173 <enabled/>
3174 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3175 ```
3176 OMA-URI:
3177 ```
3178 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3179 ```
3180 Value (string):
3181 ```
3182 <enabled/>
3183 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3184 ```
3185 OMA-URI:
3186 ```
3187 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3188 ```
3189 Value (string):
3190 ```
3191 <enabled/> or <disabled/>
3192 ```
3193 #### macOS
3194 ```
3195 <dict>
3196 <key>Permissions</key>
3197 <dict>
3198 <key>Camera</key>
3199 <dict>
3200 <key>Allow</key>
3201 <array>
3202 <string>https://example.org</string>
3203 <string>https://example.org:1234</string>
3204 </array>
3205 <key>Block</key>
3206 <array>
3207 <string>https://example.edu</string>
3208 </array>
3209 <key>BlockNewRequests</key>
3210 <true/> | <false/>
3211 <key>Locked</key>
3212 <true/> | <false/>
3213 </dict>
3214 <key>Microphone</key>
3215 <dict>
3216 <key>Allow</key>
3217 <array>
3218 <string>https://example.org</string>
3219 </array>
3220 <key>Block</key>
3221 <array>
3222 <string>https://example.edu</string>
3223 </array>
3224 <key>BlockNewRequests</key>
3225 <true/> | <false/>
3226 <key>Locked</key>
3227 <true/> | <false/>
3228 </dict>
3229 <key>Location</key>
3230 <dict>
3231 <key>Allow</key>
3232 <array>
3233 <string>https://example.org</string>
3234 </array>
3235 <key>Block</key>
3236 <array>
3237 <string>https://example.edu</string>
3238 </array>
3239 <key>BlockNewRequests</key>
3240 <true/> | <false/>
3241 <key>Locked</key>
3242 <true/> | <false/>
3243 </dict>
3244 <key>Notifications</key>
3245 <dict>
3246 <key>Allow</key>
3247 <array>
3248 <string>https://example.org</string>
3249 </array>
3250 <key>Block</key>
3251 <array>
3252 <string>https://example.edu</string>
3253 </array>
3254 <key>BlockNewRequests</key>
3255 <true/>
3256 <key>Locked</key>
3257 <true/>
3258 </dict>
3259 <key>Autoplay</key>
3260 <dict>
3261 <key>Allow</key>
3262 <array>
3263 <string>https://example.org</string>
3264 </array>
3265 <key>Block</key>
3266 <array>
3267 <string>https://example.edu</string>
3268 </array>
3269 <key>Default</key>
3270 <string>allow-audio-video | block-audio | block-audio-video</string>
3271 <key>Locked</key>
3272 <true/> | <false/>
3273 </dict>
3274 </dict>
3275 </dict>
3276 ```
3277 #### policies.json
3278 ```
3279 {
3280 "policies": {
3281 "Permissions": {
3282 "Camera": {
3283 "Allow": ["https://example.org","https://example.org:1234"],
3284 "Block": ["https://example.edu"],
3285 "BlockNewRequests": true | false,
3286 "Locked": true | false
3287 },
3288 "Microphone": {
3289 "Allow": ["https://example.org"],
3290 "Block": ["https://example.edu"],
3291 "BlockNewRequests": true | false,
3292 "Locked": true | false
3293 },
3294 "Location": {
3295 "Allow": ["https://example.org"],
3296 "Block": ["https://example.edu"],
3297 "BlockNewRequests": true | false,
3298 "Locked": true | false
3299 },
3300 "Notifications": {
3301 "Allow": ["https://example.org"],
3302 "Block": ["https://example.edu"],
3303 "BlockNewRequests": true | false,
3304 "Locked": true | false
3305 },
3306 "Autoplay": {
3307 "Allow": ["https://example.org"],
3308 "Block": ["https://example.edu"],
3309 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3310 "Locked": true | false
3311 }
3312 }
3313 }
3314 }
3315 ```
3316 ### PictureInPicture
3317
3318 Enable or disable Picture-in-Picture.
3319
3320 **Compatibility:** Firefox 78, Firefox ESR 78\
3321 **CCK2 Equivalent:** N/A\
3322 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3323
3324 #### Windows (GPO)
3325 ```
3326 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3327 ```
3328 #### Windows (Intune)
3329 OMA-URI:
3330 ```
3331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3332 ```
3333 Value (string):
3334 ```
3335 <enabled/> or <disabled/>
3336 ```
3337 #### macOS
3338 ```
3339 <dict>
3340 <key>PictureInPicture</key>
3341 <true/> | <false/>
3342 </dict>
3343 ```
3344 #### policies.json
3345 ```
3346 {
3347 "policies": {
3348 "PictureInPicture": true | false
3349 }
3350 }
3351 ```
3352 ### PopupBlocking
3353 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3354
3355 `Allow` is a list of origins where popup-windows are allowed.
3356
3357 `Default` determines whether or not pop-up windows are allowed by default.
3358
3359 `Locked` prevents the user from changing pop-up preferences.
3360
3361 **Compatibility:** Firefox 60, Firefox ESR 60\
3362 **CCK2 Equivalent:** `permissions.popup`\
3363 **Preferences Affected:** `dom.disable_open_during_load`
3364
3365 #### Windows (GPO)
3366 ```
3367 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3368 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3369 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3370 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3371 ```
3372 #### Windows (Intune)
3373 OMA-URI:
3374 ```
3375 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3376 ```
3377 Value (string):
3378 ```
3379 <enabled/>
3380 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3381 ```
3382 OMA-URI:
3383 ```
3384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3385 ```
3386 Value (string):
3387 ```
3388 <enabled/> or <disabled/>
3389 ```
3390 OMA-URI:
3391 ```
3392 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3393 ```
3394 Value (string):
3395 ```
3396 <enabled/> or <disabled/>
3397 ```
3398 #### macOS
3399 ```
3400 <dict>
3401 <key>PopupBlocking</key>
3402 <dict>
3403 <key>Allow</key>
3404 <array>
3405 <string>http://example.org</string>
3406 <string>http://example.edu</string>
3407 </array>
3408 <key>Default</key>
3409 <true/> | <false/>
3410 <key>Locked</key>
3411 <true/> | <false/>
3412 </dict>
3413 </dict>
3414 ```
3415 #### policies.json
3416 ```
3417 {
3418 "policies": {
3419 "PopupBlocking": {
3420 "Allow": ["http://example.org/",
3421 "http://example.edu/"],
3422 "Default": true | false,
3423 "Locked": true | false
3424 }
3425 }
3426 }
3427 ```
3428 ### Preferences
3429 Set and lock certain preferences.
3430
3431 **Compatibility:** See below\
3432 **CCK2 Equivalent:** `preferences`\
3433 **Preferences Affected:** See below
3434
3435 | Preference | Type | Compatibility | Default
3436 | --- | --- | --- | ---
3437 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3438 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3439 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3440 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3441 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3442 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3443 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3444 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3445 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3446 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3447 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3448 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3449 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3450 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3451 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3452 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3453 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3454 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3455 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3456 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3457 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3458 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3459 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3460 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3461 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3462 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3463 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3464 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3465 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3466 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3467 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3468 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3469 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3470 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3471 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3472 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3473 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3474 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3475 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3476 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3477 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3478 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3479 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3480 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3481 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3482 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3483 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3484 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3485 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3486 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3487 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3488 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3489 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3490 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3491 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3492 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3493 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3494 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3495 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3496 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3497 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3498 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3499 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3500 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3501 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3502 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3503 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3504 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3505 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3506 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3507 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3508 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3509 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3510 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3511 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3512 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3513 disabled
3514 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3515 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3516 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3517 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3518 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3519 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3520 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3521 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3522 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3523 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3524 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3525 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3526 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3527 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3528 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3529 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3530 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3531 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3532 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3533 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3534 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3535 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3536 #### Windows (GPO)
3537 ```
3538 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3539 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3540 ```
3541 #### Windows (Intune)
3542 OMA-URI: (periods are replaced by underscores)
3543 ```
3544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3545 ```
3546 Value (string):
3547 ```
3548 <enabled/> or <disabled/>
3549 ```
3550 #### macOS
3551 ```
3552 <dict>
3553 <key>Preferences</key>
3554 <dict>
3555 <key>boolean_preference_name</key>
3556 <true/> | <false/>
3557 <key>string_preference_name</key>
3558 <string>string_value</string>
3559 </dict>
3560 </dict>
3561 ```
3562 #### policies.json
3563 ```
3564 {
3565 "policies": {
3566 "Preferences": {
3567 "boolean_preference_name": true | false,
3568 "string_preference_name": "string_value"
3569 }
3570 }
3571 }
3572 ```
3573 ### PromptForDownloadLocation
3574 Ask where to save each file before downloading.
3575
3576 **Compatibility:** Firefox 68, Firefox ESR 68\
3577 **CCK2 Equivalent:** N/A\
3578 **Preferences Affected:** `browser.download.useDownloadDir`
3579
3580 #### Windows (GPO)
3581 ```
3582 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3583 ```
3584 #### Windows (Intune)
3585 OMA-URI:
3586 ```
3587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3588 ```
3589 Value (string):
3590 ```
3591 <enabled/> or <disabled/>
3592 ```
3593 #### macOS
3594 ```
3595 <dict>
3596 <key>PromptForDownloadLocation</key>
3597 <true/> | <false/>
3598 </dict>
3599 ```
3600 #### policies.json
3601 ```
3602 {
3603 "policies": {
3604 "PromptForDownloadLocation": true | false
3605 }
3606 }
3607 ```
3608 ### Proxy
3609 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3610 To specify ports, append them to the hostnames with a colon (:).
3611
3612 `Mode` is the proxy method being used.
3613
3614 `Locked` is whether or not proxy settings can be changed.
3615
3616 `HTTPProxy` is the HTTP proxy server.
3617
3618 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3619
3620 `SSLProxy` is the SSL proxy server.
3621
3622 `FTPProxy` is the FTP proxy server.
3623
3624 `SOCKSProxy` is the SOCKS proxy server
3625
3626 `SOCKSVersion` is the SOCKS version (4 or 5)
3627
3628 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3629
3630 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3631
3632 `AutoLogin` means do not prompt for authentication if password is saved.
3633
3634 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3635
3636 **Compatibility:** Firefox 60, Firefox ESR 60\
3637 **CCK2 Equivalent:** `networkProxy*`\
3638 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3639
3640 #### Windows (GPO)
3641 ```
3642 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3643 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3644 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3645 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3646 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3647 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3648 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3649 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3650 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3651 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3652 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3653 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3654 ```
3655 #### Windows (Intune)
3656 OMA-URI:
3657 ```
3658 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3659 ```
3660 Value (string):
3661 ```
3662 <enabled/>
3663 <data id="ProxyLocked" value="true | false"/>
3664 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3665 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3666 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3667 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3668 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3669 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3670 <data id="SOCKSVersion" value="4 | 5"/>
3671 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3672 <data id="Passthrough" value="<local>"/>
3673 <data id="AutoLogin" value="true | false"/>
3674 <data id="UseProxyForDNS" value="true | false"/>
3675 ```
3676 #### macOS
3677 ```
3678 <dict>
3679 <key>Proxy</key>
3680 <dict>
3681 <key>Mode</key>
3682 <string>none | system | manual | autoDetect | autoConfig</string>
3683 <key>Locked</key>
3684 <true> | </false>
3685 <key>HTTPProxy</key>
3686 <string>https://httpproxy.example.com</string>
3687 <key>UseHTTPProxyForAllProtocols</key>
3688 <true> | </false>
3689 <key>SSLProxy</key>
3690 <string>https://sslproxy.example.com</string>
3691 <key>FTPProxy</key>
3692 <string>https://ftpproxy.example.com</string>
3693 <key>SOCKSProxy</key>
3694 <string>https://socksproxy.example.com</string>
3695 <key>SOCKSVersion</key>
3696 <string>4 | 5</string>
3697 <key>Passthrough</key>
3698 <string>&lt;local>&gt;</string>
3699 <key>AutoConfigURL</key>
3700 <string>URL_TO_AUTOCONFIG</string>
3701 <key>AutoLogin</key>
3702 <true> | </false>
3703 <key>UseProxyForDNS</key>
3704 <true> | </false>
3705 </dict>
3706 </dict>
3707 ```
3708 #### policies.json
3709 ```
3710 {
3711 "policies": {
3712 "Proxy": {
3713 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3714 "Locked": true | false,
3715 "HTTPProxy": "hostname",
3716 "UseHTTPProxyForAllProtocols": true | false,
3717 "SSLProxy": "hostname",
3718 "FTPProxy": "hostname",
3719 "SOCKSProxy": "hostname",
3720 "SOCKSVersion": 4 | 5
3721 "Passthrough": "<local>",
3722 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3723 "AutoLogin": true | false,
3724 "UseProxyForDNS": true | false
3725 }
3726 }
3727 }
3728 ```
3729 ### RequestedLocales
3730 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3731
3732 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3733
3734 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3735 **CCK2 Equivalent:** N/A\
3736 **Preferences Affected:** N/A
3737 #### Windows (GPO)
3738 ```
3739 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3740 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3741
3742 or
3743
3744 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3745 ```
3746 #### Windows (Intune)
3747 OMA-URI:
3748 ```
3749 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3750 ```
3751 Value (string):
3752 ```
3753 <enabled/>
3754 <data id="Preferences_String" value="de,en-US"/>
3755 ```
3756 #### macOS
3757 ```
3758 <dict>
3759 <key>RequestedLocales</key>
3760 <array>
3761 <string>de</string>
3762 <string>en-US</string>
3763 </array>
3764 </dict>
3765
3766 or
3767
3768 <dict>
3769 <key>RequestedLocales</key>
3770 <string>de,en-US</string>
3771 </dict>
3772
3773 ```
3774 #### policies.json
3775 ```
3776 {
3777 "policies": {
3778 "RequestedLocales": ["de", "en-US"]
3779 }
3780 }
3781
3782 or
3783
3784 {
3785 "policies": {
3786 "RequestedLocales": "de,en-US"
3787 }
3788 }
3789 ```
3790 <a name="SanitizeOnShutdown"></a>
3791
3792 ### SanitizeOnShutdown (Selective)
3793 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3794
3795 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3796
3797 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3798 **CCK2 Equivalent:** N/A\
3799 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3800 #### Windows (GPO)
3801 ```
3802 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
3803 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
3804 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
3805 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
3806 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
3807 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
3808 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
3809 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
3810 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
3811 ```
3812 #### Windows (Intune)
3813 OMA-URI:
3814 ```
3815 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
3816 ```
3817 Value (string):
3818 ```
3819 <enabled/> or <disabled/>
3820 ```
3821 #### macOS
3822 ```
3823 <dict>
3824 <key>SanitizeOnShutdown</key>
3825 <dict>
3826 <key>Cache</key>
3827 <true/> | <false/>
3828 <key>Cookies</key>
3829 <true/> | <false/>
3830 <key>Downloads</key>
3831 <true/> | <false/>
3832 <key>FormData</key>
3833 <true/> | <false/>
3834 <key>History</key>
3835 <true/> | <false/>
3836 <key>Sessions</key>
3837 <true/> | <false/>
3838 <key>SiteSettings</key>
3839 <true/> | <false/>
3840 <key>OfflineApps</key>
3841 <true/> | <false/>
3842 <key>Locked</key>
3843 <true/> | <false/>
3844 </dict>
3845 </dict>
3846 ```
3847 #### policies.json
3848 ```
3849 {
3850 "policies": {
3851 "SanitizeOnShutdown": {
3852 "Cache": true | false,
3853 "Cookies": true | false,
3854 "Downloads": true | false,
3855 "FormData": true | false,
3856 "History": true | false,
3857 "Sessions": true | false,
3858 "SiteSettings": true | false,
3859 "OfflineApps": true | false,
3860 "Locked": true | false
3861 }
3862 }
3863 }
3864 ```
3865 ### SanitizeOnShutdown (All)
3866 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
3867
3868 **Compatibility:** Firefox 60, Firefox ESR 60\
3869 **CCK2 Equivalent:** N/A\
3870 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3871 #### Windows (GPO)
3872 ```
3873 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
3874 ```
3875 #### Windows (Intune)
3876 OMA-URI:
3877 ```
3878 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
3879 ```
3880 Value (string):
3881 ```
3882 <enabled/> or <disabled/>
3883 ```
3884 #### macOS
3885 ```
3886 <dict>
3887 <key>SanitizeOnShutdown</key>
3888 <true/> | <false/>
3889 </dict>
3890 ```
3891 #### policies.json
3892 ```
3893 {
3894 "policies": {
3895 "SanitizeOnShutdown": true | false
3896 }
3897 }
3898 ```
3899 ### SearchBar
3900 Set whether or not search bar is displayed.
3901
3902 **Compatibility:** Firefox 60, Firefox ESR 60\
3903 **CCK2 Equivalent:** `showSearchBar`\
3904 **Preferences Affected:** N/A
3905
3906 #### Windows (GPO)
3907 ```
3908 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
3909 ```
3910
3911 #### Windows (Intune)
3912 OMA-URI:
3913 ```
3914 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
3915 ```
3916 Value (string):
3917 ```
3918 <enabled/>
3919 <data id="Permissions" value="unified | separate"/>
3920 ```
3921 #### macOS
3922 ```
3923 <dict>
3924 <key>SearchBar</key>
3925 <string>unified | separate</string>
3926 </dict>
3927 ```
3928 #### policies.json
3929 ```
3930 {
3931 "policies": {
3932 "SearchBar": "unified" | "separate"
3933 }
3934 }
3935 ```
3936 <a name="SearchEngines"></a>
3937
3938 ### SearchEngines (This policy is only available on the ESR.)
3939
3940 ### SearchEngines | Default
3941
3942 Set the default search engine. This policy is only available on the ESR.
3943
3944 **Compatibility:** Firefox ESR 60\
3945 **CCK2 Equivalent:** `defaultSearchEngine`\
3946 **Preferences Affected:** N/A
3947
3948 #### Windows (GPO)
3949 ```
3950 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
3951 ```
3952 #### Windows (Intune)
3953 OMA-URI:
3954 ```
3955 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
3956 ```
3957 Value (string):
3958 ```
3959 <enabled/>
3960 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
3961 ```
3962 #### macOS
3963 ```
3964 <dict>
3965 <key>SearchEngines</key>
3966 <dict>
3967 <key>Default</key>
3968 <string>NAME_OF_SEARCH_ENGINE</string>
3969 </dict>
3970 </dict>
3971 ```
3972 #### policies.json
3973 ```
3974 {
3975 "policies": {
3976 "SearchEngines": {
3977 "Default": "NAME_OF_SEARCH_ENGINE"
3978 }
3979 }
3980 }
3981 ```
3982 ### SearchEngines | PreventInstalls
3983
3984 Prevent installing search engines from webpages.
3985
3986 **Compatibility:** Firefox ESR 60\
3987 **CCK2 Equivalent:** `disableSearchEngineInstall`\
3988 **Preferences Affected:** N/A
3989
3990 #### Windows (GPO)
3991 ```
3992 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
3993 ```
3994 #### Windows (Intune)
3995 OMA-URI:
3996 ```
3997 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
3998 ```
3999 Value (string):
4000 ```
4001 <enabled/> or <disabled/>
4002 ```
4003 #### macOS
4004 ```
4005 <dict>
4006 <key>SearchEngines</key>
4007 <dict>
4008 <key>PreventInstalls</key>
4009 <true/> | <false/>
4010 </dict>
4011 </dict>
4012 ```
4013 #### policies.json
4014 ```
4015 {
4016 "policies": {
4017 "SearchEngines": {
4018 "PreventInstalls": true | false
4019 }
4020 }
4021 }
4022 ```
4023 ### SearchEngines | Remove
4024
4025 Hide built-in search engines. This policy is only available on the ESR.
4026
4027 **Compatibility:** Firefox ESR 60.2\
4028 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4029 **Preferences Affected:** N/A
4030
4031 #### Windows (GPO)
4032 ```
4033 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4034 ```
4035 #### Windows (Intune)
4036 OMA-URI:
4037 ```
4038 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4039 ```
4040 Value (string):
4041 ```
4042 <enabled/>
4043 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4044 ```
4045 #### macOS
4046 ```
4047 <dict>
4048 <key>SearchEngines</key>
4049 <dict>
4050 <key>Remove</key>
4051 <array>
4052 <string>NAME_OF_SEARCH_ENGINE</string>
4053 </array>
4054 </dict>
4055 </dict>
4056 ```
4057 #### policies.json
4058 ```
4059 {
4060 "policies": {
4061 "SearchEngines": {
4062 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4063 }
4064 }
4065 }
4066 ```
4067 ### SearchEngines | Add
4068
4069 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4070
4071 `Name` is the name of the search engine.
4072
4073 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4074
4075 `Method` is either GET or POST
4076
4077 `IconURL` is a URL for the icon to use.
4078
4079 `Alias` is a keyword to use for the engine.
4080
4081 `Description` is a description of the search engine.
4082
4083 `PostData` is the POST data as name value pairs separated by &.
4084
4085 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4086
4087 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4088 **CCK2 Equivalent:** `searchplugins`\
4089 **Preferences Affected:** N/A
4090
4091 #### Windows (GPO)
4092 ```
4093 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4094 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4095 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4096 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4097 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4098 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4099 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4100 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4101 ```
4102 #### Windows (Intune)
4103 OMA-URI:
4104 ```
4105 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4106 ```
4107 Value (string):
4108 ```
4109 <enabled/>
4110 <data id="SearchEngine_Name" value="Example1"/>
4111 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4112 <data id="SearchEngine_Method" value="GET | POST"/>
4113 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4114 <data id="SearchEngine_Alias" value="example"/>
4115 <data id="SearchEngine_Description" value="Example Description"/>
4116 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4117 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4118 ```
4119 #### macOS
4120 ```
4121 <dict>
4122 <key>SearchEngines</key>
4123 <dict>
4124 <key>Add</key>
4125 <array>
4126 <dict>
4127 <key>Name</key>
4128 <string>Example1</string>
4129 <key>URLTemplate</key>
4130 <string>https://www.example.org/q={searchTerms}</string>
4131 <key>Method</key>
4132 <string>GET | POST </string>
4133 <key>IconURL</key>
4134 <string>https://www.example.org/favicon.ico</string>
4135 <key>Alias</key>
4136 <string>example</string>
4137 <key>Description</key>
4138 <string>Example Description</string>
4139 <key>SuggestURLTemplate</key>
4140 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4141 <key>PostData</key>
4142 <string>name=value&q={searchTerms}</string>
4143 </dict>
4144 <array>
4145 </dict>
4146 </dict>
4147 ```
4148 #### policies.json
4149 ```
4150 {
4151 "policies": {
4152 "SearchEngines": {
4153 "Add": [
4154 {
4155 "Name": "Example1",
4156 "URLTemplate": "https://www.example.org/q={searchTerms}",
4157 "Method": "GET" | "POST",
4158 "IconURL": "https://www.example.org/favicon.ico",
4159 "Alias": "example",
4160 "Description": "Description",
4161 "PostData": "name=value&q={searchTerms}",
4162 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4163 }
4164 ]
4165 }
4166 }
4167 }
4168 ```
4169 ### SearchSuggestEnabled
4170
4171 Enable search suggestions.
4172
4173 **Compatibility:** Firefox 68, Firefox ESR 68\
4174 **CCK2 Equivalent:** N/A\
4175 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4176
4177 #### Windows (GPO)
4178 ```
4179 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4180 ```
4181 #### Windows (Intune)
4182 OMA-URI:
4183 ```
4184 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4185 ```
4186 Value (string):
4187 ```
4188 <enabled/> or <disabled/>
4189 ```
4190 #### macOS
4191 ```
4192 <dict>
4193 <key>SearchSuggestEnabled</key>
4194 <true/> | <false/>
4195 </dict>
4196 ```
4197 #### policies.json
4198 ```
4199 {
4200 "policies": {
4201 "SearchSuggestEnabled": true | false
4202 }
4203 }
4204 ```
4205 ### SecurityDevices
4206
4207 Install PKCS #11 modules.
4208
4209 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4210 **CCK2 Equivalent:** `certs.devices`\
4211 **Preferences Affected:** N/A
4212
4213 #### Windows (GPO)
4214 ```
4215 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4216 ```
4217 #### Windows (Intune)
4218 OMA-URI:
4219 ```
4220 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4221 ```
4222 Value (string):
4223 ```
4224 <enabled/>
4225 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4226 ```
4227 #### macOS
4228 ```
4229 <dict>
4230 <key>SecurityDevices</key>
4231 <dict>
4232 <key>NAME_OF_DEVICE</key>
4233 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4234 </dict>
4235 </dict>
4236 ```
4237
4238 #### policies.json
4239 ```
4240 {
4241 "policies": {
4242 "SecurityDevices": {
4243 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4244 }
4245 }
4246 }
4247 ```
4248 ### SSLVersionMax
4249
4250 Set and lock the maximum version of TLS.
4251
4252 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4253 **CCK2 Equivalent:** N/A\
4254 **Preferences Affected:** `security.tls.version.max`
4255
4256 #### Windows (GPO)
4257 ```
4258 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4259 ```
4260 #### Windows (Intune)
4261 OMA-URI:
4262 ```
4263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4264 ```
4265 Value (string):
4266 ```
4267 <enabled/>
4268 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4269 ```
4270 #### macOS
4271 ```
4272 <dict>
4273 <key>SSLVersionMax</key>
4274 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4275 </dict>
4276 ```
4277
4278 #### policies.json
4279 ```
4280 {
4281 "policies": {
4282 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4283 }
4284 }
4285 ```
4286 ### SSLVersionMin
4287
4288 Set and lock the minimum version of TLS.
4289
4290 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4291 **CCK2 Equivalent:** N/A\
4292 **Preferences Affected:** `security.tls.version.min`
4293
4294 #### Windows (GPO)
4295 ```
4296 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4297 ```
4298 #### Windows (Intune)
4299 OMA-URI:
4300 ```
4301 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4302 ```
4303 Value (string):
4304 ```
4305 <enabled/>
4306 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4307 ```
4308 #### macOS
4309 ```
4310 <dict>
4311 <key>SSLVersionMin</key>
4312 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4313 </dict>
4314 ```
4315
4316 #### policies.json
4317 ```
4318 {
4319 "policies": {
4320 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4321 }
4322 }
4323 ```
4324 ### SupportMenu
4325 Add a menuitem to the help menu for specifying support information.
4326
4327 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4328 **CCK2 Equivalent:** helpMenu\
4329 **Preferences Affected:** N/A
4330
4331 #### Windows (GPO)
4332 ```
4333 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4334 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4335 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4336 ```
4337 #### Windows (Intune)
4338 OMA-URI:
4339 ```
4340 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4341 ```
4342 Value (string):
4343 ```
4344 <enabled/>
4345 <data id="SupportMenuTitle" value="Support Menu"/>
4346 <data id="SupportMenuURL" value="http://example.com/support"/>
4347 <data id="SupportMenuAccessKey" value="S">
4348 ```
4349 #### macOS
4350 ```
4351 <dict>
4352 <key>SupportMenu</key>
4353 <dict>
4354 <key>Title</key>
4355 <string>SupportMenu</string>
4356 <key>URL</key>
4357 <string>http://example.com/support</string>
4358 <key>AccessKey</key>
4359 <string>S</string>
4360 </dict>
4361 </dict>
4362 ```
4363 #### policies.json
4364 ```
4365 {
4366 "policies": {
4367 "SupportMenu": {
4368 "Title": "Support Menu",
4369 "URL": "http://example.com/support",
4370 "AccessKey": "S"
4371 }
4372 }
4373 }
4374 ```
4375 ### UserMessaging
4376
4377 Prevent installing search engines from webpages.
4378
4379 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4380
4381 `ExtensionRecommendations` Don't recommend extensions.
4382
4383 `FeatureRecommendations` Don't recommend browser features.
4384
4385 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4386
4387 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4388 **CCK2 Equivalent:** N/A\
4389 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4390
4391 #### Windows (GPO)
4392 ```
4393 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4394 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4395 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4396 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4397 ```
4398 #### Windows (Intune)
4399 OMA-URI:
4400 ```
4401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4405 ```
4406 Value (string):
4407 ```
4408 <enabled/> or <disabled/>
4409 ```
4410 #### macOS
4411 ```
4412 <dict>
4413 <key>UserMessaging</key>
4414 <dict>
4415 <key>WhatsNew</key>
4416 <true/> | <false/>
4417 <key>ExtensionRecommendations</key>
4418 <true/> | <false/>
4419 <key>FeatureRecommendations</key>
4420 <true/> | <false/>
4421 <key>UrlbarInterventions</key>
4422 <true/> | <false/>
4423 </dict>
4424 </dict>
4425 ```
4426 #### policies.json
4427 ```
4428 {
4429 "policies": {
4430 "UserMessaging": {
4431 "WhatsNew": true | false,
4432 "ExtensionRecommendations": true | false,
4433 "FeatureRecommendations": true | false,
4434 "UrlbarInterventions": true | false
4435 }
4436 }
4437 }
4438 ```
4439 ### WebsiteFilter
4440 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4441
4442 **Compatibility:** Firefox 60, Firefox ESR 60\
4443 **CCK2 Equivalent:** N/A\
4444 **Preferences Affected:** N/A
4445
4446 #### Windows (GPO)
4447 ```
4448 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4449 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4450 ```
4451 #### Windows (Intune)
4452 OMA-URI:
4453 ```
4454 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4455 ```
4456 Value (string):
4457 ```
4458 <enabled/>
4459 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4460 ```
4461 OMA-URI:
4462 ```
4463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4464 ```
4465 Value (string):
4466 ```
4467 <enabled/>
4468 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4469 ```
4470 #### macOS
4471 ```
4472 <dict>
4473 <key>WebsiteFilter</key>
4474 <dict>
4475 <key>Block</key>
4476 <array>
4477 <string><all_urls></string>
4478 </array>
4479 <key>Exceptions</key>
4480 <array>
4481 <string>http://example.org/*</string>
4482 </array>
4483 </dict>
4484
4485 </dict>
4486 ```
4487 #### policies.json
4488 ```
4489 {
4490 "policies": {
4491 "WebsiteFilter": {
4492 "Block": ["<all_urls>"],
4493 "Exceptions": ["http://example.org/*"]
4494 }
4495 }
4496 }
4497 ```

patrick-canterino.de