]> git.p6c8.net - policy-templates.git/blob - README.md
Correct HTML entities
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
10 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
11 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
12 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
13 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
14 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
15 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
16 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
17 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
18 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
19 | **[`Certificates`](#certificates)** |
20 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
21 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
22 | **[`Cookies`](#cookies)** | Configure cookie preferences.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
43 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
44 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
45 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
46 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
47 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
48 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
49 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
50 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
51 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
52 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
53 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
54 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
55 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
56 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
57 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
58 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
59 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
60 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
61 | **[`Handlers`](#handlers)** | Configure default application handlers.
62 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
63 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
64 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
65 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
66 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
67 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates..
68 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
69 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
70 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
71 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
72 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
73 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
74 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
75 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
76 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
77 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
78 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
79 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
80 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
81 | **[`Preferences`](#preferences)** | Set and lock preferences.
82 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
83 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
84 | **[`Proxy`](#proxy)** | Configure proxy settings.
85 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
86 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
87 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
88 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
89 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
90 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
91 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
92 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
93 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
94 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
95 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
96 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
97 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
98 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
99 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
100 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
101
102 ### 3rdparty
103
104 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
105
106 ### AppAutoUpdate
107
108 Enable or disable **automatic** application update.
109
110 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
111
112 If set to false, application updates are downloaded but the user can choose when to install the update.
113
114 If you have disabled updates via DisableAppUpdate, this policy has no effect.
115
116 **Compatibility:** Firefox 75, Firefox ESR 68.7\
117 **CCK2 Equivalent:** N/A\
118 **Preferences Affected:** app.update.auto
119
120 #### Windows (GPO)
121 ```
122 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
123 ```
124 #### Windows (Intune)
125 OMA-URI:
126 ```
127 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
128 ```
129 Value (string):
130 ```
131 <enabled/> or <disabled/>
132 ```
133 #### macOS
134 ```
135 <dict>
136 <key>AppAutoUpdate</key>
137 <true/> | <false/>
138 </dict>
139 ```
140 #### policies.json
141 ```
142 {
143 "policies": {
144 "AppAutoUpdate": true | false
145 }
146 }
147 ```
148 ### AppUpdateURL
149
150 Change the URL for application update if you are providing Firefox updates from a custom update server.
151
152 **Compatibility:** Firefox 62, Firefox ESR 60.2\
153 **CCK2 Equivalent:** N/A\
154 **Preferences Affected:** `app.update.url`
155
156 #### Windows (GPO)
157 ```
158 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
159 ```
160 #### Windows (Intune)
161 OMA-URI:
162 ```
163 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
164 ```
165 Value (string):
166 ```
167 <enabled/>
168 <data id="AppUpdateURL" value="https://yoursite.com"/>
169 ```
170 #### macOS
171 ```
172 <dict>
173 <key>AppUpdateURL</key>
174 <string>https://yoursite.com</string>
175 </dict>
176 ```
177 #### policies.json
178 ```
179 {
180 "policies": {
181 "AppUpdateURL": "https://yoursite.com"
182 }
183 }
184 ```
185 ### Authentication
186
187 Configure sites that support integrated authentication.
188
189 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
190
191 `PrivateBrowsing` enables integrated authentication in private browsing.
192
193 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
194 **CCK2 Equivalent:** N/A\
195 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
196
197 #### Windows (GPO)
198 ```
199 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
200 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
201 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
202 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
203 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
204 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
205 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
206 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
207 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
208 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
209 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
210 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
211 ```
212 #### Windows (Intune)
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
239 ```
240 OMA-URI:
241 ```
242 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
243 ```
244 Value (string):
245 ```
246 <enabled/>
247 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
248 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 OMA-URI:
259 ```
260 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
261 ```
262 Value (string):
263 ```
264 <enabled/> or <disabled/>
265 ```
266 #### macOS
267 ```
268 <dict>
269 <key>Authentication</key>
270 <dict>
271 <key>SPNEGO</key>
272 <array>
273 <string>mydomain.com</string>
274 <string>https://myotherdomain.com</string>
275 </array>
276 <key>Delegated</key>
277 <array>
278 <string>mydomain.com</string>
279 <string>https://myotherdomain.com</string>
280 </array>
281 <key>NTLM</key>
282 <array>
283 <string>mydomain.com</string>
284 <string>https://myotherdomain.com</string>
285 </array>
286 <key>AllowNonFQDN</key>
287 <dict>
288 <key>SPNEGO</key>
289 <true/> | <false/>
290 <key>NTLM</key>
291 <true/> | <false/>
292 </dict>
293 <key>AllowProxies</key>
294 <dict>
295 <key>SPNEGO</key>
296 <true/> | <false/>
297 <key>NTLM</key>
298 <true/> | <false/>
299 </dict>
300 <key>Locked</key>
301 <true/> | <false/>
302 <key>PrivateBrowsing</key>
303 <true/> | <false/>
304 </dict>
305 </dict>
306 ```
307 #### policies.json
308 ```
309 {
310 "policies": {
311 "Authentication": {
312 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
313 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
314 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
315 "AllowNonFQDN": {
316 "SPNEGO": true | false,
317 "NTLM": true | false
318 },
319 "AllowProxies": {
320 "SPNEGO": true | false,
321 "NTLM": true | false
322 },
323 "Locked": true | false,
324 "PrivateBrowsing": true | false
325 }
326 }
327 }
328 ```
329 ### BlockAboutAddons
330
331 Block access to the Add-ons Manager (about:addons).
332
333 **Compatibility:** Firefox 60, Firefox ESR 60\
334 **CCK2 Equivalent:** `disableAddonsManager`\
335 **Preferences Affected:** N/A
336
337 #### Windows (GPO)
338 ```
339 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
340 ```
341 #### Windows (Intune)
342 OMA-URI:
343 ```
344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
345 ```
346 Value (string):
347 ```
348 <enabled/> or <disabled/>
349 ```
350 #### macOS
351 ```
352 <dict>
353 <key>BlockAboutAddons</key>
354 <true/> | <false/>
355 </dict>
356 ```
357 #### policies.json
358 ```
359 {
360 "policies": {
361 "BlockAboutAddons": true | false
362 }
363 }
364 ```
365 ### BlockAboutConfig
366
367 Block access to about:config.
368
369 **Compatibility:** Firefox 60, Firefox ESR 60\
370 **CCK2 Equivalent:** `disableAboutConfig`\
371 **Preferences Affected:** N/A
372
373 #### Windows (GPO)
374 ```
375 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
376 ```
377 #### Windows (Intune)
378 OMA-URI:
379 ```
380 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
381 ```
382 Value (string):
383 ```
384 <enabled/> or <disabled/>
385 ```
386 #### macOS
387 ```
388 <dict>
389 <key>BlockAboutConfig</key>
390 <true/> | <false/>
391 </dict>
392 ```
393 #### policies.json
394 ```
395 {
396 "policies": {
397 "BlockAboutConfig": true | false
398 }
399 }
400 ```
401 ### BlockAboutProfiles
402
403 Block access to About Profiles (about:profiles).
404
405 **Compatibility:** Firefox 60, Firefox ESR 60\
406 **CCK2 Equivalent:** `disableAboutProfiles`\
407 **Preferences Affected:** N/A
408
409 #### Windows (GPO)
410 ```
411 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
412 ```
413 #### Windows (Intune)
414 OMA-URI:
415 ```
416 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
417 ```
418 Value (string):
419 ```
420 <enabled/> or <disabled/>
421 ```
422 #### macOS
423 ```
424 <dict>
425 <key>BlockAboutProfiles</key>
426 <true/> | <false/>
427 </dict>
428 ```
429 #### policies.json
430 ```
431 {
432 "policies": {
433 "BlockAboutProfiles": true | false
434 }
435 }
436 ```
437 ### BlockAboutSupport
438
439 Block access to Troubleshooting Information (about:support).
440
441 **Compatibility:** Firefox 60, Firefox ESR 60\
442 **CCK2 Equivalent:** `disableAboutSupport`\
443 **Preferences Affected:** N/A
444
445 #### Windows (GPO)
446 ```
447 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
448 ```
449 #### Windows (Intune)
450 OMA-URI:
451 ```
452 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
453 ```
454 Value (string):
455 ```
456 <enabled/> or <disabled/>
457 ```
458 #### macOS
459 ```
460 <dict>
461 <key>BlockAboutSupport</key>
462 <true/> | <false/>
463 </dict>
464 ```
465 #### policies.json
466 ```
467 {
468 "policies": {
469 "BlockAboutSupport": true | false
470 }
471 }
472 ```
473 ### Bookmarks
474
475 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
476
477 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
478
479 **Compatibility:** Firefox 60, Firefox ESR 60\
480 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
481 **Preferences Affected:** N/A
482
483 #### Windows (GPO)
484 ```
485 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
486 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
487 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
488 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
489 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
490 ```
491 #### Windows (Intune)
492 OMA-URI:
493 ```
494 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
495 ```
496 Value (string):
497 ```
498 <enabled/>
499 <data id="BookmarkTitle" value="Example"/>
500 <data id="BookmarkURL" value="https://example.com"/>
501 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
502 <data id="BookmarkPlacement" value="toolbar | menu"/>
503 <data id="BookmarkFolder" value="FolderName"/>
504 ```
505 #### macOS
506 ```
507 <dict>
508 <key>Bookmarks</key>
509 <array>
510 <dict>
511 <key>Title</key>
512 <string>Example</string>
513 <key>URL</key>
514 <string>https://example.com</string>
515 <key>Favicon</key>
516 <string>https://example.com/favicon.ico</string>
517 <key>Placement</key>
518 <string>toolbar | menu</string>
519 <key>Folder</key>
520 <string>FolderName</string>
521 </dict>
522 </array>
523 </dict>
524 ```
525 #### policies.json
526 ```
527 {
528 "policies": {
529 "Bookmarks": [
530 {
531 "Title": "Example",
532 "URL": "https://example.com",
533 "Favicon": "https://example.com/favicon.ico",
534 "Placement": "toolbar" | "menu",
535 "Folder": "FolderName"
536 }
537 ]
538 }
539 }
540 ```
541 ### CaptivePortal
542 Enable or disable the detection of captive portals.
543
544 **Compatibility:** Firefox 67, Firefox ESR 60.7\
545 **CCK2 Equivalent:** N/A\
546 **Preferences Affected:** `network.captive-portal-service.enabled`
547
548 #### Windows (GPO)
549 ```
550 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
551 ```
552 #### Windows (Intune)
553 OMA-URI:
554 ```
555 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
556 ```
557 Value (string):
558 ```
559 <enabled/> or <disabled/>
560 ```
561 #### macOS
562 ```
563 <dict>
564 <key>CaptivePortal</key>
565 <true/> | <false/>
566 </dict>
567 ```
568 #### policies.json
569 ```
570 {
571 "policies": {
572 "CaptivePortal": true | false
573 }
574 }
575 ```
576 ### Certificates
577
578 ### Certificates | ImportEnterpriseRoots
579
580 Trust certificates that have been added to the operating system certificate store by a user or administrator.
581
582 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
583
584 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
585
586 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
587 **CCK2 Equivalent:** N/A\
588 **Preferences Affected:** `security.enterprise_roots.enabled`
589
590 #### Windows (GPO)
591 ```
592 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
593 ```
594 #### Windows (Intune)
595 OMA-URI:
596 ```
597 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
598 ```
599 Value (string):
600 ```
601 <enabled/> or <disabled/>
602 ```
603 #### macOS
604 ```
605 <dict>
606 <key>Certificates</key>
607 <dict>
608 <key>ImportEnterpriseRoots</key>
609 <true/> | <false/>
610 </dict>
611 </dict>
612 ```
613 #### policies.json
614 ```
615 {
616 "policies": {
617 "Certificates": {
618 "ImportEnterpriseRoots": true | false
619 }
620 }
621 }
622 ```
623 ### Certificates | Install
624
625 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
626
627 - Windows
628 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
629 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
630 - macOS
631 - /Library/Application Support/Mozilla/Certificates
632 - ~/Library/Application Support/Mozilla/Certificates
633 - Linux
634 - /usr/lib/mozilla/certificates
635 - /usr/lib64/mozilla/certificates
636 - ~/.mozilla/certificates
637
638 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
639
640 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
641
642 Certificates are installed using the trust string `CT,CT,`.
643
644 Binary (DER) and ASCII (PEM) certificates are both supported.
645
646 **Compatibility:** Firefox 64, Firefox ESR 64\
647 **CCK2 Equivalent:** `certs.ca`\
648 **Preferences Affected:** N/A
649
650 #### Windows (GPO)
651 ```
652 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
653 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
654 ```
655 #### Windows (Intune)
656 OMA-URI:
657 ```
658 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
659 ```
660 Value (string):
661 ```
662 <enabled/>
663 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
664 ```
665 #### macOS
666 ```
667 <dict>
668 <key>Certificates</key>
669 <dict>
670 <key>Install</key>
671 <array>
672 <string>cert1.der</string>
673 <string>/Users/username/cert2.pem</string>
674 </array>
675 </dict>
676 </dict>
677 ```
678 #### policies.json
679 ```
680 {
681 "policies": {
682 "Certificates": {
683 "Install": ["cert1.der", "/home/username/cert2.pem"]
684 }
685 }
686 }
687 ```
688 ### Cookies
689 Configure cookie preferences.
690
691 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
692
693 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
694
695 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
696
697 `Default` determines whether cookies are accepted at all.
698
699 `AcceptThirdParty` determines how third-party cookies are handled.
700
701 `ExpireAtSessionEnd` determines when cookies expire.
702
703 `RejectTracker` only rejects cookies for trackers.
704
705 `Locked` prevents the user from changing cookie preferences.
706
707 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1)\
708 **CCK2 Equivalent:** N/A\
709 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
710
711 #### Windows (GPO)
712 ```
713 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
714 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
715 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
716 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
717 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
718 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
719 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
720 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
721 ```
722 #### Windows (Intune)
723 OMA-URI:
724 ```
725 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
726 ```
727 Value (string):
728 ```
729 <enabled/>
730 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
731 ```
732 OMA-URI:
733 ```
734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
735 ```
736 Value (string):
737 ```
738 <enabled/>
739 <data id="Cookies_Allow" value="1&#xF000;https://example.edu"/>
740 ```
741 OMA-URI:
742 ```
743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
744 ```
745 Value (string):
746 ```
747 <enabled/>
748 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
749 ```
750 OMA-URI:
751 ```
752 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
753 ```
754 Value (string):
755 ```
756 <enabled/> or <disabled/>
757 ```
758 OMA-URI:
759 ```
760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
761 ```
762 Value (string):
763 ```
764 <enabled/>
765 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
766 ```
767 OMA-URI:
768 ```
769 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
770 ```
771 Value (string):
772 ```
773 <enabled/> or <disabled/>
774 ```
775 OMA-URI:
776 ```
777 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
778 ```
779 Value (string):
780 ```
781 <enabled/> or <disabled/>
782 ```
783 OMA-URI:
784 ```
785 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
786 ```
787 Value (string):
788 ```
789 <enabled/> or <disabled/>
790 ```
791 #### macOS
792 ```
793 <dict>
794 <key>Cookies</key>
795 <dict>
796 <key>Allow</key>
797 <array>
798 <string>http://example.com</string>
799 </array>
800 <key>AllowSession</key>
801 <array>
802 <string>http://example.edu</string>
803 </array>
804 <key>Block</key>
805 <array>
806 <string>http://example.org</string>
807 </array>
808 <key>Default</key>
809 <true/> | <false/>
810 <key>AcceptThirdParty</key>
811 <string>always | never | from-visited</string>
812 <key>ExpireAtSessionEnd</key>
813 <true/> | <false/>
814 <key>RejectTracker</key>
815 <true/> | <false/>
816 <key>Locked</key>
817 <true/> | <false/>
818 </dict>
819 </dict>
820 ```
821 #### policies.json
822 ```
823 {
824 "policies": {
825 "Cookies": {
826 "Allow": ["http://example.org/"],
827 "AllowSession": ["http://example.edu/"],
828 "Block": ["http://example.edu/"],
829 "Default": true | false,
830 "AcceptThirdParty": "always" | "never" | "from-visited",
831 "ExpireAtSessionEnd": true | false,
832 "RejectTracker": true | false,
833 "Locked": true | false
834 }
835 }
836 }
837 ```
838 ### DisableSetDesktopBackground
839 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
840
841 **Compatibility:** Firefox 60, Firefox ESR 60\
842 **CCK2 Equivalent:** `removeSetDesktopBackground`\
843 **Preferences Affected:** N/A
844
845 #### Windows (GPO)
846 ```
847 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
848 ```
849 #### Windows (Intune)
850 OMA-URI:
851 ```
852 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
853 ```
854 Value (string):
855 ```
856 <enabled/> or <disabled/>
857 ```
858 #### macOS
859 ```
860 <dict>
861 <key>DisableSetDesktopBackground</key>
862 <true/> | <false/>
863 </dict>
864 ```
865 #### policies.json
866 ```
867 {
868 "policies": {
869 "DisableSetDesktopBackground": true | false
870 }
871 }
872 ```
873 ### DisableMasterPasswordCreation
874 Remove the master password functionality.
875
876 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
877
878 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
879
880 **Compatibility:** Firefox 60, Firefox ESR 60\
881 **CCK2 Equivalent:** `noMasterPassword`\
882 **Preferences Affected:** N/A
883
884 #### Windows (GPO)
885 ```
886 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
887 ```
888 #### Windows (Intune)
889 OMA-URI:
890 ```
891 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
892 ```
893 Value (string):
894 ```
895 <enabled/> or <disabled/>
896 ```
897 #### macOS
898 ```
899 <dict>
900 <key>DisableMasterPasswordCreation</key>
901 <true/> | <false/>
902 </dict>
903 ```
904 #### policies.json
905 ```
906 {
907 "policies": {
908 "DisableMasterPasswordCreation": true | false
909 }
910 }
911 ```
912 ### DisableAppUpdate
913 Turn off application updates within Firefox.
914
915 **Compatibility:** Firefox 60, Firefox ESR 60\
916 **CCK2 Equivalent:** `disableFirefoxUpdates`\
917 **Preferences Affected:** N/A
918
919 #### Windows (GPO)
920 ```
921 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
922 ```
923 #### Windows (Intune)
924 OMA-URI:
925 ```
926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
927 ```
928 Value (string):
929 ```
930 <enabled/> or <disabled/>
931 ```
932 #### macOS
933 ```
934 <dict>
935 <key>DisableAppUpdate</key>
936 <true/> | <false/>
937 </dict>
938 ```
939 #### policies.json
940 ```
941 {
942 "policies": {
943 "DisableAppUpdate": true | false
944 }
945 }
946 ```
947 ### DisableBuiltinPDFViewer
948 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
949
950 **Compatibility:** Firefox 60, Firefox ESR 60\
951 **CCK2 Equivalent:** `disablePDFjs`\
952 **Preferences Affected:** `pdfjs.disabled`
953
954 #### Windows (GPO)
955 ```
956 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
957 ```
958 #### Windows (Intune)
959 OMA-URI:
960 ```
961 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
962 ```
963 Value (string):
964 ```
965 <enabled/> or <disabled/>
966 ```
967 #### macOS
968 ```
969 <dict>
970 <key>DisableBuiltinPDFViewer</key>
971 <true/> | <false/>
972 </dict>
973 ```
974 #### policies.json
975 ```
976 {
977 "policies": {
978 "DisableBuiltinPDFViewer": true | false
979 }
980 }
981 ```
982 ### DisabledCiphers
983 Disable specific cryptographic ciphers.
984
985 ---
986 **Note:**
987
988 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
989
990 ---
991 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
992 **CCK2 Equivalent:** N/A\
993 **Preferences Affected:** N/A
994
995 #### Windows (GPO)
996 ```
997 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
998 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
999 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1000 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1001 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1002 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1003 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1004 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1005 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
1006 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1007 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
1008 ```
1009 #### Windows (Intune)
1010 OMA-URI:
1011 ```
1012 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1014 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1015 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1016 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1017 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1018 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
1019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
1020 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
1021 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
1022 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
1023 ```
1024 Value (string):
1025 ```
1026 <enabled/> or <disabled/>
1027 ```
1028 #### macOS
1029 ```
1030 <dict>
1031 <key>DisabledCiphers</key>
1032 <dict>
1033 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1034 <true/> | <false/>
1035 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1036 <true/> | <false/>
1037 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1038 <true/> | <false/>
1039 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1040 <true/> | <false/>
1041 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1042 <true/> | <false/>
1043 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1044 <true/> | <false/>
1045 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1046 <true/> | <false/>
1047 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1048 <true/> | <false/>
1049 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1050 <true/> | <false/>
1051 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1052 <true/> | <false/>
1053 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1054 <true/> | <false/>
1055 </dict>
1056 </dict>
1057 ```
1058 #### policies.json
1059 ```
1060 {
1061 "policies": {
1062 "DisabledCiphers": {
1063 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1064 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1065 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1066 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1067 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1068 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1069 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1070 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1071 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false,
1072 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false,
1073 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1074 }
1075 }
1076 }
1077 ```
1078 ### DisableDefaultBrowserAgent
1079 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1080
1081 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1082
1083 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1084 **CCK2 Equivalent:** N/A\
1085 **Preferences Affected:** N/A
1086
1087 #### Windows (GPO)
1088 ```
1089 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1090 ```
1091 #### Windows (Intune)
1092 OMA-URI:
1093 ```
1094 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1095 ```
1096 Value (string):
1097 ```
1098 <enabled/> or <disabled/>
1099 ```
1100 #### policies.json
1101 ```
1102 {
1103 "policies": {
1104 "DisableDefaultBrowserAgent": true | false
1105 }
1106 }
1107 ```
1108 ### DisableDeveloperTools
1109 Remove access to all developer tools.
1110
1111 **Compatibility:** Firefox 60, Firefox ESR 60\
1112 **CCK2 Equivalent:** `removeDeveloperTools`\
1113 **Preferences Affected:** `devtools.policy.disabled`
1114
1115 #### Windows (GPO)
1116 ```
1117 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1118 ```
1119 #### Windows (Intune)
1120 OMA-URI:
1121 ```
1122 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1123 ```
1124 Value (string):
1125 ```
1126 <enabled/> or <disabled/>
1127 ```
1128 #### macOS
1129 ```
1130 <dict>
1131 <key>DisableDeveloperTools</key>
1132 <true/> | <false/>
1133 </dict>
1134 ```
1135 #### policies.json
1136 ```
1137 {
1138 "policies": {
1139 "DisableDeveloperTools": true | false
1140 }
1141 }
1142 ```
1143 ### DisableFeedbackCommands
1144 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1145
1146 **Compatibility:** Firefox 60, Firefox ESR 60\
1147 **CCK2 Equivalent:** N/A\
1148 **Preferences Affected:** N/A
1149
1150 #### Windows (GPO)
1151 ```
1152 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1153 ```
1154 #### Windows (Intune)
1155 OMA-URI:
1156 ```
1157 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1158 ```
1159 Value (string):
1160 ```
1161 <enabled/> or <disabled/>
1162 ```
1163 #### macOS
1164 ```
1165 <dict>
1166 <key>DisableFeedbackCommands</key>
1167 <true/> | <false/>
1168 </dict>
1169 ```
1170 #### policies.json
1171 ```
1172 {
1173 "policies": {
1174 "DisableFeedbackCommands": true | false
1175 }
1176 }
1177 ```
1178 ### DisableFirefoxScreenshots
1179 Remove access to Firefox Screenshots.
1180
1181 **Compatibility:** Firefox 60, Firefox ESR 60\
1182 **CCK2 Equivalent:** N/A\
1183 **Preferences Affected:** `extensions.screenshots.disabled`
1184
1185 #### Windows (GPO)
1186 ```
1187 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1188 ```
1189 #### Windows (Intune)
1190 OMA-URI:
1191 ```
1192 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1193 ```
1194 Value (string):
1195 ```
1196 <enabled/> or <disabled/>
1197 ```
1198 #### macOS
1199 ```
1200 <dict>
1201 <key>DisableFirefoxScreenshots</key>
1202 <true/> | <false/>
1203 </dict>
1204 ```
1205 #### policies.json
1206 ```
1207 {
1208 "policies": {
1209 "DisableFirefoxScreenshots": true | false
1210 }
1211 }
1212 ```
1213 ### DisableFirefoxAccounts
1214 Disable Firefox Accounts integration (Sync).
1215
1216 **Compatibility:** Firefox 60, Firefox ESR 60\
1217 **CCK2 Equivalent:** `disableSync`\
1218 **Preferences Affected:** `identity.fxaccounts.enabled`
1219
1220 #### Windows (GPO)
1221 ```
1222 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1223 ```
1224 #### Windows (Intune)
1225 OMA-URI:
1226 ```
1227 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1228 ```
1229 Value (string):
1230 ```
1231 <enabled/> or <disabled/>
1232 ```
1233 #### macOS
1234 ```
1235 <dict>
1236 <key>DisableFirefoxAccounts</key>
1237 <true/> | <false/>
1238 </dict>
1239 ```
1240 #### policies.json
1241 ```
1242 {
1243 "policies": {
1244 "DisableFirefoxAccounts": true | false
1245 }
1246 }
1247 ```
1248 ### DisableFirefoxStudies
1249 Disable Firefox studies (Shield).
1250
1251 **Compatibility:** Firefox 60, Firefox ESR 60\
1252 **CCK2 Equivalent:** N/A\
1253 **Preferences Affected:** N/A
1254
1255 #### Windows (GPO)
1256 ```
1257 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1258 ```
1259 #### Windows (Intune)
1260 OMA-URI:
1261 ```
1262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1263 ```
1264 Value (string):
1265 ```
1266 <enabled/> or <disabled/>
1267 ```
1268 #### macOS
1269 ```
1270 <dict>
1271 <key>DisableFirefoxStudies</key>
1272 <true/> | <false/>
1273 </dict>
1274 ```
1275 #### policies.json
1276 ```
1277 {
1278 "policies": {
1279 "DisableFirefoxStudies": true | false
1280 }
1281 }
1282 ```
1283 ### DisableForgetButton
1284 Disable the "Forget" button.
1285
1286 **Compatibility:** Firefox 60, Firefox ESR 60\
1287 **CCK2 Equivalent:** `disableForget`\
1288 **Preferences Affected:** N/A
1289
1290 #### Windows (GPO)
1291 ```
1292 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1293 ```
1294 #### Windows (Intune)
1295 OMA-URI:
1296 ```
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1298 ```
1299 Value (string):
1300 ```
1301 <enabled/> or <disabled/>
1302 ```
1303 #### macOS
1304 ```
1305 <dict>
1306 <key>DisableForgetButton</key>
1307 <true/> | <false/>
1308 </dict>
1309 ```
1310 #### policies.json
1311 ```
1312 {
1313 "policies": {
1314 "DisableForgetButton": true | false
1315 }
1316 }
1317 ```
1318 ### DisableFormHistory
1319 Turn off saving information on web forms and the search bar.
1320
1321 **Compatibility:** Firefox 60, Firefox ESR 60\
1322 **CCK2 Equivalent:** `disableFormFill`\
1323 **Preferences Affected:** ` browser.formfill.enable`
1324
1325 #### Windows (GPO)
1326 ```
1327 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1328 ```
1329 #### Windows (Intune)
1330 OMA-URI:
1331 ```
1332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1333 ```
1334 Value (string):
1335 ```
1336 <enabled/> or <disabled/>
1337 ```
1338 #### macOS
1339 ```
1340 <dict>
1341 <key>DisableFormHistory</key>
1342 <true/> | <false/>
1343 </dict>
1344 ```
1345 #### policies.json
1346 ```
1347 {
1348 "policies": {
1349 "DisableFormHistory": true | false
1350 }
1351 }
1352 ```
1353 ### DisablePasswordReveal
1354 Do not allow passwords to be shown in saved logins
1355
1356 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1357 **CCK2 Equivalent:** N/A
1358 **Preferences Affected:** N/A
1359
1360 #### Windows (GPO)
1361 ```
1362 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1363 ```
1364 #### Windows (Intune)
1365 OMA-URI:
1366 ```
1367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1368 ```
1369 Value (string):
1370 ```
1371 <enabled/> or <disabled/>
1372 ```
1373 #### macOS
1374 ```
1375 <dict>
1376 <key>DisablePasswordReveal</key>
1377 <true/> | <false/>
1378 </dict>
1379 ```
1380 #### policies.json
1381 ```
1382 {
1383 "policies": {
1384 "DisablePasswordReveal": true | false
1385 }
1386 }
1387 ```
1388 ### DisablePocket
1389 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1390
1391 **Compatibility:** Firefox 60, Firefox ESR 60\
1392 **CCK2 Equivalent:** `disablePocket`\
1393 **Preferences Affected:** `extensions.pocket.enabled`
1394
1395 #### Windows (GPO)
1396 ```
1397 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1398 ```
1399 #### Windows (Intune)
1400 OMA-URI:
1401 ```
1402 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1403 ```
1404 Value (string):
1405 ```
1406 <enabled/> or <disabled/>
1407 ```
1408 #### macOS
1409 ```
1410 <dict>
1411 <key>DisablePocket</key>
1412 <true/> | <false/>
1413 </dict>
1414 ```
1415 #### policies.json
1416 ```
1417 {
1418 "policies": {
1419 "DisablePocket": true | false
1420 }
1421 }
1422 ```
1423 ### DisablePrivateBrowsing
1424 Remove access to private browsing.
1425
1426 **Compatibility:** Firefox 60, Firefox ESR 60\
1427 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1428 **Preferences Affected:** N/A
1429
1430 #### Windows (GPO)
1431 ```
1432 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1433 ```
1434 #### Windows (Intune)
1435 OMA-URI:
1436 ```
1437 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1438 ```
1439 Value (string):
1440 ```
1441 <enabled/> or <disabled/>
1442 ```
1443 #### macOS
1444 ```
1445 <dict>
1446 <key>DisablePrivateBrowsing</key>
1447 <true/> | <false/>
1448 </dict>
1449 ```
1450 #### policies.json
1451 ```
1452 {
1453 "policies": {
1454 "DisablePrivateBrowsing": true | false
1455 }
1456 }
1457 ```
1458 ### DisableProfileImport
1459 Disables the "Import data from another browser" option in the bookmarks window.
1460
1461 **Compatibility:** Firefox 60, Firefox ESR 60\
1462 **CCK2 Equivalent:** N/A\
1463 **Preferences Affected:** N/A
1464
1465 #### Windows (GPO)
1466 ```
1467 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1468 ```
1469 #### Windows (Intune)
1470 OMA-URI:
1471 ```
1472 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1473 ```
1474 Value (string):
1475 ```
1476 <enabled/> or <disabled/>
1477 ```
1478 #### macOS
1479 ```
1480 <dict>
1481 <key>DisableProfileImport</key>
1482 <true/> | <false/>
1483 </dict>
1484 ```
1485 #### policies.json
1486 ```
1487 {
1488 "policies": {
1489 "DisableProfileImport": true | false
1490 }
1491 }
1492 ```
1493 ### DisableProfileRefresh
1494 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1495
1496 **Compatibility:** Firefox 60, Firefox ESR 60\
1497 **CCK2 Equivalent:** `disableResetFirefox`\
1498 **Preferences Affected:** `browser.disableResetPrompt`
1499
1500 #### Windows (GPO)
1501 ```
1502 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1503 ```
1504 #### Windows (Intune)
1505 OMA-URI:
1506 ```
1507 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1508 ```
1509 Value (string):
1510 ```
1511 <enabled/> or <disabled/>
1512 ```
1513 #### macOS
1514 ```
1515 <dict>
1516 <key>DisableProfileRefresh</key>
1517 <true/> | <false/>
1518 </dict>
1519 ```
1520 #### policies.json
1521 ```
1522 {
1523 "policies": {
1524 "DisableProfileRefresh": true | false
1525 }
1526 }
1527 ```
1528 ### DisableSafeMode
1529 Disable safe mode within the browser.
1530
1531 On Windows, this disables safe mode via the command line as well.
1532
1533 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1534 **CCK2 Equivalent:** `disableSafeMode`\
1535 **Preferences Affected:** N/A
1536
1537 #### Windows (GPO)
1538 ```
1539 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1540 ```
1541 #### Windows (Intune)
1542 OMA-URI:
1543 ```
1544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1545 ```
1546 Value (string):
1547 ```
1548 <enabled/> or <disabled/>
1549 ```
1550 #### macOS
1551 ```
1552 <dict>
1553 <key>DisableSafeMode</key>
1554 <true/> | <false/>
1555 </dict>
1556 ```
1557 #### policies.json
1558 ```
1559 {
1560 "policies": {
1561 "DisableSafeMode": true | false
1562 }
1563 }
1564 ```
1565 ### DisableSecurityBypass
1566 Prevent the user from bypassing security in certain cases.
1567
1568 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1569
1570 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1571
1572 **Compatibility:** Firefox 60, Firefox ESR 60\
1573 **CCK2 Equivalent:** N/A\
1574 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1575
1576 #### Windows (GPO)
1577 ```
1578 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1579 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1580 ```
1581 #### Windows (Intune)
1582 OMA-URI:
1583 ```
1584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1585 ```
1586 Value (string):
1587 ```
1588 <enabled/> or <disabled/>
1589 ```
1590 OMA-URI:
1591 ```
1592 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1593 ```
1594 Value (string):
1595 ```
1596 <enabled/> or <disabled/>
1597 ```
1598
1599 #### macOS
1600 ```
1601 <dict>
1602 <key>DisableSecurityBypass</key>
1603 <dict>
1604 <key>InvalidCertificate</key>
1605 <true/> | <false/>
1606 <key>SafeBrowsing</key>
1607 <true/> | <false/>
1608 </dict>
1609 </dict>
1610 ```
1611 #### policies.json
1612 ```
1613 {
1614 "policies": {
1615 "DisableSecurityBypass": {
1616 "InvalidCertificate": true | false,
1617 "SafeBrowsing": true | false
1618 }
1619 }
1620 }
1621 ```
1622 ### DisableSystemAddonUpdate
1623 Prevent system add-ons from being installed or update.
1624
1625 **Compatibility:** Firefox 60, Firefox ESR 60\
1626 **CCK2 Equivalent:** N/A\
1627 **Preferences Affected:** N/A
1628
1629 #### Windows (GPO)
1630 ```
1631 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1632 ```
1633 #### Windows (Intune)
1634 OMA-URI:
1635 ```
1636 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1637 ```
1638 Value (string):
1639 ```
1640 <enabled/> or <disabled/>
1641 ```
1642 #### macOS
1643 ```
1644 <dict>
1645 <key>DisableSystemAddonUpdate</key>
1646 <true/> | <false/>
1647 </dict>
1648 ```
1649 #### policies.json
1650 ```
1651 {
1652 "policies": {
1653 "DisableSystemAddonUpdate": true | false
1654 }
1655 }
1656 ```
1657 ### DisableTelemetry
1658 Prevent the upload of telemetry data.
1659
1660 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1661
1662 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1663
1664 **Compatibility:** Firefox 60, Firefox ESR 60\
1665 **CCK2 Equivalent:** `disableTelemetry`\
1666 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled,toolkit.telemetry.archive.enabled`
1667
1668 #### Windows (GPO)
1669 ```
1670 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1671 ```
1672 #### Windows (Intune)
1673 OMA-URI:
1674 ```
1675 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1676 ```
1677 Value (string):
1678 ```
1679 <enabled/> or <disabled/>
1680 ```
1681 #### macOS
1682 ```
1683 <dict>
1684 <key>DisableTelemetry</key>
1685 <true/> | <false/>
1686 </dict>
1687 ```
1688 #### policies.json
1689 ```
1690 {
1691 "policies": {
1692 "DisableTelemetry": true | false
1693 }
1694 }
1695 ```
1696 ### DisplayBookmarksToolbar
1697 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1698
1699 **Compatibility:** Firefox 60, Firefox ESR 60\
1700 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1701 **Preferences Affected:** N/A
1702
1703 #### Windows (GPO)
1704 ```
1705 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1706 ```
1707 #### Windows (Intune)
1708 OMA-URI:
1709 ```
1710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1711 ```
1712 Value (string):
1713 ```
1714 <enabled/> or <disabled/>
1715 ```
1716 #### macOS
1717 ```
1718 <dict>
1719 <key>DisplayBookmarksToolbar</key>
1720 <true/> | <false/>
1721 </dict>
1722 ```
1723 #### policies.json
1724 ```
1725 {
1726 "policies": {
1727 "DisplayBookmarksToolbar": true | false
1728 }
1729 }
1730 ```
1731 ### DisplayMenuBar (Deprecated)
1732 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1733
1734 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1735 **CCK2 Equivalent:** `displayMenuBar`\
1736 **Preferences Affected:** N/A
1737
1738 #### Windows (GPO)
1739 ```
1740 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1741 ```
1742 #### macOS
1743 ```
1744 <dict>
1745 <key>DisplayMenuBar</key>
1746 <true/> | <false/>
1747 </dict>
1748 ```
1749 #### policies.json
1750 ```
1751 {
1752 "policies": {
1753 "DisplayMenuBar": true | false
1754 }
1755 }
1756 ```
1757 ### DisplayMenuBar
1758 Set the state of the menubar.
1759
1760 `always` means the menubar is shown and cannot be hidden.
1761
1762 `never` means the menubar is hidden and cannot be shown.
1763
1764 `default-on` means the menubar is on by default but can be hidden.
1765
1766 `default-off` means the menubar is off by default but can be shown.
1767
1768 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1769 **CCK2 Equivalent:** `displayMenuBar`\
1770 **Preferences Affected:** N/A
1771
1772 #### Windows (GPO)
1773 ```
1774 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1775 ```
1776 #### Windows (Intune)
1777 OMA-URI:
1778 ```
1779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1780 ```
1781 Value (string):
1782 ```
1783 <enabled/>
1784 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1785 ```
1786 #### macOS
1787 ```
1788 <dict>
1789 <key>DisplayMenuBar</key>
1790 <string>always | never | default-on | default-off</string>
1791 </dict>
1792 ```
1793 #### policies.json
1794 ```
1795 {
1796 "policies": {
1797 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1798 }
1799 }
1800 ```
1801 ### DNSOverHTTPS
1802 Configure DNS over HTTPS.
1803
1804 `Enabled` determines whether DNS over HTTPS is enabled
1805
1806 `ProviderURL` is a URL to another provider.
1807
1808 `Locked` prevents the user from changing DNS over HTTPS preferences.
1809
1810 `ExcludedDomains` excludes domains from DNS over HTTPS.
1811
1812 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1813 **CCK2 Equivalent:** N/A\
1814 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1815
1816 #### Windows (GPO)
1817 ```
1818 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1819 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1820 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1821 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1822 ```
1823 #### Windows (Intune)
1824 OMA-URI:
1825 ```
1826 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1827 ```
1828 Value (string):
1829 ```
1830 <enabled/> or <disabled/>
1831 ```
1832 OMA-URI:
1833 ```
1834 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1835 ```
1836 Value (string):
1837 ```
1838 <enabled/>
1839 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1840 ```
1841 OMA-URI:
1842 ```
1843 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1844 ```
1845 Value (string):
1846 ```
1847 <enabled/> or <disabled/>
1848 ```
1849 OMA-URI:
1850 ```
1851 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1852 ```
1853 Value (string):
1854 ```
1855 <enabled/>
1856 <data id="List" value="1&#xF000;example.com"/>
1857 ```
1858 #### macOS
1859 ```
1860 <dict>
1861 <key>DNSOverHTTPS</key>
1862 <dict>
1863 <key>Enabled</key>
1864 <true/> | <false/>
1865 <key>ProviderURL</key>
1866 <string>URL_TO_ALTERNATE_PROVIDER</string>
1867 <key>Locked</key>
1868 <true/> | <false/>
1869 <key>ExcludedDomains</key>
1870 <array>
1871 <string>example.com</string>
1872 </array>
1873 </dict>
1874 </dict>
1875 ```
1876 #### policies.json
1877 ```
1878 {
1879 "policies": {
1880 "DNSOverHTTPS": {
1881 "Enabled": true | false,
1882 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1883 "Locked": true | false,
1884 "ExcludedDomains": ["example.com"]
1885 }
1886 }
1887 }
1888 ```
1889 ### DontCheckDefaultBrowser
1890 Don't check if Firefox is the default browser at startup.
1891
1892 **Compatibility:** Firefox 60, Firefox ESR 60\
1893 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1894 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1895
1896 #### Windows (GPO)
1897 ```
1898 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1899 ```
1900 #### Windows (Intune)
1901 OMA-URI:
1902 ```
1903 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1904 ```
1905 Value (string):
1906 ```
1907 <enabled/> or <disabled/>
1908 ```
1909 #### macOS
1910 ```
1911 <dict>
1912 <key>DontCheckDefaultBrowser</key>
1913 <true/> | <false/>
1914 </dict>
1915 ```
1916 #### policies.json
1917 ```
1918 {
1919 "policies": {
1920 "DontCheckDefaultBrowser": true | false
1921 }
1922 }
1923 ```
1924 ### DefaultDownloadDirectory
1925 Set the default download directory.
1926
1927 You can use ${home} for the native home directory.
1928
1929 **Compatibility:** Firefox 68, Firefox ESR 68\
1930 **CCK2 Equivalent:** N/A\
1931 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1932
1933 #### Windows (GPO)
1934 ```
1935 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1936 ```
1937 #### Windows (Intune)
1938 OMA-URI:
1939 ```
1940 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1941 ```
1942 Value (string):
1943 ```
1944 <enabled/>
1945 <data id="Preferences_String" value="${home}\Downloads"/>
1946 ```
1947 #### macOS
1948 ```
1949 <dict>
1950 <key>DefaultDownloadDirectory</key>
1951 <string>${home}/Downloads</string>
1952 </dict>
1953 ```
1954 #### policies.json (macOS and Linux)
1955 ```
1956 {
1957 "policies": {
1958 "DefaultDownloadDirectory": "${home}/Downloads"
1959 }
1960 ```
1961 #### policies.json (Windows)
1962 ```
1963 {
1964 "policies": {
1965 "DefaultDownloadDirectory": "${home}\\Downloads"
1966 }
1967 ```
1968 ### DownloadDirectory
1969 Set and lock the download directory.
1970
1971 You can use ${home} for the native home directory.
1972
1973 **Compatibility:** Firefox 68, Firefox ESR 68\
1974 **CCK2 Equivalent:** N/A\
1975 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1976
1977 #### Windows (GPO)
1978 ```
1979 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1980 ```
1981 #### Windows (Intune)
1982 OMA-URI:
1983 ```
1984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1985 ```
1986 Value (string):
1987 ```
1988 <enabled/>
1989 <data id="Preferences_String" value="${home}\Downloads"/>
1990 ```
1991 #### macOS
1992 ```
1993 <dict>
1994 <key>DownloadDirectory</key>
1995 <string>${home}/Downloads</string>
1996 </dict>
1997 ```
1998 #### policies.json (macOS and Linux)
1999 ```
2000 {
2001 "policies": {
2002 "DownloadDirectory": "${home}/Downloads"
2003 }
2004 ```
2005 #### policies.json (Windows)
2006 ```
2007 {
2008 "policies": {
2009 "DownloadDirectory": "${home}\\Downloads"
2010 }
2011 ```
2012 ### EnableTrackingProtection
2013 Configure tracking protection.
2014
2015 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2016
2017 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2018
2019 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2020
2021 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2022
2023 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2024
2025 `Exceptions` are origins for which tracking protection is not enabled.
2026
2027 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2028 **CCK2 Equivalent:** N/A\
2029 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
2030
2031 #### Windows (GPO)
2032 ```
2033 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2034 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2035 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2036 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2037 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2038 ```
2039 #### Windows (Intune)
2040 OMA-URI:
2041 ```
2042 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2043 ```
2044 Value (string):
2045 ```
2046 <enabled/> or <disabled/>
2047 ```
2048 OMA-URI:
2049 ```
2050 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2051 ```
2052 Value (string):
2053 ```
2054 <enabled/> or <disabled/>
2055 ```
2056 OMA-URI:
2057 ```
2058 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2059 ```
2060 Value (string):
2061 ```
2062 <enabled/> or <disabled/>
2063 ```
2064 OMA-URI:
2065 ```
2066 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2067 ```
2068 Value (string):
2069 ```
2070 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2071 ```
2072 OMA-URI:
2073 ```
2074 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2075 ```
2076 Value (string):
2077 ```
2078 <enabled/> or <disabled/>
2079 ```
2080 #### macOS
2081 ```
2082 <dict>
2083 <key>EnableTrackingProtection</key>
2084 <dict>
2085 <key>Value</key>
2086 <true/> | <false/>
2087 <key>Locked</key>
2088 <true/> | <false/>
2089 <key>Cryptomining</key>
2090 <true/> | <false/>
2091 <key>Fingerprinting</key>
2092 <true/> | <false/>
2093 <key>Exceptions</key>
2094 <array>
2095 <string>https://example.com</string>
2096 </array>
2097 </dict>
2098 </dict>
2099 ```
2100 #### policies.json
2101 ```
2102 {
2103 "policies": {
2104 "EnableTrackingProtection": {
2105 "Value": true | false,
2106 "Locked": true | false,
2107 "Cryptomining": true | false,
2108 "Fingerprinting": true | false,
2109 "Exceptions": ["https://example.com"]
2110 }
2111 }
2112 ```
2113 ### EncryptedMediaExtensions
2114 Enable or disable Encrypted Media Extensions and optionally lock it.
2115
2116 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2117
2118 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2119
2120 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2121 **CCK2 Equivalent:** N/A\
2122 **Preferences Affected:** `media.eme.enabled`
2123
2124 #### Windows (GPO)
2125 ```
2126 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2127 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2128 ```
2129 #### Windows (Intune)
2130 OMA-URI:
2131 ```
2132 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2133 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2134 ```
2135 Value (string):
2136 ```
2137 <enabled/>or <disabled/>
2138 ```
2139 #### macOS
2140 ```
2141 <dict>
2142 <key>EncryptedMediaExtensions</key>
2143 <dict>
2144 <key>Enabled</key>
2145 <true/> | <false/>
2146 <key>Locked</key>
2147 <true/> | <false/>
2148 </dict>
2149 </dict>
2150 ```
2151 #### policies.json
2152 ```
2153 {
2154 "policies": {
2155 "EncryptedMediaExtensions": {
2156 "Enabled": true | false,
2157 "Locked": true | false
2158 }
2159 }
2160 ```
2161 ### EnterprisePoliciesEnabled
2162 Enable policy support on macOS.
2163
2164 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2165 **CCK2 Equivalent:** N/A\
2166 **Preferences Affected:** N/A
2167
2168 #### macOS
2169 ```
2170 <dict>
2171 <key>EnterprisePoliciesEnabled</key>
2172 <true/>
2173 </dict>
2174 ```
2175 ### Extensions
2176 Control the installation, uninstallation and locking of extensions.
2177
2178 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2179
2180 `Install` is a list of URLs or native paths for extensions to be installed.
2181
2182 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2183
2184 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2185
2186 **Compatibility:** Firefox 60, Firefox ESR 60\
2187 **CCK2 Equivalent:** `addons`\
2188 **Preferences Affected:** N/A
2189
2190 #### Windows (GPO)
2191 ```
2192 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2193 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2194 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2195 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2196 ```
2197 #### Windows (Intune)
2198 OMA-URI:
2199 ```
2200 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2201 ```
2202 Value (string):
2203 ```
2204 <enabled/>
2205 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2206 ```
2207 OMA-URI:
2208 ```
2209 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2210 ```
2211 Value (string):
2212 ```
2213 <enabled/>
2214 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2215 ```
2216 OMA-URI:
2217 ```
2218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2219 ```
2220 Value (string):
2221 ```
2222 <enabled/>
2223 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2224 ```
2225 #### macOS
2226 ```
2227 <dict>
2228 <key>Extensions</key>
2229 <dict>
2230 <key>Install</key>
2231 <array>
2232 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2233 <string>//path/to/xpi</string>
2234 </array>
2235 <key>Uninstall</key>
2236 <array>
2237 <string>bad_addon_id@mozilla.org</string>
2238 </array>
2239 <key>Locked</key>
2240 <array>
2241 <string>addon_id@mozilla.org</string>
2242 </array>
2243 </dict>
2244 </dict>
2245 ```
2246 #### policies.json
2247 ```
2248 {
2249 "policies": {
2250 "Extensions": {
2251 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2252 "Uninstall": ["bad_addon_id@mozilla.org"],
2253 "Locked": ["addon_id@mozilla.org"]
2254 }
2255 }
2256 }
2257 ```
2258 ### ExtensionSettings
2259 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2260
2261 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2262
2263 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2264
2265 The configuration for each extension is another dictionary that can contain the fields documented below.
2266
2267 | Name | Description |
2268 | --- | --- |
2269 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2270 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2271 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2272 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2273 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2274 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2275 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2276 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2277 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2278 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2279
2280 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2281 **CCK2 Equivalent:** N/A\
2282 **Preferences Affected:** N/A
2283
2284 #### Windows (GPO)
2285 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2286 ```
2287 {
2288 "*": {
2289 "blocked_install_message": "Custom error message.",
2290 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2291 "installation_mode": "blocked",
2292 "allowed_types": ["extension"]
2293 },
2294 "uBlock0@raymondhill.net": {
2295 "installation_mode": "force_installed",
2296 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2297 },
2298 "https-everywhere@eff.org": {
2299 "installation_mode": "allowed"
2300 }
2301 }
2302 ```
2303 #### Windows (Intune)
2304 OMA-URI:
2305 ```
2306 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2307 ```
2308 Value (string):
2309 ```
2310 <enabled/>
2311 <data id="ExtensionSettings" value='
2312 {
2313 "*": {
2314 "blocked_install_message": "Custom error message.",
2315 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2316 "installation_mode": "blocked",
2317 "allowed_types": ["extension"]
2318 },
2319 "uBlock0@raymondhill.net": {
2320 "installation_mode": "force_installed",
2321 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2322 },
2323 "https-everywhere@eff.org": {
2324 "installation_mode": "allowed"
2325 }
2326 }'/>
2327 ```
2328 #### macOS
2329 ```
2330 <dict>
2331 <key>ExtensionSettings</key>
2332 <dict>
2333 <key>*</key>
2334 <dict>
2335 <key>blocked_install_message</key>
2336 <string>Custom error message.</string>
2337 <key>install_sources</key>
2338 <array>
2339 <string>about:addons</string>
2340 <string>https://addons.mozilla.org/</string>
2341 </array>
2342 <key>installation_mode</key>
2343 <string>blocked</string>
2344 <key>allowed_types</key>
2345 <array>
2346 <string>extension</string>
2347 </array>
2348 </dict>
2349 <key>uBlock0@raymondhill.net</key>
2350 <dict>
2351 <key>installation_mode</key>
2352 <string>force_installed</string>
2353 <key>install_url</key>
2354 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2355 </dict>
2356 <key>https-everywhere@eff.org</key>
2357 <dict>
2358 <key>installation_mode</key>
2359 <string>allowed</string>
2360 </dict>
2361 </dict>
2362 </dict>
2363 ```
2364 #### policies.json
2365 ```
2366 {
2367 "policies": {
2368 "ExtensionSettings": {
2369 "*": {
2370 "blocked_install_message": "Custom error message.",
2371 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2372 "installation_mode": "blocked",
2373 "allowed_types": ["extension"]
2374 },
2375 "uBlock0@raymondhill.net": {
2376 "installation_mode": "force_installed",
2377 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2378 },
2379 "https-everywhere@eff.org": {
2380 "installation_mode": "allowed"
2381 }
2382 }
2383 }
2384 }
2385 ```
2386 ### ExtensionUpdate
2387 Control extension updates.
2388
2389 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2390 **CCK2 Equivalent:** N/A\
2391 **Preferences Affected:** `extensions.update.enabled`
2392
2393 #### Windows (GPO)
2394 ```
2395 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2396 ```
2397 #### Windows (Intune)
2398 OMA-URI:
2399 ```
2400 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2401 ```
2402 Value (string):
2403 ```
2404 <enabled/> or <disabled/>
2405 ```
2406 #### macOS
2407 ```
2408 <dict>
2409 <key>ExtensionUpdate</key>
2410 <true/> | <false/>
2411 </dict>
2412 ```
2413 #### policies.json
2414 ```
2415 {
2416 "policies": {
2417 "ExtensionUpdate": true | false
2418 }
2419 }
2420 ```
2421 ### FlashPlugin
2422 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2423
2424 `Allow` is a list of origins where Flash are allowed.
2425
2426 `Block` is a list of origins where Flash is not allowed.
2427
2428 `Default` determines whether or not Flash is allowed by default.
2429
2430 `Locked` prevents the user from changing Flash preferences.
2431
2432 **Compatibility:** Firefox 60, Firefox ESR 60\
2433 **CCK2 Equivalent:** `permissions.plugin`\
2434 **Preferences Affected:** `plugin.state.flash`
2435
2436 #### Windows (GPO)
2437 ```
2438 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2439 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2440 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2441 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2442 ```
2443 #### Windows (Intune)
2444 OMA-URI:
2445 ```
2446 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2447 ```
2448 Value (string):
2449 ```
2450 <enabled/>
2451 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2452 ```
2453 OMA-URI:
2454 ```
2455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2456 ```
2457 Value (string):
2458 ```
2459 <enabled/> or <disabled/>
2460 ```
2461 OMA-URI:
2462 ```
2463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2464 ```
2465 Value (string):
2466 ```
2467 <enabled/> or <disabled/>
2468 ```
2469 #### macOS
2470 ```
2471 <dict>
2472 <key>FlashPlugin</key>
2473 <dict>
2474 <key>Allow</key>
2475 <array>
2476 <string>http://example.org</string>
2477 </array>
2478 <key>Block</key>
2479 <array>
2480 <string>http://example.edu</string>
2481 </array>
2482 <key>Default</key>
2483 <true/> | <false/>
2484 <key>Locked</key>
2485 <true/> | <false/>
2486 </dict>
2487 </dict>
2488 ```
2489 #### policies.json
2490 ```
2491 {
2492 "policies": {
2493 "FlashPlugin": {
2494 "Allow": ["http://example.org/"],
2495 "Block": ["http://example.edu/"],
2496 "Default": true | false,
2497 "Locked": true | false
2498 }
2499 }
2500 }
2501 ```
2502
2503
2504
2505 ### Handlers
2506 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2507
2508 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2509
2510 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2511
2512 | Name | Description |
2513 | --- | --- |
2514 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2515 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2516 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2517 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2518 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2519 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2520
2521 **Compatibility:** Firefox 78, Firefox ESR 78\
2522 **CCK2 Equivalent:** N/A\
2523 **Preferences Affected:** N/A
2524
2525 #### Windows (GPO)
2526 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2527 ```
2528 {
2529 "mimeTypes": {
2530 "application/msword": {
2531 "action": "useSystemDefault",
2532 "ask": true | false
2533 }
2534 },
2535 "schemes": {
2536 "mailto": {
2537 "action": "useHelperApp",
2538 "ask": true | false,
2539 "handlers": [{
2540 "name": "Gmail",
2541 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2542 }]
2543 }
2544 },
2545 "extensions": {
2546 "pdf": {
2547 "action": "useHelperApp",
2548 "ask": true | false,
2549 "handlers": [{
2550 "name": "Adobe Acrobat",
2551 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2552 }]
2553 }
2554 }
2555 }
2556 ```
2557 #### Windows (Intune)
2558 OMA-URI:
2559 ```
2560 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2561 ```
2562 Value (string):
2563 ```
2564 <enabled/>
2565 <data id="Handlers" value='
2566 {
2567 "mimeTypes": {
2568 "application/msword": {
2569 "action": "useSystemDefault",
2570 "ask": true | false
2571 }
2572 },
2573 "schemes": {
2574 "mailto": {
2575 "action": "useHelperApp",
2576 "ask": true | false,
2577 "handlers": [{
2578 "name": "Gmail",
2579 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2580 }]
2581 }
2582 },
2583 "extensions": {
2584 "pdf": {
2585 "action": "useHelperApp",
2586 "ask": true | false,
2587 "handlers": [{
2588 "name": "Adobe Acrobat",
2589 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2590 }]
2591 }
2592 }
2593 }
2594 '/>
2595 ```
2596 #### macOS
2597 ```
2598 <dict>
2599 <key>Handlers</key>
2600 <dict>
2601 <key>mimeTypes</key>
2602 <dict>
2603 <key>application/msword</key>
2604 <dict>
2605 <key>action</key>
2606 <string>useSystemDefault</string>
2607 <key>ask</key>
2608 <true/> | <false/>
2609 </dict>
2610 </dict>
2611 <key>schemes</key>
2612 <dict>
2613 <key>mailto</key>
2614 <dict>
2615 <key>action</key>
2616 <string>useHelperApp</string>
2617 <key>ask</key>
2618 <true/> | <false/>
2619 <key>handlers</key>
2620 <array>
2621 <dict>
2622 <key>name</key>
2623 <string>Gmail</string>
2624 <key>uriTemplate</key>
2625 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2626 </dict>
2627 </array>
2628 </dict>
2629 </dict>
2630 <key>extensions</key>
2631 <dict>
2632 <key>pdf</key>
2633 <dict>
2634 <key>action</key>
2635 <string>useHelperApp</string>
2636 <key>ask</key>
2637 <true/> | <false/>
2638 <key>handlers</key>
2639 <array>
2640 <dict>
2641 <key>name</key>
2642 <string>Adobe Acrobat</string>
2643 <key>path</key>
2644 <string>/System/Applications/Preview.app</string>
2645 </dict>
2646 </array>
2647 </dict>
2648 </dict>
2649 </dict>
2650 </dict>
2651 ```
2652 #### policies.json
2653 ```
2654 {
2655 "policies": {
2656 "Handlers": {
2657 "mimeTypes": {
2658 "application/msword": {
2659 "action": "useSystemDefault",
2660 "ask": false
2661 }
2662 },
2663 "schemes": {
2664 "mailto": {
2665 "action": "useHelperApp",
2666 "ask": true | false,
2667 "handlers": [{
2668 "name": "Gmail",
2669 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2670 }]
2671 }
2672 },
2673 "extensions": {
2674 "pdf": {
2675 "action": "useHelperApp",
2676 "ask": true | false,
2677 "handlers": [{
2678 "name": "Adobe Acrobat",
2679 "path": "/usr/bin/acroread"
2680 }]
2681 }
2682 }
2683 }
2684 }
2685 }
2686 ```
2687 ### FirefoxHome
2688 Customize the Firefox Home page.
2689
2690 **Compatibility:** Firefox 68, Firefox ESR 68\
2691 **CCK2 Equivalent:** N/A\
2692 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2693
2694 #### Windows (GPO)
2695 ```
2696 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2697 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2698 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2699 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2700 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2701 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2702 ```
2703 #### Windows (Intune)
2704 OMA-URI:
2705 ```
2706 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2707 ```
2708 Value (string):
2709 ```
2710 <enabled/>
2711 <data id="FirefoxHome_Search" value="true | false"/>
2712 <data id="FirefoxHome_TopSites" value="true | false"/>
2713 <data id="FirefoxHome_Highlights" value="true | false"/>
2714 <data id="FirefoxHome_Pocket" value="true | false"/>
2715 <data id="FirefoxHome_Snippets" value="true | false"/>
2716 <data id="FirefoxHome_Locked" value="true | false"/>
2717 ```
2718 #### macOS
2719 ```
2720 <dict>
2721 <key>FirefoxHome</key>
2722 <dict>
2723 <key>Search</key>
2724 <true/> | <false/>
2725 <key>TopSites</key>
2726 <true/> | <false/>
2727 <key>Highlights</key>
2728 <true/> | <false/>
2729 <key>Pocket</key>
2730 <true/> | <false/>
2731 <key>Snippets</key>
2732 <true/> | <false/>
2733 <key>Locked</key>
2734 <true/> | <false/>
2735 </dict>
2736 </dict>
2737 ```
2738 #### policies.json
2739 ```
2740 {
2741 "policies": {
2742 "FirefoxHome": {
2743 "Search": true | false,
2744 "TopSites": true | false,
2745 "Highlights": true | false,
2746 "Pocket": true | false,
2747 "Snippets": true | false,
2748 "Locked": true | false
2749 }
2750 }
2751 }
2752 ```
2753 ### HardwareAcceleration
2754 Control hardware acceleration.
2755
2756 **Compatibility:** Firefox 60, Firefox ESR 60\
2757 **CCK2 Equivalent:** N/A\
2758 **Preferences Affected:** `layers.acceleration.disabled`
2759
2760 #### Windows (GPO)
2761 ```
2762 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2763 ```
2764 #### Windows (Intune)
2765 OMA-URI:
2766 ```
2767 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2768 ```
2769 Value (string):
2770 ```
2771 <enabled/> or <disabled/>
2772 ```
2773 #### macOS
2774 ```
2775 <dict>
2776 <key>HardwareAcceleration</key>
2777 <true/> | <false/>
2778 </dict>
2779 ```
2780 #### policies.json
2781 ```
2782 {
2783 "policies": {
2784 "HardwareAcceleration": true | false
2785 }
2786 }
2787 ```
2788 ### Homepage
2789 Configure the default homepage and how Firefox starts.
2790
2791 `URL` is the default homepage.
2792
2793 `Locked` prevents the user from changing homepage preferences.
2794
2795 `Additional` allows for more than one homepage.
2796
2797 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2798
2799 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
2800
2801 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2802 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2803 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2804
2805 #### Windows (GPO)
2806 ```
2807 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2808 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2809 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2810 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2811 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2812 ```
2813 #### Windows (Intune)
2814 OMA-URI:
2815 ```
2816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2817 ```
2818 Value (string):
2819 ```
2820 <enabled/>
2821
2822 <data id="HomepageURL" value="https://example.com"/>
2823 <data id="HomepageLocked" value="true | false"/>
2824 ```
2825 OMA-URI:
2826 ```
2827 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2828 ```
2829 Value (string):
2830 ```
2831 <enabled/>
2832
2833 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2834 ```
2835 OMA-URI:
2836 ```
2837 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2838 ```
2839 Value (string):
2840 ```
2841 <enabled/>
2842
2843 <data id="StartPage" value="none | homepage | previous-session"/>
2844 ```
2845 #### macOS
2846 ```
2847 <dict>
2848 <key>Homepage</key>
2849 <dict>
2850 <key>URL</key>
2851 <string>http://example.com</string>
2852 <key>Locked</key>
2853 <true/> | <false/>
2854 <key>Additional</key>
2855 <array>
2856 <string>http://example.org</string>
2857 <string>http://example.edu</string>
2858 </array>
2859 <key>StartPage</key>
2860 <string>none | homepage | previous-session | homepage-locked</string>
2861 </dict>
2862 </dict>
2863 ```
2864 #### policies.json
2865 ```
2866 {
2867 "policies": {
2868 "Homepage": {
2869 "URL": "http://example.com/",
2870 "Locked": true | false,
2871 "Additional": ["http://example.org/",
2872 "http://example.edu/"],
2873 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2874 }
2875 }
2876 }
2877 ```
2878 ### InstallAddonsPermission
2879 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2880
2881 `Allow` is a list of origins where extension installs are allowed.
2882
2883 `Default` determines whether or not extension installs are allowed by default.
2884
2885 **Compatibility:** Firefox 60, Firefox ESR 60\
2886 **CCK2 Equivalent:** `permissions.install`\
2887 **Preferences Affected:** `xpinstall.enabled`
2888
2889 #### Windows (GPO)
2890 ```
2891 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2892 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2893 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2894 ```
2895 #### Windows (Intune)
2896 OMA-URI:
2897 ```
2898 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2899 ```
2900 Value (string):
2901 ```
2902 <enabled/>
2903 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2904 ```
2905 OMA-URI:
2906 ```
2907 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2908 ```
2909 Value (string):
2910 ```
2911 <enabled/>
2912 ```
2913 #### macOS
2914 ```
2915 <dict>
2916 <key>InstallAddonsPermission</key>
2917 <dict>
2918 <key>Allow</key>
2919 <array>
2920 <string>http://example.org</string>
2921 <string>http://example.edu</string>
2922 </array>
2923 <key>Default</key>
2924 <true/> | <false/>
2925 </dict>
2926 </dict>
2927 ```
2928 #### policies.json
2929 ```
2930 {
2931 "policies": {
2932 "InstallAddonsPermission": {
2933 "Allow": ["http://example.org/",
2934 "http://example.edu/"],
2935 "Default": true | false
2936 }
2937 }
2938 }
2939 ```
2940 ### LegacyProfiles
2941 Disable the feature enforcing a separate profile for each installation.
2942
2943 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2944
2945 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2946
2947 This policy only work on Windows via GPO (not policies.json).
2948
2949 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2950 **CCK2 Equivalent:** N/A\
2951 **Preferences Affected:** N/A
2952
2953 #### Windows (GPO)
2954 ```
2955 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2956 ```
2957 #### Windows (Intune)
2958 OMA-URI:
2959 ```
2960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2961 ```
2962 Value (string):
2963 ```
2964 <enabled/> or <disabled/>
2965 ```
2966 ### LocalFileLinks
2967 Enable linking to local files by origin.
2968
2969 **Compatibility:** Firefox 68, Firefox ESR 68\
2970 **CCK2 Equivalent:** N/A\
2971 **Preferences Affected:** `capability.policy.localfilelinks.*`
2972
2973 #### Windows (GPO)
2974 ```
2975 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2976 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2977 ```
2978 #### Windows (Intune)
2979 OMA-URI:
2980 ```
2981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2982 ```
2983 Value (string):
2984 ```
2985 <enabled/>
2986 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2987 ```
2988 #### macOS
2989 ```
2990 <dict>
2991 <key>LocalFileLinks</key>
2992 <array>
2993 <string>http://example.org</string>
2994 <string>http://example.edu</string>
2995 </array>
2996 </dict>
2997 ```
2998 #### policies.json
2999 ```
3000 {
3001 "policies": {
3002 "LocalFileLinks": ["http://example.org/",
3003 "http://example.edu/"]
3004 }
3005 }
3006 ```
3007 ### ManagedBookmarks
3008 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3009
3010 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3011
3012 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3013 ```
3014 {
3015 "items": {
3016 "id": "BookmarkType",
3017 "properties": {
3018 "children": {
3019 "items": {
3020 "$ref": "BookmarkType"
3021 },
3022 "type": "array"
3023 },
3024 "name": {
3025 "type": "string"
3026 },
3027 "toplevel_name": {
3028 "type": "string"
3029 },
3030 "url": {
3031 "type": "string"
3032 }
3033 },
3034 "type": "object"
3035 },
3036 "type": "array"
3037 }
3038 ```
3039 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3040 **CCK2 Equivalent:** N/A\
3041 **Preferences Affected:** N/A
3042
3043 #### Windows (GPO)
3044 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3045 ```
3046 [
3047 {
3048 "toplevel_name": "My managed bookmarks folder"
3049 },
3050 {
3051 "url": "example.com",
3052 "name": "Example"
3053 },
3054 {
3055 "name": "Mozilla links",
3056 "children": [
3057 {
3058 "url": "https://mozilla.org",
3059 "name": "Mozilla.org"
3060 },
3061 {
3062 "url": "https://support.mozilla.org/",
3063 "name": "SUMO"
3064 }
3065 ]
3066 }
3067 ]
3068 ```
3069 #### Windows (Intune)
3070 OMA-URI:
3071 ```
3072 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3073 ```
3074 Value (string):
3075 ```
3076 <enabled/>
3077 <data id="JSON" value='
3078 [
3079 {
3080 "toplevel_name": "My managed bookmarks folder"
3081 },
3082 {
3083 "url": "example.com",
3084 "name": "Example"
3085 },
3086 {
3087 "name": "Mozilla links",
3088 "children": [
3089 {
3090 "url": "https://mozilla.org",
3091 "name": "Mozilla.org"
3092 },
3093 {
3094 "url": "https://support.mozilla.org/",
3095 "name": "SUMO"
3096 }
3097 ]
3098 }
3099 ]'/>
3100 ```
3101 #### macOS
3102 ```
3103 <dict>
3104 <key>ManagedBookmarks</key>
3105 <array>
3106 <dict>
3107 <key>toplevel_name</key>
3108 <string>My managed bookmarks folder</string></dict>
3109 <dict>
3110 <key>url</key>
3111 <string>example.com</string>
3112 <key>name</key>
3113 <string>Example</string>
3114 </dict>
3115 <dict>
3116 <key>name</key>
3117 <string>Mozilla links</string>
3118 <key>children</key>
3119 <array>
3120 <dict>
3121 <key>url</key>
3122 <string>https://mozilla.org</string>
3123 <key>name</key>
3124 <string>Mozilla</string>
3125 </dict>
3126 <dict>
3127 <key>url</key>
3128 <string>https://support.mozilla.org/</string>
3129 <key>name</key>
3130 <string>SUMO</string>
3131 </dict>
3132 </array>
3133 </dict>
3134 </array>
3135 </dict>
3136 ```
3137 #### policies.json
3138 ```
3139 {
3140 "policies": {
3141 "ManagedBookmarks": [
3142 {
3143 "toplevel_name": "My managed bookmarks folder"
3144 },
3145 {
3146 "url": "example.com",
3147 "name": "Example"
3148 },
3149 {
3150 "name": "Mozilla links",
3151 "children": [
3152 {
3153 "url": "https://mozilla.org",
3154 "name": "Mozilla.org"
3155 },
3156 {
3157 "url": "https://support.mozilla.org/",
3158 "name": "SUMO"
3159 }
3160 ]
3161 }
3162 ]
3163 }
3164 }
3165 ```
3166 ### ManualAppUpdateOnly
3167
3168 Switch to manual updates only.
3169
3170 If this policy is enabled:
3171 1. The user will never be prompted to install updates
3172 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3173 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3174
3175 This policy is primarily intended for advanced end users, not for enterprises.
3176
3177 **Compatibility:** Firefox 87\
3178 **CCK2 Equivalent:** N/A\
3179 **Preferences Affected:** N/A
3180
3181 #### policies.json
3182 ```
3183 {
3184 "policies": {
3185 "ManualAppUpdateOnly": true | false
3186 }
3187 }
3188 ```
3189 ### PrimaryPassword
3190 Require or prevent using a primary (formerly master) password.
3191
3192 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
3193
3194 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
3195
3196 **Compatibility:** Firefox 79, Firefox ESR 78.1\
3197 **CCK2 Equivalent:** `noMasterPassword`\
3198 **Preferences Affected:** N/A
3199
3200 #### Windows (GPO)
3201 ```
3202 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
3203 ```
3204 #### Windows (Intune)
3205 OMA-URI:
3206 ```
3207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
3208 ```
3209 Value (string):
3210 ```
3211 <enabled/> or <disabled/>
3212 ```
3213 #### macOS
3214 ```
3215 <dict>
3216 <key>PrimaryPassword</key>
3217 <true/> | <false/>
3218 </dict>
3219 ```
3220 #### policies.json
3221 ```
3222 {
3223 "policies": {
3224 "PrimaryPassword": true | false
3225 }
3226 }
3227 ```
3228 ### NetworkPrediction
3229 Enable or disable network prediction (DNS prefetching).
3230
3231 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3232 **CCK2 Equivalent:** N/A\
3233 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
3234
3235 #### Windows (GPO)
3236 ```
3237 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3238 ```
3239 #### Windows (Intune)
3240 OMA-URI:
3241 ```
3242 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3243 ```
3244 Value (string):
3245 ```
3246 <enabled/> or <disabled/>
3247 ```
3248 #### macOS
3249 ```
3250 <dict>
3251 <key>NetworkPrediction</key>
3252 <true/> | <false/>
3253 </dict>
3254 ```
3255 #### policies.json
3256 ```
3257 {
3258 "policies": {
3259 "NetworkPrediction": true | false
3260 }
3261 ```
3262 ### NewTabPage
3263 Enable or disable the New Tab page.
3264
3265 **Compatibility:** Firefox 68, Firefox ESR 68\
3266 **CCK2 Equivalent:** N/A\
3267 **Preferences Affected:** `browser.newtabpage.enabled`
3268
3269 #### Windows (GPO)
3270 ```
3271 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3272 ```
3273 #### Windows (Intune)
3274 OMA-URI:
3275 ```
3276 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3277 ```
3278 Value (string):
3279 ```
3280 <enabled/> or <disabled/>
3281 ```
3282 #### macOS
3283 ```
3284 <dict>
3285 <key>NewTabPage</key>
3286 <true/> | <false/>
3287 </dict>
3288 ```
3289 #### policies.json
3290 ```
3291 {
3292 "policies": {
3293 "NewTabPage": true | false
3294 }
3295 ```
3296 ### NoDefaultBookmarks
3297 Disable the creation of default bookmarks.
3298
3299 This policy is only effective if the user profile has not been created yet.
3300
3301 **Compatibility:** Firefox 60, Firefox ESR 60\
3302 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3303 **Preferences Affected:** N/A
3304
3305 #### Windows (GPO)
3306 ```
3307 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3308 ```
3309 #### Windows (Intune)
3310 OMA-URI:
3311 ```
3312 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3313 ```
3314 Value (string):
3315 ```
3316 <enabled/> or <disabled/>
3317 ```
3318 #### macOS
3319 ```
3320 <dict>
3321 <key>NoDefaultBookmarks</key>
3322 <true/> | <false/>
3323 </dict>
3324 ```
3325 #### policies.json
3326 ```
3327 {
3328 "policies": {
3329 "NoDefaultBookmarks": true | false
3330 }
3331 }
3332 ```
3333 ### OfferToSaveLogins
3334 Control whether or not Firefox offers to save passwords.
3335
3336 **Compatibility:** Firefox 60, Firefox ESR 60\
3337 **CCK2 Equivalent:** `dontRememberPasswords`\
3338 **Preferences Affected:** `signon.rememberSignons`
3339
3340 #### Windows (GPO)
3341 ```
3342 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3343 ```
3344 #### Windows (Intune)
3345 OMA-URI:
3346 ```
3347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3348 ```
3349 Value (string):
3350 ```
3351 <enabled/> or <disabled/>
3352 ```
3353 #### macOS
3354 ```
3355 <dict>
3356 <key>OfferToSaveLogins</key>
3357 <true/> | <false/>
3358 </dict>
3359 ```
3360 #### policies.json
3361 ```
3362 {
3363 "policies": {
3364 "OfferToSaveLogins": true | false
3365 }
3366 }
3367 ```
3368 ### OfferToSaveLoginsDefault
3369 Sets the default value of signon.rememberSignons without locking it.
3370
3371 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3372 **CCK2 Equivalent:** `dontRememberPasswords`\
3373 **Preferences Affected:** `signon.rememberSignons`
3374
3375 #### Windows (GPO)
3376 ```
3377 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3378 ```
3379 #### Windows (Intune)
3380 OMA-URI:
3381 ```
3382 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3383 ```
3384 Value (string):
3385 ```
3386 <enabled/> or <disabled/>
3387 ```
3388 #### macOS
3389 ```
3390 <dict>
3391 <key>OfferToSaveLoginsDefault</key>
3392 <true/> | <false/>
3393 </dict>
3394 ```
3395 #### policies.json
3396 ```
3397 {
3398 "policies": {
3399 "OfferToSaveLoginsDefault": true | false
3400 }
3401 }
3402 ```
3403 ### OverrideFirstRunPage
3404 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3405
3406 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3407
3408 **Compatibility:** Firefox 60, Firefox ESR 60\
3409 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3410 **Preferences Affected:** `startup.homepage_welcome_url`
3411
3412 #### Windows (GPO)
3413 ```
3414 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3415 ```
3416 #### Windows (Intune)
3417 OMA-URI:
3418 ```
3419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3420 ```
3421 Value (string):
3422 ```
3423 <enabled/>
3424 <data id="OverridePage" value="https://example.com"/>
3425 ```
3426 #### macOS
3427 ```
3428 <dict>
3429 <key>OverrideFirstRunPage</key>
3430 <string>http://example.org</string>
3431 </dict>
3432 ```
3433 #### policies.json
3434 ```
3435 {
3436 "policies": {
3437 "OverrideFirstRunPage": "http://example.org"
3438 }
3439 ```
3440 ### OverridePostUpdatePage
3441 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3442
3443 **Compatibility:** Firefox 60, Firefox ESR 60\
3444 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3445 **Preferences Affected:** `startup.homepage_override_url`
3446
3447 #### Windows (GPO)
3448 ```
3449 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3450 ```
3451 #### Windows (Intune)
3452 OMA-URI:
3453 ```
3454 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3455 ```
3456 Value (string):
3457 ```
3458 <enabled/>
3459 <data id="OverridePage" value="https://example.com"/>
3460 ```
3461 #### macOS
3462 ```
3463 <dict>
3464 <key>OverridePostUpdatePage</key>
3465 <string>http://example.org</string>
3466 </dict>
3467 ```
3468 #### policies.json
3469 ```
3470 {
3471 "policies": {
3472 "OverridePostUpdatePage": "http://example.org"
3473 }
3474 ```
3475 ### PasswordManagerEnabled
3476 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3477
3478 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3479 **CCK2 Equivalent:** N/A\
3480 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3481
3482 #### Windows (GPO)
3483 ```
3484 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3485 ```
3486 #### Windows (Intune)
3487 OMA-URI:
3488 ```
3489 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3490 ```
3491 Value (string):
3492 ```
3493 <enabled/> or <disabled/>
3494 ```
3495 #### macOS
3496 ```
3497 <dict>
3498 <key>PasswordManagerEnabled</key>
3499 <true/> | <false/>
3500 </dict>
3501 ```
3502 #### policies.json
3503 ```
3504 {
3505 "policies": {
3506 "PasswordManagerEnabled": true | false
3507 }
3508 }
3509 ```
3510 ### PDFjs
3511 Disable or configure PDF.js, the built-in PDF viewer.
3512
3513 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3514
3515 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3516
3517 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3518
3519 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3520 **CCK2 Equivalent:** N/A\
3521 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3522
3523 #### Windows (GPO)
3524 ```
3525 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3526 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3527 ```
3528 #### Windows (Intune)
3529 OMA-URI:
3530 ```
3531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3532 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3533 ```
3534 Value (string):
3535 ```
3536 <enabled/>or <disabled/>
3537 ```
3538 #### macOS
3539 ```
3540 <dict>
3541 <key>PDFjs</key>
3542 <dict>
3543 <key>Enabled</key>
3544 <true/> | <false/>
3545 <key>EnablePermissions</key>
3546 <true/> | <false/>
3547 </dict>
3548 </dict>
3549 ```
3550 #### policies.json
3551 ```
3552 {
3553 "policies": {
3554 "PSFjs": {
3555 "Enabled": true | false,
3556 "EnablePermissions": true | false
3557 }
3558 }
3559 ```
3560 ### Permissions
3561 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3562
3563 `Allow` is a list of origins where the feature is allowed.
3564
3565 `Block` is a list of origins where the feature is not allowed.
3566
3567 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3568
3569 `Locked` prevents the user from changing preferences for the feature.
3570
3571 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3572
3573 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3574 **CCK2 Equivalent:** N/A\
3575 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`.`permissions.default.xr`
3576
3577 #### Windows (GPO)
3578 ```
3579 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3580 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3581 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3582 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3583 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3584 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3585 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3586 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3587 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3588 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3589 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3590 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3591 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3592 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3593 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3594 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3595 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3596 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3597 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3598 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3599 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3600 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3601 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3602 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3603 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3604 ```
3605 #### Windows (Intune)
3606 OMA-URI:
3607 ```
3608 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3609 ```
3610 Value (string):
3611 ```
3612 <enabled/> or <disabled/>
3613 ```
3614 OMA-URI:
3615 ```
3616 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3617 ```
3618 Value (string):
3619 ```
3620 <enabled/> or <disabled/>
3621 ```
3622 OMA-URI:
3623 ```
3624 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3625 ```
3626 Value (string):
3627 ```
3628 <enabled/>
3629 <data id="Permissions" value="1&#xF000;https://example.org"/>
3630 ```
3631 OMA-URI:
3632 ```
3633 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3634 ```
3635 Value (string):
3636 ```
3637 <enabled/> or <disabled/>
3638 ```
3639 OMA-URI:
3640 ```
3641 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3642 ```
3643 Value (string):
3644 ```
3645 <enabled/> or <disabled/>
3646 ```
3647 OMA-URI:
3648 ```
3649 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3650 ```
3651 Value (string):
3652 ```
3653 <enabled/>
3654 <data id="Permissions" value="1&#xF000;https://example.org"/>
3655 ```
3656 OMA-URI:
3657 ```
3658 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3659 ```
3660 Value (string):
3661 ```
3662 <enabled/>
3663 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3664 ```
3665 OMA-URI:
3666 ```
3667 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3668 ```
3669 Value (string):
3670 ```
3671 <enabled/>
3672 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3673 ```
3674 OMA-URI:
3675 ```
3676 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3677 ```
3678 Value (string):
3679 ```
3680 <enabled/> or <disabled/>
3681 ```
3682 OMA-URI:
3683 ```
3684 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
3685 ```
3686 Value (string):
3687 ```
3688 <enabled/>
3689 <data id="Permissions" value="1&#xF000;https://example.org"/>
3690 ```
3691 OMA-URI:
3692 ```
3693 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
3694 ```
3695 Value (string):
3696 ```
3697 <enabled/>
3698 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3699 ```
3700 OMA-URI:
3701 ```
3702 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
3703 ```
3704 Value (string):
3705 ```
3706 <enabled/> or <disabled/>
3707 ```
3708 OMA-URI:
3709 ```
3710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
3711 ```
3712 Value (string):
3713 ```
3714 <enabled/> or <disabled/>
3715 ```
3716 #### macOS
3717 ```
3718 <dict>
3719 <key>Permissions</key>
3720 <dict>
3721 <key>Camera</key>
3722 <dict>
3723 <key>Allow</key>
3724 <array>
3725 <string>https://example.org</string>
3726 <string>https://example.org:1234</string>
3727 </array>
3728 <key>Block</key>
3729 <array>
3730 <string>https://example.edu</string>
3731 </array>
3732 <key>BlockNewRequests</key>
3733 <true/> | <false/>
3734 <key>Locked</key>
3735 <true/> | <false/>
3736 </dict>
3737 <key>Microphone</key>
3738 <dict>
3739 <key>Allow</key>
3740 <array>
3741 <string>https://example.org</string>
3742 </array>
3743 <key>Block</key>
3744 <array>
3745 <string>https://example.edu</string>
3746 </array>
3747 <key>BlockNewRequests</key>
3748 <true/> | <false/>
3749 <key>Locked</key>
3750 <true/> | <false/>
3751 </dict>
3752 <key>Location</key>
3753 <dict>
3754 <key>Allow</key>
3755 <array>
3756 <string>https://example.org</string>
3757 </array>
3758 <key>Block</key>
3759 <array>
3760 <string>https://example.edu</string>
3761 </array>
3762 <key>BlockNewRequests</key>
3763 <true/> | <false/>
3764 <key>Locked</key>
3765 <true/> | <false/>
3766 </dict>
3767 <key>Notifications</key>
3768 <dict>
3769 <key>Allow</key>
3770 <array>
3771 <string>https://example.org</string>
3772 </array>
3773 <key>Block</key>
3774 <array>
3775 <string>https://example.edu</string>
3776 </array>
3777 <key>BlockNewRequests</key>
3778 <true/>
3779 <key>Locked</key>
3780 <true/>
3781 </dict>
3782 <key>Autoplay</key>
3783 <dict>
3784 <key>Allow</key>
3785 <array>
3786 <string>https://example.org</string>
3787 </array>
3788 <key>Block</key>
3789 <array>
3790 <string>https://example.edu</string>
3791 </array>
3792 <key>Default</key>
3793 <string>allow-audio-video | block-audio | block-audio-video</string>
3794 <key>Locked</key>
3795 <true/> | <false/>
3796 </dict>
3797 </dict>
3798 </dict>
3799 ```
3800 #### policies.json
3801 ```
3802 {
3803 "policies": {
3804 "Permissions": {
3805 "Camera": {
3806 "Allow": ["https://example.org","https://example.org:1234"],
3807 "Block": ["https://example.edu"],
3808 "BlockNewRequests": true | false,
3809 "Locked": true | false
3810 },
3811 "Microphone": {
3812 "Allow": ["https://example.org"],
3813 "Block": ["https://example.edu"],
3814 "BlockNewRequests": true | false,
3815 "Locked": true | false
3816 },
3817 "Location": {
3818 "Allow": ["https://example.org"],
3819 "Block": ["https://example.edu"],
3820 "BlockNewRequests": true | false,
3821 "Locked": true | false
3822 },
3823 "Notifications": {
3824 "Allow": ["https://example.org"],
3825 "Block": ["https://example.edu"],
3826 "BlockNewRequests": true | false,
3827 "Locked": true | false
3828 },
3829 "Autoplay": {
3830 "Allow": ["https://example.org"],
3831 "Block": ["https://example.edu"],
3832 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3833 "Locked": true | false
3834 }
3835 }
3836 }
3837 }
3838 ```
3839 ### PictureInPicture
3840
3841 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
3842
3843 **Compatibility:** Firefox 78, Firefox ESR 78\
3844 **CCK2 Equivalent:** N/A\
3845 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3846
3847 #### Windows (GPO)
3848 ```
3849 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
3850 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
3851
3852 ```
3853 #### Windows (Intune)
3854 OMA-URI:
3855 ```
3856 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
3857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
3858 ```
3859 Value (string):
3860 ```
3861 <enabled/> or <disabled/>
3862 ```
3863 #### macOS
3864 ```
3865 <dict>
3866 <key>PictureInPicture</key>
3867 <dict>
3868 <key>Enabled</key>
3869 <true/> | <false/>
3870 <key>Locked</key>
3871 <true/> | <false/>
3872 </dict>
3873 </dict>
3874 ```
3875 #### policies.json
3876 ```
3877 {
3878 "policies": {
3879 "PictureInPicture": {
3880 "Enabled": true | false,
3881 "Locked": true, false
3882 }
3883 }
3884 }
3885 ```
3886 ### PopupBlocking
3887 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3888
3889 `Allow` is a list of origins where popup-windows are allowed.
3890
3891 `Default` determines whether or not pop-up windows are allowed by default.
3892
3893 `Locked` prevents the user from changing pop-up preferences.
3894
3895 **Compatibility:** Firefox 60, Firefox ESR 60\
3896 **CCK2 Equivalent:** `permissions.popup`\
3897 **Preferences Affected:** `dom.disable_open_during_load`
3898
3899 #### Windows (GPO)
3900 ```
3901 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3902 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3903 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3904 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3905 ```
3906 #### Windows (Intune)
3907 OMA-URI:
3908 ```
3909 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3910 ```
3911 Value (string):
3912 ```
3913 <enabled/>
3914 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3915 ```
3916 OMA-URI:
3917 ```
3918 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3919 ```
3920 Value (string):
3921 ```
3922 <enabled/> or <disabled/>
3923 ```
3924 OMA-URI:
3925 ```
3926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3927 ```
3928 Value (string):
3929 ```
3930 <enabled/> or <disabled/>
3931 ```
3932 #### macOS
3933 ```
3934 <dict>
3935 <key>PopupBlocking</key>
3936 <dict>
3937 <key>Allow</key>
3938 <array>
3939 <string>http://example.org</string>
3940 <string>http://example.edu</string>
3941 </array>
3942 <key>Default</key>
3943 <true/> | <false/>
3944 <key>Locked</key>
3945 <true/> | <false/>
3946 </dict>
3947 </dict>
3948 ```
3949 #### policies.json
3950 ```
3951 {
3952 "policies": {
3953 "PopupBlocking": {
3954 "Allow": ["http://example.org/",
3955 "http://example.edu/"],
3956 "Default": true | false,
3957 "Locked": true | false
3958 }
3959 }
3960 }
3961 ```
3962 ### Preferences
3963 Set and lock preferences.
3964
3965 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
3966
3967 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
3968
3969 Preferences that start with the following prefixes are supported:
3970 ```
3971 accessibility.
3972 app.update.* (Firefox 86, Firefox 78.8)
3973 browser.
3974 datareporting.policy.
3975 dom.
3976 extensions.
3977 general.autoScroll (Firefox 83, Firefox ESR 78.5)
3978 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
3979 geo.
3980 intl.
3981 layout.
3982 media.
3983 network.
3984 pdfjs. (Firefox 84, Firefox ESR 78.6)
3985 places.
3986 print.
3987 signon. (Firefox 83, Firefox ESR 78.5)
3988 spellchecker. (Firefox 84, Firefox ESR 78.6)
3989 ui.
3990 widget.
3991 ```
3992 as well as the following security preferences:
3993 | Preference | Type | Default
3994 | --- | --- | ---
3995 | security.default_personal_cert | string | Ask Every Time
3996 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3997 | security.insecure_connection_text.enabled | bool | false
3998 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
3999 | security.insecure_connection_text.pbmode.enabled | bool | false
4000 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4001 | security.insecure_field_warning.contextual.enabled | bool | true
4002 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4003 | security.mixed_content.block_active_content | boolean | true
4004 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4005 | security.osclientcerts.autoload | boolean | false
4006 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4007 | security.ssl.errorReporting.enabled | boolean | true
4008 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4009 | security.tls.hello_downgrade_check | boolean | true
4010 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4011 | security.tls.version.enable-deprecated | boolean | false
4012 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8)
4013 | security.warn_submit_secure_to_insecure | boolean | true
4014 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting s form from https to http.
4015 &nbsp;
4016
4017 Using the preference as the key, set the `Value` to the corresponding preference value.
4018
4019 `Status` can be "default", "locked", "user" or "clear"
4020
4021 Default preferences can be modified by the user.
4022
4023 If a value is locked, it is also set as the default.
4024
4025 User preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy.
4026
4027 User preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4028
4029 See the examples below for more detail.
4030
4031 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4032
4033 Status
4034 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4035 **CCK2 Equivalent:** `preferences`\
4036 **Preferences Affected:** Many
4037
4038 #### Windows (GPO)
4039 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4040 ```
4041 {
4042 "accessibility.force_disabled": {
4043 "Value": 1,
4044 "Status": "default"
4045 },
4046 "browser.cache.disk.parent_directory": {
4047 "Value": "SOME_NATIVE_PATH",
4048 "Status": "user"
4049 },
4050 "browser.tabs.warnOnClose": {
4051 "Value": false,
4052 "Status": "locked"
4053 }
4054 }
4055 ```
4056 #### Windows (Intune)
4057 OMA-URI:
4058 ```
4059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4060 ```
4061 Value (string):
4062 ```
4063 <enabled/>
4064 <data id="JSON" value='
4065 {
4066 "accessibility.force_disabled": {
4067 "Value": 1,
4068 "Status": "default"
4069 },
4070 "browser.cache.disk.parent_directory": {
4071 "Value": "SOME_NATIVE_PATH",
4072 "Status": "user"
4073 },
4074 "browser.tabs.warnOnClose": {
4075 "Value": false,
4076 "Status": "locked"
4077 }
4078 }'/>
4079 ```
4080 #### macOS
4081 ```
4082 <dict>
4083 <key>Preferences</key>
4084 <dict>
4085 <key>accessibility.force_disabled</key>
4086 <dict>
4087 <key>Value</key>
4088 <integer>1</integer>
4089 <key>Status</key>
4090 <string>default</string>
4091 </dict>
4092 <key>browser.cache.disk.parent_directory</key>
4093 <dict>
4094 <key>Value</key>
4095 <string>SOME_NATIVE_PATH</string>
4096 <key>Status</key>
4097 <string>user</string>
4098 </dict>
4099 <key>browser.tabs.warnOnClose</key>
4100 <dict>
4101 <key>Value</key>
4102 <false/>
4103 <key>Status</key>
4104 <string>locked</string>
4105 </dict>
4106 </dict>
4107 </dict>
4108 ```
4109 #### policies.json
4110 ```
4111 {
4112 "policies": {
4113 "Preferences": {
4114 "accessibility.force_disabled": {
4115 "Value": 1,
4116 "Status": "default"
4117 },
4118 "browser.cache.disk.parent_directory": {
4119 "Value": "SOME_NATIVE_PATH",
4120 "Status": "user"
4121 },
4122 "browser.tabs.warnOnClose": {
4123 "Value": false,
4124 "Status": "locked"
4125 }
4126 }
4127 }
4128 }
4129 ```
4130 ### Preferences (Deprecated)
4131 Set and lock certain preferences.
4132
4133 **Compatibility:** See below\
4134 **CCK2 Equivalent:** `preferences`\
4135 **Preferences Affected:** See below
4136
4137 | Preference | Type | Compatibility | Default
4138 | --- | --- | --- | ---
4139 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4140 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4141 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4142 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4143 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4144 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4145 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4146 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4147 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4148 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4149 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4150 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4151 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4152 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4153 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4154 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4155 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4156 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4157 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4158 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4159 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4160 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4161 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4162 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4163 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4164 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4165 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4166 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4167 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4168 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4169 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4170 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4171 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4172 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4173 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4174 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4175 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4176 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4177 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4178 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4179 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4180 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4181 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4182 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4183 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4184 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4185 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4186 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4187 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4188 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4189 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4190 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4191 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4192 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4193 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4194 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4195 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4196 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4197 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4198 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4199 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4200 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4201 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4202 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4203 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4204 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4205 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4206 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4207 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4208 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4209 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4210 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4211 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4212 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4213 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4214 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4215 disabled
4216 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4217 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4218 disabled
4219 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4220 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4221 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4222 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4223 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4224 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4225 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4226 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4227 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4228 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4229 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4230 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4231 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4232 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4233 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4234 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4235 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4236 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4237 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4238 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4239 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4240 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4241 #### Windows (GPO)
4242 ```
4243 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4244 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4245 ```
4246 #### Windows (Intune)
4247 OMA-URI: (periods are replaced by underscores)
4248 ```
4249 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4250 ```
4251 Value (string):
4252 ```
4253 <enabled/> or <disabled/>
4254 ```
4255 OMA-URI: (periods are replaced by underscores)
4256 ```
4257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4258 ```
4259 Value (string):
4260 ```
4261 <enabled/>
4262 <data id="Preferences_String" value="string_value"/>
4263 ```
4264 #### macOS
4265 ```
4266 <dict>
4267 <key>Preferences</key>
4268 <dict>
4269 <key>boolean_preference_name</key>
4270 <true/> | <false/>
4271 <key>string_preference_name</key>
4272 <string>string_value</string>
4273 </dict>
4274 </dict>
4275 ```
4276 #### policies.json
4277 ```
4278 {
4279 "policies": {
4280 "Preferences": {
4281 "boolean_preference_name": true | false,
4282 "string_preference_name": "string_value"
4283 }
4284 }
4285 }
4286 ```
4287 ### PromptForDownloadLocation
4288 Ask where to save each file before downloading.
4289
4290 **Compatibility:** Firefox 68, Firefox ESR 68\
4291 **CCK2 Equivalent:** N/A\
4292 **Preferences Affected:** `browser.download.useDownloadDir`
4293
4294 #### Windows (GPO)
4295 ```
4296 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4297 ```
4298 #### Windows (Intune)
4299 OMA-URI:
4300 ```
4301 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4302 ```
4303 Value (string):
4304 ```
4305 <enabled/> or <disabled/>
4306 ```
4307 #### macOS
4308 ```
4309 <dict>
4310 <key>PromptForDownloadLocation</key>
4311 <true/> | <false/>
4312 </dict>
4313 ```
4314 #### policies.json
4315 ```
4316 {
4317 "policies": {
4318 "PromptForDownloadLocation": true | false
4319 }
4320 }
4321 ```
4322 ### Proxy
4323 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4324 To specify ports, append them to the hostnames with a colon (:).
4325
4326 `Mode` is the proxy method being used.
4327
4328 `Locked` is whether or not proxy settings can be changed.
4329
4330 `HTTPProxy` is the HTTP proxy server.
4331
4332 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4333
4334 `SSLProxy` is the SSL proxy server.
4335
4336 `FTPProxy` is the FTP proxy server.
4337
4338 `SOCKSProxy` is the SOCKS proxy server
4339
4340 `SOCKSVersion` is the SOCKS version (4 or 5)
4341
4342 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4343
4344 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4345
4346 `AutoLogin` means do not prompt for authentication if password is saved.
4347
4348 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4349
4350 **Compatibility:** Firefox 60, Firefox ESR 60\
4351 **CCK2 Equivalent:** `networkProxy*`\
4352 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
4353
4354 #### Windows (GPO)
4355 ```
4356 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4357 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4358 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4359 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4360 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4361 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4362 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4363 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4364 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4365 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4366 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4367 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4368 ```
4369 #### Windows (Intune)
4370 OMA-URI:
4371 ```
4372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4373 ```
4374 Value (string):
4375 ```
4376 <enabled/>
4377 <data id="ProxyLocked" value="true | false"/>
4378 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4379 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4380 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4381 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4382 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4383 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4384 <data id="SOCKSVersion" value="4 | 5"/>
4385 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4386 <data id="Passthrough" value="<local>"/>
4387 <data id="AutoLogin" value="true | false"/>
4388 <data id="UseProxyForDNS" value="true | false"/>
4389 ```
4390 #### macOS
4391 ```
4392 <dict>
4393 <key>Proxy</key>
4394 <dict>
4395 <key>Mode</key>
4396 <string>none | system | manual | autoDetect | autoConfig</string>
4397 <key>Locked</key>
4398 <true> | </false>
4399 <key>HTTPProxy</key>
4400 <string>https://httpproxy.example.com</string>
4401 <key>UseHTTPProxyForAllProtocols</key>
4402 <true> | </false>
4403 <key>SSLProxy</key>
4404 <string>https://sslproxy.example.com</string>
4405 <key>FTPProxy</key>
4406 <string>https://ftpproxy.example.com</string>
4407 <key>SOCKSProxy</key>
4408 <string>https://socksproxy.example.com</string>
4409 <key>SOCKSVersion</key>
4410 <string>4 | 5</string>
4411 <key>Passthrough</key>
4412 <string>&lt;local>&gt;</string>
4413 <key>AutoConfigURL</key>
4414 <string>URL_TO_AUTOCONFIG</string>
4415 <key>AutoLogin</key>
4416 <true> | </false>
4417 <key>UseProxyForDNS</key>
4418 <true> | </false>
4419 </dict>
4420 </dict>
4421 ```
4422 #### policies.json
4423 ```
4424 {
4425 "policies": {
4426 "Proxy": {
4427 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4428 "Locked": true | false,
4429 "HTTPProxy": "hostname",
4430 "UseHTTPProxyForAllProtocols": true | false,
4431 "SSLProxy": "hostname",
4432 "FTPProxy": "hostname",
4433 "SOCKSProxy": "hostname",
4434 "SOCKSVersion": 4 | 5
4435 "Passthrough": "<local>",
4436 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4437 "AutoLogin": true | false,
4438 "UseProxyForDNS": true | false
4439 }
4440 }
4441 }
4442 ```
4443 ### RequestedLocales
4444 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4445
4446 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4447
4448 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4449 **CCK2 Equivalent:** N/A\
4450 **Preferences Affected:** N/A
4451 #### Windows (GPO)
4452 ```
4453 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4454 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4455
4456 or
4457
4458 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4459 ```
4460 #### Windows (Intune)
4461 OMA-URI:
4462 ```
4463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4464 ```
4465 Value (string):
4466 ```
4467 <enabled/>
4468 <data id="Preferences_String" value="de,en-US"/>
4469 ```
4470 #### macOS
4471 ```
4472 <dict>
4473 <key>RequestedLocales</key>
4474 <array>
4475 <string>de</string>
4476 <string>en-US</string>
4477 </array>
4478 </dict>
4479
4480 or
4481
4482 <dict>
4483 <key>RequestedLocales</key>
4484 <string>de,en-US</string>
4485 </dict>
4486
4487 ```
4488 #### policies.json
4489 ```
4490 {
4491 "policies": {
4492 "RequestedLocales": ["de", "en-US"]
4493 }
4494 }
4495
4496 or
4497
4498 {
4499 "policies": {
4500 "RequestedLocales": "de,en-US"
4501 }
4502 }
4503 ```
4504 <a name="SanitizeOnShutdown"></a>
4505
4506 ### SanitizeOnShutdown (Selective)
4507 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4508
4509 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4510
4511 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4512 **CCK2 Equivalent:** N/A\
4513 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4514 #### Windows (GPO)
4515 ```
4516 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4517 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4518 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4519 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4520 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4521 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4522 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4523 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4524 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4525 ```
4526 #### Windows (Intune)
4527 OMA-URI:
4528 ```
4529 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4530 ```
4531 Value (string):
4532 ```
4533 <enabled/> or <disabled/>
4534 ```
4535 OMA-URI:
4536 ```
4537 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4538 ```
4539 Value (string):
4540 ```
4541 <enabled/> or <disabled/>
4542 ```
4543 OMA-URI:
4544 ```
4545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4546 ```
4547 Value (string):
4548 ```
4549 <enabled/> or <disabled/>
4550 ```
4551 OMA-URI:
4552 ```
4553 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4554 ```
4555 Value (string):
4556 ```
4557 <enabled/> or <disabled/>
4558 ```
4559 OMA-URI:
4560 ```
4561 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4562 ```
4563 Value (string):
4564 ```
4565 <enabled/> or <disabled/>
4566 ```
4567 OMA-URI:
4568 ```
4569 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4570 ```
4571 Value (string):
4572 ```
4573 <enabled/> or <disabled/>
4574 ```
4575 OMA-URI:
4576 ```
4577 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4578 ```
4579 Value (string):
4580 ```
4581 <enabled/> or <disabled/>
4582 ```
4583 OMA-URI:
4584 ```
4585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4586 ```
4587 Value (string):
4588 ```
4589 <enabled/> or <disabled/>
4590 ```
4591 OMA-URI:
4592 ```
4593 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4594 ```
4595 Value (string):
4596 ```
4597 <enabled/> or <disabled/>
4598 ```
4599 #### macOS
4600 ```
4601 <dict>
4602 <key>SanitizeOnShutdown</key>
4603 <dict>
4604 <key>Cache</key>
4605 <true/> | <false/>
4606 <key>Cookies</key>
4607 <true/> | <false/>
4608 <key>Downloads</key>
4609 <true/> | <false/>
4610 <key>FormData</key>
4611 <true/> | <false/>
4612 <key>History</key>
4613 <true/> | <false/>
4614 <key>Sessions</key>
4615 <true/> | <false/>
4616 <key>SiteSettings</key>
4617 <true/> | <false/>
4618 <key>OfflineApps</key>
4619 <true/> | <false/>
4620 <key>Locked</key>
4621 <true/> | <false/>
4622 </dict>
4623 </dict>
4624 ```
4625 #### policies.json
4626 ```
4627 {
4628 "policies": {
4629 "SanitizeOnShutdown": {
4630 "Cache": true | false,
4631 "Cookies": true | false,
4632 "Downloads": true | false,
4633 "FormData": true | false,
4634 "History": true | false,
4635 "Sessions": true | false,
4636 "SiteSettings": true | false,
4637 "OfflineApps": true | false,
4638 "Locked": true | false
4639 }
4640 }
4641 }
4642 ```
4643 ### SanitizeOnShutdown (All)
4644 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4645
4646 **Compatibility:** Firefox 60, Firefox ESR 60\
4647 **CCK2 Equivalent:** N/A\
4648 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4649 #### Windows (GPO)
4650 ```
4651 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4652 ```
4653 #### Windows (Intune)
4654 OMA-URI:
4655 ```
4656 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4657 ```
4658 Value (string):
4659 ```
4660 <enabled/> or <disabled/>
4661 ```
4662 #### macOS
4663 ```
4664 <dict>
4665 <key>SanitizeOnShutdown</key>
4666 <true/> | <false/>
4667 </dict>
4668 ```
4669 #### policies.json
4670 ```
4671 {
4672 "policies": {
4673 "SanitizeOnShutdown": true | false
4674 }
4675 }
4676 ```
4677 ### SearchBar
4678 Set whether or not search bar is displayed.
4679
4680 **Compatibility:** Firefox 60, Firefox ESR 60\
4681 **CCK2 Equivalent:** `showSearchBar`\
4682 **Preferences Affected:** N/A
4683
4684 #### Windows (GPO)
4685 ```
4686 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4687 ```
4688
4689 #### Windows (Intune)
4690 OMA-URI:
4691 ```
4692 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4693 ```
4694 Value (string):
4695 ```
4696 <enabled/>
4697 <data id="Permissions" value="unified | separate"/>
4698 ```
4699 #### macOS
4700 ```
4701 <dict>
4702 <key>SearchBar</key>
4703 <string>unified | separate</string>
4704 </dict>
4705 ```
4706 #### policies.json
4707 ```
4708 {
4709 "policies": {
4710 "SearchBar": "unified" | "separate"
4711 }
4712 }
4713 ```
4714 <a name="SearchEngines"></a>
4715
4716 ### SearchEngines (This policy is only available on the ESR.)
4717
4718 ### SearchEngines | Default
4719
4720 Set the default search engine. This policy is only available on the ESR.
4721
4722 **Compatibility:** Firefox ESR 60\
4723 **CCK2 Equivalent:** `defaultSearchEngine`\
4724 **Preferences Affected:** N/A
4725
4726 #### Windows (GPO)
4727 ```
4728 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4729 ```
4730 #### Windows (Intune)
4731 OMA-URI:
4732 ```
4733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4734 ```
4735 Value (string):
4736 ```
4737 <enabled/>
4738 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4739 ```
4740 #### macOS
4741 ```
4742 <dict>
4743 <key>SearchEngines</key>
4744 <dict>
4745 <key>Default</key>
4746 <string>NAME_OF_SEARCH_ENGINE</string>
4747 </dict>
4748 </dict>
4749 ```
4750 #### policies.json
4751 ```
4752 {
4753 "policies": {
4754 "SearchEngines": {
4755 "Default": "NAME_OF_SEARCH_ENGINE"
4756 }
4757 }
4758 }
4759 ```
4760 ### SearchEngines | PreventInstalls
4761
4762 Prevent installing search engines from webpages.
4763
4764 **Compatibility:** Firefox ESR 60\
4765 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4766 **Preferences Affected:** N/A
4767
4768 #### Windows (GPO)
4769 ```
4770 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4771 ```
4772 #### Windows (Intune)
4773 OMA-URI:
4774 ```
4775 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4776 ```
4777 Value (string):
4778 ```
4779 <enabled/> or <disabled/>
4780 ```
4781 #### macOS
4782 ```
4783 <dict>
4784 <key>SearchEngines</key>
4785 <dict>
4786 <key>PreventInstalls</key>
4787 <true/> | <false/>
4788 </dict>
4789 </dict>
4790 ```
4791 #### policies.json
4792 ```
4793 {
4794 "policies": {
4795 "SearchEngines": {
4796 "PreventInstalls": true | false
4797 }
4798 }
4799 }
4800 ```
4801 ### SearchEngines | Remove
4802
4803 Hide built-in search engines. This policy is only available on the ESR.
4804
4805 **Compatibility:** Firefox ESR 60.2\
4806 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4807 **Preferences Affected:** N/A
4808
4809 #### Windows (GPO)
4810 ```
4811 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4812 ```
4813 #### Windows (Intune)
4814 OMA-URI:
4815 ```
4816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4817 ```
4818 Value (string):
4819 ```
4820 <enabled/>
4821 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4822 ```
4823 #### macOS
4824 ```
4825 <dict>
4826 <key>SearchEngines</key>
4827 <dict>
4828 <key>Remove</key>
4829 <array>
4830 <string>NAME_OF_SEARCH_ENGINE</string>
4831 </array>
4832 </dict>
4833 </dict>
4834 ```
4835 #### policies.json
4836 ```
4837 {
4838 "policies": {
4839 "SearchEngines": {
4840 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4841 }
4842 }
4843 }
4844 ```
4845 ### SearchEngines | Add
4846
4847 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4848
4849 `Name` is the name of the search engine.
4850
4851 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4852
4853 `Method` is either GET or POST
4854
4855 `IconURL` is a URL for the icon to use.
4856
4857 `Alias` is a keyword to use for the engine.
4858
4859 `Description` is a description of the search engine.
4860
4861 `PostData` is the POST data as name value pairs separated by &.
4862
4863 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4864
4865 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4866 **CCK2 Equivalent:** `searchplugins`\
4867 **Preferences Affected:** N/A
4868
4869 #### Windows (GPO)
4870 ```
4871 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4872 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4873 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4874 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4875 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4876 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4877 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4878 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4879 ```
4880 #### Windows (Intune)
4881 OMA-URI:
4882 ```
4883 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4884 ```
4885 Value (string):
4886 ```
4887 <enabled/>
4888 <data id="SearchEngine_Name" value="Example1"/>
4889 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4890 <data id="SearchEngine_Method" value="GET | POST"/>
4891 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4892 <data id="SearchEngine_Alias" value="example"/>
4893 <data id="SearchEngine_Description" value="Example Description"/>
4894 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4895 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4896 ```
4897 #### macOS
4898 ```
4899 <dict>
4900 <key>SearchEngines</key>
4901 <dict>
4902 <key>Add</key>
4903 <array>
4904 <dict>
4905 <key>Name</key>
4906 <string>Example1</string>
4907 <key>URLTemplate</key>
4908 <string>https://www.example.org/q={searchTerms}</string>
4909 <key>Method</key>
4910 <string>GET | POST </string>
4911 <key>IconURL</key>
4912 <string>https://www.example.org/favicon.ico</string>
4913 <key>Alias</key>
4914 <string>example</string>
4915 <key>Description</key>
4916 <string>Example Description</string>
4917 <key>SuggestURLTemplate</key>
4918 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4919 <key>PostData</key>
4920 <string>name=value&q={searchTerms}</string>
4921 </dict>
4922 <array>
4923 </dict>
4924 </dict>
4925 ```
4926 #### policies.json
4927 ```
4928 {
4929 "policies": {
4930 "SearchEngines": {
4931 "Add": [
4932 {
4933 "Name": "Example1",
4934 "URLTemplate": "https://www.example.org/q={searchTerms}",
4935 "Method": "GET" | "POST",
4936 "IconURL": "https://www.example.org/favicon.ico",
4937 "Alias": "example",
4938 "Description": "Description",
4939 "PostData": "name=value&q={searchTerms}",
4940 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4941 }
4942 ]
4943 }
4944 }
4945 }
4946 ```
4947 ### SearchSuggestEnabled
4948
4949 Enable search suggestions.
4950
4951 **Compatibility:** Firefox 68, Firefox ESR 68\
4952 **CCK2 Equivalent:** N/A\
4953 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4954
4955 #### Windows (GPO)
4956 ```
4957 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4958 ```
4959 #### Windows (Intune)
4960 OMA-URI:
4961 ```
4962 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
4963 ```
4964 Value (string):
4965 ```
4966 <enabled/> or <disabled/>
4967 ```
4968 #### macOS
4969 ```
4970 <dict>
4971 <key>SearchSuggestEnabled</key>
4972 <true/> | <false/>
4973 </dict>
4974 ```
4975 #### policies.json
4976 ```
4977 {
4978 "policies": {
4979 "SearchSuggestEnabled": true | false
4980 }
4981 }
4982 ```
4983 ### SecurityDevices
4984
4985 Install PKCS #11 modules.
4986
4987 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4988 **CCK2 Equivalent:** `certs.devices`\
4989 **Preferences Affected:** N/A
4990
4991 #### Windows (GPO)
4992 ```
4993 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4994 ```
4995 #### Windows (Intune)
4996 OMA-URI:
4997 ```
4998 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4999 ```
5000 Value (string):
5001 ```
5002 <enabled/>
5003 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5004 ```
5005 #### macOS
5006 ```
5007 <dict>
5008 <key>SecurityDevices</key>
5009 <dict>
5010 <key>NAME_OF_DEVICE</key>
5011 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5012 </dict>
5013 </dict>
5014 ```
5015
5016 #### policies.json
5017 ```
5018 {
5019 "policies": {
5020 "SecurityDevices": {
5021 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5022 }
5023 }
5024 }
5025 ```
5026 ### SSLVersionMax
5027
5028 Set and lock the maximum version of TLS.
5029
5030 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5031 **CCK2 Equivalent:** N/A\
5032 **Preferences Affected:** `security.tls.version.max`
5033
5034 #### Windows (GPO)
5035 ```
5036 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5037 ```
5038 #### Windows (Intune)
5039 OMA-URI:
5040 ```
5041 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5042 ```
5043 Value (string):
5044 ```
5045 <enabled/>
5046 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5047 ```
5048 #### macOS
5049 ```
5050 <dict>
5051 <key>SSLVersionMax</key>
5052 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5053 </dict>
5054 ```
5055
5056 #### policies.json
5057 ```
5058 {
5059 "policies": {
5060 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5061 }
5062 }
5063 ```
5064 ### SSLVersionMin
5065
5066 Set and lock the minimum version of TLS.
5067
5068 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5069 **CCK2 Equivalent:** N/A\
5070 **Preferences Affected:** `security.tls.version.min`
5071
5072 #### Windows (GPO)
5073 ```
5074 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5075 ```
5076 #### Windows (Intune)
5077 OMA-URI:
5078 ```
5079 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5080 ```
5081 Value (string):
5082 ```
5083 <enabled/>
5084 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5085 ```
5086 #### macOS
5087 ```
5088 <dict>
5089 <key>SSLVersionMin</key>
5090 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5091 </dict>
5092 ```
5093
5094 #### policies.json
5095 ```
5096 {
5097 "policies": {
5098 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5099 }
5100 }
5101 ```
5102 ### SupportMenu
5103 Add a menuitem to the help menu for specifying support information.
5104
5105 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5106 **CCK2 Equivalent:** helpMenu\
5107 **Preferences Affected:** N/A
5108
5109 #### Windows (GPO)
5110 ```
5111 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5112 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5113 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5114 ```
5115 #### Windows (Intune)
5116 OMA-URI:
5117 ```
5118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5119 ```
5120 Value (string):
5121 ```
5122 <enabled/>
5123 <data id="SupportMenuTitle" value="Support Menu"/>
5124 <data id="SupportMenuURL" value="http://example.com/support"/>
5125 <data id="SupportMenuAccessKey" value="S">
5126 ```
5127 #### macOS
5128 ```
5129 <dict>
5130 <key>SupportMenu</key>
5131 <dict>
5132 <key>Title</key>
5133 <string>SupportMenu</string>
5134 <key>URL</key>
5135 <string>http://example.com/support</string>
5136 <key>AccessKey</key>
5137 <string>S</string>
5138 </dict>
5139 </dict>
5140 ```
5141 #### policies.json
5142 ```
5143 {
5144 "policies": {
5145 "SupportMenu": {
5146 "Title": "Support Menu",
5147 "URL": "http://example.com/support",
5148 "AccessKey": "S"
5149 }
5150 }
5151 }
5152 ```
5153 ### UserMessaging
5154
5155 Prevent Firefox from messaging the user in certain situations.
5156
5157 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
5158
5159 `ExtensionRecommendations` Don't recommend extensions while the user is visiting web pages.
5160
5161 `FeatureRecommendations` Don't recommend browser features.
5162
5163 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
5164
5165 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5166 **CCK2 Equivalent:** N/A\
5167 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
5168
5169 #### Windows (GPO)
5170 ```
5171 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5172 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5173 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5174 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5175 ```
5176 #### Windows (Intune)
5177 OMA-URI:
5178 ```
5179 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
5180 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
5181 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
5182 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
5183 ```
5184 Value (string):
5185 ```
5186 <enabled/> or <disabled/>
5187 ```
5188 #### macOS
5189 ```
5190 <dict>
5191 <key>UserMessaging</key>
5192 <dict>
5193 <key>WhatsNew</key>
5194 <true/> | <false/>
5195 <key>ExtensionRecommendations</key>
5196 <true/> | <false/>
5197 <key>FeatureRecommendations</key>
5198 <true/> | <false/>
5199 <key>UrlbarInterventions</key>
5200 <true/> | <false/>
5201 </dict>
5202 </dict>
5203 ```
5204 #### policies.json
5205 ```
5206 {
5207 "policies": {
5208 "UserMessaging": {
5209 "WhatsNew": true | false,
5210 "ExtensionRecommendations": true | false,
5211 "FeatureRecommendations": true | false,
5212 "UrlbarInterventions": true | false
5213 }
5214 }
5215 }
5216 ```
5217 ### WebsiteFilter
5218 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5219 The arrays are limited to 1000 entries each.
5220
5221 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5222
5223 **Compatibility:** Firefox 60, Firefox ESR 60\
5224 **CCK2 Equivalent:** N/A\
5225 **Preferences Affected:** N/A
5226
5227 #### Windows (GPO)
5228 ```
5229 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5230 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5231 ```
5232 #### Windows (Intune)
5233 OMA-URI:
5234 ```
5235 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5236 ```
5237 Value (string):
5238 ```
5239 <enabled/>
5240 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
5241 ```
5242 OMA-URI:
5243 ```
5244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5245 ```
5246 Value (string):
5247 ```
5248 <enabled/>
5249 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5250 ```
5251 #### macOS
5252 ```
5253 <dict>
5254 <key>WebsiteFilter</key>
5255 <dict>
5256 <key>Block</key>
5257 <array>
5258 <string><all_urls></string>
5259 </array>
5260 <key>Exceptions</key>
5261 <array>
5262 <string>http://example.org/*</string>
5263 </array>
5264 </dict>
5265
5266 </dict>
5267 ```
5268 #### policies.json
5269 ```
5270 {
5271 "policies": {
5272 "WebsiteFilter": {
5273 "Block": ["<all_urls>"],
5274 "Exceptions": ["http://example.org/*"]
5275 }
5276 }
5277 }
5278 ```

patrick-canterino.de