]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #567 from mozilla/UserMessaging
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
35 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
36 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
37 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
38 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
39 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
40 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
41 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
42 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
43 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
44 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
45 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
46 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
47 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
48 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
49 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
50 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
51 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
52 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
53 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
54 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
55 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
56 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
57 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
58 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
59 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
60 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
61 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
62 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
63 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
64 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
65 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
66 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
67 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
68 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
69 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
70 | **[`Preferences`](#preferences)** | Set and lock some preferences.
71 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
72 | **[`Proxy`](#proxy)** | Configure proxy settings.
73 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
74 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
75 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
76 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
77 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
78 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
79 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
80 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
81 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
82 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
83 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
84 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
85 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
86 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
87 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
88 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
89
90 ### AppUpdateURL
91
92 Change the URL for application update.
93
94 **Compatibility:** Firefox 62, Firefox ESR 60.2\
95 **CCK2 Equivalent:** N/A\
96 **Preferences Affected:** `app.update.url`
97
98 #### Windows (GPO)
99 ```
100 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
101 ```
102 #### macOS
103 ```
104 <dict>
105 <key>AppUpdateURL</key>
106 <string>https://yoursite.com</string>
107 </dict>
108 ```
109 #### policies.json
110 ```
111 {
112 "policies": {
113 "AppUpdateURL": "https://yoursite.com"
114 }
115 }
116 ```
117 ### Authentication
118
119 Configure sites that support integrated authentication.
120
121 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
122
123 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
124 **CCK2 Equivalent:** N/A\
125 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
126
127 #### Windows (GPO)
128 ```
129 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
133 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
134 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
135 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
136 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
137 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
138 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
139 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
140 ```
141 #### macOS
142 ```
143 <dict>
144 <key>Authentication</key>
145 <dict>
146 <key>SPNEGO</key>
147 <array>
148 <string>mydomain.com</string>
149 <string>https://myotherdomain.com</string>
150 </array>
151 <key>Delegated</key>
152 <array>
153 <string>mydomain.com</string>
154 <string>https://myotherdomain.com</string>
155 </array>
156 <key>NTLM</key>
157 <array>
158 <string>mydomain.com</string>
159 <string>https://myotherdomain.com</string>
160 </array>
161 <key>AllowNonFQDN</key>
162 <dict>
163 <key>SPNEGO</key>
164 <true/> | <false/>
165 <key>NTLM</key>
166 <true/> | <false/>
167 </dict>
168 <key>AllowProxies</key>
169 <dict>
170 <key>SPNEGO</key>
171 <true/> | <false/>
172 <key>NTLM</key>
173 <true/> | <false/>
174 </dict>
175 <key>Locked</key>
176 <true/> | <false/>
177 </dict>
178 </dict>
179 ```
180 #### policies.json
181 ```
182 {
183 "policies": {
184 "Authentication": {
185 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
186 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
187 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
188 "AllowNonFQDN": {
189 "SPNEGO": true | false,
190 "NTLM": true | false
191 },
192 "AllowProxies": {
193 "SPNEGO": true | false,
194 "NTLM": true | false
195 },
196 "Locked": true | false
197 }
198 }
199 }
200 ```
201 ### BlockAboutAddons
202
203 Block access to the Add-ons Manager (about:addons).
204
205 **Compatibility:** Firefox 60, Firefox ESR 60\
206 **CCK2 Equivalent:** `disableAddonsManager`\
207 **Preferences Affected:** N/A
208
209 #### Windows (GPO)
210 ```
211 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
212 ```
213 #### macOS
214 ```
215 <dict>
216 <key>BlockAboutAddons</key>
217 <true/> | <false/>
218 </dict>
219 ```
220 #### policies.json
221 ```
222 {
223 "policies": {
224 "BlockAboutAddons": true | false
225 }
226 }
227 ```
228 ### BlockAboutConfig
229
230 Block access to about:config.
231
232 **Compatibility:** Firefox 60, Firefox ESR 60\
233 **CCK2 Equivalent:** `disableAboutConfig`\
234 **Preferences Affected:** N/A
235
236 #### Windows (GPO)
237 ```
238 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
239 ```
240 #### macOS
241 ```
242 <dict>
243 <key>BlockAboutConfig</key>
244 <true/> | <false/>
245 </dict>
246 ```
247 #### policies.json
248 ```
249 {
250 "policies": {
251 "BlockAboutConfig": true | false
252 }
253 }
254 ```
255 ### BlockAboutProfiles
256
257 Block access to About Profiles (about:profiles).
258
259 **Compatibility:** Firefox 60, Firefox ESR 60\
260 **CCK2 Equivalent:** `disableAboutProfiles`\
261 **Preferences Affected:** N/A
262
263 #### Windows (GPO)
264 ```
265 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
266 ```
267 #### macOS
268 ```
269 <dict>
270 <key>BlockAboutProfiles</key>
271 <true/> | <false/>
272 </dict>
273 ```
274 #### policies.json
275 ```
276 {
277 "policies": {
278 "BlockAboutProfiles": true | false
279 }
280 }
281 ```
282 ### BlockAboutSupport
283
284 Block access to Troubleshooting Information (about:support).
285
286 **Compatibility:** Firefox 60, Firefox ESR 60\
287 **CCK2 Equivalent:** `disableAboutSupport`\
288 **Preferences Affected:** N/A
289
290 #### Windows (GPO)
291 ```
292 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
293 ```
294 #### macOS
295 ```
296 <dict>
297 <key>BlockAboutSupport</key>
298 <true/> | <false/>
299 </dict>
300 ```
301 #### policies.json
302 ```
303 {
304 "policies": {
305 "BlockAboutSupport": true | false
306 }
307 }
308 ```
309 ### Bookmarks
310
311 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
312
313 **Compatibility:** Firefox 60, Firefox ESR 60\
314 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
315 **Preferences Affected:** N/A
316
317 #### Windows (GPO)
318 ```
319 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
320 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
321 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
322 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
323 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
324 ```
325 #### macOS
326 ```
327 <dict>
328 <key>Bookmarks</key>
329 <array>
330 <dict>
331 <key>Title</key>
332 <string>Example</string>
333 <key>URL</key>
334 <string>https://example.com</string>
335 <key>Favicon</key>
336 <string>https://example.com/favicon.ico</string>
337 <key>Placement</key>
338 <string>toolbar | menu</string>
339 <key>Folder</key>
340 <string>FolderName</string>
341 </dict>
342 </array>
343 </dict>
344 ```
345 #### policies.json
346 ```
347 {
348 "policies": {
349 "Bookmarks": [
350 {
351 "Title": "Example",
352 "URL": "https://example.com",
353 "Favicon": "https://example.com/favicon.ico",
354 "Placement": "toolbar" | "menu",
355 "Folder": "FolderName"
356 }
357 ]
358 }
359 }
360 ```
361 ### CaptivePortal
362 Enable or disable the detection of captive portals.
363
364 **Compatibility:** Firefox 67, Firefox ESR 60.7\
365 **CCK2 Equivalent:** N/A\
366 **Preferences Affected:** `network.captive-portal-service.enabled`
367
368 #### Windows (GPO)
369 ```
370 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
371 ```
372 #### macOS
373 ```
374 <dict>
375 <key>CaptivePortal</key>
376 <true/> | <false/>
377 </dict>
378 ```
379 #### policies.json
380 ```
381 {
382 "policies": {
383 "CaptivePortal": true | false
384 }
385 }
386 ```
387 ### Certificates
388
389 ### Certificates | ImportEnterpriseRoots
390
391 Trust certificates that have been added to the operating system certificate store by a user or administrator.
392
393 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
394
395 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
396 **CCK2 Equivalent:** N/A\
397 **Preferences Affected:** `security.enterprise_roots.enabled`
398
399 #### Windows (GPO)
400 ```
401 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
402 ```
403 #### macOS
404 ```
405 <dict>
406 <key>Certificates</key>
407 <dict>
408 <key>ImportEnterpriseRoots</key>
409 <true/> | <false/>
410 </dict>
411 </dict>
412 ```
413 #### policies.json
414 ```
415 {
416 "policies": {
417 "Certificates": {
418 "ImportEnterpriseRoots": true | false
419 }
420 }
421 }
422 ```
423 ### Certificates | Install
424
425 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
426
427 - Windows
428 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
429 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
430 - macOS
431 - /Library/Application Support/Mozilla/Certificates
432 - ~/Library/Application Support/Mozilla/Certificates
433 - Linux
434 - /usr/lib/mozilla/certificates
435 - /usr/lib64/mozilla/certificates
436 - ~/.mozilla/certificates
437
438 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
439
440 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
441
442 Certificates are installed using the trust string `CT,CT,`.
443
444 Binary (DER) and ASCII (PEM) certificates are both supported.
445
446 **Compatibility:** Firefox 64, Firefox ESR 64\
447 **CCK2 Equivalent:** `certs.ca`\
448 **Preferences Affected:** N/A
449
450 #### Windows (GPO)
451 ```
452 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
453 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
454 ```
455 #### macOS
456 ```
457 <dict>
458 <key>Certificates</key>
459 <dict>
460 <key>Install</key>
461 <array>
462 <string>cert1.der</string>
463 <string>/Users/username/cert2.pem</string>
464 </array>
465 </dict>
466 </dict>
467 ```
468 #### policies.json
469 ```
470 {
471 "policies": {
472 "Certificates": {
473 "Install": ["cert1.der", "/home/username/cert2.pem"]
474 }
475 }
476 }
477 ```
478 ### Cookies
479 Configure cookie preferences.
480
481 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
482
483 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
484
485 `Default` determines whether cookies are accepted at all.
486
487 `AcceptThirdParty` determines how third-party cookies are handled.
488
489 `ExpireAtSessionEnd` determines when cookies expire.
490
491 `RejectTracker` only rejects cookies for trackers.
492
493 `Locked` prevents the user from changing cookie preferences.
494
495 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
496 **CCK2 Equivalent:** N/A\
497 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
498
499 #### Windows (GPO)
500 ```
501 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
502 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
503 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
504 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
505 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
506 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
507 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
508 ```
509 #### macOS
510 ```
511 <dict>
512 <key>Cookies</key>
513 <dict>
514 <key>Allow</key>
515 <array>
516 <string>http://example.com</string>
517 </array>
518 <key>Block</key>
519 <array>
520 <string>http://example.org</string>
521 </array>
522 <key>Default</key>
523 <true/> | <false/>
524 <key>AcceptThirdParty</key>
525 <string>always | never | from-visited</string>
526 <key>ExpireAtSessionEnd</key>
527 <true/> | <false/>
528 <key>RejectTracker</key>
529 <true/> | <false/>
530 <key>Locked</key>
531 <true/> | <false/>
532 </dict>
533 </dict>
534 ```
535 #### policies.json
536 ```
537 {
538 "policies": {
539 "Cookies": {
540 "Allow": ["http://example.org/"],
541 "Block": ["http://example.edu/"],
542 "Default": true | false,
543 "AcceptThirdParty": "always" | "never" | "from-visited",
544 "ExpireAtSessionEnd": true | false,
545 "RejectTracker": true | false,
546 "Locked": true | false
547 }
548 }
549 }
550 ```
551 ### DisableSetDesktopBackground
552 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
553
554 **Compatibility:** Firefox 60, Firefox ESR 60\
555 **CCK2 Equivalent:** `removeSetDesktopBackground`\
556 **Preferences Affected:** N/A
557
558 #### Windows (GPO)
559 ```
560 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
561 ```
562
563 #### macOS
564 ```
565 <dict>
566 <key>DisableSetDesktopBackground</key>
567 <true/> | <false/>
568 </dict>
569 ```
570 #### policies.json
571 ```
572 {
573 "policies": {
574 "DisableSetDesktopBackground": true | false
575 }
576 }
577 ```
578 ### DisableMasterPasswordCreation
579 Remove the master password functionality.
580
581 **Compatibility:** Firefox 60, Firefox ESR 60\
582 **CCK2 Equivalent:** `noMasterPassword`\
583 **Preferences Affected:** N/A
584
585 #### Windows (GPO)
586 ```
587 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
588 ```
589
590 #### macOS
591 ```
592 <dict>
593 <key>DisableMasterPasswordCreation</key>
594 <true/> | <false/>
595 </dict>
596 ```
597 #### policies.json
598 ```
599 {
600 "policies": {
601 "DisableMasterPasswordCreation": true | false
602 }
603 }
604 ```
605 ### DisableAppUpdate
606 Turn off application updates.
607
608 **Compatibility:** Firefox 60, Firefox ESR 60\
609 **CCK2 Equivalent:** `disableFirefoxUpdates`\
610 **Preferences Affected:** N/A
611
612 #### Windows (GPO)
613 ```
614 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
615 ```
616 #### macOS
617 ```
618 <dict>
619 <key>DisableAppUpdate</key>
620 <true/> | <false/>
621 </dict>
622 ```
623 #### policies.json
624 ```
625 {
626 "policies": {
627 "DisableAppUpdate": true | false
628 }
629 }
630 ```
631 ### DisableBuiltinPDFViewer
632 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
633
634 **Compatibility:** Firefox 60, Firefox ESR 60\
635 **CCK2 Equivalent:** `disablePDFjs`\
636 **Preferences Affected:** `pdfjs.disabled`
637
638 #### Windows (GPO)
639 ```
640 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
641 ```
642
643 #### macOS
644 ```
645 <dict>
646 <key>DisableBuiltinPDFViewer</key>
647 <true/> | <false/>
648 </dict>
649 ```
650 #### policies.json
651 ```
652 {
653 "policies": {
654 "DisableBuiltinPDFViewer": true | false
655 }
656 }
657 ```
658 ### DisableDeveloperTools
659 Remove access to all developer tools.
660
661 **Compatibility:** Firefox 60, Firefox ESR 60\
662 **CCK2 Equivalent:** `removeDeveloperTools`\
663 **Preferences Affected:** `devtools.policy.disabled`
664
665 #### Windows (GPO)
666 ```
667 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
668 ```
669
670 #### macOS
671 ```
672 <dict>
673 <key>DisableDeveloperTools</key>
674 <true/> | <false/>
675 </dict>
676 ```
677 #### policies.json
678 ```
679 {
680 "policies": {
681 "DisableDeveloperTools": true | false
682 }
683 }
684 ```
685 ### DisableFeedbackCommands
686 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
687
688 **Compatibility:** Firefox 60, Firefox ESR 60\
689 **CCK2 Equivalent:** N/A\
690 **Preferences Affected:** N/A
691
692 #### Windows (GPO)
693 ```
694 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
695 ```
696 #### macOS
697 ```
698 <dict>
699 <key>DisableFeedbackCommands</key>
700 <true/> | <false/>
701 </dict>
702 ```
703 #### policies.json
704 ```
705 {
706 "policies": {
707 "DisableFeedbackCommands": true | false
708 }
709 }
710 ```
711 ### DisableFirefoxScreenshots
712 Remove access to Firefox Screenshots.
713
714 **Compatibility:** Firefox 60, Firefox ESR 60\
715 **CCK2 Equivalent:** N/A\
716 **Preferences Affected:** `extensions.screenshots.disabled`
717
718 #### Windows (GPO)
719 ```
720 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
721 ```
722 #### macOS
723 ```
724 <dict>
725 <key>DisableFirefoxScreenshots</key>
726 <true/> | <false/>
727 </dict>
728 ```
729 #### policies.json
730 ```
731 {
732 "policies": {
733 "DisableFirefoxScreenshots": true | false
734 }
735 }
736 ```
737 ### DisableFirefoxAccounts
738 Disable Firefox Accounts integration (Sync).
739
740 **Compatibility:** Firefox 60, Firefox ESR 60\
741 **CCK2 Equivalent:** `disableSync`\
742 **Preferences Affected:** `identity.fxaccounts.enabled`
743
744 #### Windows (GPO)
745 ```
746 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
747 ```
748 #### macOS
749 ```
750 <dict>
751 <key>DisableFirefoxAccounts</key>
752 <true/> | <false/>
753 </dict>
754 ```
755 #### policies.json
756 ```
757 {
758 "policies": {
759 "DisableFirefoxAccounts": true | false
760 }
761 }
762 ```
763 ### DisableFirefoxStudies
764 Disable Firefox studies (Shield).
765
766 **Compatibility:** Firefox 60, Firefox ESR 60\
767 **CCK2 Equivalent:** N/A\
768 **Preferences Affected:** N/A
769
770 #### Windows (GPO)
771 ```
772 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
773 ```
774 #### macOS
775 ```
776 <dict>
777 <key>DisableFirefoxStudies</key>
778 <true/> | <false/>
779 </dict>
780 ```
781 #### policies.json
782 ```
783 {
784 "policies": {
785 "DisableFirefoxStudies": true | false
786 }
787 }
788 ```
789 ### DisableForgetButton
790 Disable the "Forget" button.
791
792 **Compatibility:** Firefox 60, Firefox ESR 60\
793 **CCK2 Equivalent:** `disableForget`\
794 **Preferences Affected:** N/A
795
796 #### Windows (GPO)
797 ```
798 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
799 ```
800 #### macOS
801 ```
802 <dict>
803 <key>DisableForgetButton</key>
804 <true/> | <false/>
805 </dict>
806 ```
807 #### policies.json
808 ```
809 {
810 "policies": {
811 "DisableForgetButton": true | false
812 }
813 }
814 ```
815 ### DisableFormHistory
816 Turn off saving information on web forms and the search bar.
817
818 **Compatibility:** Firefox 60, Firefox ESR 60\
819 **CCK2 Equivalent:** `disableFormFill`\
820 **Preferences Affected:** ` browser.formfill.enable`
821
822 #### Windows (GPO)
823 ```
824 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
825 ```
826 #### macOS
827 ```
828 <dict>
829 <key>DisableFormHistory</key>
830 <true/> | <false/>
831 </dict>
832 ```
833 #### policies.json
834 ```
835 {
836 "policies": {
837 "DisableFormHistory": true | false
838 }
839 }
840 ```
841 ### DisablePasswordReveal
842 Do not allow passwords to be shown in saved logins
843
844 **Compatibility:** Firefox 71, Firefox ESR 68.3\
845 **CCK2 Equivalent:** N/A
846 **Preferences Affected:** N/A
847
848 #### Windows (GPO)
849 ```
850 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
851 ```
852
853 #### macOS
854 ```
855 <dict>
856 <key>DisablePasswordReveal</key>
857 <true/> | <false/>
858 </dict>
859 ```
860 #### policies.json
861 ```
862 {
863 "policies": {
864 "DisablePasswordReveal": true | false
865 }
866 }
867 ```
868 ### DisablePocket
869 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
870
871 **Compatibility:** Firefox 60, Firefox ESR 60\
872 **CCK2 Equivalent:** `disablePocket`\
873 **Preferences Affected:** `extensions.pocket.enabled`
874
875 #### Windows (GPO)
876 ```
877 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
878 ```
879 #### macOS
880 ```
881 <dict>
882 <key>DisablePocket</key>
883 <true/> | <false/>
884 </dict>
885 ```
886 #### policies.json
887 ```
888 {
889 "policies": {
890 "DisablePocket": true | false
891 }
892 }
893 ```
894 ### DisablePrivateBrowsing
895 Remove access to private browsing.
896
897 **Compatibility:** Firefox 60, Firefox ESR 60\
898 **CCK2 Equivalent:** `disablePrivateBrowsing`\
899 **Preferences Affected:** N/A
900
901 #### Windows (GPO)
902 ```
903 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
904 ```
905 #### macOS
906 ```
907 <dict>
908 <key>DisablePrivateBrowsing</key>
909 <true/> | <false/>
910 </dict>
911 ```
912 #### policies.json
913 ```
914 {
915 "policies": {
916 "DisablePrivateBrowsing": true | false
917 }
918 }
919 ```
920 ### DisableProfileImport
921 Disables the "Import data from another browser" option in the bookmarks window.
922
923 **Compatibility:** Firefox 60, Firefox ESR 60\
924 **CCK2 Equivalent:** N/A\
925 **Preferences Affected:** N/A
926
927 #### Windows (GPO)
928 ```
929 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
930 ```
931 #### macOS
932 ```
933 <dict>
934 <key>DisableProfileImport</key>
935 <true/> | <false/>
936 </dict>
937 ```
938 #### policies.json
939 ```
940 {
941 "policies": {
942 "DisableProfileImport": true | false
943 }
944 }
945 ```
946 ### DisableProfileRefresh
947 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
948
949 **Compatibility:** Firefox 60, Firefox ESR 60\
950 **CCK2 Equivalent:** `disableResetFirefox`\
951 **Preferences Affected:** `browser.disableResetPrompt`
952
953 #### Windows (GPO)
954 ```
955 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
956 ```
957 #### macOS
958 ```
959 <dict>
960 <key>DisableProfileRefresh</key>
961 <true/> | <false/>
962 </dict>
963 ```
964 #### policies.json
965 ```
966 {
967 "policies": {
968 "DisableProfileRefresh": true | false
969 }
970 }
971 ```
972 ### DisableSafeMode
973 Disable safe mode within the browser.
974
975 On Windows, this disables safe mode via the command line as well.
976
977 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
978 **CCK2 Equivalent:** `disableSafeMode`\
979 **Preferences Affected:** N/A
980
981 #### Windows (GPO)
982 ```
983 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
984 ```
985 #### macOS
986 ```
987 <dict>
988 <key>DisableSafeMode</key>
989 <true/> | <false/>
990 </dict>
991 ```
992 #### policies.json
993 ```
994 {
995 "policies": {
996 "DisableSafeMode": true | false
997 }
998 }
999 ```
1000 ### DisableSecurityBypass
1001 Prevent the user from bypassing security in certain cases.
1002
1003 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1004
1005 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1006
1007 **Compatibility:** Firefox 60, Firefox ESR 60\
1008 **CCK2 Equivalent:** N/A\
1009 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1010
1011 #### Windows (GPO)
1012 ```
1013 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1014 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1015 ```
1016 #### macOS
1017 ```
1018 <dict>
1019 <key>DisableSecurityBypass</key>
1020 <dict>
1021 <key>InvalidCertificate</key>
1022 <true/> | <false/>
1023 <key><SafeBrowsing/key>
1024 <true/> | <false/>
1025 </dict>
1026 </dict>
1027 ```
1028 #### policies.json
1029 ```
1030 {
1031 "policies": {
1032 "DisableSecurityBypass": {
1033 "InvalidCertificate": true false,
1034 "SafeBrowsing": true false
1035 }
1036 }
1037 }
1038 ```
1039 ### DisableSystemAddonUpdate
1040 Prevent system add-ons from being installed or update.
1041
1042 **Compatibility:** Firefox 60, Firefox ESR 60\
1043 **CCK2 Equivalent:** N/A\
1044 **Preferences Affected:** N/A
1045
1046 #### Windows (GPO)
1047 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1048 ```
1049 #### macOS
1050 ```
1051 <dict>
1052 <key>DisableSystemAddonUpdate</key>
1053 <true/> | <false/>
1054 </dict>
1055 ```
1056 #### policies.json
1057 ```
1058 {
1059 "policies": {
1060 "DisableSystemAddonUpdate": true | false
1061 }
1062 }
1063 ```
1064 ### DisableTelemetry
1065 Prevent the upload of telemetry data.
1066
1067 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1068
1069 **Compatibility:** Firefox 60, Firefox ESR 60\
1070 **CCK2 Equivalent:** `disableTelemetry`\
1071 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1072
1073 #### Windows (GPO)
1074 ```
1075 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1076 ```
1077 #### macOS
1078 ```
1079 <dict>
1080 <key>DisableTelemetry</key>
1081 <true/> | <false/>
1082 </dict>
1083 ```
1084 #### policies.json
1085 ```
1086 {
1087 "policies": {
1088 "DisableTelemetry": true | false
1089 }
1090 }
1091 ```
1092 ### DisplayBookmarksToolbar
1093 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1094
1095 **Compatibility:** Firefox 60, Firefox ESR 60\
1096 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1097 **Preferences Affected:** N/A
1098
1099 #### Windows (GPO)
1100 ```
1101 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1102 ```
1103 #### macOS
1104 ```
1105 <dict>
1106 <key>DisplayBookmarksToolbar</key>
1107 <true/> | <false/>
1108 </dict>
1109 ```
1110 #### policies.json
1111 ```
1112 {
1113 "policies": {
1114 "DisplayBookmarksToolbar": true | false
1115 }
1116 }
1117 ```
1118 ### DisplayMenuBar (Deprecated)
1119 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1120
1121 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1122 **CCK2 Equivalent:** `displayMenuBar`\
1123 **Preferences Affected:** N/A
1124
1125 #### Windows (GPO)
1126 ```
1127 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisplayMenuBar</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisplayMenuBar": true | false
1141 }
1142 }
1143 ```
1144 ### DisplayMenuBar
1145 Set the state of the menubar.
1146
1147 `always` means the menubar is shown and cannot be hidden.
1148
1149 `never` means the menubar is hidden and cannot be shown.
1150
1151 `default-on` means the menubar is on by default but can be hidden.
1152
1153 `default-off` means the menubar is off by default but can be shown.
1154
1155 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1156 **CCK2 Equivalent:** `displayMenuBar`\
1157 **Preferences Affected:** N/A
1158
1159 #### Windows (GPO)
1160 ```
1161 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1162 ```
1163 #### macOS
1164 ```
1165 <dict>
1166 <key>DisplayMenuBar</key>
1167 <string>always | never | default-on | default-off</string>
1168 </dict>
1169 ```
1170 #### policies.json
1171 ```
1172 {
1173 "policies": {
1174 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1175 }
1176 }
1177 ```
1178 ### DNSOverHTTPS
1179 Configure DNS over HTTPS.
1180
1181 `Enabled` determines whether DNS over HTTPS is enabled
1182
1183 `ProviderURL` is a URL to another provider.
1184
1185 `Locked` prevents the user from changing DNS over HTTPS preferences.
1186
1187 **Compatibility:** Firefox 63, Firefox ESR 68\
1188 **CCK2 Equivalent:** N/A\
1189 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1190
1191 #### Windows (GPO)
1192 ```
1193 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1194 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1195 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1196 ```
1197 #### macOS
1198 ```
1199 <dict>
1200 <key>DNSOverHTTPS</key>
1201 <dict>
1202 <key>Enabled</key>
1203 <true/> | <false/>
1204 <key>ProviderURL</key>
1205 <string>URL_TO_ALTERNATE_PROVIDER</string>
1206 <key>Locked</key>
1207 <true/> | <false/>
1208 </dict>
1209 </dict>
1210 ```
1211 #### policies.json
1212 ```
1213 {
1214 "policies": {
1215 "DNSOverHTTPS": {
1216 "Enabled": true | false,
1217 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1218 "Locked": true | false
1219 }
1220 }
1221 }
1222 ```
1223 ### DontCheckDefaultBrowser
1224 Don't check if Firefox is the default browser at startup.
1225
1226 **Compatibility:** Firefox 60, Firefox ESR 60\
1227 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1228 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1229
1230 #### Windows (GPO)
1231 ```
1232 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DontCheckDefaultBrowser</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DontCheckDefaultBrowser": true | false
1246 }
1247 }
1248 ```
1249 ### DefaultDownloadDirectory
1250 Set the default download directory.
1251
1252 You can use ${home} for the native home directory.
1253
1254 **Compatibility:** Firefox 68, Firefox ESR 68\
1255 **CCK2 Equivalent:** N/A\
1256 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1257
1258 #### Windows (GPO)
1259 ```
1260 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1261 ```
1262 #### macOS
1263 ```
1264 <dict>
1265 <key>DefaultDownloadDirectory</key>
1266 <string>${home}/Downloads</string>
1267 </dict>
1268 ```
1269 #### policies.json (macOS and Linux)
1270 ```
1271 {
1272 "policies": {
1273 "DefaultDownloadDirectory": "${home}/Downloads"
1274 }
1275 ```
1276 #### policies.json (Windows)
1277 ```
1278 {
1279 "policies": {
1280 "DefaultDownloadDirectory": "${home}\\Downloads"
1281 }
1282 ```
1283 ### DownloadDirectory
1284 Set and lock the download directory.
1285
1286 You can use ${home} for the native home directory.
1287
1288 **Compatibility:** Firefox 68, Firefox ESR 68\
1289 **CCK2 Equivalent:** N/A\
1290 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1291
1292 #### Windows (GPO)
1293 ```
1294 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1295 ```
1296 #### macOS
1297 ```
1298 <dict>
1299 <key>DownloadDirectory</key>
1300 <string>${home}/Downloads</string>
1301 </dict>
1302 ```
1303 #### policies.json (macOS and Linux)
1304 ```
1305 {
1306 "policies": {
1307 "DownloadDirectory": "${home}/Downloads"
1308 }
1309 ```
1310 #### policies.json (Windows)
1311 ```
1312 {
1313 "policies": {
1314 "DownloadDirectory": "${home}\\Downloads"
1315 }
1316 ```
1317 ### EnableTrackingProtection
1318 Configure tracking protection.
1319
1320 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1321
1322 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1323
1324 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1325
1326 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1327
1328 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1329
1330 `Exceptions` are origins for which tracking protection is not enabled.
1331
1332 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1333 **CCK2 Equivalent:** N/A\
1334 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1335
1336 #### Windows (GPO)
1337 ```
1338 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1339 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1340 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1341 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1342 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1343 ```
1344 #### macOS
1345 ```
1346 <dict>
1347 <key>EnableTrackingProtection</key>
1348 <dict>
1349 <key>Value</key>
1350 <true/> | <false/>
1351 <key><Locked</key>
1352 <true/> | <false/>
1353 <key><Cryptomining</key>
1354 <true/> | <false/>
1355 <key><Fingerprinting</key>
1356 <true/> | <false/>
1357 <key>Exceptions</key>
1358 <array>
1359 <string>https://example.com</string>
1360 </array>
1361 </dict>
1362 </dict>
1363 ```
1364 #### policies.json
1365 ```
1366 {
1367 "policies": {
1368 "EnableTrackingProtection": {
1369 "Value": [true, false],
1370 "Locked": [true, false],
1371 "Cryptomining": [true, false],
1372 "Fingerprinting": [true, false],
1373 "Exceptions": ["https://example.com"]
1374 }
1375 }
1376 ```
1377 ### EnterprisePoliciesEnabled
1378 Enable policy support on macOS.
1379
1380 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1381 **CCK2 Equivalent:** N/A\
1382 **Preferences Affected:** N/A
1383
1384 #### macOS
1385 ```
1386 <dict>
1387 <key>EnterprisePoliciesEnabled</key>
1388 <true/>
1389 </dict>
1390 ```
1391 ### Extensions
1392 Control the installation, uninstallation and locking of extensions.
1393
1394 `Install` is a list of URLs or native paths for extensions to be installed.
1395
1396 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1397
1398 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1399
1400 **Compatibility:** Firefox 60, Firefox ESR 60\
1401 **CCK2 Equivalent:** `addons`\
1402 **Preferences Affected:** N/A
1403
1404 #### Windows (GPO)
1405 ```
1406 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1407 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1408 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1409 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1410 ```
1411 #### macOS
1412 ```
1413 <dict>
1414 <key>Extensions</key>
1415 <dict>
1416 <key>Install</key>
1417 <array>
1418 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1419 <string>//path/to/xpi</string>
1420 </array>
1421 <key>Uninstall</key>
1422 <array>
1423 <string>bad_addon_id@mozilla.org</string>
1424 </array>
1425 <key>Locked</key>
1426 <array>
1427 <string>addon_id@mozilla.org</string>
1428 </array>
1429 </dict>
1430 </dict>
1431 ```
1432 #### policies.json
1433 ```
1434 {
1435 "policies": {
1436 "Extensions": {
1437 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1438 "Uninstall": ["bad_addon_id@mozilla.org"],
1439 "Locked": ["addon_id@mozilla.org"]
1440 }
1441 }
1442 }
1443 ```
1444 ### ExtensionSettings
1445 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1446
1447 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1448
1449 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1450
1451 The configuration for each extension is another dictionary that can contain the fields documented below.
1452
1453 | Name | Description |
1454 | --- | --- |
1455 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1456 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1457 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1458 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1459 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1460 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1461 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1462 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1463 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1464
1465 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1466 **CCK2 Equivalent:** N/A\
1467 **Preferences Affected:** N/A
1468
1469 #### Windows (GPO)
1470 ```
1471 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1472 {
1473 "*": {
1474 "blocked_install_message": "Custom error message.",
1475 "install_sources": ["https://addons.mozilla.org/"],
1476 "installation_mode": "blocked",
1477 "allowed_types": ["extension"]
1478 },
1479 "uBlock0@raymondhill.net": {
1480 "installation_mode": "force_installed",
1481 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1482 }
1483 }
1484 ```
1485 #### macOS
1486 ```
1487 <dict>
1488 <key>ExtensionSettings</key>
1489 <dict>
1490 <key>*</key>
1491 <dict>
1492 <key>blocked_install_message</key>
1493 <string>Custom error message.</string>
1494 <key>install_sources</key>
1495 <array>
1496 <string>https://addons.mozilla.org/</string>
1497 </array>
1498 <key>installation_mode</key>
1499 <string>blocked</string>
1500 <key>allowed_types</key>
1501 <array>
1502 <string>extension</string>
1503 </array>
1504 </dict>
1505 <key>uBlock0@raymondhill.net</key>
1506 <dict>
1507 <key>installation_mode</key>
1508 <string>force_installed</string>
1509 <key>install_url</key>
1510 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1511 </dict>
1512 </dict>
1513 </dict>
1514 ```
1515 #### policies.json
1516 ```
1517 {
1518 "policies": {
1519 "ExtensionSettings": {
1520 "*": {
1521 "blocked_install_message": "Custom error message.",
1522 "install_sources": ["https://addons.mozilla.org/"],
1523 "installation_mode": "blocked",
1524 "allowed_types": ["extension"]
1525 },
1526 "uBlock0@raymondhill.net": {
1527 "installation_mode": "force_installed",
1528 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1529 }
1530 }
1531 }
1532 }
1533 ```
1534 ### ExtensionUpdate
1535 Control extension updates.
1536
1537 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1538 **CCK2 Equivalent:** N/A\
1539 **Preferences Affected:** `extensions.update.enabled`
1540
1541 #### Windows (GPO)
1542 ```
1543 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1544 ```
1545 #### macOS
1546 ```
1547 <dict>
1548 <key>ExtensionUpdate</key>
1549 <true/> | <false/>
1550 </dict>
1551 ```
1552 #### policies.json
1553 ```
1554 {
1555 "policies": {
1556 "ExtensionUpdate": true | false
1557 }
1558 }
1559 ```
1560 ### FlashPlugin
1561 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1562
1563 `Allow` is a list of origins where Flash are allowed.
1564
1565 `Block` is a list of origins where Flash is not allowed.
1566
1567 `Default` determines whether or not Flash is allowed by default.
1568
1569 `Locked` prevents the user from changing Flash preferences.
1570
1571 **Compatibility:** Firefox 60, Firefox ESR 60\
1572 **CCK2 Equivalent:** `permissions.plugin`\
1573 **Preferences Affected:** `plugin.state.flash`
1574
1575 #### Windows (GPO)
1576 ```
1577 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1578 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1579 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1580 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1581 ```
1582 #### macOS
1583 ```
1584 <dict>
1585 <key>FlashPlugin</key>
1586 <dict>
1587 <key>Allow</key>
1588 <array>
1589 <string>http://example.org</string>
1590 </array>
1591 <key>Block</key>
1592 <array>
1593 <string>http://example.edu</string>
1594 </array>
1595 <key>Default</key>
1596 <true/> | <false/>
1597 <key>Locked</key>
1598 <true/> | <false/>
1599 </dict>
1600 </dict>
1601 ```
1602 #### policies.json
1603 ```
1604 {
1605 "policies": {
1606 "FlashPlugin": {
1607 "Allow": ["http://example.org/"],
1608 "Block": ["http://example.edu/"],
1609 "Default": true | false,
1610 "Locked": true | false
1611 }
1612 }
1613 }
1614 ```
1615 ### FirefoxHome
1616 Customize the Firefox Home page.
1617
1618 **Compatibility:** Firefox 68, Firefox ESR 68\
1619 **CCK2 Equivalent:** N/A\
1620 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1621
1622 #### Windows (GPO)
1623 ```
1624 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1625 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1626 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1627 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1628 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1629 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1630 ```
1631 #### macOS
1632 ```
1633 <dict>
1634 <key>FirefoxHome</key>
1635 <dict>
1636 <key>Search</key>
1637 <true/> | <false/>
1638 <key>TopSites</key>
1639 <true/> | <false/>
1640 <key>Highlights</key>
1641 <true/> | <false/>
1642 <key>Pocket</key>
1643 <true/> | <false/>
1644 <key>Snippets</key>
1645 <true/> | <false/>
1646 <key>Locked</key>
1647 <true/> | <false/>
1648 </dict>
1649 </dict>
1650 ```
1651 #### policies.json
1652 ```
1653 {
1654 "policies": {
1655 "FirefoxHome": {
1656 "Search": true | false,
1657 "TopSites": true | false,
1658 "Highlights": true | false,
1659 "Pocket": true | false,
1660 "Snippets": true | false,
1661 "Locked": true | false
1662 }
1663 }
1664 }
1665 ```
1666 ### HardwareAcceleration
1667 Control hardware acceleration.
1668
1669 **Compatibility:** Firefox 60, Firefox ESR 60\
1670 **CCK2 Equivalent:** N/A\
1671 **Preferences Affected:** `layers.acceleration.disabled`
1672
1673 #### Windows (GPO)
1674 ```
1675 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1676 ```
1677 #### macOS
1678 ```
1679 <dict>
1680 <key>HardwareAcceleration</key>
1681 <true/> | <false/>
1682 </dict>
1683 ```
1684 #### policies.json
1685 ```
1686 {
1687 "policies": {
1688 "HardwareAcceleration": true | false
1689 }
1690 }
1691 ```
1692 ### Homepage
1693 Configure the default homepage and how Firefox starts.
1694
1695 `URL` is the default homepage.
1696
1697 `Locked` prevents the user from changing homepage preferences.
1698
1699 `Additional` allows for more than one homepage.
1700
1701 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1702
1703 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1704 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1705 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1706
1707 #### Windows (GPO)
1708 ```
1709 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1710 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1711 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1712 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1713 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1714 ```
1715 #### macOS
1716 ```
1717 <dict>
1718 <key>Homepage</key>
1719 <dict>
1720 <key>URL</key>
1721 <string>http://example.com</string>
1722 <key>Locked</key>
1723 <true/> | <false/>
1724 <key>Additional</key>
1725 <array>
1726 <string>http://example.org</string>
1727 <string>http://example.edu</string>
1728 </array>
1729 <key>StartPage</key>
1730 <string>none | homepage | previous-session</string>
1731 </dict>
1732 </dict>
1733 ```
1734 #### policies.json
1735 ```
1736 {
1737 "policies": {
1738 "Homepage": {
1739 "URL": "http://example.com/",
1740 "Locked": true | false,
1741 "Additional": ["http://example.org/",
1742 "http://example.edu/"],
1743 "StartPage": "none" | "homepage" | "previous-session"
1744 }
1745 }
1746 }
1747 ```
1748 ### InstallAddonsPermission
1749 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1750
1751 `Allow` is a list of origins where extension installs are allowed.
1752
1753 `Default` determines whether or not extension installs are allowed by default.
1754
1755 **Compatibility:** Firefox 60, Firefox ESR 60\
1756 **CCK2 Equivalent:** `permissions.install`\
1757 **Preferences Affected:** `xpinstall.enabled`
1758
1759 #### Windows (GPO)
1760 ```
1761 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1762 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1763 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1764 ```
1765 #### macOS
1766 ```
1767 <dict>
1768 <key>InstallAddonsPermission</key>
1769 <dict>
1770 <key>Allow</key>
1771 <array>
1772 <string>http://example.org</string>
1773 <string>http://example.edu</string>
1774 </array>
1775 <key>Default</key>
1776 <true/> | <false/>
1777 </dict>
1778 </dict>
1779 ```
1780 #### policies.json
1781 ```
1782 {
1783 "policies": {
1784 "InstallAddonsPermission": {
1785 "Allow": ["http://example.org/",
1786 "http://example.edu/"],
1787 "Default": true | false
1788 }
1789 }
1790 }
1791 ```
1792 ### LegacyProfiles
1793 Disable the feature enforcing a separate profile for each installation.
1794
1795 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1796
1797 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1798
1799 This policy only work on Windows via GPO (not policies.json).
1800
1801 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1802 **CCK2 Equivalent:** N/A\
1803 **Preferences Affected:** N/A
1804
1805 #### Windows (GPO)
1806 ```
1807 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1808 ```
1809 ### LocalFileLinks
1810 Enable linking to local files by origin.
1811
1812 **Compatibility:** Firefox 68, Firefox ESR 68\
1813 **CCK2 Equivalent:** N/A\
1814 **Preferences Affected:** `capability.policy.localfilelinks.*`
1815
1816 #### Windows (GPO)
1817 ```
1818 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1819 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1820 ```
1821 #### macOS
1822 ```
1823 <dict>
1824 <key>LocalFileLinks</key>
1825 <array>
1826 <string>http://example.org</string>
1827 <string>http://example.edu</string>
1828 </array>
1829 </dict>
1830 ```
1831 #### policies.json
1832 ```
1833 {
1834 "policies": {
1835 "LocalFileLinks": ["http://example.org/",
1836 "http://example.edu/"]
1837 }
1838 }
1839 ```
1840 ### NoDefaultBookmarks
1841 Disable the creation of default bookmarks.
1842
1843 This policy is only effective if the user profile has not been created yet.
1844
1845 **Compatibility:** Firefox 60, Firefox ESR 60\
1846 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1847 **Preferences Affected:** N/A
1848
1849 #### Windows (GPO)
1850 ```
1851 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1852 ```
1853 #### macOS
1854 ```
1855 <dict>
1856 <key>NoDefaultBookmarks</key>
1857 <true/> | <false/>
1858 </dict>
1859 ```
1860 #### policies.json
1861 ```
1862 {
1863 "policies": {
1864 "NoDefaultBookmarks": true | false
1865 }
1866 }
1867 ```
1868 ### NetworkPrediction
1869 Enable or disable network prediction (DNS prefetching).
1870
1871 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1872 **CCK2 Equivalent:** N/A\
1873 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1874
1875 #### Windows (GPO)
1876 ```
1877 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1878 ```
1879 #### macOS
1880 ```
1881 <dict>
1882 <key>NetworkPrediction</key>
1883 <true/> | <false/>
1884 </dict>
1885 ```
1886 #### policies.json
1887 ```
1888 {
1889 "policies": {
1890 "NetworkPrediction": true | false
1891 }
1892 ```
1893 ### NewTabPage
1894 Enable or disable the New Tab page.
1895
1896 **Compatibility:** Firefox 68, Firefox ESR 68\
1897 **CCK2 Equivalent:** N/A\
1898 **Preferences Affected:** `browser.newtabpage.enabled`
1899
1900 #### Windows (GPO)
1901 ```
1902 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1903 ```
1904 #### macOS
1905 ```
1906 <dict>
1907 <key>NewTabPage</key>
1908 <true/> | <false/>
1909 </dict>
1910 ```
1911 #### policies.json
1912 ```
1913 {
1914 "policies": {
1915 "NewTabPage": true | false
1916 }
1917 ```
1918 ### OfferToSaveLogins
1919 Control whether or not Firefox offers to save passwords.
1920
1921 **Compatibility:** Firefox 60, Firefox ESR 60\
1922 **CCK2 Equivalent:** `dontRememberPasswords`\
1923 **Preferences Affected:** `signon.rememberSignons`
1924
1925 #### Windows (GPO)
1926 ```
1927 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1928 ```
1929 #### macOS
1930 ```
1931 <dict>
1932 <key>OfferToSaveLogins</key>
1933 <true/> | <false/>
1934 </dict>
1935 ```
1936 #### policies.json
1937 ```
1938 {
1939 "policies": {
1940 "OfferToSaveLogins": true | false
1941 }
1942 }
1943 ```
1944 ### OfferToSaveLoginsDefault
1945 Sets the default value of signon.rememberSignons without locking it.
1946
1947 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1948 **CCK2 Equivalent:** `dontRememberPasswords`\
1949 **Preferences Affected:** `signon.rememberSignons`
1950
1951 #### Windows (GPO)
1952 ```
1953 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1954 ```
1955 #### macOS
1956 ```
1957 <dict>
1958 <key>OfferToSaveLoginsDefault</key>
1959 <true/> | <false/>
1960 </dict>
1961 ```
1962 #### policies.json
1963 ```
1964 {
1965 "policies": {
1966 "OfferToSaveLoginsDefault": true | false
1967 }
1968 }
1969 ```
1970 ### OverrideFirstRunPage
1971 Override the first run page. If the value is blank, no first run page is displayed.
1972
1973 **Compatibility:** Firefox 60, Firefox ESR 60\
1974 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1975 **Preferences Affected:** `startup.homepage_welcome_url`
1976
1977 #### Windows (GPO)
1978 ```
1979 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1980 ```
1981 #### macOS
1982 ```
1983 <dict>
1984 <key>OverrideFirstRunPage</key>
1985 <string>http://example.org</string>
1986 </dict>
1987 ```
1988 #### policies.json
1989 ```
1990 {
1991 "policies": {
1992 "OverrideFirstRunPage": "http://example.org"
1993 }
1994 ```
1995 ### OverridePostUpdatePage
1996 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1997
1998 **Compatibility:** Firefox 60, Firefox ESR 60\
1999 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2000 **Preferences Affected:** `startup.homepage_override_url`
2001
2002 #### Windows (GPO)
2003 ```
2004 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2005 ```
2006 #### macOS
2007 ```
2008 <dict>
2009 <key>OverridePostUpdatePage</key>
2010 <string>http://example.org</string>
2011 </dict>
2012 ```
2013 #### policies.json
2014 ```
2015 {
2016 "policies": {
2017 "OverridePostUpdatePage": "http://example.org"
2018 }
2019 ```
2020 ### PasswordManagerEnabled
2021 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2022
2023 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2024 **CCK2 Equivalent:** N/A\
2025 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2026
2027 #### Windows (GPO)
2028 ```
2029 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2030 ```
2031 #### macOS
2032 ```
2033 <dict>
2034 <key>PasswordManagerEnabled</key>
2035 <true/> | <false/>
2036 </dict>
2037 ```
2038 #### policies.json
2039 ```
2040 {
2041 "policies": {
2042 "PasswordManagerEnabled": true | false
2043 }
2044 }
2045 ```
2046 ### Permissions
2047 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2048
2049 `Allow` is a list of origins where the feature is allowed.
2050
2051 `Block` is a list of origins where the feature is not allowed.
2052
2053 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2054
2055 `Locked` prevents the user from changing preferences for the feature.
2056
2057 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2058 **CCK2 Equivalent:** N/A\
2059 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2060
2061 #### Windows (GPO)
2062 ```
2063 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2064 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2065 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2066 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2067 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2068 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2069 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2070 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2071 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2072 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2073 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2074 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2075 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2076 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2077 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2078 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2079 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2080 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2081 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2082 ```
2083 #### macOS
2084 ```
2085 <dict>
2086 <key>Permissions</key>
2087 <dict>
2088 <key>Camera</key>
2089 <dict>
2090 <key>Allow</key>
2091 <array>
2092 <string>https://example.org</string>
2093 <string>https://example.org:1234</string>
2094 </array>
2095 <key>Block</key>
2096 <array>
2097 <string>https://example.edu</string>
2098 </array>
2099 <key>BlockNewRequests</key>
2100 <true/>
2101 <key>Locked</key>
2102 <true/>
2103 </dict>
2104 <key>Microphone</key>
2105 <dict>
2106 <key>Allow</key>
2107 <array>
2108 <string>https://example.org</string>
2109 </array>
2110 <key>Block</key>
2111 <array>
2112 <string>https://example.edu</string>
2113 </array>
2114 <key>BlockNewRequests</key>
2115 <true/>
2116 <key>Locked</key>
2117 <true/>
2118 </dict>
2119 <key>Location</key>
2120 <dict>
2121 <key>Allow</key>
2122 <array>
2123 <string>https://example.org</string>
2124 </array>
2125 <key>Block</key>
2126 <array>
2127 <string>https://example.edu</string>
2128 </array>
2129 <key>BlockNewRequests</key>
2130 <true/>
2131 <key>Locked</key>
2132 <true/>
2133 </dict>
2134 <key>Notifications</key>
2135 <dict>
2136 <key>Allow</key>
2137 <array>
2138 <string>https://example.org</string>
2139 </array>
2140 <key>Block</key>
2141 <array>
2142 <string>https://example.edu</string>
2143 </array>
2144 <key>BlockNewRequests</key>
2145 <true/>
2146 <key>Locked</key>
2147 <true/>
2148 </dict>
2149 <key>Autoplay</key>
2150 <dict>
2151 <key>Allow</key>
2152 <array>
2153 <string>https://example.org</string>
2154 </array>
2155 <key>Block</key>
2156 <array>
2157 <string>https://example.edu</string>
2158 </array>
2159 </dict>
2160 </dict>
2161 </dict>
2162 ```
2163 #### policies.json
2164 ```
2165 {
2166 "policies": {
2167 "Permissions": {
2168 "Camera": {
2169 "Allow": ["https://example.org","https://example.org:1234"],
2170 "Block": ["https://example.edu"],
2171 "BlockNewRequests": true | false,
2172 "Locked": true | false
2173 },
2174 "Microphone": {
2175 "Allow": ["https://example.org"],
2176 "Block": ["https://example.edu"],
2177 "BlockNewRequests": true | false,
2178 "Locked": true | false
2179 },
2180 "Location": {
2181 "Allow": ["https://example.org"],
2182 "Block": ["https://example.edu"],
2183 "BlockNewRequests": true | false,
2184 "Locked": true | false
2185 },
2186 "Notifications": {
2187 "Allow": ["https://example.org"],
2188 "Block": ["https://example.edu"],
2189 "BlockNewRequests": true | false,
2190 "Locked": true | false
2191 },
2192 "Autoplay": {
2193 "Allow": ["https://example.org"],
2194 "Block": ["https://example.edu"]
2195 }
2196 }
2197 }
2198 }
2199 ```
2200 ### PopupBlocking
2201 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2202
2203 `Allow` is a list of origins where popup-windows are allowed.
2204
2205 `Default` determines whether or not pop-up windows are allowed by default.
2206
2207 `Locked` prevents the user from changing pop-up preferences.
2208
2209 **Compatibility:** Firefox 60, Firefox ESR 60\
2210 **CCK2 Equivalent:** `permissions.popup`\
2211 **Preferences Affected:** `dom.disable_open_during_load`
2212
2213 #### Windows (GPO)
2214 ```
2215 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2216 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2217 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2218 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2219 ```
2220 #### macOS
2221 ```
2222 <dict>
2223 <key>PopupBlocking</key>
2224 <dict>
2225 <key>Allow</key>
2226 <array>
2227 <string>http://example.org</string>
2228 <string>http://example.edu</string>
2229 </array>
2230 <key>Default</key>
2231 <true/> | <false/>
2232 <key>Locked</key>
2233 <true/> | <false/>
2234 </dict>
2235 </dict>
2236 ```
2237 #### policies.json
2238 ```
2239 {
2240 "policies": {
2241 "PopupBlocking": {
2242 "Allow": ["http://example.org/",
2243 "http://example.edu/"],
2244 "Default": true | false,
2245 "Locked": true | false
2246 }
2247 }
2248 }
2249 ```
2250 ### Preferences
2251 Set and lock certain preferences.
2252
2253 **Compatibility:** See below\
2254 **CCK2 Equivalent:** `preferences`\
2255 **Preferences Affected:** See below
2256
2257 | Preference | Type | Compatibility | Default
2258 | --- | --- | --- | ---
2259 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2260 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2261 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2262 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2263 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2264 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2265 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2266 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2267 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2268 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2269 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2270 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2271 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2272 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2273 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2274 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2275 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2276 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2277 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2278 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2279 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2280 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2281 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2282 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2283 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2284 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2285 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2286 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2287 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2288 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2289 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2290 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2291 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2292 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2293 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2294 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2295 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2296 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2297 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2298 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2299 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2300 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2301 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2302 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2303 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2304 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2305 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2306 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2307 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2308 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2309 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2310 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2311 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2312 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2313 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2314 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2315 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2316 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2317 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2318 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2319 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2320 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2321 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2322 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2323 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2324 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2325 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2326 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2327 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2328 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2329 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2330 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2331 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2332 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2333 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2334 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2335 disabled
2336 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2337 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2338 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2339 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2340 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2341 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2342 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2343 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2344 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2345 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2346 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2347 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2348 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2349 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2350 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2351 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2352 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2353 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2354 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2355 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2356 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2357 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2358 #### Windows (GPO)
2359 ```
2360 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2361 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2362 ```
2363 #### macOS
2364 ```
2365 <dict>
2366 <key>Preferences</key>
2367 <dict>
2368 <key>boolean_preference_name</key>
2369 <true/> | <false/>
2370 <key>string_preference_name</key>
2371 <string>string_value</string>
2372 </dict>
2373 </dict>
2374 ```
2375 #### policies.json
2376 ```
2377 {
2378 "policies": {
2379 "Preferences": {
2380 "boolean_preference_name": true | false,
2381 "string_preference_name": "string_value"
2382 }
2383 }
2384 }
2385 ```
2386 ### PromptForDownloadLocation
2387 Ask where to save each file before downloading.
2388
2389 **Compatibility:** Firefox 68, Firefox ESR 68\
2390 **CCK2 Equivalent:** N/A\
2391 **Preferences Affected:** `browser.download.useDownloadDir`
2392
2393 #### Windows (GPO)
2394 ```
2395 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2396 ```
2397 #### macOS
2398 ```
2399 <dict>
2400 <key>PromptForDownloadLocation</key>
2401 <true/> | <false/>
2402 </dict>
2403 ```
2404 #### policies.json
2405 ```
2406 {
2407 "policies": {
2408 "PromptForDownloadLocation": true | false
2409 }
2410 }
2411 ```
2412 ### Proxy
2413 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2414 To specify ports, append them to the hostnames with a colon (:).
2415
2416 `Mode` is the proxy method being used.
2417
2418 `Locked` is whether or not proxy settings can be changed.
2419
2420 `HTTPProxy` is the HTTP proxy server.
2421
2422 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2423
2424 `SSLProxy` is the SSL proxy server.
2425
2426 `FTPProxy` is the FTP proxy server.
2427
2428 `SOCKSProxy` is the SOCKS proxy server
2429
2430 `SOCKSVersion` is the SOCKS version (4 or 5)
2431
2432 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2433
2434 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2435
2436 `AutoLogin` means do not prompt for authentication if password is saved.
2437
2438 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2439
2440 **Compatibility:** Firefox 60, Firefox ESR 60\
2441 **CCK2 Equivalent:** `networkProxy*`\
2442 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2443
2444 #### Windows (GPO)
2445 ```
2446 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2447 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2448 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2449 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2450 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2451 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2452 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2453 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2454 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2455 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2456 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2457 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2458 ```
2459 #### macOS
2460 ```
2461 <dict>
2462 <key>Proxy</key>
2463 <dict>
2464 <key>Mode</key>
2465 <string>none | system | manual | autoDetect | autoConfig</string>
2466 <key>Locked</key>
2467 <true> | </false>
2468 <key>HTTPProxy</key>
2469 <string>https://httpproxy.example.com</string>
2470 <key>UseHTTPProxyForAllProtocols</key>
2471 <true> | </false>
2472 <key>SSLProxy</key>
2473 <string>https://sslproxy.example.com</string>
2474 <key>FTPProxy</key>
2475 <string>https://ftpproxy.example.com</string>
2476 <key>SOCKSProxy</key>
2477 <string>https://socksproxy.example.com</string>
2478 <key>SOCKSVersion</key>
2479 <string>4 | 5</string>
2480 <key>Passthrough</key>
2481 <string>&lt;local>&gt;</string>
2482 <key>AutoConfigURL</key>
2483 <string>URL_TO_AUTOCONFIG</string>
2484 <key>AutoLogin</key>
2485 <true> | </false>
2486 <key>UseProxyForDNS</key>
2487 <true> | </false>
2488 </dict>
2489 </dict>
2490 ```
2491 #### policies.json
2492 ```
2493 {
2494 "policies": {
2495 "Proxy": {
2496 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2497 "Locked": [true, false],
2498 "HTTPProxy": "hostname",
2499 "UseHTTPProxyForAllProtocols": [true, false],
2500 "SSLProxy": "hostname",
2501 "FTPProxy": "hostname",
2502 "SOCKSProxy": "hostname",
2503 "SOCKSVersion": 4 | 5
2504 "Passthrough": "<local>",
2505 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2506 "AutoLogin": [true, false],
2507 "UseProxyForDNS": [true, false]
2508 }
2509 }
2510 }
2511 ```
2512 ### RequestedLocales
2513 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2514
2515 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2516
2517 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2518 **CCK2 Equivalent:** N/A\
2519 **Preferences Affected:** N/A
2520 #### Windows (GPO)
2521 ```
2522 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2523 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2524
2525 or
2526
2527 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2528 ```
2529 #### macOS
2530 ```
2531 <dict>
2532 <key>RequestedLocales</key>
2533 <array>
2534 <string>de</string>
2535 <string>en-US</string>
2536 </array>
2537 </dict>
2538
2539 or
2540
2541 <dict>
2542 <key>RequestedLocales</key>
2543 <string>de,en-US</string>
2544 </dict>
2545
2546 ```
2547 #### policies.json
2548 ```
2549 {
2550 "policies": {
2551 "RequestedLocales": ["de", "en-US"]
2552 }
2553 }
2554
2555 or
2556
2557 {
2558 "policies": {
2559 "RequestedLocales": "de,en-US"
2560 }
2561 }
2562 ```
2563 ### SanitizeOnShutdown (Selective)
2564 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2565
2566 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2567
2568 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2569 **CCK2 Equivalent:** N/A\
2570 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2571 #### Windows (GPO)
2572 ```
2573 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2574 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2575 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2576 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2577 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2578 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2579 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2580 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2581 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2582 ```
2583 #### macOS
2584 ```
2585 <dict>
2586 <key>SanitizeOnShutdown</key>
2587 <dict>
2588 <key>Cache</key>
2589 <true/> | <false/>
2590 <key>Cookies</key>
2591 <true/> | <false/>
2592 <key>Downloads</key>
2593 <true/> | <false/>
2594 <key>FormData</key>
2595 <true/> | <false/>
2596 <key>History</key>
2597 <true/> | <false/>
2598 <key>Sessions</key>
2599 <true/> | <false/>
2600 <key>SiteSettings</key>
2601 <true/> | <false/>
2602 <key>OfflineApps</key>
2603 <true/> | <false/>
2604 <key>Locked</key>
2605 <true/> | <false/>
2606 </dict>
2607 </dict>
2608 ```
2609 #### policies.json
2610 ```
2611 {
2612 "policies": {
2613 "SanitizeOnShutdown": {
2614 "Cache": true | false,
2615 "Cookies": true | false,
2616 "Downloads": true | false,
2617 "FormData": true | false,
2618 "History": true | false,
2619 "Sessions": true | false,
2620 "SiteSettings": true | false,
2621 "OfflineApps": true | false,
2622 "Locked": true | false
2623 }
2624 }
2625 }
2626 ```
2627 ### SanitizeOnShutdown (All)
2628 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2629
2630 **Compatibility:** Firefox 60, Firefox ESR 60\
2631 **CCK2 Equivalent:** N/A\
2632 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2633 #### Windows (GPO)
2634 ```
2635 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2636 ```
2637 #### macOS
2638 ```
2639 <dict>
2640 <key>SanitizeOnShutdown</key>
2641 <true/> | <false/>
2642 </dict>
2643 ```
2644 #### policies.json
2645 ```
2646 {
2647 "policies": {
2648 "SanitizeOnShutdown": true | false
2649 }
2650 }
2651 ```
2652 ### SearchBar
2653 Set whether or not search bar is displayed.
2654
2655 **Compatibility:** Firefox 60, Firefox ESR 60\
2656 **CCK2 Equivalent:** `showSearchBar`\
2657 **Preferences Affected:** N/A
2658
2659 #### Windows (GPO)
2660 ```
2661 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2662 ```
2663 #### macOS
2664 ```
2665 <dict>
2666 <key>SearchBar</key>
2667 <string>unified | separate</string>
2668 </dict>
2669 ```
2670
2671 #### policies.json
2672 ```
2673 {
2674 "policies": {
2675 "SearchBar": "unified" | "separate"
2676 }
2677 }
2678 ```
2679
2680
2681
2682
2683
2684 ### SearchEngines (This policy is only available on the ESR.)
2685
2686 ### SearchEngines | Default
2687
2688 Set the default search engine. This policy is only available on the ESR.
2689
2690 **Compatibility:** Firefox ESR 60\
2691 **CCK2 Equivalent:** `defaultSearchEngine`\
2692 **Preferences Affected:** N/A
2693
2694 #### Windows (GPO)
2695 ```
2696 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2697 ```
2698 #### macOS
2699 ```
2700 <dict>
2701 <key>SearchEngines</key>
2702 <dict>
2703 <key>Default</key>
2704 <string>NAME_OF_SEARCH_ENGINE</string>
2705 </dict>
2706 </dict>
2707 ```
2708 #### policies.json
2709 ```
2710 {
2711 "policies": {
2712 "SearchEngines": {
2713 "Default": "NAME_OF_SEARCH_ENGINE"
2714 }
2715 }
2716 }
2717 ```
2718 ### SearchEngines | PreventInstalls
2719
2720 Prevent installing search engines from webpages.
2721
2722 **Compatibility:** Firefox ESR 60\
2723 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2724 **Preferences Affected:** N/A
2725
2726 #### Windows (GPO)
2727 ```
2728 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2729 ```
2730 #### macOS
2731 ```
2732 <dict>
2733 <key>SearchEngines</key>
2734 <dict>
2735 <key>PreventInstalls</key>
2736 <true/> | <false/>
2737 </dict>
2738 </dict>
2739 ```
2740 #### policies.json
2741 ```
2742 {
2743 "policies": {
2744 "SearchEngines": {
2745 "PreventInstalls": true | false
2746 }
2747 }
2748 }
2749 ```
2750 ### SearchEngines | Remove
2751
2752 Hide built-in search engines. This policy is only available on the ESR.
2753
2754 **Compatibility:** Firefox ESR 60.2\
2755 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2756 **Preferences Affected:** N/A
2757
2758 #### Windows (GPO)
2759 ```
2760 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2761 ```
2762 #### macOS
2763 ```
2764 <dict>
2765 <key>SearchEngines</key>
2766 <dict>
2767 <key>Remove</key>
2768 <array>
2769 <string>NAME_OF_SEARCH_ENGINE</string>
2770 </array>
2771 </dict>
2772 </dict>
2773 ```
2774 #### policies.json
2775 ```
2776 {
2777 "policies": {
2778 "SearchEngines": {
2779 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2780 }
2781 }
2782 }
2783 ```
2784 ### SearchEngines | Add
2785
2786 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2787
2788 `Name` is the name of the search engine.
2789
2790 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2791
2792 `Method` is either GET or POST
2793
2794 `IconURL` is a URL for the icon to use.
2795
2796 `Alias` is a keyword to use for the engine.
2797
2798 `Description` is a description of the search engine.
2799
2800 `PostData` is the POST data as name value pairs separated by &.
2801
2802 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2803
2804 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2805 **CCK2 Equivalent:** `searchplugins`\
2806 **Preferences Affected:** N/A
2807
2808 #### Windows (GPO)
2809 ```
2810 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2811 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2812 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2813 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2814 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2815 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2816 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2817 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2818 ```
2819
2820 #### macOS
2821 ```
2822 <dict>
2823 <key>SearchEngines</key>
2824 <dict>
2825 <key>Add</key>
2826 <array>
2827 <dict>
2828 <key>Name</key>
2829 <string>Example1</string>
2830 <key>URLTemplate</key>
2831 <string>https://www.example.org/q={searchTerms}</string>
2832 <key>Method</key>
2833 <string>GET | POST </string>
2834 <key>IconURL</key>
2835 <string>https://www.example.org/favicon.ico</string>
2836 <key>Alias</key>
2837 <string>example</string>
2838 <key>Description</key>
2839 <string>Example Description</string>
2840 <key>SuggestURLTemplate</key>
2841 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2842 <key>PostData</key>
2843 <string>name=value&q={searchTerms}</string>
2844 </dict>
2845 <array>
2846 </dict>
2847 </dict>
2848 ```
2849 #### policies.json
2850 ```
2851 {
2852 "policies": {
2853 "SearchEngines": {
2854 "Add": [
2855 {
2856 "Name": "Example1",
2857 "URLTemplate": "https://www.example.org/q={searchTerms}",
2858 "Method": "GET" | "POST",
2859 "IconURL": "https://www.example.org/favicon.ico",
2860 "Alias": "example",
2861 "Description": "Description",
2862 "PostData": "name=value&q={searchTerms}",
2863 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2864 }
2865 ]
2866 }
2867 }
2868 }
2869 ```
2870 ### SearchSuggestEnabled
2871
2872 Enable search suggestions.
2873
2874 **Compatibility:** Firefox 68, Firefox ESR 68\
2875 **CCK2 Equivalent:** N/A\
2876 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2877
2878 #### Windows (GPO)
2879 ```
2880 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2881 ```
2882 #### macOS
2883 ```
2884 <dict>
2885 <key>SearchSuggestEnabled</key>
2886 <true/> | <false/>
2887 </dict>
2888 ```
2889 #### policies.json
2890 ```
2891 {
2892 "policies": {
2893 "SearchSuggestEnabled": true | false
2894 }
2895 }
2896 ```
2897 ### SecurityDevices
2898
2899 Install PKCS #11 modules.
2900
2901 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2902 **CCK2 Equivalent:** `certs.devices`\
2903 **Preferences Affected:** N/A
2904
2905 #### Windows (GPO)
2906 ```
2907 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2908 ```
2909 #### macOS
2910 ```
2911 <dict>
2912 <key>SecurityDevices</key>
2913 <dict>
2914 <key>NAME_OF_DEVICE</key>
2915 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2916 </dict>
2917 </dict>
2918 ```
2919
2920 #### policies.json
2921 ```
2922 {
2923 "policies": {
2924 "SecurityDevices": {
2925 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2926 }
2927 }
2928 }
2929 ```
2930 ### SSLVersionMax
2931
2932 Set and lock the maximum version of TLS.
2933
2934 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2935 **CCK2 Equivalent:** N/A\
2936 **Preferences Affected:** `security.tls.version.max`
2937
2938 #### Windows (GPO)
2939 ```
2940 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2941 ```
2942 #### macOS
2943 ```
2944 <dict>
2945 <key>SSLVersionMax</key>
2946 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2947 </dict>
2948 ```
2949
2950 #### policies.json
2951 ```
2952 {
2953 "policies": {
2954 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2955 }
2956 }
2957 ```
2958 ### SSLVersionMin
2959
2960 Set and lock the minimum version of TLS.
2961
2962 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2963 **CCK2 Equivalent:** N/A\
2964 **Preferences Affected:** `security.tls.version.min`
2965
2966 #### Windows (GPO)
2967 ```
2968 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2969 ```
2970 #### macOS
2971 ```
2972 <dict>
2973 <key>SSLVersionMin</key>
2974 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2975 </dict>
2976 ```
2977
2978 #### policies.json
2979 ```
2980 {
2981 "policies": {
2982 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2983 }
2984 }
2985 ```
2986 ### SupportMenu
2987 Add a menuitem to the help menu for specifying support information.
2988
2989 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2990 **CCK2 Equivalent:** helpMenu\
2991 **Preferences Affected:** N/A
2992
2993 #### Windows (GPO)
2994 ```
2995 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2996 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2997 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
2998 ```
2999 #### macOS
3000 ```
3001 <dict>
3002 <key>SupportMenu</key>
3003 <dict>
3004 <key>Title</key>
3005 <string>SupportMenu</string>
3006 <key>URL</key>
3007 <string>http://example.com/support</string>
3008 <key>AccessKey</key>
3009 <string>S</string>
3010 </dict>
3011 </dict>
3012 ```
3013 #### policies.json
3014 ```
3015 {
3016 "policies": {
3017 "SupportMenu": {
3018 "Title": "Support Menu",
3019 "URL": "http://example.com/support",
3020 "AccessKey": "S"
3021 }
3022 }
3023 }
3024 ```
3025 ### UserMessaging
3026
3027 Prevent installing search engines from webpages.
3028
3029 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3030
3031 `ExtensionRecommendations` Don't recommend extensions.
3032
3033 `FeatureRecommendations` Don't recommend browser features.
3034
3035 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3036
3037 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3038 **CCK2 Equivalent:** N/A\
3039 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3040
3041 #### Windows (GPO)
3042 ```
3043 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3044 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3045 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3046 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3047 ```
3048 #### macOS
3049 ```
3050 <dict>
3051 <key>UserMessaging</key>
3052 <dict>
3053 <key>WhatsNew</key>
3054 <true/> | <false/>
3055 <key>ExtensionRecommendations</key>
3056 <true/> | <false/>
3057 <key>FeatureRecommendations</key>
3058 <true/> | <false/>
3059 <key>UrlbarInterventions</key>
3060 <true/> | <false/>
3061 </dict>
3062 </dict>
3063 ```
3064 #### policies.json
3065 ```
3066 {
3067 "policies": {
3068 "UserMessaging": {
3069 "WhatsNew": true | false,
3070 "ExtensionRecommendations": true | false,
3071 "FeatureRecommendations": true | false,
3072 "UrlbarInterventions": true | false
3073 }
3074 }
3075 }
3076 ```
3077 ### WebsiteFilter
3078 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3079
3080 **Compatibility:** Firefox 60, Firefox ESR 60\
3081 **CCK2 Equivalent:** N/A\
3082 **Preferences Affected:** N/A
3083
3084 #### Windows (GPO)
3085 ```
3086 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3087 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3088 ```
3089 #### macOS
3090 ```
3091 <dict>
3092 <key>WebsiteFilter</key>
3093 <dict>
3094 <key>Block</key>
3095 <array>
3096 <string><all_urls></string>
3097 </array>
3098 <key>Exceptions</key>
3099 <array>
3100 <string>http://example.org/*</string>
3101 </array>
3102 </dict>
3103
3104 </dict>
3105 ```
3106 #### policies.json
3107 ```
3108 {
3109 "policies": {
3110 "WebsiteFilter": {
3111 "Block": ["<all_urls>"],
3112 "Exceptions": ["http://example.org/*"]
3113 }
3114 }
3115 }
3116 ```

patrick-canterino.de