]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #586 from mozilla/Permissions_Autoplay_DefaultLocked
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
35 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
36 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
37 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
38 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
39 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
40 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
41 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
42 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
43 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
44 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
45 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
46 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
47 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
48 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
49 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
50 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
51 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
52 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
53 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
54 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
55 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
56 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
57 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
58 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
59 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
60 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
61 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
62 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
63 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
64 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
65 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
66 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
67 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
68 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
69 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
70 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
71 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
72 | **[`Preferences`](#preferences)** | Set and lock some preferences.
73 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
74 | **[`Proxy`](#proxy)** | Configure proxy settings.
75 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
76 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
77 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
78 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
79 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
80 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
81 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
82 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
83 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
84 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
85 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
86 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
87 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
88 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
89 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
90 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
91
92 ### AppAutoUpdate
93
94 Enable or disable **automatic** application update.
95
96 If set to true, application updates are installed without user approval.
97
98 If set to false, application updates are downloaded but the user can choose when to install the update.
99
100 If you have disabled updates via DisableAppUpdate, this policy has no effect.
101
102 **Compatibility:** Firefox 75, Firefox ESR 68.7\
103 **CCK2 Equivalent:** N/A\
104 **Preferences Affected:** app.update.auto
105
106 #### Windows (GPO)
107 ```
108 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
109 ```
110 #### macOS
111 ```
112 <dict>
113 <key>AppAutoUpdate</key>
114 <true/> | <false/>
115 </dict>
116 ```
117 #### policies.json
118 ```
119 {
120 "policies": {
121 "AppAutoUpdate": true | false
122 }
123 }
124 ```
125 ### AppUpdateURL
126
127 Change the URL for application update.
128
129 **Compatibility:** Firefox 62, Firefox ESR 60.2\
130 **CCK2 Equivalent:** N/A\
131 **Preferences Affected:** `app.update.url`
132
133 #### Windows (GPO)
134 ```
135 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
136 ```
137 #### macOS
138 ```
139 <dict>
140 <key>AppUpdateURL</key>
141 <string>https://yoursite.com</string>
142 </dict>
143 ```
144 #### policies.json
145 ```
146 {
147 "policies": {
148 "AppUpdateURL": "https://yoursite.com"
149 }
150 }
151 ```
152 ### Authentication
153
154 Configure sites that support integrated authentication.
155
156 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
157
158 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
159 **CCK2 Equivalent:** N/A\
160 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
161
162 #### Windows (GPO)
163 ```
164 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
165 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
166 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
167 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
168 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
169 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
170 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
171 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
172 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
173 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
174 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
175 ```
176 #### macOS
177 ```
178 <dict>
179 <key>Authentication</key>
180 <dict>
181 <key>SPNEGO</key>
182 <array>
183 <string>mydomain.com</string>
184 <string>https://myotherdomain.com</string>
185 </array>
186 <key>Delegated</key>
187 <array>
188 <string>mydomain.com</string>
189 <string>https://myotherdomain.com</string>
190 </array>
191 <key>NTLM</key>
192 <array>
193 <string>mydomain.com</string>
194 <string>https://myotherdomain.com</string>
195 </array>
196 <key>AllowNonFQDN</key>
197 <dict>
198 <key>SPNEGO</key>
199 <true/> | <false/>
200 <key>NTLM</key>
201 <true/> | <false/>
202 </dict>
203 <key>AllowProxies</key>
204 <dict>
205 <key>SPNEGO</key>
206 <true/> | <false/>
207 <key>NTLM</key>
208 <true/> | <false/>
209 </dict>
210 <key>Locked</key>
211 <true/> | <false/>
212 </dict>
213 </dict>
214 ```
215 #### policies.json
216 ```
217 {
218 "policies": {
219 "Authentication": {
220 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
221 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
222 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
223 "AllowNonFQDN": {
224 "SPNEGO": true | false,
225 "NTLM": true | false
226 },
227 "AllowProxies": {
228 "SPNEGO": true | false,
229 "NTLM": true | false
230 },
231 "Locked": true | false
232 }
233 }
234 }
235 ```
236 ### BlockAboutAddons
237
238 Block access to the Add-ons Manager (about:addons).
239
240 **Compatibility:** Firefox 60, Firefox ESR 60\
241 **CCK2 Equivalent:** `disableAddonsManager`\
242 **Preferences Affected:** N/A
243
244 #### Windows (GPO)
245 ```
246 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
247 ```
248 #### macOS
249 ```
250 <dict>
251 <key>BlockAboutAddons</key>
252 <true/> | <false/>
253 </dict>
254 ```
255 #### policies.json
256 ```
257 {
258 "policies": {
259 "BlockAboutAddons": true | false
260 }
261 }
262 ```
263 ### BlockAboutConfig
264
265 Block access to about:config.
266
267 **Compatibility:** Firefox 60, Firefox ESR 60\
268 **CCK2 Equivalent:** `disableAboutConfig`\
269 **Preferences Affected:** N/A
270
271 #### Windows (GPO)
272 ```
273 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
274 ```
275 #### macOS
276 ```
277 <dict>
278 <key>BlockAboutConfig</key>
279 <true/> | <false/>
280 </dict>
281 ```
282 #### policies.json
283 ```
284 {
285 "policies": {
286 "BlockAboutConfig": true | false
287 }
288 }
289 ```
290 ### BlockAboutProfiles
291
292 Block access to About Profiles (about:profiles).
293
294 **Compatibility:** Firefox 60, Firefox ESR 60\
295 **CCK2 Equivalent:** `disableAboutProfiles`\
296 **Preferences Affected:** N/A
297
298 #### Windows (GPO)
299 ```
300 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
301 ```
302 #### macOS
303 ```
304 <dict>
305 <key>BlockAboutProfiles</key>
306 <true/> | <false/>
307 </dict>
308 ```
309 #### policies.json
310 ```
311 {
312 "policies": {
313 "BlockAboutProfiles": true | false
314 }
315 }
316 ```
317 ### BlockAboutSupport
318
319 Block access to Troubleshooting Information (about:support).
320
321 **Compatibility:** Firefox 60, Firefox ESR 60\
322 **CCK2 Equivalent:** `disableAboutSupport`\
323 **Preferences Affected:** N/A
324
325 #### Windows (GPO)
326 ```
327 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
328 ```
329 #### macOS
330 ```
331 <dict>
332 <key>BlockAboutSupport</key>
333 <true/> | <false/>
334 </dict>
335 ```
336 #### policies.json
337 ```
338 {
339 "policies": {
340 "BlockAboutSupport": true | false
341 }
342 }
343 ```
344 ### Bookmarks
345
346 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
347
348 **Compatibility:** Firefox 60, Firefox ESR 60\
349 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
350 **Preferences Affected:** N/A
351
352 #### Windows (GPO)
353 ```
354 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
355 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
356 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
357 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
358 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
359 ```
360 #### macOS
361 ```
362 <dict>
363 <key>Bookmarks</key>
364 <array>
365 <dict>
366 <key>Title</key>
367 <string>Example</string>
368 <key>URL</key>
369 <string>https://example.com</string>
370 <key>Favicon</key>
371 <string>https://example.com/favicon.ico</string>
372 <key>Placement</key>
373 <string>toolbar | menu</string>
374 <key>Folder</key>
375 <string>FolderName</string>
376 </dict>
377 </array>
378 </dict>
379 ```
380 #### policies.json
381 ```
382 {
383 "policies": {
384 "Bookmarks": [
385 {
386 "Title": "Example",
387 "URL": "https://example.com",
388 "Favicon": "https://example.com/favicon.ico",
389 "Placement": "toolbar" | "menu",
390 "Folder": "FolderName"
391 }
392 ]
393 }
394 }
395 ```
396 ### CaptivePortal
397 Enable or disable the detection of captive portals.
398
399 **Compatibility:** Firefox 67, Firefox ESR 60.7\
400 **CCK2 Equivalent:** N/A\
401 **Preferences Affected:** `network.captive-portal-service.enabled`
402
403 #### Windows (GPO)
404 ```
405 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
406 ```
407 #### macOS
408 ```
409 <dict>
410 <key>CaptivePortal</key>
411 <true/> | <false/>
412 </dict>
413 ```
414 #### policies.json
415 ```
416 {
417 "policies": {
418 "CaptivePortal": true | false
419 }
420 }
421 ```
422 ### Certificates
423
424 ### Certificates | ImportEnterpriseRoots
425
426 Trust certificates that have been added to the operating system certificate store by a user or administrator.
427
428 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
429
430 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
431 **CCK2 Equivalent:** N/A\
432 **Preferences Affected:** `security.enterprise_roots.enabled`
433
434 #### Windows (GPO)
435 ```
436 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
437 ```
438 #### macOS
439 ```
440 <dict>
441 <key>Certificates</key>
442 <dict>
443 <key>ImportEnterpriseRoots</key>
444 <true/> | <false/>
445 </dict>
446 </dict>
447 ```
448 #### policies.json
449 ```
450 {
451 "policies": {
452 "Certificates": {
453 "ImportEnterpriseRoots": true | false
454 }
455 }
456 }
457 ```
458 ### Certificates | Install
459
460 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
461
462 - Windows
463 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
464 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
465 - macOS
466 - /Library/Application Support/Mozilla/Certificates
467 - ~/Library/Application Support/Mozilla/Certificates
468 - Linux
469 - /usr/lib/mozilla/certificates
470 - /usr/lib64/mozilla/certificates
471 - ~/.mozilla/certificates
472
473 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
474
475 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
476
477 Certificates are installed using the trust string `CT,CT,`.
478
479 Binary (DER) and ASCII (PEM) certificates are both supported.
480
481 **Compatibility:** Firefox 64, Firefox ESR 64\
482 **CCK2 Equivalent:** `certs.ca`\
483 **Preferences Affected:** N/A
484
485 #### Windows (GPO)
486 ```
487 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
488 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
489 ```
490 #### macOS
491 ```
492 <dict>
493 <key>Certificates</key>
494 <dict>
495 <key>Install</key>
496 <array>
497 <string>cert1.der</string>
498 <string>/Users/username/cert2.pem</string>
499 </array>
500 </dict>
501 </dict>
502 ```
503 #### policies.json
504 ```
505 {
506 "policies": {
507 "Certificates": {
508 "Install": ["cert1.der", "/home/username/cert2.pem"]
509 }
510 }
511 }
512 ```
513 ### Cookies
514 Configure cookie preferences.
515
516 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
517
518 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
519
520 `Default` determines whether cookies are accepted at all.
521
522 `AcceptThirdParty` determines how third-party cookies are handled.
523
524 `ExpireAtSessionEnd` determines when cookies expire.
525
526 `RejectTracker` only rejects cookies for trackers.
527
528 `Locked` prevents the user from changing cookie preferences.
529
530 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
531 **CCK2 Equivalent:** N/A\
532 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
533
534 #### Windows (GPO)
535 ```
536 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
537 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
538 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
539 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
540 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
541 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
542 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
543 ```
544 #### macOS
545 ```
546 <dict>
547 <key>Cookies</key>
548 <dict>
549 <key>Allow</key>
550 <array>
551 <string>http://example.com</string>
552 </array>
553 <key>Block</key>
554 <array>
555 <string>http://example.org</string>
556 </array>
557 <key>Default</key>
558 <true/> | <false/>
559 <key>AcceptThirdParty</key>
560 <string>always | never | from-visited</string>
561 <key>ExpireAtSessionEnd</key>
562 <true/> | <false/>
563 <key>RejectTracker</key>
564 <true/> | <false/>
565 <key>Locked</key>
566 <true/> | <false/>
567 </dict>
568 </dict>
569 ```
570 #### policies.json
571 ```
572 {
573 "policies": {
574 "Cookies": {
575 "Allow": ["http://example.org/"],
576 "Block": ["http://example.edu/"],
577 "Default": true | false,
578 "AcceptThirdParty": "always" | "never" | "from-visited",
579 "ExpireAtSessionEnd": true | false,
580 "RejectTracker": true | false,
581 "Locked": true | false
582 }
583 }
584 }
585 ```
586 ### DisableSetDesktopBackground
587 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
588
589 **Compatibility:** Firefox 60, Firefox ESR 60\
590 **CCK2 Equivalent:** `removeSetDesktopBackground`\
591 **Preferences Affected:** N/A
592
593 #### Windows (GPO)
594 ```
595 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
596 ```
597
598 #### macOS
599 ```
600 <dict>
601 <key>DisableSetDesktopBackground</key>
602 <true/> | <false/>
603 </dict>
604 ```
605 #### policies.json
606 ```
607 {
608 "policies": {
609 "DisableSetDesktopBackground": true | false
610 }
611 }
612 ```
613 ### DisableMasterPasswordCreation
614 Remove the master password functionality.
615
616 **Compatibility:** Firefox 60, Firefox ESR 60\
617 **CCK2 Equivalent:** `noMasterPassword`\
618 **Preferences Affected:** N/A
619
620 #### Windows (GPO)
621 ```
622 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
623 ```
624
625 #### macOS
626 ```
627 <dict>
628 <key>DisableMasterPasswordCreation</key>
629 <true/> | <false/>
630 </dict>
631 ```
632 #### policies.json
633 ```
634 {
635 "policies": {
636 "DisableMasterPasswordCreation": true | false
637 }
638 }
639 ```
640 ### DisableAppUpdate
641 Turn off application updates.
642
643 **Compatibility:** Firefox 60, Firefox ESR 60\
644 **CCK2 Equivalent:** `disableFirefoxUpdates`\
645 **Preferences Affected:** N/A
646
647 #### Windows (GPO)
648 ```
649 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
650 ```
651 #### macOS
652 ```
653 <dict>
654 <key>DisableAppUpdate</key>
655 <true/> | <false/>
656 </dict>
657 ```
658 #### policies.json
659 ```
660 {
661 "policies": {
662 "DisableAppUpdate": true | false
663 }
664 }
665 ```
666 ### DisableBuiltinPDFViewer
667 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
668
669 **Compatibility:** Firefox 60, Firefox ESR 60\
670 **CCK2 Equivalent:** `disablePDFjs`\
671 **Preferences Affected:** `pdfjs.disabled`
672
673 #### Windows (GPO)
674 ```
675 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
676 ```
677
678 #### macOS
679 ```
680 <dict>
681 <key>DisableBuiltinPDFViewer</key>
682 <true/> | <false/>
683 </dict>
684 ```
685 #### policies.json
686 ```
687 {
688 "policies": {
689 "DisableBuiltinPDFViewer": true | false
690 }
691 }
692 ```
693 ### DisableDefaultBrowserAgent
694 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
695
696 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
697 **CCK2 Equivalent:** N/A\
698 **Preferences Affected:** N/A
699
700 #### Windows (GPO)
701 ```
702 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
703 ```
704
705 #### policies.json
706 ```
707 {
708 "policies": {
709 "DisableDefaultBrowserAgent": true | false
710 }
711 }
712 ```
713 ### DisableDeveloperTools
714 Remove access to all developer tools.
715
716 **Compatibility:** Firefox 60, Firefox ESR 60\
717 **CCK2 Equivalent:** `removeDeveloperTools`\
718 **Preferences Affected:** `devtools.policy.disabled`
719
720 #### Windows (GPO)
721 ```
722 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
723 ```
724
725 #### macOS
726 ```
727 <dict>
728 <key>DisableDeveloperTools</key>
729 <true/> | <false/>
730 </dict>
731 ```
732 #### policies.json
733 ```
734 {
735 "policies": {
736 "DisableDeveloperTools": true | false
737 }
738 }
739 ```
740 ### DisableFeedbackCommands
741 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
742
743 **Compatibility:** Firefox 60, Firefox ESR 60\
744 **CCK2 Equivalent:** N/A\
745 **Preferences Affected:** N/A
746
747 #### Windows (GPO)
748 ```
749 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
750 ```
751 #### macOS
752 ```
753 <dict>
754 <key>DisableFeedbackCommands</key>
755 <true/> | <false/>
756 </dict>
757 ```
758 #### policies.json
759 ```
760 {
761 "policies": {
762 "DisableFeedbackCommands": true | false
763 }
764 }
765 ```
766 ### DisableFirefoxScreenshots
767 Remove access to Firefox Screenshots.
768
769 **Compatibility:** Firefox 60, Firefox ESR 60\
770 **CCK2 Equivalent:** N/A\
771 **Preferences Affected:** `extensions.screenshots.disabled`
772
773 #### Windows (GPO)
774 ```
775 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
776 ```
777 #### macOS
778 ```
779 <dict>
780 <key>DisableFirefoxScreenshots</key>
781 <true/> | <false/>
782 </dict>
783 ```
784 #### policies.json
785 ```
786 {
787 "policies": {
788 "DisableFirefoxScreenshots": true | false
789 }
790 }
791 ```
792 ### DisableFirefoxAccounts
793 Disable Firefox Accounts integration (Sync).
794
795 **Compatibility:** Firefox 60, Firefox ESR 60\
796 **CCK2 Equivalent:** `disableSync`\
797 **Preferences Affected:** `identity.fxaccounts.enabled`
798
799 #### Windows (GPO)
800 ```
801 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
802 ```
803 #### macOS
804 ```
805 <dict>
806 <key>DisableFirefoxAccounts</key>
807 <true/> | <false/>
808 </dict>
809 ```
810 #### policies.json
811 ```
812 {
813 "policies": {
814 "DisableFirefoxAccounts": true | false
815 }
816 }
817 ```
818 ### DisableFirefoxStudies
819 Disable Firefox studies (Shield).
820
821 **Compatibility:** Firefox 60, Firefox ESR 60\
822 **CCK2 Equivalent:** N/A\
823 **Preferences Affected:** N/A
824
825 #### Windows (GPO)
826 ```
827 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
828 ```
829 #### macOS
830 ```
831 <dict>
832 <key>DisableFirefoxStudies</key>
833 <true/> | <false/>
834 </dict>
835 ```
836 #### policies.json
837 ```
838 {
839 "policies": {
840 "DisableFirefoxStudies": true | false
841 }
842 }
843 ```
844 ### DisableForgetButton
845 Disable the "Forget" button.
846
847 **Compatibility:** Firefox 60, Firefox ESR 60\
848 **CCK2 Equivalent:** `disableForget`\
849 **Preferences Affected:** N/A
850
851 #### Windows (GPO)
852 ```
853 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>DisableForgetButton</key>
859 <true/> | <false/>
860 </dict>
861 ```
862 #### policies.json
863 ```
864 {
865 "policies": {
866 "DisableForgetButton": true | false
867 }
868 }
869 ```
870 ### DisableFormHistory
871 Turn off saving information on web forms and the search bar.
872
873 **Compatibility:** Firefox 60, Firefox ESR 60\
874 **CCK2 Equivalent:** `disableFormFill`\
875 **Preferences Affected:** ` browser.formfill.enable`
876
877 #### Windows (GPO)
878 ```
879 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
880 ```
881 #### macOS
882 ```
883 <dict>
884 <key>DisableFormHistory</key>
885 <true/> | <false/>
886 </dict>
887 ```
888 #### policies.json
889 ```
890 {
891 "policies": {
892 "DisableFormHistory": true | false
893 }
894 }
895 ```
896 ### DisablePasswordReveal
897 Do not allow passwords to be shown in saved logins
898
899 **Compatibility:** Firefox 71, Firefox ESR 68.3\
900 **CCK2 Equivalent:** N/A
901 **Preferences Affected:** N/A
902
903 #### Windows (GPO)
904 ```
905 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
906 ```
907
908 #### macOS
909 ```
910 <dict>
911 <key>DisablePasswordReveal</key>
912 <true/> | <false/>
913 </dict>
914 ```
915 #### policies.json
916 ```
917 {
918 "policies": {
919 "DisablePasswordReveal": true | false
920 }
921 }
922 ```
923 ### DisablePocket
924 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
925
926 **Compatibility:** Firefox 60, Firefox ESR 60\
927 **CCK2 Equivalent:** `disablePocket`\
928 **Preferences Affected:** `extensions.pocket.enabled`
929
930 #### Windows (GPO)
931 ```
932 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
933 ```
934 #### macOS
935 ```
936 <dict>
937 <key>DisablePocket</key>
938 <true/> | <false/>
939 </dict>
940 ```
941 #### policies.json
942 ```
943 {
944 "policies": {
945 "DisablePocket": true | false
946 }
947 }
948 ```
949 ### DisablePrivateBrowsing
950 Remove access to private browsing.
951
952 **Compatibility:** Firefox 60, Firefox ESR 60\
953 **CCK2 Equivalent:** `disablePrivateBrowsing`\
954 **Preferences Affected:** N/A
955
956 #### Windows (GPO)
957 ```
958 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
959 ```
960 #### macOS
961 ```
962 <dict>
963 <key>DisablePrivateBrowsing</key>
964 <true/> | <false/>
965 </dict>
966 ```
967 #### policies.json
968 ```
969 {
970 "policies": {
971 "DisablePrivateBrowsing": true | false
972 }
973 }
974 ```
975 ### DisableProfileImport
976 Disables the "Import data from another browser" option in the bookmarks window.
977
978 **Compatibility:** Firefox 60, Firefox ESR 60\
979 **CCK2 Equivalent:** N/A\
980 **Preferences Affected:** N/A
981
982 #### Windows (GPO)
983 ```
984 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
985 ```
986 #### macOS
987 ```
988 <dict>
989 <key>DisableProfileImport</key>
990 <true/> | <false/>
991 </dict>
992 ```
993 #### policies.json
994 ```
995 {
996 "policies": {
997 "DisableProfileImport": true | false
998 }
999 }
1000 ```
1001 ### DisableProfileRefresh
1002 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1003
1004 **Compatibility:** Firefox 60, Firefox ESR 60\
1005 **CCK2 Equivalent:** `disableResetFirefox`\
1006 **Preferences Affected:** `browser.disableResetPrompt`
1007
1008 #### Windows (GPO)
1009 ```
1010 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1011 ```
1012 #### macOS
1013 ```
1014 <dict>
1015 <key>DisableProfileRefresh</key>
1016 <true/> | <false/>
1017 </dict>
1018 ```
1019 #### policies.json
1020 ```
1021 {
1022 "policies": {
1023 "DisableProfileRefresh": true | false
1024 }
1025 }
1026 ```
1027 ### DisableSafeMode
1028 Disable safe mode within the browser.
1029
1030 On Windows, this disables safe mode via the command line as well.
1031
1032 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1033 **CCK2 Equivalent:** `disableSafeMode`\
1034 **Preferences Affected:** N/A
1035
1036 #### Windows (GPO)
1037 ```
1038 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1039 ```
1040 #### macOS
1041 ```
1042 <dict>
1043 <key>DisableSafeMode</key>
1044 <true/> | <false/>
1045 </dict>
1046 ```
1047 #### policies.json
1048 ```
1049 {
1050 "policies": {
1051 "DisableSafeMode": true | false
1052 }
1053 }
1054 ```
1055 ### DisableSecurityBypass
1056 Prevent the user from bypassing security in certain cases.
1057
1058 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1059
1060 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1061
1062 **Compatibility:** Firefox 60, Firefox ESR 60\
1063 **CCK2 Equivalent:** N/A\
1064 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1065
1066 #### Windows (GPO)
1067 ```
1068 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1069 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1070 ```
1071 #### macOS
1072 ```
1073 <dict>
1074 <key>DisableSecurityBypass</key>
1075 <dict>
1076 <key>InvalidCertificate</key>
1077 <true/> | <false/>
1078 <key><SafeBrowsing/key>
1079 <true/> | <false/>
1080 </dict>
1081 </dict>
1082 ```
1083 #### policies.json
1084 ```
1085 {
1086 "policies": {
1087 "DisableSecurityBypass": {
1088 "InvalidCertificate": true false,
1089 "SafeBrowsing": true false
1090 }
1091 }
1092 }
1093 ```
1094 ### DisableSystemAddonUpdate
1095 Prevent system add-ons from being installed or update.
1096
1097 **Compatibility:** Firefox 60, Firefox ESR 60\
1098 **CCK2 Equivalent:** N/A\
1099 **Preferences Affected:** N/A
1100
1101 #### Windows (GPO)
1102 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1103 ```
1104 #### macOS
1105 ```
1106 <dict>
1107 <key>DisableSystemAddonUpdate</key>
1108 <true/> | <false/>
1109 </dict>
1110 ```
1111 #### policies.json
1112 ```
1113 {
1114 "policies": {
1115 "DisableSystemAddonUpdate": true | false
1116 }
1117 }
1118 ```
1119 ### DisableTelemetry
1120 Prevent the upload of telemetry data.
1121
1122 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1123
1124 **Compatibility:** Firefox 60, Firefox ESR 60\
1125 **CCK2 Equivalent:** `disableTelemetry`\
1126 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1127
1128 #### Windows (GPO)
1129 ```
1130 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1131 ```
1132 #### macOS
1133 ```
1134 <dict>
1135 <key>DisableTelemetry</key>
1136 <true/> | <false/>
1137 </dict>
1138 ```
1139 #### policies.json
1140 ```
1141 {
1142 "policies": {
1143 "DisableTelemetry": true | false
1144 }
1145 }
1146 ```
1147 ### DisplayBookmarksToolbar
1148 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1149
1150 **Compatibility:** Firefox 60, Firefox ESR 60\
1151 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1152 **Preferences Affected:** N/A
1153
1154 #### Windows (GPO)
1155 ```
1156 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1157 ```
1158 #### macOS
1159 ```
1160 <dict>
1161 <key>DisplayBookmarksToolbar</key>
1162 <true/> | <false/>
1163 </dict>
1164 ```
1165 #### policies.json
1166 ```
1167 {
1168 "policies": {
1169 "DisplayBookmarksToolbar": true | false
1170 }
1171 }
1172 ```
1173 ### DisplayMenuBar (Deprecated)
1174 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1175
1176 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1177 **CCK2 Equivalent:** `displayMenuBar`\
1178 **Preferences Affected:** N/A
1179
1180 #### Windows (GPO)
1181 ```
1182 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1183 ```
1184 #### macOS
1185 ```
1186 <dict>
1187 <key>DisplayMenuBar</key>
1188 <true/> | <false/>
1189 </dict>
1190 ```
1191 #### policies.json
1192 ```
1193 {
1194 "policies": {
1195 "DisplayMenuBar": true | false
1196 }
1197 }
1198 ```
1199 ### DisplayMenuBar
1200 Set the state of the menubar.
1201
1202 `always` means the menubar is shown and cannot be hidden.
1203
1204 `never` means the menubar is hidden and cannot be shown.
1205
1206 `default-on` means the menubar is on by default but can be hidden.
1207
1208 `default-off` means the menubar is off by default but can be shown.
1209
1210 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1211 **CCK2 Equivalent:** `displayMenuBar`\
1212 **Preferences Affected:** N/A
1213
1214 #### Windows (GPO)
1215 ```
1216 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1217 ```
1218 #### macOS
1219 ```
1220 <dict>
1221 <key>DisplayMenuBar</key>
1222 <string>always | never | default-on | default-off</string>
1223 </dict>
1224 ```
1225 #### policies.json
1226 ```
1227 {
1228 "policies": {
1229 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1230 }
1231 }
1232 ```
1233 ### DNSOverHTTPS
1234 Configure DNS over HTTPS.
1235
1236 `Enabled` determines whether DNS over HTTPS is enabled
1237
1238 `ProviderURL` is a URL to another provider.
1239
1240 `Locked` prevents the user from changing DNS over HTTPS preferences.
1241
1242 `ExcludedDomains` excludes domains from DNS over HTTPS.
1243
1244 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1245 **CCK2 Equivalent:** N/A\
1246 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1247
1248 #### Windows (GPO)
1249 ```
1250 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1251 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1252 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1253 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1254 ```
1255 #### macOS
1256 ```
1257 <dict>
1258 <key>DNSOverHTTPS</key>
1259 <dict>
1260 <key>Enabled</key>
1261 <true/> | <false/>
1262 <key>ProviderURL</key>
1263 <string>URL_TO_ALTERNATE_PROVIDER</string>
1264 <key>Locked</key>
1265 <true/> | <false/>
1266 <key>ExcludedDomains</key>
1267 <array>
1268 <string>example.com</string>
1269 </array>
1270 </dict>
1271 </dict>
1272 ```
1273 #### policies.json
1274 ```
1275 {
1276 "policies": {
1277 "DNSOverHTTPS": {
1278 "Enabled": true | false,
1279 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1280 "Locked": true | false,
1281 "ExcludedDomains": ["example.com"]
1282 }
1283 }
1284 }
1285 ```
1286 ### DontCheckDefaultBrowser
1287 Don't check if Firefox is the default browser at startup.
1288
1289 **Compatibility:** Firefox 60, Firefox ESR 60\
1290 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1291 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1292
1293 #### Windows (GPO)
1294 ```
1295 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1296 ```
1297 #### macOS
1298 ```
1299 <dict>
1300 <key>DontCheckDefaultBrowser</key>
1301 <true/> | <false/>
1302 </dict>
1303 ```
1304 #### policies.json
1305 ```
1306 {
1307 "policies": {
1308 "DontCheckDefaultBrowser": true | false
1309 }
1310 }
1311 ```
1312 ### DefaultDownloadDirectory
1313 Set the default download directory.
1314
1315 You can use ${home} for the native home directory.
1316
1317 **Compatibility:** Firefox 68, Firefox ESR 68\
1318 **CCK2 Equivalent:** N/A\
1319 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1320
1321 #### Windows (GPO)
1322 ```
1323 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1324 ```
1325 #### macOS
1326 ```
1327 <dict>
1328 <key>DefaultDownloadDirectory</key>
1329 <string>${home}/Downloads</string>
1330 </dict>
1331 ```
1332 #### policies.json (macOS and Linux)
1333 ```
1334 {
1335 "policies": {
1336 "DefaultDownloadDirectory": "${home}/Downloads"
1337 }
1338 ```
1339 #### policies.json (Windows)
1340 ```
1341 {
1342 "policies": {
1343 "DefaultDownloadDirectory": "${home}\\Downloads"
1344 }
1345 ```
1346 ### DownloadDirectory
1347 Set and lock the download directory.
1348
1349 You can use ${home} for the native home directory.
1350
1351 **Compatibility:** Firefox 68, Firefox ESR 68\
1352 **CCK2 Equivalent:** N/A\
1353 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1354
1355 #### Windows (GPO)
1356 ```
1357 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1358 ```
1359 #### macOS
1360 ```
1361 <dict>
1362 <key>DownloadDirectory</key>
1363 <string>${home}/Downloads</string>
1364 </dict>
1365 ```
1366 #### policies.json (macOS and Linux)
1367 ```
1368 {
1369 "policies": {
1370 "DownloadDirectory": "${home}/Downloads"
1371 }
1372 ```
1373 #### policies.json (Windows)
1374 ```
1375 {
1376 "policies": {
1377 "DownloadDirectory": "${home}\\Downloads"
1378 }
1379 ```
1380 ### EnableTrackingProtection
1381 Configure tracking protection.
1382
1383 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1384
1385 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1386
1387 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1388
1389 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1390
1391 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1392
1393 `Exceptions` are origins for which tracking protection is not enabled.
1394
1395 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1396 **CCK2 Equivalent:** N/A\
1397 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1398
1399 #### Windows (GPO)
1400 ```
1401 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1402 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1403 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1404 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1405 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1406 ```
1407 #### macOS
1408 ```
1409 <dict>
1410 <key>EnableTrackingProtection</key>
1411 <dict>
1412 <key>Value</key>
1413 <true/> | <false/>
1414 <key><Locked</key>
1415 <true/> | <false/>
1416 <key><Cryptomining</key>
1417 <true/> | <false/>
1418 <key><Fingerprinting</key>
1419 <true/> | <false/>
1420 <key>Exceptions</key>
1421 <array>
1422 <string>https://example.com</string>
1423 </array>
1424 </dict>
1425 </dict>
1426 ```
1427 #### policies.json
1428 ```
1429 {
1430 "policies": {
1431 "EnableTrackingProtection": {
1432 "Value": [true, false],
1433 "Locked": [true, false],
1434 "Cryptomining": [true, false],
1435 "Fingerprinting": [true, false],
1436 "Exceptions": ["https://example.com"]
1437 }
1438 }
1439 ```
1440 ### EnterprisePoliciesEnabled
1441 Enable policy support on macOS.
1442
1443 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1444 **CCK2 Equivalent:** N/A\
1445 **Preferences Affected:** N/A
1446
1447 #### macOS
1448 ```
1449 <dict>
1450 <key>EnterprisePoliciesEnabled</key>
1451 <true/>
1452 </dict>
1453 ```
1454 ### Extensions
1455 Control the installation, uninstallation and locking of extensions.
1456
1457 `Install` is a list of URLs or native paths for extensions to be installed.
1458
1459 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1460
1461 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1462
1463 **Compatibility:** Firefox 60, Firefox ESR 60\
1464 **CCK2 Equivalent:** `addons`\
1465 **Preferences Affected:** N/A
1466
1467 #### Windows (GPO)
1468 ```
1469 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1470 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1471 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1472 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1473 ```
1474 #### macOS
1475 ```
1476 <dict>
1477 <key>Extensions</key>
1478 <dict>
1479 <key>Install</key>
1480 <array>
1481 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1482 <string>//path/to/xpi</string>
1483 </array>
1484 <key>Uninstall</key>
1485 <array>
1486 <string>bad_addon_id@mozilla.org</string>
1487 </array>
1488 <key>Locked</key>
1489 <array>
1490 <string>addon_id@mozilla.org</string>
1491 </array>
1492 </dict>
1493 </dict>
1494 ```
1495 #### policies.json
1496 ```
1497 {
1498 "policies": {
1499 "Extensions": {
1500 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1501 "Uninstall": ["bad_addon_id@mozilla.org"],
1502 "Locked": ["addon_id@mozilla.org"]
1503 }
1504 }
1505 }
1506 ```
1507 ### ExtensionSettings
1508 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1509
1510 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1511
1512 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1513
1514 The configuration for each extension is another dictionary that can contain the fields documented below.
1515
1516 | Name | Description |
1517 | --- | --- |
1518 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1519 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1520 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1521 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1522 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1523 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1524 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1525 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1526 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1527
1528 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1529 **CCK2 Equivalent:** N/A\
1530 **Preferences Affected:** N/A
1531
1532 #### Windows (GPO)
1533 ```
1534 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1535 {
1536 "*": {
1537 "blocked_install_message": "Custom error message.",
1538 "install_sources": ["https://addons.mozilla.org/"],
1539 "installation_mode": "blocked",
1540 "allowed_types": ["extension"]
1541 },
1542 "uBlock0@raymondhill.net": {
1543 "installation_mode": "force_installed",
1544 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1545 }
1546 }
1547 ```
1548 #### macOS
1549 ```
1550 <dict>
1551 <key>ExtensionSettings</key>
1552 <dict>
1553 <key>*</key>
1554 <dict>
1555 <key>blocked_install_message</key>
1556 <string>Custom error message.</string>
1557 <key>install_sources</key>
1558 <array>
1559 <string>https://addons.mozilla.org/</string>
1560 </array>
1561 <key>installation_mode</key>
1562 <string>blocked</string>
1563 <key>allowed_types</key>
1564 <array>
1565 <string>extension</string>
1566 </array>
1567 </dict>
1568 <key>uBlock0@raymondhill.net</key>
1569 <dict>
1570 <key>installation_mode</key>
1571 <string>force_installed</string>
1572 <key>install_url</key>
1573 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1574 </dict>
1575 </dict>
1576 </dict>
1577 ```
1578 #### policies.json
1579 ```
1580 {
1581 "policies": {
1582 "ExtensionSettings": {
1583 "*": {
1584 "blocked_install_message": "Custom error message.",
1585 "install_sources": ["https://addons.mozilla.org/"],
1586 "installation_mode": "blocked",
1587 "allowed_types": ["extension"]
1588 },
1589 "uBlock0@raymondhill.net": {
1590 "installation_mode": "force_installed",
1591 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1592 }
1593 }
1594 }
1595 }
1596 ```
1597 ### ExtensionUpdate
1598 Control extension updates.
1599
1600 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1601 **CCK2 Equivalent:** N/A\
1602 **Preferences Affected:** `extensions.update.enabled`
1603
1604 #### Windows (GPO)
1605 ```
1606 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1607 ```
1608 #### macOS
1609 ```
1610 <dict>
1611 <key>ExtensionUpdate</key>
1612 <true/> | <false/>
1613 </dict>
1614 ```
1615 #### policies.json
1616 ```
1617 {
1618 "policies": {
1619 "ExtensionUpdate": true | false
1620 }
1621 }
1622 ```
1623 ### FlashPlugin
1624 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1625
1626 `Allow` is a list of origins where Flash are allowed.
1627
1628 `Block` is a list of origins where Flash is not allowed.
1629
1630 `Default` determines whether or not Flash is allowed by default.
1631
1632 `Locked` prevents the user from changing Flash preferences.
1633
1634 **Compatibility:** Firefox 60, Firefox ESR 60\
1635 **CCK2 Equivalent:** `permissions.plugin`\
1636 **Preferences Affected:** `plugin.state.flash`
1637
1638 #### Windows (GPO)
1639 ```
1640 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1641 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1642 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1643 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>FlashPlugin</key>
1649 <dict>
1650 <key>Allow</key>
1651 <array>
1652 <string>http://example.org</string>
1653 </array>
1654 <key>Block</key>
1655 <array>
1656 <string>http://example.edu</string>
1657 </array>
1658 <key>Default</key>
1659 <true/> | <false/>
1660 <key>Locked</key>
1661 <true/> | <false/>
1662 </dict>
1663 </dict>
1664 ```
1665 #### policies.json
1666 ```
1667 {
1668 "policies": {
1669 "FlashPlugin": {
1670 "Allow": ["http://example.org/"],
1671 "Block": ["http://example.edu/"],
1672 "Default": true | false,
1673 "Locked": true | false
1674 }
1675 }
1676 }
1677 ```
1678 ### FirefoxHome
1679 Customize the Firefox Home page.
1680
1681 **Compatibility:** Firefox 68, Firefox ESR 68\
1682 **CCK2 Equivalent:** N/A\
1683 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1684
1685 #### Windows (GPO)
1686 ```
1687 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1688 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1689 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1690 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1691 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1692 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1693 ```
1694 #### macOS
1695 ```
1696 <dict>
1697 <key>FirefoxHome</key>
1698 <dict>
1699 <key>Search</key>
1700 <true/> | <false/>
1701 <key>TopSites</key>
1702 <true/> | <false/>
1703 <key>Highlights</key>
1704 <true/> | <false/>
1705 <key>Pocket</key>
1706 <true/> | <false/>
1707 <key>Snippets</key>
1708 <true/> | <false/>
1709 <key>Locked</key>
1710 <true/> | <false/>
1711 </dict>
1712 </dict>
1713 ```
1714 #### policies.json
1715 ```
1716 {
1717 "policies": {
1718 "FirefoxHome": {
1719 "Search": true | false,
1720 "TopSites": true | false,
1721 "Highlights": true | false,
1722 "Pocket": true | false,
1723 "Snippets": true | false,
1724 "Locked": true | false
1725 }
1726 }
1727 }
1728 ```
1729 ### HardwareAcceleration
1730 Control hardware acceleration.
1731
1732 **Compatibility:** Firefox 60, Firefox ESR 60\
1733 **CCK2 Equivalent:** N/A\
1734 **Preferences Affected:** `layers.acceleration.disabled`
1735
1736 #### Windows (GPO)
1737 ```
1738 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1739 ```
1740 #### macOS
1741 ```
1742 <dict>
1743 <key>HardwareAcceleration</key>
1744 <true/> | <false/>
1745 </dict>
1746 ```
1747 #### policies.json
1748 ```
1749 {
1750 "policies": {
1751 "HardwareAcceleration": true | false
1752 }
1753 }
1754 ```
1755 ### Homepage
1756 Configure the default homepage and how Firefox starts.
1757
1758 `URL` is the default homepage.
1759
1760 `Locked` prevents the user from changing homepage preferences.
1761
1762 `Additional` allows for more than one homepage.
1763
1764 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1765
1766 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1767 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1768 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1769
1770 #### Windows (GPO)
1771 ```
1772 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1773 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1774 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1775 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1776 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1777 ```
1778 #### macOS
1779 ```
1780 <dict>
1781 <key>Homepage</key>
1782 <dict>
1783 <key>URL</key>
1784 <string>http://example.com</string>
1785 <key>Locked</key>
1786 <true/> | <false/>
1787 <key>Additional</key>
1788 <array>
1789 <string>http://example.org</string>
1790 <string>http://example.edu</string>
1791 </array>
1792 <key>StartPage</key>
1793 <string>none | homepage | previous-session</string>
1794 </dict>
1795 </dict>
1796 ```
1797 #### policies.json
1798 ```
1799 {
1800 "policies": {
1801 "Homepage": {
1802 "URL": "http://example.com/",
1803 "Locked": true | false,
1804 "Additional": ["http://example.org/",
1805 "http://example.edu/"],
1806 "StartPage": "none" | "homepage" | "previous-session"
1807 }
1808 }
1809 }
1810 ```
1811 ### InstallAddonsPermission
1812 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1813
1814 `Allow` is a list of origins where extension installs are allowed.
1815
1816 `Default` determines whether or not extension installs are allowed by default.
1817
1818 **Compatibility:** Firefox 60, Firefox ESR 60\
1819 **CCK2 Equivalent:** `permissions.install`\
1820 **Preferences Affected:** `xpinstall.enabled`
1821
1822 #### Windows (GPO)
1823 ```
1824 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1825 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1826 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>InstallAddonsPermission</key>
1832 <dict>
1833 <key>Allow</key>
1834 <array>
1835 <string>http://example.org</string>
1836 <string>http://example.edu</string>
1837 </array>
1838 <key>Default</key>
1839 <true/> | <false/>
1840 </dict>
1841 </dict>
1842 ```
1843 #### policies.json
1844 ```
1845 {
1846 "policies": {
1847 "InstallAddonsPermission": {
1848 "Allow": ["http://example.org/",
1849 "http://example.edu/"],
1850 "Default": true | false
1851 }
1852 }
1853 }
1854 ```
1855 ### LegacyProfiles
1856 Disable the feature enforcing a separate profile for each installation.
1857
1858 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1859
1860 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1861
1862 This policy only work on Windows via GPO (not policies.json).
1863
1864 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1865 **CCK2 Equivalent:** N/A\
1866 **Preferences Affected:** N/A
1867
1868 #### Windows (GPO)
1869 ```
1870 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1871 ```
1872 ### LocalFileLinks
1873 Enable linking to local files by origin.
1874
1875 **Compatibility:** Firefox 68, Firefox ESR 68\
1876 **CCK2 Equivalent:** N/A\
1877 **Preferences Affected:** `capability.policy.localfilelinks.*`
1878
1879 #### Windows (GPO)
1880 ```
1881 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1882 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1883 ```
1884 #### macOS
1885 ```
1886 <dict>
1887 <key>LocalFileLinks</key>
1888 <array>
1889 <string>http://example.org</string>
1890 <string>http://example.edu</string>
1891 </array>
1892 </dict>
1893 ```
1894 #### policies.json
1895 ```
1896 {
1897 "policies": {
1898 "LocalFileLinks": ["http://example.org/",
1899 "http://example.edu/"]
1900 }
1901 }
1902 ```
1903 ### NoDefaultBookmarks
1904 Disable the creation of default bookmarks.
1905
1906 This policy is only effective if the user profile has not been created yet.
1907
1908 **Compatibility:** Firefox 60, Firefox ESR 60\
1909 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1910 **Preferences Affected:** N/A
1911
1912 #### Windows (GPO)
1913 ```
1914 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1915 ```
1916 #### macOS
1917 ```
1918 <dict>
1919 <key>NoDefaultBookmarks</key>
1920 <true/> | <false/>
1921 </dict>
1922 ```
1923 #### policies.json
1924 ```
1925 {
1926 "policies": {
1927 "NoDefaultBookmarks": true | false
1928 }
1929 }
1930 ```
1931 ### NetworkPrediction
1932 Enable or disable network prediction (DNS prefetching).
1933
1934 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1935 **CCK2 Equivalent:** N/A\
1936 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1937
1938 #### Windows (GPO)
1939 ```
1940 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1941 ```
1942 #### macOS
1943 ```
1944 <dict>
1945 <key>NetworkPrediction</key>
1946 <true/> | <false/>
1947 </dict>
1948 ```
1949 #### policies.json
1950 ```
1951 {
1952 "policies": {
1953 "NetworkPrediction": true | false
1954 }
1955 ```
1956 ### NewTabPage
1957 Enable or disable the New Tab page.
1958
1959 **Compatibility:** Firefox 68, Firefox ESR 68\
1960 **CCK2 Equivalent:** N/A\
1961 **Preferences Affected:** `browser.newtabpage.enabled`
1962
1963 #### Windows (GPO)
1964 ```
1965 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1966 ```
1967 #### macOS
1968 ```
1969 <dict>
1970 <key>NewTabPage</key>
1971 <true/> | <false/>
1972 </dict>
1973 ```
1974 #### policies.json
1975 ```
1976 {
1977 "policies": {
1978 "NewTabPage": true | false
1979 }
1980 ```
1981 ### OfferToSaveLogins
1982 Control whether or not Firefox offers to save passwords.
1983
1984 **Compatibility:** Firefox 60, Firefox ESR 60\
1985 **CCK2 Equivalent:** `dontRememberPasswords`\
1986 **Preferences Affected:** `signon.rememberSignons`
1987
1988 #### Windows (GPO)
1989 ```
1990 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1991 ```
1992 #### macOS
1993 ```
1994 <dict>
1995 <key>OfferToSaveLogins</key>
1996 <true/> | <false/>
1997 </dict>
1998 ```
1999 #### policies.json
2000 ```
2001 {
2002 "policies": {
2003 "OfferToSaveLogins": true | false
2004 }
2005 }
2006 ```
2007 ### OfferToSaveLoginsDefault
2008 Sets the default value of signon.rememberSignons without locking it.
2009
2010 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2011 **CCK2 Equivalent:** `dontRememberPasswords`\
2012 **Preferences Affected:** `signon.rememberSignons`
2013
2014 #### Windows (GPO)
2015 ```
2016 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
2017 ```
2018 #### macOS
2019 ```
2020 <dict>
2021 <key>OfferToSaveLoginsDefault</key>
2022 <true/> | <false/>
2023 </dict>
2024 ```
2025 #### policies.json
2026 ```
2027 {
2028 "policies": {
2029 "OfferToSaveLoginsDefault": true | false
2030 }
2031 }
2032 ```
2033 ### OverrideFirstRunPage
2034 Override the first run page. If the value is blank, no first run page is displayed.
2035
2036 **Compatibility:** Firefox 60, Firefox ESR 60\
2037 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2038 **Preferences Affected:** `startup.homepage_welcome_url`
2039
2040 #### Windows (GPO)
2041 ```
2042 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2043 ```
2044 #### macOS
2045 ```
2046 <dict>
2047 <key>OverrideFirstRunPage</key>
2048 <string>http://example.org</string>
2049 </dict>
2050 ```
2051 #### policies.json
2052 ```
2053 {
2054 "policies": {
2055 "OverrideFirstRunPage": "http://example.org"
2056 }
2057 ```
2058 ### OverridePostUpdatePage
2059 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2060
2061 **Compatibility:** Firefox 60, Firefox ESR 60\
2062 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2063 **Preferences Affected:** `startup.homepage_override_url`
2064
2065 #### Windows (GPO)
2066 ```
2067 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2068 ```
2069 #### macOS
2070 ```
2071 <dict>
2072 <key>OverridePostUpdatePage</key>
2073 <string>http://example.org</string>
2074 </dict>
2075 ```
2076 #### policies.json
2077 ```
2078 {
2079 "policies": {
2080 "OverridePostUpdatePage": "http://example.org"
2081 }
2082 ```
2083 ### PasswordManagerEnabled
2084 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2085
2086 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2087 **CCK2 Equivalent:** N/A\
2088 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2089
2090 #### Windows (GPO)
2091 ```
2092 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2093 ```
2094 #### macOS
2095 ```
2096 <dict>
2097 <key>PasswordManagerEnabled</key>
2098 <true/> | <false/>
2099 </dict>
2100 ```
2101 #### policies.json
2102 ```
2103 {
2104 "policies": {
2105 "PasswordManagerEnabled": true | false
2106 }
2107 }
2108 ```
2109 ### Permissions
2110 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2111
2112 `Allow` is a list of origins where the feature is allowed.
2113
2114 `Block` is a list of origins where the feature is not allowed.
2115
2116 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2117
2118 `Locked` prevents the user from changing preferences for the feature.
2119
2120 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
2121
2122 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
2123 **CCK2 Equivalent:** N/A\
2124 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
2125
2126 #### Windows (GPO)
2127 ```
2128 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2129 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2130 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2131 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2132 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2133 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2134 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2135 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2136 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2137 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2138 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2139 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2140 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2141 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2142 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2143 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2144 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2145 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2146 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2147 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
2148 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
2149 ```
2150 #### macOS
2151 ```
2152 <dict>
2153 <key>Permissions</key>
2154 <dict>
2155 <key>Camera</key>
2156 <dict>
2157 <key>Allow</key>
2158 <array>
2159 <string>https://example.org</string>
2160 <string>https://example.org:1234</string>
2161 </array>
2162 <key>Block</key>
2163 <array>
2164 <string>https://example.edu</string>
2165 </array>
2166 <key>BlockNewRequests</key>
2167 <true/> | <false/>
2168 <key>Locked</key>
2169 <true/> | <false/>
2170 </dict>
2171 <key>Microphone</key>
2172 <dict>
2173 <key>Allow</key>
2174 <array>
2175 <string>https://example.org</string>
2176 </array>
2177 <key>Block</key>
2178 <array>
2179 <string>https://example.edu</string>
2180 </array>
2181 <key>BlockNewRequests</key>
2182 <true/> | <false/>
2183 <key>Locked</key>
2184 <true/> | <false/>
2185 </dict>
2186 <key>Location</key>
2187 <dict>
2188 <key>Allow</key>
2189 <array>
2190 <string>https://example.org</string>
2191 </array>
2192 <key>Block</key>
2193 <array>
2194 <string>https://example.edu</string>
2195 </array>
2196 <key>BlockNewRequests</key>
2197 <true/> | <false/>
2198 <key>Locked</key>
2199 <true/> | <false/>
2200 </dict>
2201 <key>Notifications</key>
2202 <dict>
2203 <key>Allow</key>
2204 <array>
2205 <string>https://example.org</string>
2206 </array>
2207 <key>Block</key>
2208 <array>
2209 <string>https://example.edu</string>
2210 </array>
2211 <key>BlockNewRequests</key>
2212 <true/>
2213 <key>Locked</key>
2214 <true/>
2215 </dict>
2216 <key>Autoplay</key>
2217 <dict>
2218 <key>Allow</key>
2219 <array>
2220 <string>https://example.org</string>
2221 </array>
2222 <key>Block</key>
2223 <array>
2224 <string>https://example.edu</string>
2225 </array>
2226 <key>Default</key>
2227 <string>allow-audio-video | block-audio | block-audio-video</string>
2228 <key>Locked</key>
2229 <true/> | <false/>
2230 </dict>
2231 </dict>
2232 </dict>
2233 ```
2234 #### policies.json
2235 ```
2236 {
2237 "policies": {
2238 "Permissions": {
2239 "Camera": {
2240 "Allow": ["https://example.org","https://example.org:1234"],
2241 "Block": ["https://example.edu"],
2242 "BlockNewRequests": true | false,
2243 "Locked": true | false
2244 },
2245 "Microphone": {
2246 "Allow": ["https://example.org"],
2247 "Block": ["https://example.edu"],
2248 "BlockNewRequests": true | false,
2249 "Locked": true | false
2250 },
2251 "Location": {
2252 "Allow": ["https://example.org"],
2253 "Block": ["https://example.edu"],
2254 "BlockNewRequests": true | false,
2255 "Locked": true | false
2256 },
2257 "Notifications": {
2258 "Allow": ["https://example.org"],
2259 "Block": ["https://example.edu"],
2260 "BlockNewRequests": true | false,
2261 "Locked": true | false
2262 },
2263 "Autoplay": {
2264 "Allow": ["https://example.org"],
2265 "Block": ["https://example.edu"],
2266 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
2267 "Locked": true | false
2268 }
2269 }
2270 }
2271 }
2272 ```
2273 ### PopupBlocking
2274 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2275
2276 `Allow` is a list of origins where popup-windows are allowed.
2277
2278 `Default` determines whether or not pop-up windows are allowed by default.
2279
2280 `Locked` prevents the user from changing pop-up preferences.
2281
2282 **Compatibility:** Firefox 60, Firefox ESR 60\
2283 **CCK2 Equivalent:** `permissions.popup`\
2284 **Preferences Affected:** `dom.disable_open_during_load`
2285
2286 #### Windows (GPO)
2287 ```
2288 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2289 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2290 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2291 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2292 ```
2293 #### macOS
2294 ```
2295 <dict>
2296 <key>PopupBlocking</key>
2297 <dict>
2298 <key>Allow</key>
2299 <array>
2300 <string>http://example.org</string>
2301 <string>http://example.edu</string>
2302 </array>
2303 <key>Default</key>
2304 <true/> | <false/>
2305 <key>Locked</key>
2306 <true/> | <false/>
2307 </dict>
2308 </dict>
2309 ```
2310 #### policies.json
2311 ```
2312 {
2313 "policies": {
2314 "PopupBlocking": {
2315 "Allow": ["http://example.org/",
2316 "http://example.edu/"],
2317 "Default": true | false,
2318 "Locked": true | false
2319 }
2320 }
2321 }
2322 ```
2323 ### Preferences
2324 Set and lock certain preferences.
2325
2326 **Compatibility:** See below\
2327 **CCK2 Equivalent:** `preferences`\
2328 **Preferences Affected:** See below
2329
2330 | Preference | Type | Compatibility | Default
2331 | --- | --- | --- | ---
2332 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2333 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2334 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2335 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2336 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2337 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2338 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2339 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2340 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2341 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2342 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2343 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2344 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2345 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2346 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2347 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2348 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2349 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2350 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2351 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2352 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2353 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2354 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2355 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2356 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2357 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2358 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2359 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2360 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2361 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2362 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2363 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2364 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2365 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2366 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2367 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2368 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2369 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2370 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2371 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2372 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2373 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2374 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2376 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2377 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2378 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2379 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2380 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2381 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2382 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2383 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2384 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2385 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2386 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2387 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2388 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2389 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2390 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2391 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2392 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2393 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2394 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2395 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2396 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2397 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2398 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2399 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2400 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2401 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2402 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2403 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2404 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2405 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2406 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2407 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2408 disabled
2409 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2410 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2411 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2412 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2413 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2414 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2415 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2416 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2417 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2418 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2419 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2420 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2421 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
2422 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2423 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2424 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2425 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2426 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2427 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2428 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2429 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2430 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2431 #### Windows (GPO)
2432 ```
2433 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2434 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2435 ```
2436 #### macOS
2437 ```
2438 <dict>
2439 <key>Preferences</key>
2440 <dict>
2441 <key>boolean_preference_name</key>
2442 <true/> | <false/>
2443 <key>string_preference_name</key>
2444 <string>string_value</string>
2445 </dict>
2446 </dict>
2447 ```
2448 #### policies.json
2449 ```
2450 {
2451 "policies": {
2452 "Preferences": {
2453 "boolean_preference_name": true | false,
2454 "string_preference_name": "string_value"
2455 }
2456 }
2457 }
2458 ```
2459 ### PromptForDownloadLocation
2460 Ask where to save each file before downloading.
2461
2462 **Compatibility:** Firefox 68, Firefox ESR 68\
2463 **CCK2 Equivalent:** N/A\
2464 **Preferences Affected:** `browser.download.useDownloadDir`
2465
2466 #### Windows (GPO)
2467 ```
2468 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2469 ```
2470 #### macOS
2471 ```
2472 <dict>
2473 <key>PromptForDownloadLocation</key>
2474 <true/> | <false/>
2475 </dict>
2476 ```
2477 #### policies.json
2478 ```
2479 {
2480 "policies": {
2481 "PromptForDownloadLocation": true | false
2482 }
2483 }
2484 ```
2485 ### Proxy
2486 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2487 To specify ports, append them to the hostnames with a colon (:).
2488
2489 `Mode` is the proxy method being used.
2490
2491 `Locked` is whether or not proxy settings can be changed.
2492
2493 `HTTPProxy` is the HTTP proxy server.
2494
2495 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2496
2497 `SSLProxy` is the SSL proxy server.
2498
2499 `FTPProxy` is the FTP proxy server.
2500
2501 `SOCKSProxy` is the SOCKS proxy server
2502
2503 `SOCKSVersion` is the SOCKS version (4 or 5)
2504
2505 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2506
2507 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2508
2509 `AutoLogin` means do not prompt for authentication if password is saved.
2510
2511 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2512
2513 **Compatibility:** Firefox 60, Firefox ESR 60\
2514 **CCK2 Equivalent:** `networkProxy*`\
2515 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2516
2517 #### Windows (GPO)
2518 ```
2519 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2520 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2521 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2522 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2523 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2524 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2525 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2526 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2527 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2528 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2529 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2530 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2531 ```
2532 #### macOS
2533 ```
2534 <dict>
2535 <key>Proxy</key>
2536 <dict>
2537 <key>Mode</key>
2538 <string>none | system | manual | autoDetect | autoConfig</string>
2539 <key>Locked</key>
2540 <true> | </false>
2541 <key>HTTPProxy</key>
2542 <string>https://httpproxy.example.com</string>
2543 <key>UseHTTPProxyForAllProtocols</key>
2544 <true> | </false>
2545 <key>SSLProxy</key>
2546 <string>https://sslproxy.example.com</string>
2547 <key>FTPProxy</key>
2548 <string>https://ftpproxy.example.com</string>
2549 <key>SOCKSProxy</key>
2550 <string>https://socksproxy.example.com</string>
2551 <key>SOCKSVersion</key>
2552 <string>4 | 5</string>
2553 <key>Passthrough</key>
2554 <string>&lt;local>&gt;</string>
2555 <key>AutoConfigURL</key>
2556 <string>URL_TO_AUTOCONFIG</string>
2557 <key>AutoLogin</key>
2558 <true> | </false>
2559 <key>UseProxyForDNS</key>
2560 <true> | </false>
2561 </dict>
2562 </dict>
2563 ```
2564 #### policies.json
2565 ```
2566 {
2567 "policies": {
2568 "Proxy": {
2569 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2570 "Locked": [true, false],
2571 "HTTPProxy": "hostname",
2572 "UseHTTPProxyForAllProtocols": [true, false],
2573 "SSLProxy": "hostname",
2574 "FTPProxy": "hostname",
2575 "SOCKSProxy": "hostname",
2576 "SOCKSVersion": 4 | 5
2577 "Passthrough": "<local>",
2578 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2579 "AutoLogin": [true, false],
2580 "UseProxyForDNS": [true, false]
2581 }
2582 }
2583 }
2584 ```
2585 ### RequestedLocales
2586 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2587
2588 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2589
2590 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2591 **CCK2 Equivalent:** N/A\
2592 **Preferences Affected:** N/A
2593 #### Windows (GPO)
2594 ```
2595 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2596 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2597
2598 or
2599
2600 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2601 ```
2602 #### macOS
2603 ```
2604 <dict>
2605 <key>RequestedLocales</key>
2606 <array>
2607 <string>de</string>
2608 <string>en-US</string>
2609 </array>
2610 </dict>
2611
2612 or
2613
2614 <dict>
2615 <key>RequestedLocales</key>
2616 <string>de,en-US</string>
2617 </dict>
2618
2619 ```
2620 #### policies.json
2621 ```
2622 {
2623 "policies": {
2624 "RequestedLocales": ["de", "en-US"]
2625 }
2626 }
2627
2628 or
2629
2630 {
2631 "policies": {
2632 "RequestedLocales": "de,en-US"
2633 }
2634 }
2635 ```
2636 <a name="SanitizeOnShutdown"></a>
2637
2638 ### SanitizeOnShutdown (Selective)
2639 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2640
2641 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2642
2643 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2644 **CCK2 Equivalent:** N/A\
2645 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2646 #### Windows (GPO)
2647 ```
2648 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2649 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2650 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2651 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2652 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2653 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2654 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2655 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2656 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2657 ```
2658 #### macOS
2659 ```
2660 <dict>
2661 <key>SanitizeOnShutdown</key>
2662 <dict>
2663 <key>Cache</key>
2664 <true/> | <false/>
2665 <key>Cookies</key>
2666 <true/> | <false/>
2667 <key>Downloads</key>
2668 <true/> | <false/>
2669 <key>FormData</key>
2670 <true/> | <false/>
2671 <key>History</key>
2672 <true/> | <false/>
2673 <key>Sessions</key>
2674 <true/> | <false/>
2675 <key>SiteSettings</key>
2676 <true/> | <false/>
2677 <key>OfflineApps</key>
2678 <true/> | <false/>
2679 <key>Locked</key>
2680 <true/> | <false/>
2681 </dict>
2682 </dict>
2683 ```
2684 #### policies.json
2685 ```
2686 {
2687 "policies": {
2688 "SanitizeOnShutdown": {
2689 "Cache": true | false,
2690 "Cookies": true | false,
2691 "Downloads": true | false,
2692 "FormData": true | false,
2693 "History": true | false,
2694 "Sessions": true | false,
2695 "SiteSettings": true | false,
2696 "OfflineApps": true | false,
2697 "Locked": true | false
2698 }
2699 }
2700 }
2701 ```
2702 ### SanitizeOnShutdown (All)
2703 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2704
2705 **Compatibility:** Firefox 60, Firefox ESR 60\
2706 **CCK2 Equivalent:** N/A\
2707 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2708 #### Windows (GPO)
2709 ```
2710 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2711 ```
2712 #### macOS
2713 ```
2714 <dict>
2715 <key>SanitizeOnShutdown</key>
2716 <true/> | <false/>
2717 </dict>
2718 ```
2719 #### policies.json
2720 ```
2721 {
2722 "policies": {
2723 "SanitizeOnShutdown": true | false
2724 }
2725 }
2726 ```
2727 ### SearchBar
2728 Set whether or not search bar is displayed.
2729
2730 **Compatibility:** Firefox 60, Firefox ESR 60\
2731 **CCK2 Equivalent:** `showSearchBar`\
2732 **Preferences Affected:** N/A
2733
2734 #### Windows (GPO)
2735 ```
2736 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2737 ```
2738 #### macOS
2739 ```
2740 <dict>
2741 <key>SearchBar</key>
2742 <string>unified | separate</string>
2743 </dict>
2744 ```
2745
2746 #### policies.json
2747 ```
2748 {
2749 "policies": {
2750 "SearchBar": "unified" | "separate"
2751 }
2752 }
2753 ```
2754 <a name="SearchEngines"></a>
2755
2756 ### SearchEngines (This policy is only available on the ESR.)
2757
2758 ### SearchEngines | Default
2759
2760 Set the default search engine. This policy is only available on the ESR.
2761
2762 **Compatibility:** Firefox ESR 60\
2763 **CCK2 Equivalent:** `defaultSearchEngine`\
2764 **Preferences Affected:** N/A
2765
2766 #### Windows (GPO)
2767 ```
2768 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2769 ```
2770 #### macOS
2771 ```
2772 <dict>
2773 <key>SearchEngines</key>
2774 <dict>
2775 <key>Default</key>
2776 <string>NAME_OF_SEARCH_ENGINE</string>
2777 </dict>
2778 </dict>
2779 ```
2780 #### policies.json
2781 ```
2782 {
2783 "policies": {
2784 "SearchEngines": {
2785 "Default": "NAME_OF_SEARCH_ENGINE"
2786 }
2787 }
2788 }
2789 ```
2790 ### SearchEngines | PreventInstalls
2791
2792 Prevent installing search engines from webpages.
2793
2794 **Compatibility:** Firefox ESR 60\
2795 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2796 **Preferences Affected:** N/A
2797
2798 #### Windows (GPO)
2799 ```
2800 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2801 ```
2802 #### macOS
2803 ```
2804 <dict>
2805 <key>SearchEngines</key>
2806 <dict>
2807 <key>PreventInstalls</key>
2808 <true/> | <false/>
2809 </dict>
2810 </dict>
2811 ```
2812 #### policies.json
2813 ```
2814 {
2815 "policies": {
2816 "SearchEngines": {
2817 "PreventInstalls": true | false
2818 }
2819 }
2820 }
2821 ```
2822 ### SearchEngines | Remove
2823
2824 Hide built-in search engines. This policy is only available on the ESR.
2825
2826 **Compatibility:** Firefox ESR 60.2\
2827 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2828 **Preferences Affected:** N/A
2829
2830 #### Windows (GPO)
2831 ```
2832 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2833 ```
2834 #### macOS
2835 ```
2836 <dict>
2837 <key>SearchEngines</key>
2838 <dict>
2839 <key>Remove</key>
2840 <array>
2841 <string>NAME_OF_SEARCH_ENGINE</string>
2842 </array>
2843 </dict>
2844 </dict>
2845 ```
2846 #### policies.json
2847 ```
2848 {
2849 "policies": {
2850 "SearchEngines": {
2851 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2852 }
2853 }
2854 }
2855 ```
2856 ### SearchEngines | Add
2857
2858 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2859
2860 `Name` is the name of the search engine.
2861
2862 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2863
2864 `Method` is either GET or POST
2865
2866 `IconURL` is a URL for the icon to use.
2867
2868 `Alias` is a keyword to use for the engine.
2869
2870 `Description` is a description of the search engine.
2871
2872 `PostData` is the POST data as name value pairs separated by &.
2873
2874 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2875
2876 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2877 **CCK2 Equivalent:** `searchplugins`\
2878 **Preferences Affected:** N/A
2879
2880 #### Windows (GPO)
2881 ```
2882 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2883 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2884 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2885 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2886 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2887 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2888 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2889 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2890 ```
2891
2892 #### macOS
2893 ```
2894 <dict>
2895 <key>SearchEngines</key>
2896 <dict>
2897 <key>Add</key>
2898 <array>
2899 <dict>
2900 <key>Name</key>
2901 <string>Example1</string>
2902 <key>URLTemplate</key>
2903 <string>https://www.example.org/q={searchTerms}</string>
2904 <key>Method</key>
2905 <string>GET | POST </string>
2906 <key>IconURL</key>
2907 <string>https://www.example.org/favicon.ico</string>
2908 <key>Alias</key>
2909 <string>example</string>
2910 <key>Description</key>
2911 <string>Example Description</string>
2912 <key>SuggestURLTemplate</key>
2913 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2914 <key>PostData</key>
2915 <string>name=value&q={searchTerms}</string>
2916 </dict>
2917 <array>
2918 </dict>
2919 </dict>
2920 ```
2921 #### policies.json
2922 ```
2923 {
2924 "policies": {
2925 "SearchEngines": {
2926 "Add": [
2927 {
2928 "Name": "Example1",
2929 "URLTemplate": "https://www.example.org/q={searchTerms}",
2930 "Method": "GET" | "POST",
2931 "IconURL": "https://www.example.org/favicon.ico",
2932 "Alias": "example",
2933 "Description": "Description",
2934 "PostData": "name=value&q={searchTerms}",
2935 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2936 }
2937 ]
2938 }
2939 }
2940 }
2941 ```
2942 ### SearchSuggestEnabled
2943
2944 Enable search suggestions.
2945
2946 **Compatibility:** Firefox 68, Firefox ESR 68\
2947 **CCK2 Equivalent:** N/A\
2948 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2949
2950 #### Windows (GPO)
2951 ```
2952 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2953 ```
2954 #### macOS
2955 ```
2956 <dict>
2957 <key>SearchSuggestEnabled</key>
2958 <true/> | <false/>
2959 </dict>
2960 ```
2961 #### policies.json
2962 ```
2963 {
2964 "policies": {
2965 "SearchSuggestEnabled": true | false
2966 }
2967 }
2968 ```
2969 ### SecurityDevices
2970
2971 Install PKCS #11 modules.
2972
2973 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2974 **CCK2 Equivalent:** `certs.devices`\
2975 **Preferences Affected:** N/A
2976
2977 #### Windows (GPO)
2978 ```
2979 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2980 ```
2981 #### macOS
2982 ```
2983 <dict>
2984 <key>SecurityDevices</key>
2985 <dict>
2986 <key>NAME_OF_DEVICE</key>
2987 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2988 </dict>
2989 </dict>
2990 ```
2991
2992 #### policies.json
2993 ```
2994 {
2995 "policies": {
2996 "SecurityDevices": {
2997 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2998 }
2999 }
3000 }
3001 ```
3002 ### SSLVersionMax
3003
3004 Set and lock the maximum version of TLS.
3005
3006 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3007 **CCK2 Equivalent:** N/A\
3008 **Preferences Affected:** `security.tls.version.max`
3009
3010 #### Windows (GPO)
3011 ```
3012 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3013 ```
3014 #### macOS
3015 ```
3016 <dict>
3017 <key>SSLVersionMax</key>
3018 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3019 </dict>
3020 ```
3021
3022 #### policies.json
3023 ```
3024 {
3025 "policies": {
3026 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3027 }
3028 }
3029 ```
3030 ### SSLVersionMin
3031
3032 Set and lock the minimum version of TLS.
3033
3034 **Compatibility:** Firefox 66, Firefox ESR 60.6\
3035 **CCK2 Equivalent:** N/A\
3036 **Preferences Affected:** `security.tls.version.min`
3037
3038 #### Windows (GPO)
3039 ```
3040 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3041 ```
3042 #### macOS
3043 ```
3044 <dict>
3045 <key>SSLVersionMin</key>
3046 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3047 </dict>
3048 ```
3049
3050 #### policies.json
3051 ```
3052 {
3053 "policies": {
3054 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3055 }
3056 }
3057 ```
3058 ### SupportMenu
3059 Add a menuitem to the help menu for specifying support information.
3060
3061 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3062 **CCK2 Equivalent:** helpMenu\
3063 **Preferences Affected:** N/A
3064
3065 #### Windows (GPO)
3066 ```
3067 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3068 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3069 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3070 ```
3071 #### macOS
3072 ```
3073 <dict>
3074 <key>SupportMenu</key>
3075 <dict>
3076 <key>Title</key>
3077 <string>SupportMenu</string>
3078 <key>URL</key>
3079 <string>http://example.com/support</string>
3080 <key>AccessKey</key>
3081 <string>S</string>
3082 </dict>
3083 </dict>
3084 ```
3085 #### policies.json
3086 ```
3087 {
3088 "policies": {
3089 "SupportMenu": {
3090 "Title": "Support Menu",
3091 "URL": "http://example.com/support",
3092 "AccessKey": "S"
3093 }
3094 }
3095 }
3096 ```
3097 ### UserMessaging
3098
3099 Prevent installing search engines from webpages.
3100
3101 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3102
3103 `ExtensionRecommendations` Don't recommend extensions.
3104
3105 `FeatureRecommendations` Don't recommend browser features.
3106
3107 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3108
3109 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3110 **CCK2 Equivalent:** N/A\
3111 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3112
3113 #### Windows (GPO)
3114 ```
3115 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3116 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3117 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3118 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3119 ```
3120 #### macOS
3121 ```
3122 <dict>
3123 <key>UserMessaging</key>
3124 <dict>
3125 <key>WhatsNew</key>
3126 <true/> | <false/>
3127 <key>ExtensionRecommendations</key>
3128 <true/> | <false/>
3129 <key>FeatureRecommendations</key>
3130 <true/> | <false/>
3131 <key>UrlbarInterventions</key>
3132 <true/> | <false/>
3133 </dict>
3134 </dict>
3135 ```
3136 #### policies.json
3137 ```
3138 {
3139 "policies": {
3140 "UserMessaging": {
3141 "WhatsNew": true | false,
3142 "ExtensionRecommendations": true | false,
3143 "FeatureRecommendations": true | false,
3144 "UrlbarInterventions": true | false
3145 }
3146 }
3147 }
3148 ```
3149 ### WebsiteFilter
3150 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3151
3152 **Compatibility:** Firefox 60, Firefox ESR 60\
3153 **CCK2 Equivalent:** N/A\
3154 **Preferences Affected:** N/A
3155
3156 #### Windows (GPO)
3157 ```
3158 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3159 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3160 ```
3161 #### macOS
3162 ```
3163 <dict>
3164 <key>WebsiteFilter</key>
3165 <dict>
3166 <key>Block</key>
3167 <array>
3168 <string><all_urls></string>
3169 </array>
3170 <key>Exceptions</key>
3171 <array>
3172 <string>http://example.org/*</string>
3173 </array>
3174 </dict>
3175
3176 </dict>
3177 ```
3178 #### policies.json
3179 ```
3180 {
3181 "policies": {
3182 "WebsiteFilter": {
3183 "Block": ["<all_urls>"],
3184 "Exceptions": ["http://example.org/*"]
3185 }
3186 }
3187 }
3188 ```

patrick-canterino.de