]> git.p6c8.net - policy-templates.git/blob - README.md
Fix some typos
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
10 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
11 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
12 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
13 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
14 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
15 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
16 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
17 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
18 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
19 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
20 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
21 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
22 | **[`Certificates`](#certificates)** |
23 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
24 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
25 | **[`Cookies`](#cookies)** | Configure cookie preferences.
26 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
27 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
28 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
29 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
30 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
31 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
32 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
33 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
34 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
35 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
36 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
37 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
38 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
39 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
40 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
41 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
42 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
43 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
44 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
45 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
46 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
47 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
48 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
49 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
50 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
51 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
52 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
53 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
54 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
55 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
56 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
57 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
58 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
59 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
60 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
61 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
62 | **[`FlashPlugin (Deprecated)`](#flashplugin-deprecated)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
63 | **[`Handlers`](#handlers)** | Configure default application handlers.
64 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
65 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
66 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
67 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
68 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
69 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
70 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
71 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
72 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
73 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
74 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
75 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
76 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
77 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
78 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
79 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
80 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
81 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
82 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
83 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
84 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
85 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
86 | **[`Preferences`](#preferences)** | Set and lock preferences.
87 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
88 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
89 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
90 | **[`Proxy`](#proxy)** | Configure proxy settings.
91 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
92 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
93 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
94 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
95 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
96 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
97 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
98 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
99 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
100 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
101 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
102 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
103 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
104 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
105 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
106 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
107 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
108 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
109
110 ### 3rdparty
111
112 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
113
114 For GPO and Intune, the extension developer should provide an ADMX file.
115
116 **Compatibility:** Firefox 68\
117 **CCK2 Equivalent:** N/A\
118 **Preferences Affected:** N/A
119
120 #### macOS
121 ```
122 <dict>
123 <key>3rdparty</key>
124 <dict>
125 <key>Extensions</key>
126 <dict>
127 <key>uBlock0@raymondhill.net</key>
128 <dict>
129 <key>adminSettings</key>
130 <dict>
131 <key>selectedFilterLists</key>
132 <array>
133 <string>ublock-privacy</string>
134 <string>ublock-badware</string>
135 <string>ublock-filters</string>
136 <string>user-filters</string>
137 </array>
138 </dict>
139 </dict>
140 </dict>
141 </dict>
142 </dict>
143 ```
144 #### policies.json
145 ```
146 {
147 "policies": {
148 "3rdparty": {
149 "Extensions": {
150 "uBlock0@raymondhill.net": {
151 "adminSettings": {
152 "selectedFilterLists": [
153 "ublock-privacy",
154 "ublock-badware",
155 "ublock-filters",
156 "user-filters"
157 ]
158 }
159 }
160 }
161 }
162 }
163 }
164 ```
165
166 ### AllowedDomainsForApps
167
168 Define domains allowed to access Google Workspace.
169
170 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
171
172 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
173
174 **Compatibility:** Firefox 89, Firefox ESR 78.11\
175 **CCK2 Equivalent:** N/A\
176 **Preferences Affected:** N/A
177
178 #### Windows (GPO)
179 ```
180 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
181 ```
182 #### Windows (Intune)
183 OMA-URI:
184 ```
185 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
186 ```
187 Value (string):
188 ```
189 <enabled/>
190 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
191 ```
192 #### macOS
193 ```
194 <dict>
195 <key>AllowedDomainsForApps</key>
196 <string>managedfirefox.com,example.com</string>
197 </dict>
198 ```
199 #### policies.json
200 ```
201 {
202 "policies": {
203 "AllowedDomainsForApps": "managedfirefox.com,example.com"
204 }
205 }
206 ```
207 ### AppAutoUpdate
208
209 Enable or disable **automatic** application update.
210
211 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
212
213 If set to false, application updates are downloaded but the user can choose when to install the update.
214
215 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
216
217 **Compatibility:** Firefox 75, Firefox ESR 68.7\
218 **CCK2 Equivalent:** N/A\
219 **Preferences Affected:** `app.update.auto`
220
221 #### Windows (GPO)
222 ```
223 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
224 ```
225 #### Windows (Intune)
226 OMA-URI:
227 ```
228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
229 ```
230 Value (string):
231 ```
232 <enabled/> or <disabled/>
233 ```
234 #### macOS
235 ```
236 <dict>
237 <key>AppAutoUpdate</key>
238 <true/> | <false/>
239 </dict>
240 ```
241 #### policies.json
242 ```
243 {
244 "policies": {
245 "AppAutoUpdate": true | false
246 }
247 }
248 ```
249 ### AppUpdateURL
250
251 Change the URL for application update if you are providing Firefox updates from a custom update server.
252
253 **Compatibility:** Firefox 62, Firefox ESR 60.2\
254 **CCK2 Equivalent:** N/A\
255 **Preferences Affected:** `app.update.url`
256
257 #### Windows (GPO)
258 ```
259 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
260 ```
261 #### Windows (Intune)
262 OMA-URI:
263 ```
264 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
265 ```
266 Value (string):
267 ```
268 <enabled/>
269 <data id="AppUpdateURL" value="https://yoursite.com"/>
270 ```
271 #### macOS
272 ```
273 <dict>
274 <key>AppUpdateURL</key>
275 <string>https://yoursite.com</string>
276 </dict>
277 ```
278 #### policies.json
279 ```
280 {
281 "policies": {
282 "AppUpdateURL": "https://yoursite.com"
283 }
284 }
285 ```
286 ### Authentication
287
288 Configure sites that support integrated authentication.
289
290 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
291
292 `PrivateBrowsing` enables integrated authentication in private browsing.
293
294 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
295 **CCK2 Equivalent:** N/A\
296 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
297
298 #### Windows (GPO)
299 ```
300 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
301 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
302 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
303 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
304 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
305 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
306 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
307 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
308 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
309 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
310 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
311 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
312 ```
313 #### Windows (Intune)
314 OMA-URI:
315 ```
316 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
317 ```
318 Value (string):
319 ```
320 <enabled/>
321 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
322 ```
323 OMA-URI:
324 ```
325 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
326 ```
327 Value (string):
328 ```
329 <enabled/>
330 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
331 ```
332 OMA-URI:
333 ```
334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
335 ```
336 Value (string):
337 ```
338 <enabled/>
339 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
340 ```
341 OMA-URI:
342 ```
343 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
344 ```
345 Value (string):
346 ```
347 <enabled/>
348 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
349 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
350 ```
351 OMA-URI:
352 ```
353 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
354 ```
355 Value (string):
356 ```
357 <enabled/> or <disabled/>
358 ```
359 OMA-URI:
360 ```
361 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
362 ```
363 Value (string):
364 ```
365 <enabled/> or <disabled/>
366 ```
367 #### macOS
368 ```
369 <dict>
370 <key>Authentication</key>
371 <dict>
372 <key>SPNEGO</key>
373 <array>
374 <string>mydomain.com</string>
375 <string>https://myotherdomain.com</string>
376 </array>
377 <key>Delegated</key>
378 <array>
379 <string>mydomain.com</string>
380 <string>https://myotherdomain.com</string>
381 </array>
382 <key>NTLM</key>
383 <array>
384 <string>mydomain.com</string>
385 <string>https://myotherdomain.com</string>
386 </array>
387 <key>AllowNonFQDN</key>
388 <dict>
389 <key>SPNEGO</key>
390 <true/> | <false/>
391 <key>NTLM</key>
392 <true/> | <false/>
393 </dict>
394 <key>AllowProxies</key>
395 <dict>
396 <key>SPNEGO</key>
397 <true/> | <false/>
398 <key>NTLM</key>
399 <true/> | <false/>
400 </dict>
401 <key>Locked</key>
402 <true/> | <false/>
403 <key>PrivateBrowsing</key>
404 <true/> | <false/>
405 </dict>
406 </dict>
407 ```
408 #### policies.json
409 ```
410 {
411 "policies": {
412 "Authentication": {
413 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
414 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
415 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
416 "AllowNonFQDN": {
417 "SPNEGO": true | false,
418 "NTLM": true | false
419 },
420 "AllowProxies": {
421 "SPNEGO": true | false,
422 "NTLM": true | false
423 },
424 "Locked": true | false,
425 "PrivateBrowsing": true | false
426 }
427 }
428 }
429 ```
430 ### AutoLaunchProtocolsFromOrigins
431 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
432
433 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
434
435 The schema is:
436 ```
437 {
438 "items": {
439 "properties": {
440 "allowed_origins": {
441 "items": {
442 "type": "string"
443 },
444 "type": "array"
445 },
446 "protocol": {
447 "type": "string"
448 }
449 },
450 "required": [
451 "protocol",
452 "allowed_origins"
453 ],
454 "type": "object"
455 },
456 "type": "array"
457 }
458 ```
459 **Compatibility:** Firefox 90, Firefox ESR 78.12\
460 **CCK2 Equivalent:** N/A\
461 **Preferences Affected:** N/A
462
463 #### Windows (GPO)
464 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
465 ```
466 [
467 {
468 "protocol": "zoommtg",
469 "allowed_origins": [
470 "https://somesite.zoom.us"
471 ]
472 }
473 ]
474 ```
475 #### Windows (Intune)
476 OMA-URI:
477 ```
478 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
479 ```
480 Value (string):
481 ```
482 <enabled/>
483 <data id="JSON" value='
484 [
485 {
486 "protocol": "zoommtg",
487 "allowed_origins": [
488 "https://somesite.zoom.us"
489 ]
490 }
491 ]'/>
492 ```
493 #### macOS
494 ```
495 <dict>
496 <key>AutoLaunchProtocolsFromOrigins</key>
497 <array>
498 <dict>
499 <key>protocol</key>
500 <string>zoommtg</string>
501 <key>allowed_origins</key>
502 <array>
503 <string>https://somesite.zoom.us</string>
504 </array>
505 </dict>
506 </array>
507 </dict>
508 ```
509 #### policies.json
510 ```
511 {
512 "policies": {
513 "AutoLaunchProtocolsFromOrigins": [{
514 "protocol": "zoommtg",
515 "allowed_origins": [
516 "https://somesite.zoom.us"
517 ]
518 }]
519 }
520 }
521 ```
522 ### BackgroundAppUpdate
523
524 Enable or disable **automatic** application update **in the background**, when the application is not running.
525
526 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
527
528 If set to false, the application will not try to install updates when the application is not running.
529
530 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
531
532 **Compatibility:** Firefox 90 (Windows only)\
533 **CCK2 Equivalent:** N/A\
534 **Preferences Affected:** `app.update.background.enabled`
535
536 #### Windows (GPO)
537 ```
538 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
539 ```
540 #### Windows (Intune)
541 OMA-URI:
542 ```
543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
544 ```
545 Value (string):
546 ```
547 <enabled/> or <disabled/>
548 ```
549 #### macOS
550 ```
551 <dict>
552 <key>BackgroundAppUpdate</key>
553 <true/> | <false/>
554 </dict>
555 ```
556 #### policies.json
557 ```
558 {
559 "policies": {
560 "BackgroundAppUpdate": true | false
561 }
562 }
563 ```
564 ### BlockAboutAddons
565
566 Block access to the Add-ons Manager (about:addons).
567
568 **Compatibility:** Firefox 60, Firefox ESR 60\
569 **CCK2 Equivalent:** `disableAddonsManager`\
570 **Preferences Affected:** N/A
571
572 #### Windows (GPO)
573 ```
574 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
575 ```
576 #### Windows (Intune)
577 OMA-URI:
578 ```
579 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
580 ```
581 Value (string):
582 ```
583 <enabled/> or <disabled/>
584 ```
585 #### macOS
586 ```
587 <dict>
588 <key>BlockAboutAddons</key>
589 <true/> | <false/>
590 </dict>
591 ```
592 #### policies.json
593 ```
594 {
595 "policies": {
596 "BlockAboutAddons": true | false
597 }
598 }
599 ```
600 ### BlockAboutConfig
601
602 Block access to about:config.
603
604 **Compatibility:** Firefox 60, Firefox ESR 60\
605 **CCK2 Equivalent:** `disableAboutConfig`\
606 **Preferences Affected:** N/A
607
608 #### Windows (GPO)
609 ```
610 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
611 ```
612 #### Windows (Intune)
613 OMA-URI:
614 ```
615 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
616 ```
617 Value (string):
618 ```
619 <enabled/> or <disabled/>
620 ```
621 #### macOS
622 ```
623 <dict>
624 <key>BlockAboutConfig</key>
625 <true/> | <false/>
626 </dict>
627 ```
628 #### policies.json
629 ```
630 {
631 "policies": {
632 "BlockAboutConfig": true | false
633 }
634 }
635 ```
636 ### BlockAboutProfiles
637
638 Block access to About Profiles (about:profiles).
639
640 **Compatibility:** Firefox 60, Firefox ESR 60\
641 **CCK2 Equivalent:** `disableAboutProfiles`\
642 **Preferences Affected:** N/A
643
644 #### Windows (GPO)
645 ```
646 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
647 ```
648 #### Windows (Intune)
649 OMA-URI:
650 ```
651 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
652 ```
653 Value (string):
654 ```
655 <enabled/> or <disabled/>
656 ```
657 #### macOS
658 ```
659 <dict>
660 <key>BlockAboutProfiles</key>
661 <true/> | <false/>
662 </dict>
663 ```
664 #### policies.json
665 ```
666 {
667 "policies": {
668 "BlockAboutProfiles": true | false
669 }
670 }
671 ```
672 ### BlockAboutSupport
673
674 Block access to Troubleshooting Information (about:support).
675
676 **Compatibility:** Firefox 60, Firefox ESR 60\
677 **CCK2 Equivalent:** `disableAboutSupport`\
678 **Preferences Affected:** N/A
679
680 #### Windows (GPO)
681 ```
682 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
683 ```
684 #### Windows (Intune)
685 OMA-URI:
686 ```
687 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
688 ```
689 Value (string):
690 ```
691 <enabled/> or <disabled/>
692 ```
693 #### macOS
694 ```
695 <dict>
696 <key>BlockAboutSupport</key>
697 <true/> | <false/>
698 </dict>
699 ```
700 #### policies.json
701 ```
702 {
703 "policies": {
704 "BlockAboutSupport": true | false
705 }
706 }
707 ```
708 ### Bookmarks
709
710 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
711
712 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
713
714 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
715
716 **Compatibility:** Firefox 60, Firefox ESR 60\
717 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
718 **Preferences Affected:** N/A
719
720 #### Windows (GPO)
721 ```
722 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
723 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
724 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
725 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
726 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
727
728 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
729 ```
730 []
731 ```
732
733 ```
734 #### Windows (Intune)
735 OMA-URI:
736 ```
737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
738 ```
739 Value (string):
740 ```
741 <enabled/>
742 <data id="BookmarkTitle" value="Example"/>
743 <data id="BookmarkURL" value="https://example.com"/>
744 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
745 <data id="BookmarkPlacement" value="toolbar | menu"/>
746 <data id="BookmarkFolder" value="FolderName"/>
747 ```
748 OMA-URI:
749 ```
750 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
751 ```
752 Value (string):
753 ```
754 <enabled/>
755 <data id="JSON" value='[]'/>
756 ```
757 #### macOS
758 ```
759 <dict>
760 <key>Bookmarks</key>
761 <array>
762 <dict>
763 <key>Title</key>
764 <string>Example</string>
765 <key>URL</key>
766 <string>https://example.com</string>
767 <key>Favicon</key>
768 <string>https://example.com/favicon.ico</string>
769 <key>Placement</key>
770 <string>toolbar | menu</string>
771 <key>Folder</key>
772 <string>FolderName</string>
773 </dict>
774 </array>
775 </dict>
776 ```
777 #### policies.json
778 ```
779 {
780 "policies": {
781 "Bookmarks": [
782 {
783 "Title": "Example",
784 "URL": "https://example.com",
785 "Favicon": "https://example.com/favicon.ico",
786 "Placement": "toolbar" | "menu",
787 "Folder": "FolderName"
788 }
789 ]
790 }
791 }
792 ```
793 ### CaptivePortal
794 Enable or disable the detection of captive portals.
795
796 **Compatibility:** Firefox 67, Firefox ESR 60.7\
797 **CCK2 Equivalent:** N/A\
798 **Preferences Affected:** `network.captive-portal-service.enabled`
799
800 #### Windows (GPO)
801 ```
802 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
803 ```
804 #### Windows (Intune)
805 OMA-URI:
806 ```
807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
808 ```
809 Value (string):
810 ```
811 <enabled/> or <disabled/>
812 ```
813 #### macOS
814 ```
815 <dict>
816 <key>CaptivePortal</key>
817 <true/> | <false/>
818 </dict>
819 ```
820 #### policies.json
821 ```
822 {
823 "policies": {
824 "CaptivePortal": true | false
825 }
826 }
827 ```
828 ### Certificates
829
830 ### Certificates | ImportEnterpriseRoots
831
832 Trust certificates that have been added to the operating system certificate store by a user or administrator.
833
834 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
835
836 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
837
838 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
839 **CCK2 Equivalent:** N/A\
840 **Preferences Affected:** `security.enterprise_roots.enabled`
841
842 #### Windows (GPO)
843 ```
844 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
845 ```
846 #### Windows (Intune)
847 OMA-URI:
848 ```
849 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
850 ```
851 Value (string):
852 ```
853 <enabled/> or <disabled/>
854 ```
855 #### macOS
856 ```
857 <dict>
858 <key>Certificates</key>
859 <dict>
860 <key>ImportEnterpriseRoots</key>
861 <true/> | <false/>
862 </dict>
863 </dict>
864 ```
865 #### policies.json
866 ```
867 {
868 "policies": {
869 "Certificates": {
870 "ImportEnterpriseRoots": true | false
871 }
872 }
873 }
874 ```
875 ### Certificates | Install
876
877 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
878
879 - Windows
880 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
881 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
882 - macOS
883 - /Library/Application Support/Mozilla/Certificates
884 - ~/Library/Application Support/Mozilla/Certificates
885 - Linux
886 - /usr/lib/mozilla/certificates
887 - /usr/lib64/mozilla/certificates
888 - ~/.mozilla/certificates
889
890 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
891
892 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
893
894 Certificates are installed using the trust string `CT,CT,`.
895
896 Binary (DER) and ASCII (PEM) certificates are both supported.
897
898 **Compatibility:** Firefox 64, Firefox ESR 64\
899 **CCK2 Equivalent:** `certs.ca`\
900 **Preferences Affected:** N/A
901
902 #### Windows (GPO)
903 ```
904 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
905 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
906 ```
907 #### Windows (Intune)
908 OMA-URI:
909 ```
910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
911 ```
912 Value (string):
913 ```
914 <enabled/>
915 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
916 ```
917 #### macOS
918 ```
919 <dict>
920 <key>Certificates</key>
921 <dict>
922 <key>Install</key>
923 <array>
924 <string>cert1.der</string>
925 <string>/Users/username/cert2.pem</string>
926 </array>
927 </dict>
928 </dict>
929 ```
930 #### policies.json
931 ```
932 {
933 "policies": {
934 "Certificates": {
935 "Install": ["cert1.der", "/home/username/cert2.pem"]
936 }
937 }
938 }
939 ```
940 ### Cookies
941 Configure cookie preferences.
942
943 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
944
945 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
946
947 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
948
949 `Behavior` sets the default behavior for cookies based on the values below.
950
951 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
952
953 | Value | Description
954 | --- | ---
955 | accept | Accept all cookies
956 | reject-foreign | Reject third party cookies
957 | reject | Reject all cookies
958 | limit-foreign | Reject third party cookies for sites you haven't visited
959 | reject-tracker | Reject cookies for known trackers (default)
960 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
961
962 `Default` (Deprecated) determines whether cookies are accepted at all.
963
964 `AcceptThirdParty` (Deprecated) determines how third-party cookies are handled.
965
966 `ExpireAtSessionEnd` determines when cookies expire.
967
968 `RejectTracker` (Deprecated) only rejects cookies for trackers.
969
970 `Locked` prevents the user from changing cookie preferences.
971
972 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
973 **CCK2 Equivalent:** N/A\
974 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
975
976 #### Windows (GPO)
977 ```
978 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
979 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
980 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
981 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
982 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
983 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
984 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
985 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
986 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
987 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
988 ```
989 #### Windows (Intune)
990 OMA-URI:
991 ```
992 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
993 ```
994 Value (string):
995 ```
996 <enabled/>
997 <data id="Permissions" value="1&#xF000;https://example.com"/>
998 ```
999 OMA-URI:
1000 ```
1001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1002 ```
1003 Value (string):
1004 ```
1005 <enabled/>
1006 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1007 ```
1008 OMA-URI:
1009 ```
1010 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1011 ```
1012 Value (string):
1013 ```
1014 <enabled/>
1015 <data id="Permissions" value="1&#xF000;https://example.org"/>
1016 ```
1017 OMA-URI:
1018 ```
1019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
1020 ```
1021 Value (string):
1022 ```
1023 <enabled/> or <disabled/>
1024 ```
1025 OMA-URI:
1026 ```
1027 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
1028 ```
1029 Value (string):
1030 ```
1031 <enabled/>
1032 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
1033 ```
1034 OMA-URI:
1035 ```
1036 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
1037 ```
1038 Value (string):
1039 ```
1040 <enabled/> or <disabled/>
1041 ```
1042 OMA-URI:
1043 ```
1044 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
1045 ```
1046 Value (string):
1047 ```
1048 <enabled/> or <disabled/>
1049 ```
1050 OMA-URI:
1051 ```
1052 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1053 ```
1054 Value (string):
1055 ```
1056 <enabled/> or <disabled/>
1057 ```
1058 OMA-URI:
1059 ```
1060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1061 ```
1062 Value (string):
1063 ```
1064 <enabled/>
1065 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1066 ```
1067 OMA-URI:
1068 ```
1069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1070 ```
1071 Value (string):
1072 ```
1073 <enabled/>
1074 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1075 ```
1076 #### macOS
1077 ```
1078 <dict>
1079 <key>Cookies</key>
1080 <dict>
1081 <key>Allow</key>
1082 <array>
1083 <string>http://example.com</string>
1084 </array>
1085 <key>AllowSession</key>
1086 <array>
1087 <string>http://example.edu</string>
1088 </array>
1089 <key>Block</key>
1090 <array>
1091 <string>http://example.org</string>
1092 </array>
1093 <key>Default</key>
1094 <true/> | <false/>
1095 <key>AcceptThirdParty</key>
1096 <string>always | never | from-visited</string>
1097 <key>ExpireAtSessionEnd</key>
1098 <true/> | <false/>
1099 <key>RejectTracker</key>
1100 <true/> | <false/>
1101 <key>Locked</key>
1102 <true/> | <false/>
1103 <key>Behavior</key>
1104 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1105 <key>BehaviorPrivateBrowsing</key>
1106 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1107 </dict>
1108 </dict>
1109 ```
1110 #### policies.json
1111 ```
1112 {
1113 "policies": {
1114 "Cookies": {
1115 "Allow": ["http://example.org/"],
1116 "AllowSession": ["http://example.edu/"],
1117 "Block": ["http://example.edu/"],
1118 "Default": true | false,
1119 "AcceptThirdParty": "always" | "never" | "from-visited",
1120 "ExpireAtSessionEnd": true | false,
1121 "RejectTracker": true | false,
1122 "Locked": true | false,
1123 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1124 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1125 }
1126 }
1127 }
1128 ```
1129 ### DefaultDownloadDirectory
1130 Set the default download directory.
1131
1132 You can use ${home} for the native home directory.
1133
1134 **Compatibility:** Firefox 68, Firefox ESR 68\
1135 **CCK2 Equivalent:** N/A\
1136 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1137
1138 #### Windows (GPO)
1139 ```
1140 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1141 ```
1142 #### Windows (Intune)
1143 OMA-URI:
1144 ```
1145 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1146 ```
1147 Value (string):
1148 ```
1149 <enabled/>
1150 <data id="Preferences_String" value="${home}\Downloads"/>
1151 ```
1152 #### macOS
1153 ```
1154 <dict>
1155 <key>DefaultDownloadDirectory</key>
1156 <string>${home}/Downloads</string>
1157 </dict>
1158 ```
1159 #### policies.json (macOS and Linux)
1160 ```
1161 {
1162 "policies": {
1163 "DefaultDownloadDirectory": "${home}/Downloads"
1164 }
1165 ```
1166 #### policies.json (Windows)
1167 ```
1168 {
1169 "policies": {
1170 "DefaultDownloadDirectory": "${home}\\Downloads"
1171 }
1172 ```
1173 ### DisableAppUpdate
1174 Turn off application updates within Firefox.
1175
1176 **Compatibility:** Firefox 60, Firefox ESR 60\
1177 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1178 **Preferences Affected:** N/A
1179
1180 #### Windows (GPO)
1181 ```
1182 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1183 ```
1184 #### Windows (Intune)
1185 OMA-URI:
1186 ```
1187 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1188 ```
1189 Value (string):
1190 ```
1191 <enabled/> or <disabled/>
1192 ```
1193 #### macOS
1194 ```
1195 <dict>
1196 <key>DisableAppUpdate</key>
1197 <true/> | <false/>
1198 </dict>
1199 ```
1200 #### policies.json
1201 ```
1202 {
1203 "policies": {
1204 "DisableAppUpdate": true | false
1205 }
1206 }
1207 ```
1208 ### DisableBuiltinPDFViewer
1209 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1210
1211 **Compatibility:** Firefox 60, Firefox ESR 60\
1212 **CCK2 Equivalent:** `disablePDFjs`\
1213 **Preferences Affected:** `pdfjs.disabled`
1214
1215 #### Windows (GPO)
1216 ```
1217 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1218 ```
1219 #### Windows (Intune)
1220 OMA-URI:
1221 ```
1222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1223 ```
1224 Value (string):
1225 ```
1226 <enabled/> or <disabled/>
1227 ```
1228 #### macOS
1229 ```
1230 <dict>
1231 <key>DisableBuiltinPDFViewer</key>
1232 <true/> | <false/>
1233 </dict>
1234 ```
1235 #### policies.json
1236 ```
1237 {
1238 "policies": {
1239 "DisableBuiltinPDFViewer": true | false
1240 }
1241 }
1242 ```
1243 ### DisabledCiphers
1244 Disable specific cryptographic ciphers, listed below.
1245
1246 ```
1247 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1248 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1249 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1250 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1251 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1252 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1253 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1254 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1255 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1257 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1258 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1259 TLS_RSA_WITH_AES_128_GCM_SHA256
1260 TLS_RSA_WITH_AES_256_GCM_SHA384
1261 TLS_RSA_WITH_AES_128_CBC_SHA
1262 TLS_RSA_WITH_AES_256_CBC_SHA
1263 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1264 ```
1265
1266 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1267
1268 ---
1269 **Note:**
1270
1271 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1272
1273 ---
1274 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1275 **CCK2 Equivalent:** N/A\
1276 **Preferences Affected:** N/A
1277
1278 #### Windows (GPO)
1279 ```
1280 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1281 ```
1282 #### Windows (Intune)
1283 OMA-URI:
1284 ```
1285 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1286
1287 ```
1288 Value (string):
1289 ```
1290 <enabled/> or <disabled/>
1291 ```
1292 #### macOS
1293 ```
1294 <dict>
1295 <key>DisabledCiphers</key>
1296 <dict>
1297 <key>CIPHER_NAME</key>
1298 <true/> | <false/>
1299 </dict>
1300 </dict>
1301 ```
1302 #### policies.json
1303 ```
1304 {
1305 "policies": {
1306 "DisabledCiphers": {
1307 "CIPHER_NAME": true | false,
1308 }
1309 }
1310 }
1311 ```
1312 ### DisableDefaultBrowserAgent
1313 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1314
1315 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1316
1317 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1318 **CCK2 Equivalent:** N/A\
1319 **Preferences Affected:** N/A
1320
1321 #### Windows (GPO)
1322 ```
1323 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1324 ```
1325 #### Windows (Intune)
1326 OMA-URI:
1327 ```
1328 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1329 ```
1330 Value (string):
1331 ```
1332 <enabled/> or <disabled/>
1333 ```
1334 #### policies.json
1335 ```
1336 {
1337 "policies": {
1338 "DisableDefaultBrowserAgent": true | false
1339 }
1340 }
1341 ```
1342 ### DisableDeveloperTools
1343 Remove access to all developer tools.
1344
1345 **Compatibility:** Firefox 60, Firefox ESR 60\
1346 **CCK2 Equivalent:** `removeDeveloperTools`\
1347 **Preferences Affected:** `devtools.policy.disabled`
1348
1349 #### Windows (GPO)
1350 ```
1351 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1352 ```
1353 #### Windows (Intune)
1354 OMA-URI:
1355 ```
1356 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1357 ```
1358 Value (string):
1359 ```
1360 <enabled/> or <disabled/>
1361 ```
1362 #### macOS
1363 ```
1364 <dict>
1365 <key>DisableDeveloperTools</key>
1366 <true/> | <false/>
1367 </dict>
1368 ```
1369 #### policies.json
1370 ```
1371 {
1372 "policies": {
1373 "DisableDeveloperTools": true | false
1374 }
1375 }
1376 ```
1377 ### DisableFeedbackCommands
1378 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1379
1380 **Compatibility:** Firefox 60, Firefox ESR 60\
1381 **CCK2 Equivalent:** N/A\
1382 **Preferences Affected:** N/A
1383
1384 #### Windows (GPO)
1385 ```
1386 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1387 ```
1388 #### Windows (Intune)
1389 OMA-URI:
1390 ```
1391 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1392 ```
1393 Value (string):
1394 ```
1395 <enabled/> or <disabled/>
1396 ```
1397 #### macOS
1398 ```
1399 <dict>
1400 <key>DisableFeedbackCommands</key>
1401 <true/> | <false/>
1402 </dict>
1403 ```
1404 #### policies.json
1405 ```
1406 {
1407 "policies": {
1408 "DisableFeedbackCommands": true | false
1409 }
1410 }
1411 ```
1412 ### DisableFirefoxAccounts
1413 Disable Firefox Accounts integration (Sync).
1414
1415 **Compatibility:** Firefox 60, Firefox ESR 60\
1416 **CCK2 Equivalent:** `disableSync`\
1417 **Preferences Affected:** `identity.fxaccounts.enabled`
1418
1419 #### Windows (GPO)
1420 ```
1421 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1422 ```
1423 #### Windows (Intune)
1424 OMA-URI:
1425 ```
1426 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1427 ```
1428 Value (string):
1429 ```
1430 <enabled/> or <disabled/>
1431 ```
1432 #### macOS
1433 ```
1434 <dict>
1435 <key>DisableFirefoxAccounts</key>
1436 <true/> | <false/>
1437 </dict>
1438 ```
1439 #### policies.json
1440 ```
1441 {
1442 "policies": {
1443 "DisableFirefoxAccounts": true | false
1444 }
1445 }
1446 ```
1447 ### DisableFirefoxScreenshots
1448 Remove access to Firefox Screenshots.
1449
1450 **Compatibility:** Firefox 60, Firefox ESR 60\
1451 **CCK2 Equivalent:** N/A\
1452 **Preferences Affected:** `extensions.screenshots.disabled`
1453
1454 #### Windows (GPO)
1455 ```
1456 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1457 ```
1458 #### Windows (Intune)
1459 OMA-URI:
1460 ```
1461 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1462 ```
1463 Value (string):
1464 ```
1465 <enabled/> or <disabled/>
1466 ```
1467 #### macOS
1468 ```
1469 <dict>
1470 <key>DisableFirefoxScreenshots</key>
1471 <true/> | <false/>
1472 </dict>
1473 ```
1474 #### policies.json
1475 ```
1476 {
1477 "policies": {
1478 "DisableFirefoxScreenshots": true | false
1479 }
1480 }
1481 ```
1482 ### DisableFirefoxStudies
1483 Disable Firefox studies (Shield).
1484
1485 **Compatibility:** Firefox 60, Firefox ESR 60\
1486 **CCK2 Equivalent:** N/A\
1487 **Preferences Affected:** N/A
1488
1489 #### Windows (GPO)
1490 ```
1491 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1492 ```
1493 #### Windows (Intune)
1494 OMA-URI:
1495 ```
1496 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1497 ```
1498 Value (string):
1499 ```
1500 <enabled/> or <disabled/>
1501 ```
1502 #### macOS
1503 ```
1504 <dict>
1505 <key>DisableFirefoxStudies</key>
1506 <true/> | <false/>
1507 </dict>
1508 ```
1509 #### policies.json
1510 ```
1511 {
1512 "policies": {
1513 "DisableFirefoxStudies": true | false
1514 }
1515 }
1516 ```
1517 ### DisableForgetButton
1518 Disable the "Forget" button.
1519
1520 **Compatibility:** Firefox 60, Firefox ESR 60\
1521 **CCK2 Equivalent:** `disableForget`\
1522 **Preferences Affected:** N/A
1523
1524 #### Windows (GPO)
1525 ```
1526 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1527 ```
1528 #### Windows (Intune)
1529 OMA-URI:
1530 ```
1531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1532 ```
1533 Value (string):
1534 ```
1535 <enabled/> or <disabled/>
1536 ```
1537 #### macOS
1538 ```
1539 <dict>
1540 <key>DisableForgetButton</key>
1541 <true/> | <false/>
1542 </dict>
1543 ```
1544 #### policies.json
1545 ```
1546 {
1547 "policies": {
1548 "DisableForgetButton": true | false
1549 }
1550 }
1551 ```
1552 ### DisableFormHistory
1553 Turn off saving information on web forms and the search bar.
1554
1555 **Compatibility:** Firefox 60, Firefox ESR 60\
1556 **CCK2 Equivalent:** `disableFormFill`\
1557 **Preferences Affected:** `browser.formfill.enable`
1558
1559 #### Windows (GPO)
1560 ```
1561 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1562 ```
1563 #### Windows (Intune)
1564 OMA-URI:
1565 ```
1566 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1567 ```
1568 Value (string):
1569 ```
1570 <enabled/> or <disabled/>
1571 ```
1572 #### macOS
1573 ```
1574 <dict>
1575 <key>DisableFormHistory</key>
1576 <true/> | <false/>
1577 </dict>
1578 ```
1579 #### policies.json
1580 ```
1581 {
1582 "policies": {
1583 "DisableFormHistory": true | false
1584 }
1585 }
1586 ```
1587 ### DisableMasterPasswordCreation
1588 Remove the master password functionality.
1589
1590 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1591
1592 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1593
1594 **Compatibility:** Firefox 60, Firefox ESR 60\
1595 **CCK2 Equivalent:** `noMasterPassword`\
1596 **Preferences Affected:** N/A
1597
1598 #### Windows (GPO)
1599 ```
1600 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1601 ```
1602 #### Windows (Intune)
1603 OMA-URI:
1604 ```
1605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1606 ```
1607 Value (string):
1608 ```
1609 <enabled/> or <disabled/>
1610 ```
1611 #### macOS
1612 ```
1613 <dict>
1614 <key>DisableMasterPasswordCreation</key>
1615 <true/> | <false/>
1616 </dict>
1617 ```
1618 #### policies.json
1619 ```
1620 {
1621 "policies": {
1622 "DisableMasterPasswordCreation": true | false
1623 }
1624 }
1625 ```
1626 ### DisablePasswordReveal
1627 Do not allow passwords to be shown in saved logins
1628
1629 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1630 **CCK2 Equivalent:** N/A
1631 **Preferences Affected:** N/A
1632
1633 #### Windows (GPO)
1634 ```
1635 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1636 ```
1637 #### Windows (Intune)
1638 OMA-URI:
1639 ```
1640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1641 ```
1642 Value (string):
1643 ```
1644 <enabled/> or <disabled/>
1645 ```
1646 #### macOS
1647 ```
1648 <dict>
1649 <key>DisablePasswordReveal</key>
1650 <true/> | <false/>
1651 </dict>
1652 ```
1653 #### policies.json
1654 ```
1655 {
1656 "policies": {
1657 "DisablePasswordReveal": true | false
1658 }
1659 }
1660 ```
1661 ### DisablePocket
1662 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1663
1664 **Compatibility:** Firefox 60, Firefox ESR 60\
1665 **CCK2 Equivalent:** `disablePocket`\
1666 **Preferences Affected:** `extensions.pocket.enabled`
1667
1668 #### Windows (GPO)
1669 ```
1670 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1671 ```
1672 #### Windows (Intune)
1673 OMA-URI:
1674 ```
1675 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1676 ```
1677 Value (string):
1678 ```
1679 <enabled/> or <disabled/>
1680 ```
1681 #### macOS
1682 ```
1683 <dict>
1684 <key>DisablePocket</key>
1685 <true/> | <false/>
1686 </dict>
1687 ```
1688 #### policies.json
1689 ```
1690 {
1691 "policies": {
1692 "DisablePocket": true | false
1693 }
1694 }
1695 ```
1696 ### DisablePrivateBrowsing
1697 Remove access to private browsing.
1698
1699 **Compatibility:** Firefox 60, Firefox ESR 60\
1700 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1701 **Preferences Affected:** N/A
1702
1703 #### Windows (GPO)
1704 ```
1705 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1706 ```
1707 #### Windows (Intune)
1708 OMA-URI:
1709 ```
1710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1711 ```
1712 Value (string):
1713 ```
1714 <enabled/> or <disabled/>
1715 ```
1716 #### macOS
1717 ```
1718 <dict>
1719 <key>DisablePrivateBrowsing</key>
1720 <true/> | <false/>
1721 </dict>
1722 ```
1723 #### policies.json
1724 ```
1725 {
1726 "policies": {
1727 "DisablePrivateBrowsing": true | false
1728 }
1729 }
1730 ```
1731 ### DisableProfileImport
1732 Disables the "Import data from another browser" option in the bookmarks window.
1733
1734 **Compatibility:** Firefox 60, Firefox ESR 60\
1735 **CCK2 Equivalent:** N/A\
1736 **Preferences Affected:** N/A
1737
1738 #### Windows (GPO)
1739 ```
1740 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1741 ```
1742 #### Windows (Intune)
1743 OMA-URI:
1744 ```
1745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1746 ```
1747 Value (string):
1748 ```
1749 <enabled/> or <disabled/>
1750 ```
1751 #### macOS
1752 ```
1753 <dict>
1754 <key>DisableProfileImport</key>
1755 <true/> | <false/>
1756 </dict>
1757 ```
1758 #### policies.json
1759 ```
1760 {
1761 "policies": {
1762 "DisableProfileImport": true | false
1763 }
1764 }
1765 ```
1766 ### DisableProfileRefresh
1767 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1768
1769 **Compatibility:** Firefox 60, Firefox ESR 60\
1770 **CCK2 Equivalent:** `disableResetFirefox`\
1771 **Preferences Affected:** `browser.disableResetPrompt`
1772
1773 #### Windows (GPO)
1774 ```
1775 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1776 ```
1777 #### Windows (Intune)
1778 OMA-URI:
1779 ```
1780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1781 ```
1782 Value (string):
1783 ```
1784 <enabled/> or <disabled/>
1785 ```
1786 #### macOS
1787 ```
1788 <dict>
1789 <key>DisableProfileRefresh</key>
1790 <true/> | <false/>
1791 </dict>
1792 ```
1793 #### policies.json
1794 ```
1795 {
1796 "policies": {
1797 "DisableProfileRefresh": true | false
1798 }
1799 }
1800 ```
1801 ### DisableSafeMode
1802 Disable safe mode within the browser.
1803
1804 On Windows, this disables safe mode via the command line as well.
1805
1806 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1807 **CCK2 Equivalent:** `disableSafeMode`\
1808 **Preferences Affected:** N/A
1809
1810 #### Windows (GPO)
1811 ```
1812 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1813 ```
1814 #### Windows (Intune)
1815 OMA-URI:
1816 ```
1817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1818 ```
1819 Value (string):
1820 ```
1821 <enabled/> or <disabled/>
1822 ```
1823 #### macOS
1824 ```
1825 <dict>
1826 <key>DisableSafeMode</key>
1827 <true/> | <false/>
1828 </dict>
1829 ```
1830 #### policies.json
1831 ```
1832 {
1833 "policies": {
1834 "DisableSafeMode": true | false
1835 }
1836 }
1837 ```
1838 ### DisableSecurityBypass
1839 Prevent the user from bypassing security in certain cases.
1840
1841 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1842
1843 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1844
1845 **Compatibility:** Firefox 60, Firefox ESR 60\
1846 **CCK2 Equivalent:** N/A\
1847 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
1848
1849 #### Windows (GPO)
1850 ```
1851 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1852 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1853 ```
1854 #### Windows (Intune)
1855 OMA-URI:
1856 ```
1857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1858 ```
1859 Value (string):
1860 ```
1861 <enabled/> or <disabled/>
1862 ```
1863 OMA-URI:
1864 ```
1865 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1866 ```
1867 Value (string):
1868 ```
1869 <enabled/> or <disabled/>
1870 ```
1871
1872 #### macOS
1873 ```
1874 <dict>
1875 <key>DisableSecurityBypass</key>
1876 <dict>
1877 <key>InvalidCertificate</key>
1878 <true/> | <false/>
1879 <key>SafeBrowsing</key>
1880 <true/> | <false/>
1881 </dict>
1882 </dict>
1883 ```
1884 #### policies.json
1885 ```
1886 {
1887 "policies": {
1888 "DisableSecurityBypass": {
1889 "InvalidCertificate": true | false,
1890 "SafeBrowsing": true | false
1891 }
1892 }
1893 }
1894 ```
1895 ### DisableSetDesktopBackground
1896 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
1897
1898 **Compatibility:** Firefox 60, Firefox ESR 60\
1899 **CCK2 Equivalent:** `removeSetDesktopBackground`\
1900 **Preferences Affected:** N/A
1901
1902 #### Windows (GPO)
1903 ```
1904 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
1905 ```
1906 #### Windows (Intune)
1907 OMA-URI:
1908 ```
1909 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
1910 ```
1911 Value (string):
1912 ```
1913 <enabled/> or <disabled/>
1914 ```
1915 #### macOS
1916 ```
1917 <dict>
1918 <key>DisableSetDesktopBackground</key>
1919 <true/> | <false/>
1920 </dict>
1921 ```
1922 #### policies.json
1923 ```
1924 {
1925 "policies": {
1926 "DisableSetDesktopBackground": true | false
1927 }
1928 }
1929 ```
1930 ### DisableSystemAddonUpdate
1931 Prevent system add-ons from being installed or updated.
1932
1933 **Compatibility:** Firefox 60, Firefox ESR 60\
1934 **CCK2 Equivalent:** N/A\
1935 **Preferences Affected:** N/A
1936
1937 #### Windows (GPO)
1938 ```
1939 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1940 ```
1941 #### Windows (Intune)
1942 OMA-URI:
1943 ```
1944 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1945 ```
1946 Value (string):
1947 ```
1948 <enabled/> or <disabled/>
1949 ```
1950 #### macOS
1951 ```
1952 <dict>
1953 <key>DisableSystemAddonUpdate</key>
1954 <true/> | <false/>
1955 </dict>
1956 ```
1957 #### policies.json
1958 ```
1959 {
1960 "policies": {
1961 "DisableSystemAddonUpdate": true | false
1962 }
1963 }
1964 ```
1965 ### DisableTelemetry
1966 Prevent the upload of telemetry data.
1967
1968 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1969
1970 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1971
1972 **Compatibility:** Firefox 60, Firefox ESR 60\
1973 **CCK2 Equivalent:** `disableTelemetry`\
1974 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
1975
1976 #### Windows (GPO)
1977 ```
1978 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1979 ```
1980 #### Windows (Intune)
1981 OMA-URI:
1982 ```
1983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1984 ```
1985 Value (string):
1986 ```
1987 <enabled/> or <disabled/>
1988 ```
1989 #### macOS
1990 ```
1991 <dict>
1992 <key>DisableTelemetry</key>
1993 <true/> | <false/>
1994 </dict>
1995 ```
1996 #### policies.json
1997 ```
1998 {
1999 "policies": {
2000 "DisableTelemetry": true | false
2001 }
2002 }
2003 ```
2004 ### DisplayBookmarksToolbar
2005 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
2006
2007 **Compatibility:** Firefox 60, Firefox ESR 60\
2008 **CCK2 Equivalent:** `displayBookmarksToolbar`\
2009 **Preferences Affected:** N/A
2010
2011 #### Windows (GPO)
2012 ```
2013 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
2014 ```
2015 #### Windows (Intune)
2016 OMA-URI:
2017 ```
2018 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
2019 ```
2020 Value (string):
2021 ```
2022 <enabled/> or <disabled/>
2023 ```
2024 #### macOS
2025 ```
2026 <dict>
2027 <key>DisplayBookmarksToolbar</key>
2028 <true/> | <false/>
2029 </dict>
2030 ```
2031 #### policies.json
2032 ```
2033 {
2034 "policies": {
2035 "DisplayBookmarksToolbar": true | false
2036 }
2037 }
2038 ```
2039 ### DisplayMenuBar
2040 Set the state of the menubar.
2041
2042 `always` means the menubar is shown and cannot be hidden.
2043
2044 `never` means the menubar is hidden and cannot be shown.
2045
2046 `default-on` means the menubar is on by default but can be hidden.
2047
2048 `default-off` means the menubar is off by default but can be shown.
2049
2050 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2051 **CCK2 Equivalent:** `displayMenuBar`\
2052 **Preferences Affected:** N/A
2053
2054 #### Windows (GPO)
2055 ```
2056 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2057 ```
2058 #### Windows (Intune)
2059 OMA-URI:
2060 ```
2061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2062 ```
2063 Value (string):
2064 ```
2065 <enabled/>
2066 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2067 ```
2068 #### macOS
2069 ```
2070 <dict>
2071 <key>DisplayMenuBar</key>
2072 <string>always | never | default-on | default-off</string>
2073 </dict>
2074 ```
2075 #### policies.json
2076 ```
2077 {
2078 "policies": {
2079 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2080 }
2081 }
2082 ```
2083 ### DisplayMenuBar (Deprecated)
2084 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
2085
2086 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
2087 **CCK2 Equivalent:** `displayMenuBar`\
2088 **Preferences Affected:** N/A
2089
2090 #### Windows (GPO)
2091 ```
2092 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
2093 ```
2094 #### macOS
2095 ```
2096 <dict>
2097 <key>DisplayMenuBar</key>
2098 <true/> | <false/>
2099 </dict>
2100 ```
2101 #### policies.json
2102 ```
2103 {
2104 "policies": {
2105 "DisplayMenuBar": true | false
2106 }
2107 }
2108 ```
2109 ### DNSOverHTTPS
2110 Configure DNS over HTTPS.
2111
2112 `Enabled` determines whether DNS over HTTPS is enabled
2113
2114 `ProviderURL` is a URL to another provider.
2115
2116 `Locked` prevents the user from changing DNS over HTTPS preferences.
2117
2118 `ExcludedDomains` excludes domains from DNS over HTTPS.
2119
2120 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
2121 **CCK2 Equivalent:** N/A\
2122 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2123
2124 #### Windows (GPO)
2125 ```
2126 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2127 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2128 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2129 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2130 ```
2131 #### Windows (Intune)
2132 OMA-URI:
2133 ```
2134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2135 ```
2136 Value (string):
2137 ```
2138 <enabled/> or <disabled/>
2139 ```
2140 OMA-URI:
2141 ```
2142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2143 ```
2144 Value (string):
2145 ```
2146 <enabled/>
2147 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2148 ```
2149 OMA-URI:
2150 ```
2151 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2152 ```
2153 Value (string):
2154 ```
2155 <enabled/> or <disabled/>
2156 ```
2157 OMA-URI:
2158 ```
2159 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2160 ```
2161 Value (string):
2162 ```
2163 <enabled/>
2164 <data id="List" value="1&#xF000;example.com"/>
2165 ```
2166 #### macOS
2167 ```
2168 <dict>
2169 <key>DNSOverHTTPS</key>
2170 <dict>
2171 <key>Enabled</key>
2172 <true/> | <false/>
2173 <key>ProviderURL</key>
2174 <string>URL_TO_ALTERNATE_PROVIDER</string>
2175 <key>Locked</key>
2176 <true/> | <false/>
2177 <key>ExcludedDomains</key>
2178 <array>
2179 <string>example.com</string>
2180 </array>
2181 </dict>
2182 </dict>
2183 ```
2184 #### policies.json
2185 ```
2186 {
2187 "policies": {
2188 "DNSOverHTTPS": {
2189 "Enabled": true | false,
2190 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2191 "Locked": true | false,
2192 "ExcludedDomains": ["example.com"]
2193 }
2194 }
2195 }
2196 ```
2197 ### DontCheckDefaultBrowser
2198 Don't check if Firefox is the default browser at startup.
2199
2200 **Compatibility:** Firefox 60, Firefox ESR 60\
2201 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2202 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2203
2204 #### Windows (GPO)
2205 ```
2206 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2207 ```
2208 #### Windows (Intune)
2209 OMA-URI:
2210 ```
2211 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2212 ```
2213 Value (string):
2214 ```
2215 <enabled/> or <disabled/>
2216 ```
2217 #### macOS
2218 ```
2219 <dict>
2220 <key>DontCheckDefaultBrowser</key>
2221 <true/> | <false/>
2222 </dict>
2223 ```
2224 #### policies.json
2225 ```
2226 {
2227 "policies": {
2228 "DontCheckDefaultBrowser": true | false
2229 }
2230 }
2231 ```
2232 ### DownloadDirectory
2233 Set and lock the download directory.
2234
2235 You can use ${home} for the native home directory.
2236
2237 **Compatibility:** Firefox 68, Firefox ESR 68\
2238 **CCK2 Equivalent:** N/A\
2239 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2240
2241 #### Windows (GPO)
2242 ```
2243 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2244 ```
2245 #### Windows (Intune)
2246 OMA-URI:
2247 ```
2248 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2249 ```
2250 Value (string):
2251 ```
2252 <enabled/>
2253 <data id="Preferences_String" value="${home}\Downloads"/>
2254 ```
2255 #### macOS
2256 ```
2257 <dict>
2258 <key>DownloadDirectory</key>
2259 <string>${home}/Downloads</string>
2260 </dict>
2261 ```
2262 #### policies.json (macOS and Linux)
2263 ```
2264 {
2265 "policies": {
2266 "DownloadDirectory": "${home}/Downloads"
2267 }
2268 ```
2269 #### policies.json (Windows)
2270 ```
2271 {
2272 "policies": {
2273 "DownloadDirectory": "${home}\\Downloads"
2274 }
2275 ```
2276 ### EnableTrackingProtection
2277 Configure tracking protection.
2278
2279 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2280
2281 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2282
2283 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2284
2285 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2286
2287 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2288
2289 `Exceptions` are origins for which tracking protection is not enabled.
2290
2291 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2292 **CCK2 Equivalent:** N/A\
2293 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2294
2295 #### Windows (GPO)
2296 ```
2297 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2298 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2299 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2300 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2301 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2302 ```
2303 #### Windows (Intune)
2304 OMA-URI:
2305 ```
2306 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2307 ```
2308 Value (string):
2309 ```
2310 <enabled/> or <disabled/>
2311 ```
2312 OMA-URI:
2313 ```
2314 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2315 ```
2316 Value (string):
2317 ```
2318 <enabled/> or <disabled/>
2319 ```
2320 OMA-URI:
2321 ```
2322 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2323 ```
2324 Value (string):
2325 ```
2326 <enabled/> or <disabled/>
2327 ```
2328 OMA-URI:
2329 ```
2330 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2331 ```
2332 Value (string):
2333 ```
2334 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2335 ```
2336 OMA-URI:
2337 ```
2338 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2339 ```
2340 Value (string):
2341 ```
2342 <enabled/> or <disabled/>
2343 ```
2344 #### macOS
2345 ```
2346 <dict>
2347 <key>EnableTrackingProtection</key>
2348 <dict>
2349 <key>Value</key>
2350 <true/> | <false/>
2351 <key>Locked</key>
2352 <true/> | <false/>
2353 <key>Cryptomining</key>
2354 <true/> | <false/>
2355 <key>Fingerprinting</key>
2356 <true/> | <false/>
2357 <key>Exceptions</key>
2358 <array>
2359 <string>https://example.com</string>
2360 </array>
2361 </dict>
2362 </dict>
2363 ```
2364 #### policies.json
2365 ```
2366 {
2367 "policies": {
2368 "EnableTrackingProtection": {
2369 "Value": true | false,
2370 "Locked": true | false,
2371 "Cryptomining": true | false,
2372 "Fingerprinting": true | false,
2373 "Exceptions": ["https://example.com"]
2374 }
2375 }
2376 }
2377 ```
2378 ### EncryptedMediaExtensions
2379 Enable or disable Encrypted Media Extensions and optionally lock it.
2380
2381 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2382
2383 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2384
2385 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2386 **CCK2 Equivalent:** N/A\
2387 **Preferences Affected:** `media.eme.enabled`
2388
2389 #### Windows (GPO)
2390 ```
2391 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2392 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2393 ```
2394 #### Windows (Intune)
2395 OMA-URI:
2396 ```
2397 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2398 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2399 ```
2400 Value (string):
2401 ```
2402 <enabled/>or <disabled/>
2403 ```
2404 #### macOS
2405 ```
2406 <dict>
2407 <key>EncryptedMediaExtensions</key>
2408 <dict>
2409 <key>Enabled</key>
2410 <true/> | <false/>
2411 <key>Locked</key>
2412 <true/> | <false/>
2413 </dict>
2414 </dict>
2415 ```
2416 #### policies.json
2417 ```
2418 {
2419 "policies": {
2420 "EncryptedMediaExtensions": {
2421 "Enabled": true | false,
2422 "Locked": true | false
2423 }
2424 }
2425 }
2426 ```
2427 ### EnterprisePoliciesEnabled
2428 Enable policy support on macOS.
2429
2430 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2431 **CCK2 Equivalent:** N/A\
2432 **Preferences Affected:** N/A
2433
2434 #### macOS
2435 ```
2436 <dict>
2437 <key>EnterprisePoliciesEnabled</key>
2438 <true/>
2439 </dict>
2440 ```
2441 ### Extensions
2442 Control the installation, uninstallation and locking of extensions.
2443
2444 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2445
2446 `Install` is a list of URLs or native paths for extensions to be installed.
2447
2448 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2449
2450 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2451
2452 **Compatibility:** Firefox 60, Firefox ESR 60\
2453 **CCK2 Equivalent:** `addons`\
2454 **Preferences Affected:** N/A
2455
2456 #### Windows (GPO)
2457 ```
2458 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2459 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2460 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2461 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2462 ```
2463 #### Windows (Intune)
2464 OMA-URI:
2465 ```
2466 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2467 ```
2468 Value (string):
2469 ```
2470 <enabled/>
2471 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2472 ```
2473 OMA-URI:
2474 ```
2475 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2476 ```
2477 Value (string):
2478 ```
2479 <enabled/>
2480 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2481 ```
2482 OMA-URI:
2483 ```
2484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2485 ```
2486 Value (string):
2487 ```
2488 <enabled/>
2489 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2490 ```
2491 #### macOS
2492 ```
2493 <dict>
2494 <key>Extensions</key>
2495 <dict>
2496 <key>Install</key>
2497 <array>
2498 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2499 <string>//path/to/xpi</string>
2500 </array>
2501 <key>Uninstall</key>
2502 <array>
2503 <string>bad_addon_id@mozilla.org</string>
2504 </array>
2505 <key>Locked</key>
2506 <array>
2507 <string>addon_id@mozilla.org</string>
2508 </array>
2509 </dict>
2510 </dict>
2511 ```
2512 #### policies.json
2513 ```
2514 {
2515 "policies": {
2516 "Extensions": {
2517 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2518 "Uninstall": ["bad_addon_id@mozilla.org"],
2519 "Locked": ["addon_id@mozilla.org"]
2520 }
2521 }
2522 }
2523 ```
2524 ### ExtensionSettings
2525 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2526
2527 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2528
2529 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2530
2531 The configuration for each extension is another dictionary that can contain the fields documented below.
2532
2533 | Name | Description |
2534 | --- | --- |
2535 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2536 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2537 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2538 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2539 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2540 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2541 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2542 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2543 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2544 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2545 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2546
2547 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2548 **CCK2 Equivalent:** N/A\
2549 **Preferences Affected:** N/A
2550
2551 #### Windows (GPO)
2552 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2553 ```
2554 {
2555 "*": {
2556 "blocked_install_message": "Custom error message.",
2557 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2558 "installation_mode": "blocked",
2559 "allowed_types": ["extension"]
2560 },
2561 "uBlock0@raymondhill.net": {
2562 "installation_mode": "force_installed",
2563 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2564 },
2565 "https-everywhere@eff.org": {
2566 "installation_mode": "allowed"
2567 }
2568 }
2569 ```
2570 #### Windows (Intune)
2571 OMA-URI:
2572 ```
2573 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2574 ```
2575 Value (string):
2576 ```
2577 <enabled/>
2578 <data id="ExtensionSettings" value='
2579 {
2580 "*": {
2581 "blocked_install_message": "Custom error message.",
2582 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2583 "installation_mode": "blocked",
2584 "allowed_types": ["extension"]
2585 },
2586 "uBlock0@raymondhill.net": {
2587 "installation_mode": "force_installed",
2588 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2589 },
2590 "https-everywhere@eff.org": {
2591 "installation_mode": "allowed"
2592 }
2593 }'/>
2594 ```
2595 #### macOS
2596 ```
2597 <dict>
2598 <key>ExtensionSettings</key>
2599 <dict>
2600 <key>*</key>
2601 <dict>
2602 <key>blocked_install_message</key>
2603 <string>Custom error message.</string>
2604 <key>install_sources</key>
2605 <array>
2606 <string>about:addons</string>
2607 <string>https://addons.mozilla.org/</string>
2608 </array>
2609 <key>installation_mode</key>
2610 <string>blocked</string>
2611 <key>allowed_types</key>
2612 <array>
2613 <string>extension</string>
2614 </array>
2615 </dict>
2616 <key>uBlock0@raymondhill.net</key>
2617 <dict>
2618 <key>installation_mode</key>
2619 <string>force_installed</string>
2620 <key>install_url</key>
2621 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2622 </dict>
2623 <key>https-everywhere@eff.org</key>
2624 <dict>
2625 <key>installation_mode</key>
2626 <string>allowed</string>
2627 </dict>
2628 </dict>
2629 </dict>
2630 ```
2631 #### policies.json
2632 ```
2633 {
2634 "policies": {
2635 "ExtensionSettings": {
2636 "*": {
2637 "blocked_install_message": "Custom error message.",
2638 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2639 "installation_mode": "blocked",
2640 "allowed_types": ["extension"]
2641 },
2642 "uBlock0@raymondhill.net": {
2643 "installation_mode": "force_installed",
2644 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2645 },
2646 "https-everywhere@eff.org": {
2647 "installation_mode": "allowed"
2648 }
2649 }
2650 }
2651 }
2652 ```
2653 ### ExtensionUpdate
2654 Control extension updates.
2655
2656 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2657 **CCK2 Equivalent:** N/A\
2658 **Preferences Affected:** `extensions.update.enabled`
2659
2660 #### Windows (GPO)
2661 ```
2662 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2663 ```
2664 #### Windows (Intune)
2665 OMA-URI:
2666 ```
2667 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2668 ```
2669 Value (string):
2670 ```
2671 <enabled/> or <disabled/>
2672 ```
2673 #### macOS
2674 ```
2675 <dict>
2676 <key>ExtensionUpdate</key>
2677 <true/> | <false/>
2678 </dict>
2679 ```
2680 #### policies.json
2681 ```
2682 {
2683 "policies": {
2684 "ExtensionUpdate": true | false
2685 }
2686 }
2687 ```
2688 ### FirefoxHome
2689 Customize the Firefox Home page.
2690
2691 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4)
2692 **CCK2 Equivalent:** N/A\
2693 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
2694
2695 #### Windows (GPO)
2696 ```
2697 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2698 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2699 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
2700 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2701 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2702 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
2703 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2704 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2705 ```
2706 #### Windows (Intune)
2707 OMA-URI:
2708 ```
2709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2710 ```
2711 Value (string):
2712 ```
2713 <enabled/>
2714 <data id="FirefoxHome_Search" value="true | false"/>
2715 <data id="FirefoxHome_TopSites" value="true | false"/>
2716 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
2717 <data id="FirefoxHome_Highlights" value="true | false"/>
2718 <data id="FirefoxHome_Pocket" value="true | false"/>
2719 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
2720 <data id="FirefoxHome_Snippets" value="true | false"/>
2721 <data id="FirefoxHome_Locked" value="true | false"/>
2722 ```
2723 #### macOS
2724 ```
2725 <dict>
2726 <key>FirefoxHome</key>
2727 <dict>
2728 <key>Search</key>
2729 <true/> | <false/>
2730 <key>TopSites</key>
2731 <true/> | <false/>
2732 <key>SponsoredTopSites</key>
2733 <true/> | <false/>
2734 <key>Highlights</key>
2735 <true/> | <false/>
2736 <key>Pocket</key>
2737 <true/> | <false/>
2738 <key>SponsoredPocket</key>
2739 <true/> | <false/>
2740 <key>Snippets</key>
2741 <true/> | <false/>
2742 <key>Locked</key>
2743 <true/> | <false/>
2744 </dict>
2745 </dict>
2746 ```
2747 #### policies.json
2748 ```
2749 {
2750 "policies": {
2751 "FirefoxHome": {
2752 "Search": true | false,
2753 "TopSites": true | false,
2754 "SponsoredTopSites": true | false,
2755 "Highlights": true | false,
2756 "Pocket": true | false,
2757 "SponsoredPocket": true | false,
2758 "Snippets": true | false,
2759 "Locked": true | false
2760 }
2761 }
2762 }
2763 ```
2764 ### FlashPlugin (Deprecated)
2765 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2766
2767 `Allow` is a list of origins where Flash are allowed.
2768
2769 `Block` is a list of origins where Flash is not allowed.
2770
2771 `Default` determines whether or not Flash is allowed by default.
2772
2773 `Locked` prevents the user from changing Flash preferences.
2774
2775 **Compatibility:** Firefox 60, Firefox ESR 60\
2776 **CCK2 Equivalent:** `permissions.plugin`\
2777 **Preferences Affected:** `plugin.state.flash`
2778
2779 #### Windows (GPO)
2780 ```
2781 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2782 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2783 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2784 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2785 ```
2786 #### Windows (Intune)
2787 OMA-URI:
2788 ```
2789 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2790 ```
2791 Value (string):
2792 ```
2793 <enabled/>
2794 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2795 ```
2796 OMA-URI:
2797 ```
2798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2799 ```
2800 Value (string):
2801 ```
2802 <enabled/> or <disabled/>
2803 ```
2804 OMA-URI:
2805 ```
2806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2807 ```
2808 Value (string):
2809 ```
2810 <enabled/> or <disabled/>
2811 ```
2812 #### macOS
2813 ```
2814 <dict>
2815 <key>FlashPlugin</key>
2816 <dict>
2817 <key>Allow</key>
2818 <array>
2819 <string>http://example.org</string>
2820 </array>
2821 <key>Block</key>
2822 <array>
2823 <string>http://example.edu</string>
2824 </array>
2825 <key>Default</key>
2826 <true/> | <false/>
2827 <key>Locked</key>
2828 <true/> | <false/>
2829 </dict>
2830 </dict>
2831 ```
2832 #### policies.json
2833 ```
2834 {
2835 "policies": {
2836 "FlashPlugin": {
2837 "Allow": ["http://example.org/"],
2838 "Block": ["http://example.edu/"],
2839 "Default": true | false,
2840 "Locked": true | false
2841 }
2842 }
2843 }
2844 ```
2845 ### Handlers
2846 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2847
2848 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2849
2850 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2851
2852 | Name | Description |
2853 | --- | --- |
2854 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2855 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2856 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2857 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2858 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2859 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2860
2861 **Compatibility:** Firefox 78, Firefox ESR 78\
2862 **CCK2 Equivalent:** N/A\
2863 **Preferences Affected:** N/A
2864
2865 #### Windows (GPO)
2866 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2867 ```
2868 {
2869 "mimeTypes": {
2870 "application/msword": {
2871 "action": "useSystemDefault",
2872 "ask": true | false
2873 }
2874 },
2875 "schemes": {
2876 "mailto": {
2877 "action": "useHelperApp",
2878 "ask": true | false,
2879 "handlers": [{
2880 "name": "Gmail",
2881 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2882 }]
2883 }
2884 },
2885 "extensions": {
2886 "pdf": {
2887 "action": "useHelperApp",
2888 "ask": true | false,
2889 "handlers": [{
2890 "name": "Adobe Acrobat",
2891 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2892 }]
2893 }
2894 }
2895 }
2896 ```
2897 #### Windows (Intune)
2898 OMA-URI:
2899 ```
2900 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2901 ```
2902 Value (string):
2903 ```
2904 <enabled/>
2905 <data id="Handlers" value='
2906 {
2907 "mimeTypes": {
2908 "application/msword": {
2909 "action": "useSystemDefault",
2910 "ask": true | false
2911 }
2912 },
2913 "schemes": {
2914 "mailto": {
2915 "action": "useHelperApp",
2916 "ask": true | false,
2917 "handlers": [{
2918 "name": "Gmail",
2919 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2920 }]
2921 }
2922 },
2923 "extensions": {
2924 "pdf": {
2925 "action": "useHelperApp",
2926 "ask": true | false,
2927 "handlers": [{
2928 "name": "Adobe Acrobat",
2929 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2930 }]
2931 }
2932 }
2933 }
2934 '/>
2935 ```
2936 #### macOS
2937 ```
2938 <dict>
2939 <key>Handlers</key>
2940 <dict>
2941 <key>mimeTypes</key>
2942 <dict>
2943 <key>application/msword</key>
2944 <dict>
2945 <key>action</key>
2946 <string>useSystemDefault</string>
2947 <key>ask</key>
2948 <true/> | <false/>
2949 </dict>
2950 </dict>
2951 <key>schemes</key>
2952 <dict>
2953 <key>mailto</key>
2954 <dict>
2955 <key>action</key>
2956 <string>useHelperApp</string>
2957 <key>ask</key>
2958 <true/> | <false/>
2959 <key>handlers</key>
2960 <array>
2961 <dict>
2962 <key>name</key>
2963 <string>Gmail</string>
2964 <key>uriTemplate</key>
2965 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2966 </dict>
2967 </array>
2968 </dict>
2969 </dict>
2970 <key>extensions</key>
2971 <dict>
2972 <key>pdf</key>
2973 <dict>
2974 <key>action</key>
2975 <string>useHelperApp</string>
2976 <key>ask</key>
2977 <true/> | <false/>
2978 <key>handlers</key>
2979 <array>
2980 <dict>
2981 <key>name</key>
2982 <string>Adobe Acrobat</string>
2983 <key>path</key>
2984 <string>/System/Applications/Preview.app</string>
2985 </dict>
2986 </array>
2987 </dict>
2988 </dict>
2989 </dict>
2990 </dict>
2991 ```
2992 #### policies.json
2993 ```
2994 {
2995 "policies": {
2996 "Handlers": {
2997 "mimeTypes": {
2998 "application/msword": {
2999 "action": "useSystemDefault",
3000 "ask": false
3001 }
3002 },
3003 "schemes": {
3004 "mailto": {
3005 "action": "useHelperApp",
3006 "ask": true | false,
3007 "handlers": [{
3008 "name": "Gmail",
3009 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3010 }]
3011 }
3012 },
3013 "extensions": {
3014 "pdf": {
3015 "action": "useHelperApp",
3016 "ask": true | false,
3017 "handlers": [{
3018 "name": "Adobe Acrobat",
3019 "path": "/usr/bin/acroread"
3020 }]
3021 }
3022 }
3023 }
3024 }
3025 }
3026 ```
3027 ### HardwareAcceleration
3028 Control hardware acceleration.
3029
3030 **Compatibility:** Firefox 60, Firefox ESR 60\
3031 **CCK2 Equivalent:** N/A\
3032 **Preferences Affected:** `layers.acceleration.disabled`
3033
3034 #### Windows (GPO)
3035 ```
3036 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3037 ```
3038 #### Windows (Intune)
3039 OMA-URI:
3040 ```
3041 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3042 ```
3043 Value (string):
3044 ```
3045 <enabled/> or <disabled/>
3046 ```
3047 #### macOS
3048 ```
3049 <dict>
3050 <key>HardwareAcceleration</key>
3051 <true/> | <false/>
3052 </dict>
3053 ```
3054 #### policies.json
3055 ```
3056 {
3057 "policies": {
3058 "HardwareAcceleration": true | false
3059 }
3060 }
3061 ```
3062 ### Homepage
3063 Configure the default homepage and how Firefox starts.
3064
3065 `URL` is the default homepage.
3066
3067 `Locked` prevents the user from changing homepage preferences.
3068
3069 `Additional` allows for more than one homepage.
3070
3071 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3072
3073 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3074
3075 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3076 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3077 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3078
3079 #### Windows (GPO)
3080 ```
3081 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3082 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3083 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3084 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3085 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3086 ```
3087 #### Windows (Intune)
3088 OMA-URI:
3089 ```
3090 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3091 ```
3092 Value (string):
3093 ```
3094 <enabled/>
3095
3096 <data id="HomepageURL" value="https://example.com"/>
3097 <data id="HomepageLocked" value="true | false"/>
3098 ```
3099 OMA-URI:
3100 ```
3101 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3102 ```
3103 Value (string):
3104 ```
3105 <enabled/>
3106
3107 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3108 ```
3109 OMA-URI:
3110 ```
3111 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3112 ```
3113 Value (string):
3114 ```
3115 <enabled/>
3116
3117 <data id="StartPage" value="none | homepage | previous-session"/>
3118 ```
3119 #### macOS
3120 ```
3121 <dict>
3122 <key>Homepage</key>
3123 <dict>
3124 <key>URL</key>
3125 <string>http://example.com</string>
3126 <key>Locked</key>
3127 <true/> | <false/>
3128 <key>Additional</key>
3129 <array>
3130 <string>http://example.org</string>
3131 <string>http://example.edu</string>
3132 </array>
3133 <key>StartPage</key>
3134 <string>none | homepage | previous-session | homepage-locked</string>
3135 </dict>
3136 </dict>
3137 ```
3138 #### policies.json
3139 ```
3140 {
3141 "policies": {
3142 "Homepage": {
3143 "URL": "http://example.com/",
3144 "Locked": true | false,
3145 "Additional": ["http://example.org/",
3146 "http://example.edu/"],
3147 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3148 }
3149 }
3150 }
3151 ```
3152 ### InstallAddonsPermission
3153 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3154
3155 `Allow` is a list of origins where extension installs are allowed.
3156
3157 `Default` determines whether or not extension installs are allowed by default.
3158
3159 **Compatibility:** Firefox 60, Firefox ESR 60\
3160 **CCK2 Equivalent:** `permissions.install`\
3161 **Preferences Affected:** `xpinstall.enabled`
3162
3163 #### Windows (GPO)
3164 ```
3165 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3166 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3167 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3168 ```
3169 #### Windows (Intune)
3170 OMA-URI:
3171 ```
3172 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3173 ```
3174 Value (string):
3175 ```
3176 <enabled/>
3177 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3178 ```
3179 OMA-URI:
3180 ```
3181 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3182 ```
3183 Value (string):
3184 ```
3185 <enabled/>
3186 ```
3187 #### macOS
3188 ```
3189 <dict>
3190 <key>InstallAddonsPermission</key>
3191 <dict>
3192 <key>Allow</key>
3193 <array>
3194 <string>http://example.org</string>
3195 <string>http://example.edu</string>
3196 </array>
3197 <key>Default</key>
3198 <true/> | <false/>
3199 </dict>
3200 </dict>
3201 ```
3202 #### policies.json
3203 ```
3204 {
3205 "policies": {
3206 "InstallAddonsPermission": {
3207 "Allow": ["http://example.org/",
3208 "http://example.edu/"],
3209 "Default": true | false
3210 }
3211 }
3212 }
3213 ```
3214 ### LegacyProfiles
3215 Disable the feature enforcing a separate profile for each installation.
3216
3217 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3218
3219 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3220
3221 This policy only work on Windows via GPO (not policies.json).
3222
3223 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3224 **CCK2 Equivalent:** N/A\
3225 **Preferences Affected:** N/A
3226
3227 #### Windows (GPO)
3228 ```
3229 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3230 ```
3231 #### Windows (Intune)
3232 OMA-URI:
3233 ```
3234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3235 ```
3236 Value (string):
3237 ```
3238 <enabled/> or <disabled/>
3239 ```
3240 ### LegacySameSiteCookieBehaviorEnabled
3241 Enable default legacy SameSite cookie behavior setting.
3242
3243 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3244
3245 **Compatibility:** Firefox 96\
3246 **CCK2 Equivalent:** N/A\
3247 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3248
3249 #### Windows (GPO)
3250 ```
3251 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3252 ```
3253 #### Windows (Intune)
3254 OMA-URI:
3255 ```
3256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3257 ```
3258 Value (string):
3259 ```
3260 <enabled/> or <disabled/>
3261 ```
3262 #### macOS
3263 ```
3264 <dict>
3265 <key>LegacySameSiteCookieBehaviorEnabled</key>
3266 <true/> | <false/>
3267 </dict>
3268 ```
3269 #### policies.json
3270 ```
3271 {
3272 "policies": {
3273 "LegacySameSiteCookieBehaviorEnabled": true | false
3274 }
3275 ```
3276 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3277 Revert to legacy SameSite behavior for cookies on specified sites.
3278
3279 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3280
3281 **Compatibility:** Firefox 96\
3282 **CCK2 Equivalent:** N/A\
3283 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3284
3285 #### Windows (GPO)
3286 ```
3287 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3288 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3289 ```
3290 #### Windows (Intune)
3291 OMA-URI:
3292 ```
3293 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3294 ```
3295 Value (string):
3296 ```
3297 <enabled/>
3298 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3299 ```
3300 #### macOS
3301 ```
3302 <dict>
3303 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3304 <array>
3305 <string>example.org</string>
3306 <string>example.edu</string>
3307 </array>
3308 </dict>
3309 ```
3310 #### policies.json
3311 ```
3312 {
3313 "policies": {
3314 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3315 "example.edu"]
3316 }
3317 }
3318 ```
3319 ### LocalFileLinks
3320 Enable linking to local files by origin.
3321
3322 **Compatibility:** Firefox 68, Firefox ESR 68\
3323 **CCK2 Equivalent:** N/A\
3324 **Preferences Affected:** `capability.policy.localfilelinks.*`
3325
3326 #### Windows (GPO)
3327 ```
3328 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3329 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3330 ```
3331 #### Windows (Intune)
3332 OMA-URI:
3333 ```
3334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3335 ```
3336 Value (string):
3337 ```
3338 <enabled/>
3339 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3340 ```
3341 #### macOS
3342 ```
3343 <dict>
3344 <key>LocalFileLinks</key>
3345 <array>
3346 <string>http://example.org</string>
3347 <string>http://example.edu</string>
3348 </array>
3349 </dict>
3350 ```
3351 #### policies.json
3352 ```
3353 {
3354 "policies": {
3355 "LocalFileLinks": ["http://example.org/",
3356 "http://example.edu/"]
3357 }
3358 }
3359 ```
3360 ### ManagedBookmarks
3361 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3362
3363 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3364
3365 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3366 ```
3367 {
3368 "items": {
3369 "id": "BookmarkType",
3370 "properties": {
3371 "children": {
3372 "items": {
3373 "$ref": "BookmarkType"
3374 },
3375 "type": "array"
3376 },
3377 "name": {
3378 "type": "string"
3379 },
3380 "toplevel_name": {
3381 "type": "string"
3382 },
3383 "url": {
3384 "type": "string"
3385 }
3386 },
3387 "type": "object"
3388 },
3389 "type": "array"
3390 }
3391 ```
3392 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3393 **CCK2 Equivalent:** N/A\
3394 **Preferences Affected:** N/A
3395
3396 #### Windows (GPO)
3397 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3398 ```
3399 [
3400 {
3401 "toplevel_name": "My managed bookmarks folder"
3402 },
3403 {
3404 "url": "example.com",
3405 "name": "Example"
3406 },
3407 {
3408 "name": "Mozilla links",
3409 "children": [
3410 {
3411 "url": "https://mozilla.org",
3412 "name": "Mozilla.org"
3413 },
3414 {
3415 "url": "https://support.mozilla.org/",
3416 "name": "SUMO"
3417 }
3418 ]
3419 }
3420 ]
3421 ```
3422 #### Windows (Intune)
3423 OMA-URI:
3424 ```
3425 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3426 ```
3427 Value (string):
3428 ```
3429 <enabled/>
3430 <data id="JSON" value='
3431 [
3432 {
3433 "toplevel_name": "My managed bookmarks folder"
3434 },
3435 {
3436 "url": "example.com",
3437 "name": "Example"
3438 },
3439 {
3440 "name": "Mozilla links",
3441 "children": [
3442 {
3443 "url": "https://mozilla.org",
3444 "name": "Mozilla.org"
3445 },
3446 {
3447 "url": "https://support.mozilla.org/",
3448 "name": "SUMO"
3449 }
3450 ]
3451 }
3452 ]'/>
3453 ```
3454 #### macOS
3455 ```
3456 <dict>
3457 <key>ManagedBookmarks</key>
3458 <array>
3459 <dict>
3460 <key>toplevel_name</key>
3461 <string>My managed bookmarks folder</string>
3462 <dict>
3463 <key>url</key>
3464 <string>example.com</string>
3465 <key>name</key>
3466 <string>Example</string>
3467 </dict>
3468 <dict>
3469 <key>name</key>
3470 <string>Mozilla links</string>
3471 <key>children</key>
3472 <array>
3473 <dict>
3474 <key>url</key>
3475 <string>https://mozilla.org</string>
3476 <key>name</key>
3477 <string>Mozilla</string>
3478 </dict>
3479 <dict>
3480 <key>url</key>
3481 <string>https://support.mozilla.org/</string>
3482 <key>name</key>
3483 <string>SUMO</string>
3484 </dict>
3485 </array>
3486 </dict>
3487 </array>
3488 </dict>
3489 ```
3490 #### policies.json
3491 ```
3492 {
3493 "policies": {
3494 "ManagedBookmarks": [
3495 {
3496 "toplevel_name": "My managed bookmarks folder"
3497 },
3498 {
3499 "url": "example.com",
3500 "name": "Example"
3501 },
3502 {
3503 "name": "Mozilla links",
3504 "children": [
3505 {
3506 "url": "https://mozilla.org",
3507 "name": "Mozilla.org"
3508 },
3509 {
3510 "url": "https://support.mozilla.org/",
3511 "name": "SUMO"
3512 }
3513 ]
3514 }
3515 ]
3516 }
3517 }
3518 ```
3519 ### ManualAppUpdateOnly
3520
3521 Switch to manual updates only.
3522
3523 If this policy is enabled:
3524 1. The user will never be prompted to install updates
3525 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3526 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3527
3528 This policy is primarily intended for advanced end users, not for enterprises.
3529
3530 **Compatibility:** Firefox 87\
3531 **CCK2 Equivalent:** N/A\
3532 **Preferences Affected:** N/A
3533
3534 #### policies.json
3535 ```
3536 {
3537 "policies": {
3538 "ManualAppUpdateOnly": true | false
3539 }
3540 }
3541 ```
3542 ### NetworkPrediction
3543 Enable or disable network prediction (DNS prefetching).
3544
3545 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3546 **CCK2 Equivalent:** N/A\
3547 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3548
3549 #### Windows (GPO)
3550 ```
3551 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3552 ```
3553 #### Windows (Intune)
3554 OMA-URI:
3555 ```
3556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3557 ```
3558 Value (string):
3559 ```
3560 <enabled/> or <disabled/>
3561 ```
3562 #### macOS
3563 ```
3564 <dict>
3565 <key>NetworkPrediction</key>
3566 <true/> | <false/>
3567 </dict>
3568 ```
3569 #### policies.json
3570 ```
3571 {
3572 "policies": {
3573 "NetworkPrediction": true | false
3574 }
3575 ```
3576 ### NewTabPage
3577 Enable or disable the New Tab page.
3578
3579 **Compatibility:** Firefox 68, Firefox ESR 68\
3580 **CCK2 Equivalent:** N/A\
3581 **Preferences Affected:** `browser.newtabpage.enabled`
3582
3583 #### Windows (GPO)
3584 ```
3585 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3586 ```
3587 #### Windows (Intune)
3588 OMA-URI:
3589 ```
3590 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3591 ```
3592 Value (string):
3593 ```
3594 <enabled/> or <disabled/>
3595 ```
3596 #### macOS
3597 ```
3598 <dict>
3599 <key>NewTabPage</key>
3600 <true/> | <false/>
3601 </dict>
3602 ```
3603 #### policies.json
3604 ```
3605 {
3606 "policies": {
3607 "NewTabPage": true | false
3608 }
3609 ```
3610 ### NoDefaultBookmarks
3611 Disable the creation of default bookmarks.
3612
3613 This policy is only effective if the user profile has not been created yet.
3614
3615 **Compatibility:** Firefox 60, Firefox ESR 60\
3616 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3617 **Preferences Affected:** N/A
3618
3619 #### Windows (GPO)
3620 ```
3621 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3622 ```
3623 #### Windows (Intune)
3624 OMA-URI:
3625 ```
3626 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3627 ```
3628 Value (string):
3629 ```
3630 <enabled/> or <disabled/>
3631 ```
3632 #### macOS
3633 ```
3634 <dict>
3635 <key>NoDefaultBookmarks</key>
3636 <true/> | <false/>
3637 </dict>
3638 ```
3639 #### policies.json
3640 ```
3641 {
3642 "policies": {
3643 "NoDefaultBookmarks": true | false
3644 }
3645 }
3646 ```
3647 ### OfferToSaveLogins
3648 Control whether or not Firefox offers to save passwords.
3649
3650 **Compatibility:** Firefox 60, Firefox ESR 60\
3651 **CCK2 Equivalent:** `dontRememberPasswords`\
3652 **Preferences Affected:** `signon.rememberSignons`
3653
3654 #### Windows (GPO)
3655 ```
3656 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3657 ```
3658 #### Windows (Intune)
3659 OMA-URI:
3660 ```
3661 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3662 ```
3663 Value (string):
3664 ```
3665 <enabled/> or <disabled/>
3666 ```
3667 #### macOS
3668 ```
3669 <dict>
3670 <key>OfferToSaveLogins</key>
3671 <true/> | <false/>
3672 </dict>
3673 ```
3674 #### policies.json
3675 ```
3676 {
3677 "policies": {
3678 "OfferToSaveLogins": true | false
3679 }
3680 }
3681 ```
3682 ### OfferToSaveLoginsDefault
3683 Sets the default value of signon.rememberSignons without locking it.
3684
3685 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3686 **CCK2 Equivalent:** `dontRememberPasswords`\
3687 **Preferences Affected:** `signon.rememberSignons`
3688
3689 #### Windows (GPO)
3690 ```
3691 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3692 ```
3693 #### Windows (Intune)
3694 OMA-URI:
3695 ```
3696 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3697 ```
3698 Value (string):
3699 ```
3700 <enabled/> or <disabled/>
3701 ```
3702 #### macOS
3703 ```
3704 <dict>
3705 <key>OfferToSaveLoginsDefault</key>
3706 <true/> | <false/>
3707 </dict>
3708 ```
3709 #### policies.json
3710 ```
3711 {
3712 "policies": {
3713 "OfferToSaveLoginsDefault": true | false
3714 }
3715 }
3716 ```
3717 ### OverrideFirstRunPage
3718 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3719
3720 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3721
3722 **Compatibility:** Firefox 60, Firefox ESR 60\
3723 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3724 **Preferences Affected:** `startup.homepage_welcome_url`
3725
3726 #### Windows (GPO)
3727 ```
3728 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3729 ```
3730 #### Windows (Intune)
3731 OMA-URI:
3732 ```
3733 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3734 ```
3735 Value (string):
3736 ```
3737 <enabled/>
3738 <data id="OverridePage" value="https://example.com"/>
3739 ```
3740 #### macOS
3741 ```
3742 <dict>
3743 <key>OverrideFirstRunPage</key>
3744 <string>http://example.org</string>
3745 </dict>
3746 ```
3747 #### policies.json
3748 ```
3749 {
3750 "policies": {
3751 "OverrideFirstRunPage": "http://example.org"
3752 }
3753 }
3754 ```
3755 ### OverridePostUpdatePage
3756 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3757
3758 **Compatibility:** Firefox 60, Firefox ESR 60\
3759 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3760 **Preferences Affected:** `startup.homepage_override_url`
3761
3762 #### Windows (GPO)
3763 ```
3764 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3765 ```
3766 #### Windows (Intune)
3767 OMA-URI:
3768 ```
3769 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3770 ```
3771 Value (string):
3772 ```
3773 <enabled/>
3774 <data id="OverridePage" value="https://example.com"/>
3775 ```
3776 #### macOS
3777 ```
3778 <dict>
3779 <key>OverridePostUpdatePage</key>
3780 <string>http://example.org</string>
3781 </dict>
3782 ```
3783 #### policies.json
3784 ```
3785 {
3786 "policies": {
3787 "OverridePostUpdatePage": "http://example.org"
3788 }
3789 }
3790 ```
3791 ### PasswordManagerEnabled
3792 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3793
3794 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3795 **CCK2 Equivalent:** N/A\
3796 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3797
3798 #### Windows (GPO)
3799 ```
3800 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3801 ```
3802 #### Windows (Intune)
3803 OMA-URI:
3804 ```
3805 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3806 ```
3807 Value (string):
3808 ```
3809 <enabled/> or <disabled/>
3810 ```
3811 #### macOS
3812 ```
3813 <dict>
3814 <key>PasswordManagerEnabled</key>
3815 <true/> | <false/>
3816 </dict>
3817 ```
3818 #### policies.json
3819 ```
3820 {
3821 "policies": {
3822 "PasswordManagerEnabled": true | false
3823 }
3824 }
3825 ```
3826 ### PasswordManagerExceptions
3827 Prevent Firefox from saving passwords for specific sites.
3828
3829 The sites are specified as a list of origins.
3830
3831 **Compatibility:** Firefox 101\
3832 **CCK2 Equivalent:** N/A\
3833 **Preferences Affected:** N/A
3834
3835 #### Windows (GPO)
3836 ```
3837 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
3838 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
3839 ```
3840 #### Windows (Intune)
3841 OMA-URI:
3842 ```
3843 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
3844 ```
3845 Value (string):
3846 ```
3847 <enabled/>
3848 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3849 ```
3850 #### macOS
3851 ```
3852 <dict>
3853 <key>PasswordManagerExceptions</key>
3854 <array>
3855 <string>https://example.org</string>
3856 <string>https://example.edu</string>
3857 </array>
3858 </dict>
3859 ```
3860 #### policies.json
3861 ```
3862 {
3863 "policies": {
3864 "PasswordManagerExceptions": ["https://example.org",
3865 "https://example.edu"]
3866 }
3867 }
3868 ```
3869
3870 ### PDFjs
3871 Disable or configure PDF.js, the built-in PDF viewer.
3872
3873 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3874
3875 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3876
3877 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3878
3879 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3880 **CCK2 Equivalent:** N/A\
3881 **Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions`
3882
3883 #### Windows (GPO)
3884 ```
3885 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3886 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3887 ```
3888 #### Windows (Intune)
3889 OMA-URI:
3890 ```
3891 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3893 ```
3894 Value (string):
3895 ```
3896 <enabled/>or <disabled/>
3897 ```
3898 #### macOS
3899 ```
3900 <dict>
3901 <key>PDFjs</key>
3902 <dict>
3903 <key>Enabled</key>
3904 <true/> | <false/>
3905 <key>EnablePermissions</key>
3906 <true/> | <false/>
3907 </dict>
3908 </dict>
3909 ```
3910 #### policies.json
3911 ```
3912 {
3913 "policies": {
3914 "PDFjs": {
3915 "Enabled": true | false,
3916 "EnablePermissions": true | false
3917 }
3918 }
3919 }
3920 ```
3921 ### Permissions
3922 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3923
3924 `Allow` is a list of origins where the feature is allowed.
3925
3926 `Block` is a list of origins where the feature is not allowed.
3927
3928 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3929
3930 `Locked` prevents the user from changing preferences for the feature.
3931
3932 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3933
3934 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3935 **CCK2 Equivalent:** N/A\
3936 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
3937
3938 #### Windows (GPO)
3939 ```
3940 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3941 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3942 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3943 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3944 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3945 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3946 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3947 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3948 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3949 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3950 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3951 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3952 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3953 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3954 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3955 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3956 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3957 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3958 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3959 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3960 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3961 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3962 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3963 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3964 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3965 ```
3966 #### Windows (Intune)
3967 OMA-URI:
3968 ```
3969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3970 ```
3971 Value (string):
3972 ```
3973 <enabled/> or <disabled/>
3974 ```
3975 OMA-URI:
3976 ```
3977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3978 ```
3979 Value (string):
3980 ```
3981 <enabled/> or <disabled/>
3982 ```
3983 OMA-URI:
3984 ```
3985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3986 ```
3987 Value (string):
3988 ```
3989 <enabled/>
3990 <data id="Permissions" value="1&#xF000;https://example.org"/>
3991 ```
3992 OMA-URI:
3993 ```
3994 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3995 ```
3996 Value (string):
3997 ```
3998 <enabled/> or <disabled/>
3999 ```
4000 OMA-URI:
4001 ```
4002 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4003 ```
4004 Value (string):
4005 ```
4006 <enabled/> or <disabled/>
4007 ```
4008 OMA-URI:
4009 ```
4010 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4011 ```
4012 Value (string):
4013 ```
4014 <enabled/>
4015 <data id="Permissions" value="1&#xF000;https://example.org"/>
4016 ```
4017 OMA-URI:
4018 ```
4019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4020 ```
4021 Value (string):
4022 ```
4023 <enabled/>
4024 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4025 ```
4026 OMA-URI:
4027 ```
4028 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4029 ```
4030 Value (string):
4031 ```
4032 <enabled/>
4033 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4034 ```
4035 OMA-URI:
4036 ```
4037 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4038 ```
4039 Value (string):
4040 ```
4041 <enabled/> or <disabled/>
4042 ```
4043 OMA-URI:
4044 ```
4045 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4046 ```
4047 Value (string):
4048 ```
4049 <enabled/>
4050 <data id="Permissions" value="1&#xF000;https://example.org"/>
4051 ```
4052 OMA-URI:
4053 ```
4054 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4055 ```
4056 Value (string):
4057 ```
4058 <enabled/>
4059 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4060 ```
4061 OMA-URI:
4062 ```
4063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4064 ```
4065 Value (string):
4066 ```
4067 <enabled/> or <disabled/>
4068 ```
4069 OMA-URI:
4070 ```
4071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4072 ```
4073 Value (string):
4074 ```
4075 <enabled/> or <disabled/>
4076 ```
4077 #### macOS
4078 ```
4079 <dict>
4080 <key>Permissions</key>
4081 <dict>
4082 <key>Camera</key>
4083 <dict>
4084 <key>Allow</key>
4085 <array>
4086 <string>https://example.org</string>
4087 <string>https://example.org:1234</string>
4088 </array>
4089 <key>Block</key>
4090 <array>
4091 <string>https://example.edu</string>
4092 </array>
4093 <key>BlockNewRequests</key>
4094 <true/> | <false/>
4095 <key>Locked</key>
4096 <true/> | <false/>
4097 </dict>
4098 <key>Microphone</key>
4099 <dict>
4100 <key>Allow</key>
4101 <array>
4102 <string>https://example.org</string>
4103 </array>
4104 <key>Block</key>
4105 <array>
4106 <string>https://example.edu</string>
4107 </array>
4108 <key>BlockNewRequests</key>
4109 <true/> | <false/>
4110 <key>Locked</key>
4111 <true/> | <false/>
4112 </dict>
4113 <key>Location</key>
4114 <dict>
4115 <key>Allow</key>
4116 <array>
4117 <string>https://example.org</string>
4118 </array>
4119 <key>Block</key>
4120 <array>
4121 <string>https://example.edu</string>
4122 </array>
4123 <key>BlockNewRequests</key>
4124 <true/> | <false/>
4125 <key>Locked</key>
4126 <true/> | <false/>
4127 </dict>
4128 <key>Notifications</key>
4129 <dict>
4130 <key>Allow</key>
4131 <array>
4132 <string>https://example.org</string>
4133 </array>
4134 <key>Block</key>
4135 <array>
4136 <string>https://example.edu</string>
4137 </array>
4138 <key>BlockNewRequests</key>
4139 <true/>
4140 <key>Locked</key>
4141 <true/>
4142 </dict>
4143 <key>Autoplay</key>
4144 <dict>
4145 <key>Allow</key>
4146 <array>
4147 <string>https://example.org</string>
4148 </array>
4149 <key>Block</key>
4150 <array>
4151 <string>https://example.edu</string>
4152 </array>
4153 <key>Default</key>
4154 <string>allow-audio-video | block-audio | block-audio-video</string>
4155 <key>Locked</key>
4156 <true/> | <false/>
4157 </dict>
4158 </dict>
4159 </dict>
4160 ```
4161 #### policies.json
4162 ```
4163 {
4164 "policies": {
4165 "Permissions": {
4166 "Camera": {
4167 "Allow": ["https://example.org","https://example.org:1234"],
4168 "Block": ["https://example.edu"],
4169 "BlockNewRequests": true | false,
4170 "Locked": true | false
4171 },
4172 "Microphone": {
4173 "Allow": ["https://example.org"],
4174 "Block": ["https://example.edu"],
4175 "BlockNewRequests": true | false,
4176 "Locked": true | false
4177 },
4178 "Location": {
4179 "Allow": ["https://example.org"],
4180 "Block": ["https://example.edu"],
4181 "BlockNewRequests": true | false,
4182 "Locked": true | false
4183 },
4184 "Notifications": {
4185 "Allow": ["https://example.org"],
4186 "Block": ["https://example.edu"],
4187 "BlockNewRequests": true | false,
4188 "Locked": true | false
4189 },
4190 "Autoplay": {
4191 "Allow": ["https://example.org"],
4192 "Block": ["https://example.edu"],
4193 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4194 "Locked": true | false
4195 }
4196 }
4197 }
4198 }
4199 ```
4200 ### PictureInPicture
4201
4202 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4203
4204 **Compatibility:** Firefox 78, Firefox ESR 78\
4205 **CCK2 Equivalent:** N/A\
4206 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4207
4208 #### Windows (GPO)
4209 ```
4210 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4211 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4212
4213 ```
4214 #### Windows (Intune)
4215 OMA-URI:
4216 ```
4217 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4219 ```
4220 Value (string):
4221 ```
4222 <enabled/> or <disabled/>
4223 ```
4224 #### macOS
4225 ```
4226 <dict>
4227 <key>PictureInPicture</key>
4228 <dict>
4229 <key>Enabled</key>
4230 <true/> | <false/>
4231 <key>Locked</key>
4232 <true/> | <false/>
4233 </dict>
4234 </dict>
4235 ```
4236 #### policies.json
4237 ```
4238 {
4239 "policies": {
4240 "PictureInPicture": {
4241 "Enabled": true | false,
4242 "Locked": true | false
4243 }
4244 }
4245 }
4246 ```
4247 ### PopupBlocking
4248 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4249
4250 `Allow` is a list of origins where popup-windows are allowed.
4251
4252 `Default` determines whether or not pop-up windows are allowed by default.
4253
4254 `Locked` prevents the user from changing pop-up preferences.
4255
4256 **Compatibility:** Firefox 60, Firefox ESR 60\
4257 **CCK2 Equivalent:** `permissions.popup`\
4258 **Preferences Affected:** `dom.disable_open_during_load`
4259
4260 #### Windows (GPO)
4261 ```
4262 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4263 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4264 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4265 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4266 ```
4267 #### Windows (Intune)
4268 OMA-URI:
4269 ```
4270 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4271 ```
4272 Value (string):
4273 ```
4274 <enabled/>
4275 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4276 ```
4277 OMA-URI:
4278 ```
4279 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4280 ```
4281 Value (string):
4282 ```
4283 <enabled/> or <disabled/>
4284 ```
4285 OMA-URI:
4286 ```
4287 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4288 ```
4289 Value (string):
4290 ```
4291 <enabled/> or <disabled/>
4292 ```
4293 #### macOS
4294 ```
4295 <dict>
4296 <key>PopupBlocking</key>
4297 <dict>
4298 <key>Allow</key>
4299 <array>
4300 <string>http://example.org</string>
4301 <string>http://example.edu</string>
4302 </array>
4303 <key>Default</key>
4304 <true/> | <false/>
4305 <key>Locked</key>
4306 <true/> | <false/>
4307 </dict>
4308 </dict>
4309 ```
4310 #### policies.json
4311 ```
4312 {
4313 "policies": {
4314 "PopupBlocking": {
4315 "Allow": ["http://example.org/",
4316 "http://example.edu/"],
4317 "Default": true | false,
4318 "Locked": true | false
4319 }
4320 }
4321 }
4322 ```
4323 ### Preferences
4324 Set and lock preferences.
4325
4326 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4327
4328 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4329
4330 Preferences that start with the following prefixes are supported:
4331 ```
4332 accessibility.
4333 app.update.* (Firefox 86, Firefox 78.8)
4334 browser.
4335 datareporting.policy.
4336 dom.
4337 extensions.
4338 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4339 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4340 geo.
4341 gfx.
4342 intl.
4343 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4344 layers.
4345 layout.
4346 media.
4347 network.
4348 pdfjs. (Firefox 84, Firefox ESR 78.6)
4349 places.
4350 print.
4351 signon. (Firefox 83, Firefox ESR 78.5)
4352 spellchecker. (Firefox 84, Firefox ESR 78.6)
4353 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4354 ui.
4355 widget.
4356 ```
4357 as well as the following security preferences:
4358 | Preference | Type | Default
4359 | --- | --- | ---
4360 | security.default_personal_cert | string | Ask Every Time
4361 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4362 | security.insecure_connection_text.enabled | bool | false
4363 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4364 | security.insecure_connection_text.pbmode.enabled | bool | false
4365 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4366 | security.insecure_field_warning.contextual.enabled | bool | true
4367 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4368 | security.mixed_content.block_active_content | boolean | true
4369 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4370 | security.osclientcerts.autoload | boolean | false
4371 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4372 | security.ssl.errorReporting.enabled | boolean | true
4373 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4374 | security.tls.enable_0rtt_data | boolean | true
4375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15).
4376 | security.tls.hello_downgrade_check | boolean | true
4377 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4378 | security.tls.version.enable-deprecated | boolean | false
4379 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8).
4380 | security.warn_submit_secure_to_insecure | boolean | true
4381 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4382 &nbsp;
4383
4384 Using the preference as the key, set the `Value` to the corresponding preference value.
4385
4386 `Status` can be "default", "locked", "user" or "clear"
4387
4388 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4389 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4390 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4391 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4392
4393 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4394
4395 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4396
4397 See the examples below for more detail.
4398
4399 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4400
4401 Status
4402 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4403 **CCK2 Equivalent:** `preferences`\
4404 **Preferences Affected:** Many
4405
4406 #### Windows (GPO)
4407 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4408 ```
4409 {
4410 "accessibility.force_disabled": {
4411 "Value": 1,
4412 "Status": "default"
4413 },
4414 "browser.cache.disk.parent_directory": {
4415 "Value": "SOME_NATIVE_PATH",
4416 "Status": "user"
4417 },
4418 "browser.tabs.warnOnClose": {
4419 "Value": false,
4420 "Status": "locked"
4421 }
4422 }
4423 ```
4424 #### Windows (Intune)
4425 OMA-URI:
4426 ```
4427 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4428 ```
4429 Value (string):
4430 ```
4431 <enabled/>
4432 <data id="JSON" value='
4433 {
4434 "accessibility.force_disabled": {
4435 "Value": 1,
4436 "Status": "default"
4437 },
4438 "browser.cache.disk.parent_directory": {
4439 "Value": "SOME_NATIVE_PATH",
4440 "Status": "user"
4441 },
4442 "browser.tabs.warnOnClose": {
4443 "Value": false,
4444 "Status": "locked"
4445 }
4446 }'/>
4447 ```
4448 #### macOS
4449 ```
4450 <dict>
4451 <key>Preferences</key>
4452 <dict>
4453 <key>accessibility.force_disabled</key>
4454 <dict>
4455 <key>Value</key>
4456 <integer>1</integer>
4457 <key>Status</key>
4458 <string>default</string>
4459 </dict>
4460 <key>browser.cache.disk.parent_directory</key>
4461 <dict>
4462 <key>Value</key>
4463 <string>SOME_NATIVE_PATH</string>
4464 <key>Status</key>
4465 <string>user</string>
4466 </dict>
4467 <key>browser.tabs.warnOnClose</key>
4468 <dict>
4469 <key>Value</key>
4470 <false/>
4471 <key>Status</key>
4472 <string>locked</string>
4473 </dict>
4474 </dict>
4475 </dict>
4476 ```
4477 #### policies.json
4478 ```
4479 {
4480 "policies": {
4481 "Preferences": {
4482 "accessibility.force_disabled": {
4483 "Value": 1,
4484 "Status": "default"
4485 },
4486 "browser.cache.disk.parent_directory": {
4487 "Value": "SOME_NATIVE_PATH",
4488 "Status": "user"
4489 },
4490 "browser.tabs.warnOnClose": {
4491 "Value": false,
4492 "Status": "locked"
4493 }
4494 }
4495 }
4496 }
4497 ```
4498 ### Preferences (Deprecated)
4499 Set and lock certain preferences.
4500
4501 **Compatibility:** See below\
4502 **CCK2 Equivalent:** `preferences`\
4503 **Preferences Affected:** See below
4504
4505 | Preference | Type | Compatibility | Default
4506 | --- | --- | --- | ---
4507 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4508 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4509 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4510 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4511 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4512 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4513 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4514 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4515 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4516 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4517 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4518 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4519 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4520 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4521 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4522 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4523 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4524 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4525 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4526 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4527 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4528 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4529 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4530 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4531 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4532 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4533 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4534 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4535 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4536 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4537 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4538 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4539 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4540 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4541 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4542 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4543 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4544 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4545 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4546 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4547 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4548 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4549 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4550 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4551 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4552 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4553 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4554 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4555 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4556 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4557 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4558 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4559 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4560 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4561 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4562 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4563 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4564 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4565 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4566 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4567 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4568 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4569 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4570 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4571 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4572 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4573 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4574 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4575 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4576 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4577 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4578 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4579 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4580 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4581 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4582 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4583 disabled
4584 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4585 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4586 disabled
4587 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4588 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4589 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4590 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4591 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4592 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4593 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4594 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4595 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4596 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4597 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4598 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4599 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4600 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4601 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4602 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4603 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4604 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4605 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4606 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4607 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4608 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4609 #### Windows (GPO)
4610 ```
4611 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4612 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4613 ```
4614 #### Windows (Intune)
4615 OMA-URI: (periods are replaced by underscores)
4616 ```
4617 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4618 ```
4619 Value (string):
4620 ```
4621 <enabled/> or <disabled/>
4622 ```
4623 OMA-URI: (periods are replaced by underscores)
4624 ```
4625 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4626 ```
4627 Value (string):
4628 ```
4629 <enabled/>
4630 <data id="Preferences_String" value="string_value"/>
4631 ```
4632 #### macOS
4633 ```
4634 <dict>
4635 <key>Preferences</key>
4636 <dict>
4637 <key>boolean_preference_name</key>
4638 <true/> | <false/>
4639 <key>string_preference_name</key>
4640 <string>string_value</string>
4641 </dict>
4642 </dict>
4643 ```
4644 #### policies.json
4645 ```
4646 {
4647 "policies": {
4648 "Preferences": {
4649 "boolean_preference_name": true | false,
4650 "string_preference_name": "string_value"
4651 }
4652 }
4653 }
4654 ```
4655 ### PrimaryPassword
4656 Require or prevent using a primary (formerly master) password.
4657
4658 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4659
4660 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4661
4662 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4663 **CCK2 Equivalent:** `noMasterPassword`\
4664 **Preferences Affected:** N/A
4665
4666 #### Windows (GPO)
4667 ```
4668 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4669 ```
4670 #### Windows (Intune)
4671 OMA-URI:
4672 ```
4673 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4674 ```
4675 Value (string):
4676 ```
4677 <enabled/> or <disabled/>
4678 ```
4679 #### macOS
4680 ```
4681 <dict>
4682 <key>PrimaryPassword</key>
4683 <true/> | <false/>
4684 </dict>
4685 ```
4686 #### policies.json
4687 ```
4688 {
4689 "policies": {
4690 "PrimaryPassword": true | false
4691 }
4692 }
4693 ```
4694 ### PromptForDownloadLocation
4695 Ask where to save each file before downloading.
4696
4697 **Compatibility:** Firefox 68, Firefox ESR 68\
4698 **CCK2 Equivalent:** N/A\
4699 **Preferences Affected:** `browser.download.useDownloadDir`
4700
4701 #### Windows (GPO)
4702 ```
4703 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4704 ```
4705 #### Windows (Intune)
4706 OMA-URI:
4707 ```
4708 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4709 ```
4710 Value (string):
4711 ```
4712 <enabled/> or <disabled/>
4713 ```
4714 #### macOS
4715 ```
4716 <dict>
4717 <key>PromptForDownloadLocation</key>
4718 <true/> | <false/>
4719 </dict>
4720 ```
4721 #### policies.json
4722 ```
4723 {
4724 "policies": {
4725 "PromptForDownloadLocation": true | false
4726 }
4727 }
4728 ```
4729 ### Proxy
4730 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4731 To specify ports, append them to the hostnames with a colon (:).
4732
4733 `Mode` is the proxy method being used.
4734
4735 `Locked` is whether or not proxy settings can be changed.
4736
4737 `HTTPProxy` is the HTTP proxy server.
4738
4739 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4740
4741 `SSLProxy` is the SSL proxy server.
4742
4743 `FTPProxy` is the FTP proxy server.
4744
4745 `SOCKSProxy` is the SOCKS proxy server
4746
4747 `SOCKSVersion` is the SOCKS version (4 or 5)
4748
4749 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4750
4751 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4752
4753 `AutoLogin` means do not prompt for authentication if password is saved.
4754
4755 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4756
4757 **Compatibility:** Firefox 60, Firefox ESR 60\
4758 **CCK2 Equivalent:** `networkProxy*`\
4759 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
4760
4761 #### Windows (GPO)
4762 ```
4763 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4764 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4765 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4766 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4767 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4768 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4769 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4770 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4771 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4772 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4773 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4774 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4775 ```
4776 #### Windows (Intune)
4777 OMA-URI:
4778 ```
4779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4780 ```
4781 Value (string):
4782 ```
4783 <enabled/>
4784 <data id="ProxyLocked" value="true | false"/>
4785 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4786 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4787 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4788 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4789 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4790 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4791 <data id="SOCKSVersion" value="4 | 5"/>
4792 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4793 <data id="Passthrough" value="<local>"/>
4794 <data id="AutoLogin" value="true | false"/>
4795 <data id="UseProxyForDNS" value="true | false"/>
4796 ```
4797 #### macOS
4798 ```
4799 <dict>
4800 <key>Proxy</key>
4801 <dict>
4802 <key>Mode</key>
4803 <string>none | system | manual | autoDetect | autoConfig</string>
4804 <key>Locked</key>
4805 <true> | </false>
4806 <key>HTTPProxy</key>
4807 <string>https://httpproxy.example.com</string>
4808 <key>UseHTTPProxyForAllProtocols</key>
4809 <true> | </false>
4810 <key>SSLProxy</key>
4811 <string>https://sslproxy.example.com</string>
4812 <key>FTPProxy</key>
4813 <string>https://ftpproxy.example.com</string>
4814 <key>SOCKSProxy</key>
4815 <string>https://socksproxy.example.com</string>
4816 <key>SOCKSVersion</key>
4817 <string>4 | 5</string>
4818 <key>Passthrough</key>
4819 <string>&lt;local>&gt;</string>
4820 <key>AutoConfigURL</key>
4821 <string>URL_TO_AUTOCONFIG</string>
4822 <key>AutoLogin</key>
4823 <true> | </false>
4824 <key>UseProxyForDNS</key>
4825 <true> | </false>
4826 </dict>
4827 </dict>
4828 ```
4829 #### policies.json
4830 ```
4831 {
4832 "policies": {
4833 "Proxy": {
4834 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4835 "Locked": true | false,
4836 "HTTPProxy": "hostname",
4837 "UseHTTPProxyForAllProtocols": true | false,
4838 "SSLProxy": "hostname",
4839 "FTPProxy": "hostname",
4840 "SOCKSProxy": "hostname",
4841 "SOCKSVersion": 4 | 5,
4842 "Passthrough": "<local>",
4843 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4844 "AutoLogin": true | false,
4845 "UseProxyForDNS": true | false
4846 }
4847 }
4848 }
4849 ```
4850 ### RequestedLocales
4851 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4852
4853 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4854
4855 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4856 **CCK2 Equivalent:** N/A\
4857 **Preferences Affected:** N/A
4858 #### Windows (GPO)
4859 ```
4860 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4861 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4862
4863 or
4864
4865 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4866 ```
4867 #### Windows (Intune)
4868 OMA-URI:
4869 ```
4870 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4871 ```
4872 Value (string):
4873 ```
4874 <enabled/>
4875 <data id="Preferences_String" value="de,en-US"/>
4876 ```
4877 #### macOS
4878 ```
4879 <dict>
4880 <key>RequestedLocales</key>
4881 <array>
4882 <string>de</string>
4883 <string>en-US</string>
4884 </array>
4885 </dict>
4886
4887 or
4888
4889 <dict>
4890 <key>RequestedLocales</key>
4891 <string>de,en-US</string>
4892 </dict>
4893
4894 ```
4895 #### policies.json
4896 ```
4897 {
4898 "policies": {
4899 "RequestedLocales": ["de", "en-US"]
4900 }
4901 }
4902
4903 or
4904
4905 {
4906 "policies": {
4907 "RequestedLocales": "de,en-US"
4908 }
4909 }
4910 ```
4911 <a name="SanitizeOnShutdown"></a>
4912
4913 ### SanitizeOnShutdown (Selective)
4914 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4915
4916 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4917
4918 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4919 **CCK2 Equivalent:** N/A\
4920 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
4921 #### Windows (GPO)
4922 ```
4923 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4924 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4925 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4926 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4927 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4928 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4929 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4930 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4931 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4932 ```
4933 #### Windows (Intune)
4934 OMA-URI:
4935 ```
4936 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4937 ```
4938 Value (string):
4939 ```
4940 <enabled/> or <disabled/>
4941 ```
4942 OMA-URI:
4943 ```
4944 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4945 ```
4946 Value (string):
4947 ```
4948 <enabled/> or <disabled/>
4949 ```
4950 OMA-URI:
4951 ```
4952 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4953 ```
4954 Value (string):
4955 ```
4956 <enabled/> or <disabled/>
4957 ```
4958 OMA-URI:
4959 ```
4960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4961 ```
4962 Value (string):
4963 ```
4964 <enabled/> or <disabled/>
4965 ```
4966 OMA-URI:
4967 ```
4968 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4969 ```
4970 Value (string):
4971 ```
4972 <enabled/> or <disabled/>
4973 ```
4974 OMA-URI:
4975 ```
4976 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4977 ```
4978 Value (string):
4979 ```
4980 <enabled/> or <disabled/>
4981 ```
4982 OMA-URI:
4983 ```
4984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4985 ```
4986 Value (string):
4987 ```
4988 <enabled/> or <disabled/>
4989 ```
4990 OMA-URI:
4991 ```
4992 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4993 ```
4994 Value (string):
4995 ```
4996 <enabled/> or <disabled/>
4997 ```
4998 OMA-URI:
4999 ```
5000 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5001 ```
5002 Value (string):
5003 ```
5004 <enabled/> or <disabled/>
5005 ```
5006 #### macOS
5007 ```
5008 <dict>
5009 <key>SanitizeOnShutdown</key>
5010 <dict>
5011 <key>Cache</key>
5012 <true/> | <false/>
5013 <key>Cookies</key>
5014 <true/> | <false/>
5015 <key>Downloads</key>
5016 <true/> | <false/>
5017 <key>FormData</key>
5018 <true/> | <false/>
5019 <key>History</key>
5020 <true/> | <false/>
5021 <key>Sessions</key>
5022 <true/> | <false/>
5023 <key>SiteSettings</key>
5024 <true/> | <false/>
5025 <key>OfflineApps</key>
5026 <true/> | <false/>
5027 <key>Locked</key>
5028 <true/> | <false/>
5029 </dict>
5030 </dict>
5031 ```
5032 #### policies.json
5033 ```
5034 {
5035 "policies": {
5036 "SanitizeOnShutdown": {
5037 "Cache": true | false,
5038 "Cookies": true | false,
5039 "Downloads": true | false,
5040 "FormData": true | false,
5041 "History": true | false,
5042 "Sessions": true | false,
5043 "SiteSettings": true | false,
5044 "OfflineApps": true | false,
5045 "Locked": true | false
5046 }
5047 }
5048 }
5049 ```
5050 ### SanitizeOnShutdown (All)
5051 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5052
5053 **Compatibility:** Firefox 60, Firefox ESR 60\
5054 **CCK2 Equivalent:** N/A\
5055 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5056 #### Windows (GPO)
5057 ```
5058 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5059 ```
5060 #### Windows (Intune)
5061 OMA-URI:
5062 ```
5063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5064 ```
5065 Value (string):
5066 ```
5067 <enabled/> or <disabled/>
5068 ```
5069 #### macOS
5070 ```
5071 <dict>
5072 <key>SanitizeOnShutdown</key>
5073 <true/> | <false/>
5074 </dict>
5075 ```
5076 #### policies.json
5077 ```
5078 {
5079 "policies": {
5080 "SanitizeOnShutdown": true | false
5081 }
5082 }
5083 ```
5084 ### SearchBar
5085 Set whether or not search bar is displayed.
5086
5087 **Compatibility:** Firefox 60, Firefox ESR 60\
5088 **CCK2 Equivalent:** `showSearchBar`\
5089 **Preferences Affected:** N/A
5090
5091 #### Windows (GPO)
5092 ```
5093 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5094 ```
5095
5096 #### Windows (Intune)
5097 OMA-URI:
5098 ```
5099 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5100 ```
5101 Value (string):
5102 ```
5103 <enabled/>
5104 <data id="SearchBar" value="unified | separate"/>
5105 ```
5106 #### macOS
5107 ```
5108 <dict>
5109 <key>SearchBar</key>
5110 <string>unified | separate</string>
5111 </dict>
5112 ```
5113 #### policies.json
5114 ```
5115 {
5116 "policies": {
5117 "SearchBar": "unified" | "separate"
5118 }
5119 }
5120 ```
5121 <a name="SearchEngines"></a>
5122
5123 ### SearchEngines (This policy is only available on the ESR.)
5124
5125 ### SearchEngines | Add
5126
5127 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5128
5129 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5130
5131 `Name` is the name of the search engine.
5132
5133 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5134
5135 `Method` is either GET or POST
5136
5137 `IconURL` is a URL for the icon to use.
5138
5139 `Alias` is a keyword to use for the engine.
5140
5141 `Description` is a description of the search engine.
5142
5143 `PostData` is the POST data as name value pairs separated by &.
5144
5145 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5146
5147 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5148
5149 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5150 **CCK2 Equivalent:** `searchplugins`\
5151 **Preferences Affected:** N/A
5152
5153 #### Windows (GPO)
5154 ```
5155 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5156 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5157 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5158 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5159 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5160 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5161 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5162 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5163 ```
5164 #### Windows (Intune)
5165 OMA-URI:
5166 ```
5167 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5168 ```
5169 Value (string):
5170 ```
5171 <enabled/>
5172 <data id="SearchEngine_Name" value="Example1"/>
5173 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5174 <data id="SearchEngine_Method" value="GET | POST"/>
5175 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5176 <data id="SearchEngine_Alias" value="example"/>
5177 <data id="SearchEngine_Description" value="Example Description"/>
5178 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5179 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5180 ```
5181 #### macOS
5182 ```
5183 <dict>
5184 <key>SearchEngines</key>
5185 <dict>
5186 <key>Add</key>
5187 <array>
5188 <dict>
5189 <key>Name</key>
5190 <string>Example1</string>
5191 <key>URLTemplate</key>
5192 <string>https://www.example.org/q={searchTerms}</string>
5193 <key>Method</key>
5194 <string>GET | POST </string>
5195 <key>IconURL</key>
5196 <string>https://www.example.org/favicon.ico</string>
5197 <key>Alias</key>
5198 <string>example</string>
5199 <key>Description</key>
5200 <string>Example Description</string>
5201 <key>SuggestURLTemplate</key>
5202 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5203 <key>PostData</key>
5204 <string>name=value&q={searchTerms}</string>
5205 </dict>
5206 <array>
5207 </dict>
5208 </dict>
5209 ```
5210 #### policies.json
5211 ```
5212 {
5213 "policies": {
5214 "SearchEngines": {
5215 "Add": [
5216 {
5217 "Name": "Example1",
5218 "URLTemplate": "https://www.example.org/q={searchTerms}",
5219 "Method": "GET" | "POST",
5220 "IconURL": "https://www.example.org/favicon.ico",
5221 "Alias": "example",
5222 "Description": "Description",
5223 "PostData": "name=value&q={searchTerms}",
5224 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5225 }
5226 ]
5227 }
5228 }
5229 }
5230 ```
5231 ### SearchEngines | Default
5232
5233 Set the default search engine. This policy is only available on the ESR.
5234
5235 **Compatibility:** Firefox ESR 60\
5236 **CCK2 Equivalent:** `defaultSearchEngine`\
5237 **Preferences Affected:** N/A
5238
5239 #### Windows (GPO)
5240 ```
5241 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5242 ```
5243 #### Windows (Intune)
5244 OMA-URI:
5245 ```
5246 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5247 ```
5248 Value (string):
5249 ```
5250 <enabled/>
5251 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5252 ```
5253 #### macOS
5254 ```
5255 <dict>
5256 <key>SearchEngines</key>
5257 <dict>
5258 <key>Default</key>
5259 <string>NAME_OF_SEARCH_ENGINE</string>
5260 </dict>
5261 </dict>
5262 ```
5263 #### policies.json
5264 ```
5265 {
5266 "policies": {
5267 "SearchEngines": {
5268 "Default": "NAME_OF_SEARCH_ENGINE"
5269 }
5270 }
5271 }
5272 ```
5273 ### SearchEngines | PreventInstalls
5274
5275 Prevent installing search engines from webpages.
5276
5277 **Compatibility:** Firefox ESR 60\
5278 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5279 **Preferences Affected:** N/A
5280
5281 #### Windows (GPO)
5282 ```
5283 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5284 ```
5285 #### Windows (Intune)
5286 OMA-URI:
5287 ```
5288 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5289 ```
5290 Value (string):
5291 ```
5292 <enabled/> or <disabled/>
5293 ```
5294 #### macOS
5295 ```
5296 <dict>
5297 <key>SearchEngines</key>
5298 <dict>
5299 <key>PreventInstalls</key>
5300 <true/> | <false/>
5301 </dict>
5302 </dict>
5303 ```
5304 #### policies.json
5305 ```
5306 {
5307 "policies": {
5308 "SearchEngines": {
5309 "PreventInstalls": true | false
5310 }
5311 }
5312 }
5313 ```
5314 ### SearchEngines | Remove
5315
5316 Hide built-in search engines. This policy is only available on the ESR.
5317
5318 **Compatibility:** Firefox ESR 60.2\
5319 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5320 **Preferences Affected:** N/A
5321
5322 #### Windows (GPO)
5323 ```
5324 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5325 ```
5326 #### Windows (Intune)
5327 OMA-URI:
5328 ```
5329 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5330 ```
5331 Value (string):
5332 ```
5333 <enabled/>
5334 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5335 ```
5336 #### macOS
5337 ```
5338 <dict>
5339 <key>SearchEngines</key>
5340 <dict>
5341 <key>Remove</key>
5342 <array>
5343 <string>NAME_OF_SEARCH_ENGINE</string>
5344 </array>
5345 </dict>
5346 </dict>
5347 ```
5348 #### policies.json
5349 ```
5350 {
5351 "policies": {
5352 "SearchEngines": {
5353 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5354 }
5355 }
5356 }
5357 ```
5358 ### SearchSuggestEnabled
5359
5360 Enable search suggestions.
5361
5362 **Compatibility:** Firefox 68, Firefox ESR 68\
5363 **CCK2 Equivalent:** N/A\
5364 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5365
5366 #### Windows (GPO)
5367 ```
5368 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5369 ```
5370 #### Windows (Intune)
5371 OMA-URI:
5372 ```
5373 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5374 ```
5375 Value (string):
5376 ```
5377 <enabled/> or <disabled/>
5378 ```
5379 #### macOS
5380 ```
5381 <dict>
5382 <key>SearchSuggestEnabled</key>
5383 <true/> | <false/>
5384 </dict>
5385 ```
5386 #### policies.json
5387 ```
5388 {
5389 "policies": {
5390 "SearchSuggestEnabled": true | false
5391 }
5392 }
5393 ```
5394 ### SecurityDevices
5395
5396 Install PKCS #11 modules.
5397
5398 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5399 **CCK2 Equivalent:** `certs.devices`\
5400 **Preferences Affected:** N/A
5401
5402 #### Windows (GPO)
5403 ```
5404 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5405 ```
5406 #### Windows (Intune)
5407 OMA-URI:
5408 ```
5409 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5410 ```
5411 Value (string):
5412 ```
5413 <enabled/>
5414 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5415 ```
5416 #### macOS
5417 ```
5418 <dict>
5419 <key>SecurityDevices</key>
5420 <dict>
5421 <key>NAME_OF_DEVICE</key>
5422 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5423 </dict>
5424 </dict>
5425 ```
5426
5427 #### policies.json
5428 ```
5429 {
5430 "policies": {
5431 "SecurityDevices": {
5432 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5433 }
5434 }
5435 }
5436 ```
5437 ### ShowHomeButton
5438 Show the home button on the toolbar.
5439
5440 Future versions of Firefox will not show the home button by default.
5441
5442 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5443 **CCK2 Equivalent:** N/A\
5444 **Preferences Affected:** N/A
5445
5446 #### Windows (GPO)
5447 ```
5448 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5449 ```
5450 #### Windows (Intune)
5451 OMA-URI:
5452 ```
5453 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
5454 ```
5455 Value (string):
5456 ```
5457 <enabled/> or <disabled/>
5458 ```
5459 #### macOS
5460 ```
5461 <dict>
5462 <key>ShowHomeButton</key>
5463 <true/> | <false/>
5464 </dict>
5465 ```
5466 #### policies.json
5467 ```
5468 {
5469 "policies": {
5470 "ShowHomeButton": true | false
5471 }
5472 }
5473 ```
5474 ### SSLVersionMax
5475
5476 Set and lock the maximum version of TLS.
5477
5478 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5479 **CCK2 Equivalent:** N/A\
5480 **Preferences Affected:** `security.tls.version.max`
5481
5482 #### Windows (GPO)
5483 ```
5484 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5485 ```
5486 #### Windows (Intune)
5487 OMA-URI:
5488 ```
5489 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5490 ```
5491 Value (string):
5492 ```
5493 <enabled/>
5494 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5495 ```
5496 #### macOS
5497 ```
5498 <dict>
5499 <key>SSLVersionMax</key>
5500 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5501 </dict>
5502 ```
5503
5504 #### policies.json
5505 ```
5506 {
5507 "policies": {
5508 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5509 }
5510 }
5511 ```
5512 ### SSLVersionMin
5513
5514 Set and lock the minimum version of TLS.
5515
5516 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5517 **CCK2 Equivalent:** N/A\
5518 **Preferences Affected:** `security.tls.version.min`
5519
5520 #### Windows (GPO)
5521 ```
5522 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5523 ```
5524 #### Windows (Intune)
5525 OMA-URI:
5526 ```
5527 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5528 ```
5529 Value (string):
5530 ```
5531 <enabled/>
5532 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5533 ```
5534 #### macOS
5535 ```
5536 <dict>
5537 <key>SSLVersionMin</key>
5538 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5539 </dict>
5540 ```
5541
5542 #### policies.json
5543 ```
5544 {
5545 "policies": {
5546 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5547 }
5548 }
5549 ```
5550 ### SupportMenu
5551 Add a menuitem to the help menu for specifying support information.
5552
5553 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5554 **CCK2 Equivalent:** helpMenu\
5555 **Preferences Affected:** N/A
5556
5557 #### Windows (GPO)
5558 ```
5559 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5560 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5561 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5562 ```
5563 #### Windows (Intune)
5564 OMA-URI:
5565 ```
5566 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5567 ```
5568 Value (string):
5569 ```
5570 <enabled/>
5571 <data id="SupportMenuTitle" value="Support Menu"/>
5572 <data id="SupportMenuURL" value="http://example.com/support"/>
5573 <data id="SupportMenuAccessKey" value="S">
5574 ```
5575 #### macOS
5576 ```
5577 <dict>
5578 <key>SupportMenu</key>
5579 <dict>
5580 <key>Title</key>
5581 <string>SupportMenu</string>
5582 <key>URL</key>
5583 <string>http://example.com/support</string>
5584 <key>AccessKey</key>
5585 <string>S</string>
5586 </dict>
5587 </dict>
5588 ```
5589 #### policies.json
5590 ```
5591 {
5592 "policies": {
5593 "SupportMenu": {
5594 "Title": "Support Menu",
5595 "URL": "http://example.com/support",
5596 "AccessKey": "S"
5597 }
5598 }
5599 }
5600 ```
5601 ### UserMessaging
5602
5603 Prevent Firefox from messaging the user in certain situations.
5604
5605 `WhatsNew` Remove the "What's New" icon and menuitem.
5606
5607 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
5608
5609 `FeatureRecommendations` If false, don't recommend browser features.
5610
5611 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
5612
5613 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
5614
5615 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
5616
5617 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5618 **CCK2 Equivalent:** N/A\
5619 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
5620
5621 #### Windows (GPO)
5622 ```
5623 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5624 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5625 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5626 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5627 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
5628 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
5629 ```
5630 #### Windows (Intune)
5631 OMA-URI:
5632 ```
5633 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
5634 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
5635 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
5636 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
5637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
5638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
5639 ```
5640 Value (string):
5641 ```
5642 <enabled/> or <disabled/>
5643 ```
5644 #### macOS
5645 ```
5646 <dict>
5647 <key>UserMessaging</key>
5648 <dict>
5649 <key>WhatsNew</key>
5650 <true/> | <false/>
5651 <key>ExtensionRecommendations</key>
5652 <true/> | <false/>
5653 <key>FeatureRecommendations</key>
5654 <true/> | <false/>
5655 <key>UrlbarInterventions</key>
5656 <true/> | <false/>
5657 <key>SkipOnboarding</key>
5658 <true/> | <false/>
5659 <key>MoreFromMozilla</key>
5660 <true/> | <false/>
5661 </dict>
5662 </dict>
5663 ```
5664 #### policies.json
5665 ```
5666 {
5667 "policies": {
5668 "UserMessaging": {
5669 "WhatsNew": true | false,
5670 "ExtensionRecommendations": true | false,
5671 "FeatureRecommendations": true | false,
5672 "UrlbarInterventions": true | false
5673 "SkipOnboarding": true | false,
5674 "MoreFromMozilla": true | false
5675 }
5676 }
5677 }
5678 ```
5679 ### WebsiteFilter
5680 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5681 The arrays are limited to 1000 entries each.
5682
5683 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
5684
5685 For specific protocols, use `https://*/*` or `http://*/*`.
5686
5687 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5688
5689 **Compatibility:** Firefox 60, Firefox ESR 60\
5690 **CCK2 Equivalent:** N/A\
5691 **Preferences Affected:** N/A
5692
5693 #### Windows (GPO)
5694 ```
5695 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5696 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5697 ```
5698 #### Windows (Intune)
5699 OMA-URI:
5700 ```
5701 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5702 ```
5703 Value (string):
5704 ```
5705 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
5706 ```
5707 OMA-URI:
5708 ```
5709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5710 ```
5711 Value (string):
5712 ```
5713 <enabled/>
5714 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5715 ```
5716 #### macOS
5717 ```
5718 <dict>
5719 <key>WebsiteFilter</key>
5720 <dict>
5721 <key>Block</key>
5722 <array>
5723 <string><all_urls></string>
5724 </array>
5725 <key>Exceptions</key>
5726 <array>
5727 <string>http://example.org/*</string>
5728 </array>
5729 </dict>
5730
5731 </dict>
5732 ```
5733 #### policies.json
5734 ```
5735 {
5736 "policies": {
5737 "WebsiteFilter": {
5738 "Block": ["<all_urls>"],
5739 "Exceptions": ["http://example.org/*"]
5740 }
5741 }
5742 }
5743 ```
5744 ### WindowsSSO
5745 Allow Windows single sign-on for Microsoft, work, and school accounts.
5746
5747 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
5748
5749 **Compatibility:** Firefox 91\
5750 **CCK2 Equivalent:** N/A\
5751 **Preferences Affected:** `network.http.windows-sso.enabled`
5752
5753 #### Windows (GPO)
5754 ```
5755 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
5756 ```
5757 #### Windows (Intune)
5758 OMA-URI:
5759 ```
5760 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
5761 ```
5762 Value (string):
5763 ```
5764 <enabled/> or <disabled/>
5765 ```
5766 #### policies.json
5767 ```
5768 {
5769 "policies": {
5770 "WindowsSSO": true | false
5771 }
5772 }
5773 ```

patrick-canterino.de