]> git.p6c8.net - policy-templates.git/blob - README.md
8bca71d04614254f5ccd7e6ae4c9d305beea4107
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
10 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
11 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
12 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
13 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
14 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
15 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
16 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
17 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
18 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
19 | **[`Certificates`](#certificates)** |
20 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
21 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
22 | **[`Cookies`](#cookies)** | Configure cookie preferences.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
30 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
43 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
44 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
45 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
46 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
47 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
48 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
49 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
50 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
51 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
52 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
53 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
54 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
55 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
56 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
57 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
58 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
59 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
60 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
61 | **[`Handlers`](#handlers)** | Configure default application handlers.
62 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
63 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
64 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
65 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
66 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
67 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates..
68 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
69 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
70 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
71 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
72 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
73 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
74 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
75 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
76 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
77 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
78 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
79 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
80 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
81 | **[`Preferences`](#preferences)** | Set and lock preferences.
82 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
83 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
84 | **[`Proxy`](#proxy)** | Configure proxy settings.
85 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
86 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
87 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
88 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
89 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
90 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
91 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
92 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
93 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
94 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
95 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
96 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
97 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
98 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
99 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
100 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
101 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
102
103 ### 3rdparty
104
105 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
106
107 ### AppAutoUpdate
108
109 Enable or disable **automatic** application update.
110
111 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
112
113 If set to false, application updates are downloaded but the user can choose when to install the update.
114
115 If you have disabled updates via DisableAppUpdate, this policy has no effect.
116
117 **Compatibility:** Firefox 75, Firefox ESR 68.7\
118 **CCK2 Equivalent:** N/A\
119 **Preferences Affected:** app.update.auto
120
121 #### Windows (GPO)
122 ```
123 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
124 ```
125 #### Windows (Intune)
126 OMA-URI:
127 ```
128 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
129 ```
130 Value (string):
131 ```
132 <enabled/> or <disabled/>
133 ```
134 #### macOS
135 ```
136 <dict>
137 <key>AppAutoUpdate</key>
138 <true/> | <false/>
139 </dict>
140 ```
141 #### policies.json
142 ```
143 {
144 "policies": {
145 "AppAutoUpdate": true | false
146 }
147 }
148 ```
149 ### AppUpdateURL
150
151 Change the URL for application update if you are providing Firefox updates from a custom update server.
152
153 **Compatibility:** Firefox 62, Firefox ESR 60.2\
154 **CCK2 Equivalent:** N/A\
155 **Preferences Affected:** `app.update.url`
156
157 #### Windows (GPO)
158 ```
159 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
160 ```
161 #### Windows (Intune)
162 OMA-URI:
163 ```
164 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
165 ```
166 Value (string):
167 ```
168 <enabled/>
169 <data id="AppUpdateURL" value="https://yoursite.com"/>
170 ```
171 #### macOS
172 ```
173 <dict>
174 <key>AppUpdateURL</key>
175 <string>https://yoursite.com</string>
176 </dict>
177 ```
178 #### policies.json
179 ```
180 {
181 "policies": {
182 "AppUpdateURL": "https://yoursite.com"
183 }
184 }
185 ```
186 ### Authentication
187
188 Configure sites that support integrated authentication.
189
190 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
191
192 `PrivateBrowsing` enables integrated authentication in private browsing.
193
194 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
195 **CCK2 Equivalent:** N/A\
196 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
197
198 #### Windows (GPO)
199 ```
200 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
201 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
202 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
203 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
204 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
205 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
206 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
207 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
208 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
209 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
210 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
211 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
212 ```
213 #### Windows (Intune)
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
244 ```
245 Value (string):
246 ```
247 <enabled/>
248 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
249 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
250 ```
251 OMA-URI:
252 ```
253 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
254 ```
255 Value (string):
256 ```
257 <enabled/> or <disabled/>
258 ```
259 OMA-URI:
260 ```
261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
262 ```
263 Value (string):
264 ```
265 <enabled/> or <disabled/>
266 ```
267 #### macOS
268 ```
269 <dict>
270 <key>Authentication</key>
271 <dict>
272 <key>SPNEGO</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>Delegated</key>
278 <array>
279 <string>mydomain.com</string>
280 <string>https://myotherdomain.com</string>
281 </array>
282 <key>NTLM</key>
283 <array>
284 <string>mydomain.com</string>
285 <string>https://myotherdomain.com</string>
286 </array>
287 <key>AllowNonFQDN</key>
288 <dict>
289 <key>SPNEGO</key>
290 <true/> | <false/>
291 <key>NTLM</key>
292 <true/> | <false/>
293 </dict>
294 <key>AllowProxies</key>
295 <dict>
296 <key>SPNEGO</key>
297 <true/> | <false/>
298 <key>NTLM</key>
299 <true/> | <false/>
300 </dict>
301 <key>Locked</key>
302 <true/> | <false/>
303 <key>PrivateBrowsing</key>
304 <true/> | <false/>
305 </dict>
306 </dict>
307 ```
308 #### policies.json
309 ```
310 {
311 "policies": {
312 "Authentication": {
313 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
314 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
315 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
316 "AllowNonFQDN": {
317 "SPNEGO": true | false,
318 "NTLM": true | false
319 },
320 "AllowProxies": {
321 "SPNEGO": true | false,
322 "NTLM": true | false
323 },
324 "Locked": true | false,
325 "PrivateBrowsing": true | false
326 }
327 }
328 }
329 ```
330 ### BlockAboutAddons
331
332 Block access to the Add-ons Manager (about:addons).
333
334 **Compatibility:** Firefox 60, Firefox ESR 60\
335 **CCK2 Equivalent:** `disableAddonsManager`\
336 **Preferences Affected:** N/A
337
338 #### Windows (GPO)
339 ```
340 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
341 ```
342 #### Windows (Intune)
343 OMA-URI:
344 ```
345 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
346 ```
347 Value (string):
348 ```
349 <enabled/> or <disabled/>
350 ```
351 #### macOS
352 ```
353 <dict>
354 <key>BlockAboutAddons</key>
355 <true/> | <false/>
356 </dict>
357 ```
358 #### policies.json
359 ```
360 {
361 "policies": {
362 "BlockAboutAddons": true | false
363 }
364 }
365 ```
366 ### BlockAboutConfig
367
368 Block access to about:config.
369
370 **Compatibility:** Firefox 60, Firefox ESR 60\
371 **CCK2 Equivalent:** `disableAboutConfig`\
372 **Preferences Affected:** N/A
373
374 #### Windows (GPO)
375 ```
376 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
377 ```
378 #### Windows (Intune)
379 OMA-URI:
380 ```
381 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
382 ```
383 Value (string):
384 ```
385 <enabled/> or <disabled/>
386 ```
387 #### macOS
388 ```
389 <dict>
390 <key>BlockAboutConfig</key>
391 <true/> | <false/>
392 </dict>
393 ```
394 #### policies.json
395 ```
396 {
397 "policies": {
398 "BlockAboutConfig": true | false
399 }
400 }
401 ```
402 ### BlockAboutProfiles
403
404 Block access to About Profiles (about:profiles).
405
406 **Compatibility:** Firefox 60, Firefox ESR 60\
407 **CCK2 Equivalent:** `disableAboutProfiles`\
408 **Preferences Affected:** N/A
409
410 #### Windows (GPO)
411 ```
412 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
413 ```
414 #### Windows (Intune)
415 OMA-URI:
416 ```
417 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
418 ```
419 Value (string):
420 ```
421 <enabled/> or <disabled/>
422 ```
423 #### macOS
424 ```
425 <dict>
426 <key>BlockAboutProfiles</key>
427 <true/> | <false/>
428 </dict>
429 ```
430 #### policies.json
431 ```
432 {
433 "policies": {
434 "BlockAboutProfiles": true | false
435 }
436 }
437 ```
438 ### BlockAboutSupport
439
440 Block access to Troubleshooting Information (about:support).
441
442 **Compatibility:** Firefox 60, Firefox ESR 60\
443 **CCK2 Equivalent:** `disableAboutSupport`\
444 **Preferences Affected:** N/A
445
446 #### Windows (GPO)
447 ```
448 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
449 ```
450 #### Windows (Intune)
451 OMA-URI:
452 ```
453 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
454 ```
455 Value (string):
456 ```
457 <enabled/> or <disabled/>
458 ```
459 #### macOS
460 ```
461 <dict>
462 <key>BlockAboutSupport</key>
463 <true/> | <false/>
464 </dict>
465 ```
466 #### policies.json
467 ```
468 {
469 "policies": {
470 "BlockAboutSupport": true | false
471 }
472 }
473 ```
474 ### Bookmarks
475
476 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
477
478 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
479
480 **Compatibility:** Firefox 60, Firefox ESR 60\
481 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
482 **Preferences Affected:** N/A
483
484 #### Windows (GPO)
485 ```
486 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
487 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
488 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
489 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
490 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
491 ```
492 #### Windows (Intune)
493 OMA-URI:
494 ```
495 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
496 ```
497 Value (string):
498 ```
499 <enabled/>
500 <data id="BookmarkTitle" value="Example"/>
501 <data id="BookmarkURL" value="https://example.com"/>
502 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
503 <data id="BookmarkPlacement" value="toolbar | menu"/>
504 <data id="BookmarkFolder" value="FolderName"/>
505 ```
506 #### macOS
507 ```
508 <dict>
509 <key>Bookmarks</key>
510 <array>
511 <dict>
512 <key>Title</key>
513 <string>Example</string>
514 <key>URL</key>
515 <string>https://example.com</string>
516 <key>Favicon</key>
517 <string>https://example.com/favicon.ico</string>
518 <key>Placement</key>
519 <string>toolbar | menu</string>
520 <key>Folder</key>
521 <string>FolderName</string>
522 </dict>
523 </array>
524 </dict>
525 ```
526 #### policies.json
527 ```
528 {
529 "policies": {
530 "Bookmarks": [
531 {
532 "Title": "Example",
533 "URL": "https://example.com",
534 "Favicon": "https://example.com/favicon.ico",
535 "Placement": "toolbar" | "menu",
536 "Folder": "FolderName"
537 }
538 ]
539 }
540 }
541 ```
542 ### CaptivePortal
543 Enable or disable the detection of captive portals.
544
545 **Compatibility:** Firefox 67, Firefox ESR 60.7\
546 **CCK2 Equivalent:** N/A\
547 **Preferences Affected:** `network.captive-portal-service.enabled`
548
549 #### Windows (GPO)
550 ```
551 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
552 ```
553 #### Windows (Intune)
554 OMA-URI:
555 ```
556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
557 ```
558 Value (string):
559 ```
560 <enabled/> or <disabled/>
561 ```
562 #### macOS
563 ```
564 <dict>
565 <key>CaptivePortal</key>
566 <true/> | <false/>
567 </dict>
568 ```
569 #### policies.json
570 ```
571 {
572 "policies": {
573 "CaptivePortal": true | false
574 }
575 }
576 ```
577 ### Certificates
578
579 ### Certificates | ImportEnterpriseRoots
580
581 Trust certificates that have been added to the operating system certificate store by a user or administrator.
582
583 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
584
585 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
586
587 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
588 **CCK2 Equivalent:** N/A\
589 **Preferences Affected:** `security.enterprise_roots.enabled`
590
591 #### Windows (GPO)
592 ```
593 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
594 ```
595 #### Windows (Intune)
596 OMA-URI:
597 ```
598 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
599 ```
600 Value (string):
601 ```
602 <enabled/> or <disabled/>
603 ```
604 #### macOS
605 ```
606 <dict>
607 <key>Certificates</key>
608 <dict>
609 <key>ImportEnterpriseRoots</key>
610 <true/> | <false/>
611 </dict>
612 </dict>
613 ```
614 #### policies.json
615 ```
616 {
617 "policies": {
618 "Certificates": {
619 "ImportEnterpriseRoots": true | false
620 }
621 }
622 }
623 ```
624 ### Certificates | Install
625
626 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
627
628 - Windows
629 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
630 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
631 - macOS
632 - /Library/Application Support/Mozilla/Certificates
633 - ~/Library/Application Support/Mozilla/Certificates
634 - Linux
635 - /usr/lib/mozilla/certificates
636 - /usr/lib64/mozilla/certificates
637 - ~/.mozilla/certificates
638
639 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
640
641 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
642
643 Certificates are installed using the trust string `CT,CT,`.
644
645 Binary (DER) and ASCII (PEM) certificates are both supported.
646
647 **Compatibility:** Firefox 64, Firefox ESR 64\
648 **CCK2 Equivalent:** `certs.ca`\
649 **Preferences Affected:** N/A
650
651 #### Windows (GPO)
652 ```
653 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
654 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
655 ```
656 #### Windows (Intune)
657 OMA-URI:
658 ```
659 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
660 ```
661 Value (string):
662 ```
663 <enabled/>
664 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
665 ```
666 #### macOS
667 ```
668 <dict>
669 <key>Certificates</key>
670 <dict>
671 <key>Install</key>
672 <array>
673 <string>cert1.der</string>
674 <string>/Users/username/cert2.pem</string>
675 </array>
676 </dict>
677 </dict>
678 ```
679 #### policies.json
680 ```
681 {
682 "policies": {
683 "Certificates": {
684 "Install": ["cert1.der", "/home/username/cert2.pem"]
685 }
686 }
687 }
688 ```
689 ### Cookies
690 Configure cookie preferences.
691
692 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
693
694 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
695
696 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
697
698 `Default` determines whether cookies are accepted at all.
699
700 `AcceptThirdParty` determines how third-party cookies are handled.
701
702 `ExpireAtSessionEnd` determines when cookies expire.
703
704 `RejectTracker` only rejects cookies for trackers.
705
706 `Locked` prevents the user from changing cookie preferences.
707
708 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1)\
709 **CCK2 Equivalent:** N/A\
710 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
711
712 #### Windows (GPO)
713 ```
714 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
715 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
716 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
717 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
718 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
719 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
720 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
721 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
722 ```
723 #### Windows (Intune)
724 OMA-URI:
725 ```
726 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
727 ```
728 Value (string):
729 ```
730 <enabled/>
731 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
732 ```
733 OMA-URI:
734 ```
735 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
736 ```
737 Value (string):
738 ```
739 <enabled/>
740 <data id="Cookies_Allow" value="1&#xF000;https://example.edu"/>
741 ```
742 OMA-URI:
743 ```
744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
745 ```
746 Value (string):
747 ```
748 <enabled/>
749 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
750 ```
751 OMA-URI:
752 ```
753 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
754 ```
755 Value (string):
756 ```
757 <enabled/> or <disabled/>
758 ```
759 OMA-URI:
760 ```
761 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
762 ```
763 Value (string):
764 ```
765 <enabled/>
766 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
767 ```
768 OMA-URI:
769 ```
770 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
771 ```
772 Value (string):
773 ```
774 <enabled/> or <disabled/>
775 ```
776 OMA-URI:
777 ```
778 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
779 ```
780 Value (string):
781 ```
782 <enabled/> or <disabled/>
783 ```
784 OMA-URI:
785 ```
786 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
787 ```
788 Value (string):
789 ```
790 <enabled/> or <disabled/>
791 ```
792 #### macOS
793 ```
794 <dict>
795 <key>Cookies</key>
796 <dict>
797 <key>Allow</key>
798 <array>
799 <string>http://example.com</string>
800 </array>
801 <key>AllowSession</key>
802 <array>
803 <string>http://example.edu</string>
804 </array>
805 <key>Block</key>
806 <array>
807 <string>http://example.org</string>
808 </array>
809 <key>Default</key>
810 <true/> | <false/>
811 <key>AcceptThirdParty</key>
812 <string>always | never | from-visited</string>
813 <key>ExpireAtSessionEnd</key>
814 <true/> | <false/>
815 <key>RejectTracker</key>
816 <true/> | <false/>
817 <key>Locked</key>
818 <true/> | <false/>
819 </dict>
820 </dict>
821 ```
822 #### policies.json
823 ```
824 {
825 "policies": {
826 "Cookies": {
827 "Allow": ["http://example.org/"],
828 "AllowSession": ["http://example.edu/"],
829 "Block": ["http://example.edu/"],
830 "Default": true | false,
831 "AcceptThirdParty": "always" | "never" | "from-visited",
832 "ExpireAtSessionEnd": true | false,
833 "RejectTracker": true | false,
834 "Locked": true | false
835 }
836 }
837 }
838 ```
839 ### DisableSetDesktopBackground
840 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
841
842 **Compatibility:** Firefox 60, Firefox ESR 60\
843 **CCK2 Equivalent:** `removeSetDesktopBackground`\
844 **Preferences Affected:** N/A
845
846 #### Windows (GPO)
847 ```
848 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
849 ```
850 #### Windows (Intune)
851 OMA-URI:
852 ```
853 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
854 ```
855 Value (string):
856 ```
857 <enabled/> or <disabled/>
858 ```
859 #### macOS
860 ```
861 <dict>
862 <key>DisableSetDesktopBackground</key>
863 <true/> | <false/>
864 </dict>
865 ```
866 #### policies.json
867 ```
868 {
869 "policies": {
870 "DisableSetDesktopBackground": true | false
871 }
872 }
873 ```
874 ### DisableMasterPasswordCreation
875 Remove the master password functionality.
876
877 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
878
879 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
880
881 **Compatibility:** Firefox 60, Firefox ESR 60\
882 **CCK2 Equivalent:** `noMasterPassword`\
883 **Preferences Affected:** N/A
884
885 #### Windows (GPO)
886 ```
887 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
888 ```
889 #### Windows (Intune)
890 OMA-URI:
891 ```
892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
893 ```
894 Value (string):
895 ```
896 <enabled/> or <disabled/>
897 ```
898 #### macOS
899 ```
900 <dict>
901 <key>DisableMasterPasswordCreation</key>
902 <true/> | <false/>
903 </dict>
904 ```
905 #### policies.json
906 ```
907 {
908 "policies": {
909 "DisableMasterPasswordCreation": true | false
910 }
911 }
912 ```
913 ### DisableAppUpdate
914 Turn off application updates within Firefox.
915
916 **Compatibility:** Firefox 60, Firefox ESR 60\
917 **CCK2 Equivalent:** `disableFirefoxUpdates`\
918 **Preferences Affected:** N/A
919
920 #### Windows (GPO)
921 ```
922 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
923 ```
924 #### Windows (Intune)
925 OMA-URI:
926 ```
927 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
928 ```
929 Value (string):
930 ```
931 <enabled/> or <disabled/>
932 ```
933 #### macOS
934 ```
935 <dict>
936 <key>DisableAppUpdate</key>
937 <true/> | <false/>
938 </dict>
939 ```
940 #### policies.json
941 ```
942 {
943 "policies": {
944 "DisableAppUpdate": true | false
945 }
946 }
947 ```
948 ### DisableBuiltinPDFViewer
949 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
950
951 **Compatibility:** Firefox 60, Firefox ESR 60\
952 **CCK2 Equivalent:** `disablePDFjs`\
953 **Preferences Affected:** `pdfjs.disabled`
954
955 #### Windows (GPO)
956 ```
957 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
958 ```
959 #### Windows (Intune)
960 OMA-URI:
961 ```
962 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
963 ```
964 Value (string):
965 ```
966 <enabled/> or <disabled/>
967 ```
968 #### macOS
969 ```
970 <dict>
971 <key>DisableBuiltinPDFViewer</key>
972 <true/> | <false/>
973 </dict>
974 ```
975 #### policies.json
976 ```
977 {
978 "policies": {
979 "DisableBuiltinPDFViewer": true | false
980 }
981 }
982 ```
983 ### DisabledCiphers
984 Disable specific cryptographic ciphers.
985
986 ---
987 **Note:**
988
989 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
990
991 ---
992 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
993 **CCK2 Equivalent:** N/A\
994 **Preferences Affected:** N/A
995
996 #### Windows (GPO)
997 ```
998 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
999 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1000 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1001 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1002 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1003 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1004 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1005 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1006 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
1007 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1008 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
1009 ```
1010 #### Windows (Intune)
1011 OMA-URI:
1012 ```
1013 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1014 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1015 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1016 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1017 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1018 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
1020 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
1021 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
1022 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
1023 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
1024 ```
1025 Value (string):
1026 ```
1027 <enabled/> or <disabled/>
1028 ```
1029 #### macOS
1030 ```
1031 <dict>
1032 <key>DisabledCiphers</key>
1033 <dict>
1034 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1035 <true/> | <false/>
1036 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1037 <true/> | <false/>
1038 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1039 <true/> | <false/>
1040 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1041 <true/> | <false/>
1042 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1043 <true/> | <false/>
1044 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1045 <true/> | <false/>
1046 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1047 <true/> | <false/>
1048 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1049 <true/> | <false/>
1050 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1051 <true/> | <false/>
1052 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1053 <true/> | <false/>
1054 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1055 <true/> | <false/>
1056 </dict>
1057 </dict>
1058 ```
1059 #### policies.json
1060 ```
1061 {
1062 "policies": {
1063 "DisabledCiphers": {
1064 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1065 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1066 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1067 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1068 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1069 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1070 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1071 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1072 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false,
1073 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false,
1074 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1075 }
1076 }
1077 }
1078 ```
1079 ### DisableDefaultBrowserAgent
1080 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1081
1082 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1083
1084 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1085 **CCK2 Equivalent:** N/A\
1086 **Preferences Affected:** N/A
1087
1088 #### Windows (GPO)
1089 ```
1090 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1091 ```
1092 #### Windows (Intune)
1093 OMA-URI:
1094 ```
1095 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1096 ```
1097 Value (string):
1098 ```
1099 <enabled/> or <disabled/>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableDefaultBrowserAgent": true | false
1106 }
1107 }
1108 ```
1109 ### DisableDeveloperTools
1110 Remove access to all developer tools.
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** `removeDeveloperTools`\
1114 **Preferences Affected:** `devtools.policy.disabled`
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableDeveloperTools</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableDeveloperTools": true | false
1141 }
1142 }
1143 ```
1144 ### DisableFeedbackCommands
1145 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60\
1148 **CCK2 Equivalent:** N/A\
1149 **Preferences Affected:** N/A
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1154 ```
1155 #### Windows (Intune)
1156 OMA-URI:
1157 ```
1158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1159 ```
1160 Value (string):
1161 ```
1162 <enabled/> or <disabled/>
1163 ```
1164 #### macOS
1165 ```
1166 <dict>
1167 <key>DisableFeedbackCommands</key>
1168 <true/> | <false/>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableFeedbackCommands": true | false
1176 }
1177 }
1178 ```
1179 ### DisableFirefoxScreenshots
1180 Remove access to Firefox Screenshots.
1181
1182 **Compatibility:** Firefox 60, Firefox ESR 60\
1183 **CCK2 Equivalent:** N/A\
1184 **Preferences Affected:** `extensions.screenshots.disabled`
1185
1186 #### Windows (GPO)
1187 ```
1188 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1189 ```
1190 #### Windows (Intune)
1191 OMA-URI:
1192 ```
1193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1194 ```
1195 Value (string):
1196 ```
1197 <enabled/> or <disabled/>
1198 ```
1199 #### macOS
1200 ```
1201 <dict>
1202 <key>DisableFirefoxScreenshots</key>
1203 <true/> | <false/>
1204 </dict>
1205 ```
1206 #### policies.json
1207 ```
1208 {
1209 "policies": {
1210 "DisableFirefoxScreenshots": true | false
1211 }
1212 }
1213 ```
1214 ### DisableFirefoxAccounts
1215 Disable Firefox Accounts integration (Sync).
1216
1217 **Compatibility:** Firefox 60, Firefox ESR 60\
1218 **CCK2 Equivalent:** `disableSync`\
1219 **Preferences Affected:** `identity.fxaccounts.enabled`
1220
1221 #### Windows (GPO)
1222 ```
1223 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1224 ```
1225 #### Windows (Intune)
1226 OMA-URI:
1227 ```
1228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1229 ```
1230 Value (string):
1231 ```
1232 <enabled/> or <disabled/>
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DisableFirefoxAccounts</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DisableFirefoxAccounts": true | false
1246 }
1247 }
1248 ```
1249 ### DisableFirefoxStudies
1250 Disable Firefox studies (Shield).
1251
1252 **Compatibility:** Firefox 60, Firefox ESR 60\
1253 **CCK2 Equivalent:** N/A\
1254 **Preferences Affected:** N/A
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1259 ```
1260 #### Windows (Intune)
1261 OMA-URI:
1262 ```
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1264 ```
1265 Value (string):
1266 ```
1267 <enabled/> or <disabled/>
1268 ```
1269 #### macOS
1270 ```
1271 <dict>
1272 <key>DisableFirefoxStudies</key>
1273 <true/> | <false/>
1274 </dict>
1275 ```
1276 #### policies.json
1277 ```
1278 {
1279 "policies": {
1280 "DisableFirefoxStudies": true | false
1281 }
1282 }
1283 ```
1284 ### DisableForgetButton
1285 Disable the "Forget" button.
1286
1287 **Compatibility:** Firefox 60, Firefox ESR 60\
1288 **CCK2 Equivalent:** `disableForget`\
1289 **Preferences Affected:** N/A
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1294 ```
1295 #### Windows (Intune)
1296 OMA-URI:
1297 ```
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1299 ```
1300 Value (string):
1301 ```
1302 <enabled/> or <disabled/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DisableForgetButton</key>
1308 <true/> | <false/>
1309 </dict>
1310 ```
1311 #### policies.json
1312 ```
1313 {
1314 "policies": {
1315 "DisableForgetButton": true | false
1316 }
1317 }
1318 ```
1319 ### DisableFormHistory
1320 Turn off saving information on web forms and the search bar.
1321
1322 **Compatibility:** Firefox 60, Firefox ESR 60\
1323 **CCK2 Equivalent:** `disableFormFill`\
1324 **Preferences Affected:** ` browser.formfill.enable`
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisableFormHistory</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisableFormHistory": true | false
1351 }
1352 }
1353 ```
1354 ### DisablePasswordReveal
1355 Do not allow passwords to be shown in saved logins
1356
1357 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1358 **CCK2 Equivalent:** N/A
1359 **Preferences Affected:** N/A
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisablePasswordReveal</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisablePasswordReveal": true | false
1386 }
1387 }
1388 ```
1389 ### DisablePocket
1390 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1391
1392 **Compatibility:** Firefox 60, Firefox ESR 60\
1393 **CCK2 Equivalent:** `disablePocket`\
1394 **Preferences Affected:** `extensions.pocket.enabled`
1395
1396 #### Windows (GPO)
1397 ```
1398 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1399 ```
1400 #### Windows (Intune)
1401 OMA-URI:
1402 ```
1403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1404 ```
1405 Value (string):
1406 ```
1407 <enabled/> or <disabled/>
1408 ```
1409 #### macOS
1410 ```
1411 <dict>
1412 <key>DisablePocket</key>
1413 <true/> | <false/>
1414 </dict>
1415 ```
1416 #### policies.json
1417 ```
1418 {
1419 "policies": {
1420 "DisablePocket": true | false
1421 }
1422 }
1423 ```
1424 ### DisablePrivateBrowsing
1425 Remove access to private browsing.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1429 **Preferences Affected:** N/A
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1434 ```
1435 #### Windows (Intune)
1436 OMA-URI:
1437 ```
1438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1439 ```
1440 Value (string):
1441 ```
1442 <enabled/> or <disabled/>
1443 ```
1444 #### macOS
1445 ```
1446 <dict>
1447 <key>DisablePrivateBrowsing</key>
1448 <true/> | <false/>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "DisablePrivateBrowsing": true | false
1456 }
1457 }
1458 ```
1459 ### DisableProfileImport
1460 Disables the "Import data from another browser" option in the bookmarks window.
1461
1462 **Compatibility:** Firefox 60, Firefox ESR 60\
1463 **CCK2 Equivalent:** N/A\
1464 **Preferences Affected:** N/A
1465
1466 #### Windows (GPO)
1467 ```
1468 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1469 ```
1470 #### Windows (Intune)
1471 OMA-URI:
1472 ```
1473 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1474 ```
1475 Value (string):
1476 ```
1477 <enabled/> or <disabled/>
1478 ```
1479 #### macOS
1480 ```
1481 <dict>
1482 <key>DisableProfileImport</key>
1483 <true/> | <false/>
1484 </dict>
1485 ```
1486 #### policies.json
1487 ```
1488 {
1489 "policies": {
1490 "DisableProfileImport": true | false
1491 }
1492 }
1493 ```
1494 ### DisableProfileRefresh
1495 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1496
1497 **Compatibility:** Firefox 60, Firefox ESR 60\
1498 **CCK2 Equivalent:** `disableResetFirefox`\
1499 **Preferences Affected:** `browser.disableResetPrompt`
1500
1501 #### Windows (GPO)
1502 ```
1503 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1504 ```
1505 #### Windows (Intune)
1506 OMA-URI:
1507 ```
1508 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1509 ```
1510 Value (string):
1511 ```
1512 <enabled/> or <disabled/>
1513 ```
1514 #### macOS
1515 ```
1516 <dict>
1517 <key>DisableProfileRefresh</key>
1518 <true/> | <false/>
1519 </dict>
1520 ```
1521 #### policies.json
1522 ```
1523 {
1524 "policies": {
1525 "DisableProfileRefresh": true | false
1526 }
1527 }
1528 ```
1529 ### DisableSafeMode
1530 Disable safe mode within the browser.
1531
1532 On Windows, this disables safe mode via the command line as well.
1533
1534 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1535 **CCK2 Equivalent:** `disableSafeMode`\
1536 **Preferences Affected:** N/A
1537
1538 #### Windows (GPO)
1539 ```
1540 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1541 ```
1542 #### Windows (Intune)
1543 OMA-URI:
1544 ```
1545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1546 ```
1547 Value (string):
1548 ```
1549 <enabled/> or <disabled/>
1550 ```
1551 #### macOS
1552 ```
1553 <dict>
1554 <key>DisableSafeMode</key>
1555 <true/> | <false/>
1556 </dict>
1557 ```
1558 #### policies.json
1559 ```
1560 {
1561 "policies": {
1562 "DisableSafeMode": true | false
1563 }
1564 }
1565 ```
1566 ### DisableSecurityBypass
1567 Prevent the user from bypassing security in certain cases.
1568
1569 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1570
1571 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1572
1573 **Compatibility:** Firefox 60, Firefox ESR 60\
1574 **CCK2 Equivalent:** N/A\
1575 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1576
1577 #### Windows (GPO)
1578 ```
1579 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1580 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1581 ```
1582 #### Windows (Intune)
1583 OMA-URI:
1584 ```
1585 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1586 ```
1587 Value (string):
1588 ```
1589 <enabled/> or <disabled/>
1590 ```
1591 OMA-URI:
1592 ```
1593 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1594 ```
1595 Value (string):
1596 ```
1597 <enabled/> or <disabled/>
1598 ```
1599
1600 #### macOS
1601 ```
1602 <dict>
1603 <key>DisableSecurityBypass</key>
1604 <dict>
1605 <key>InvalidCertificate</key>
1606 <true/> | <false/>
1607 <key>SafeBrowsing</key>
1608 <true/> | <false/>
1609 </dict>
1610 </dict>
1611 ```
1612 #### policies.json
1613 ```
1614 {
1615 "policies": {
1616 "DisableSecurityBypass": {
1617 "InvalidCertificate": true | false,
1618 "SafeBrowsing": true | false
1619 }
1620 }
1621 }
1622 ```
1623 ### DisableSystemAddonUpdate
1624 Prevent system add-ons from being installed or update.
1625
1626 **Compatibility:** Firefox 60, Firefox ESR 60\
1627 **CCK2 Equivalent:** N/A\
1628 **Preferences Affected:** N/A
1629
1630 #### Windows (GPO)
1631 ```
1632 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1633 ```
1634 #### Windows (Intune)
1635 OMA-URI:
1636 ```
1637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1638 ```
1639 Value (string):
1640 ```
1641 <enabled/> or <disabled/>
1642 ```
1643 #### macOS
1644 ```
1645 <dict>
1646 <key>DisableSystemAddonUpdate</key>
1647 <true/> | <false/>
1648 </dict>
1649 ```
1650 #### policies.json
1651 ```
1652 {
1653 "policies": {
1654 "DisableSystemAddonUpdate": true | false
1655 }
1656 }
1657 ```
1658 ### DisableTelemetry
1659 Prevent the upload of telemetry data.
1660
1661 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1662
1663 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1664
1665 **Compatibility:** Firefox 60, Firefox ESR 60\
1666 **CCK2 Equivalent:** `disableTelemetry`\
1667 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled,toolkit.telemetry.archive.enabled`
1668
1669 #### Windows (GPO)
1670 ```
1671 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1672 ```
1673 #### Windows (Intune)
1674 OMA-URI:
1675 ```
1676 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1677 ```
1678 Value (string):
1679 ```
1680 <enabled/> or <disabled/>
1681 ```
1682 #### macOS
1683 ```
1684 <dict>
1685 <key>DisableTelemetry</key>
1686 <true/> | <false/>
1687 </dict>
1688 ```
1689 #### policies.json
1690 ```
1691 {
1692 "policies": {
1693 "DisableTelemetry": true | false
1694 }
1695 }
1696 ```
1697 ### DisplayBookmarksToolbar
1698 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1699
1700 **Compatibility:** Firefox 60, Firefox ESR 60\
1701 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1702 **Preferences Affected:** N/A
1703
1704 #### Windows (GPO)
1705 ```
1706 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1707 ```
1708 #### Windows (Intune)
1709 OMA-URI:
1710 ```
1711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1712 ```
1713 Value (string):
1714 ```
1715 <enabled/> or <disabled/>
1716 ```
1717 #### macOS
1718 ```
1719 <dict>
1720 <key>DisplayBookmarksToolbar</key>
1721 <true/> | <false/>
1722 </dict>
1723 ```
1724 #### policies.json
1725 ```
1726 {
1727 "policies": {
1728 "DisplayBookmarksToolbar": true | false
1729 }
1730 }
1731 ```
1732 ### DisplayMenuBar (Deprecated)
1733 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1734
1735 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1736 **CCK2 Equivalent:** `displayMenuBar`\
1737 **Preferences Affected:** N/A
1738
1739 #### Windows (GPO)
1740 ```
1741 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1742 ```
1743 #### macOS
1744 ```
1745 <dict>
1746 <key>DisplayMenuBar</key>
1747 <true/> | <false/>
1748 </dict>
1749 ```
1750 #### policies.json
1751 ```
1752 {
1753 "policies": {
1754 "DisplayMenuBar": true | false
1755 }
1756 }
1757 ```
1758 ### DisplayMenuBar
1759 Set the state of the menubar.
1760
1761 `always` means the menubar is shown and cannot be hidden.
1762
1763 `never` means the menubar is hidden and cannot be shown.
1764
1765 `default-on` means the menubar is on by default but can be hidden.
1766
1767 `default-off` means the menubar is off by default but can be shown.
1768
1769 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1770 **CCK2 Equivalent:** `displayMenuBar`\
1771 **Preferences Affected:** N/A
1772
1773 #### Windows (GPO)
1774 ```
1775 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1776 ```
1777 #### Windows (Intune)
1778 OMA-URI:
1779 ```
1780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1781 ```
1782 Value (string):
1783 ```
1784 <enabled/>
1785 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1786 ```
1787 #### macOS
1788 ```
1789 <dict>
1790 <key>DisplayMenuBar</key>
1791 <string>always | never | default-on | default-off</string>
1792 </dict>
1793 ```
1794 #### policies.json
1795 ```
1796 {
1797 "policies": {
1798 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1799 }
1800 }
1801 ```
1802 ### DNSOverHTTPS
1803 Configure DNS over HTTPS.
1804
1805 `Enabled` determines whether DNS over HTTPS is enabled
1806
1807 `ProviderURL` is a URL to another provider.
1808
1809 `Locked` prevents the user from changing DNS over HTTPS preferences.
1810
1811 `ExcludedDomains` excludes domains from DNS over HTTPS.
1812
1813 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1814 **CCK2 Equivalent:** N/A\
1815 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1816
1817 #### Windows (GPO)
1818 ```
1819 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1820 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1821 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1822 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1823 ```
1824 #### Windows (Intune)
1825 OMA-URI:
1826 ```
1827 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1828 ```
1829 Value (string):
1830 ```
1831 <enabled/> or <disabled/>
1832 ```
1833 OMA-URI:
1834 ```
1835 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1836 ```
1837 Value (string):
1838 ```
1839 <enabled/>
1840 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1841 ```
1842 OMA-URI:
1843 ```
1844 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1845 ```
1846 Value (string):
1847 ```
1848 <enabled/> or <disabled/>
1849 ```
1850 OMA-URI:
1851 ```
1852 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1853 ```
1854 Value (string):
1855 ```
1856 <enabled/>
1857 <data id="List" value="1&#xF000;example.com"/>
1858 ```
1859 #### macOS
1860 ```
1861 <dict>
1862 <key>DNSOverHTTPS</key>
1863 <dict>
1864 <key>Enabled</key>
1865 <true/> | <false/>
1866 <key>ProviderURL</key>
1867 <string>URL_TO_ALTERNATE_PROVIDER</string>
1868 <key>Locked</key>
1869 <true/> | <false/>
1870 <key>ExcludedDomains</key>
1871 <array>
1872 <string>example.com</string>
1873 </array>
1874 </dict>
1875 </dict>
1876 ```
1877 #### policies.json
1878 ```
1879 {
1880 "policies": {
1881 "DNSOverHTTPS": {
1882 "Enabled": true | false,
1883 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1884 "Locked": true | false,
1885 "ExcludedDomains": ["example.com"]
1886 }
1887 }
1888 }
1889 ```
1890 ### DontCheckDefaultBrowser
1891 Don't check if Firefox is the default browser at startup.
1892
1893 **Compatibility:** Firefox 60, Firefox ESR 60\
1894 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1895 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1896
1897 #### Windows (GPO)
1898 ```
1899 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1900 ```
1901 #### Windows (Intune)
1902 OMA-URI:
1903 ```
1904 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1905 ```
1906 Value (string):
1907 ```
1908 <enabled/> or <disabled/>
1909 ```
1910 #### macOS
1911 ```
1912 <dict>
1913 <key>DontCheckDefaultBrowser</key>
1914 <true/> | <false/>
1915 </dict>
1916 ```
1917 #### policies.json
1918 ```
1919 {
1920 "policies": {
1921 "DontCheckDefaultBrowser": true | false
1922 }
1923 }
1924 ```
1925 ### DefaultDownloadDirectory
1926 Set the default download directory.
1927
1928 You can use ${home} for the native home directory.
1929
1930 **Compatibility:** Firefox 68, Firefox ESR 68\
1931 **CCK2 Equivalent:** N/A\
1932 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1933
1934 #### Windows (GPO)
1935 ```
1936 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1937 ```
1938 #### Windows (Intune)
1939 OMA-URI:
1940 ```
1941 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1942 ```
1943 Value (string):
1944 ```
1945 <enabled/>
1946 <data id="Preferences_String" value="${home}\Downloads"/>
1947 ```
1948 #### macOS
1949 ```
1950 <dict>
1951 <key>DefaultDownloadDirectory</key>
1952 <string>${home}/Downloads</string>
1953 </dict>
1954 ```
1955 #### policies.json (macOS and Linux)
1956 ```
1957 {
1958 "policies": {
1959 "DefaultDownloadDirectory": "${home}/Downloads"
1960 }
1961 ```
1962 #### policies.json (Windows)
1963 ```
1964 {
1965 "policies": {
1966 "DefaultDownloadDirectory": "${home}\\Downloads"
1967 }
1968 ```
1969 ### DownloadDirectory
1970 Set and lock the download directory.
1971
1972 You can use ${home} for the native home directory.
1973
1974 **Compatibility:** Firefox 68, Firefox ESR 68\
1975 **CCK2 Equivalent:** N/A\
1976 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1977
1978 #### Windows (GPO)
1979 ```
1980 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1981 ```
1982 #### Windows (Intune)
1983 OMA-URI:
1984 ```
1985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1986 ```
1987 Value (string):
1988 ```
1989 <enabled/>
1990 <data id="Preferences_String" value="${home}\Downloads"/>
1991 ```
1992 #### macOS
1993 ```
1994 <dict>
1995 <key>DownloadDirectory</key>
1996 <string>${home}/Downloads</string>
1997 </dict>
1998 ```
1999 #### policies.json (macOS and Linux)
2000 ```
2001 {
2002 "policies": {
2003 "DownloadDirectory": "${home}/Downloads"
2004 }
2005 ```
2006 #### policies.json (Windows)
2007 ```
2008 {
2009 "policies": {
2010 "DownloadDirectory": "${home}\\Downloads"
2011 }
2012 ```
2013 ### EnableTrackingProtection
2014 Configure tracking protection.
2015
2016 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2017
2018 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2019
2020 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2021
2022 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2023
2024 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2025
2026 `Exceptions` are origins for which tracking protection is not enabled.
2027
2028 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2029 **CCK2 Equivalent:** N/A\
2030 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
2031
2032 #### Windows (GPO)
2033 ```
2034 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2035 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2036 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2037 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2038 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2039 ```
2040 #### Windows (Intune)
2041 OMA-URI:
2042 ```
2043 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2044 ```
2045 Value (string):
2046 ```
2047 <enabled/> or <disabled/>
2048 ```
2049 OMA-URI:
2050 ```
2051 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2052 ```
2053 Value (string):
2054 ```
2055 <enabled/> or <disabled/>
2056 ```
2057 OMA-URI:
2058 ```
2059 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2060 ```
2061 Value (string):
2062 ```
2063 <enabled/> or <disabled/>
2064 ```
2065 OMA-URI:
2066 ```
2067 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2068 ```
2069 Value (string):
2070 ```
2071 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2072 ```
2073 OMA-URI:
2074 ```
2075 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2076 ```
2077 Value (string):
2078 ```
2079 <enabled/> or <disabled/>
2080 ```
2081 #### macOS
2082 ```
2083 <dict>
2084 <key>EnableTrackingProtection</key>
2085 <dict>
2086 <key>Value</key>
2087 <true/> | <false/>
2088 <key>Locked</key>
2089 <true/> | <false/>
2090 <key>Cryptomining</key>
2091 <true/> | <false/>
2092 <key>Fingerprinting</key>
2093 <true/> | <false/>
2094 <key>Exceptions</key>
2095 <array>
2096 <string>https://example.com</string>
2097 </array>
2098 </dict>
2099 </dict>
2100 ```
2101 #### policies.json
2102 ```
2103 {
2104 "policies": {
2105 "EnableTrackingProtection": {
2106 "Value": true | false,
2107 "Locked": true | false,
2108 "Cryptomining": true | false,
2109 "Fingerprinting": true | false,
2110 "Exceptions": ["https://example.com"]
2111 }
2112 }
2113 ```
2114 ### EncryptedMediaExtensions
2115 Enable or disable Encrypted Media Extensions and optionally lock it.
2116
2117 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2118
2119 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2120
2121 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2122 **CCK2 Equivalent:** N/A\
2123 **Preferences Affected:** `media.eme.enabled`
2124
2125 #### Windows (GPO)
2126 ```
2127 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2128 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2129 ```
2130 #### Windows (Intune)
2131 OMA-URI:
2132 ```
2133 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2135 ```
2136 Value (string):
2137 ```
2138 <enabled/>or <disabled/>
2139 ```
2140 #### macOS
2141 ```
2142 <dict>
2143 <key>EncryptedMediaExtensions</key>
2144 <dict>
2145 <key>Enabled</key>
2146 <true/> | <false/>
2147 <key>Locked</key>
2148 <true/> | <false/>
2149 </dict>
2150 </dict>
2151 ```
2152 #### policies.json
2153 ```
2154 {
2155 "policies": {
2156 "EncryptedMediaExtensions": {
2157 "Enabled": true | false,
2158 "Locked": true | false
2159 }
2160 }
2161 ```
2162 ### EnterprisePoliciesEnabled
2163 Enable policy support on macOS.
2164
2165 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2166 **CCK2 Equivalent:** N/A\
2167 **Preferences Affected:** N/A
2168
2169 #### macOS
2170 ```
2171 <dict>
2172 <key>EnterprisePoliciesEnabled</key>
2173 <true/>
2174 </dict>
2175 ```
2176 ### Extensions
2177 Control the installation, uninstallation and locking of extensions.
2178
2179 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2180
2181 `Install` is a list of URLs or native paths for extensions to be installed.
2182
2183 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2184
2185 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2186
2187 **Compatibility:** Firefox 60, Firefox ESR 60\
2188 **CCK2 Equivalent:** `addons`\
2189 **Preferences Affected:** N/A
2190
2191 #### Windows (GPO)
2192 ```
2193 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2194 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2195 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2196 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2197 ```
2198 #### Windows (Intune)
2199 OMA-URI:
2200 ```
2201 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2202 ```
2203 Value (string):
2204 ```
2205 <enabled/>
2206 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2207 ```
2208 OMA-URI:
2209 ```
2210 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2211 ```
2212 Value (string):
2213 ```
2214 <enabled/>
2215 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2216 ```
2217 OMA-URI:
2218 ```
2219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2220 ```
2221 Value (string):
2222 ```
2223 <enabled/>
2224 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2225 ```
2226 #### macOS
2227 ```
2228 <dict>
2229 <key>Extensions</key>
2230 <dict>
2231 <key>Install</key>
2232 <array>
2233 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2234 <string>//path/to/xpi</string>
2235 </array>
2236 <key>Uninstall</key>
2237 <array>
2238 <string>bad_addon_id@mozilla.org</string>
2239 </array>
2240 <key>Locked</key>
2241 <array>
2242 <string>addon_id@mozilla.org</string>
2243 </array>
2244 </dict>
2245 </dict>
2246 ```
2247 #### policies.json
2248 ```
2249 {
2250 "policies": {
2251 "Extensions": {
2252 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2253 "Uninstall": ["bad_addon_id@mozilla.org"],
2254 "Locked": ["addon_id@mozilla.org"]
2255 }
2256 }
2257 }
2258 ```
2259 ### ExtensionSettings
2260 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2261
2262 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2263
2264 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2265
2266 The configuration for each extension is another dictionary that can contain the fields documented below.
2267
2268 | Name | Description |
2269 | --- | --- |
2270 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2271 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2272 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2273 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2274 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2275 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2276 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2277 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2278 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2279 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2280
2281 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2282 **CCK2 Equivalent:** N/A\
2283 **Preferences Affected:** N/A
2284
2285 #### Windows (GPO)
2286 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2287 ```
2288 {
2289 "*": {
2290 "blocked_install_message": "Custom error message.",
2291 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2292 "installation_mode": "blocked",
2293 "allowed_types": ["extension"]
2294 },
2295 "uBlock0@raymondhill.net": {
2296 "installation_mode": "force_installed",
2297 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2298 },
2299 "https-everywhere@eff.org": {
2300 "installation_mode": "allowed"
2301 }
2302 }
2303 ```
2304 #### Windows (Intune)
2305 OMA-URI:
2306 ```
2307 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2308 ```
2309 Value (string):
2310 ```
2311 <enabled/>
2312 <data id="ExtensionSettings" value='
2313 {
2314 "*": {
2315 "blocked_install_message": "Custom error message.",
2316 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2317 "installation_mode": "blocked",
2318 "allowed_types": ["extension"]
2319 },
2320 "uBlock0@raymondhill.net": {
2321 "installation_mode": "force_installed",
2322 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2323 },
2324 "https-everywhere@eff.org": {
2325 "installation_mode": "allowed"
2326 }
2327 }'/>
2328 ```
2329 #### macOS
2330 ```
2331 <dict>
2332 <key>ExtensionSettings</key>
2333 <dict>
2334 <key>*</key>
2335 <dict>
2336 <key>blocked_install_message</key>
2337 <string>Custom error message.</string>
2338 <key>install_sources</key>
2339 <array>
2340 <string>about:addons</string>
2341 <string>https://addons.mozilla.org/</string>
2342 </array>
2343 <key>installation_mode</key>
2344 <string>blocked</string>
2345 <key>allowed_types</key>
2346 <array>
2347 <string>extension</string>
2348 </array>
2349 </dict>
2350 <key>uBlock0@raymondhill.net</key>
2351 <dict>
2352 <key>installation_mode</key>
2353 <string>force_installed</string>
2354 <key>install_url</key>
2355 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2356 </dict>
2357 <key>https-everywhere@eff.org</key>
2358 <dict>
2359 <key>installation_mode</key>
2360 <string>allowed</string>
2361 </dict>
2362 </dict>
2363 </dict>
2364 ```
2365 #### policies.json
2366 ```
2367 {
2368 "policies": {
2369 "ExtensionSettings": {
2370 "*": {
2371 "blocked_install_message": "Custom error message.",
2372 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2373 "installation_mode": "blocked",
2374 "allowed_types": ["extension"]
2375 },
2376 "uBlock0@raymondhill.net": {
2377 "installation_mode": "force_installed",
2378 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2379 },
2380 "https-everywhere@eff.org": {
2381 "installation_mode": "allowed"
2382 }
2383 }
2384 }
2385 }
2386 ```
2387 ### ExtensionUpdate
2388 Control extension updates.
2389
2390 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2391 **CCK2 Equivalent:** N/A\
2392 **Preferences Affected:** `extensions.update.enabled`
2393
2394 #### Windows (GPO)
2395 ```
2396 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2397 ```
2398 #### Windows (Intune)
2399 OMA-URI:
2400 ```
2401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2402 ```
2403 Value (string):
2404 ```
2405 <enabled/> or <disabled/>
2406 ```
2407 #### macOS
2408 ```
2409 <dict>
2410 <key>ExtensionUpdate</key>
2411 <true/> | <false/>
2412 </dict>
2413 ```
2414 #### policies.json
2415 ```
2416 {
2417 "policies": {
2418 "ExtensionUpdate": true | false
2419 }
2420 }
2421 ```
2422 ### FlashPlugin
2423 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2424
2425 `Allow` is a list of origins where Flash are allowed.
2426
2427 `Block` is a list of origins where Flash is not allowed.
2428
2429 `Default` determines whether or not Flash is allowed by default.
2430
2431 `Locked` prevents the user from changing Flash preferences.
2432
2433 **Compatibility:** Firefox 60, Firefox ESR 60\
2434 **CCK2 Equivalent:** `permissions.plugin`\
2435 **Preferences Affected:** `plugin.state.flash`
2436
2437 #### Windows (GPO)
2438 ```
2439 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2440 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2441 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2442 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2443 ```
2444 #### Windows (Intune)
2445 OMA-URI:
2446 ```
2447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2448 ```
2449 Value (string):
2450 ```
2451 <enabled/>
2452 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2453 ```
2454 OMA-URI:
2455 ```
2456 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2457 ```
2458 Value (string):
2459 ```
2460 <enabled/> or <disabled/>
2461 ```
2462 OMA-URI:
2463 ```
2464 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2465 ```
2466 Value (string):
2467 ```
2468 <enabled/> or <disabled/>
2469 ```
2470 #### macOS
2471 ```
2472 <dict>
2473 <key>FlashPlugin</key>
2474 <dict>
2475 <key>Allow</key>
2476 <array>
2477 <string>http://example.org</string>
2478 </array>
2479 <key>Block</key>
2480 <array>
2481 <string>http://example.edu</string>
2482 </array>
2483 <key>Default</key>
2484 <true/> | <false/>
2485 <key>Locked</key>
2486 <true/> | <false/>
2487 </dict>
2488 </dict>
2489 ```
2490 #### policies.json
2491 ```
2492 {
2493 "policies": {
2494 "FlashPlugin": {
2495 "Allow": ["http://example.org/"],
2496 "Block": ["http://example.edu/"],
2497 "Default": true | false,
2498 "Locked": true | false
2499 }
2500 }
2501 }
2502 ```
2503
2504
2505
2506 ### Handlers
2507 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2508
2509 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2510
2511 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2512
2513 | Name | Description |
2514 | --- | --- |
2515 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2516 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2517 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2518 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2519 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2520 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2521
2522 **Compatibility:** Firefox 78, Firefox ESR 78\
2523 **CCK2 Equivalent:** N/A\
2524 **Preferences Affected:** N/A
2525
2526 #### Windows (GPO)
2527 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2528 ```
2529 {
2530 "mimeTypes": {
2531 "application/msword": {
2532 "action": "useSystemDefault",
2533 "ask": true | false
2534 }
2535 },
2536 "schemes": {
2537 "mailto": {
2538 "action": "useHelperApp",
2539 "ask": true | false,
2540 "handlers": [{
2541 "name": "Gmail",
2542 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2543 }]
2544 }
2545 },
2546 "extensions": {
2547 "pdf": {
2548 "action": "useHelperApp",
2549 "ask": true | false,
2550 "handlers": [{
2551 "name": "Adobe Acrobat",
2552 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2553 }]
2554 }
2555 }
2556 }
2557 ```
2558 #### Windows (Intune)
2559 OMA-URI:
2560 ```
2561 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2562 ```
2563 Value (string):
2564 ```
2565 <enabled/>
2566 <data id="Handlers" value='
2567 {
2568 "mimeTypes": {
2569 "application/msword": {
2570 "action": "useSystemDefault",
2571 "ask": true | false
2572 }
2573 },
2574 "schemes": {
2575 "mailto": {
2576 "action": "useHelperApp",
2577 "ask": true | false,
2578 "handlers": [{
2579 "name": "Gmail",
2580 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2581 }]
2582 }
2583 },
2584 "extensions": {
2585 "pdf": {
2586 "action": "useHelperApp",
2587 "ask": true | false,
2588 "handlers": [{
2589 "name": "Adobe Acrobat",
2590 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2591 }]
2592 }
2593 }
2594 }
2595 '/>
2596 ```
2597 #### macOS
2598 ```
2599 <dict>
2600 <key>Handlers</key>
2601 <dict>
2602 <key>mimeTypes</key>
2603 <dict>
2604 <key>application/msword</key>
2605 <dict>
2606 <key>action</key>
2607 <string>useSystemDefault</string>
2608 <key>ask</key>
2609 <true/> | <false/>
2610 </dict>
2611 </dict>
2612 <key>schemes</key>
2613 <dict>
2614 <key>mailto</key>
2615 <dict>
2616 <key>action</key>
2617 <string>useHelperApp</string>
2618 <key>ask</key>
2619 <true/> | <false/>
2620 <key>handlers</key>
2621 <array>
2622 <dict>
2623 <key>name</key>
2624 <string>Gmail</string>
2625 <key>uriTemplate</key>
2626 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2627 </dict>
2628 </array>
2629 </dict>
2630 </dict>
2631 <key>extensions</key>
2632 <dict>
2633 <key>pdf</key>
2634 <dict>
2635 <key>action</key>
2636 <string>useHelperApp</string>
2637 <key>ask</key>
2638 <true/> | <false/>
2639 <key>handlers</key>
2640 <array>
2641 <dict>
2642 <key>name</key>
2643 <string>Adobe Acrobat</string>
2644 <key>path</key>
2645 <string>/System/Applications/Preview.app</string>
2646 </dict>
2647 </array>
2648 </dict>
2649 </dict>
2650 </dict>
2651 </dict>
2652 ```
2653 #### policies.json
2654 ```
2655 {
2656 "policies": {
2657 "Handlers": {
2658 "mimeTypes": {
2659 "application/msword": {
2660 "action": "useSystemDefault",
2661 "ask": false
2662 }
2663 },
2664 "schemes": {
2665 "mailto": {
2666 "action": "useHelperApp",
2667 "ask": true | false,
2668 "handlers": [{
2669 "name": "Gmail",
2670 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2671 }]
2672 }
2673 },
2674 "extensions": {
2675 "pdf": {
2676 "action": "useHelperApp",
2677 "ask": true | false,
2678 "handlers": [{
2679 "name": "Adobe Acrobat",
2680 "path": "/usr/bin/acroread"
2681 }]
2682 }
2683 }
2684 }
2685 }
2686 }
2687 ```
2688 ### FirefoxHome
2689 Customize the Firefox Home page.
2690
2691 **Compatibility:** Firefox 68, Firefox ESR 68\
2692 **CCK2 Equivalent:** N/A\
2693 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2694
2695 #### Windows (GPO)
2696 ```
2697 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2698 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2699 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2700 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2701 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2702 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2703 ```
2704 #### Windows (Intune)
2705 OMA-URI:
2706 ```
2707 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2708 ```
2709 Value (string):
2710 ```
2711 <enabled/>
2712 <data id="FirefoxHome_Search" value="true | false"/>
2713 <data id="FirefoxHome_TopSites" value="true | false"/>
2714 <data id="FirefoxHome_Highlights" value="true | false"/>
2715 <data id="FirefoxHome_Pocket" value="true | false"/>
2716 <data id="FirefoxHome_Snippets" value="true | false"/>
2717 <data id="FirefoxHome_Locked" value="true | false"/>
2718 ```
2719 #### macOS
2720 ```
2721 <dict>
2722 <key>FirefoxHome</key>
2723 <dict>
2724 <key>Search</key>
2725 <true/> | <false/>
2726 <key>TopSites</key>
2727 <true/> | <false/>
2728 <key>Highlights</key>
2729 <true/> | <false/>
2730 <key>Pocket</key>
2731 <true/> | <false/>
2732 <key>Snippets</key>
2733 <true/> | <false/>
2734 <key>Locked</key>
2735 <true/> | <false/>
2736 </dict>
2737 </dict>
2738 ```
2739 #### policies.json
2740 ```
2741 {
2742 "policies": {
2743 "FirefoxHome": {
2744 "Search": true | false,
2745 "TopSites": true | false,
2746 "Highlights": true | false,
2747 "Pocket": true | false,
2748 "Snippets": true | false,
2749 "Locked": true | false
2750 }
2751 }
2752 }
2753 ```
2754 ### HardwareAcceleration
2755 Control hardware acceleration.
2756
2757 **Compatibility:** Firefox 60, Firefox ESR 60\
2758 **CCK2 Equivalent:** N/A\
2759 **Preferences Affected:** `layers.acceleration.disabled`
2760
2761 #### Windows (GPO)
2762 ```
2763 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2764 ```
2765 #### Windows (Intune)
2766 OMA-URI:
2767 ```
2768 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2769 ```
2770 Value (string):
2771 ```
2772 <enabled/> or <disabled/>
2773 ```
2774 #### macOS
2775 ```
2776 <dict>
2777 <key>HardwareAcceleration</key>
2778 <true/> | <false/>
2779 </dict>
2780 ```
2781 #### policies.json
2782 ```
2783 {
2784 "policies": {
2785 "HardwareAcceleration": true | false
2786 }
2787 }
2788 ```
2789 ### Homepage
2790 Configure the default homepage and how Firefox starts.
2791
2792 `URL` is the default homepage.
2793
2794 `Locked` prevents the user from changing homepage preferences.
2795
2796 `Additional` allows for more than one homepage.
2797
2798 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2799
2800 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
2801
2802 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2803 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2804 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2805
2806 #### Windows (GPO)
2807 ```
2808 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2809 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2810 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2811 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2812 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2813 ```
2814 #### Windows (Intune)
2815 OMA-URI:
2816 ```
2817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2818 ```
2819 Value (string):
2820 ```
2821 <enabled/>
2822
2823 <data id="HomepageURL" value="https://example.com"/>
2824 <data id="HomepageLocked" value="true | false"/>
2825 ```
2826 OMA-URI:
2827 ```
2828 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2829 ```
2830 Value (string):
2831 ```
2832 <enabled/>
2833
2834 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2835 ```
2836 OMA-URI:
2837 ```
2838 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2839 ```
2840 Value (string):
2841 ```
2842 <enabled/>
2843
2844 <data id="StartPage" value="none | homepage | previous-session"/>
2845 ```
2846 #### macOS
2847 ```
2848 <dict>
2849 <key>Homepage</key>
2850 <dict>
2851 <key>URL</key>
2852 <string>http://example.com</string>
2853 <key>Locked</key>
2854 <true/> | <false/>
2855 <key>Additional</key>
2856 <array>
2857 <string>http://example.org</string>
2858 <string>http://example.edu</string>
2859 </array>
2860 <key>StartPage</key>
2861 <string>none | homepage | previous-session | homepage-locked</string>
2862 </dict>
2863 </dict>
2864 ```
2865 #### policies.json
2866 ```
2867 {
2868 "policies": {
2869 "Homepage": {
2870 "URL": "http://example.com/",
2871 "Locked": true | false,
2872 "Additional": ["http://example.org/",
2873 "http://example.edu/"],
2874 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2875 }
2876 }
2877 }
2878 ```
2879 ### InstallAddonsPermission
2880 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2881
2882 `Allow` is a list of origins where extension installs are allowed.
2883
2884 `Default` determines whether or not extension installs are allowed by default.
2885
2886 **Compatibility:** Firefox 60, Firefox ESR 60\
2887 **CCK2 Equivalent:** `permissions.install`\
2888 **Preferences Affected:** `xpinstall.enabled`
2889
2890 #### Windows (GPO)
2891 ```
2892 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2893 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2894 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2895 ```
2896 #### Windows (Intune)
2897 OMA-URI:
2898 ```
2899 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2900 ```
2901 Value (string):
2902 ```
2903 <enabled/>
2904 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2905 ```
2906 OMA-URI:
2907 ```
2908 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2909 ```
2910 Value (string):
2911 ```
2912 <enabled/>
2913 ```
2914 #### macOS
2915 ```
2916 <dict>
2917 <key>InstallAddonsPermission</key>
2918 <dict>
2919 <key>Allow</key>
2920 <array>
2921 <string>http://example.org</string>
2922 <string>http://example.edu</string>
2923 </array>
2924 <key>Default</key>
2925 <true/> | <false/>
2926 </dict>
2927 </dict>
2928 ```
2929 #### policies.json
2930 ```
2931 {
2932 "policies": {
2933 "InstallAddonsPermission": {
2934 "Allow": ["http://example.org/",
2935 "http://example.edu/"],
2936 "Default": true | false
2937 }
2938 }
2939 }
2940 ```
2941 ### LegacyProfiles
2942 Disable the feature enforcing a separate profile for each installation.
2943
2944 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2945
2946 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2947
2948 This policy only work on Windows via GPO (not policies.json).
2949
2950 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2951 **CCK2 Equivalent:** N/A\
2952 **Preferences Affected:** N/A
2953
2954 #### Windows (GPO)
2955 ```
2956 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2957 ```
2958 #### Windows (Intune)
2959 OMA-URI:
2960 ```
2961 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2962 ```
2963 Value (string):
2964 ```
2965 <enabled/> or <disabled/>
2966 ```
2967 ### LocalFileLinks
2968 Enable linking to local files by origin.
2969
2970 **Compatibility:** Firefox 68, Firefox ESR 68\
2971 **CCK2 Equivalent:** N/A\
2972 **Preferences Affected:** `capability.policy.localfilelinks.*`
2973
2974 #### Windows (GPO)
2975 ```
2976 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2977 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2978 ```
2979 #### Windows (Intune)
2980 OMA-URI:
2981 ```
2982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2983 ```
2984 Value (string):
2985 ```
2986 <enabled/>
2987 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2988 ```
2989 #### macOS
2990 ```
2991 <dict>
2992 <key>LocalFileLinks</key>
2993 <array>
2994 <string>http://example.org</string>
2995 <string>http://example.edu</string>
2996 </array>
2997 </dict>
2998 ```
2999 #### policies.json
3000 ```
3001 {
3002 "policies": {
3003 "LocalFileLinks": ["http://example.org/",
3004 "http://example.edu/"]
3005 }
3006 }
3007 ```
3008 ### ManagedBookmarks
3009 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3010
3011 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3012
3013 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3014 ```
3015 {
3016 "items": {
3017 "id": "BookmarkType",
3018 "properties": {
3019 "children": {
3020 "items": {
3021 "$ref": "BookmarkType"
3022 },
3023 "type": "array"
3024 },
3025 "name": {
3026 "type": "string"
3027 },
3028 "toplevel_name": {
3029 "type": "string"
3030 },
3031 "url": {
3032 "type": "string"
3033 }
3034 },
3035 "type": "object"
3036 },
3037 "type": "array"
3038 }
3039 ```
3040 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3041 **CCK2 Equivalent:** N/A\
3042 **Preferences Affected:** N/A
3043
3044 #### Windows (GPO)
3045 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3046 ```
3047 [
3048 {
3049 "toplevel_name": "My managed bookmarks folder"
3050 },
3051 {
3052 "url": "example.com",
3053 "name": "Example"
3054 },
3055 {
3056 "name": "Mozilla links",
3057 "children": [
3058 {
3059 "url": "https://mozilla.org",
3060 "name": "Mozilla.org"
3061 },
3062 {
3063 "url": "https://support.mozilla.org/",
3064 "name": "SUMO"
3065 }
3066 ]
3067 }
3068 ]
3069 ```
3070 #### Windows (Intune)
3071 OMA-URI:
3072 ```
3073 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3074 ```
3075 Value (string):
3076 ```
3077 <enabled/>
3078 <data id="JSON" value='
3079 [
3080 {
3081 "toplevel_name": "My managed bookmarks folder"
3082 },
3083 {
3084 "url": "example.com",
3085 "name": "Example"
3086 },
3087 {
3088 "name": "Mozilla links",
3089 "children": [
3090 {
3091 "url": "https://mozilla.org",
3092 "name": "Mozilla.org"
3093 },
3094 {
3095 "url": "https://support.mozilla.org/",
3096 "name": "SUMO"
3097 }
3098 ]
3099 }
3100 ]'/>
3101 ```
3102 #### macOS
3103 ```
3104 <dict>
3105 <key>ManagedBookmarks</key>
3106 <array>
3107 <dict>
3108 <key>toplevel_name</key>
3109 <string>My managed bookmarks folder</string></dict>
3110 <dict>
3111 <key>url</key>
3112 <string>example.com</string>
3113 <key>name</key>
3114 <string>Example</string>
3115 </dict>
3116 <dict>
3117 <key>name</key>
3118 <string>Mozilla links</string>
3119 <key>children</key>
3120 <array>
3121 <dict>
3122 <key>url</key>
3123 <string>https://mozilla.org</string>
3124 <key>name</key>
3125 <string>Mozilla</string>
3126 </dict>
3127 <dict>
3128 <key>url</key>
3129 <string>https://support.mozilla.org/</string>
3130 <key>name</key>
3131 <string>SUMO</string>
3132 </dict>
3133 </array>
3134 </dict>
3135 </array>
3136 </dict>
3137 ```
3138 #### policies.json
3139 ```
3140 {
3141 "policies": {
3142 "ManagedBookmarks": [
3143 {
3144 "toplevel_name": "My managed bookmarks folder"
3145 },
3146 {
3147 "url": "example.com",
3148 "name": "Example"
3149 },
3150 {
3151 "name": "Mozilla links",
3152 "children": [
3153 {
3154 "url": "https://mozilla.org",
3155 "name": "Mozilla.org"
3156 },
3157 {
3158 "url": "https://support.mozilla.org/",
3159 "name": "SUMO"
3160 }
3161 ]
3162 }
3163 ]
3164 }
3165 }
3166 ```
3167 ### ManualAppUpdateOnly
3168
3169 Switch to manual updates only.
3170
3171 If this policy is enabled:
3172 1. The user will never be prompted to install updates
3173 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3174 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3175
3176 This policy is primarily intended for advanced end users, not for enterprises.
3177
3178 **Compatibility:** Firefox 87\
3179 **CCK2 Equivalent:** N/A\
3180 **Preferences Affected:** N/A
3181
3182 #### policies.json
3183 ```
3184 {
3185 "policies": {
3186 "ManualAppUpdateOnly": true | false
3187 }
3188 }
3189 ```
3190 ### PrimaryPassword
3191 Require or prevent using a primary (formerly master) password.
3192
3193 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
3194
3195 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
3196
3197 **Compatibility:** Firefox 79, Firefox ESR 78.1\
3198 **CCK2 Equivalent:** `noMasterPassword`\
3199 **Preferences Affected:** N/A
3200
3201 #### Windows (GPO)
3202 ```
3203 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
3204 ```
3205 #### Windows (Intune)
3206 OMA-URI:
3207 ```
3208 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
3209 ```
3210 Value (string):
3211 ```
3212 <enabled/> or <disabled/>
3213 ```
3214 #### macOS
3215 ```
3216 <dict>
3217 <key>PrimaryPassword</key>
3218 <true/> | <false/>
3219 </dict>
3220 ```
3221 #### policies.json
3222 ```
3223 {
3224 "policies": {
3225 "PrimaryPassword": true | false
3226 }
3227 }
3228 ```
3229 ### NetworkPrediction
3230 Enable or disable network prediction (DNS prefetching).
3231
3232 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3233 **CCK2 Equivalent:** N/A\
3234 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
3235
3236 #### Windows (GPO)
3237 ```
3238 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3239 ```
3240 #### Windows (Intune)
3241 OMA-URI:
3242 ```
3243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3244 ```
3245 Value (string):
3246 ```
3247 <enabled/> or <disabled/>
3248 ```
3249 #### macOS
3250 ```
3251 <dict>
3252 <key>NetworkPrediction</key>
3253 <true/> | <false/>
3254 </dict>
3255 ```
3256 #### policies.json
3257 ```
3258 {
3259 "policies": {
3260 "NetworkPrediction": true | false
3261 }
3262 ```
3263 ### NewTabPage
3264 Enable or disable the New Tab page.
3265
3266 **Compatibility:** Firefox 68, Firefox ESR 68\
3267 **CCK2 Equivalent:** N/A\
3268 **Preferences Affected:** `browser.newtabpage.enabled`
3269
3270 #### Windows (GPO)
3271 ```
3272 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3273 ```
3274 #### Windows (Intune)
3275 OMA-URI:
3276 ```
3277 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3278 ```
3279 Value (string):
3280 ```
3281 <enabled/> or <disabled/>
3282 ```
3283 #### macOS
3284 ```
3285 <dict>
3286 <key>NewTabPage</key>
3287 <true/> | <false/>
3288 </dict>
3289 ```
3290 #### policies.json
3291 ```
3292 {
3293 "policies": {
3294 "NewTabPage": true | false
3295 }
3296 ```
3297 ### NoDefaultBookmarks
3298 Disable the creation of default bookmarks.
3299
3300 This policy is only effective if the user profile has not been created yet.
3301
3302 **Compatibility:** Firefox 60, Firefox ESR 60\
3303 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3304 **Preferences Affected:** N/A
3305
3306 #### Windows (GPO)
3307 ```
3308 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3309 ```
3310 #### Windows (Intune)
3311 OMA-URI:
3312 ```
3313 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3314 ```
3315 Value (string):
3316 ```
3317 <enabled/> or <disabled/>
3318 ```
3319 #### macOS
3320 ```
3321 <dict>
3322 <key>NoDefaultBookmarks</key>
3323 <true/> | <false/>
3324 </dict>
3325 ```
3326 #### policies.json
3327 ```
3328 {
3329 "policies": {
3330 "NoDefaultBookmarks": true | false
3331 }
3332 }
3333 ```
3334 ### OfferToSaveLogins
3335 Control whether or not Firefox offers to save passwords.
3336
3337 **Compatibility:** Firefox 60, Firefox ESR 60\
3338 **CCK2 Equivalent:** `dontRememberPasswords`\
3339 **Preferences Affected:** `signon.rememberSignons`
3340
3341 #### Windows (GPO)
3342 ```
3343 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3344 ```
3345 #### Windows (Intune)
3346 OMA-URI:
3347 ```
3348 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3349 ```
3350 Value (string):
3351 ```
3352 <enabled/> or <disabled/>
3353 ```
3354 #### macOS
3355 ```
3356 <dict>
3357 <key>OfferToSaveLogins</key>
3358 <true/> | <false/>
3359 </dict>
3360 ```
3361 #### policies.json
3362 ```
3363 {
3364 "policies": {
3365 "OfferToSaveLogins": true | false
3366 }
3367 }
3368 ```
3369 ### OfferToSaveLoginsDefault
3370 Sets the default value of signon.rememberSignons without locking it.
3371
3372 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3373 **CCK2 Equivalent:** `dontRememberPasswords`\
3374 **Preferences Affected:** `signon.rememberSignons`
3375
3376 #### Windows (GPO)
3377 ```
3378 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3379 ```
3380 #### Windows (Intune)
3381 OMA-URI:
3382 ```
3383 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3384 ```
3385 Value (string):
3386 ```
3387 <enabled/> or <disabled/>
3388 ```
3389 #### macOS
3390 ```
3391 <dict>
3392 <key>OfferToSaveLoginsDefault</key>
3393 <true/> | <false/>
3394 </dict>
3395 ```
3396 #### policies.json
3397 ```
3398 {
3399 "policies": {
3400 "OfferToSaveLoginsDefault": true | false
3401 }
3402 }
3403 ```
3404 ### OverrideFirstRunPage
3405 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3406
3407 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3408
3409 **Compatibility:** Firefox 60, Firefox ESR 60\
3410 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3411 **Preferences Affected:** `startup.homepage_welcome_url`
3412
3413 #### Windows (GPO)
3414 ```
3415 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3416 ```
3417 #### Windows (Intune)
3418 OMA-URI:
3419 ```
3420 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3421 ```
3422 Value (string):
3423 ```
3424 <enabled/>
3425 <data id="OverridePage" value="https://example.com"/>
3426 ```
3427 #### macOS
3428 ```
3429 <dict>
3430 <key>OverrideFirstRunPage</key>
3431 <string>http://example.org</string>
3432 </dict>
3433 ```
3434 #### policies.json
3435 ```
3436 {
3437 "policies": {
3438 "OverrideFirstRunPage": "http://example.org"
3439 }
3440 ```
3441 ### OverridePostUpdatePage
3442 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3443
3444 **Compatibility:** Firefox 60, Firefox ESR 60\
3445 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3446 **Preferences Affected:** `startup.homepage_override_url`
3447
3448 #### Windows (GPO)
3449 ```
3450 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3451 ```
3452 #### Windows (Intune)
3453 OMA-URI:
3454 ```
3455 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3456 ```
3457 Value (string):
3458 ```
3459 <enabled/>
3460 <data id="OverridePage" value="https://example.com"/>
3461 ```
3462 #### macOS
3463 ```
3464 <dict>
3465 <key>OverridePostUpdatePage</key>
3466 <string>http://example.org</string>
3467 </dict>
3468 ```
3469 #### policies.json
3470 ```
3471 {
3472 "policies": {
3473 "OverridePostUpdatePage": "http://example.org"
3474 }
3475 ```
3476 ### PasswordManagerEnabled
3477 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3478
3479 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3480 **CCK2 Equivalent:** N/A\
3481 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3482
3483 #### Windows (GPO)
3484 ```
3485 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3486 ```
3487 #### Windows (Intune)
3488 OMA-URI:
3489 ```
3490 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3491 ```
3492 Value (string):
3493 ```
3494 <enabled/> or <disabled/>
3495 ```
3496 #### macOS
3497 ```
3498 <dict>
3499 <key>PasswordManagerEnabled</key>
3500 <true/> | <false/>
3501 </dict>
3502 ```
3503 #### policies.json
3504 ```
3505 {
3506 "policies": {
3507 "PasswordManagerEnabled": true | false
3508 }
3509 }
3510 ```
3511 ### PDFjs
3512 Disable or configure PDF.js, the built-in PDF viewer.
3513
3514 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3515
3516 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3517
3518 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3519
3520 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3521 **CCK2 Equivalent:** N/A\
3522 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3523
3524 #### Windows (GPO)
3525 ```
3526 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3527 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3528 ```
3529 #### Windows (Intune)
3530 OMA-URI:
3531 ```
3532 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3533 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3534 ```
3535 Value (string):
3536 ```
3537 <enabled/>or <disabled/>
3538 ```
3539 #### macOS
3540 ```
3541 <dict>
3542 <key>PDFjs</key>
3543 <dict>
3544 <key>Enabled</key>
3545 <true/> | <false/>
3546 <key>EnablePermissions</key>
3547 <true/> | <false/>
3548 </dict>
3549 </dict>
3550 ```
3551 #### policies.json
3552 ```
3553 {
3554 "policies": {
3555 "PSFjs": {
3556 "Enabled": true | false,
3557 "EnablePermissions": true | false
3558 }
3559 }
3560 ```
3561 ### Permissions
3562 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3563
3564 `Allow` is a list of origins where the feature is allowed.
3565
3566 `Block` is a list of origins where the feature is not allowed.
3567
3568 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3569
3570 `Locked` prevents the user from changing preferences for the feature.
3571
3572 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3573
3574 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3575 **CCK2 Equivalent:** N/A\
3576 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`.`permissions.default.xr`
3577
3578 #### Windows (GPO)
3579 ```
3580 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3581 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3582 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3583 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3584 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3585 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3586 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3587 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3588 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3589 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3590 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3591 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3592 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3593 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3594 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3595 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3596 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3597 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3598 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3599 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3600 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3601 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3602 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3603 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3604 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3605 ```
3606 #### Windows (Intune)
3607 OMA-URI:
3608 ```
3609 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3610 ```
3611 Value (string):
3612 ```
3613 <enabled/> or <disabled/>
3614 ```
3615 OMA-URI:
3616 ```
3617 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3618 ```
3619 Value (string):
3620 ```
3621 <enabled/> or <disabled/>
3622 ```
3623 OMA-URI:
3624 ```
3625 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3626 ```
3627 Value (string):
3628 ```
3629 <enabled/>
3630 <data id="Permissions" value="1&#xF000;https://example.org"/>
3631 ```
3632 OMA-URI:
3633 ```
3634 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3635 ```
3636 Value (string):
3637 ```
3638 <enabled/> or <disabled/>
3639 ```
3640 OMA-URI:
3641 ```
3642 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3643 ```
3644 Value (string):
3645 ```
3646 <enabled/> or <disabled/>
3647 ```
3648 OMA-URI:
3649 ```
3650 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3651 ```
3652 Value (string):
3653 ```
3654 <enabled/>
3655 <data id="Permissions" value="1&#xF000;https://example.org"/>
3656 ```
3657 OMA-URI:
3658 ```
3659 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3660 ```
3661 Value (string):
3662 ```
3663 <enabled/>
3664 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3665 ```
3666 OMA-URI:
3667 ```
3668 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3669 ```
3670 Value (string):
3671 ```
3672 <enabled/>
3673 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3674 ```
3675 OMA-URI:
3676 ```
3677 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3678 ```
3679 Value (string):
3680 ```
3681 <enabled/> or <disabled/>
3682 ```
3683 OMA-URI:
3684 ```
3685 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
3686 ```
3687 Value (string):
3688 ```
3689 <enabled/>
3690 <data id="Permissions" value="1&#xF000;https://example.org"/>
3691 ```
3692 OMA-URI:
3693 ```
3694 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
3695 ```
3696 Value (string):
3697 ```
3698 <enabled/>
3699 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3700 ```
3701 OMA-URI:
3702 ```
3703 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
3704 ```
3705 Value (string):
3706 ```
3707 <enabled/> or <disabled/>
3708 ```
3709 OMA-URI:
3710 ```
3711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
3712 ```
3713 Value (string):
3714 ```
3715 <enabled/> or <disabled/>
3716 ```
3717 #### macOS
3718 ```
3719 <dict>
3720 <key>Permissions</key>
3721 <dict>
3722 <key>Camera</key>
3723 <dict>
3724 <key>Allow</key>
3725 <array>
3726 <string>https://example.org</string>
3727 <string>https://example.org:1234</string>
3728 </array>
3729 <key>Block</key>
3730 <array>
3731 <string>https://example.edu</string>
3732 </array>
3733 <key>BlockNewRequests</key>
3734 <true/> | <false/>
3735 <key>Locked</key>
3736 <true/> | <false/>
3737 </dict>
3738 <key>Microphone</key>
3739 <dict>
3740 <key>Allow</key>
3741 <array>
3742 <string>https://example.org</string>
3743 </array>
3744 <key>Block</key>
3745 <array>
3746 <string>https://example.edu</string>
3747 </array>
3748 <key>BlockNewRequests</key>
3749 <true/> | <false/>
3750 <key>Locked</key>
3751 <true/> | <false/>
3752 </dict>
3753 <key>Location</key>
3754 <dict>
3755 <key>Allow</key>
3756 <array>
3757 <string>https://example.org</string>
3758 </array>
3759 <key>Block</key>
3760 <array>
3761 <string>https://example.edu</string>
3762 </array>
3763 <key>BlockNewRequests</key>
3764 <true/> | <false/>
3765 <key>Locked</key>
3766 <true/> | <false/>
3767 </dict>
3768 <key>Notifications</key>
3769 <dict>
3770 <key>Allow</key>
3771 <array>
3772 <string>https://example.org</string>
3773 </array>
3774 <key>Block</key>
3775 <array>
3776 <string>https://example.edu</string>
3777 </array>
3778 <key>BlockNewRequests</key>
3779 <true/>
3780 <key>Locked</key>
3781 <true/>
3782 </dict>
3783 <key>Autoplay</key>
3784 <dict>
3785 <key>Allow</key>
3786 <array>
3787 <string>https://example.org</string>
3788 </array>
3789 <key>Block</key>
3790 <array>
3791 <string>https://example.edu</string>
3792 </array>
3793 <key>Default</key>
3794 <string>allow-audio-video | block-audio | block-audio-video</string>
3795 <key>Locked</key>
3796 <true/> | <false/>
3797 </dict>
3798 </dict>
3799 </dict>
3800 ```
3801 #### policies.json
3802 ```
3803 {
3804 "policies": {
3805 "Permissions": {
3806 "Camera": {
3807 "Allow": ["https://example.org","https://example.org:1234"],
3808 "Block": ["https://example.edu"],
3809 "BlockNewRequests": true | false,
3810 "Locked": true | false
3811 },
3812 "Microphone": {
3813 "Allow": ["https://example.org"],
3814 "Block": ["https://example.edu"],
3815 "BlockNewRequests": true | false,
3816 "Locked": true | false
3817 },
3818 "Location": {
3819 "Allow": ["https://example.org"],
3820 "Block": ["https://example.edu"],
3821 "BlockNewRequests": true | false,
3822 "Locked": true | false
3823 },
3824 "Notifications": {
3825 "Allow": ["https://example.org"],
3826 "Block": ["https://example.edu"],
3827 "BlockNewRequests": true | false,
3828 "Locked": true | false
3829 },
3830 "Autoplay": {
3831 "Allow": ["https://example.org"],
3832 "Block": ["https://example.edu"],
3833 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3834 "Locked": true | false
3835 }
3836 }
3837 }
3838 }
3839 ```
3840 ### PictureInPicture
3841
3842 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
3843
3844 **Compatibility:** Firefox 78, Firefox ESR 78\
3845 **CCK2 Equivalent:** N/A\
3846 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3847
3848 #### Windows (GPO)
3849 ```
3850 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
3851 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
3852
3853 ```
3854 #### Windows (Intune)
3855 OMA-URI:
3856 ```
3857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
3858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
3859 ```
3860 Value (string):
3861 ```
3862 <enabled/> or <disabled/>
3863 ```
3864 #### macOS
3865 ```
3866 <dict>
3867 <key>PictureInPicture</key>
3868 <dict>
3869 <key>Enabled</key>
3870 <true/> | <false/>
3871 <key>Locked</key>
3872 <true/> | <false/>
3873 </dict>
3874 </dict>
3875 ```
3876 #### policies.json
3877 ```
3878 {
3879 "policies": {
3880 "PictureInPicture": {
3881 "Enabled": true | false,
3882 "Locked": true, false
3883 }
3884 }
3885 }
3886 ```
3887 ### PopupBlocking
3888 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3889
3890 `Allow` is a list of origins where popup-windows are allowed.
3891
3892 `Default` determines whether or not pop-up windows are allowed by default.
3893
3894 `Locked` prevents the user from changing pop-up preferences.
3895
3896 **Compatibility:** Firefox 60, Firefox ESR 60\
3897 **CCK2 Equivalent:** `permissions.popup`\
3898 **Preferences Affected:** `dom.disable_open_during_load`
3899
3900 #### Windows (GPO)
3901 ```
3902 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3903 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3904 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3905 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3906 ```
3907 #### Windows (Intune)
3908 OMA-URI:
3909 ```
3910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3911 ```
3912 Value (string):
3913 ```
3914 <enabled/>
3915 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3916 ```
3917 OMA-URI:
3918 ```
3919 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3920 ```
3921 Value (string):
3922 ```
3923 <enabled/> or <disabled/>
3924 ```
3925 OMA-URI:
3926 ```
3927 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3928 ```
3929 Value (string):
3930 ```
3931 <enabled/> or <disabled/>
3932 ```
3933 #### macOS
3934 ```
3935 <dict>
3936 <key>PopupBlocking</key>
3937 <dict>
3938 <key>Allow</key>
3939 <array>
3940 <string>http://example.org</string>
3941 <string>http://example.edu</string>
3942 </array>
3943 <key>Default</key>
3944 <true/> | <false/>
3945 <key>Locked</key>
3946 <true/> | <false/>
3947 </dict>
3948 </dict>
3949 ```
3950 #### policies.json
3951 ```
3952 {
3953 "policies": {
3954 "PopupBlocking": {
3955 "Allow": ["http://example.org/",
3956 "http://example.edu/"],
3957 "Default": true | false,
3958 "Locked": true | false
3959 }
3960 }
3961 }
3962 ```
3963 ### Preferences
3964 Set and lock preferences.
3965
3966 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
3967
3968 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
3969
3970 Preferences that start with the following prefixes are supported:
3971 ```
3972 accessibility.
3973 app.update.* (Firefox 86, Firefox 78.8)
3974 browser.
3975 datareporting.policy.
3976 dom.
3977 extensions.
3978 general.autoScroll (Firefox 83, Firefox ESR 78.5)
3979 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
3980 geo.
3981 intl.
3982 layout.
3983 media.
3984 network.
3985 pdfjs. (Firefox 84, Firefox ESR 78.6)
3986 places.
3987 print.
3988 signon. (Firefox 83, Firefox ESR 78.5)
3989 spellchecker. (Firefox 84, Firefox ESR 78.6)
3990 ui.
3991 widget.
3992 ```
3993 as well as the following security preferences:
3994 | Preference | Type | Default
3995 | --- | --- | ---
3996 | security.default_personal_cert | string | Ask Every Time
3997 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3998 | security.insecure_connection_text.enabled | bool | false
3999 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4000 | security.insecure_connection_text.pbmode.enabled | bool | false
4001 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4002 | security.insecure_field_warning.contextual.enabled | bool | true
4003 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4004 | security.mixed_content.block_active_content | boolean | true
4005 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4006 | security.osclientcerts.autoload | boolean | false
4007 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4008 | security.ssl.errorReporting.enabled | boolean | true
4009 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4010 | security.tls.hello_downgrade_check | boolean | true
4011 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4012 | security.tls.version.enable-deprecated | boolean | false
4013 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8)
4014 | security.warn_submit_secure_to_insecure | boolean | true
4015 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting s form from https to http.
4016 &nbsp;
4017
4018 Using the preference as the key, set the `Value` to the corresponding preference value.
4019
4020 `Status` can be "default", "locked", "user" or "clear"
4021
4022 Default preferences can be modified by the user.
4023
4024 If a value is locked, it is also set as the default.
4025
4026 User preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy.
4027
4028 User preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4029
4030 See the examples below for more detail.
4031
4032 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4033
4034 Status
4035 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4036 **CCK2 Equivalent:** `preferences`\
4037 **Preferences Affected:** Many
4038
4039 #### Windows (GPO)
4040 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4041 ```
4042 {
4043 "accessibility.force_disabled": {
4044 "Value": 1,
4045 "Status": "default"
4046 },
4047 "browser.cache.disk.parent_directory": {
4048 "Value": "SOME_NATIVE_PATH",
4049 "Status": "user"
4050 },
4051 "browser.tabs.warnOnClose": {
4052 "Value": false,
4053 "Status": "locked"
4054 }
4055 }
4056 ```
4057 #### Windows (Intune)
4058 OMA-URI:
4059 ```
4060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4061 ```
4062 Value (string):
4063 ```
4064 <enabled/>
4065 <data id="JSON" value='
4066 {
4067 "accessibility.force_disabled": {
4068 "Value": 1,
4069 "Status": "default"
4070 },
4071 "browser.cache.disk.parent_directory": {
4072 "Value": "SOME_NATIVE_PATH",
4073 "Status": "user"
4074 },
4075 "browser.tabs.warnOnClose": {
4076 "Value": false,
4077 "Status": "locked"
4078 }
4079 }'/>
4080 ```
4081 #### macOS
4082 ```
4083 <dict>
4084 <key>Preferences</key>
4085 <dict>
4086 <key>accessibility.force_disabled</key>
4087 <dict>
4088 <key>Value</key>
4089 <integer>1</integer>
4090 <key>Status</key>
4091 <string>default</string>
4092 </dict>
4093 <key>browser.cache.disk.parent_directory</key>
4094 <dict>
4095 <key>Value</key>
4096 <string>SOME_NATIVE_PATH</string>
4097 <key>Status</key>
4098 <string>user</string>
4099 </dict>
4100 <key>browser.tabs.warnOnClose</key>
4101 <dict>
4102 <key>Value</key>
4103 <false/>
4104 <key>Status</key>
4105 <string>locked</string>
4106 </dict>
4107 </dict>
4108 </dict>
4109 ```
4110 #### policies.json
4111 ```
4112 {
4113 "policies": {
4114 "Preferences": {
4115 "accessibility.force_disabled": {
4116 "Value": 1,
4117 "Status": "default"
4118 },
4119 "browser.cache.disk.parent_directory": {
4120 "Value": "SOME_NATIVE_PATH",
4121 "Status": "user"
4122 },
4123 "browser.tabs.warnOnClose": {
4124 "Value": false,
4125 "Status": "locked"
4126 }
4127 }
4128 }
4129 }
4130 ```
4131 ### Preferences (Deprecated)
4132 Set and lock certain preferences.
4133
4134 **Compatibility:** See below\
4135 **CCK2 Equivalent:** `preferences`\
4136 **Preferences Affected:** See below
4137
4138 | Preference | Type | Compatibility | Default
4139 | --- | --- | --- | ---
4140 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4141 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4142 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4143 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4144 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4145 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4146 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4147 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4148 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4149 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4150 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4151 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4152 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4153 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4154 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4155 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4156 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4157 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4158 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4159 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4160 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4161 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4162 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4163 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4164 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4165 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4166 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4167 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4168 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4169 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4170 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4171 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4172 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4173 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4174 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4175 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4176 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4177 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4178 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4179 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4180 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4181 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4182 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4183 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4184 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4185 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4186 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4187 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4188 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4189 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4190 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4191 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4192 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4193 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4194 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4195 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4196 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4197 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4198 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4199 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4200 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4201 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4202 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4203 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4204 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4205 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4206 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4207 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4208 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4209 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4210 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4211 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4212 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4213 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4214 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4215 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4216 disabled
4217 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4218 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4219 disabled
4220 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4221 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4222 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4223 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4224 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4225 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4226 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4227 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4228 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4229 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4230 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4231 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4232 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4233 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4234 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4235 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4236 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4237 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4238 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4239 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4240 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4241 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4242 #### Windows (GPO)
4243 ```
4244 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4245 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4246 ```
4247 #### Windows (Intune)
4248 OMA-URI: (periods are replaced by underscores)
4249 ```
4250 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4251 ```
4252 Value (string):
4253 ```
4254 <enabled/> or <disabled/>
4255 ```
4256 OMA-URI: (periods are replaced by underscores)
4257 ```
4258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4259 ```
4260 Value (string):
4261 ```
4262 <enabled/>
4263 <data id="Preferences_String" value="string_value"/>
4264 ```
4265 #### macOS
4266 ```
4267 <dict>
4268 <key>Preferences</key>
4269 <dict>
4270 <key>boolean_preference_name</key>
4271 <true/> | <false/>
4272 <key>string_preference_name</key>
4273 <string>string_value</string>
4274 </dict>
4275 </dict>
4276 ```
4277 #### policies.json
4278 ```
4279 {
4280 "policies": {
4281 "Preferences": {
4282 "boolean_preference_name": true | false,
4283 "string_preference_name": "string_value"
4284 }
4285 }
4286 }
4287 ```
4288 ### PromptForDownloadLocation
4289 Ask where to save each file before downloading.
4290
4291 **Compatibility:** Firefox 68, Firefox ESR 68\
4292 **CCK2 Equivalent:** N/A\
4293 **Preferences Affected:** `browser.download.useDownloadDir`
4294
4295 #### Windows (GPO)
4296 ```
4297 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4298 ```
4299 #### Windows (Intune)
4300 OMA-URI:
4301 ```
4302 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4303 ```
4304 Value (string):
4305 ```
4306 <enabled/> or <disabled/>
4307 ```
4308 #### macOS
4309 ```
4310 <dict>
4311 <key>PromptForDownloadLocation</key>
4312 <true/> | <false/>
4313 </dict>
4314 ```
4315 #### policies.json
4316 ```
4317 {
4318 "policies": {
4319 "PromptForDownloadLocation": true | false
4320 }
4321 }
4322 ```
4323 ### Proxy
4324 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4325 To specify ports, append them to the hostnames with a colon (:).
4326
4327 `Mode` is the proxy method being used.
4328
4329 `Locked` is whether or not proxy settings can be changed.
4330
4331 `HTTPProxy` is the HTTP proxy server.
4332
4333 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4334
4335 `SSLProxy` is the SSL proxy server.
4336
4337 `FTPProxy` is the FTP proxy server.
4338
4339 `SOCKSProxy` is the SOCKS proxy server
4340
4341 `SOCKSVersion` is the SOCKS version (4 or 5)
4342
4343 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4344
4345 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4346
4347 `AutoLogin` means do not prompt for authentication if password is saved.
4348
4349 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4350
4351 **Compatibility:** Firefox 60, Firefox ESR 60\
4352 **CCK2 Equivalent:** `networkProxy*`\
4353 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
4354
4355 #### Windows (GPO)
4356 ```
4357 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4358 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4359 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4360 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4361 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4362 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4363 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4364 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4365 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4366 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4367 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4368 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4369 ```
4370 #### Windows (Intune)
4371 OMA-URI:
4372 ```
4373 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4374 ```
4375 Value (string):
4376 ```
4377 <enabled/>
4378 <data id="ProxyLocked" value="true | false"/>
4379 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4380 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4381 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4382 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4383 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4384 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4385 <data id="SOCKSVersion" value="4 | 5"/>
4386 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4387 <data id="Passthrough" value="<local>"/>
4388 <data id="AutoLogin" value="true | false"/>
4389 <data id="UseProxyForDNS" value="true | false"/>
4390 ```
4391 #### macOS
4392 ```
4393 <dict>
4394 <key>Proxy</key>
4395 <dict>
4396 <key>Mode</key>
4397 <string>none | system | manual | autoDetect | autoConfig</string>
4398 <key>Locked</key>
4399 <true> | </false>
4400 <key>HTTPProxy</key>
4401 <string>https://httpproxy.example.com</string>
4402 <key>UseHTTPProxyForAllProtocols</key>
4403 <true> | </false>
4404 <key>SSLProxy</key>
4405 <string>https://sslproxy.example.com</string>
4406 <key>FTPProxy</key>
4407 <string>https://ftpproxy.example.com</string>
4408 <key>SOCKSProxy</key>
4409 <string>https://socksproxy.example.com</string>
4410 <key>SOCKSVersion</key>
4411 <string>4 | 5</string>
4412 <key>Passthrough</key>
4413 <string>&lt;local>&gt;</string>
4414 <key>AutoConfigURL</key>
4415 <string>URL_TO_AUTOCONFIG</string>
4416 <key>AutoLogin</key>
4417 <true> | </false>
4418 <key>UseProxyForDNS</key>
4419 <true> | </false>
4420 </dict>
4421 </dict>
4422 ```
4423 #### policies.json
4424 ```
4425 {
4426 "policies": {
4427 "Proxy": {
4428 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4429 "Locked": true | false,
4430 "HTTPProxy": "hostname",
4431 "UseHTTPProxyForAllProtocols": true | false,
4432 "SSLProxy": "hostname",
4433 "FTPProxy": "hostname",
4434 "SOCKSProxy": "hostname",
4435 "SOCKSVersion": 4 | 5
4436 "Passthrough": "<local>",
4437 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4438 "AutoLogin": true | false,
4439 "UseProxyForDNS": true | false
4440 }
4441 }
4442 }
4443 ```
4444 ### RequestedLocales
4445 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4446
4447 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4448
4449 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4450 **CCK2 Equivalent:** N/A\
4451 **Preferences Affected:** N/A
4452 #### Windows (GPO)
4453 ```
4454 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4455 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4456
4457 or
4458
4459 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4460 ```
4461 #### Windows (Intune)
4462 OMA-URI:
4463 ```
4464 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4465 ```
4466 Value (string):
4467 ```
4468 <enabled/>
4469 <data id="Preferences_String" value="de,en-US"/>
4470 ```
4471 #### macOS
4472 ```
4473 <dict>
4474 <key>RequestedLocales</key>
4475 <array>
4476 <string>de</string>
4477 <string>en-US</string>
4478 </array>
4479 </dict>
4480
4481 or
4482
4483 <dict>
4484 <key>RequestedLocales</key>
4485 <string>de,en-US</string>
4486 </dict>
4487
4488 ```
4489 #### policies.json
4490 ```
4491 {
4492 "policies": {
4493 "RequestedLocales": ["de", "en-US"]
4494 }
4495 }
4496
4497 or
4498
4499 {
4500 "policies": {
4501 "RequestedLocales": "de,en-US"
4502 }
4503 }
4504 ```
4505 <a name="SanitizeOnShutdown"></a>
4506
4507 ### SanitizeOnShutdown (Selective)
4508 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4509
4510 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4511
4512 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4513 **CCK2 Equivalent:** N/A\
4514 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4515 #### Windows (GPO)
4516 ```
4517 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4518 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4519 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4520 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4521 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4522 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4523 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4524 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4525 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4526 ```
4527 #### Windows (Intune)
4528 OMA-URI:
4529 ```
4530 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4531 ```
4532 Value (string):
4533 ```
4534 <enabled/> or <disabled/>
4535 ```
4536 OMA-URI:
4537 ```
4538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4539 ```
4540 Value (string):
4541 ```
4542 <enabled/> or <disabled/>
4543 ```
4544 OMA-URI:
4545 ```
4546 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4547 ```
4548 Value (string):
4549 ```
4550 <enabled/> or <disabled/>
4551 ```
4552 OMA-URI:
4553 ```
4554 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4555 ```
4556 Value (string):
4557 ```
4558 <enabled/> or <disabled/>
4559 ```
4560 OMA-URI:
4561 ```
4562 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4563 ```
4564 Value (string):
4565 ```
4566 <enabled/> or <disabled/>
4567 ```
4568 OMA-URI:
4569 ```
4570 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4571 ```
4572 Value (string):
4573 ```
4574 <enabled/> or <disabled/>
4575 ```
4576 OMA-URI:
4577 ```
4578 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4579 ```
4580 Value (string):
4581 ```
4582 <enabled/> or <disabled/>
4583 ```
4584 OMA-URI:
4585 ```
4586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4587 ```
4588 Value (string):
4589 ```
4590 <enabled/> or <disabled/>
4591 ```
4592 OMA-URI:
4593 ```
4594 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4595 ```
4596 Value (string):
4597 ```
4598 <enabled/> or <disabled/>
4599 ```
4600 #### macOS
4601 ```
4602 <dict>
4603 <key>SanitizeOnShutdown</key>
4604 <dict>
4605 <key>Cache</key>
4606 <true/> | <false/>
4607 <key>Cookies</key>
4608 <true/> | <false/>
4609 <key>Downloads</key>
4610 <true/> | <false/>
4611 <key>FormData</key>
4612 <true/> | <false/>
4613 <key>History</key>
4614 <true/> | <false/>
4615 <key>Sessions</key>
4616 <true/> | <false/>
4617 <key>SiteSettings</key>
4618 <true/> | <false/>
4619 <key>OfflineApps</key>
4620 <true/> | <false/>
4621 <key>Locked</key>
4622 <true/> | <false/>
4623 </dict>
4624 </dict>
4625 ```
4626 #### policies.json
4627 ```
4628 {
4629 "policies": {
4630 "SanitizeOnShutdown": {
4631 "Cache": true | false,
4632 "Cookies": true | false,
4633 "Downloads": true | false,
4634 "FormData": true | false,
4635 "History": true | false,
4636 "Sessions": true | false,
4637 "SiteSettings": true | false,
4638 "OfflineApps": true | false,
4639 "Locked": true | false
4640 }
4641 }
4642 }
4643 ```
4644 ### SanitizeOnShutdown (All)
4645 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4646
4647 **Compatibility:** Firefox 60, Firefox ESR 60\
4648 **CCK2 Equivalent:** N/A\
4649 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4650 #### Windows (GPO)
4651 ```
4652 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4653 ```
4654 #### Windows (Intune)
4655 OMA-URI:
4656 ```
4657 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4658 ```
4659 Value (string):
4660 ```
4661 <enabled/> or <disabled/>
4662 ```
4663 #### macOS
4664 ```
4665 <dict>
4666 <key>SanitizeOnShutdown</key>
4667 <true/> | <false/>
4668 </dict>
4669 ```
4670 #### policies.json
4671 ```
4672 {
4673 "policies": {
4674 "SanitizeOnShutdown": true | false
4675 }
4676 }
4677 ```
4678 ### SearchBar
4679 Set whether or not search bar is displayed.
4680
4681 **Compatibility:** Firefox 60, Firefox ESR 60\
4682 **CCK2 Equivalent:** `showSearchBar`\
4683 **Preferences Affected:** N/A
4684
4685 #### Windows (GPO)
4686 ```
4687 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4688 ```
4689
4690 #### Windows (Intune)
4691 OMA-URI:
4692 ```
4693 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4694 ```
4695 Value (string):
4696 ```
4697 <enabled/>
4698 <data id="Permissions" value="unified | separate"/>
4699 ```
4700 #### macOS
4701 ```
4702 <dict>
4703 <key>SearchBar</key>
4704 <string>unified | separate</string>
4705 </dict>
4706 ```
4707 #### policies.json
4708 ```
4709 {
4710 "policies": {
4711 "SearchBar": "unified" | "separate"
4712 }
4713 }
4714 ```
4715 <a name="SearchEngines"></a>
4716
4717 ### SearchEngines (This policy is only available on the ESR.)
4718
4719 ### SearchEngines | Default
4720
4721 Set the default search engine. This policy is only available on the ESR.
4722
4723 **Compatibility:** Firefox ESR 60\
4724 **CCK2 Equivalent:** `defaultSearchEngine`\
4725 **Preferences Affected:** N/A
4726
4727 #### Windows (GPO)
4728 ```
4729 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4730 ```
4731 #### Windows (Intune)
4732 OMA-URI:
4733 ```
4734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4735 ```
4736 Value (string):
4737 ```
4738 <enabled/>
4739 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4740 ```
4741 #### macOS
4742 ```
4743 <dict>
4744 <key>SearchEngines</key>
4745 <dict>
4746 <key>Default</key>
4747 <string>NAME_OF_SEARCH_ENGINE</string>
4748 </dict>
4749 </dict>
4750 ```
4751 #### policies.json
4752 ```
4753 {
4754 "policies": {
4755 "SearchEngines": {
4756 "Default": "NAME_OF_SEARCH_ENGINE"
4757 }
4758 }
4759 }
4760 ```
4761 ### SearchEngines | PreventInstalls
4762
4763 Prevent installing search engines from webpages.
4764
4765 **Compatibility:** Firefox ESR 60\
4766 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4767 **Preferences Affected:** N/A
4768
4769 #### Windows (GPO)
4770 ```
4771 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4772 ```
4773 #### Windows (Intune)
4774 OMA-URI:
4775 ```
4776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4777 ```
4778 Value (string):
4779 ```
4780 <enabled/> or <disabled/>
4781 ```
4782 #### macOS
4783 ```
4784 <dict>
4785 <key>SearchEngines</key>
4786 <dict>
4787 <key>PreventInstalls</key>
4788 <true/> | <false/>
4789 </dict>
4790 </dict>
4791 ```
4792 #### policies.json
4793 ```
4794 {
4795 "policies": {
4796 "SearchEngines": {
4797 "PreventInstalls": true | false
4798 }
4799 }
4800 }
4801 ```
4802 ### SearchEngines | Remove
4803
4804 Hide built-in search engines. This policy is only available on the ESR.
4805
4806 **Compatibility:** Firefox ESR 60.2\
4807 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4808 **Preferences Affected:** N/A
4809
4810 #### Windows (GPO)
4811 ```
4812 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4813 ```
4814 #### Windows (Intune)
4815 OMA-URI:
4816 ```
4817 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4818 ```
4819 Value (string):
4820 ```
4821 <enabled/>
4822 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4823 ```
4824 #### macOS
4825 ```
4826 <dict>
4827 <key>SearchEngines</key>
4828 <dict>
4829 <key>Remove</key>
4830 <array>
4831 <string>NAME_OF_SEARCH_ENGINE</string>
4832 </array>
4833 </dict>
4834 </dict>
4835 ```
4836 #### policies.json
4837 ```
4838 {
4839 "policies": {
4840 "SearchEngines": {
4841 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4842 }
4843 }
4844 }
4845 ```
4846 ### SearchEngines | Add
4847
4848 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4849
4850 `Name` is the name of the search engine.
4851
4852 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4853
4854 `Method` is either GET or POST
4855
4856 `IconURL` is a URL for the icon to use.
4857
4858 `Alias` is a keyword to use for the engine.
4859
4860 `Description` is a description of the search engine.
4861
4862 `PostData` is the POST data as name value pairs separated by &.
4863
4864 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4865
4866 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4867 **CCK2 Equivalent:** `searchplugins`\
4868 **Preferences Affected:** N/A
4869
4870 #### Windows (GPO)
4871 ```
4872 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4873 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4874 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4875 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4876 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4877 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4878 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4879 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4880 ```
4881 #### Windows (Intune)
4882 OMA-URI:
4883 ```
4884 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4885 ```
4886 Value (string):
4887 ```
4888 <enabled/>
4889 <data id="SearchEngine_Name" value="Example1"/>
4890 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4891 <data id="SearchEngine_Method" value="GET | POST"/>
4892 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4893 <data id="SearchEngine_Alias" value="example"/>
4894 <data id="SearchEngine_Description" value="Example Description"/>
4895 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4896 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4897 ```
4898 #### macOS
4899 ```
4900 <dict>
4901 <key>SearchEngines</key>
4902 <dict>
4903 <key>Add</key>
4904 <array>
4905 <dict>
4906 <key>Name</key>
4907 <string>Example1</string>
4908 <key>URLTemplate</key>
4909 <string>https://www.example.org/q={searchTerms}</string>
4910 <key>Method</key>
4911 <string>GET | POST </string>
4912 <key>IconURL</key>
4913 <string>https://www.example.org/favicon.ico</string>
4914 <key>Alias</key>
4915 <string>example</string>
4916 <key>Description</key>
4917 <string>Example Description</string>
4918 <key>SuggestURLTemplate</key>
4919 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4920 <key>PostData</key>
4921 <string>name=value&q={searchTerms}</string>
4922 </dict>
4923 <array>
4924 </dict>
4925 </dict>
4926 ```
4927 #### policies.json
4928 ```
4929 {
4930 "policies": {
4931 "SearchEngines": {
4932 "Add": [
4933 {
4934 "Name": "Example1",
4935 "URLTemplate": "https://www.example.org/q={searchTerms}",
4936 "Method": "GET" | "POST",
4937 "IconURL": "https://www.example.org/favicon.ico",
4938 "Alias": "example",
4939 "Description": "Description",
4940 "PostData": "name=value&q={searchTerms}",
4941 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4942 }
4943 ]
4944 }
4945 }
4946 }
4947 ```
4948 ### SearchSuggestEnabled
4949
4950 Enable search suggestions.
4951
4952 **Compatibility:** Firefox 68, Firefox ESR 68\
4953 **CCK2 Equivalent:** N/A\
4954 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4955
4956 #### Windows (GPO)
4957 ```
4958 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4959 ```
4960 #### Windows (Intune)
4961 OMA-URI:
4962 ```
4963 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
4964 ```
4965 Value (string):
4966 ```
4967 <enabled/> or <disabled/>
4968 ```
4969 #### macOS
4970 ```
4971 <dict>
4972 <key>SearchSuggestEnabled</key>
4973 <true/> | <false/>
4974 </dict>
4975 ```
4976 #### policies.json
4977 ```
4978 {
4979 "policies": {
4980 "SearchSuggestEnabled": true | false
4981 }
4982 }
4983 ```
4984 ### SecurityDevices
4985
4986 Install PKCS #11 modules.
4987
4988 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4989 **CCK2 Equivalent:** `certs.devices`\
4990 **Preferences Affected:** N/A
4991
4992 #### Windows (GPO)
4993 ```
4994 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4995 ```
4996 #### Windows (Intune)
4997 OMA-URI:
4998 ```
4999 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5000 ```
5001 Value (string):
5002 ```
5003 <enabled/>
5004 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5005 ```
5006 #### macOS
5007 ```
5008 <dict>
5009 <key>SecurityDevices</key>
5010 <dict>
5011 <key>NAME_OF_DEVICE</key>
5012 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5013 </dict>
5014 </dict>
5015 ```
5016
5017 #### policies.json
5018 ```
5019 {
5020 "policies": {
5021 "SecurityDevices": {
5022 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5023 }
5024 }
5025 }
5026 ```
5027 ### ShowHomeButton
5028 Show the home button on the toolbar.
5029
5030 Future versions of Firefox will not show the home button by default.
5031
5032 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5033 **CCK2 Equivalent:** N/A\
5034 **Preferences Affected:** N/A
5035
5036 #### Windows (GPO)
5037 ```
5038 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5039 ```
5040 #### Windows (Intune)
5041 OMA-URI:
5042 ```
5043 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ShowHomeButton
5044 ```
5045 Value (string):
5046 ```
5047 <enabled/> or <disabled/>
5048 ```
5049 #### macOS
5050 ```
5051 <dict>
5052 <key>ShowHomeButton</key>
5053 <true/> | <false/>
5054 </dict>
5055 ```
5056 #### policies.json
5057 ```
5058 {
5059 "policies": {
5060 "ShowHomeButton": true | false
5061 }
5062 }
5063 ```
5064 ### SSLVersionMax
5065
5066 Set and lock the maximum version of TLS.
5067
5068 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5069 **CCK2 Equivalent:** N/A\
5070 **Preferences Affected:** `security.tls.version.max`
5071
5072 #### Windows (GPO)
5073 ```
5074 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5075 ```
5076 #### Windows (Intune)
5077 OMA-URI:
5078 ```
5079 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5080 ```
5081 Value (string):
5082 ```
5083 <enabled/>
5084 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5085 ```
5086 #### macOS
5087 ```
5088 <dict>
5089 <key>SSLVersionMax</key>
5090 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5091 </dict>
5092 ```
5093
5094 #### policies.json
5095 ```
5096 {
5097 "policies": {
5098 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5099 }
5100 }
5101 ```
5102 ### SSLVersionMin
5103
5104 Set and lock the minimum version of TLS.
5105
5106 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5107 **CCK2 Equivalent:** N/A\
5108 **Preferences Affected:** `security.tls.version.min`
5109
5110 #### Windows (GPO)
5111 ```
5112 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5113 ```
5114 #### Windows (Intune)
5115 OMA-URI:
5116 ```
5117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5118 ```
5119 Value (string):
5120 ```
5121 <enabled/>
5122 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5123 ```
5124 #### macOS
5125 ```
5126 <dict>
5127 <key>SSLVersionMin</key>
5128 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5129 </dict>
5130 ```
5131
5132 #### policies.json
5133 ```
5134 {
5135 "policies": {
5136 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5137 }
5138 }
5139 ```
5140 ### SupportMenu
5141 Add a menuitem to the help menu for specifying support information.
5142
5143 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5144 **CCK2 Equivalent:** helpMenu\
5145 **Preferences Affected:** N/A
5146
5147 #### Windows (GPO)
5148 ```
5149 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5150 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5151 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5152 ```
5153 #### Windows (Intune)
5154 OMA-URI:
5155 ```
5156 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5157 ```
5158 Value (string):
5159 ```
5160 <enabled/>
5161 <data id="SupportMenuTitle" value="Support Menu"/>
5162 <data id="SupportMenuURL" value="http://example.com/support"/>
5163 <data id="SupportMenuAccessKey" value="S">
5164 ```
5165 #### macOS
5166 ```
5167 <dict>
5168 <key>SupportMenu</key>
5169 <dict>
5170 <key>Title</key>
5171 <string>SupportMenu</string>
5172 <key>URL</key>
5173 <string>http://example.com/support</string>
5174 <key>AccessKey</key>
5175 <string>S</string>
5176 </dict>
5177 </dict>
5178 ```
5179 #### policies.json
5180 ```
5181 {
5182 "policies": {
5183 "SupportMenu": {
5184 "Title": "Support Menu",
5185 "URL": "http://example.com/support",
5186 "AccessKey": "S"
5187 }
5188 }
5189 }
5190 ```
5191 ### UserMessaging
5192
5193 Prevent Firefox from messaging the user in certain situations.
5194
5195 `WhatsNew` Remove the "What's New" icon and menuitem.
5196
5197 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
5198
5199 `FeatureRecommendations` IF false, don't recommend browser features.
5200
5201 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
5202
5203 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
5204
5205 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5206 **CCK2 Equivalent:** N/A\
5207 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features,browser.aboutwelcome.enabled`
5208
5209 #### Windows (GPO)
5210 ```
5211 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5212 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5213 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5214 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5215 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
5216 ```
5217 #### Windows (Intune)
5218 OMA-URI:
5219 ```
5220 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
5221 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
5222 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
5223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
5224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_SkipOnboarding
5225 ```
5226 Value (string):
5227 ```
5228 <enabled/> or <disabled/>
5229 ```
5230 #### macOS
5231 ```
5232 <dict>
5233 <key>UserMessaging</key>
5234 <dict>
5235 <key>WhatsNew</key>
5236 <true/> | <false/>
5237 <key>ExtensionRecommendations</key>
5238 <true/> | <false/>
5239 <key>FeatureRecommendations</key>
5240 <true/> | <false/>
5241 <key>UrlbarInterventions</key>
5242 <true/> | <false/>
5243 <key>SkipOnboarding</key>
5244 <true/> | <false/>
5245 </dict>
5246 </dict>
5247 ```
5248 #### policies.json
5249 ```
5250 {
5251 "policies": {
5252 "UserMessaging": {
5253 "WhatsNew": true | false,
5254 "ExtensionRecommendations": true | false,
5255 "FeatureRecommendations": true | false,
5256 "UrlbarInterventions": true | false
5257 "SkipOnboarding": true | false
5258 }
5259 }
5260 }
5261 ```
5262 ### WebsiteFilter
5263 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5264 The arrays are limited to 1000 entries each.
5265
5266 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5267
5268 **Compatibility:** Firefox 60, Firefox ESR 60\
5269 **CCK2 Equivalent:** N/A\
5270 **Preferences Affected:** N/A
5271
5272 #### Windows (GPO)
5273 ```
5274 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5275 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5276 ```
5277 #### Windows (Intune)
5278 OMA-URI:
5279 ```
5280 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5281 ```
5282 Value (string):
5283 ```
5284 <enabled/>
5285 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
5286 ```
5287 OMA-URI:
5288 ```
5289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5290 ```
5291 Value (string):
5292 ```
5293 <enabled/>
5294 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5295 ```
5296 #### macOS
5297 ```
5298 <dict>
5299 <key>WebsiteFilter</key>
5300 <dict>
5301 <key>Block</key>
5302 <array>
5303 <string><all_urls></string>
5304 </array>
5305 <key>Exceptions</key>
5306 <array>
5307 <string>http://example.org/*</string>
5308 </array>
5309 </dict>
5310
5311 </dict>
5312 ```
5313 #### policies.json
5314 ```
5315 {
5316 "policies": {
5317 "WebsiteFilter": {
5318 "Block": ["<all_urls>"],
5319 "Exceptions": ["http://example.org/*"]
5320 }
5321 }
5322 }
5323 ```

patrick-canterino.de