]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #460 from drlellinger/patch-2
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar`](#displaymenubar)** | Set the initial state of the menubar.
42 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
43 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
44 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
45 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
46 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
47 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
48 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
49 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
50 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
51 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
52 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
53 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
54 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
55 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
56 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
57 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
58 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
59 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
60 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
61 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
62 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
63 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
64 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
65 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
66 | **[`Preferences`](#preferences)** | Set and lock some preferences.
67 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
68 | **[`Proxy`](#proxy)** | Configure proxy settings.
69 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
70 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
71 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
72 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
73 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
74 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
75 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
76 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
77 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
78 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
79 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
80 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
81 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
82 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
83 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
84
85 ### AppUpdateURL
86
87 Change the URL for application update.
88
89 **Compatibility:** Firefox 62, Firefox ESR 60.2\
90 **CCK2 Equivalent:** N/A\
91 **Preferences Affected:** `app.update.url`
92
93 #### Windows
94 ```
95 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
96 ```
97 #### macOS
98 ```
99 <dict>
100 <key>AppUpdateURL</key>
101 <string>https://yoursite.com</string>
102 </dict>
103 ```
104 #### JSON
105 ```
106 {
107 "policies": {
108 "AppUpdateURL": "https://yoursite.com"
109 }
110 }
111 ```
112 ### Authentication
113
114 Configure sites that support integrated authentication.
115
116 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
117
118 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2)\
119 **CCK2 Equivalent:** N/A\
120 **Preferences Affected:** `network.negotiate-auth.trusted-uris`, `network.negotiate-auth.delegation-uris`, `network.automatic-ntlm-auth.trusted-uris`, `network.automatic-ntlm-auth.allow-non-fqdn`, `network.negotiate-auth.allow-non-fqdn`
121
122 #### Windows
123 ```
124 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
125 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
126 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
127 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
128 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
131 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
132 ```
133 #### macOS
134 ```
135 <dict>
136 <key>Authentication</key>
137 <dict>
138 <key>SPNEGO</key>
139 <array>
140 <string>mydomain.com</string>
141 <string>https://myotherdomain.com</string>
142 </array>
143 <key>Delegated</key>
144 <array>
145 <string>mydomain.com</string>
146 <string>https://myotherdomain.com</string>
147 </array>
148 <key>NTLM</key>
149 <array>
150 <string>mydomain.com</string>
151 <string>https://myotherdomain.com</string>
152 </array>
153 <key>AllowNonFQDN</key>
154 <dict>
155 <key>SPNEGO</key>
156 <true/> | <false/>
157 <key>NTLM</key>
158 <true/> | <false/>
159 </dict>
160 </dict>
161 </dict>
162 ```
163 #### JSON
164 ```
165 {
166 "policies": {
167 "Authentication": {
168 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
169 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
170 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
171 "AllowNonFQDN": {
172 "SPNEGO": true | false,
173 "NTLM": true | false
174 }
175 }
176 }
177 }
178 ```
179 ### BlockAboutAddons
180
181 Block access to the Add-ons Manager (about:addons).
182
183 **Compatibility:** Firefox 60, Firefox ESR 60\
184 **CCK2 Equivalent:** `disableAddonsManager`\
185 **Preferences Affected:** N/A
186
187 #### Windows
188 ```
189 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
190 ```
191 #### macOS
192 ```
193 <dict>
194 <key>BlockAboutAddons</key>
195 <true/> | <false/>
196 </dict>
197 ```
198 #### JSON
199 ```
200 {
201 "policies": {
202 "BlockAboutAddons": true | false
203 }
204 }
205 ```
206 ### BlockAboutConfig
207
208 Block access to about:config.
209
210 **Compatibility:** Firefox 60, Firefox ESR 60\
211 **CCK2 Equivalent:** `disableAboutConfig`\
212 **Preferences Affected:** N/A
213
214 #### Windows
215 ```
216 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
217 ```
218 #### macOS
219 ```
220 <dict>
221 <key>BlockAboutConfig</key>
222 <true/> | <false/>
223 </dict>
224 ```
225 #### JSON
226 ```
227 {
228 "policies": {
229 "BlockAboutConfig": true | false
230 }
231 }
232 ```
233 ### BlockAboutProfiles
234
235 Block access to About Profiles (about:profiles).
236
237 **Compatibility:** Firefox 60, Firefox ESR 60\
238 **CCK2 Equivalent:** `disableAboutProfiles`\
239 **Preferences Affected:** N/A
240
241 #### Windows
242 ```
243 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
244 ```
245 #### macOS
246 ```
247 <dict>
248 <key>BlockAboutProfiles</key>
249 <true/> | <false/>
250 </dict>
251 ```
252 #### JSON
253 ```
254 {
255 "policies": {
256 "BlockAboutProfiles": true | false
257 }
258 }
259 ```
260 ### BlockAboutSupport
261
262 Block access to Troubleshooting Information (about:support).
263
264 **Compatibility:** Firefox 60, Firefox ESR 60\
265 **CCK2 Equivalent:** `disableAboutSupport`\
266 **Preferences Affected:** N/A
267
268 #### Windows
269 ```
270 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
271 ```
272 #### macOS
273 ```
274 <dict>
275 <key>BlockAboutSupport</key>
276 <true/> | <false/>
277 </dict>
278 ```
279 #### JSON
280 ```
281 {
282 "policies": {
283 "BlockAboutSupport": true | false
284 }
285 }
286 ```
287 ### Bookmarks
288
289 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
290
291 **Compatibility:** Firefox 60, Firefox ESR 60\
292 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
293 **Preferences Affected:** N/A
294
295 #### Windows
296 ```
297 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
298 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
299 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
300 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
301 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
302 ```
303 #### macOS
304 ```
305 <dict>
306 <key>Bookmarks</key>
307 <array>
308 <dict>
309 <key>Title</key>
310 <string>Example</string>
311 <key>URL</key>
312 <string>https://example.com</string>
313 <key>Favicon</key>
314 <string>https://example.com/favicon.ico</string>
315 <key>Placement</key>
316 <string>toolbar | menu</string>
317 <key>Folder</key>
318 <string>FolderName</string>
319 </dict>
320 </array>
321 </dict>
322 ```
323 #### JSON
324 ```
325 {
326 "policies": {
327 "Bookmarks": [
328 {
329 "Title": "Example",
330 "URL": "https://example.com",
331 "Favicon": "https://example.com/favicon.ico",
332 "Placement": "toolbar" | "menu",
333 "Folder": "FolderName"
334 }
335 ]
336 }
337 }
338 ```
339 ### CaptivePortal
340 Enable or disable the detection of captive portals.
341
342 **Compatibility:** Firefox 67, Firefox ESR 60.7\
343 **CCK2 Equivalent:** N/A\
344 **Preferences Affected:** `network.captive-portal-service.enabled`
345
346 #### Windows
347 ```
348 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
349 ```
350 #### macOS
351 ```
352 <dict>
353 <key>CaptivePortal</key>
354 <true/> | <false/>
355 </dict>
356 ```
357 #### JSON
358 ```
359 {
360 "policies": {
361 "CaptivePortal": true | false
362 }
363 }
364 ```
365 ### Certificates
366
367 ### Certificates | ImportEnterpriseRoots
368
369 Trust certificates that have been added to the operating system certificate store by a user or administrator.
370
371 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
372
373 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
374 **CCK2 Equivalent:** N/A\
375 **Preferences Affected:** `security.enterprise_roots.enabled`
376
377 #### Windows
378 ```
379 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
380 ```
381 #### macOS
382 ```
383 <dict>
384 <key>Certificates</key>
385 <dict>
386 <key>ImportEnterpriseRoots</key>
387 <true/> | <false/>
388 </dict>
389 </dict>
390 ```
391 #### JSON
392 ```
393 {
394 "policies": {
395 "Certificates": {
396 "ImportEnterpriseRoots": true | false
397 }
398 }
399 }
400 ```
401 ### Certificates | Install
402
403 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
404
405 - Windows
406 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
407 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
408 - macOS
409 - /Library/Application Support/Mozilla/Certificates
410 - ~/Library/Application Support/Mozilla/Certificates
411 - Linux
412 - /usr/lib/mozilla/certificates
413 - /usr/lib64/mozilla/certificates
414 - ~/.mozilla/certificates
415
416 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
417
418 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
419
420 Certificates are installed using the trust string `CT,CT,`.
421
422 Binary (DER) and ASCII (PEM) certificates are both supported.
423
424 **Compatibility:** Firefox 64, Firefox ESR 64\
425 **CCK2 Equivalent:** `certs.ca`\
426 **Preferences Affected:** N/A
427
428 #### Windows
429 ```
430 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
431 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
432 ```
433 #### macOS
434 ```
435 <dict>
436 <key>Certificates</key>
437 <dict>
438 <key>Install</key>
439 <array>
440 <string>cert1.der</string>
441 <string>/Users/username/cert2.pem</string>
442 </array>
443 </dict>
444 </dict>
445 ```
446 #### JSON
447 ```
448 {
449 "policies": {
450 "Certificates": {
451 "Install": ["cert1.der", "/home/username/cert2.pem"]
452 }
453 }
454 }
455 ```
456 ### Cookies
457 Configure cookie preferences.
458
459 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
460
461 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
462
463 `Default` determines whether cookies are accepted at all.
464
465 `AcceptThirdParty` determines how third-party cookies are handled.
466
467 `ExpireAtSessionEnd` determines when cookies expire.
468
469 `RejectTracker` only rejects cookies for trackers.
470
471 `Locked` prevents the user from changing cookie preferences.
472
473 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
474 **CCK2 Equivalent:** N/A\
475 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
476
477 #### Windows
478 ```
479 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
480 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
481 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
482 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
483 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
484 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
485 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
486 ```
487 #### macOS
488 ```
489 <dict>
490 <key>Cookies</key>
491 <dict>
492 <key>Allow</key>
493 <array>
494 <string>http://example.com</string>
495 </array>
496 <key>Block</key>
497 <array>
498 <string>http://example.org</string>
499 </array>
500 <key>Default</key>
501 <true/> | <false/>
502 <key>AcceptThirdParty</key>
503 <string>always | never | from-visited</string>
504 <key>ExpireAtSessionEnd</key>
505 <true/> | <false/>
506 <key>RejectTracker</key>
507 <true/> | <false/>
508 <key>Locked</key>
509 <true/> | <false/>
510 </dict>
511 </dict>
512 ```
513 #### JSON
514 ```
515 {
516 "policies": {
517 "Cookies": {
518 "Allow": ["http://example.org/"],
519 "Block": ["http://example.edu/"],
520 "Default": true | false,
521 "AcceptThirdParty": "always" | "never" | "from-visited"],
522 "ExpireAtSessionEnd": true | false,
523 "RejectTracker": true | false,
524 "Locked": true | false
525 }
526 }
527 }
528 ```
529 ### DisableSetDesktopBackground
530 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
531
532 **Compatibility:** Firefox 60, Firefox ESR 60\
533 **CCK2 Equivalent:** `removeSetDesktopBackground`\
534 **Preferences Affected:** N/A
535
536 #### Windows
537 ```
538 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
539 ```
540
541 #### macOS
542 ```
543 <dict>
544 <key>DisableSetDesktopBackground</key>
545 <true/> | <false/>
546 </dict>
547 ```
548 #### JSON
549 ```
550 {
551 "policies": {
552 "DisableSetDesktopBackground": true | false
553 }
554 }
555 ```
556 ### DisableMasterPasswordCreation
557 Remove the master password functionality.
558
559 **Compatibility:** Firefox 60, Firefox ESR 60\
560 **CCK2 Equivalent:** `noMasterPassword`\
561 **Preferences Affected:** N/A
562
563 #### Windows
564 ```
565 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
566 ```
567
568 #### macOS
569 ```
570 <dict>
571 <key>DisableMasterPasswordCreation</key>
572 <true/> | <false/>
573 </dict>
574 ```
575 #### JSON
576 ```
577 {
578 "policies": {
579 "DisableMasterPasswordCreation": true | false
580 }
581 }
582 ```
583 ### DisableAppUpdate
584 Turn off application updates.
585
586 **Compatibility:** Firefox 60, Firefox ESR 60\
587 **CCK2 Equivalent:** `disableFirefoxUpdates`\
588 **Preferences Affected:** N/A
589
590 #### Windows
591 ```
592 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
593 ```
594 #### macOS
595 ```
596 <dict>
597 <key>DisableAppUpdate</key>
598 <true/> | <false/>
599 </dict>
600 ```
601 #### JSON
602 ```
603 {
604 "policies": {
605 "DisableAppUpdate": true | false
606 }
607 }
608 ```
609 ### DisableBuiltinPDFViewer
610 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
611
612 **Compatibility:** Firefox 60, Firefox ESR 60\
613 **CCK2 Equivalent:** `disablePDFjs`\
614 **Preferences Affected:** `pdfjs.disabled`
615
616 #### Windows
617 ```
618 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
619 ```
620
621 #### macOS
622 ```
623 <dict>
624 <key>DisableBuiltinPDFViewer</key>
625 <true/> | <false/>
626 </dict>
627 ```
628 #### JSON
629 ```
630 {
631 "policies": {
632 "DisableBuiltinPDFViewer": true | false
633 }
634 }
635 ```
636 ### DisableDeveloperTools
637 Remove access to all developer tools.
638
639 **Compatibility:** Firefox 60, Firefox ESR 60\
640 **CCK2 Equivalent:** `removeDeveloperTools`\
641 **Preferences Affected:** `devtools.policy.disabled`
642
643 #### Windows
644 ```
645 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
646 ```
647
648 #### macOS
649 ```
650 <dict>
651 <key>DisableDeveloperTools</key>
652 <true/> | <false/>
653 </dict>
654 ```
655 #### JSON
656 ```
657 {
658 "policies": {
659 "DisableDeveloperTools": true | false
660 }
661 }
662 ```
663 ### DisableFeedbackCommands
664 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
665
666 **Compatibility:** Firefox 60, Firefox ESR 60\
667 **CCK2 Equivalent:** N/A\
668 **Preferences Affected:** N/A
669
670 #### Windows
671 ```
672 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
673 ```
674 #### macOS
675 ```
676 <dict>
677 <key>DisableFeedbackCommands</key>
678 <true/> | <false/>
679 </dict>
680 ```
681 #### JSON
682 ```
683 {
684 "policies": {
685 "DisableFeedbackCommands": true | false
686 }
687 }
688 ```
689 ### DisableFirefoxScreenshots
690 Remove access to Firefox Screenshots.
691
692 **Compatibility:** Firefox 60, Firefox ESR 60\
693 **CCK2 Equivalent:** N/A\
694 **Preferences Affected:** `extensions.screenshots.disabled`
695
696 #### Windows
697 ```
698 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
699 ```
700 #### macOS
701 ```
702 <dict>
703 <key>DisableFirefoxScreenshots</key>
704 <true/> | <false/>
705 </dict>
706 ```
707 #### JSON
708 ```
709 {
710 "policies": {
711 "DisableFirefoxScreenshots": true | false
712 }
713 }
714 ```
715 ### DisableFirefoxAccounts
716 Disable Firefox Accounts integration (Sync).
717
718 **Compatibility:** Firefox 60, Firefox ESR 60\
719 **CCK2 Equivalent:** `disableSync`\
720 **Preferences Affected:** `identity.fxaccounts.enabled`
721
722 #### Windows
723 ```
724 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
725 ```
726 #### macOS
727 ```
728 <dict>
729 <key>DisableFirefoxAccounts</key>
730 <true/> | <false/>
731 </dict>
732 ```
733 #### JSON
734 ```
735 {
736 "policies": {
737 "DisableFirefoxAccounts": true | false
738 }
739 }
740 ```
741 ### DisableFirefoxStudies
742 Disable Firefox studies (Shield).
743
744 **Compatibility:** Firefox 60, Firefox ESR 60\
745 **CCK2 Equivalent:** `disableForget`\
746 **Preferences Affected:** N/A
747
748 #### Windows
749 ```
750 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
751 ```
752 #### macOS
753 ```
754 <dict>
755 <key>DisableFirefoxStudies</key>
756 <true/> | <false/>
757 </dict>
758 ```
759 #### JSON
760 ```
761 {
762 "policies": {
763 "DisableFirefoxStudies": true | false
764 }
765 }
766 ```
767 ### DisableForgetButton
768 Disable the "Forget" button.
769
770 **Compatibility:** Firefox 60, Firefox ESR 60\
771 **CCK2 Equivalent:** `disableForget`\
772 **Preferences Affected:** N/A
773
774 #### Windows
775 ```
776 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
777 ```
778 #### macOS
779 ```
780 <dict>
781 <key>DisableForgetButton</key>
782 <true/> | <false/>
783 </dict>
784 ```
785 #### JSON
786 ```
787 {
788 "policies": {
789 "DisableForgetButton": true | false
790 }
791 }
792 ```
793 ### DisableFormHistory
794 Turn off saving information on web forms and the search bar.
795
796 **Compatibility:** Firefox 60, Firefox ESR 60\
797 **CCK2 Equivalent:** `disableFormFill`\
798 **Preferences Affected:** ` browser.formfill.enable`
799
800 #### Windows
801 ```
802 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
803 ```
804 #### macOS
805 ```
806 <dict>
807 <key>DisableFormHistory</key>
808 <true/> | <false/>
809 </dict>
810 ```
811 #### JSON
812 ```
813 {
814 "policies": {
815 "DisableFormHistory": true | false
816 }
817 }
818 ```
819 ### DisablePocket
820 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
821
822 **Compatibility:** Firefox 60, Firefox ESR 60\
823 **CCK2 Equivalent:** `disablePocket`\
824 **Preferences Affected:** `extensions.pocket.enabled`
825
826 #### Windows
827 ```
828 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
829 ```
830 #### macOS
831 ```
832 <dict>
833 <key>DisablePocket</key>
834 <true/> | <false/>
835 </dict>
836 ```
837 #### JSON
838 ```
839 {
840 "policies": {
841 "DisablePocket": true | false
842 }
843 }
844 ```
845 ### DisablePrivateBrowsing
846 Remove access to private browsing.
847
848 **Compatibility:** Firefox 60, Firefox ESR 60\
849 **CCK2 Equivalent:** `disablePrivateBrowsing`\
850 **Preferences Affected:** N/A
851
852 #### Windows
853 ```
854 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
855 ```
856 #### macOS
857 ```
858 <dict>
859 <key>DisablePrivateBrowsing</key>
860 <true/> | <false/>
861 </dict>
862 ```
863 #### JSON
864 ```
865 {
866 "policies": {
867 "DisablePrivateBrowsing": true | false
868 }
869 }
870 ```
871 ### DisableProfileImport
872 Disables the "Import data from another browser" option in the bookmarks window.
873
874 **Compatibility:** Firefox 60, Firefox ESR 60\
875 **CCK2 Equivalent:** N/A\
876 **Preferences Affected:** N/A
877
878 #### Windows
879 ```
880 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
881 ```
882 #### macOS
883 ```
884 <dict>
885 <key>DisableProfileImport</key>
886 <true/> | <false/>
887 </dict>
888 ```
889 #### JSON
890 ```
891 {
892 "policies": {
893 "DisableProfileImport": true | false
894 }
895 }
896 ```
897 ### DisableProfileRefresh
898 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
899
900 **Compatibility:** Firefox 60, Firefox ESR 60\
901 **CCK2 Equivalent:** `disableResetFirefox`\
902 **Preferences Affected:** `browser.disableResetPrompt`
903
904 #### Windows
905 ```
906 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
907 ```
908 #### macOS
909 ```
910 <dict>
911 <key>DisableProfileRefresh</key>
912 <true/> | <false/>
913 </dict>
914 ```
915 #### JSON
916 ```
917 {
918 "policies": {
919 "DisableProfileRefresh": true | false
920 }
921 }
922 ```
923 ### DisableSafeMode
924 Disable safe mode within the browser.
925
926 On Windows, this disables safe mode via the command line as well.
927
928 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
929 **CCK2 Equivalent:** `disableSafeMode`\
930 **Preferences Affected:** N/A
931
932 #### Windows
933 ```
934 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
935 ```
936 #### macOS
937 ```
938 <dict>
939 <key>DisableSafeMode</key>
940 <true/> | <false/>
941 </dict>
942 ```
943 #### JSON
944 ```
945 {
946 "policies": {
947 "DisableSafeMode": true | false
948 }
949 }
950 ```
951 ### DisableSecurityBypass
952 Prevent the user from bypassing security in certain cases.
953
954 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
955
956 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
957
958 **Compatibility:** Firefox 60, Firefox ESR 60\
959 **CCK2 Equivalent:** N/A\
960 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
961
962 #### Windows
963 ```
964 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
965 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
966 ```
967 #### macOS
968 ```
969 <dict>
970 <key>DisableSecurityBypass</key>
971 <dict>
972 <key>InvalidCertificate</key>
973 <true/> | <false/>
974 <key><SafeBrowsing/key>
975 <true/> | <false/>
976 </dict>
977 </dict>
978 ```
979 #### JSON
980 ```
981 {
982 "policies": {
983 "DisableSecurityBypass": {
984 "InvalidCertificate": true false,
985 "SafeBrowsing": true false
986 }
987 }
988 }
989 ```
990 ### DisableSystemAddonUpdate
991 Prevent system add-ons from being installed or update.
992
993 **Compatibility:** Firefox 60, Firefox ESR 60\
994 **CCK2 Equivalent:** N/A\
995 **Preferences Affected:** N/A
996
997 #### Windows
998 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
999 ```
1000 #### macOS
1001 ```
1002 <dict>
1003 <key>DisableSystemAddonUpdate</key>
1004 <true/> | <false/>
1005 </dict>
1006 ```
1007 #### JSON
1008 ```
1009 {
1010 "policies": {
1011 "DisableSystemAddonUpdate": true | false
1012 }
1013 }
1014 ```
1015 ### DisableTelemetry
1016 Prevent the upload of telemetry data.
1017
1018 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1019
1020 **Compatibility:** Firefox 60, Firefox ESR 60\
1021 **CCK2 Equivalent:** `disableTelemetry`\
1022 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1023
1024 #### Windows
1025 ```
1026 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1027 ```
1028 #### macOS
1029 ```
1030 <dict>
1031 <key>DisableTelemetry</key>
1032 <true/> | <false/>
1033 </dict>
1034 ```
1035 #### JSON
1036 ```
1037 {
1038 "policies": {
1039 "DisableTelemetry": true | false
1040 }
1041 }
1042 ```
1043 ### DisplayBookmarksToolbar
1044 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1045
1046 **Compatibility:** Firefox 60, Firefox ESR 60\
1047 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1048 **Preferences Affected:** N/A
1049
1050 #### Windows
1051 ```
1052 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1053 ```
1054 #### macOS
1055 ```
1056 <dict>
1057 <key>DisplayBookmarksToolbar</key>
1058 <true/> | <false/>
1059 </dict>
1060 ```
1061 #### JSON
1062 ```
1063 {
1064 "policies": {
1065 "DisplayBookmarksToolbar": true | false
1066 }
1067 }
1068 ```
1069 ### DisplayMenuBar
1070 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1071
1072 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1073 **CCK2 Equivalent:** `displayMenuBar`\
1074 **Preferences Affected:** N/A
1075
1076 #### Windows
1077 ```
1078 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1079 ```
1080 #### macOS
1081 ```
1082 <dict>
1083 <key>DisplayMenuBar</key>
1084 <true/> | <false/>
1085 </dict>
1086 ```
1087 #### JSON
1088 ```
1089 {
1090 "policies": {
1091 "DisplayMenuBar": true | false
1092 }
1093 }
1094 ```
1095 ### DNSOverHTTPS
1096 Configure DNS over HTTPS.
1097
1098 `Enabled` determines whether DNS over HTTPS is enabled
1099
1100 `ProviderURL` is a URL to another provider.
1101
1102 `Locked` prevents the user from changing DNS over HTTPS preferences.
1103
1104 **Compatibility:** Firefox 63, Firefox ESR 68\
1105 **CCK2 Equivalent:** N/A\
1106 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1107
1108 #### Windows
1109 ```
1110 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1111 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1112 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1113 ```
1114 #### macOS
1115 ```
1116 <dict>
1117 <key>DNSOverHTTPS</key>
1118 <dict>
1119 <key>Enabled</key>
1120 <true/> | <false/>
1121 <key>ProviderURL</key>
1122 <string>URL_TO_ALTERNATE_PROVIDER</string>
1123 <key>Locked</key>
1124 <true/> | <false/>
1125 </dict>
1126 </dict>
1127 ```
1128 #### JSON
1129 ```
1130 {
1131 "policies": {
1132 "DNSOverHTTPS": {
1133 "Enabled": true | false,
1134 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1135 "Locked": true | false
1136 }
1137 }
1138 }
1139 ```
1140 ### DontCheckDefaultBrowser
1141 Don't check if Firefox is the default browser at startup.
1142
1143 **Compatibility:** Firefox 60, Firefox ESR 60\
1144 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1145 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1146
1147 #### Windows
1148 ```
1149 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1150 ```
1151 #### macOS
1152 ```
1153 <dict>
1154 <key>DontCheckDefaultBrowser</key>
1155 <true/> | <false/>
1156 </dict>
1157 ```
1158 #### JSON
1159 ```
1160 {
1161 "policies": {
1162 "DontCheckDefaultBrowser": true | false
1163 }
1164 }
1165 ```
1166 ### DefaultDownloadDirectory
1167 Set the default download directory.
1168
1169 You can use ${home} for the native home directory.
1170
1171 **Compatibility:** Firefox 68, Firefox ESR 68\
1172 **CCK2 Equivalent:** N/A\
1173 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1174
1175 #### Windows
1176 ```
1177 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1178 ```
1179 #### macOS
1180 ```
1181 <dict>
1182 <key>DefaultDownloadDirectory</key>
1183 <string>${home}/Downloads</string>
1184 </dict>
1185 ```
1186 #### JSON (macOS and Linux)
1187 ```
1188 {
1189 "policies": {
1190 "DefaultDownloadDirectory": "${home}/Downloads"
1191 }
1192 ```
1193 #### JSON (Windows)
1194 ```
1195 {
1196 "policies": {
1197 "DefaultDownloadDirectory": "${home}\\Downloads"
1198 }
1199 ```
1200 ### DownloadDirectory
1201 Set and lock the download directory.
1202
1203 You can use ${home} for the native home directory.
1204
1205 **Compatibility:** Firefox 68, Firefox ESR 68\
1206 **CCK2 Equivalent:** N/A\
1207 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1208
1209 #### Windows
1210 ```
1211 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1212 ```
1213 #### macOS
1214 ```
1215 <dict>
1216 <key>DownloadDirectory</key>
1217 <string>${home}/Downloads</string>
1218 </dict>
1219 ```
1220 #### JSON (macOS and Linux)
1221 ```
1222 {
1223 "policies": {
1224 "DownloadDirectory": "${home}/Downloads"
1225 }
1226 ```
1227 #### JSON (Windows)
1228 ```
1229 {
1230 "policies": {
1231 "DownloadDirectory": "${home}\\Downloads"
1232 }
1233 ```
1234 ### EnableTrackingProtection
1235 Configure tracking protection.
1236
1237 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1238
1239 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1240
1241 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1242
1243 **Compatibility:** Firefox 60, Firefox ESR 60\
1244 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1245 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`
1246
1247 #### Windows
1248 ```
1249 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1250 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1251 ```
1252 #### macOS
1253 ```
1254 <dict>
1255 <key>EnableTrackingProtection</key>
1256 <dict>
1257 <key>Value</key>
1258 <true/> | <false/>
1259
1260 <key><Locked/key>
1261 <true/> | <false/>
1262 </dict>
1263 </dict>
1264 ```
1265 #### JSON
1266 ```
1267 {
1268 "policies": {
1269 "EnableTrackingProtection": {
1270 "Value": [true, false],
1271 "Locked": [true, false]
1272 }
1273 }
1274 ```
1275 ### EnterprisePoliciesEnabled
1276 Enable policy support on macOS.
1277
1278 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1279 **CCK2 Equivalent:** N/A\
1280 **Preferences Affected:** N/A
1281
1282 #### macOS
1283 ```
1284 <dict>
1285 <key>EnterprisePoliciesEnabled</key>
1286 <true/>
1287 </dict>
1288 ```
1289 ### Extensions
1290 Control the installation, uninstallation and locking of extensions.
1291
1292 `Install` is a list of URLs or native paths for extensions to be installed.
1293
1294 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1295
1296 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1297
1298 **Compatibility:** Firefox 60, Firefox ESR 60\
1299 **CCK2 Equivalent:** `addons`\
1300 **Preferences Affected:** N/A
1301
1302 #### Windows
1303 ```
1304 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1305 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1306 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1307 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1308 ```
1309 #### macOS
1310 ```
1311 <dict>
1312 <key>Extensions</key>
1313 <dict>
1314 <key>Install</key>
1315 <array>
1316 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1317 <string>//path/to/xpi</string>
1318 </array>
1319 <key>Uninstall</key>
1320 <array>
1321 <string>bad_addon_id@mozilla.org</string>
1322 </array>
1323 <key>Locked</key>
1324 <array>
1325 <string>addon_id@mozilla.org</string>
1326 </array>
1327 </dict>
1328 </dict>
1329 ```
1330 #### JSON
1331
1332
1333 ```
1334 {
1335 "policies": {
1336 "Extensions": {
1337 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1338 "Uninstall": ["bad_addon_id@mozilla.org"],
1339 "Locked": ["addon_id@mozilla.org"]
1340 }
1341 }
1342 }
1343 ```
1344 ### ExtensionSettings
1345 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1346
1347 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1348
1349 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1350
1351 The configuration for each extension is another dictionary that can contain the fields documented below.
1352
1353 | Name | Description |
1354 | --- | --- |
1355 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1356 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1357 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1358 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1359 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1360 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1361 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1362 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1363 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1364
1365 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1366 **CCK2 Equivalent:** N/A\
1367 **Preferences Affected:** N/A
1368
1369 #### Windows
1370 ```
1371 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) = '{"*": {"installation_mode": "blocked"}}'
1372 ```
1373 #### macOS
1374 ```
1375 <dict>
1376 <key>ExtensionSettings</key>
1377 <dict>
1378 <key>*</key>
1379 <dict>
1380 <key>blocked_install_message</key>
1381 <string>Custom error message.</string>
1382 <key>install_sources</key>
1383 <array>
1384 <string>https://addons.mozilla.org/</string>
1385 </array>
1386 <key>installation_mode</key>
1387 <string>blocked</string>
1388 </dict>
1389 <key>uBlock0@raymondhill.net</key>
1390 <dict>
1391 <key>installation_mode</key>
1392 <string>force_installed</string>
1393 <key>install_url</key>
1394 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1395 </dict>
1396 </dict>
1397 </dict>
1398 ```
1399 #### JSON
1400 ```
1401 {
1402 "policies": {
1403 "ExtensionSettings": {
1404 "*": {
1405 "blocked_install_message": "Custom error message.",
1406 "install_sources": ["https://addons.mozilla.org/"],
1407 "installation_mode": "blocked"
1408 },
1409 "uBlock0@raymondhill.net": {
1410 "installation_mode": "force_installed",
1411 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1412 }
1413 }
1414 }
1415 }
1416 ```
1417 ### ExtensionUpdate
1418 Control extension updates.
1419
1420 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1421 **CCK2 Equivalent:** N/A\
1422 **Preferences Affected:** `extensions.update.enabled`
1423
1424 #### Windows
1425 ```
1426 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1427 ```
1428 #### macOS
1429 ```
1430 <dict>
1431 <key>ExtensionUpdate</key>
1432 <true/> | <false/>
1433 </dict>
1434 ```
1435 #### JSON
1436 ```
1437 {
1438 "policies": {
1439 "ExtensionUpdate": true | false
1440 }
1441 }
1442 ```
1443 ### FlashPlugin
1444 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1445
1446 `Allow` is a list of origins where Flash are allowed.
1447
1448 `Block` is a list of origins where Flash is not allowed.
1449
1450 `Default` determines whether or not Flash is allowed by default.
1451
1452 `Locked` prevents the user from changing Flash preferences.
1453
1454 **Compatibility:** Firefox 60, Firefox ESR 60\
1455 **CCK2 Equivalent:** `permissions.plugin`\
1456 **Preferences Affected:** `plugin.state.flash`
1457
1458 #### Windows
1459 ```
1460 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1461 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1462 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1463 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1464 ```
1465 #### macOS
1466 ```
1467 <dict>
1468 <key>FlashPlugin</key>
1469 <dict>
1470 <key>Allow</key>
1471 <array>
1472 <string>http://example.org</string>
1473 </array>
1474 <key>Block</key>
1475 <array>
1476 <string>http://example.edu</string>
1477 </array>
1478 <key>Default</key>
1479 <true/> | <false/>
1480 <key>Locked</key>
1481 <true/> | <false/>
1482 </dict>
1483 </dict>
1484 ```
1485 #### JSON
1486 ```
1487 {
1488 "policies": {
1489 "FlashPlugin": {
1490 "Allow": ["http://example.org/"],
1491 "Block": ["http://example.edu/"],
1492 "Default": true | false,
1493 "Locked": true | false
1494 }
1495 }
1496 }
1497 ```
1498 ### FirefoxHome
1499 Customize the Firefox Home page.
1500
1501 **Compatibility:** Firefox 68, Firefox ESR 68\
1502 **CCK2 Equivalent:** N/A\
1503 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1504
1505 #### Windows
1506 ```
1507 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1508 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1509 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1510 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1511 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1512 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1513 ```
1514 #### macOS
1515 ```
1516 <dict>
1517 <key>FirefoxHome</key>
1518 <dict>
1519 <key>Search</key>
1520 <true/> | <false/>
1521 <key>TopSites</key>
1522 <true/> | <false/>
1523 <key>Highlights</key>
1524 <true/> | <false/>
1525 <key>Pocket</key>
1526 <true/> | <false/>
1527 <key>Snippets</key>
1528 <true/> | <false/>
1529 <key>Locked</key>
1530 <true/> | <false/>
1531 </dict>
1532 </dict>
1533 ```
1534 #### JSON
1535 ```
1536 {
1537 "policies": {
1538 "FirefoxHome": {
1539 "Search": true | false,
1540 "TopSites": true | false,
1541 "Highlights": true | false,
1542 "Pocket": true | false,
1543 "Snippets": true | false,
1544 "Locked": true | false
1545 }
1546 }
1547 }
1548 ```
1549 ### HardwareAcceleration
1550 Control hardware acceleration.
1551
1552 **Compatibility:** Firefox 60, Firefox ESR 60\
1553 **CCK2 Equivalent:** N/A\
1554 **Preferences Affected:** `layers.acceleration.disabled`
1555
1556 #### Windows
1557 ```
1558 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1559 ```
1560 #### macOS
1561 ```
1562 <dict>
1563 <key>HardwareAcceleration</key>
1564 <true/> | <false/>
1565 </dict>
1566 ```
1567 #### JSON
1568 ```
1569 {
1570 "policies": {
1571 "HardwareAcceleration": true | false
1572 }
1573 }
1574 ```
1575 ### Homepage
1576 Configure the default homepage and how Firefox starts.
1577
1578 `URL` is the default homepage.
1579
1580 `Locked` prevents the user from changing homepage preferences.
1581
1582 `Additional` allows for more than one homepage.
1583
1584 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1585
1586 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1587 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1588 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1589
1590 #### Windows
1591 ```
1592 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1593 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1594 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1595 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1596 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1597 ```
1598 #### macOS
1599 ```
1600 <dict>
1601 <key>Homepage</key>
1602 <dict>
1603 <key>URL</key>
1604 <string>http://example.com</string>
1605 <key>Locked</key>
1606 <true/> | <false/>
1607 <key>Additional</key>
1608 <array>
1609 <string>http://example.org</string>
1610 <string>http://example.edu</string>
1611 </array>
1612 <key>StartPage</key>
1613 <string>always | never | from-visited</string>
1614 </dict>
1615 </dict>
1616 ```
1617 #### JSON
1618 ```
1619 {
1620 "policies": {
1621 "Homepage": {
1622 "URL": "http://example.com/",
1623 "Locked": true | false,
1624 "Additional": ["http://example.org/",
1625 "http://example.edu/"],
1626 "StartPage": "none" | "homepage" | "previous-session"
1627 }
1628 }
1629 }
1630 ```
1631 ### InstallAddonsPermission
1632 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1633
1634 `Allow` is a list of origins where extension installs are allowed.
1635
1636 `Default` determines whether or not extension installs are allowed by default.
1637
1638 **Compatibility:** Firefox 60, Firefox ESR 60\
1639 **CCK2 Equivalent:** `permissions.install`\
1640 **Preferences Affected:** `xpinstall.enabled`
1641
1642 #### Windows
1643 ```
1644 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1645 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1646 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1647 ```
1648 #### macOS
1649 ```
1650 <dict>
1651 <key>InstallAddonsPermission</key>
1652 <dict>
1653 <key>Allow</key>
1654 <array>
1655 <string>http://example.org</string>
1656 <string>http://example.edu</string>
1657 </array>
1658 <key>Default</key>
1659 <true/> | <false/>
1660 </dict>
1661 </dict>
1662 ```
1663 #### JSON
1664 ```
1665 {
1666 "policies": {
1667 "InstallAddonsPermission": {
1668 "Allow": ["http://example.org/",
1669 "http://example.edu/"],
1670 "Default": true | false
1671 }
1672 }
1673 }
1674 ```
1675 ### LegacyProfiles
1676 Disable the feature enforcing a separate profile for each installation.
1677
1678 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1679
1680 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1681
1682 This policy only work on Windows via GPO (not policies.json).
1683
1684 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1685 **CCK2 Equivalent:** N/A\
1686 **Preferences Affected:** N/A
1687
1688 #### Windows
1689 ```
1690 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1691 ```
1692 ### LocalFileLinks
1693 Enable linking to local files by origin.
1694
1695 **Compatibility:** Firefox 68, Firefox ESR 68\
1696 **CCK2 Equivalent:** N/A\
1697 **Preferences Affected:** `capability.policy.localfilelinks.*`
1698
1699 #### Windows
1700 ```
1701 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1702 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1703 ```
1704 #### macOS
1705 ```
1706 <dict>
1707 <key>LocalFileLinks</key>
1708 <array>
1709 <string>http://example.org</string>
1710 <string>http://example.edu</string>
1711 </array>
1712 </dict>
1713 ```
1714 #### JSON
1715 ```
1716 {
1717 "policies": {
1718 "LocalFileLinks": ["http://example.org/",
1719 "http://example.edu/"]
1720 }
1721 }
1722 ```
1723 ### NoDefaultBookmarks
1724 Disable the creation of default bookmarks.
1725
1726 This policy is only effective if the user profile has not been created yet.
1727
1728 **Compatibility:** Firefox 60, Firefox ESR 60\
1729 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1730 **Preferences Affected:** N/A
1731
1732 #### Windows
1733 ```
1734 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1735 ```
1736 #### macOS
1737 ```
1738 <dict>
1739 <key>NoDefaultBookmarks</key>
1740 <true/> | <false/>
1741 </dict>
1742 ```
1743 #### JSON
1744 ```
1745 {
1746 "policies": {
1747 "NoDefaultBookmarks": true | false
1748 }
1749 }
1750 ```
1751 ### NetworkPrediction
1752 Enable or disable network prediction (DNS prefetching).
1753
1754 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1755 **CCK2 Equivalent:** N/A\
1756 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1757
1758 #### Windows
1759 ```
1760 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1761 ```
1762 #### macOS
1763 ```
1764 <dict>
1765 <key>NetworkPrediction</key>
1766 <true/> | <false/>
1767 </dict>
1768 ```
1769 #### JSON
1770 ```
1771 {
1772 "policies": {
1773 "NetworkPrediction": true | false
1774 }
1775 ```
1776 ### NewTabPage
1777 Enable or disable the New Tab page.
1778
1779 **Compatibility:** Firefox 68, Firefox ESR 68\
1780 **CCK2 Equivalent:** N/A\
1781 **Preferences Affected:** `browser.newtabpage.enabled`
1782
1783 #### Windows
1784 ```
1785 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1786 ```
1787 #### macOS
1788 ```
1789 <dict>
1790 <key>NewTabPage</key>
1791 <true/> | <false/>
1792 </dict>
1793 ```
1794 #### JSON
1795 ```
1796 {
1797 "policies": {
1798 "NewTabPage": true | false
1799 }
1800 ```
1801 ### OfferToSaveLogins
1802 Control whether or not Firefox offers to save passwords.
1803
1804 **Compatibility:** Firefox 60, Firefox ESR 60\
1805 **CCK2 Equivalent:** `dontRememberPasswords`\
1806 **Preferences Affected:** `signon.rememberSignons`
1807
1808 #### Windows
1809 ```
1810 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1811 ```
1812 #### macOS
1813 ```
1814 <dict>
1815 <key>OfferToSaveLogins</key>
1816 <true/> | <false/>
1817 </dict>
1818 ```
1819 #### JSON
1820 ```
1821 {
1822 "policies": {
1823 "OfferToSaveLogins": true | false
1824 }
1825 }
1826 ```
1827 ### OverrideFirstRunPage
1828 Override the first run page. If the value is blank, no first run page is displayed.
1829
1830 **Compatibility:** Firefox 60, Firefox ESR 60\
1831 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1832 **Preferences Affected:** `startup.homepage_welcome_url`
1833
1834 #### Windows
1835 ```
1836 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1837 ```
1838 #### macOS
1839 ```
1840 <dict>
1841 <key>OverrideFirstRunPage</key>
1842 <string>http://example.org</string>
1843 </dict>
1844 ```
1845 #### JSON
1846 ```
1847 {
1848 "policies": {
1849 "OverrideFirstRunPage": "http://example.org"
1850 }
1851 ```
1852 ### OverridePostUpdatePage
1853 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1854
1855 **Compatibility:** Firefox 60, Firefox ESR 60\
1856 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1857 **Preferences Affected:** `startup.homepage_override_url`
1858
1859 #### Windows
1860 ```
1861 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
1862 ```
1863 #### macOS
1864 ```
1865 <dict>
1866 <key>OverridePostUpdatePage</key>
1867 <string>http://example.org</string>
1868 </dict>
1869 ```
1870 #### JSON
1871 ```
1872 {
1873 "policies": {
1874 "OverridePostUpdatePage": "http://example.org"
1875 }
1876 ```
1877 ### Permissions
1878 Set permissions associated with camera, microphone, location, and notifications
1879
1880 `Allow` is a list of origins where the feature is allowed.
1881
1882 `Block` is a list of origins where the feature is not allowed.
1883
1884 `BlockNewRequests` determines whether or not new requests can be made for the feature.
1885
1886 `Locked` prevents the user from changing preferences for the feature.
1887
1888 **Compatibility:** Firefox 62, Firefox ESR 60.2\
1889 **CCK2 Equivalent:** N/A\
1890 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
1891
1892 #### Windows
1893 ```
1894 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
1895 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
1896 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
1897 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
1898 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
1899 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
1900 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
1901 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
1902 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
1903 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
1904 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
1905 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
1906 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
1907 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
1908 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
1909 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
1910 ```
1911 #### macOS
1912 ```
1913 <dict>
1914 <key>Permissions</key>
1915 <dict>
1916 <key>Camera</key>
1917 <dict>
1918 <key>Allow</key>
1919 <array>
1920 <string>https://example.org</string>
1921 </array>
1922 <key>Block</key>
1923 <array>
1924 <string>https://example.edu</string>
1925 </array>
1926 <key>BlockNewRequests</key>
1927 <true/>
1928 <key>Locked</key>
1929 <true/>
1930 </dict>
1931 <key>Microphone</key>
1932 <dict>
1933 <key>Allow</key>
1934 <array>
1935 <string>https://example.org</string>
1936 </array>
1937 <key>Block</key>
1938 <array>
1939 <string>https://example.edu</string>
1940 </array>
1941 <key>BlockNewRequests</key>
1942 <true/>
1943 <key>Locked</key>
1944 <true/>
1945 </dict>
1946 <key>Location</key>
1947 <dict>
1948 <key>Allow</key>
1949 <array>
1950 <string>https://example.org</string>
1951 </array>
1952 <key>Block</key>
1953 <array>
1954 <string>https://example.edu</string>
1955 </array>
1956 <key>BlockNewRequests</key>
1957 <true/>
1958 <key>Locked</key>
1959 <true/>
1960 </dict>
1961 <key>Notifications</key>
1962 <dict>
1963 <key>Allow</key>
1964 <array>
1965 <string>https://example.org</string>
1966 </array>
1967 <key>Block</key>
1968 <array>
1969 <string>https://example.edu</string>
1970 </array>
1971 <key>BlockNewRequests</key>
1972 <true/>
1973 <key>Locked</key>
1974 <true/>
1975 </dict>
1976 </dict>
1977 </dict>
1978 ```
1979 #### JSON
1980 ```
1981 {
1982 "policies": {
1983 "Permissions": {
1984 "Camera": {
1985 "Allow": ["https://example.org"],
1986 "Block": ["https://example.edu"],
1987 "BlockNewRequests": true | false,
1988 "Locked": true | false
1989 },
1990 "Microphone": {
1991 "Allow": ["https://example.org"],
1992 "Block": ["https://example.edu"],
1993 "BlockNewRequests": true | false,
1994 "Locked": true | false
1995 },
1996 "Location": {
1997 "Allow": ["https://example.org"],
1998 "Block": ["https://example.edu"],
1999 "BlockNewRequests": true | false,
2000 "Locked": true | false
2001 },
2002 "Notifications": {
2003 "Allow": ["https://example.org"],
2004 "Block": ["https://example.edu"],
2005 "BlockNewRequests": true | false,
2006 "Locked": true | false
2007 }
2008 }
2009 }
2010 }
2011 ```
2012 ### PopupBlocking
2013 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2014
2015 `Allow` is a list of origins where popup-windows are allowed.
2016
2017 `Default` determines whether or not pop-up windows are allowed by default.
2018
2019 `Locked` prevents the user from changing pop-up preferences.
2020
2021 **Compatibility:** Firefox 60, Firefox ESR 60\
2022 **CCK2 Equivalent:** `permissions.popup`\
2023 **Preferences Affected:** `dom.disable_open_during_load`
2024
2025 #### Windows
2026 ```
2027 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2028 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2029 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2030 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2031 ```
2032 #### macOS
2033 ```
2034 <dict>
2035 <key>PopupBlocking</key>
2036 <dict>
2037 <key>Allow</key>
2038 <array>
2039 <string>http://example.org</string>
2040 <string>http://example.edu</string>
2041 </array>
2042 <key>Default</key>
2043 <true/> | <false/>
2044 <key>Locked</key>
2045 <true/> | <false/>
2046 </dict>
2047 </dict>
2048 ```
2049 #### JSON
2050 ```
2051 {
2052 "policies": {
2053 "PopupBlocking": {
2054 "Allow": ["http://example.org/",
2055 "http://example.edu/"],
2056 "Default": true | false,
2057 "Locked": true | false
2058 }
2059 }
2060 }
2061 ```
2062 ### Preferences
2063 Set and lock certain preferences.
2064
2065 **Compatibility:** See below\
2066 **CCK2 Equivalent:** `preferences`\
2067 **Preferences Affected:** See below
2068
2069 | Preference | Type | Compatibility | Default
2070 | --- | --- | --- | ---
2071 | app.update.auto | boolean | Firefox 68, Firefox 68 ESR | true
2072 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2073 | browser.cache.disk.enable | boolean | Firefox 68, Firefox 68 ESR | true
2074 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2075 | browser.cache.disk.parent_directory | string | Firefox 68, Firefox 68 ESR | Profile temporary directory
2076 | &nbsp;&nbsp;&nbsp;&nbsp;If set, changes the location of the disk cache.
2077 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox 68 ESR | false
2078 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2079 | browser.search.update | boolean | Firefox 68, Firefox 68 ESR | true
2080 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2081 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox 68 ESR | true
2082 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2083 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox 68 ESR | true
2084 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2085 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox 68 ESR | true
2086 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2087 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox 68 ESR | true
2088 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2089 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox 68 ESR | false
2090 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2091 | dom.disable_window_flip | boolean | Firefox 68, Firefox 68 ESR | true
2092 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2093 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox 68 ESR | false
2094 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2095 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox 68 ESR | true
2096 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2097 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox 68 ESR | N/A
2098 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2099 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox 68 ESR | N/A
2100 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2101 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox 68 ESR | N/A
2102 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2103 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox 68 ESR | true
2104 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2105 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox 68 ESR | true
2106 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2107 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox 68 ESR | false
2108 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2109 | network.IDN_show_punycode | boolean | Firefox 68, Firefox 68 ESR | false
2110 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2111 | places.history.enabled | boolean | Firefox 68, Firefox 68 ESR | true
2112 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2113 | security.default_personal_cert | string | Firefox 68, Firefox 68 ESR | Ask Every Time
2114 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2115 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox 68 ESR | true
2116 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2117 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox 68 ESR | true
2118 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2119 #### Windows
2120 ```
2121 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2122 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2123 ```
2124 #### macOS
2125 ```
2126 <dict>
2127 <key>Preferences</key>
2128 <dict>
2129 <key>boolean_preference_name</key>
2130 <true/> | <false/>
2131 <key>string_preference_name</key>
2132 <string>string_value</string>
2133 </dict>
2134 </dict>
2135 ```
2136 #### JSON
2137 ```
2138 {
2139 "policies": {
2140 "Preferences": {
2141 "boolean_preference_name": true | false,
2142 "string_preference_name": "string_value"
2143 }
2144 }
2145 }
2146 ```
2147 ### PromptForDownloadLocation
2148 Ask where to save each file before downloading.
2149
2150 **Compatibility:** Firefox 68, Firefox ESR 68\
2151 **CCK2 Equivalent:** N/A
2152 **Preferences Affected:** `browser.download.useDownloadDir`
2153
2154 #### Windows
2155 ```
2156 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2157 ```
2158 #### macOS
2159 ```
2160 <dict>
2161 <key>PromptForDownloadLocation</key>
2162 <true/> | <false/>
2163 </dict>
2164 ```
2165 #### JSON
2166 ```
2167 {
2168 "policies": {
2169 "PromptForDownloadLocation": true | false
2170 }
2171 }
2172 ```
2173 ### Proxy
2174 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2175 To specify ports, append them to the hostnames with a colon (:).
2176
2177 `Mode` is the proxy method being used.
2178
2179 `Locked` is whether or not proxy settings can be changed.
2180
2181 `HTTPProxy` is the HTTP proxy server.
2182
2183 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2184
2185 `SSLProxy` is the SSL proxy server.
2186
2187 `FTPProxy` is the FTP proxy server.
2188
2189 `SOCKSProxy` is the SOCKS proxy server
2190
2191 `SOCKSVersion` is the SOCKS version (4 or 5)
2192
2193 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2194
2195 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2196
2197 `AutoLogin` means do not prompt for authentication if password is saved.
2198
2199 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2200
2201 **Compatibility:** Firefox 60, Firefox ESR 60\
2202 **CCK2 Equivalent:** `networkProxy*`\
2203 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2204
2205 #### Windows
2206 ```
2207 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2208 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2209 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2210 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2211 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2212 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2213 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2214 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2215 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2216 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2217 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2218 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2219 ```
2220 #### macOS
2221 ```
2222 <dict>
2223 <key>Proxy</key>
2224 <dict>
2225 <key>Mode</key>
2226 <string>none | system | manual | autoDetect| autoConfig</string>
2227 <key>Locked</key>
2228 <true> | </false>
2229 <key>HTTPProxy</key>
2230 <string>https://httpproxy.example.com</string>
2231 <key>UseHTTPProxyForAllProtocols</key>
2232 <true> | </false>
2233 <key>SSLProxy</key>
2234 <string>https://sslproxy.example.com</string>
2235 <key>FTPProxy</key>
2236 <string>https://ftpproxy.example.com</string>
2237 <key>SOCKSProxy</key>
2238 <string>https://socksproxy.example.com</string>
2239 <key>SOCKSVersion</key>
2240 <string>4 | 5</string>
2241 <key>Passthrough</key>
2242 <string>&lt;local>&gt;</string>
2243 <key>AutoConfigURL</key>
2244 <string>URL_TO_AUTOCONFIG</string>
2245 <key>AutoLogin</key>
2246 <true> | </false>
2247 <key>UseProxyForDNS</key>
2248 <true> | </false>
2249 </dict>
2250 </dict>
2251 ```
2252 #### JSON
2253 ```
2254 {
2255 "policies": {
2256 "Proxy": {
2257 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2258 "Locked": [true, false],
2259 "HTTPProxy": "hostname",
2260 "UseHTTPProxyForAllProtocols": [true, false],
2261 "SSLProxy": "hostname",
2262 "FTPProxy": "hostname",
2263 "SOCKSProxy": "hostname",
2264 "SOCKSVersion": 4 | 5
2265 "Passthrough": "<local>",
2266 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2267 "AutoLogin": [true, false],
2268 "UseProxyForDNS": [true, false]
2269 }
2270 }
2271 }
2272 ```
2273 ### RequestedLocales
2274 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2275
2276 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2277
2278 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2279 **CCK2 Equivalent:** N/A\
2280 **Preferences Affected:** N/A
2281 #### Windows
2282 ```
2283 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2284 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2285
2286 or
2287
2288 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2289 ```
2290 #### macOS
2291 ```
2292 <dict>
2293 <key>RequestedLocales</key>
2294 <array>
2295 <string>de</string>
2296 <string>en-US</string>
2297 </array>
2298 </dict>
2299
2300 or
2301
2302 <dict>
2303 <key>RequestedLocales</key>
2304 <string>de,en-US</string>
2305 </dict>
2306
2307 ```
2308 #### JSON
2309 ```
2310 {
2311 "policies": {
2312 "RequestedLocales": ["de", "en-US"]
2313 }
2314 }
2315
2316 or
2317
2318 {
2319 "policies": {
2320 "RequestedLocales": "de,en-US"
2321 }
2322 }
2323 ```
2324 ### SanitizeOnShutdown (Selective)
2325 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2326
2327 **Compatibility:** Firefox 68, Firefox ESR 68\
2328 **CCK2 Equivalent:** N/A\
2329 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2330 #### Windows
2331 ```
2332 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2333 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2334 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2335 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2336 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2337 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2338 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2339 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2340 ```
2341 #### macOS
2342 ```
2343 <dict>
2344 <key>SanitizeOnShutdown</key>
2345 <dict>
2346 <key>Cache</key>
2347 <true/> | <false/>
2348 <key>Cookies</key>
2349 <true/> | <false/>
2350 <key>Downloads</key>
2351 <true/> | <false/>
2352 <key>FormData</key>
2353 <true/> | <false/>
2354 <key>History</key>
2355 <true/> | <false/>
2356 <key>Sessions</key>
2357 <true/> | <false/>
2358 <key>SiteSettings</key>
2359 <true/> | <false/>
2360 <key>OfflineApps</key>
2361 <true/> | <false/>
2362 </dict>
2363 </dict>
2364 ```
2365 #### JSON
2366 ```
2367 {
2368 "policies": {
2369 "SanitizeOnShutdown": {
2370 "Cache": true | false,
2371 "Cookies": true | false,
2372 "Downloads": true | false,
2373 "FormData": true | false,
2374 "History": true | false,
2375 "Sessions": true | false,
2376 "SiteSettings": true | false,
2377 "OfflineApps": true | false
2378 }
2379 }
2380 }
2381 ```
2382 ### SanitizeOnShutdown (All)
2383 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2384
2385 **Compatibility:** Firefox 60, Firefox ESR 60\
2386 **CCK2 Equivalent:** N/A\
2387 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2388 #### Windows
2389 ```
2390 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2391 ```
2392 #### macOS
2393 ```
2394 <dict>
2395 <key>SanitizeOnShutdown</key>
2396 <true/> | <false/>
2397 </dict>
2398 ```
2399 #### JSON
2400 ```
2401 {
2402 "policies": {
2403 "SanitizeOnShutdown": true | false
2404 }
2405 }
2406 ```
2407 ### SearchBar
2408 Set whether or not search bar is displayed.
2409
2410 **Compatibility:** Firefox 60, Firefox ESR 60\
2411 **CCK2 Equivalent:** `showSearchBar`\
2412 **Preferences Affected:** N/A
2413
2414 #### Windows
2415 ```
2416 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2417 ```
2418 #### macOS
2419 ```
2420 <dict>
2421 <key>SearchBar</key>
2422 <string>unified | separate</string>
2423 </dict>
2424 ```
2425
2426 #### JSON
2427 ```
2428 {
2429 "policies": {
2430 "SearchBar": "unified" | "separate"
2431 }
2432 }
2433 ```
2434
2435
2436
2437
2438
2439 ### SearchEngines (This policy is only available on the ESR.)
2440
2441 ### SearchEngines | Default
2442
2443 Set the default search engine. This policy is only available on the ESR.
2444
2445 **Compatibility:** Firefox ESR 60\
2446 **CCK2 Equivalent:** `defaultSearchEngine`\
2447 **Preferences Affected:** N/A
2448
2449 #### Windows
2450 ```
2451 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2452 ```
2453 #### macOS
2454 ```
2455 <dict>
2456 <key>SearchEngines</key>
2457 <dict>
2458 <key>Default</key>
2459 <string>NAME_OF_SEARCH_ENGINE</string>
2460 </dict>
2461 </dict>
2462 ```
2463 #### JSON
2464 ```
2465 {
2466 "policies": {
2467 "SearchEngines": {
2468 "Default": "NAME_OF_SEARCH_ENGINE"
2469 }
2470 }
2471 }
2472 ```
2473 ### SearchEngines | PreventInstalls
2474
2475 Prevent installing search engines from webpages.
2476
2477 **Compatibility:** Firefox ESR 60\
2478 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2479 **Preferences Affected:** N/A
2480
2481 #### Windows
2482 ```
2483 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2484 ```
2485 #### macOS
2486 ```
2487 <dict>
2488 <key>SearchEngines</key>
2489 <dict>
2490 <key>PreventInstalls</key>
2491 <true/> | <false/>
2492 </dict>
2493 </dict>
2494 ```
2495 #### JSON
2496 ```
2497 {
2498 "policies": {
2499 "SearchEngines": {
2500 "PreventInstalls": true | false
2501 }
2502 }
2503 }
2504 ```
2505 ### SearchEngines | Remove
2506
2507 Hide built-in search engines. This policy is only available on the ESR.
2508
2509 **Compatibility:** Firefox ESR 60.2\
2510 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2511 **Preferences Affected:** N/A
2512
2513 #### Windows
2514 ```
2515 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2516 ```
2517 #### macOS
2518 ```
2519 <dict>
2520 <key>SearchEngines</key>
2521 <dict>
2522 <key>Remove</key>
2523 <array>
2524 <string>NAME_OF_SEARCH_ENGINE</string>
2525 </array>
2526 </dict>
2527 </dict>
2528 ```
2529 #### JSON
2530 ```
2531 {
2532 "policies": {
2533 "SearchEngines": {
2534 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2535 }
2536 }
2537 }
2538 ```
2539 ### SearchEngines | Add
2540
2541 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2542
2543 `Name` is the name of the search engine.
2544
2545 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2546
2547 `Method` is either GET or POST
2548
2549 `IconURL` is a URL for the icon to use.
2550
2551 `Alias` is a keyword to use for the engine.
2552
2553 `Description` is a description of the search engine.
2554
2555 `PostData` is the POST data as name value pairs separated by &.
2556
2557 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2558
2559 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2560 **CCK2 Equivalent:** `searchplugins`\
2561 **Preferences Affected:** N/A
2562
2563 #### Windows
2564 ```
2565 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2566 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2567 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2568 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2569 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2570 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2571 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2572 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2573 ```
2574
2575 #### macOS
2576 ```
2577 <dict>
2578 <key>SearchEngines</key>
2579 <dict>
2580 <key>Add</key>
2581 <array>
2582 <dict>
2583 <key>Name</key>
2584 <string>Example1</string>
2585 <key>URLTemplate</key>
2586 <string>https://www.example.org/q={searchTerms}</string>
2587 <key>Method</key>
2588 <string>GET | POST </string>
2589 <key>IconURL</key>
2590 <string>https://www.example.org/favicon.ico</string>
2591 <key>Alias</key>
2592 <string>example</string>
2593 <key>Description</key>
2594 <string>Example Description</string>
2595 <key>SuggestURLTemplate</key>
2596 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2597 <key>PostData</key>
2598 <string>name=value&q={searchTerms}</string>
2599 </dict>
2600 <array>
2601 </dict>
2602 </dict>
2603 ```
2604 #### JSON
2605 ```
2606 {
2607 "policies": {
2608 "SearchEngines": {
2609 "Add": [
2610 {
2611 "Name": "Example1",
2612 "URLTemplate": "https://www.example.org/q={searchTerms}",
2613 "Method": "GET" | "POST",
2614 "IconURL": "https://www.example.org/favicon.ico",
2615 "Alias": "example",
2616 "Description": "Description",
2617 "PostData": "name=value&q={searchTerms}",
2618 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2619 }
2620 ]
2621 }
2622 }
2623 }
2624 ```
2625 ### SearchSuggestEnabled
2626
2627 Enable search suggestions.
2628
2629 **Compatibility:** Firefox 68, Firefox ESR 68\
2630 **CCK2 Equivalent:** N/A\
2631 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2632
2633 #### Windows
2634 ```
2635 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2636 ```
2637 #### macOS
2638 ```
2639 <dict>
2640 <key>SearchSuggestEnabled</key>
2641 <true/> | <false/>
2642 </dict>
2643 ```
2644 #### JSON
2645 ```
2646 {
2647 "policies": {
2648 "SearchSuggestEnabled": true | false
2649 }
2650 }
2651 ```
2652 ### SecurityDevices
2653
2654 Install PKCS #11 modules.
2655
2656 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2657 **CCK2 Equivalent:** `certs.devices`\
2658 **Preferences Affected:** N/A
2659
2660 #### Windows
2661 ```
2662 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2663 ```
2664 #### macOS
2665 ```
2666 <dict>
2667 <key>SecurityDevices</key>
2668 <dict>
2669 <key>NAME_OF_DEVICE</key>
2670 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2671 </dict>
2672 </dict>
2673 ```
2674
2675 #### JSON
2676 ```
2677 {
2678 "policies": {
2679 "SecurityDevices": {
2680 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2681 }
2682 }
2683 }
2684 ```
2685 ### SSLVersionMax
2686
2687 Set and lock the maximum version of TLS.
2688
2689 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2690 **CCK2 Equivalent:** N/A\
2691 **Preferences Affected:** `security.tls.version.max`
2692
2693 #### Windows
2694 ```
2695 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2696 ```
2697 #### macOS
2698 ```
2699 <dict>
2700 <key>SSLVersionMax</key>
2701 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2702 </dict>
2703 ```
2704
2705 #### JSON
2706 ```
2707 {
2708 "policies": {
2709 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2710 }
2711 }
2712 ```
2713 ### SSLVersionMin
2714
2715 Set and lock the minimum version of TLS.
2716
2717 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2718 **CCK2 Equivalent:** N/A\
2719 **Preferences Affected:** `security.tls.version.min`
2720
2721 #### Windows
2722 ```
2723 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2724 ```
2725 #### macOS
2726 ```
2727 <dict>
2728 <key>SSLVersionMin</key>
2729 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2730 </dict>
2731 ```
2732
2733 #### JSON
2734 ```
2735 {
2736 "policies": {
2737 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2738 }
2739 }
2740 ```
2741 ### SupportMenu
2742 Add a menuitem to the help menu for specifying support information.
2743
2744 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2745 **CCK2 Equivalent:** helpMenu\
2746 **Preferences Affected:** N/A
2747
2748 #### Windows
2749 ```
2750 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2751 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2752 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
2753 ```
2754 #### macOS
2755 ```
2756 <dict>
2757 <key>SupportMenu</key>
2758 <dict>
2759 <key>Title</key>
2760 <string>SupportMenu</string>
2761 <key>URL</key>
2762 <string>http://example.com/support</string>
2763 <key>AccessKey</key>
2764 <string>S</string>
2765 </dict>
2766 </dict>
2767 ```
2768 #### JSON
2769 ```
2770 {
2771 "policies": {
2772 "SupportMenu": {
2773 "Title": "Support Menu",
2774 "URL": "http://example.com/support",
2775 "AccessKey": "S"
2776 }
2777 }
2778 }
2779 ```
2780 ### WebsiteFilter
2781 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2782
2783 **Compatibility:** Firefox 60, Firefox ESR 60\
2784 **CCK2 Equivalent:** N/A\
2785 **Preferences Affected:** N/A
2786
2787 #### Windows
2788 ```
2789 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
2790 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
2791 ```
2792 #### macOS
2793 ```
2794 <dict>
2795 <key>WebsiteFilter</key>
2796 <dict>
2797 <key>Block</key>
2798 <array>
2799 <string><all_urls></string>
2800 </array>
2801 <key>Exceptions</key>
2802 <array>
2803 <string>http://example.org/*</string>
2804 </array>
2805 </dict>
2806
2807 </dict>
2808 ```
2809 #### JSON
2810 ```
2811 {
2812 "policies": {
2813 "WebsiteFilter": {
2814 "Block": ["<all_urls>"],
2815 "Exceptions": ["http://example.org/*"]
2816 }
2817 }
2818 }
2819 ```

patrick-canterino.de