]> git.p6c8.net - policy-templates.git/blob - README.md
Add Linux disclaimer for ImportEnterpriseRoots
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`MasterPassword`](#masterpassword)** | Require or prevent using a master password.
66 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
67 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
68 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
69 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
70 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
71 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
72 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
73 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
74 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
75 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
76 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
77 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
78 | **[`Preferences`](#preferences)** | Set and lock some preferences.
79 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
80 | **[`Proxy`](#proxy)** | Configure proxy settings.
81 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
82 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
83 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
84 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
85 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
86 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
87 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
88 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
91 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
92 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
93 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
94 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
95 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
96 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
97
98 ### AppAutoUpdate
99
100 Enable or disable **automatic** application update.
101
102 If set to true, application updates are installed without user approval.
103
104 If set to false, application updates are downloaded but the user can choose when to install the update.
105
106 If you have disabled updates via DisableAppUpdate, this policy has no effect.
107
108 **Compatibility:** Firefox 75, Firefox ESR 68.7\
109 **CCK2 Equivalent:** N/A\
110 **Preferences Affected:** app.update.auto
111
112 #### Windows (GPO)
113 ```
114 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
115 ```
116 #### Windows (Intune)
117 OMA-URI:
118 ```
119 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
120 ```
121 Value (string):
122 ```
123 <enabled/> or <disabled/>
124 ```
125 #### macOS
126 ```
127 <dict>
128 <key>AppAutoUpdate</key>
129 <true/> | <false/>
130 </dict>
131 ```
132 #### policies.json
133 ```
134 {
135 "policies": {
136 "AppAutoUpdate": true | false
137 }
138 }
139 ```
140 ### AppUpdateURL
141
142 Change the URL for application update.
143
144 **Compatibility:** Firefox 62, Firefox ESR 60.2\
145 **CCK2 Equivalent:** N/A\
146 **Preferences Affected:** `app.update.url`
147
148 #### Windows (GPO)
149 ```
150 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
151 ```
152 #### Windows (Intune)
153 OMA-URI:
154 ```
155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
156 ```
157 Value (string):
158 ```
159 <enabled/>
160 <data id="AppUpdateURL" value="https://yoursite.com"/>
161 ```
162 #### macOS
163 ```
164 <dict>
165 <key>AppUpdateURL</key>
166 <string>https://yoursite.com</string>
167 </dict>
168 ```
169 #### policies.json
170 ```
171 {
172 "policies": {
173 "AppUpdateURL": "https://yoursite.com"
174 }
175 }
176 ```
177 ### Authentication
178
179 Configure sites that support integrated authentication.
180
181 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
182
183 `PrivateBrowsing` enables integrated authentication in prviate browsing.
184
185 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
186 **CCK2 Equivalent:** N/A\
187 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
188
189 #### Windows (GPO)
190 ```
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
202 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
203 ```
204 #### Windows (Intune)
205 OMA-URI:
206 ```
207 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
208 ```
209 Value (string):
210 ```
211 <enabled/>
212 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
213 ```
214 OMA-URI:
215 ```
216 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
217 ```
218 Value (string):
219 ```
220 <enabled/>
221 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
222 ```
223 OMA-URI:
224 ```
225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
226 ```
227 Value (string):
228 ```
229 <enabled/>
230 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
231 ```
232 OMA-URI:
233 ```
234 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
235 ```
236 Value (string):
237 ```
238 <enabled/>
239 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
240 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
241 ```
242 OMA-URI:
243 ```
244 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
245 ```
246 Value (string):
247 ```
248 <enabled/> or <disabled/>
249 ```
250 OMA-URI:
251 ```
252 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
253 ```
254 Value (string):
255 ```
256 <enabled/> or <disabled/>
257 ```
258 #### macOS
259 ```
260 <dict>
261 <key>Authentication</key>
262 <dict>
263 <key>SPNEGO</key>
264 <array>
265 <string>mydomain.com</string>
266 <string>https://myotherdomain.com</string>
267 </array>
268 <key>Delegated</key>
269 <array>
270 <string>mydomain.com</string>
271 <string>https://myotherdomain.com</string>
272 </array>
273 <key>NTLM</key>
274 <array>
275 <string>mydomain.com</string>
276 <string>https://myotherdomain.com</string>
277 </array>
278 <key>AllowNonFQDN</key>
279 <dict>
280 <key>SPNEGO</key>
281 <true/> | <false/>
282 <key>NTLM</key>
283 <true/> | <false/>
284 </dict>
285 <key>AllowProxies</key>
286 <dict>
287 <key>SPNEGO</key>
288 <true/> | <false/>
289 <key>NTLM</key>
290 <true/> | <false/>
291 </dict>
292 <key>Locked</key>
293 <true/> | <false/>
294 <key>PrivateBrowsing</key>
295 <true/> | <false/>
296 </dict>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "Authentication": {
304 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
305 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
306 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
307 "AllowNonFQDN": {
308 "SPNEGO": true | false,
309 "NTLM": true | false
310 },
311 "AllowProxies": {
312 "SPNEGO": true | false,
313 "NTLM": true | false
314 },
315 "Locked": true | false,
316 "PrivateBrowsing": true | false
317 }
318 }
319 }
320 ```
321 ### BlockAboutAddons
322
323 Block access to the Add-ons Manager (about:addons).
324
325 **Compatibility:** Firefox 60, Firefox ESR 60\
326 **CCK2 Equivalent:** `disableAddonsManager`\
327 **Preferences Affected:** N/A
328
329 #### Windows (GPO)
330 ```
331 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
332 ```
333 #### Windows (Intune)
334 OMA-URI:
335 ```
336 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
337 ```
338 Value (string):
339 ```
340 <enabled/> or <disabled/>
341 ```
342 #### macOS
343 ```
344 <dict>
345 <key>BlockAboutAddons</key>
346 <true/> | <false/>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "BlockAboutAddons": true | false
354 }
355 }
356 ```
357 ### BlockAboutConfig
358
359 Block access to about:config.
360
361 **Compatibility:** Firefox 60, Firefox ESR 60\
362 **CCK2 Equivalent:** `disableAboutConfig`\
363 **Preferences Affected:** N/A
364
365 #### Windows (GPO)
366 ```
367 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
368 ```
369 #### Windows (Intune)
370 OMA-URI:
371 ```
372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
373 ```
374 Value (string):
375 ```
376 <enabled/> or <disabled/>
377 ```
378 #### macOS
379 ```
380 <dict>
381 <key>BlockAboutConfig</key>
382 <true/> | <false/>
383 </dict>
384 ```
385 #### policies.json
386 ```
387 {
388 "policies": {
389 "BlockAboutConfig": true | false
390 }
391 }
392 ```
393 ### BlockAboutProfiles
394
395 Block access to About Profiles (about:profiles).
396
397 **Compatibility:** Firefox 60, Firefox ESR 60\
398 **CCK2 Equivalent:** `disableAboutProfiles`\
399 **Preferences Affected:** N/A
400
401 #### Windows (GPO)
402 ```
403 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
404 ```
405 #### Windows (Intune)
406 OMA-URI:
407 ```
408 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
409 ```
410 Value (string):
411 ```
412 <enabled/> or <disabled/>
413 ```
414 #### macOS
415 ```
416 <dict>
417 <key>BlockAboutProfiles</key>
418 <true/> | <false/>
419 </dict>
420 ```
421 #### policies.json
422 ```
423 {
424 "policies": {
425 "BlockAboutProfiles": true | false
426 }
427 }
428 ```
429 ### BlockAboutSupport
430
431 Block access to Troubleshooting Information (about:support).
432
433 **Compatibility:** Firefox 60, Firefox ESR 60\
434 **CCK2 Equivalent:** `disableAboutSupport`\
435 **Preferences Affected:** N/A
436
437 #### Windows (GPO)
438 ```
439 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
440 ```
441 #### Windows (Intune)
442 OMA-URI:
443 ```
444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
445 ```
446 Value (string):
447 ```
448 <enabled/> or <disabled/>
449 ```
450 #### macOS
451 ```
452 <dict>
453 <key>BlockAboutSupport</key>
454 <true/> | <false/>
455 </dict>
456 ```
457 #### policies.json
458 ```
459 {
460 "policies": {
461 "BlockAboutSupport": true | false
462 }
463 }
464 ```
465 ### Bookmarks
466
467 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
468
469 **Compatibility:** Firefox 60, Firefox ESR 60\
470 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
471 **Preferences Affected:** N/A
472
473 #### Windows (GPO)
474 ```
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
479 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
485 ```
486 Value (string):
487 ```
488 <enabled/>
489 <data id="BookmarkTitle" value="Example"/>
490 <data id="BookmarkURL" value="https://example.com"/>
491 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
492 <data id="BookmarkPlacement" value="toolbar | menu"/>
493 <data id="BookmarkFolder" value="FolderName"/>
494 ```
495 #### macOS
496 ```
497 <dict>
498 <key>Bookmarks</key>
499 <array>
500 <dict>
501 <key>Title</key>
502 <string>Example</string>
503 <key>URL</key>
504 <string>https://example.com</string>
505 <key>Favicon</key>
506 <string>https://example.com/favicon.ico</string>
507 <key>Placement</key>
508 <string>toolbar | menu</string>
509 <key>Folder</key>
510 <string>FolderName</string>
511 </dict>
512 </array>
513 </dict>
514 ```
515 #### policies.json
516 ```
517 {
518 "policies": {
519 "Bookmarks": [
520 {
521 "Title": "Example",
522 "URL": "https://example.com",
523 "Favicon": "https://example.com/favicon.ico",
524 "Placement": "toolbar" | "menu",
525 "Folder": "FolderName"
526 }
527 ]
528 }
529 }
530 ```
531 ### CaptivePortal
532 Enable or disable the detection of captive portals.
533
534 **Compatibility:** Firefox 67, Firefox ESR 60.7\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `network.captive-portal-service.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>CaptivePortal</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "CaptivePortal": true | false
563 }
564 }
565 ```
566 ### Certificates
567
568 ### Certificates | ImportEnterpriseRoots
569
570 Trust certificates that have been added to the operating system certificate store by a user or administrator.
571
572 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
573
574 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
575
576 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
577 **CCK2 Equivalent:** N/A\
578 **Preferences Affected:** `security.enterprise_roots.enabled`
579
580 #### Windows (GPO)
581 ```
582 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
583 ```
584 #### Windows (Intune)
585 OMA-URI:
586 ```
587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
588 ```
589 Value (string):
590 ```
591 <enabled/> or <disabled/>
592 ```
593 #### macOS
594 ```
595 <dict>
596 <key>Certificates</key>
597 <dict>
598 <key>ImportEnterpriseRoots</key>
599 <true/> | <false/>
600 </dict>
601 </dict>
602 ```
603 #### policies.json
604 ```
605 {
606 "policies": {
607 "Certificates": {
608 "ImportEnterpriseRoots": true | false
609 }
610 }
611 }
612 ```
613 ### Certificates | Install
614
615 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
616
617 - Windows
618 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
619 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
620 - macOS
621 - /Library/Application Support/Mozilla/Certificates
622 - ~/Library/Application Support/Mozilla/Certificates
623 - Linux
624 - /usr/lib/mozilla/certificates
625 - /usr/lib64/mozilla/certificates
626 - ~/.mozilla/certificates
627
628 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
629
630 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
631
632 Certificates are installed using the trust string `CT,CT,`.
633
634 Binary (DER) and ASCII (PEM) certificates are both supported.
635
636 **Compatibility:** Firefox 64, Firefox ESR 64\
637 **CCK2 Equivalent:** `certs.ca`\
638 **Preferences Affected:** N/A
639
640 #### Windows (GPO)
641 ```
642 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
643 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
644 ```
645 #### Windows (Intune)
646 OMA-URI:
647 ```
648 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
649 ```
650 Value (string):
651 ```
652 <enabled/>
653 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
654 ```
655 #### macOS
656 ```
657 <dict>
658 <key>Certificates</key>
659 <dict>
660 <key>Install</key>
661 <array>
662 <string>cert1.der</string>
663 <string>/Users/username/cert2.pem</string>
664 </array>
665 </dict>
666 </dict>
667 ```
668 #### policies.json
669 ```
670 {
671 "policies": {
672 "Certificates": {
673 "Install": ["cert1.der", "/home/username/cert2.pem"]
674 }
675 }
676 }
677 ```
678 ### Cookies
679 Configure cookie preferences.
680
681 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
682
683 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
684
685 `Default` determines whether cookies are accepted at all.
686
687 `AcceptThirdParty` determines how third-party cookies are handled.
688
689 `ExpireAtSessionEnd` determines when cookies expire.
690
691 `RejectTracker` only rejects cookies for trackers.
692
693 `Locked` prevents the user from changing cookie preferences.
694
695 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
696 **CCK2 Equivalent:** N/A\
697 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
698
699 #### Windows (GPO)
700 ```
701 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
702 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
703 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
704 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
705 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
706 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
707 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
708 ```
709 #### Windows (Intune)
710 OMA-URI:
711 ```
712 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
713 ```
714 Value (string):
715 ```
716 <enabled/>
717 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
718 ```
719 OMA-URI:
720 ```
721 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
722 ```
723 Value (string):
724 ```
725 <enabled/>
726 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
727 ```
728 OMA-URI:
729 ```
730 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
731 ```
732 Value (string):
733 ```
734 <enabled/> or <disabled/>
735 ```
736 OMA-URI:
737 ```
738 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
739 ```
740 Value (string):
741 ```
742 <enabled/>
743 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
744 ```
745 OMA-URI:
746 ```
747 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
748 ```
749 Value (string):
750 ```
751 <enabled/> or <disabled/>
752 ```
753 OMA-URI:
754 ```
755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
756 ```
757 Value (string):
758 ```
759 <enabled/> or <disabled/>
760 ```
761 OMA-URI:
762 ```
763 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
764 ```
765 Value (string):
766 ```
767 <enabled/> or <disabled/>
768 ```
769 #### macOS
770 ```
771 <dict>
772 <key>Cookies</key>
773 <dict>
774 <key>Allow</key>
775 <array>
776 <string>http://example.com</string>
777 </array>
778 <key>Block</key>
779 <array>
780 <string>http://example.org</string>
781 </array>
782 <key>Default</key>
783 <true/> | <false/>
784 <key>AcceptThirdParty</key>
785 <string>always | never | from-visited</string>
786 <key>ExpireAtSessionEnd</key>
787 <true/> | <false/>
788 <key>RejectTracker</key>
789 <true/> | <false/>
790 <key>Locked</key>
791 <true/> | <false/>
792 </dict>
793 </dict>
794 ```
795 #### policies.json
796 ```
797 {
798 "policies": {
799 "Cookies": {
800 "Allow": ["http://example.org/"],
801 "Block": ["http://example.edu/"],
802 "Default": true | false,
803 "AcceptThirdParty": "always" | "never" | "from-visited",
804 "ExpireAtSessionEnd": true | false,
805 "RejectTracker": true | false,
806 "Locked": true | false
807 }
808 }
809 }
810 ```
811 ### DisableSetDesktopBackground
812 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
813
814 **Compatibility:** Firefox 60, Firefox ESR 60\
815 **CCK2 Equivalent:** `removeSetDesktopBackground`\
816 **Preferences Affected:** N/A
817
818 #### Windows (GPO)
819 ```
820 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
821 ```
822 #### Windows (Intune)
823 OMA-URI:
824 ```
825 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
826 ```
827 Value (string):
828 ```
829 <enabled/> or <disabled/>
830 ```
831 #### macOS
832 ```
833 <dict>
834 <key>DisableSetDesktopBackground</key>
835 <true/> | <false/>
836 </dict>
837 ```
838 #### policies.json
839 ```
840 {
841 "policies": {
842 "DisableSetDesktopBackground": true | false
843 }
844 }
845 ```
846 ### DisableMasterPasswordCreation
847 Remove the master password functionality.
848
849 **Compatibility:** Firefox 60, Firefox ESR 60\
850 **CCK2 Equivalent:** `noMasterPassword`\
851 **Preferences Affected:** N/A
852
853 #### Windows (GPO)
854 ```
855 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
856 ```
857 #### Windows (Intune)
858 OMA-URI:
859 ```
860 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
861 ```
862 Value (string):
863 ```
864 <enabled/> or <disabled/>
865 ```
866 #### macOS
867 ```
868 <dict>
869 <key>DisableMasterPasswordCreation</key>
870 <true/> | <false/>
871 </dict>
872 ```
873 #### policies.json
874 ```
875 {
876 "policies": {
877 "DisableMasterPasswordCreation": true | false
878 }
879 }
880 ```
881 ### DisableAppUpdate
882 Turn off application updates.
883
884 **Compatibility:** Firefox 60, Firefox ESR 60\
885 **CCK2 Equivalent:** `disableFirefoxUpdates`\
886 **Preferences Affected:** N/A
887
888 #### Windows (GPO)
889 ```
890 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
891 ```
892 #### Windows (Intune)
893 OMA-URI:
894 ```
895 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
896 ```
897 Value (string):
898 ```
899 <enabled/> or <disabled/>
900 ```
901 #### macOS
902 ```
903 <dict>
904 <key>DisableAppUpdate</key>
905 <true/> | <false/>
906 </dict>
907 ```
908 #### policies.json
909 ```
910 {
911 "policies": {
912 "DisableAppUpdate": true | false
913 }
914 }
915 ```
916 ### DisableBuiltinPDFViewer
917 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
918
919 **Compatibility:** Firefox 60, Firefox ESR 60\
920 **CCK2 Equivalent:** `disablePDFjs`\
921 **Preferences Affected:** `pdfjs.disabled`
922
923 #### Windows (GPO)
924 ```
925 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
926 ```
927 #### Windows (Intune)
928 OMA-URI:
929 ```
930 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
931 ```
932 Value (string):
933 ```
934 <enabled/> or <disabled/>
935 ```
936 #### macOS
937 ```
938 <dict>
939 <key>DisableBuiltinPDFViewer</key>
940 <true/> | <false/>
941 </dict>
942 ```
943 #### policies.json
944 ```
945 {
946 "policies": {
947 "DisableBuiltinPDFViewer": true | false
948 }
949 }
950 ```
951 ### DisabledCiphers
952 Disable specific cryptographic ciphers.
953
954 ---
955 **Note:**
956
957 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
958
959 ---
960 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
961 **CCK2 Equivalent:** N/A\
962 **Preferences Affected:** N/A
963
964 #### Windows (GPO)
965 ```
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
975 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
976 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
977 ```
978 #### Windows (Intune)
979 OMA-URI:
980 ```
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
991 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
992 ```
993 Value (string):
994 ```
995 <enabled/> or <disabled/>
996 ```
997 #### macOS
998 ```
999 <dict>
1000 <key>DisabledCiphers</key>
1001 <dict>
1002 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1003 <true/> | <false/>
1004 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1005 <true/> | <false/>
1006 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1007 <true/> | <false/>
1008 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1009 <true/> | <false/>
1010 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1011 <true/> | <false/>
1012 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1013 <true/> | <false/>
1014 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1015 <true/> | <false/>
1016 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1017 <true/> | <false/>
1018 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1019 <true/> | <false/>
1020 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1021 <true/> | <false/>
1022 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1023 <true/> | <false/>
1024 </dict>
1025 </dict>
1026 ```
1027 #### policies.json
1028 ```
1029 {
1030 "policies": {
1031 "DisabledCiphers" {
1032 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1033 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1035 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1036 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1037 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1038 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1039 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1040 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1041 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1042 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1043 }
1044 }
1045 }
1046 ```
1047 ### DisableDefaultBrowserAgent
1048 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1049
1050 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1051 **CCK2 Equivalent:** N/A\
1052 **Preferences Affected:** N/A
1053
1054 #### Windows (GPO)
1055 ```
1056 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1057 ```
1058 #### Windows (Intune)
1059 OMA-URI:
1060 ```
1061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1062 ```
1063 Value (string):
1064 ```
1065 <enabled/> or <disabled/>
1066 ```
1067 #### policies.json
1068 ```
1069 {
1070 "policies": {
1071 "DisableDefaultBrowserAgent": true | false
1072 }
1073 }
1074 ```
1075 ### DisableDeveloperTools
1076 Remove access to all developer tools.
1077
1078 **Compatibility:** Firefox 60, Firefox ESR 60\
1079 **CCK2 Equivalent:** `removeDeveloperTools`\
1080 **Preferences Affected:** `devtools.policy.disabled`
1081
1082 #### Windows (GPO)
1083 ```
1084 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1085 ```
1086 #### Windows (Intune)
1087 OMA-URI:
1088 ```
1089 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1090 ```
1091 Value (string):
1092 ```
1093 <enabled/> or <disabled/>
1094 ```
1095 #### macOS
1096 ```
1097 <dict>
1098 <key>DisableDeveloperTools</key>
1099 <true/> | <false/>
1100 </dict>
1101 ```
1102 #### policies.json
1103 ```
1104 {
1105 "policies": {
1106 "DisableDeveloperTools": true | false
1107 }
1108 }
1109 ```
1110 ### DisableFeedbackCommands
1111 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1112
1113 **Compatibility:** Firefox 60, Firefox ESR 60\
1114 **CCK2 Equivalent:** N/A\
1115 **Preferences Affected:** N/A
1116
1117 #### Windows (GPO)
1118 ```
1119 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1120 ```
1121 #### Windows (Intune)
1122 OMA-URI:
1123 ```
1124 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1125 ```
1126 Value (string):
1127 ```
1128 <enabled/> or <disabled/>
1129 ```
1130 #### macOS
1131 ```
1132 <dict>
1133 <key>DisableFeedbackCommands</key>
1134 <true/> | <false/>
1135 </dict>
1136 ```
1137 #### policies.json
1138 ```
1139 {
1140 "policies": {
1141 "DisableFeedbackCommands": true | false
1142 }
1143 }
1144 ```
1145 ### DisableFirefoxScreenshots
1146 Remove access to Firefox Screenshots.
1147
1148 **Compatibility:** Firefox 60, Firefox ESR 60\
1149 **CCK2 Equivalent:** N/A\
1150 **Preferences Affected:** `extensions.screenshots.disabled`
1151
1152 #### Windows (GPO)
1153 ```
1154 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1155 ```
1156 #### Windows (Intune)
1157 OMA-URI:
1158 ```
1159 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1160 ```
1161 Value (string):
1162 ```
1163 <enabled/> or <disabled/>
1164 ```
1165 #### macOS
1166 ```
1167 <dict>
1168 <key>DisableFirefoxScreenshots</key>
1169 <true/> | <false/>
1170 </dict>
1171 ```
1172 #### policies.json
1173 ```
1174 {
1175 "policies": {
1176 "DisableFirefoxScreenshots": true | false
1177 }
1178 }
1179 ```
1180 ### DisableFirefoxAccounts
1181 Disable Firefox Accounts integration (Sync).
1182
1183 **Compatibility:** Firefox 60, Firefox ESR 60\
1184 **CCK2 Equivalent:** `disableSync`\
1185 **Preferences Affected:** `identity.fxaccounts.enabled`
1186
1187 #### Windows (GPO)
1188 ```
1189 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1190 ```
1191 #### Windows (Intune)
1192 OMA-URI:
1193 ```
1194 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1195 ```
1196 Value (string):
1197 ```
1198 <enabled/> or <disabled/>
1199 ```
1200 #### macOS
1201 ```
1202 <dict>
1203 <key>DisableFirefoxAccounts</key>
1204 <true/> | <false/>
1205 </dict>
1206 ```
1207 #### policies.json
1208 ```
1209 {
1210 "policies": {
1211 "DisableFirefoxAccounts": true | false
1212 }
1213 }
1214 ```
1215 ### DisableFirefoxStudies
1216 Disable Firefox studies (Shield).
1217
1218 **Compatibility:** Firefox 60, Firefox ESR 60\
1219 **CCK2 Equivalent:** N/A\
1220 **Preferences Affected:** N/A
1221
1222 #### Windows (GPO)
1223 ```
1224 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1225 ```
1226 #### Windows (Intune)
1227 OMA-URI:
1228 ```
1229 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1230 ```
1231 Value (string):
1232 ```
1233 <enabled/> or <disabled/>
1234 ```
1235 #### macOS
1236 ```
1237 <dict>
1238 <key>DisableFirefoxStudies</key>
1239 <true/> | <false/>
1240 </dict>
1241 ```
1242 #### policies.json
1243 ```
1244 {
1245 "policies": {
1246 "DisableFirefoxStudies": true | false
1247 }
1248 }
1249 ```
1250 ### DisableForgetButton
1251 Disable the "Forget" button.
1252
1253 **Compatibility:** Firefox 60, Firefox ESR 60\
1254 **CCK2 Equivalent:** `disableForget`\
1255 **Preferences Affected:** N/A
1256
1257 #### Windows (GPO)
1258 ```
1259 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1260 ```
1261 #### Windows (Intune)
1262 OMA-URI:
1263 ```
1264 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1265 ```
1266 Value (string):
1267 ```
1268 <enabled/> or <disabled/>
1269 ```
1270 #### macOS
1271 ```
1272 <dict>
1273 <key>DisableForgetButton</key>
1274 <true/> | <false/>
1275 </dict>
1276 ```
1277 #### policies.json
1278 ```
1279 {
1280 "policies": {
1281 "DisableForgetButton": true | false
1282 }
1283 }
1284 ```
1285 ### DisableFormHistory
1286 Turn off saving information on web forms and the search bar.
1287
1288 **Compatibility:** Firefox 60, Firefox ESR 60\
1289 **CCK2 Equivalent:** `disableFormFill`\
1290 **Preferences Affected:** ` browser.formfill.enable`
1291
1292 #### Windows (GPO)
1293 ```
1294 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1295 ```
1296 #### Windows (Intune)
1297 OMA-URI:
1298 ```
1299 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1300 ```
1301 Value (string):
1302 ```
1303 <enabled/> or <disabled/>
1304 ```
1305 #### macOS
1306 ```
1307 <dict>
1308 <key>DisableFormHistory</key>
1309 <true/> | <false/>
1310 </dict>
1311 ```
1312 #### policies.json
1313 ```
1314 {
1315 "policies": {
1316 "DisableFormHistory": true | false
1317 }
1318 }
1319 ```
1320 ### DisablePasswordReveal
1321 Do not allow passwords to be shown in saved logins
1322
1323 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1324 **CCK2 Equivalent:** N/A
1325 **Preferences Affected:** N/A
1326
1327 #### Windows (GPO)
1328 ```
1329 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1330 ```
1331 #### Windows (Intune)
1332 OMA-URI:
1333 ```
1334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1335 ```
1336 Value (string):
1337 ```
1338 <enabled/> or <disabled/>
1339 ```
1340 #### macOS
1341 ```
1342 <dict>
1343 <key>DisablePasswordReveal</key>
1344 <true/> | <false/>
1345 </dict>
1346 ```
1347 #### policies.json
1348 ```
1349 {
1350 "policies": {
1351 "DisablePasswordReveal": true | false
1352 }
1353 }
1354 ```
1355 ### DisablePocket
1356 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1357
1358 **Compatibility:** Firefox 60, Firefox ESR 60\
1359 **CCK2 Equivalent:** `disablePocket`\
1360 **Preferences Affected:** `extensions.pocket.enabled`
1361
1362 #### Windows (GPO)
1363 ```
1364 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1365 ```
1366 #### Windows (Intune)
1367 OMA-URI:
1368 ```
1369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1370 ```
1371 Value (string):
1372 ```
1373 <enabled/> or <disabled/>
1374 ```
1375 #### macOS
1376 ```
1377 <dict>
1378 <key>DisablePocket</key>
1379 <true/> | <false/>
1380 </dict>
1381 ```
1382 #### policies.json
1383 ```
1384 {
1385 "policies": {
1386 "DisablePocket": true | false
1387 }
1388 }
1389 ```
1390 ### DisablePrivateBrowsing
1391 Remove access to private browsing.
1392
1393 **Compatibility:** Firefox 60, Firefox ESR 60\
1394 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1395 **Preferences Affected:** N/A
1396
1397 #### Windows (GPO)
1398 ```
1399 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1400 ```
1401 #### Windows (Intune)
1402 OMA-URI:
1403 ```
1404 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1405 ```
1406 Value (string):
1407 ```
1408 <enabled/> or <disabled/>
1409 ```
1410 #### macOS
1411 ```
1412 <dict>
1413 <key>DisablePrivateBrowsing</key>
1414 <true/> | <false/>
1415 </dict>
1416 ```
1417 #### policies.json
1418 ```
1419 {
1420 "policies": {
1421 "DisablePrivateBrowsing": true | false
1422 }
1423 }
1424 ```
1425 ### DisableProfileImport
1426 Disables the "Import data from another browser" option in the bookmarks window.
1427
1428 **Compatibility:** Firefox 60, Firefox ESR 60\
1429 **CCK2 Equivalent:** N/A\
1430 **Preferences Affected:** N/A
1431
1432 #### Windows (GPO)
1433 ```
1434 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1435 ```
1436 #### Windows (Intune)
1437 OMA-URI:
1438 ```
1439 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1440 ```
1441 Value (string):
1442 ```
1443 <enabled/> or <disabled/>
1444 ```
1445 #### macOS
1446 ```
1447 <dict>
1448 <key>DisableProfileImport</key>
1449 <true/> | <false/>
1450 </dict>
1451 ```
1452 #### policies.json
1453 ```
1454 {
1455 "policies": {
1456 "DisableProfileImport": true | false
1457 }
1458 }
1459 ```
1460 ### DisableProfileRefresh
1461 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1462
1463 **Compatibility:** Firefox 60, Firefox ESR 60\
1464 **CCK2 Equivalent:** `disableResetFirefox`\
1465 **Preferences Affected:** `browser.disableResetPrompt`
1466
1467 #### Windows (GPO)
1468 ```
1469 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1470 ```
1471 #### Windows (Intune)
1472 OMA-URI:
1473 ```
1474 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1475 ```
1476 Value (string):
1477 ```
1478 <enabled/> or <disabled/>
1479 ```
1480 #### macOS
1481 ```
1482 <dict>
1483 <key>DisableProfileRefresh</key>
1484 <true/> | <false/>
1485 </dict>
1486 ```
1487 #### policies.json
1488 ```
1489 {
1490 "policies": {
1491 "DisableProfileRefresh": true | false
1492 }
1493 }
1494 ```
1495 ### DisableSafeMode
1496 Disable safe mode within the browser.
1497
1498 On Windows, this disables safe mode via the command line as well.
1499
1500 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1501 **CCK2 Equivalent:** `disableSafeMode`\
1502 **Preferences Affected:** N/A
1503
1504 #### Windows (GPO)
1505 ```
1506 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1507 ```
1508 #### Windows (Intune)
1509 OMA-URI:
1510 ```
1511 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1512 ```
1513 Value (string):
1514 ```
1515 <enabled/> or <disabled/>
1516 ```
1517 #### macOS
1518 ```
1519 <dict>
1520 <key>DisableSafeMode</key>
1521 <true/> | <false/>
1522 </dict>
1523 ```
1524 #### policies.json
1525 ```
1526 {
1527 "policies": {
1528 "DisableSafeMode": true | false
1529 }
1530 }
1531 ```
1532 ### DisableSecurityBypass
1533 Prevent the user from bypassing security in certain cases.
1534
1535 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1536
1537 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1538
1539 **Compatibility:** Firefox 60, Firefox ESR 60\
1540 **CCK2 Equivalent:** N/A\
1541 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1542
1543 #### Windows (GPO)
1544 ```
1545 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1546 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1547 ```
1548 #### Windows (Intune)
1549 OMA-URI:
1550 ```
1551 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1552 ```
1553 Value (string):
1554 ```
1555 <enabled/> or <disabled/>
1556 ```
1557 OMA-URI:
1558 ```
1559 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1560 ```
1561 Value (string):
1562 ```
1563 <enabled/> or <disabled/>
1564 ```
1565
1566 #### macOS
1567 ```
1568 <dict>
1569 <key>DisableSecurityBypass</key>
1570 <dict>
1571 <key>InvalidCertificate</key>
1572 <true/> | <false/>
1573 <key><SafeBrowsing/key>
1574 <true/> | <false/>
1575 </dict>
1576 </dict>
1577 ```
1578 #### policies.json
1579 ```
1580 {
1581 "policies": {
1582 "DisableSecurityBypass": {
1583 "InvalidCertificate": true | false,
1584 "SafeBrowsing": true | false
1585 }
1586 }
1587 }
1588 ```
1589 ### DisableSystemAddonUpdate
1590 Prevent system add-ons from being installed or update.
1591
1592 **Compatibility:** Firefox 60, Firefox ESR 60\
1593 **CCK2 Equivalent:** N/A\
1594 **Preferences Affected:** N/A
1595
1596 #### Windows (GPO)
1597 ```
1598 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1599 ```
1600 #### Windows (Intune)
1601 OMA-URI:
1602 ```
1603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1604 ```
1605 Value (string):
1606 ```
1607 <enabled/> or <disabled/>
1608 ```
1609 #### macOS
1610 ```
1611 <dict>
1612 <key>DisableSystemAddonUpdate</key>
1613 <true/> | <false/>
1614 </dict>
1615 ```
1616 #### policies.json
1617 ```
1618 {
1619 "policies": {
1620 "DisableSystemAddonUpdate": true | false
1621 }
1622 }
1623 ```
1624 ### DisableTelemetry
1625 Prevent the upload of telemetry data.
1626
1627 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1628
1629 **Compatibility:** Firefox 60, Firefox ESR 60\
1630 **CCK2 Equivalent:** `disableTelemetry`\
1631 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1632
1633 #### Windows (GPO)
1634 ```
1635 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1636 ```
1637 #### Windows (Intune)
1638 OMA-URI:
1639 ```
1640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1641 ```
1642 Value (string):
1643 ```
1644 <enabled/> or <disabled/>
1645 ```
1646 #### macOS
1647 ```
1648 <dict>
1649 <key>DisableTelemetry</key>
1650 <true/> | <false/>
1651 </dict>
1652 ```
1653 #### policies.json
1654 ```
1655 {
1656 "policies": {
1657 "DisableTelemetry": true | false
1658 }
1659 }
1660 ```
1661 ### DisplayBookmarksToolbar
1662 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1663
1664 **Compatibility:** Firefox 60, Firefox ESR 60\
1665 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1666 **Preferences Affected:** N/A
1667
1668 #### Windows (GPO)
1669 ```
1670 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1671 ```
1672 #### Windows (Intune)
1673 OMA-URI:
1674 ```
1675 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1676 ```
1677 Value (string):
1678 ```
1679 <enabled/> or <disabled/>
1680 ```
1681 #### macOS
1682 ```
1683 <dict>
1684 <key>DisplayBookmarksToolbar</key>
1685 <true/> | <false/>
1686 </dict>
1687 ```
1688 #### policies.json
1689 ```
1690 {
1691 "policies": {
1692 "DisplayBookmarksToolbar": true | false
1693 }
1694 }
1695 ```
1696 ### DisplayMenuBar (Deprecated)
1697 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1698
1699 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1700 **CCK2 Equivalent:** `displayMenuBar`\
1701 **Preferences Affected:** N/A
1702
1703 #### Windows (GPO)
1704 ```
1705 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1706 ```
1707 #### macOS
1708 ```
1709 <dict>
1710 <key>DisplayMenuBar</key>
1711 <true/> | <false/>
1712 </dict>
1713 ```
1714 #### policies.json
1715 ```
1716 {
1717 "policies": {
1718 "DisplayMenuBar": true | false
1719 }
1720 }
1721 ```
1722 ### DisplayMenuBar
1723 Set the state of the menubar.
1724
1725 `always` means the menubar is shown and cannot be hidden.
1726
1727 `never` means the menubar is hidden and cannot be shown.
1728
1729 `default-on` means the menubar is on by default but can be hidden.
1730
1731 `default-off` means the menubar is off by default but can be shown.
1732
1733 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1734 **CCK2 Equivalent:** `displayMenuBar`\
1735 **Preferences Affected:** N/A
1736
1737 #### Windows (GPO)
1738 ```
1739 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1740 ```
1741 #### Windows (Intune)
1742 OMA-URI:
1743 ```
1744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1745 ```
1746 Value (string):
1747 ```
1748 <enabled/>
1749 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1750 ```
1751 #### macOS
1752 ```
1753 <dict>
1754 <key>DisplayMenuBar</key>
1755 <string>always | never | default-on | default-off</string>
1756 </dict>
1757 ```
1758 #### policies.json
1759 ```
1760 {
1761 "policies": {
1762 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1763 }
1764 }
1765 ```
1766 ### DNSOverHTTPS
1767 Configure DNS over HTTPS.
1768
1769 `Enabled` determines whether DNS over HTTPS is enabled
1770
1771 `ProviderURL` is a URL to another provider.
1772
1773 `Locked` prevents the user from changing DNS over HTTPS preferences.
1774
1775 `ExcludedDomains` excludes domains from DNS over HTTPS.
1776
1777 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1778 **CCK2 Equivalent:** N/A\
1779 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1780
1781 #### Windows (GPO)
1782 ```
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1785 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1786 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1787 ```
1788 #### Windows (Intune)
1789 OMA-URI:
1790 ```
1791 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1792 ```
1793 Value (string):
1794 ```
1795 <enabled/> or <disabled/>
1796 ```
1797 OMA-URI:
1798 ```
1799 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1800 ```
1801 Value (string):
1802 ```
1803 <enabled/>
1804 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1805 ```
1806 OMA-URI:
1807 ```
1808 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1809 ```
1810 Value (string):
1811 ```
1812 <enabled/> or <disabled/>
1813 ```
1814 OMA-URI:
1815 ```
1816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1817 ```
1818 Value (string):
1819 ```
1820 <enabled/>
1821 <data id="List" value="1&#xF000;example.com"/>
1822 ```
1823 #### macOS
1824 ```
1825 <dict>
1826 <key>DNSOverHTTPS</key>
1827 <dict>
1828 <key>Enabled</key>
1829 <true/> | <false/>
1830 <key>ProviderURL</key>
1831 <string>URL_TO_ALTERNATE_PROVIDER</string>
1832 <key>Locked</key>
1833 <true/> | <false/>
1834 <key>ExcludedDomains</key>
1835 <array>
1836 <string>example.com</string>
1837 </array>
1838 </dict>
1839 </dict>
1840 ```
1841 #### policies.json
1842 ```
1843 {
1844 "policies": {
1845 "DNSOverHTTPS": {
1846 "Enabled": true | false,
1847 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1848 "Locked": true | false,
1849 "ExcludedDomains": ["example.com"]
1850 }
1851 }
1852 }
1853 ```
1854 ### DontCheckDefaultBrowser
1855 Don't check if Firefox is the default browser at startup.
1856
1857 **Compatibility:** Firefox 60, Firefox ESR 60\
1858 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1859 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1860
1861 #### Windows (GPO)
1862 ```
1863 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1864 ```
1865 #### Windows (Intune)
1866 OMA-URI:
1867 ```
1868 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1869 ```
1870 Value (string):
1871 ```
1872 <enabled/> or <disabled/>
1873 ```
1874 #### macOS
1875 ```
1876 <dict>
1877 <key>DontCheckDefaultBrowser</key>
1878 <true/> | <false/>
1879 </dict>
1880 ```
1881 #### policies.json
1882 ```
1883 {
1884 "policies": {
1885 "DontCheckDefaultBrowser": true | false
1886 }
1887 }
1888 ```
1889 ### DefaultDownloadDirectory
1890 Set the default download directory.
1891
1892 You can use ${home} for the native home directory.
1893
1894 **Compatibility:** Firefox 68, Firefox ESR 68\
1895 **CCK2 Equivalent:** N/A\
1896 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1897
1898 #### Windows (GPO)
1899 ```
1900 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1901 ```
1902 #### Windows (Intune)
1903 OMA-URI:
1904 ```
1905 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1906 ```
1907 Value (string):
1908 ```
1909 <enabled/>
1910 <data id="Preferences_String" value="${home}\Downloads"/>
1911 ```
1912 #### macOS
1913 ```
1914 <dict>
1915 <key>DefaultDownloadDirectory</key>
1916 <string>${home}/Downloads</string>
1917 </dict>
1918 ```
1919 #### policies.json (macOS and Linux)
1920 ```
1921 {
1922 "policies": {
1923 "DefaultDownloadDirectory": "${home}/Downloads"
1924 }
1925 ```
1926 #### policies.json (Windows)
1927 ```
1928 {
1929 "policies": {
1930 "DefaultDownloadDirectory": "${home}\\Downloads"
1931 }
1932 ```
1933 ### DownloadDirectory
1934 Set and lock the download directory.
1935
1936 You can use ${home} for the native home directory.
1937
1938 **Compatibility:** Firefox 68, Firefox ESR 68\
1939 **CCK2 Equivalent:** N/A\
1940 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1941
1942 #### Windows (GPO)
1943 ```
1944 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1945 ```
1946 #### Windows (Intune)
1947 OMA-URI:
1948 ```
1949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1950 ```
1951 Value (string):
1952 ```
1953 <enabled/>
1954 <data id="Preferences_String" value="${home}\Downloads"/>
1955 ```
1956 #### macOS
1957 ```
1958 <dict>
1959 <key>DownloadDirectory</key>
1960 <string>${home}/Downloads</string>
1961 </dict>
1962 ```
1963 #### policies.json (macOS and Linux)
1964 ```
1965 {
1966 "policies": {
1967 "DownloadDirectory": "${home}/Downloads"
1968 }
1969 ```
1970 #### policies.json (Windows)
1971 ```
1972 {
1973 "policies": {
1974 "DownloadDirectory": "${home}\\Downloads"
1975 }
1976 ```
1977 ### EnableTrackingProtection
1978 Configure tracking protection.
1979
1980 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1981
1982 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1983
1984 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1985
1986 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1987
1988 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1989
1990 `Exceptions` are origins for which tracking protection is not enabled.
1991
1992 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1993 **CCK2 Equivalent:** N/A\
1994 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1995
1996 #### Windows (GPO)
1997 ```
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2001 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2002 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2003 ```
2004 #### Windows (Intune)
2005 OMA-URI:
2006 ```
2007 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2008 ```
2009 Value (string):
2010 ```
2011 <enabled/>
2012 <data id="TrackingProtectionLocked" value="true | false"/>
2013 <data id="Cryptomining" value="true | false"/>
2014 <data id="Fingerprinting" value="true | false"/>
2015 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2016 ```
2017 #### macOS
2018 ```
2019 <dict>
2020 <key>EnableTrackingProtection</key>
2021 <dict>
2022 <key>Value</key>
2023 <true/> | <false/>
2024 <key><Locked</key>
2025 <true/> | <false/>
2026 <key><Cryptomining</key>
2027 <true/> | <false/>
2028 <key><Fingerprinting</key>
2029 <true/> | <false/>
2030 <key>Exceptions</key>
2031 <array>
2032 <string>https://example.com</string>
2033 </array>
2034 </dict>
2035 </dict>
2036 ```
2037 #### policies.json
2038 ```
2039 {
2040 "policies": {
2041 "EnableTrackingProtection": {
2042 "Value": true | false,
2043 "Locked": true | false,
2044 "Cryptomining": true | false,
2045 "Fingerprinting": true | false,
2046 "Exceptions": ["https://example.com"]
2047 }
2048 }
2049 ```
2050 ### EncryptedMediaExtensions
2051 Enable or disable Encrypted Media Extensions and optionally lock it.
2052
2053 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2054
2055 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2056
2057 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2058 **CCK2 Equivalent:** N/A\
2059 **Preferences Affected:** `media.eme.enabled`
2060
2061 #### Windows (GPO)
2062 ```
2063 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2064 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2065 ```
2066 #### Windows (Intune)
2067 OMA-URI:
2068 ```
2069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2071 ```
2072 Value (string):
2073 ```
2074 <enabled/>or <disabled/>
2075 ```
2076 #### macOS
2077 ```
2078 <dict>
2079 <key>EncryptedMediaExtensions</key>
2080 <dict>
2081 <key>Enabled</key>
2082 <true/> | <false/>
2083 <key><Locked</key>
2084 <true/> | <false/>
2085 </dict>
2086 </dict>
2087 ```
2088 #### policies.json
2089 ```
2090 {
2091 "policies": {
2092 "EncryptedMediaExtensions": {
2093 "Enabled": true | false,
2094 "Locked": true | false
2095 }
2096 }
2097 ```
2098 ### EnterprisePoliciesEnabled
2099 Enable policy support on macOS.
2100
2101 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2102 **CCK2 Equivalent:** N/A\
2103 **Preferences Affected:** N/A
2104
2105 #### macOS
2106 ```
2107 <dict>
2108 <key>EnterprisePoliciesEnabled</key>
2109 <true/>
2110 </dict>
2111 ```
2112 ### Extensions
2113 Control the installation, uninstallation and locking of extensions.
2114
2115 `Install` is a list of URLs or native paths for extensions to be installed.
2116
2117 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2118
2119 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2120
2121 **Compatibility:** Firefox 60, Firefox ESR 60\
2122 **CCK2 Equivalent:** `addons`\
2123 **Preferences Affected:** N/A
2124
2125 #### Windows (GPO)
2126 ```
2127 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2128 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2129 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2130 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2131 ```
2132 #### macOS
2133 ```
2134 <dict>
2135 <key>Extensions</key>
2136 <dict>
2137 <key>Install</key>
2138 <array>
2139 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2140 <string>//path/to/xpi</string>
2141 </array>
2142 <key>Uninstall</key>
2143 <array>
2144 <string>bad_addon_id@mozilla.org</string>
2145 </array>
2146 <key>Locked</key>
2147 <array>
2148 <string>addon_id@mozilla.org</string>
2149 </array>
2150 </dict>
2151 </dict>
2152 ```
2153 #### policies.json
2154 ```
2155 {
2156 "policies": {
2157 "Extensions": {
2158 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2159 "Uninstall": ["bad_addon_id@mozilla.org"],
2160 "Locked": ["addon_id@mozilla.org"]
2161 }
2162 }
2163 }
2164 ```
2165 ### ExtensionSettings
2166 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2167
2168 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2169
2170 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2171
2172 The configuration for each extension is another dictionary that can contain the fields documented below.
2173
2174 | Name | Description |
2175 | --- | --- |
2176 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2177 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2178 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2179 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2180 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2181 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2182 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2183 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2184 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2185 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2186
2187 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2188 **CCK2 Equivalent:** N/A\
2189 **Preferences Affected:** N/A
2190
2191 #### Windows (GPO)
2192 ```
2193 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2194 {
2195 "*": {
2196 "blocked_install_message": "Custom error message.",
2197 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2198 "installation_mode": "blocked",
2199 "allowed_types": ["extension"]
2200 },
2201 "uBlock0@raymondhill.net": {
2202 "installation_mode": "force_installed",
2203 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2204 },
2205 "https-everywhere@eff.org": {
2206 "installation_mode": "allowed",
2207 }
2208 }
2209 ```
2210 #### Windows (Intune)
2211 OMA-URI:
2212 ```
2213 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2214 ```
2215 Value (string):
2216 ```
2217 <enabled/>
2218 <data id="ExtensionSettings" value='
2219 "*": {
2220 "blocked_install_message": "Custom error message.",
2221 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2222 "installation_mode": "blocked",
2223 "allowed_types": ["extension"]
2224 },
2225 "uBlock0@raymondhill.net": {
2226 "installation_mode": "force_installed",
2227 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2228 },
2229 "https-everywhere@eff.org": {
2230 "installation_mode": "allowed",
2231 }'/>
2232 ```
2233 #### macOS
2234 ```
2235 <dict>
2236 <key>ExtensionSettings</key>
2237 <dict>
2238 <key>*</key>
2239 <dict>
2240 <key>blocked_install_message</key>
2241 <string>Custom error message.</string>
2242 <key>install_sources</key>
2243 <array>
2244 <string>about:addons</string>
2245 <string>https://addons.mozilla.org/</string>
2246 </array>
2247 <key>installation_mode</key>
2248 <string>blocked</string>
2249 <key>allowed_types</key>
2250 <array>
2251 <string>extension</string>
2252 </array>
2253 </dict>
2254 <key>uBlock0@raymondhill.net</key>
2255 <dict>
2256 <key>installation_mode</key>
2257 <string>force_installed</string>
2258 <key>install_url</key>
2259 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2260 </dict>
2261 <key>https-everywhere@eff.org</key>
2262 <dict>
2263 <key>installation_mode</key>
2264 <string>allowed</string>
2265 </dict>
2266 </dict>
2267 </dict>
2268 ```
2269 #### policies.json
2270 ```
2271 {
2272 "policies": {
2273 "ExtensionSettings": {
2274 "*": {
2275 "blocked_install_message": "Custom error message.",
2276 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2277 "installation_mode": "blocked",
2278 "allowed_types": ["extension"]
2279 },
2280 "uBlock0@raymondhill.net": {
2281 "installation_mode": "force_installed",
2282 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2283 },
2284 "https-everywhere@eff.org": {
2285 "installation_mode": "allowed"
2286 }
2287 }
2288 }
2289 }
2290 ```
2291 ### ExtensionUpdate
2292 Control extension updates.
2293
2294 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2295 **CCK2 Equivalent:** N/A\
2296 **Preferences Affected:** `extensions.update.enabled`
2297
2298 #### Windows (GPO)
2299 ```
2300 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2301 ```
2302 #### Windows (Intune)
2303 OMA-URI:
2304 ```
2305 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2306 ```
2307 Value (string):
2308 ```
2309 <enabled/> or <disabled/>
2310 ```
2311 #### macOS
2312 ```
2313 <dict>
2314 <key>ExtensionUpdate</key>
2315 <true/> | <false/>
2316 </dict>
2317 ```
2318 #### policies.json
2319 ```
2320 {
2321 "policies": {
2322 "ExtensionUpdate": true | false
2323 }
2324 }
2325 ```
2326 ### FlashPlugin
2327 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2328
2329 `Allow` is a list of origins where Flash are allowed.
2330
2331 `Block` is a list of origins where Flash is not allowed.
2332
2333 `Default` determines whether or not Flash is allowed by default.
2334
2335 `Locked` prevents the user from changing Flash preferences.
2336
2337 **Compatibility:** Firefox 60, Firefox ESR 60\
2338 **CCK2 Equivalent:** `permissions.plugin`\
2339 **Preferences Affected:** `plugin.state.flash`
2340
2341 #### Windows (GPO)
2342 ```
2343 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2344 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2345 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2346 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2347 ```
2348 #### Windows (Intune)
2349 OMA-URI:
2350 ```
2351 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2352 ```
2353 Value (string):
2354 ```
2355 <enabled/>
2356 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2357 ```
2358 OMA-URI:
2359 ```
2360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2361 ```
2362 Value (string):
2363 ```
2364 <enabled/> or <disabled/>
2365 ```
2366 OMA-URI:
2367 ```
2368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2369 ```
2370 Value (string):
2371 ```
2372 <enabled/> or <disabled/>
2373 ```
2374 #### macOS
2375 ```
2376 <dict>
2377 <key>FlashPlugin</key>
2378 <dict>
2379 <key>Allow</key>
2380 <array>
2381 <string>http://example.org</string>
2382 </array>
2383 <key>Block</key>
2384 <array>
2385 <string>http://example.edu</string>
2386 </array>
2387 <key>Default</key>
2388 <true/> | <false/>
2389 <key>Locked</key>
2390 <true/> | <false/>
2391 </dict>
2392 </dict>
2393 ```
2394 #### policies.json
2395 ```
2396 {
2397 "policies": {
2398 "FlashPlugin": {
2399 "Allow": ["http://example.org/"],
2400 "Block": ["http://example.edu/"],
2401 "Default": true | false,
2402 "Locked": true | false
2403 }
2404 }
2405 }
2406 ```
2407
2408
2409
2410 ### Handlers
2411 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2412
2413 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2414
2415 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2416
2417 | Name | Description |
2418 | --- | --- |
2419 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2420 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2421 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2422 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2423 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2424 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2425
2426 **Compatibility:** Firefox 78, Firefox ESR 78\
2427 **CCK2 Equivalent:** N/A\
2428 **Preferences Affected:** N/A
2429
2430 #### Windows (GPO)
2431 ```
2432 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2433 {
2434 "mimeTypes": {
2435 "application/msword": {
2436 "action": "useSystemDefault",
2437 "ask": true | false
2438 }
2439 },
2440 "schemes": {
2441 "mailto": {
2442 "action": "useHelperApp",
2443 "ask": true | false,
2444 "handlers": [{
2445 "name": "Gmail",
2446 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2447 }]
2448 }
2449 },
2450 "extensions": {
2451 "pdf": {
2452 "action": "useHelperApp",
2453 "ask": true | false,
2454 "handlers": [{
2455 "name": "Adobe Acrobat",
2456 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2457 }]
2458 }
2459 }
2460 }
2461 ```
2462 #### Windows (Intune)
2463 OMA-URI:
2464 ```
2465 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2466 ```
2467 Value (string):
2468 ```
2469 <enabled/>
2470 <data id="Handlers" value='
2471 {
2472 "mimeTypes": {
2473 "application/msword": {
2474 "action": "useSystemDefault",
2475 "ask": true | false
2476 }
2477 },
2478 "schemes": {
2479 "mailto": {
2480 "action": "useHelperApp",
2481 "ask": true | false,
2482 "handlers": [{
2483 "name": "Gmail",
2484 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2485 }]
2486 }
2487 },
2488 "extensions": {
2489 "pdf": {
2490 "action": "useHelperApp",
2491 "ask": true | false,
2492 "handlers": [{
2493 "name": "Adobe Acrobat",
2494 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2495 }]
2496 }
2497 }
2498 }
2499 '/>
2500 ```
2501 #### macOS
2502 ```
2503 <dict>
2504 <key>Handlers</key>
2505 <dict>
2506 <key>mimeTypes</key>
2507 <dict>
2508 <key>application/msword</key>
2509 <dict>
2510 <key>action</key>
2511 <string>useSystemDefault</string>
2512 <key>ask</key>
2513 <true/> | <false/>
2514 </dict>
2515 </dict>
2516 <key>schemes</key>
2517 <dict>
2518 <key>mailto</key>
2519 <dict>
2520 <key>action</key>
2521 <string>useHelperApp</string>
2522 <key>ask</key>
2523 <true/> | <false/>
2524 <key>handlers</key>
2525 <array>
2526 <dict>
2527 <key>name</key>
2528 <string>Gmail</string>
2529 <key>uriTemplate</key>
2530 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2531 </dict>
2532 </array>
2533 </dict>
2534 </dict>
2535 <key>extensions</key>
2536 <dict>
2537 <key>pdf</key>
2538 <dict>
2539 <key>action</key>
2540 <string>useHelperApp</string>
2541 <key>ask</key>
2542 <true/> | <false/>
2543 <key>handlers</key>
2544 <array>
2545 <dict>
2546 <key>name</key>
2547 <string>Adobe Acrobat</string>
2548 <key>path</key>
2549 <string>/System/Applications/Preview.app</string>
2550 </dict>
2551 </array>
2552 </dict>
2553 </dict>
2554 </dict>
2555 </dict>
2556 ```
2557 #### policies.json
2558 ```
2559 {
2560 "mimeTypes": {
2561 "application/msword": {
2562 "action": "useSystemDefault",
2563 "ask": false
2564 }
2565 },
2566 "schemes": {
2567 "mailto": {
2568 "action": "useHelperApp",
2569 "ask": true | false,
2570 "handlers": [{
2571 "name": "Gmail",
2572 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2573 }]
2574 }
2575 },
2576 "extensions": {
2577 "pdf": {
2578 "action": "useHelperApp",
2579 "ask": true | false,
2580 "handlers": [{
2581 "name": "Adobe Acrobat",
2582 "path": "/usr/bin/acroread"
2583 }]
2584 }
2585 }
2586 }
2587 ```
2588 ### FirefoxHome
2589 Customize the Firefox Home page.
2590
2591 **Compatibility:** Firefox 68, Firefox ESR 68\
2592 **CCK2 Equivalent:** N/A\
2593 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2594
2595 #### Windows (GPO)
2596 ```
2597 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2598 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2599 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2600 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2601 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2602 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2603 ```
2604 #### Windows (Intune)
2605 OMA-URI:
2606 ```
2607 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2608 ```
2609 Value (string):
2610 ```
2611 <enabled/>
2612 <data id="FirefoxHome_Search" value="true | false"/>
2613 <data id="FirefoxHome_TopSites" value="true | false"/>
2614 <data id="FirefoxHome_Highlights" value="true | false"/>
2615 <data id="FirefoxHome_Pocket" value="true | false"/>
2616 <data id="FirefoxHome_Snippets" value="true | false"/>
2617 <data id="FirefoxHome_Locked" value="true | false"/>
2618 ```
2619 #### macOS
2620 ```
2621 <dict>
2622 <key>FirefoxHome</key>
2623 <dict>
2624 <key>Search</key>
2625 <true/> | <false/>
2626 <key>TopSites</key>
2627 <true/> | <false/>
2628 <key>Highlights</key>
2629 <true/> | <false/>
2630 <key>Pocket</key>
2631 <true/> | <false/>
2632 <key>Snippets</key>
2633 <true/> | <false/>
2634 <key>Locked</key>
2635 <true/> | <false/>
2636 </dict>
2637 </dict>
2638 ```
2639 #### policies.json
2640 ```
2641 {
2642 "policies": {
2643 "FirefoxHome": {
2644 "Search": true | false,
2645 "TopSites": true | false,
2646 "Highlights": true | false,
2647 "Pocket": true | false,
2648 "Snippets": true | false,
2649 "Locked": true | false
2650 }
2651 }
2652 }
2653 ```
2654 ### HardwareAcceleration
2655 Control hardware acceleration.
2656
2657 **Compatibility:** Firefox 60, Firefox ESR 60\
2658 **CCK2 Equivalent:** N/A\
2659 **Preferences Affected:** `layers.acceleration.disabled`
2660
2661 #### Windows (GPO)
2662 ```
2663 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2664 ```
2665 #### Windows (Intune)
2666 OMA-URI:
2667 ```
2668 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2669 ```
2670 Value (string):
2671 ```
2672 <enabled/> or <disabled/>
2673 ```
2674 #### macOS
2675 ```
2676 <dict>
2677 <key>HardwareAcceleration</key>
2678 <true/> | <false/>
2679 </dict>
2680 ```
2681 #### policies.json
2682 ```
2683 {
2684 "policies": {
2685 "HardwareAcceleration": true | false
2686 }
2687 }
2688 ```
2689 ### Homepage
2690 Configure the default homepage and how Firefox starts.
2691
2692 `URL` is the default homepage.
2693
2694 `Locked` prevents the user from changing homepage preferences.
2695
2696 `Additional` allows for more than one homepage.
2697
2698 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2699
2700 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2701
2702 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2703 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2704 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2705
2706 #### Windows (GPO)
2707 ```
2708 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2709 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2710 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2711 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2712 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2713 ```
2714 #### Windows (Intune)
2715 OMA-URI:
2716 ```
2717 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2718 ```
2719 Value (string):
2720 ```
2721 <enabled/>
2722
2723 <data id="HomepageURL" value="https://example.com"/>
2724 <data id="HomepageLocked" value="true | false"/>
2725 ```
2726 OMA-URI:
2727 ```
2728 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2729 ```
2730 Value (string):
2731 ```
2732 <enabled/>
2733
2734 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2735 ```
2736 OMA-URI:
2737 ```
2738 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2739 ```
2740 Value (string):
2741 ```
2742 <enabled/>
2743
2744 <data id="StartPage" value="none | homepage | previous-session"/>
2745 ```
2746 #### macOS
2747 ```
2748 <dict>
2749 <key>Homepage</key>
2750 <dict>
2751 <key>URL</key>
2752 <string>http://example.com</string>
2753 <key>Locked</key>
2754 <true/> | <false/>
2755 <key>Additional</key>
2756 <array>
2757 <string>http://example.org</string>
2758 <string>http://example.edu</string>
2759 </array>
2760 <key>StartPage</key>
2761 <string>none | homepage | previous-session | homepage-locked</string>
2762 </dict>
2763 </dict>
2764 ```
2765 #### policies.json
2766 ```
2767 {
2768 "policies": {
2769 "Homepage": {
2770 "URL": "http://example.com/",
2771 "Locked": true | false,
2772 "Additional": ["http://example.org/",
2773 "http://example.edu/"],
2774 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2775 }
2776 }
2777 }
2778 ```
2779 ### InstallAddonsPermission
2780 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2781
2782 `Allow` is a list of origins where extension installs are allowed.
2783
2784 `Default` determines whether or not extension installs are allowed by default.
2785
2786 **Compatibility:** Firefox 60, Firefox ESR 60\
2787 **CCK2 Equivalent:** `permissions.install`\
2788 **Preferences Affected:** `xpinstall.enabled`
2789
2790 #### Windows (GPO)
2791 ```
2792 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2793 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2794 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2795 ```
2796 #### Windows (Intune)
2797 OMA-URI:
2798 ```
2799 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2800 ```
2801 Value (string):
2802 ```
2803 <enabled/>
2804 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2805 ```
2806 OMA-URI:
2807 ```
2808 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2809 ```
2810 Value (string):
2811 ```
2812 <enabled/>
2813 ```
2814 #### macOS
2815 ```
2816 <dict>
2817 <key>InstallAddonsPermission</key>
2818 <dict>
2819 <key>Allow</key>
2820 <array>
2821 <string>http://example.org</string>
2822 <string>http://example.edu</string>
2823 </array>
2824 <key>Default</key>
2825 <true/> | <false/>
2826 </dict>
2827 </dict>
2828 ```
2829 #### policies.json
2830 ```
2831 {
2832 "policies": {
2833 "InstallAddonsPermission": {
2834 "Allow": ["http://example.org/",
2835 "http://example.edu/"],
2836 "Default": true | false
2837 }
2838 }
2839 }
2840 ```
2841 ### LegacyProfiles
2842 Disable the feature enforcing a separate profile for each installation.
2843
2844 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2845
2846 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2847
2848 This policy only work on Windows via GPO (not policies.json).
2849
2850 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2851 **CCK2 Equivalent:** N/A\
2852 **Preferences Affected:** N/A
2853
2854 #### Windows (GPO)
2855 ```
2856 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2857 ```
2858 #### Windows (Intune)
2859 OMA-URI:
2860 ```
2861 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2862 ```
2863 Value (string):
2864 ```
2865 <enabled/> or <disabled/>
2866 ```
2867 ### LocalFileLinks
2868 Enable linking to local files by origin.
2869
2870 **Compatibility:** Firefox 68, Firefox ESR 68\
2871 **CCK2 Equivalent:** N/A\
2872 **Preferences Affected:** `capability.policy.localfilelinks.*`
2873
2874 #### Windows (GPO)
2875 ```
2876 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2877 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2878 ```
2879 #### Windows (Intune)
2880 OMA-URI:
2881 ```
2882 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2883 ```
2884 Value (string):
2885 ```
2886 <enabled/>
2887 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2888 ```
2889 #### macOS
2890 ```
2891 <dict>
2892 <key>LocalFileLinks</key>
2893 <array>
2894 <string>http://example.org</string>
2895 <string>http://example.edu</string>
2896 </array>
2897 </dict>
2898 ```
2899 #### policies.json
2900 ```
2901 {
2902 "policies": {
2903 "LocalFileLinks": ["http://example.org/",
2904 "http://example.edu/"]
2905 }
2906 }
2907 ```
2908 ### MasterPassword
2909 Require or prevent using a master password.
2910
2911 If this value is true, a master password is required. If this values is false, it works the same as `DisableMasterPasswordCreation` and removes the master password functionality.
2912
2913 **Compatibility:** Firefox 78, Firefox ESR 78\
2914 **CCK2 Equivalent:** `noMasterPassword`\
2915 **Preferences Affected:** N/A
2916
2917 #### Windows (GPO)
2918 ```
2919 Software\Policies\Mozilla\Firefox\MasterPassword = 0x1 | 0x0
2920 ```
2921 #### Windows (Intune)
2922 OMA-URI:
2923 ```
2924 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/MasterPassword
2925 ```
2926 Value (string):
2927 ```
2928 <enabled/> or <disabled/>
2929 ```
2930 #### macOS
2931 ```
2932 <dict>
2933 <key>MasterPassword</key>
2934 <true/> | <false/>
2935 </dict>
2936 ```
2937 #### policies.json
2938 ```
2939 {
2940 "policies": {
2941 "MasterPassword": true | false
2942 }
2943 }
2944 ```
2945 ### NetworkPrediction
2946 Enable or disable network prediction (DNS prefetching).
2947
2948 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2949 **CCK2 Equivalent:** N/A\
2950 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2951
2952 #### Windows (GPO)
2953 ```
2954 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2955 ```
2956 #### Windows (Intune)
2957 OMA-URI:
2958 ```
2959 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2960 ```
2961 Value (string):
2962 ```
2963 <enabled/> or <disabled/>
2964 ```
2965 #### macOS
2966 ```
2967 <dict>
2968 <key>NetworkPrediction</key>
2969 <true/> | <false/>
2970 </dict>
2971 ```
2972 #### policies.json
2973 ```
2974 {
2975 "policies": {
2976 "NetworkPrediction": true | false
2977 }
2978 ```
2979 ### NewTabPage
2980 Enable or disable the New Tab page.
2981
2982 **Compatibility:** Firefox 68, Firefox ESR 68\
2983 **CCK2 Equivalent:** N/A\
2984 **Preferences Affected:** `browser.newtabpage.enabled`
2985
2986 #### Windows (GPO)
2987 ```
2988 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2989 ```
2990 #### Windows (Intune)
2991 OMA-URI:
2992 ```
2993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2994 ```
2995 Value (string):
2996 ```
2997 <enabled/> or <disabled/>
2998 ```
2999 #### macOS
3000 ```
3001 <dict>
3002 <key>NewTabPage</key>
3003 <true/> | <false/>
3004 </dict>
3005 ```
3006 #### policies.json
3007 ```
3008 {
3009 "policies": {
3010 "NewTabPage": true | false
3011 }
3012 ```
3013 ### NoDefaultBookmarks
3014 Disable the creation of default bookmarks.
3015
3016 This policy is only effective if the user profile has not been created yet.
3017
3018 **Compatibility:** Firefox 60, Firefox ESR 60\
3019 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3020 **Preferences Affected:** N/A
3021
3022 #### Windows (GPO)
3023 ```
3024 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3025 ```
3026 #### Windows (Intune)
3027 OMA-URI:
3028 ```
3029 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3030 ```
3031 Value (string):
3032 ```
3033 <enabled/> or <disabled/>
3034 ```
3035 #### macOS
3036 ```
3037 <dict>
3038 <key>NoDefaultBookmarks</key>
3039 <true/> | <false/>
3040 </dict>
3041 ```
3042 #### policies.json
3043 ```
3044 {
3045 "policies": {
3046 "NoDefaultBookmarks": true | false
3047 }
3048 }
3049 ```
3050 ### OfferToSaveLogins
3051 Control whether or not Firefox offers to save passwords.
3052
3053 **Compatibility:** Firefox 60, Firefox ESR 60\
3054 **CCK2 Equivalent:** `dontRememberPasswords`\
3055 **Preferences Affected:** `signon.rememberSignons`
3056
3057 #### Windows (GPO)
3058 ```
3059 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3060 ```
3061 #### Windows (Intune)
3062 OMA-URI:
3063 ```
3064 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3065 ```
3066 Value (string):
3067 ```
3068 <enabled/> or <disabled/>
3069 ```
3070 #### macOS
3071 ```
3072 <dict>
3073 <key>OfferToSaveLogins</key>
3074 <true/> | <false/>
3075 </dict>
3076 ```
3077 #### policies.json
3078 ```
3079 {
3080 "policies": {
3081 "OfferToSaveLogins": true | false
3082 }
3083 }
3084 ```
3085 ### OfferToSaveLoginsDefault
3086 Sets the default value of signon.rememberSignons without locking it.
3087
3088 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3089 **CCK2 Equivalent:** `dontRememberPasswords`\
3090 **Preferences Affected:** `signon.rememberSignons`
3091
3092 #### Windows (GPO)
3093 ```
3094 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3095 ```
3096 #### Windows (Intune)
3097 OMA-URI:
3098 ```
3099 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3100 ```
3101 Value (string):
3102 ```
3103 <enabled/> or <disabled/>
3104 ```
3105 #### macOS
3106 ```
3107 <dict>
3108 <key>OfferToSaveLoginsDefault</key>
3109 <true/> | <false/>
3110 </dict>
3111 ```
3112 #### policies.json
3113 ```
3114 {
3115 "policies": {
3116 "OfferToSaveLoginsDefault": true | false
3117 }
3118 }
3119 ```
3120 ### OverrideFirstRunPage
3121 Override the first run page. If the value is blank, no first run page is displayed.
3122
3123 **Compatibility:** Firefox 60, Firefox ESR 60\
3124 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3125 **Preferences Affected:** `startup.homepage_welcome_url`
3126
3127 #### Windows (GPO)
3128 ```
3129 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3130 ```
3131 #### Windows (Intune)
3132 OMA-URI:
3133 ```
3134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3135 ```
3136 Value (string):
3137 ```
3138 <enabled/>
3139 <data id="OverridePage" value="https://example.com"/>
3140 ```
3141 #### macOS
3142 ```
3143 <dict>
3144 <key>OverrideFirstRunPage</key>
3145 <string>http://example.org</string>
3146 </dict>
3147 ```
3148 #### policies.json
3149 ```
3150 {
3151 "policies": {
3152 "OverrideFirstRunPage": "http://example.org"
3153 }
3154 ```
3155 ### OverridePostUpdatePage
3156 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3157
3158 **Compatibility:** Firefox 60, Firefox ESR 60\
3159 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3160 **Preferences Affected:** `startup.homepage_override_url`
3161
3162 #### Windows (GPO)
3163 ```
3164 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3165 ```
3166 #### Windows (Intune)
3167 OMA-URI:
3168 ```
3169 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3170 ```
3171 Value (string):
3172 ```
3173 <enabled/>
3174 <data id="OverridePage" value="https://example.com"/>
3175 ```
3176 #### macOS
3177 ```
3178 <dict>
3179 <key>OverridePostUpdatePage</key>
3180 <string>http://example.org</string>
3181 </dict>
3182 ```
3183 #### policies.json
3184 ```
3185 {
3186 "policies": {
3187 "OverridePostUpdatePage": "http://example.org"
3188 }
3189 ```
3190 ### PasswordManagerEnabled
3191 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3192
3193 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3194 **CCK2 Equivalent:** N/A\
3195 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3196
3197 #### Windows (GPO)
3198 ```
3199 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3200 ```
3201 #### Windows (Intune)
3202 OMA-URI:
3203 ```
3204 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3205 ```
3206 Value (string):
3207 ```
3208 <enabled/> or <disabled/>
3209 ```
3210 #### macOS
3211 ```
3212 <dict>
3213 <key>PasswordManagerEnabled</key>
3214 <true/> | <false/>
3215 </dict>
3216 ```
3217 #### policies.json
3218 ```
3219 {
3220 "policies": {
3221 "PasswordManagerEnabled": true | false
3222 }
3223 }
3224 ```
3225 ### PDFjs
3226 Disable or configure PDF.js, the built-in PDF viewer.
3227
3228 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3229
3230 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3231
3232 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3233
3234 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3235 **CCK2 Equivalent:** N/A\
3236 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3237
3238 #### Windows (GPO)
3239 ```
3240 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3241 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3242 ```
3243 #### Windows (Intune)
3244 OMA-URI:
3245 ```
3246 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3248 ```
3249 Value (string):
3250 ```
3251 <enabled/>or <disabled/>
3252 ```
3253 #### macOS
3254 ```
3255 <dict>
3256 <key>PDFjs</key>
3257 <dict>
3258 <key>Enabled</key>
3259 <true/> | <false/>
3260 <key><EnablePermissions</key>
3261 <true/> | <false/>
3262 </dict>
3263 </dict>
3264 ```
3265 #### policies.json
3266 ```
3267 {
3268 "policies": {
3269 "PSFjs": {
3270 "Enabled": true | false,
3271 "EnablePermissions": true | false
3272 }
3273 }
3274 ```
3275 ### Permissions
3276 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3277
3278 `Allow` is a list of origins where the feature is allowed.
3279
3280 `Block` is a list of origins where the feature is not allowed.
3281
3282 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3283
3284 `Locked` prevents the user from changing preferences for the feature.
3285
3286 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3287
3288 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3289 **CCK2 Equivalent:** N/A\
3290 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3291
3292 #### Windows (GPO)
3293 ```
3294 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3295 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3296 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3297 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3298 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3299 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3300 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3301 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3302 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3303 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3304 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3305 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3306 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3307 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3308 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3309 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3310 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3311 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3312 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3313 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3314 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3315 ```
3316 #### Windows (Intune)
3317 OMA-URI:
3318 ```
3319 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3320 ```
3321 Value (string):
3322 ```
3323 <enabled/> or <disabled/>
3324 ```
3325 OMA-URI:
3326 ```
3327 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3328 ```
3329 Value (string):
3330 ```
3331 <enabled/> or <disabled/>
3332 ```
3333 OMA-URI:
3334 ```
3335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3336 ```
3337 Value (string):
3338 ```
3339 <enabled/>
3340 <data id="Permissions" value="1&#xF000;https://example.org"/>
3341 ```
3342 OMA-URI:
3343 ```
3344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3345 ```
3346 Value (string):
3347 ```
3348 <enabled/> or <disabled/>
3349 ```
3350 OMA-URI:
3351 ```
3352 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3353 ```
3354 Value (string):
3355 ```
3356 <enabled/> or <disabled/>
3357 ```
3358 OMA-URI:
3359 ```
3360 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3361 ```
3362 Value (string):
3363 ```
3364 <enabled/>
3365 <data id="Permissions" value="1&#xF000;https://example.org"/>
3366 ```
3367 OMA-URI:
3368 ```
3369 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3370 ```
3371 Value (string):
3372 ```
3373 <enabled/>
3374 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3375 ```
3376 OMA-URI:
3377 ```
3378 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3379 ```
3380 Value (string):
3381 ```
3382 <enabled/>
3383 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3384 ```
3385 OMA-URI:
3386 ```
3387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3388 ```
3389 Value (string):
3390 ```
3391 <enabled/> or <disabled/>
3392 ```
3393 #### macOS
3394 ```
3395 <dict>
3396 <key>Permissions</key>
3397 <dict>
3398 <key>Camera</key>
3399 <dict>
3400 <key>Allow</key>
3401 <array>
3402 <string>https://example.org</string>
3403 <string>https://example.org:1234</string>
3404 </array>
3405 <key>Block</key>
3406 <array>
3407 <string>https://example.edu</string>
3408 </array>
3409 <key>BlockNewRequests</key>
3410 <true/> | <false/>
3411 <key>Locked</key>
3412 <true/> | <false/>
3413 </dict>
3414 <key>Microphone</key>
3415 <dict>
3416 <key>Allow</key>
3417 <array>
3418 <string>https://example.org</string>
3419 </array>
3420 <key>Block</key>
3421 <array>
3422 <string>https://example.edu</string>
3423 </array>
3424 <key>BlockNewRequests</key>
3425 <true/> | <false/>
3426 <key>Locked</key>
3427 <true/> | <false/>
3428 </dict>
3429 <key>Location</key>
3430 <dict>
3431 <key>Allow</key>
3432 <array>
3433 <string>https://example.org</string>
3434 </array>
3435 <key>Block</key>
3436 <array>
3437 <string>https://example.edu</string>
3438 </array>
3439 <key>BlockNewRequests</key>
3440 <true/> | <false/>
3441 <key>Locked</key>
3442 <true/> | <false/>
3443 </dict>
3444 <key>Notifications</key>
3445 <dict>
3446 <key>Allow</key>
3447 <array>
3448 <string>https://example.org</string>
3449 </array>
3450 <key>Block</key>
3451 <array>
3452 <string>https://example.edu</string>
3453 </array>
3454 <key>BlockNewRequests</key>
3455 <true/>
3456 <key>Locked</key>
3457 <true/>
3458 </dict>
3459 <key>Autoplay</key>
3460 <dict>
3461 <key>Allow</key>
3462 <array>
3463 <string>https://example.org</string>
3464 </array>
3465 <key>Block</key>
3466 <array>
3467 <string>https://example.edu</string>
3468 </array>
3469 <key>Default</key>
3470 <string>allow-audio-video | block-audio | block-audio-video</string>
3471 <key>Locked</key>
3472 <true/> | <false/>
3473 </dict>
3474 </dict>
3475 </dict>
3476 ```
3477 #### policies.json
3478 ```
3479 {
3480 "policies": {
3481 "Permissions": {
3482 "Camera": {
3483 "Allow": ["https://example.org","https://example.org:1234"],
3484 "Block": ["https://example.edu"],
3485 "BlockNewRequests": true | false,
3486 "Locked": true | false
3487 },
3488 "Microphone": {
3489 "Allow": ["https://example.org"],
3490 "Block": ["https://example.edu"],
3491 "BlockNewRequests": true | false,
3492 "Locked": true | false
3493 },
3494 "Location": {
3495 "Allow": ["https://example.org"],
3496 "Block": ["https://example.edu"],
3497 "BlockNewRequests": true | false,
3498 "Locked": true | false
3499 },
3500 "Notifications": {
3501 "Allow": ["https://example.org"],
3502 "Block": ["https://example.edu"],
3503 "BlockNewRequests": true | false,
3504 "Locked": true | false
3505 },
3506 "Autoplay": {
3507 "Allow": ["https://example.org"],
3508 "Block": ["https://example.edu"],
3509 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3510 "Locked": true | false
3511 }
3512 }
3513 }
3514 }
3515 ```
3516 ### PictureInPicture
3517
3518 Enable or disable Picture-in-Picture.
3519
3520 **Compatibility:** Firefox 78, Firefox ESR 78\
3521 **CCK2 Equivalent:** N/A\
3522 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3523
3524 #### Windows (GPO)
3525 ```
3526 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3527 ```
3528 #### Windows (Intune)
3529 OMA-URI:
3530 ```
3531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3532 ```
3533 Value (string):
3534 ```
3535 <enabled/> or <disabled/>
3536 ```
3537 #### macOS
3538 ```
3539 <dict>
3540 <key>PictureInPicture</key>
3541 <true/> | <false/>
3542 </dict>
3543 ```
3544 #### policies.json
3545 ```
3546 {
3547 "policies": {
3548 "PictureInPicture": true | false
3549 }
3550 }
3551 ```
3552 ### PopupBlocking
3553 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3554
3555 `Allow` is a list of origins where popup-windows are allowed.
3556
3557 `Default` determines whether or not pop-up windows are allowed by default.
3558
3559 `Locked` prevents the user from changing pop-up preferences.
3560
3561 **Compatibility:** Firefox 60, Firefox ESR 60\
3562 **CCK2 Equivalent:** `permissions.popup`\
3563 **Preferences Affected:** `dom.disable_open_during_load`
3564
3565 #### Windows (GPO)
3566 ```
3567 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3568 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3569 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3570 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3571 ```
3572 #### Windows (Intune)
3573 OMA-URI:
3574 ```
3575 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3576 ```
3577 Value (string):
3578 ```
3579 <enabled/>
3580 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3581 ```
3582 OMA-URI:
3583 ```
3584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3585 ```
3586 Value (string):
3587 ```
3588 <enabled/> or <disabled/>
3589 ```
3590 OMA-URI:
3591 ```
3592 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3593 ```
3594 Value (string):
3595 ```
3596 <enabled/> or <disabled/>
3597 ```
3598 #### macOS
3599 ```
3600 <dict>
3601 <key>PopupBlocking</key>
3602 <dict>
3603 <key>Allow</key>
3604 <array>
3605 <string>http://example.org</string>
3606 <string>http://example.edu</string>
3607 </array>
3608 <key>Default</key>
3609 <true/> | <false/>
3610 <key>Locked</key>
3611 <true/> | <false/>
3612 </dict>
3613 </dict>
3614 ```
3615 #### policies.json
3616 ```
3617 {
3618 "policies": {
3619 "PopupBlocking": {
3620 "Allow": ["http://example.org/",
3621 "http://example.edu/"],
3622 "Default": true | false,
3623 "Locked": true | false
3624 }
3625 }
3626 }
3627 ```
3628 ### Preferences
3629 Set and lock certain preferences.
3630
3631 **Compatibility:** See below\
3632 **CCK2 Equivalent:** `preferences`\
3633 **Preferences Affected:** See below
3634
3635 | Preference | Type | Compatibility | Default
3636 | --- | --- | --- | ---
3637 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3639 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3640 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3641 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3643 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3644 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3645 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3647 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3648 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3649 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3650 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3651 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3653 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3655 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3657 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3659 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3661 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3663 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3665 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3667 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3668 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3669 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3670 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3671 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3673 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3675 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3676 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3677 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3678 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3679 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3680 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3681 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3682 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3683 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3684 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3685 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3686 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3687 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3688 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3689 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3691 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3693 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3695 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3696 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3697 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3698 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3699 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3700 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3701 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3702 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3703 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3704 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3705 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3706 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3707 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3708 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3709 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3710 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3711 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3712 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3713 disabled
3714 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3716 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3718 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3719 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3720 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3721 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3722 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3723 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3724 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3725 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3726 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3727 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3728 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3729 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3730 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3731 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3732 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3733 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3734 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3735 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3736 #### Windows (GPO)
3737 ```
3738 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3739 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3740 ```
3741 #### Windows (Intune)
3742 OMA-URI: (periods are replaced by underscores)
3743 ```
3744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3745 ```
3746 Value (string):
3747 ```
3748 <enabled/> or <disabled/>
3749 ```
3750 #### macOS
3751 ```
3752 <dict>
3753 <key>Preferences</key>
3754 <dict>
3755 <key>boolean_preference_name</key>
3756 <true/> | <false/>
3757 <key>string_preference_name</key>
3758 <string>string_value</string>
3759 </dict>
3760 </dict>
3761 ```
3762 #### policies.json
3763 ```
3764 {
3765 "policies": {
3766 "Preferences": {
3767 "boolean_preference_name": true | false,
3768 "string_preference_name": "string_value"
3769 }
3770 }
3771 }
3772 ```
3773 ### PromptForDownloadLocation
3774 Ask where to save each file before downloading.
3775
3776 **Compatibility:** Firefox 68, Firefox ESR 68\
3777 **CCK2 Equivalent:** N/A\
3778 **Preferences Affected:** `browser.download.useDownloadDir`
3779
3780 #### Windows (GPO)
3781 ```
3782 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3783 ```
3784 #### Windows (Intune)
3785 OMA-URI:
3786 ```
3787 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3788 ```
3789 Value (string):
3790 ```
3791 <enabled/> or <disabled/>
3792 ```
3793 #### macOS
3794 ```
3795 <dict>
3796 <key>PromptForDownloadLocation</key>
3797 <true/> | <false/>
3798 </dict>
3799 ```
3800 #### policies.json
3801 ```
3802 {
3803 "policies": {
3804 "PromptForDownloadLocation": true | false
3805 }
3806 }
3807 ```
3808 ### Proxy
3809 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3810 To specify ports, append them to the hostnames with a colon (:).
3811
3812 `Mode` is the proxy method being used.
3813
3814 `Locked` is whether or not proxy settings can be changed.
3815
3816 `HTTPProxy` is the HTTP proxy server.
3817
3818 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3819
3820 `SSLProxy` is the SSL proxy server.
3821
3822 `FTPProxy` is the FTP proxy server.
3823
3824 `SOCKSProxy` is the SOCKS proxy server
3825
3826 `SOCKSVersion` is the SOCKS version (4 or 5)
3827
3828 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3829
3830 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3831
3832 `AutoLogin` means do not prompt for authentication if password is saved.
3833
3834 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3835
3836 **Compatibility:** Firefox 60, Firefox ESR 60\
3837 **CCK2 Equivalent:** `networkProxy*`\
3838 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3839
3840 #### Windows (GPO)
3841 ```
3842 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3843 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3844 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3845 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3846 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3847 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3848 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3849 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3850 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3851 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3852 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3853 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3854 ```
3855 #### Windows (Intune)
3856 OMA-URI:
3857 ```
3858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3859 ```
3860 Value (string):
3861 ```
3862 <enabled/>
3863 <data id="ProxyLocked" value="true | false"/>
3864 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3865 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3866 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3867 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3868 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3869 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3870 <data id="SOCKSVersion" value="4 | 5"/>
3871 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3872 <data id="Passthrough" value="<local>"/>
3873 <data id="AutoLogin" value="true | false"/>
3874 <data id="UseProxyForDNS" value="true | false"/>
3875 ```
3876 #### macOS
3877 ```
3878 <dict>
3879 <key>Proxy</key>
3880 <dict>
3881 <key>Mode</key>
3882 <string>none | system | manual | autoDetect | autoConfig</string>
3883 <key>Locked</key>
3884 <true> | </false>
3885 <key>HTTPProxy</key>
3886 <string>https://httpproxy.example.com</string>
3887 <key>UseHTTPProxyForAllProtocols</key>
3888 <true> | </false>
3889 <key>SSLProxy</key>
3890 <string>https://sslproxy.example.com</string>
3891 <key>FTPProxy</key>
3892 <string>https://ftpproxy.example.com</string>
3893 <key>SOCKSProxy</key>
3894 <string>https://socksproxy.example.com</string>
3895 <key>SOCKSVersion</key>
3896 <string>4 | 5</string>
3897 <key>Passthrough</key>
3898 <string>&lt;local>&gt;</string>
3899 <key>AutoConfigURL</key>
3900 <string>URL_TO_AUTOCONFIG</string>
3901 <key>AutoLogin</key>
3902 <true> | </false>
3903 <key>UseProxyForDNS</key>
3904 <true> | </false>
3905 </dict>
3906 </dict>
3907 ```
3908 #### policies.json
3909 ```
3910 {
3911 "policies": {
3912 "Proxy": {
3913 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3914 "Locked": true | false,
3915 "HTTPProxy": "hostname",
3916 "UseHTTPProxyForAllProtocols": true | false,
3917 "SSLProxy": "hostname",
3918 "FTPProxy": "hostname",
3919 "SOCKSProxy": "hostname",
3920 "SOCKSVersion": 4 | 5
3921 "Passthrough": "<local>",
3922 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3923 "AutoLogin": true | false,
3924 "UseProxyForDNS": true | false
3925 }
3926 }
3927 }
3928 ```
3929 ### RequestedLocales
3930 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3931
3932 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3933
3934 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3935 **CCK2 Equivalent:** N/A\
3936 **Preferences Affected:** N/A
3937 #### Windows (GPO)
3938 ```
3939 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3940 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3941
3942 or
3943
3944 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3945 ```
3946 #### Windows (Intune)
3947 OMA-URI:
3948 ```
3949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3950 ```
3951 Value (string):
3952 ```
3953 <enabled/>
3954 <data id="Preferences_String" value="de,en-US"/>
3955 ```
3956 #### macOS
3957 ```
3958 <dict>
3959 <key>RequestedLocales</key>
3960 <array>
3961 <string>de</string>
3962 <string>en-US</string>
3963 </array>
3964 </dict>
3965
3966 or
3967
3968 <dict>
3969 <key>RequestedLocales</key>
3970 <string>de,en-US</string>
3971 </dict>
3972
3973 ```
3974 #### policies.json
3975 ```
3976 {
3977 "policies": {
3978 "RequestedLocales": ["de", "en-US"]
3979 }
3980 }
3981
3982 or
3983
3984 {
3985 "policies": {
3986 "RequestedLocales": "de,en-US"
3987 }
3988 }
3989 ```
3990 <a name="SanitizeOnShutdown"></a>
3991
3992 ### SanitizeOnShutdown (Selective)
3993 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3994
3995 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3996
3997 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3998 **CCK2 Equivalent:** N/A\
3999 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4000 #### Windows (GPO)
4001 ```
4002 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4003 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4004 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4005 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4006 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4007 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4008 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4009 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4010 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4011 ```
4012 #### Windows (Intune)
4013 OMA-URI:
4014 ```
4015 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4016 ```
4017 Value (string):
4018 ```
4019 <enabled/> or <disabled/>
4020 ```
4021 #### macOS
4022 ```
4023 <dict>
4024 <key>SanitizeOnShutdown</key>
4025 <dict>
4026 <key>Cache</key>
4027 <true/> | <false/>
4028 <key>Cookies</key>
4029 <true/> | <false/>
4030 <key>Downloads</key>
4031 <true/> | <false/>
4032 <key>FormData</key>
4033 <true/> | <false/>
4034 <key>History</key>
4035 <true/> | <false/>
4036 <key>Sessions</key>
4037 <true/> | <false/>
4038 <key>SiteSettings</key>
4039 <true/> | <false/>
4040 <key>OfflineApps</key>
4041 <true/> | <false/>
4042 <key>Locked</key>
4043 <true/> | <false/>
4044 </dict>
4045 </dict>
4046 ```
4047 #### policies.json
4048 ```
4049 {
4050 "policies": {
4051 "SanitizeOnShutdown": {
4052 "Cache": true | false,
4053 "Cookies": true | false,
4054 "Downloads": true | false,
4055 "FormData": true | false,
4056 "History": true | false,
4057 "Sessions": true | false,
4058 "SiteSettings": true | false,
4059 "OfflineApps": true | false,
4060 "Locked": true | false
4061 }
4062 }
4063 }
4064 ```
4065 ### SanitizeOnShutdown (All)
4066 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4067
4068 **Compatibility:** Firefox 60, Firefox ESR 60\
4069 **CCK2 Equivalent:** N/A\
4070 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4071 #### Windows (GPO)
4072 ```
4073 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4074 ```
4075 #### Windows (Intune)
4076 OMA-URI:
4077 ```
4078 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4079 ```
4080 Value (string):
4081 ```
4082 <enabled/> or <disabled/>
4083 ```
4084 #### macOS
4085 ```
4086 <dict>
4087 <key>SanitizeOnShutdown</key>
4088 <true/> | <false/>
4089 </dict>
4090 ```
4091 #### policies.json
4092 ```
4093 {
4094 "policies": {
4095 "SanitizeOnShutdown": true | false
4096 }
4097 }
4098 ```
4099 ### SearchBar
4100 Set whether or not search bar is displayed.
4101
4102 **Compatibility:** Firefox 60, Firefox ESR 60\
4103 **CCK2 Equivalent:** `showSearchBar`\
4104 **Preferences Affected:** N/A
4105
4106 #### Windows (GPO)
4107 ```
4108 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4109 ```
4110
4111 #### Windows (Intune)
4112 OMA-URI:
4113 ```
4114 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4115 ```
4116 Value (string):
4117 ```
4118 <enabled/>
4119 <data id="Permissions" value="unified | separate"/>
4120 ```
4121 #### macOS
4122 ```
4123 <dict>
4124 <key>SearchBar</key>
4125 <string>unified | separate</string>
4126 </dict>
4127 ```
4128 #### policies.json
4129 ```
4130 {
4131 "policies": {
4132 "SearchBar": "unified" | "separate"
4133 }
4134 }
4135 ```
4136 <a name="SearchEngines"></a>
4137
4138 ### SearchEngines (This policy is only available on the ESR.)
4139
4140 ### SearchEngines | Default
4141
4142 Set the default search engine. This policy is only available on the ESR.
4143
4144 **Compatibility:** Firefox ESR 60\
4145 **CCK2 Equivalent:** `defaultSearchEngine`\
4146 **Preferences Affected:** N/A
4147
4148 #### Windows (GPO)
4149 ```
4150 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4151 ```
4152 #### Windows (Intune)
4153 OMA-URI:
4154 ```
4155 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4156 ```
4157 Value (string):
4158 ```
4159 <enabled/>
4160 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4161 ```
4162 #### macOS
4163 ```
4164 <dict>
4165 <key>SearchEngines</key>
4166 <dict>
4167 <key>Default</key>
4168 <string>NAME_OF_SEARCH_ENGINE</string>
4169 </dict>
4170 </dict>
4171 ```
4172 #### policies.json
4173 ```
4174 {
4175 "policies": {
4176 "SearchEngines": {
4177 "Default": "NAME_OF_SEARCH_ENGINE"
4178 }
4179 }
4180 }
4181 ```
4182 ### SearchEngines | PreventInstalls
4183
4184 Prevent installing search engines from webpages.
4185
4186 **Compatibility:** Firefox ESR 60\
4187 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4188 **Preferences Affected:** N/A
4189
4190 #### Windows (GPO)
4191 ```
4192 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4193 ```
4194 #### Windows (Intune)
4195 OMA-URI:
4196 ```
4197 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4198 ```
4199 Value (string):
4200 ```
4201 <enabled/> or <disabled/>
4202 ```
4203 #### macOS
4204 ```
4205 <dict>
4206 <key>SearchEngines</key>
4207 <dict>
4208 <key>PreventInstalls</key>
4209 <true/> | <false/>
4210 </dict>
4211 </dict>
4212 ```
4213 #### policies.json
4214 ```
4215 {
4216 "policies": {
4217 "SearchEngines": {
4218 "PreventInstalls": true | false
4219 }
4220 }
4221 }
4222 ```
4223 ### SearchEngines | Remove
4224
4225 Hide built-in search engines. This policy is only available on the ESR.
4226
4227 **Compatibility:** Firefox ESR 60.2\
4228 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4229 **Preferences Affected:** N/A
4230
4231 #### Windows (GPO)
4232 ```
4233 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4234 ```
4235 #### Windows (Intune)
4236 OMA-URI:
4237 ```
4238 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4239 ```
4240 Value (string):
4241 ```
4242 <enabled/>
4243 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4244 ```
4245 #### macOS
4246 ```
4247 <dict>
4248 <key>SearchEngines</key>
4249 <dict>
4250 <key>Remove</key>
4251 <array>
4252 <string>NAME_OF_SEARCH_ENGINE</string>
4253 </array>
4254 </dict>
4255 </dict>
4256 ```
4257 #### policies.json
4258 ```
4259 {
4260 "policies": {
4261 "SearchEngines": {
4262 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4263 }
4264 }
4265 }
4266 ```
4267 ### SearchEngines | Add
4268
4269 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4270
4271 `Name` is the name of the search engine.
4272
4273 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4274
4275 `Method` is either GET or POST
4276
4277 `IconURL` is a URL for the icon to use.
4278
4279 `Alias` is a keyword to use for the engine.
4280
4281 `Description` is a description of the search engine.
4282
4283 `PostData` is the POST data as name value pairs separated by &.
4284
4285 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4286
4287 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4288 **CCK2 Equivalent:** `searchplugins`\
4289 **Preferences Affected:** N/A
4290
4291 #### Windows (GPO)
4292 ```
4293 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4294 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4295 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4296 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4297 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4298 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4299 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4300 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4301 ```
4302 #### Windows (Intune)
4303 OMA-URI:
4304 ```
4305 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4306 ```
4307 Value (string):
4308 ```
4309 <enabled/>
4310 <data id="SearchEngine_Name" value="Example1"/>
4311 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4312 <data id="SearchEngine_Method" value="GET | POST"/>
4313 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4314 <data id="SearchEngine_Alias" value="example"/>
4315 <data id="SearchEngine_Description" value="Example Description"/>
4316 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4317 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4318 ```
4319 #### macOS
4320 ```
4321 <dict>
4322 <key>SearchEngines</key>
4323 <dict>
4324 <key>Add</key>
4325 <array>
4326 <dict>
4327 <key>Name</key>
4328 <string>Example1</string>
4329 <key>URLTemplate</key>
4330 <string>https://www.example.org/q={searchTerms}</string>
4331 <key>Method</key>
4332 <string>GET | POST </string>
4333 <key>IconURL</key>
4334 <string>https://www.example.org/favicon.ico</string>
4335 <key>Alias</key>
4336 <string>example</string>
4337 <key>Description</key>
4338 <string>Example Description</string>
4339 <key>SuggestURLTemplate</key>
4340 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4341 <key>PostData</key>
4342 <string>name=value&q={searchTerms}</string>
4343 </dict>
4344 <array>
4345 </dict>
4346 </dict>
4347 ```
4348 #### policies.json
4349 ```
4350 {
4351 "policies": {
4352 "SearchEngines": {
4353 "Add": [
4354 {
4355 "Name": "Example1",
4356 "URLTemplate": "https://www.example.org/q={searchTerms}",
4357 "Method": "GET" | "POST",
4358 "IconURL": "https://www.example.org/favicon.ico",
4359 "Alias": "example",
4360 "Description": "Description",
4361 "PostData": "name=value&q={searchTerms}",
4362 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4363 }
4364 ]
4365 }
4366 }
4367 }
4368 ```
4369 ### SearchSuggestEnabled
4370
4371 Enable search suggestions.
4372
4373 **Compatibility:** Firefox 68, Firefox ESR 68\
4374 **CCK2 Equivalent:** N/A\
4375 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4376
4377 #### Windows (GPO)
4378 ```
4379 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4380 ```
4381 #### Windows (Intune)
4382 OMA-URI:
4383 ```
4384 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4385 ```
4386 Value (string):
4387 ```
4388 <enabled/> or <disabled/>
4389 ```
4390 #### macOS
4391 ```
4392 <dict>
4393 <key>SearchSuggestEnabled</key>
4394 <true/> | <false/>
4395 </dict>
4396 ```
4397 #### policies.json
4398 ```
4399 {
4400 "policies": {
4401 "SearchSuggestEnabled": true | false
4402 }
4403 }
4404 ```
4405 ### SecurityDevices
4406
4407 Install PKCS #11 modules.
4408
4409 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4410 **CCK2 Equivalent:** `certs.devices`\
4411 **Preferences Affected:** N/A
4412
4413 #### Windows (GPO)
4414 ```
4415 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4416 ```
4417 #### Windows (Intune)
4418 OMA-URI:
4419 ```
4420 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4421 ```
4422 Value (string):
4423 ```
4424 <enabled/>
4425 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4426 ```
4427 #### macOS
4428 ```
4429 <dict>
4430 <key>SecurityDevices</key>
4431 <dict>
4432 <key>NAME_OF_DEVICE</key>
4433 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4434 </dict>
4435 </dict>
4436 ```
4437
4438 #### policies.json
4439 ```
4440 {
4441 "policies": {
4442 "SecurityDevices": {
4443 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4444 }
4445 }
4446 }
4447 ```
4448 ### SSLVersionMax
4449
4450 Set and lock the maximum version of TLS.
4451
4452 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4453 **CCK2 Equivalent:** N/A\
4454 **Preferences Affected:** `security.tls.version.max`
4455
4456 #### Windows (GPO)
4457 ```
4458 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4459 ```
4460 #### Windows (Intune)
4461 OMA-URI:
4462 ```
4463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4464 ```
4465 Value (string):
4466 ```
4467 <enabled/>
4468 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4469 ```
4470 #### macOS
4471 ```
4472 <dict>
4473 <key>SSLVersionMax</key>
4474 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4475 </dict>
4476 ```
4477
4478 #### policies.json
4479 ```
4480 {
4481 "policies": {
4482 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4483 }
4484 }
4485 ```
4486 ### SSLVersionMin
4487
4488 Set and lock the minimum version of TLS.
4489
4490 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4491 **CCK2 Equivalent:** N/A\
4492 **Preferences Affected:** `security.tls.version.min`
4493
4494 #### Windows (GPO)
4495 ```
4496 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4497 ```
4498 #### Windows (Intune)
4499 OMA-URI:
4500 ```
4501 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4502 ```
4503 Value (string):
4504 ```
4505 <enabled/>
4506 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4507 ```
4508 #### macOS
4509 ```
4510 <dict>
4511 <key>SSLVersionMin</key>
4512 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4513 </dict>
4514 ```
4515
4516 #### policies.json
4517 ```
4518 {
4519 "policies": {
4520 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4521 }
4522 }
4523 ```
4524 ### SupportMenu
4525 Add a menuitem to the help menu for specifying support information.
4526
4527 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4528 **CCK2 Equivalent:** helpMenu\
4529 **Preferences Affected:** N/A
4530
4531 #### Windows (GPO)
4532 ```
4533 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4534 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4535 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4536 ```
4537 #### Windows (Intune)
4538 OMA-URI:
4539 ```
4540 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4541 ```
4542 Value (string):
4543 ```
4544 <enabled/>
4545 <data id="SupportMenuTitle" value="Support Menu"/>
4546 <data id="SupportMenuURL" value="http://example.com/support"/>
4547 <data id="SupportMenuAccessKey" value="S">
4548 ```
4549 #### macOS
4550 ```
4551 <dict>
4552 <key>SupportMenu</key>
4553 <dict>
4554 <key>Title</key>
4555 <string>SupportMenu</string>
4556 <key>URL</key>
4557 <string>http://example.com/support</string>
4558 <key>AccessKey</key>
4559 <string>S</string>
4560 </dict>
4561 </dict>
4562 ```
4563 #### policies.json
4564 ```
4565 {
4566 "policies": {
4567 "SupportMenu": {
4568 "Title": "Support Menu",
4569 "URL": "http://example.com/support",
4570 "AccessKey": "S"
4571 }
4572 }
4573 }
4574 ```
4575 ### UserMessaging
4576
4577 Prevent installing search engines from webpages.
4578
4579 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4580
4581 `ExtensionRecommendations` Don't recommend extensions.
4582
4583 `FeatureRecommendations` Don't recommend browser features.
4584
4585 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4586
4587 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4588 **CCK2 Equivalent:** N/A\
4589 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4590
4591 #### Windows (GPO)
4592 ```
4593 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4594 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4595 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4596 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4597 ```
4598 #### Windows (Intune)
4599 OMA-URI:
4600 ```
4601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4604 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4605 ```
4606 Value (string):
4607 ```
4608 <enabled/> or <disabled/>
4609 ```
4610 #### macOS
4611 ```
4612 <dict>
4613 <key>UserMessaging</key>
4614 <dict>
4615 <key>WhatsNew</key>
4616 <true/> | <false/>
4617 <key>ExtensionRecommendations</key>
4618 <true/> | <false/>
4619 <key>FeatureRecommendations</key>
4620 <true/> | <false/>
4621 <key>UrlbarInterventions</key>
4622 <true/> | <false/>
4623 </dict>
4624 </dict>
4625 ```
4626 #### policies.json
4627 ```
4628 {
4629 "policies": {
4630 "UserMessaging": {
4631 "WhatsNew": true | false,
4632 "ExtensionRecommendations": true | false,
4633 "FeatureRecommendations": true | false,
4634 "UrlbarInterventions": true | false
4635 }
4636 }
4637 }
4638 ```
4639 ### WebsiteFilter
4640 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4641
4642 **Compatibility:** Firefox 60, Firefox ESR 60\
4643 **CCK2 Equivalent:** N/A\
4644 **Preferences Affected:** N/A
4645
4646 #### Windows (GPO)
4647 ```
4648 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4649 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4650 ```
4651 #### Windows (Intune)
4652 OMA-URI:
4653 ```
4654 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4655 ```
4656 Value (string):
4657 ```
4658 <enabled/>
4659 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4660 ```
4661 OMA-URI:
4662 ```
4663 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4664 ```
4665 Value (string):
4666 ```
4667 <enabled/>
4668 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4669 ```
4670 #### macOS
4671 ```
4672 <dict>
4673 <key>WebsiteFilter</key>
4674 <dict>
4675 <key>Block</key>
4676 <array>
4677 <string><all_urls></string>
4678 </array>
4679 <key>Exceptions</key>
4680 <array>
4681 <string>http://example.org/*</string>
4682 </array>
4683 </dict>
4684
4685 </dict>
4686 ```
4687 #### policies.json
4688 ```
4689 {
4690 "policies": {
4691 "WebsiteFilter": {
4692 "Block": ["<all_urls>"],
4693 "Exceptions": ["http://example.org/*"]
4694 }
4695 }
4696 }
4697 ```

patrick-canterino.de