]> git.p6c8.net - policy-templates.git/blob - docs/index.md
Merge pull request #1094 from willdurand/patch-1
[policy-templates.git] / docs / index.md
1 Firefox policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
2
3 Unfortunately, JSON files do not support comments, but you can add extra entries to the JSON to use as comments. You will see an error in about:policies, but the policies will still work properly. For example:
4
5 ```
6 {
7 "policies": {
8 "Authentication": {
9 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"]
10 }
11 "Authentication_Comment": "These domains are required for us"
12 }
13 }
14 ```
15
16 | Policy Name | Description
17 | --- | --- |
18 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
19 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
20 | **[`AllowFileSelectionDialogs`](#allowfileselectiondialogs)** | Allow file selection dialogs.
21 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
22 | **[`AppUpdatePin`](#appupdatepin)** | Prevent Firefox from being updated beyond the specified version.
23 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
24 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
25 | **[`AutofillAddressEnabled`](#autofilladdressenabled)** | Enable autofill for addresses.
26 | **[`AutofillCreditCardEnabled`](#autofillcreditcardenabled)** | Enable autofill for payment methods.
27 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
28 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
29 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
30 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
31 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
32 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
33 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
34 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
35 | **[`Certificates`](#certificates)** |
36 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
37 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
38 | **[`Containers`](#containers)** | Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
39 | **[`Cookies`](#cookies)** | Configure cookie preferences.
40 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
41 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
42 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
43 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
44 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
45 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
46 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
47 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
48 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
49 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
50 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
51 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
52 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
53 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
54 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
55 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
56 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
57 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
58 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
59 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
60 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
61 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
62 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
63 | **[`DisableThirdPartyModuleBlocking`](#disablethirdpartymoduleblocking)** | Do not allow blocking third-party modules.
64 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
65 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
66 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
67 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
68 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
69 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
70 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
71 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
72 | **[`ExemptDomainFileTypePairsFromFileTypeDownloadWarnings`](#exemptdomainfiletypepairsfromfiletypedownloadwarnings)** | Disable warnings based on file extension for specific file types on domains.
73 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
74 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
75 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
76 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
77 | **[`FirefoxSuggest`](#firefoxsuggest)** | Customize Firefox Suggest.
78 | **[`GoToIntranetSiteForSingleWordEntryInAddressBar`](#gotointranetsiteforsinglewordentryinaddressbar)** | Force direct intranet site navigation instead of searching when typing single word entries in the address bar.
79 | **[`Handlers`](#handlers)** | Configure default application handlers.
80 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
81 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
82 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
83 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
84 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
85 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
86 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
87 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
88 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
89 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
90 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
91 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
92 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
93 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
94 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
95 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
96 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
97 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
98 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
99 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
100 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
101 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
102 | **[`Preferences`](#preferences)** | Set and lock preferences.
103 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
104 | **[`PrintingEnabled`](#printingenabled)** | Enable or disable printing.
105 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
106 | **[`Proxy`](#proxy)** | Configure proxy settings.
107 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
108 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
109 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
110 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
111 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
112 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
113 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
114 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
115 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
116 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
117 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
118 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
119 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
120 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
121 | **[`StartDownloadsInTempDirectory`](#startdownloadsintempdirectory)** | Force downloads to start off in a local, temporary location rather than the default download directory.
122 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
123 | **[`TranslateEnabled`](#translateenabled)** | Enable or disable webpage translation.
124 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
125 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
126 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
127 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
128
129 ### 3rdparty
130
131 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/enterprise-development/#how-to-add-policy).
132
133 For GPO and Intune, the extension developer should provide an ADMX file.
134
135 **Compatibility:** Firefox 68\
136 **CCK2 Equivalent:** N/A\
137 **Preferences Affected:** N/A
138
139 #### macOS
140 ```
141 <dict>
142 <key>3rdparty</key>
143 <dict>
144 <key>Extensions</key>
145 <dict>
146 <key>uBlock0@raymondhill.net</key>
147 <dict>
148 <key>adminSettings</key>
149 <dict>
150 <key>selectedFilterLists</key>
151 <array>
152 <string>ublock-privacy</string>
153 <string>ublock-badware</string>
154 <string>ublock-filters</string>
155 <string>user-filters</string>
156 </array>
157 </dict>
158 </dict>
159 </dict>
160 </dict>
161 </dict>
162 ```
163 #### policies.json
164 ```
165 {
166 "policies": {
167 "3rdparty": {
168 "Extensions": {
169 "uBlock0@raymondhill.net": {
170 "adminSettings": {
171 "selectedFilterLists": [
172 "ublock-privacy",
173 "ublock-badware",
174 "ublock-filters",
175 "user-filters"
176 ]
177 }
178 }
179 }
180 }
181 }
182 }
183 ```
184
185 ### AllowedDomainsForApps
186
187 Define domains allowed to access Google Workspace.
188
189 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
190
191 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
192
193 **Compatibility:** Firefox 89, Firefox ESR 78.11\
194 **CCK2 Equivalent:** N/A\
195 **Preferences Affected:** N/A
196
197 #### Windows (GPO)
198 ```
199 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
200 ```
201 #### Windows (Intune)
202 OMA-URI:
203 ```
204 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
205 ```
206 Value (string):
207 ```
208 <enabled/>
209 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
210 ```
211 #### macOS
212 ```
213 <dict>
214 <key>AllowedDomainsForApps</key>
215 <string>managedfirefox.com,example.com</string>
216 </dict>
217 ```
218 #### policies.json
219 ```
220 {
221 "policies": {
222 "AllowedDomainsForApps": "managedfirefox.com,example.com"
223 }
224 }
225 ```
226 ### AllowFileSelectionDialogs
227
228 Enable or disable file selection dialogs.
229
230 **Compatibility:** Firefox 124\
231 **CCK2 Equivalent:** N/A\
232 **Preferences Affected:** `widget.disable_file_pickers`
233
234 #### Windows (GPO)
235 ```
236 Software\Policies\Mozilla\Firefox\AllowFileSelectionDialogs = 0x1 | 0x0
237 ```
238 #### Windows (Intune)
239 OMA-URI:
240 ```
241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoAllowFileSelectionDialogsUpdate
242 ```
243 Value (string):
244 ```
245 <enabled/> or <disabled/>
246 ```
247 #### macOS
248 ```
249 <dict>
250 <key>AllowFileSelectionDialogs</key>
251 <true/> | <false/>
252 </dict>
253 ```
254 #### policies.json
255 ```
256 {
257 "policies": {
258 "AllowFileSelectionDialogs": true | false
259 }
260 }
261 ```
262 ### AppAutoUpdate
263
264 Enable or disable **automatic** application update.
265
266 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
267
268 If set to false, application updates are downloaded but the user can choose when to install the update.
269
270 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
271
272 **Compatibility:** Firefox 75, Firefox ESR 68.7\
273 **CCK2 Equivalent:** N/A\
274 **Preferences Affected:** `app.update.auto`
275
276 #### Windows (GPO)
277 ```
278 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
279 ```
280 #### Windows (Intune)
281 OMA-URI:
282 ```
283 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
284 ```
285 Value (string):
286 ```
287 <enabled/> or <disabled/>
288 ```
289 #### macOS
290 ```
291 <dict>
292 <key>AppAutoUpdate</key>
293 <true/> | <false/>
294 </dict>
295 ```
296 #### policies.json
297 ```
298 {
299 "policies": {
300 "AppAutoUpdate": true | false
301 }
302 }
303 ```
304 ### AppUpdatePin
305
306 Prevent Firefox from being updated beyond the specified version.
307
308 You can specify the any version as ```xx.``` and Firefox will be updated with all minor versions, but will not be updated beyond the major version.
309
310 You can also specify the version as ```xx.xx``` and Firefox will be updated with all patch versions, but will not be updated beyond the minor version.
311
312 You should specify a version that exists or is guaranteed to exist. If you specify a version that doesn't end up existing, Firefox will update beyond that version.
313
314 **Compatibility:** Firefox 102,\
315 **CCK2 Equivalent:** N/A\
316 **Preferences Affected:** N/A
317
318 #### Windows (GPO)
319 ```
320 Software\Policies\Mozilla\Firefox\AppUpdatePin = "106."
321 ```
322 #### Windows (Intune)
323 OMA-URI:
324 ```
325 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdatePin
326 ```
327 Value (string):
328 ```
329 <enabled/>
330 <data id="AppUpdatePin" value="106."/>
331 ```
332 #### macOS
333 ```
334 <dict>
335 <key>AppUpdatePin</key>
336 <string>106.</string>
337 </dict>
338 ```
339 #### policies.json
340 ```
341 {
342 "policies": {
343 "AppUpdatePin": "106."
344 }
345 }
346 ```
347 ### AppUpdateURL
348
349 Change the URL for application update if you are providing Firefox updates from a custom update server.
350
351 **Compatibility:** Firefox 62, Firefox ESR 60.2\
352 **CCK2 Equivalent:** N/A\
353 **Preferences Affected:** `app.update.url`
354
355 #### Windows (GPO)
356 ```
357 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
358 ```
359 #### Windows (Intune)
360 OMA-URI:
361 ```
362 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
363 ```
364 Value (string):
365 ```
366 <enabled/>
367 <data id="AppUpdateURL" value="https://yoursite.com"/>
368 ```
369 #### macOS
370 ```
371 <dict>
372 <key>AppUpdateURL</key>
373 <string>https://yoursite.com</string>
374 </dict>
375 ```
376 #### policies.json
377 ```
378 {
379 "policies": {
380 "AppUpdateURL": "https://yoursite.com"
381 }
382 }
383 ```
384 ### Authentication
385
386 Configure sites that support integrated authentication.
387
388 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
389
390 `PrivateBrowsing` enables integrated authentication in private browsing.
391
392 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
393 **CCK2 Equivalent:** N/A\
394 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
395
396 #### Windows (GPO)
397 ```
398 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
399 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
400 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
401 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
402 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
403 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
404 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
405 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
406 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
407 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
408 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
409 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
410 ```
411 #### Windows (Intune)
412 OMA-URI:
413 ```
414 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
415 ```
416 Value (string):
417 ```
418 <enabled/>
419 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
420 ```
421 OMA-URI:
422 ```
423 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
424 ```
425 Value (string):
426 ```
427 <enabled/>
428 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
429 ```
430 OMA-URI:
431 ```
432 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
433 ```
434 Value (string):
435 ```
436 <enabled/>
437 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
438 ```
439 OMA-URI:
440 ```
441 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
442 ```
443 Value (string):
444 ```
445 <enabled/>
446 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
447 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
448 ```
449 OMA-URI:
450 ```
451 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
452 ```
453 Value (string):
454 ```
455 <enabled/> or <disabled/>
456 ```
457 OMA-URI:
458 ```
459 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
460 ```
461 Value (string):
462 ```
463 <enabled/> or <disabled/>
464 ```
465 #### macOS
466 ```
467 <dict>
468 <key>Authentication</key>
469 <dict>
470 <key>SPNEGO</key>
471 <array>
472 <string>mydomain.com</string>
473 <string>https://myotherdomain.com</string>
474 </array>
475 <key>Delegated</key>
476 <array>
477 <string>mydomain.com</string>
478 <string>https://myotherdomain.com</string>
479 </array>
480 <key>NTLM</key>
481 <array>
482 <string>mydomain.com</string>
483 <string>https://myotherdomain.com</string>
484 </array>
485 <key>AllowNonFQDN</key>
486 <dict>
487 <key>SPNEGO</key>
488 <true/> | <false/>
489 <key>NTLM</key>
490 <true/> | <false/>
491 </dict>
492 <key>AllowProxies</key>
493 <dict>
494 <key>SPNEGO</key>
495 <true/> | <false/>
496 <key>NTLM</key>
497 <true/> | <false/>
498 </dict>
499 <key>Locked</key>
500 <true/> | <false/>
501 <key>PrivateBrowsing</key>
502 <true/> | <false/>
503 </dict>
504 </dict>
505 ```
506 #### policies.json
507 ```
508 {
509 "policies": {
510 "Authentication": {
511 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
512 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
513 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
514 "AllowNonFQDN": {
515 "SPNEGO": true | false,
516 "NTLM": true | false
517 },
518 "AllowProxies": {
519 "SPNEGO": true | false,
520 "NTLM": true | false
521 },
522 "Locked": true | false,
523 "PrivateBrowsing": true | false
524 }
525 }
526 }
527 ```
528 ### AutofillAddressEnabled
529
530 Enables or disables autofill for addresses.
531
532 This only applies when address autofill is enabled for a particular Firefox version or region. See [this page](https://support.mozilla.org/kb/automatically-fill-your-address-web-forms) for more information.
533
534 **Compatibility:** Firefox 125, Firefox ESR 115.10\
535 **CCK2 Equivalent:** N/A\
536 **Preferences Affected:** `extensions.formautofill.addresses.enabled`
537
538 #### Windows (GPO)
539 ```
540 Software\Policies\Mozilla\Firefox\AutofillAddressEnabled = 0x1 | 0x0
541 ```
542 #### Windows (Intune)
543 OMA-URI:
544 ```
545 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutofillAddressEnabled
546 ```
547 Value (string):
548 ```
549 <enabled/> or <disabled/>
550 ```
551 #### macOS
552 ```
553 <dict>
554 <key>AutofillAddressEnabled</key>
555 <true/> | <false/>
556 </dict>
557 ```
558 #### policies.json
559 ```
560 {
561 "policies": {
562 "AutofillAddressEnabled": true | false
563 }
564 }
565 ```
566 ### AutofillCreditCardEnabled
567
568 Enables or disables autofill for payment methods.
569
570 This only applies when payment method autofill is enabled for a particular Firefox version or region. See [this page](https://support.mozilla.org/kb/credit-card-autofill) for more information.
571
572 **Compatibility:** Firefox 125, Firefox ESR 115.10\
573 **CCK2 Equivalent:** N/A\
574 **Preferences Affected:** `extensions.formautofill.creditCards.enabled`
575
576 #### Windows (GPO)
577 ```
578 Software\Policies\Mozilla\Firefox\AutofillCreditCardEnabled = 0x1 | 0x0
579 ```
580 #### Windows (Intune)
581 OMA-URI:
582 ```
583 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutofillCreditCardEnabled
584 ```
585 Value (string):
586 ```
587 <enabled/> or <disabled/>
588 ```
589 #### macOS
590 ```
591 <dict>
592 <key>AutofillCreditCardEnabled</key>
593 <true/> | <false/>
594 </dict>
595 ```
596 #### policies.json
597 ```
598 {
599 "policies": {
600 "AutofillCreditCardEnabled": true | false
601 }
602 }
603 ```
604 ### AutoLaunchProtocolsFromOrigins
605 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
606
607 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
608
609 The schema is:
610 ```
611 {
612 "items": {
613 "properties": {
614 "allowed_origins": {
615 "items": {
616 "type": "string"
617 },
618 "type": "array"
619 },
620 "protocol": {
621 "type": "string"
622 }
623 },
624 "required": [
625 "protocol",
626 "allowed_origins"
627 ],
628 "type": "object"
629 },
630 "type": "array"
631 }
632 ```
633 **Compatibility:** Firefox 90, Firefox ESR 78.12\
634 **CCK2 Equivalent:** N/A\
635 **Preferences Affected:** N/A
636
637 #### Windows (GPO)
638 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
639 ```
640 [
641 {
642 "protocol": "zoommtg",
643 "allowed_origins": [
644 "https://somesite.zoom.us"
645 ]
646 }
647 ]
648 ```
649 #### Windows (Intune)
650 OMA-URI:
651 ```
652 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
653 ```
654 Value (string):
655 ```
656 <enabled/>
657 <data id="JSON" value='
658 [
659 {
660 "protocol": "zoommtg",
661 "allowed_origins": [
662 "https://somesite.zoom.us"
663 ]
664 }
665 ]'/>
666 ```
667 #### macOS
668 ```
669 <dict>
670 <key>AutoLaunchProtocolsFromOrigins</key>
671 <array>
672 <dict>
673 <key>protocol</key>
674 <string>zoommtg</string>
675 <key>allowed_origins</key>
676 <array>
677 <string>https://somesite.zoom.us</string>
678 </array>
679 </dict>
680 </array>
681 </dict>
682 ```
683 #### policies.json
684 ```
685 {
686 "policies": {
687 "AutoLaunchProtocolsFromOrigins": [{
688 "protocol": "zoommtg",
689 "allowed_origins": [
690 "https://somesite.zoom.us"
691 ]
692 }]
693 }
694 }
695 ```
696 ### BackgroundAppUpdate
697
698 Enable or disable **automatic** application update **in the background**, when the application is not running.
699
700 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
701
702 If set to false, the application will not try to install updates when the application is not running.
703
704 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
705
706 If you are having trouble getting the background task to run, verify your configuration with the ["Requirements to run" section in this support document](https://support.mozilla.org/en-US/kb/enable-background-updates-firefox-windows).
707
708 **Compatibility:** Firefox 90 (Windows only)\
709 **CCK2 Equivalent:** N/A\
710 **Preferences Affected:** `app.update.background.enabled`
711
712 #### Windows (GPO)
713 ```
714 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
715 ```
716 #### Windows (Intune)
717 OMA-URI:
718 ```
719 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
720 ```
721 Value (string):
722 ```
723 <enabled/> or <disabled/>
724 ```
725 #### macOS
726 ```
727 <dict>
728 <key>BackgroundAppUpdate</key>
729 <true/> | <false/>
730 </dict>
731 ```
732 #### policies.json
733 ```
734 {
735 "policies": {
736 "BackgroundAppUpdate": true | false
737 }
738 }
739 ```
740 ### BlockAboutAddons
741
742 Block access to the Add-ons Manager (about:addons).
743
744 **Compatibility:** Firefox 60, Firefox ESR 60\
745 **CCK2 Equivalent:** `disableAddonsManager`\
746 **Preferences Affected:** N/A
747
748 #### Windows (GPO)
749 ```
750 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
751 ```
752 #### Windows (Intune)
753 OMA-URI:
754 ```
755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
756 ```
757 Value (string):
758 ```
759 <enabled/> or <disabled/>
760 ```
761 #### macOS
762 ```
763 <dict>
764 <key>BlockAboutAddons</key>
765 <true/> | <false/>
766 </dict>
767 ```
768 #### policies.json
769 ```
770 {
771 "policies": {
772 "BlockAboutAddons": true | false
773 }
774 }
775 ```
776 ### BlockAboutConfig
777
778 Block access to about:config.
779
780 **Compatibility:** Firefox 60, Firefox ESR 60\
781 **CCK2 Equivalent:** `disableAboutConfig`\
782 **Preferences Affected:** N/A
783
784 #### Windows (GPO)
785 ```
786 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
787 ```
788 #### Windows (Intune)
789 OMA-URI:
790 ```
791 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
792 ```
793 Value (string):
794 ```
795 <enabled/> or <disabled/>
796 ```
797 #### macOS
798 ```
799 <dict>
800 <key>BlockAboutConfig</key>
801 <true/> | <false/>
802 </dict>
803 ```
804 #### policies.json
805 ```
806 {
807 "policies": {
808 "BlockAboutConfig": true | false
809 }
810 }
811 ```
812 ### BlockAboutProfiles
813
814 Block access to About Profiles (about:profiles).
815
816 **Compatibility:** Firefox 60, Firefox ESR 60\
817 **CCK2 Equivalent:** `disableAboutProfiles`\
818 **Preferences Affected:** N/A
819
820 #### Windows (GPO)
821 ```
822 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
823 ```
824 #### Windows (Intune)
825 OMA-URI:
826 ```
827 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
828 ```
829 Value (string):
830 ```
831 <enabled/> or <disabled/>
832 ```
833 #### macOS
834 ```
835 <dict>
836 <key>BlockAboutProfiles</key>
837 <true/> | <false/>
838 </dict>
839 ```
840 #### policies.json
841 ```
842 {
843 "policies": {
844 "BlockAboutProfiles": true | false
845 }
846 }
847 ```
848 ### BlockAboutSupport
849
850 Block access to Troubleshooting Information (about:support).
851
852 **Compatibility:** Firefox 60, Firefox ESR 60\
853 **CCK2 Equivalent:** `disableAboutSupport`\
854 **Preferences Affected:** N/A
855
856 #### Windows (GPO)
857 ```
858 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
859 ```
860 #### Windows (Intune)
861 OMA-URI:
862 ```
863 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
864 ```
865 Value (string):
866 ```
867 <enabled/> or <disabled/>
868 ```
869 #### macOS
870 ```
871 <dict>
872 <key>BlockAboutSupport</key>
873 <true/> | <false/>
874 </dict>
875 ```
876 #### policies.json
877 ```
878 {
879 "policies": {
880 "BlockAboutSupport": true | false
881 }
882 }
883 ```
884 ### Bookmarks
885
886 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
887
888 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
889
890 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
891
892 **Compatibility:** Firefox 60, Firefox ESR 60\
893 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
894 **Preferences Affected:** N/A
895
896 #### Windows (GPO)
897 ```
898 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
899 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
900 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
901 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
902 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
903
904 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
905 ```
906 []
907 ```
908
909 ```
910 #### Windows (Intune)
911 OMA-URI:
912 ```
913 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
914 ```
915 Value (string):
916 ```
917 <enabled/>
918 <data id="BookmarkTitle" value="Example"/>
919 <data id="BookmarkURL" value="https://example.com"/>
920 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
921 <data id="BookmarkPlacement" value="toolbar | menu"/>
922 <data id="BookmarkFolder" value="FolderName"/>
923 ```
924 OMA-URI:
925 ```
926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
927 ```
928 Value (string):
929 ```
930 <enabled/>
931 <data id="JSON" value='[]'/>
932 ```
933 #### macOS
934 ```
935 <dict>
936 <key>Bookmarks</key>
937 <array>
938 <dict>
939 <key>Title</key>
940 <string>Example</string>
941 <key>URL</key>
942 <string>https://example.com</string>
943 <key>Favicon</key>
944 <string>https://example.com/favicon.ico</string>
945 <key>Placement</key>
946 <string>toolbar | menu</string>
947 <key>Folder</key>
948 <string>FolderName</string>
949 </dict>
950 </array>
951 </dict>
952 ```
953 #### policies.json
954 ```
955 {
956 "policies": {
957 "Bookmarks": [
958 {
959 "Title": "Example",
960 "URL": "https://example.com",
961 "Favicon": "https://example.com/favicon.ico",
962 "Placement": "toolbar" | "menu",
963 "Folder": "FolderName"
964 }
965 ]
966 }
967 }
968 ```
969 ### CaptivePortal
970 Enable or disable the detection of captive portals.
971
972 **Compatibility:** Firefox 67, Firefox ESR 60.7\
973 **CCK2 Equivalent:** N/A\
974 **Preferences Affected:** `network.captive-portal-service.enabled`
975
976 #### Windows (GPO)
977 ```
978 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
979 ```
980 #### Windows (Intune)
981 OMA-URI:
982 ```
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
984 ```
985 Value (string):
986 ```
987 <enabled/> or <disabled/>
988 ```
989 #### macOS
990 ```
991 <dict>
992 <key>CaptivePortal</key>
993 <true/> | <false/>
994 </dict>
995 ```
996 #### policies.json
997 ```
998 {
999 "policies": {
1000 "CaptivePortal": true | false
1001 }
1002 }
1003 ```
1004 ### Certificates
1005
1006 ### Certificates | ImportEnterpriseRoots
1007
1008 Trust certificates that have been added to the operating system certificate store by a user or administrator.
1009
1010 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
1011
1012 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
1013
1014 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
1015 **CCK2 Equivalent:** N/A\
1016 **Preferences Affected:** `security.enterprise_roots.enabled`
1017
1018 #### Windows (GPO)
1019 ```
1020 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
1021 ```
1022 #### Windows (Intune)
1023 OMA-URI:
1024 ```
1025 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
1026 ```
1027 Value (string):
1028 ```
1029 <enabled/> or <disabled/>
1030 ```
1031 #### macOS
1032 ```
1033 <dict>
1034 <key>Certificates</key>
1035 <dict>
1036 <key>ImportEnterpriseRoots</key>
1037 <true/> | <false/>
1038 </dict>
1039 </dict>
1040 ```
1041 #### policies.json
1042 ```
1043 {
1044 "policies": {
1045 "Certificates": {
1046 "ImportEnterpriseRoots": true | false
1047 }
1048 }
1049 }
1050 ```
1051 ### Certificates | Install
1052
1053 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
1054
1055 - Windows
1056 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
1057 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
1058 - macOS
1059 - /Library/Application Support/Mozilla/Certificates
1060 - ~/Library/Application Support/Mozilla/Certificates
1061 - Linux
1062 - /usr/lib/mozilla/certificates
1063 - /usr/lib64/mozilla/certificates
1064 - ~/.mozilla/certificates
1065
1066 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
1067
1068 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
1069
1070 Certificates are installed using the trust string `CT,CT,`.
1071
1072 Binary (DER) and ASCII (PEM) certificates are both supported.
1073
1074 **Compatibility:** Firefox 64, Firefox ESR 64\
1075 **CCK2 Equivalent:** `certs.ca`\
1076 **Preferences Affected:** N/A
1077
1078 #### Windows (GPO)
1079 ```
1080 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
1081 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
1082 ```
1083 #### Windows (Intune)
1084 OMA-URI:
1085 ```
1086 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
1087 ```
1088 Value (string):
1089 ```
1090 <enabled/>
1091 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
1092 ```
1093 #### macOS
1094 ```
1095 <dict>
1096 <key>Certificates</key>
1097 <dict>
1098 <key>Install</key>
1099 <array>
1100 <string>cert1.der</string>
1101 <string>/Users/username/cert2.pem</string>
1102 </array>
1103 </dict>
1104 </dict>
1105 ```
1106 #### policies.json
1107 ```
1108 {
1109 "policies": {
1110 "Certificates": {
1111 "Install": ["cert1.der", "/home/username/cert2.pem"]
1112 }
1113 }
1114 }
1115 ```
1116 ### Containers
1117 Set policies related to [containers](https://addons.mozilla.org/firefox/addon/multi-account-containers/).
1118
1119 Currently you can set the initial set of containers.
1120
1121 For each container, you can specify the name, icon, and color.
1122
1123 | Name | Description |
1124 | --- | --- |
1125 | `name`| Name of container
1126 | `icon` | Can be `fingerprint`, `briefcase`, `dollar`, `cart`, `vacation`, `gift`, `food`, `fruit`, `pet`, `tree`, `chill`, `circle`, `fence`
1127 | `color` | Can be `blue`, `turquoise`, `green`, `yellow`, `orange`, `red`, `pink`, `purple`, `toolbar`
1128
1129 **Compatibility:** Firefox 113\
1130 **CCK2 Equivalent:** N/A\
1131 **Preferences Affected:** N/A
1132
1133 #### Windows (GPO)
1134 Software\Policies\Mozilla\Firefox\Containers (REG_MULTI_SZ) =
1135 ```
1136 {
1137 "Default": [
1138 {
1139 "name": "My container",
1140 "icon": "pet",
1141 "color": "turquoise"
1142 }
1143 ]
1144 }
1145 ```
1146 #### Windows (Intune)
1147 OMA-URI:
1148 ```
1149 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Containers
1150 ```
1151 Value (string):
1152 ```
1153 <enabled/>
1154 <data id="JSON" value='
1155 {
1156 "Default": [
1157 {
1158 "name": "My container",
1159 "icon": "pet",
1160 "color": "turquoise"
1161 }
1162 ]
1163 }
1164 '/>
1165 ```
1166 #### macOS
1167 ```
1168 <dict>
1169 <key>Default</key>
1170 <dict>
1171 <key>Containers</key>
1172 <array>
1173 <dict>
1174 <key>name</key>
1175 <string>My container</string>
1176 <key>icon</key>
1177 <string>pet</string>
1178 <key>color</key>
1179 <string>turquoise</string>
1180 </dict>
1181 </array>
1182 </dict>
1183 </dict>
1184 ```
1185 #### policies.json
1186 ```
1187 {
1188 "policies": {
1189 "Containers": {
1190 "Default": [
1191 {
1192 "name": "My container",
1193 "icon": "pet",
1194 "color": "turquoise"
1195 }
1196 ]
1197 }
1198 }
1199 }
1200 ```
1201 ### Cookies
1202 Configure cookie preferences.
1203
1204 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
1205
1206 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
1207
1208 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
1209
1210 `Behavior` sets the default behavior for cookies based on the values below.
1211
1212 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
1213
1214 | Value | Description
1215 | --- | --- |
1216 | accept | Accept all cookies
1217 | reject-foreign | Reject third party cookies
1218 | reject | Reject all cookies
1219 | limit-foreign | Reject third party cookies for sites you haven't visited
1220 | reject-tracker | Reject cookies for known trackers (default)
1221 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
1222
1223 `Locked` prevents the user from changing cookie preferences.
1224
1225 `Default` determines whether cookies are accepted at all. (*Deprecated*. Use `Behavior` instead)
1226
1227 `AcceptThirdParty` determines how third-party cookies are handled. (*Deprecated*. Use `Behavior` instead)
1228
1229 `RejectTracker` only rejects cookies for trackers. (*Deprecated*. Use `Behavior` instead)
1230
1231 `ExpireAtSessionEnd` determines when cookies expire. (*Deprecated*. Use [`SanitizeOnShutdown`](#sanitizeonshutdown-selective) instead)
1232
1233 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
1234 **CCK2 Equivalent:** N/A\
1235 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
1236
1237 #### Windows (GPO)
1238 ```
1239 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
1240 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
1241 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
1242 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1243 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
1244 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1245 ```
1246 #### Windows (Intune)
1247 OMA-URI:
1248 ```
1249 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
1250 ```
1251 Value (string):
1252 ```
1253 <enabled/>
1254 <data id="Permissions" value="1&#xF000;https://example.com"/>
1255 ```
1256 OMA-URI:
1257 ```
1258 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1259 ```
1260 Value (string):
1261 ```
1262 <enabled/>
1263 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1264 ```
1265 OMA-URI:
1266 ```
1267 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1268 ```
1269 Value (string):
1270 ```
1271 <enabled/>
1272 <data id="Permissions" value="1&#xF000;https://example.org"/>
1273 ```
1274 OMA-URI:
1275 ```
1276 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1277 ```
1278 Value (string):
1279 ```
1280 <enabled/> or <disabled/>
1281 ```
1282 OMA-URI:
1283 ```
1284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1285 ```
1286 Value (string):
1287 ```
1288 <enabled/>
1289 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1290 ```
1291 OMA-URI:
1292 ```
1293 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1294 ```
1295 Value (string):
1296 ```
1297 <enabled/>
1298 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1299 ```
1300 #### macOS
1301 ```
1302 <dict>
1303 <key>Cookies</key>
1304 <dict>
1305 <key>Allow</key>
1306 <array>
1307 <string>http://example.com</string>
1308 </array>
1309 <key>AllowSession</key>
1310 <array>
1311 <string>http://example.edu</string>
1312 </array>
1313 <key>Block</key>
1314 <array>
1315 <string>http://example.org</string>
1316 </array>
1317 <key>Locked</key>
1318 <true/> | <false/>
1319 <key>Behavior</key>
1320 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1321 <key>BehaviorPrivateBrowsing</key>
1322 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1323 </dict>
1324 </dict>
1325 ```
1326 #### policies.json
1327 ```
1328 {
1329 "policies": {
1330 "Cookies": {
1331 "Allow": ["http://example.org/"],
1332 "AllowSession": ["http://example.edu/"],
1333 "Block": ["http://example.edu/"],
1334 "Locked": true | false,
1335 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1336 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1337 }
1338 }
1339 }
1340 ```
1341 ### DefaultDownloadDirectory
1342 Set the default download directory.
1343
1344 You can use ${home} for the native home directory.
1345
1346 **Compatibility:** Firefox 68, Firefox ESR 68\
1347 **CCK2 Equivalent:** N/A\
1348 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1349
1350 #### Windows (GPO)
1351 ```
1352 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1353 ```
1354 #### Windows (Intune)
1355 OMA-URI:
1356 ```
1357 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1358 ```
1359 Value (string):
1360 ```
1361 <enabled/>
1362 <data id="Preferences_String" value="${home}\Downloads"/>
1363 ```
1364 #### macOS
1365 ```
1366 <dict>
1367 <key>DefaultDownloadDirectory</key>
1368 <string>${home}/Downloads</string>
1369 </dict>
1370 ```
1371 #### policies.json (macOS and Linux)
1372 ```
1373 {
1374 "policies": {
1375 "DefaultDownloadDirectory": "${home}/Downloads"
1376 }
1377 }
1378 ```
1379 #### policies.json (Windows)
1380 ```
1381 {
1382 "policies": {
1383 "DefaultDownloadDirectory": "${home}\\Downloads"
1384 }
1385 }
1386 ```
1387 ### DisableAppUpdate
1388 Turn off application updates within Firefox.
1389
1390 **Compatibility:** Firefox 60, Firefox ESR 60\
1391 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1392 **Preferences Affected:** N/A
1393
1394 #### Windows (GPO)
1395 ```
1396 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1397 ```
1398 #### Windows (Intune)
1399 OMA-URI:
1400 ```
1401 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1402 ```
1403 Value (string):
1404 ```
1405 <enabled/> or <disabled/>
1406 ```
1407 #### macOS
1408 ```
1409 <dict>
1410 <key>DisableAppUpdate</key>
1411 <true/> | <false/>
1412 </dict>
1413 ```
1414 #### policies.json
1415 ```
1416 {
1417 "policies": {
1418 "DisableAppUpdate": true | false
1419 }
1420 }
1421 ```
1422 ### DisableBuiltinPDFViewer
1423 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1424
1425 **Compatibility:** Firefox 60, Firefox ESR 60\
1426 **CCK2 Equivalent:** `disablePDFjs`\
1427 **Preferences Affected:** `pdfjs.disabled`
1428
1429 #### Windows (GPO)
1430 ```
1431 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1432 ```
1433 #### Windows (Intune)
1434 OMA-URI:
1435 ```
1436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1437 ```
1438 Value (string):
1439 ```
1440 <enabled/> or <disabled/>
1441 ```
1442 #### macOS
1443 ```
1444 <dict>
1445 <key>DisableBuiltinPDFViewer</key>
1446 <true/> | <false/>
1447 </dict>
1448 ```
1449 #### policies.json
1450 ```
1451 {
1452 "policies": {
1453 "DisableBuiltinPDFViewer": true | false
1454 }
1455 }
1456 ```
1457 ### DisabledCiphers
1458 Disable specific cryptographic ciphers, listed below.
1459
1460 ```
1461 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1462 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1463 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1464 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1465 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1466 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1467 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1468 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1469 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1470 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1471 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1472 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1473 TLS_RSA_WITH_AES_128_GCM_SHA256
1474 TLS_RSA_WITH_AES_256_GCM_SHA384
1475 TLS_RSA_WITH_AES_128_CBC_SHA
1476 TLS_RSA_WITH_AES_256_CBC_SHA
1477 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1478 ```
1479
1480 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1481
1482 ---
1483 **Note:**
1484
1485 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1486
1487 ---
1488 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1489 **CCK2 Equivalent:** N/A\
1490 **Preferences Affected:** N/A
1491
1492 #### Windows (GPO)
1493 ```
1494 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1495 ```
1496 #### Windows (Intune)
1497 OMA-URI:
1498 ```
1499 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1500
1501 ```
1502 Value (string):
1503 ```
1504 <enabled/> or <disabled/>
1505 ```
1506 #### macOS
1507 ```
1508 <dict>
1509 <key>DisabledCiphers</key>
1510 <dict>
1511 <key>CIPHER_NAME</key>
1512 <true/> | <false/>
1513 </dict>
1514 </dict>
1515 ```
1516 #### policies.json
1517 ```
1518 {
1519 "policies": {
1520 "DisabledCiphers": {
1521 "CIPHER_NAME": true | false,
1522 }
1523 }
1524 }
1525 ```
1526 ### DisableDefaultBrowserAgent
1527 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1528
1529 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1530
1531 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1532 **CCK2 Equivalent:** N/A\
1533 **Preferences Affected:** N/A
1534
1535 #### Windows (GPO)
1536 ```
1537 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1538 ```
1539 #### Windows (Intune)
1540 OMA-URI:
1541 ```
1542 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1543 ```
1544 Value (string):
1545 ```
1546 <enabled/> or <disabled/>
1547 ```
1548 #### policies.json
1549 ```
1550 {
1551 "policies": {
1552 "DisableDefaultBrowserAgent": true | false
1553 }
1554 }
1555 ```
1556 ### DisableDeveloperTools
1557 Remove access to all developer tools.
1558
1559 **Compatibility:** Firefox 60, Firefox ESR 60\
1560 **CCK2 Equivalent:** `removeDeveloperTools`\
1561 **Preferences Affected:** `devtools.policy.disabled`
1562
1563 #### Windows (GPO)
1564 ```
1565 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1566 ```
1567 #### Windows (Intune)
1568 OMA-URI:
1569 ```
1570 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1571 ```
1572 Value (string):
1573 ```
1574 <enabled/> or <disabled/>
1575 ```
1576 #### macOS
1577 ```
1578 <dict>
1579 <key>DisableDeveloperTools</key>
1580 <true/> | <false/>
1581 </dict>
1582 ```
1583 #### policies.json
1584 ```
1585 {
1586 "policies": {
1587 "DisableDeveloperTools": true | false
1588 }
1589 }
1590 ```
1591 ### DisableFeedbackCommands
1592 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1593
1594 **Compatibility:** Firefox 60, Firefox ESR 60\
1595 **CCK2 Equivalent:** N/A\
1596 **Preferences Affected:** N/A
1597
1598 #### Windows (GPO)
1599 ```
1600 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1601 ```
1602 #### Windows (Intune)
1603 OMA-URI:
1604 ```
1605 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1606 ```
1607 Value (string):
1608 ```
1609 <enabled/> or <disabled/>
1610 ```
1611 #### macOS
1612 ```
1613 <dict>
1614 <key>DisableFeedbackCommands</key>
1615 <true/> | <false/>
1616 </dict>
1617 ```
1618 #### policies.json
1619 ```
1620 {
1621 "policies": {
1622 "DisableFeedbackCommands": true | false
1623 }
1624 }
1625 ```
1626 ### DisableFirefoxAccounts
1627 Disable Firefox Accounts integration (Sync).
1628
1629 **Compatibility:** Firefox 60, Firefox ESR 60\
1630 **CCK2 Equivalent:** `disableSync`\
1631 **Preferences Affected:** `identity.fxaccounts.enabled`
1632
1633 #### Windows (GPO)
1634 ```
1635 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1636 ```
1637 #### Windows (Intune)
1638 OMA-URI:
1639 ```
1640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1641 ```
1642 Value (string):
1643 ```
1644 <enabled/> or <disabled/>
1645 ```
1646 #### macOS
1647 ```
1648 <dict>
1649 <key>DisableFirefoxAccounts</key>
1650 <true/> | <false/>
1651 </dict>
1652 ```
1653 #### policies.json
1654 ```
1655 {
1656 "policies": {
1657 "DisableFirefoxAccounts": true | false
1658 }
1659 }
1660 ```
1661 ### DisableFirefoxScreenshots
1662 Remove access to Firefox Screenshots.
1663
1664 **Compatibility:** Firefox 60, Firefox ESR 60\
1665 **CCK2 Equivalent:** N/A\
1666 **Preferences Affected:** `extensions.screenshots.disabled`
1667
1668 #### Windows (GPO)
1669 ```
1670 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1671 ```
1672 #### Windows (Intune)
1673 OMA-URI:
1674 ```
1675 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1676 ```
1677 Value (string):
1678 ```
1679 <enabled/> or <disabled/>
1680 ```
1681 #### macOS
1682 ```
1683 <dict>
1684 <key>DisableFirefoxScreenshots</key>
1685 <true/> | <false/>
1686 </dict>
1687 ```
1688 #### policies.json
1689 ```
1690 {
1691 "policies": {
1692 "DisableFirefoxScreenshots": true | false
1693 }
1694 }
1695 ```
1696 ### DisableFirefoxStudies
1697 Disable Firefox studies (Shield).
1698
1699 **Compatibility:** Firefox 60, Firefox ESR 60\
1700 **CCK2 Equivalent:** N/A\
1701 **Preferences Affected:** `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
1702
1703 #### Windows (GPO)
1704 ```
1705 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1706 ```
1707 #### Windows (Intune)
1708 OMA-URI:
1709 ```
1710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1711 ```
1712 Value (string):
1713 ```
1714 <enabled/> or <disabled/>
1715 ```
1716 #### macOS
1717 ```
1718 <dict>
1719 <key>DisableFirefoxStudies</key>
1720 <true/> | <false/>
1721 </dict>
1722 ```
1723 #### policies.json
1724 ```
1725 {
1726 "policies": {
1727 "DisableFirefoxStudies": true | false
1728 }
1729 }
1730 ```
1731 ### DisableForgetButton
1732 Disable the "Forget" button.
1733
1734 **Compatibility:** Firefox 60, Firefox ESR 60\
1735 **CCK2 Equivalent:** `disableForget`\
1736 **Preferences Affected:** N/A
1737
1738 #### Windows (GPO)
1739 ```
1740 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1741 ```
1742 #### Windows (Intune)
1743 OMA-URI:
1744 ```
1745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1746 ```
1747 Value (string):
1748 ```
1749 <enabled/> or <disabled/>
1750 ```
1751 #### macOS
1752 ```
1753 <dict>
1754 <key>DisableForgetButton</key>
1755 <true/> | <false/>
1756 </dict>
1757 ```
1758 #### policies.json
1759 ```
1760 {
1761 "policies": {
1762 "DisableForgetButton": true | false
1763 }
1764 }
1765 ```
1766 ### DisableFormHistory
1767 Turn off saving information on web forms and the search bar.
1768
1769 **Compatibility:** Firefox 60, Firefox ESR 60\
1770 **CCK2 Equivalent:** `disableFormFill`\
1771 **Preferences Affected:** `browser.formfill.enable`
1772
1773 #### Windows (GPO)
1774 ```
1775 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1776 ```
1777 #### Windows (Intune)
1778 OMA-URI:
1779 ```
1780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1781 ```
1782 Value (string):
1783 ```
1784 <enabled/> or <disabled/>
1785 ```
1786 #### macOS
1787 ```
1788 <dict>
1789 <key>DisableFormHistory</key>
1790 <true/> | <false/>
1791 </dict>
1792 ```
1793 #### policies.json
1794 ```
1795 {
1796 "policies": {
1797 "DisableFormHistory": true | false
1798 }
1799 }
1800 ```
1801 ### DisableMasterPasswordCreation
1802 Remove the master password functionality.
1803
1804 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1805
1806 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1807
1808 **Compatibility:** Firefox 60, Firefox ESR 60\
1809 **CCK2 Equivalent:** `noMasterPassword`\
1810 **Preferences Affected:** N/A
1811
1812 #### Windows (GPO)
1813 ```
1814 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1815 ```
1816 #### Windows (Intune)
1817 OMA-URI:
1818 ```
1819 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1820 ```
1821 Value (string):
1822 ```
1823 <enabled/> or <disabled/>
1824 ```
1825 #### macOS
1826 ```
1827 <dict>
1828 <key>DisableMasterPasswordCreation</key>
1829 <true/> | <false/>
1830 </dict>
1831 ```
1832 #### policies.json
1833 ```
1834 {
1835 "policies": {
1836 "DisableMasterPasswordCreation": true | false
1837 }
1838 }
1839 ```
1840 ### DisablePasswordReveal
1841 Do not allow passwords to be shown in saved logins
1842
1843 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1844 **CCK2 Equivalent:** N/A
1845 **Preferences Affected:** N/A
1846
1847 #### Windows (GPO)
1848 ```
1849 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1850 ```
1851 #### Windows (Intune)
1852 OMA-URI:
1853 ```
1854 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1855 ```
1856 Value (string):
1857 ```
1858 <enabled/> or <disabled/>
1859 ```
1860 #### macOS
1861 ```
1862 <dict>
1863 <key>DisablePasswordReveal</key>
1864 <true/> | <false/>
1865 </dict>
1866 ```
1867 #### policies.json
1868 ```
1869 {
1870 "policies": {
1871 "DisablePasswordReveal": true | false
1872 }
1873 }
1874 ```
1875 ### DisablePocket
1876 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1877
1878 **Compatibility:** Firefox 60, Firefox ESR 60\
1879 **CCK2 Equivalent:** `disablePocket`\
1880 **Preferences Affected:** `extensions.pocket.enabled`
1881
1882 #### Windows (GPO)
1883 ```
1884 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1885 ```
1886 #### Windows (Intune)
1887 OMA-URI:
1888 ```
1889 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1890 ```
1891 Value (string):
1892 ```
1893 <enabled/> or <disabled/>
1894 ```
1895 #### macOS
1896 ```
1897 <dict>
1898 <key>DisablePocket</key>
1899 <true/> | <false/>
1900 </dict>
1901 ```
1902 #### policies.json
1903 ```
1904 {
1905 "policies": {
1906 "DisablePocket": true | false
1907 }
1908 }
1909 ```
1910 ### DisablePrivateBrowsing
1911 Remove access to private browsing.
1912
1913 **Compatibility:** Firefox 60, Firefox ESR 60\
1914 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1915 **Preferences Affected:** N/A
1916
1917 #### Windows (GPO)
1918 ```
1919 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1920 ```
1921 #### Windows (Intune)
1922 OMA-URI:
1923 ```
1924 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1925 ```
1926 Value (string):
1927 ```
1928 <enabled/> or <disabled/>
1929 ```
1930 #### macOS
1931 ```
1932 <dict>
1933 <key>DisablePrivateBrowsing</key>
1934 <true/> | <false/>
1935 </dict>
1936 ```
1937 #### policies.json
1938 ```
1939 {
1940 "policies": {
1941 "DisablePrivateBrowsing": true | false
1942 }
1943 }
1944 ```
1945 ### DisableProfileImport
1946 Disables the "Import data from another browser" option in the bookmarks window.
1947
1948 **Compatibility:** Firefox 60, Firefox ESR 60\
1949 **CCK2 Equivalent:** N/A\
1950 **Preferences Affected:** N/A
1951
1952 #### Windows (GPO)
1953 ```
1954 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1955 ```
1956 #### Windows (Intune)
1957 OMA-URI:
1958 ```
1959 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1960 ```
1961 Value (string):
1962 ```
1963 <enabled/> or <disabled/>
1964 ```
1965 #### macOS
1966 ```
1967 <dict>
1968 <key>DisableProfileImport</key>
1969 <true/> | <false/>
1970 </dict>
1971 ```
1972 #### policies.json
1973 ```
1974 {
1975 "policies": {
1976 "DisableProfileImport": true | false
1977 }
1978 }
1979 ```
1980 ### DisableProfileRefresh
1981 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1982
1983 **Compatibility:** Firefox 60, Firefox ESR 60\
1984 **CCK2 Equivalent:** `disableResetFirefox`\
1985 **Preferences Affected:** `browser.disableResetPrompt`
1986
1987 #### Windows (GPO)
1988 ```
1989 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1990 ```
1991 #### Windows (Intune)
1992 OMA-URI:
1993 ```
1994 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1995 ```
1996 Value (string):
1997 ```
1998 <enabled/> or <disabled/>
1999 ```
2000 #### macOS
2001 ```
2002 <dict>
2003 <key>DisableProfileRefresh</key>
2004 <true/> | <false/>
2005 </dict>
2006 ```
2007 #### policies.json
2008 ```
2009 {
2010 "policies": {
2011 "DisableProfileRefresh": true | false
2012 }
2013 }
2014 ```
2015 ### DisableSafeMode
2016 Disable safe mode within the browser.
2017
2018 On Windows, this disables safe mode via the command line as well.
2019
2020 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
2021 **CCK2 Equivalent:** `disableSafeMode`\
2022 **Preferences Affected:** N/A
2023
2024 #### Windows (GPO)
2025 ```
2026 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
2027 ```
2028 #### Windows (Intune)
2029 OMA-URI:
2030 ```
2031 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
2032 ```
2033 Value (string):
2034 ```
2035 <enabled/> or <disabled/>
2036 ```
2037 #### macOS
2038 ```
2039 <dict>
2040 <key>DisableSafeMode</key>
2041 <true/> | <false/>
2042 </dict>
2043 ```
2044 #### policies.json
2045 ```
2046 {
2047 "policies": {
2048 "DisableSafeMode": true | false
2049 }
2050 }
2051 ```
2052 ### DisableSecurityBypass
2053 Prevent the user from bypassing security in certain cases.
2054
2055 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
2056
2057 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
2058
2059 These policies only affect what happens when an error is shown, they do not affect any settings in preferences.
2060
2061 **Compatibility:** Firefox 60, Firefox ESR 60\
2062 **CCK2 Equivalent:** N/A\
2063 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
2064
2065 #### Windows (GPO)
2066 ```
2067 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
2068 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
2069 ```
2070 #### Windows (Intune)
2071 OMA-URI:
2072 ```
2073 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
2074 ```
2075 Value (string):
2076 ```
2077 <enabled/> or <disabled/>
2078 ```
2079 OMA-URI:
2080 ```
2081 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
2082 ```
2083 Value (string):
2084 ```
2085 <enabled/> or <disabled/>
2086 ```
2087
2088 #### macOS
2089 ```
2090 <dict>
2091 <key>DisableSecurityBypass</key>
2092 <dict>
2093 <key>InvalidCertificate</key>
2094 <true/> | <false/>
2095 <key>SafeBrowsing</key>
2096 <true/> | <false/>
2097 </dict>
2098 </dict>
2099 ```
2100 #### policies.json
2101 ```
2102 {
2103 "policies": {
2104 "DisableSecurityBypass": {
2105 "InvalidCertificate": true | false,
2106 "SafeBrowsing": true | false
2107 }
2108 }
2109 }
2110 ```
2111 ### DisableSetDesktopBackground
2112 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
2113
2114 **Compatibility:** Firefox 60, Firefox ESR 60\
2115 **CCK2 Equivalent:** `removeSetDesktopBackground`\
2116 **Preferences Affected:** N/A
2117
2118 #### Windows (GPO)
2119 ```
2120 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
2121 ```
2122 #### Windows (Intune)
2123 OMA-URI:
2124 ```
2125 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
2126 ```
2127 Value (string):
2128 ```
2129 <enabled/> or <disabled/>
2130 ```
2131 #### macOS
2132 ```
2133 <dict>
2134 <key>DisableSetDesktopBackground</key>
2135 <true/> | <false/>
2136 </dict>
2137 ```
2138 #### policies.json
2139 ```
2140 {
2141 "policies": {
2142 "DisableSetDesktopBackground": true | false
2143 }
2144 }
2145 ```
2146 ### DisableSystemAddonUpdate
2147 Prevent system add-ons from being installed or updated.
2148
2149 **Compatibility:** Firefox 60, Firefox ESR 60\
2150 **CCK2 Equivalent:** N/A\
2151 **Preferences Affected:** N/A
2152
2153 #### Windows (GPO)
2154 ```
2155 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
2156 ```
2157 #### Windows (Intune)
2158 OMA-URI:
2159 ```
2160 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
2161 ```
2162 Value (string):
2163 ```
2164 <enabled/> or <disabled/>
2165 ```
2166 #### macOS
2167 ```
2168 <dict>
2169 <key>DisableSystemAddonUpdate</key>
2170 <true/> | <false/>
2171 </dict>
2172 ```
2173 #### policies.json
2174 ```
2175 {
2176 "policies": {
2177 "DisableSystemAddonUpdate": true | false
2178 }
2179 }
2180 ```
2181 ### DisableTelemetry
2182 Prevent the upload of telemetry data.
2183
2184 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
2185
2186 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
2187
2188 **Compatibility:** Firefox 60, Firefox ESR 60\
2189 **CCK2 Equivalent:** `disableTelemetry`\
2190 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
2191
2192 #### Windows (GPO)
2193 ```
2194 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
2195 ```
2196 #### Windows (Intune)
2197 OMA-URI:
2198 ```
2199 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
2200 ```
2201 Value (string):
2202 ```
2203 <enabled/> or <disabled/>
2204 ```
2205 #### macOS
2206 ```
2207 <dict>
2208 <key>DisableTelemetry</key>
2209 <true/> | <false/>
2210 </dict>
2211 ```
2212 #### policies.json
2213 ```
2214 {
2215 "policies": {
2216 "DisableTelemetry": true | false
2217 }
2218 }
2219 ```
2220 ### DisableThirdPartyModuleBlocking
2221 Do not allow blocking third-party modules from the `about:third-party` page.
2222
2223 This policy only works on Windows through GPO (not policies.json).
2224
2225 **Compatibility:** Firefox 110 (Windows only, GPO only)\
2226 **CCK2 Equivalent:** N/A\
2227 **Preferences Affected:** N/A
2228
2229 #### Windows (GPO)
2230 ```
2231 Software\Policies\Mozilla\Firefox\DisableThirdPartyModuleBlocking = = 0x1 | 0x0
2232 ```
2233 #### Windows (Intune)
2234 OMA-URI:
2235 ```
2236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableThirdPartyModuleBlocking
2237 ```
2238 Value (string):
2239 ```
2240 <enabled/> or <disabled/>
2241 ```
2242 ### DisplayBookmarksToolbar
2243 Set the initial state of the bookmarks toolbar. A user can still change how it is displayed.
2244
2245 `always` means the bookmarks toolbar is always shown.
2246
2247 `never` means the bookmarks toolbar is not shown.
2248
2249 `newtab` means the bookmarks toolbar is only shown on the new tab page.
2250
2251 **Compatibility:** Firefox 109, Firefox ESR 102.7\
2252 **CCK2 Equivalent:** N/A\
2253 **Preferences Affected:** N/A
2254
2255 #### Windows (GPO)
2256 ```
2257 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = "always", "never", "newtab"
2258 ```
2259 #### Windows (Intune)
2260 OMA-URI:
2261 ```
2262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar_Enum
2263 ```
2264 Value (string):
2265 ```
2266 <enabled/>
2267 <data id="DisplayBookmarksToolbar" value="always | never | newtab"/>
2268 ```
2269 #### macOS
2270 ```
2271 <dict>
2272 <key>DisplayBookmarksToolbar</key>
2273 <string>always | never | newtab</string>
2274 </dict>
2275 ```
2276 #### policies.json
2277 ```
2278 {
2279 "policies": {
2280 "DisplayBookmarksToolbar": "always" | "never" | "newtab"
2281 }
2282 }
2283 ```
2284 ### DisplayMenuBar
2285 Set the state of the menubar.
2286
2287 `always` means the menubar is shown and cannot be hidden.
2288
2289 `never` means the menubar is hidden and cannot be shown.
2290
2291 `default-on` means the menubar is on by default but can be hidden.
2292
2293 `default-off` means the menubar is off by default but can be shown.
2294
2295 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2296 **CCK2 Equivalent:** `displayMenuBar`\
2297 **Preferences Affected:** N/A
2298
2299 #### Windows (GPO)
2300 ```
2301 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2302 ```
2303 #### Windows (Intune)
2304 OMA-URI:
2305 ```
2306 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2307 ```
2308 Value (string):
2309 ```
2310 <enabled/>
2311 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2312 ```
2313 #### macOS
2314 ```
2315 <dict>
2316 <key>DisplayMenuBar</key>
2317 <string>always | never | default-on | default-off</string>
2318 </dict>
2319 ```
2320 #### policies.json
2321 ```
2322 {
2323 "policies": {
2324 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2325 }
2326 }
2327 ```
2328 ### DNSOverHTTPS
2329 Configure DNS over HTTPS.
2330
2331 `Enabled` determines whether DNS over HTTPS is enabled
2332
2333 `ProviderURL` is a URL to another provider.
2334
2335 `Locked` prevents the user from changing DNS over HTTPS preferences.
2336
2337 `ExcludedDomains` excludes domains from DNS over HTTPS.
2338
2339 `Fallback` determines whether or not Firefox will use your default DNS resolver if there is a problem with the secure DNS provider.
2340
2341 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7) (Fallback added in 124)\
2342 **CCK2 Equivalent:** N/A\
2343 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2344
2345 #### Windows (GPO)
2346 ```
2347 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2348 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2349 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2350 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2351 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Fallback = 0x1 | 0x0
2352 ```
2353 #### Windows (Intune)
2354 OMA-URI:
2355 ```
2356 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2357 ```
2358 Value (string):
2359 ```
2360 <enabled/> or <disabled/>
2361 ```
2362 OMA-URI:
2363 ```
2364 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2365 ```
2366 Value (string):
2367 ```
2368 <enabled/>
2369 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2370 ```
2371 OMA-URI:
2372 ```
2373 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2374 ```
2375 Value (string):
2376 ```
2377 <enabled/> or <disabled/>
2378 ```
2379 OMA-URI:
2380 ```
2381 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2382 ```
2383 Value (string):
2384 ```
2385 <enabled/>
2386 <data id="List" value="1&#xF000;example.com"/>
2387 ```
2388 OMA-URI:
2389 ```
2390 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Fallback
2391 ```
2392 Value (string):
2393 ```
2394 <enabled/> or <disabled/>
2395 ```
2396 #### macOS
2397 ```
2398 <dict>
2399 <key>DNSOverHTTPS</key>
2400 <dict>
2401 <key>Enabled</key>
2402 <true/> | <false/>
2403 <key>ProviderURL</key>
2404 <string>URL_TO_ALTERNATE_PROVIDER</string>
2405 <key>Locked</key>
2406 <true/> | <false/>
2407 <key>ExcludedDomains</key>
2408 <array>
2409 <string>example.com</string>
2410 </array>
2411 <key>Fallback</key>
2412 <true/> | <false/>
2413 </dict>
2414 </dict>
2415 ```
2416 #### policies.json
2417 ```
2418 {
2419 "policies": {
2420 "DNSOverHTTPS": {
2421 "Enabled": true | false,
2422 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2423 "Locked": true | false,
2424 "ExcludedDomains": ["example.com"],
2425 "Fallback": true | false,
2426 }
2427 }
2428 }
2429 ```
2430 ### DontCheckDefaultBrowser
2431 Don't check if Firefox is the default browser at startup.
2432
2433 **Compatibility:** Firefox 60, Firefox ESR 60\
2434 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2435 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2436
2437 #### Windows (GPO)
2438 ```
2439 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2440 ```
2441 #### Windows (Intune)
2442 OMA-URI:
2443 ```
2444 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2445 ```
2446 Value (string):
2447 ```
2448 <enabled/> or <disabled/>
2449 ```
2450 #### macOS
2451 ```
2452 <dict>
2453 <key>DontCheckDefaultBrowser</key>
2454 <true/> | <false/>
2455 </dict>
2456 ```
2457 #### policies.json
2458 ```
2459 {
2460 "policies": {
2461 "DontCheckDefaultBrowser": true | false
2462 }
2463 }
2464 ```
2465 ### DownloadDirectory
2466 Set and lock the download directory.
2467
2468 You can use ${home} for the native home directory.
2469
2470 **Compatibility:** Firefox 68, Firefox ESR 68\
2471 **CCK2 Equivalent:** N/A\
2472 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2473
2474 #### Windows (GPO)
2475 ```
2476 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2477 ```
2478 #### Windows (Intune)
2479 OMA-URI:
2480 ```
2481 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2482 ```
2483 Value (string):
2484 ```
2485 <enabled/>
2486 <data id="Preferences_String" value="${home}\Downloads"/>
2487 ```
2488 #### macOS
2489 ```
2490 <dict>
2491 <key>DownloadDirectory</key>
2492 <string>${home}/Downloads</string>
2493 </dict>
2494 ```
2495 #### policies.json (macOS and Linux)
2496 ```
2497 {
2498 "policies": {
2499 "DownloadDirectory": "${home}/Downloads"
2500 }
2501 ```
2502 #### policies.json (Windows)
2503 ```
2504 {
2505 "policies": {
2506 "DownloadDirectory": "${home}\\Downloads"
2507 }
2508 ```
2509 ### EnableTrackingProtection
2510 Configure tracking protection.
2511
2512 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2513
2514 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2515
2516 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2517
2518 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2519
2520 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2521
2522 If `EmailTracking` is set to true, hidden email tracking pixels and scripts on websites are blocked. (Firefox 112)
2523
2524 `Exceptions` are origins for which tracking protection is not enabled.
2525
2526 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2527 **CCK2 Equivalent:** N/A\
2528 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2529
2530 #### Windows (GPO)
2531 ```
2532 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2533 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2534 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2535 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2536 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2537 ```
2538 #### Windows (Intune)
2539 OMA-URI:
2540 ```
2541 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2542 ```
2543 Value (string):
2544 ```
2545 <enabled/> or <disabled/>
2546 ```
2547 OMA-URI:
2548 ```
2549 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2550 ```
2551 Value (string):
2552 ```
2553 <enabled/> or <disabled/>
2554 ```
2555 OMA-URI:
2556 ```
2557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2558 ```
2559 Value (string):
2560 ```
2561 <enabled/> or <disabled/>
2562 ```
2563 OMA-URI:
2564 ```
2565 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2566 ```
2567 Value (string):
2568 ```
2569 <enabled/>
2570 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2571 ```
2572 OMA-URI:
2573 ```
2574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2575 ```
2576 Value (string):
2577 ```
2578 <enabled/> or <disabled/>
2579 ```
2580 #### macOS
2581 ```
2582 <dict>
2583 <key>EnableTrackingProtection</key>
2584 <dict>
2585 <key>Value</key>
2586 <true/> | <false/>
2587 <key>Locked</key>
2588 <true/> | <false/>
2589 <key>Cryptomining</key>
2590 <true/> | <false/>
2591 <key>Fingerprinting</key>
2592 <true/> | <false/>
2593 <key>Exceptions</key>
2594 <array>
2595 <string>https://example.com</string>
2596 </array>
2597 </dict>
2598 </dict>
2599 ```
2600 #### policies.json
2601 ```
2602 {
2603 "policies": {
2604 "EnableTrackingProtection": {
2605 "Value": true | false,
2606 "Locked": true | false,
2607 "Cryptomining": true | false,
2608 "Fingerprinting": true | false,
2609 "Exceptions": ["https://example.com"]
2610 }
2611 }
2612 }
2613 ```
2614 ### EncryptedMediaExtensions
2615 Enable or disable Encrypted Media Extensions and optionally lock it.
2616
2617 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2618
2619 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2620
2621 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2622 **CCK2 Equivalent:** N/A\
2623 **Preferences Affected:** `media.eme.enabled`
2624
2625 #### Windows (GPO)
2626 ```
2627 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2628 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2629 ```
2630 #### Windows (Intune)
2631 OMA-URI:
2632 ```
2633 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2634 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2635 ```
2636 Value (string):
2637 ```
2638 <enabled/>or <disabled/>
2639 ```
2640 #### macOS
2641 ```
2642 <dict>
2643 <key>EncryptedMediaExtensions</key>
2644 <dict>
2645 <key>Enabled</key>
2646 <true/> | <false/>
2647 <key>Locked</key>
2648 <true/> | <false/>
2649 </dict>
2650 </dict>
2651 ```
2652 #### policies.json
2653 ```
2654 {
2655 "policies": {
2656 "EncryptedMediaExtensions": {
2657 "Enabled": true | false,
2658 "Locked": true | false
2659 }
2660 }
2661 }
2662 ```
2663 ### EnterprisePoliciesEnabled
2664 Enable policy support on macOS.
2665
2666 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2667 **CCK2 Equivalent:** N/A\
2668 **Preferences Affected:** N/A
2669
2670 #### macOS
2671 ```
2672 <dict>
2673 <key>EnterprisePoliciesEnabled</key>
2674 <true/>
2675 </dict>
2676 ```
2677 ### ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2678
2679 Disable warnings based on file extension for specific file types on domains.
2680
2681 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#ExemptDomainFileTypePairsFromFileTypeDownloadWarnings) of the same name.
2682
2683 Important: The documentation for the policy for both Edge and Chrome is incorrect. The ```domains``` value must be a domain, not a URL pattern. Also, we do not support using ```*``` to mean all domains.
2684
2685 **Compatibility:** Firefox 102\
2686 **CCK2 Equivalent:** N/A\
2687 **Preferences Affected:** N/A
2688
2689 #### Windows (GPO)
2690 Software\Policies\Mozilla\Firefox\ExemptDomainFileTypePairsFromFileTypeDownloadWarnings (REG_MULTI_SZ) =
2691 ```
2692 [
2693 {
2694 "file_extension": "jnlp",
2695 "domains": ["example.com"]
2696 }
2697 ]
2698 ```
2699 #### Windows (Intune)
2700 OMA-URI:
2701 ```
2702 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExemptDomainFileTypePairsFromFileTypeDownloadWarnings
2703 ```
2704 Value (string):
2705 ```
2706 <enabled/>
2707 <data id="JSON" value='
2708 [
2709 {
2710 "file_extension": "jnlp",
2711 "domains": ["example.com"]
2712 }
2713 ]
2714 '/>
2715 ```
2716 #### macOS
2717 ```
2718 <dict>
2719 <key>ExemptDomainFileTypePairsFromFileTypeDownloadWarnings</key>
2720 <array>
2721 <dict>
2722 <key>file_extension</key>
2723 <string>jnlp</string>
2724 <key>domains</key>
2725 <array>
2726 <string>example.com</string>
2727 </array>
2728 </dict>
2729 </array>
2730 </dict>
2731 ```
2732 #### policies.json
2733 ```
2734 {
2735 "policies": {
2736 "ExemptDomainFileTypePairsFromFileTypeDownloadWarnings": [{
2737 "file_extension": "jnlp",
2738 "domains": ["example.com"]
2739 }]
2740 }
2741 }
2742 ```
2743 ### Extensions
2744 Control the installation, uninstallation and locking of extensions.
2745
2746 We strongly recommend that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2747
2748 This method will be deprecated in the near future.
2749
2750 `Install` is a list of URLs or native paths for extensions to be installed.
2751
2752 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2753
2754 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2755
2756 **Compatibility:** Firefox 60, Firefox ESR 60\
2757 **CCK2 Equivalent:** `addons`\
2758 **Preferences Affected:** N/A
2759
2760 #### Windows (GPO)
2761 ```
2762 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2763 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2764 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2765 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2766 ```
2767 #### Windows (Intune)
2768 OMA-URI:
2769 ```
2770 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2771 ```
2772 Value (string):
2773 ```
2774 <enabled/>
2775 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2776 ```
2777 OMA-URI:
2778 ```
2779 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2780 ```
2781 Value (string):
2782 ```
2783 <enabled/>
2784 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2785 ```
2786 OMA-URI:
2787 ```
2788 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2789 ```
2790 Value (string):
2791 ```
2792 <enabled/>
2793 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2794 ```
2795 #### macOS
2796 ```
2797 <dict>
2798 <key>Extensions</key>
2799 <dict>
2800 <key>Install</key>
2801 <array>
2802 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2803 <string>//path/to/xpi</string>
2804 </array>
2805 <key>Uninstall</key>
2806 <array>
2807 <string>bad_addon_id@mozilla.org</string>
2808 </array>
2809 <key>Locked</key>
2810 <array>
2811 <string>addon_id@mozilla.org</string>
2812 </array>
2813 </dict>
2814 </dict>
2815 ```
2816 #### policies.json
2817 ```
2818 {
2819 "policies": {
2820 "Extensions": {
2821 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2822 "Uninstall": ["bad_addon_id@mozilla.org"],
2823 "Locked": ["addon_id@mozilla.org"]
2824 }
2825 }
2826 }
2827 ```
2828 ### ExtensionSettings
2829 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2830
2831 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2832
2833 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2834
2835 The configuration for each extension is another dictionary that can contain the fields documented below.
2836
2837 | Name | Description |
2838 | --- | --- |
2839 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2840 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2841 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2842 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2843 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2844 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2845 | `install_sources` | A list of sources from which installing extensions is allowed using URL match patterns. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2846 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2847 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2848 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2849 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2850 | `default_area` | (Firefox 113) String that indicates where to place the extension icon by default. Possible values are `navbar` and `menupanel`.
2851 | `temporarily_allow_weak_signatures`| (Firefox 127) A boolean that indicates whether to allow installing extensions signed using deprecated signature algorithms.
2852
2853 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2854 **CCK2 Equivalent:** N/A\
2855 **Preferences Affected:** N/A
2856
2857 #### Windows (GPO)
2858 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2859 ```
2860 {
2861 "*": {
2862 "blocked_install_message": "Custom error message.",
2863 "install_sources": ["https://yourwebsite.com/*"],
2864 "installation_mode": "blocked",
2865 "allowed_types": ["extension"]
2866 },
2867 "uBlock0@raymondhill.net": {
2868 "installation_mode": "force_installed",
2869 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2870 },
2871 "https-everywhere@eff.org": {
2872 "installation_mode": "allowed",
2873 "updates_disabled": false
2874 }
2875 }
2876 ```
2877 #### Windows (Intune)
2878 OMA-URI:
2879 ```
2880 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2881 ```
2882 Value (string):
2883 ```
2884 <enabled/>
2885 <data id="ExtensionSettings" value='
2886 {
2887 "*": {
2888 "blocked_install_message": "Custom error message.",
2889 "install_sources": ["https://yourwebsite.com/*"],
2890 "installation_mode": "blocked",
2891 "allowed_types": ["extension"]
2892 },
2893 "uBlock0@raymondhill.net": {
2894 "installation_mode": "force_installed",
2895 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2896 },
2897 "https-everywhere@eff.org": {
2898 "installation_mode": "allowed",
2899 "updates_disabled": false
2900 }
2901 }'/>
2902 ```
2903 #### macOS
2904 ```
2905 <dict>
2906 <key>ExtensionSettings</key>
2907 <dict>
2908 <key>*</key>
2909 <dict>
2910 <key>blocked_install_message</key>
2911 <string>Custom error message.</string>
2912 <key>install_sources</key>
2913 <array>
2914 <string>"https://yourwebsite.com/*"</string>
2915 </array>
2916 <key>installation_mode</key>
2917 <string>blocked</string>
2918 <key>allowed_types</key>
2919 <array>
2920 <string>extension</string>
2921 </array>
2922 </dict>
2923 <key>uBlock0@raymondhill.net</key>
2924 <dict>
2925 <key>installation_mode</key>
2926 <string>force_installed</string>
2927 <key>install_url</key>
2928 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2929 </dict>
2930 <key>https-everywhere@eff.org</key>
2931 <dict>
2932 <key>installation_mode</key>
2933 <string>allowed</string>
2934 <key>updates_disabled</key>
2935 <true/> | <false/>
2936 </dict>
2937 </dict>
2938 </dict>
2939 ```
2940 #### policies.json
2941 ```
2942 {
2943 "policies": {
2944 "ExtensionSettings": {
2945 "*": {
2946 "blocked_install_message": "Custom error message.",
2947 "install_sources": ["https://yourwebsite.com/*"],
2948 "installation_mode": "blocked",
2949 "allowed_types": ["extension"]
2950 },
2951 "uBlock0@raymondhill.net": {
2952 "installation_mode": "force_installed",
2953 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2954 },
2955 "https-everywhere@eff.org": {
2956 "installation_mode": "allowed",
2957 "updates_disabled": false
2958 }
2959 }
2960 }
2961 }
2962 ```
2963 ### ExtensionUpdate
2964 Control extension updates.
2965
2966 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2967 **CCK2 Equivalent:** N/A\
2968 **Preferences Affected:** `extensions.update.enabled`
2969
2970 #### Windows (GPO)
2971 ```
2972 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2973 ```
2974 #### Windows (Intune)
2975 OMA-URI:
2976 ```
2977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2978 ```
2979 Value (string):
2980 ```
2981 <enabled/> or <disabled/>
2982 ```
2983 #### macOS
2984 ```
2985 <dict>
2986 <key>ExtensionUpdate</key>
2987 <true/> | <false/>
2988 </dict>
2989 ```
2990 #### policies.json
2991 ```
2992 {
2993 "policies": {
2994 "ExtensionUpdate": true | false
2995 }
2996 }
2997 ```
2998 ### FirefoxHome
2999 Customize the Firefox Home page.
3000
3001 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4, Snippets was deprecated in Firefox 122)
3002 **CCK2 Equivalent:** N/A\
3003 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
3004
3005 #### Windows (GPO)
3006 ```
3007 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
3008 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
3009 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
3010 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
3011 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
3012 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
3013 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
3014 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
3015 ```
3016 #### Windows (Intune)
3017 OMA-URI:
3018 ```
3019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
3020 ```
3021 Value (string):
3022 ```
3023 <enabled/>
3024 <data id="FirefoxHome_Search" value="true | false"/>
3025 <data id="FirefoxHome_TopSites" value="true | false"/>
3026 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
3027 <data id="FirefoxHome_Highlights" value="true | false"/>
3028 <data id="FirefoxHome_Pocket" value="true | false"/>
3029 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
3030 <data id="FirefoxHome_Snippets" value="true | false"/>
3031 <data id="FirefoxHome_Locked" value="true | false"/>
3032 ```
3033 #### macOS
3034 ```
3035 <dict>
3036 <key>FirefoxHome</key>
3037 <dict>
3038 <key>Search</key>
3039 <true/> | <false/>
3040 <key>TopSites</key>
3041 <true/> | <false/>
3042 <key>SponsoredTopSites</key>
3043 <true/> | <false/>
3044 <key>Highlights</key>
3045 <true/> | <false/>
3046 <key>Pocket</key>
3047 <true/> | <false/>
3048 <key>SponsoredPocket</key>
3049 <true/> | <false/>
3050 <key>Snippets</key>
3051 <true/> | <false/>
3052 <key>Locked</key>
3053 <true/> | <false/>
3054 </dict>
3055 </dict>
3056 ```
3057 #### policies.json
3058 ```
3059 {
3060 "policies": {
3061 "FirefoxHome": {
3062 "Search": true | false,
3063 "TopSites": true | false,
3064 "SponsoredTopSites": true | false,
3065 "Highlights": true | false,
3066 "Pocket": true | false,
3067 "SponsoredPocket": true | false,
3068 "Snippets": true | false,
3069 "Locked": true | false
3070 }
3071 }
3072 }
3073 ```
3074 ### FirefoxSuggest
3075 Customize Firefox Suggest (US only).
3076
3077 **Compatibility:** Firefox 118, Firefox ESR 115.3.
3078 **CCK2 Equivalent:** N/A\
3079 **Preferences Affected:** `browser.urlbar.suggest.quicksuggest.nonsponsored`, `browser.urlbar.suggest.quicksuggest.sponsored`, `browser.urlbar.quicksuggest.dataCollection.enabled`
3080
3081 #### Windows (GPO)
3082 ```
3083 Software\Policies\Mozilla\Firefox\FirefoxSuggest\WebSuggestions = 0x1 | 0x0
3084 Software\Policies\Mozilla\Firefox\FirefoxSuggest\SponsoredSuggestions = 0x1 | 0x0
3085 Software\Policies\Mozilla\Firefox\FirefoxSuggest\ImproveSuggest = 0x1 | 0x0
3086 Software\Policies\Mozilla\Firefox\FirefoxSuggest\Locked = 0x1 | 0x0
3087 ```
3088 #### Windows (Intune)
3089 OMA-URI:
3090 ```
3091 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/WebSuggestions
3092 ```
3093 Value (string):
3094 ```
3095 <enabled/> or <disabled/>
3096 ```
3097 OMA-URI:
3098 ```
3099 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/SponsoredSuggestions
3100 ```
3101 Value (string):
3102 ```
3103 <enabled/> or <disabled/>
3104 ```
3105 OMA-URI:
3106 ```
3107 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/ImproveSuggest
3108 ```
3109 Value (string):
3110 ```
3111 <enabled/> or <disabled/>
3112 ```
3113 OMA-URI:
3114 ```
3115 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~FirefoxSuggest/Locked
3116 ```
3117 Value (string):
3118 ```
3119 <enabled/> or <disabled/>
3120 ```
3121 #### macOS
3122 ```
3123 <dict>
3124 <key>FirefoxSuggest</key>
3125 <dict>
3126 <key>WebSuggestions</key>
3127 <true/> | <false/>
3128 <key>SponsoredSuggestions</key>
3129 <true/> | <false/>
3130 <key>ImproveSuggest</key>
3131 <true/> | <false/>
3132 <key>Locked</key>
3133 <true/> | <false/>
3134 </dict>
3135 </dict>
3136 ```
3137 #### policies.json
3138 ```
3139 {
3140 "policies": {
3141 "FirefoxSuggest": {
3142 "WebSuggestions": true | false,
3143 "SponsoredSuggestions": true | false,
3144 "ImproveSuggest": true | false,
3145 "Locked": true | false
3146 }
3147 }
3148 }
3149 ```
3150 ### GoToIntranetSiteForSingleWordEntryInAddressBar
3151 Whether to always go through the DNS server before sending a single word search string to a search engine.
3152
3153 If the site exists, it will navigate to the website. If the intranet responds with a 404, the page will show a 404. If the intranet does not respond, the browser will attempt a search.
3154
3155 The second result in the URL bar will be a search result to allow users to conduct a web search exactly as it was entered.
3156
3157 If instead you would like to enable the ability to have your domain appear as a valid URL and to disallow the browser from ever searching that term using the first result that matches it, add the pref `browser.fixup.domainwhitelist.YOUR_DOMAIN` (where `YOUR_DOMAIN` is the name of the domain you'd like to add), and set the pref to `true`. The URL bar will then suggest `YOUR_DOMAIN` when the user fully types `YOUR_DOMAIN`. If the user attempts to load that domain and it fails to load, it will show an "Unable to connect" error page.
3158
3159 You can also whitelist a domain suffix that is not part of the [Public Suffix List](https://publicsuffix.org/) by adding the pref `browser.fixup.domainsuffixwhitelist.YOUR_DOMAIN_SUFFIX` with a value of `true`.
3160
3161 Additionally, if you want users to see a "Did you mean to go to 'YOUR_DOMAIN'" prompt below the URL bar if they land on a search results page instead of an intranet domain that provides a response, set the pref `browser.urlbar.dnsResolveSingleWordsAfterSearch` to `1`. Enabling this will cause the browser to commit a DNS check after every single word search. If the browser receives a response from the intranet, a prompt will ask the user if they'd like to instead navigate to `YOUR_DOMAIN`. If the user presses the **yes** button, `browser.fixup.domainwhitelist.YOUR_DOMAIN` will be set to `true`.
3162
3163 **Compatibility:** Firefox 104, Firefox ESR 102.2\
3164 **CCK2 Equivalent:** `N/A`\
3165 **Preferences Affected:** `browser.fixup.dns_first_for_single_words`
3166
3167 #### Windows (GPO)
3168 ```
3169 Software\Policies\Mozilla\Firefox\GoToIntranetSiteForSingleWordEntryInAddressBar = 0x1 | 0x0
3170 ```
3171 #### Windows (Intune)
3172 OMA-URI:
3173 ```
3174 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/GoToIntranetSiteForSingleWordEntryInAddressBar
3175 ```
3176 Value (string):
3177 ```
3178 <enabled/> or <disabled/>
3179 ```
3180 #### macOS
3181 ```
3182 <dict>
3183 <key>GoToIntranetSiteForSingleWordEntryInAddressBar</key>
3184 <true/> | <false/>
3185 </dict>
3186 ```
3187 #### policies.json
3188 ```
3189 {
3190 "policies": {
3191 "GoToIntranetSiteForSingleWordEntryInAddressBar": true | false
3192 }
3193 }
3194 ```
3195 ### Handlers
3196 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
3197
3198 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
3199
3200 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
3201
3202 | Name | Description |
3203 | --- | --- |
3204 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
3205 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
3206 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
3207 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
3208 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
3209 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
3210
3211 **Compatibility:** Firefox 78, Firefox ESR 78\
3212 **CCK2 Equivalent:** N/A\
3213 **Preferences Affected:** N/A
3214
3215 #### Windows (GPO)
3216 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
3217 ```
3218 {
3219 "mimeTypes": {
3220 "application/msword": {
3221 "action": "useSystemDefault",
3222 "ask": true | false
3223 }
3224 },
3225 "schemes": {
3226 "mailto": {
3227 "action": "useHelperApp",
3228 "ask": true | false,
3229 "handlers": [{
3230 "name": "Gmail",
3231 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3232 }]
3233 }
3234 },
3235 "extensions": {
3236 "pdf": {
3237 "action": "useHelperApp",
3238 "ask": true | false,
3239 "handlers": [{
3240 "name": "Adobe Acrobat",
3241 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3242 }]
3243 }
3244 }
3245 }
3246 ```
3247 #### Windows (Intune)
3248 OMA-URI:
3249 ```
3250 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
3251 ```
3252 Value (string):
3253 ```
3254 <enabled/>
3255 <data id="Handlers" value='
3256 {
3257 "mimeTypes": {
3258 "application/msword": {
3259 "action": "useSystemDefault",
3260 "ask": true | false
3261 }
3262 },
3263 "schemes": {
3264 "mailto": {
3265 "action": "useHelperApp",
3266 "ask": true | false,
3267 "handlers": [{
3268 "name": "Gmail",
3269 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
3270 }]
3271 }
3272 },
3273 "extensions": {
3274 "pdf": {
3275 "action": "useHelperApp",
3276 "ask": true | false,
3277 "handlers": [{
3278 "name": "Adobe Acrobat",
3279 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
3280 }]
3281 }
3282 }
3283 }
3284 '/>
3285 ```
3286 #### macOS
3287 ```
3288 <dict>
3289 <key>Handlers</key>
3290 <dict>
3291 <key>mimeTypes</key>
3292 <dict>
3293 <key>application/msword</key>
3294 <dict>
3295 <key>action</key>
3296 <string>useSystemDefault</string>
3297 <key>ask</key>
3298 <true/> | <false/>
3299 </dict>
3300 </dict>
3301 <key>schemes</key>
3302 <dict>
3303 <key>mailto</key>
3304 <dict>
3305 <key>action</key>
3306 <string>useHelperApp</string>
3307 <key>ask</key>
3308 <true/> | <false/>
3309 <key>handlers</key>
3310 <array>
3311 <dict>
3312 <key>name</key>
3313 <string>Gmail</string>
3314 <key>uriTemplate</key>
3315 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
3316 </dict>
3317 </array>
3318 </dict>
3319 </dict>
3320 <key>extensions</key>
3321 <dict>
3322 <key>pdf</key>
3323 <dict>
3324 <key>action</key>
3325 <string>useHelperApp</string>
3326 <key>ask</key>
3327 <true/> | <false/>
3328 <key>handlers</key>
3329 <array>
3330 <dict>
3331 <key>name</key>
3332 <string>Adobe Acrobat</string>
3333 <key>path</key>
3334 <string>/System/Applications/Preview.app</string>
3335 </dict>
3336 </array>
3337 </dict>
3338 </dict>
3339 </dict>
3340 </dict>
3341 ```
3342 #### policies.json
3343 ```
3344 {
3345 "policies": {
3346 "Handlers": {
3347 "mimeTypes": {
3348 "application/msword": {
3349 "action": "useSystemDefault",
3350 "ask": false
3351 }
3352 },
3353 "schemes": {
3354 "mailto": {
3355 "action": "useHelperApp",
3356 "ask": true | false,
3357 "handlers": [{
3358 "name": "Gmail",
3359 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3360 }]
3361 }
3362 },
3363 "extensions": {
3364 "pdf": {
3365 "action": "useHelperApp",
3366 "ask": true | false,
3367 "handlers": [{
3368 "name": "Adobe Acrobat",
3369 "path": "/usr/bin/acroread"
3370 }]
3371 }
3372 }
3373 }
3374 }
3375 }
3376 ```
3377 ### HardwareAcceleration
3378 Control hardware acceleration.
3379
3380 **Compatibility:** Firefox 60, Firefox ESR 60\
3381 **CCK2 Equivalent:** N/A\
3382 **Preferences Affected:** `layers.acceleration.disabled`
3383
3384 #### Windows (GPO)
3385 ```
3386 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3387 ```
3388 #### Windows (Intune)
3389 OMA-URI:
3390 ```
3391 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3392 ```
3393 Value (string):
3394 ```
3395 <enabled/> or <disabled/>
3396 ```
3397 #### macOS
3398 ```
3399 <dict>
3400 <key>HardwareAcceleration</key>
3401 <true/> | <false/>
3402 </dict>
3403 ```
3404 #### policies.json
3405 ```
3406 {
3407 "policies": {
3408 "HardwareAcceleration": true | false
3409 }
3410 }
3411 ```
3412 ### Homepage
3413 Configure the default homepage and how Firefox starts.
3414
3415 `URL` is the default homepage.
3416
3417 `Locked` prevents the user from changing homepage preferences.
3418
3419 `Additional` allows for more than one homepage.
3420
3421 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3422
3423 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3424
3425 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3426 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3427 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3428
3429 #### Windows (GPO)
3430 ```
3431 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3432 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3433 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3434 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3435 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3436 ```
3437 #### Windows (Intune)
3438 OMA-URI:
3439 ```
3440 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3441 ```
3442 Value (string):
3443 ```
3444 <enabled/>
3445
3446 <data id="HomepageURL" value="https://example.com"/>
3447 <data id="HomepageLocked" value="true | false"/>
3448 ```
3449 OMA-URI:
3450 ```
3451 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3452 ```
3453 Value (string):
3454 ```
3455 <enabled/>
3456
3457 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3458 ```
3459 OMA-URI:
3460 ```
3461 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3462 ```
3463 Value (string):
3464 ```
3465 <enabled/>
3466
3467 <data id="StartPage" value="none | homepage | previous-session"/>
3468 ```
3469 #### macOS
3470 ```
3471 <dict>
3472 <key>Homepage</key>
3473 <dict>
3474 <key>URL</key>
3475 <string>http://example.com</string>
3476 <key>Locked</key>
3477 <true/> | <false/>
3478 <key>Additional</key>
3479 <array>
3480 <string>http://example.org</string>
3481 <string>http://example.edu</string>
3482 </array>
3483 <key>StartPage</key>
3484 <string>none | homepage | previous-session | homepage-locked</string>
3485 </dict>
3486 </dict>
3487 ```
3488 #### policies.json
3489 ```
3490 {
3491 "policies": {
3492 "Homepage": {
3493 "URL": "http://example.com/",
3494 "Locked": true | false,
3495 "Additional": ["http://example.org/",
3496 "http://example.edu/"],
3497 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3498 }
3499 }
3500 }
3501 ```
3502 ### InstallAddonsPermission
3503 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3504
3505 `Allow` is a list of origins where extension installs are allowed.
3506
3507 `Default` determines whether or not extension installs are allowed by default.
3508
3509 **Compatibility:** Firefox 60, Firefox ESR 60\
3510 **CCK2 Equivalent:** `permissions.install`\
3511 **Preferences Affected:** `xpinstall.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3512
3513 #### Windows (GPO)
3514 ```
3515 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3516 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3517 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3518 ```
3519 #### Windows (Intune)
3520 OMA-URI:
3521 ```
3522 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3523 ```
3524 Value (string):
3525 ```
3526 <enabled/>
3527 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3528 ```
3529 OMA-URI:
3530 ```
3531 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3532 ```
3533 Value (string):
3534 ```
3535 <enabled/>
3536 ```
3537 #### macOS
3538 ```
3539 <dict>
3540 <key>InstallAddonsPermission</key>
3541 <dict>
3542 <key>Allow</key>
3543 <array>
3544 <string>http://example.org</string>
3545 <string>http://example.edu</string>
3546 </array>
3547 <key>Default</key>
3548 <true/> | <false/>
3549 </dict>
3550 </dict>
3551 ```
3552 #### policies.json
3553 ```
3554 {
3555 "policies": {
3556 "InstallAddonsPermission": {
3557 "Allow": ["http://example.org/",
3558 "http://example.edu/"],
3559 "Default": true | false
3560 }
3561 }
3562 }
3563 ```
3564 ### LegacyProfiles
3565 Disable the feature enforcing a separate profile for each installation.
3566
3567 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3568
3569 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3570
3571 This policy only work on Windows via GPO (not policies.json).
3572
3573 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3574 **CCK2 Equivalent:** N/A\
3575 **Preferences Affected:** N/A
3576
3577 #### Windows (GPO)
3578 ```
3579 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3580 ```
3581 #### Windows (Intune)
3582 OMA-URI:
3583 ```
3584 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3585 ```
3586 Value (string):
3587 ```
3588 <enabled/> or <disabled/>
3589 ```
3590 ### LegacySameSiteCookieBehaviorEnabled
3591 Enable default legacy SameSite cookie behavior setting.
3592
3593 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3594
3595 **Compatibility:** Firefox 96\
3596 **CCK2 Equivalent:** N/A\
3597 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3598
3599 #### Windows (GPO)
3600 ```
3601 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3602 ```
3603 #### Windows (Intune)
3604 OMA-URI:
3605 ```
3606 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3607 ```
3608 Value (string):
3609 ```
3610 <enabled/> or <disabled/>
3611 ```
3612 #### macOS
3613 ```
3614 <dict>
3615 <key>LegacySameSiteCookieBehaviorEnabled</key>
3616 <true/> | <false/>
3617 </dict>
3618 ```
3619 #### policies.json
3620 ```
3621 {
3622 "policies": {
3623 "LegacySameSiteCookieBehaviorEnabled": true | false
3624 }
3625 ```
3626 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3627 Revert to legacy SameSite behavior for cookies on specified sites.
3628
3629 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3630
3631 **Compatibility:** Firefox 96\
3632 **CCK2 Equivalent:** N/A\
3633 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3634
3635 #### Windows (GPO)
3636 ```
3637 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3638 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3639 ```
3640 #### Windows (Intune)
3641 OMA-URI:
3642 ```
3643 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3644 ```
3645 Value (string):
3646 ```
3647 <enabled/>
3648 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3649 ```
3650 #### macOS
3651 ```
3652 <dict>
3653 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3654 <array>
3655 <string>example.org</string>
3656 <string>example.edu</string>
3657 </array>
3658 </dict>
3659 ```
3660 #### policies.json
3661 ```
3662 {
3663 "policies": {
3664 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3665 "example.edu"]
3666 }
3667 }
3668 ```
3669 ### LocalFileLinks
3670 Enable linking to local files by origin.
3671
3672 **Compatibility:** Firefox 68, Firefox ESR 68\
3673 **CCK2 Equivalent:** N/A\
3674 **Preferences Affected:** `capability.policy.localfilelinks.*`
3675
3676 #### Windows (GPO)
3677 ```
3678 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3679 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3680 ```
3681 #### Windows (Intune)
3682 OMA-URI:
3683 ```
3684 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3685 ```
3686 Value (string):
3687 ```
3688 <enabled/>
3689 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3690 ```
3691 #### macOS
3692 ```
3693 <dict>
3694 <key>LocalFileLinks</key>
3695 <array>
3696 <string>http://example.org</string>
3697 <string>http://example.edu</string>
3698 </array>
3699 </dict>
3700 ```
3701 #### policies.json
3702 ```
3703 {
3704 "policies": {
3705 "LocalFileLinks": ["http://example.org/",
3706 "http://example.edu/"]
3707 }
3708 }
3709 ```
3710 ### ManagedBookmarks
3711 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3712
3713 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3714
3715 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3716 ```
3717 {
3718 "items": {
3719 "id": "BookmarkType",
3720 "properties": {
3721 "children": {
3722 "items": {
3723 "$ref": "BookmarkType"
3724 },
3725 "type": "array"
3726 },
3727 "name": {
3728 "type": "string"
3729 },
3730 "toplevel_name": {
3731 "type": "string"
3732 },
3733 "url": {
3734 "type": "string"
3735 }
3736 },
3737 "type": "object"
3738 },
3739 "type": "array"
3740 }
3741 ```
3742 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3743 **CCK2 Equivalent:** N/A\
3744 **Preferences Affected:** N/A
3745
3746 #### Windows (GPO)
3747 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3748 ```
3749 [
3750 {
3751 "toplevel_name": "My managed bookmarks folder"
3752 },
3753 {
3754 "url": "example.com",
3755 "name": "Example"
3756 },
3757 {
3758 "name": "Mozilla links",
3759 "children": [
3760 {
3761 "url": "https://mozilla.org",
3762 "name": "Mozilla.org"
3763 },
3764 {
3765 "url": "https://support.mozilla.org/",
3766 "name": "SUMO"
3767 }
3768 ]
3769 }
3770 ]
3771 ```
3772 #### Windows (Intune)
3773 OMA-URI:
3774 ```
3775 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3776 ```
3777 Value (string):
3778 ```
3779 <enabled/>
3780 <data id="JSON" value='
3781 [
3782 {
3783 "toplevel_name": "My managed bookmarks folder"
3784 },
3785 {
3786 "url": "example.com",
3787 "name": "Example"
3788 },
3789 {
3790 "name": "Mozilla links",
3791 "children": [
3792 {
3793 "url": "https://mozilla.org",
3794 "name": "Mozilla.org"
3795 },
3796 {
3797 "url": "https://support.mozilla.org/",
3798 "name": "SUMO"
3799 }
3800 ]
3801 }
3802 ]'/>
3803 ```
3804 #### macOS
3805 ```
3806 <dict>
3807 <key>ManagedBookmarks</key>
3808 <array>
3809 <dict>
3810 <key>toplevel_name</key>
3811 <string>My managed bookmarks folder</string>
3812 <dict>
3813 <key>url</key>
3814 <string>example.com</string>
3815 <key>name</key>
3816 <string>Example</string>
3817 </dict>
3818 <dict>
3819 <key>name</key>
3820 <string>Mozilla links</string>
3821 <key>children</key>
3822 <array>
3823 <dict>
3824 <key>url</key>
3825 <string>https://mozilla.org</string>
3826 <key>name</key>
3827 <string>Mozilla</string>
3828 </dict>
3829 <dict>
3830 <key>url</key>
3831 <string>https://support.mozilla.org/</string>
3832 <key>name</key>
3833 <string>SUMO</string>
3834 </dict>
3835 </array>
3836 </dict>
3837 </array>
3838 </dict>
3839 ```
3840 #### policies.json
3841 ```
3842 {
3843 "policies": {
3844 "ManagedBookmarks": [
3845 {
3846 "toplevel_name": "My managed bookmarks folder"
3847 },
3848 {
3849 "url": "example.com",
3850 "name": "Example"
3851 },
3852 {
3853 "name": "Mozilla links",
3854 "children": [
3855 {
3856 "url": "https://mozilla.org",
3857 "name": "Mozilla.org"
3858 },
3859 {
3860 "url": "https://support.mozilla.org/",
3861 "name": "SUMO"
3862 }
3863 ]
3864 }
3865 ]
3866 }
3867 }
3868 ```
3869 ### ManualAppUpdateOnly
3870
3871 Switch to manual updates only.
3872
3873 If this policy is enabled:
3874 1. The user will never be prompted to install updates
3875 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3876 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3877
3878 This policy is primarily intended for advanced end users, not for enterprises, but it is available via GPO.
3879
3880 **Compatibility:** Firefox 87\
3881 **CCK2 Equivalent:** N/A\
3882 **Preferences Affected:** N/A
3883
3884 #### Windows (GPO)
3885 ```
3886 Software\Policies\Mozilla\Firefox\ManualAppUpdateOnly = 0x1 | 0x0
3887 ```
3888 #### Windows (Intune)
3889 OMA-URI:
3890 ```
3891 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManualAppUpdateOnly
3892 ```
3893 Value (string):
3894 ```
3895 <enabled/> or <disabled/>
3896 ```
3897 #### macOS
3898 ```
3899 <dict>
3900 <key>ManualAppUpdateOnly</key>
3901 <true/> | <false/>
3902 </dict>
3903 ```
3904 #### policies.json
3905 ```
3906 {
3907 "policies": {
3908 "ManualAppUpdateOnly": true | false
3909 }
3910 }
3911 ```
3912 ### NetworkPrediction
3913 Enable or disable network prediction (DNS prefetching).
3914
3915 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3916 **CCK2 Equivalent:** N/A\
3917 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3918
3919 #### Windows (GPO)
3920 ```
3921 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3922 ```
3923 #### Windows (Intune)
3924 OMA-URI:
3925 ```
3926 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3927 ```
3928 Value (string):
3929 ```
3930 <enabled/> or <disabled/>
3931 ```
3932 #### macOS
3933 ```
3934 <dict>
3935 <key>NetworkPrediction</key>
3936 <true/> | <false/>
3937 </dict>
3938 ```
3939 #### policies.json
3940 ```
3941 {
3942 "policies": {
3943 "NetworkPrediction": true | false
3944 }
3945 ```
3946 ### NewTabPage
3947 Enable or disable the New Tab page.
3948
3949 **Compatibility:** Firefox 68, Firefox ESR 68\
3950 **CCK2 Equivalent:** N/A\
3951 **Preferences Affected:** `browser.newtabpage.enabled`
3952
3953 #### Windows (GPO)
3954 ```
3955 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3956 ```
3957 #### Windows (Intune)
3958 OMA-URI:
3959 ```
3960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3961 ```
3962 Value (string):
3963 ```
3964 <enabled/> or <disabled/>
3965 ```
3966 #### macOS
3967 ```
3968 <dict>
3969 <key>NewTabPage</key>
3970 <true/> | <false/>
3971 </dict>
3972 ```
3973 #### policies.json
3974 ```
3975 {
3976 "policies": {
3977 "NewTabPage": true | false
3978 }
3979 ```
3980 ### NoDefaultBookmarks
3981 Disable the creation of default bookmarks.
3982
3983 This policy is only effective if the user profile has not been created yet.
3984
3985 **Compatibility:** Firefox 60, Firefox ESR 60\
3986 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3987 **Preferences Affected:** N/A
3988
3989 #### Windows (GPO)
3990 ```
3991 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3992 ```
3993 #### Windows (Intune)
3994 OMA-URI:
3995 ```
3996 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3997 ```
3998 Value (string):
3999 ```
4000 <enabled/> or <disabled/>
4001 ```
4002 #### macOS
4003 ```
4004 <dict>
4005 <key>NoDefaultBookmarks</key>
4006 <true/> | <false/>
4007 </dict>
4008 ```
4009 #### policies.json
4010 ```
4011 {
4012 "policies": {
4013 "NoDefaultBookmarks": true | false
4014 }
4015 }
4016 ```
4017 ### OfferToSaveLogins
4018 Control whether or not Firefox offers to save passwords.
4019
4020 **Compatibility:** Firefox 60, Firefox ESR 60\
4021 **CCK2 Equivalent:** `dontRememberPasswords`\
4022 **Preferences Affected:** `signon.rememberSignons`
4023
4024 #### Windows (GPO)
4025 ```
4026 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
4027 ```
4028 #### Windows (Intune)
4029 OMA-URI:
4030 ```
4031 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
4032 ```
4033 Value (string):
4034 ```
4035 <enabled/> or <disabled/>
4036 ```
4037 #### macOS
4038 ```
4039 <dict>
4040 <key>OfferToSaveLogins</key>
4041 <true/> | <false/>
4042 </dict>
4043 ```
4044 #### policies.json
4045 ```
4046 {
4047 "policies": {
4048 "OfferToSaveLogins": true | false
4049 }
4050 }
4051 ```
4052 ### OfferToSaveLoginsDefault
4053 Sets the default value of signon.rememberSignons without locking it.
4054
4055 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4056 **CCK2 Equivalent:** `dontRememberPasswords`\
4057 **Preferences Affected:** `signon.rememberSignons`
4058
4059 #### Windows (GPO)
4060 ```
4061 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
4062 ```
4063 #### Windows (Intune)
4064 OMA-URI:
4065 ```
4066 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
4067 ```
4068 Value (string):
4069 ```
4070 <enabled/> or <disabled/>
4071 ```
4072 #### macOS
4073 ```
4074 <dict>
4075 <key>OfferToSaveLoginsDefault</key>
4076 <true/> | <false/>
4077 </dict>
4078 ```
4079 #### policies.json
4080 ```
4081 {
4082 "policies": {
4083 "OfferToSaveLoginsDefault": true | false
4084 }
4085 }
4086 ```
4087 ### OverrideFirstRunPage
4088 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
4089
4090 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
4091
4092 **Compatibility:** Firefox 60, Firefox ESR 60\
4093 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
4094 **Preferences Affected:** `startup.homepage_welcome_url`
4095
4096 #### Windows (GPO)
4097 ```
4098 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
4099 ```
4100 #### Windows (Intune)
4101 OMA-URI:
4102 ```
4103 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
4104 ```
4105 Value (string):
4106 ```
4107 <enabled/>
4108 <data id="OverridePage" value="https://example.com"/>
4109 ```
4110 #### macOS
4111 ```
4112 <dict>
4113 <key>OverrideFirstRunPage</key>
4114 <string>http://example.org</string>
4115 </dict>
4116 ```
4117 #### policies.json
4118 ```
4119 {
4120 "policies": {
4121 "OverrideFirstRunPage": "http://example.org"
4122 }
4123 }
4124 ```
4125 ### OverridePostUpdatePage
4126 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
4127
4128 **Compatibility:** Firefox 60, Firefox ESR 60\
4129 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
4130 **Preferences Affected:** `startup.homepage_override_url`
4131
4132 #### Windows (GPO)
4133 ```
4134 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
4135 ```
4136 #### Windows (Intune)
4137 OMA-URI:
4138 ```
4139 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
4140 ```
4141 Value (string):
4142 ```
4143 <enabled/>
4144 <data id="OverridePage" value="https://example.com"/>
4145 ```
4146 #### macOS
4147 ```
4148 <dict>
4149 <key>OverridePostUpdatePage</key>
4150 <string>http://example.org</string>
4151 </dict>
4152 ```
4153 #### policies.json
4154 ```
4155 {
4156 "policies": {
4157 "OverridePostUpdatePage": "http://example.org"
4158 }
4159 }
4160 ```
4161 ### PasswordManagerEnabled
4162 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
4163
4164 **Compatibility:** Firefox 70, Firefox ESR 60.2\
4165 **CCK2 Equivalent:** N/A\
4166 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
4167
4168 #### Windows (GPO)
4169 ```
4170 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
4171 ```
4172 #### Windows (Intune)
4173 OMA-URI:
4174 ```
4175 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
4176 ```
4177 Value (string):
4178 ```
4179 <enabled/> or <disabled/>
4180 ```
4181 #### macOS
4182 ```
4183 <dict>
4184 <key>PasswordManagerEnabled</key>
4185 <true/> | <false/>
4186 </dict>
4187 ```
4188 #### policies.json
4189 ```
4190 {
4191 "policies": {
4192 "PasswordManagerEnabled": true | false
4193 }
4194 }
4195 ```
4196 ### PasswordManagerExceptions
4197 Prevent Firefox from saving passwords for specific sites.
4198
4199 The sites are specified as a list of origins.
4200
4201 **Compatibility:** Firefox 101\
4202 **CCK2 Equivalent:** N/A\
4203 **Preferences Affected:** N/A
4204
4205 #### Windows (GPO)
4206 ```
4207 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
4208 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
4209 ```
4210 #### Windows (Intune)
4211 OMA-URI:
4212 ```
4213 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
4214 ```
4215 Value (string):
4216 ```
4217 <enabled/>
4218 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4219 ```
4220 #### macOS
4221 ```
4222 <dict>
4223 <key>PasswordManagerExceptions</key>
4224 <array>
4225 <string>https://example.org</string>
4226 <string>https://example.edu</string>
4227 </array>
4228 </dict>
4229 ```
4230 #### policies.json
4231 ```
4232 {
4233 "policies": {
4234 "PasswordManagerExceptions": ["https://example.org",
4235 "https://example.edu"]
4236 }
4237 }
4238 ```
4239
4240 ### PDFjs
4241 Disable or configure PDF.js, the built-in PDF viewer.
4242
4243 If `Enabled` is set to false, the built-in PDF viewer is disabled.
4244
4245 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
4246
4247 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
4248
4249 **Compatibility:** Firefox 77, Firefox ESR 68.9\
4250 **CCK2 Equivalent:** N/A\
4251 **Preferences Affected:** `pdfjs.disabled`, `pdfjs.enablePermissions`
4252
4253 #### Windows (GPO)
4254 ```
4255 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
4256 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
4257 ```
4258 #### Windows (Intune)
4259 OMA-URI:
4260 ```
4261 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
4262 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
4263 ```
4264 Value (string):
4265 ```
4266 <enabled/>or <disabled/>
4267 ```
4268 #### macOS
4269 ```
4270 <dict>
4271 <key>PDFjs</key>
4272 <dict>
4273 <key>Enabled</key>
4274 <true/> | <false/>
4275 <key>EnablePermissions</key>
4276 <true/> | <false/>
4277 </dict>
4278 </dict>
4279 ```
4280 #### policies.json
4281 ```
4282 {
4283 "policies": {
4284 "PDFjs": {
4285 "Enabled": true | false,
4286 "EnablePermissions": true | false
4287 }
4288 }
4289 }
4290 ```
4291 ### Permissions
4292 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
4293
4294 `Allow` is a list of origins where the feature is allowed.
4295
4296 `Block` is a list of origins where the feature is not allowed.
4297
4298 `BlockNewRequests` determines whether or not new requests can be made for the feature.
4299
4300 `Locked` prevents the user from changing preferences for the feature.
4301
4302 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
4303
4304 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
4305 **CCK2 Equivalent:** N/A\
4306 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
4307
4308 #### Windows (GPO)
4309 ```
4310 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
4311 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
4312 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
4313 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
4314 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
4315 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
4316 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
4317 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
4318 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
4319 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
4320 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
4321 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
4322 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
4323 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
4324 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
4325 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
4326 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
4327 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
4328 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
4329 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
4330 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
4331 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
4332 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
4333 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
4334 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
4335 ```
4336 #### Windows (Intune)
4337 OMA-URI:
4338 ```
4339 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
4340 ```
4341 Value (string):
4342 ```
4343 <enabled/> or <disabled/>
4344 ```
4345 OMA-URI:
4346 ```
4347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
4348 ```
4349 Value (string):
4350 ```
4351 <enabled/> or <disabled/>
4352 ```
4353 OMA-URI:
4354 ```
4355 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
4356 ```
4357 Value (string):
4358 ```
4359 <enabled/>
4360 <data id="Permissions" value="1&#xF000;https://example.org"/>
4361 ```
4362 OMA-URI:
4363 ```
4364 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
4365 ```
4366 Value (string):
4367 ```
4368 <enabled/> or <disabled/>
4369 ```
4370 OMA-URI:
4371 ```
4372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4373 ```
4374 Value (string):
4375 ```
4376 <enabled/> or <disabled/>
4377 ```
4378 OMA-URI:
4379 ```
4380 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4381 ```
4382 Value (string):
4383 ```
4384 <enabled/>
4385 <data id="Permissions" value="1&#xF000;https://example.org"/>
4386 ```
4387 OMA-URI:
4388 ```
4389 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4390 ```
4391 Value (string):
4392 ```
4393 <enabled/>
4394 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4395 ```
4396 OMA-URI:
4397 ```
4398 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4399 ```
4400 Value (string):
4401 ```
4402 <enabled/>
4403 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4404 ```
4405 OMA-URI:
4406 ```
4407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4408 ```
4409 Value (string):
4410 ```
4411 <enabled/> or <disabled/>
4412 ```
4413 OMA-URI:
4414 ```
4415 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4416 ```
4417 Value (string):
4418 ```
4419 <enabled/>
4420 <data id="Permissions" value="1&#xF000;https://example.org"/>
4421 ```
4422 OMA-URI:
4423 ```
4424 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4425 ```
4426 Value (string):
4427 ```
4428 <enabled/>
4429 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4430 ```
4431 OMA-URI:
4432 ```
4433 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4434 ```
4435 Value (string):
4436 ```
4437 <enabled/> or <disabled/>
4438 ```
4439 OMA-URI:
4440 ```
4441 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4442 ```
4443 Value (string):
4444 ```
4445 <enabled/> or <disabled/>
4446 ```
4447 #### macOS
4448 ```
4449 <dict>
4450 <key>Permissions</key>
4451 <dict>
4452 <key>Camera</key>
4453 <dict>
4454 <key>Allow</key>
4455 <array>
4456 <string>https://example.org</string>
4457 <string>https://example.org:1234</string>
4458 </array>
4459 <key>Block</key>
4460 <array>
4461 <string>https://example.edu</string>
4462 </array>
4463 <key>BlockNewRequests</key>
4464 <true/> | <false/>
4465 <key>Locked</key>
4466 <true/> | <false/>
4467 </dict>
4468 <key>Microphone</key>
4469 <dict>
4470 <key>Allow</key>
4471 <array>
4472 <string>https://example.org</string>
4473 </array>
4474 <key>Block</key>
4475 <array>
4476 <string>https://example.edu</string>
4477 </array>
4478 <key>BlockNewRequests</key>
4479 <true/> | <false/>
4480 <key>Locked</key>
4481 <true/> | <false/>
4482 </dict>
4483 <key>Location</key>
4484 <dict>
4485 <key>Allow</key>
4486 <array>
4487 <string>https://example.org</string>
4488 </array>
4489 <key>Block</key>
4490 <array>
4491 <string>https://example.edu</string>
4492 </array>
4493 <key>BlockNewRequests</key>
4494 <true/> | <false/>
4495 <key>Locked</key>
4496 <true/> | <false/>
4497 </dict>
4498 <key>Notifications</key>
4499 <dict>
4500 <key>Allow</key>
4501 <array>
4502 <string>https://example.org</string>
4503 </array>
4504 <key>Block</key>
4505 <array>
4506 <string>https://example.edu</string>
4507 </array>
4508 <key>BlockNewRequests</key>
4509 <true/>
4510 <key>Locked</key>
4511 <true/>
4512 </dict>
4513 <key>Autoplay</key>
4514 <dict>
4515 <key>Allow</key>
4516 <array>
4517 <string>https://example.org</string>
4518 </array>
4519 <key>Block</key>
4520 <array>
4521 <string>https://example.edu</string>
4522 </array>
4523 <key>Default</key>
4524 <string>allow-audio-video | block-audio | block-audio-video</string>
4525 <key>Locked</key>
4526 <true/> | <false/>
4527 </dict>
4528 </dict>
4529 </dict>
4530 ```
4531 #### policies.json
4532 ```
4533 {
4534 "policies": {
4535 "Permissions": {
4536 "Camera": {
4537 "Allow": ["https://example.org","https://example.org:1234"],
4538 "Block": ["https://example.edu"],
4539 "BlockNewRequests": true | false,
4540 "Locked": true | false
4541 },
4542 "Microphone": {
4543 "Allow": ["https://example.org"],
4544 "Block": ["https://example.edu"],
4545 "BlockNewRequests": true | false,
4546 "Locked": true | false
4547 },
4548 "Location": {
4549 "Allow": ["https://example.org"],
4550 "Block": ["https://example.edu"],
4551 "BlockNewRequests": true | false,
4552 "Locked": true | false
4553 },
4554 "Notifications": {
4555 "Allow": ["https://example.org"],
4556 "Block": ["https://example.edu"],
4557 "BlockNewRequests": true | false,
4558 "Locked": true | false
4559 },
4560 "Autoplay": {
4561 "Allow": ["https://example.org"],
4562 "Block": ["https://example.edu"],
4563 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4564 "Locked": true | false
4565 }
4566 }
4567 }
4568 }
4569 ```
4570 ### PictureInPicture
4571
4572 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4573
4574 **Compatibility:** Firefox 78, Firefox ESR 78\
4575 **CCK2 Equivalent:** N/A\
4576 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4577
4578 #### Windows (GPO)
4579 ```
4580 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4581 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4582
4583 ```
4584 #### Windows (Intune)
4585 OMA-URI:
4586 ```
4587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4588 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4589 ```
4590 Value (string):
4591 ```
4592 <enabled/> or <disabled/>
4593 ```
4594 #### macOS
4595 ```
4596 <dict>
4597 <key>PictureInPicture</key>
4598 <dict>
4599 <key>Enabled</key>
4600 <true/> | <false/>
4601 <key>Locked</key>
4602 <true/> | <false/>
4603 </dict>
4604 </dict>
4605 ```
4606 #### policies.json
4607 ```
4608 {
4609 "policies": {
4610 "PictureInPicture": {
4611 "Enabled": true | false,
4612 "Locked": true | false
4613 }
4614 }
4615 }
4616 ```
4617 ### PopupBlocking
4618 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4619
4620 `Allow` is a list of origins where popup-windows are allowed.
4621
4622 `Default` determines whether or not pop-up windows are allowed by default.
4623
4624 `Locked` prevents the user from changing pop-up preferences.
4625
4626 **Compatibility:** Firefox 60, Firefox ESR 60\
4627 **CCK2 Equivalent:** `permissions.popup`\
4628 **Preferences Affected:** `dom.disable_open_during_load`
4629
4630 #### Windows (GPO)
4631 ```
4632 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4633 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4634 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4635 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4636 ```
4637 #### Windows (Intune)
4638 OMA-URI:
4639 ```
4640 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4641 ```
4642 Value (string):
4643 ```
4644 <enabled/>
4645 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4646 ```
4647 OMA-URI:
4648 ```
4649 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4650 ```
4651 Value (string):
4652 ```
4653 <enabled/> or <disabled/>
4654 ```
4655 OMA-URI:
4656 ```
4657 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4658 ```
4659 Value (string):
4660 ```
4661 <enabled/> or <disabled/>
4662 ```
4663 #### macOS
4664 ```
4665 <dict>
4666 <key>PopupBlocking</key>
4667 <dict>
4668 <key>Allow</key>
4669 <array>
4670 <string>http://example.org</string>
4671 <string>http://example.edu</string>
4672 </array>
4673 <key>Default</key>
4674 <true/> | <false/>
4675 <key>Locked</key>
4676 <true/> | <false/>
4677 </dict>
4678 </dict>
4679 ```
4680 #### policies.json
4681 ```
4682 {
4683 "policies": {
4684 "PopupBlocking": {
4685 "Allow": ["http://example.org/",
4686 "http://example.edu/"],
4687 "Default": true | false,
4688 "Locked": true | false
4689 }
4690 }
4691 }
4692 ```
4693 ### Preferences
4694 Set and lock preferences.
4695
4696 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section in group policy.
4697
4698 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4699
4700 Preferences that start with the following prefixes are supported:
4701 ```
4702 accessibility.
4703 alerts.* (Firefox 122, Firefox ESR 115.7)
4704 app.update.* (Firefox 86, Firefox ESR 78.8)
4705 browser.
4706 datareporting.policy.
4707 dom.
4708 extensions.
4709 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4710 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4711 geo.
4712 gfx.
4713 intl.
4714 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4715 layers.
4716 layout.
4717 media.
4718 network.
4719 pdfjs. (Firefox 84, Firefox ESR 78.6)
4720 places.
4721 pref.
4722 print.
4723 privacy.globalprivacycontrol.enabled (Firefox 127, Firefox ESR 128.0)
4724 privacy.userContext.enabled (Firefox 126, Firefox ESR 115.11)
4725 privacy.userContext.ui.enabled (Firefox 126, Firefox ESR 115.11)
4726 signon. (Firefox 83, Firefox ESR 78.5)
4727 spellchecker. (Firefox 84, Firefox ESR 78.6)
4728 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4729 ui.
4730 widget.
4731 xpinstall.signatures.required (Firefox ESR 102.10, Firefox ESR only)
4732 xpinstall.whitelist.required (Firefox 118, Firefox ESR 115.3)
4733 ```
4734 as well as the following security preferences:
4735
4736 | Preference | Type | Default
4737 | --- | --- | --- |
4738 | security.default_personal_cert | string | Ask Every Time
4739 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4740 | security.disable_button.openCertManager | string | N/A
4741 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the View Certificates button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4742 | security.disable_button.openDeviceManager | string | N/A
4743 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true and locked, the Security Devices button in preferences is disabled (Firefox 121, Firefox ESR 115.6)
4744 | security.insecure_connection_text.enabled | bool | false
4745 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4746 | security.insecure_connection_text.pbmode.enabled | bool | false
4747 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4748 | security.mixed_content.block_active_content | boolean | true
4749 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, mixed active content (HTTP subresources such as scripts, fetch requests, etc. on a HTTPS page) will be blocked.
4750 | security.mixed_content.block_display_content | boolean | false
4751 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, mixed passive/display content (HTTP subresources such as images, videos, etc. on a HTTPS page) will be blocked. (Firefox 127, Firefox ESR 128.0)
4752 | security.mixed_content.upgrade_display_content | boolean | true
4753 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, mixed passive/display content (HTTP subresources such as images, videos, etc. on a HTTPS page) will be upgraded to HTTPS. (Firefox 127, Firefox ESR 128.0)
4754 | security.osclientcerts.autoload | boolean | false
4755 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4756 | security.OCSP.enabled | integer | 1
4757 | &nbsp;&nbsp;&nbsp;&nbsp;If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates.
4758 | security.OCSP.require | boolean | false
4759 | &nbsp;&nbsp;&nbsp;&nbsp; If true, if an OCSP request times out, the connection fails.
4760 | security.osclientcerts.assume_rsa_pss_support | boolean | true
4761 | &nbsp;&nbsp;&nbsp;&nbsp; If false, we don't assume an RSA key can do RSA-PSS. (Firefox 114, Firefox ESR 102.12)
4762 | security.ssl.enable_ocsp_stapling | boolean | true
4763 | &nbsp;&nbsp;&nbsp;&nbsp; If false, OCSP stapling is not enabled.
4764 | security.ssl.errorReporting.enabled | boolean | true
4765 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4766 | security.ssl.require_safe_negotiation | boolean | false
4767 | &nbsp;&nbsp;&nbsp;&nbsp;If true, Firefox will only negotiate TLS connections with servers that indicate they support secure renegotiation. (Firefox 118, Firefox ESR 115.3)
4768 | security.tls.enable_0rtt_data | boolean | true
4769 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off. (Firefox 93, Firefox 91.2, Firefox 78.15)
4770 | security.tls.hello_downgrade_check | boolean | true
4771 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4772 | security.tls.version.enable-deprecated | boolean | false
4773 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1. (Firefox 86, Firefox 78.8)
4774 | security.warn_submit_secure_to_insecure | boolean | true
4775 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4776
4777 Using the preference as the key, set the `Value` to the corresponding preference value.
4778
4779 `Status` can be "default", "locked", "user" or "clear"
4780
4781 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4782 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4783 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4784 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4785
4786 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4787
4788 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4789
4790 You can also set the `Type` starting in Firefox 123 and Firefox ESR 115.8. It can be `number`, `boolean` or `string`. This is especially useful if you are seeing 0 or 1 values being converted to booleans when set as user preferences.
4791
4792 See the examples below for more detail.
4793
4794 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4795
4796 Status
4797 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4798 **CCK2 Equivalent:** `preferences`\
4799 **Preferences Affected:** Many
4800
4801 #### Windows (GPO)
4802 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4803 ```
4804 {
4805 "accessibility.force_disabled": {
4806 "Value": 1,
4807 "Status": "default",
4808 "Type": "number"
4809
4810 },
4811 "browser.cache.disk.parent_directory": {
4812 "Value": "SOME_NATIVE_PATH",
4813 "Status": "user"
4814 },
4815 "browser.tabs.warnOnClose": {
4816 "Value": false,
4817 "Status": "locked"
4818 }
4819 }
4820 ```
4821 #### Windows (Intune)
4822 OMA-URI:
4823 ```
4824 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4825 ```
4826 Value (string):
4827 ```
4828 <enabled/>
4829 <data id="JSON" value='
4830 {
4831 "accessibility.force_disabled": {
4832 "Value": 1,
4833 "Status": "default",
4834 "Type": "number"
4835 },
4836 "browser.cache.disk.parent_directory": {
4837 "Value": "SOME_NATIVE_PATH",
4838 "Status": "user"
4839 },
4840 "browser.tabs.warnOnClose": {
4841 "Value": false,
4842 "Status": "locked"
4843 }
4844 }'/>
4845 ```
4846 #### macOS
4847 ```
4848 <dict>
4849 <key>Preferences</key>
4850 <dict>
4851 <key>accessibility.force_disabled</key>
4852 <dict>
4853 <key>Value</key>
4854 <integer>1</integer>
4855 <key>Status</key>
4856 <string>default</string>
4857 <key>Type</key>
4858 <string>number</string>
4859 </dict>
4860 <key>browser.cache.disk.parent_directory</key>
4861 <dict>
4862 <key>Value</key>
4863 <string>SOME_NATIVE_PATH</string>
4864 <key>Status</key>
4865 <string>user</string>
4866 </dict>
4867 <key>browser.tabs.warnOnClose</key>
4868 <dict>
4869 <key>Value</key>
4870 <false/>
4871 <key>Status</key>
4872 <string>locked</string>
4873 </dict>
4874 </dict>
4875 </dict>
4876 ```
4877 #### policies.json
4878 ```
4879 {
4880 "policies": {
4881 "Preferences": {
4882 "accessibility.force_disabled": {
4883 "Value": 1,
4884 "Status": "default"
4885 "Type": "number"
4886 },
4887 "browser.cache.disk.parent_directory": {
4888 "Value": "SOME_NATIVE_PATH",
4889 "Status": "user"
4890 },
4891 "browser.tabs.warnOnClose": {
4892 "Value": false,
4893 "Status": "locked"
4894 }
4895 }
4896 }
4897 }
4898 ```
4899 ### PrimaryPassword
4900 Require or prevent using a primary (formerly master) password.
4901
4902 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4903
4904 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4905
4906 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4907 **CCK2 Equivalent:** `noMasterPassword`\
4908 **Preferences Affected:** N/A
4909
4910 #### Windows (GPO)
4911 ```
4912 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4913 ```
4914 #### Windows (Intune)
4915 OMA-URI:
4916 ```
4917 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4918 ```
4919 Value (string):
4920 ```
4921 <enabled/> or <disabled/>
4922 ```
4923 #### macOS
4924 ```
4925 <dict>
4926 <key>PrimaryPassword</key>
4927 <true/> | <false/>
4928 </dict>
4929 ```
4930 #### policies.json
4931 ```
4932 {
4933 "policies": {
4934 "PrimaryPassword": true | false
4935 }
4936 }
4937 ```
4938 ### PrintingEnabled
4939 Enable or disable printing.
4940
4941 **Compatibility:** Firefox 120, Firefox ESR 115.5\
4942 **CCK2 Equivalent:** N/A\
4943 **Preferences Affected:** `print.enabled`
4944
4945 #### Windows (GPO)
4946 ```
4947 Software\Policies\Mozilla\Firefox\PrintingEnabled = 0x1 | 0x0
4948 ```
4949 #### Windows (Intune)
4950 OMA-URI:
4951 ```
4952 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrintingEnabled
4953 ```
4954 Value (string):
4955 ```
4956 <enabled/> or <disabled/>
4957 ```
4958 #### macOS
4959 ```
4960 <dict>
4961 <key>PrintingEnabled</key>
4962 <true/> | <false/>
4963 </dict>
4964 ```
4965 #### policies.json
4966 ```
4967 {
4968 "policies": {
4969 "PrintingEnabled": true | false
4970 }
4971 }
4972 ```
4973 ### PromptForDownloadLocation
4974 Ask where to save each file before downloading.
4975
4976 **Compatibility:** Firefox 68, Firefox ESR 68\
4977 **CCK2 Equivalent:** N/A\
4978 **Preferences Affected:** `browser.download.useDownloadDir`
4979
4980 #### Windows (GPO)
4981 ```
4982 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4983 ```
4984 #### Windows (Intune)
4985 OMA-URI:
4986 ```
4987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4988 ```
4989 Value (string):
4990 ```
4991 <enabled/> or <disabled/>
4992 ```
4993 #### macOS
4994 ```
4995 <dict>
4996 <key>PromptForDownloadLocation</key>
4997 <true/> | <false/>
4998 </dict>
4999 ```
5000 #### policies.json
5001 ```
5002 {
5003 "policies": {
5004 "PromptForDownloadLocation": true | false
5005 }
5006 }
5007 ```
5008 ### Proxy
5009 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
5010 To specify ports, append them to the hostnames with a colon (:).
5011
5012 Unless you lock this policy, changes the user already has in place will take effect.
5013
5014 `Mode` is the proxy method being used.
5015
5016 `Locked` is whether or not proxy settings can be changed.
5017
5018 `HTTPProxy` is the HTTP proxy server.
5019
5020 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
5021
5022 `SSLProxy` is the SSL proxy server.
5023
5024 `FTPProxy` is the FTP proxy server.
5025
5026 `SOCKSProxy` is the SOCKS proxy server
5027
5028 `SOCKSVersion` is the SOCKS version (4 or 5)
5029
5030 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
5031
5032 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
5033
5034 `AutoLogin` means do not prompt for authentication if password is saved.
5035
5036 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
5037
5038 **Compatibility:** Firefox 60, Firefox ESR 60\
5039 **CCK2 Equivalent:** `networkProxy*`\
5040 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
5041
5042 #### Windows (GPO)
5043 ```
5044 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
5045 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
5046 Software\Policies\Mozilla\Firefox\Proxy\HTTPProxy = https://httpproxy.example.com
5047 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
5048 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
5049 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
5050 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
5051 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
5052 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
5053 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
5054 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
5055 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
5056 ```
5057 #### Windows (Intune)
5058 **Note**
5059 These setttings were moved to a category to make them easier to configure via Intune.
5060
5061 OMA-URI:
5062 ```
5063 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Locked
5064 ```
5065 Value (string):
5066 ```
5067 <enabled/> or <disabled/>
5068 ```
5069 OMA-URI:
5070 ```
5071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_ConnectionType
5072 ```
5073 Value (string):
5074 ```
5075 <enabled/>
5076 <data id="Proxy_ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5077 ```
5078 OMA-URI:
5079 ```
5080 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_HTTPProxy
5081 ```
5082 Value (string):
5083 ```
5084 <enabled/>
5085 <data id="Proxy_HTTPProxy" value="httpproxy.example.com"/>
5086 ```
5087 OMA-URI:
5088 ```
5089 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseHTTPProxyForAllProtocols
5090 ```
5091 Value (string):
5092 ```
5093 <enabled/> or <disabled/>
5094 ```
5095 OMA-URI:
5096 ```
5097 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SSLProxy
5098 ```
5099 Value (string):
5100 ```
5101 <enabled/>
5102 <data id="Proxy_SSLProxy" value="sslproxy.example.com"/>
5103 ```
5104 OMA-URI:
5105 ```
5106 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_SOCKSProxy
5107 ```
5108 Value (string):
5109 ```
5110 <enabled/>
5111 <data id="Proxy_SOCKSProxy" value="socksproxy.example.com"/>
5112 <data id="Proxy_SOCKSVersion" value="4 | 5"/>
5113 ```
5114 OMA-URI:
5115 ```
5116 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoConfigURL
5117 ```
5118 Value (string):
5119 ```
5120 <enabled/>
5121 <data id="Proxy_AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5122 ```
5123 OMA-URI:
5124 ```
5125 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_Passthrough
5126 ```
5127 Value (string):
5128 ```
5129 <enabled/>
5130 <data id="Proxy_Passthrough" value="&lt;local&gt;"/>
5131 ```
5132 OMA-URI:
5133 ```
5134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_AutoLogin
5135 ```
5136 Value (string):
5137 ```
5138 <enabled/> or <disabled/>
5139 ```
5140 OMA-URI:
5141 ```
5142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~ProxySettings/Proxy_UseProxyForDNS
5143 ```
5144 Value (string):
5145 ```
5146 <enabled/> or <disabled/>
5147 ```
5148 OMA-URI (Old way):
5149 ```
5150 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
5151 ```
5152 Value (string):
5153 ```
5154 <enabled/>
5155 <data id="ProxyLocked" value="true | false"/>
5156 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
5157 <data id="HTTPProxy" value="httpproxy.example.com"/>
5158 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
5159 <data id="SSLProxy" value="sslproxy.example.com"/>
5160 <data id="FTPProxy" value="ftpproxy.example.com"/>
5161 <data id="SOCKSProxy" value="socksproxy.example.com"/>
5162 <data id="SOCKSVersion" value="4 | 5"/>
5163 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
5164 <data id="Passthrough" value="<local>"/>
5165 <data id="AutoLogin" value="true | false"/>
5166 <data id="UseProxyForDNS" value="true | false"/>
5167 ```
5168 #### macOS
5169 ```
5170 <dict>
5171 <key>Proxy</key>
5172 <dict>
5173 <key>Mode</key>
5174 <string>none | system | manual | autoDetect | autoConfig</string>
5175 <key>Locked</key>
5176 <true> | </false>
5177 <key>HTTPProxy</key>
5178 <string>https://httpproxy.example.com</string>
5179 <key>UseHTTPProxyForAllProtocols</key>
5180 <true> | </false>
5181 <key>SSLProxy</key>
5182 <string>https://sslproxy.example.com</string>
5183 <key>FTPProxy</key>
5184 <string>https://ftpproxy.example.com</string>
5185 <key>SOCKSProxy</key>
5186 <string>https://socksproxy.example.com</string>
5187 <key>SOCKSVersion</key>
5188 <string>4 | 5</string>
5189 <key>Passthrough</key>
5190 <string>&lt;local>&gt;</string>
5191 <key>AutoConfigURL</key>
5192 <string>URL_TO_AUTOCONFIG</string>
5193 <key>AutoLogin</key>
5194 <true> | </false>
5195 <key>UseProxyForDNS</key>
5196 <true> | </false>
5197 </dict>
5198 </dict>
5199 ```
5200 #### policies.json
5201 ```
5202 {
5203 "policies": {
5204 "Proxy": {
5205 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
5206 "Locked": true | false,
5207 "HTTPProxy": "hostname",
5208 "UseHTTPProxyForAllProtocols": true | false,
5209 "SSLProxy": "hostname",
5210 "FTPProxy": "hostname",
5211 "SOCKSProxy": "hostname",
5212 "SOCKSVersion": 4 | 5,
5213 "Passthrough": "<local>",
5214 "AutoConfigURL": "URL_TO_AUTOCONFIG",
5215 "AutoLogin": true | false,
5216 "UseProxyForDNS": true | false
5217 }
5218 }
5219 }
5220 ```
5221 ### RequestedLocales
5222 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
5223
5224 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
5225
5226 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
5227 **CCK2 Equivalent:** N/A\
5228 **Preferences Affected:** N/A
5229 #### Windows (GPO)
5230 ```
5231 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
5232 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
5233
5234 or
5235
5236 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
5237 ```
5238 #### Windows (Intune)
5239 OMA-URI:
5240 ```
5241 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
5242 ```
5243 Value (string):
5244 ```
5245 <enabled/>
5246 <data id="Preferences_String" value="de,en-US"/>
5247 ```
5248 #### macOS
5249 ```
5250 <dict>
5251 <key>RequestedLocales</key>
5252 <array>
5253 <string>de</string>
5254 <string>en-US</string>
5255 </array>
5256 </dict>
5257
5258 or
5259
5260 <dict>
5261 <key>RequestedLocales</key>
5262 <string>de,en-US</string>
5263 </dict>
5264
5265 ```
5266 #### policies.json
5267 ```
5268 {
5269 "policies": {
5270 "RequestedLocales": ["de", "en-US"]
5271 }
5272 }
5273
5274 or
5275
5276 {
5277 "policies": {
5278 "RequestedLocales": "de,en-US"
5279 }
5280 }
5281 ```
5282 <a name="SanitizeOnShutdown"></a>
5283
5284 ### SanitizeOnShutdown (Selective)
5285 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
5286
5287 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
5288
5289 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
5290 **CCK2 Equivalent:** N/A\
5291 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5292 #### Windows (GPO)
5293 ```
5294 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
5295 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
5296 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
5297 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
5298 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
5299 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
5300 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
5301 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
5302 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
5303 ```
5304 #### Windows (Intune)
5305 OMA-URI:
5306 ```
5307 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
5308 ```
5309 Value (string):
5310 ```
5311 <enabled/> or <disabled/>
5312 ```
5313 OMA-URI:
5314 ```
5315 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
5316 ```
5317 Value (string):
5318 ```
5319 <enabled/> or <disabled/>
5320 ```
5321 OMA-URI:
5322 ```
5323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
5324 ```
5325 Value (string):
5326 ```
5327 <enabled/> or <disabled/>
5328 ```
5329 OMA-URI:
5330 ```
5331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
5332 ```
5333 Value (string):
5334 ```
5335 <enabled/> or <disabled/>
5336 ```
5337 OMA-URI:
5338 ```
5339 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
5340 ```
5341 Value (string):
5342 ```
5343 <enabled/> or <disabled/>
5344 ```
5345 OMA-URI:
5346 ```
5347 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
5348 ```
5349 Value (string):
5350 ```
5351 <enabled/> or <disabled/>
5352 ```
5353 OMA-URI:
5354 ```
5355 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
5356 ```
5357 Value (string):
5358 ```
5359 <enabled/> or <disabled/>
5360 ```
5361 OMA-URI:
5362 ```
5363 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
5364 ```
5365 Value (string):
5366 ```
5367 <enabled/> or <disabled/>
5368 ```
5369 OMA-URI:
5370 ```
5371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5372 ```
5373 Value (string):
5374 ```
5375 <enabled/> or <disabled/>
5376 ```
5377 #### macOS
5378 ```
5379 <dict>
5380 <key>SanitizeOnShutdown</key>
5381 <dict>
5382 <key>Cache</key>
5383 <true/> | <false/>
5384 <key>Cookies</key>
5385 <true/> | <false/>
5386 <key>Downloads</key>
5387 <true/> | <false/>
5388 <key>FormData</key>
5389 <true/> | <false/>
5390 <key>History</key>
5391 <true/> | <false/>
5392 <key>Sessions</key>
5393 <true/> | <false/>
5394 <key>SiteSettings</key>
5395 <true/> | <false/>
5396 <key>OfflineApps</key>
5397 <true/> | <false/>
5398 <key>Locked</key>
5399 <true/> | <false/>
5400 </dict>
5401 </dict>
5402 ```
5403 #### policies.json
5404 ```
5405 {
5406 "policies": {
5407 "SanitizeOnShutdown": {
5408 "Cache": true | false,
5409 "Cookies": true | false,
5410 "Downloads": true | false,
5411 "FormData": true | false,
5412 "History": true | false,
5413 "Sessions": true | false,
5414 "SiteSettings": true | false,
5415 "OfflineApps": true | false,
5416 "Locked": true | false
5417 }
5418 }
5419 }
5420 ```
5421 ### SanitizeOnShutdown (All)
5422 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5423
5424 **Compatibility:** Firefox 60, Firefox ESR 60\
5425 **CCK2 Equivalent:** N/A\
5426 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5427 #### Windows (GPO)
5428 ```
5429 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5430 ```
5431 #### Windows (Intune)
5432 OMA-URI:
5433 ```
5434 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5435 ```
5436 Value (string):
5437 ```
5438 <enabled/> or <disabled/>
5439 ```
5440 #### macOS
5441 ```
5442 <dict>
5443 <key>SanitizeOnShutdown</key>
5444 <true/> | <false/>
5445 </dict>
5446 ```
5447 #### policies.json
5448 ```
5449 {
5450 "policies": {
5451 "SanitizeOnShutdown": true | false
5452 }
5453 }
5454 ```
5455 ### SearchBar
5456 Set whether or not search bar is displayed.
5457
5458 **Compatibility:** Firefox 60, Firefox ESR 60\
5459 **CCK2 Equivalent:** `showSearchBar`\
5460 **Preferences Affected:** N/A
5461
5462 #### Windows (GPO)
5463 ```
5464 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5465 ```
5466
5467 #### Windows (Intune)
5468 OMA-URI:
5469 ```
5470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5471 ```
5472 Value (string):
5473 ```
5474 <enabled/>
5475 <data id="SearchBar" value="unified | separate"/>
5476 ```
5477 #### macOS
5478 ```
5479 <dict>
5480 <key>SearchBar</key>
5481 <string>unified | separate</string>
5482 </dict>
5483 ```
5484 #### policies.json
5485 ```
5486 {
5487 "policies": {
5488 "SearchBar": "unified" | "separate"
5489 }
5490 }
5491 ```
5492 <a name="SearchEngines"></a>
5493
5494 ### SearchEngines (This policy is only available on the ESR.)
5495
5496 ### SearchEngines | Add
5497
5498 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5499
5500 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5501
5502 `Name` is the name of the search engine.
5503
5504 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5505
5506 `Method` is either GET or POST
5507
5508 `IconURL` is a URL for the icon to use.
5509
5510 `Alias` is a keyword to use for the engine.
5511
5512 `Description` is a description of the search engine.
5513
5514 `PostData` is the POST data as name value pairs separated by &.
5515
5516 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5517
5518 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5519
5520 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5521 **CCK2 Equivalent:** `searchplugins`\
5522 **Preferences Affected:** N/A
5523
5524 #### Windows (GPO)
5525 ```
5526 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5527 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5528 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5529 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5530 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5531 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5532 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5533 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5534 ```
5535 #### Windows (Intune)
5536 OMA-URI:
5537 ```
5538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5539 ```
5540 Value (string):
5541 ```
5542 <enabled/>
5543 <data id="SearchEngine_Name" value="Example1"/>
5544 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5545 <data id="SearchEngine_Method" value="GET | POST"/>
5546 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5547 <data id="SearchEngine_Alias" value="example"/>
5548 <data id="SearchEngine_Description" value="Example Description"/>
5549 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5550 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5551 ```
5552 #### macOS
5553 ```
5554 <dict>
5555 <key>SearchEngines</key>
5556 <dict>
5557 <key>Add</key>
5558 <array>
5559 <dict>
5560 <key>Name</key>
5561 <string>Example1</string>
5562 <key>URLTemplate</key>
5563 <string>https://www.example.org/q={searchTerms}</string>
5564 <key>Method</key>
5565 <string>GET | POST </string>
5566 <key>IconURL</key>
5567 <string>https://www.example.org/favicon.ico</string>
5568 <key>Alias</key>
5569 <string>example</string>
5570 <key>Description</key>
5571 <string>Example Description</string>
5572 <key>SuggestURLTemplate</key>
5573 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5574 <key>PostData</key>
5575 <string>name=value&q={searchTerms}</string>
5576 </dict>
5577 <array>
5578 </dict>
5579 </dict>
5580 ```
5581 #### policies.json
5582 ```
5583 {
5584 "policies": {
5585 "SearchEngines": {
5586 "Add": [
5587 {
5588 "Name": "Example1",
5589 "URLTemplate": "https://www.example.org/q={searchTerms}",
5590 "Method": "GET" | "POST",
5591 "IconURL": "https://www.example.org/favicon.ico",
5592 "Alias": "example",
5593 "Description": "Description",
5594 "PostData": "name=value&q={searchTerms}",
5595 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5596 }
5597 ]
5598 }
5599 }
5600 }
5601 ```
5602 ### SearchEngines | Default
5603
5604 Set the default search engine. This policy is only available on the ESR.
5605
5606 **Compatibility:** Firefox ESR 60\
5607 **CCK2 Equivalent:** `defaultSearchEngine`\
5608 **Preferences Affected:** N/A
5609
5610 #### Windows (GPO)
5611 ```
5612 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5613 ```
5614 #### Windows (Intune)
5615 OMA-URI:
5616 ```
5617 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5618 ```
5619 Value (string):
5620 ```
5621 <enabled/>
5622 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5623 ```
5624 #### macOS
5625 ```
5626 <dict>
5627 <key>SearchEngines</key>
5628 <dict>
5629 <key>Default</key>
5630 <string>NAME_OF_SEARCH_ENGINE</string>
5631 </dict>
5632 </dict>
5633 ```
5634 #### policies.json
5635 ```
5636 {
5637 "policies": {
5638 "SearchEngines": {
5639 "Default": "NAME_OF_SEARCH_ENGINE"
5640 }
5641 }
5642 }
5643 ```
5644 ### SearchEngines | PreventInstalls
5645
5646 Prevent installing search engines from webpages.
5647
5648 **Compatibility:** Firefox ESR 60\
5649 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5650 **Preferences Affected:** N/A
5651
5652 #### Windows (GPO)
5653 ```
5654 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5655 ```
5656 #### Windows (Intune)
5657 OMA-URI:
5658 ```
5659 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5660 ```
5661 Value (string):
5662 ```
5663 <enabled/> or <disabled/>
5664 ```
5665 #### macOS
5666 ```
5667 <dict>
5668 <key>SearchEngines</key>
5669 <dict>
5670 <key>PreventInstalls</key>
5671 <true/> | <false/>
5672 </dict>
5673 </dict>
5674 ```
5675 #### policies.json
5676 ```
5677 {
5678 "policies": {
5679 "SearchEngines": {
5680 "PreventInstalls": true | false
5681 }
5682 }
5683 }
5684 ```
5685 ### SearchEngines | Remove
5686
5687 Hide built-in search engines. This policy is only available on the ESR.
5688
5689 **Compatibility:** Firefox ESR 60.2\
5690 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5691 **Preferences Affected:** N/A
5692
5693 #### Windows (GPO)
5694 ```
5695 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5696 ```
5697 #### Windows (Intune)
5698 OMA-URI:
5699 ```
5700 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5701 ```
5702 Value (string):
5703 ```
5704 <enabled/>
5705 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5706 ```
5707 #### macOS
5708 ```
5709 <dict>
5710 <key>SearchEngines</key>
5711 <dict>
5712 <key>Remove</key>
5713 <array>
5714 <string>NAME_OF_SEARCH_ENGINE</string>
5715 </array>
5716 </dict>
5717 </dict>
5718 ```
5719 #### policies.json
5720 ```
5721 {
5722 "policies": {
5723 "SearchEngines": {
5724 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5725 }
5726 }
5727 }
5728 ```
5729 ### SearchSuggestEnabled
5730
5731 Enable search suggestions.
5732
5733 **Compatibility:** Firefox 68, Firefox ESR 68\
5734 **CCK2 Equivalent:** N/A\
5735 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5736
5737 #### Windows (GPO)
5738 ```
5739 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5740 ```
5741 #### Windows (Intune)
5742 OMA-URI:
5743 ```
5744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5745 ```
5746 Value (string):
5747 ```
5748 <enabled/> or <disabled/>
5749 ```
5750 #### macOS
5751 ```
5752 <dict>
5753 <key>SearchSuggestEnabled</key>
5754 <true/> | <false/>
5755 </dict>
5756 ```
5757 #### policies.json
5758 ```
5759 {
5760 "policies": {
5761 "SearchSuggestEnabled": true | false
5762 }
5763 }
5764 ```
5765 ### SecurityDevices
5766
5767 Add or delete PKCS #11 modules.
5768
5769 **Compatibility:** Firefox 114, Firefox ESR 112.12\
5770 **CCK2 Equivalent:** N/A\
5771 **Preferences Affected:** N/A
5772
5773 #### Windows (GPO)
5774 ```
5775 Software\Policies\Mozilla\Firefox\SecurityDevices\Add\NAME_OF_DEVICE_TO_ADD = PATH_TO_LIBRARY_FOR_DEVICE
5776 Software\Policies\Mozilla\Firefox\SecurityDevices\Remove\1 = NAME_OF_DEVICE_TO_REMOVE
5777 ```
5778 #### Windows (Intune)
5779 OMA-URI:
5780 ```
5781 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Add
5782 ```
5783 Value (string):
5784 ```
5785 <enabled/>
5786 <data id="SecurityDevices" value="NAME_OF_DEVICE_TO_ADD&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5787 ```
5788 OMA-URI:
5789 ```
5790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices/SecurityDevices_Delete
5791 ```
5792 Value (string):
5793 ```
5794 <enabled/>
5795 <data id="SecurityDevices" value="1&#xF000;NAME_OF_DEVICE_TO_REMOVE"/>
5796 ```
5797 #### macOS
5798 ```
5799 <dict>
5800 <key>SecurityDevices</key>
5801 <dict>
5802 <key>Add<key>
5803 <dict>
5804 <key>NAME_OF_DEVICE_TO_ADD</key>
5805 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5806 </dict>
5807 <key>Delete</add>
5808 <array>
5809 <string>NAME_OF_DEVICE_TO_DELETE</string>
5810 </array>
5811 </dict>
5812 </dict>
5813 ```
5814 #### policies.json
5815 ```
5816 {
5817 "policies": {
5818 "SecurityDevices": {
5819 "Add": {
5820 "NAME_OF_DEVICE_TO_ADD": "PATH_TO_LIBRARY_FOR_DEVICE"
5821 },
5822 "Delete": ["NAME_OF_DEVICE_TO_DELETE"]
5823 }
5824 }
5825 }
5826 ```
5827 ### SecurityDevices (Deprecated)
5828
5829 Install PKCS #11 modules.
5830
5831 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5832 **CCK2 Equivalent:** `certs.devices`\
5833 **Preferences Affected:** N/A
5834
5835 #### Windows (GPO)
5836 ```
5837 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5838 ```
5839 #### Windows (Intune)
5840 OMA-URI:
5841 ```
5842 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5843 ```
5844 Value (string):
5845 ```
5846 <enabled/>
5847 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5848 ```
5849 #### macOS
5850 ```
5851 <dict>
5852 <key>SecurityDevices</key>
5853 <dict>
5854 <key>NAME_OF_DEVICE</key>
5855 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5856 </dict>
5857 </dict>
5858 ```
5859 #### policies.json
5860 ```
5861 {
5862 "policies": {
5863 "SecurityDevices": {
5864 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5865 }
5866 }
5867 }
5868 ```
5869 ### ShowHomeButton
5870 Show the home button on the toolbar.
5871
5872 Future versions of Firefox will not show the home button by default.
5873
5874 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5875 **CCK2 Equivalent:** N/A\
5876 **Preferences Affected:** N/A
5877
5878 #### Windows (GPO)
5879 ```
5880 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5881 ```
5882 #### Windows (Intune)
5883 OMA-URI:
5884 ```
5885 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
5886 ```
5887 Value (string):
5888 ```
5889 <enabled/> or <disabled/>
5890 ```
5891 #### macOS
5892 ```
5893 <dict>
5894 <key>ShowHomeButton</key>
5895 <true/> | <false/>
5896 </dict>
5897 ```
5898 #### policies.json
5899 ```
5900 {
5901 "policies": {
5902 "ShowHomeButton": true | false
5903 }
5904 }
5905 ```
5906 ### SSLVersionMax
5907
5908 Set and lock the maximum version of TLS. (Firefox defaults to a maximum of TLS 1.3.)
5909
5910 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5911 **CCK2 Equivalent:** N/A\
5912 **Preferences Affected:** `security.tls.version.max`
5913
5914 #### Windows (GPO)
5915 ```
5916 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5917 ```
5918 #### Windows (Intune)
5919 OMA-URI:
5920 ```
5921 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5922 ```
5923 Value (string):
5924 ```
5925 <enabled/>
5926 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5927 ```
5928 #### macOS
5929 ```
5930 <dict>
5931 <key>SSLVersionMax</key>
5932 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5933 </dict>
5934 ```
5935
5936 #### policies.json
5937 ```
5938 {
5939 "policies": {
5940 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5941 }
5942 }
5943 ```
5944 ### SSLVersionMin
5945
5946 Set and lock the minimum version of TLS. (Firefox defaults to a minimum of TLS 1.2.)
5947
5948 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5949 **CCK2 Equivalent:** N/A\
5950 **Preferences Affected:** `security.tls.version.min`
5951
5952 #### Windows (GPO)
5953 ```
5954 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5955 ```
5956 #### Windows (Intune)
5957 OMA-URI:
5958 ```
5959 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5960 ```
5961 Value (string):
5962 ```
5963 <enabled/>
5964 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5965 ```
5966 #### macOS
5967 ```
5968 <dict>
5969 <key>SSLVersionMin</key>
5970 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5971 </dict>
5972 ```
5973
5974 #### policies.json
5975 ```
5976 {
5977 "policies": {
5978 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5979 }
5980 }
5981 ```
5982 ### StartDownloadsInTempDirectory
5983 Force downloads to start off in a local, temporary location rather than the default download directory.
5984
5985 **Compatibility:** Firefox 102\
5986 **CCK2 Equivalent:** N/A\
5987 **Preferences Affected:** `browser.download.start_downloads_in_tmp_dir`
5988
5989 #### Windows (GPO)
5990 ```
5991 Software\Policies\Mozilla\Firefox\StartDownloadsInTempDirectory = 0x1 | 0x0
5992 ```
5993 #### Windows (Intune)
5994 OMA-URI:
5995 ```
5996 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/StartDownloadsInTempDirectory
5997 ```
5998 Value (string):
5999 ```
6000 <enabled/> or <disabled/>
6001 ```
6002 #### macOS
6003 ```
6004 <dict>
6005 <key>StartDownloadsInTempDirectory</key>
6006 <true/> | <false/>
6007 </dict>
6008 ```
6009 #### policies.json
6010 ```
6011 {
6012 "policies": {
6013 "StartDownloadsInTempDirectory": true | false
6014 }
6015 ```
6016 ### SupportMenu
6017 Add a menuitem to the help menu for specifying support information.
6018
6019 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
6020 **CCK2 Equivalent:** helpMenu\
6021 **Preferences Affected:** N/A
6022
6023 #### Windows (GPO)
6024 ```
6025 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
6026 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
6027 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
6028 ```
6029 #### Windows (Intune)
6030 OMA-URI:
6031 ```
6032 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
6033 ```
6034 Value (string):
6035 ```
6036 <enabled/>
6037 <data id="SupportMenuTitle" value="Support Menu"/>
6038 <data id="SupportMenuURL" value="http://example.com/support"/>
6039 <data id="SupportMenuAccessKey" value="S"/>
6040 ```
6041 #### macOS
6042 ```
6043 <dict>
6044 <key>SupportMenu</key>
6045 <dict>
6046 <key>Title</key>
6047 <string>SupportMenu</string>
6048 <key>URL</key>
6049 <string>http://example.com/support</string>
6050 <key>AccessKey</key>
6051 <string>S</string>
6052 </dict>
6053 </dict>
6054 ```
6055 #### policies.json
6056 ```
6057 {
6058 "policies": {
6059 "SupportMenu": {
6060 "Title": "Support Menu",
6061 "URL": "http://example.com/support",
6062 "AccessKey": "S"
6063 }
6064 }
6065 }
6066 ```
6067 ### TranslateEnabled
6068 Enable or disable webpage translation.
6069
6070 Note: Web page translation is done completely on the client, so there is no data or privacy risk.
6071
6072 If you only want to disable the popup, you can set the pref `browser.translations.automaticallyPopup` to false using the [Preferences](#preferences) policy.
6073
6074 **Compatibility:** Firefox 126\
6075 **CCK2 Equivalent:** N/A\
6076 **Preferences Affected:** `browser.translations.enable`
6077
6078 #### Windows (GPO)
6079 ```
6080 Software\Policies\Mozilla\Firefox\TranslateEnabled = 0x1 | 0x0
6081 ```
6082 #### Windows (Intune)
6083 OMA-URI:
6084 ```
6085 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TranslateEnabled
6086 ```
6087 Value (string):
6088 ```
6089 <enabled/> or <disabled/>
6090 ```
6091 #### macOS
6092 ```
6093 <dict>
6094 <key>TranslateEnabled</key>
6095 <true/> | <false/>
6096 </dict>
6097 ```
6098 #### policies.json
6099 ```
6100 {
6101 "policies": {
6102 "TranslateEnabled": true | false
6103 }
6104 }
6105 ```
6106 ### UserMessaging
6107
6108 Prevent Firefox from messaging the user in certain situations.
6109
6110 `WhatsNew` Remove the "What's New" icon and menuitem.
6111
6112 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
6113
6114 `FeatureRecommendations` If false, don't recommend browser features.
6115
6116 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
6117
6118 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
6119
6120 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
6121
6122 `Locked` prevents the user from changing user messaging preferences.
6123
6124 **Compatibility:** Firefox 75, Firefox ESR 68.7\
6125 **CCK2 Equivalent:** N/A\
6126 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
6127
6128 #### Windows (GPO)
6129 ```
6130 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
6131 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
6132 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
6133 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
6134 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
6135 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
6136 Software\Policies\Mozilla\Firefox\UserMessaging\Locked = 0x1 | 0x0
6137 ```
6138 #### Windows (Intune)
6139 OMA-URI:
6140 ```
6141 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
6142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
6143 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
6144 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
6145 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
6146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
6147 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_Locked
6148 ```
6149 Value (string):
6150 ```
6151 <enabled/> or <disabled/>
6152 ```
6153 #### macOS
6154 ```
6155 <dict>
6156 <key>UserMessaging</key>
6157 <dict>
6158 <key>WhatsNew</key>
6159 <true/> | <false/>
6160 <key>ExtensionRecommendations</key>
6161 <true/> | <false/>
6162 <key>FeatureRecommendations</key>
6163 <true/> | <false/>
6164 <key>UrlbarInterventions</key>
6165 <true/> | <false/>
6166 <key>SkipOnboarding</key>
6167 <true/> | <false/>
6168 <key>MoreFromMozilla</key>
6169 <true/> | <false/>
6170 <key>Locked</key>
6171 <true/> | <false/>
6172 </dict>
6173 </dict>
6174 ```
6175 #### policies.json
6176 ```
6177 {
6178 "policies": {
6179 "UserMessaging": {
6180 "WhatsNew": true | false,
6181 "ExtensionRecommendations": true | false,
6182 "FeatureRecommendations": true | false,
6183 "UrlbarInterventions": true | false,
6184 "SkipOnboarding": true | false,
6185 "MoreFromMozilla": true | false,
6186 "Locked": true | false
6187 }
6188 }
6189 }
6190 ```
6191 ### UseSystemPrintDialog
6192 Use the system print dialog instead of the print preview window.
6193
6194 **Compatibility:** Firefox 102\
6195 **CCK2 Equivalent:** N/A\
6196 **Preferences Affected:** `print.prefer_system_dialog`
6197
6198 #### Windows (GPO)
6199 ```
6200 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
6201 ```
6202 #### Windows (Intune)
6203 OMA-URI:
6204 ```
6205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
6206 ```
6207 Value (string):
6208 ```
6209 <enabled/> or <disabled/>
6210 ```
6211 #### macOS
6212 ```
6213 <dict>
6214 <key>UseSystemPrintDialog</key>
6215 <true/> | <false/>
6216 </dict>
6217 ```
6218 #### policies.json
6219 ```
6220 {
6221 "policies": {
6222 "UseSystemPrintDialog": true | false
6223 }
6224 }
6225 ```
6226 ### WebsiteFilter
6227 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
6228 The arrays are limited to 1000 entries each.
6229
6230 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
6231
6232 For specific protocols, use `https://*/*` or `http://*/*`.
6233
6234 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
6235
6236 **Compatibility:** Firefox 60, Firefox ESR 60\
6237 **CCK2 Equivalent:** N/A\
6238 **Preferences Affected:** N/A
6239
6240 #### Windows (GPO)
6241 ```
6242 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
6243 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
6244 ```
6245 #### Windows (Intune)
6246 OMA-URI:
6247 ```
6248 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
6249 ```
6250 Value (string):
6251 ```
6252 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
6253 ```
6254 OMA-URI:
6255 ```
6256 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
6257 ```
6258 Value (string):
6259 ```
6260 <enabled/>
6261 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
6262 ```
6263 #### macOS
6264 ```
6265 <dict>
6266 <key>WebsiteFilter</key>
6267 <dict>
6268 <key>Block</key>
6269 <array>
6270 <string><all_urls></string>
6271 </array>
6272 <key>Exceptions</key>
6273 <array>
6274 <string>http://example.org/*</string>
6275 </array>
6276 </dict>
6277
6278 </dict>
6279 ```
6280 #### policies.json
6281 ```
6282 {
6283 "policies": {
6284 "WebsiteFilter": {
6285 "Block": ["<all_urls>"],
6286 "Exceptions": ["http://example.org/*"]
6287 }
6288 }
6289 }
6290 ```
6291 ### WindowsSSO
6292 Allow Windows single sign-on for Microsoft, work, and school accounts.
6293
6294 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
6295
6296 **Compatibility:** Firefox 91\
6297 **CCK2 Equivalent:** N/A\
6298 **Preferences Affected:** `network.http.windows-sso.enabled`
6299
6300 #### Windows (GPO)
6301 ```
6302 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
6303 ```
6304 #### Windows (Intune)
6305 OMA-URI:
6306 ```
6307 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
6308 ```
6309 Value (string):
6310 ```
6311 <enabled/> or <disabled/>
6312 ```
6313 #### policies.json
6314 ```
6315 {
6316 "policies": {
6317 "WindowsSSO": true | false
6318 }
6319 }
6320 ```

patrick-canterino.de