]> git.p6c8.net - policy-templates.git/blob - README.md
Update description
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
10 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
11 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
12 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
13 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
14 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
15 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
16 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
17 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
18 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
19 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
20 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
21 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
22 | **[`Certificates`](#certificates)** |
23 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
24 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
25 | **[`Cookies`](#cookies)** | Configure cookie preferences.
26 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
27 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
28 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
29 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
30 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
31 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
32 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
33 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
34 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
35 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
36 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
37 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
38 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
39 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
40 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
41 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
42 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
43 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
44 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
45 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
46 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
47 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or updated.
48 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
49 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
50 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
51 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
52 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
53 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
54 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
55 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
56 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
57 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
58 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
59 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
60 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
61 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
62 | **[`FlashPlugin (Deprecated)`](#flashplugin-deprecated)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
63 | **[`Handlers`](#handlers)** | Configure default application handlers.
64 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
65 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
66 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
67 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
68 | **[`LegacySameSiteCookieBehaviorEnabled`](#legacysamesitecookiebehaviorenabled)** | Enable default legacy SameSite cookie behavior setting.
69 | **[`LegacySameSiteCookieBehaviorEnabledForDomainList`](#legacysamesitecookiebehaviorenabledfordomainlist)** | Revert to legacy SameSite behavior for cookies on specified sites.
70 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
71 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
72 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates.
73 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
74 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
75 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
76 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
77 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
78 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
79 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
80 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
81 | **[`PasswordManagerExceptions`](#passwordmanagerexceptions)** | Prevent Firefox from saving passwords for specific sites.
82 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
83 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
84 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
85 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
86 | **[`Preferences`](#preferences)** | Set and lock preferences.
87 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
88 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
89 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
90 | **[`Proxy`](#proxy)** | Configure proxy settings.
91 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
92 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
93 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
94 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
95 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
96 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
97 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
98 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
99 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
100 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
101 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
102 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
103 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
104 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
105 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
106 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
107 | **[`UseSystemPrintDialog`](#usesystemprintdialog)** | Print using the system print dialog instead of print preview.
108 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
109 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
110
111 ### 3rdparty
112
113 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
114
115 For GPO and Intune, the extension developer should provide an ADMX file.
116
117 **Compatibility:** Firefox 68\
118 **CCK2 Equivalent:** N/A\
119 **Preferences Affected:** N/A
120
121 #### macOS
122 ```
123 <dict>
124 <key>3rdparty</key>
125 <dict>
126 <key>Extensions</key>
127 <dict>
128 <key>uBlock0@raymondhill.net</key>
129 <dict>
130 <key>adminSettings</key>
131 <dict>
132 <key>selectedFilterLists</key>
133 <array>
134 <string>ublock-privacy</string>
135 <string>ublock-badware</string>
136 <string>ublock-filters</string>
137 <string>user-filters</string>
138 </array>
139 </dict>
140 </dict>
141 </dict>
142 </dict>
143 </dict>
144 ```
145 #### policies.json
146 ```
147 {
148 "policies": {
149 "3rdparty": {
150 "Extensions": {
151 "uBlock0@raymondhill.net": {
152 "adminSettings": {
153 "selectedFilterLists": [
154 "ublock-privacy",
155 "ublock-badware",
156 "ublock-filters",
157 "user-filters"
158 ]
159 }
160 }
161 }
162 }
163 }
164 }
165 ```
166
167 ### AllowedDomainsForApps
168
169 Define domains allowed to access Google Workspace.
170
171 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
172
173 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
174
175 **Compatibility:** Firefox 89, Firefox ESR 78.11\
176 **CCK2 Equivalent:** N/A\
177 **Preferences Affected:** N/A
178
179 #### Windows (GPO)
180 ```
181 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
182 ```
183 #### Windows (Intune)
184 OMA-URI:
185 ```
186 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
187 ```
188 Value (string):
189 ```
190 <enabled/>
191 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
192 ```
193 #### macOS
194 ```
195 <dict>
196 <key>AllowedDomainsForApps</key>
197 <string>managedfirefox.com,example.com</string>
198 </dict>
199 ```
200 #### policies.json
201 ```
202 {
203 "policies": {
204 "AllowedDomainsForApps": "managedfirefox.com,example.com"
205 }
206 }
207 ```
208 ### AppAutoUpdate
209
210 Enable or disable **automatic** application update.
211
212 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
213
214 If set to false, application updates are downloaded but the user can choose when to install the update.
215
216 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
217
218 **Compatibility:** Firefox 75, Firefox ESR 68.7\
219 **CCK2 Equivalent:** N/A\
220 **Preferences Affected:** `app.update.auto`
221
222 #### Windows (GPO)
223 ```
224 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
225 ```
226 #### Windows (Intune)
227 OMA-URI:
228 ```
229 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
230 ```
231 Value (string):
232 ```
233 <enabled/> or <disabled/>
234 ```
235 #### macOS
236 ```
237 <dict>
238 <key>AppAutoUpdate</key>
239 <true/> | <false/>
240 </dict>
241 ```
242 #### policies.json
243 ```
244 {
245 "policies": {
246 "AppAutoUpdate": true | false
247 }
248 }
249 ```
250 ### AppUpdateURL
251
252 Change the URL for application update if you are providing Firefox updates from a custom update server.
253
254 **Compatibility:** Firefox 62, Firefox ESR 60.2\
255 **CCK2 Equivalent:** N/A\
256 **Preferences Affected:** `app.update.url`
257
258 #### Windows (GPO)
259 ```
260 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
261 ```
262 #### Windows (Intune)
263 OMA-URI:
264 ```
265 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
266 ```
267 Value (string):
268 ```
269 <enabled/>
270 <data id="AppUpdateURL" value="https://yoursite.com"/>
271 ```
272 #### macOS
273 ```
274 <dict>
275 <key>AppUpdateURL</key>
276 <string>https://yoursite.com</string>
277 </dict>
278 ```
279 #### policies.json
280 ```
281 {
282 "policies": {
283 "AppUpdateURL": "https://yoursite.com"
284 }
285 }
286 ```
287 ### Authentication
288
289 Configure sites that support integrated authentication.
290
291 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
292
293 `PrivateBrowsing` enables integrated authentication in private browsing.
294
295 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
296 **CCK2 Equivalent:** N/A\
297 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
298
299 #### Windows (GPO)
300 ```
301 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
302 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
303 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
304 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
305 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
306 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
307 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
308 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
309 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
310 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
311 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
312 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
313 ```
314 #### Windows (Intune)
315 OMA-URI:
316 ```
317 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
318 ```
319 Value (string):
320 ```
321 <enabled/>
322 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
323 ```
324 OMA-URI:
325 ```
326 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
327 ```
328 Value (string):
329 ```
330 <enabled/>
331 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
332 ```
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
336 ```
337 Value (string):
338 ```
339 <enabled/>
340 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
341 ```
342 OMA-URI:
343 ```
344 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
345 ```
346 Value (string):
347 ```
348 <enabled/>
349 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
350 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
351 ```
352 OMA-URI:
353 ```
354 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
355 ```
356 Value (string):
357 ```
358 <enabled/> or <disabled/>
359 ```
360 OMA-URI:
361 ```
362 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
363 ```
364 Value (string):
365 ```
366 <enabled/> or <disabled/>
367 ```
368 #### macOS
369 ```
370 <dict>
371 <key>Authentication</key>
372 <dict>
373 <key>SPNEGO</key>
374 <array>
375 <string>mydomain.com</string>
376 <string>https://myotherdomain.com</string>
377 </array>
378 <key>Delegated</key>
379 <array>
380 <string>mydomain.com</string>
381 <string>https://myotherdomain.com</string>
382 </array>
383 <key>NTLM</key>
384 <array>
385 <string>mydomain.com</string>
386 <string>https://myotherdomain.com</string>
387 </array>
388 <key>AllowNonFQDN</key>
389 <dict>
390 <key>SPNEGO</key>
391 <true/> | <false/>
392 <key>NTLM</key>
393 <true/> | <false/>
394 </dict>
395 <key>AllowProxies</key>
396 <dict>
397 <key>SPNEGO</key>
398 <true/> | <false/>
399 <key>NTLM</key>
400 <true/> | <false/>
401 </dict>
402 <key>Locked</key>
403 <true/> | <false/>
404 <key>PrivateBrowsing</key>
405 <true/> | <false/>
406 </dict>
407 </dict>
408 ```
409 #### policies.json
410 ```
411 {
412 "policies": {
413 "Authentication": {
414 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
415 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
416 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
417 "AllowNonFQDN": {
418 "SPNEGO": true | false,
419 "NTLM": true | false
420 },
421 "AllowProxies": {
422 "SPNEGO": true | false,
423 "NTLM": true | false
424 },
425 "Locked": true | false,
426 "PrivateBrowsing": true | false
427 }
428 }
429 }
430 ```
431 ### AutoLaunchProtocolsFromOrigins
432 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
433
434 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
435
436 The schema is:
437 ```
438 {
439 "items": {
440 "properties": {
441 "allowed_origins": {
442 "items": {
443 "type": "string"
444 },
445 "type": "array"
446 },
447 "protocol": {
448 "type": "string"
449 }
450 },
451 "required": [
452 "protocol",
453 "allowed_origins"
454 ],
455 "type": "object"
456 },
457 "type": "array"
458 }
459 ```
460 **Compatibility:** Firefox 90, Firefox ESR 78.12\
461 **CCK2 Equivalent:** N/A\
462 **Preferences Affected:** N/A
463
464 #### Windows (GPO)
465 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
466 ```
467 [
468 {
469 "protocol": "zoommtg",
470 "allowed_origins": [
471 "https://somesite.zoom.us"
472 ]
473 }
474 ]
475 ```
476 #### Windows (Intune)
477 OMA-URI:
478 ```
479 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
480 ```
481 Value (string):
482 ```
483 <enabled/>
484 <data id="JSON" value='
485 [
486 {
487 "protocol": "zoommtg",
488 "allowed_origins": [
489 "https://somesite.zoom.us"
490 ]
491 }
492 ]'/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>AutoLaunchProtocolsFromOrigins</key>
498 <array>
499 <dict>
500 <key>protocol</key>
501 <string>zoommtg</string>
502 <key>allowed_origins</key>
503 <array>
504 <string>https://somesite.zoom.us</string>
505 </array>
506 </dict>
507 </array>
508 </dict>
509 ```
510 #### policies.json
511 ```
512 {
513 "policies": {
514 "AutoLaunchProtocolsFromOrigins": [{
515 "protocol": "zoommtg",
516 "allowed_origins": [
517 "https://somesite.zoom.us"
518 ]
519 }]
520 }
521 }
522 ```
523 ### BackgroundAppUpdate
524
525 Enable or disable **automatic** application update **in the background**, when the application is not running.
526
527 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
528
529 If set to false, the application will not try to install updates when the application is not running.
530
531 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
532
533 **Compatibility:** Firefox 90 (Windows only)\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `app.update.background.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>BackgroundAppUpdate</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "BackgroundAppUpdate": true | false
562 }
563 }
564 ```
565 ### BlockAboutAddons
566
567 Block access to the Add-ons Manager (about:addons).
568
569 **Compatibility:** Firefox 60, Firefox ESR 60\
570 **CCK2 Equivalent:** `disableAddonsManager`\
571 **Preferences Affected:** N/A
572
573 #### Windows (GPO)
574 ```
575 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
576 ```
577 #### Windows (Intune)
578 OMA-URI:
579 ```
580 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
581 ```
582 Value (string):
583 ```
584 <enabled/> or <disabled/>
585 ```
586 #### macOS
587 ```
588 <dict>
589 <key>BlockAboutAddons</key>
590 <true/> | <false/>
591 </dict>
592 ```
593 #### policies.json
594 ```
595 {
596 "policies": {
597 "BlockAboutAddons": true | false
598 }
599 }
600 ```
601 ### BlockAboutConfig
602
603 Block access to about:config.
604
605 **Compatibility:** Firefox 60, Firefox ESR 60\
606 **CCK2 Equivalent:** `disableAboutConfig`\
607 **Preferences Affected:** N/A
608
609 #### Windows (GPO)
610 ```
611 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
612 ```
613 #### Windows (Intune)
614 OMA-URI:
615 ```
616 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
617 ```
618 Value (string):
619 ```
620 <enabled/> or <disabled/>
621 ```
622 #### macOS
623 ```
624 <dict>
625 <key>BlockAboutConfig</key>
626 <true/> | <false/>
627 </dict>
628 ```
629 #### policies.json
630 ```
631 {
632 "policies": {
633 "BlockAboutConfig": true | false
634 }
635 }
636 ```
637 ### BlockAboutProfiles
638
639 Block access to About Profiles (about:profiles).
640
641 **Compatibility:** Firefox 60, Firefox ESR 60\
642 **CCK2 Equivalent:** `disableAboutProfiles`\
643 **Preferences Affected:** N/A
644
645 #### Windows (GPO)
646 ```
647 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
648 ```
649 #### Windows (Intune)
650 OMA-URI:
651 ```
652 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
653 ```
654 Value (string):
655 ```
656 <enabled/> or <disabled/>
657 ```
658 #### macOS
659 ```
660 <dict>
661 <key>BlockAboutProfiles</key>
662 <true/> | <false/>
663 </dict>
664 ```
665 #### policies.json
666 ```
667 {
668 "policies": {
669 "BlockAboutProfiles": true | false
670 }
671 }
672 ```
673 ### BlockAboutSupport
674
675 Block access to Troubleshooting Information (about:support).
676
677 **Compatibility:** Firefox 60, Firefox ESR 60\
678 **CCK2 Equivalent:** `disableAboutSupport`\
679 **Preferences Affected:** N/A
680
681 #### Windows (GPO)
682 ```
683 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
684 ```
685 #### Windows (Intune)
686 OMA-URI:
687 ```
688 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
689 ```
690 Value (string):
691 ```
692 <enabled/> or <disabled/>
693 ```
694 #### macOS
695 ```
696 <dict>
697 <key>BlockAboutSupport</key>
698 <true/> | <false/>
699 </dict>
700 ```
701 #### policies.json
702 ```
703 {
704 "policies": {
705 "BlockAboutSupport": true | false
706 }
707 }
708 ```
709 ### Bookmarks
710
711 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
712
713 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
714
715 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
716
717 **Compatibility:** Firefox 60, Firefox ESR 60\
718 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
719 **Preferences Affected:** N/A
720
721 #### Windows (GPO)
722 ```
723 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
724 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
725 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
726 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
727 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
728
729 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
730 ```
731 []
732 ```
733
734 ```
735 #### Windows (Intune)
736 OMA-URI:
737 ```
738 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
739 ```
740 Value (string):
741 ```
742 <enabled/>
743 <data id="BookmarkTitle" value="Example"/>
744 <data id="BookmarkURL" value="https://example.com"/>
745 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
746 <data id="BookmarkPlacement" value="toolbar | menu"/>
747 <data id="BookmarkFolder" value="FolderName"/>
748 ```
749 OMA-URI:
750 ```
751 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
752 ```
753 Value (string):
754 ```
755 <enabled/>
756 <data id="JSON" value='[]'/>
757 ```
758 #### macOS
759 ```
760 <dict>
761 <key>Bookmarks</key>
762 <array>
763 <dict>
764 <key>Title</key>
765 <string>Example</string>
766 <key>URL</key>
767 <string>https://example.com</string>
768 <key>Favicon</key>
769 <string>https://example.com/favicon.ico</string>
770 <key>Placement</key>
771 <string>toolbar | menu</string>
772 <key>Folder</key>
773 <string>FolderName</string>
774 </dict>
775 </array>
776 </dict>
777 ```
778 #### policies.json
779 ```
780 {
781 "policies": {
782 "Bookmarks": [
783 {
784 "Title": "Example",
785 "URL": "https://example.com",
786 "Favicon": "https://example.com/favicon.ico",
787 "Placement": "toolbar" | "menu",
788 "Folder": "FolderName"
789 }
790 ]
791 }
792 }
793 ```
794 ### CaptivePortal
795 Enable or disable the detection of captive portals.
796
797 **Compatibility:** Firefox 67, Firefox ESR 60.7\
798 **CCK2 Equivalent:** N/A\
799 **Preferences Affected:** `network.captive-portal-service.enabled`
800
801 #### Windows (GPO)
802 ```
803 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
804 ```
805 #### Windows (Intune)
806 OMA-URI:
807 ```
808 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
809 ```
810 Value (string):
811 ```
812 <enabled/> or <disabled/>
813 ```
814 #### macOS
815 ```
816 <dict>
817 <key>CaptivePortal</key>
818 <true/> | <false/>
819 </dict>
820 ```
821 #### policies.json
822 ```
823 {
824 "policies": {
825 "CaptivePortal": true | false
826 }
827 }
828 ```
829 ### Certificates
830
831 ### Certificates | ImportEnterpriseRoots
832
833 Trust certificates that have been added to the operating system certificate store by a user or administrator.
834
835 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
836
837 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
838
839 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
840 **CCK2 Equivalent:** N/A\
841 **Preferences Affected:** `security.enterprise_roots.enabled`
842
843 #### Windows (GPO)
844 ```
845 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
846 ```
847 #### Windows (Intune)
848 OMA-URI:
849 ```
850 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
851 ```
852 Value (string):
853 ```
854 <enabled/> or <disabled/>
855 ```
856 #### macOS
857 ```
858 <dict>
859 <key>Certificates</key>
860 <dict>
861 <key>ImportEnterpriseRoots</key>
862 <true/> | <false/>
863 </dict>
864 </dict>
865 ```
866 #### policies.json
867 ```
868 {
869 "policies": {
870 "Certificates": {
871 "ImportEnterpriseRoots": true | false
872 }
873 }
874 }
875 ```
876 ### Certificates | Install
877
878 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
879
880 - Windows
881 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
882 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
883 - macOS
884 - /Library/Application Support/Mozilla/Certificates
885 - ~/Library/Application Support/Mozilla/Certificates
886 - Linux
887 - /usr/lib/mozilla/certificates
888 - /usr/lib64/mozilla/certificates
889 - ~/.mozilla/certificates
890
891 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
892
893 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
894
895 Certificates are installed using the trust string `CT,CT,`.
896
897 Binary (DER) and ASCII (PEM) certificates are both supported.
898
899 **Compatibility:** Firefox 64, Firefox ESR 64\
900 **CCK2 Equivalent:** `certs.ca`\
901 **Preferences Affected:** N/A
902
903 #### Windows (GPO)
904 ```
905 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
906 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
907 ```
908 #### Windows (Intune)
909 OMA-URI:
910 ```
911 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
912 ```
913 Value (string):
914 ```
915 <enabled/>
916 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
917 ```
918 #### macOS
919 ```
920 <dict>
921 <key>Certificates</key>
922 <dict>
923 <key>Install</key>
924 <array>
925 <string>cert1.der</string>
926 <string>/Users/username/cert2.pem</string>
927 </array>
928 </dict>
929 </dict>
930 ```
931 #### policies.json
932 ```
933 {
934 "policies": {
935 "Certificates": {
936 "Install": ["cert1.der", "/home/username/cert2.pem"]
937 }
938 }
939 }
940 ```
941 ### Cookies
942 Configure cookie preferences.
943
944 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
945
946 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
947
948 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
949
950 `Behavior` sets the default behavior for cookies based on the values below.
951
952 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
953
954 | Value | Description
955 | --- | ---
956 | accept | Accept all cookies
957 | reject-foreign | Reject third party cookies
958 | reject | Reject all cookies
959 | limit-foreign | Reject third party cookies for sites you haven't visited
960 | reject-tracker | Reject cookies for known trackers (default)
961 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
962
963 `Default` (Deprecated) determines whether cookies are accepted at all.
964
965 `AcceptThirdParty` (Deprecated) determines how third-party cookies are handled.
966
967 `ExpireAtSessionEnd` determines when cookies expire.
968
969 `RejectTracker` (Deprecated) only rejects cookies for trackers.
970
971 `Locked` prevents the user from changing cookie preferences.
972
973 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
974 **CCK2 Equivalent:** N/A\
975 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
976
977 #### Windows (GPO)
978 ```
979 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
980 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
981 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
982 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
983 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
984 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
985 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
986 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
987 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
988 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
989 ```
990 #### Windows (Intune)
991 OMA-URI:
992 ```
993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
994 ```
995 Value (string):
996 ```
997 <enabled/>
998 <data id="Permissions" value="1&#xF000;https://example.com"/>
999 ```
1000 OMA-URI:
1001 ```
1002 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
1003 ```
1004 Value (string):
1005 ```
1006 <enabled/>
1007 <data id="Permissions" value="1&#xF000;https://example.edu"/>
1008 ```
1009 OMA-URI:
1010 ```
1011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
1012 ```
1013 Value (string):
1014 ```
1015 <enabled/>
1016 <data id="Permissions" value="1&#xF000;https://example.org"/>
1017 ```
1018 OMA-URI:
1019 ```
1020 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
1021 ```
1022 Value (string):
1023 ```
1024 <enabled/> or <disabled/>
1025 ```
1026 OMA-URI:
1027 ```
1028 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
1029 ```
1030 Value (string):
1031 ```
1032 <enabled/>
1033 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
1034 ```
1035 OMA-URI:
1036 ```
1037 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
1038 ```
1039 Value (string):
1040 ```
1041 <enabled/> or <disabled/>
1042 ```
1043 OMA-URI:
1044 ```
1045 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
1046 ```
1047 Value (string):
1048 ```
1049 <enabled/> or <disabled/>
1050 ```
1051 OMA-URI:
1052 ```
1053 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
1054 ```
1055 Value (string):
1056 ```
1057 <enabled/> or <disabled/>
1058 ```
1059 OMA-URI:
1060 ```
1061 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1062 ```
1063 Value (string):
1064 ```
1065 <enabled/>
1066 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1067 ```
1068 OMA-URI:
1069 ```
1070 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1071 ```
1072 Value (string):
1073 ```
1074 <enabled/>
1075 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1076 ```
1077 #### macOS
1078 ```
1079 <dict>
1080 <key>Cookies</key>
1081 <dict>
1082 <key>Allow</key>
1083 <array>
1084 <string>http://example.com</string>
1085 </array>
1086 <key>AllowSession</key>
1087 <array>
1088 <string>http://example.edu</string>
1089 </array>
1090 <key>Block</key>
1091 <array>
1092 <string>http://example.org</string>
1093 </array>
1094 <key>Default</key>
1095 <true/> | <false/>
1096 <key>AcceptThirdParty</key>
1097 <string>always | never | from-visited</string>
1098 <key>ExpireAtSessionEnd</key>
1099 <true/> | <false/>
1100 <key>RejectTracker</key>
1101 <true/> | <false/>
1102 <key>Locked</key>
1103 <true/> | <false/>
1104 <key>Behavior</key>
1105 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1106 <key>BehaviorPrivateBrowsing</key>
1107 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1108 </dict>
1109 </dict>
1110 ```
1111 #### policies.json
1112 ```
1113 {
1114 "policies": {
1115 "Cookies": {
1116 "Allow": ["http://example.org/"],
1117 "AllowSession": ["http://example.edu/"],
1118 "Block": ["http://example.edu/"],
1119 "Default": true | false,
1120 "AcceptThirdParty": "always" | "never" | "from-visited",
1121 "ExpireAtSessionEnd": true | false,
1122 "RejectTracker": true | false,
1123 "Locked": true | false,
1124 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1125 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1126 }
1127 }
1128 }
1129 ```
1130 ### DefaultDownloadDirectory
1131 Set the default download directory.
1132
1133 You can use ${home} for the native home directory.
1134
1135 **Compatibility:** Firefox 68, Firefox ESR 68\
1136 **CCK2 Equivalent:** N/A\
1137 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1138
1139 #### Windows (GPO)
1140 ```
1141 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1142 ```
1143 #### Windows (Intune)
1144 OMA-URI:
1145 ```
1146 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1147 ```
1148 Value (string):
1149 ```
1150 <enabled/>
1151 <data id="Preferences_String" value="${home}\Downloads"/>
1152 ```
1153 #### macOS
1154 ```
1155 <dict>
1156 <key>DefaultDownloadDirectory</key>
1157 <string>${home}/Downloads</string>
1158 </dict>
1159 ```
1160 #### policies.json (macOS and Linux)
1161 ```
1162 {
1163 "policies": {
1164 "DefaultDownloadDirectory": "${home}/Downloads"
1165 }
1166 ```
1167 #### policies.json (Windows)
1168 ```
1169 {
1170 "policies": {
1171 "DefaultDownloadDirectory": "${home}\\Downloads"
1172 }
1173 ```
1174 ### DisableAppUpdate
1175 Turn off application updates within Firefox.
1176
1177 **Compatibility:** Firefox 60, Firefox ESR 60\
1178 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1179 **Preferences Affected:** N/A
1180
1181 #### Windows (GPO)
1182 ```
1183 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1184 ```
1185 #### Windows (Intune)
1186 OMA-URI:
1187 ```
1188 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1189 ```
1190 Value (string):
1191 ```
1192 <enabled/> or <disabled/>
1193 ```
1194 #### macOS
1195 ```
1196 <dict>
1197 <key>DisableAppUpdate</key>
1198 <true/> | <false/>
1199 </dict>
1200 ```
1201 #### policies.json
1202 ```
1203 {
1204 "policies": {
1205 "DisableAppUpdate": true | false
1206 }
1207 }
1208 ```
1209 ### DisableBuiltinPDFViewer
1210 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1211
1212 **Compatibility:** Firefox 60, Firefox ESR 60\
1213 **CCK2 Equivalent:** `disablePDFjs`\
1214 **Preferences Affected:** `pdfjs.disabled`
1215
1216 #### Windows (GPO)
1217 ```
1218 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1219 ```
1220 #### Windows (Intune)
1221 OMA-URI:
1222 ```
1223 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1224 ```
1225 Value (string):
1226 ```
1227 <enabled/> or <disabled/>
1228 ```
1229 #### macOS
1230 ```
1231 <dict>
1232 <key>DisableBuiltinPDFViewer</key>
1233 <true/> | <false/>
1234 </dict>
1235 ```
1236 #### policies.json
1237 ```
1238 {
1239 "policies": {
1240 "DisableBuiltinPDFViewer": true | false
1241 }
1242 }
1243 ```
1244 ### DisabledCiphers
1245 Disable specific cryptographic ciphers, listed below.
1246
1247 ```
1248 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1249 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1250 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
1251 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
1252 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
1253 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
1254 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1255 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
1256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1257 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
1258 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1259 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1260 TLS_RSA_WITH_AES_128_GCM_SHA256
1261 TLS_RSA_WITH_AES_256_GCM_SHA384
1262 TLS_RSA_WITH_AES_128_CBC_SHA
1263 TLS_RSA_WITH_AES_256_CBC_SHA
1264 TLS_RSA_WITH_3DES_EDE_CBC_SHA
1265 ```
1266
1267 **Preferences Affected:** `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256`, `security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_256_gcm_sha384`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_256_sha`, `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.deprecated.rsa_des_ede3_sha`
1268
1269 ---
1270 **Note:**
1271
1272 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1273
1274 ---
1275 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA38, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 were added in Firefox 97 and Firefox 91.6)\
1276 **CCK2 Equivalent:** N/A\
1277 **Preferences Affected:** N/A
1278
1279 #### Windows (GPO)
1280 ```
1281 Software\Policies\Mozilla\Firefox\DisabledCiphers\CIPHER_NAME = 0x1 | 0x0
1282 ```
1283 #### Windows (Intune)
1284 OMA-URI:
1285 ```
1286 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_CIPHER_NAME
1287
1288 ```
1289 Value (string):
1290 ```
1291 <enabled/> or <disabled/>
1292 ```
1293 #### macOS
1294 ```
1295 <dict>
1296 <key>DisabledCiphers</key>
1297 <dict>
1298 <key>CIPHER_NAME</key>
1299 <true/> | <false/>
1300 </dict>
1301 </dict>
1302 ```
1303 #### policies.json
1304 ```
1305 {
1306 "policies": {
1307 "DisabledCiphers": {
1308 "CIPHER_NAME": true | false,
1309 }
1310 }
1311 }
1312 ```
1313 ### DisableDefaultBrowserAgent
1314 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1315
1316 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1317
1318 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1319 **CCK2 Equivalent:** N/A\
1320 **Preferences Affected:** N/A
1321
1322 #### Windows (GPO)
1323 ```
1324 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1325 ```
1326 #### Windows (Intune)
1327 OMA-URI:
1328 ```
1329 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1330 ```
1331 Value (string):
1332 ```
1333 <enabled/> or <disabled/>
1334 ```
1335 #### policies.json
1336 ```
1337 {
1338 "policies": {
1339 "DisableDefaultBrowserAgent": true | false
1340 }
1341 }
1342 ```
1343 ### DisableDeveloperTools
1344 Remove access to all developer tools.
1345
1346 **Compatibility:** Firefox 60, Firefox ESR 60\
1347 **CCK2 Equivalent:** `removeDeveloperTools`\
1348 **Preferences Affected:** `devtools.policy.disabled`
1349
1350 #### Windows (GPO)
1351 ```
1352 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1353 ```
1354 #### Windows (Intune)
1355 OMA-URI:
1356 ```
1357 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1358 ```
1359 Value (string):
1360 ```
1361 <enabled/> or <disabled/>
1362 ```
1363 #### macOS
1364 ```
1365 <dict>
1366 <key>DisableDeveloperTools</key>
1367 <true/> | <false/>
1368 </dict>
1369 ```
1370 #### policies.json
1371 ```
1372 {
1373 "policies": {
1374 "DisableDeveloperTools": true | false
1375 }
1376 }
1377 ```
1378 ### DisableFeedbackCommands
1379 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1380
1381 **Compatibility:** Firefox 60, Firefox ESR 60\
1382 **CCK2 Equivalent:** N/A\
1383 **Preferences Affected:** N/A
1384
1385 #### Windows (GPO)
1386 ```
1387 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1388 ```
1389 #### Windows (Intune)
1390 OMA-URI:
1391 ```
1392 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1393 ```
1394 Value (string):
1395 ```
1396 <enabled/> or <disabled/>
1397 ```
1398 #### macOS
1399 ```
1400 <dict>
1401 <key>DisableFeedbackCommands</key>
1402 <true/> | <false/>
1403 </dict>
1404 ```
1405 #### policies.json
1406 ```
1407 {
1408 "policies": {
1409 "DisableFeedbackCommands": true | false
1410 }
1411 }
1412 ```
1413 ### DisableFirefoxAccounts
1414 Disable Firefox Accounts integration (Sync).
1415
1416 **Compatibility:** Firefox 60, Firefox ESR 60\
1417 **CCK2 Equivalent:** `disableSync`\
1418 **Preferences Affected:** `identity.fxaccounts.enabled`
1419
1420 #### Windows (GPO)
1421 ```
1422 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1423 ```
1424 #### Windows (Intune)
1425 OMA-URI:
1426 ```
1427 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1428 ```
1429 Value (string):
1430 ```
1431 <enabled/> or <disabled/>
1432 ```
1433 #### macOS
1434 ```
1435 <dict>
1436 <key>DisableFirefoxAccounts</key>
1437 <true/> | <false/>
1438 </dict>
1439 ```
1440 #### policies.json
1441 ```
1442 {
1443 "policies": {
1444 "DisableFirefoxAccounts": true | false
1445 }
1446 }
1447 ```
1448 ### DisableFirefoxScreenshots
1449 Remove access to Firefox Screenshots.
1450
1451 **Compatibility:** Firefox 60, Firefox ESR 60\
1452 **CCK2 Equivalent:** N/A\
1453 **Preferences Affected:** `extensions.screenshots.disabled`
1454
1455 #### Windows (GPO)
1456 ```
1457 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1458 ```
1459 #### Windows (Intune)
1460 OMA-URI:
1461 ```
1462 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1463 ```
1464 Value (string):
1465 ```
1466 <enabled/> or <disabled/>
1467 ```
1468 #### macOS
1469 ```
1470 <dict>
1471 <key>DisableFirefoxScreenshots</key>
1472 <true/> | <false/>
1473 </dict>
1474 ```
1475 #### policies.json
1476 ```
1477 {
1478 "policies": {
1479 "DisableFirefoxScreenshots": true | false
1480 }
1481 }
1482 ```
1483 ### DisableFirefoxStudies
1484 Disable Firefox studies (Shield).
1485
1486 **Compatibility:** Firefox 60, Firefox ESR 60\
1487 **CCK2 Equivalent:** N/A\
1488 **Preferences Affected:** N/A
1489
1490 #### Windows (GPO)
1491 ```
1492 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1493 ```
1494 #### Windows (Intune)
1495 OMA-URI:
1496 ```
1497 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1498 ```
1499 Value (string):
1500 ```
1501 <enabled/> or <disabled/>
1502 ```
1503 #### macOS
1504 ```
1505 <dict>
1506 <key>DisableFirefoxStudies</key>
1507 <true/> | <false/>
1508 </dict>
1509 ```
1510 #### policies.json
1511 ```
1512 {
1513 "policies": {
1514 "DisableFirefoxStudies": true | false
1515 }
1516 }
1517 ```
1518 ### DisableForgetButton
1519 Disable the "Forget" button.
1520
1521 **Compatibility:** Firefox 60, Firefox ESR 60\
1522 **CCK2 Equivalent:** `disableForget`\
1523 **Preferences Affected:** N/A
1524
1525 #### Windows (GPO)
1526 ```
1527 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1528 ```
1529 #### Windows (Intune)
1530 OMA-URI:
1531 ```
1532 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1533 ```
1534 Value (string):
1535 ```
1536 <enabled/> or <disabled/>
1537 ```
1538 #### macOS
1539 ```
1540 <dict>
1541 <key>DisableForgetButton</key>
1542 <true/> | <false/>
1543 </dict>
1544 ```
1545 #### policies.json
1546 ```
1547 {
1548 "policies": {
1549 "DisableForgetButton": true | false
1550 }
1551 }
1552 ```
1553 ### DisableFormHistory
1554 Turn off saving information on web forms and the search bar.
1555
1556 **Compatibility:** Firefox 60, Firefox ESR 60\
1557 **CCK2 Equivalent:** `disableFormFill`\
1558 **Preferences Affected:** `browser.formfill.enable`
1559
1560 #### Windows (GPO)
1561 ```
1562 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1563 ```
1564 #### Windows (Intune)
1565 OMA-URI:
1566 ```
1567 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1568 ```
1569 Value (string):
1570 ```
1571 <enabled/> or <disabled/>
1572 ```
1573 #### macOS
1574 ```
1575 <dict>
1576 <key>DisableFormHistory</key>
1577 <true/> | <false/>
1578 </dict>
1579 ```
1580 #### policies.json
1581 ```
1582 {
1583 "policies": {
1584 "DisableFormHistory": true | false
1585 }
1586 }
1587 ```
1588 ### DisableMasterPasswordCreation
1589 Remove the master password functionality.
1590
1591 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1592
1593 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1594
1595 **Compatibility:** Firefox 60, Firefox ESR 60\
1596 **CCK2 Equivalent:** `noMasterPassword`\
1597 **Preferences Affected:** N/A
1598
1599 #### Windows (GPO)
1600 ```
1601 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1602 ```
1603 #### Windows (Intune)
1604 OMA-URI:
1605 ```
1606 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1607 ```
1608 Value (string):
1609 ```
1610 <enabled/> or <disabled/>
1611 ```
1612 #### macOS
1613 ```
1614 <dict>
1615 <key>DisableMasterPasswordCreation</key>
1616 <true/> | <false/>
1617 </dict>
1618 ```
1619 #### policies.json
1620 ```
1621 {
1622 "policies": {
1623 "DisableMasterPasswordCreation": true | false
1624 }
1625 }
1626 ```
1627 ### DisablePasswordReveal
1628 Do not allow passwords to be shown in saved logins
1629
1630 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1631 **CCK2 Equivalent:** N/A
1632 **Preferences Affected:** N/A
1633
1634 #### Windows (GPO)
1635 ```
1636 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1637 ```
1638 #### Windows (Intune)
1639 OMA-URI:
1640 ```
1641 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1642 ```
1643 Value (string):
1644 ```
1645 <enabled/> or <disabled/>
1646 ```
1647 #### macOS
1648 ```
1649 <dict>
1650 <key>DisablePasswordReveal</key>
1651 <true/> | <false/>
1652 </dict>
1653 ```
1654 #### policies.json
1655 ```
1656 {
1657 "policies": {
1658 "DisablePasswordReveal": true | false
1659 }
1660 }
1661 ```
1662 ### DisablePocket
1663 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1664
1665 **Compatibility:** Firefox 60, Firefox ESR 60\
1666 **CCK2 Equivalent:** `disablePocket`\
1667 **Preferences Affected:** `extensions.pocket.enabled`
1668
1669 #### Windows (GPO)
1670 ```
1671 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1672 ```
1673 #### Windows (Intune)
1674 OMA-URI:
1675 ```
1676 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1677 ```
1678 Value (string):
1679 ```
1680 <enabled/> or <disabled/>
1681 ```
1682 #### macOS
1683 ```
1684 <dict>
1685 <key>DisablePocket</key>
1686 <true/> | <false/>
1687 </dict>
1688 ```
1689 #### policies.json
1690 ```
1691 {
1692 "policies": {
1693 "DisablePocket": true | false
1694 }
1695 }
1696 ```
1697 ### DisablePrivateBrowsing
1698 Remove access to private browsing.
1699
1700 **Compatibility:** Firefox 60, Firefox ESR 60\
1701 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1702 **Preferences Affected:** N/A
1703
1704 #### Windows (GPO)
1705 ```
1706 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1707 ```
1708 #### Windows (Intune)
1709 OMA-URI:
1710 ```
1711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1712 ```
1713 Value (string):
1714 ```
1715 <enabled/> or <disabled/>
1716 ```
1717 #### macOS
1718 ```
1719 <dict>
1720 <key>DisablePrivateBrowsing</key>
1721 <true/> | <false/>
1722 </dict>
1723 ```
1724 #### policies.json
1725 ```
1726 {
1727 "policies": {
1728 "DisablePrivateBrowsing": true | false
1729 }
1730 }
1731 ```
1732 ### DisableProfileImport
1733 Disables the "Import data from another browser" option in the bookmarks window.
1734
1735 **Compatibility:** Firefox 60, Firefox ESR 60\
1736 **CCK2 Equivalent:** N/A\
1737 **Preferences Affected:** N/A
1738
1739 #### Windows (GPO)
1740 ```
1741 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1742 ```
1743 #### Windows (Intune)
1744 OMA-URI:
1745 ```
1746 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1747 ```
1748 Value (string):
1749 ```
1750 <enabled/> or <disabled/>
1751 ```
1752 #### macOS
1753 ```
1754 <dict>
1755 <key>DisableProfileImport</key>
1756 <true/> | <false/>
1757 </dict>
1758 ```
1759 #### policies.json
1760 ```
1761 {
1762 "policies": {
1763 "DisableProfileImport": true | false
1764 }
1765 }
1766 ```
1767 ### DisableProfileRefresh
1768 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1769
1770 **Compatibility:** Firefox 60, Firefox ESR 60\
1771 **CCK2 Equivalent:** `disableResetFirefox`\
1772 **Preferences Affected:** `browser.disableResetPrompt`
1773
1774 #### Windows (GPO)
1775 ```
1776 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1777 ```
1778 #### Windows (Intune)
1779 OMA-URI:
1780 ```
1781 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1782 ```
1783 Value (string):
1784 ```
1785 <enabled/> or <disabled/>
1786 ```
1787 #### macOS
1788 ```
1789 <dict>
1790 <key>DisableProfileRefresh</key>
1791 <true/> | <false/>
1792 </dict>
1793 ```
1794 #### policies.json
1795 ```
1796 {
1797 "policies": {
1798 "DisableProfileRefresh": true | false
1799 }
1800 }
1801 ```
1802 ### DisableSafeMode
1803 Disable safe mode within the browser.
1804
1805 On Windows, this disables safe mode via the command line as well.
1806
1807 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1808 **CCK2 Equivalent:** `disableSafeMode`\
1809 **Preferences Affected:** N/A
1810
1811 #### Windows (GPO)
1812 ```
1813 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1814 ```
1815 #### Windows (Intune)
1816 OMA-URI:
1817 ```
1818 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1819 ```
1820 Value (string):
1821 ```
1822 <enabled/> or <disabled/>
1823 ```
1824 #### macOS
1825 ```
1826 <dict>
1827 <key>DisableSafeMode</key>
1828 <true/> | <false/>
1829 </dict>
1830 ```
1831 #### policies.json
1832 ```
1833 {
1834 "policies": {
1835 "DisableSafeMode": true | false
1836 }
1837 }
1838 ```
1839 ### DisableSecurityBypass
1840 Prevent the user from bypassing security in certain cases.
1841
1842 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1843
1844 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1845
1846 **Compatibility:** Firefox 60, Firefox ESR 60\
1847 **CCK2 Equivalent:** N/A\
1848 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
1849
1850 #### Windows (GPO)
1851 ```
1852 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1853 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1854 ```
1855 #### Windows (Intune)
1856 OMA-URI:
1857 ```
1858 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1859 ```
1860 Value (string):
1861 ```
1862 <enabled/> or <disabled/>
1863 ```
1864 OMA-URI:
1865 ```
1866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1867 ```
1868 Value (string):
1869 ```
1870 <enabled/> or <disabled/>
1871 ```
1872
1873 #### macOS
1874 ```
1875 <dict>
1876 <key>DisableSecurityBypass</key>
1877 <dict>
1878 <key>InvalidCertificate</key>
1879 <true/> | <false/>
1880 <key>SafeBrowsing</key>
1881 <true/> | <false/>
1882 </dict>
1883 </dict>
1884 ```
1885 #### policies.json
1886 ```
1887 {
1888 "policies": {
1889 "DisableSecurityBypass": {
1890 "InvalidCertificate": true | false,
1891 "SafeBrowsing": true | false
1892 }
1893 }
1894 }
1895 ```
1896 ### DisableSetDesktopBackground
1897 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
1898
1899 **Compatibility:** Firefox 60, Firefox ESR 60\
1900 **CCK2 Equivalent:** `removeSetDesktopBackground`\
1901 **Preferences Affected:** N/A
1902
1903 #### Windows (GPO)
1904 ```
1905 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
1906 ```
1907 #### Windows (Intune)
1908 OMA-URI:
1909 ```
1910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
1911 ```
1912 Value (string):
1913 ```
1914 <enabled/> or <disabled/>
1915 ```
1916 #### macOS
1917 ```
1918 <dict>
1919 <key>DisableSetDesktopBackground</key>
1920 <true/> | <false/>
1921 </dict>
1922 ```
1923 #### policies.json
1924 ```
1925 {
1926 "policies": {
1927 "DisableSetDesktopBackground": true | false
1928 }
1929 }
1930 ```
1931 ### DisableSystemAddonUpdate
1932 Prevent system add-ons from being installed or updated.
1933
1934 **Compatibility:** Firefox 60, Firefox ESR 60\
1935 **CCK2 Equivalent:** N/A\
1936 **Preferences Affected:** N/A
1937
1938 #### Windows (GPO)
1939 ```
1940 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1941 ```
1942 #### Windows (Intune)
1943 OMA-URI:
1944 ```
1945 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1946 ```
1947 Value (string):
1948 ```
1949 <enabled/> or <disabled/>
1950 ```
1951 #### macOS
1952 ```
1953 <dict>
1954 <key>DisableSystemAddonUpdate</key>
1955 <true/> | <false/>
1956 </dict>
1957 ```
1958 #### policies.json
1959 ```
1960 {
1961 "policies": {
1962 "DisableSystemAddonUpdate": true | false
1963 }
1964 }
1965 ```
1966 ### DisableTelemetry
1967 Prevent the upload of telemetry data.
1968
1969 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1970
1971 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1972
1973 **Compatibility:** Firefox 60, Firefox ESR 60\
1974 **CCK2 Equivalent:** `disableTelemetry`\
1975 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
1976
1977 #### Windows (GPO)
1978 ```
1979 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1980 ```
1981 #### Windows (Intune)
1982 OMA-URI:
1983 ```
1984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1985 ```
1986 Value (string):
1987 ```
1988 <enabled/> or <disabled/>
1989 ```
1990 #### macOS
1991 ```
1992 <dict>
1993 <key>DisableTelemetry</key>
1994 <true/> | <false/>
1995 </dict>
1996 ```
1997 #### policies.json
1998 ```
1999 {
2000 "policies": {
2001 "DisableTelemetry": true | false
2002 }
2003 }
2004 ```
2005 ### DisplayBookmarksToolbar
2006 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
2007
2008 **Compatibility:** Firefox 60, Firefox ESR 60\
2009 **CCK2 Equivalent:** `displayBookmarksToolbar`\
2010 **Preferences Affected:** N/A
2011
2012 #### Windows (GPO)
2013 ```
2014 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
2015 ```
2016 #### Windows (Intune)
2017 OMA-URI:
2018 ```
2019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
2020 ```
2021 Value (string):
2022 ```
2023 <enabled/> or <disabled/>
2024 ```
2025 #### macOS
2026 ```
2027 <dict>
2028 <key>DisplayBookmarksToolbar</key>
2029 <true/> | <false/>
2030 </dict>
2031 ```
2032 #### policies.json
2033 ```
2034 {
2035 "policies": {
2036 "DisplayBookmarksToolbar": true | false
2037 }
2038 }
2039 ```
2040 ### DisplayMenuBar
2041 Set the state of the menubar.
2042
2043 `always` means the menubar is shown and cannot be hidden.
2044
2045 `never` means the menubar is hidden and cannot be shown.
2046
2047 `default-on` means the menubar is on by default but can be hidden.
2048
2049 `default-off` means the menubar is off by default but can be shown.
2050
2051 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2052 **CCK2 Equivalent:** `displayMenuBar`\
2053 **Preferences Affected:** N/A
2054
2055 #### Windows (GPO)
2056 ```
2057 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2058 ```
2059 #### Windows (Intune)
2060 OMA-URI:
2061 ```
2062 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2063 ```
2064 Value (string):
2065 ```
2066 <enabled/>
2067 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2068 ```
2069 #### macOS
2070 ```
2071 <dict>
2072 <key>DisplayMenuBar</key>
2073 <string>always | never | default-on | default-off</string>
2074 </dict>
2075 ```
2076 #### policies.json
2077 ```
2078 {
2079 "policies": {
2080 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2081 }
2082 }
2083 ```
2084 ### DisplayMenuBar (Deprecated)
2085 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
2086
2087 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
2088 **CCK2 Equivalent:** `displayMenuBar`\
2089 **Preferences Affected:** N/A
2090
2091 #### Windows (GPO)
2092 ```
2093 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
2094 ```
2095 #### macOS
2096 ```
2097 <dict>
2098 <key>DisplayMenuBar</key>
2099 <true/> | <false/>
2100 </dict>
2101 ```
2102 #### policies.json
2103 ```
2104 {
2105 "policies": {
2106 "DisplayMenuBar": true | false
2107 }
2108 }
2109 ```
2110 ### DNSOverHTTPS
2111 Configure DNS over HTTPS.
2112
2113 `Enabled` determines whether DNS over HTTPS is enabled
2114
2115 `ProviderURL` is a URL to another provider.
2116
2117 `Locked` prevents the user from changing DNS over HTTPS preferences.
2118
2119 `ExcludedDomains` excludes domains from DNS over HTTPS.
2120
2121 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
2122 **CCK2 Equivalent:** N/A\
2123 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2124
2125 #### Windows (GPO)
2126 ```
2127 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2128 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2129 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2130 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2131 ```
2132 #### Windows (Intune)
2133 OMA-URI:
2134 ```
2135 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2136 ```
2137 Value (string):
2138 ```
2139 <enabled/> or <disabled/>
2140 ```
2141 OMA-URI:
2142 ```
2143 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2144 ```
2145 Value (string):
2146 ```
2147 <enabled/>
2148 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2149 ```
2150 OMA-URI:
2151 ```
2152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2153 ```
2154 Value (string):
2155 ```
2156 <enabled/> or <disabled/>
2157 ```
2158 OMA-URI:
2159 ```
2160 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2161 ```
2162 Value (string):
2163 ```
2164 <enabled/>
2165 <data id="List" value="1&#xF000;example.com"/>
2166 ```
2167 #### macOS
2168 ```
2169 <dict>
2170 <key>DNSOverHTTPS</key>
2171 <dict>
2172 <key>Enabled</key>
2173 <true/> | <false/>
2174 <key>ProviderURL</key>
2175 <string>URL_TO_ALTERNATE_PROVIDER</string>
2176 <key>Locked</key>
2177 <true/> | <false/>
2178 <key>ExcludedDomains</key>
2179 <array>
2180 <string>example.com</string>
2181 </array>
2182 </dict>
2183 </dict>
2184 ```
2185 #### policies.json
2186 ```
2187 {
2188 "policies": {
2189 "DNSOverHTTPS": {
2190 "Enabled": true | false,
2191 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2192 "Locked": true | false,
2193 "ExcludedDomains": ["example.com"]
2194 }
2195 }
2196 }
2197 ```
2198 ### DontCheckDefaultBrowser
2199 Don't check if Firefox is the default browser at startup.
2200
2201 **Compatibility:** Firefox 60, Firefox ESR 60\
2202 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2203 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2204
2205 #### Windows (GPO)
2206 ```
2207 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2208 ```
2209 #### Windows (Intune)
2210 OMA-URI:
2211 ```
2212 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2213 ```
2214 Value (string):
2215 ```
2216 <enabled/> or <disabled/>
2217 ```
2218 #### macOS
2219 ```
2220 <dict>
2221 <key>DontCheckDefaultBrowser</key>
2222 <true/> | <false/>
2223 </dict>
2224 ```
2225 #### policies.json
2226 ```
2227 {
2228 "policies": {
2229 "DontCheckDefaultBrowser": true | false
2230 }
2231 }
2232 ```
2233 ### DownloadDirectory
2234 Set and lock the download directory.
2235
2236 You can use ${home} for the native home directory.
2237
2238 **Compatibility:** Firefox 68, Firefox ESR 68\
2239 **CCK2 Equivalent:** N/A\
2240 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2241
2242 #### Windows (GPO)
2243 ```
2244 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2245 ```
2246 #### Windows (Intune)
2247 OMA-URI:
2248 ```
2249 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2250 ```
2251 Value (string):
2252 ```
2253 <enabled/>
2254 <data id="Preferences_String" value="${home}\Downloads"/>
2255 ```
2256 #### macOS
2257 ```
2258 <dict>
2259 <key>DownloadDirectory</key>
2260 <string>${home}/Downloads</string>
2261 </dict>
2262 ```
2263 #### policies.json (macOS and Linux)
2264 ```
2265 {
2266 "policies": {
2267 "DownloadDirectory": "${home}/Downloads"
2268 }
2269 ```
2270 #### policies.json (Windows)
2271 ```
2272 {
2273 "policies": {
2274 "DownloadDirectory": "${home}\\Downloads"
2275 }
2276 ```
2277 ### EnableTrackingProtection
2278 Configure tracking protection.
2279
2280 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2281
2282 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2283
2284 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2285
2286 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2287
2288 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2289
2290 `Exceptions` are origins for which tracking protection is not enabled.
2291
2292 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2293 **CCK2 Equivalent:** N/A\
2294 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2295
2296 #### Windows (GPO)
2297 ```
2298 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2299 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2300 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2301 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2302 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2303 ```
2304 #### Windows (Intune)
2305 OMA-URI:
2306 ```
2307 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2308 ```
2309 Value (string):
2310 ```
2311 <enabled/> or <disabled/>
2312 ```
2313 OMA-URI:
2314 ```
2315 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2316 ```
2317 Value (string):
2318 ```
2319 <enabled/> or <disabled/>
2320 ```
2321 OMA-URI:
2322 ```
2323 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2324 ```
2325 Value (string):
2326 ```
2327 <enabled/> or <disabled/>
2328 ```
2329 OMA-URI:
2330 ```
2331 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2332 ```
2333 Value (string):
2334 ```
2335 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2336 ```
2337 OMA-URI:
2338 ```
2339 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2340 ```
2341 Value (string):
2342 ```
2343 <enabled/> or <disabled/>
2344 ```
2345 #### macOS
2346 ```
2347 <dict>
2348 <key>EnableTrackingProtection</key>
2349 <dict>
2350 <key>Value</key>
2351 <true/> | <false/>
2352 <key>Locked</key>
2353 <true/> | <false/>
2354 <key>Cryptomining</key>
2355 <true/> | <false/>
2356 <key>Fingerprinting</key>
2357 <true/> | <false/>
2358 <key>Exceptions</key>
2359 <array>
2360 <string>https://example.com</string>
2361 </array>
2362 </dict>
2363 </dict>
2364 ```
2365 #### policies.json
2366 ```
2367 {
2368 "policies": {
2369 "EnableTrackingProtection": {
2370 "Value": true | false,
2371 "Locked": true | false,
2372 "Cryptomining": true | false,
2373 "Fingerprinting": true | false,
2374 "Exceptions": ["https://example.com"]
2375 }
2376 }
2377 }
2378 ```
2379 ### EncryptedMediaExtensions
2380 Enable or disable Encrypted Media Extensions and optionally lock it.
2381
2382 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2383
2384 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2385
2386 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2387 **CCK2 Equivalent:** N/A\
2388 **Preferences Affected:** `media.eme.enabled`
2389
2390 #### Windows (GPO)
2391 ```
2392 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2393 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2394 ```
2395 #### Windows (Intune)
2396 OMA-URI:
2397 ```
2398 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2399 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2400 ```
2401 Value (string):
2402 ```
2403 <enabled/>or <disabled/>
2404 ```
2405 #### macOS
2406 ```
2407 <dict>
2408 <key>EncryptedMediaExtensions</key>
2409 <dict>
2410 <key>Enabled</key>
2411 <true/> | <false/>
2412 <key>Locked</key>
2413 <true/> | <false/>
2414 </dict>
2415 </dict>
2416 ```
2417 #### policies.json
2418 ```
2419 {
2420 "policies": {
2421 "EncryptedMediaExtensions": {
2422 "Enabled": true | false,
2423 "Locked": true | false
2424 }
2425 }
2426 }
2427 ```
2428 ### EnterprisePoliciesEnabled
2429 Enable policy support on macOS.
2430
2431 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2432 **CCK2 Equivalent:** N/A\
2433 **Preferences Affected:** N/A
2434
2435 #### macOS
2436 ```
2437 <dict>
2438 <key>EnterprisePoliciesEnabled</key>
2439 <true/>
2440 </dict>
2441 ```
2442 ### Extensions
2443 Control the installation, uninstallation and locking of extensions.
2444
2445 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2446
2447 `Install` is a list of URLs or native paths for extensions to be installed.
2448
2449 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2450
2451 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2452
2453 **Compatibility:** Firefox 60, Firefox ESR 60\
2454 **CCK2 Equivalent:** `addons`\
2455 **Preferences Affected:** N/A
2456
2457 #### Windows (GPO)
2458 ```
2459 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2460 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2461 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2462 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2463 ```
2464 #### Windows (Intune)
2465 OMA-URI:
2466 ```
2467 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2468 ```
2469 Value (string):
2470 ```
2471 <enabled/>
2472 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2473 ```
2474 OMA-URI:
2475 ```
2476 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2477 ```
2478 Value (string):
2479 ```
2480 <enabled/>
2481 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2482 ```
2483 OMA-URI:
2484 ```
2485 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2486 ```
2487 Value (string):
2488 ```
2489 <enabled/>
2490 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2491 ```
2492 #### macOS
2493 ```
2494 <dict>
2495 <key>Extensions</key>
2496 <dict>
2497 <key>Install</key>
2498 <array>
2499 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2500 <string>//path/to/xpi</string>
2501 </array>
2502 <key>Uninstall</key>
2503 <array>
2504 <string>bad_addon_id@mozilla.org</string>
2505 </array>
2506 <key>Locked</key>
2507 <array>
2508 <string>addon_id@mozilla.org</string>
2509 </array>
2510 </dict>
2511 </dict>
2512 ```
2513 #### policies.json
2514 ```
2515 {
2516 "policies": {
2517 "Extensions": {
2518 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2519 "Uninstall": ["bad_addon_id@mozilla.org"],
2520 "Locked": ["addon_id@mozilla.org"]
2521 }
2522 }
2523 }
2524 ```
2525 ### ExtensionSettings
2526 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2527
2528 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2529
2530 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2531
2532 The configuration for each extension is another dictionary that can contain the fields documented below.
2533
2534 | Name | Description |
2535 | --- | --- |
2536 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2537 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2538 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2539 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2540 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2541 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2542 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2543 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2544 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2545 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2546 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2547
2548 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2549 **CCK2 Equivalent:** N/A\
2550 **Preferences Affected:** N/A
2551
2552 #### Windows (GPO)
2553 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2554 ```
2555 {
2556 "*": {
2557 "blocked_install_message": "Custom error message.",
2558 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2559 "installation_mode": "blocked",
2560 "allowed_types": ["extension"]
2561 },
2562 "uBlock0@raymondhill.net": {
2563 "installation_mode": "force_installed",
2564 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2565 },
2566 "https-everywhere@eff.org": {
2567 "installation_mode": "allowed"
2568 }
2569 }
2570 ```
2571 #### Windows (Intune)
2572 OMA-URI:
2573 ```
2574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2575 ```
2576 Value (string):
2577 ```
2578 <enabled/>
2579 <data id="ExtensionSettings" value='
2580 {
2581 "*": {
2582 "blocked_install_message": "Custom error message.",
2583 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2584 "installation_mode": "blocked",
2585 "allowed_types": ["extension"]
2586 },
2587 "uBlock0@raymondhill.net": {
2588 "installation_mode": "force_installed",
2589 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2590 },
2591 "https-everywhere@eff.org": {
2592 "installation_mode": "allowed"
2593 }
2594 }'/>
2595 ```
2596 #### macOS
2597 ```
2598 <dict>
2599 <key>ExtensionSettings</key>
2600 <dict>
2601 <key>*</key>
2602 <dict>
2603 <key>blocked_install_message</key>
2604 <string>Custom error message.</string>
2605 <key>install_sources</key>
2606 <array>
2607 <string>about:addons</string>
2608 <string>https://addons.mozilla.org/</string>
2609 </array>
2610 <key>installation_mode</key>
2611 <string>blocked</string>
2612 <key>allowed_types</key>
2613 <array>
2614 <string>extension</string>
2615 </array>
2616 </dict>
2617 <key>uBlock0@raymondhill.net</key>
2618 <dict>
2619 <key>installation_mode</key>
2620 <string>force_installed</string>
2621 <key>install_url</key>
2622 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2623 </dict>
2624 <key>https-everywhere@eff.org</key>
2625 <dict>
2626 <key>installation_mode</key>
2627 <string>allowed</string>
2628 </dict>
2629 </dict>
2630 </dict>
2631 ```
2632 #### policies.json
2633 ```
2634 {
2635 "policies": {
2636 "ExtensionSettings": {
2637 "*": {
2638 "blocked_install_message": "Custom error message.",
2639 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2640 "installation_mode": "blocked",
2641 "allowed_types": ["extension"]
2642 },
2643 "uBlock0@raymondhill.net": {
2644 "installation_mode": "force_installed",
2645 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2646 },
2647 "https-everywhere@eff.org": {
2648 "installation_mode": "allowed"
2649 }
2650 }
2651 }
2652 }
2653 ```
2654 ### ExtensionUpdate
2655 Control extension updates.
2656
2657 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2658 **CCK2 Equivalent:** N/A\
2659 **Preferences Affected:** `extensions.update.enabled`
2660
2661 #### Windows (GPO)
2662 ```
2663 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2664 ```
2665 #### Windows (Intune)
2666 OMA-URI:
2667 ```
2668 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2669 ```
2670 Value (string):
2671 ```
2672 <enabled/> or <disabled/>
2673 ```
2674 #### macOS
2675 ```
2676 <dict>
2677 <key>ExtensionUpdate</key>
2678 <true/> | <false/>
2679 </dict>
2680 ```
2681 #### policies.json
2682 ```
2683 {
2684 "policies": {
2685 "ExtensionUpdate": true | false
2686 }
2687 }
2688 ```
2689 ### FirefoxHome
2690 Customize the Firefox Home page.
2691
2692 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4)
2693 **CCK2 Equivalent:** N/A\
2694 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
2695
2696 #### Windows (GPO)
2697 ```
2698 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2699 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2700 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
2701 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2702 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2703 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
2704 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2705 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2706 ```
2707 #### Windows (Intune)
2708 OMA-URI:
2709 ```
2710 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2711 ```
2712 Value (string):
2713 ```
2714 <enabled/>
2715 <data id="FirefoxHome_Search" value="true | false"/>
2716 <data id="FirefoxHome_TopSites" value="true | false"/>
2717 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
2718 <data id="FirefoxHome_Highlights" value="true | false"/>
2719 <data id="FirefoxHome_Pocket" value="true | false"/>
2720 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
2721 <data id="FirefoxHome_Snippets" value="true | false"/>
2722 <data id="FirefoxHome_Locked" value="true | false"/>
2723 ```
2724 #### macOS
2725 ```
2726 <dict>
2727 <key>FirefoxHome</key>
2728 <dict>
2729 <key>Search</key>
2730 <true/> | <false/>
2731 <key>TopSites</key>
2732 <true/> | <false/>
2733 <key>SponsoredTopSites</key>
2734 <true/> | <false/>
2735 <key>Highlights</key>
2736 <true/> | <false/>
2737 <key>Pocket</key>
2738 <true/> | <false/>
2739 <key>SponsoredPocket</key>
2740 <true/> | <false/>
2741 <key>Snippets</key>
2742 <true/> | <false/>
2743 <key>Locked</key>
2744 <true/> | <false/>
2745 </dict>
2746 </dict>
2747 ```
2748 #### policies.json
2749 ```
2750 {
2751 "policies": {
2752 "FirefoxHome": {
2753 "Search": true | false,
2754 "TopSites": true | false,
2755 "SponsoredTopSites": true | false,
2756 "Highlights": true | false,
2757 "Pocket": true | false,
2758 "SponsoredPocket": true | false,
2759 "Snippets": true | false,
2760 "Locked": true | false
2761 }
2762 }
2763 }
2764 ```
2765 ### FlashPlugin (Deprecated)
2766 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2767
2768 `Allow` is a list of origins where Flash are allowed.
2769
2770 `Block` is a list of origins where Flash is not allowed.
2771
2772 `Default` determines whether or not Flash is allowed by default.
2773
2774 `Locked` prevents the user from changing Flash preferences.
2775
2776 **Compatibility:** Firefox 60, Firefox ESR 60\
2777 **CCK2 Equivalent:** `permissions.plugin`\
2778 **Preferences Affected:** `plugin.state.flash`
2779
2780 #### Windows (GPO)
2781 ```
2782 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2783 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2784 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2785 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2786 ```
2787 #### Windows (Intune)
2788 OMA-URI:
2789 ```
2790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2791 ```
2792 Value (string):
2793 ```
2794 <enabled/>
2795 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2796 ```
2797 OMA-URI:
2798 ```
2799 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2800 ```
2801 Value (string):
2802 ```
2803 <enabled/> or <disabled/>
2804 ```
2805 OMA-URI:
2806 ```
2807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2808 ```
2809 Value (string):
2810 ```
2811 <enabled/> or <disabled/>
2812 ```
2813 #### macOS
2814 ```
2815 <dict>
2816 <key>FlashPlugin</key>
2817 <dict>
2818 <key>Allow</key>
2819 <array>
2820 <string>http://example.org</string>
2821 </array>
2822 <key>Block</key>
2823 <array>
2824 <string>http://example.edu</string>
2825 </array>
2826 <key>Default</key>
2827 <true/> | <false/>
2828 <key>Locked</key>
2829 <true/> | <false/>
2830 </dict>
2831 </dict>
2832 ```
2833 #### policies.json
2834 ```
2835 {
2836 "policies": {
2837 "FlashPlugin": {
2838 "Allow": ["http://example.org/"],
2839 "Block": ["http://example.edu/"],
2840 "Default": true | false,
2841 "Locked": true | false
2842 }
2843 }
2844 }
2845 ```
2846 ### Handlers
2847 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2848
2849 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2850
2851 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2852
2853 | Name | Description |
2854 | --- | --- |
2855 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2856 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2857 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2858 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2859 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2860 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2861
2862 **Compatibility:** Firefox 78, Firefox ESR 78\
2863 **CCK2 Equivalent:** N/A\
2864 **Preferences Affected:** N/A
2865
2866 #### Windows (GPO)
2867 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2868 ```
2869 {
2870 "mimeTypes": {
2871 "application/msword": {
2872 "action": "useSystemDefault",
2873 "ask": true | false
2874 }
2875 },
2876 "schemes": {
2877 "mailto": {
2878 "action": "useHelperApp",
2879 "ask": true | false,
2880 "handlers": [{
2881 "name": "Gmail",
2882 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2883 }]
2884 }
2885 },
2886 "extensions": {
2887 "pdf": {
2888 "action": "useHelperApp",
2889 "ask": true | false,
2890 "handlers": [{
2891 "name": "Adobe Acrobat",
2892 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2893 }]
2894 }
2895 }
2896 }
2897 ```
2898 #### Windows (Intune)
2899 OMA-URI:
2900 ```
2901 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2902 ```
2903 Value (string):
2904 ```
2905 <enabled/>
2906 <data id="Handlers" value='
2907 {
2908 "mimeTypes": {
2909 "application/msword": {
2910 "action": "useSystemDefault",
2911 "ask": true | false
2912 }
2913 },
2914 "schemes": {
2915 "mailto": {
2916 "action": "useHelperApp",
2917 "ask": true | false,
2918 "handlers": [{
2919 "name": "Gmail",
2920 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2921 }]
2922 }
2923 },
2924 "extensions": {
2925 "pdf": {
2926 "action": "useHelperApp",
2927 "ask": true | false,
2928 "handlers": [{
2929 "name": "Adobe Acrobat",
2930 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2931 }]
2932 }
2933 }
2934 }
2935 '/>
2936 ```
2937 #### macOS
2938 ```
2939 <dict>
2940 <key>Handlers</key>
2941 <dict>
2942 <key>mimeTypes</key>
2943 <dict>
2944 <key>application/msword</key>
2945 <dict>
2946 <key>action</key>
2947 <string>useSystemDefault</string>
2948 <key>ask</key>
2949 <true/> | <false/>
2950 </dict>
2951 </dict>
2952 <key>schemes</key>
2953 <dict>
2954 <key>mailto</key>
2955 <dict>
2956 <key>action</key>
2957 <string>useHelperApp</string>
2958 <key>ask</key>
2959 <true/> | <false/>
2960 <key>handlers</key>
2961 <array>
2962 <dict>
2963 <key>name</key>
2964 <string>Gmail</string>
2965 <key>uriTemplate</key>
2966 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2967 </dict>
2968 </array>
2969 </dict>
2970 </dict>
2971 <key>extensions</key>
2972 <dict>
2973 <key>pdf</key>
2974 <dict>
2975 <key>action</key>
2976 <string>useHelperApp</string>
2977 <key>ask</key>
2978 <true/> | <false/>
2979 <key>handlers</key>
2980 <array>
2981 <dict>
2982 <key>name</key>
2983 <string>Adobe Acrobat</string>
2984 <key>path</key>
2985 <string>/System/Applications/Preview.app</string>
2986 </dict>
2987 </array>
2988 </dict>
2989 </dict>
2990 </dict>
2991 </dict>
2992 ```
2993 #### policies.json
2994 ```
2995 {
2996 "policies": {
2997 "Handlers": {
2998 "mimeTypes": {
2999 "application/msword": {
3000 "action": "useSystemDefault",
3001 "ask": false
3002 }
3003 },
3004 "schemes": {
3005 "mailto": {
3006 "action": "useHelperApp",
3007 "ask": true | false,
3008 "handlers": [{
3009 "name": "Gmail",
3010 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
3011 }]
3012 }
3013 },
3014 "extensions": {
3015 "pdf": {
3016 "action": "useHelperApp",
3017 "ask": true | false,
3018 "handlers": [{
3019 "name": "Adobe Acrobat",
3020 "path": "/usr/bin/acroread"
3021 }]
3022 }
3023 }
3024 }
3025 }
3026 }
3027 ```
3028 ### HardwareAcceleration
3029 Control hardware acceleration.
3030
3031 **Compatibility:** Firefox 60, Firefox ESR 60\
3032 **CCK2 Equivalent:** N/A\
3033 **Preferences Affected:** `layers.acceleration.disabled`
3034
3035 #### Windows (GPO)
3036 ```
3037 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3038 ```
3039 #### Windows (Intune)
3040 OMA-URI:
3041 ```
3042 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3043 ```
3044 Value (string):
3045 ```
3046 <enabled/> or <disabled/>
3047 ```
3048 #### macOS
3049 ```
3050 <dict>
3051 <key>HardwareAcceleration</key>
3052 <true/> | <false/>
3053 </dict>
3054 ```
3055 #### policies.json
3056 ```
3057 {
3058 "policies": {
3059 "HardwareAcceleration": true | false
3060 }
3061 }
3062 ```
3063 ### Homepage
3064 Configure the default homepage and how Firefox starts.
3065
3066 `URL` is the default homepage.
3067
3068 `Locked` prevents the user from changing homepage preferences.
3069
3070 `Additional` allows for more than one homepage.
3071
3072 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3073
3074 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3075
3076 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3077 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3078 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3079
3080 #### Windows (GPO)
3081 ```
3082 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3083 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3084 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3085 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3086 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3087 ```
3088 #### Windows (Intune)
3089 OMA-URI:
3090 ```
3091 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3092 ```
3093 Value (string):
3094 ```
3095 <enabled/>
3096
3097 <data id="HomepageURL" value="https://example.com"/>
3098 <data id="HomepageLocked" value="true | false"/>
3099 ```
3100 OMA-URI:
3101 ```
3102 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3103 ```
3104 Value (string):
3105 ```
3106 <enabled/>
3107
3108 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3109 ```
3110 OMA-URI:
3111 ```
3112 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3113 ```
3114 Value (string):
3115 ```
3116 <enabled/>
3117
3118 <data id="StartPage" value="none | homepage | previous-session"/>
3119 ```
3120 #### macOS
3121 ```
3122 <dict>
3123 <key>Homepage</key>
3124 <dict>
3125 <key>URL</key>
3126 <string>http://example.com</string>
3127 <key>Locked</key>
3128 <true/> | <false/>
3129 <key>Additional</key>
3130 <array>
3131 <string>http://example.org</string>
3132 <string>http://example.edu</string>
3133 </array>
3134 <key>StartPage</key>
3135 <string>none | homepage | previous-session | homepage-locked</string>
3136 </dict>
3137 </dict>
3138 ```
3139 #### policies.json
3140 ```
3141 {
3142 "policies": {
3143 "Homepage": {
3144 "URL": "http://example.com/",
3145 "Locked": true | false,
3146 "Additional": ["http://example.org/",
3147 "http://example.edu/"],
3148 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3149 }
3150 }
3151 }
3152 ```
3153 ### InstallAddonsPermission
3154 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3155
3156 `Allow` is a list of origins where extension installs are allowed.
3157
3158 `Default` determines whether or not extension installs are allowed by default.
3159
3160 **Compatibility:** Firefox 60, Firefox ESR 60\
3161 **CCK2 Equivalent:** `permissions.install`\
3162 **Preferences Affected:** `xpinstall.enabled`
3163
3164 #### Windows (GPO)
3165 ```
3166 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3167 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3168 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3169 ```
3170 #### Windows (Intune)
3171 OMA-URI:
3172 ```
3173 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3174 ```
3175 Value (string):
3176 ```
3177 <enabled/>
3178 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3179 ```
3180 OMA-URI:
3181 ```
3182 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3183 ```
3184 Value (string):
3185 ```
3186 <enabled/>
3187 ```
3188 #### macOS
3189 ```
3190 <dict>
3191 <key>InstallAddonsPermission</key>
3192 <dict>
3193 <key>Allow</key>
3194 <array>
3195 <string>http://example.org</string>
3196 <string>http://example.edu</string>
3197 </array>
3198 <key>Default</key>
3199 <true/> | <false/>
3200 </dict>
3201 </dict>
3202 ```
3203 #### policies.json
3204 ```
3205 {
3206 "policies": {
3207 "InstallAddonsPermission": {
3208 "Allow": ["http://example.org/",
3209 "http://example.edu/"],
3210 "Default": true | false
3211 }
3212 }
3213 }
3214 ```
3215 ### LegacyProfiles
3216 Disable the feature enforcing a separate profile for each installation.
3217
3218 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3219
3220 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3221
3222 This policy only work on Windows via GPO (not policies.json).
3223
3224 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3225 **CCK2 Equivalent:** N/A\
3226 **Preferences Affected:** N/A
3227
3228 #### Windows (GPO)
3229 ```
3230 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3231 ```
3232 #### Windows (Intune)
3233 OMA-URI:
3234 ```
3235 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3236 ```
3237 Value (string):
3238 ```
3239 <enabled/> or <disabled/>
3240 ```
3241 ### LegacySameSiteCookieBehaviorEnabled
3242 Enable default legacy SameSite cookie behavior setting.
3243
3244 If this policy is set to true, it reverts all cookies to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3245
3246 **Compatibility:** Firefox 96\
3247 **CCK2 Equivalent:** N/A\
3248 **Preferences Affected:** `network.cookie.sameSite.laxByDefault`
3249
3250 #### Windows (GPO)
3251 ```
3252 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabled = = 0x1 | 0x0
3253 ```
3254 #### Windows (Intune)
3255 OMA-URI:
3256 ```
3257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabled
3258 ```
3259 Value (string):
3260 ```
3261 <enabled/> or <disabled/>
3262 ```
3263 #### macOS
3264 ```
3265 <dict>
3266 <key>LegacySameSiteCookieBehaviorEnabled</key>
3267 <true/> | <false/>
3268 </dict>
3269 ```
3270 #### policies.json
3271 ```
3272 {
3273 "policies": {
3274 "LegacySameSiteCookieBehaviorEnabled": true | false
3275 }
3276 ```
3277 ### LegacySameSiteCookieBehaviorEnabledForDomainList
3278 Revert to legacy SameSite behavior for cookies on specified sites.
3279
3280 If this policy is set to true, cookies set for domains in this list will revert to legacy SameSite behavior which means that cookies that don't explicitly specify a ```SameSite``` attribute are treated as if they were ```SameSite=None```.
3281
3282 **Compatibility:** Firefox 96\
3283 **CCK2 Equivalent:** N/A\
3284 **Preferences Affected:** `network.cookie.sameSite.laxByDefault.disabledHosts`
3285
3286 #### Windows (GPO)
3287 ```
3288 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\1 = "example.org"
3289 Software\Policies\Mozilla\Firefox\LegacySameSiteCookieBehaviorEnabledForDomainList\2 = "example.edu"
3290 ```
3291 #### Windows (Intune)
3292 OMA-URI:
3293 ```
3294 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacySameSiteCookieBehaviorEnabledForDomainList
3295 ```
3296 Value (string):
3297 ```
3298 <enabled/>
3299 <data id="LegacySameSiteCookieBehaviorEnabledForDomainList" value="1&#xF000;example.org&#xF000;2&#xF000;example.edu"/>
3300 ```
3301 #### macOS
3302 ```
3303 <dict>
3304 <key>LegacySameSiteCookieBehaviorEnabledForDomainList</key>
3305 <array>
3306 <string>example.org</string>
3307 <string>example.edu</string>
3308 </array>
3309 </dict>
3310 ```
3311 #### policies.json
3312 ```
3313 {
3314 "policies": {
3315 "LegacySameSiteCookieBehaviorEnabledForDomainList": ["example.org",
3316 "example.edu"]
3317 }
3318 }
3319 ```
3320 ### LocalFileLinks
3321 Enable linking to local files by origin.
3322
3323 **Compatibility:** Firefox 68, Firefox ESR 68\
3324 **CCK2 Equivalent:** N/A\
3325 **Preferences Affected:** `capability.policy.localfilelinks.*`
3326
3327 #### Windows (GPO)
3328 ```
3329 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3330 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3331 ```
3332 #### Windows (Intune)
3333 OMA-URI:
3334 ```
3335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3336 ```
3337 Value (string):
3338 ```
3339 <enabled/>
3340 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3341 ```
3342 #### macOS
3343 ```
3344 <dict>
3345 <key>LocalFileLinks</key>
3346 <array>
3347 <string>http://example.org</string>
3348 <string>http://example.edu</string>
3349 </array>
3350 </dict>
3351 ```
3352 #### policies.json
3353 ```
3354 {
3355 "policies": {
3356 "LocalFileLinks": ["http://example.org/",
3357 "http://example.edu/"]
3358 }
3359 }
3360 ```
3361 ### ManagedBookmarks
3362 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3363
3364 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3365
3366 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3367 ```
3368 {
3369 "items": {
3370 "id": "BookmarkType",
3371 "properties": {
3372 "children": {
3373 "items": {
3374 "$ref": "BookmarkType"
3375 },
3376 "type": "array"
3377 },
3378 "name": {
3379 "type": "string"
3380 },
3381 "toplevel_name": {
3382 "type": "string"
3383 },
3384 "url": {
3385 "type": "string"
3386 }
3387 },
3388 "type": "object"
3389 },
3390 "type": "array"
3391 }
3392 ```
3393 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3394 **CCK2 Equivalent:** N/A\
3395 **Preferences Affected:** N/A
3396
3397 #### Windows (GPO)
3398 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3399 ```
3400 [
3401 {
3402 "toplevel_name": "My managed bookmarks folder"
3403 },
3404 {
3405 "url": "example.com",
3406 "name": "Example"
3407 },
3408 {
3409 "name": "Mozilla links",
3410 "children": [
3411 {
3412 "url": "https://mozilla.org",
3413 "name": "Mozilla.org"
3414 },
3415 {
3416 "url": "https://support.mozilla.org/",
3417 "name": "SUMO"
3418 }
3419 ]
3420 }
3421 ]
3422 ```
3423 #### Windows (Intune)
3424 OMA-URI:
3425 ```
3426 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3427 ```
3428 Value (string):
3429 ```
3430 <enabled/>
3431 <data id="JSON" value='
3432 [
3433 {
3434 "toplevel_name": "My managed bookmarks folder"
3435 },
3436 {
3437 "url": "example.com",
3438 "name": "Example"
3439 },
3440 {
3441 "name": "Mozilla links",
3442 "children": [
3443 {
3444 "url": "https://mozilla.org",
3445 "name": "Mozilla.org"
3446 },
3447 {
3448 "url": "https://support.mozilla.org/",
3449 "name": "SUMO"
3450 }
3451 ]
3452 }
3453 ]'/>
3454 ```
3455 #### macOS
3456 ```
3457 <dict>
3458 <key>ManagedBookmarks</key>
3459 <array>
3460 <dict>
3461 <key>toplevel_name</key>
3462 <string>My managed bookmarks folder</string>
3463 <dict>
3464 <key>url</key>
3465 <string>example.com</string>
3466 <key>name</key>
3467 <string>Example</string>
3468 </dict>
3469 <dict>
3470 <key>name</key>
3471 <string>Mozilla links</string>
3472 <key>children</key>
3473 <array>
3474 <dict>
3475 <key>url</key>
3476 <string>https://mozilla.org</string>
3477 <key>name</key>
3478 <string>Mozilla</string>
3479 </dict>
3480 <dict>
3481 <key>url</key>
3482 <string>https://support.mozilla.org/</string>
3483 <key>name</key>
3484 <string>SUMO</string>
3485 </dict>
3486 </array>
3487 </dict>
3488 </array>
3489 </dict>
3490 ```
3491 #### policies.json
3492 ```
3493 {
3494 "policies": {
3495 "ManagedBookmarks": [
3496 {
3497 "toplevel_name": "My managed bookmarks folder"
3498 },
3499 {
3500 "url": "example.com",
3501 "name": "Example"
3502 },
3503 {
3504 "name": "Mozilla links",
3505 "children": [
3506 {
3507 "url": "https://mozilla.org",
3508 "name": "Mozilla.org"
3509 },
3510 {
3511 "url": "https://support.mozilla.org/",
3512 "name": "SUMO"
3513 }
3514 ]
3515 }
3516 ]
3517 }
3518 }
3519 ```
3520 ### ManualAppUpdateOnly
3521
3522 Switch to manual updates only.
3523
3524 If this policy is enabled:
3525 1. The user will never be prompted to install updates
3526 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3527 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3528
3529 This policy is primarily intended for advanced end users, not for enterprises.
3530
3531 **Compatibility:** Firefox 87\
3532 **CCK2 Equivalent:** N/A\
3533 **Preferences Affected:** N/A
3534
3535 #### policies.json
3536 ```
3537 {
3538 "policies": {
3539 "ManualAppUpdateOnly": true | false
3540 }
3541 }
3542 ```
3543 ### NetworkPrediction
3544 Enable or disable network prediction (DNS prefetching).
3545
3546 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3547 **CCK2 Equivalent:** N/A\
3548 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3549
3550 #### Windows (GPO)
3551 ```
3552 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3553 ```
3554 #### Windows (Intune)
3555 OMA-URI:
3556 ```
3557 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3558 ```
3559 Value (string):
3560 ```
3561 <enabled/> or <disabled/>
3562 ```
3563 #### macOS
3564 ```
3565 <dict>
3566 <key>NetworkPrediction</key>
3567 <true/> | <false/>
3568 </dict>
3569 ```
3570 #### policies.json
3571 ```
3572 {
3573 "policies": {
3574 "NetworkPrediction": true | false
3575 }
3576 ```
3577 ### NewTabPage
3578 Enable or disable the New Tab page.
3579
3580 **Compatibility:** Firefox 68, Firefox ESR 68\
3581 **CCK2 Equivalent:** N/A\
3582 **Preferences Affected:** `browser.newtabpage.enabled`
3583
3584 #### Windows (GPO)
3585 ```
3586 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3587 ```
3588 #### Windows (Intune)
3589 OMA-URI:
3590 ```
3591 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3592 ```
3593 Value (string):
3594 ```
3595 <enabled/> or <disabled/>
3596 ```
3597 #### macOS
3598 ```
3599 <dict>
3600 <key>NewTabPage</key>
3601 <true/> | <false/>
3602 </dict>
3603 ```
3604 #### policies.json
3605 ```
3606 {
3607 "policies": {
3608 "NewTabPage": true | false
3609 }
3610 ```
3611 ### NoDefaultBookmarks
3612 Disable the creation of default bookmarks.
3613
3614 This policy is only effective if the user profile has not been created yet.
3615
3616 **Compatibility:** Firefox 60, Firefox ESR 60\
3617 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3618 **Preferences Affected:** N/A
3619
3620 #### Windows (GPO)
3621 ```
3622 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3623 ```
3624 #### Windows (Intune)
3625 OMA-URI:
3626 ```
3627 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3628 ```
3629 Value (string):
3630 ```
3631 <enabled/> or <disabled/>
3632 ```
3633 #### macOS
3634 ```
3635 <dict>
3636 <key>NoDefaultBookmarks</key>
3637 <true/> | <false/>
3638 </dict>
3639 ```
3640 #### policies.json
3641 ```
3642 {
3643 "policies": {
3644 "NoDefaultBookmarks": true | false
3645 }
3646 }
3647 ```
3648 ### OfferToSaveLogins
3649 Control whether or not Firefox offers to save passwords.
3650
3651 **Compatibility:** Firefox 60, Firefox ESR 60\
3652 **CCK2 Equivalent:** `dontRememberPasswords`\
3653 **Preferences Affected:** `signon.rememberSignons`
3654
3655 #### Windows (GPO)
3656 ```
3657 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3658 ```
3659 #### Windows (Intune)
3660 OMA-URI:
3661 ```
3662 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3663 ```
3664 Value (string):
3665 ```
3666 <enabled/> or <disabled/>
3667 ```
3668 #### macOS
3669 ```
3670 <dict>
3671 <key>OfferToSaveLogins</key>
3672 <true/> | <false/>
3673 </dict>
3674 ```
3675 #### policies.json
3676 ```
3677 {
3678 "policies": {
3679 "OfferToSaveLogins": true | false
3680 }
3681 }
3682 ```
3683 ### OfferToSaveLoginsDefault
3684 Sets the default value of signon.rememberSignons without locking it.
3685
3686 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3687 **CCK2 Equivalent:** `dontRememberPasswords`\
3688 **Preferences Affected:** `signon.rememberSignons`
3689
3690 #### Windows (GPO)
3691 ```
3692 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3693 ```
3694 #### Windows (Intune)
3695 OMA-URI:
3696 ```
3697 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3698 ```
3699 Value (string):
3700 ```
3701 <enabled/> or <disabled/>
3702 ```
3703 #### macOS
3704 ```
3705 <dict>
3706 <key>OfferToSaveLoginsDefault</key>
3707 <true/> | <false/>
3708 </dict>
3709 ```
3710 #### policies.json
3711 ```
3712 {
3713 "policies": {
3714 "OfferToSaveLoginsDefault": true | false
3715 }
3716 }
3717 ```
3718 ### OverrideFirstRunPage
3719 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3720
3721 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3722
3723 **Compatibility:** Firefox 60, Firefox ESR 60\
3724 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3725 **Preferences Affected:** `startup.homepage_welcome_url`
3726
3727 #### Windows (GPO)
3728 ```
3729 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3730 ```
3731 #### Windows (Intune)
3732 OMA-URI:
3733 ```
3734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3735 ```
3736 Value (string):
3737 ```
3738 <enabled/>
3739 <data id="OverridePage" value="https://example.com"/>
3740 ```
3741 #### macOS
3742 ```
3743 <dict>
3744 <key>OverrideFirstRunPage</key>
3745 <string>http://example.org</string>
3746 </dict>
3747 ```
3748 #### policies.json
3749 ```
3750 {
3751 "policies": {
3752 "OverrideFirstRunPage": "http://example.org"
3753 }
3754 }
3755 ```
3756 ### OverridePostUpdatePage
3757 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3758
3759 **Compatibility:** Firefox 60, Firefox ESR 60\
3760 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3761 **Preferences Affected:** `startup.homepage_override_url`
3762
3763 #### Windows (GPO)
3764 ```
3765 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3766 ```
3767 #### Windows (Intune)
3768 OMA-URI:
3769 ```
3770 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3771 ```
3772 Value (string):
3773 ```
3774 <enabled/>
3775 <data id="OverridePage" value="https://example.com"/>
3776 ```
3777 #### macOS
3778 ```
3779 <dict>
3780 <key>OverridePostUpdatePage</key>
3781 <string>http://example.org</string>
3782 </dict>
3783 ```
3784 #### policies.json
3785 ```
3786 {
3787 "policies": {
3788 "OverridePostUpdatePage": "http://example.org"
3789 }
3790 }
3791 ```
3792 ### PasswordManagerEnabled
3793 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3794
3795 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3796 **CCK2 Equivalent:** N/A\
3797 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3798
3799 #### Windows (GPO)
3800 ```
3801 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3802 ```
3803 #### Windows (Intune)
3804 OMA-URI:
3805 ```
3806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3807 ```
3808 Value (string):
3809 ```
3810 <enabled/> or <disabled/>
3811 ```
3812 #### macOS
3813 ```
3814 <dict>
3815 <key>PasswordManagerEnabled</key>
3816 <true/> | <false/>
3817 </dict>
3818 ```
3819 #### policies.json
3820 ```
3821 {
3822 "policies": {
3823 "PasswordManagerEnabled": true | false
3824 }
3825 }
3826 ```
3827 ### PasswordManagerExceptions
3828 Prevent Firefox from saving passwords for specific sites.
3829
3830 The sites are specified as a list of origins.
3831
3832 **Compatibility:** Firefox 101\
3833 **CCK2 Equivalent:** N/A\
3834 **Preferences Affected:** N/A
3835
3836 #### Windows (GPO)
3837 ```
3838 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\1 = "https://example.org"
3839 Software\Policies\Mozilla\Firefox\PasswordManagerExceptions\2 = "https://example.edu"
3840 ```
3841 #### Windows (Intune)
3842 OMA-URI:
3843 ```
3844 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerExceptions
3845 ```
3846 Value (string):
3847 ```
3848 <enabled/>
3849 <data id="List" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3850 ```
3851 #### macOS
3852 ```
3853 <dict>
3854 <key>PasswordManagerExceptions</key>
3855 <array>
3856 <string>https://example.org</string>
3857 <string>https://example.edu</string>
3858 </array>
3859 </dict>
3860 ```
3861 #### policies.json
3862 ```
3863 {
3864 "policies": {
3865 "PasswordManagerExceptions": ["https://example.org",
3866 "https://example.edu"]
3867 }
3868 }
3869 ```
3870
3871 ### PDFjs
3872 Disable or configure PDF.js, the built-in PDF viewer.
3873
3874 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3875
3876 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3877
3878 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3879
3880 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3881 **CCK2 Equivalent:** N/A\
3882 **Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions`
3883
3884 #### Windows (GPO)
3885 ```
3886 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3887 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3888 ```
3889 #### Windows (Intune)
3890 OMA-URI:
3891 ```
3892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3893 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3894 ```
3895 Value (string):
3896 ```
3897 <enabled/>or <disabled/>
3898 ```
3899 #### macOS
3900 ```
3901 <dict>
3902 <key>PDFjs</key>
3903 <dict>
3904 <key>Enabled</key>
3905 <true/> | <false/>
3906 <key>EnablePermissions</key>
3907 <true/> | <false/>
3908 </dict>
3909 </dict>
3910 ```
3911 #### policies.json
3912 ```
3913 {
3914 "policies": {
3915 "PDFjs": {
3916 "Enabled": true | false,
3917 "EnablePermissions": true | false
3918 }
3919 }
3920 }
3921 ```
3922 ### Permissions
3923 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3924
3925 `Allow` is a list of origins where the feature is allowed.
3926
3927 `Block` is a list of origins where the feature is not allowed.
3928
3929 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3930
3931 `Locked` prevents the user from changing preferences for the feature.
3932
3933 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3934
3935 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3936 **CCK2 Equivalent:** N/A\
3937 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
3938
3939 #### Windows (GPO)
3940 ```
3941 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3942 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3943 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3944 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3945 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3946 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3947 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3948 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3949 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3950 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3951 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3952 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3953 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3954 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3955 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3956 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3957 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3958 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3959 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3960 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3961 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3962 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3963 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3964 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3965 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3966 ```
3967 #### Windows (Intune)
3968 OMA-URI:
3969 ```
3970 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3971 ```
3972 Value (string):
3973 ```
3974 <enabled/> or <disabled/>
3975 ```
3976 OMA-URI:
3977 ```
3978 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3979 ```
3980 Value (string):
3981 ```
3982 <enabled/> or <disabled/>
3983 ```
3984 OMA-URI:
3985 ```
3986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3987 ```
3988 Value (string):
3989 ```
3990 <enabled/>
3991 <data id="Permissions" value="1&#xF000;https://example.org"/>
3992 ```
3993 OMA-URI:
3994 ```
3995 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3996 ```
3997 Value (string):
3998 ```
3999 <enabled/> or <disabled/>
4000 ```
4001 OMA-URI:
4002 ```
4003 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
4004 ```
4005 Value (string):
4006 ```
4007 <enabled/> or <disabled/>
4008 ```
4009 OMA-URI:
4010 ```
4011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
4012 ```
4013 Value (string):
4014 ```
4015 <enabled/>
4016 <data id="Permissions" value="1&#xF000;https://example.org"/>
4017 ```
4018 OMA-URI:
4019 ```
4020 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
4021 ```
4022 Value (string):
4023 ```
4024 <enabled/>
4025 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4026 ```
4027 OMA-URI:
4028 ```
4029 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
4030 ```
4031 Value (string):
4032 ```
4033 <enabled/>
4034 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
4035 ```
4036 OMA-URI:
4037 ```
4038 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
4039 ```
4040 Value (string):
4041 ```
4042 <enabled/> or <disabled/>
4043 ```
4044 OMA-URI:
4045 ```
4046 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
4047 ```
4048 Value (string):
4049 ```
4050 <enabled/>
4051 <data id="Permissions" value="1&#xF000;https://example.org"/>
4052 ```
4053 OMA-URI:
4054 ```
4055 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
4056 ```
4057 Value (string):
4058 ```
4059 <enabled/>
4060 <data id="Permissions" value="1&#xF000;https://example.edu"/>
4061 ```
4062 OMA-URI:
4063 ```
4064 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
4065 ```
4066 Value (string):
4067 ```
4068 <enabled/> or <disabled/>
4069 ```
4070 OMA-URI:
4071 ```
4072 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
4073 ```
4074 Value (string):
4075 ```
4076 <enabled/> or <disabled/>
4077 ```
4078 #### macOS
4079 ```
4080 <dict>
4081 <key>Permissions</key>
4082 <dict>
4083 <key>Camera</key>
4084 <dict>
4085 <key>Allow</key>
4086 <array>
4087 <string>https://example.org</string>
4088 <string>https://example.org:1234</string>
4089 </array>
4090 <key>Block</key>
4091 <array>
4092 <string>https://example.edu</string>
4093 </array>
4094 <key>BlockNewRequests</key>
4095 <true/> | <false/>
4096 <key>Locked</key>
4097 <true/> | <false/>
4098 </dict>
4099 <key>Microphone</key>
4100 <dict>
4101 <key>Allow</key>
4102 <array>
4103 <string>https://example.org</string>
4104 </array>
4105 <key>Block</key>
4106 <array>
4107 <string>https://example.edu</string>
4108 </array>
4109 <key>BlockNewRequests</key>
4110 <true/> | <false/>
4111 <key>Locked</key>
4112 <true/> | <false/>
4113 </dict>
4114 <key>Location</key>
4115 <dict>
4116 <key>Allow</key>
4117 <array>
4118 <string>https://example.org</string>
4119 </array>
4120 <key>Block</key>
4121 <array>
4122 <string>https://example.edu</string>
4123 </array>
4124 <key>BlockNewRequests</key>
4125 <true/> | <false/>
4126 <key>Locked</key>
4127 <true/> | <false/>
4128 </dict>
4129 <key>Notifications</key>
4130 <dict>
4131 <key>Allow</key>
4132 <array>
4133 <string>https://example.org</string>
4134 </array>
4135 <key>Block</key>
4136 <array>
4137 <string>https://example.edu</string>
4138 </array>
4139 <key>BlockNewRequests</key>
4140 <true/>
4141 <key>Locked</key>
4142 <true/>
4143 </dict>
4144 <key>Autoplay</key>
4145 <dict>
4146 <key>Allow</key>
4147 <array>
4148 <string>https://example.org</string>
4149 </array>
4150 <key>Block</key>
4151 <array>
4152 <string>https://example.edu</string>
4153 </array>
4154 <key>Default</key>
4155 <string>allow-audio-video | block-audio | block-audio-video</string>
4156 <key>Locked</key>
4157 <true/> | <false/>
4158 </dict>
4159 </dict>
4160 </dict>
4161 ```
4162 #### policies.json
4163 ```
4164 {
4165 "policies": {
4166 "Permissions": {
4167 "Camera": {
4168 "Allow": ["https://example.org","https://example.org:1234"],
4169 "Block": ["https://example.edu"],
4170 "BlockNewRequests": true | false,
4171 "Locked": true | false
4172 },
4173 "Microphone": {
4174 "Allow": ["https://example.org"],
4175 "Block": ["https://example.edu"],
4176 "BlockNewRequests": true | false,
4177 "Locked": true | false
4178 },
4179 "Location": {
4180 "Allow": ["https://example.org"],
4181 "Block": ["https://example.edu"],
4182 "BlockNewRequests": true | false,
4183 "Locked": true | false
4184 },
4185 "Notifications": {
4186 "Allow": ["https://example.org"],
4187 "Block": ["https://example.edu"],
4188 "BlockNewRequests": true | false,
4189 "Locked": true | false
4190 },
4191 "Autoplay": {
4192 "Allow": ["https://example.org"],
4193 "Block": ["https://example.edu"],
4194 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4195 "Locked": true | false
4196 }
4197 }
4198 }
4199 }
4200 ```
4201 ### PictureInPicture
4202
4203 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4204
4205 **Compatibility:** Firefox 78, Firefox ESR 78\
4206 **CCK2 Equivalent:** N/A\
4207 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4208
4209 #### Windows (GPO)
4210 ```
4211 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4212 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4213
4214 ```
4215 #### Windows (Intune)
4216 OMA-URI:
4217 ```
4218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4219 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4220 ```
4221 Value (string):
4222 ```
4223 <enabled/> or <disabled/>
4224 ```
4225 #### macOS
4226 ```
4227 <dict>
4228 <key>PictureInPicture</key>
4229 <dict>
4230 <key>Enabled</key>
4231 <true/> | <false/>
4232 <key>Locked</key>
4233 <true/> | <false/>
4234 </dict>
4235 </dict>
4236 ```
4237 #### policies.json
4238 ```
4239 {
4240 "policies": {
4241 "PictureInPicture": {
4242 "Enabled": true | false,
4243 "Locked": true | false
4244 }
4245 }
4246 }
4247 ```
4248 ### PopupBlocking
4249 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4250
4251 `Allow` is a list of origins where popup-windows are allowed.
4252
4253 `Default` determines whether or not pop-up windows are allowed by default.
4254
4255 `Locked` prevents the user from changing pop-up preferences.
4256
4257 **Compatibility:** Firefox 60, Firefox ESR 60\
4258 **CCK2 Equivalent:** `permissions.popup`\
4259 **Preferences Affected:** `dom.disable_open_during_load`
4260
4261 #### Windows (GPO)
4262 ```
4263 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4264 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4265 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4266 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4267 ```
4268 #### Windows (Intune)
4269 OMA-URI:
4270 ```
4271 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4272 ```
4273 Value (string):
4274 ```
4275 <enabled/>
4276 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4277 ```
4278 OMA-URI:
4279 ```
4280 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4281 ```
4282 Value (string):
4283 ```
4284 <enabled/> or <disabled/>
4285 ```
4286 OMA-URI:
4287 ```
4288 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4289 ```
4290 Value (string):
4291 ```
4292 <enabled/> or <disabled/>
4293 ```
4294 #### macOS
4295 ```
4296 <dict>
4297 <key>PopupBlocking</key>
4298 <dict>
4299 <key>Allow</key>
4300 <array>
4301 <string>http://example.org</string>
4302 <string>http://example.edu</string>
4303 </array>
4304 <key>Default</key>
4305 <true/> | <false/>
4306 <key>Locked</key>
4307 <true/> | <false/>
4308 </dict>
4309 </dict>
4310 ```
4311 #### policies.json
4312 ```
4313 {
4314 "policies": {
4315 "PopupBlocking": {
4316 "Allow": ["http://example.org/",
4317 "http://example.edu/"],
4318 "Default": true | false,
4319 "Locked": true | false
4320 }
4321 }
4322 }
4323 ```
4324 ### Preferences
4325 Set and lock preferences.
4326
4327 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4328
4329 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4330
4331 Preferences that start with the following prefixes are supported:
4332 ```
4333 accessibility.
4334 app.update.* (Firefox 86, Firefox 78.8)
4335 browser.
4336 datareporting.policy.
4337 dom.
4338 extensions.
4339 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4340 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4341 geo.
4342 gfx.
4343 intl.
4344 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4345 layers.
4346 layout.
4347 media.
4348 network.
4349 pdfjs. (Firefox 84, Firefox ESR 78.6)
4350 places.
4351 print.
4352 signon. (Firefox 83, Firefox ESR 78.5)
4353 spellchecker. (Firefox 84, Firefox ESR 78.6)
4354 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4355 ui.
4356 widget.
4357 ```
4358 as well as the following security preferences:
4359 | Preference | Type | Default
4360 | --- | --- | ---
4361 | security.default_personal_cert | string | Ask Every Time
4362 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4363 | security.insecure_connection_text.enabled | bool | false
4364 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4365 | security.insecure_connection_text.pbmode.enabled | bool | false
4366 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4367 | security.insecure_field_warning.contextual.enabled | bool | true
4368 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4369 | security.mixed_content.block_active_content | boolean | true
4370 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4371 | security.osclientcerts.autoload | boolean | false
4372 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4373 | security.ssl.errorReporting.enabled | boolean | true
4374 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4375 | security.tls.enable_0rtt_data | boolean | true
4376 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15).
4377 | security.tls.hello_downgrade_check | boolean | true
4378 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4379 | security.tls.version.enable-deprecated | boolean | false
4380 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8).
4381 | security.warn_submit_secure_to_insecure | boolean | true
4382 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4383 &nbsp;
4384
4385 Using the preference as the key, set the `Value` to the corresponding preference value.
4386
4387 `Status` can be "default", "locked", "user" or "clear"
4388
4389 * `"default"`: Read/Write: Settings appear as default even if factory default differs.
4390 * `"locked"`: Read-Only: Settings appear as default even if factory default differs.
4391 * `"user"`: Read/Write: Settings appear as changed if it differs from factory default.
4392 * `"clear"`: Read/Write: `Value` has no effect. Resets to factory defaults on each startup.
4393
4394 `"user"` preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4395
4396 `"user"` preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4397
4398 See the examples below for more detail.
4399
4400 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4401
4402 Status
4403 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4404 **CCK2 Equivalent:** `preferences`\
4405 **Preferences Affected:** Many
4406
4407 #### Windows (GPO)
4408 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4409 ```
4410 {
4411 "accessibility.force_disabled": {
4412 "Value": 1,
4413 "Status": "default"
4414 },
4415 "browser.cache.disk.parent_directory": {
4416 "Value": "SOME_NATIVE_PATH",
4417 "Status": "user"
4418 },
4419 "browser.tabs.warnOnClose": {
4420 "Value": false,
4421 "Status": "locked"
4422 }
4423 }
4424 ```
4425 #### Windows (Intune)
4426 OMA-URI:
4427 ```
4428 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4429 ```
4430 Value (string):
4431 ```
4432 <enabled/>
4433 <data id="JSON" value='
4434 {
4435 "accessibility.force_disabled": {
4436 "Value": 1,
4437 "Status": "default"
4438 },
4439 "browser.cache.disk.parent_directory": {
4440 "Value": "SOME_NATIVE_PATH",
4441 "Status": "user"
4442 },
4443 "browser.tabs.warnOnClose": {
4444 "Value": false,
4445 "Status": "locked"
4446 }
4447 }'/>
4448 ```
4449 #### macOS
4450 ```
4451 <dict>
4452 <key>Preferences</key>
4453 <dict>
4454 <key>accessibility.force_disabled</key>
4455 <dict>
4456 <key>Value</key>
4457 <integer>1</integer>
4458 <key>Status</key>
4459 <string>default</string>
4460 </dict>
4461 <key>browser.cache.disk.parent_directory</key>
4462 <dict>
4463 <key>Value</key>
4464 <string>SOME_NATIVE_PATH</string>
4465 <key>Status</key>
4466 <string>user</string>
4467 </dict>
4468 <key>browser.tabs.warnOnClose</key>
4469 <dict>
4470 <key>Value</key>
4471 <false/>
4472 <key>Status</key>
4473 <string>locked</string>
4474 </dict>
4475 </dict>
4476 </dict>
4477 ```
4478 #### policies.json
4479 ```
4480 {
4481 "policies": {
4482 "Preferences": {
4483 "accessibility.force_disabled": {
4484 "Value": 1,
4485 "Status": "default"
4486 },
4487 "browser.cache.disk.parent_directory": {
4488 "Value": "SOME_NATIVE_PATH",
4489 "Status": "user"
4490 },
4491 "browser.tabs.warnOnClose": {
4492 "Value": false,
4493 "Status": "locked"
4494 }
4495 }
4496 }
4497 }
4498 ```
4499 ### Preferences (Deprecated)
4500 Set and lock certain preferences.
4501
4502 **Compatibility:** See below\
4503 **CCK2 Equivalent:** `preferences`\
4504 **Preferences Affected:** See below
4505
4506 | Preference | Type | Compatibility | Default
4507 | --- | --- | --- | ---
4508 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4509 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4510 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4511 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4512 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4513 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4514 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4515 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4516 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4517 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4518 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4519 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4520 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4521 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4522 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4523 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4524 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4525 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4526 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4527 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4528 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4529 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4530 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4531 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4532 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4533 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4534 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4535 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4536 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4537 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4538 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4539 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4540 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4541 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4542 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4543 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4544 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4545 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4546 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4547 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4548 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4549 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4550 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4551 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4552 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4553 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4554 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4555 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4556 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4557 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4558 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4559 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4560 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4561 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4562 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4563 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4564 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4565 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4566 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4567 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4568 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4569 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4570 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4571 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4572 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4573 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4574 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4575 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4576 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4577 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4578 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4579 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4580 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4581 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4582 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4583 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4584 disabled
4585 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4586 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4587 disabled
4588 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4589 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4590 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4591 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4592 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4593 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4594 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4595 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4596 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4597 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4598 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4599 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4600 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4601 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4602 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4603 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4604 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4605 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4606 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4607 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4608 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4609 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4610 #### Windows (GPO)
4611 ```
4612 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4613 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4614 ```
4615 #### Windows (Intune)
4616 OMA-URI: (periods are replaced by underscores)
4617 ```
4618 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4619 ```
4620 Value (string):
4621 ```
4622 <enabled/> or <disabled/>
4623 ```
4624 OMA-URI: (periods are replaced by underscores)
4625 ```
4626 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4627 ```
4628 Value (string):
4629 ```
4630 <enabled/>
4631 <data id="Preferences_String" value="string_value"/>
4632 ```
4633 #### macOS
4634 ```
4635 <dict>
4636 <key>Preferences</key>
4637 <dict>
4638 <key>boolean_preference_name</key>
4639 <true/> | <false/>
4640 <key>string_preference_name</key>
4641 <string>string_value</string>
4642 </dict>
4643 </dict>
4644 ```
4645 #### policies.json
4646 ```
4647 {
4648 "policies": {
4649 "Preferences": {
4650 "boolean_preference_name": true | false,
4651 "string_preference_name": "string_value"
4652 }
4653 }
4654 }
4655 ```
4656 ### PrimaryPassword
4657 Require or prevent using a primary (formerly master) password.
4658
4659 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4660
4661 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4662
4663 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4664 **CCK2 Equivalent:** `noMasterPassword`\
4665 **Preferences Affected:** N/A
4666
4667 #### Windows (GPO)
4668 ```
4669 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4670 ```
4671 #### Windows (Intune)
4672 OMA-URI:
4673 ```
4674 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4675 ```
4676 Value (string):
4677 ```
4678 <enabled/> or <disabled/>
4679 ```
4680 #### macOS
4681 ```
4682 <dict>
4683 <key>PrimaryPassword</key>
4684 <true/> | <false/>
4685 </dict>
4686 ```
4687 #### policies.json
4688 ```
4689 {
4690 "policies": {
4691 "PrimaryPassword": true | false
4692 }
4693 }
4694 ```
4695 ### PromptForDownloadLocation
4696 Ask where to save each file before downloading.
4697
4698 **Compatibility:** Firefox 68, Firefox ESR 68\
4699 **CCK2 Equivalent:** N/A\
4700 **Preferences Affected:** `browser.download.useDownloadDir`
4701
4702 #### Windows (GPO)
4703 ```
4704 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4705 ```
4706 #### Windows (Intune)
4707 OMA-URI:
4708 ```
4709 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4710 ```
4711 Value (string):
4712 ```
4713 <enabled/> or <disabled/>
4714 ```
4715 #### macOS
4716 ```
4717 <dict>
4718 <key>PromptForDownloadLocation</key>
4719 <true/> | <false/>
4720 </dict>
4721 ```
4722 #### policies.json
4723 ```
4724 {
4725 "policies": {
4726 "PromptForDownloadLocation": true | false
4727 }
4728 }
4729 ```
4730 ### Proxy
4731 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4732 To specify ports, append them to the hostnames with a colon (:).
4733
4734 `Mode` is the proxy method being used.
4735
4736 `Locked` is whether or not proxy settings can be changed.
4737
4738 `HTTPProxy` is the HTTP proxy server.
4739
4740 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4741
4742 `SSLProxy` is the SSL proxy server.
4743
4744 `FTPProxy` is the FTP proxy server.
4745
4746 `SOCKSProxy` is the SOCKS proxy server
4747
4748 `SOCKSVersion` is the SOCKS version (4 or 5)
4749
4750 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4751
4752 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4753
4754 `AutoLogin` means do not prompt for authentication if password is saved.
4755
4756 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4757
4758 **Compatibility:** Firefox 60, Firefox ESR 60\
4759 **CCK2 Equivalent:** `networkProxy*`\
4760 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
4761
4762 #### Windows (GPO)
4763 ```
4764 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4765 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4766 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4767 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4768 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4769 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4770 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4771 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4772 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4773 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4774 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4775 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4776 ```
4777 #### Windows (Intune)
4778 OMA-URI:
4779 ```
4780 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4781 ```
4782 Value (string):
4783 ```
4784 <enabled/>
4785 <data id="ProxyLocked" value="true | false"/>
4786 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4787 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4788 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4789 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4790 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4791 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4792 <data id="SOCKSVersion" value="4 | 5"/>
4793 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4794 <data id="Passthrough" value="<local>"/>
4795 <data id="AutoLogin" value="true | false"/>
4796 <data id="UseProxyForDNS" value="true | false"/>
4797 ```
4798 #### macOS
4799 ```
4800 <dict>
4801 <key>Proxy</key>
4802 <dict>
4803 <key>Mode</key>
4804 <string>none | system | manual | autoDetect | autoConfig</string>
4805 <key>Locked</key>
4806 <true> | </false>
4807 <key>HTTPProxy</key>
4808 <string>https://httpproxy.example.com</string>
4809 <key>UseHTTPProxyForAllProtocols</key>
4810 <true> | </false>
4811 <key>SSLProxy</key>
4812 <string>https://sslproxy.example.com</string>
4813 <key>FTPProxy</key>
4814 <string>https://ftpproxy.example.com</string>
4815 <key>SOCKSProxy</key>
4816 <string>https://socksproxy.example.com</string>
4817 <key>SOCKSVersion</key>
4818 <string>4 | 5</string>
4819 <key>Passthrough</key>
4820 <string>&lt;local>&gt;</string>
4821 <key>AutoConfigURL</key>
4822 <string>URL_TO_AUTOCONFIG</string>
4823 <key>AutoLogin</key>
4824 <true> | </false>
4825 <key>UseProxyForDNS</key>
4826 <true> | </false>
4827 </dict>
4828 </dict>
4829 ```
4830 #### policies.json
4831 ```
4832 {
4833 "policies": {
4834 "Proxy": {
4835 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4836 "Locked": true | false,
4837 "HTTPProxy": "hostname",
4838 "UseHTTPProxyForAllProtocols": true | false,
4839 "SSLProxy": "hostname",
4840 "FTPProxy": "hostname",
4841 "SOCKSProxy": "hostname",
4842 "SOCKSVersion": 4 | 5,
4843 "Passthrough": "<local>",
4844 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4845 "AutoLogin": true | false,
4846 "UseProxyForDNS": true | false
4847 }
4848 }
4849 }
4850 ```
4851 ### RequestedLocales
4852 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4853
4854 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4855
4856 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4857 **CCK2 Equivalent:** N/A\
4858 **Preferences Affected:** N/A
4859 #### Windows (GPO)
4860 ```
4861 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4862 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4863
4864 or
4865
4866 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4867 ```
4868 #### Windows (Intune)
4869 OMA-URI:
4870 ```
4871 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4872 ```
4873 Value (string):
4874 ```
4875 <enabled/>
4876 <data id="Preferences_String" value="de,en-US"/>
4877 ```
4878 #### macOS
4879 ```
4880 <dict>
4881 <key>RequestedLocales</key>
4882 <array>
4883 <string>de</string>
4884 <string>en-US</string>
4885 </array>
4886 </dict>
4887
4888 or
4889
4890 <dict>
4891 <key>RequestedLocales</key>
4892 <string>de,en-US</string>
4893 </dict>
4894
4895 ```
4896 #### policies.json
4897 ```
4898 {
4899 "policies": {
4900 "RequestedLocales": ["de", "en-US"]
4901 }
4902 }
4903
4904 or
4905
4906 {
4907 "policies": {
4908 "RequestedLocales": "de,en-US"
4909 }
4910 }
4911 ```
4912 <a name="SanitizeOnShutdown"></a>
4913
4914 ### SanitizeOnShutdown (Selective)
4915 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4916
4917 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4918
4919 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4920 **CCK2 Equivalent:** N/A\
4921 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
4922 #### Windows (GPO)
4923 ```
4924 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4925 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4926 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4927 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4928 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4929 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4930 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4931 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4932 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4933 ```
4934 #### Windows (Intune)
4935 OMA-URI:
4936 ```
4937 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4938 ```
4939 Value (string):
4940 ```
4941 <enabled/> or <disabled/>
4942 ```
4943 OMA-URI:
4944 ```
4945 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4946 ```
4947 Value (string):
4948 ```
4949 <enabled/> or <disabled/>
4950 ```
4951 OMA-URI:
4952 ```
4953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4954 ```
4955 Value (string):
4956 ```
4957 <enabled/> or <disabled/>
4958 ```
4959 OMA-URI:
4960 ```
4961 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4962 ```
4963 Value (string):
4964 ```
4965 <enabled/> or <disabled/>
4966 ```
4967 OMA-URI:
4968 ```
4969 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4970 ```
4971 Value (string):
4972 ```
4973 <enabled/> or <disabled/>
4974 ```
4975 OMA-URI:
4976 ```
4977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4978 ```
4979 Value (string):
4980 ```
4981 <enabled/> or <disabled/>
4982 ```
4983 OMA-URI:
4984 ```
4985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4986 ```
4987 Value (string):
4988 ```
4989 <enabled/> or <disabled/>
4990 ```
4991 OMA-URI:
4992 ```
4993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4994 ```
4995 Value (string):
4996 ```
4997 <enabled/> or <disabled/>
4998 ```
4999 OMA-URI:
5000 ```
5001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
5002 ```
5003 Value (string):
5004 ```
5005 <enabled/> or <disabled/>
5006 ```
5007 #### macOS
5008 ```
5009 <dict>
5010 <key>SanitizeOnShutdown</key>
5011 <dict>
5012 <key>Cache</key>
5013 <true/> | <false/>
5014 <key>Cookies</key>
5015 <true/> | <false/>
5016 <key>Downloads</key>
5017 <true/> | <false/>
5018 <key>FormData</key>
5019 <true/> | <false/>
5020 <key>History</key>
5021 <true/> | <false/>
5022 <key>Sessions</key>
5023 <true/> | <false/>
5024 <key>SiteSettings</key>
5025 <true/> | <false/>
5026 <key>OfflineApps</key>
5027 <true/> | <false/>
5028 <key>Locked</key>
5029 <true/> | <false/>
5030 </dict>
5031 </dict>
5032 ```
5033 #### policies.json
5034 ```
5035 {
5036 "policies": {
5037 "SanitizeOnShutdown": {
5038 "Cache": true | false,
5039 "Cookies": true | false,
5040 "Downloads": true | false,
5041 "FormData": true | false,
5042 "History": true | false,
5043 "Sessions": true | false,
5044 "SiteSettings": true | false,
5045 "OfflineApps": true | false,
5046 "Locked": true | false
5047 }
5048 }
5049 }
5050 ```
5051 ### SanitizeOnShutdown (All)
5052 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
5053
5054 **Compatibility:** Firefox 60, Firefox ESR 60\
5055 **CCK2 Equivalent:** N/A\
5056 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
5057 #### Windows (GPO)
5058 ```
5059 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
5060 ```
5061 #### Windows (Intune)
5062 OMA-URI:
5063 ```
5064 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
5065 ```
5066 Value (string):
5067 ```
5068 <enabled/> or <disabled/>
5069 ```
5070 #### macOS
5071 ```
5072 <dict>
5073 <key>SanitizeOnShutdown</key>
5074 <true/> | <false/>
5075 </dict>
5076 ```
5077 #### policies.json
5078 ```
5079 {
5080 "policies": {
5081 "SanitizeOnShutdown": true | false
5082 }
5083 }
5084 ```
5085 ### SearchBar
5086 Set whether or not search bar is displayed.
5087
5088 **Compatibility:** Firefox 60, Firefox ESR 60\
5089 **CCK2 Equivalent:** `showSearchBar`\
5090 **Preferences Affected:** N/A
5091
5092 #### Windows (GPO)
5093 ```
5094 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
5095 ```
5096
5097 #### Windows (Intune)
5098 OMA-URI:
5099 ```
5100 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
5101 ```
5102 Value (string):
5103 ```
5104 <enabled/>
5105 <data id="SearchBar" value="unified | separate"/>
5106 ```
5107 #### macOS
5108 ```
5109 <dict>
5110 <key>SearchBar</key>
5111 <string>unified | separate</string>
5112 </dict>
5113 ```
5114 #### policies.json
5115 ```
5116 {
5117 "policies": {
5118 "SearchBar": "unified" | "separate"
5119 }
5120 }
5121 ```
5122 <a name="SearchEngines"></a>
5123
5124 ### SearchEngines (This policy is only available on the ESR.)
5125
5126 ### SearchEngines | Add
5127
5128 Add new search engines. Although there are only five engines available in the ADMX template, there is no limit. To add more in the ADMX template, you can duplicate the XML.
5129
5130 This policy is only available on the ESR. `Name` and `URLTemplate` are required.
5131
5132 `Name` is the name of the search engine.
5133
5134 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
5135
5136 `Method` is either GET or POST
5137
5138 `IconURL` is a URL for the icon to use.
5139
5140 `Alias` is a keyword to use for the engine.
5141
5142 `Description` is a description of the search engine.
5143
5144 `PostData` is the POST data as name value pairs separated by &.
5145
5146 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
5147
5148 `Encoding` is the query charset for the engine. It defaults to UTF-8.
5149
5150 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
5151 **CCK2 Equivalent:** `searchplugins`\
5152 **Preferences Affected:** N/A
5153
5154 #### Windows (GPO)
5155 ```
5156 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5157 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5158 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5159 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5160 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5161 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5162 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5163 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5164 ```
5165 #### Windows (Intune)
5166 OMA-URI:
5167 ```
5168 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5169 ```
5170 Value (string):
5171 ```
5172 <enabled/>
5173 <data id="SearchEngine_Name" value="Example1"/>
5174 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5175 <data id="SearchEngine_Method" value="GET | POST"/>
5176 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5177 <data id="SearchEngine_Alias" value="example"/>
5178 <data id="SearchEngine_Description" value="Example Description"/>
5179 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5180 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5181 ```
5182 #### macOS
5183 ```
5184 <dict>
5185 <key>SearchEngines</key>
5186 <dict>
5187 <key>Add</key>
5188 <array>
5189 <dict>
5190 <key>Name</key>
5191 <string>Example1</string>
5192 <key>URLTemplate</key>
5193 <string>https://www.example.org/q={searchTerms}</string>
5194 <key>Method</key>
5195 <string>GET | POST </string>
5196 <key>IconURL</key>
5197 <string>https://www.example.org/favicon.ico</string>
5198 <key>Alias</key>
5199 <string>example</string>
5200 <key>Description</key>
5201 <string>Example Description</string>
5202 <key>SuggestURLTemplate</key>
5203 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5204 <key>PostData</key>
5205 <string>name=value&q={searchTerms}</string>
5206 </dict>
5207 <array>
5208 </dict>
5209 </dict>
5210 ```
5211 #### policies.json
5212 ```
5213 {
5214 "policies": {
5215 "SearchEngines": {
5216 "Add": [
5217 {
5218 "Name": "Example1",
5219 "URLTemplate": "https://www.example.org/q={searchTerms}",
5220 "Method": "GET" | "POST",
5221 "IconURL": "https://www.example.org/favicon.ico",
5222 "Alias": "example",
5223 "Description": "Description",
5224 "PostData": "name=value&q={searchTerms}",
5225 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5226 }
5227 ]
5228 }
5229 }
5230 }
5231 ```
5232 ### SearchEngines | Default
5233
5234 Set the default search engine. This policy is only available on the ESR.
5235
5236 **Compatibility:** Firefox ESR 60\
5237 **CCK2 Equivalent:** `defaultSearchEngine`\
5238 **Preferences Affected:** N/A
5239
5240 #### Windows (GPO)
5241 ```
5242 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5243 ```
5244 #### Windows (Intune)
5245 OMA-URI:
5246 ```
5247 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5248 ```
5249 Value (string):
5250 ```
5251 <enabled/>
5252 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5253 ```
5254 #### macOS
5255 ```
5256 <dict>
5257 <key>SearchEngines</key>
5258 <dict>
5259 <key>Default</key>
5260 <string>NAME_OF_SEARCH_ENGINE</string>
5261 </dict>
5262 </dict>
5263 ```
5264 #### policies.json
5265 ```
5266 {
5267 "policies": {
5268 "SearchEngines": {
5269 "Default": "NAME_OF_SEARCH_ENGINE"
5270 }
5271 }
5272 }
5273 ```
5274 ### SearchEngines | PreventInstalls
5275
5276 Prevent installing search engines from webpages.
5277
5278 **Compatibility:** Firefox ESR 60\
5279 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5280 **Preferences Affected:** N/A
5281
5282 #### Windows (GPO)
5283 ```
5284 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5285 ```
5286 #### Windows (Intune)
5287 OMA-URI:
5288 ```
5289 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5290 ```
5291 Value (string):
5292 ```
5293 <enabled/> or <disabled/>
5294 ```
5295 #### macOS
5296 ```
5297 <dict>
5298 <key>SearchEngines</key>
5299 <dict>
5300 <key>PreventInstalls</key>
5301 <true/> | <false/>
5302 </dict>
5303 </dict>
5304 ```
5305 #### policies.json
5306 ```
5307 {
5308 "policies": {
5309 "SearchEngines": {
5310 "PreventInstalls": true | false
5311 }
5312 }
5313 }
5314 ```
5315 ### SearchEngines | Remove
5316
5317 Hide built-in search engines. This policy is only available on the ESR.
5318
5319 **Compatibility:** Firefox ESR 60.2\
5320 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5321 **Preferences Affected:** N/A
5322
5323 #### Windows (GPO)
5324 ```
5325 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5326 ```
5327 #### Windows (Intune)
5328 OMA-URI:
5329 ```
5330 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5331 ```
5332 Value (string):
5333 ```
5334 <enabled/>
5335 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5336 ```
5337 #### macOS
5338 ```
5339 <dict>
5340 <key>SearchEngines</key>
5341 <dict>
5342 <key>Remove</key>
5343 <array>
5344 <string>NAME_OF_SEARCH_ENGINE</string>
5345 </array>
5346 </dict>
5347 </dict>
5348 ```
5349 #### policies.json
5350 ```
5351 {
5352 "policies": {
5353 "SearchEngines": {
5354 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5355 }
5356 }
5357 }
5358 ```
5359 ### SearchSuggestEnabled
5360
5361 Enable search suggestions.
5362
5363 **Compatibility:** Firefox 68, Firefox ESR 68\
5364 **CCK2 Equivalent:** N/A\
5365 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5366
5367 #### Windows (GPO)
5368 ```
5369 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5370 ```
5371 #### Windows (Intune)
5372 OMA-URI:
5373 ```
5374 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5375 ```
5376 Value (string):
5377 ```
5378 <enabled/> or <disabled/>
5379 ```
5380 #### macOS
5381 ```
5382 <dict>
5383 <key>SearchSuggestEnabled</key>
5384 <true/> | <false/>
5385 </dict>
5386 ```
5387 #### policies.json
5388 ```
5389 {
5390 "policies": {
5391 "SearchSuggestEnabled": true | false
5392 }
5393 }
5394 ```
5395 ### SecurityDevices
5396
5397 Install PKCS #11 modules.
5398
5399 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5400 **CCK2 Equivalent:** `certs.devices`\
5401 **Preferences Affected:** N/A
5402
5403 #### Windows (GPO)
5404 ```
5405 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5406 ```
5407 #### Windows (Intune)
5408 OMA-URI:
5409 ```
5410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5411 ```
5412 Value (string):
5413 ```
5414 <enabled/>
5415 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5416 ```
5417 #### macOS
5418 ```
5419 <dict>
5420 <key>SecurityDevices</key>
5421 <dict>
5422 <key>NAME_OF_DEVICE</key>
5423 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5424 </dict>
5425 </dict>
5426 ```
5427
5428 #### policies.json
5429 ```
5430 {
5431 "policies": {
5432 "SecurityDevices": {
5433 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5434 }
5435 }
5436 }
5437 ```
5438 ### ShowHomeButton
5439 Show the home button on the toolbar.
5440
5441 Future versions of Firefox will not show the home button by default.
5442
5443 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5444 **CCK2 Equivalent:** N/A\
5445 **Preferences Affected:** N/A
5446
5447 #### Windows (GPO)
5448 ```
5449 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5450 ```
5451 #### Windows (Intune)
5452 OMA-URI:
5453 ```
5454 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/Homepage_ShowHomeButton
5455 ```
5456 Value (string):
5457 ```
5458 <enabled/> or <disabled/>
5459 ```
5460 #### macOS
5461 ```
5462 <dict>
5463 <key>ShowHomeButton</key>
5464 <true/> | <false/>
5465 </dict>
5466 ```
5467 #### policies.json
5468 ```
5469 {
5470 "policies": {
5471 "ShowHomeButton": true | false
5472 }
5473 }
5474 ```
5475 ### SSLVersionMax
5476
5477 Set and lock the maximum version of TLS.
5478
5479 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5480 **CCK2 Equivalent:** N/A\
5481 **Preferences Affected:** `security.tls.version.max`
5482
5483 #### Windows (GPO)
5484 ```
5485 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5486 ```
5487 #### Windows (Intune)
5488 OMA-URI:
5489 ```
5490 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5491 ```
5492 Value (string):
5493 ```
5494 <enabled/>
5495 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5496 ```
5497 #### macOS
5498 ```
5499 <dict>
5500 <key>SSLVersionMax</key>
5501 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5502 </dict>
5503 ```
5504
5505 #### policies.json
5506 ```
5507 {
5508 "policies": {
5509 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5510 }
5511 }
5512 ```
5513 ### SSLVersionMin
5514
5515 Set and lock the minimum version of TLS.
5516
5517 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5518 **CCK2 Equivalent:** N/A\
5519 **Preferences Affected:** `security.tls.version.min`
5520
5521 #### Windows (GPO)
5522 ```
5523 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5524 ```
5525 #### Windows (Intune)
5526 OMA-URI:
5527 ```
5528 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5529 ```
5530 Value (string):
5531 ```
5532 <enabled/>
5533 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5534 ```
5535 #### macOS
5536 ```
5537 <dict>
5538 <key>SSLVersionMin</key>
5539 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5540 </dict>
5541 ```
5542
5543 #### policies.json
5544 ```
5545 {
5546 "policies": {
5547 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5548 }
5549 }
5550 ```
5551 ### SupportMenu
5552 Add a menuitem to the help menu for specifying support information.
5553
5554 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5555 **CCK2 Equivalent:** helpMenu\
5556 **Preferences Affected:** N/A
5557
5558 #### Windows (GPO)
5559 ```
5560 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5561 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5562 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5563 ```
5564 #### Windows (Intune)
5565 OMA-URI:
5566 ```
5567 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5568 ```
5569 Value (string):
5570 ```
5571 <enabled/>
5572 <data id="SupportMenuTitle" value="Support Menu"/>
5573 <data id="SupportMenuURL" value="http://example.com/support"/>
5574 <data id="SupportMenuAccessKey" value="S">
5575 ```
5576 #### macOS
5577 ```
5578 <dict>
5579 <key>SupportMenu</key>
5580 <dict>
5581 <key>Title</key>
5582 <string>SupportMenu</string>
5583 <key>URL</key>
5584 <string>http://example.com/support</string>
5585 <key>AccessKey</key>
5586 <string>S</string>
5587 </dict>
5588 </dict>
5589 ```
5590 #### policies.json
5591 ```
5592 {
5593 "policies": {
5594 "SupportMenu": {
5595 "Title": "Support Menu",
5596 "URL": "http://example.com/support",
5597 "AccessKey": "S"
5598 }
5599 }
5600 }
5601 ```
5602 ### UserMessaging
5603
5604 Prevent Firefox from messaging the user in certain situations.
5605
5606 `WhatsNew` Remove the "What's New" icon and menuitem.
5607
5608 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
5609
5610 `FeatureRecommendations` If false, don't recommend browser features.
5611
5612 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
5613
5614 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
5615
5616 `MoreFromMozilla` If false, don't show the "More from Mozilla" section in Preferences. (Firefox 98)
5617
5618 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5619 **CCK2 Equivalent:** N/A\
5620 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`, `browser.preferences.moreFromMozilla`
5621
5622 #### Windows (GPO)
5623 ```
5624 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5625 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5626 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5627 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5628 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
5629 Software\Policies\Mozilla\Firefox\UserMessaging\MoreFromMozilla = 0x1 | 0x0
5630 ```
5631 #### Windows (Intune)
5632 OMA-URI:
5633 ```
5634 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
5635 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
5636 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
5637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
5638 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
5639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_MoreFromMozilla
5640 ```
5641 Value (string):
5642 ```
5643 <enabled/> or <disabled/>
5644 ```
5645 #### macOS
5646 ```
5647 <dict>
5648 <key>UserMessaging</key>
5649 <dict>
5650 <key>WhatsNew</key>
5651 <true/> | <false/>
5652 <key>ExtensionRecommendations</key>
5653 <true/> | <false/>
5654 <key>FeatureRecommendations</key>
5655 <true/> | <false/>
5656 <key>UrlbarInterventions</key>
5657 <true/> | <false/>
5658 <key>SkipOnboarding</key>
5659 <true/> | <false/>
5660 <key>MoreFromMozilla</key>
5661 <true/> | <false/>
5662 </dict>
5663 </dict>
5664 ```
5665 #### policies.json
5666 ```
5667 {
5668 "policies": {
5669 "UserMessaging": {
5670 "WhatsNew": true | false,
5671 "ExtensionRecommendations": true | false,
5672 "FeatureRecommendations": true | false,
5673 "UrlbarInterventions": true | false,
5674 "SkipOnboarding": true | false,
5675 "MoreFromMozilla": true | false
5676 }
5677 }
5678 }
5679 ```
5680 ### UseSystemPrintDialog
5681 Use the system print dialog instead of the print preview window.
5682
5683 **Compatibility:** Firefox 102\
5684 **CCK2 Equivalent:** N/A\
5685 **Preferences Affected:** `print.prefer_system_dialog`
5686
5687 #### Windows (GPO)
5688 ```
5689 Software\Policies\Mozilla\Firefox\UseSystemPrintDialog = 0x1 | 0x0
5690 ```
5691 #### Windows (Intune)
5692 OMA-URI:
5693 ```
5694 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UseSystemPrintDialog
5695 ```
5696 Value (string):
5697 ```
5698 <enabled/> or <disabled/>
5699 ```
5700 #### macOS
5701 ```
5702 <dict>
5703 <key>UseSystemPrintDialog</key>
5704 <true/> | <false/>
5705 </dict>
5706 ```
5707 #### policies.json
5708 ```
5709 {
5710 "policies": {
5711 "UseSystemPrintDialog": true | false
5712 }
5713 }
5714 ```
5715 ### WebsiteFilter
5716 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5717 The arrays are limited to 1000 entries each.
5718
5719 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
5720
5721 For specific protocols, use `https://*/*` or `http://*/*`.
5722
5723 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5724
5725 **Compatibility:** Firefox 60, Firefox ESR 60\
5726 **CCK2 Equivalent:** N/A\
5727 **Preferences Affected:** N/A
5728
5729 #### Windows (GPO)
5730 ```
5731 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5732 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5733 ```
5734 #### Windows (Intune)
5735 OMA-URI:
5736 ```
5737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5738 ```
5739 Value (string):
5740 ```
5741 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
5742 ```
5743 OMA-URI:
5744 ```
5745 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5746 ```
5747 Value (string):
5748 ```
5749 <enabled/>
5750 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5751 ```
5752 #### macOS
5753 ```
5754 <dict>
5755 <key>WebsiteFilter</key>
5756 <dict>
5757 <key>Block</key>
5758 <array>
5759 <string><all_urls></string>
5760 </array>
5761 <key>Exceptions</key>
5762 <array>
5763 <string>http://example.org/*</string>
5764 </array>
5765 </dict>
5766
5767 </dict>
5768 ```
5769 #### policies.json
5770 ```
5771 {
5772 "policies": {
5773 "WebsiteFilter": {
5774 "Block": ["<all_urls>"],
5775 "Exceptions": ["http://example.org/*"]
5776 }
5777 }
5778 }
5779 ```
5780 ### WindowsSSO
5781 Allow Windows single sign-on for Microsoft, work, and school accounts.
5782
5783 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
5784
5785 **Compatibility:** Firefox 91\
5786 **CCK2 Equivalent:** N/A\
5787 **Preferences Affected:** `network.http.windows-sso.enabled`
5788
5789 #### Windows (GPO)
5790 ```
5791 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
5792 ```
5793 #### Windows (Intune)
5794 OMA-URI:
5795 ```
5796 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
5797 ```
5798 Value (string):
5799 ```
5800 <enabled/> or <disabled/>
5801 ```
5802 #### policies.json
5803 ```
5804 {
5805 "policies": {
5806 "WindowsSSO": true | false
5807 }
5808 }
5809 ```

patrick-canterino.de