]> git.p6c8.net - policy-templates.git/blob - README.md
Enhanced German translation
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar`](#displaymenubar)** | Set the initial state of the menubar.
42 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
43 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
44 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
45 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
46 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
47 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
48 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
49 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
50 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
51 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
52 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
53 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
54 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
55 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
56 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
57 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
58 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
59 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
60 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
61 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
62 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
63 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
64 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
65 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
66 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
67 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
68 | **[`Preferences`](#preferences)** | Set and lock some preferences.
69 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
70 | **[`Proxy`](#proxy)** | Configure proxy settings.
71 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
72 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
73 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
74 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
75 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
76 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
77 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
78 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
79 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
80 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
81 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
82 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
83 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
84 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
85 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
86
87 ### AppUpdateURL
88
89 Change the URL for application update.
90
91 **Compatibility:** Firefox 62, Firefox ESR 60.2\
92 **CCK2 Equivalent:** N/A\
93 **Preferences Affected:** `app.update.url`
94
95 #### Windows (GPO)
96 ```
97 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
98 ```
99 #### macOS
100 ```
101 <dict>
102 <key>AppUpdateURL</key>
103 <string>https://yoursite.com</string>
104 </dict>
105 ```
106 #### policies.json
107 ```
108 {
109 "policies": {
110 "AppUpdateURL": "https://yoursite.com"
111 }
112 }
113 ```
114 ### Authentication
115
116 Configure sites that support integrated authentication.
117
118 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
119
120 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2)\
121 **CCK2 Equivalent:** N/A\
122 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
123
124 #### Windows (GPO)
125 ```
126 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
127 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
128 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
133 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
134 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
135 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
136 ```
137 #### macOS
138 ```
139 <dict>
140 <key>Authentication</key>
141 <dict>
142 <key>SPNEGO</key>
143 <array>
144 <string>mydomain.com</string>
145 <string>https://myotherdomain.com</string>
146 </array>
147 <key>Delegated</key>
148 <array>
149 <string>mydomain.com</string>
150 <string>https://myotherdomain.com</string>
151 </array>
152 <key>NTLM</key>
153 <array>
154 <string>mydomain.com</string>
155 <string>https://myotherdomain.com</string>
156 </array>
157 <key>AllowNonFQDN</key>
158 <dict>
159 <key>SPNEGO</key>
160 <true/> | <false/>
161 <key>NTLM</key>
162 <true/> | <false/>
163 </dict>
164 <key>AllowProxies</key>
165 <dict>
166 <key>SPNEGO</key>
167 <true/> | <false/>
168 <key>NTLM</key>
169 <true/> | <false/>
170 </dict>
171 </dict>
172 </dict>
173 ```
174 #### policies.json
175 ```
176 {
177 "policies": {
178 "Authentication": {
179 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
180 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
181 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
182 "AllowNonFQDN": {
183 "SPNEGO": true | false,
184 "NTLM": true | false
185 },
186 "AllowProxies": {
187 "SPNEGO": true | false,
188 "NTLM": true | false
189 }
190 }
191 }
192 }
193 ```
194 ### BlockAboutAddons
195
196 Block access to the Add-ons Manager (about:addons).
197
198 **Compatibility:** Firefox 60, Firefox ESR 60\
199 **CCK2 Equivalent:** `disableAddonsManager`\
200 **Preferences Affected:** N/A
201
202 #### Windows (GPO)
203 ```
204 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
205 ```
206 #### macOS
207 ```
208 <dict>
209 <key>BlockAboutAddons</key>
210 <true/> | <false/>
211 </dict>
212 ```
213 #### policies.json
214 ```
215 {
216 "policies": {
217 "BlockAboutAddons": true | false
218 }
219 }
220 ```
221 ### BlockAboutConfig
222
223 Block access to about:config.
224
225 **Compatibility:** Firefox 60, Firefox ESR 60\
226 **CCK2 Equivalent:** `disableAboutConfig`\
227 **Preferences Affected:** N/A
228
229 #### Windows (GPO)
230 ```
231 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
232 ```
233 #### macOS
234 ```
235 <dict>
236 <key>BlockAboutConfig</key>
237 <true/> | <false/>
238 </dict>
239 ```
240 #### policies.json
241 ```
242 {
243 "policies": {
244 "BlockAboutConfig": true | false
245 }
246 }
247 ```
248 ### BlockAboutProfiles
249
250 Block access to About Profiles (about:profiles).
251
252 **Compatibility:** Firefox 60, Firefox ESR 60\
253 **CCK2 Equivalent:** `disableAboutProfiles`\
254 **Preferences Affected:** N/A
255
256 #### Windows (GPO)
257 ```
258 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
259 ```
260 #### macOS
261 ```
262 <dict>
263 <key>BlockAboutProfiles</key>
264 <true/> | <false/>
265 </dict>
266 ```
267 #### policies.json
268 ```
269 {
270 "policies": {
271 "BlockAboutProfiles": true | false
272 }
273 }
274 ```
275 ### BlockAboutSupport
276
277 Block access to Troubleshooting Information (about:support).
278
279 **Compatibility:** Firefox 60, Firefox ESR 60\
280 **CCK2 Equivalent:** `disableAboutSupport`\
281 **Preferences Affected:** N/A
282
283 #### Windows (GPO)
284 ```
285 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
286 ```
287 #### macOS
288 ```
289 <dict>
290 <key>BlockAboutSupport</key>
291 <true/> | <false/>
292 </dict>
293 ```
294 #### policies.json
295 ```
296 {
297 "policies": {
298 "BlockAboutSupport": true | false
299 }
300 }
301 ```
302 ### Bookmarks
303
304 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
305
306 **Compatibility:** Firefox 60, Firefox ESR 60\
307 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
308 **Preferences Affected:** N/A
309
310 #### Windows (GPO)
311 ```
312 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
313 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
314 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
315 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
316 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
317 ```
318 #### macOS
319 ```
320 <dict>
321 <key>Bookmarks</key>
322 <array>
323 <dict>
324 <key>Title</key>
325 <string>Example</string>
326 <key>URL</key>
327 <string>https://example.com</string>
328 <key>Favicon</key>
329 <string>https://example.com/favicon.ico</string>
330 <key>Placement</key>
331 <string>toolbar | menu</string>
332 <key>Folder</key>
333 <string>FolderName</string>
334 </dict>
335 </array>
336 </dict>
337 ```
338 #### policies.json
339 ```
340 {
341 "policies": {
342 "Bookmarks": [
343 {
344 "Title": "Example",
345 "URL": "https://example.com",
346 "Favicon": "https://example.com/favicon.ico",
347 "Placement": "toolbar" | "menu",
348 "Folder": "FolderName"
349 }
350 ]
351 }
352 }
353 ```
354 ### CaptivePortal
355 Enable or disable the detection of captive portals.
356
357 **Compatibility:** Firefox 67, Firefox ESR 60.7\
358 **CCK2 Equivalent:** N/A\
359 **Preferences Affected:** `network.captive-portal-service.enabled`
360
361 #### Windows (GPO)
362 ```
363 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
364 ```
365 #### macOS
366 ```
367 <dict>
368 <key>CaptivePortal</key>
369 <true/> | <false/>
370 </dict>
371 ```
372 #### policies.json
373 ```
374 {
375 "policies": {
376 "CaptivePortal": true | false
377 }
378 }
379 ```
380 ### Certificates
381
382 ### Certificates | ImportEnterpriseRoots
383
384 Trust certificates that have been added to the operating system certificate store by a user or administrator.
385
386 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
387
388 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
389 **CCK2 Equivalent:** N/A\
390 **Preferences Affected:** `security.enterprise_roots.enabled`
391
392 #### Windows (GPO)
393 ```
394 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
395 ```
396 #### macOS
397 ```
398 <dict>
399 <key>Certificates</key>
400 <dict>
401 <key>ImportEnterpriseRoots</key>
402 <true/> | <false/>
403 </dict>
404 </dict>
405 ```
406 #### policies.json
407 ```
408 {
409 "policies": {
410 "Certificates": {
411 "ImportEnterpriseRoots": true | false
412 }
413 }
414 }
415 ```
416 ### Certificates | Install
417
418 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
419
420 - Windows
421 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
422 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
423 - macOS
424 - /Library/Application Support/Mozilla/Certificates
425 - ~/Library/Application Support/Mozilla/Certificates
426 - Linux
427 - /usr/lib/mozilla/certificates
428 - /usr/lib64/mozilla/certificates
429 - ~/.mozilla/certificates
430
431 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
432
433 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
434
435 Certificates are installed using the trust string `CT,CT,`.
436
437 Binary (DER) and ASCII (PEM) certificates are both supported.
438
439 **Compatibility:** Firefox 64, Firefox ESR 64\
440 **CCK2 Equivalent:** `certs.ca`\
441 **Preferences Affected:** N/A
442
443 #### Windows (GPO)
444 ```
445 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
446 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
447 ```
448 #### macOS
449 ```
450 <dict>
451 <key>Certificates</key>
452 <dict>
453 <key>Install</key>
454 <array>
455 <string>cert1.der</string>
456 <string>/Users/username/cert2.pem</string>
457 </array>
458 </dict>
459 </dict>
460 ```
461 #### policies.json
462 ```
463 {
464 "policies": {
465 "Certificates": {
466 "Install": ["cert1.der", "/home/username/cert2.pem"]
467 }
468 }
469 }
470 ```
471 ### Cookies
472 Configure cookie preferences.
473
474 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
475
476 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
477
478 `Default` determines whether cookies are accepted at all.
479
480 `AcceptThirdParty` determines how third-party cookies are handled.
481
482 `ExpireAtSessionEnd` determines when cookies expire.
483
484 `RejectTracker` only rejects cookies for trackers.
485
486 `Locked` prevents the user from changing cookie preferences.
487
488 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
489 **CCK2 Equivalent:** N/A\
490 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
491
492 #### Windows (GPO)
493 ```
494 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
495 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
496 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
497 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
498 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
499 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
500 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
501 ```
502 #### macOS
503 ```
504 <dict>
505 <key>Cookies</key>
506 <dict>
507 <key>Allow</key>
508 <array>
509 <string>http://example.com</string>
510 </array>
511 <key>Block</key>
512 <array>
513 <string>http://example.org</string>
514 </array>
515 <key>Default</key>
516 <true/> | <false/>
517 <key>AcceptThirdParty</key>
518 <string>always | never | from-visited</string>
519 <key>ExpireAtSessionEnd</key>
520 <true/> | <false/>
521 <key>RejectTracker</key>
522 <true/> | <false/>
523 <key>Locked</key>
524 <true/> | <false/>
525 </dict>
526 </dict>
527 ```
528 #### policies.json
529 ```
530 {
531 "policies": {
532 "Cookies": {
533 "Allow": ["http://example.org/"],
534 "Block": ["http://example.edu/"],
535 "Default": true | false,
536 "AcceptThirdParty": "always" | "never" | "from-visited"],
537 "ExpireAtSessionEnd": true | false,
538 "RejectTracker": true | false,
539 "Locked": true | false
540 }
541 }
542 }
543 ```
544 ### DisableSetDesktopBackground
545 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
546
547 **Compatibility:** Firefox 60, Firefox ESR 60\
548 **CCK2 Equivalent:** `removeSetDesktopBackground`\
549 **Preferences Affected:** N/A
550
551 #### Windows (GPO)
552 ```
553 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
554 ```
555
556 #### macOS
557 ```
558 <dict>
559 <key>DisableSetDesktopBackground</key>
560 <true/> | <false/>
561 </dict>
562 ```
563 #### policies.json
564 ```
565 {
566 "policies": {
567 "DisableSetDesktopBackground": true | false
568 }
569 }
570 ```
571 ### DisableMasterPasswordCreation
572 Remove the master password functionality.
573
574 **Compatibility:** Firefox 60, Firefox ESR 60\
575 **CCK2 Equivalent:** `noMasterPassword`\
576 **Preferences Affected:** N/A
577
578 #### Windows (GPO)
579 ```
580 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
581 ```
582
583 #### macOS
584 ```
585 <dict>
586 <key>DisableMasterPasswordCreation</key>
587 <true/> | <false/>
588 </dict>
589 ```
590 #### policies.json
591 ```
592 {
593 "policies": {
594 "DisableMasterPasswordCreation": true | false
595 }
596 }
597 ```
598 ### DisableAppUpdate
599 Turn off application updates.
600
601 **Compatibility:** Firefox 60, Firefox ESR 60\
602 **CCK2 Equivalent:** `disableFirefoxUpdates`\
603 **Preferences Affected:** N/A
604
605 #### Windows (GPO)
606 ```
607 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
608 ```
609 #### macOS
610 ```
611 <dict>
612 <key>DisableAppUpdate</key>
613 <true/> | <false/>
614 </dict>
615 ```
616 #### policies.json
617 ```
618 {
619 "policies": {
620 "DisableAppUpdate": true | false
621 }
622 }
623 ```
624 ### DisableBuiltinPDFViewer
625 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
626
627 **Compatibility:** Firefox 60, Firefox ESR 60\
628 **CCK2 Equivalent:** `disablePDFjs`\
629 **Preferences Affected:** `pdfjs.disabled`
630
631 #### Windows (GPO)
632 ```
633 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
634 ```
635
636 #### macOS
637 ```
638 <dict>
639 <key>DisableBuiltinPDFViewer</key>
640 <true/> | <false/>
641 </dict>
642 ```
643 #### policies.json
644 ```
645 {
646 "policies": {
647 "DisableBuiltinPDFViewer": true | false
648 }
649 }
650 ```
651 ### DisableDeveloperTools
652 Remove access to all developer tools.
653
654 **Compatibility:** Firefox 60, Firefox ESR 60\
655 **CCK2 Equivalent:** `removeDeveloperTools`\
656 **Preferences Affected:** `devtools.policy.disabled`
657
658 #### Windows (GPO)
659 ```
660 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
661 ```
662
663 #### macOS
664 ```
665 <dict>
666 <key>DisableDeveloperTools</key>
667 <true/> | <false/>
668 </dict>
669 ```
670 #### policies.json
671 ```
672 {
673 "policies": {
674 "DisableDeveloperTools": true | false
675 }
676 }
677 ```
678 ### DisableFeedbackCommands
679 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
680
681 **Compatibility:** Firefox 60, Firefox ESR 60\
682 **CCK2 Equivalent:** N/A\
683 **Preferences Affected:** N/A
684
685 #### Windows (GPO)
686 ```
687 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
688 ```
689 #### macOS
690 ```
691 <dict>
692 <key>DisableFeedbackCommands</key>
693 <true/> | <false/>
694 </dict>
695 ```
696 #### policies.json
697 ```
698 {
699 "policies": {
700 "DisableFeedbackCommands": true | false
701 }
702 }
703 ```
704 ### DisableFirefoxScreenshots
705 Remove access to Firefox Screenshots.
706
707 **Compatibility:** Firefox 60, Firefox ESR 60\
708 **CCK2 Equivalent:** N/A\
709 **Preferences Affected:** `extensions.screenshots.disabled`
710
711 #### Windows (GPO)
712 ```
713 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
714 ```
715 #### macOS
716 ```
717 <dict>
718 <key>DisableFirefoxScreenshots</key>
719 <true/> | <false/>
720 </dict>
721 ```
722 #### policies.json
723 ```
724 {
725 "policies": {
726 "DisableFirefoxScreenshots": true | false
727 }
728 }
729 ```
730 ### DisableFirefoxAccounts
731 Disable Firefox Accounts integration (Sync).
732
733 **Compatibility:** Firefox 60, Firefox ESR 60\
734 **CCK2 Equivalent:** `disableSync`\
735 **Preferences Affected:** `identity.fxaccounts.enabled`
736
737 #### Windows (GPO)
738 ```
739 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
740 ```
741 #### macOS
742 ```
743 <dict>
744 <key>DisableFirefoxAccounts</key>
745 <true/> | <false/>
746 </dict>
747 ```
748 #### policies.json
749 ```
750 {
751 "policies": {
752 "DisableFirefoxAccounts": true | false
753 }
754 }
755 ```
756 ### DisableFirefoxStudies
757 Disable Firefox studies (Shield).
758
759 **Compatibility:** Firefox 60, Firefox ESR 60\
760 **CCK2 Equivalent:** `disableForget`\
761 **Preferences Affected:** N/A
762
763 #### Windows (GPO)
764 ```
765 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
766 ```
767 #### macOS
768 ```
769 <dict>
770 <key>DisableFirefoxStudies</key>
771 <true/> | <false/>
772 </dict>
773 ```
774 #### policies.json
775 ```
776 {
777 "policies": {
778 "DisableFirefoxStudies": true | false
779 }
780 }
781 ```
782 ### DisableForgetButton
783 Disable the "Forget" button.
784
785 **Compatibility:** Firefox 60, Firefox ESR 60\
786 **CCK2 Equivalent:** `disableForget`\
787 **Preferences Affected:** N/A
788
789 #### Windows (GPO)
790 ```
791 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
792 ```
793 #### macOS
794 ```
795 <dict>
796 <key>DisableForgetButton</key>
797 <true/> | <false/>
798 </dict>
799 ```
800 #### policies.json
801 ```
802 {
803 "policies": {
804 "DisableForgetButton": true | false
805 }
806 }
807 ```
808 ### DisableFormHistory
809 Turn off saving information on web forms and the search bar.
810
811 **Compatibility:** Firefox 60, Firefox ESR 60\
812 **CCK2 Equivalent:** `disableFormFill`\
813 **Preferences Affected:** ` browser.formfill.enable`
814
815 #### Windows (GPO)
816 ```
817 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
818 ```
819 #### macOS
820 ```
821 <dict>
822 <key>DisableFormHistory</key>
823 <true/> | <false/>
824 </dict>
825 ```
826 #### policies.json
827 ```
828 {
829 "policies": {
830 "DisableFormHistory": true | false
831 }
832 }
833 ```
834 ### DisablePocket
835 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
836
837 **Compatibility:** Firefox 60, Firefox ESR 60\
838 **CCK2 Equivalent:** `disablePocket`\
839 **Preferences Affected:** `extensions.pocket.enabled`
840
841 #### Windows (GPO)
842 ```
843 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
844 ```
845 #### macOS
846 ```
847 <dict>
848 <key>DisablePocket</key>
849 <true/> | <false/>
850 </dict>
851 ```
852 #### policies.json
853 ```
854 {
855 "policies": {
856 "DisablePocket": true | false
857 }
858 }
859 ```
860 ### DisablePrivateBrowsing
861 Remove access to private browsing.
862
863 **Compatibility:** Firefox 60, Firefox ESR 60\
864 **CCK2 Equivalent:** `disablePrivateBrowsing`\
865 **Preferences Affected:** N/A
866
867 #### Windows (GPO)
868 ```
869 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
870 ```
871 #### macOS
872 ```
873 <dict>
874 <key>DisablePrivateBrowsing</key>
875 <true/> | <false/>
876 </dict>
877 ```
878 #### policies.json
879 ```
880 {
881 "policies": {
882 "DisablePrivateBrowsing": true | false
883 }
884 }
885 ```
886 ### DisableProfileImport
887 Disables the "Import data from another browser" option in the bookmarks window.
888
889 **Compatibility:** Firefox 60, Firefox ESR 60\
890 **CCK2 Equivalent:** N/A\
891 **Preferences Affected:** N/A
892
893 #### Windows (GPO)
894 ```
895 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
896 ```
897 #### macOS
898 ```
899 <dict>
900 <key>DisableProfileImport</key>
901 <true/> | <false/>
902 </dict>
903 ```
904 #### policies.json
905 ```
906 {
907 "policies": {
908 "DisableProfileImport": true | false
909 }
910 }
911 ```
912 ### DisableProfileRefresh
913 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
914
915 **Compatibility:** Firefox 60, Firefox ESR 60\
916 **CCK2 Equivalent:** `disableResetFirefox`\
917 **Preferences Affected:** `browser.disableResetPrompt`
918
919 #### Windows (GPO)
920 ```
921 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
922 ```
923 #### macOS
924 ```
925 <dict>
926 <key>DisableProfileRefresh</key>
927 <true/> | <false/>
928 </dict>
929 ```
930 #### policies.json
931 ```
932 {
933 "policies": {
934 "DisableProfileRefresh": true | false
935 }
936 }
937 ```
938 ### DisableSafeMode
939 Disable safe mode within the browser.
940
941 On Windows, this disables safe mode via the command line as well.
942
943 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
944 **CCK2 Equivalent:** `disableSafeMode`\
945 **Preferences Affected:** N/A
946
947 #### Windows (GPO)
948 ```
949 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
950 ```
951 #### macOS
952 ```
953 <dict>
954 <key>DisableSafeMode</key>
955 <true/> | <false/>
956 </dict>
957 ```
958 #### policies.json
959 ```
960 {
961 "policies": {
962 "DisableSafeMode": true | false
963 }
964 }
965 ```
966 ### DisableSecurityBypass
967 Prevent the user from bypassing security in certain cases.
968
969 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
970
971 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
972
973 **Compatibility:** Firefox 60, Firefox ESR 60\
974 **CCK2 Equivalent:** N/A\
975 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
976
977 #### Windows (GPO)
978 ```
979 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
980 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
981 ```
982 #### macOS
983 ```
984 <dict>
985 <key>DisableSecurityBypass</key>
986 <dict>
987 <key>InvalidCertificate</key>
988 <true/> | <false/>
989 <key><SafeBrowsing/key>
990 <true/> | <false/>
991 </dict>
992 </dict>
993 ```
994 #### policies.json
995 ```
996 {
997 "policies": {
998 "DisableSecurityBypass": {
999 "InvalidCertificate": true false,
1000 "SafeBrowsing": true false
1001 }
1002 }
1003 }
1004 ```
1005 ### DisableSystemAddonUpdate
1006 Prevent system add-ons from being installed or update.
1007
1008 **Compatibility:** Firefox 60, Firefox ESR 60\
1009 **CCK2 Equivalent:** N/A\
1010 **Preferences Affected:** N/A
1011
1012 #### Windows (GPO)
1013 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1014 ```
1015 #### macOS
1016 ```
1017 <dict>
1018 <key>DisableSystemAddonUpdate</key>
1019 <true/> | <false/>
1020 </dict>
1021 ```
1022 #### policies.json
1023 ```
1024 {
1025 "policies": {
1026 "DisableSystemAddonUpdate": true | false
1027 }
1028 }
1029 ```
1030 ### DisableTelemetry
1031 Prevent the upload of telemetry data.
1032
1033 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1034
1035 **Compatibility:** Firefox 60, Firefox ESR 60\
1036 **CCK2 Equivalent:** `disableTelemetry`\
1037 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1038
1039 #### Windows (GPO)
1040 ```
1041 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1042 ```
1043 #### macOS
1044 ```
1045 <dict>
1046 <key>DisableTelemetry</key>
1047 <true/> | <false/>
1048 </dict>
1049 ```
1050 #### policies.json
1051 ```
1052 {
1053 "policies": {
1054 "DisableTelemetry": true | false
1055 }
1056 }
1057 ```
1058 ### DisplayBookmarksToolbar
1059 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1060
1061 **Compatibility:** Firefox 60, Firefox ESR 60\
1062 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1063 **Preferences Affected:** N/A
1064
1065 #### Windows (GPO)
1066 ```
1067 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1068 ```
1069 #### macOS
1070 ```
1071 <dict>
1072 <key>DisplayBookmarksToolbar</key>
1073 <true/> | <false/>
1074 </dict>
1075 ```
1076 #### policies.json
1077 ```
1078 {
1079 "policies": {
1080 "DisplayBookmarksToolbar": true | false
1081 }
1082 }
1083 ```
1084 ### DisplayMenuBar
1085 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1086
1087 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1088 **CCK2 Equivalent:** `displayMenuBar`\
1089 **Preferences Affected:** N/A
1090
1091 #### Windows (GPO)
1092 ```
1093 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1094 ```
1095 #### macOS
1096 ```
1097 <dict>
1098 <key>DisplayMenuBar</key>
1099 <true/> | <false/>
1100 </dict>
1101 ```
1102 #### policies.json
1103 ```
1104 {
1105 "policies": {
1106 "DisplayMenuBar": true | false
1107 }
1108 }
1109 ```
1110 ### DNSOverHTTPS
1111 Configure DNS over HTTPS.
1112
1113 `Enabled` determines whether DNS over HTTPS is enabled
1114
1115 `ProviderURL` is a URL to another provider.
1116
1117 `Locked` prevents the user from changing DNS over HTTPS preferences.
1118
1119 **Compatibility:** Firefox 63, Firefox ESR 68\
1120 **CCK2 Equivalent:** N/A\
1121 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1122
1123 #### Windows (GPO)
1124 ```
1125 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1126 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1127 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DNSOverHTTPS</key>
1133 <dict>
1134 <key>Enabled</key>
1135 <true/> | <false/>
1136 <key>ProviderURL</key>
1137 <string>URL_TO_ALTERNATE_PROVIDER</string>
1138 <key>Locked</key>
1139 <true/> | <false/>
1140 </dict>
1141 </dict>
1142 ```
1143 #### policies.json
1144 ```
1145 {
1146 "policies": {
1147 "DNSOverHTTPS": {
1148 "Enabled": true | false,
1149 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1150 "Locked": true | false
1151 }
1152 }
1153 }
1154 ```
1155 ### DontCheckDefaultBrowser
1156 Don't check if Firefox is the default browser at startup.
1157
1158 **Compatibility:** Firefox 60, Firefox ESR 60\
1159 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1160 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1161
1162 #### Windows (GPO)
1163 ```
1164 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1165 ```
1166 #### macOS
1167 ```
1168 <dict>
1169 <key>DontCheckDefaultBrowser</key>
1170 <true/> | <false/>
1171 </dict>
1172 ```
1173 #### policies.json
1174 ```
1175 {
1176 "policies": {
1177 "DontCheckDefaultBrowser": true | false
1178 }
1179 }
1180 ```
1181 ### DefaultDownloadDirectory
1182 Set the default download directory.
1183
1184 You can use ${home} for the native home directory.
1185
1186 **Compatibility:** Firefox 68, Firefox ESR 68\
1187 **CCK2 Equivalent:** N/A\
1188 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1189
1190 #### Windows (GPO)
1191 ```
1192 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1193 ```
1194 #### macOS
1195 ```
1196 <dict>
1197 <key>DefaultDownloadDirectory</key>
1198 <string>${home}/Downloads</string>
1199 </dict>
1200 ```
1201 #### policies.json (macOS and Linux)
1202 ```
1203 {
1204 "policies": {
1205 "DefaultDownloadDirectory": "${home}/Downloads"
1206 }
1207 ```
1208 #### policies.json (Windows)
1209 ```
1210 {
1211 "policies": {
1212 "DefaultDownloadDirectory": "${home}\\Downloads"
1213 }
1214 ```
1215 ### DownloadDirectory
1216 Set and lock the download directory.
1217
1218 You can use ${home} for the native home directory.
1219
1220 **Compatibility:** Firefox 68, Firefox ESR 68\
1221 **CCK2 Equivalent:** N/A\
1222 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1223
1224 #### Windows (GPO)
1225 ```
1226 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1227 ```
1228 #### macOS
1229 ```
1230 <dict>
1231 <key>DownloadDirectory</key>
1232 <string>${home}/Downloads</string>
1233 </dict>
1234 ```
1235 #### policies.json (macOS and Linux)
1236 ```
1237 {
1238 "policies": {
1239 "DownloadDirectory": "${home}/Downloads"
1240 }
1241 ```
1242 #### policies.json (Windows)
1243 ```
1244 {
1245 "policies": {
1246 "DownloadDirectory": "${home}\\Downloads"
1247 }
1248 ```
1249 ### EnableTrackingProtection
1250 Configure tracking protection.
1251
1252 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1253
1254 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1255
1256 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1257
1258 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1259
1260 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1261
1262 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2)\
1263 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1264 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1265
1266 #### Windows (GPO)
1267 ```
1268 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1269 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1270 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1271 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1272 ```
1273 #### macOS
1274 ```
1275 <dict>
1276 <key>EnableTrackingProtection</key>
1277 <dict>
1278 <key>Value</key>
1279 <true/> | <false/>
1280 <key><Locked/key>
1281 <true/> | <false/>
1282 <key><Cryptomining/key>
1283 <true/> | <false/>
1284 <key><Fingerprinting/key>
1285 <true/> | <false/>
1286 </dict>
1287 </dict>
1288 ```
1289 #### policies.json
1290 ```
1291 {
1292 "policies": {
1293 "EnableTrackingProtection": {
1294 "Value": [true, false],
1295 "Locked": [true, false],
1296 "Cryptomining": [true, false],
1297 "Fingerprinting": [true, false]
1298 }
1299 }
1300 ```
1301 ### EnterprisePoliciesEnabled
1302 Enable policy support on macOS.
1303
1304 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1305 **CCK2 Equivalent:** N/A\
1306 **Preferences Affected:** N/A
1307
1308 #### macOS
1309 ```
1310 <dict>
1311 <key>EnterprisePoliciesEnabled</key>
1312 <true/>
1313 </dict>
1314 ```
1315 ### Extensions
1316 Control the installation, uninstallation and locking of extensions.
1317
1318 `Install` is a list of URLs or native paths for extensions to be installed.
1319
1320 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1321
1322 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1323
1324 **Compatibility:** Firefox 60, Firefox ESR 60\
1325 **CCK2 Equivalent:** `addons`\
1326 **Preferences Affected:** N/A
1327
1328 #### Windows (GPO)
1329 ```
1330 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1331 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1332 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1333 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1334 ```
1335 #### macOS
1336 ```
1337 <dict>
1338 <key>Extensions</key>
1339 <dict>
1340 <key>Install</key>
1341 <array>
1342 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1343 <string>//path/to/xpi</string>
1344 </array>
1345 <key>Uninstall</key>
1346 <array>
1347 <string>bad_addon_id@mozilla.org</string>
1348 </array>
1349 <key>Locked</key>
1350 <array>
1351 <string>addon_id@mozilla.org</string>
1352 </array>
1353 </dict>
1354 </dict>
1355 ```
1356 #### policies.json
1357 ```
1358 {
1359 "policies": {
1360 "Extensions": {
1361 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1362 "Uninstall": ["bad_addon_id@mozilla.org"],
1363 "Locked": ["addon_id@mozilla.org"]
1364 }
1365 }
1366 }
1367 ```
1368 ### ExtensionSettings
1369 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1370
1371 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1372
1373 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1374
1375 The configuration for each extension is another dictionary that can contain the fields documented below.
1376
1377 | Name | Description |
1378 | --- | --- |
1379 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1380 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1381 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1382 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1383 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1384 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1385 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1386 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1387 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1388
1389 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1390 **CCK2 Equivalent:** N/A\
1391 **Preferences Affected:** N/A
1392
1393 #### Windows (GPO)
1394 ```
1395 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1396 {
1397 "*": {
1398 "blocked_install_message": "Custom error message.",
1399 "install_sources": ["https://addons.mozilla.org/"],
1400 "installation_mode": "blocked"
1401 },
1402 "uBlock0@raymondhill.net": {
1403 "installation_mode": "force_installed",
1404 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1405 }
1406 }
1407 ```
1408 #### macOS
1409 ```
1410 <dict>
1411 <key>ExtensionSettings</key>
1412 <dict>
1413 <key>*</key>
1414 <dict>
1415 <key>blocked_install_message</key>
1416 <string>Custom error message.</string>
1417 <key>install_sources</key>
1418 <array>
1419 <string>https://addons.mozilla.org/</string>
1420 </array>
1421 <key>installation_mode</key>
1422 <string>blocked</string>
1423 </dict>
1424 <key>uBlock0@raymondhill.net</key>
1425 <dict>
1426 <key>installation_mode</key>
1427 <string>force_installed</string>
1428 <key>install_url</key>
1429 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1430 </dict>
1431 </dict>
1432 </dict>
1433 ```
1434 #### policies.json
1435 ```
1436 {
1437 "policies": {
1438 "ExtensionSettings": {
1439 "*": {
1440 "blocked_install_message": "Custom error message.",
1441 "install_sources": ["https://addons.mozilla.org/"],
1442 "installation_mode": "blocked"
1443 },
1444 "uBlock0@raymondhill.net": {
1445 "installation_mode": "force_installed",
1446 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1447 }
1448 }
1449 }
1450 }
1451 ```
1452 ### ExtensionUpdate
1453 Control extension updates.
1454
1455 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1456 **CCK2 Equivalent:** N/A\
1457 **Preferences Affected:** `extensions.update.enabled`
1458
1459 #### Windows (GPO)
1460 ```
1461 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1462 ```
1463 #### macOS
1464 ```
1465 <dict>
1466 <key>ExtensionUpdate</key>
1467 <true/> | <false/>
1468 </dict>
1469 ```
1470 #### policies.json
1471 ```
1472 {
1473 "policies": {
1474 "ExtensionUpdate": true | false
1475 }
1476 }
1477 ```
1478 ### FlashPlugin
1479 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1480
1481 `Allow` is a list of origins where Flash are allowed.
1482
1483 `Block` is a list of origins where Flash is not allowed.
1484
1485 `Default` determines whether or not Flash is allowed by default.
1486
1487 `Locked` prevents the user from changing Flash preferences.
1488
1489 **Compatibility:** Firefox 60, Firefox ESR 60\
1490 **CCK2 Equivalent:** `permissions.plugin`\
1491 **Preferences Affected:** `plugin.state.flash`
1492
1493 #### Windows (GPO)
1494 ```
1495 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1496 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1497 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1498 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1499 ```
1500 #### macOS
1501 ```
1502 <dict>
1503 <key>FlashPlugin</key>
1504 <dict>
1505 <key>Allow</key>
1506 <array>
1507 <string>http://example.org</string>
1508 </array>
1509 <key>Block</key>
1510 <array>
1511 <string>http://example.edu</string>
1512 </array>
1513 <key>Default</key>
1514 <true/> | <false/>
1515 <key>Locked</key>
1516 <true/> | <false/>
1517 </dict>
1518 </dict>
1519 ```
1520 #### policies.json
1521 ```
1522 {
1523 "policies": {
1524 "FlashPlugin": {
1525 "Allow": ["http://example.org/"],
1526 "Block": ["http://example.edu/"],
1527 "Default": true | false,
1528 "Locked": true | false
1529 }
1530 }
1531 }
1532 ```
1533 ### FirefoxHome
1534 Customize the Firefox Home page.
1535
1536 **Compatibility:** Firefox 68, Firefox ESR 68\
1537 **CCK2 Equivalent:** N/A\
1538 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1539
1540 #### Windows (GPO)
1541 ```
1542 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1543 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1544 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1545 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1546 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1547 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1548 ```
1549 #### macOS
1550 ```
1551 <dict>
1552 <key>FirefoxHome</key>
1553 <dict>
1554 <key>Search</key>
1555 <true/> | <false/>
1556 <key>TopSites</key>
1557 <true/> | <false/>
1558 <key>Highlights</key>
1559 <true/> | <false/>
1560 <key>Pocket</key>
1561 <true/> | <false/>
1562 <key>Snippets</key>
1563 <true/> | <false/>
1564 <key>Locked</key>
1565 <true/> | <false/>
1566 </dict>
1567 </dict>
1568 ```
1569 #### policies.json
1570 ```
1571 {
1572 "policies": {
1573 "FirefoxHome": {
1574 "Search": true | false,
1575 "TopSites": true | false,
1576 "Highlights": true | false,
1577 "Pocket": true | false,
1578 "Snippets": true | false,
1579 "Locked": true | false
1580 }
1581 }
1582 }
1583 ```
1584 ### HardwareAcceleration
1585 Control hardware acceleration.
1586
1587 **Compatibility:** Firefox 60, Firefox ESR 60\
1588 **CCK2 Equivalent:** N/A\
1589 **Preferences Affected:** `layers.acceleration.disabled`
1590
1591 #### Windows (GPO)
1592 ```
1593 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1594 ```
1595 #### macOS
1596 ```
1597 <dict>
1598 <key>HardwareAcceleration</key>
1599 <true/> | <false/>
1600 </dict>
1601 ```
1602 #### policies.json
1603 ```
1604 {
1605 "policies": {
1606 "HardwareAcceleration": true | false
1607 }
1608 }
1609 ```
1610 ### Homepage
1611 Configure the default homepage and how Firefox starts.
1612
1613 `URL` is the default homepage.
1614
1615 `Locked` prevents the user from changing homepage preferences.
1616
1617 `Additional` allows for more than one homepage.
1618
1619 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1620
1621 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1622 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1623 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1624
1625 #### Windows (GPO)
1626 ```
1627 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1628 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1629 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1630 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1631 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1632 ```
1633 #### macOS
1634 ```
1635 <dict>
1636 <key>Homepage</key>
1637 <dict>
1638 <key>URL</key>
1639 <string>http://example.com</string>
1640 <key>Locked</key>
1641 <true/> | <false/>
1642 <key>Additional</key>
1643 <array>
1644 <string>http://example.org</string>
1645 <string>http://example.edu</string>
1646 </array>
1647 <key>StartPage</key>
1648 <string>always | never | from-visited</string>
1649 </dict>
1650 </dict>
1651 ```
1652 #### policies.json
1653 ```
1654 {
1655 "policies": {
1656 "Homepage": {
1657 "URL": "http://example.com/",
1658 "Locked": true | false,
1659 "Additional": ["http://example.org/",
1660 "http://example.edu/"],
1661 "StartPage": "none" | "homepage" | "previous-session"
1662 }
1663 }
1664 }
1665 ```
1666 ### InstallAddonsPermission
1667 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1668
1669 `Allow` is a list of origins where extension installs are allowed.
1670
1671 `Default` determines whether or not extension installs are allowed by default.
1672
1673 **Compatibility:** Firefox 60, Firefox ESR 60\
1674 **CCK2 Equivalent:** `permissions.install`\
1675 **Preferences Affected:** `xpinstall.enabled`
1676
1677 #### Windows (GPO)
1678 ```
1679 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1680 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1681 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1682 ```
1683 #### macOS
1684 ```
1685 <dict>
1686 <key>InstallAddonsPermission</key>
1687 <dict>
1688 <key>Allow</key>
1689 <array>
1690 <string>http://example.org</string>
1691 <string>http://example.edu</string>
1692 </array>
1693 <key>Default</key>
1694 <true/> | <false/>
1695 </dict>
1696 </dict>
1697 ```
1698 #### policies.json
1699 ```
1700 {
1701 "policies": {
1702 "InstallAddonsPermission": {
1703 "Allow": ["http://example.org/",
1704 "http://example.edu/"],
1705 "Default": true | false
1706 }
1707 }
1708 }
1709 ```
1710 ### LegacyProfiles
1711 Disable the feature enforcing a separate profile for each installation.
1712
1713 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1714
1715 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1716
1717 This policy only work on Windows via GPO (not policies.json).
1718
1719 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1720 **CCK2 Equivalent:** N/A\
1721 **Preferences Affected:** N/A
1722
1723 #### Windows (GPO)
1724 ```
1725 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1726 ```
1727 ### LocalFileLinks
1728 Enable linking to local files by origin.
1729
1730 **Compatibility:** Firefox 68, Firefox ESR 68\
1731 **CCK2 Equivalent:** N/A\
1732 **Preferences Affected:** `capability.policy.localfilelinks.*`
1733
1734 #### Windows (GPO)
1735 ```
1736 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1737 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1738 ```
1739 #### macOS
1740 ```
1741 <dict>
1742 <key>LocalFileLinks</key>
1743 <array>
1744 <string>http://example.org</string>
1745 <string>http://example.edu</string>
1746 </array>
1747 </dict>
1748 ```
1749 #### policies.json
1750 ```
1751 {
1752 "policies": {
1753 "LocalFileLinks": ["http://example.org/",
1754 "http://example.edu/"]
1755 }
1756 }
1757 ```
1758 ### NoDefaultBookmarks
1759 Disable the creation of default bookmarks.
1760
1761 This policy is only effective if the user profile has not been created yet.
1762
1763 **Compatibility:** Firefox 60, Firefox ESR 60\
1764 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1765 **Preferences Affected:** N/A
1766
1767 #### Windows (GPO)
1768 ```
1769 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1770 ```
1771 #### macOS
1772 ```
1773 <dict>
1774 <key>NoDefaultBookmarks</key>
1775 <true/> | <false/>
1776 </dict>
1777 ```
1778 #### policies.json
1779 ```
1780 {
1781 "policies": {
1782 "NoDefaultBookmarks": true | false
1783 }
1784 }
1785 ```
1786 ### NetworkPrediction
1787 Enable or disable network prediction (DNS prefetching).
1788
1789 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1790 **CCK2 Equivalent:** N/A\
1791 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1792
1793 #### Windows (GPO)
1794 ```
1795 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1796 ```
1797 #### macOS
1798 ```
1799 <dict>
1800 <key>NetworkPrediction</key>
1801 <true/> | <false/>
1802 </dict>
1803 ```
1804 #### policies.json
1805 ```
1806 {
1807 "policies": {
1808 "NetworkPrediction": true | false
1809 }
1810 ```
1811 ### NewTabPage
1812 Enable or disable the New Tab page.
1813
1814 **Compatibility:** Firefox 68, Firefox ESR 68\
1815 **CCK2 Equivalent:** N/A\
1816 **Preferences Affected:** `browser.newtabpage.enabled`
1817
1818 #### Windows (GPO)
1819 ```
1820 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1821 ```
1822 #### macOS
1823 ```
1824 <dict>
1825 <key>NewTabPage</key>
1826 <true/> | <false/>
1827 </dict>
1828 ```
1829 #### policies.json
1830 ```
1831 {
1832 "policies": {
1833 "NewTabPage": true | false
1834 }
1835 ```
1836 ### OfferToSaveLogins
1837 Control whether or not Firefox offers to save passwords.
1838
1839 **Compatibility:** Firefox 60, Firefox ESR 60\
1840 **CCK2 Equivalent:** `dontRememberPasswords`\
1841 **Preferences Affected:** `signon.rememberSignons`
1842
1843 #### Windows (GPO)
1844 ```
1845 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1846 ```
1847 #### macOS
1848 ```
1849 <dict>
1850 <key>OfferToSaveLogins</key>
1851 <true/> | <false/>
1852 </dict>
1853 ```
1854 #### policies.json
1855 ```
1856 {
1857 "policies": {
1858 "OfferToSaveLogins": true | false
1859 }
1860 }
1861 ```
1862 ### OfferToSaveLoginsDefault
1863 Sets the default value of signon.rememberSignons without locking it.
1864
1865 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1866 **CCK2 Equivalent:** `dontRememberPasswords`\
1867 **Preferences Affected:** `signon.rememberSignons`
1868
1869 #### Windows (GPO)
1870 ```
1871 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1872 ```
1873 #### macOS
1874 ```
1875 <dict>
1876 <key>OfferToSaveLoginsDefault</key>
1877 <true/> | <false/>
1878 </dict>
1879 ```
1880 #### policies.json
1881 ```
1882 {
1883 "policies": {
1884 "OfferToSaveLoginsDefault": true | false
1885 }
1886 }
1887 ```
1888 ### OverrideFirstRunPage
1889 Override the first run page. If the value is blank, no first run page is displayed.
1890
1891 **Compatibility:** Firefox 60, Firefox ESR 60\
1892 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1893 **Preferences Affected:** `startup.homepage_welcome_url`
1894
1895 #### Windows (GPO)
1896 ```
1897 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1898 ```
1899 #### macOS
1900 ```
1901 <dict>
1902 <key>OverrideFirstRunPage</key>
1903 <string>http://example.org</string>
1904 </dict>
1905 ```
1906 #### policies.json
1907 ```
1908 {
1909 "policies": {
1910 "OverrideFirstRunPage": "http://example.org"
1911 }
1912 ```
1913 ### OverridePostUpdatePage
1914 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1915
1916 **Compatibility:** Firefox 60, Firefox ESR 60\
1917 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1918 **Preferences Affected:** `startup.homepage_override_url`
1919
1920 #### Windows (GPO)
1921 ```
1922 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
1923 ```
1924 #### macOS
1925 ```
1926 <dict>
1927 <key>OverridePostUpdatePage</key>
1928 <string>http://example.org</string>
1929 </dict>
1930 ```
1931 #### policies.json
1932 ```
1933 {
1934 "policies": {
1935 "OverridePostUpdatePage": "http://example.org"
1936 }
1937 ```
1938 ### PasswordManagerEnabled
1939 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
1940
1941 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1942 **CCK2 Equivalent:** N/A\
1943 **Preferences Affected:** `prefs.privacy.disable_button.view_passwords`
1944
1945 #### Windows (GPO)
1946 ```
1947 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
1948 ```
1949 #### macOS
1950 ```
1951 <dict>
1952 <key>PasswordManagerEnabled</key>
1953 <true/> | <false/>
1954 </dict>
1955 ```
1956 #### policies.json
1957 ```
1958 {
1959 "policies": {
1960 "PasswordManagerEnabled": true | false
1961 }
1962 }
1963 ```
1964 ### Permissions
1965 Set permissions associated with camera, microphone, location, and notifications
1966
1967 `Allow` is a list of origins where the feature is allowed.
1968
1969 `Block` is a list of origins where the feature is not allowed.
1970
1971 `BlockNewRequests` determines whether or not new requests can be made for the feature.
1972
1973 `Locked` prevents the user from changing preferences for the feature.
1974
1975 **Compatibility:** Firefox 62, Firefox ESR 60.2\
1976 **CCK2 Equivalent:** N/A\
1977 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
1978
1979 #### Windows (GPO)
1980 ```
1981 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
1982 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
1983 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
1984 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
1985 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
1986 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
1987 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
1988 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
1989 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
1990 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
1991 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
1992 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
1993 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
1994 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
1995 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
1996 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
1997 ```
1998 #### macOS
1999 ```
2000 <dict>
2001 <key>Permissions</key>
2002 <dict>
2003 <key>Camera</key>
2004 <dict>
2005 <key>Allow</key>
2006 <array>
2007 <string>https://example.org</string>
2008 </array>
2009 <key>Block</key>
2010 <array>
2011 <string>https://example.edu</string>
2012 </array>
2013 <key>BlockNewRequests</key>
2014 <true/>
2015 <key>Locked</key>
2016 <true/>
2017 </dict>
2018 <key>Microphone</key>
2019 <dict>
2020 <key>Allow</key>
2021 <array>
2022 <string>https://example.org</string>
2023 </array>
2024 <key>Block</key>
2025 <array>
2026 <string>https://example.edu</string>
2027 </array>
2028 <key>BlockNewRequests</key>
2029 <true/>
2030 <key>Locked</key>
2031 <true/>
2032 </dict>
2033 <key>Location</key>
2034 <dict>
2035 <key>Allow</key>
2036 <array>
2037 <string>https://example.org</string>
2038 </array>
2039 <key>Block</key>
2040 <array>
2041 <string>https://example.edu</string>
2042 </array>
2043 <key>BlockNewRequests</key>
2044 <true/>
2045 <key>Locked</key>
2046 <true/>
2047 </dict>
2048 <key>Notifications</key>
2049 <dict>
2050 <key>Allow</key>
2051 <array>
2052 <string>https://example.org</string>
2053 </array>
2054 <key>Block</key>
2055 <array>
2056 <string>https://example.edu</string>
2057 </array>
2058 <key>BlockNewRequests</key>
2059 <true/>
2060 <key>Locked</key>
2061 <true/>
2062 </dict>
2063 </dict>
2064 </dict>
2065 ```
2066 #### policies.json
2067 ```
2068 {
2069 "policies": {
2070 "Permissions": {
2071 "Camera": {
2072 "Allow": ["https://example.org"],
2073 "Block": ["https://example.edu"],
2074 "BlockNewRequests": true | false,
2075 "Locked": true | false
2076 },
2077 "Microphone": {
2078 "Allow": ["https://example.org"],
2079 "Block": ["https://example.edu"],
2080 "BlockNewRequests": true | false,
2081 "Locked": true | false
2082 },
2083 "Location": {
2084 "Allow": ["https://example.org"],
2085 "Block": ["https://example.edu"],
2086 "BlockNewRequests": true | false,
2087 "Locked": true | false
2088 },
2089 "Notifications": {
2090 "Allow": ["https://example.org"],
2091 "Block": ["https://example.edu"],
2092 "BlockNewRequests": true | false,
2093 "Locked": true | false
2094 }
2095 }
2096 }
2097 }
2098 ```
2099 ### PopupBlocking
2100 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2101
2102 `Allow` is a list of origins where popup-windows are allowed.
2103
2104 `Default` determines whether or not pop-up windows are allowed by default.
2105
2106 `Locked` prevents the user from changing pop-up preferences.
2107
2108 **Compatibility:** Firefox 60, Firefox ESR 60\
2109 **CCK2 Equivalent:** `permissions.popup`\
2110 **Preferences Affected:** `dom.disable_open_during_load`
2111
2112 #### Windows (GPO)
2113 ```
2114 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2115 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2116 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2117 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2118 ```
2119 #### macOS
2120 ```
2121 <dict>
2122 <key>PopupBlocking</key>
2123 <dict>
2124 <key>Allow</key>
2125 <array>
2126 <string>http://example.org</string>
2127 <string>http://example.edu</string>
2128 </array>
2129 <key>Default</key>
2130 <true/> | <false/>
2131 <key>Locked</key>
2132 <true/> | <false/>
2133 </dict>
2134 </dict>
2135 ```
2136 #### policies.json
2137 ```
2138 {
2139 "policies": {
2140 "PopupBlocking": {
2141 "Allow": ["http://example.org/",
2142 "http://example.edu/"],
2143 "Default": true | false,
2144 "Locked": true | false
2145 }
2146 }
2147 }
2148 ```
2149 ### Preferences
2150 Set and lock certain preferences.
2151
2152 **Compatibility:** See below\
2153 **CCK2 Equivalent:** `preferences`\
2154 **Preferences Affected:** See below
2155
2156 | Preference | Type | Compatibility | Default
2157 | --- | --- | --- | ---
2158 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2159 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2160 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2161 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2162 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2163 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2164 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2165 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2166 | browser.bookmarks.restore_default_bookmarks | string | Firefox 70, Firefox ESR 68.2 | N/A
2167 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2168 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2169 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2170 | browser.cache.disk.parent_directory | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2171 | &nbsp;&nbsp;&nbsp;&nbsp;If set, changes the location of the disk cache.
2172 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2173 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2174 | browser.places.importBookmarksHTML | string | Firefox 70, Firefox ESR 68.2
2175 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2176 | browser.safebrowsing.phishing.enabled | string | Firefox 70, Firefox ESR 68.2 | true
2177 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2178 | browser.safebrowsing.malware.enabled | string | Firefox 70, Firefox ESR 68.2 | true
2179 | &nbsp;&nbsp;&nbsp;&nbsp;IF false, malware protection is not enabled (Not recommended)
2180 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2181 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2182 | browser.slowStartup.notificationDisabled | string | Firefox 70, Firefox ESR 68.2 | false
2183 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2184 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2185 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2186 | browser.taskbar.previews.enable | string | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2187 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2188 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2189 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2190 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2191 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2192 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2193 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2194 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2195 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2196 | dom.allow_scripts_to_close_windows | string | Firefox 70, Firefox ESR 68.2 | false
2197 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2198 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2199 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2200 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2201 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2202 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2203 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2204 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2205 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2206 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2207 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2208 | extensions.blocklist.enabled | string | Firefox 70, Firefox ESR 68.2 | true
2209 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2210 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2211 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2212 | geo.enabled | string | Firefox 70, Firefox ESR 68.2 | true
2213 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2214 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2215 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2216 | media.eme.enabled | string | Firefox 70, Firefox ESR 68.2 | true
2217 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2218 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2219 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2220 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2221 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2222 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2223 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2224 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2225 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2226 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2227 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2228 | print.save_print_settings | string | Firefox 70, Firefox ESR 68.2 | true
2229 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2230 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2231 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2232 | security.mixed_content.block_active_content | string | Firefox 70, Firefox ESR 68.2 | true
2233 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2234 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2235 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2236 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2237 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2238 #### Windows (GPO)
2239 ```
2240 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2241 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2242 ```
2243 #### macOS
2244 ```
2245 <dict>
2246 <key>Preferences</key>
2247 <dict>
2248 <key>boolean_preference_name</key>
2249 <true/> | <false/>
2250 <key>string_preference_name</key>
2251 <string>string_value</string>
2252 </dict>
2253 </dict>
2254 ```
2255 #### policies.json
2256 ```
2257 {
2258 "policies": {
2259 "Preferences": {
2260 "boolean_preference_name": true | false,
2261 "string_preference_name": "string_value"
2262 }
2263 }
2264 }
2265 ```
2266 ### PromptForDownloadLocation
2267 Ask where to save each file before downloading.
2268
2269 **Compatibility:** Firefox 68, Firefox ESR 68\
2270 **CCK2 Equivalent:** N/A
2271 **Preferences Affected:** `browser.download.useDownloadDir`
2272
2273 #### Windows (GPO)
2274 ```
2275 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2276 ```
2277 #### macOS
2278 ```
2279 <dict>
2280 <key>PromptForDownloadLocation</key>
2281 <true/> | <false/>
2282 </dict>
2283 ```
2284 #### policies.json
2285 ```
2286 {
2287 "policies": {
2288 "PromptForDownloadLocation": true | false
2289 }
2290 }
2291 ```
2292 ### Proxy
2293 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2294 To specify ports, append them to the hostnames with a colon (:).
2295
2296 `Mode` is the proxy method being used.
2297
2298 `Locked` is whether or not proxy settings can be changed.
2299
2300 `HTTPProxy` is the HTTP proxy server.
2301
2302 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2303
2304 `SSLProxy` is the SSL proxy server.
2305
2306 `FTPProxy` is the FTP proxy server.
2307
2308 `SOCKSProxy` is the SOCKS proxy server
2309
2310 `SOCKSVersion` is the SOCKS version (4 or 5)
2311
2312 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2313
2314 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2315
2316 `AutoLogin` means do not prompt for authentication if password is saved.
2317
2318 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2319
2320 **Compatibility:** Firefox 60, Firefox ESR 60\
2321 **CCK2 Equivalent:** `networkProxy*`\
2322 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2323
2324 #### Windows (GPO)
2325 ```
2326 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2327 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2328 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2329 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2330 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2331 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2332 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2333 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2334 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2335 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2336 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2337 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2338 ```
2339 #### macOS
2340 ```
2341 <dict>
2342 <key>Proxy</key>
2343 <dict>
2344 <key>Mode</key>
2345 <string>none | system | manual | autoDetect| autoConfig</string>
2346 <key>Locked</key>
2347 <true> | </false>
2348 <key>HTTPProxy</key>
2349 <string>https://httpproxy.example.com</string>
2350 <key>UseHTTPProxyForAllProtocols</key>
2351 <true> | </false>
2352 <key>SSLProxy</key>
2353 <string>https://sslproxy.example.com</string>
2354 <key>FTPProxy</key>
2355 <string>https://ftpproxy.example.com</string>
2356 <key>SOCKSProxy</key>
2357 <string>https://socksproxy.example.com</string>
2358 <key>SOCKSVersion</key>
2359 <string>4 | 5</string>
2360 <key>Passthrough</key>
2361 <string>&lt;local>&gt;</string>
2362 <key>AutoConfigURL</key>
2363 <string>URL_TO_AUTOCONFIG</string>
2364 <key>AutoLogin</key>
2365 <true> | </false>
2366 <key>UseProxyForDNS</key>
2367 <true> | </false>
2368 </dict>
2369 </dict>
2370 ```
2371 #### policies.json
2372 ```
2373 {
2374 "policies": {
2375 "Proxy": {
2376 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2377 "Locked": [true, false],
2378 "HTTPProxy": "hostname",
2379 "UseHTTPProxyForAllProtocols": [true, false],
2380 "SSLProxy": "hostname",
2381 "FTPProxy": "hostname",
2382 "SOCKSProxy": "hostname",
2383 "SOCKSVersion": 4 | 5
2384 "Passthrough": "<local>",
2385 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2386 "AutoLogin": [true, false],
2387 "UseProxyForDNS": [true, false]
2388 }
2389 }
2390 }
2391 ```
2392 ### RequestedLocales
2393 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2394
2395 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2396
2397 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2398 **CCK2 Equivalent:** N/A\
2399 **Preferences Affected:** N/A
2400 #### Windows (GPO)
2401 ```
2402 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2403 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2404
2405 or
2406
2407 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2408 ```
2409 #### macOS
2410 ```
2411 <dict>
2412 <key>RequestedLocales</key>
2413 <array>
2414 <string>de</string>
2415 <string>en-US</string>
2416 </array>
2417 </dict>
2418
2419 or
2420
2421 <dict>
2422 <key>RequestedLocales</key>
2423 <string>de,en-US</string>
2424 </dict>
2425
2426 ```
2427 #### policies.json
2428 ```
2429 {
2430 "policies": {
2431 "RequestedLocales": ["de", "en-US"]
2432 }
2433 }
2434
2435 or
2436
2437 {
2438 "policies": {
2439 "RequestedLocales": "de,en-US"
2440 }
2441 }
2442 ```
2443 ### SanitizeOnShutdown (Selective)
2444 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2445
2446 **Compatibility:** Firefox 68, Firefox ESR 68\
2447 **CCK2 Equivalent:** N/A\
2448 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2449 #### Windows (GPO)
2450 ```
2451 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2452 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2453 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2454 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2455 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2456 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2457 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2458 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2459 ```
2460 #### macOS
2461 ```
2462 <dict>
2463 <key>SanitizeOnShutdown</key>
2464 <dict>
2465 <key>Cache</key>
2466 <true/> | <false/>
2467 <key>Cookies</key>
2468 <true/> | <false/>
2469 <key>Downloads</key>
2470 <true/> | <false/>
2471 <key>FormData</key>
2472 <true/> | <false/>
2473 <key>History</key>
2474 <true/> | <false/>
2475 <key>Sessions</key>
2476 <true/> | <false/>
2477 <key>SiteSettings</key>
2478 <true/> | <false/>
2479 <key>OfflineApps</key>
2480 <true/> | <false/>
2481 </dict>
2482 </dict>
2483 ```
2484 #### policies.json
2485 ```
2486 {
2487 "policies": {
2488 "SanitizeOnShutdown": {
2489 "Cache": true | false,
2490 "Cookies": true | false,
2491 "Downloads": true | false,
2492 "FormData": true | false,
2493 "History": true | false,
2494 "Sessions": true | false,
2495 "SiteSettings": true | false,
2496 "OfflineApps": true | false
2497 }
2498 }
2499 }
2500 ```
2501 ### SanitizeOnShutdown (All)
2502 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2503
2504 **Compatibility:** Firefox 60, Firefox ESR 60\
2505 **CCK2 Equivalent:** N/A\
2506 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2507 #### Windows (GPO)
2508 ```
2509 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2510 ```
2511 #### macOS
2512 ```
2513 <dict>
2514 <key>SanitizeOnShutdown</key>
2515 <true/> | <false/>
2516 </dict>
2517 ```
2518 #### policies.json
2519 ```
2520 {
2521 "policies": {
2522 "SanitizeOnShutdown": true | false
2523 }
2524 }
2525 ```
2526 ### SearchBar
2527 Set whether or not search bar is displayed.
2528
2529 **Compatibility:** Firefox 60, Firefox ESR 60\
2530 **CCK2 Equivalent:** `showSearchBar`\
2531 **Preferences Affected:** N/A
2532
2533 #### Windows (GPO)
2534 ```
2535 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2536 ```
2537 #### macOS
2538 ```
2539 <dict>
2540 <key>SearchBar</key>
2541 <string>unified | separate</string>
2542 </dict>
2543 ```
2544
2545 #### policies.json
2546 ```
2547 {
2548 "policies": {
2549 "SearchBar": "unified" | "separate"
2550 }
2551 }
2552 ```
2553
2554
2555
2556
2557
2558 ### SearchEngines (This policy is only available on the ESR.)
2559
2560 ### SearchEngines | Default
2561
2562 Set the default search engine. This policy is only available on the ESR.
2563
2564 **Compatibility:** Firefox ESR 60\
2565 **CCK2 Equivalent:** `defaultSearchEngine`\
2566 **Preferences Affected:** N/A
2567
2568 #### Windows (GPO)
2569 ```
2570 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2571 ```
2572 #### macOS
2573 ```
2574 <dict>
2575 <key>SearchEngines</key>
2576 <dict>
2577 <key>Default</key>
2578 <string>NAME_OF_SEARCH_ENGINE</string>
2579 </dict>
2580 </dict>
2581 ```
2582 #### policies.json
2583 ```
2584 {
2585 "policies": {
2586 "SearchEngines": {
2587 "Default": "NAME_OF_SEARCH_ENGINE"
2588 }
2589 }
2590 }
2591 ```
2592 ### SearchEngines | PreventInstalls
2593
2594 Prevent installing search engines from webpages.
2595
2596 **Compatibility:** Firefox ESR 60\
2597 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2598 **Preferences Affected:** N/A
2599
2600 #### Windows (GPO)
2601 ```
2602 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2603 ```
2604 #### macOS
2605 ```
2606 <dict>
2607 <key>SearchEngines</key>
2608 <dict>
2609 <key>PreventInstalls</key>
2610 <true/> | <false/>
2611 </dict>
2612 </dict>
2613 ```
2614 #### policies.json
2615 ```
2616 {
2617 "policies": {
2618 "SearchEngines": {
2619 "PreventInstalls": true | false
2620 }
2621 }
2622 }
2623 ```
2624 ### SearchEngines | Remove
2625
2626 Hide built-in search engines. This policy is only available on the ESR.
2627
2628 **Compatibility:** Firefox ESR 60.2\
2629 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2630 **Preferences Affected:** N/A
2631
2632 #### Windows (GPO)
2633 ```
2634 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2635 ```
2636 #### macOS
2637 ```
2638 <dict>
2639 <key>SearchEngines</key>
2640 <dict>
2641 <key>Remove</key>
2642 <array>
2643 <string>NAME_OF_SEARCH_ENGINE</string>
2644 </array>
2645 </dict>
2646 </dict>
2647 ```
2648 #### policies.json
2649 ```
2650 {
2651 "policies": {
2652 "SearchEngines": {
2653 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2654 }
2655 }
2656 }
2657 ```
2658 ### SearchEngines | Add
2659
2660 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2661
2662 `Name` is the name of the search engine.
2663
2664 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2665
2666 `Method` is either GET or POST
2667
2668 `IconURL` is a URL for the icon to use.
2669
2670 `Alias` is a keyword to use for the engine.
2671
2672 `Description` is a description of the search engine.
2673
2674 `PostData` is the POST data as name value pairs separated by &.
2675
2676 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2677
2678 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2679 **CCK2 Equivalent:** `searchplugins`\
2680 **Preferences Affected:** N/A
2681
2682 #### Windows (GPO)
2683 ```
2684 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2685 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2686 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2687 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2688 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2689 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2690 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2691 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2692 ```
2693
2694 #### macOS
2695 ```
2696 <dict>
2697 <key>SearchEngines</key>
2698 <dict>
2699 <key>Add</key>
2700 <array>
2701 <dict>
2702 <key>Name</key>
2703 <string>Example1</string>
2704 <key>URLTemplate</key>
2705 <string>https://www.example.org/q={searchTerms}</string>
2706 <key>Method</key>
2707 <string>GET | POST </string>
2708 <key>IconURL</key>
2709 <string>https://www.example.org/favicon.ico</string>
2710 <key>Alias</key>
2711 <string>example</string>
2712 <key>Description</key>
2713 <string>Example Description</string>
2714 <key>SuggestURLTemplate</key>
2715 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2716 <key>PostData</key>
2717 <string>name=value&q={searchTerms}</string>
2718 </dict>
2719 <array>
2720 </dict>
2721 </dict>
2722 ```
2723 #### policies.json
2724 ```
2725 {
2726 "policies": {
2727 "SearchEngines": {
2728 "Add": [
2729 {
2730 "Name": "Example1",
2731 "URLTemplate": "https://www.example.org/q={searchTerms}",
2732 "Method": "GET" | "POST",
2733 "IconURL": "https://www.example.org/favicon.ico",
2734 "Alias": "example",
2735 "Description": "Description",
2736 "PostData": "name=value&q={searchTerms}",
2737 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2738 }
2739 ]
2740 }
2741 }
2742 }
2743 ```
2744 ### SearchSuggestEnabled
2745
2746 Enable search suggestions.
2747
2748 **Compatibility:** Firefox 68, Firefox ESR 68\
2749 **CCK2 Equivalent:** N/A\
2750 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2751
2752 #### Windows (GPO)
2753 ```
2754 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2755 ```
2756 #### macOS
2757 ```
2758 <dict>
2759 <key>SearchSuggestEnabled</key>
2760 <true/> | <false/>
2761 </dict>
2762 ```
2763 #### policies.json
2764 ```
2765 {
2766 "policies": {
2767 "SearchSuggestEnabled": true | false
2768 }
2769 }
2770 ```
2771 ### SecurityDevices
2772
2773 Install PKCS #11 modules.
2774
2775 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2776 **CCK2 Equivalent:** `certs.devices`\
2777 **Preferences Affected:** N/A
2778
2779 #### Windows (GPO)
2780 ```
2781 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2782 ```
2783 #### macOS
2784 ```
2785 <dict>
2786 <key>SecurityDevices</key>
2787 <dict>
2788 <key>NAME_OF_DEVICE</key>
2789 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2790 </dict>
2791 </dict>
2792 ```
2793
2794 #### policies.json
2795 ```
2796 {
2797 "policies": {
2798 "SecurityDevices": {
2799 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2800 }
2801 }
2802 }
2803 ```
2804 ### SSLVersionMax
2805
2806 Set and lock the maximum version of TLS.
2807
2808 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2809 **CCK2 Equivalent:** N/A\
2810 **Preferences Affected:** `security.tls.version.max`
2811
2812 #### Windows (GPO)
2813 ```
2814 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2815 ```
2816 #### macOS
2817 ```
2818 <dict>
2819 <key>SSLVersionMax</key>
2820 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2821 </dict>
2822 ```
2823
2824 #### policies.json
2825 ```
2826 {
2827 "policies": {
2828 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2829 }
2830 }
2831 ```
2832 ### SSLVersionMin
2833
2834 Set and lock the minimum version of TLS.
2835
2836 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2837 **CCK2 Equivalent:** N/A\
2838 **Preferences Affected:** `security.tls.version.min`
2839
2840 #### Windows (GPO)
2841 ```
2842 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2843 ```
2844 #### macOS
2845 ```
2846 <dict>
2847 <key>SSLVersionMin</key>
2848 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2849 </dict>
2850 ```
2851
2852 #### policies.json
2853 ```
2854 {
2855 "policies": {
2856 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2857 }
2858 }
2859 ```
2860 ### SupportMenu
2861 Add a menuitem to the help menu for specifying support information.
2862
2863 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2864 **CCK2 Equivalent:** helpMenu\
2865 **Preferences Affected:** N/A
2866
2867 #### Windows (GPO)
2868 ```
2869 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2870 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2871 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
2872 ```
2873 #### macOS
2874 ```
2875 <dict>
2876 <key>SupportMenu</key>
2877 <dict>
2878 <key>Title</key>
2879 <string>SupportMenu</string>
2880 <key>URL</key>
2881 <string>http://example.com/support</string>
2882 <key>AccessKey</key>
2883 <string>S</string>
2884 </dict>
2885 </dict>
2886 ```
2887 #### policies.json
2888 ```
2889 {
2890 "policies": {
2891 "SupportMenu": {
2892 "Title": "Support Menu",
2893 "URL": "http://example.com/support",
2894 "AccessKey": "S"
2895 }
2896 }
2897 }
2898 ```
2899 ### WebsiteFilter
2900 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2901
2902 **Compatibility:** Firefox 60, Firefox ESR 60\
2903 **CCK2 Equivalent:** N/A\
2904 **Preferences Affected:** N/A
2905
2906 #### Windows (GPO)
2907 ```
2908 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
2909 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
2910 ```
2911 #### macOS
2912 ```
2913 <dict>
2914 <key>WebsiteFilter</key>
2915 <dict>
2916 <key>Block</key>
2917 <array>
2918 <string><all_urls></string>
2919 </array>
2920 <key>Exceptions</key>
2921 <array>
2922 <string>http://example.org/*</string>
2923 </array>
2924 </dict>
2925
2926 </dict>
2927 ```
2928 #### policies.json
2929 ```
2930 {
2931 "policies": {
2932 "WebsiteFilter": {
2933 "Block": ["<all_urls>"],
2934 "Exceptions": ["http://example.org/*"]
2935 }
2936 }
2937 }
2938 ```

patrick-canterino.de