]> git.p6c8.net - policy-templates.git/blob - README.md
Merge pull request #566 from mozilla/AppAutoUpdate
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#AppAutoUpdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
11 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
27 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
28 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
29 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
30 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
31 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
32 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
33 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
34 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
37 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
38 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
39 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
40 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
41 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
42 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
43 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
44 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
45 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
46 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
47 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
48 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
49 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
50 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
51 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
52 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
53 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
54 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
55 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
56 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
57 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
58 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
59 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
60 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
61 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
62 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
63 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
64 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
65 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
66 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
67 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
68 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
69 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
70 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
71 | **[`Preferences`](#preferences)** | Set and lock some preferences.
72 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
73 | **[`Proxy`](#proxy)** | Configure proxy settings.
74 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
75 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
76 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
77 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
78 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
79 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
80 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
81 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
82 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
83 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
84 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
85 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
86 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
87 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
88 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
89 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
90
91 ### AppAutoUpdate
92
93 Enable or disable **automatic** application update.
94
95 If set to true, application updates are installed without user approval.
96
97 If set to false, application updates are downloaded but the user can choose when to install the update.
98
99 If you have disabled updates via DisableAppUpdate, this policy has no effect.
100
101 **Compatibility:** Firefox 75, Firefox ESR 68.7\
102 **CCK2 Equivalent:** N/A\
103 **Preferences Affected:** app.update.auto
104
105 #### Windows (GPO)
106 ```
107 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
108 ```
109 #### macOS
110 ```
111 <dict>
112 <key>AppAutoUpdate</key>
113 <true/> | <false/>
114 </dict>
115 ```
116 #### policies.json
117 ```
118 {
119 "policies": {
120 "AppAutoUpdate": true | false
121 }
122 }
123 ```
124 ### AppUpdateURL
125
126 Change the URL for application update.
127
128 **Compatibility:** Firefox 62, Firefox ESR 60.2\
129 **CCK2 Equivalent:** N/A\
130 **Preferences Affected:** `app.update.url`
131
132 #### Windows (GPO)
133 ```
134 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
135 ```
136 #### macOS
137 ```
138 <dict>
139 <key>AppUpdateURL</key>
140 <string>https://yoursite.com</string>
141 </dict>
142 ```
143 #### policies.json
144 ```
145 {
146 "policies": {
147 "AppUpdateURL": "https://yoursite.com"
148 }
149 }
150 ```
151 ### Authentication
152
153 Configure sites that support integrated authentication.
154
155 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
156
157 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
158 **CCK2 Equivalent:** N/A\
159 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
160
161 #### Windows (GPO)
162 ```
163 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
164 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
165 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
166 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
167 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
168 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
169 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
170 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
171 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
172 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
173 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
174 ```
175 #### macOS
176 ```
177 <dict>
178 <key>Authentication</key>
179 <dict>
180 <key>SPNEGO</key>
181 <array>
182 <string>mydomain.com</string>
183 <string>https://myotherdomain.com</string>
184 </array>
185 <key>Delegated</key>
186 <array>
187 <string>mydomain.com</string>
188 <string>https://myotherdomain.com</string>
189 </array>
190 <key>NTLM</key>
191 <array>
192 <string>mydomain.com</string>
193 <string>https://myotherdomain.com</string>
194 </array>
195 <key>AllowNonFQDN</key>
196 <dict>
197 <key>SPNEGO</key>
198 <true/> | <false/>
199 <key>NTLM</key>
200 <true/> | <false/>
201 </dict>
202 <key>AllowProxies</key>
203 <dict>
204 <key>SPNEGO</key>
205 <true/> | <false/>
206 <key>NTLM</key>
207 <true/> | <false/>
208 </dict>
209 <key>Locked</key>
210 <true/> | <false/>
211 </dict>
212 </dict>
213 ```
214 #### policies.json
215 ```
216 {
217 "policies": {
218 "Authentication": {
219 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
220 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
221 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
222 "AllowNonFQDN": {
223 "SPNEGO": true | false,
224 "NTLM": true | false
225 },
226 "AllowProxies": {
227 "SPNEGO": true | false,
228 "NTLM": true | false
229 },
230 "Locked": true | false
231 }
232 }
233 }
234 ```
235 ### BlockAboutAddons
236
237 Block access to the Add-ons Manager (about:addons).
238
239 **Compatibility:** Firefox 60, Firefox ESR 60\
240 **CCK2 Equivalent:** `disableAddonsManager`\
241 **Preferences Affected:** N/A
242
243 #### Windows (GPO)
244 ```
245 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
246 ```
247 #### macOS
248 ```
249 <dict>
250 <key>BlockAboutAddons</key>
251 <true/> | <false/>
252 </dict>
253 ```
254 #### policies.json
255 ```
256 {
257 "policies": {
258 "BlockAboutAddons": true | false
259 }
260 }
261 ```
262 ### BlockAboutConfig
263
264 Block access to about:config.
265
266 **Compatibility:** Firefox 60, Firefox ESR 60\
267 **CCK2 Equivalent:** `disableAboutConfig`\
268 **Preferences Affected:** N/A
269
270 #### Windows (GPO)
271 ```
272 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
273 ```
274 #### macOS
275 ```
276 <dict>
277 <key>BlockAboutConfig</key>
278 <true/> | <false/>
279 </dict>
280 ```
281 #### policies.json
282 ```
283 {
284 "policies": {
285 "BlockAboutConfig": true | false
286 }
287 }
288 ```
289 ### BlockAboutProfiles
290
291 Block access to About Profiles (about:profiles).
292
293 **Compatibility:** Firefox 60, Firefox ESR 60\
294 **CCK2 Equivalent:** `disableAboutProfiles`\
295 **Preferences Affected:** N/A
296
297 #### Windows (GPO)
298 ```
299 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
300 ```
301 #### macOS
302 ```
303 <dict>
304 <key>BlockAboutProfiles</key>
305 <true/> | <false/>
306 </dict>
307 ```
308 #### policies.json
309 ```
310 {
311 "policies": {
312 "BlockAboutProfiles": true | false
313 }
314 }
315 ```
316 ### BlockAboutSupport
317
318 Block access to Troubleshooting Information (about:support).
319
320 **Compatibility:** Firefox 60, Firefox ESR 60\
321 **CCK2 Equivalent:** `disableAboutSupport`\
322 **Preferences Affected:** N/A
323
324 #### Windows (GPO)
325 ```
326 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
327 ```
328 #### macOS
329 ```
330 <dict>
331 <key>BlockAboutSupport</key>
332 <true/> | <false/>
333 </dict>
334 ```
335 #### policies.json
336 ```
337 {
338 "policies": {
339 "BlockAboutSupport": true | false
340 }
341 }
342 ```
343 ### Bookmarks
344
345 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
346
347 **Compatibility:** Firefox 60, Firefox ESR 60\
348 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
349 **Preferences Affected:** N/A
350
351 #### Windows (GPO)
352 ```
353 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
354 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
355 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
356 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
357 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
358 ```
359 #### macOS
360 ```
361 <dict>
362 <key>Bookmarks</key>
363 <array>
364 <dict>
365 <key>Title</key>
366 <string>Example</string>
367 <key>URL</key>
368 <string>https://example.com</string>
369 <key>Favicon</key>
370 <string>https://example.com/favicon.ico</string>
371 <key>Placement</key>
372 <string>toolbar | menu</string>
373 <key>Folder</key>
374 <string>FolderName</string>
375 </dict>
376 </array>
377 </dict>
378 ```
379 #### policies.json
380 ```
381 {
382 "policies": {
383 "Bookmarks": [
384 {
385 "Title": "Example",
386 "URL": "https://example.com",
387 "Favicon": "https://example.com/favicon.ico",
388 "Placement": "toolbar" | "menu",
389 "Folder": "FolderName"
390 }
391 ]
392 }
393 }
394 ```
395 ### CaptivePortal
396 Enable or disable the detection of captive portals.
397
398 **Compatibility:** Firefox 67, Firefox ESR 60.7\
399 **CCK2 Equivalent:** N/A\
400 **Preferences Affected:** `network.captive-portal-service.enabled`
401
402 #### Windows (GPO)
403 ```
404 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
405 ```
406 #### macOS
407 ```
408 <dict>
409 <key>CaptivePortal</key>
410 <true/> | <false/>
411 </dict>
412 ```
413 #### policies.json
414 ```
415 {
416 "policies": {
417 "CaptivePortal": true | false
418 }
419 }
420 ```
421 ### Certificates
422
423 ### Certificates | ImportEnterpriseRoots
424
425 Trust certificates that have been added to the operating system certificate store by a user or administrator.
426
427 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
428
429 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
430 **CCK2 Equivalent:** N/A\
431 **Preferences Affected:** `security.enterprise_roots.enabled`
432
433 #### Windows (GPO)
434 ```
435 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
436 ```
437 #### macOS
438 ```
439 <dict>
440 <key>Certificates</key>
441 <dict>
442 <key>ImportEnterpriseRoots</key>
443 <true/> | <false/>
444 </dict>
445 </dict>
446 ```
447 #### policies.json
448 ```
449 {
450 "policies": {
451 "Certificates": {
452 "ImportEnterpriseRoots": true | false
453 }
454 }
455 }
456 ```
457 ### Certificates | Install
458
459 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
460
461 - Windows
462 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
463 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
464 - macOS
465 - /Library/Application Support/Mozilla/Certificates
466 - ~/Library/Application Support/Mozilla/Certificates
467 - Linux
468 - /usr/lib/mozilla/certificates
469 - /usr/lib64/mozilla/certificates
470 - ~/.mozilla/certificates
471
472 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
473
474 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
475
476 Certificates are installed using the trust string `CT,CT,`.
477
478 Binary (DER) and ASCII (PEM) certificates are both supported.
479
480 **Compatibility:** Firefox 64, Firefox ESR 64\
481 **CCK2 Equivalent:** `certs.ca`\
482 **Preferences Affected:** N/A
483
484 #### Windows (GPO)
485 ```
486 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
487 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
488 ```
489 #### macOS
490 ```
491 <dict>
492 <key>Certificates</key>
493 <dict>
494 <key>Install</key>
495 <array>
496 <string>cert1.der</string>
497 <string>/Users/username/cert2.pem</string>
498 </array>
499 </dict>
500 </dict>
501 ```
502 #### policies.json
503 ```
504 {
505 "policies": {
506 "Certificates": {
507 "Install": ["cert1.der", "/home/username/cert2.pem"]
508 }
509 }
510 }
511 ```
512 ### Cookies
513 Configure cookie preferences.
514
515 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
516
517 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
518
519 `Default` determines whether cookies are accepted at all.
520
521 `AcceptThirdParty` determines how third-party cookies are handled.
522
523 `ExpireAtSessionEnd` determines when cookies expire.
524
525 `RejectTracker` only rejects cookies for trackers.
526
527 `Locked` prevents the user from changing cookie preferences.
528
529 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
530 **CCK2 Equivalent:** N/A\
531 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
532
533 #### Windows (GPO)
534 ```
535 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
536 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
537 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
538 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
539 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
540 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
541 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
542 ```
543 #### macOS
544 ```
545 <dict>
546 <key>Cookies</key>
547 <dict>
548 <key>Allow</key>
549 <array>
550 <string>http://example.com</string>
551 </array>
552 <key>Block</key>
553 <array>
554 <string>http://example.org</string>
555 </array>
556 <key>Default</key>
557 <true/> | <false/>
558 <key>AcceptThirdParty</key>
559 <string>always | never | from-visited</string>
560 <key>ExpireAtSessionEnd</key>
561 <true/> | <false/>
562 <key>RejectTracker</key>
563 <true/> | <false/>
564 <key>Locked</key>
565 <true/> | <false/>
566 </dict>
567 </dict>
568 ```
569 #### policies.json
570 ```
571 {
572 "policies": {
573 "Cookies": {
574 "Allow": ["http://example.org/"],
575 "Block": ["http://example.edu/"],
576 "Default": true | false,
577 "AcceptThirdParty": "always" | "never" | "from-visited",
578 "ExpireAtSessionEnd": true | false,
579 "RejectTracker": true | false,
580 "Locked": true | false
581 }
582 }
583 }
584 ```
585 ### DisableSetDesktopBackground
586 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
587
588 **Compatibility:** Firefox 60, Firefox ESR 60\
589 **CCK2 Equivalent:** `removeSetDesktopBackground`\
590 **Preferences Affected:** N/A
591
592 #### Windows (GPO)
593 ```
594 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
595 ```
596
597 #### macOS
598 ```
599 <dict>
600 <key>DisableSetDesktopBackground</key>
601 <true/> | <false/>
602 </dict>
603 ```
604 #### policies.json
605 ```
606 {
607 "policies": {
608 "DisableSetDesktopBackground": true | false
609 }
610 }
611 ```
612 ### DisableMasterPasswordCreation
613 Remove the master password functionality.
614
615 **Compatibility:** Firefox 60, Firefox ESR 60\
616 **CCK2 Equivalent:** `noMasterPassword`\
617 **Preferences Affected:** N/A
618
619 #### Windows (GPO)
620 ```
621 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
622 ```
623
624 #### macOS
625 ```
626 <dict>
627 <key>DisableMasterPasswordCreation</key>
628 <true/> | <false/>
629 </dict>
630 ```
631 #### policies.json
632 ```
633 {
634 "policies": {
635 "DisableMasterPasswordCreation": true | false
636 }
637 }
638 ```
639 ### DisableAppUpdate
640 Turn off application updates.
641
642 **Compatibility:** Firefox 60, Firefox ESR 60\
643 **CCK2 Equivalent:** `disableFirefoxUpdates`\
644 **Preferences Affected:** N/A
645
646 #### Windows (GPO)
647 ```
648 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
649 ```
650 #### macOS
651 ```
652 <dict>
653 <key>DisableAppUpdate</key>
654 <true/> | <false/>
655 </dict>
656 ```
657 #### policies.json
658 ```
659 {
660 "policies": {
661 "DisableAppUpdate": true | false
662 }
663 }
664 ```
665 ### DisableBuiltinPDFViewer
666 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
667
668 **Compatibility:** Firefox 60, Firefox ESR 60\
669 **CCK2 Equivalent:** `disablePDFjs`\
670 **Preferences Affected:** `pdfjs.disabled`
671
672 #### Windows (GPO)
673 ```
674 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
675 ```
676
677 #### macOS
678 ```
679 <dict>
680 <key>DisableBuiltinPDFViewer</key>
681 <true/> | <false/>
682 </dict>
683 ```
684 #### policies.json
685 ```
686 {
687 "policies": {
688 "DisableBuiltinPDFViewer": true | false
689 }
690 }
691 ```
692 ### DisableDeveloperTools
693 Remove access to all developer tools.
694
695 **Compatibility:** Firefox 60, Firefox ESR 60\
696 **CCK2 Equivalent:** `removeDeveloperTools`\
697 **Preferences Affected:** `devtools.policy.disabled`
698
699 #### Windows (GPO)
700 ```
701 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
702 ```
703
704 #### macOS
705 ```
706 <dict>
707 <key>DisableDeveloperTools</key>
708 <true/> | <false/>
709 </dict>
710 ```
711 #### policies.json
712 ```
713 {
714 "policies": {
715 "DisableDeveloperTools": true | false
716 }
717 }
718 ```
719 ### DisableFeedbackCommands
720 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
721
722 **Compatibility:** Firefox 60, Firefox ESR 60\
723 **CCK2 Equivalent:** N/A\
724 **Preferences Affected:** N/A
725
726 #### Windows (GPO)
727 ```
728 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
729 ```
730 #### macOS
731 ```
732 <dict>
733 <key>DisableFeedbackCommands</key>
734 <true/> | <false/>
735 </dict>
736 ```
737 #### policies.json
738 ```
739 {
740 "policies": {
741 "DisableFeedbackCommands": true | false
742 }
743 }
744 ```
745 ### DisableFirefoxScreenshots
746 Remove access to Firefox Screenshots.
747
748 **Compatibility:** Firefox 60, Firefox ESR 60\
749 **CCK2 Equivalent:** N/A\
750 **Preferences Affected:** `extensions.screenshots.disabled`
751
752 #### Windows (GPO)
753 ```
754 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
755 ```
756 #### macOS
757 ```
758 <dict>
759 <key>DisableFirefoxScreenshots</key>
760 <true/> | <false/>
761 </dict>
762 ```
763 #### policies.json
764 ```
765 {
766 "policies": {
767 "DisableFirefoxScreenshots": true | false
768 }
769 }
770 ```
771 ### DisableFirefoxAccounts
772 Disable Firefox Accounts integration (Sync).
773
774 **Compatibility:** Firefox 60, Firefox ESR 60\
775 **CCK2 Equivalent:** `disableSync`\
776 **Preferences Affected:** `identity.fxaccounts.enabled`
777
778 #### Windows (GPO)
779 ```
780 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
781 ```
782 #### macOS
783 ```
784 <dict>
785 <key>DisableFirefoxAccounts</key>
786 <true/> | <false/>
787 </dict>
788 ```
789 #### policies.json
790 ```
791 {
792 "policies": {
793 "DisableFirefoxAccounts": true | false
794 }
795 }
796 ```
797 ### DisableFirefoxStudies
798 Disable Firefox studies (Shield).
799
800 **Compatibility:** Firefox 60, Firefox ESR 60\
801 **CCK2 Equivalent:** N/A\
802 **Preferences Affected:** N/A
803
804 #### Windows (GPO)
805 ```
806 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
807 ```
808 #### macOS
809 ```
810 <dict>
811 <key>DisableFirefoxStudies</key>
812 <true/> | <false/>
813 </dict>
814 ```
815 #### policies.json
816 ```
817 {
818 "policies": {
819 "DisableFirefoxStudies": true | false
820 }
821 }
822 ```
823 ### DisableForgetButton
824 Disable the "Forget" button.
825
826 **Compatibility:** Firefox 60, Firefox ESR 60\
827 **CCK2 Equivalent:** `disableForget`\
828 **Preferences Affected:** N/A
829
830 #### Windows (GPO)
831 ```
832 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
833 ```
834 #### macOS
835 ```
836 <dict>
837 <key>DisableForgetButton</key>
838 <true/> | <false/>
839 </dict>
840 ```
841 #### policies.json
842 ```
843 {
844 "policies": {
845 "DisableForgetButton": true | false
846 }
847 }
848 ```
849 ### DisableFormHistory
850 Turn off saving information on web forms and the search bar.
851
852 **Compatibility:** Firefox 60, Firefox ESR 60\
853 **CCK2 Equivalent:** `disableFormFill`\
854 **Preferences Affected:** ` browser.formfill.enable`
855
856 #### Windows (GPO)
857 ```
858 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
859 ```
860 #### macOS
861 ```
862 <dict>
863 <key>DisableFormHistory</key>
864 <true/> | <false/>
865 </dict>
866 ```
867 #### policies.json
868 ```
869 {
870 "policies": {
871 "DisableFormHistory": true | false
872 }
873 }
874 ```
875 ### DisablePasswordReveal
876 Do not allow passwords to be shown in saved logins
877
878 **Compatibility:** Firefox 71, Firefox ESR 68.3\
879 **CCK2 Equivalent:** N/A
880 **Preferences Affected:** N/A
881
882 #### Windows (GPO)
883 ```
884 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
885 ```
886
887 #### macOS
888 ```
889 <dict>
890 <key>DisablePasswordReveal</key>
891 <true/> | <false/>
892 </dict>
893 ```
894 #### policies.json
895 ```
896 {
897 "policies": {
898 "DisablePasswordReveal": true | false
899 }
900 }
901 ```
902 ### DisablePocket
903 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
904
905 **Compatibility:** Firefox 60, Firefox ESR 60\
906 **CCK2 Equivalent:** `disablePocket`\
907 **Preferences Affected:** `extensions.pocket.enabled`
908
909 #### Windows (GPO)
910 ```
911 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
912 ```
913 #### macOS
914 ```
915 <dict>
916 <key>DisablePocket</key>
917 <true/> | <false/>
918 </dict>
919 ```
920 #### policies.json
921 ```
922 {
923 "policies": {
924 "DisablePocket": true | false
925 }
926 }
927 ```
928 ### DisablePrivateBrowsing
929 Remove access to private browsing.
930
931 **Compatibility:** Firefox 60, Firefox ESR 60\
932 **CCK2 Equivalent:** `disablePrivateBrowsing`\
933 **Preferences Affected:** N/A
934
935 #### Windows (GPO)
936 ```
937 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
938 ```
939 #### macOS
940 ```
941 <dict>
942 <key>DisablePrivateBrowsing</key>
943 <true/> | <false/>
944 </dict>
945 ```
946 #### policies.json
947 ```
948 {
949 "policies": {
950 "DisablePrivateBrowsing": true | false
951 }
952 }
953 ```
954 ### DisableProfileImport
955 Disables the "Import data from another browser" option in the bookmarks window.
956
957 **Compatibility:** Firefox 60, Firefox ESR 60\
958 **CCK2 Equivalent:** N/A\
959 **Preferences Affected:** N/A
960
961 #### Windows (GPO)
962 ```
963 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
964 ```
965 #### macOS
966 ```
967 <dict>
968 <key>DisableProfileImport</key>
969 <true/> | <false/>
970 </dict>
971 ```
972 #### policies.json
973 ```
974 {
975 "policies": {
976 "DisableProfileImport": true | false
977 }
978 }
979 ```
980 ### DisableProfileRefresh
981 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
982
983 **Compatibility:** Firefox 60, Firefox ESR 60\
984 **CCK2 Equivalent:** `disableResetFirefox`\
985 **Preferences Affected:** `browser.disableResetPrompt`
986
987 #### Windows (GPO)
988 ```
989 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
990 ```
991 #### macOS
992 ```
993 <dict>
994 <key>DisableProfileRefresh</key>
995 <true/> | <false/>
996 </dict>
997 ```
998 #### policies.json
999 ```
1000 {
1001 "policies": {
1002 "DisableProfileRefresh": true | false
1003 }
1004 }
1005 ```
1006 ### DisableSafeMode
1007 Disable safe mode within the browser.
1008
1009 On Windows, this disables safe mode via the command line as well.
1010
1011 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1012 **CCK2 Equivalent:** `disableSafeMode`\
1013 **Preferences Affected:** N/A
1014
1015 #### Windows (GPO)
1016 ```
1017 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1018 ```
1019 #### macOS
1020 ```
1021 <dict>
1022 <key>DisableSafeMode</key>
1023 <true/> | <false/>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisableSafeMode": true | false
1031 }
1032 }
1033 ```
1034 ### DisableSecurityBypass
1035 Prevent the user from bypassing security in certain cases.
1036
1037 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1038
1039 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1040
1041 **Compatibility:** Firefox 60, Firefox ESR 60\
1042 **CCK2 Equivalent:** N/A\
1043 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1044
1045 #### Windows (GPO)
1046 ```
1047 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1048 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1049 ```
1050 #### macOS
1051 ```
1052 <dict>
1053 <key>DisableSecurityBypass</key>
1054 <dict>
1055 <key>InvalidCertificate</key>
1056 <true/> | <false/>
1057 <key><SafeBrowsing/key>
1058 <true/> | <false/>
1059 </dict>
1060 </dict>
1061 ```
1062 #### policies.json
1063 ```
1064 {
1065 "policies": {
1066 "DisableSecurityBypass": {
1067 "InvalidCertificate": true false,
1068 "SafeBrowsing": true false
1069 }
1070 }
1071 }
1072 ```
1073 ### DisableSystemAddonUpdate
1074 Prevent system add-ons from being installed or update.
1075
1076 **Compatibility:** Firefox 60, Firefox ESR 60\
1077 **CCK2 Equivalent:** N/A\
1078 **Preferences Affected:** N/A
1079
1080 #### Windows (GPO)
1081 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1082 ```
1083 #### macOS
1084 ```
1085 <dict>
1086 <key>DisableSystemAddonUpdate</key>
1087 <true/> | <false/>
1088 </dict>
1089 ```
1090 #### policies.json
1091 ```
1092 {
1093 "policies": {
1094 "DisableSystemAddonUpdate": true | false
1095 }
1096 }
1097 ```
1098 ### DisableTelemetry
1099 Prevent the upload of telemetry data.
1100
1101 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1102
1103 **Compatibility:** Firefox 60, Firefox ESR 60\
1104 **CCK2 Equivalent:** `disableTelemetry`\
1105 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1106
1107 #### Windows (GPO)
1108 ```
1109 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1110 ```
1111 #### macOS
1112 ```
1113 <dict>
1114 <key>DisableTelemetry</key>
1115 <true/> | <false/>
1116 </dict>
1117 ```
1118 #### policies.json
1119 ```
1120 {
1121 "policies": {
1122 "DisableTelemetry": true | false
1123 }
1124 }
1125 ```
1126 ### DisplayBookmarksToolbar
1127 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1128
1129 **Compatibility:** Firefox 60, Firefox ESR 60\
1130 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1131 **Preferences Affected:** N/A
1132
1133 #### Windows (GPO)
1134 ```
1135 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1136 ```
1137 #### macOS
1138 ```
1139 <dict>
1140 <key>DisplayBookmarksToolbar</key>
1141 <true/> | <false/>
1142 </dict>
1143 ```
1144 #### policies.json
1145 ```
1146 {
1147 "policies": {
1148 "DisplayBookmarksToolbar": true | false
1149 }
1150 }
1151 ```
1152 ### DisplayMenuBar (Deprecated)
1153 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1154
1155 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1156 **CCK2 Equivalent:** `displayMenuBar`\
1157 **Preferences Affected:** N/A
1158
1159 #### Windows (GPO)
1160 ```
1161 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1162 ```
1163 #### macOS
1164 ```
1165 <dict>
1166 <key>DisplayMenuBar</key>
1167 <true/> | <false/>
1168 </dict>
1169 ```
1170 #### policies.json
1171 ```
1172 {
1173 "policies": {
1174 "DisplayMenuBar": true | false
1175 }
1176 }
1177 ```
1178 ### DisplayMenuBar
1179 Set the state of the menubar.
1180
1181 `always` means the menubar is shown and cannot be hidden.
1182
1183 `never` means the menubar is hidden and cannot be shown.
1184
1185 `default-on` means the menubar is on by default but can be hidden.
1186
1187 `default-off` means the menubar is off by default but can be shown.
1188
1189 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1190 **CCK2 Equivalent:** `displayMenuBar`\
1191 **Preferences Affected:** N/A
1192
1193 #### Windows (GPO)
1194 ```
1195 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1196 ```
1197 #### macOS
1198 ```
1199 <dict>
1200 <key>DisplayMenuBar</key>
1201 <string>always | never | default-on | default-off</string>
1202 </dict>
1203 ```
1204 #### policies.json
1205 ```
1206 {
1207 "policies": {
1208 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1209 }
1210 }
1211 ```
1212 ### DNSOverHTTPS
1213 Configure DNS over HTTPS.
1214
1215 `Enabled` determines whether DNS over HTTPS is enabled
1216
1217 `ProviderURL` is a URL to another provider.
1218
1219 `Locked` prevents the user from changing DNS over HTTPS preferences.
1220
1221 **Compatibility:** Firefox 63, Firefox ESR 68\
1222 **CCK2 Equivalent:** N/A\
1223 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1224
1225 #### Windows (GPO)
1226 ```
1227 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1228 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1229 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1230 ```
1231 #### macOS
1232 ```
1233 <dict>
1234 <key>DNSOverHTTPS</key>
1235 <dict>
1236 <key>Enabled</key>
1237 <true/> | <false/>
1238 <key>ProviderURL</key>
1239 <string>URL_TO_ALTERNATE_PROVIDER</string>
1240 <key>Locked</key>
1241 <true/> | <false/>
1242 </dict>
1243 </dict>
1244 ```
1245 #### policies.json
1246 ```
1247 {
1248 "policies": {
1249 "DNSOverHTTPS": {
1250 "Enabled": true | false,
1251 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1252 "Locked": true | false
1253 }
1254 }
1255 }
1256 ```
1257 ### DontCheckDefaultBrowser
1258 Don't check if Firefox is the default browser at startup.
1259
1260 **Compatibility:** Firefox 60, Firefox ESR 60\
1261 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1262 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1263
1264 #### Windows (GPO)
1265 ```
1266 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1267 ```
1268 #### macOS
1269 ```
1270 <dict>
1271 <key>DontCheckDefaultBrowser</key>
1272 <true/> | <false/>
1273 </dict>
1274 ```
1275 #### policies.json
1276 ```
1277 {
1278 "policies": {
1279 "DontCheckDefaultBrowser": true | false
1280 }
1281 }
1282 ```
1283 ### DefaultDownloadDirectory
1284 Set the default download directory.
1285
1286 You can use ${home} for the native home directory.
1287
1288 **Compatibility:** Firefox 68, Firefox ESR 68\
1289 **CCK2 Equivalent:** N/A\
1290 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1291
1292 #### Windows (GPO)
1293 ```
1294 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1295 ```
1296 #### macOS
1297 ```
1298 <dict>
1299 <key>DefaultDownloadDirectory</key>
1300 <string>${home}/Downloads</string>
1301 </dict>
1302 ```
1303 #### policies.json (macOS and Linux)
1304 ```
1305 {
1306 "policies": {
1307 "DefaultDownloadDirectory": "${home}/Downloads"
1308 }
1309 ```
1310 #### policies.json (Windows)
1311 ```
1312 {
1313 "policies": {
1314 "DefaultDownloadDirectory": "${home}\\Downloads"
1315 }
1316 ```
1317 ### DownloadDirectory
1318 Set and lock the download directory.
1319
1320 You can use ${home} for the native home directory.
1321
1322 **Compatibility:** Firefox 68, Firefox ESR 68\
1323 **CCK2 Equivalent:** N/A\
1324 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1329 ```
1330 #### macOS
1331 ```
1332 <dict>
1333 <key>DownloadDirectory</key>
1334 <string>${home}/Downloads</string>
1335 </dict>
1336 ```
1337 #### policies.json (macOS and Linux)
1338 ```
1339 {
1340 "policies": {
1341 "DownloadDirectory": "${home}/Downloads"
1342 }
1343 ```
1344 #### policies.json (Windows)
1345 ```
1346 {
1347 "policies": {
1348 "DownloadDirectory": "${home}\\Downloads"
1349 }
1350 ```
1351 ### EnableTrackingProtection
1352 Configure tracking protection.
1353
1354 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1355
1356 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1357
1358 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1359
1360 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1361
1362 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1363
1364 `Exceptions` are origins for which tracking protection is not enabled.
1365
1366 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1367 **CCK2 Equivalent:** N/A\
1368 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1369
1370 #### Windows (GPO)
1371 ```
1372 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1373 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1374 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1375 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1376 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1377 ```
1378 #### macOS
1379 ```
1380 <dict>
1381 <key>EnableTrackingProtection</key>
1382 <dict>
1383 <key>Value</key>
1384 <true/> | <false/>
1385 <key><Locked</key>
1386 <true/> | <false/>
1387 <key><Cryptomining</key>
1388 <true/> | <false/>
1389 <key><Fingerprinting</key>
1390 <true/> | <false/>
1391 <key>Exceptions</key>
1392 <array>
1393 <string>https://example.com</string>
1394 </array>
1395 </dict>
1396 </dict>
1397 ```
1398 #### policies.json
1399 ```
1400 {
1401 "policies": {
1402 "EnableTrackingProtection": {
1403 "Value": [true, false],
1404 "Locked": [true, false],
1405 "Cryptomining": [true, false],
1406 "Fingerprinting": [true, false],
1407 "Exceptions": ["https://example.com"]
1408 }
1409 }
1410 ```
1411 ### EnterprisePoliciesEnabled
1412 Enable policy support on macOS.
1413
1414 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1415 **CCK2 Equivalent:** N/A\
1416 **Preferences Affected:** N/A
1417
1418 #### macOS
1419 ```
1420 <dict>
1421 <key>EnterprisePoliciesEnabled</key>
1422 <true/>
1423 </dict>
1424 ```
1425 ### Extensions
1426 Control the installation, uninstallation and locking of extensions.
1427
1428 `Install` is a list of URLs or native paths for extensions to be installed.
1429
1430 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1431
1432 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1433
1434 **Compatibility:** Firefox 60, Firefox ESR 60\
1435 **CCK2 Equivalent:** `addons`\
1436 **Preferences Affected:** N/A
1437
1438 #### Windows (GPO)
1439 ```
1440 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1441 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1442 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1443 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1444 ```
1445 #### macOS
1446 ```
1447 <dict>
1448 <key>Extensions</key>
1449 <dict>
1450 <key>Install</key>
1451 <array>
1452 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1453 <string>//path/to/xpi</string>
1454 </array>
1455 <key>Uninstall</key>
1456 <array>
1457 <string>bad_addon_id@mozilla.org</string>
1458 </array>
1459 <key>Locked</key>
1460 <array>
1461 <string>addon_id@mozilla.org</string>
1462 </array>
1463 </dict>
1464 </dict>
1465 ```
1466 #### policies.json
1467 ```
1468 {
1469 "policies": {
1470 "Extensions": {
1471 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1472 "Uninstall": ["bad_addon_id@mozilla.org"],
1473 "Locked": ["addon_id@mozilla.org"]
1474 }
1475 }
1476 }
1477 ```
1478 ### ExtensionSettings
1479 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1480
1481 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1482
1483 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1484
1485 The configuration for each extension is another dictionary that can contain the fields documented below.
1486
1487 | Name | Description |
1488 | --- | --- |
1489 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1490 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1491 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1492 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1493 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1494 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1495 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1496 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1497 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1498
1499 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1500 **CCK2 Equivalent:** N/A\
1501 **Preferences Affected:** N/A
1502
1503 #### Windows (GPO)
1504 ```
1505 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1506 {
1507 "*": {
1508 "blocked_install_message": "Custom error message.",
1509 "install_sources": ["https://addons.mozilla.org/"],
1510 "installation_mode": "blocked",
1511 "allowed_types": ["extension"]
1512 },
1513 "uBlock0@raymondhill.net": {
1514 "installation_mode": "force_installed",
1515 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1516 }
1517 }
1518 ```
1519 #### macOS
1520 ```
1521 <dict>
1522 <key>ExtensionSettings</key>
1523 <dict>
1524 <key>*</key>
1525 <dict>
1526 <key>blocked_install_message</key>
1527 <string>Custom error message.</string>
1528 <key>install_sources</key>
1529 <array>
1530 <string>https://addons.mozilla.org/</string>
1531 </array>
1532 <key>installation_mode</key>
1533 <string>blocked</string>
1534 <key>allowed_types</key>
1535 <array>
1536 <string>extension</string>
1537 </array>
1538 </dict>
1539 <key>uBlock0@raymondhill.net</key>
1540 <dict>
1541 <key>installation_mode</key>
1542 <string>force_installed</string>
1543 <key>install_url</key>
1544 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1545 </dict>
1546 </dict>
1547 </dict>
1548 ```
1549 #### policies.json
1550 ```
1551 {
1552 "policies": {
1553 "ExtensionSettings": {
1554 "*": {
1555 "blocked_install_message": "Custom error message.",
1556 "install_sources": ["https://addons.mozilla.org/"],
1557 "installation_mode": "blocked",
1558 "allowed_types": ["extension"]
1559 },
1560 "uBlock0@raymondhill.net": {
1561 "installation_mode": "force_installed",
1562 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1563 }
1564 }
1565 }
1566 }
1567 ```
1568 ### ExtensionUpdate
1569 Control extension updates.
1570
1571 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1572 **CCK2 Equivalent:** N/A\
1573 **Preferences Affected:** `extensions.update.enabled`
1574
1575 #### Windows (GPO)
1576 ```
1577 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1578 ```
1579 #### macOS
1580 ```
1581 <dict>
1582 <key>ExtensionUpdate</key>
1583 <true/> | <false/>
1584 </dict>
1585 ```
1586 #### policies.json
1587 ```
1588 {
1589 "policies": {
1590 "ExtensionUpdate": true | false
1591 }
1592 }
1593 ```
1594 ### FlashPlugin
1595 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1596
1597 `Allow` is a list of origins where Flash are allowed.
1598
1599 `Block` is a list of origins where Flash is not allowed.
1600
1601 `Default` determines whether or not Flash is allowed by default.
1602
1603 `Locked` prevents the user from changing Flash preferences.
1604
1605 **Compatibility:** Firefox 60, Firefox ESR 60\
1606 **CCK2 Equivalent:** `permissions.plugin`\
1607 **Preferences Affected:** `plugin.state.flash`
1608
1609 #### Windows (GPO)
1610 ```
1611 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1612 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1613 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1614 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1615 ```
1616 #### macOS
1617 ```
1618 <dict>
1619 <key>FlashPlugin</key>
1620 <dict>
1621 <key>Allow</key>
1622 <array>
1623 <string>http://example.org</string>
1624 </array>
1625 <key>Block</key>
1626 <array>
1627 <string>http://example.edu</string>
1628 </array>
1629 <key>Default</key>
1630 <true/> | <false/>
1631 <key>Locked</key>
1632 <true/> | <false/>
1633 </dict>
1634 </dict>
1635 ```
1636 #### policies.json
1637 ```
1638 {
1639 "policies": {
1640 "FlashPlugin": {
1641 "Allow": ["http://example.org/"],
1642 "Block": ["http://example.edu/"],
1643 "Default": true | false,
1644 "Locked": true | false
1645 }
1646 }
1647 }
1648 ```
1649 ### FirefoxHome
1650 Customize the Firefox Home page.
1651
1652 **Compatibility:** Firefox 68, Firefox ESR 68\
1653 **CCK2 Equivalent:** N/A\
1654 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1655
1656 #### Windows (GPO)
1657 ```
1658 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1659 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1660 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1661 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1662 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1663 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1664 ```
1665 #### macOS
1666 ```
1667 <dict>
1668 <key>FirefoxHome</key>
1669 <dict>
1670 <key>Search</key>
1671 <true/> | <false/>
1672 <key>TopSites</key>
1673 <true/> | <false/>
1674 <key>Highlights</key>
1675 <true/> | <false/>
1676 <key>Pocket</key>
1677 <true/> | <false/>
1678 <key>Snippets</key>
1679 <true/> | <false/>
1680 <key>Locked</key>
1681 <true/> | <false/>
1682 </dict>
1683 </dict>
1684 ```
1685 #### policies.json
1686 ```
1687 {
1688 "policies": {
1689 "FirefoxHome": {
1690 "Search": true | false,
1691 "TopSites": true | false,
1692 "Highlights": true | false,
1693 "Pocket": true | false,
1694 "Snippets": true | false,
1695 "Locked": true | false
1696 }
1697 }
1698 }
1699 ```
1700 ### HardwareAcceleration
1701 Control hardware acceleration.
1702
1703 **Compatibility:** Firefox 60, Firefox ESR 60\
1704 **CCK2 Equivalent:** N/A\
1705 **Preferences Affected:** `layers.acceleration.disabled`
1706
1707 #### Windows (GPO)
1708 ```
1709 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1710 ```
1711 #### macOS
1712 ```
1713 <dict>
1714 <key>HardwareAcceleration</key>
1715 <true/> | <false/>
1716 </dict>
1717 ```
1718 #### policies.json
1719 ```
1720 {
1721 "policies": {
1722 "HardwareAcceleration": true | false
1723 }
1724 }
1725 ```
1726 ### Homepage
1727 Configure the default homepage and how Firefox starts.
1728
1729 `URL` is the default homepage.
1730
1731 `Locked` prevents the user from changing homepage preferences.
1732
1733 `Additional` allows for more than one homepage.
1734
1735 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1736
1737 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1738 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1739 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1740
1741 #### Windows (GPO)
1742 ```
1743 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1744 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1745 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1746 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1747 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1748 ```
1749 #### macOS
1750 ```
1751 <dict>
1752 <key>Homepage</key>
1753 <dict>
1754 <key>URL</key>
1755 <string>http://example.com</string>
1756 <key>Locked</key>
1757 <true/> | <false/>
1758 <key>Additional</key>
1759 <array>
1760 <string>http://example.org</string>
1761 <string>http://example.edu</string>
1762 </array>
1763 <key>StartPage</key>
1764 <string>none | homepage | previous-session</string>
1765 </dict>
1766 </dict>
1767 ```
1768 #### policies.json
1769 ```
1770 {
1771 "policies": {
1772 "Homepage": {
1773 "URL": "http://example.com/",
1774 "Locked": true | false,
1775 "Additional": ["http://example.org/",
1776 "http://example.edu/"],
1777 "StartPage": "none" | "homepage" | "previous-session"
1778 }
1779 }
1780 }
1781 ```
1782 ### InstallAddonsPermission
1783 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1784
1785 `Allow` is a list of origins where extension installs are allowed.
1786
1787 `Default` determines whether or not extension installs are allowed by default.
1788
1789 **Compatibility:** Firefox 60, Firefox ESR 60\
1790 **CCK2 Equivalent:** `permissions.install`\
1791 **Preferences Affected:** `xpinstall.enabled`
1792
1793 #### Windows (GPO)
1794 ```
1795 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1796 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1797 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1798 ```
1799 #### macOS
1800 ```
1801 <dict>
1802 <key>InstallAddonsPermission</key>
1803 <dict>
1804 <key>Allow</key>
1805 <array>
1806 <string>http://example.org</string>
1807 <string>http://example.edu</string>
1808 </array>
1809 <key>Default</key>
1810 <true/> | <false/>
1811 </dict>
1812 </dict>
1813 ```
1814 #### policies.json
1815 ```
1816 {
1817 "policies": {
1818 "InstallAddonsPermission": {
1819 "Allow": ["http://example.org/",
1820 "http://example.edu/"],
1821 "Default": true | false
1822 }
1823 }
1824 }
1825 ```
1826 ### LegacyProfiles
1827 Disable the feature enforcing a separate profile for each installation.
1828
1829 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1830
1831 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1832
1833 This policy only work on Windows via GPO (not policies.json).
1834
1835 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1836 **CCK2 Equivalent:** N/A\
1837 **Preferences Affected:** N/A
1838
1839 #### Windows (GPO)
1840 ```
1841 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1842 ```
1843 ### LocalFileLinks
1844 Enable linking to local files by origin.
1845
1846 **Compatibility:** Firefox 68, Firefox ESR 68\
1847 **CCK2 Equivalent:** N/A\
1848 **Preferences Affected:** `capability.policy.localfilelinks.*`
1849
1850 #### Windows (GPO)
1851 ```
1852 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1853 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1854 ```
1855 #### macOS
1856 ```
1857 <dict>
1858 <key>LocalFileLinks</key>
1859 <array>
1860 <string>http://example.org</string>
1861 <string>http://example.edu</string>
1862 </array>
1863 </dict>
1864 ```
1865 #### policies.json
1866 ```
1867 {
1868 "policies": {
1869 "LocalFileLinks": ["http://example.org/",
1870 "http://example.edu/"]
1871 }
1872 }
1873 ```
1874 ### NoDefaultBookmarks
1875 Disable the creation of default bookmarks.
1876
1877 This policy is only effective if the user profile has not been created yet.
1878
1879 **Compatibility:** Firefox 60, Firefox ESR 60\
1880 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1881 **Preferences Affected:** N/A
1882
1883 #### Windows (GPO)
1884 ```
1885 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1886 ```
1887 #### macOS
1888 ```
1889 <dict>
1890 <key>NoDefaultBookmarks</key>
1891 <true/> | <false/>
1892 </dict>
1893 ```
1894 #### policies.json
1895 ```
1896 {
1897 "policies": {
1898 "NoDefaultBookmarks": true | false
1899 }
1900 }
1901 ```
1902 ### NetworkPrediction
1903 Enable or disable network prediction (DNS prefetching).
1904
1905 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1906 **CCK2 Equivalent:** N/A\
1907 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1908
1909 #### Windows (GPO)
1910 ```
1911 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1912 ```
1913 #### macOS
1914 ```
1915 <dict>
1916 <key>NetworkPrediction</key>
1917 <true/> | <false/>
1918 </dict>
1919 ```
1920 #### policies.json
1921 ```
1922 {
1923 "policies": {
1924 "NetworkPrediction": true | false
1925 }
1926 ```
1927 ### NewTabPage
1928 Enable or disable the New Tab page.
1929
1930 **Compatibility:** Firefox 68, Firefox ESR 68\
1931 **CCK2 Equivalent:** N/A\
1932 **Preferences Affected:** `browser.newtabpage.enabled`
1933
1934 #### Windows (GPO)
1935 ```
1936 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1937 ```
1938 #### macOS
1939 ```
1940 <dict>
1941 <key>NewTabPage</key>
1942 <true/> | <false/>
1943 </dict>
1944 ```
1945 #### policies.json
1946 ```
1947 {
1948 "policies": {
1949 "NewTabPage": true | false
1950 }
1951 ```
1952 ### OfferToSaveLogins
1953 Control whether or not Firefox offers to save passwords.
1954
1955 **Compatibility:** Firefox 60, Firefox ESR 60\
1956 **CCK2 Equivalent:** `dontRememberPasswords`\
1957 **Preferences Affected:** `signon.rememberSignons`
1958
1959 #### Windows (GPO)
1960 ```
1961 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1962 ```
1963 #### macOS
1964 ```
1965 <dict>
1966 <key>OfferToSaveLogins</key>
1967 <true/> | <false/>
1968 </dict>
1969 ```
1970 #### policies.json
1971 ```
1972 {
1973 "policies": {
1974 "OfferToSaveLogins": true | false
1975 }
1976 }
1977 ```
1978 ### OfferToSaveLoginsDefault
1979 Sets the default value of signon.rememberSignons without locking it.
1980
1981 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1982 **CCK2 Equivalent:** `dontRememberPasswords`\
1983 **Preferences Affected:** `signon.rememberSignons`
1984
1985 #### Windows (GPO)
1986 ```
1987 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1988 ```
1989 #### macOS
1990 ```
1991 <dict>
1992 <key>OfferToSaveLoginsDefault</key>
1993 <true/> | <false/>
1994 </dict>
1995 ```
1996 #### policies.json
1997 ```
1998 {
1999 "policies": {
2000 "OfferToSaveLoginsDefault": true | false
2001 }
2002 }
2003 ```
2004 ### OverrideFirstRunPage
2005 Override the first run page. If the value is blank, no first run page is displayed.
2006
2007 **Compatibility:** Firefox 60, Firefox ESR 60\
2008 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
2009 **Preferences Affected:** `startup.homepage_welcome_url`
2010
2011 #### Windows (GPO)
2012 ```
2013 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
2014 ```
2015 #### macOS
2016 ```
2017 <dict>
2018 <key>OverrideFirstRunPage</key>
2019 <string>http://example.org</string>
2020 </dict>
2021 ```
2022 #### policies.json
2023 ```
2024 {
2025 "policies": {
2026 "OverrideFirstRunPage": "http://example.org"
2027 }
2028 ```
2029 ### OverridePostUpdatePage
2030 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2031
2032 **Compatibility:** Firefox 60, Firefox ESR 60\
2033 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2034 **Preferences Affected:** `startup.homepage_override_url`
2035
2036 #### Windows (GPO)
2037 ```
2038 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2039 ```
2040 #### macOS
2041 ```
2042 <dict>
2043 <key>OverridePostUpdatePage</key>
2044 <string>http://example.org</string>
2045 </dict>
2046 ```
2047 #### policies.json
2048 ```
2049 {
2050 "policies": {
2051 "OverridePostUpdatePage": "http://example.org"
2052 }
2053 ```
2054 ### PasswordManagerEnabled
2055 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2056
2057 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2058 **CCK2 Equivalent:** N/A\
2059 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2060
2061 #### Windows (GPO)
2062 ```
2063 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2064 ```
2065 #### macOS
2066 ```
2067 <dict>
2068 <key>PasswordManagerEnabled</key>
2069 <true/> | <false/>
2070 </dict>
2071 ```
2072 #### policies.json
2073 ```
2074 {
2075 "policies": {
2076 "PasswordManagerEnabled": true | false
2077 }
2078 }
2079 ```
2080 ### Permissions
2081 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2082
2083 `Allow` is a list of origins where the feature is allowed.
2084
2085 `Block` is a list of origins where the feature is not allowed.
2086
2087 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2088
2089 `Locked` prevents the user from changing preferences for the feature.
2090
2091 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2092 **CCK2 Equivalent:** N/A\
2093 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2094
2095 #### Windows (GPO)
2096 ```
2097 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2098 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2099 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2100 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2101 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2102 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2103 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2104 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2105 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2106 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2107 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2108 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2109 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2110 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2111 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2112 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2113 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2114 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2115 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2116 ```
2117 #### macOS
2118 ```
2119 <dict>
2120 <key>Permissions</key>
2121 <dict>
2122 <key>Camera</key>
2123 <dict>
2124 <key>Allow</key>
2125 <array>
2126 <string>https://example.org</string>
2127 <string>https://example.org:1234</string>
2128 </array>
2129 <key>Block</key>
2130 <array>
2131 <string>https://example.edu</string>
2132 </array>
2133 <key>BlockNewRequests</key>
2134 <true/>
2135 <key>Locked</key>
2136 <true/>
2137 </dict>
2138 <key>Microphone</key>
2139 <dict>
2140 <key>Allow</key>
2141 <array>
2142 <string>https://example.org</string>
2143 </array>
2144 <key>Block</key>
2145 <array>
2146 <string>https://example.edu</string>
2147 </array>
2148 <key>BlockNewRequests</key>
2149 <true/>
2150 <key>Locked</key>
2151 <true/>
2152 </dict>
2153 <key>Location</key>
2154 <dict>
2155 <key>Allow</key>
2156 <array>
2157 <string>https://example.org</string>
2158 </array>
2159 <key>Block</key>
2160 <array>
2161 <string>https://example.edu</string>
2162 </array>
2163 <key>BlockNewRequests</key>
2164 <true/>
2165 <key>Locked</key>
2166 <true/>
2167 </dict>
2168 <key>Notifications</key>
2169 <dict>
2170 <key>Allow</key>
2171 <array>
2172 <string>https://example.org</string>
2173 </array>
2174 <key>Block</key>
2175 <array>
2176 <string>https://example.edu</string>
2177 </array>
2178 <key>BlockNewRequests</key>
2179 <true/>
2180 <key>Locked</key>
2181 <true/>
2182 </dict>
2183 <key>Autoplay</key>
2184 <dict>
2185 <key>Allow</key>
2186 <array>
2187 <string>https://example.org</string>
2188 </array>
2189 <key>Block</key>
2190 <array>
2191 <string>https://example.edu</string>
2192 </array>
2193 </dict>
2194 </dict>
2195 </dict>
2196 ```
2197 #### policies.json
2198 ```
2199 {
2200 "policies": {
2201 "Permissions": {
2202 "Camera": {
2203 "Allow": ["https://example.org","https://example.org:1234"],
2204 "Block": ["https://example.edu"],
2205 "BlockNewRequests": true | false,
2206 "Locked": true | false
2207 },
2208 "Microphone": {
2209 "Allow": ["https://example.org"],
2210 "Block": ["https://example.edu"],
2211 "BlockNewRequests": true | false,
2212 "Locked": true | false
2213 },
2214 "Location": {
2215 "Allow": ["https://example.org"],
2216 "Block": ["https://example.edu"],
2217 "BlockNewRequests": true | false,
2218 "Locked": true | false
2219 },
2220 "Notifications": {
2221 "Allow": ["https://example.org"],
2222 "Block": ["https://example.edu"],
2223 "BlockNewRequests": true | false,
2224 "Locked": true | false
2225 },
2226 "Autoplay": {
2227 "Allow": ["https://example.org"],
2228 "Block": ["https://example.edu"]
2229 }
2230 }
2231 }
2232 }
2233 ```
2234 ### PopupBlocking
2235 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2236
2237 `Allow` is a list of origins where popup-windows are allowed.
2238
2239 `Default` determines whether or not pop-up windows are allowed by default.
2240
2241 `Locked` prevents the user from changing pop-up preferences.
2242
2243 **Compatibility:** Firefox 60, Firefox ESR 60\
2244 **CCK2 Equivalent:** `permissions.popup`\
2245 **Preferences Affected:** `dom.disable_open_during_load`
2246
2247 #### Windows (GPO)
2248 ```
2249 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2250 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2251 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2252 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2253 ```
2254 #### macOS
2255 ```
2256 <dict>
2257 <key>PopupBlocking</key>
2258 <dict>
2259 <key>Allow</key>
2260 <array>
2261 <string>http://example.org</string>
2262 <string>http://example.edu</string>
2263 </array>
2264 <key>Default</key>
2265 <true/> | <false/>
2266 <key>Locked</key>
2267 <true/> | <false/>
2268 </dict>
2269 </dict>
2270 ```
2271 #### policies.json
2272 ```
2273 {
2274 "policies": {
2275 "PopupBlocking": {
2276 "Allow": ["http://example.org/",
2277 "http://example.edu/"],
2278 "Default": true | false,
2279 "Locked": true | false
2280 }
2281 }
2282 }
2283 ```
2284 ### Preferences
2285 Set and lock certain preferences.
2286
2287 **Compatibility:** See below\
2288 **CCK2 Equivalent:** `preferences`\
2289 **Preferences Affected:** See below
2290
2291 | Preference | Type | Compatibility | Default
2292 | --- | --- | --- | ---
2293 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2294 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2295 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
2296 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2297 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2298 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2299 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2300 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2301 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2302 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2303 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2304 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2305 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2306 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2307 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2308 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2309 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2310 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2311 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2312 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2313 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2314 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2315 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2316 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2317 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2318 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2319 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2320 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2321 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2322 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2323 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2324 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2325 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2326 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2327 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2328 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2329 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2330 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2331 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2332 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2333 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2334 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2335 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2336 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2337 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2338 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2339 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2340 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2341 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2342 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2343 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2344 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2345 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2346 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2347 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2348 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2349 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2350 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2351 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2352 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2353 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2354 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2355 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2356 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2357 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2358 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2359 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2360 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2361 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2362 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2363 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2364 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2365 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2366 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2367 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2368 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2369 disabled
2370 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2371 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2372 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2373 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2374 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2375 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2376 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2377 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2378 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2379 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2380 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2381 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2382 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2383 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2384 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2385 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2386 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2387 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2388 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2389 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2390 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2391 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2392 #### Windows (GPO)
2393 ```
2394 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2395 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2396 ```
2397 #### macOS
2398 ```
2399 <dict>
2400 <key>Preferences</key>
2401 <dict>
2402 <key>boolean_preference_name</key>
2403 <true/> | <false/>
2404 <key>string_preference_name</key>
2405 <string>string_value</string>
2406 </dict>
2407 </dict>
2408 ```
2409 #### policies.json
2410 ```
2411 {
2412 "policies": {
2413 "Preferences": {
2414 "boolean_preference_name": true | false,
2415 "string_preference_name": "string_value"
2416 }
2417 }
2418 }
2419 ```
2420 ### PromptForDownloadLocation
2421 Ask where to save each file before downloading.
2422
2423 **Compatibility:** Firefox 68, Firefox ESR 68\
2424 **CCK2 Equivalent:** N/A\
2425 **Preferences Affected:** `browser.download.useDownloadDir`
2426
2427 #### Windows (GPO)
2428 ```
2429 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2430 ```
2431 #### macOS
2432 ```
2433 <dict>
2434 <key>PromptForDownloadLocation</key>
2435 <true/> | <false/>
2436 </dict>
2437 ```
2438 #### policies.json
2439 ```
2440 {
2441 "policies": {
2442 "PromptForDownloadLocation": true | false
2443 }
2444 }
2445 ```
2446 ### Proxy
2447 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2448 To specify ports, append them to the hostnames with a colon (:).
2449
2450 `Mode` is the proxy method being used.
2451
2452 `Locked` is whether or not proxy settings can be changed.
2453
2454 `HTTPProxy` is the HTTP proxy server.
2455
2456 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2457
2458 `SSLProxy` is the SSL proxy server.
2459
2460 `FTPProxy` is the FTP proxy server.
2461
2462 `SOCKSProxy` is the SOCKS proxy server
2463
2464 `SOCKSVersion` is the SOCKS version (4 or 5)
2465
2466 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2467
2468 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2469
2470 `AutoLogin` means do not prompt for authentication if password is saved.
2471
2472 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2473
2474 **Compatibility:** Firefox 60, Firefox ESR 60\
2475 **CCK2 Equivalent:** `networkProxy*`\
2476 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2477
2478 #### Windows (GPO)
2479 ```
2480 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2481 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2482 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2483 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2484 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2485 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2486 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2487 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2488 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2489 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2490 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2491 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2492 ```
2493 #### macOS
2494 ```
2495 <dict>
2496 <key>Proxy</key>
2497 <dict>
2498 <key>Mode</key>
2499 <string>none | system | manual | autoDetect | autoConfig</string>
2500 <key>Locked</key>
2501 <true> | </false>
2502 <key>HTTPProxy</key>
2503 <string>https://httpproxy.example.com</string>
2504 <key>UseHTTPProxyForAllProtocols</key>
2505 <true> | </false>
2506 <key>SSLProxy</key>
2507 <string>https://sslproxy.example.com</string>
2508 <key>FTPProxy</key>
2509 <string>https://ftpproxy.example.com</string>
2510 <key>SOCKSProxy</key>
2511 <string>https://socksproxy.example.com</string>
2512 <key>SOCKSVersion</key>
2513 <string>4 | 5</string>
2514 <key>Passthrough</key>
2515 <string>&lt;local>&gt;</string>
2516 <key>AutoConfigURL</key>
2517 <string>URL_TO_AUTOCONFIG</string>
2518 <key>AutoLogin</key>
2519 <true> | </false>
2520 <key>UseProxyForDNS</key>
2521 <true> | </false>
2522 </dict>
2523 </dict>
2524 ```
2525 #### policies.json
2526 ```
2527 {
2528 "policies": {
2529 "Proxy": {
2530 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2531 "Locked": [true, false],
2532 "HTTPProxy": "hostname",
2533 "UseHTTPProxyForAllProtocols": [true, false],
2534 "SSLProxy": "hostname",
2535 "FTPProxy": "hostname",
2536 "SOCKSProxy": "hostname",
2537 "SOCKSVersion": 4 | 5
2538 "Passthrough": "<local>",
2539 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2540 "AutoLogin": [true, false],
2541 "UseProxyForDNS": [true, false]
2542 }
2543 }
2544 }
2545 ```
2546 ### RequestedLocales
2547 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2548
2549 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2550
2551 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2552 **CCK2 Equivalent:** N/A\
2553 **Preferences Affected:** N/A
2554 #### Windows (GPO)
2555 ```
2556 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2557 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2558
2559 or
2560
2561 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2562 ```
2563 #### macOS
2564 ```
2565 <dict>
2566 <key>RequestedLocales</key>
2567 <array>
2568 <string>de</string>
2569 <string>en-US</string>
2570 </array>
2571 </dict>
2572
2573 or
2574
2575 <dict>
2576 <key>RequestedLocales</key>
2577 <string>de,en-US</string>
2578 </dict>
2579
2580 ```
2581 #### policies.json
2582 ```
2583 {
2584 "policies": {
2585 "RequestedLocales": ["de", "en-US"]
2586 }
2587 }
2588
2589 or
2590
2591 {
2592 "policies": {
2593 "RequestedLocales": "de,en-US"
2594 }
2595 }
2596 ```
2597 ### SanitizeOnShutdown (Selective)
2598 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2599
2600 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2601
2602 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2603 **CCK2 Equivalent:** N/A\
2604 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2605 #### Windows (GPO)
2606 ```
2607 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2608 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2609 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2610 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2611 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2612 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2613 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2614 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2615 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2616 ```
2617 #### macOS
2618 ```
2619 <dict>
2620 <key>SanitizeOnShutdown</key>
2621 <dict>
2622 <key>Cache</key>
2623 <true/> | <false/>
2624 <key>Cookies</key>
2625 <true/> | <false/>
2626 <key>Downloads</key>
2627 <true/> | <false/>
2628 <key>FormData</key>
2629 <true/> | <false/>
2630 <key>History</key>
2631 <true/> | <false/>
2632 <key>Sessions</key>
2633 <true/> | <false/>
2634 <key>SiteSettings</key>
2635 <true/> | <false/>
2636 <key>OfflineApps</key>
2637 <true/> | <false/>
2638 <key>Locked</key>
2639 <true/> | <false/>
2640 </dict>
2641 </dict>
2642 ```
2643 #### policies.json
2644 ```
2645 {
2646 "policies": {
2647 "SanitizeOnShutdown": {
2648 "Cache": true | false,
2649 "Cookies": true | false,
2650 "Downloads": true | false,
2651 "FormData": true | false,
2652 "History": true | false,
2653 "Sessions": true | false,
2654 "SiteSettings": true | false,
2655 "OfflineApps": true | false,
2656 "Locked": true | false
2657 }
2658 }
2659 }
2660 ```
2661 ### SanitizeOnShutdown (All)
2662 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2663
2664 **Compatibility:** Firefox 60, Firefox ESR 60\
2665 **CCK2 Equivalent:** N/A\
2666 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2667 #### Windows (GPO)
2668 ```
2669 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2670 ```
2671 #### macOS
2672 ```
2673 <dict>
2674 <key>SanitizeOnShutdown</key>
2675 <true/> | <false/>
2676 </dict>
2677 ```
2678 #### policies.json
2679 ```
2680 {
2681 "policies": {
2682 "SanitizeOnShutdown": true | false
2683 }
2684 }
2685 ```
2686 ### SearchBar
2687 Set whether or not search bar is displayed.
2688
2689 **Compatibility:** Firefox 60, Firefox ESR 60\
2690 **CCK2 Equivalent:** `showSearchBar`\
2691 **Preferences Affected:** N/A
2692
2693 #### Windows (GPO)
2694 ```
2695 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2696 ```
2697 #### macOS
2698 ```
2699 <dict>
2700 <key>SearchBar</key>
2701 <string>unified | separate</string>
2702 </dict>
2703 ```
2704
2705 #### policies.json
2706 ```
2707 {
2708 "policies": {
2709 "SearchBar": "unified" | "separate"
2710 }
2711 }
2712 ```
2713
2714
2715
2716
2717
2718 ### SearchEngines (This policy is only available on the ESR.)
2719
2720 ### SearchEngines | Default
2721
2722 Set the default search engine. This policy is only available on the ESR.
2723
2724 **Compatibility:** Firefox ESR 60\
2725 **CCK2 Equivalent:** `defaultSearchEngine`\
2726 **Preferences Affected:** N/A
2727
2728 #### Windows (GPO)
2729 ```
2730 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2731 ```
2732 #### macOS
2733 ```
2734 <dict>
2735 <key>SearchEngines</key>
2736 <dict>
2737 <key>Default</key>
2738 <string>NAME_OF_SEARCH_ENGINE</string>
2739 </dict>
2740 </dict>
2741 ```
2742 #### policies.json
2743 ```
2744 {
2745 "policies": {
2746 "SearchEngines": {
2747 "Default": "NAME_OF_SEARCH_ENGINE"
2748 }
2749 }
2750 }
2751 ```
2752 ### SearchEngines | PreventInstalls
2753
2754 Prevent installing search engines from webpages.
2755
2756 **Compatibility:** Firefox ESR 60\
2757 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2758 **Preferences Affected:** N/A
2759
2760 #### Windows (GPO)
2761 ```
2762 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2763 ```
2764 #### macOS
2765 ```
2766 <dict>
2767 <key>SearchEngines</key>
2768 <dict>
2769 <key>PreventInstalls</key>
2770 <true/> | <false/>
2771 </dict>
2772 </dict>
2773 ```
2774 #### policies.json
2775 ```
2776 {
2777 "policies": {
2778 "SearchEngines": {
2779 "PreventInstalls": true | false
2780 }
2781 }
2782 }
2783 ```
2784 ### SearchEngines | Remove
2785
2786 Hide built-in search engines. This policy is only available on the ESR.
2787
2788 **Compatibility:** Firefox ESR 60.2\
2789 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2790 **Preferences Affected:** N/A
2791
2792 #### Windows (GPO)
2793 ```
2794 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2795 ```
2796 #### macOS
2797 ```
2798 <dict>
2799 <key>SearchEngines</key>
2800 <dict>
2801 <key>Remove</key>
2802 <array>
2803 <string>NAME_OF_SEARCH_ENGINE</string>
2804 </array>
2805 </dict>
2806 </dict>
2807 ```
2808 #### policies.json
2809 ```
2810 {
2811 "policies": {
2812 "SearchEngines": {
2813 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2814 }
2815 }
2816 }
2817 ```
2818 ### SearchEngines | Add
2819
2820 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2821
2822 `Name` is the name of the search engine.
2823
2824 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2825
2826 `Method` is either GET or POST
2827
2828 `IconURL` is a URL for the icon to use.
2829
2830 `Alias` is a keyword to use for the engine.
2831
2832 `Description` is a description of the search engine.
2833
2834 `PostData` is the POST data as name value pairs separated by &.
2835
2836 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2837
2838 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2839 **CCK2 Equivalent:** `searchplugins`\
2840 **Preferences Affected:** N/A
2841
2842 #### Windows (GPO)
2843 ```
2844 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2845 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2846 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2847 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2848 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2849 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2850 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2851 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2852 ```
2853
2854 #### macOS
2855 ```
2856 <dict>
2857 <key>SearchEngines</key>
2858 <dict>
2859 <key>Add</key>
2860 <array>
2861 <dict>
2862 <key>Name</key>
2863 <string>Example1</string>
2864 <key>URLTemplate</key>
2865 <string>https://www.example.org/q={searchTerms}</string>
2866 <key>Method</key>
2867 <string>GET | POST </string>
2868 <key>IconURL</key>
2869 <string>https://www.example.org/favicon.ico</string>
2870 <key>Alias</key>
2871 <string>example</string>
2872 <key>Description</key>
2873 <string>Example Description</string>
2874 <key>SuggestURLTemplate</key>
2875 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2876 <key>PostData</key>
2877 <string>name=value&q={searchTerms}</string>
2878 </dict>
2879 <array>
2880 </dict>
2881 </dict>
2882 ```
2883 #### policies.json
2884 ```
2885 {
2886 "policies": {
2887 "SearchEngines": {
2888 "Add": [
2889 {
2890 "Name": "Example1",
2891 "URLTemplate": "https://www.example.org/q={searchTerms}",
2892 "Method": "GET" | "POST",
2893 "IconURL": "https://www.example.org/favicon.ico",
2894 "Alias": "example",
2895 "Description": "Description",
2896 "PostData": "name=value&q={searchTerms}",
2897 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2898 }
2899 ]
2900 }
2901 }
2902 }
2903 ```
2904 ### SearchSuggestEnabled
2905
2906 Enable search suggestions.
2907
2908 **Compatibility:** Firefox 68, Firefox ESR 68\
2909 **CCK2 Equivalent:** N/A\
2910 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2911
2912 #### Windows (GPO)
2913 ```
2914 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2915 ```
2916 #### macOS
2917 ```
2918 <dict>
2919 <key>SearchSuggestEnabled</key>
2920 <true/> | <false/>
2921 </dict>
2922 ```
2923 #### policies.json
2924 ```
2925 {
2926 "policies": {
2927 "SearchSuggestEnabled": true | false
2928 }
2929 }
2930 ```
2931 ### SecurityDevices
2932
2933 Install PKCS #11 modules.
2934
2935 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2936 **CCK2 Equivalent:** `certs.devices`\
2937 **Preferences Affected:** N/A
2938
2939 #### Windows (GPO)
2940 ```
2941 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2942 ```
2943 #### macOS
2944 ```
2945 <dict>
2946 <key>SecurityDevices</key>
2947 <dict>
2948 <key>NAME_OF_DEVICE</key>
2949 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2950 </dict>
2951 </dict>
2952 ```
2953
2954 #### policies.json
2955 ```
2956 {
2957 "policies": {
2958 "SecurityDevices": {
2959 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2960 }
2961 }
2962 }
2963 ```
2964 ### SSLVersionMax
2965
2966 Set and lock the maximum version of TLS.
2967
2968 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2969 **CCK2 Equivalent:** N/A\
2970 **Preferences Affected:** `security.tls.version.max`
2971
2972 #### Windows (GPO)
2973 ```
2974 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2975 ```
2976 #### macOS
2977 ```
2978 <dict>
2979 <key>SSLVersionMax</key>
2980 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2981 </dict>
2982 ```
2983
2984 #### policies.json
2985 ```
2986 {
2987 "policies": {
2988 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2989 }
2990 }
2991 ```
2992 ### SSLVersionMin
2993
2994 Set and lock the minimum version of TLS.
2995
2996 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2997 **CCK2 Equivalent:** N/A\
2998 **Preferences Affected:** `security.tls.version.min`
2999
3000 #### Windows (GPO)
3001 ```
3002 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3003 ```
3004 #### macOS
3005 ```
3006 <dict>
3007 <key>SSLVersionMin</key>
3008 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
3009 </dict>
3010 ```
3011
3012 #### policies.json
3013 ```
3014 {
3015 "policies": {
3016 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
3017 }
3018 }
3019 ```
3020 ### SupportMenu
3021 Add a menuitem to the help menu for specifying support information.
3022
3023 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
3024 **CCK2 Equivalent:** helpMenu\
3025 **Preferences Affected:** N/A
3026
3027 #### Windows (GPO)
3028 ```
3029 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3030 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3031 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3032 ```
3033 #### macOS
3034 ```
3035 <dict>
3036 <key>SupportMenu</key>
3037 <dict>
3038 <key>Title</key>
3039 <string>SupportMenu</string>
3040 <key>URL</key>
3041 <string>http://example.com/support</string>
3042 <key>AccessKey</key>
3043 <string>S</string>
3044 </dict>
3045 </dict>
3046 ```
3047 #### policies.json
3048 ```
3049 {
3050 "policies": {
3051 "SupportMenu": {
3052 "Title": "Support Menu",
3053 "URL": "http://example.com/support",
3054 "AccessKey": "S"
3055 }
3056 }
3057 }
3058 ```
3059 ### UserMessaging
3060
3061 Prevent installing search engines from webpages.
3062
3063 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3064
3065 `ExtensionRecommendations` Don't recommend extensions.
3066
3067 `FeatureRecommendations` Don't recommend browser features.
3068
3069 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3070
3071 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3072 **CCK2 Equivalent:** N/A\
3073 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3074
3075 #### Windows (GPO)
3076 ```
3077 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3078 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3079 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3080 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3081 ```
3082 #### macOS
3083 ```
3084 <dict>
3085 <key>UserMessaging</key>
3086 <dict>
3087 <key>WhatsNew</key>
3088 <true/> | <false/>
3089 <key>ExtensionRecommendations</key>
3090 <true/> | <false/>
3091 <key>FeatureRecommendations</key>
3092 <true/> | <false/>
3093 <key>UrlbarInterventions</key>
3094 <true/> | <false/>
3095 </dict>
3096 </dict>
3097 ```
3098 #### policies.json
3099 ```
3100 {
3101 "policies": {
3102 "UserMessaging": {
3103 "WhatsNew": true | false,
3104 "ExtensionRecommendations": true | false,
3105 "FeatureRecommendations": true | false,
3106 "UrlbarInterventions": true | false
3107 }
3108 }
3109 }
3110 ```
3111 ### WebsiteFilter
3112 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3113
3114 **Compatibility:** Firefox 60, Firefox ESR 60\
3115 **CCK2 Equivalent:** N/A\
3116 **Preferences Affected:** N/A
3117
3118 #### Windows (GPO)
3119 ```
3120 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3121 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3122 ```
3123 #### macOS
3124 ```
3125 <dict>
3126 <key>WebsiteFilter</key>
3127 <dict>
3128 <key>Block</key>
3129 <array>
3130 <string><all_urls></string>
3131 </array>
3132 <key>Exceptions</key>
3133 <array>
3134 <string>http://example.org/*</string>
3135 </array>
3136 </dict>
3137
3138 </dict>
3139 ```
3140 #### policies.json
3141 ```
3142 {
3143 "policies": {
3144 "WebsiteFilter": {
3145 "Block": ["<all_urls>"],
3146 "Exceptions": ["http://example.org/*"]
3147 }
3148 }
3149 }
3150 ```

patrick-canterino.de