]> git.p6c8.net - policy-templates.git/blob - README.md
Update firefox.adml
[policy-templates.git] / README.md
1 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
2
3 | Policy Name | Description
4 | --- | --- |
5 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
6 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
7 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
8 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
9 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
10 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
11 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
12 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
13 | **[`Certificates`](#certificates)** |
14 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
15 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
16 | **[`Cookies`](#cookies)** | Configure cookie preferences.
17 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
18 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
19 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
20 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
21 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
22 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
23 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
24 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
25 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
26 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
27 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
28 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
29 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
30 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
31 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
32 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
33 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
34 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
35 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
36 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
37 | **[`DisplayMenuBar`](#displaymenubar)** | Set the initial state of the menubar.
38 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
39 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
40 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
41 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
42 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
43 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
44 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
45 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
46 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
47 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
48 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
49 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
50 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
51 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
52 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
53 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
54 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
55 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
56 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
57 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
58 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
59 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
60 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
61 | **[`Preferences`](#preferences)** | Set and lock some preferences.
62 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
63 | **[`Proxy`](#proxy)** | Configure proxy settings.
64 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
65 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
66 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
67 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
68 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
69 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
70 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
71 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
72 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
73 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
74 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
75 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
76 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
77 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
78 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
79
80 ### AppUpdateURL
81
82 Change the URL for application update.
83
84 **Compatibility:** Firefox 62, Firefox ESR 60.2\
85 **CCK2 Equivalent:** N/A\
86 **Preferences Affected:** `app.update.url`
87
88 #### Windows
89 ```
90 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
91 ```
92 #### macOS
93 ```
94 <dict>
95 <key>AppUpdateURL</key>
96 <string>https://yoursite.com</string>
97 </dict>
98 ```
99 ### JSON
100 ```
101 {
102 "policies": {
103 "AppUpdateURL": "https://yoursite.com"
104 }
105 }
106 ```
107 ### Authentication
108
109 Configure sites that support integrated authentication.
110
111 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
112
113 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2)\
114 **CCK2 Equivalent:** N/A\
115 **Preferences Affected:** `network.negotiate-auth.trusted-uris`, `network.negotiate-auth.delegation-uris`, `network.automatic-ntlm-auth.trusted-uris`, `network.automatic-ntlm-auth.allow-non-fqdn`, `network.negotiate-auth.allow-non-fqdn`
116
117 #### Windows
118 ```
119 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
120 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
121 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
122 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
123 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
124 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
125 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
126 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
127 ```
128 #### macOS
129 ```
130 <dict>
131 <key>Authentication</key>
132 <dict>
133 <key>SPNEGO</key>
134 <array>
135 <string>mydomain.com</string>
136 <string>https://myotherdomain.com</string>
137 </array>
138 <key>Delegated</key>
139 <array>
140 <string>mydomain.com</string>
141 <string>https://myotherdomain.com</string>
142 </array>
143 <key>NTLM</key>
144 <array>
145 <string>mydomain.com</string>
146 <string>https://myotherdomain.com</string>
147 </array>
148 <key>AllowNonFQDN</key>
149 <dict>
150 <key>SPNEGO</key>
151 <true/> | <false/>
152 <key>NTLM</key>
153 <true/> | <false/>
154 </dict>
155 </dict>
156 </dict>
157 ```
158 ### JSON
159 ```
160 {
161 "policies": {
162 "Authentication": {
163 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
164 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
165 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
166 "AllowNonFQDN": {
167 "SPNEGO": true | false,
168 "NTLM": true | false
169 }
170 }
171 }
172 }
173 ```
174 ### BlockAboutAddons
175
176 Block access to the Add-ons Manager (about:addons).
177
178 **Compatibility:** Firefox 60, Firefox ESR 60\
179 **CCK2 Equivalent:** `disableAddonsManager`\
180 **Preferences Affected:** N/A
181
182 #### Windows
183 ```
184 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
185 ```
186 #### macOS
187 ```
188 <dict>
189 <key>BlockAboutAddons</key>
190 <true/> | <false/>
191 </dict>
192 ```
193 #### JSON
194 ```
195 {
196 "policies": {
197 "BlockAboutAddons": true | false
198 }
199 }
200 ```
201 ### BlockAboutConfig
202
203 Block access to about:config.
204
205 **Compatibility:** Firefox 60, Firefox ESR 60\
206 **CCK2 Equivalent:** `disableAboutConfig`\
207 **Preferences Affected:** N/A
208
209 #### Windows
210 ```
211 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
212 ```
213 #### macOS
214 ```
215 <dict>
216 <key>BlockAboutConfig</key>
217 <true/> | <false/>
218 </dict>
219 ```
220 #### JSON
221 ```
222 {
223 "policies": {
224 "BlockAboutConfig": true | false
225 }
226 }
227 ```
228 ### BlockAboutProfiles
229
230 Block access to About Profiles (about:profiles).
231
232 **Compatibility:** Firefox 60, Firefox ESR 60\
233 **CCK2 Equivalent:** `disableAboutProfiles`\
234 **Preferences Affected:** N/A
235
236 #### Windows
237 ```
238 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
239 ```
240 #### macOS
241 ```
242 <dict>
243 <key>BlockAboutProfiles</key>
244 <true/> | <false/>
245 </dict>
246 ```
247 #### JSON
248 ```
249 {
250 "policies": {
251 "BlockAboutProfiles": true | false
252 }
253 }
254 ```
255 ### BlockAboutSupport
256
257 Block access to Troubleshooting Information (about:support).
258
259 **Compatibility:** Firefox 60, Firefox ESR 60\
260 **CCK2 Equivalent:** `disableAboutSupport`\
261 **Preferences Affected:** N/A
262
263 #### Windows
264 ```
265 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
266 ```
267 #### macOS
268 ```
269 <dict>
270 <key>BlockAboutSupport</key>
271 <true/> | <false/>
272 </dict>
273 ```
274 #### JSON
275 ```
276 {
277 "policies": {
278 "BlockAboutSupport": true | false
279 }
280 }
281 ```
282 ### Bookmarks
283
284 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
285
286 **Compatibility:** Firefox 60, Firefox ESR 60\
287 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
288 **Preferences Affected:** N/A
289
290 #### Windows
291 ```
292 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
293 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
294 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
295 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
296 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
297 ```
298 #### macOS
299 ```
300 <dict>
301 <key>Bookmarks</key>
302 <array>
303 <dict>
304 <key>Title</key>
305 <string>Example</string>
306 <key>URL</key>
307 <string>https://example.com</string>
308 <key>Favicon</key>
309 <string>https://example.com/favicon.ico</string>
310 <key>Placement</key>
311 <string>toolbar | menu</string>
312 <key>Folder</key>
313 <string>FolderName</string>
314 </dict>
315 </array>
316 </dict>
317 ```
318 ### JSON
319 ```
320 {
321 "policies": {
322 "Bookmarks": [
323 {
324 "Title": "Example",
325 "URL": "https://example.com",
326 "Favicon": "https://example.com/favicon.ico",
327 "Placement": "toolbar" | "menu",
328 "Folder": "FolderName"
329 }
330 ]
331 }
332 }
333 ```
334 ### CaptivePortal
335 Enable or disable the detection of captive portals.
336
337 **Compatibility:** Firefox 67, Firefox ESR 60.7\
338 **CCK2 Equivalent:** N/A\
339 **Preferences Affected:** `network.captive-portal-service.enabled`
340
341 #### Windows
342 ```
343 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
344 ```
345 #### macOS
346 ```
347 <dict>
348 <key>CaptivePortal</key>
349 <true/> | <false/>
350 </dict>
351 ```
352 #### JSON
353 ```
354 {
355 "policies": {
356 "CaptivePortal": true | false
357 }
358 }
359 ```
360 ### Certificates
361
362 ### Certificates | ImportEnterpriseRoots
363
364 Trust certificates that have been added to the operating system certificate store by a user or administrator.
365
366 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
367
368 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
369 **CCK2 Equivalent:** N/A\
370 **Preferences Affected:** `security.enterprise_roots.enabled`
371
372 #### Windows
373 ```
374 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
375 ```
376 #### macOS
377 ```
378 <dict>
379 <key>Certificates</key>
380 <dict>
381 <key>ImportEnterpriseRoots</key>
382 <true/> | <false/>
383 </dict>
384 </dict>
385 ```
386 #### JSON
387 ```
388 {
389 "policies": {
390 "Certificates": {
391 "ImportEnterpriseRoots": true | false
392 }
393 }
394 }
395 ```
396 ### Certificates | Install
397
398 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
399
400 - Windows
401 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
402 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
403 - macOS
404 - /Library/Application Support/Mozilla/Certificates
405 - ~/Library/Application Support/Mozilla/Certificates
406 - Linux
407 - /usr/lib/mozilla/certificates
408 - /usr/lib64/mozilla/certificates
409 - ~/.mozilla/certificates
410
411 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
412
413 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
414
415 Certificates are installed using the trust string `CT,CT,`.
416
417 Binary (DER) and ASCII (PEM) certificates are both supported.
418
419 **Compatibility:** Firefox 64, Firefox ESR 64\
420 **CCK2 Equivalent:** `certs.ca`\
421 **Preferences Affected:** N/A
422
423 #### Windows
424 ```
425 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
426 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
427 ```
428 #### macOS
429 ```
430 <dict>
431 <key>Certificates</key>
432 <dict>
433 <key>Install</key>
434 <array>
435 <string>cert1.der</string>
436 <string>/Users/username/cert2.pem</string>
437 </array>
438 </dict>
439 </dict>
440 ```
441 #### JSON
442 ```
443 {
444 "policies": {
445 "Certificates": {
446 "Install": ["cert1.der", "/home/username/cert2.pem"]
447 }
448 }
449 }
450 ```
451 ### Cookies
452 Configure cookie preferences.
453
454 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
455
456 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
457
458 `Default` determines whether cookies are accepted at all.
459
460 `AcceptThirdParty` determines how third-party cookies are handled.
461
462 `ExpireAtSessionEnd` determines when cookies expire.
463
464 `RejectTracker` only rejects cookies for trackers.
465
466 `Locked` prevents the user from changing cookie preferences.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
469 **CCK2 Equivalent:** N/A\
470 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
471
472 #### Windows
473 ```
474 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
475 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
476 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
477 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
478 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
479 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
480 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
481 ```
482 #### macOS
483 ```
484 <dict>
485 <key>Cookies</key>
486 <dict>
487 <key>Allow</key>
488 <array>
489 <string>http://example.com</string>
490 </array>
491 <key>Block</key>
492 <array>
493 <string>http://example.org</string>
494 </array>
495 <key>Default</key>
496 <true/> | <false/>
497 <key>AcceptThirdParty</key>
498 <string>always | never | from-visited</string>
499 <key>ExpireAtSessionEnd</key>
500 <true/> | <false/>
501 <key>RejectTracker</key>
502 <true/> | <false/>
503 <key>Locked</key>
504 <true/> | <false/>
505 </dict>
506 </dict>
507 ```
508 #### JSON
509 ```
510 {
511 "policies": {
512 "Cookies": {
513 "Allow": ["http://example.org/"],
514 "Block": ["http://example.edu/"],
515 "Default": true | false,
516 "AcceptThirdParty": "always" | "never" | "from-visited"],
517 "ExpireAtSessionEnd": true | false,
518 "RejectTracker": true | false,
519 "Locked": true | false
520 }
521 }
522 }
523 ```
524 ### DisableSetDesktopBackground
525 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
526
527 **Compatibility:** Firefox 60, Firefox ESR 60\
528 **CCK2 Equivalent:** `removeSetDesktopBackground`\
529 **Preferences Affected:** N/A
530
531 #### Windows
532 ```
533 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
534 ```
535
536 #### macOS
537 ```
538 <dict>
539 <key>DisableSetDesktopBackground</key>
540 <true/> | <false/>
541 </dict>
542 ```
543 #### JSON
544 ```
545 {
546 "policies": {
547 "DisableSetDesktopBackground": true | false
548 }
549 }
550 ```
551 ### DisableMasterPasswordCreation
552 Remove the master password functionality.
553
554 **Compatibility:** Firefox 60, Firefox ESR 60\
555 **CCK2 Equivalent:** `noMasterPassword`\
556 **Preferences Affected:** N/A
557
558 #### Windows
559 ```
560 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
561 ```
562
563 #### macOS
564 ```
565 <dict>
566 <key>DisableMasterPasswordCreation</key>
567 <true/> | <false/>
568 </dict>
569 ```
570 #### JSON
571 ```
572 {
573 "policies": {
574 "DisableMasterPasswordCreation": true | false
575 }
576 }
577 ```
578 ### DisableAppUpdate
579 Turn off application updates.
580
581 **Compatibility:** Firefox 60, Firefox ESR 60\
582 **CCK2 Equivalent:** `disableFirefoxUpdates`\
583 **Preferences Affected:** N/A
584
585 #### Windows
586 ```
587 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
588 ```
589 #### macOS
590 ```
591 <dict>
592 <key>DisableAppUpdate</key>
593 <true/> | <false/>
594 </dict>
595 ```
596 #### JSON
597 ```
598 {
599 "policies": {
600 "DisableAppUpdate": true | false
601 }
602 }
603 ```
604 ### DisableBuiltinPDFViewer
605 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
606
607 **Compatibility:** Firefox 60, Firefox ESR 60\
608 **CCK2 Equivalent:** `disablePDFjs`\
609 **Preferences Affected:** `pdfjs.disabled`
610
611 #### Windows
612 ```
613 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
614 ```
615
616 #### macOS
617 ```
618 <dict>
619 <key>DisableBuiltinPDFViewer</key>
620 <true/> | <false/>
621 </dict>
622 ```
623 #### JSON
624 ```
625 {
626 "policies": {
627 "DisableBuiltinPDFViewer": true | false
628 }
629 }
630 ```
631 ### DisableDeveloperTools
632 Remove access to all developer tools.
633
634 **Compatibility:** Firefox 60, Firefox ESR 60\
635 **CCK2 Equivalent:** `removeDeveloperTools`\
636 **Preferences Affected:** `devtools.policy.disabled`
637
638 #### Windows
639 ```
640 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
641 ```
642
643 #### macOS
644 ```
645 <dict>
646 <key>DisableDeveloperTools</key>
647 <true/> | <false/>
648 </dict>
649 ```
650 #### JSON
651 ```
652 {
653 "policies": {
654 "DisableDeveloperTools": true | false
655 }
656 }
657 ```
658 ### DisableFeedbackCommands
659 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
660
661 **Compatibility:** Firefox 60, Firefox ESR 60\
662 **CCK2 Equivalent:** N/A\
663 **Preferences Affected:** N/A
664
665 #### Windows
666 ```
667 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
668 ```
669 #### macOS
670 ```
671 <dict>
672 <key>DisableFeedbackCommands</key>
673 <true/> | <false/>
674 </dict>
675 ```
676 #### JSON
677 ```
678 {
679 "policies": {
680 "DisableFeedbackCommands": true | false
681 }
682 }
683 ```
684 ### DisableFirefoxScreenshots
685 Remove access to Firefox Screenshots.
686
687 **Compatibility:** Firefox 60, Firefox ESR 60\
688 **CCK2 Equivalent:** N/A\
689 **Preferences Affected:** `extensions.screenshots.disabled`
690
691 #### Windows
692 ```
693 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
694 ```
695 #### macOS
696 ```
697 <dict>
698 <key>DisableFirefoxScreenshots</key>
699 <true/> | <false/>
700 </dict>
701 ```
702 #### JSON
703 ```
704 {
705 "policies": {
706 "DisableFirefoxScreenshots": true | false
707 }
708 }
709 ```
710 ### DisableFirefoxAccounts
711 Disable Firefox Accounts integration (Sync).
712
713 **Compatibility:** Firefox 60, Firefox ESR 60\
714 **CCK2 Equivalent:** `disableSync`\
715 **Preferences Affected:** `identity.fxaccounts.enabled`
716
717 #### Windows
718 ```
719 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
720 ```
721 #### macOS
722 ```
723 <dict>
724 <key>DisableFirefoxAccounts</key>
725 <true/> | <false/>
726 </dict>
727 ```
728 #### JSON
729 ```
730 {
731 "policies": {
732 "DisableFirefoxAccounts": true | false
733 }
734 }
735 ```
736 ### DisableFirefoxStudies
737 Disable Firefox studies (Shield).
738
739 **Compatibility:** Firefox 60, Firefox ESR 60\
740 **CCK2 Equivalent:** `disableForget`\
741 **Preferences Affected:** N/A
742
743 #### Windows
744 ```
745 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
746 ```
747 #### macOS
748 ```
749 <dict>
750 <key>DisableFirefoxStudies</key>
751 <true/> | <false/>
752 </dict>
753 ```
754 #### JSON
755 ```
756 {
757 "policies": {
758 "DisableFirefoxStudies": true | false
759 }
760 }
761 ```
762 ### DisableForgetButton
763 Disable the "Forget" button.
764
765 **Compatibility:** Firefox 60, Firefox ESR 60\
766 **CCK2 Equivalent:** `disableForget`\
767 **Preferences Affected:** N/A
768
769 #### Windows
770 ```
771 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
772 ```
773 #### macOS
774 ```
775 <dict>
776 <key>DisableForgetButton</key>
777 <true/> | <false/>
778 </dict>
779 ```
780 #### JSON
781 ```
782 {
783 "policies": {
784 "DisableForgetButton": true | false
785 }
786 }
787 ```
788 ### DisableFormHistory
789 Turn off saving information on web forms and the search bar.
790
791 **Compatibility:** Firefox 60, Firefox ESR 60\
792 **CCK2 Equivalent:** `disableFormFill`\
793 **Preferences Affected:** ` browser.formfill.enable`
794
795 #### Windows
796 ```
797 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
798 ```
799 #### macOS
800 ```
801 <dict>
802 <key>DisableFormHistory</key>
803 <true/> | <false/>
804 </dict>
805 ```
806 #### JSON
807 ```
808 {
809 "policies": {
810 "DisableFormHistory": true | false
811 }
812 }
813 ```
814 ### DisablePocket
815 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
816
817 **Compatibility:** Firefox 60, Firefox ESR 60\
818 **CCK2 Equivalent:** `disablePocket`\
819 **Preferences Affected:** `extensions.pocket.enabled`
820
821 #### Windows
822 ```
823 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
824 ```
825 #### macOS
826 ```
827 <dict>
828 <key>DisablePocket</key>
829 <true/> | <false/>
830 </dict>
831 ```
832 #### JSON
833 ```
834 {
835 "policies": {
836 "DisablePocket": true | false
837 }
838 }
839 ```
840 ### DisablePrivateBrowsing
841 Remove access to private browsing.
842
843 **Compatibility:** Firefox 60, Firefox ESR 60\
844 **CCK2 Equivalent:** `disablePrivateBrowsing`\
845 **Preferences Affected:** N/A
846
847 #### Windows
848 ```
849 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
850 ```
851 #### macOS
852 ```
853 <dict>
854 <key>DisablePrivateBrowsing</key>
855 <true/> | <false/>
856 </dict>
857 ```
858 #### JSON
859 ```
860 {
861 "policies": {
862 "DisablePrivateBrowsing": true | false
863 }
864 }
865 ```
866 ### DisableProfileImport
867 Disables the "Import data from another browser" option in the bookmarks window.
868
869 **Compatibility:** Firefox 60, Firefox ESR 60\
870 **CCK2 Equivalent:** N/A\
871 **Preferences Affected:** N/A
872
873 #### Windows
874 ```
875 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
876 ```
877 #### macOS
878 ```
879 <dict>
880 <key>DisableProfileImport</key>
881 <true/> | <false/>
882 </dict>
883 ```
884 #### JSON
885 ```
886 {
887 "policies": {
888 "DisableProfileImport": true | false
889 }
890 }
891 ```
892 ### DisableProfileRefresh
893 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
894
895 **Compatibility:** Firefox 60, Firefox ESR 60\
896 **CCK2 Equivalent:** `disableResetFirefox`\
897 **Preferences Affected:** `browser.disableResetPrompt`
898
899 #### Windows
900 ```
901 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
902 ```
903 #### macOS
904 ```
905 <dict>
906 <key>DisableProfileRefresh</key>
907 <true/> | <false/>
908 </dict>
909 ```
910 #### JSON
911 ```
912 {
913 "policies": {
914 "DisableProfileRefresh": true | false
915 }
916 }
917 ```
918 ### DisableSafeMode
919 Disable safe mode within the browser.
920
921 On Windows, this disables safe mode via the command line as well.
922
923 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
924 **CCK2 Equivalent:** `disableSafeMode`\
925 **Preferences Affected:** N/A
926
927 #### Windows
928 ```
929 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
930 ```
931 #### macOS
932 ```
933 <dict>
934 <key>DisableSafeMode</key>
935 <true/> | <false/>
936 </dict>
937 ```
938 #### JSON
939 ```
940 {
941 "policies": {
942 "DisableSafeMode": true | false
943 }
944 }
945 ```
946 ### DisableSecurityBypass
947 Prevent the user from bypassing security in certain cases.
948
949 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
950
951 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
952
953 **Compatibility:** Firefox 60, Firefox ESR 60\
954 **CCK2 Equivalent:** N/A\
955 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
956
957 #### Windows
958 ```
959 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
960 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
961 ```
962 #### macOS
963 ```
964 <dict>
965 <key>DisableSecurityBypass</key>
966 <dict>
967 <key>InvalidCertificate</key>
968 <true/> | <false/>
969 <key><SafeBrowsing/key>
970 <true/> | <false/>
971 </dict>
972 </dict>
973 ```
974 #### JSON
975 ```
976 {
977 "policies": {
978 "DisableSecurityBypass": {
979 "InvalidCertificate": true false,
980 "SafeBrowsing": true false
981 }
982 }
983 }
984 ```
985 ### DisableSystemAddonUpdate
986 Prevent system add-ons from being installed or update.
987
988 **Compatibility:** Firefox 60, Firefox ESR 60\
989 **CCK2 Equivalent:** N/A\
990 **Preferences Affected:** N/A
991
992 #### Windows
993 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
994 ```
995 #### macOS
996 ```
997 <dict>
998 <key>DisableSystemAddonUpdate</key>
999 <true/> | <false/>
1000 </dict>
1001 ```
1002 #### JSON
1003 ```
1004 {
1005 "policies": {
1006 "DisableSystemAddonUpdate": true | false
1007 }
1008 }
1009 ```
1010 ### DisableTelemetry
1011 Prevent the upload of telemetry data.
1012
1013 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1014
1015 **Compatibility:** Firefox 60, Firefox ESR 60\
1016 **CCK2 Equivalent:** `disableTelemetry`\
1017 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1018
1019 #### Windows
1020 ```
1021 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1022 ```
1023 #### macOS
1024 ```
1025 <dict>
1026 <key>DisableTelemetry</key>
1027 <true/> | <false/>
1028 </dict>
1029 ```
1030 #### JSON
1031 ```
1032 {
1033 "policies": {
1034 "DisableTelemetry": true | false
1035 }
1036 }
1037 ```
1038 ### DisplayBookmarksToolbar
1039 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1040
1041 **Compatibility:** Firefox 60, Firefox ESR 60\
1042 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1043 **Preferences Affected:** N/A
1044
1045 #### Windows
1046 ```
1047 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1048 ```
1049 #### macOS
1050 ```
1051 <dict>
1052 <key>DisplayBookmarksToolbar</key>
1053 <true/> | <false/>
1054 </dict>
1055 ```
1056 #### JSON
1057 ```
1058 {
1059 "policies": {
1060 "DisplayBookmarksToolbar": true | false
1061 }
1062 }
1063 ```
1064 ### DisplayMenuBar
1065 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1066
1067 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1068 **CCK2 Equivalent:** `displayMenuBar`\
1069 **Preferences Affected:** N/A
1070
1071 #### Windows
1072 ```
1073 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1074 ```
1075 #### macOS
1076 ```
1077 <dict>
1078 <key>DisplayMenuBar</key>
1079 <true/> | <false/>
1080 </dict>
1081 ```
1082 #### JSON
1083 ```
1084 {
1085 "policies": {
1086 "DisplayMenuBar": true | false
1087 }
1088 }
1089 ```
1090 ### DNSOverHTTPS
1091 Configure DNS over HTTPS.
1092
1093 `Enabled` determines whether DNS over HTTPS is enabled
1094
1095 `ProviderURL` is a URL to another provider.
1096
1097 `Locked` prevents the user from changing DNS over HTTPS preferences.
1098
1099 **Compatibility:** Firefox 63, Firefox ESR 68\
1100 **CCK2 Equivalent:** N/A\
1101 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1102
1103 #### Windows
1104 ```
1105 Software\Policies\Mozilla\Firefox\Cookies\Enabled = 0x1 | 0x0
1106 Software\Policies\Mozilla\Firefox\Cookies\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1107 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
1108 ```
1109 #### macOS
1110 ```
1111 <dict>
1112 <key>Cookies</key>
1113 <dict>
1114 <key>Enabled</key>
1115 <true/> | <false/>
1116 <key>ProviderURL</key>
1117 <string>URL_TO_ALTERNATE_PROVIDER</string>
1118 <key>Locked</key>
1119 <true/> | <false/>
1120 </dict>
1121 </dict>
1122 ```
1123 #### JSON
1124 ```
1125 {
1126 "policies": {
1127 "DNSOverHTTPS": {
1128 "Enabled": true | false,
1129 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1130 "Locked": true | false
1131 }
1132 }
1133 }
1134 ```
1135 ### DontCheckDefaultBrowser
1136 Don't check if Firefox is the default browser at startup.
1137
1138 **Compatibility:** Firefox 60, Firefox ESR 60\
1139 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1140 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1141
1142 #### Windows
1143 ```
1144 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1145 ```
1146 #### macOS
1147 ```
1148 <dict>
1149 <key>DontCheckDefaultBrowser</key>
1150 <true/> | <false/>
1151 </dict>
1152 ```
1153 #### JSON
1154 ```
1155 {
1156 "policies": {
1157 "DontCheckDefaultBrowser": true | false
1158 }
1159 }
1160 ```
1161 ### DefaultDownloadDirectory
1162 Set the default download directory.
1163
1164 You can use ${home} for the native home directory.
1165
1166 **Compatibility:** Firefox 68, Firefox ESR 68\
1167 **CCK2 Equivalent:** N/A\
1168 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1169
1170 #### Windows
1171 ```
1172 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1173 ```
1174 #### macOS
1175 ```
1176 <dict>
1177 <key>DefaultDownloadDirectory</key>
1178 <string>${home}/Downloads</string>
1179 </dict>
1180 ```
1181 #### JSON
1182 ```
1183 {
1184 "policies": {
1185 "DefaultDownloadDirectory": "${home}/Downloads"
1186 }
1187 ```
1188 ### DownloadDirectory
1189 Set and lock the download directory.
1190
1191 You can use ${home} for the native home directory.
1192
1193 **Compatibility:** Firefox 68, Firefox ESR 68\
1194 **CCK2 Equivalent:** N/A\
1195 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1196
1197 #### Windows
1198 ```
1199 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1200 ```
1201 #### macOS
1202 ```
1203 <dict>
1204 <key>DownloadDirectory</key>
1205 <string>${home}/Downloads</string>
1206 </dict>
1207 ```
1208 #### JSON
1209 ```
1210 {
1211 "policies": {
1212 "DownloadDirectory": "${home}/Downloads"
1213 }
1214 ```
1215 ### EnableTrackingProtection
1216 Configure tracking protection.
1217
1218 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1219
1220 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1221
1222 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1223
1224 **Compatibility:** Firefox 60, Firefox ESR 60\
1225 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1226 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`
1227
1228 #### Windows
1229 ```
1230 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1231 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1232 ```
1233 #### macOS
1234 ```
1235 <dict>
1236 <key>EnableTrackingProtection</key>
1237 <dict>
1238 <key>Value</key>
1239 <true/> | <false/>
1240
1241 <key><Locked/key>
1242 <true/> | <false/>
1243 </dict>
1244 </dict>
1245 ```
1246 #### JSON
1247 ```
1248 {
1249 "policies": {
1250 "EnableTrackingProtection": {
1251 "Value": [true, false],
1252 "Locked": [true, false]
1253 }
1254 }
1255 ```
1256 ### EnterprisePoliciesEnabled
1257 Enable policy support on macOS.
1258
1259 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1260 **CCK2 Equivalent:** N/A\
1261 **Preferences Affected:** N/A
1262
1263 #### macOS
1264 ```
1265 <dict>
1266 <key>EnterprisePoliciesEnabled</key>
1267 <true/>
1268 </dict>
1269 ```
1270 ### Extensions
1271 Control the installation, uninstallation and locking of extensions.
1272
1273 `Install` is a list of URLs or native paths for extensions to be installed.
1274
1275 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1276
1277 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1278
1279 **Compatibility:** Firefox 60, Firefox ESR 60\
1280 **CCK2 Equivalent:** `addons`\
1281 **Preferences Affected:** N/A
1282
1283 #### Windows
1284 ```
1285 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1286 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1287 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1288 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1289 ```
1290 #### macOS
1291 ```
1292 <dict>
1293 <key>Extensions</key>
1294 <dict>
1295 <key>Install</key>
1296 <array>
1297 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1298 <string>//path/to/xpi</string>
1299 </array>
1300 <key>Uninstall</key>
1301 <array>
1302 <string>bad_addon_id@mozilla.org</string>
1303 </array>
1304 <key>Locked</key>
1305 <array>
1306 <string>addon_id@mozilla.org</string>
1307 </array>
1308 </dict>
1309 </dict>
1310 ```
1311 #### JSON
1312
1313
1314 ```
1315 {
1316 "policies": {
1317 "Extensions": {
1318 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1319 "Uninstall": ["bad_addon_id@mozilla.org"],
1320 "Locked": ["addon_id@mozilla.org"]
1321 }
1322 }
1323 }
1324 ```
1325 ### ExtensionSettings
1326 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1327
1328 This policy maps an extension ID to its configuration. With an extension ID, configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1329
1330 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1331
1332 The configuration for each extension is another dictionary that can contain the fields documented below.
1333
1334 | Name | Description |
1335 | --- | --- |
1336 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1337 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1338 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1339 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1340 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1341 | `install_url`| Maps to a string indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi
1342 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1343 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1344 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1345
1346 **Compatibility:** Firefox 68, Firefox ESR 68, Firefox 68.0.1 (Windows)\
1347 **CCK2 Equivalent:** N/A\
1348 **Preferences Affected:** N/A
1349
1350 #### Windows
1351 Currently, you have to remove all newlines from your JSON. We will be removing that limitation in a future release.
1352
1353 Software\Policies\Mozilla\Firefox\ExtensionSettings = '{"*": {"installation_mode": "blocked"}}`
1354 #### macOS
1355 ```
1356 <dict>
1357 <key>ExtensionSettings</key>
1358 <dict>
1359 <key>*</key>
1360 <dict>
1361 <key>blocked_install_message</key>
1362 <string>Custom error message.</string>
1363 <key>install_sources</key>
1364 <array>
1365 <string>https://addons.mozilla.org/</string>
1366 </array>
1367 <key>installation_mode</key>
1368 <string>blocked</string>
1369 </dict>
1370 <key>uBlock0@raymondhill.net</key>
1371 <dict>
1372 <key>installation_mode</key>
1373 <string>force_installed</string>
1374 <key>install_url</key>
1375 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1376 </dict>
1377 </dict>
1378 </dict>
1379 ```
1380 #### JSON
1381 ```
1382 {
1383 "policies": {
1384 "ExtensionSettings": {
1385 "*": {
1386 "blocked_install_message": "Custom error message.",
1387 "install_sources": ["https://addons.mozilla.org/"],
1388 "installation_mode": "blocked"
1389 },
1390 "uBlock0@raymondhill.net": {
1391 "installation_mode": "force_installed",
1392 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1393 }
1394 }
1395 }
1396 }
1397 ```
1398
1399 ### ExtensionUpdate
1400 Control extension updates.
1401
1402 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1403 **CCK2 Equivalent:** N/A\
1404 **Preferences Affected:** `extensions.update.enabled`
1405
1406 #### Windows
1407 ```
1408 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1409 ```
1410 #### macOS
1411 ```
1412 <dict>
1413 <key>ExtensionUpdate</key>
1414 <true/> | <false/>
1415 </dict>
1416 ```
1417 #### JSON
1418 ```
1419 {
1420 "policies": {
1421 "ExtensionUpdate": true | false
1422 }
1423 }
1424 ```
1425 ### FlashPlugin
1426 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1427
1428 `Allow` is a list of origins where Flash are allowed.
1429
1430 `Block` is a list of origins where Flash is not allowed.
1431
1432 `Default` determines whether or not Flash is allowed by default.
1433
1434 `Locked` prevents the user from changing Flash preferences.
1435
1436 **Compatibility:** Firefox 60, Firefox ESR 60\
1437 **CCK2 Equivalent:** `permissions.plugin`\
1438 **Preferences Affected:** `plugin.state.flash`
1439
1440 #### Windows
1441 ```
1442 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1443 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1444 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1445 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1446 ```
1447 #### macOS
1448 ```
1449 <dict>
1450 <key>FlashPlugin</key>
1451 <dict>
1452 <key>Allow</key>
1453 <array>
1454 <string>http://example.org</string>
1455 </array>
1456 <key>Block</key>
1457 <array>
1458 <string>http://example.edu</string>
1459 </array>
1460 <key>Default</key>
1461 <true/> | <false/>
1462 <key>Locked</key>
1463 <true/> | <false/>
1464 </dict>
1465 </dict>
1466 ```
1467 #### JSON
1468 ```
1469 {
1470 "policies": {
1471 "FlashPlugin": {
1472 "Allow": ["http://example.org/"],
1473 "Block": ["http://example.edu/"],
1474 "Default": true | false,
1475 "Locked": true | false
1476 }
1477 }
1478 }
1479 ```
1480 ### FirefoxHome
1481 Customize the Firefox Home page.
1482
1483 **Compatibility:** Firefox 68, Firefox ESR 68\
1484 **CCK2 Equivalent:** N/A\
1485 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1486
1487 #### Windows
1488 ```
1489 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1490 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1491 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1492 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1493 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1494 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1495 ```
1496 #### macOS
1497 ```
1498 <dict>
1499 <key>FirefoxHome</key>
1500 <dict>
1501 <key>Search</key>
1502 <true/> | <false/>
1503 <key>TopSites</key>
1504 <true/> | <false/>
1505 <key>Highlights</key>
1506 <true/> | <false/>
1507 <key>Pocket</key>
1508 <true/> | <false/>
1509 <key>Snippets</key>
1510 <true/> | <false/>
1511 <key>Locked</key>
1512 <true/> | <false/>
1513 </dict>
1514 </dict>
1515 ```
1516 #### JSON
1517 ```
1518 {
1519 "policies": {
1520 "FirefoxHome": {
1521 "Search": true | false,
1522 "TopSites": true | false,
1523 "Highlights": true | false,
1524 "Pocket": true | false,
1525 "Snippets": true | false,
1526 "Locked": true | false
1527 }
1528 }
1529 }
1530 ```
1531 ### HardwareAcceleration
1532 Control hardware acceleration.
1533
1534 **Compatibility:** Firefox 60, Firefox ESR 60\
1535 **CCK2 Equivalent:** N/A\
1536 **Preferences Affected:** `layers.acceleration.disabled`
1537
1538 #### Windows
1539 ```
1540 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1541 ```
1542 #### macOS
1543 ```
1544 <dict>
1545 <key>HardwareAcceleration</key>
1546 <true/> | <false/>
1547 </dict>
1548 ```
1549 #### JSON
1550 ```
1551 {
1552 "policies": {
1553 "HardwareAcceleration": true | false
1554 }
1555 }
1556 ```
1557 ### Homepage
1558 Configure the default homepage and how Firefox starts.
1559
1560 `URL` is the default homepage.
1561
1562 `Locked` prevents the user from changing homepage preferences.
1563
1564 `Additional` allows for more than one homepage.
1565
1566 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1567
1568 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1569 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1570 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1571
1572 #### Windows
1573 ```
1574 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1575 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1576 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1577 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1578 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1579 ```
1580 #### macOS
1581 ```
1582 <dict>
1583 <key>Homepage</key>
1584 <dict>
1585 <key>URL</key>
1586 <string>http://example.com</string>
1587 <key>Locked</key>
1588 <true/> | <false/>
1589 <key>Additional</key>
1590 <array>
1591 <string>http://example.org</string>
1592 <string>http://example.edu</string>
1593 </array>
1594 <key>StartPage</key>
1595 <string>always | never | from-visited</string>
1596 </dict>
1597 </dict>
1598 ```
1599 #### JSON
1600 ```
1601 {
1602 "policies": {
1603 "Homepage": {
1604 "URL": "http://example.com/",
1605 "Locked": true | false,
1606 "Additional": ["http://example.org/",
1607 "http://example.edu/"],
1608 "StartPage": "none" | "homepage" | "previous-session"
1609 }
1610 }
1611 }
1612 ```
1613 ### InstallAddonsPermission
1614 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1615
1616 `Allow` is a list of origins where extension installs are allowed.
1617
1618 `Default` determines whether or not extension installs are allowed by default.
1619
1620 **Compatibility:** Firefox 60, Firefox ESR 60\
1621 **CCK2 Equivalent:** `permissions.install`\
1622 **Preferences Affected:** `xpinstall.enabled`
1623
1624 #### Windows
1625 ```
1626 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1627 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1628 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1629 ```
1630 #### macOS
1631 ```
1632 <dict>
1633 <key>InstallAddonsPermission</key>
1634 <dict>
1635 <key>Allow</key>
1636 <array>
1637 <string>http://example.org</string>
1638 <string>http://example.edu</string>
1639 </array>
1640 <key>Default</key>
1641 <true/> | <false/>
1642 </dict>
1643 </dict>
1644 ```
1645 #### JSON
1646 ```
1647 {
1648 "policies": {
1649 "InstallAddonsPermission": {
1650 "Allow": ["http://example.org/",
1651 "http://example.edu/"],
1652 "Default": true | false
1653 }
1654 }
1655 }
1656 ```
1657 ### LocalFileLinks
1658 Enable linking to local files by origin.
1659
1660 **Compatibility:** Firefox 68, Firefox ESR 68\
1661 **CCK2 Equivalent:** N/A\
1662 **Preferences Affected:** `capability.policy.localfilelinks.*`
1663
1664 #### Windows
1665 ```
1666 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1667 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1668 ```
1669 #### macOS
1670 ```
1671 <dict>
1672 <key>LocalFileLinks</key>
1673 <array>
1674 <string>http://example.org</string>
1675 <string>http://example.edu</string>
1676 </array>
1677 </dict>
1678 ```
1679 #### JSON
1680 ```
1681 {
1682 "policies": {
1683 "LocalFileLinks": ["http://example.org/",
1684 "http://example.edu/"]
1685 }
1686 }
1687 ```
1688 ### NoDefaultBookmarks
1689 Disable the creation of default bookmarks.
1690
1691 This policy is only effective if the user profile has not been created yet.
1692
1693 **Compatibility:** Firefox 60, Firefox ESR 60\
1694 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1695 **Preferences Affected:** N/A
1696
1697 #### Windows
1698 ```
1699 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1700 ```
1701 #### macOS
1702 ```
1703 <dict>
1704 <key>NoDefaultBookmarks</key>
1705 <true/> | <false/>
1706 </dict>
1707 ```
1708 #### JSON
1709 ```
1710 {
1711 "policies": {
1712 "NoDefaultBookmarks": true | false
1713 }
1714 }
1715 ```
1716 ### NetworkPrediction
1717 Enable or disable network prediction (DNS prefetching).
1718
1719 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1720 **CCK2 Equivalent:** N/A\
1721 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1722
1723 #### Windows
1724 ```
1725 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1726 ```
1727 #### macOS
1728 ```
1729 <dict>
1730 <key>NetworkPrediction</key>
1731 <true/> | <false/>
1732 </dict>
1733 ```
1734 #### JSON
1735 ```
1736 {
1737 "policies": {
1738 "NetworkPrediction": true | false
1739 }
1740 ```
1741 ### NewTabPage
1742 Enable or disable the New Tab page.
1743
1744 **Compatibility:** Firefox 68, Firefox ESR 68\
1745 **CCK2 Equivalent:** N/A\
1746 **Preferences Affected:** `browser.newtabpage.enabled`
1747
1748 #### Windows
1749 ```
1750 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1751 ```
1752 #### macOS
1753 ```
1754 <dict>
1755 <key>NewTabPage</key>
1756 <true/> | <false/>
1757 </dict>
1758 ```
1759 #### JSON
1760 ```
1761 {
1762 "policies": {
1763 "NewTabPage": true | false
1764 }
1765 ```
1766 ### OfferToSaveLogins
1767 Control whether or not Firefox offers to save passwords.
1768
1769 **Compatibility:** Firefox 60, Firefox ESR 60\
1770 **CCK2 Equivalent:** `dontRememberPasswords`\
1771 **Preferences Affected:** `signon.rememberSignons`
1772
1773 #### Windows
1774 ```
1775 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1776 ```
1777 #### macOS
1778 ```
1779 <dict>
1780 <key>OfferToSaveLogins</key>
1781 <true/> | <false/>
1782 </dict>
1783 ```
1784 #### JSON
1785 ```
1786 {
1787 "policies": {
1788 "OfferToSaveLogins": true | false
1789 }
1790 }
1791 ```
1792 ### OverrideFirstRunPage
1793 Override the first run page. If the value is blank, no first run page is displayed.
1794
1795 **Compatibility:** Firefox 60, Firefox ESR 60\
1796 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1797 **Preferences Affected:** `startup.homepage_welcome_url`
1798
1799 #### Windows
1800 ```
1801 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1802 ```
1803 #### macOS
1804 ```
1805 <dict>
1806 <key>OverrideFirstRunPage</key>
1807 <string>http://example.org</string>
1808 </dict>
1809 ```
1810 #### JSON
1811 ```
1812 {
1813 "policies": {
1814 "OverrideFirstRunPage": "http://example.org"
1815 }
1816 ```
1817 ### OverridePostUpdatePage
1818 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1819
1820 **Compatibility:** Firefox 60, Firefox ESR 60\
1821 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1822 **Preferences Affected:** `startup.homepage_override_url`
1823
1824 #### Windows
1825 ```
1826 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>OverridePostUpdatePage</key>
1832 <string>http://example.org</string>
1833 </dict>
1834 ```
1835 #### JSON
1836 ```
1837 {
1838 "policies": {
1839 "OverridePostUpdatePage": "http://example.org"
1840 }
1841 ```
1842 ### Permissions
1843 Set permissions associated with camera, microphone, location, and notifications
1844
1845 `Allow` is a list of origins where the feature is allowed.
1846
1847 `Block` is a list of origins where the feature is not allowed.
1848
1849 `BlockNewRequests` determines whether or not new requests can be made for the feature.
1850
1851 `Locked` prevents the user from changing preferences for the feature.
1852
1853 **Compatibility:** Firefox 62, Firefox ESR 60.2\
1854 **CCK2 Equivalent:** N/A\
1855 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
1856
1857 #### Windows
1858 ```
1859 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
1860 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
1861 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
1862 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
1863 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
1864 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
1865 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
1866 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
1867 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
1868 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
1869 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
1870 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
1871 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
1872 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
1873 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
1874 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
1875 ```
1876 #### macOS
1877 ```
1878 <dict>
1879 <key>Permissions</key>
1880 <dict>
1881 <key>Camera</key>
1882 <dict>
1883 <key>Allow</key>
1884 <array>
1885 <string>https://example.org</string>
1886 </array>
1887 <key>Block</key>
1888 <array>
1889 <string>https://example.edu</string>
1890 </array>
1891 <key>BlockNewRequests</key>
1892 <true/>
1893 <key>Locked</key>
1894 <true/>
1895 </dict>
1896 <key>Microphone</key>
1897 <dict>
1898 <key>Allow</key>
1899 <array>
1900 <string>https://example.org</string>
1901 </array>
1902 <key>Block</key>
1903 <array>
1904 <string>https://example.edu</string>
1905 </array>
1906 <key>BlockNewRequests</key>
1907 <true/>
1908 <key>Locked</key>
1909 <true/>
1910 </dict>
1911 <key>Location</key>
1912 <dict>
1913 <key>Allow</key>
1914 <array>
1915 <string>https://example.org</string>
1916 </array>
1917 <key>Block</key>
1918 <array>
1919 <string>https://example.edu</string>
1920 </array>
1921 <key>BlockNewRequests</key>
1922 <true/>
1923 <key>Locked</key>
1924 <true/>
1925 </dict>
1926 <key>Notifications</key>
1927 <dict>
1928 <key>Allow</key>
1929 <array>
1930 <string>https://example.org</string>
1931 </array>
1932 <key>Block</key>
1933 <array>
1934 <string>https://example.edu</string>
1935 </array>
1936 <key>BlockNewRequests</key>
1937 <true/>
1938 <key>Locked</key>
1939 <true/>
1940 </dict>
1941 </dict>
1942 </dict>
1943 ```
1944 #### JSON
1945 ```
1946 {
1947 "policies": {
1948 "Permissions": {
1949 "Camera": {
1950 "Allow": ["https://example.org"],
1951 "Block": ["https://example.edu"],
1952 "BlockNewRequests": true | false,
1953 "Locked": true | false
1954 },
1955 "Microphone": {
1956 "Allow": ["https://example.org"],
1957 "Block": ["https://example.edu"],
1958 "BlockNewRequests": true | false,
1959 "Locked": true | false
1960 },
1961 "Location": {
1962 "Allow": ["https://example.org"],
1963 "Block": ["https://example.edu"],
1964 "BlockNewRequests": true | false,
1965 "Locked": true | false
1966 },
1967 "Notifications": {
1968 "Allow": ["https://example.org"],
1969 "Block": ["https://example.edu"],
1970 "BlockNewRequests": true | false,
1971 "Locked": true | false
1972 }
1973 }
1974 }
1975 }
1976 ```
1977 ### PopupBlocking
1978 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
1979
1980 `Allow` is a list of origins where popup-windows are allowed.
1981
1982 `Default` determines whether or not pop-up windows are allowed by default.
1983
1984 `Locked` prevents the user from changing pop-up preferences.
1985
1986 **Compatibility:** Firefox 60, Firefox ESR 60\
1987 **CCK2 Equivalent:** `permissions.popup`\
1988 **Preferences Affected:** `dom.disable_open_during_load`
1989
1990 #### Windows
1991 ```
1992 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
1993 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
1994 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
1995 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
1996 ```
1997 #### macOS
1998 ```
1999 <dict>
2000 <key>PopupBlocking</key>
2001 <dict>
2002 <key>Allow</key>
2003 <array>
2004 <string>http://example.org</string>
2005 <string>http://example.edu</string>
2006 </array>
2007 <key>Default</key>
2008 <true/> | <false/>
2009 <key>Locked</key>
2010 <true/> | <false/>
2011 </dict>
2012 </dict>
2013 ```
2014 #### JSON
2015 ```
2016 {
2017 "policies": {
2018 "PopupBlocking": {
2019 "Allow": ["http://example.org/",
2020 "http://example.edu/"],
2021 "Default": true | false,
2022 "Locked": true | false
2023 }
2024 }
2025 }
2026 ```
2027 ### Preferences
2028 Set and lock certain preferences.
2029
2030 **Compatibility:** See below\
2031 **CCK2 Equivalent:** `preferences`\
2032 **Preferences Affected:** See below
2033
2034 | Preference | Type | Compatibility
2035 | --- | --- | ---
2036 | app.update.auto | boolean | Firefox 68, Firefox 68 ESR
2037 | browser.cache.disk.enable | boolean | Firefox 68, Firefox 68 ESR
2038 | browser.cache.disk.parent_directory | string | Firefox 68, Firefox 68 ESR
2039 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox 68 ESR
2040 | browser.search.update | boolean | Firefox 68, Firefox 68 ESR
2041 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox 68 ESR
2042 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox 68 ESR
2043 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox 68 ESR
2044 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox 68 ESR
2045 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox 68 ESR
2046 | dom.disable_window_flip | boolean | Firefox 68, Firefox 68 ESR
2047 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox 68 ESR
2048 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox 68 ESR
2049 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox 68 ESR
2050 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox 68 ESR
2051 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox 68 ESR
2052 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox 68 ESR
2053 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox 68 ESR
2054 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox 68 ESR
2055 | network.IDN_show_punycode | boolean | Firefox 68, Firefox 68 ESR
2056 | places.history.enabled | boolean | Firefox 68, Firefox 68 ESR
2057 | security.default_personal_cert | string | Firefox 68, Firefox 68 ESR
2058 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox 68 ESR
2059 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox 68 ESR
2060 #### Windows
2061 ```
2062 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2063 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2064 ```
2065 #### macOS
2066 ```
2067 <dict>
2068 <key>Preferences</key>
2069 <dict>
2070 <key>boolean_preference_name</key>
2071 <true/> | <false/>
2072 <key>string_preference_name</key>
2073 <string>string_value</string>
2074 </dict>
2075 </dict>
2076 ```
2077 #### JSON
2078 ```
2079 {
2080 "policies": {
2081 "Preferences": {
2082 "boolean_preference_name": true | false,
2083 "string_preference_name": "string_value"
2084 }
2085 }
2086 }
2087 ```
2088 ### PromptForDownloadLocation
2089 Ask where to save each file before downloading.
2090
2091 **Compatibility:** Firefox 68, Firefox ESR 68\
2092 **CCK2 Equivalent:** N/A
2093 **Preferences Affected:** `browser.download.useDownloadDir`
2094
2095 #### Windows
2096 ```
2097 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2098 ```
2099 #### macOS
2100 ```
2101 <dict>
2102 <key>PromptForDownloadLocation</key>
2103 <true/> | <false/>
2104 </dict>
2105 ```
2106 #### JSON
2107 ```
2108 {
2109 "policies": {
2110 "PromptForDownloadLocation": true | false
2111 }
2112 }
2113 ```
2114 ### Proxy
2115 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2116 To specify ports, append them to the hostnames with a colon (:).
2117
2118 `Mode` is the proxy method being used.
2119
2120 `Locked` is whether or not proxy settings can be changed.
2121
2122 `HTTPProxy` is the HTTP proxy server.
2123
2124 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2125
2126 `SSLProxy` is the SSL proxy server.
2127
2128 `FTPProxy` is the FTP proxy server.
2129
2130 `SOCKSProxy` is the SOCKS proxy server
2131
2132 `SOCKSVersion` is the SOCKS version (4 or 5)
2133
2134 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2135
2136 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2137
2138 `AutoLogin` means do not prompt for authentication if password is saved.
2139
2140 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2141
2142 **Compatibility:** Firefoox 60, Firefox ESR 60\
2143 **CCK2 Equivalent:** `networkProxy*`\
2144 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2145
2146 #### Windows
2147 ```
2148 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2149 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2150 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2151 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2152 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2153 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2154 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2155 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2156 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2157 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2158 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2159 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2160 ```
2161 #### macOS
2162 ```
2163 <dict>
2164 <key>Proxy</key>
2165 <dict>
2166 <key>Mode</key>
2167 <string>none | system | manual | autoDetect| autoConfig</string>
2168 <key>Locked</key>
2169 <true> | </false>
2170 <key>HTTPProxy</key>
2171 <string>https://httpproxy.example.com</string>
2172 <key>UseHTTPProxyForAllProtocols</key>
2173 <true> | </false>
2174 <key>SSLProxy</key>
2175 <string>https://sslproxy.example.com</string>
2176 <key>FTPProxy</key>
2177 <string>https://ftpproxy.example.com</string>
2178 <key>SOCKSProxy</key>
2179 <string>https://socksproxy.example.com</string>
2180 <key>SOCKSVersion</key>
2181 <string>4 | 5</string>
2182 <key>Passthrough</key>
2183 <string>&lt;local>&gt;</string>
2184 <key>AutoConfigURL</key>
2185 <string>URL_TO_AUTOCONFIG</string>
2186 <key>AutoLogin</key>
2187 <true> | </false>
2188 <key>UseProxyForDNS</key>
2189 <true> | </false>
2190 </dict>
2191 </dict>
2192 ```
2193 ### JSON
2194 ```
2195 {
2196 "policies": {
2197 "Proxy": {
2198 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2199 "Locked": [true, false],
2200 "HTTPProxy": "hostname",
2201 "UseHTTPProxyForAllProtocols": [true, false],
2202 "SSLProxy": "hostname",
2203 "FTPProxy": "hostname",
2204 "SOCKSProxy": "hostname",
2205 "SOCKSVersion": 4 | 5
2206 "Passthrough": "<local>",
2207 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2208 "AutoLogin": [true, false],
2209 "UseProxyForDNS": [true, false]
2210 }
2211 }
2212 }
2213 ```
2214 ### RequestedLocales
2215 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2216
2217 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2218
2219 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2220 **CCK2 Equivalent:** N/A\
2221 **Preferences Affected:** N/A
2222 #### Windows
2223 ```
2224 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2225 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2226
2227 or
2228
2229 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2230 ```
2231 #### macOS
2232 ```
2233 <dict>
2234 <key>RequestedLocales</key>
2235 <array>
2236 <string>de</string>
2237 <string>en-US</string>
2238 </array>
2239 </dict>
2240
2241 or
2242
2243 <dict>
2244 <key>RequestedLocales</key>
2245 <string>de,en-US</string>
2246 </dict>
2247
2248 ```
2249 #### JSON
2250 ```
2251 {
2252 "policies": {
2253 "RequestedLocales": ["de", "en-US"]
2254 }
2255 }
2256
2257 or
2258
2259 {
2260 "policies": {
2261 "RequestedLocales": "de,en-US"
2262 }
2263 }
2264 ```
2265 ### SanitizeOnShutdown (Selective)
2266 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2267
2268 **Compatibility:** Firefox 68, Firefox ESR 68\
2269 **CCK2 Equivalent:** N/A\
2270 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2271 #### Windows
2272 ```
2273 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2274 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2275 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2276 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2277 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2278 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2279 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2280 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2281 ```
2282 #### macOS
2283 ```
2284 <dict>
2285 <key>SanitizeOnShutdown</key>
2286 <dict>
2287 <key>Cache</key>
2288 <true/> | <false/>
2289 <key>Cookies</key>
2290 <true/> | <false/>
2291 <key>Downloads</key>
2292 <true/> | <false/>
2293 <key>FormData</key>
2294 <true/> | <false/>
2295 <key>History</key>
2296 <true/> | <false/>
2297 <key>Sessions</key>
2298 <true/> | <false/>
2299 <key>SiteSettings</key>
2300 <true/> | <false/>
2301 <key>OfflineApps</key>
2302 <true/> | <false/>
2303 </dict>
2304 </dict>
2305 ```
2306 #### JSON
2307 ```
2308 {
2309 "policies": {
2310 "SanitizeOnShutdown": {
2311 "Cache": true | false,
2312 "Cookies": true | false,
2313 "Downloads": true | false,
2314 "FormData": true | false,
2315 "History": true | false,
2316 "Sessions": true | false,
2317 "SiteSettings": true | false,
2318 "OfflineApps": true | false
2319 }
2320 }
2321 }
2322 ```
2323 ### SanitizeOnShutdown (All)
2324 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2325
2326 **Compatibility:** Firefox 60, Firefox ESR 60\
2327 **CCK2 Equivalent:** N/A\
2328 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2329 #### Windows
2330 ```
2331 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2332 ```
2333 #### macOS
2334 ```
2335 <dict>
2336 <key>SanitizeOnShutdown</key>
2337 <true/> | <false/>
2338 </dict>
2339 ```
2340 #### JSON
2341 ```
2342 {
2343 "policies": {
2344 "SanitizeOnShutdown": true | false
2345 }
2346 }
2347 ```
2348 ### SearchBar
2349 Set whether or not search bar is displayed.
2350
2351 **Compatibility:** Firefox 60, Firefox ESR 60\
2352 **CCK2 Equivalent:** `showSearchBar`\
2353 **Preferences Affected:** N/A
2354
2355 #### Windows
2356 ```
2357 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2358 ```
2359 #### macOS
2360 ```
2361 <dict>
2362 <key>SearchBar</key>
2363 <string>unified | separate</string>
2364 </dict>
2365 ```
2366
2367 #### JSON
2368 ```
2369 {
2370 "policies": {
2371 "SearchBar": "unified" | "separate"
2372 }
2373 }
2374 ```
2375
2376
2377
2378
2379
2380 ### SearchEngines (This policy is only available on the ESR.)
2381
2382 ### SearchEngines | Default
2383
2384 Set the default search engine. This policy is only available on the ESR.
2385
2386 **Compatibility:** Firefox ESR 60\
2387 **CCK2 Equivalent:** `defaultSearchEngine`\
2388 **Preferences Affected:** N/A
2389
2390 ### Windows
2391 ```
2392 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2393 ```
2394 #### macOS
2395 ```
2396 <dict>
2397 <key>SearchEngines</key>
2398 <dict>
2399 <key>Default</key>
2400 <string>NAME_OF_SEARCH_ENGINE</string>
2401 </dict>
2402 </dict>
2403 ```
2404 ### JSON
2405 ```
2406 {
2407 "policies": {
2408 "SearchEngines": {
2409 "Default": "NAME_OF_SEARCH_ENGINE"
2410 }
2411 }
2412 }
2413 ```
2414 ### SearchEngines | PreventInstalls
2415
2416 Prevent installing search engines from webpages.
2417
2418 **Compatibility:** Firefox ESR 60\
2419 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2420 **Preferences Affected:** N/A
2421
2422 ### Windows
2423 ```
2424 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2425 ```
2426 #### macOS
2427 ```
2428 <dict>
2429 <key>SearchEngines</key>
2430 <dict>
2431 <key>PreventInstalls</key>
2432 <true/> | <false/>
2433 </dict>
2434 </dict>
2435 ```
2436 ### JSON
2437 ```
2438 {
2439 "policies": {
2440 "SearchEngines": {
2441 "PreventInstalls": true | false
2442 }
2443 }
2444 }
2445 ```
2446 ### SearchEngines | Remove
2447
2448 Hide built-in search engines. This policy is only available on the ESR.
2449
2450 **Compatibility:** Firefox ESR 60.2\
2451 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2452 **Preferences Affected:** N/A
2453
2454 ### Windows
2455 ```
2456 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2457 ```
2458 #### macOS
2459 ```
2460 <dict>
2461 <key>SearchEngines</key>
2462 <dict>
2463 <key>Remove</key>
2464 <array>
2465 <string>NAME_OF_SEARCH_ENGINE</string>
2466 </array>
2467 </dict>
2468 </dict>
2469 ```
2470 ### JSON
2471 ```
2472 {
2473 "policies": {
2474 "SearchEngines": {
2475 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2476 }
2477 }
2478 }
2479 ```
2480 ### SearchEngines | Add
2481
2482 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2483
2484 `Name` is the name of the search engine.
2485
2486 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2487
2488 `Method` is either GET or POST
2489
2490 `IconURL` is a URL for the icon to use.
2491
2492 `Alias` is a keyword to use for the engine.
2493
2494 `Description` is a description of the search engine.
2495
2496 `PostData` is the POST data as name value pairs separated by &.
2497
2498 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2499
2500 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2501 **CCK2 Equivalent:** `searchplugins`\
2502 **Preferences Affected:** N/A
2503
2504 #### Windows
2505 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2506 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2507 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2508 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2509 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2510 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2511 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2512 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2513
2514 #### macOS
2515 ```
2516 <dict>
2517 <key>SearchEngines</key>
2518 <dict>
2519 <key>Add</key>
2520 <array>
2521 <dict>
2522 <key>Name</key>
2523 <string>Example1</string>
2524 <key>URLTemplate</key>
2525 <string>https://www.example.org/q={searchTerms}</string>
2526 <key>Method</key>
2527 <string>GET | POST </string>
2528 <key>IconURL</key>
2529 <string>https://www.example.org/favicon.ico</string>
2530 <key>Alias</key>
2531 <string>example</string>
2532 <key>Description</key>
2533 <string>Example Description</string>
2534 <key>SuggestURLTemplate</key>
2535 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2536 <key>PostData</key>
2537 <string>name=value&q={searchTerms}</string>
2538 </dict>
2539 <array>
2540 </dict>
2541 </dict>
2542 ```
2543 ### JSON
2544 ```
2545 {
2546 "policies": {
2547 "SearchEngines": {
2548 "Add": [
2549 {
2550 "Name": "Example1",
2551 "URLTemplate": "https://www.example.org/q={searchTerms}",
2552 "Method": "GET" | "POST",
2553 "IconURL": "https://www.example.org/favicon.ico",
2554 "Alias": "example",
2555 "Description": "Description",
2556 "PostData": "name=value&q={searchTerms}",
2557 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2558 }
2559 ]
2560 }
2561 }
2562 }
2563 ```
2564 ### SearchSuggestEnabled
2565
2566 Enable search suggestions.
2567
2568 **Compatibility:** Firefox 68, Firefox ESR 68\
2569 **CCK2 Equivalent:** N/A\
2570 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2571
2572 ### Windows
2573 ```
2574 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2575 ```
2576 #### macOS
2577 ```
2578 <dict>
2579 <key>SearchSuggestEnabled</key>
2580 <true/> | <false/>
2581 </dict>
2582 ```
2583 ### JSON
2584 ```
2585 {
2586 "policies": {
2587 "SearchSuggestEnabled": true | false
2588 }
2589 }
2590 ```
2591 ### SecurityDevices
2592
2593 Install PKCS #11 modules.
2594
2595 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2596 **CCK2 Equivalent:** `certs.devices`\
2597 **Preferences Affected:** N/A
2598
2599 #### Windows
2600 ```
2601 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2602 ```
2603 #### macOS
2604 ```
2605 <dict>
2606 <key>SecurityDevices</key>
2607 <dict>
2608 <key>NAME_OF_DEVICE</key>
2609 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2610 </dict>
2611 </dict>
2612 ```
2613
2614 #### JSON
2615 ```
2616 {
2617 "policies": {
2618 "SecurityDevices": {
2619 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2620 }
2621 }
2622 }
2623 ```
2624 ### SSLVersionMax
2625
2626 Set and lock the maximum version of TLS.
2627
2628 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2629 **CCK2 Equivalent:** N/A\
2630 **Preferences Affected:** `security.tls.version.max`
2631
2632 #### Windows
2633 ```
2634 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2635 ```
2636 #### macOS
2637 ```
2638 <dict>
2639 <key>SSLVersionMax</key>
2640 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2641 </dict>
2642 ```
2643
2644 #### JSON
2645 ```
2646 {
2647 "policies": {
2648 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2649 }
2650 }
2651 ```
2652 ### SSLVersionMin
2653
2654 Set and lock the minimum version of TLS.
2655
2656 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2657 **CCK2 Equivalent:** N/A\
2658 **Preferences Affected:** `security.tls.version.min`
2659
2660 #### Windows
2661 ```
2662 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2663 ```
2664 #### macOS
2665 ```
2666 <dict>
2667 <key>SSLVersionMin</key>
2668 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2669 </dict>
2670 ```
2671
2672 #### JSON
2673 ```
2674 {
2675 "policies": {
2676 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2677 }
2678 }
2679 ```
2680 ### SupportMenu
2681 Add a menuitem to the help menu for specifying support information.
2682
2683 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2684 **CCK2 Equivalent:** helpMenu\
2685 **Preferences Affected:** N/A
2686
2687 #### Windows
2688 ```
2689 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2690 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2691 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "S"
2692 ```
2693 #### macOS
2694 ```
2695 <dict>
2696 <key>SupportMenu</key>
2697 <dict>
2698 <key>Title</key>
2699 <string>SupportMenu</string>
2700 <key>URL</key>
2701 <string>http://example.com/support</string>
2702 <key>AccessKey</key>
2703 <string>S</string>
2704 </dict>
2705 </dict>
2706 ```
2707 ### JSON
2708 ```
2709 {
2710 "policies": {
2711 "SupportMenu": {
2712 "Title": "Support Menu",
2713 "URL": "http://example.com/support",
2714 "AccessKey": "S"
2715 }
2716 }
2717 }
2718 ```
2719 ### WebsiteFilter
2720 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
2721
2722 **Compatibility:** Firefox 60, Firefox ESR 60\
2723 **CCK2 Equivalent:** N/A\
2724 **Preferences Affected:** N/A
2725
2726 #### Windows
2727 ```
2728 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
2729 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
2730 ```
2731 #### macOS
2732 ```
2733 <dict>
2734 <key>WebsiteFilter</key>
2735 <dict>
2736 <key>Block</key>
2737 <array>
2738 <string><all_urls></string>
2739 </array>
2740 <key>Exceptions</key>
2741 <array>
2742 <string>http://example.org/*</string>
2743 </array>
2744 </dict>
2745
2746 </dict>
2747 ```
2748 ### JSON
2749 ```
2750 {
2751 "policies": {
2752 "WebsiteFilter": {
2753 "Block": ["<all_urls>"],
2754 "Exceptions": ["http://example.org/*"]
2755 }
2756 }
2757 }
2758 ```

patrick-canterino.de