]> git.p6c8.net - policy-templates.git/blob - README.md
Updates for new UserMessaging policy
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
42 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
43 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
44 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
45 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
46 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
47 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
48 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
49 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
50 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
51 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
52 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
53 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
54 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
55 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
56 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
57 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
58 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
59 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
60 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
61 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
62 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
63 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
64 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
65 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
66 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
67 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
68 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
69 | **[`Preferences`](#preferences)** | Set and lock some preferences.
70 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
71 | **[`Proxy`](#proxy)** | Configure proxy settings.
72 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
73 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
74 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
75 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
76 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
77 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
78 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
79 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
80 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
81 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
82 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
83 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
84 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
85 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
86 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
87 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
88
89 ### AppUpdateURL
90
91 Change the URL for application update.
92
93 **Compatibility:** Firefox 62, Firefox ESR 60.2\
94 **CCK2 Equivalent:** N/A\
95 **Preferences Affected:** `app.update.url`
96
97 #### Windows (GPO)
98 ```
99 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
100 ```
101 #### macOS
102 ```
103 <dict>
104 <key>AppUpdateURL</key>
105 <string>https://yoursite.com</string>
106 </dict>
107 ```
108 #### policies.json
109 ```
110 {
111 "policies": {
112 "AppUpdateURL": "https://yoursite.com"
113 }
114 }
115 ```
116 ### Authentication
117
118 Configure sites that support integrated authentication.
119
120 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
121
122 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
123 **CCK2 Equivalent:** N/A\
124 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
125
126 #### Windows (GPO)
127 ```
128 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
133 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
134 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
135 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
136 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
137 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
138 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
139 ```
140 #### macOS
141 ```
142 <dict>
143 <key>Authentication</key>
144 <dict>
145 <key>SPNEGO</key>
146 <array>
147 <string>mydomain.com</string>
148 <string>https://myotherdomain.com</string>
149 </array>
150 <key>Delegated</key>
151 <array>
152 <string>mydomain.com</string>
153 <string>https://myotherdomain.com</string>
154 </array>
155 <key>NTLM</key>
156 <array>
157 <string>mydomain.com</string>
158 <string>https://myotherdomain.com</string>
159 </array>
160 <key>AllowNonFQDN</key>
161 <dict>
162 <key>SPNEGO</key>
163 <true/> | <false/>
164 <key>NTLM</key>
165 <true/> | <false/>
166 </dict>
167 <key>AllowProxies</key>
168 <dict>
169 <key>SPNEGO</key>
170 <true/> | <false/>
171 <key>NTLM</key>
172 <true/> | <false/>
173 </dict>
174 <key>Locked</key>
175 <true/> | <false/>
176 </dict>
177 </dict>
178 ```
179 #### policies.json
180 ```
181 {
182 "policies": {
183 "Authentication": {
184 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
185 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
186 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
187 "AllowNonFQDN": {
188 "SPNEGO": true | false,
189 "NTLM": true | false
190 },
191 "AllowProxies": {
192 "SPNEGO": true | false,
193 "NTLM": true | false
194 },
195 "Locked": true | false
196 }
197 }
198 }
199 ```
200 ### BlockAboutAddons
201
202 Block access to the Add-ons Manager (about:addons).
203
204 **Compatibility:** Firefox 60, Firefox ESR 60\
205 **CCK2 Equivalent:** `disableAddonsManager`\
206 **Preferences Affected:** N/A
207
208 #### Windows (GPO)
209 ```
210 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
211 ```
212 #### macOS
213 ```
214 <dict>
215 <key>BlockAboutAddons</key>
216 <true/> | <false/>
217 </dict>
218 ```
219 #### policies.json
220 ```
221 {
222 "policies": {
223 "BlockAboutAddons": true | false
224 }
225 }
226 ```
227 ### BlockAboutConfig
228
229 Block access to about:config.
230
231 **Compatibility:** Firefox 60, Firefox ESR 60\
232 **CCK2 Equivalent:** `disableAboutConfig`\
233 **Preferences Affected:** N/A
234
235 #### Windows (GPO)
236 ```
237 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
238 ```
239 #### macOS
240 ```
241 <dict>
242 <key>BlockAboutConfig</key>
243 <true/> | <false/>
244 </dict>
245 ```
246 #### policies.json
247 ```
248 {
249 "policies": {
250 "BlockAboutConfig": true | false
251 }
252 }
253 ```
254 ### BlockAboutProfiles
255
256 Block access to About Profiles (about:profiles).
257
258 **Compatibility:** Firefox 60, Firefox ESR 60\
259 **CCK2 Equivalent:** `disableAboutProfiles`\
260 **Preferences Affected:** N/A
261
262 #### Windows (GPO)
263 ```
264 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
265 ```
266 #### macOS
267 ```
268 <dict>
269 <key>BlockAboutProfiles</key>
270 <true/> | <false/>
271 </dict>
272 ```
273 #### policies.json
274 ```
275 {
276 "policies": {
277 "BlockAboutProfiles": true | false
278 }
279 }
280 ```
281 ### BlockAboutSupport
282
283 Block access to Troubleshooting Information (about:support).
284
285 **Compatibility:** Firefox 60, Firefox ESR 60\
286 **CCK2 Equivalent:** `disableAboutSupport`\
287 **Preferences Affected:** N/A
288
289 #### Windows (GPO)
290 ```
291 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
292 ```
293 #### macOS
294 ```
295 <dict>
296 <key>BlockAboutSupport</key>
297 <true/> | <false/>
298 </dict>
299 ```
300 #### policies.json
301 ```
302 {
303 "policies": {
304 "BlockAboutSupport": true | false
305 }
306 }
307 ```
308 ### Bookmarks
309
310 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
311
312 **Compatibility:** Firefox 60, Firefox ESR 60\
313 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
314 **Preferences Affected:** N/A
315
316 #### Windows (GPO)
317 ```
318 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
319 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
320 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
321 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
322 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
323 ```
324 #### macOS
325 ```
326 <dict>
327 <key>Bookmarks</key>
328 <array>
329 <dict>
330 <key>Title</key>
331 <string>Example</string>
332 <key>URL</key>
333 <string>https://example.com</string>
334 <key>Favicon</key>
335 <string>https://example.com/favicon.ico</string>
336 <key>Placement</key>
337 <string>toolbar | menu</string>
338 <key>Folder</key>
339 <string>FolderName</string>
340 </dict>
341 </array>
342 </dict>
343 ```
344 #### policies.json
345 ```
346 {
347 "policies": {
348 "Bookmarks": [
349 {
350 "Title": "Example",
351 "URL": "https://example.com",
352 "Favicon": "https://example.com/favicon.ico",
353 "Placement": "toolbar" | "menu",
354 "Folder": "FolderName"
355 }
356 ]
357 }
358 }
359 ```
360 ### CaptivePortal
361 Enable or disable the detection of captive portals.
362
363 **Compatibility:** Firefox 67, Firefox ESR 60.7\
364 **CCK2 Equivalent:** N/A\
365 **Preferences Affected:** `network.captive-portal-service.enabled`
366
367 #### Windows (GPO)
368 ```
369 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
370 ```
371 #### macOS
372 ```
373 <dict>
374 <key>CaptivePortal</key>
375 <true/> | <false/>
376 </dict>
377 ```
378 #### policies.json
379 ```
380 {
381 "policies": {
382 "CaptivePortal": true | false
383 }
384 }
385 ```
386 ### Certificates
387
388 ### Certificates | ImportEnterpriseRoots
389
390 Trust certificates that have been added to the operating system certificate store by a user or administrator.
391
392 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
393
394 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
395 **CCK2 Equivalent:** N/A\
396 **Preferences Affected:** `security.enterprise_roots.enabled`
397
398 #### Windows (GPO)
399 ```
400 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
401 ```
402 #### macOS
403 ```
404 <dict>
405 <key>Certificates</key>
406 <dict>
407 <key>ImportEnterpriseRoots</key>
408 <true/> | <false/>
409 </dict>
410 </dict>
411 ```
412 #### policies.json
413 ```
414 {
415 "policies": {
416 "Certificates": {
417 "ImportEnterpriseRoots": true | false
418 }
419 }
420 }
421 ```
422 ### Certificates | Install
423
424 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
425
426 - Windows
427 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
428 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
429 - macOS
430 - /Library/Application Support/Mozilla/Certificates
431 - ~/Library/Application Support/Mozilla/Certificates
432 - Linux
433 - /usr/lib/mozilla/certificates
434 - /usr/lib64/mozilla/certificates
435 - ~/.mozilla/certificates
436
437 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
438
439 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
440
441 Certificates are installed using the trust string `CT,CT,`.
442
443 Binary (DER) and ASCII (PEM) certificates are both supported.
444
445 **Compatibility:** Firefox 64, Firefox ESR 64\
446 **CCK2 Equivalent:** `certs.ca`\
447 **Preferences Affected:** N/A
448
449 #### Windows (GPO)
450 ```
451 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
452 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
453 ```
454 #### macOS
455 ```
456 <dict>
457 <key>Certificates</key>
458 <dict>
459 <key>Install</key>
460 <array>
461 <string>cert1.der</string>
462 <string>/Users/username/cert2.pem</string>
463 </array>
464 </dict>
465 </dict>
466 ```
467 #### policies.json
468 ```
469 {
470 "policies": {
471 "Certificates": {
472 "Install": ["cert1.der", "/home/username/cert2.pem"]
473 }
474 }
475 }
476 ```
477 ### Cookies
478 Configure cookie preferences.
479
480 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
481
482 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
483
484 `Default` determines whether cookies are accepted at all.
485
486 `AcceptThirdParty` determines how third-party cookies are handled.
487
488 `ExpireAtSessionEnd` determines when cookies expire.
489
490 `RejectTracker` only rejects cookies for trackers.
491
492 `Locked` prevents the user from changing cookie preferences.
493
494 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
495 **CCK2 Equivalent:** N/A\
496 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
497
498 #### Windows (GPO)
499 ```
500 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
501 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
502 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
503 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
504 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
505 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
506 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
507 ```
508 #### macOS
509 ```
510 <dict>
511 <key>Cookies</key>
512 <dict>
513 <key>Allow</key>
514 <array>
515 <string>http://example.com</string>
516 </array>
517 <key>Block</key>
518 <array>
519 <string>http://example.org</string>
520 </array>
521 <key>Default</key>
522 <true/> | <false/>
523 <key>AcceptThirdParty</key>
524 <string>always | never | from-visited</string>
525 <key>ExpireAtSessionEnd</key>
526 <true/> | <false/>
527 <key>RejectTracker</key>
528 <true/> | <false/>
529 <key>Locked</key>
530 <true/> | <false/>
531 </dict>
532 </dict>
533 ```
534 #### policies.json
535 ```
536 {
537 "policies": {
538 "Cookies": {
539 "Allow": ["http://example.org/"],
540 "Block": ["http://example.edu/"],
541 "Default": true | false,
542 "AcceptThirdParty": "always" | "never" | "from-visited",
543 "ExpireAtSessionEnd": true | false,
544 "RejectTracker": true | false,
545 "Locked": true | false
546 }
547 }
548 }
549 ```
550 ### DisableSetDesktopBackground
551 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
552
553 **Compatibility:** Firefox 60, Firefox ESR 60\
554 **CCK2 Equivalent:** `removeSetDesktopBackground`\
555 **Preferences Affected:** N/A
556
557 #### Windows (GPO)
558 ```
559 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
560 ```
561
562 #### macOS
563 ```
564 <dict>
565 <key>DisableSetDesktopBackground</key>
566 <true/> | <false/>
567 </dict>
568 ```
569 #### policies.json
570 ```
571 {
572 "policies": {
573 "DisableSetDesktopBackground": true | false
574 }
575 }
576 ```
577 ### DisableMasterPasswordCreation
578 Remove the master password functionality.
579
580 **Compatibility:** Firefox 60, Firefox ESR 60\
581 **CCK2 Equivalent:** `noMasterPassword`\
582 **Preferences Affected:** N/A
583
584 #### Windows (GPO)
585 ```
586 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
587 ```
588
589 #### macOS
590 ```
591 <dict>
592 <key>DisableMasterPasswordCreation</key>
593 <true/> | <false/>
594 </dict>
595 ```
596 #### policies.json
597 ```
598 {
599 "policies": {
600 "DisableMasterPasswordCreation": true | false
601 }
602 }
603 ```
604 ### DisableAppUpdate
605 Turn off application updates.
606
607 **Compatibility:** Firefox 60, Firefox ESR 60\
608 **CCK2 Equivalent:** `disableFirefoxUpdates`\
609 **Preferences Affected:** N/A
610
611 #### Windows (GPO)
612 ```
613 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
614 ```
615 #### macOS
616 ```
617 <dict>
618 <key>DisableAppUpdate</key>
619 <true/> | <false/>
620 </dict>
621 ```
622 #### policies.json
623 ```
624 {
625 "policies": {
626 "DisableAppUpdate": true | false
627 }
628 }
629 ```
630 ### DisableBuiltinPDFViewer
631 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
632
633 **Compatibility:** Firefox 60, Firefox ESR 60\
634 **CCK2 Equivalent:** `disablePDFjs`\
635 **Preferences Affected:** `pdfjs.disabled`
636
637 #### Windows (GPO)
638 ```
639 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
640 ```
641
642 #### macOS
643 ```
644 <dict>
645 <key>DisableBuiltinPDFViewer</key>
646 <true/> | <false/>
647 </dict>
648 ```
649 #### policies.json
650 ```
651 {
652 "policies": {
653 "DisableBuiltinPDFViewer": true | false
654 }
655 }
656 ```
657 ### DisableDeveloperTools
658 Remove access to all developer tools.
659
660 **Compatibility:** Firefox 60, Firefox ESR 60\
661 **CCK2 Equivalent:** `removeDeveloperTools`\
662 **Preferences Affected:** `devtools.policy.disabled`
663
664 #### Windows (GPO)
665 ```
666 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
667 ```
668
669 #### macOS
670 ```
671 <dict>
672 <key>DisableDeveloperTools</key>
673 <true/> | <false/>
674 </dict>
675 ```
676 #### policies.json
677 ```
678 {
679 "policies": {
680 "DisableDeveloperTools": true | false
681 }
682 }
683 ```
684 ### DisableFeedbackCommands
685 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
686
687 **Compatibility:** Firefox 60, Firefox ESR 60\
688 **CCK2 Equivalent:** N/A\
689 **Preferences Affected:** N/A
690
691 #### Windows (GPO)
692 ```
693 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
694 ```
695 #### macOS
696 ```
697 <dict>
698 <key>DisableFeedbackCommands</key>
699 <true/> | <false/>
700 </dict>
701 ```
702 #### policies.json
703 ```
704 {
705 "policies": {
706 "DisableFeedbackCommands": true | false
707 }
708 }
709 ```
710 ### DisableFirefoxScreenshots
711 Remove access to Firefox Screenshots.
712
713 **Compatibility:** Firefox 60, Firefox ESR 60\
714 **CCK2 Equivalent:** N/A\
715 **Preferences Affected:** `extensions.screenshots.disabled`
716
717 #### Windows (GPO)
718 ```
719 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
720 ```
721 #### macOS
722 ```
723 <dict>
724 <key>DisableFirefoxScreenshots</key>
725 <true/> | <false/>
726 </dict>
727 ```
728 #### policies.json
729 ```
730 {
731 "policies": {
732 "DisableFirefoxScreenshots": true | false
733 }
734 }
735 ```
736 ### DisableFirefoxAccounts
737 Disable Firefox Accounts integration (Sync).
738
739 **Compatibility:** Firefox 60, Firefox ESR 60\
740 **CCK2 Equivalent:** `disableSync`\
741 **Preferences Affected:** `identity.fxaccounts.enabled`
742
743 #### Windows (GPO)
744 ```
745 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
746 ```
747 #### macOS
748 ```
749 <dict>
750 <key>DisableFirefoxAccounts</key>
751 <true/> | <false/>
752 </dict>
753 ```
754 #### policies.json
755 ```
756 {
757 "policies": {
758 "DisableFirefoxAccounts": true | false
759 }
760 }
761 ```
762 ### DisableFirefoxStudies
763 Disable Firefox studies (Shield).
764
765 **Compatibility:** Firefox 60, Firefox ESR 60\
766 **CCK2 Equivalent:** N/A\
767 **Preferences Affected:** N/A
768
769 #### Windows (GPO)
770 ```
771 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
772 ```
773 #### macOS
774 ```
775 <dict>
776 <key>DisableFirefoxStudies</key>
777 <true/> | <false/>
778 </dict>
779 ```
780 #### policies.json
781 ```
782 {
783 "policies": {
784 "DisableFirefoxStudies": true | false
785 }
786 }
787 ```
788 ### DisableForgetButton
789 Disable the "Forget" button.
790
791 **Compatibility:** Firefox 60, Firefox ESR 60\
792 **CCK2 Equivalent:** `disableForget`\
793 **Preferences Affected:** N/A
794
795 #### Windows (GPO)
796 ```
797 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
798 ```
799 #### macOS
800 ```
801 <dict>
802 <key>DisableForgetButton</key>
803 <true/> | <false/>
804 </dict>
805 ```
806 #### policies.json
807 ```
808 {
809 "policies": {
810 "DisableForgetButton": true | false
811 }
812 }
813 ```
814 ### DisableFormHistory
815 Turn off saving information on web forms and the search bar.
816
817 **Compatibility:** Firefox 60, Firefox ESR 60\
818 **CCK2 Equivalent:** `disableFormFill`\
819 **Preferences Affected:** ` browser.formfill.enable`
820
821 #### Windows (GPO)
822 ```
823 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
824 ```
825 #### macOS
826 ```
827 <dict>
828 <key>DisableFormHistory</key>
829 <true/> | <false/>
830 </dict>
831 ```
832 #### policies.json
833 ```
834 {
835 "policies": {
836 "DisableFormHistory": true | false
837 }
838 }
839 ```
840 ### DisablePasswordReveal
841 Do not allow passwords to be shown in saved logins
842
843 **Compatibility:** Firefox 71, Firefox ESR 68.3\
844 **CCK2 Equivalent:** N/A
845 **Preferences Affected:** N/A
846
847 #### Windows (GPO)
848 ```
849 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
850 ```
851
852 #### macOS
853 ```
854 <dict>
855 <key>DisablePasswordReveal</key>
856 <true/> | <false/>
857 </dict>
858 ```
859 #### policies.json
860 ```
861 {
862 "policies": {
863 "DisablePasswordReveal": true | false
864 }
865 }
866 ```
867 ### DisablePocket
868 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
869
870 **Compatibility:** Firefox 60, Firefox ESR 60\
871 **CCK2 Equivalent:** `disablePocket`\
872 **Preferences Affected:** `extensions.pocket.enabled`
873
874 #### Windows (GPO)
875 ```
876 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
877 ```
878 #### macOS
879 ```
880 <dict>
881 <key>DisablePocket</key>
882 <true/> | <false/>
883 </dict>
884 ```
885 #### policies.json
886 ```
887 {
888 "policies": {
889 "DisablePocket": true | false
890 }
891 }
892 ```
893 ### DisablePrivateBrowsing
894 Remove access to private browsing.
895
896 **Compatibility:** Firefox 60, Firefox ESR 60\
897 **CCK2 Equivalent:** `disablePrivateBrowsing`\
898 **Preferences Affected:** N/A
899
900 #### Windows (GPO)
901 ```
902 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
903 ```
904 #### macOS
905 ```
906 <dict>
907 <key>DisablePrivateBrowsing</key>
908 <true/> | <false/>
909 </dict>
910 ```
911 #### policies.json
912 ```
913 {
914 "policies": {
915 "DisablePrivateBrowsing": true | false
916 }
917 }
918 ```
919 ### DisableProfileImport
920 Disables the "Import data from another browser" option in the bookmarks window.
921
922 **Compatibility:** Firefox 60, Firefox ESR 60\
923 **CCK2 Equivalent:** N/A\
924 **Preferences Affected:** N/A
925
926 #### Windows (GPO)
927 ```
928 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
929 ```
930 #### macOS
931 ```
932 <dict>
933 <key>DisableProfileImport</key>
934 <true/> | <false/>
935 </dict>
936 ```
937 #### policies.json
938 ```
939 {
940 "policies": {
941 "DisableProfileImport": true | false
942 }
943 }
944 ```
945 ### DisableProfileRefresh
946 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
947
948 **Compatibility:** Firefox 60, Firefox ESR 60\
949 **CCK2 Equivalent:** `disableResetFirefox`\
950 **Preferences Affected:** `browser.disableResetPrompt`
951
952 #### Windows (GPO)
953 ```
954 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
955 ```
956 #### macOS
957 ```
958 <dict>
959 <key>DisableProfileRefresh</key>
960 <true/> | <false/>
961 </dict>
962 ```
963 #### policies.json
964 ```
965 {
966 "policies": {
967 "DisableProfileRefresh": true | false
968 }
969 }
970 ```
971 ### DisableSafeMode
972 Disable safe mode within the browser.
973
974 On Windows, this disables safe mode via the command line as well.
975
976 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
977 **CCK2 Equivalent:** `disableSafeMode`\
978 **Preferences Affected:** N/A
979
980 #### Windows (GPO)
981 ```
982 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
983 ```
984 #### macOS
985 ```
986 <dict>
987 <key>DisableSafeMode</key>
988 <true/> | <false/>
989 </dict>
990 ```
991 #### policies.json
992 ```
993 {
994 "policies": {
995 "DisableSafeMode": true | false
996 }
997 }
998 ```
999 ### DisableSecurityBypass
1000 Prevent the user from bypassing security in certain cases.
1001
1002 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1003
1004 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1005
1006 **Compatibility:** Firefox 60, Firefox ESR 60\
1007 **CCK2 Equivalent:** N/A\
1008 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1009
1010 #### Windows (GPO)
1011 ```
1012 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1013 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1014 ```
1015 #### macOS
1016 ```
1017 <dict>
1018 <key>DisableSecurityBypass</key>
1019 <dict>
1020 <key>InvalidCertificate</key>
1021 <true/> | <false/>
1022 <key><SafeBrowsing/key>
1023 <true/> | <false/>
1024 </dict>
1025 </dict>
1026 ```
1027 #### policies.json
1028 ```
1029 {
1030 "policies": {
1031 "DisableSecurityBypass": {
1032 "InvalidCertificate": true false,
1033 "SafeBrowsing": true false
1034 }
1035 }
1036 }
1037 ```
1038 ### DisableSystemAddonUpdate
1039 Prevent system add-ons from being installed or update.
1040
1041 **Compatibility:** Firefox 60, Firefox ESR 60\
1042 **CCK2 Equivalent:** N/A\
1043 **Preferences Affected:** N/A
1044
1045 #### Windows (GPO)
1046 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1047 ```
1048 #### macOS
1049 ```
1050 <dict>
1051 <key>DisableSystemAddonUpdate</key>
1052 <true/> | <false/>
1053 </dict>
1054 ```
1055 #### policies.json
1056 ```
1057 {
1058 "policies": {
1059 "DisableSystemAddonUpdate": true | false
1060 }
1061 }
1062 ```
1063 ### DisableTelemetry
1064 Prevent the upload of telemetry data.
1065
1066 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1067
1068 **Compatibility:** Firefox 60, Firefox ESR 60\
1069 **CCK2 Equivalent:** `disableTelemetry`\
1070 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1071
1072 #### Windows (GPO)
1073 ```
1074 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1075 ```
1076 #### macOS
1077 ```
1078 <dict>
1079 <key>DisableTelemetry</key>
1080 <true/> | <false/>
1081 </dict>
1082 ```
1083 #### policies.json
1084 ```
1085 {
1086 "policies": {
1087 "DisableTelemetry": true | false
1088 }
1089 }
1090 ```
1091 ### DisplayBookmarksToolbar
1092 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1093
1094 **Compatibility:** Firefox 60, Firefox ESR 60\
1095 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1096 **Preferences Affected:** N/A
1097
1098 #### Windows (GPO)
1099 ```
1100 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1101 ```
1102 #### macOS
1103 ```
1104 <dict>
1105 <key>DisplayBookmarksToolbar</key>
1106 <true/> | <false/>
1107 </dict>
1108 ```
1109 #### policies.json
1110 ```
1111 {
1112 "policies": {
1113 "DisplayBookmarksToolbar": true | false
1114 }
1115 }
1116 ```
1117 ### DisplayMenuBar (Deprecated)
1118 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1119
1120 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1121 **CCK2 Equivalent:** `displayMenuBar`\
1122 **Preferences Affected:** N/A
1123
1124 #### Windows (GPO)
1125 ```
1126 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1127 ```
1128 #### macOS
1129 ```
1130 <dict>
1131 <key>DisplayMenuBar</key>
1132 <true/> | <false/>
1133 </dict>
1134 ```
1135 #### policies.json
1136 ```
1137 {
1138 "policies": {
1139 "DisplayMenuBar": true | false
1140 }
1141 }
1142 ```
1143 ### DisplayMenuBar
1144 Set the state of the menubar.
1145
1146 `always` means the menubar is shown and cannot be hidden.
1147
1148 `never` means the menubar is hidden and cannot be shown.
1149
1150 `default-on` means the menubar is on by default but can be hidden.
1151
1152 `default-off` means the menubar is off by default but can be shown.
1153
1154 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1155 **CCK2 Equivalent:** `displayMenuBar`\
1156 **Preferences Affected:** N/A
1157
1158 #### Windows (GPO)
1159 ```
1160 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1161 ```
1162 #### macOS
1163 ```
1164 <dict>
1165 <key>DisplayMenuBar</key>
1166 <string>always | never | default-on | default-off</string>
1167 </dict>
1168 ```
1169 #### policies.json
1170 ```
1171 {
1172 "policies": {
1173 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1174 }
1175 }
1176 ```
1177 ### DNSOverHTTPS
1178 Configure DNS over HTTPS.
1179
1180 `Enabled` determines whether DNS over HTTPS is enabled
1181
1182 `ProviderURL` is a URL to another provider.
1183
1184 `Locked` prevents the user from changing DNS over HTTPS preferences.
1185
1186 **Compatibility:** Firefox 63, Firefox ESR 68\
1187 **CCK2 Equivalent:** N/A\
1188 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1189
1190 #### Windows (GPO)
1191 ```
1192 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1193 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1194 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1195 ```
1196 #### macOS
1197 ```
1198 <dict>
1199 <key>DNSOverHTTPS</key>
1200 <dict>
1201 <key>Enabled</key>
1202 <true/> | <false/>
1203 <key>ProviderURL</key>
1204 <string>URL_TO_ALTERNATE_PROVIDER</string>
1205 <key>Locked</key>
1206 <true/> | <false/>
1207 </dict>
1208 </dict>
1209 ```
1210 #### policies.json
1211 ```
1212 {
1213 "policies": {
1214 "DNSOverHTTPS": {
1215 "Enabled": true | false,
1216 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1217 "Locked": true | false
1218 }
1219 }
1220 }
1221 ```
1222 ### DontCheckDefaultBrowser
1223 Don't check if Firefox is the default browser at startup.
1224
1225 **Compatibility:** Firefox 60, Firefox ESR 60\
1226 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1227 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1228
1229 #### Windows (GPO)
1230 ```
1231 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1232 ```
1233 #### macOS
1234 ```
1235 <dict>
1236 <key>DontCheckDefaultBrowser</key>
1237 <true/> | <false/>
1238 </dict>
1239 ```
1240 #### policies.json
1241 ```
1242 {
1243 "policies": {
1244 "DontCheckDefaultBrowser": true | false
1245 }
1246 }
1247 ```
1248 ### DefaultDownloadDirectory
1249 Set the default download directory.
1250
1251 You can use ${home} for the native home directory.
1252
1253 **Compatibility:** Firefox 68, Firefox ESR 68\
1254 **CCK2 Equivalent:** N/A\
1255 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1256
1257 #### Windows (GPO)
1258 ```
1259 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1260 ```
1261 #### macOS
1262 ```
1263 <dict>
1264 <key>DefaultDownloadDirectory</key>
1265 <string>${home}/Downloads</string>
1266 </dict>
1267 ```
1268 #### policies.json (macOS and Linux)
1269 ```
1270 {
1271 "policies": {
1272 "DefaultDownloadDirectory": "${home}/Downloads"
1273 }
1274 ```
1275 #### policies.json (Windows)
1276 ```
1277 {
1278 "policies": {
1279 "DefaultDownloadDirectory": "${home}\\Downloads"
1280 }
1281 ```
1282 ### DownloadDirectory
1283 Set and lock the download directory.
1284
1285 You can use ${home} for the native home directory.
1286
1287 **Compatibility:** Firefox 68, Firefox ESR 68\
1288 **CCK2 Equivalent:** N/A\
1289 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1294 ```
1295 #### macOS
1296 ```
1297 <dict>
1298 <key>DownloadDirectory</key>
1299 <string>${home}/Downloads</string>
1300 </dict>
1301 ```
1302 #### policies.json (macOS and Linux)
1303 ```
1304 {
1305 "policies": {
1306 "DownloadDirectory": "${home}/Downloads"
1307 }
1308 ```
1309 #### policies.json (Windows)
1310 ```
1311 {
1312 "policies": {
1313 "DownloadDirectory": "${home}\\Downloads"
1314 }
1315 ```
1316 ### EnableTrackingProtection
1317 Configure tracking protection.
1318
1319 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1320
1321 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1322
1323 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1324
1325 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1326
1327 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1328
1329 `Exceptions` are origins for which tracking protection is not enabled.
1330
1331 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1332 **CCK2 Equivalent:** N/A\
1333 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1334
1335 #### Windows (GPO)
1336 ```
1337 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1338 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1339 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1340 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1341 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1342 ```
1343 #### macOS
1344 ```
1345 <dict>
1346 <key>EnableTrackingProtection</key>
1347 <dict>
1348 <key>Value</key>
1349 <true/> | <false/>
1350 <key><Locked</key>
1351 <true/> | <false/>
1352 <key><Cryptomining</key>
1353 <true/> | <false/>
1354 <key><Fingerprinting</key>
1355 <true/> | <false/>
1356 <key>Exceptions</key>
1357 <array>
1358 <string>https://example.com</string>
1359 </array>
1360 </dict>
1361 </dict>
1362 ```
1363 #### policies.json
1364 ```
1365 {
1366 "policies": {
1367 "EnableTrackingProtection": {
1368 "Value": [true, false],
1369 "Locked": [true, false],
1370 "Cryptomining": [true, false],
1371 "Fingerprinting": [true, false],
1372 "Exceptions": ["https://example.com"]
1373 }
1374 }
1375 ```
1376 ### EnterprisePoliciesEnabled
1377 Enable policy support on macOS.
1378
1379 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1380 **CCK2 Equivalent:** N/A\
1381 **Preferences Affected:** N/A
1382
1383 #### macOS
1384 ```
1385 <dict>
1386 <key>EnterprisePoliciesEnabled</key>
1387 <true/>
1388 </dict>
1389 ```
1390 ### Extensions
1391 Control the installation, uninstallation and locking of extensions.
1392
1393 `Install` is a list of URLs or native paths for extensions to be installed.
1394
1395 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1396
1397 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1398
1399 **Compatibility:** Firefox 60, Firefox ESR 60\
1400 **CCK2 Equivalent:** `addons`\
1401 **Preferences Affected:** N/A
1402
1403 #### Windows (GPO)
1404 ```
1405 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1406 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1407 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1408 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1409 ```
1410 #### macOS
1411 ```
1412 <dict>
1413 <key>Extensions</key>
1414 <dict>
1415 <key>Install</key>
1416 <array>
1417 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1418 <string>//path/to/xpi</string>
1419 </array>
1420 <key>Uninstall</key>
1421 <array>
1422 <string>bad_addon_id@mozilla.org</string>
1423 </array>
1424 <key>Locked</key>
1425 <array>
1426 <string>addon_id@mozilla.org</string>
1427 </array>
1428 </dict>
1429 </dict>
1430 ```
1431 #### policies.json
1432 ```
1433 {
1434 "policies": {
1435 "Extensions": {
1436 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1437 "Uninstall": ["bad_addon_id@mozilla.org"],
1438 "Locked": ["addon_id@mozilla.org"]
1439 }
1440 }
1441 }
1442 ```
1443 ### ExtensionSettings
1444 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1445
1446 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1447
1448 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1449
1450 The configuration for each extension is another dictionary that can contain the fields documented below.
1451
1452 | Name | Description |
1453 | --- | --- |
1454 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1455 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1456 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1457 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1458 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1459 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1460 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1461 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1462 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1463
1464 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1465 **CCK2 Equivalent:** N/A\
1466 **Preferences Affected:** N/A
1467
1468 #### Windows (GPO)
1469 ```
1470 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1471 {
1472 "*": {
1473 "blocked_install_message": "Custom error message.",
1474 "install_sources": ["https://addons.mozilla.org/"],
1475 "installation_mode": "blocked",
1476 "allowed_types": ["extension"]
1477 },
1478 "uBlock0@raymondhill.net": {
1479 "installation_mode": "force_installed",
1480 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1481 }
1482 }
1483 ```
1484 #### macOS
1485 ```
1486 <dict>
1487 <key>ExtensionSettings</key>
1488 <dict>
1489 <key>*</key>
1490 <dict>
1491 <key>blocked_install_message</key>
1492 <string>Custom error message.</string>
1493 <key>install_sources</key>
1494 <array>
1495 <string>https://addons.mozilla.org/</string>
1496 </array>
1497 <key>installation_mode</key>
1498 <string>blocked</string>
1499 <key>allowed_types</key>
1500 <array>
1501 <string>extension</string>
1502 </array>
1503 </dict>
1504 <key>uBlock0@raymondhill.net</key>
1505 <dict>
1506 <key>installation_mode</key>
1507 <string>force_installed</string>
1508 <key>install_url</key>
1509 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1510 </dict>
1511 </dict>
1512 </dict>
1513 ```
1514 #### policies.json
1515 ```
1516 {
1517 "policies": {
1518 "ExtensionSettings": {
1519 "*": {
1520 "blocked_install_message": "Custom error message.",
1521 "install_sources": ["https://addons.mozilla.org/"],
1522 "installation_mode": "blocked",
1523 "allowed_types": ["extension"]
1524 },
1525 "uBlock0@raymondhill.net": {
1526 "installation_mode": "force_installed",
1527 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1528 }
1529 }
1530 }
1531 }
1532 ```
1533 ### ExtensionUpdate
1534 Control extension updates.
1535
1536 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1537 **CCK2 Equivalent:** N/A\
1538 **Preferences Affected:** `extensions.update.enabled`
1539
1540 #### Windows (GPO)
1541 ```
1542 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1543 ```
1544 #### macOS
1545 ```
1546 <dict>
1547 <key>ExtensionUpdate</key>
1548 <true/> | <false/>
1549 </dict>
1550 ```
1551 #### policies.json
1552 ```
1553 {
1554 "policies": {
1555 "ExtensionUpdate": true | false
1556 }
1557 }
1558 ```
1559 ### FlashPlugin
1560 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1561
1562 `Allow` is a list of origins where Flash are allowed.
1563
1564 `Block` is a list of origins where Flash is not allowed.
1565
1566 `Default` determines whether or not Flash is allowed by default.
1567
1568 `Locked` prevents the user from changing Flash preferences.
1569
1570 **Compatibility:** Firefox 60, Firefox ESR 60\
1571 **CCK2 Equivalent:** `permissions.plugin`\
1572 **Preferences Affected:** `plugin.state.flash`
1573
1574 #### Windows (GPO)
1575 ```
1576 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1577 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1578 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1579 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1580 ```
1581 #### macOS
1582 ```
1583 <dict>
1584 <key>FlashPlugin</key>
1585 <dict>
1586 <key>Allow</key>
1587 <array>
1588 <string>http://example.org</string>
1589 </array>
1590 <key>Block</key>
1591 <array>
1592 <string>http://example.edu</string>
1593 </array>
1594 <key>Default</key>
1595 <true/> | <false/>
1596 <key>Locked</key>
1597 <true/> | <false/>
1598 </dict>
1599 </dict>
1600 ```
1601 #### policies.json
1602 ```
1603 {
1604 "policies": {
1605 "FlashPlugin": {
1606 "Allow": ["http://example.org/"],
1607 "Block": ["http://example.edu/"],
1608 "Default": true | false,
1609 "Locked": true | false
1610 }
1611 }
1612 }
1613 ```
1614 ### FirefoxHome
1615 Customize the Firefox Home page.
1616
1617 **Compatibility:** Firefox 68, Firefox ESR 68\
1618 **CCK2 Equivalent:** N/A\
1619 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1620
1621 #### Windows (GPO)
1622 ```
1623 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1624 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1625 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1626 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1627 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1628 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1629 ```
1630 #### macOS
1631 ```
1632 <dict>
1633 <key>FirefoxHome</key>
1634 <dict>
1635 <key>Search</key>
1636 <true/> | <false/>
1637 <key>TopSites</key>
1638 <true/> | <false/>
1639 <key>Highlights</key>
1640 <true/> | <false/>
1641 <key>Pocket</key>
1642 <true/> | <false/>
1643 <key>Snippets</key>
1644 <true/> | <false/>
1645 <key>Locked</key>
1646 <true/> | <false/>
1647 </dict>
1648 </dict>
1649 ```
1650 #### policies.json
1651 ```
1652 {
1653 "policies": {
1654 "FirefoxHome": {
1655 "Search": true | false,
1656 "TopSites": true | false,
1657 "Highlights": true | false,
1658 "Pocket": true | false,
1659 "Snippets": true | false,
1660 "Locked": true | false
1661 }
1662 }
1663 }
1664 ```
1665 ### HardwareAcceleration
1666 Control hardware acceleration.
1667
1668 **Compatibility:** Firefox 60, Firefox ESR 60\
1669 **CCK2 Equivalent:** N/A\
1670 **Preferences Affected:** `layers.acceleration.disabled`
1671
1672 #### Windows (GPO)
1673 ```
1674 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1675 ```
1676 #### macOS
1677 ```
1678 <dict>
1679 <key>HardwareAcceleration</key>
1680 <true/> | <false/>
1681 </dict>
1682 ```
1683 #### policies.json
1684 ```
1685 {
1686 "policies": {
1687 "HardwareAcceleration": true | false
1688 }
1689 }
1690 ```
1691 ### Homepage
1692 Configure the default homepage and how Firefox starts.
1693
1694 `URL` is the default homepage.
1695
1696 `Locked` prevents the user from changing homepage preferences.
1697
1698 `Additional` allows for more than one homepage.
1699
1700 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1701
1702 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1703 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1704 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1705
1706 #### Windows (GPO)
1707 ```
1708 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1709 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1710 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1711 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1712 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1713 ```
1714 #### macOS
1715 ```
1716 <dict>
1717 <key>Homepage</key>
1718 <dict>
1719 <key>URL</key>
1720 <string>http://example.com</string>
1721 <key>Locked</key>
1722 <true/> | <false/>
1723 <key>Additional</key>
1724 <array>
1725 <string>http://example.org</string>
1726 <string>http://example.edu</string>
1727 </array>
1728 <key>StartPage</key>
1729 <string>none | homepage | previous-session</string>
1730 </dict>
1731 </dict>
1732 ```
1733 #### policies.json
1734 ```
1735 {
1736 "policies": {
1737 "Homepage": {
1738 "URL": "http://example.com/",
1739 "Locked": true | false,
1740 "Additional": ["http://example.org/",
1741 "http://example.edu/"],
1742 "StartPage": "none" | "homepage" | "previous-session"
1743 }
1744 }
1745 }
1746 ```
1747 ### InstallAddonsPermission
1748 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1749
1750 `Allow` is a list of origins where extension installs are allowed.
1751
1752 `Default` determines whether or not extension installs are allowed by default.
1753
1754 **Compatibility:** Firefox 60, Firefox ESR 60\
1755 **CCK2 Equivalent:** `permissions.install`\
1756 **Preferences Affected:** `xpinstall.enabled`
1757
1758 #### Windows (GPO)
1759 ```
1760 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1761 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1762 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1763 ```
1764 #### macOS
1765 ```
1766 <dict>
1767 <key>InstallAddonsPermission</key>
1768 <dict>
1769 <key>Allow</key>
1770 <array>
1771 <string>http://example.org</string>
1772 <string>http://example.edu</string>
1773 </array>
1774 <key>Default</key>
1775 <true/> | <false/>
1776 </dict>
1777 </dict>
1778 ```
1779 #### policies.json
1780 ```
1781 {
1782 "policies": {
1783 "InstallAddonsPermission": {
1784 "Allow": ["http://example.org/",
1785 "http://example.edu/"],
1786 "Default": true | false
1787 }
1788 }
1789 }
1790 ```
1791 ### LegacyProfiles
1792 Disable the feature enforcing a separate profile for each installation.
1793
1794 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1795
1796 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1797
1798 This policy only work on Windows via GPO (not policies.json).
1799
1800 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1801 **CCK2 Equivalent:** N/A\
1802 **Preferences Affected:** N/A
1803
1804 #### Windows (GPO)
1805 ```
1806 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1807 ```
1808 ### LocalFileLinks
1809 Enable linking to local files by origin.
1810
1811 **Compatibility:** Firefox 68, Firefox ESR 68\
1812 **CCK2 Equivalent:** N/A\
1813 **Preferences Affected:** `capability.policy.localfilelinks.*`
1814
1815 #### Windows (GPO)
1816 ```
1817 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1818 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1819 ```
1820 #### macOS
1821 ```
1822 <dict>
1823 <key>LocalFileLinks</key>
1824 <array>
1825 <string>http://example.org</string>
1826 <string>http://example.edu</string>
1827 </array>
1828 </dict>
1829 ```
1830 #### policies.json
1831 ```
1832 {
1833 "policies": {
1834 "LocalFileLinks": ["http://example.org/",
1835 "http://example.edu/"]
1836 }
1837 }
1838 ```
1839 ### NoDefaultBookmarks
1840 Disable the creation of default bookmarks.
1841
1842 This policy is only effective if the user profile has not been created yet.
1843
1844 **Compatibility:** Firefox 60, Firefox ESR 60\
1845 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1846 **Preferences Affected:** N/A
1847
1848 #### Windows (GPO)
1849 ```
1850 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1851 ```
1852 #### macOS
1853 ```
1854 <dict>
1855 <key>NoDefaultBookmarks</key>
1856 <true/> | <false/>
1857 </dict>
1858 ```
1859 #### policies.json
1860 ```
1861 {
1862 "policies": {
1863 "NoDefaultBookmarks": true | false
1864 }
1865 }
1866 ```
1867 ### NetworkPrediction
1868 Enable or disable network prediction (DNS prefetching).
1869
1870 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1871 **CCK2 Equivalent:** N/A\
1872 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1873
1874 #### Windows (GPO)
1875 ```
1876 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1877 ```
1878 #### macOS
1879 ```
1880 <dict>
1881 <key>NetworkPrediction</key>
1882 <true/> | <false/>
1883 </dict>
1884 ```
1885 #### policies.json
1886 ```
1887 {
1888 "policies": {
1889 "NetworkPrediction": true | false
1890 }
1891 ```
1892 ### NewTabPage
1893 Enable or disable the New Tab page.
1894
1895 **Compatibility:** Firefox 68, Firefox ESR 68\
1896 **CCK2 Equivalent:** N/A\
1897 **Preferences Affected:** `browser.newtabpage.enabled`
1898
1899 #### Windows (GPO)
1900 ```
1901 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1902 ```
1903 #### macOS
1904 ```
1905 <dict>
1906 <key>NewTabPage</key>
1907 <true/> | <false/>
1908 </dict>
1909 ```
1910 #### policies.json
1911 ```
1912 {
1913 "policies": {
1914 "NewTabPage": true | false
1915 }
1916 ```
1917 ### OfferToSaveLogins
1918 Control whether or not Firefox offers to save passwords.
1919
1920 **Compatibility:** Firefox 60, Firefox ESR 60\
1921 **CCK2 Equivalent:** `dontRememberPasswords`\
1922 **Preferences Affected:** `signon.rememberSignons`
1923
1924 #### Windows (GPO)
1925 ```
1926 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1927 ```
1928 #### macOS
1929 ```
1930 <dict>
1931 <key>OfferToSaveLogins</key>
1932 <true/> | <false/>
1933 </dict>
1934 ```
1935 #### policies.json
1936 ```
1937 {
1938 "policies": {
1939 "OfferToSaveLogins": true | false
1940 }
1941 }
1942 ```
1943 ### OfferToSaveLoginsDefault
1944 Sets the default value of signon.rememberSignons without locking it.
1945
1946 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1947 **CCK2 Equivalent:** `dontRememberPasswords`\
1948 **Preferences Affected:** `signon.rememberSignons`
1949
1950 #### Windows (GPO)
1951 ```
1952 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1953 ```
1954 #### macOS
1955 ```
1956 <dict>
1957 <key>OfferToSaveLoginsDefault</key>
1958 <true/> | <false/>
1959 </dict>
1960 ```
1961 #### policies.json
1962 ```
1963 {
1964 "policies": {
1965 "OfferToSaveLoginsDefault": true | false
1966 }
1967 }
1968 ```
1969 ### OverrideFirstRunPage
1970 Override the first run page. If the value is blank, no first run page is displayed.
1971
1972 **Compatibility:** Firefox 60, Firefox ESR 60\
1973 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1974 **Preferences Affected:** `startup.homepage_welcome_url`
1975
1976 #### Windows (GPO)
1977 ```
1978 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1979 ```
1980 #### macOS
1981 ```
1982 <dict>
1983 <key>OverrideFirstRunPage</key>
1984 <string>http://example.org</string>
1985 </dict>
1986 ```
1987 #### policies.json
1988 ```
1989 {
1990 "policies": {
1991 "OverrideFirstRunPage": "http://example.org"
1992 }
1993 ```
1994 ### OverridePostUpdatePage
1995 Override the upgrade page. If the value is blank, no upgrade page is displayed.
1996
1997 **Compatibility:** Firefox 60, Firefox ESR 60\
1998 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
1999 **Preferences Affected:** `startup.homepage_override_url`
2000
2001 #### Windows (GPO)
2002 ```
2003 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2004 ```
2005 #### macOS
2006 ```
2007 <dict>
2008 <key>OverridePostUpdatePage</key>
2009 <string>http://example.org</string>
2010 </dict>
2011 ```
2012 #### policies.json
2013 ```
2014 {
2015 "policies": {
2016 "OverridePostUpdatePage": "http://example.org"
2017 }
2018 ```
2019 ### PasswordManagerEnabled
2020 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2021
2022 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2023 **CCK2 Equivalent:** N/A\
2024 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2025
2026 #### Windows (GPO)
2027 ```
2028 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2029 ```
2030 #### macOS
2031 ```
2032 <dict>
2033 <key>PasswordManagerEnabled</key>
2034 <true/> | <false/>
2035 </dict>
2036 ```
2037 #### policies.json
2038 ```
2039 {
2040 "policies": {
2041 "PasswordManagerEnabled": true | false
2042 }
2043 }
2044 ```
2045 ### Permissions
2046 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2047
2048 `Allow` is a list of origins where the feature is allowed.
2049
2050 `Block` is a list of origins where the feature is not allowed.
2051
2052 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2053
2054 `Locked` prevents the user from changing preferences for the feature.
2055
2056 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2057 **CCK2 Equivalent:** N/A\
2058 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2059
2060 #### Windows (GPO)
2061 ```
2062 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2063 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2064 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2065 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2066 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2067 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2068 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2069 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2070 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2071 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2072 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2073 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2074 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2075 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2076 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2077 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2078 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2079 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2080 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2081 ```
2082 #### macOS
2083 ```
2084 <dict>
2085 <key>Permissions</key>
2086 <dict>
2087 <key>Camera</key>
2088 <dict>
2089 <key>Allow</key>
2090 <array>
2091 <string>https://example.org</string>
2092 <string>https://example.org:1234</string>
2093 </array>
2094 <key>Block</key>
2095 <array>
2096 <string>https://example.edu</string>
2097 </array>
2098 <key>BlockNewRequests</key>
2099 <true/>
2100 <key>Locked</key>
2101 <true/>
2102 </dict>
2103 <key>Microphone</key>
2104 <dict>
2105 <key>Allow</key>
2106 <array>
2107 <string>https://example.org</string>
2108 </array>
2109 <key>Block</key>
2110 <array>
2111 <string>https://example.edu</string>
2112 </array>
2113 <key>BlockNewRequests</key>
2114 <true/>
2115 <key>Locked</key>
2116 <true/>
2117 </dict>
2118 <key>Location</key>
2119 <dict>
2120 <key>Allow</key>
2121 <array>
2122 <string>https://example.org</string>
2123 </array>
2124 <key>Block</key>
2125 <array>
2126 <string>https://example.edu</string>
2127 </array>
2128 <key>BlockNewRequests</key>
2129 <true/>
2130 <key>Locked</key>
2131 <true/>
2132 </dict>
2133 <key>Notifications</key>
2134 <dict>
2135 <key>Allow</key>
2136 <array>
2137 <string>https://example.org</string>
2138 </array>
2139 <key>Block</key>
2140 <array>
2141 <string>https://example.edu</string>
2142 </array>
2143 <key>BlockNewRequests</key>
2144 <true/>
2145 <key>Locked</key>
2146 <true/>
2147 </dict>
2148 <key>Autoplay</key>
2149 <dict>
2150 <key>Allow</key>
2151 <array>
2152 <string>https://example.org</string>
2153 </array>
2154 <key>Block</key>
2155 <array>
2156 <string>https://example.edu</string>
2157 </array>
2158 </dict>
2159 </dict>
2160 </dict>
2161 ```
2162 #### policies.json
2163 ```
2164 {
2165 "policies": {
2166 "Permissions": {
2167 "Camera": {
2168 "Allow": ["https://example.org","https://example.org:1234"],
2169 "Block": ["https://example.edu"],
2170 "BlockNewRequests": true | false,
2171 "Locked": true | false
2172 },
2173 "Microphone": {
2174 "Allow": ["https://example.org"],
2175 "Block": ["https://example.edu"],
2176 "BlockNewRequests": true | false,
2177 "Locked": true | false
2178 },
2179 "Location": {
2180 "Allow": ["https://example.org"],
2181 "Block": ["https://example.edu"],
2182 "BlockNewRequests": true | false,
2183 "Locked": true | false
2184 },
2185 "Notifications": {
2186 "Allow": ["https://example.org"],
2187 "Block": ["https://example.edu"],
2188 "BlockNewRequests": true | false,
2189 "Locked": true | false
2190 },
2191 "Autoplay": {
2192 "Allow": ["https://example.org"],
2193 "Block": ["https://example.edu"]
2194 }
2195 }
2196 }
2197 }
2198 ```
2199 ### PopupBlocking
2200 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2201
2202 `Allow` is a list of origins where popup-windows are allowed.
2203
2204 `Default` determines whether or not pop-up windows are allowed by default.
2205
2206 `Locked` prevents the user from changing pop-up preferences.
2207
2208 **Compatibility:** Firefox 60, Firefox ESR 60\
2209 **CCK2 Equivalent:** `permissions.popup`\
2210 **Preferences Affected:** `dom.disable_open_during_load`
2211
2212 #### Windows (GPO)
2213 ```
2214 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2215 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2216 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2217 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2218 ```
2219 #### macOS
2220 ```
2221 <dict>
2222 <key>PopupBlocking</key>
2223 <dict>
2224 <key>Allow</key>
2225 <array>
2226 <string>http://example.org</string>
2227 <string>http://example.edu</string>
2228 </array>
2229 <key>Default</key>
2230 <true/> | <false/>
2231 <key>Locked</key>
2232 <true/> | <false/>
2233 </dict>
2234 </dict>
2235 ```
2236 #### policies.json
2237 ```
2238 {
2239 "policies": {
2240 "PopupBlocking": {
2241 "Allow": ["http://example.org/",
2242 "http://example.edu/"],
2243 "Default": true | false,
2244 "Locked": true | false
2245 }
2246 }
2247 }
2248 ```
2249 ### Preferences
2250 Set and lock certain preferences.
2251
2252 **Compatibility:** See below\
2253 **CCK2 Equivalent:** `preferences`\
2254 **Preferences Affected:** See below
2255
2256 | Preference | Type | Compatibility | Default
2257 | --- | --- | --- | ---
2258 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2259 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2260 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2261 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2262 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2263 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2264 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2265 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2266 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2267 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2268 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2269 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2270 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2271 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2272 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2273 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2274 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2275 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2276 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2277 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2278 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2279 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2280 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2281 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2282 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2283 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2284 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2285 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2286 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2287 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2288 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2289 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2290 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2291 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2292 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2293 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2294 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2295 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2296 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2297 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2298 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2299 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2300 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2301 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2302 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2303 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2304 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2305 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2306 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2307 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2308 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2309 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2310 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2311 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2312 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2313 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2314 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2315 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2316 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2317 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2318 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2319 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2320 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2321 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2322 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2323 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2324 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2325 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2326 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2327 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2328 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2329 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2330 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2331 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2332 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2333 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2334 disabled
2335 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2336 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2337 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2338 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2339 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2340 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2341 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2342 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2343 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2344 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2345 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2346 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2347 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2348 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2349 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2350 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2351 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2352 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2353 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2354 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2355 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2356 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2357 #### Windows (GPO)
2358 ```
2359 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2360 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2361 ```
2362 #### macOS
2363 ```
2364 <dict>
2365 <key>Preferences</key>
2366 <dict>
2367 <key>boolean_preference_name</key>
2368 <true/> | <false/>
2369 <key>string_preference_name</key>
2370 <string>string_value</string>
2371 </dict>
2372 </dict>
2373 ```
2374 #### policies.json
2375 ```
2376 {
2377 "policies": {
2378 "Preferences": {
2379 "boolean_preference_name": true | false,
2380 "string_preference_name": "string_value"
2381 }
2382 }
2383 }
2384 ```
2385 ### PromptForDownloadLocation
2386 Ask where to save each file before downloading.
2387
2388 **Compatibility:** Firefox 68, Firefox ESR 68\
2389 **CCK2 Equivalent:** N/A\
2390 **Preferences Affected:** `browser.download.useDownloadDir`
2391
2392 #### Windows (GPO)
2393 ```
2394 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2395 ```
2396 #### macOS
2397 ```
2398 <dict>
2399 <key>PromptForDownloadLocation</key>
2400 <true/> | <false/>
2401 </dict>
2402 ```
2403 #### policies.json
2404 ```
2405 {
2406 "policies": {
2407 "PromptForDownloadLocation": true | false
2408 }
2409 }
2410 ```
2411 ### Proxy
2412 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2413 To specify ports, append them to the hostnames with a colon (:).
2414
2415 `Mode` is the proxy method being used.
2416
2417 `Locked` is whether or not proxy settings can be changed.
2418
2419 `HTTPProxy` is the HTTP proxy server.
2420
2421 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2422
2423 `SSLProxy` is the SSL proxy server.
2424
2425 `FTPProxy` is the FTP proxy server.
2426
2427 `SOCKSProxy` is the SOCKS proxy server
2428
2429 `SOCKSVersion` is the SOCKS version (4 or 5)
2430
2431 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2432
2433 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2434
2435 `AutoLogin` means do not prompt for authentication if password is saved.
2436
2437 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2438
2439 **Compatibility:** Firefox 60, Firefox ESR 60\
2440 **CCK2 Equivalent:** `networkProxy*`\
2441 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2442
2443 #### Windows (GPO)
2444 ```
2445 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2446 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2447 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2448 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2449 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2450 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2451 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2452 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2453 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2454 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2455 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2456 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2457 ```
2458 #### macOS
2459 ```
2460 <dict>
2461 <key>Proxy</key>
2462 <dict>
2463 <key>Mode</key>
2464 <string>none | system | manual | autoDetect | autoConfig</string>
2465 <key>Locked</key>
2466 <true> | </false>
2467 <key>HTTPProxy</key>
2468 <string>https://httpproxy.example.com</string>
2469 <key>UseHTTPProxyForAllProtocols</key>
2470 <true> | </false>
2471 <key>SSLProxy</key>
2472 <string>https://sslproxy.example.com</string>
2473 <key>FTPProxy</key>
2474 <string>https://ftpproxy.example.com</string>
2475 <key>SOCKSProxy</key>
2476 <string>https://socksproxy.example.com</string>
2477 <key>SOCKSVersion</key>
2478 <string>4 | 5</string>
2479 <key>Passthrough</key>
2480 <string>&lt;local>&gt;</string>
2481 <key>AutoConfigURL</key>
2482 <string>URL_TO_AUTOCONFIG</string>
2483 <key>AutoLogin</key>
2484 <true> | </false>
2485 <key>UseProxyForDNS</key>
2486 <true> | </false>
2487 </dict>
2488 </dict>
2489 ```
2490 #### policies.json
2491 ```
2492 {
2493 "policies": {
2494 "Proxy": {
2495 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2496 "Locked": [true, false],
2497 "HTTPProxy": "hostname",
2498 "UseHTTPProxyForAllProtocols": [true, false],
2499 "SSLProxy": "hostname",
2500 "FTPProxy": "hostname",
2501 "SOCKSProxy": "hostname",
2502 "SOCKSVersion": 4 | 5
2503 "Passthrough": "<local>",
2504 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2505 "AutoLogin": [true, false],
2506 "UseProxyForDNS": [true, false]
2507 }
2508 }
2509 }
2510 ```
2511 ### RequestedLocales
2512 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2513
2514 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2515
2516 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2517 **CCK2 Equivalent:** N/A\
2518 **Preferences Affected:** N/A
2519 #### Windows (GPO)
2520 ```
2521 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2522 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2523
2524 or
2525
2526 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2527 ```
2528 #### macOS
2529 ```
2530 <dict>
2531 <key>RequestedLocales</key>
2532 <array>
2533 <string>de</string>
2534 <string>en-US</string>
2535 </array>
2536 </dict>
2537
2538 or
2539
2540 <dict>
2541 <key>RequestedLocales</key>
2542 <string>de,en-US</string>
2543 </dict>
2544
2545 ```
2546 #### policies.json
2547 ```
2548 {
2549 "policies": {
2550 "RequestedLocales": ["de", "en-US"]
2551 }
2552 }
2553
2554 or
2555
2556 {
2557 "policies": {
2558 "RequestedLocales": "de,en-US"
2559 }
2560 }
2561 ```
2562 ### SanitizeOnShutdown (Selective)
2563 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2564
2565 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2566
2567 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2568 **CCK2 Equivalent:** N/A\
2569 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2570 #### Windows (GPO)
2571 ```
2572 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2573 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2574 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2575 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2576 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2577 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2578 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2579 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2580 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2581 ```
2582 #### macOS
2583 ```
2584 <dict>
2585 <key>SanitizeOnShutdown</key>
2586 <dict>
2587 <key>Cache</key>
2588 <true/> | <false/>
2589 <key>Cookies</key>
2590 <true/> | <false/>
2591 <key>Downloads</key>
2592 <true/> | <false/>
2593 <key>FormData</key>
2594 <true/> | <false/>
2595 <key>History</key>
2596 <true/> | <false/>
2597 <key>Sessions</key>
2598 <true/> | <false/>
2599 <key>SiteSettings</key>
2600 <true/> | <false/>
2601 <key>OfflineApps</key>
2602 <true/> | <false/>
2603 <key>Locked</key>
2604 <true/> | <false/>
2605 </dict>
2606 </dict>
2607 ```
2608 #### policies.json
2609 ```
2610 {
2611 "policies": {
2612 "SanitizeOnShutdown": {
2613 "Cache": true | false,
2614 "Cookies": true | false,
2615 "Downloads": true | false,
2616 "FormData": true | false,
2617 "History": true | false,
2618 "Sessions": true | false,
2619 "SiteSettings": true | false,
2620 "OfflineApps": true | false,
2621 "Locked": true | false
2622 }
2623 }
2624 }
2625 ```
2626 ### SanitizeOnShutdown (All)
2627 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2628
2629 **Compatibility:** Firefox 60, Firefox ESR 60\
2630 **CCK2 Equivalent:** N/A\
2631 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2632 #### Windows (GPO)
2633 ```
2634 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2635 ```
2636 #### macOS
2637 ```
2638 <dict>
2639 <key>SanitizeOnShutdown</key>
2640 <true/> | <false/>
2641 </dict>
2642 ```
2643 #### policies.json
2644 ```
2645 {
2646 "policies": {
2647 "SanitizeOnShutdown": true | false
2648 }
2649 }
2650 ```
2651 ### SearchBar
2652 Set whether or not search bar is displayed.
2653
2654 **Compatibility:** Firefox 60, Firefox ESR 60\
2655 **CCK2 Equivalent:** `showSearchBar`\
2656 **Preferences Affected:** N/A
2657
2658 #### Windows (GPO)
2659 ```
2660 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2661 ```
2662 #### macOS
2663 ```
2664 <dict>
2665 <key>SearchBar</key>
2666 <string>unified | separate</string>
2667 </dict>
2668 ```
2669
2670 #### policies.json
2671 ```
2672 {
2673 "policies": {
2674 "SearchBar": "unified" | "separate"
2675 }
2676 }
2677 ```
2678
2679
2680
2681
2682
2683 ### SearchEngines (This policy is only available on the ESR.)
2684
2685 ### SearchEngines | Default
2686
2687 Set the default search engine. This policy is only available on the ESR.
2688
2689 **Compatibility:** Firefox ESR 60\
2690 **CCK2 Equivalent:** `defaultSearchEngine`\
2691 **Preferences Affected:** N/A
2692
2693 #### Windows (GPO)
2694 ```
2695 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2696 ```
2697 #### macOS
2698 ```
2699 <dict>
2700 <key>SearchEngines</key>
2701 <dict>
2702 <key>Default</key>
2703 <string>NAME_OF_SEARCH_ENGINE</string>
2704 </dict>
2705 </dict>
2706 ```
2707 #### policies.json
2708 ```
2709 {
2710 "policies": {
2711 "SearchEngines": {
2712 "Default": "NAME_OF_SEARCH_ENGINE"
2713 }
2714 }
2715 }
2716 ```
2717 ### SearchEngines | PreventInstalls
2718
2719 Prevent installing search engines from webpages.
2720
2721 **Compatibility:** Firefox ESR 60\
2722 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2723 **Preferences Affected:** N/A
2724
2725 #### Windows (GPO)
2726 ```
2727 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2728 ```
2729 #### macOS
2730 ```
2731 <dict>
2732 <key>SearchEngines</key>
2733 <dict>
2734 <key>PreventInstalls</key>
2735 <true/> | <false/>
2736 </dict>
2737 </dict>
2738 ```
2739 #### policies.json
2740 ```
2741 {
2742 "policies": {
2743 "SearchEngines": {
2744 "PreventInstalls": true | false
2745 }
2746 }
2747 }
2748 ```
2749 ### SearchEngines | Remove
2750
2751 Hide built-in search engines. This policy is only available on the ESR.
2752
2753 **Compatibility:** Firefox ESR 60.2\
2754 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2755 **Preferences Affected:** N/A
2756
2757 #### Windows (GPO)
2758 ```
2759 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2760 ```
2761 #### macOS
2762 ```
2763 <dict>
2764 <key>SearchEngines</key>
2765 <dict>
2766 <key>Remove</key>
2767 <array>
2768 <string>NAME_OF_SEARCH_ENGINE</string>
2769 </array>
2770 </dict>
2771 </dict>
2772 ```
2773 #### policies.json
2774 ```
2775 {
2776 "policies": {
2777 "SearchEngines": {
2778 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2779 }
2780 }
2781 }
2782 ```
2783 ### SearchEngines | Add
2784
2785 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2786
2787 `Name` is the name of the search engine.
2788
2789 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2790
2791 `Method` is either GET or POST
2792
2793 `IconURL` is a URL for the icon to use.
2794
2795 `Alias` is a keyword to use for the engine.
2796
2797 `Description` is a description of the search engine.
2798
2799 `PostData` is the POST data as name value pairs separated by &.
2800
2801 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2802
2803 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2804 **CCK2 Equivalent:** `searchplugins`\
2805 **Preferences Affected:** N/A
2806
2807 #### Windows (GPO)
2808 ```
2809 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2810 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2811 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2812 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2813 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2814 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2815 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2816 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2817 ```
2818
2819 #### macOS
2820 ```
2821 <dict>
2822 <key>SearchEngines</key>
2823 <dict>
2824 <key>Add</key>
2825 <array>
2826 <dict>
2827 <key>Name</key>
2828 <string>Example1</string>
2829 <key>URLTemplate</key>
2830 <string>https://www.example.org/q={searchTerms}</string>
2831 <key>Method</key>
2832 <string>GET | POST </string>
2833 <key>IconURL</key>
2834 <string>https://www.example.org/favicon.ico</string>
2835 <key>Alias</key>
2836 <string>example</string>
2837 <key>Description</key>
2838 <string>Example Description</string>
2839 <key>SuggestURLTemplate</key>
2840 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2841 <key>PostData</key>
2842 <string>name=value&q={searchTerms}</string>
2843 </dict>
2844 <array>
2845 </dict>
2846 </dict>
2847 ```
2848 #### policies.json
2849 ```
2850 {
2851 "policies": {
2852 "SearchEngines": {
2853 "Add": [
2854 {
2855 "Name": "Example1",
2856 "URLTemplate": "https://www.example.org/q={searchTerms}",
2857 "Method": "GET" | "POST",
2858 "IconURL": "https://www.example.org/favicon.ico",
2859 "Alias": "example",
2860 "Description": "Description",
2861 "PostData": "name=value&q={searchTerms}",
2862 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2863 }
2864 ]
2865 }
2866 }
2867 }
2868 ```
2869 ### SearchSuggestEnabled
2870
2871 Enable search suggestions.
2872
2873 **Compatibility:** Firefox 68, Firefox ESR 68\
2874 **CCK2 Equivalent:** N/A\
2875 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2876
2877 #### Windows (GPO)
2878 ```
2879 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2880 ```
2881 #### macOS
2882 ```
2883 <dict>
2884 <key>SearchSuggestEnabled</key>
2885 <true/> | <false/>
2886 </dict>
2887 ```
2888 #### policies.json
2889 ```
2890 {
2891 "policies": {
2892 "SearchSuggestEnabled": true | false
2893 }
2894 }
2895 ```
2896 ### SecurityDevices
2897
2898 Install PKCS #11 modules.
2899
2900 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2901 **CCK2 Equivalent:** `certs.devices`\
2902 **Preferences Affected:** N/A
2903
2904 #### Windows (GPO)
2905 ```
2906 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2907 ```
2908 #### macOS
2909 ```
2910 <dict>
2911 <key>SecurityDevices</key>
2912 <dict>
2913 <key>NAME_OF_DEVICE</key>
2914 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2915 </dict>
2916 </dict>
2917 ```
2918
2919 #### policies.json
2920 ```
2921 {
2922 "policies": {
2923 "SecurityDevices": {
2924 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2925 }
2926 }
2927 }
2928 ```
2929 ### SSLVersionMax
2930
2931 Set and lock the maximum version of TLS.
2932
2933 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2934 **CCK2 Equivalent:** N/A\
2935 **Preferences Affected:** `security.tls.version.max`
2936
2937 #### Windows (GPO)
2938 ```
2939 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2940 ```
2941 #### macOS
2942 ```
2943 <dict>
2944 <key>SSLVersionMax</key>
2945 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2946 </dict>
2947 ```
2948
2949 #### policies.json
2950 ```
2951 {
2952 "policies": {
2953 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2954 }
2955 }
2956 ```
2957 ### SSLVersionMin
2958
2959 Set and lock the minimum version of TLS.
2960
2961 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2962 **CCK2 Equivalent:** N/A\
2963 **Preferences Affected:** `security.tls.version.min`
2964
2965 #### Windows (GPO)
2966 ```
2967 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2968 ```
2969 #### macOS
2970 ```
2971 <dict>
2972 <key>SSLVersionMin</key>
2973 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2974 </dict>
2975 ```
2976
2977 #### policies.json
2978 ```
2979 {
2980 "policies": {
2981 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2982 }
2983 }
2984 ```
2985 ### SupportMenu
2986 Add a menuitem to the help menu for specifying support information.
2987
2988 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2989 **CCK2 Equivalent:** helpMenu\
2990 **Preferences Affected:** N/A
2991
2992 #### Windows (GPO)
2993 ```
2994 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
2995 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
2996 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
2997 ```
2998 #### macOS
2999 ```
3000 <dict>
3001 <key>SupportMenu</key>
3002 <dict>
3003 <key>Title</key>
3004 <string>SupportMenu</string>
3005 <key>URL</key>
3006 <string>http://example.com/support</string>
3007 <key>AccessKey</key>
3008 <string>S</string>
3009 </dict>
3010 </dict>
3011 ```
3012 #### policies.json
3013 ```
3014 {
3015 "policies": {
3016 "SupportMenu": {
3017 "Title": "Support Menu",
3018 "URL": "http://example.com/support",
3019 "AccessKey": "S"
3020 }
3021 }
3022 }
3023 ```
3024 ### UserMessaging
3025
3026 Prevent installing search engines from webpages.
3027
3028 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
3029
3030 `ExtensionRecommendations` Don't recommend extensions.
3031
3032 `FeatureRecommendations` Don't recommend browser features.
3033
3034 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
3035
3036 **Compatibility:** Firefox 75, Firefox ESR 68.7\
3037 **CCK2 Equivalent:** N/A\
3038 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
3039
3040 #### Windows (GPO)
3041 ```
3042 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
3043 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
3044 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
3045 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
3046 ```
3047 #### macOS
3048 ```
3049 <dict>
3050 <key>UserMessaging</key>
3051 <dict>
3052 <key>WhatsNew</key>
3053 <true/> | <false/>
3054 <key>ExtensionRecommendations</key>
3055 <true/> | <false/>
3056 <key>FeatureRecommendations</key>
3057 <true/> | <false/>
3058 <key>UrlbarInterventions</key>
3059 <true/> | <false/>
3060 </dict>
3061 </dict>
3062 ```
3063 #### policies.json
3064 ```
3065 {
3066 "policies": {
3067 "UserMessaging": {
3068 "WhatsNew": true | false,
3069 "ExtensionRecommendations": true | false,
3070 "FeatureRecommendations": true | false,
3071 "UrlbarInterventions": true | false
3072 }
3073 }
3074 }
3075 ```
3076 ### WebsiteFilter
3077 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3078
3079 **Compatibility:** Firefox 60, Firefox ESR 60\
3080 **CCK2 Equivalent:** N/A\
3081 **Preferences Affected:** N/A
3082
3083 #### Windows (GPO)
3084 ```
3085 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
3086 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
3087 ```
3088 #### macOS
3089 ```
3090 <dict>
3091 <key>WebsiteFilter</key>
3092 <dict>
3093 <key>Block</key>
3094 <array>
3095 <string><all_urls></string>
3096 </array>
3097 <key>Exceptions</key>
3098 <array>
3099 <string>http://example.org/*</string>
3100 </array>
3101 </dict>
3102
3103 </dict>
3104 ```
3105 #### policies.json
3106 ```
3107 {
3108 "policies": {
3109 "WebsiteFilter": {
3110 "Block": ["<all_urls>"],
3111 "Exceptions": ["http://example.org/*"]
3112 }
3113 }
3114 }
3115 ```

patrick-canterino.de