]> git.p6c8.net - policy-templates.git/blob - README.md
Remove versions
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the officially released versions (https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the Group Policy templates on Windows (https://github.com/mozilla/policy-templates/tree/master/windows), configuration profiles on macOS (https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppUpdateURL`](#AppUpdateURL)** | Change the URL for application update.
10 | **[`Authentication`](#Authentication)** | Configure sites that support integrated authentication.
11 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
12 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
13 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
14 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
15 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
16 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
17 | **[`Certificates`](#certificates)** |
18 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
19 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
20 | **[`Cookies`](#cookies)** | Configure cookie preferences.
21 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
22 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
26 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
27 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
28 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
29 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
30 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
31 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
32 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
33 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
34 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
35 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
36 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
37 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
38 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
39 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
40 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
41 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
42 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
43 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
44 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
45 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
46 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
47 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
48 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
49 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
50 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
51 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
52 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
53 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
54 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
55 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
56 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
57 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
58 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
59 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
60 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
61 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
62 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
63 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
64 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
65 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
66 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
67 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
68 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
69 | **[`Preferences`](#preferences)** | Set and lock some preferences.
70 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
71 | **[`Proxy`](#proxy)** | Configure proxy settings.
72 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
73 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
74 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
75 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
76 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
77 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
78 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
79 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
80 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
81 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
82 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
83 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
84 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
85 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
86 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
87
88 ### AppUpdateURL
89
90 Change the URL for application update.
91
92 **Compatibility:** Firefox 62, Firefox ESR 60.2\
93 **CCK2 Equivalent:** N/A\
94 **Preferences Affected:** `app.update.url`
95
96 #### Windows (GPO)
97 ```
98 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
99 ```
100 #### macOS
101 ```
102 <dict>
103 <key>AppUpdateURL</key>
104 <string>https://yoursite.com</string>
105 </dict>
106 ```
107 #### policies.json
108 ```
109 {
110 "policies": {
111 "AppUpdateURL": "https://yoursite.com"
112 }
113 }
114 ```
115 ### Authentication
116
117 Configure sites that support integrated authentication.
118
119 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
120
121 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3)\
122 **CCK2 Equivalent:** N/A\
123 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`
124
125 #### Windows (GPO)
126 ```
127 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
128 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
129 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
130 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
131 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
132 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
133 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
134 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
135 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
136 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
137 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
138 ```
139 #### macOS
140 ```
141 <dict>
142 <key>Authentication</key>
143 <dict>
144 <key>SPNEGO</key>
145 <array>
146 <string>mydomain.com</string>
147 <string>https://myotherdomain.com</string>
148 </array>
149 <key>Delegated</key>
150 <array>
151 <string>mydomain.com</string>
152 <string>https://myotherdomain.com</string>
153 </array>
154 <key>NTLM</key>
155 <array>
156 <string>mydomain.com</string>
157 <string>https://myotherdomain.com</string>
158 </array>
159 <key>AllowNonFQDN</key>
160 <dict>
161 <key>SPNEGO</key>
162 <true/> | <false/>
163 <key>NTLM</key>
164 <true/> | <false/>
165 </dict>
166 <key>AllowProxies</key>
167 <dict>
168 <key>SPNEGO</key>
169 <true/> | <false/>
170 <key>NTLM</key>
171 <true/> | <false/>
172 </dict>
173 <key>Locked</key>
174 <true/> | <false/>
175 </dict>
176 </dict>
177 ```
178 #### policies.json
179 ```
180 {
181 "policies": {
182 "Authentication": {
183 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
184 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
185 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
186 "AllowNonFQDN": {
187 "SPNEGO": true | false,
188 "NTLM": true | false
189 },
190 "AllowProxies": {
191 "SPNEGO": true | false,
192 "NTLM": true | false
193 },
194 "Locked": true | false
195 }
196 }
197 }
198 ```
199 ### BlockAboutAddons
200
201 Block access to the Add-ons Manager (about:addons).
202
203 **Compatibility:** Firefox 60, Firefox ESR 60\
204 **CCK2 Equivalent:** `disableAddonsManager`\
205 **Preferences Affected:** N/A
206
207 #### Windows (GPO)
208 ```
209 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
210 ```
211 #### macOS
212 ```
213 <dict>
214 <key>BlockAboutAddons</key>
215 <true/> | <false/>
216 </dict>
217 ```
218 #### policies.json
219 ```
220 {
221 "policies": {
222 "BlockAboutAddons": true | false
223 }
224 }
225 ```
226 ### BlockAboutConfig
227
228 Block access to about:config.
229
230 **Compatibility:** Firefox 60, Firefox ESR 60\
231 **CCK2 Equivalent:** `disableAboutConfig`\
232 **Preferences Affected:** N/A
233
234 #### Windows (GPO)
235 ```
236 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
237 ```
238 #### macOS
239 ```
240 <dict>
241 <key>BlockAboutConfig</key>
242 <true/> | <false/>
243 </dict>
244 ```
245 #### policies.json
246 ```
247 {
248 "policies": {
249 "BlockAboutConfig": true | false
250 }
251 }
252 ```
253 ### BlockAboutProfiles
254
255 Block access to About Profiles (about:profiles).
256
257 **Compatibility:** Firefox 60, Firefox ESR 60\
258 **CCK2 Equivalent:** `disableAboutProfiles`\
259 **Preferences Affected:** N/A
260
261 #### Windows (GPO)
262 ```
263 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
264 ```
265 #### macOS
266 ```
267 <dict>
268 <key>BlockAboutProfiles</key>
269 <true/> | <false/>
270 </dict>
271 ```
272 #### policies.json
273 ```
274 {
275 "policies": {
276 "BlockAboutProfiles": true | false
277 }
278 }
279 ```
280 ### BlockAboutSupport
281
282 Block access to Troubleshooting Information (about:support).
283
284 **Compatibility:** Firefox 60, Firefox ESR 60\
285 **CCK2 Equivalent:** `disableAboutSupport`\
286 **Preferences Affected:** N/A
287
288 #### Windows (GPO)
289 ```
290 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
291 ```
292 #### macOS
293 ```
294 <dict>
295 <key>BlockAboutSupport</key>
296 <true/> | <false/>
297 </dict>
298 ```
299 #### policies.json
300 ```
301 {
302 "policies": {
303 "BlockAboutSupport": true | false
304 }
305 }
306 ```
307 ### Bookmarks
308
309 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
310
311 **Compatibility:** Firefox 60, Firefox ESR 60\
312 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
313 **Preferences Affected:** N/A
314
315 #### Windows (GPO)
316 ```
317 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
318 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
319 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
320 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
321 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
322 ```
323 #### macOS
324 ```
325 <dict>
326 <key>Bookmarks</key>
327 <array>
328 <dict>
329 <key>Title</key>
330 <string>Example</string>
331 <key>URL</key>
332 <string>https://example.com</string>
333 <key>Favicon</key>
334 <string>https://example.com/favicon.ico</string>
335 <key>Placement</key>
336 <string>toolbar | menu</string>
337 <key>Folder</key>
338 <string>FolderName</string>
339 </dict>
340 </array>
341 </dict>
342 ```
343 #### policies.json
344 ```
345 {
346 "policies": {
347 "Bookmarks": [
348 {
349 "Title": "Example",
350 "URL": "https://example.com",
351 "Favicon": "https://example.com/favicon.ico",
352 "Placement": "toolbar" | "menu",
353 "Folder": "FolderName"
354 }
355 ]
356 }
357 }
358 ```
359 ### CaptivePortal
360 Enable or disable the detection of captive portals.
361
362 **Compatibility:** Firefox 67, Firefox ESR 60.7\
363 **CCK2 Equivalent:** N/A\
364 **Preferences Affected:** `network.captive-portal-service.enabled`
365
366 #### Windows (GPO)
367 ```
368 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
369 ```
370 #### macOS
371 ```
372 <dict>
373 <key>CaptivePortal</key>
374 <true/> | <false/>
375 </dict>
376 ```
377 #### policies.json
378 ```
379 {
380 "policies": {
381 "CaptivePortal": true | false
382 }
383 }
384 ```
385 ### Certificates
386
387 ### Certificates | ImportEnterpriseRoots
388
389 Trust certificates that have been added to the operating system certificate store by a user or administrator.
390
391 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
392
393 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
394 **CCK2 Equivalent:** N/A\
395 **Preferences Affected:** `security.enterprise_roots.enabled`
396
397 #### Windows (GPO)
398 ```
399 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
400 ```
401 #### macOS
402 ```
403 <dict>
404 <key>Certificates</key>
405 <dict>
406 <key>ImportEnterpriseRoots</key>
407 <true/> | <false/>
408 </dict>
409 </dict>
410 ```
411 #### policies.json
412 ```
413 {
414 "policies": {
415 "Certificates": {
416 "ImportEnterpriseRoots": true | false
417 }
418 }
419 }
420 ```
421 ### Certificates | Install
422
423 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
424
425 - Windows
426 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
427 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
428 - macOS
429 - /Library/Application Support/Mozilla/Certificates
430 - ~/Library/Application Support/Mozilla/Certificates
431 - Linux
432 - /usr/lib/mozilla/certificates
433 - /usr/lib64/mozilla/certificates
434 - ~/.mozilla/certificates
435
436 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
437
438 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
439
440 Certificates are installed using the trust string `CT,CT,`.
441
442 Binary (DER) and ASCII (PEM) certificates are both supported.
443
444 **Compatibility:** Firefox 64, Firefox ESR 64\
445 **CCK2 Equivalent:** `certs.ca`\
446 **Preferences Affected:** N/A
447
448 #### Windows (GPO)
449 ```
450 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
451 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
452 ```
453 #### macOS
454 ```
455 <dict>
456 <key>Certificates</key>
457 <dict>
458 <key>Install</key>
459 <array>
460 <string>cert1.der</string>
461 <string>/Users/username/cert2.pem</string>
462 </array>
463 </dict>
464 </dict>
465 ```
466 #### policies.json
467 ```
468 {
469 "policies": {
470 "Certificates": {
471 "Install": ["cert1.der", "/home/username/cert2.pem"]
472 }
473 }
474 }
475 ```
476 ### Cookies
477 Configure cookie preferences.
478
479 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
480
481 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
482
483 `Default` determines whether cookies are accepted at all.
484
485 `AcceptThirdParty` determines how third-party cookies are handled.
486
487 `ExpireAtSessionEnd` determines when cookies expire.
488
489 `RejectTracker` only rejects cookies for trackers.
490
491 `Locked` prevents the user from changing cookie preferences.
492
493 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
494 **CCK2 Equivalent:** N/A\
495 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
496
497 #### Windows (GPO)
498 ```
499 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
500 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
501 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
502 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" |"from-visited"
503 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
504 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
505 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
506 ```
507 #### macOS
508 ```
509 <dict>
510 <key>Cookies</key>
511 <dict>
512 <key>Allow</key>
513 <array>
514 <string>http://example.com</string>
515 </array>
516 <key>Block</key>
517 <array>
518 <string>http://example.org</string>
519 </array>
520 <key>Default</key>
521 <true/> | <false/>
522 <key>AcceptThirdParty</key>
523 <string>always | never | from-visited</string>
524 <key>ExpireAtSessionEnd</key>
525 <true/> | <false/>
526 <key>RejectTracker</key>
527 <true/> | <false/>
528 <key>Locked</key>
529 <true/> | <false/>
530 </dict>
531 </dict>
532 ```
533 #### policies.json
534 ```
535 {
536 "policies": {
537 "Cookies": {
538 "Allow": ["http://example.org/"],
539 "Block": ["http://example.edu/"],
540 "Default": true | false,
541 "AcceptThirdParty": "always" | "never" | "from-visited",
542 "ExpireAtSessionEnd": true | false,
543 "RejectTracker": true | false,
544 "Locked": true | false
545 }
546 }
547 }
548 ```
549 ### DisableSetDesktopBackground
550 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
551
552 **Compatibility:** Firefox 60, Firefox ESR 60\
553 **CCK2 Equivalent:** `removeSetDesktopBackground`\
554 **Preferences Affected:** N/A
555
556 #### Windows (GPO)
557 ```
558 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
559 ```
560
561 #### macOS
562 ```
563 <dict>
564 <key>DisableSetDesktopBackground</key>
565 <true/> | <false/>
566 </dict>
567 ```
568 #### policies.json
569 ```
570 {
571 "policies": {
572 "DisableSetDesktopBackground": true | false
573 }
574 }
575 ```
576 ### DisableMasterPasswordCreation
577 Remove the master password functionality.
578
579 **Compatibility:** Firefox 60, Firefox ESR 60\
580 **CCK2 Equivalent:** `noMasterPassword`\
581 **Preferences Affected:** N/A
582
583 #### Windows (GPO)
584 ```
585 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
586 ```
587
588 #### macOS
589 ```
590 <dict>
591 <key>DisableMasterPasswordCreation</key>
592 <true/> | <false/>
593 </dict>
594 ```
595 #### policies.json
596 ```
597 {
598 "policies": {
599 "DisableMasterPasswordCreation": true | false
600 }
601 }
602 ```
603 ### DisableAppUpdate
604 Turn off application updates.
605
606 **Compatibility:** Firefox 60, Firefox ESR 60\
607 **CCK2 Equivalent:** `disableFirefoxUpdates`\
608 **Preferences Affected:** N/A
609
610 #### Windows (GPO)
611 ```
612 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
613 ```
614 #### macOS
615 ```
616 <dict>
617 <key>DisableAppUpdate</key>
618 <true/> | <false/>
619 </dict>
620 ```
621 #### policies.json
622 ```
623 {
624 "policies": {
625 "DisableAppUpdate": true | false
626 }
627 }
628 ```
629 ### DisableBuiltinPDFViewer
630 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
631
632 **Compatibility:** Firefox 60, Firefox ESR 60\
633 **CCK2 Equivalent:** `disablePDFjs`\
634 **Preferences Affected:** `pdfjs.disabled`
635
636 #### Windows (GPO)
637 ```
638 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
639 ```
640
641 #### macOS
642 ```
643 <dict>
644 <key>DisableBuiltinPDFViewer</key>
645 <true/> | <false/>
646 </dict>
647 ```
648 #### policies.json
649 ```
650 {
651 "policies": {
652 "DisableBuiltinPDFViewer": true | false
653 }
654 }
655 ```
656 ### DisableDeveloperTools
657 Remove access to all developer tools.
658
659 **Compatibility:** Firefox 60, Firefox ESR 60\
660 **CCK2 Equivalent:** `removeDeveloperTools`\
661 **Preferences Affected:** `devtools.policy.disabled`
662
663 #### Windows (GPO)
664 ```
665 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
666 ```
667
668 #### macOS
669 ```
670 <dict>
671 <key>DisableDeveloperTools</key>
672 <true/> | <false/>
673 </dict>
674 ```
675 #### policies.json
676 ```
677 {
678 "policies": {
679 "DisableDeveloperTools": true | false
680 }
681 }
682 ```
683 ### DisableFeedbackCommands
684 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
685
686 **Compatibility:** Firefox 60, Firefox ESR 60\
687 **CCK2 Equivalent:** N/A\
688 **Preferences Affected:** N/A
689
690 #### Windows (GPO)
691 ```
692 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
693 ```
694 #### macOS
695 ```
696 <dict>
697 <key>DisableFeedbackCommands</key>
698 <true/> | <false/>
699 </dict>
700 ```
701 #### policies.json
702 ```
703 {
704 "policies": {
705 "DisableFeedbackCommands": true | false
706 }
707 }
708 ```
709 ### DisableFirefoxScreenshots
710 Remove access to Firefox Screenshots.
711
712 **Compatibility:** Firefox 60, Firefox ESR 60\
713 **CCK2 Equivalent:** N/A\
714 **Preferences Affected:** `extensions.screenshots.disabled`
715
716 #### Windows (GPO)
717 ```
718 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
719 ```
720 #### macOS
721 ```
722 <dict>
723 <key>DisableFirefoxScreenshots</key>
724 <true/> | <false/>
725 </dict>
726 ```
727 #### policies.json
728 ```
729 {
730 "policies": {
731 "DisableFirefoxScreenshots": true | false
732 }
733 }
734 ```
735 ### DisableFirefoxAccounts
736 Disable Firefox Accounts integration (Sync).
737
738 **Compatibility:** Firefox 60, Firefox ESR 60\
739 **CCK2 Equivalent:** `disableSync`\
740 **Preferences Affected:** `identity.fxaccounts.enabled`
741
742 #### Windows (GPO)
743 ```
744 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
745 ```
746 #### macOS
747 ```
748 <dict>
749 <key>DisableFirefoxAccounts</key>
750 <true/> | <false/>
751 </dict>
752 ```
753 #### policies.json
754 ```
755 {
756 "policies": {
757 "DisableFirefoxAccounts": true | false
758 }
759 }
760 ```
761 ### DisableFirefoxStudies
762 Disable Firefox studies (Shield).
763
764 **Compatibility:** Firefox 60, Firefox ESR 60\
765 **CCK2 Equivalent:** N/A\
766 **Preferences Affected:** N/A
767
768 #### Windows (GPO)
769 ```
770 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
771 ```
772 #### macOS
773 ```
774 <dict>
775 <key>DisableFirefoxStudies</key>
776 <true/> | <false/>
777 </dict>
778 ```
779 #### policies.json
780 ```
781 {
782 "policies": {
783 "DisableFirefoxStudies": true | false
784 }
785 }
786 ```
787 ### DisableForgetButton
788 Disable the "Forget" button.
789
790 **Compatibility:** Firefox 60, Firefox ESR 60\
791 **CCK2 Equivalent:** `disableForget`\
792 **Preferences Affected:** N/A
793
794 #### Windows (GPO)
795 ```
796 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
797 ```
798 #### macOS
799 ```
800 <dict>
801 <key>DisableForgetButton</key>
802 <true/> | <false/>
803 </dict>
804 ```
805 #### policies.json
806 ```
807 {
808 "policies": {
809 "DisableForgetButton": true | false
810 }
811 }
812 ```
813 ### DisableFormHistory
814 Turn off saving information on web forms and the search bar.
815
816 **Compatibility:** Firefox 60, Firefox ESR 60\
817 **CCK2 Equivalent:** `disableFormFill`\
818 **Preferences Affected:** ` browser.formfill.enable`
819
820 #### Windows (GPO)
821 ```
822 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
823 ```
824 #### macOS
825 ```
826 <dict>
827 <key>DisableFormHistory</key>
828 <true/> | <false/>
829 </dict>
830 ```
831 #### policies.json
832 ```
833 {
834 "policies": {
835 "DisableFormHistory": true | false
836 }
837 }
838 ```
839 ### DisablePasswordReveal
840 Do not allow passwords to be shown in saved logins
841
842 **Compatibility:** Firefox 71, Firefox ESR 68.3\
843 **CCK2 Equivalent:** N/A
844 **Preferences Affected:** N/A
845
846 #### Windows (GPO)
847 ```
848 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
849 ```
850
851 #### macOS
852 ```
853 <dict>
854 <key>DisablePasswordReveal</key>
855 <true/> | <false/>
856 </dict>
857 ```
858 #### policies.json
859 ```
860 {
861 "policies": {
862 "DisablePasswordReveal": true | false
863 }
864 }
865 ```
866 ### DisablePocket
867 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
868
869 **Compatibility:** Firefox 60, Firefox ESR 60\
870 **CCK2 Equivalent:** `disablePocket`\
871 **Preferences Affected:** `extensions.pocket.enabled`
872
873 #### Windows (GPO)
874 ```
875 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
876 ```
877 #### macOS
878 ```
879 <dict>
880 <key>DisablePocket</key>
881 <true/> | <false/>
882 </dict>
883 ```
884 #### policies.json
885 ```
886 {
887 "policies": {
888 "DisablePocket": true | false
889 }
890 }
891 ```
892 ### DisablePrivateBrowsing
893 Remove access to private browsing.
894
895 **Compatibility:** Firefox 60, Firefox ESR 60\
896 **CCK2 Equivalent:** `disablePrivateBrowsing`\
897 **Preferences Affected:** N/A
898
899 #### Windows (GPO)
900 ```
901 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
902 ```
903 #### macOS
904 ```
905 <dict>
906 <key>DisablePrivateBrowsing</key>
907 <true/> | <false/>
908 </dict>
909 ```
910 #### policies.json
911 ```
912 {
913 "policies": {
914 "DisablePrivateBrowsing": true | false
915 }
916 }
917 ```
918 ### DisableProfileImport
919 Disables the "Import data from another browser" option in the bookmarks window.
920
921 **Compatibility:** Firefox 60, Firefox ESR 60\
922 **CCK2 Equivalent:** N/A\
923 **Preferences Affected:** N/A
924
925 #### Windows (GPO)
926 ```
927 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
928 ```
929 #### macOS
930 ```
931 <dict>
932 <key>DisableProfileImport</key>
933 <true/> | <false/>
934 </dict>
935 ```
936 #### policies.json
937 ```
938 {
939 "policies": {
940 "DisableProfileImport": true | false
941 }
942 }
943 ```
944 ### DisableProfileRefresh
945 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
946
947 **Compatibility:** Firefox 60, Firefox ESR 60\
948 **CCK2 Equivalent:** `disableResetFirefox`\
949 **Preferences Affected:** `browser.disableResetPrompt`
950
951 #### Windows (GPO)
952 ```
953 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
954 ```
955 #### macOS
956 ```
957 <dict>
958 <key>DisableProfileRefresh</key>
959 <true/> | <false/>
960 </dict>
961 ```
962 #### policies.json
963 ```
964 {
965 "policies": {
966 "DisableProfileRefresh": true | false
967 }
968 }
969 ```
970 ### DisableSafeMode
971 Disable safe mode within the browser.
972
973 On Windows, this disables safe mode via the command line as well.
974
975 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
976 **CCK2 Equivalent:** `disableSafeMode`\
977 **Preferences Affected:** N/A
978
979 #### Windows (GPO)
980 ```
981 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
982 ```
983 #### macOS
984 ```
985 <dict>
986 <key>DisableSafeMode</key>
987 <true/> | <false/>
988 </dict>
989 ```
990 #### policies.json
991 ```
992 {
993 "policies": {
994 "DisableSafeMode": true | false
995 }
996 }
997 ```
998 ### DisableSecurityBypass
999 Prevent the user from bypassing security in certain cases.
1000
1001 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1002
1003 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1004
1005 **Compatibility:** Firefox 60, Firefox ESR 60\
1006 **CCK2 Equivalent:** N/A\
1007 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1008
1009 #### Windows (GPO)
1010 ```
1011 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1012 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1013 ```
1014 #### macOS
1015 ```
1016 <dict>
1017 <key>DisableSecurityBypass</key>
1018 <dict>
1019 <key>InvalidCertificate</key>
1020 <true/> | <false/>
1021 <key><SafeBrowsing/key>
1022 <true/> | <false/>
1023 </dict>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisableSecurityBypass": {
1031 "InvalidCertificate": true false,
1032 "SafeBrowsing": true false
1033 }
1034 }
1035 }
1036 ```
1037 ### DisableSystemAddonUpdate
1038 Prevent system add-ons from being installed or update.
1039
1040 **Compatibility:** Firefox 60, Firefox ESR 60\
1041 **CCK2 Equivalent:** N/A\
1042 **Preferences Affected:** N/A
1043
1044 #### Windows (GPO)
1045 ```Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1046 ```
1047 #### macOS
1048 ```
1049 <dict>
1050 <key>DisableSystemAddonUpdate</key>
1051 <true/> | <false/>
1052 </dict>
1053 ```
1054 #### policies.json
1055 ```
1056 {
1057 "policies": {
1058 "DisableSystemAddonUpdate": true | false
1059 }
1060 }
1061 ```
1062 ### DisableTelemetry
1063 Prevent the upload of telemetry data.
1064
1065 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1066
1067 **Compatibility:** Firefox 60, Firefox ESR 60\
1068 **CCK2 Equivalent:** `disableTelemetry`\
1069 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1070
1071 #### Windows (GPO)
1072 ```
1073 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1074 ```
1075 #### macOS
1076 ```
1077 <dict>
1078 <key>DisableTelemetry</key>
1079 <true/> | <false/>
1080 </dict>
1081 ```
1082 #### policies.json
1083 ```
1084 {
1085 "policies": {
1086 "DisableTelemetry": true | false
1087 }
1088 }
1089 ```
1090 ### DisplayBookmarksToolbar
1091 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1092
1093 **Compatibility:** Firefox 60, Firefox ESR 60\
1094 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1095 **Preferences Affected:** N/A
1096
1097 #### Windows (GPO)
1098 ```
1099 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1100 ```
1101 #### macOS
1102 ```
1103 <dict>
1104 <key>DisplayBookmarksToolbar</key>
1105 <true/> | <false/>
1106 </dict>
1107 ```
1108 #### policies.json
1109 ```
1110 {
1111 "policies": {
1112 "DisplayBookmarksToolbar": true | false
1113 }
1114 }
1115 ```
1116 ### DisplayMenuBar (Deprecated)
1117 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1118
1119 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1120 **CCK2 Equivalent:** `displayMenuBar`\
1121 **Preferences Affected:** N/A
1122
1123 #### Windows (GPO)
1124 ```
1125 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1126 ```
1127 #### macOS
1128 ```
1129 <dict>
1130 <key>DisplayMenuBar</key>
1131 <true/> | <false/>
1132 </dict>
1133 ```
1134 #### policies.json
1135 ```
1136 {
1137 "policies": {
1138 "DisplayMenuBar": true | false
1139 }
1140 }
1141 ```
1142 ### DisplayMenuBar
1143 Set the state of the menubar.
1144
1145 `always` means the menubar is shown and cannot be hidden.
1146
1147 `never` means the menubar is hidden and cannot be shown.
1148
1149 `default-on` means the menubar is on by default but can be hidden.
1150
1151 `default-off` means the menubar is off by default but can be shown.
1152
1153 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1154 **CCK2 Equivalent:** `displayMenuBar`\
1155 **Preferences Affected:** N/A
1156
1157 #### Windows (GPO)
1158 ```
1159 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1160 ```
1161 #### macOS
1162 ```
1163 <dict>
1164 <key>DisplayMenuBar</key>
1165 <string>always | never | default-on | default-off</string>
1166 </dict>
1167 ```
1168 #### policies.json
1169 ```
1170 {
1171 "policies": {
1172 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1173 }
1174 }
1175 ```
1176 ### DNSOverHTTPS
1177 Configure DNS over HTTPS.
1178
1179 `Enabled` determines whether DNS over HTTPS is enabled
1180
1181 `ProviderURL` is a URL to another provider.
1182
1183 `Locked` prevents the user from changing DNS over HTTPS preferences.
1184
1185 `ExcludedDomains` excludes domains from DNS over HTTPS.
1186
1187 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1188 **CCK2 Equivalent:** N/A\
1189 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1190
1191 #### Windows (GPO)
1192 ```
1193 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1194 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1195 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1196 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1197 ```
1198 #### macOS
1199 ```
1200 <dict>
1201 <key>DNSOverHTTPS</key>
1202 <dict>
1203 <key>Enabled</key>
1204 <true/> | <false/>
1205 <key>ProviderURL</key>
1206 <string>URL_TO_ALTERNATE_PROVIDER</string>
1207 <key>Locked</key>
1208 <true/> | <false/>
1209 <key>ExcludedDomains</key>
1210 <array>
1211 <string>example.com</string>
1212 </array>
1213 </dict>
1214 </dict>
1215 ```
1216 #### policies.json
1217 ```
1218 {
1219 "policies": {
1220 "DNSOverHTTPS": {
1221 "Enabled": true | false,
1222 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1223 "Locked": true | false,
1224 "ExcludedDomains": ["example.com"]
1225 }
1226 }
1227 }
1228 ```
1229 ### DontCheckDefaultBrowser
1230 Don't check if Firefox is the default browser at startup.
1231
1232 **Compatibility:** Firefox 60, Firefox ESR 60\
1233 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1234 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1235
1236 #### Windows (GPO)
1237 ```
1238 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1239 ```
1240 #### macOS
1241 ```
1242 <dict>
1243 <key>DontCheckDefaultBrowser</key>
1244 <true/> | <false/>
1245 </dict>
1246 ```
1247 #### policies.json
1248 ```
1249 {
1250 "policies": {
1251 "DontCheckDefaultBrowser": true | false
1252 }
1253 }
1254 ```
1255 ### DefaultDownloadDirectory
1256 Set the default download directory.
1257
1258 You can use ${home} for the native home directory.
1259
1260 **Compatibility:** Firefox 68, Firefox ESR 68\
1261 **CCK2 Equivalent:** N/A\
1262 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1263
1264 #### Windows (GPO)
1265 ```
1266 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1267 ```
1268 #### macOS
1269 ```
1270 <dict>
1271 <key>DefaultDownloadDirectory</key>
1272 <string>${home}/Downloads</string>
1273 </dict>
1274 ```
1275 #### policies.json (macOS and Linux)
1276 ```
1277 {
1278 "policies": {
1279 "DefaultDownloadDirectory": "${home}/Downloads"
1280 }
1281 ```
1282 #### policies.json (Windows)
1283 ```
1284 {
1285 "policies": {
1286 "DefaultDownloadDirectory": "${home}\\Downloads"
1287 }
1288 ```
1289 ### DownloadDirectory
1290 Set and lock the download directory.
1291
1292 You can use ${home} for the native home directory.
1293
1294 **Compatibility:** Firefox 68, Firefox ESR 68\
1295 **CCK2 Equivalent:** N/A\
1296 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1297
1298 #### Windows (GPO)
1299 ```
1300 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1301 ```
1302 #### macOS
1303 ```
1304 <dict>
1305 <key>DownloadDirectory</key>
1306 <string>${home}/Downloads</string>
1307 </dict>
1308 ```
1309 #### policies.json (macOS and Linux)
1310 ```
1311 {
1312 "policies": {
1313 "DownloadDirectory": "${home}/Downloads"
1314 }
1315 ```
1316 #### policies.json (Windows)
1317 ```
1318 {
1319 "policies": {
1320 "DownloadDirectory": "${home}\\Downloads"
1321 }
1322 ```
1323 ### EnableTrackingProtection
1324 Configure tracking protection.
1325
1326 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1327
1328 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1329
1330 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1331
1332 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1333
1334 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1335
1336 `Exceptions` are origins for which tracking protection is not enabled.
1337
1338 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1339 **CCK2 Equivalent:** N/A\
1340 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1341
1342 #### Windows (GPO)
1343 ```
1344 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1345 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1346 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
1347 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
1348 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
1349 ```
1350 #### macOS
1351 ```
1352 <dict>
1353 <key>EnableTrackingProtection</key>
1354 <dict>
1355 <key>Value</key>
1356 <true/> | <false/>
1357 <key><Locked</key>
1358 <true/> | <false/>
1359 <key><Cryptomining</key>
1360 <true/> | <false/>
1361 <key><Fingerprinting</key>
1362 <true/> | <false/>
1363 <key>Exceptions</key>
1364 <array>
1365 <string>https://example.com</string>
1366 </array>
1367 </dict>
1368 </dict>
1369 ```
1370 #### policies.json
1371 ```
1372 {
1373 "policies": {
1374 "EnableTrackingProtection": {
1375 "Value": [true, false],
1376 "Locked": [true, false],
1377 "Cryptomining": [true, false],
1378 "Fingerprinting": [true, false],
1379 "Exceptions": ["https://example.com"]
1380 }
1381 }
1382 ```
1383 ### EnterprisePoliciesEnabled
1384 Enable policy support on macOS.
1385
1386 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
1387 **CCK2 Equivalent:** N/A\
1388 **Preferences Affected:** N/A
1389
1390 #### macOS
1391 ```
1392 <dict>
1393 <key>EnterprisePoliciesEnabled</key>
1394 <true/>
1395 </dict>
1396 ```
1397 ### Extensions
1398 Control the installation, uninstallation and locking of extensions.
1399
1400 `Install` is a list of URLs or native paths for extensions to be installed.
1401
1402 `Uninstall` is a list of extension IDs that should be uninstalled if found.
1403
1404 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
1405
1406 **Compatibility:** Firefox 60, Firefox ESR 60\
1407 **CCK2 Equivalent:** `addons`\
1408 **Preferences Affected:** N/A
1409
1410 #### Windows (GPO)
1411 ```
1412 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
1413 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
1414 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
1415 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
1416 ```
1417 #### macOS
1418 ```
1419 <dict>
1420 <key>Extensions</key>
1421 <dict>
1422 <key>Install</key>
1423 <array>
1424 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
1425 <string>//path/to/xpi</string>
1426 </array>
1427 <key>Uninstall</key>
1428 <array>
1429 <string>bad_addon_id@mozilla.org</string>
1430 </array>
1431 <key>Locked</key>
1432 <array>
1433 <string>addon_id@mozilla.org</string>
1434 </array>
1435 </dict>
1436 </dict>
1437 ```
1438 #### policies.json
1439 ```
1440 {
1441 "policies": {
1442 "Extensions": {
1443 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
1444 "Uninstall": ["bad_addon_id@mozilla.org"],
1445 "Locked": ["addon_id@mozilla.org"]
1446 }
1447 }
1448 }
1449 ```
1450 ### ExtensionSettings
1451 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
1452
1453 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
1454
1455 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section.
1456
1457 The configuration for each extension is another dictionary that can contain the fields documented below.
1458
1459 | Name | Description |
1460 | --- | --- |
1461 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
1462 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior.
1463 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
1464 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
1465 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
1466 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi.
1467 | `install_sources` | Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
1468 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
1469 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else.
1470
1471 **Compatibility:** Firefox 69, Firefox ESR 68.1\
1472 **CCK2 Equivalent:** N/A\
1473 **Preferences Affected:** N/A
1474
1475 #### Windows (GPO)
1476 ```
1477 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
1478 {
1479 "*": {
1480 "blocked_install_message": "Custom error message.",
1481 "install_sources": ["https://addons.mozilla.org/"],
1482 "installation_mode": "blocked",
1483 "allowed_types": ["extension"]
1484 },
1485 "uBlock0@raymondhill.net": {
1486 "installation_mode": "force_installed",
1487 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1488 }
1489 }
1490 ```
1491 #### macOS
1492 ```
1493 <dict>
1494 <key>ExtensionSettings</key>
1495 <dict>
1496 <key>*</key>
1497 <dict>
1498 <key>blocked_install_message</key>
1499 <string>Custom error message.</string>
1500 <key>install_sources</key>
1501 <array>
1502 <string>https://addons.mozilla.org/</string>
1503 </array>
1504 <key>installation_mode</key>
1505 <string>blocked</string>
1506 <key>allowed_types</key>
1507 <array>
1508 <string>extension</string>
1509 </array>
1510 </dict>
1511 <key>uBlock0@raymondhill.net</key>
1512 <dict>
1513 <key>installation_mode</key>
1514 <string>force_installed</string>
1515 <key>install_url</key>
1516 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
1517 </dict>
1518 </dict>
1519 </dict>
1520 ```
1521 #### policies.json
1522 ```
1523 {
1524 "policies": {
1525 "ExtensionSettings": {
1526 "*": {
1527 "blocked_install_message": "Custom error message.",
1528 "install_sources": ["https://addons.mozilla.org/"],
1529 "installation_mode": "blocked",
1530 "allowed_types": ["extension"]
1531 },
1532 "uBlock0@raymondhill.net": {
1533 "installation_mode": "force_installed",
1534 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
1535 }
1536 }
1537 }
1538 }
1539 ```
1540 ### ExtensionUpdate
1541 Control extension updates.
1542
1543 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1544 **CCK2 Equivalent:** N/A\
1545 **Preferences Affected:** `extensions.update.enabled`
1546
1547 #### Windows (GPO)
1548 ```
1549 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
1550 ```
1551 #### macOS
1552 ```
1553 <dict>
1554 <key>ExtensionUpdate</key>
1555 <true/> | <false/>
1556 </dict>
1557 ```
1558 #### policies.json
1559 ```
1560 {
1561 "policies": {
1562 "ExtensionUpdate": true | false
1563 }
1564 }
1565 ```
1566 ### FlashPlugin
1567 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
1568
1569 `Allow` is a list of origins where Flash are allowed.
1570
1571 `Block` is a list of origins where Flash is not allowed.
1572
1573 `Default` determines whether or not Flash is allowed by default.
1574
1575 `Locked` prevents the user from changing Flash preferences.
1576
1577 **Compatibility:** Firefox 60, Firefox ESR 60\
1578 **CCK2 Equivalent:** `permissions.plugin`\
1579 **Preferences Affected:** `plugin.state.flash`
1580
1581 #### Windows (GPO)
1582 ```
1583 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
1584 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
1585 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
1586 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
1587 ```
1588 #### macOS
1589 ```
1590 <dict>
1591 <key>FlashPlugin</key>
1592 <dict>
1593 <key>Allow</key>
1594 <array>
1595 <string>http://example.org</string>
1596 </array>
1597 <key>Block</key>
1598 <array>
1599 <string>http://example.edu</string>
1600 </array>
1601 <key>Default</key>
1602 <true/> | <false/>
1603 <key>Locked</key>
1604 <true/> | <false/>
1605 </dict>
1606 </dict>
1607 ```
1608 #### policies.json
1609 ```
1610 {
1611 "policies": {
1612 "FlashPlugin": {
1613 "Allow": ["http://example.org/"],
1614 "Block": ["http://example.edu/"],
1615 "Default": true | false,
1616 "Locked": true | false
1617 }
1618 }
1619 }
1620 ```
1621 ### FirefoxHome
1622 Customize the Firefox Home page.
1623
1624 **Compatibility:** Firefox 68, Firefox ESR 68\
1625 **CCK2 Equivalent:** N/A\
1626 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
1627
1628 #### Windows (GPO)
1629 ```
1630 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
1631 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
1632 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
1633 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
1634 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
1635 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
1636 ```
1637 #### macOS
1638 ```
1639 <dict>
1640 <key>FirefoxHome</key>
1641 <dict>
1642 <key>Search</key>
1643 <true/> | <false/>
1644 <key>TopSites</key>
1645 <true/> | <false/>
1646 <key>Highlights</key>
1647 <true/> | <false/>
1648 <key>Pocket</key>
1649 <true/> | <false/>
1650 <key>Snippets</key>
1651 <true/> | <false/>
1652 <key>Locked</key>
1653 <true/> | <false/>
1654 </dict>
1655 </dict>
1656 ```
1657 #### policies.json
1658 ```
1659 {
1660 "policies": {
1661 "FirefoxHome": {
1662 "Search": true | false,
1663 "TopSites": true | false,
1664 "Highlights": true | false,
1665 "Pocket": true | false,
1666 "Snippets": true | false,
1667 "Locked": true | false
1668 }
1669 }
1670 }
1671 ```
1672 ### HardwareAcceleration
1673 Control hardware acceleration.
1674
1675 **Compatibility:** Firefox 60, Firefox ESR 60\
1676 **CCK2 Equivalent:** N/A\
1677 **Preferences Affected:** `layers.acceleration.disabled`
1678
1679 #### Windows (GPO)
1680 ```
1681 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
1682 ```
1683 #### macOS
1684 ```
1685 <dict>
1686 <key>HardwareAcceleration</key>
1687 <true/> | <false/>
1688 </dict>
1689 ```
1690 #### policies.json
1691 ```
1692 {
1693 "policies": {
1694 "HardwareAcceleration": true | false
1695 }
1696 }
1697 ```
1698 ### Homepage
1699 Configure the default homepage and how Firefox starts.
1700
1701 `URL` is the default homepage.
1702
1703 `Locked` prevents the user from changing homepage preferences.
1704
1705 `Additional` allows for more than one homepage.
1706
1707 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
1708
1709 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4)\
1710 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
1711 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
1712
1713 #### Windows (GPO)
1714 ```
1715 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
1716 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
1717 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
1718 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
1719 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session"
1720 ```
1721 #### macOS
1722 ```
1723 <dict>
1724 <key>Homepage</key>
1725 <dict>
1726 <key>URL</key>
1727 <string>http://example.com</string>
1728 <key>Locked</key>
1729 <true/> | <false/>
1730 <key>Additional</key>
1731 <array>
1732 <string>http://example.org</string>
1733 <string>http://example.edu</string>
1734 </array>
1735 <key>StartPage</key>
1736 <string>none | homepage | previous-session</string>
1737 </dict>
1738 </dict>
1739 ```
1740 #### policies.json
1741 ```
1742 {
1743 "policies": {
1744 "Homepage": {
1745 "URL": "http://example.com/",
1746 "Locked": true | false,
1747 "Additional": ["http://example.org/",
1748 "http://example.edu/"],
1749 "StartPage": "none" | "homepage" | "previous-session"
1750 }
1751 }
1752 }
1753 ```
1754 ### InstallAddonsPermission
1755 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
1756
1757 `Allow` is a list of origins where extension installs are allowed.
1758
1759 `Default` determines whether or not extension installs are allowed by default.
1760
1761 **Compatibility:** Firefox 60, Firefox ESR 60\
1762 **CCK2 Equivalent:** `permissions.install`\
1763 **Preferences Affected:** `xpinstall.enabled`
1764
1765 #### Windows (GPO)
1766 ```
1767 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
1768 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
1769 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
1770 ```
1771 #### macOS
1772 ```
1773 <dict>
1774 <key>InstallAddonsPermission</key>
1775 <dict>
1776 <key>Allow</key>
1777 <array>
1778 <string>http://example.org</string>
1779 <string>http://example.edu</string>
1780 </array>
1781 <key>Default</key>
1782 <true/> | <false/>
1783 </dict>
1784 </dict>
1785 ```
1786 #### policies.json
1787 ```
1788 {
1789 "policies": {
1790 "InstallAddonsPermission": {
1791 "Allow": ["http://example.org/",
1792 "http://example.edu/"],
1793 "Default": true | false
1794 }
1795 }
1796 }
1797 ```
1798 ### LegacyProfiles
1799 Disable the feature enforcing a separate profile for each installation.
1800
1801 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
1802
1803 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
1804
1805 This policy only work on Windows via GPO (not policies.json).
1806
1807 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
1808 **CCK2 Equivalent:** N/A\
1809 **Preferences Affected:** N/A
1810
1811 #### Windows (GPO)
1812 ```
1813 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
1814 ```
1815 ### LocalFileLinks
1816 Enable linking to local files by origin.
1817
1818 **Compatibility:** Firefox 68, Firefox ESR 68\
1819 **CCK2 Equivalent:** N/A\
1820 **Preferences Affected:** `capability.policy.localfilelinks.*`
1821
1822 #### Windows (GPO)
1823 ```
1824 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
1825 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
1826 ```
1827 #### macOS
1828 ```
1829 <dict>
1830 <key>LocalFileLinks</key>
1831 <array>
1832 <string>http://example.org</string>
1833 <string>http://example.edu</string>
1834 </array>
1835 </dict>
1836 ```
1837 #### policies.json
1838 ```
1839 {
1840 "policies": {
1841 "LocalFileLinks": ["http://example.org/",
1842 "http://example.edu/"]
1843 }
1844 }
1845 ```
1846 ### NoDefaultBookmarks
1847 Disable the creation of default bookmarks.
1848
1849 This policy is only effective if the user profile has not been created yet.
1850
1851 **Compatibility:** Firefox 60, Firefox ESR 60\
1852 **CCK2 Equivalent:** `removeDefaultBookmarks`\
1853 **Preferences Affected:** N/A
1854
1855 #### Windows (GPO)
1856 ```
1857 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
1858 ```
1859 #### macOS
1860 ```
1861 <dict>
1862 <key>NoDefaultBookmarks</key>
1863 <true/> | <false/>
1864 </dict>
1865 ```
1866 #### policies.json
1867 ```
1868 {
1869 "policies": {
1870 "NoDefaultBookmarks": true | false
1871 }
1872 }
1873 ```
1874 ### NetworkPrediction
1875 Enable or disable network prediction (DNS prefetching).
1876
1877 **Compatibility:** Firefox 67, Firefox ESR 60.7\
1878 **CCK2 Equivalent:** N/A\
1879 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
1880
1881 #### Windows (GPO)
1882 ```
1883 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
1884 ```
1885 #### macOS
1886 ```
1887 <dict>
1888 <key>NetworkPrediction</key>
1889 <true/> | <false/>
1890 </dict>
1891 ```
1892 #### policies.json
1893 ```
1894 {
1895 "policies": {
1896 "NetworkPrediction": true | false
1897 }
1898 ```
1899 ### NewTabPage
1900 Enable or disable the New Tab page.
1901
1902 **Compatibility:** Firefox 68, Firefox ESR 68\
1903 **CCK2 Equivalent:** N/A\
1904 **Preferences Affected:** `browser.newtabpage.enabled`
1905
1906 #### Windows (GPO)
1907 ```
1908 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
1909 ```
1910 #### macOS
1911 ```
1912 <dict>
1913 <key>NewTabPage</key>
1914 <true/> | <false/>
1915 </dict>
1916 ```
1917 #### policies.json
1918 ```
1919 {
1920 "policies": {
1921 "NewTabPage": true | false
1922 }
1923 ```
1924 ### OfferToSaveLogins
1925 Control whether or not Firefox offers to save passwords.
1926
1927 **Compatibility:** Firefox 60, Firefox ESR 60\
1928 **CCK2 Equivalent:** `dontRememberPasswords`\
1929 **Preferences Affected:** `signon.rememberSignons`
1930
1931 #### Windows (GPO)
1932 ```
1933 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
1934 ```
1935 #### macOS
1936 ```
1937 <dict>
1938 <key>OfferToSaveLogins</key>
1939 <true/> | <false/>
1940 </dict>
1941 ```
1942 #### policies.json
1943 ```
1944 {
1945 "policies": {
1946 "OfferToSaveLogins": true | false
1947 }
1948 }
1949 ```
1950 ### OfferToSaveLoginsDefault
1951 Sets the default value of signon.rememberSignons without locking it.
1952
1953 **Compatibility:** Firefox 70, Firefox ESR 60.2\
1954 **CCK2 Equivalent:** `dontRememberPasswords`\
1955 **Preferences Affected:** `signon.rememberSignons`
1956
1957 #### Windows (GPO)
1958 ```
1959 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
1960 ```
1961 #### macOS
1962 ```
1963 <dict>
1964 <key>OfferToSaveLoginsDefault</key>
1965 <true/> | <false/>
1966 </dict>
1967 ```
1968 #### policies.json
1969 ```
1970 {
1971 "policies": {
1972 "OfferToSaveLoginsDefault": true | false
1973 }
1974 }
1975 ```
1976 ### OverrideFirstRunPage
1977 Override the first run page. If the value is blank, no first run page is displayed.
1978
1979 **Compatibility:** Firefox 60, Firefox ESR 60\
1980 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
1981 **Preferences Affected:** `startup.homepage_welcome_url`
1982
1983 #### Windows (GPO)
1984 ```
1985 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
1986 ```
1987 #### macOS
1988 ```
1989 <dict>
1990 <key>OverrideFirstRunPage</key>
1991 <string>http://example.org</string>
1992 </dict>
1993 ```
1994 #### policies.json
1995 ```
1996 {
1997 "policies": {
1998 "OverrideFirstRunPage": "http://example.org"
1999 }
2000 ```
2001 ### OverridePostUpdatePage
2002 Override the upgrade page. If the value is blank, no upgrade page is displayed.
2003
2004 **Compatibility:** Firefox 60, Firefox ESR 60\
2005 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
2006 **Preferences Affected:** `startup.homepage_override_url`
2007
2008 #### Windows (GPO)
2009 ```
2010 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
2011 ```
2012 #### macOS
2013 ```
2014 <dict>
2015 <key>OverridePostUpdatePage</key>
2016 <string>http://example.org</string>
2017 </dict>
2018 ```
2019 #### policies.json
2020 ```
2021 {
2022 "policies": {
2023 "OverridePostUpdatePage": "http://example.org"
2024 }
2025 ```
2026 ### PasswordManagerEnabled
2027 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
2028
2029 **Compatibility:** Firefox 70, Firefox ESR 60.2\
2030 **CCK2 Equivalent:** N/A\
2031 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
2032
2033 #### Windows (GPO)
2034 ```
2035 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
2036 ```
2037 #### macOS
2038 ```
2039 <dict>
2040 <key>PasswordManagerEnabled</key>
2041 <true/> | <false/>
2042 </dict>
2043 ```
2044 #### policies.json
2045 ```
2046 {
2047 "policies": {
2048 "PasswordManagerEnabled": true | false
2049 }
2050 }
2051 ```
2052 ### Permissions
2053 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
2054
2055 `Allow` is a list of origins where the feature is allowed.
2056
2057 `Block` is a list of origins where the feature is not allowed.
2058
2059 `BlockNewRequests` determines whether or not new requests can be made for the feature.
2060
2061 `Locked` prevents the user from changing preferences for the feature.
2062
2063 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6\
2064 **CCK2 Equivalent:** N/A\
2065 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`
2066
2067 #### Windows (GPO)
2068 ```
2069 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
2070 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
2071 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
2072 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
2073 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
2074 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
2075 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
2076 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
2077 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
2078 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
2079 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
2080 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
2081 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
2082 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
2083 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
2084 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
2085 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
2086 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
2087 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
2088 ```
2089 #### macOS
2090 ```
2091 <dict>
2092 <key>Permissions</key>
2093 <dict>
2094 <key>Camera</key>
2095 <dict>
2096 <key>Allow</key>
2097 <array>
2098 <string>https://example.org</string>
2099 <string>https://example.org:1234</string>
2100 </array>
2101 <key>Block</key>
2102 <array>
2103 <string>https://example.edu</string>
2104 </array>
2105 <key>BlockNewRequests</key>
2106 <true/>
2107 <key>Locked</key>
2108 <true/>
2109 </dict>
2110 <key>Microphone</key>
2111 <dict>
2112 <key>Allow</key>
2113 <array>
2114 <string>https://example.org</string>
2115 </array>
2116 <key>Block</key>
2117 <array>
2118 <string>https://example.edu</string>
2119 </array>
2120 <key>BlockNewRequests</key>
2121 <true/>
2122 <key>Locked</key>
2123 <true/>
2124 </dict>
2125 <key>Location</key>
2126 <dict>
2127 <key>Allow</key>
2128 <array>
2129 <string>https://example.org</string>
2130 </array>
2131 <key>Block</key>
2132 <array>
2133 <string>https://example.edu</string>
2134 </array>
2135 <key>BlockNewRequests</key>
2136 <true/>
2137 <key>Locked</key>
2138 <true/>
2139 </dict>
2140 <key>Notifications</key>
2141 <dict>
2142 <key>Allow</key>
2143 <array>
2144 <string>https://example.org</string>
2145 </array>
2146 <key>Block</key>
2147 <array>
2148 <string>https://example.edu</string>
2149 </array>
2150 <key>BlockNewRequests</key>
2151 <true/>
2152 <key>Locked</key>
2153 <true/>
2154 </dict>
2155 <key>Autoplay</key>
2156 <dict>
2157 <key>Allow</key>
2158 <array>
2159 <string>https://example.org</string>
2160 </array>
2161 <key>Block</key>
2162 <array>
2163 <string>https://example.edu</string>
2164 </array>
2165 </dict>
2166 </dict>
2167 </dict>
2168 ```
2169 #### policies.json
2170 ```
2171 {
2172 "policies": {
2173 "Permissions": {
2174 "Camera": {
2175 "Allow": ["https://example.org","https://example.org:1234"],
2176 "Block": ["https://example.edu"],
2177 "BlockNewRequests": true | false,
2178 "Locked": true | false
2179 },
2180 "Microphone": {
2181 "Allow": ["https://example.org"],
2182 "Block": ["https://example.edu"],
2183 "BlockNewRequests": true | false,
2184 "Locked": true | false
2185 },
2186 "Location": {
2187 "Allow": ["https://example.org"],
2188 "Block": ["https://example.edu"],
2189 "BlockNewRequests": true | false,
2190 "Locked": true | false
2191 },
2192 "Notifications": {
2193 "Allow": ["https://example.org"],
2194 "Block": ["https://example.edu"],
2195 "BlockNewRequests": true | false,
2196 "Locked": true | false
2197 },
2198 "Autoplay": {
2199 "Allow": ["https://example.org"],
2200 "Block": ["https://example.edu"]
2201 }
2202 }
2203 }
2204 }
2205 ```
2206 ### PopupBlocking
2207 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
2208
2209 `Allow` is a list of origins where popup-windows are allowed.
2210
2211 `Default` determines whether or not pop-up windows are allowed by default.
2212
2213 `Locked` prevents the user from changing pop-up preferences.
2214
2215 **Compatibility:** Firefox 60, Firefox ESR 60\
2216 **CCK2 Equivalent:** `permissions.popup`\
2217 **Preferences Affected:** `dom.disable_open_during_load`
2218
2219 #### Windows (GPO)
2220 ```
2221 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
2222 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
2223 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
2224 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
2225 ```
2226 #### macOS
2227 ```
2228 <dict>
2229 <key>PopupBlocking</key>
2230 <dict>
2231 <key>Allow</key>
2232 <array>
2233 <string>http://example.org</string>
2234 <string>http://example.edu</string>
2235 </array>
2236 <key>Default</key>
2237 <true/> | <false/>
2238 <key>Locked</key>
2239 <true/> | <false/>
2240 </dict>
2241 </dict>
2242 ```
2243 #### policies.json
2244 ```
2245 {
2246 "policies": {
2247 "PopupBlocking": {
2248 "Allow": ["http://example.org/",
2249 "http://example.edu/"],
2250 "Default": true | false,
2251 "Locked": true | false
2252 }
2253 }
2254 }
2255 ```
2256 ### Preferences
2257 Set and lock certain preferences.
2258
2259 **Compatibility:** See below\
2260 **CCK2 Equivalent:** `preferences`\
2261 **Preferences Affected:** See below
2262
2263 | Preference | Type | Compatibility | Default
2264 | --- | --- | --- | ---
2265 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
2266 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
2267 | app.update.auto | boolean | Firefox 68, Firefox ESR 68 | true
2268 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
2269 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
2270 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
2271 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
2272 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
2273 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
2274 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
2275 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
2276 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
2277 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
2278 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
2279 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
2280 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
2281 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
2282 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
2283 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
2284 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
2285 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2286 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
2287 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2288 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
2289 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
2290 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
2291 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
2292 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
2293 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
2294 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
2295 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
2296 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
2297 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
2298 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
2299 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
2300 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
2301 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
2302 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
2303 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
2304 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
2305 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
2306 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
2307 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
2308 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
2309 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
2310 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
2311 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2312 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
2313 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
2314 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2315 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
2316 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
2317 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
2318 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
2319 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
2320 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
2321 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2322 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
2323 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
2324 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
2325 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2326 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
2327 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2328 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
2329 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
2330 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
2331 | media.eme.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
2332 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
2333 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2334 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
2335 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2336 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
2337 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
2338 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
2339 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
2340 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
2341 disabled
2342 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
2343 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
2344 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
2345 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
2346 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2347 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
2348 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
2349 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
2350 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
2351 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
2352 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
2353 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
2354 | security.osclientcerts.autoload | boolean | Firefox 72, Firefox ESR 68.4 (Windows only) | false
2355 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
2356 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
2357 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
2358 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
2359 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
2360 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
2361 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
2362 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
2363 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
2364 #### Windows (GPO)
2365 ```
2366 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
2367 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
2368 ```
2369 #### macOS
2370 ```
2371 <dict>
2372 <key>Preferences</key>
2373 <dict>
2374 <key>boolean_preference_name</key>
2375 <true/> | <false/>
2376 <key>string_preference_name</key>
2377 <string>string_value</string>
2378 </dict>
2379 </dict>
2380 ```
2381 #### policies.json
2382 ```
2383 {
2384 "policies": {
2385 "Preferences": {
2386 "boolean_preference_name": true | false,
2387 "string_preference_name": "string_value"
2388 }
2389 }
2390 }
2391 ```
2392 ### PromptForDownloadLocation
2393 Ask where to save each file before downloading.
2394
2395 **Compatibility:** Firefox 68, Firefox ESR 68\
2396 **CCK2 Equivalent:** N/A\
2397 **Preferences Affected:** `browser.download.useDownloadDir`
2398
2399 #### Windows (GPO)
2400 ```
2401 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
2402 ```
2403 #### macOS
2404 ```
2405 <dict>
2406 <key>PromptForDownloadLocation</key>
2407 <true/> | <false/>
2408 </dict>
2409 ```
2410 #### policies.json
2411 ```
2412 {
2413 "policies": {
2414 "PromptForDownloadLocation": true | false
2415 }
2416 }
2417 ```
2418 ### Proxy
2419 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
2420 To specify ports, append them to the hostnames with a colon (:).
2421
2422 `Mode` is the proxy method being used.
2423
2424 `Locked` is whether or not proxy settings can be changed.
2425
2426 `HTTPProxy` is the HTTP proxy server.
2427
2428 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
2429
2430 `SSLProxy` is the SSL proxy server.
2431
2432 `FTPProxy` is the FTP proxy server.
2433
2434 `SOCKSProxy` is the SOCKS proxy server
2435
2436 `SOCKSVersion` is the SOCKS version (4 or 5)
2437
2438 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
2439
2440 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
2441
2442 `AutoLogin` means do not prompt for authentication if password is saved.
2443
2444 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
2445
2446 **Compatibility:** Firefox 60, Firefox ESR 60\
2447 **CCK2 Equivalent:** `networkProxy*`\
2448 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
2449
2450 #### Windows (GPO)
2451 ```
2452 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
2453 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
2454 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
2455 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
2456 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
2457 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
2458 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
2459 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
2460 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
2461 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
2462 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
2463 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
2464 ```
2465 #### macOS
2466 ```
2467 <dict>
2468 <key>Proxy</key>
2469 <dict>
2470 <key>Mode</key>
2471 <string>none | system | manual | autoDetect | autoConfig</string>
2472 <key>Locked</key>
2473 <true> | </false>
2474 <key>HTTPProxy</key>
2475 <string>https://httpproxy.example.com</string>
2476 <key>UseHTTPProxyForAllProtocols</key>
2477 <true> | </false>
2478 <key>SSLProxy</key>
2479 <string>https://sslproxy.example.com</string>
2480 <key>FTPProxy</key>
2481 <string>https://ftpproxy.example.com</string>
2482 <key>SOCKSProxy</key>
2483 <string>https://socksproxy.example.com</string>
2484 <key>SOCKSVersion</key>
2485 <string>4 | 5</string>
2486 <key>Passthrough</key>
2487 <string>&lt;local>&gt;</string>
2488 <key>AutoConfigURL</key>
2489 <string>URL_TO_AUTOCONFIG</string>
2490 <key>AutoLogin</key>
2491 <true> | </false>
2492 <key>UseProxyForDNS</key>
2493 <true> | </false>
2494 </dict>
2495 </dict>
2496 ```
2497 #### policies.json
2498 ```
2499 {
2500 "policies": {
2501 "Proxy": {
2502 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
2503 "Locked": [true, false],
2504 "HTTPProxy": "hostname",
2505 "UseHTTPProxyForAllProtocols": [true, false],
2506 "SSLProxy": "hostname",
2507 "FTPProxy": "hostname",
2508 "SOCKSProxy": "hostname",
2509 "SOCKSVersion": 4 | 5
2510 "Passthrough": "<local>",
2511 "AutoConfigURL": "URL_TO_AUTOCONFIG",
2512 "AutoLogin": [true, false],
2513 "UseProxyForDNS": [true, false]
2514 }
2515 }
2516 }
2517 ```
2518 ### RequestedLocales
2519 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
2520
2521 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
2522
2523 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
2524 **CCK2 Equivalent:** N/A\
2525 **Preferences Affected:** N/A
2526 #### Windows (GPO)
2527 ```
2528 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
2529 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
2530
2531 or
2532
2533 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
2534 ```
2535 #### macOS
2536 ```
2537 <dict>
2538 <key>RequestedLocales</key>
2539 <array>
2540 <string>de</string>
2541 <string>en-US</string>
2542 </array>
2543 </dict>
2544
2545 or
2546
2547 <dict>
2548 <key>RequestedLocales</key>
2549 <string>de,en-US</string>
2550 </dict>
2551
2552 ```
2553 #### policies.json
2554 ```
2555 {
2556 "policies": {
2557 "RequestedLocales": ["de", "en-US"]
2558 }
2559 }
2560
2561 or
2562
2563 {
2564 "policies": {
2565 "RequestedLocales": "de,en-US"
2566 }
2567 }
2568 ```
2569 ### SanitizeOnShutdown (Selective)
2570 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
2571
2572 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
2573
2574 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
2575 **CCK2 Equivalent:** N/A\
2576 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2577 #### Windows (GPO)
2578 ```
2579 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
2580 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
2581 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
2582 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
2583 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
2584 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
2585 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
2586 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
2587 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
2588 ```
2589 #### macOS
2590 ```
2591 <dict>
2592 <key>SanitizeOnShutdown</key>
2593 <dict>
2594 <key>Cache</key>
2595 <true/> | <false/>
2596 <key>Cookies</key>
2597 <true/> | <false/>
2598 <key>Downloads</key>
2599 <true/> | <false/>
2600 <key>FormData</key>
2601 <true/> | <false/>
2602 <key>History</key>
2603 <true/> | <false/>
2604 <key>Sessions</key>
2605 <true/> | <false/>
2606 <key>SiteSettings</key>
2607 <true/> | <false/>
2608 <key>OfflineApps</key>
2609 <true/> | <false/>
2610 <key>Locked</key>
2611 <true/> | <false/>
2612 </dict>
2613 </dict>
2614 ```
2615 #### policies.json
2616 ```
2617 {
2618 "policies": {
2619 "SanitizeOnShutdown": {
2620 "Cache": true | false,
2621 "Cookies": true | false,
2622 "Downloads": true | false,
2623 "FormData": true | false,
2624 "History": true | false,
2625 "Sessions": true | false,
2626 "SiteSettings": true | false,
2627 "OfflineApps": true | false,
2628 "Locked": true | false
2629 }
2630 }
2631 }
2632 ```
2633 ### SanitizeOnShutdown (All)
2634 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
2635
2636 **Compatibility:** Firefox 60, Firefox ESR 60\
2637 **CCK2 Equivalent:** N/A\
2638 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
2639 #### Windows (GPO)
2640 ```
2641 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
2642 ```
2643 #### macOS
2644 ```
2645 <dict>
2646 <key>SanitizeOnShutdown</key>
2647 <true/> | <false/>
2648 </dict>
2649 ```
2650 #### policies.json
2651 ```
2652 {
2653 "policies": {
2654 "SanitizeOnShutdown": true | false
2655 }
2656 }
2657 ```
2658 ### SearchBar
2659 Set whether or not search bar is displayed.
2660
2661 **Compatibility:** Firefox 60, Firefox ESR 60\
2662 **CCK2 Equivalent:** `showSearchBar`\
2663 **Preferences Affected:** N/A
2664
2665 #### Windows (GPO)
2666 ```
2667 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
2668 ```
2669 #### macOS
2670 ```
2671 <dict>
2672 <key>SearchBar</key>
2673 <string>unified | separate</string>
2674 </dict>
2675 ```
2676
2677 #### policies.json
2678 ```
2679 {
2680 "policies": {
2681 "SearchBar": "unified" | "separate"
2682 }
2683 }
2684 ```
2685
2686
2687
2688
2689
2690 ### SearchEngines (This policy is only available on the ESR.)
2691
2692 ### SearchEngines | Default
2693
2694 Set the default search engine. This policy is only available on the ESR.
2695
2696 **Compatibility:** Firefox ESR 60\
2697 **CCK2 Equivalent:** `defaultSearchEngine`\
2698 **Preferences Affected:** N/A
2699
2700 #### Windows (GPO)
2701 ```
2702 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
2703 ```
2704 #### macOS
2705 ```
2706 <dict>
2707 <key>SearchEngines</key>
2708 <dict>
2709 <key>Default</key>
2710 <string>NAME_OF_SEARCH_ENGINE</string>
2711 </dict>
2712 </dict>
2713 ```
2714 #### policies.json
2715 ```
2716 {
2717 "policies": {
2718 "SearchEngines": {
2719 "Default": "NAME_OF_SEARCH_ENGINE"
2720 }
2721 }
2722 }
2723 ```
2724 ### SearchEngines | PreventInstalls
2725
2726 Prevent installing search engines from webpages.
2727
2728 **Compatibility:** Firefox ESR 60\
2729 **CCK2 Equivalent:** `disableSearchEngineInstall`\
2730 **Preferences Affected:** N/A
2731
2732 #### Windows (GPO)
2733 ```
2734 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
2735 ```
2736 #### macOS
2737 ```
2738 <dict>
2739 <key>SearchEngines</key>
2740 <dict>
2741 <key>PreventInstalls</key>
2742 <true/> | <false/>
2743 </dict>
2744 </dict>
2745 ```
2746 #### policies.json
2747 ```
2748 {
2749 "policies": {
2750 "SearchEngines": {
2751 "PreventInstalls": true | false
2752 }
2753 }
2754 }
2755 ```
2756 ### SearchEngines | Remove
2757
2758 Hide built-in search engines. This policy is only available on the ESR.
2759
2760 **Compatibility:** Firefox ESR 60.2\
2761 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
2762 **Preferences Affected:** N/A
2763
2764 #### Windows (GPO)
2765 ```
2766 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
2767 ```
2768 #### macOS
2769 ```
2770 <dict>
2771 <key>SearchEngines</key>
2772 <dict>
2773 <key>Remove</key>
2774 <array>
2775 <string>NAME_OF_SEARCH_ENGINE</string>
2776 </array>
2777 </dict>
2778 </dict>
2779 ```
2780 #### policies.json
2781 ```
2782 {
2783 "policies": {
2784 "SearchEngines": {
2785 "Remove": ["NAME_OF_SEARCH_ENGINE"]
2786 }
2787 }
2788 }
2789 ```
2790 ### SearchEngines | Add
2791
2792 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
2793
2794 `Name` is the name of the search engine.
2795
2796 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
2797
2798 `Method` is either GET or POST
2799
2800 `IconURL` is a URL for the icon to use.
2801
2802 `Alias` is a keyword to use for the engine.
2803
2804 `Description` is a description of the search engine.
2805
2806 `PostData` is the POST data as name value pairs separated by &.
2807
2808 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
2809
2810 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
2811 **CCK2 Equivalent:** `searchplugins`\
2812 **Preferences Affected:** N/A
2813
2814 #### Windows (GPO)
2815 ```
2816 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
2817 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
2818 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
2819 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
2820 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
2821 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
2822 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
2823 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
2824 ```
2825
2826 #### macOS
2827 ```
2828 <dict>
2829 <key>SearchEngines</key>
2830 <dict>
2831 <key>Add</key>
2832 <array>
2833 <dict>
2834 <key>Name</key>
2835 <string>Example1</string>
2836 <key>URLTemplate</key>
2837 <string>https://www.example.org/q={searchTerms}</string>
2838 <key>Method</key>
2839 <string>GET | POST </string>
2840 <key>IconURL</key>
2841 <string>https://www.example.org/favicon.ico</string>
2842 <key>Alias</key>
2843 <string>example</string>
2844 <key>Description</key>
2845 <string>Example Description</string>
2846 <key>SuggestURLTemplate</key>
2847 <string>https://www.example.org/suggestions/q={searchTerms}</string>
2848 <key>PostData</key>
2849 <string>name=value&q={searchTerms}</string>
2850 </dict>
2851 <array>
2852 </dict>
2853 </dict>
2854 ```
2855 #### policies.json
2856 ```
2857 {
2858 "policies": {
2859 "SearchEngines": {
2860 "Add": [
2861 {
2862 "Name": "Example1",
2863 "URLTemplate": "https://www.example.org/q={searchTerms}",
2864 "Method": "GET" | "POST",
2865 "IconURL": "https://www.example.org/favicon.ico",
2866 "Alias": "example",
2867 "Description": "Description",
2868 "PostData": "name=value&q={searchTerms}",
2869 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
2870 }
2871 ]
2872 }
2873 }
2874 }
2875 ```
2876 ### SearchSuggestEnabled
2877
2878 Enable search suggestions.
2879
2880 **Compatibility:** Firefox 68, Firefox ESR 68\
2881 **CCK2 Equivalent:** N/A\
2882 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
2883
2884 #### Windows (GPO)
2885 ```
2886 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
2887 ```
2888 #### macOS
2889 ```
2890 <dict>
2891 <key>SearchSuggestEnabled</key>
2892 <true/> | <false/>
2893 </dict>
2894 ```
2895 #### policies.json
2896 ```
2897 {
2898 "policies": {
2899 "SearchSuggestEnabled": true | false
2900 }
2901 }
2902 ```
2903 ### SecurityDevices
2904
2905 Install PKCS #11 modules.
2906
2907 **Compatibility:** Firefox 64, Firefox ESR 60.4\
2908 **CCK2 Equivalent:** `certs.devices`\
2909 **Preferences Affected:** N/A
2910
2911 #### Windows (GPO)
2912 ```
2913 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
2914 ```
2915 #### macOS
2916 ```
2917 <dict>
2918 <key>SecurityDevices</key>
2919 <dict>
2920 <key>NAME_OF_DEVICE</key>
2921 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
2922 </dict>
2923 </dict>
2924 ```
2925
2926 #### policies.json
2927 ```
2928 {
2929 "policies": {
2930 "SecurityDevices": {
2931 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
2932 }
2933 }
2934 }
2935 ```
2936 ### SSLVersionMax
2937
2938 Set and lock the maximum version of TLS.
2939
2940 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2941 **CCK2 Equivalent:** N/A\
2942 **Preferences Affected:** `security.tls.version.max`
2943
2944 #### Windows (GPO)
2945 ```
2946 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2947 ```
2948 #### macOS
2949 ```
2950 <dict>
2951 <key>SSLVersionMax</key>
2952 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2953 </dict>
2954 ```
2955
2956 #### policies.json
2957 ```
2958 {
2959 "policies": {
2960 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2961 }
2962 }
2963 ```
2964 ### SSLVersionMin
2965
2966 Set and lock the minimum version of TLS.
2967
2968 **Compatibility:** Firefox 66, Firefox ESR 60.6\
2969 **CCK2 Equivalent:** N/A\
2970 **Preferences Affected:** `security.tls.version.min`
2971
2972 #### Windows (GPO)
2973 ```
2974 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2975 ```
2976 #### macOS
2977 ```
2978 <dict>
2979 <key>SSLVersionMin</key>
2980 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
2981 </dict>
2982 ```
2983
2984 #### policies.json
2985 ```
2986 {
2987 "policies": {
2988 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
2989 }
2990 }
2991 ```
2992 ### SupportMenu
2993 Add a menuitem to the help menu for specifying support information.
2994
2995 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
2996 **CCK2 Equivalent:** helpMenu\
2997 **Preferences Affected:** N/A
2998
2999 #### Windows (GPO)
3000 ```
3001 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
3002 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
3003 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
3004 ```
3005 #### macOS
3006 ```
3007 <dict>
3008 <key>SupportMenu</key>
3009 <dict>
3010 <key>Title</key>
3011 <string>SupportMenu</string>
3012 <key>URL</key>
3013 <string>http://example.com/support</string>
3014 <key>AccessKey</key>
3015 <string>S</string>
3016 </dict>
3017 </dict>
3018 ```
3019 #### policies.json
3020 ```
3021 {
3022 "policies": {
3023 "SupportMenu": {
3024 "Title": "Support Menu",
3025 "URL": "http://example.com/support",
3026 "AccessKey": "S"
3027 }
3028 }
3029 }
3030 ```
3031 ### WebsiteFilter
3032 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
3033
3034 **Compatibility:** Firefox 60, Firefox ESR 60\
3035 **CCK2 Equivalent:** N/A\
3036 **Preferences Affected:** N/A
3037
3038 #### Windows (GPO)
3039 ```
3040 Software\Policies\Mozilla\Firefox\WebsiteFilters\Block\1 = "<all_urls>"
3041 Software\Policies\Mozilla\Firefox\WebsiteFilters\Exceptions\1 = "http://example.org/*"
3042 ```
3043 #### macOS
3044 ```
3045 <dict>
3046 <key>WebsiteFilter</key>
3047 <dict>
3048 <key>Block</key>
3049 <array>
3050 <string><all_urls></string>
3051 </array>
3052 <key>Exceptions</key>
3053 <array>
3054 <string>http://example.org/*</string>
3055 </array>
3056 </dict>
3057
3058 </dict>
3059 ```
3060 #### policies.json
3061 ```
3062 {
3063 "policies": {
3064 "WebsiteFilter": {
3065 "Block": ["<all_urls>"],
3066 "Exceptions": ["http://example.org/*"]
3067 }
3068 }
3069 }
3070 ```

patrick-canterino.de