]> git.p6c8.net - policy-templates.git/blob - README.md
Fix a few typos
[policy-templates.git] / README.md
1 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
2
3 | Policy Name | Description
4 | --- | --- |
5 | **[`3rdparty`](#3rdparty)** | Set policies that WebExtensions can access via chrome.storage.managed.
6 | **[`AllowedDomainsForApps`](#alloweddomainsforapps)** | Define domains allowed to access Google Workspace.
7 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
8 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
9 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
10 | **[`AutoLaunchProtocolsFromOrigins`](#autolaunchprotocolsfromorigins)** | Define a list of external protocols that can be used from listed origins without prompting the user.
11 | **[`BackgroundAppUpdate`](#backgroundappupdate)** | Enable or disable the background updater (Windows only).
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
23 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
24 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
25 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
26 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
27 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
28 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
29 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
32 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
33 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
34 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
43 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
44 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
45 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
48 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
49 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
58 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
59 | **[`Handlers`](#handlers)** | Configure default application handlers.
60 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`ManagedBookmarks`](#managedbookmarks)** | Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
66 | **[`ManualAppUpdateOnly`](#manualappupdateonly)** | Allow manual updates only and do not notify the user about updates..
67 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
68 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
69 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
70 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
71 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
72 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
73 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
74 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
75 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
76 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
77 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
78 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
79 | **[`Preferences`](#preferences)** | Set and lock preferences.
80 | **[`Preferences (Deprecated)`](#preferences-deprecated)** | Set and lock some preferences.
81 | **[`PrimaryPassword`](#primarypassword)** | Require or prevent using a primary (formerly master) password.
82 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
83 | **[`Proxy`](#proxy)** | Configure proxy settings.
84 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
85 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
86 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
87 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
88 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
89 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
90 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
91 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
92 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
93 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
94 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
95 | **[`ShowHomeButton`](#showhomebutton)** | Show the home button on the toolbar.
96 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
97 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
98 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
99 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
100 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
101 | **[`WindowsSSO`](#windowssso)** | Allow Windows single sign-on for Microsoft, work, and school accounts.
102
103 ### 3rdparty
104
105 Allow WebExtensions to configure policy. For more information, see [Adding policy support to your extension](https://extensionworkshop.com/documentation/enterprise/adding-policy-support-to-your-extension/).
106
107 ### AppAutoUpdate
108
109 Enable or disable **automatic** application update.
110
111 If set to true, application updates are installed without user approval within Firefox. The operating system might still require approval.
112
113 If set to false, application updates are downloaded but the user can choose when to install the update.
114
115 If you have disabled updates via `DisableAppUpdate`, this policy has no effect.
116
117 **Compatibility:** Firefox 75, Firefox ESR 68.7\
118 **CCK2 Equivalent:** N/A\
119 **Preferences Affected:** `app.update.auto`
120
121 #### Windows (GPO)
122 ```
123 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
124 ```
125 #### Windows (Intune)
126 OMA-URI:
127 ```
128 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
129 ```
130 Value (string):
131 ```
132 <enabled/> or <disabled/>
133 ```
134 #### macOS
135 ```
136 <dict>
137 <key>AppAutoUpdate</key>
138 <true/> | <false/>
139 </dict>
140 ```
141 #### policies.json
142 ```
143 {
144 "policies": {
145 "AppAutoUpdate": true | false
146 }
147 }
148 ```
149 ### AllowedDomainsForApps
150
151 Define domains allowed to access Google Workspace.
152
153 This policy is based on the [Chrome policy](https://chromeenterprise.google/policies/#AllowedDomainsForApps) of the same name.
154
155 If this policy is enabled, users can only access Google Workspace using accounts from the specified domains. If you want to allow Gmail, you can add ```consumer_accounts``` to the list.
156
157 **Compatibility:** Firefox 89, Firefox ESR 78.11\
158 **CCK2 Equivalent:** N/A\
159 **Preferences Affected:** N/A
160
161 #### Windows (GPO)
162 ```
163 Software\Policies\Mozilla\Firefox\AllowedDomainsForApps = "managedfirefox.com,example.com"
164 ```
165 #### Windows (Intune)
166 OMA-URI:
167 ```
168 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AllowedDomainsForApps
169 ```
170 Value (string):
171 ```
172 <enabled/>
173 <data id="AllowedDomainsForApps" value="managedfirefox.com,example.com"/>
174 ```
175 #### macOS
176 ```
177 <dict>
178 <key>AllowedDomainsForApps</key>
179 <string>managedfirefox.com,example.com</string>
180 </dict>
181 ```
182 #### policies.json
183 ```
184 {
185 "policies": {
186 "AllowedDomainsForApps": "managedfirefox.com,example.com"
187 }
188 }
189 ```
190 ### AppUpdateURL
191
192 Change the URL for application update if you are providing Firefox updates from a custom update server.
193
194 **Compatibility:** Firefox 62, Firefox ESR 60.2\
195 **CCK2 Equivalent:** N/A\
196 **Preferences Affected:** `app.update.url`
197
198 #### Windows (GPO)
199 ```
200 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
201 ```
202 #### Windows (Intune)
203 OMA-URI:
204 ```
205 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
206 ```
207 Value (string):
208 ```
209 <enabled/>
210 <data id="AppUpdateURL" value="https://yoursite.com"/>
211 ```
212 #### macOS
213 ```
214 <dict>
215 <key>AppUpdateURL</key>
216 <string>https://yoursite.com</string>
217 </dict>
218 ```
219 #### policies.json
220 ```
221 {
222 "policies": {
223 "AppUpdateURL": "https://yoursite.com"
224 }
225 }
226 ```
227 ### Authentication
228
229 Configure sites that support integrated authentication.
230
231 See [Integrated authentication](https://htmlpreview.github.io/?https://github.com/mdn/archived-content/blob/main/files/en-us/mozilla/integrated_authentication/raw.html) for more information.
232
233 `PrivateBrowsing` enables integrated authentication in private browsing.
234
235 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
236 **CCK2 Equivalent:** N/A\
237 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
238
239 #### Windows (GPO)
240 ```
241 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
242 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
243 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
244 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
245 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
246 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
247 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
248 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
249 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
250 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
251 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
252 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
253 ```
254 #### Windows (Intune)
255 OMA-URI:
256 ```
257 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
258 ```
259 Value (string):
260 ```
261 <enabled/>
262 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
263 ```
264 OMA-URI:
265 ```
266 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
267 ```
268 Value (string):
269 ```
270 <enabled/>
271 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
272 ```
273 OMA-URI:
274 ```
275 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
276 ```
277 Value (string):
278 ```
279 <enabled/>
280 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
281 ```
282 OMA-URI:
283 ```
284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
285 ```
286 Value (string):
287 ```
288 <enabled/>
289 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
290 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
291 ```
292 OMA-URI:
293 ```
294 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
295 ```
296 Value (string):
297 ```
298 <enabled/> or <disabled/>
299 ```
300 OMA-URI:
301 ```
302 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
303 ```
304 Value (string):
305 ```
306 <enabled/> or <disabled/>
307 ```
308 #### macOS
309 ```
310 <dict>
311 <key>Authentication</key>
312 <dict>
313 <key>SPNEGO</key>
314 <array>
315 <string>mydomain.com</string>
316 <string>https://myotherdomain.com</string>
317 </array>
318 <key>Delegated</key>
319 <array>
320 <string>mydomain.com</string>
321 <string>https://myotherdomain.com</string>
322 </array>
323 <key>NTLM</key>
324 <array>
325 <string>mydomain.com</string>
326 <string>https://myotherdomain.com</string>
327 </array>
328 <key>AllowNonFQDN</key>
329 <dict>
330 <key>SPNEGO</key>
331 <true/> | <false/>
332 <key>NTLM</key>
333 <true/> | <false/>
334 </dict>
335 <key>AllowProxies</key>
336 <dict>
337 <key>SPNEGO</key>
338 <true/> | <false/>
339 <key>NTLM</key>
340 <true/> | <false/>
341 </dict>
342 <key>Locked</key>
343 <true/> | <false/>
344 <key>PrivateBrowsing</key>
345 <true/> | <false/>
346 </dict>
347 </dict>
348 ```
349 #### policies.json
350 ```
351 {
352 "policies": {
353 "Authentication": {
354 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
355 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
356 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
357 "AllowNonFQDN": {
358 "SPNEGO": true | false,
359 "NTLM": true | false
360 },
361 "AllowProxies": {
362 "SPNEGO": true | false,
363 "NTLM": true | false
364 },
365 "Locked": true | false,
366 "PrivateBrowsing": true | false
367 }
368 }
369 }
370 ```
371 ### AutoLaunchProtocolsFromOrigins
372 Define a list of external protocols that can be used from listed origins without prompting the user. The origin is the scheme plus the hostname.
373
374 The syntax of this policy is exactly the same as the [Chrome AutoLaunchProtocolsFromOrigins policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=AutoLaunchProtocolsFromOrigins) except that you can only use valid origins (not just hostnames). This also means that you cannot specify an asterisk for all origins.
375
376 The schema is:
377 ```
378 {
379 "items": {
380 "properties": {
381 "allowed_origins": {
382 "items": {
383 "type": "string"
384 },
385 "type": "array"
386 },
387 "protocol": {
388 "type": "string"
389 }
390 },
391 "required": [
392 "protocol",
393 "allowed_origins"
394 ],
395 "type": "object"
396 },
397 "type": "array"
398 }
399 ```
400 **Compatibility:** Firefox 90, Firefox ESR 78.12\
401 **CCK2 Equivalent:** N/A\
402 **Preferences Affected:** N/A
403
404 #### Windows (GPO)
405 Software\Policies\Mozilla\Firefox\AutoLaunchProtocolsFromOrigins (REG_MULTI_SZ) =
406 ```
407 [
408 {
409 "protocol": "zoommtg",
410 "allowed_origins": [
411 "https://somesite.zoom.us"
412 ]
413 }
414 ]
415 ```
416 #### Windows (Intune)
417 OMA-URI:
418 ```
419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AutoLaunchProtocolsFromOrigins
420 ```
421 Value (string):
422 ```
423 <enabled/>
424 <data id="JSON" value='
425 [
426 {
427 "protocol": "zoommtg",
428 "allowed_origins": [
429 "https://somesite.zoom.us"
430 ]
431 }
432 ]'/>
433 ```
434 #### macOS
435 ```
436 <dict>
437 <key>AutoLaunchProtocolsFromOrigins</key>
438 <array>
439 <dict>
440 <key>protocol</key>
441 <string>zoommtg</string>
442 <key>allowed_origins</key>
443 <array>
444 <string>https://somesite.zoom.us</string>
445 </array>
446 </dict>
447 </array>
448 </dict>
449 ```
450 #### policies.json
451 ```
452 {
453 "policies": {
454 "AutoLaunchProtocolsFromOrigins": [{
455 "protocol": "zoommtg",
456 "allowed_origins": [
457 "https://somesite.zoom.us"
458 ]
459 }]
460 }
461 }
462 ```
463 ### BackgroundAppUpdate
464
465 Enable or disable **automatic** application update **in the background**, when the application is not running.
466
467 If set to true, application updates may be installed (without user approval) in the background, even when the application is not running. The operating system might still require approval.
468
469 If set to false, the application will not try to install updates when the application is not running.
470
471 If you have disabled updates via `DisableAppUpdate` or disabled automatic updates via `AppAutoUpdate`, this policy has no effect.
472
473 **Compatibility:** Firefox 90 (Windows only)\
474 **CCK2 Equivalent:** N/A\
475 **Preferences Affected:** `app.update.background.enabled`
476
477 #### Windows (GPO)
478 ```
479 Software\Policies\Mozilla\Firefox\BackgroundAppUpdate = 0x1 | 0x0
480 ```
481 #### Windows (Intune)
482 OMA-URI:
483 ```
484 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BackgroundAppUpdate
485 ```
486 Value (string):
487 ```
488 <enabled/> or <disabled/>
489 ```
490 #### macOS
491 ```
492 <dict>
493 <key>BackgroundAppUpdate</key>
494 <true/> | <false/>
495 </dict>
496 ```
497 #### policies.json
498 ```
499 {
500 "policies": {
501 "BackgroundAppUpdate": true | false
502 }
503 }
504 ```
505 ### BlockAboutAddons
506
507 Block access to the Add-ons Manager (about:addons).
508
509 **Compatibility:** Firefox 60, Firefox ESR 60\
510 **CCK2 Equivalent:** `disableAddonsManager`\
511 **Preferences Affected:** N/A
512
513 #### Windows (GPO)
514 ```
515 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
516 ```
517 #### Windows (Intune)
518 OMA-URI:
519 ```
520 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
521 ```
522 Value (string):
523 ```
524 <enabled/> or <disabled/>
525 ```
526 #### macOS
527 ```
528 <dict>
529 <key>BlockAboutAddons</key>
530 <true/> | <false/>
531 </dict>
532 ```
533 #### policies.json
534 ```
535 {
536 "policies": {
537 "BlockAboutAddons": true | false
538 }
539 }
540 ```
541 ### BlockAboutConfig
542
543 Block access to about:config.
544
545 **Compatibility:** Firefox 60, Firefox ESR 60\
546 **CCK2 Equivalent:** `disableAboutConfig`\
547 **Preferences Affected:** N/A
548
549 #### Windows (GPO)
550 ```
551 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
552 ```
553 #### Windows (Intune)
554 OMA-URI:
555 ```
556 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
557 ```
558 Value (string):
559 ```
560 <enabled/> or <disabled/>
561 ```
562 #### macOS
563 ```
564 <dict>
565 <key>BlockAboutConfig</key>
566 <true/> | <false/>
567 </dict>
568 ```
569 #### policies.json
570 ```
571 {
572 "policies": {
573 "BlockAboutConfig": true | false
574 }
575 }
576 ```
577 ### BlockAboutProfiles
578
579 Block access to About Profiles (about:profiles).
580
581 **Compatibility:** Firefox 60, Firefox ESR 60\
582 **CCK2 Equivalent:** `disableAboutProfiles`\
583 **Preferences Affected:** N/A
584
585 #### Windows (GPO)
586 ```
587 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
588 ```
589 #### Windows (Intune)
590 OMA-URI:
591 ```
592 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
593 ```
594 Value (string):
595 ```
596 <enabled/> or <disabled/>
597 ```
598 #### macOS
599 ```
600 <dict>
601 <key>BlockAboutProfiles</key>
602 <true/> | <false/>
603 </dict>
604 ```
605 #### policies.json
606 ```
607 {
608 "policies": {
609 "BlockAboutProfiles": true | false
610 }
611 }
612 ```
613 ### BlockAboutSupport
614
615 Block access to Troubleshooting Information (about:support).
616
617 **Compatibility:** Firefox 60, Firefox ESR 60\
618 **CCK2 Equivalent:** `disableAboutSupport`\
619 **Preferences Affected:** N/A
620
621 #### Windows (GPO)
622 ```
623 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
624 ```
625 #### Windows (Intune)
626 OMA-URI:
627 ```
628 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
629 ```
630 Value (string):
631 ```
632 <enabled/> or <disabled/>
633 ```
634 #### macOS
635 ```
636 <dict>
637 <key>BlockAboutSupport</key>
638 <true/> | <false/>
639 </dict>
640 ```
641 #### policies.json
642 ```
643 {
644 "policies": {
645 "BlockAboutSupport": true | false
646 }
647 }
648 ```
649 ### Bookmarks
650
651 Note: [`ManagedBookmarks`](#managedbookmarks) is the new recommended way to add bookmarks. This policy will continue to be supported.
652
653 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
654
655 If you want to clear all bookmarks set with this policy, you can set the value to an empty array (```[]```). This can be on Windows via the new Bookmarks (JSON) policy available with GPO and Intune.
656
657 **Compatibility:** Firefox 60, Firefox ESR 60\
658 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
659 **Preferences Affected:** N/A
660
661 #### Windows (GPO)
662 ```
663 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
664 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
665 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
666 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
667 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
668
669 Software\Policies\Mozilla\Firefox\Bookmarks (REG_MULTI_SZ) =
670 ```
671 []
672 ```
673
674 ```
675 #### Windows (Intune)
676 OMA-URI:
677 ```
678 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
679 ```
680 Value (string):
681 ```
682 <enabled/>
683 <data id="BookmarkTitle" value="Example"/>
684 <data id="BookmarkURL" value="https://example.com"/>
685 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
686 <data id="BookmarkPlacement" value="toolbar | menu"/>
687 <data id="BookmarkFolder" value="FolderName"/>
688 ```
689 OMA-URI:
690 ```
691 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Bookmarks
692 ```
693 Value (string):
694 ```
695 <enabled/>
696 <data id="JSON" value='[]'/>
697 ```
698 #### macOS
699 ```
700 <dict>
701 <key>Bookmarks</key>
702 <array>
703 <dict>
704 <key>Title</key>
705 <string>Example</string>
706 <key>URL</key>
707 <string>https://example.com</string>
708 <key>Favicon</key>
709 <string>https://example.com/favicon.ico</string>
710 <key>Placement</key>
711 <string>toolbar | menu</string>
712 <key>Folder</key>
713 <string>FolderName</string>
714 </dict>
715 </array>
716 </dict>
717 ```
718 #### policies.json
719 ```
720 {
721 "policies": {
722 "Bookmarks": [
723 {
724 "Title": "Example",
725 "URL": "https://example.com",
726 "Favicon": "https://example.com/favicon.ico",
727 "Placement": "toolbar" | "menu",
728 "Folder": "FolderName"
729 }
730 ]
731 }
732 }
733 ```
734 ### CaptivePortal
735 Enable or disable the detection of captive portals.
736
737 **Compatibility:** Firefox 67, Firefox ESR 60.7\
738 **CCK2 Equivalent:** N/A\
739 **Preferences Affected:** `network.captive-portal-service.enabled`
740
741 #### Windows (GPO)
742 ```
743 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
744 ```
745 #### Windows (Intune)
746 OMA-URI:
747 ```
748 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
749 ```
750 Value (string):
751 ```
752 <enabled/> or <disabled/>
753 ```
754 #### macOS
755 ```
756 <dict>
757 <key>CaptivePortal</key>
758 <true/> | <false/>
759 </dict>
760 ```
761 #### policies.json
762 ```
763 {
764 "policies": {
765 "CaptivePortal": true | false
766 }
767 }
768 ```
769 ### Certificates
770
771 ### Certificates | ImportEnterpriseRoots
772
773 Trust certificates that have been added to the operating system certificate store by a user or administrator.
774
775 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
776
777 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
778
779 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
780 **CCK2 Equivalent:** N/A\
781 **Preferences Affected:** `security.enterprise_roots.enabled`
782
783 #### Windows (GPO)
784 ```
785 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
786 ```
787 #### Windows (Intune)
788 OMA-URI:
789 ```
790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
791 ```
792 Value (string):
793 ```
794 <enabled/> or <disabled/>
795 ```
796 #### macOS
797 ```
798 <dict>
799 <key>Certificates</key>
800 <dict>
801 <key>ImportEnterpriseRoots</key>
802 <true/> | <false/>
803 </dict>
804 </dict>
805 ```
806 #### policies.json
807 ```
808 {
809 "policies": {
810 "Certificates": {
811 "ImportEnterpriseRoots": true | false
812 }
813 }
814 }
815 ```
816 ### Certificates | Install
817
818 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
819
820 - Windows
821 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
822 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
823 - macOS
824 - /Library/Application Support/Mozilla/Certificates
825 - ~/Library/Application Support/Mozilla/Certificates
826 - Linux
827 - /usr/lib/mozilla/certificates
828 - /usr/lib64/mozilla/certificates
829 - ~/.mozilla/certificates
830
831 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
832
833 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
834
835 Certificates are installed using the trust string `CT,CT,`.
836
837 Binary (DER) and ASCII (PEM) certificates are both supported.
838
839 **Compatibility:** Firefox 64, Firefox ESR 64\
840 **CCK2 Equivalent:** `certs.ca`\
841 **Preferences Affected:** N/A
842
843 #### Windows (GPO)
844 ```
845 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
846 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
847 ```
848 #### Windows (Intune)
849 OMA-URI:
850 ```
851 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
852 ```
853 Value (string):
854 ```
855 <enabled/>
856 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
857 ```
858 #### macOS
859 ```
860 <dict>
861 <key>Certificates</key>
862 <dict>
863 <key>Install</key>
864 <array>
865 <string>cert1.der</string>
866 <string>/Users/username/cert2.pem</string>
867 </array>
868 </dict>
869 </dict>
870 ```
871 #### policies.json
872 ```
873 {
874 "policies": {
875 "Certificates": {
876 "Install": ["cert1.der", "/home/username/cert2.pem"]
877 }
878 }
879 }
880 ```
881 ### Cookies
882 Configure cookie preferences.
883
884 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
885
886 `AllowSession` is a list of origins (not domains) where cookies are only allowed for the current session. You must include http or https.
887
888 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
889
890 `Behavior` sets the default behavior for cookies based on the values below.
891
892 `BehaviorPrivateBrowsing` sets the default behavior for cookies in private browsing based on the values below.
893
894 | Value | Description
895 | --- | ---
896 | accept | Accept all cookies
897 | reject-foreign | Reject third party cookies
898 | reject | Reject all cookies
899 | limit-foreign | Reject third party cookies for sites you haven't visited
900 | reject-tracker | Reject cookies for known trackers (default)
901 | reject-tracker-and-partition-foreign | Reject cookies for known trackers and partition third-party cookies (Total Cookie Protection) (default for private browsing)
902
903 `Default` (Deprecated) determines whether cookies are accepted at all.
904
905 `AcceptThirdParty` (Deprecated) determines how third-party cookies are handled.
906
907 `ExpireAtSessionEnd` determines when cookies expire.
908
909 `RejectTracker` (Deprecated) only rejects cookies for trackers.
910
911 `Locked` prevents the user from changing cookie preferences.
912
913 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker added in Firefox 63, AllowSession added in Firefox 79/78.1, Behavior added in Firefox 95/91.4)\
914 **CCK2 Equivalent:** N/A\
915 **Preferences Affected:** `network.cookie.cookieBehavior`, `network.cookie.cookieBehavior.pbmode`, `network.cookie.lifetimePolicy`
916
917 #### Windows (GPO)
918 ```
919 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
920 Software\Policies\Mozilla\Firefox\Cookies\AllowSession\1 = "https://example.edu"
921 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
922 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
923 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
924 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
925 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
926 Software\Policies\Mozilla\Firefox\Cookies\Behavior = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
927 Software\Policies\Mozilla\Firefox\Cookies\BehaviorPrivateBrowsing = "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign"
928 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
929 ```
930 #### Windows (Intune)
931 OMA-URI:
932 ```
933 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
934 ```
935 Value (string):
936 ```
937 <enabled/>
938 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
939 ```
940 OMA-URI:
941 ```
942 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AllowSession
943 ```
944 Value (string):
945 ```
946 <enabled/>
947 <data id="Cookies_Allow" value="1&#xF000;https://example.edu"/>
948 ```
949 OMA-URI:
950 ```
951 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
952 ```
953 Value (string):
954 ```
955 <enabled/>
956 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
957 ```
958 OMA-URI:
959 ```
960 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
961 ```
962 Value (string):
963 ```
964 <enabled/> or <disabled/>
965 ```
966 OMA-URI:
967 ```
968 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
969 ```
970 Value (string):
971 ```
972 <enabled/>
973 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
974 ```
975 OMA-URI:
976 ```
977 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
978 ```
979 Value (string):
980 ```
981 <enabled/> or <disabled/>
982 ```
983 OMA-URI:
984 ```
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
986 ```
987 Value (string):
988 ```
989 <enabled/> or <disabled/>
990 ```
991 OMA-URI:
992 ```
993 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
994 ```
995 Value (string):
996 ```
997 <enabled/> or <disabled/>
998 ```
999 OMA-URI:
1000 ```
1001 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Behavior
1002 ```
1003 Value (string):
1004 ```
1005 <enabled/>
1006 <data id="Cookies_Behavior" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1007 ```
1008 OMA-URI:
1009 ```
1010 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_BehaviorPrivateBrowsing
1011 ```
1012 Value (string):
1013 ```
1014 <enabled/>
1015 <data id="Cookies_BehaviorPrivateBrowsing" value="accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign"/>
1016 ```
1017 #### macOS
1018 ```
1019 <dict>
1020 <key>Cookies</key>
1021 <dict>
1022 <key>Allow</key>
1023 <array>
1024 <string>http://example.com</string>
1025 </array>
1026 <key>AllowSession</key>
1027 <array>
1028 <string>http://example.edu</string>
1029 </array>
1030 <key>Block</key>
1031 <array>
1032 <string>http://example.org</string>
1033 </array>
1034 <key>Default</key>
1035 <true/> | <false/>
1036 <key>AcceptThirdParty</key>
1037 <string>always | never | from-visited</string>
1038 <key>ExpireAtSessionEnd</key>
1039 <true/> | <false/>
1040 <key>RejectTracker</key>
1041 <true/> | <false/>
1042 <key>Locked</key>
1043 <true/> | <false/>
1044 <key>Behavior</key>
1045 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1046 <key>BehaviorPrivateBrowsing</key>
1047 <string>accept | reject-foreign | reject | limit-foreign | reject-tracker | reject-tracker-and-partition-foreign</string>
1048 </dict>
1049 </dict>
1050 ```
1051 #### policies.json
1052 ```
1053 {
1054 "policies": {
1055 "Cookies": {
1056 "Allow": ["http://example.org/"],
1057 "AllowSession": ["http://example.edu/"],
1058 "Block": ["http://example.edu/"],
1059 "Default": true | false,
1060 "AcceptThirdParty": "always" | "never" | "from-visited",
1061 "ExpireAtSessionEnd": true | false,
1062 "RejectTracker": true | false,
1063 "Locked": true | false,
1064 "Behavior": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1065 "BehaviorPrivateBrowsing": "accept" | "reject-foreign" | "reject" | "limit-foreign" | "reject-tracker" | "reject-tracker-and-partition-foreign",
1066 }
1067 }
1068 }
1069 ```
1070 ### DisableSetDesktopBackground
1071 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
1072
1073 **Compatibility:** Firefox 60, Firefox ESR 60\
1074 **CCK2 Equivalent:** `removeSetDesktopBackground`\
1075 **Preferences Affected:** N/A
1076
1077 #### Windows (GPO)
1078 ```
1079 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
1080 ```
1081 #### Windows (Intune)
1082 OMA-URI:
1083 ```
1084 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
1085 ```
1086 Value (string):
1087 ```
1088 <enabled/> or <disabled/>
1089 ```
1090 #### macOS
1091 ```
1092 <dict>
1093 <key>DisableSetDesktopBackground</key>
1094 <true/> | <false/>
1095 </dict>
1096 ```
1097 #### policies.json
1098 ```
1099 {
1100 "policies": {
1101 "DisableSetDesktopBackground": true | false
1102 }
1103 }
1104 ```
1105 ### DisableMasterPasswordCreation
1106 Remove the master password functionality.
1107
1108 If this value is true, it works the same as setting [`PrimaryPassword`](#primarypassword) to false and removes the primary password functionality.
1109
1110 If both `DisableMasterPasswordCreation` and `PrimaryPassword` are used, `DisableMasterPasswordCreation` takes precedent.
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** `noMasterPassword`\
1114 **Preferences Affected:** N/A
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableMasterPasswordCreation</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableMasterPasswordCreation": true | false
1141 }
1142 }
1143 ```
1144 ### DefaultDownloadDirectory
1145 Set the default download directory.
1146
1147 You can use ${home} for the native home directory.
1148
1149 **Compatibility:** Firefox 68, Firefox ESR 68\
1150 **CCK2 Equivalent:** N/A\
1151 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`
1152
1153 #### Windows (GPO)
1154 ```
1155 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1156 ```
1157 #### Windows (Intune)
1158 OMA-URI:
1159 ```
1160 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1161 ```
1162 Value (string):
1163 ```
1164 <enabled/>
1165 <data id="Preferences_String" value="${home}\Downloads"/>
1166 ```
1167 #### macOS
1168 ```
1169 <dict>
1170 <key>DefaultDownloadDirectory</key>
1171 <string>${home}/Downloads</string>
1172 </dict>
1173 ```
1174 #### policies.json (macOS and Linux)
1175 ```
1176 {
1177 "policies": {
1178 "DefaultDownloadDirectory": "${home}/Downloads"
1179 }
1180 ```
1181 #### policies.json (Windows)
1182 ```
1183 {
1184 "policies": {
1185 "DefaultDownloadDirectory": "${home}\\Downloads"
1186 }
1187 ```
1188 ### DisableAppUpdate
1189 Turn off application updates within Firefox.
1190
1191 **Compatibility:** Firefox 60, Firefox ESR 60\
1192 **CCK2 Equivalent:** `disableFirefoxUpdates`\
1193 **Preferences Affected:** N/A
1194
1195 #### Windows (GPO)
1196 ```
1197 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
1198 ```
1199 #### Windows (Intune)
1200 OMA-URI:
1201 ```
1202 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
1203 ```
1204 Value (string):
1205 ```
1206 <enabled/> or <disabled/>
1207 ```
1208 #### macOS
1209 ```
1210 <dict>
1211 <key>DisableAppUpdate</key>
1212 <true/> | <false/>
1213 </dict>
1214 ```
1215 #### policies.json
1216 ```
1217 {
1218 "policies": {
1219 "DisableAppUpdate": true | false
1220 }
1221 }
1222 ```
1223 ### DisableBuiltinPDFViewer
1224 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
1225
1226 **Compatibility:** Firefox 60, Firefox ESR 60\
1227 **CCK2 Equivalent:** `disablePDFjs`\
1228 **Preferences Affected:** `pdfjs.disabled`
1229
1230 #### Windows (GPO)
1231 ```
1232 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
1233 ```
1234 #### Windows (Intune)
1235 OMA-URI:
1236 ```
1237 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
1238 ```
1239 Value (string):
1240 ```
1241 <enabled/> or <disabled/>
1242 ```
1243 #### macOS
1244 ```
1245 <dict>
1246 <key>DisableBuiltinPDFViewer</key>
1247 <true/> | <false/>
1248 </dict>
1249 ```
1250 #### policies.json
1251 ```
1252 {
1253 "policies": {
1254 "DisableBuiltinPDFViewer": true | false
1255 }
1256 }
1257 ```
1258 ### DisabledCiphers
1259 Disable specific cryptographic ciphers.
1260
1261 **Preferences Affected:** `security.ssl3.dhe_rsa_aes_128_sha`, `security.ssl3.dhe_rsa_aes_256_sha`, `security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_rsa_aes_128_gcm_sha256`, `security.ssl3.ecdhe_rsa_aes_128_sha`, `security.ssl3.ecdhe_rsa_aes_256_sha`, `security.ssl3.rsa_aes_128_gcm_sha256`, `security.ssl3.rsa_aes_128_sha`, `security.ssl3.rsa_aes_256_gcm_sha384`, `security.ssl3.rsa_aes_256_sha`, `security.ssl3.rsa_des_ede3_sha`
1262
1263 ---
1264 **Note:**
1265
1266 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
1267
1268 ---
1269 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
1270 **CCK2 Equivalent:** N/A\
1271 **Preferences Affected:** N/A
1272
1273 #### Windows (GPO)
1274 ```
1275 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1276 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1277 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1278 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1279 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1280 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1281 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
1282 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
1283 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
1284 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
1285 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
1286 ```
1287 #### Windows (Intune)
1288 OMA-URI:
1289 ```
1290 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
1291 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
1292 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
1293 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
1294 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
1295 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
1296 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
1297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
1299 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
1300 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
1301 ```
1302 Value (string):
1303 ```
1304 <enabled/> or <disabled/>
1305 ```
1306 #### macOS
1307 ```
1308 <dict>
1309 <key>DisabledCiphers</key>
1310 <dict>
1311 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1312 <true/> | <false/>
1313 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1314 <true/> | <false/>
1315 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1316 <true/> | <false/>
1317 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1318 <true/> | <false/>
1319 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1320 <true/> | <false/>
1321 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1322 <true/> | <false/>
1323 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1324 <true/> | <false/>
1325 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1326 <true/> | <false/>
1327 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1328 <true/> | <false/>
1329 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1330 <true/> | <false/>
1331 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1332 <true/> | <false/>
1333 </dict>
1334 </dict>
1335 ```
1336 #### policies.json
1337 ```
1338 {
1339 "policies": {
1340 "DisabledCiphers": {
1341 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1342 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1343 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1344 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1345 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1346 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1347 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1348 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1349 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false,
1350 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false,
1351 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1352 }
1353 }
1354 }
1355 ```
1356 ### DisableDefaultBrowserAgent
1357 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1358
1359 The browser agent is a Windows-only scheduled task which runs in the background to collect and submit data about the browser that the user has set as their OS default. More information is available [here](https://firefox-source-docs.mozilla.org/toolkit/mozapps/defaultagent/default-browser-agent/index.html).
1360
1361 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1362 **CCK2 Equivalent:** N/A\
1363 **Preferences Affected:** N/A
1364
1365 #### Windows (GPO)
1366 ```
1367 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1368 ```
1369 #### Windows (Intune)
1370 OMA-URI:
1371 ```
1372 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1373 ```
1374 Value (string):
1375 ```
1376 <enabled/> or <disabled/>
1377 ```
1378 #### policies.json
1379 ```
1380 {
1381 "policies": {
1382 "DisableDefaultBrowserAgent": true | false
1383 }
1384 }
1385 ```
1386 ### DisableDeveloperTools
1387 Remove access to all developer tools.
1388
1389 **Compatibility:** Firefox 60, Firefox ESR 60\
1390 **CCK2 Equivalent:** `removeDeveloperTools`\
1391 **Preferences Affected:** `devtools.policy.disabled`
1392
1393 #### Windows (GPO)
1394 ```
1395 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1396 ```
1397 #### Windows (Intune)
1398 OMA-URI:
1399 ```
1400 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1401 ```
1402 Value (string):
1403 ```
1404 <enabled/> or <disabled/>
1405 ```
1406 #### macOS
1407 ```
1408 <dict>
1409 <key>DisableDeveloperTools</key>
1410 <true/> | <false/>
1411 </dict>
1412 ```
1413 #### policies.json
1414 ```
1415 {
1416 "policies": {
1417 "DisableDeveloperTools": true | false
1418 }
1419 }
1420 ```
1421 ### DisableFeedbackCommands
1422 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1423
1424 **Compatibility:** Firefox 60, Firefox ESR 60\
1425 **CCK2 Equivalent:** N/A\
1426 **Preferences Affected:** N/A
1427
1428 #### Windows (GPO)
1429 ```
1430 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1431 ```
1432 #### Windows (Intune)
1433 OMA-URI:
1434 ```
1435 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1436 ```
1437 Value (string):
1438 ```
1439 <enabled/> or <disabled/>
1440 ```
1441 #### macOS
1442 ```
1443 <dict>
1444 <key>DisableFeedbackCommands</key>
1445 <true/> | <false/>
1446 </dict>
1447 ```
1448 #### policies.json
1449 ```
1450 {
1451 "policies": {
1452 "DisableFeedbackCommands": true | false
1453 }
1454 }
1455 ```
1456 ### DisableFirefoxAccounts
1457 Disable Firefox Accounts integration (Sync).
1458
1459 **Compatibility:** Firefox 60, Firefox ESR 60\
1460 **CCK2 Equivalent:** `disableSync`\
1461 **Preferences Affected:** `identity.fxaccounts.enabled`
1462
1463 #### Windows (GPO)
1464 ```
1465 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1466 ```
1467 #### Windows (Intune)
1468 OMA-URI:
1469 ```
1470 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1471 ```
1472 Value (string):
1473 ```
1474 <enabled/> or <disabled/>
1475 ```
1476 #### macOS
1477 ```
1478 <dict>
1479 <key>DisableFirefoxAccounts</key>
1480 <true/> | <false/>
1481 </dict>
1482 ```
1483 #### policies.json
1484 ```
1485 {
1486 "policies": {
1487 "DisableFirefoxAccounts": true | false
1488 }
1489 }
1490 ```
1491 ### DisableFirefoxScreenshots
1492 Remove access to Firefox Screenshots.
1493
1494 **Compatibility:** Firefox 60, Firefox ESR 60\
1495 **CCK2 Equivalent:** N/A\
1496 **Preferences Affected:** `extensions.screenshots.disabled`
1497
1498 #### Windows (GPO)
1499 ```
1500 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1501 ```
1502 #### Windows (Intune)
1503 OMA-URI:
1504 ```
1505 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1506 ```
1507 Value (string):
1508 ```
1509 <enabled/> or <disabled/>
1510 ```
1511 #### macOS
1512 ```
1513 <dict>
1514 <key>DisableFirefoxScreenshots</key>
1515 <true/> | <false/>
1516 </dict>
1517 ```
1518 #### policies.json
1519 ```
1520 {
1521 "policies": {
1522 "DisableFirefoxScreenshots": true | false
1523 }
1524 }
1525 ```
1526 ### DisableFirefoxStudies
1527 Disable Firefox studies (Shield).
1528
1529 **Compatibility:** Firefox 60, Firefox ESR 60\
1530 **CCK2 Equivalent:** N/A\
1531 **Preferences Affected:** N/A
1532
1533 #### Windows (GPO)
1534 ```
1535 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1536 ```
1537 #### Windows (Intune)
1538 OMA-URI:
1539 ```
1540 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1541 ```
1542 Value (string):
1543 ```
1544 <enabled/> or <disabled/>
1545 ```
1546 #### macOS
1547 ```
1548 <dict>
1549 <key>DisableFirefoxStudies</key>
1550 <true/> | <false/>
1551 </dict>
1552 ```
1553 #### policies.json
1554 ```
1555 {
1556 "policies": {
1557 "DisableFirefoxStudies": true | false
1558 }
1559 }
1560 ```
1561 ### DisableForgetButton
1562 Disable the "Forget" button.
1563
1564 **Compatibility:** Firefox 60, Firefox ESR 60\
1565 **CCK2 Equivalent:** `disableForget`\
1566 **Preferences Affected:** N/A
1567
1568 #### Windows (GPO)
1569 ```
1570 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1571 ```
1572 #### Windows (Intune)
1573 OMA-URI:
1574 ```
1575 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1576 ```
1577 Value (string):
1578 ```
1579 <enabled/> or <disabled/>
1580 ```
1581 #### macOS
1582 ```
1583 <dict>
1584 <key>DisableForgetButton</key>
1585 <true/> | <false/>
1586 </dict>
1587 ```
1588 #### policies.json
1589 ```
1590 {
1591 "policies": {
1592 "DisableForgetButton": true | false
1593 }
1594 }
1595 ```
1596 ### DisableFormHistory
1597 Turn off saving information on web forms and the search bar.
1598
1599 **Compatibility:** Firefox 60, Firefox ESR 60\
1600 **CCK2 Equivalent:** `disableFormFill`\
1601 **Preferences Affected:** `browser.formfill.enable`
1602
1603 #### Windows (GPO)
1604 ```
1605 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1606 ```
1607 #### Windows (Intune)
1608 OMA-URI:
1609 ```
1610 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1611 ```
1612 Value (string):
1613 ```
1614 <enabled/> or <disabled/>
1615 ```
1616 #### macOS
1617 ```
1618 <dict>
1619 <key>DisableFormHistory</key>
1620 <true/> | <false/>
1621 </dict>
1622 ```
1623 #### policies.json
1624 ```
1625 {
1626 "policies": {
1627 "DisableFormHistory": true | false
1628 }
1629 }
1630 ```
1631 ### DisablePasswordReveal
1632 Do not allow passwords to be shown in saved logins
1633
1634 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1635 **CCK2 Equivalent:** N/A
1636 **Preferences Affected:** N/A
1637
1638 #### Windows (GPO)
1639 ```
1640 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1641 ```
1642 #### Windows (Intune)
1643 OMA-URI:
1644 ```
1645 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1646 ```
1647 Value (string):
1648 ```
1649 <enabled/> or <disabled/>
1650 ```
1651 #### macOS
1652 ```
1653 <dict>
1654 <key>DisablePasswordReveal</key>
1655 <true/> | <false/>
1656 </dict>
1657 ```
1658 #### policies.json
1659 ```
1660 {
1661 "policies": {
1662 "DisablePasswordReveal": true | false
1663 }
1664 }
1665 ```
1666 ### DisablePocket
1667 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1668
1669 **Compatibility:** Firefox 60, Firefox ESR 60\
1670 **CCK2 Equivalent:** `disablePocket`\
1671 **Preferences Affected:** `extensions.pocket.enabled`
1672
1673 #### Windows (GPO)
1674 ```
1675 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1676 ```
1677 #### Windows (Intune)
1678 OMA-URI:
1679 ```
1680 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1681 ```
1682 Value (string):
1683 ```
1684 <enabled/> or <disabled/>
1685 ```
1686 #### macOS
1687 ```
1688 <dict>
1689 <key>DisablePocket</key>
1690 <true/> | <false/>
1691 </dict>
1692 ```
1693 #### policies.json
1694 ```
1695 {
1696 "policies": {
1697 "DisablePocket": true | false
1698 }
1699 }
1700 ```
1701 ### DisablePrivateBrowsing
1702 Remove access to private browsing.
1703
1704 **Compatibility:** Firefox 60, Firefox ESR 60\
1705 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1706 **Preferences Affected:** N/A
1707
1708 #### Windows (GPO)
1709 ```
1710 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1711 ```
1712 #### Windows (Intune)
1713 OMA-URI:
1714 ```
1715 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1716 ```
1717 Value (string):
1718 ```
1719 <enabled/> or <disabled/>
1720 ```
1721 #### macOS
1722 ```
1723 <dict>
1724 <key>DisablePrivateBrowsing</key>
1725 <true/> | <false/>
1726 </dict>
1727 ```
1728 #### policies.json
1729 ```
1730 {
1731 "policies": {
1732 "DisablePrivateBrowsing": true | false
1733 }
1734 }
1735 ```
1736 ### DisableProfileImport
1737 Disables the "Import data from another browser" option in the bookmarks window.
1738
1739 **Compatibility:** Firefox 60, Firefox ESR 60\
1740 **CCK2 Equivalent:** N/A\
1741 **Preferences Affected:** N/A
1742
1743 #### Windows (GPO)
1744 ```
1745 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1746 ```
1747 #### Windows (Intune)
1748 OMA-URI:
1749 ```
1750 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1751 ```
1752 Value (string):
1753 ```
1754 <enabled/> or <disabled/>
1755 ```
1756 #### macOS
1757 ```
1758 <dict>
1759 <key>DisableProfileImport</key>
1760 <true/> | <false/>
1761 </dict>
1762 ```
1763 #### policies.json
1764 ```
1765 {
1766 "policies": {
1767 "DisableProfileImport": true | false
1768 }
1769 }
1770 ```
1771 ### DisableProfileRefresh
1772 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1773
1774 **Compatibility:** Firefox 60, Firefox ESR 60\
1775 **CCK2 Equivalent:** `disableResetFirefox`\
1776 **Preferences Affected:** `browser.disableResetPrompt`
1777
1778 #### Windows (GPO)
1779 ```
1780 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1781 ```
1782 #### Windows (Intune)
1783 OMA-URI:
1784 ```
1785 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1786 ```
1787 Value (string):
1788 ```
1789 <enabled/> or <disabled/>
1790 ```
1791 #### macOS
1792 ```
1793 <dict>
1794 <key>DisableProfileRefresh</key>
1795 <true/> | <false/>
1796 </dict>
1797 ```
1798 #### policies.json
1799 ```
1800 {
1801 "policies": {
1802 "DisableProfileRefresh": true | false
1803 }
1804 }
1805 ```
1806 ### DisableSafeMode
1807 Disable safe mode within the browser.
1808
1809 On Windows, this disables safe mode via the command line as well.
1810
1811 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1812 **CCK2 Equivalent:** `disableSafeMode`\
1813 **Preferences Affected:** N/A
1814
1815 #### Windows (GPO)
1816 ```
1817 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1818 ```
1819 #### Windows (Intune)
1820 OMA-URI:
1821 ```
1822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1823 ```
1824 Value (string):
1825 ```
1826 <enabled/> or <disabled/>
1827 ```
1828 #### macOS
1829 ```
1830 <dict>
1831 <key>DisableSafeMode</key>
1832 <true/> | <false/>
1833 </dict>
1834 ```
1835 #### policies.json
1836 ```
1837 {
1838 "policies": {
1839 "DisableSafeMode": true | false
1840 }
1841 }
1842 ```
1843 ### DisableSecurityBypass
1844 Prevent the user from bypassing security in certain cases.
1845
1846 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1847
1848 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1849
1850 **Compatibility:** Firefox 60, Firefox ESR 60\
1851 **CCK2 Equivalent:** N/A\
1852 **Preferences Affected:** `security.certerror.hideAddException`, `browser.safebrowsing.allowOverride`
1853
1854 #### Windows (GPO)
1855 ```
1856 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1857 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1858 ```
1859 #### Windows (Intune)
1860 OMA-URI:
1861 ```
1862 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1863 ```
1864 Value (string):
1865 ```
1866 <enabled/> or <disabled/>
1867 ```
1868 OMA-URI:
1869 ```
1870 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1871 ```
1872 Value (string):
1873 ```
1874 <enabled/> or <disabled/>
1875 ```
1876
1877 #### macOS
1878 ```
1879 <dict>
1880 <key>DisableSecurityBypass</key>
1881 <dict>
1882 <key>InvalidCertificate</key>
1883 <true/> | <false/>
1884 <key>SafeBrowsing</key>
1885 <true/> | <false/>
1886 </dict>
1887 </dict>
1888 ```
1889 #### policies.json
1890 ```
1891 {
1892 "policies": {
1893 "DisableSecurityBypass": {
1894 "InvalidCertificate": true | false,
1895 "SafeBrowsing": true | false
1896 }
1897 }
1898 }
1899 ```
1900 ### DisableSystemAddonUpdate
1901 Prevent system add-ons from being installed or update.
1902
1903 **Compatibility:** Firefox 60, Firefox ESR 60\
1904 **CCK2 Equivalent:** N/A\
1905 **Preferences Affected:** N/A
1906
1907 #### Windows (GPO)
1908 ```
1909 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1910 ```
1911 #### Windows (Intune)
1912 OMA-URI:
1913 ```
1914 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1915 ```
1916 Value (string):
1917 ```
1918 <enabled/> or <disabled/>
1919 ```
1920 #### macOS
1921 ```
1922 <dict>
1923 <key>DisableSystemAddonUpdate</key>
1924 <true/> | <false/>
1925 </dict>
1926 ```
1927 #### policies.json
1928 ```
1929 {
1930 "policies": {
1931 "DisableSystemAddonUpdate": true | false
1932 }
1933 }
1934 ```
1935 ### DisableTelemetry
1936 Prevent the upload of telemetry data.
1937
1938 As of Firefox 83 and Firefox ESR 78.5, local storage of telemetry data is disabled as well.
1939
1940 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1941
1942 **Compatibility:** Firefox 60, Firefox ESR 60\
1943 **CCK2 Equivalent:** `disableTelemetry`\
1944 **Preferences Affected:** `datareporting.healthreport.uploadEnabled`, `datareporting.policy.dataSubmissionEnabled`, `toolkit.telemetry.archive.enabled`
1945
1946 #### Windows (GPO)
1947 ```
1948 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1949 ```
1950 #### Windows (Intune)
1951 OMA-URI:
1952 ```
1953 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1954 ```
1955 Value (string):
1956 ```
1957 <enabled/> or <disabled/>
1958 ```
1959 #### macOS
1960 ```
1961 <dict>
1962 <key>DisableTelemetry</key>
1963 <true/> | <false/>
1964 </dict>
1965 ```
1966 #### policies.json
1967 ```
1968 {
1969 "policies": {
1970 "DisableTelemetry": true | false
1971 }
1972 }
1973 ```
1974 ### DisplayBookmarksToolbar
1975 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1976
1977 **Compatibility:** Firefox 60, Firefox ESR 60\
1978 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1979 **Preferences Affected:** N/A
1980
1981 #### Windows (GPO)
1982 ```
1983 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1984 ```
1985 #### Windows (Intune)
1986 OMA-URI:
1987 ```
1988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1989 ```
1990 Value (string):
1991 ```
1992 <enabled/> or <disabled/>
1993 ```
1994 #### macOS
1995 ```
1996 <dict>
1997 <key>DisplayBookmarksToolbar</key>
1998 <true/> | <false/>
1999 </dict>
2000 ```
2001 #### policies.json
2002 ```
2003 {
2004 "policies": {
2005 "DisplayBookmarksToolbar": true | false
2006 }
2007 }
2008 ```
2009 ### DisplayMenuBar
2010 Set the state of the menubar.
2011
2012 `always` means the menubar is shown and cannot be hidden.
2013
2014 `never` means the menubar is hidden and cannot be shown.
2015
2016 `default-on` means the menubar is on by default but can be hidden.
2017
2018 `default-off` means the menubar is off by default but can be shown.
2019
2020 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
2021 **CCK2 Equivalent:** `displayMenuBar`\
2022 **Preferences Affected:** N/A
2023
2024 #### Windows (GPO)
2025 ```
2026 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
2027 ```
2028 #### Windows (Intune)
2029 OMA-URI:
2030 ```
2031 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
2032 ```
2033 Value (string):
2034 ```
2035 <enabled/>
2036 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
2037 ```
2038 #### macOS
2039 ```
2040 <dict>
2041 <key>DisplayMenuBar</key>
2042 <string>always | never | default-on | default-off</string>
2043 </dict>
2044 ```
2045 #### policies.json
2046 ```
2047 {
2048 "policies": {
2049 "DisplayMenuBar": "always", "never", "default-on", "default-off"
2050 }
2051 }
2052 ```
2053 ### DisplayMenuBar (Deprecated)
2054 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
2055
2056 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
2057 **CCK2 Equivalent:** `displayMenuBar`\
2058 **Preferences Affected:** N/A
2059
2060 #### Windows (GPO)
2061 ```
2062 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
2063 ```
2064 #### macOS
2065 ```
2066 <dict>
2067 <key>DisplayMenuBar</key>
2068 <true/> | <false/>
2069 </dict>
2070 ```
2071 #### policies.json
2072 ```
2073 {
2074 "policies": {
2075 "DisplayMenuBar": true | false
2076 }
2077 }
2078 ```
2079 ### DNSOverHTTPS
2080 Configure DNS over HTTPS.
2081
2082 `Enabled` determines whether DNS over HTTPS is enabled
2083
2084 `ProviderURL` is a URL to another provider.
2085
2086 `Locked` prevents the user from changing DNS over HTTPS preferences.
2087
2088 `ExcludedDomains` excludes domains from DNS over HTTPS.
2089
2090 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
2091 **CCK2 Equivalent:** N/A\
2092 **Preferences Affected:** `network.trr.mode`, `network.trr.uri`
2093
2094 #### Windows (GPO)
2095 ```
2096 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
2097 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
2098 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
2099 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
2100 ```
2101 #### Windows (Intune)
2102 OMA-URI:
2103 ```
2104 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
2105 ```
2106 Value (string):
2107 ```
2108 <enabled/> or <disabled/>
2109 ```
2110 OMA-URI:
2111 ```
2112 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
2113 ```
2114 Value (string):
2115 ```
2116 <enabled/>
2117 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
2118 ```
2119 OMA-URI:
2120 ```
2121 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
2122 ```
2123 Value (string):
2124 ```
2125 <enabled/> or <disabled/>
2126 ```
2127 OMA-URI:
2128 ```
2129 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
2130 ```
2131 Value (string):
2132 ```
2133 <enabled/>
2134 <data id="List" value="1&#xF000;example.com"/>
2135 ```
2136 #### macOS
2137 ```
2138 <dict>
2139 <key>DNSOverHTTPS</key>
2140 <dict>
2141 <key>Enabled</key>
2142 <true/> | <false/>
2143 <key>ProviderURL</key>
2144 <string>URL_TO_ALTERNATE_PROVIDER</string>
2145 <key>Locked</key>
2146 <true/> | <false/>
2147 <key>ExcludedDomains</key>
2148 <array>
2149 <string>example.com</string>
2150 </array>
2151 </dict>
2152 </dict>
2153 ```
2154 #### policies.json
2155 ```
2156 {
2157 "policies": {
2158 "DNSOverHTTPS": {
2159 "Enabled": true | false,
2160 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
2161 "Locked": true | false,
2162 "ExcludedDomains": ["example.com"]
2163 }
2164 }
2165 }
2166 ```
2167 ### DontCheckDefaultBrowser
2168 Don't check if Firefox is the default browser at startup.
2169
2170 **Compatibility:** Firefox 60, Firefox ESR 60\
2171 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
2172 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
2173
2174 #### Windows (GPO)
2175 ```
2176 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
2177 ```
2178 #### Windows (Intune)
2179 OMA-URI:
2180 ```
2181 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
2182 ```
2183 Value (string):
2184 ```
2185 <enabled/> or <disabled/>
2186 ```
2187 #### macOS
2188 ```
2189 <dict>
2190 <key>DontCheckDefaultBrowser</key>
2191 <true/> | <false/>
2192 </dict>
2193 ```
2194 #### policies.json
2195 ```
2196 {
2197 "policies": {
2198 "DontCheckDefaultBrowser": true | false
2199 }
2200 }
2201 ```
2202 ### DownloadDirectory
2203 Set and lock the download directory.
2204
2205 You can use ${home} for the native home directory.
2206
2207 **Compatibility:** Firefox 68, Firefox ESR 68\
2208 **CCK2 Equivalent:** N/A\
2209 **Preferences Affected:** `browser.download.dir`, `browser.download.folderList`, `browser.download.useDownloadDir`
2210
2211 #### Windows (GPO)
2212 ```
2213 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
2214 ```
2215 #### Windows (Intune)
2216 OMA-URI:
2217 ```
2218 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
2219 ```
2220 Value (string):
2221 ```
2222 <enabled/>
2223 <data id="Preferences_String" value="${home}\Downloads"/>
2224 ```
2225 #### macOS
2226 ```
2227 <dict>
2228 <key>DownloadDirectory</key>
2229 <string>${home}/Downloads</string>
2230 </dict>
2231 ```
2232 #### policies.json (macOS and Linux)
2233 ```
2234 {
2235 "policies": {
2236 "DownloadDirectory": "${home}/Downloads"
2237 }
2238 ```
2239 #### policies.json (Windows)
2240 ```
2241 {
2242 "policies": {
2243 "DownloadDirectory": "${home}\\Downloads"
2244 }
2245 ```
2246 ### EnableTrackingProtection
2247 Configure tracking protection.
2248
2249 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
2250
2251 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
2252
2253 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
2254
2255 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
2256
2257 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
2258
2259 `Exceptions` are origins for which tracking protection is not enabled.
2260
2261 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
2262 **CCK2 Equivalent:** N/A\
2263 **Preferences Affected:** `privacy.trackingprotection.enabled`, `privacy.trackingprotection.pbmode.enabled`, `privacy.trackingprotection.cryptomining.enabled`, `privacy.trackingprotection.fingerprinting.enabled`
2264
2265 #### Windows (GPO)
2266 ```
2267 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
2268 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
2269 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2270 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2271 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2272 ```
2273 #### Windows (Intune)
2274 OMA-URI:
2275 ```
2276 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/A_TrackingProtection_Value
2277 ```
2278 Value (string):
2279 ```
2280 <enabled/> or <disabled/>
2281 ```
2282 OMA-URI:
2283 ```
2284 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/B_TrackingProtection_Cryptomining
2285 ```
2286 Value (string):
2287 ```
2288 <enabled/> or <disabled/>
2289 ```
2290 OMA-URI:
2291 ```
2292 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/C_TrackingProtection_Fingerprinting
2293 ```
2294 Value (string):
2295 ```
2296 <enabled/> or <disabled/>
2297 ```
2298 OMA-URI:
2299 ```
2300 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/D_TrackingProtection_Exceptions
2301 ```
2302 Value (string):
2303 ```
2304 <data id="TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2305 ```
2306 OMA-URI:
2307 ```
2308 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~TrackingProtection/E_TrackingProtection_Locked
2309 ```
2310 Value (string):
2311 ```
2312 <enabled/> or <disabled/>
2313 ```
2314 #### macOS
2315 ```
2316 <dict>
2317 <key>EnableTrackingProtection</key>
2318 <dict>
2319 <key>Value</key>
2320 <true/> | <false/>
2321 <key>Locked</key>
2322 <true/> | <false/>
2323 <key>Cryptomining</key>
2324 <true/> | <false/>
2325 <key>Fingerprinting</key>
2326 <true/> | <false/>
2327 <key>Exceptions</key>
2328 <array>
2329 <string>https://example.com</string>
2330 </array>
2331 </dict>
2332 </dict>
2333 ```
2334 #### policies.json
2335 ```
2336 {
2337 "policies": {
2338 "EnableTrackingProtection": {
2339 "Value": true | false,
2340 "Locked": true | false,
2341 "Cryptomining": true | false,
2342 "Fingerprinting": true | false,
2343 "Exceptions": ["https://example.com"]
2344 }
2345 }
2346 }
2347 ```
2348 ### EncryptedMediaExtensions
2349 Enable or disable Encrypted Media Extensions and optionally lock it.
2350
2351 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2352
2353 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2354
2355 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2356 **CCK2 Equivalent:** N/A\
2357 **Preferences Affected:** `media.eme.enabled`
2358
2359 #### Windows (GPO)
2360 ```
2361 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2362 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2363 ```
2364 #### Windows (Intune)
2365 OMA-URI:
2366 ```
2367 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2369 ```
2370 Value (string):
2371 ```
2372 <enabled/>or <disabled/>
2373 ```
2374 #### macOS
2375 ```
2376 <dict>
2377 <key>EncryptedMediaExtensions</key>
2378 <dict>
2379 <key>Enabled</key>
2380 <true/> | <false/>
2381 <key>Locked</key>
2382 <true/> | <false/>
2383 </dict>
2384 </dict>
2385 ```
2386 #### policies.json
2387 ```
2388 {
2389 "policies": {
2390 "EncryptedMediaExtensions": {
2391 "Enabled": true | false,
2392 "Locked": true | false
2393 }
2394 }
2395 }
2396 ```
2397 ### EnterprisePoliciesEnabled
2398 Enable policy support on macOS.
2399
2400 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2401 **CCK2 Equivalent:** N/A\
2402 **Preferences Affected:** N/A
2403
2404 #### macOS
2405 ```
2406 <dict>
2407 <key>EnterprisePoliciesEnabled</key>
2408 <true/>
2409 </dict>
2410 ```
2411 ### Extensions
2412 Control the installation, uninstallation and locking of extensions.
2413
2414 While this policy is not technically deprecated, it is recommended that you use the **[`ExtensionSettings`](#extensionsettings)** policy. It has the same functionality and adds more. It does not support native paths, though, so you'll have to use file:/// URLs.
2415
2416 `Install` is a list of URLs or native paths for extensions to be installed.
2417
2418 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2419
2420 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2421
2422 **Compatibility:** Firefox 60, Firefox ESR 60\
2423 **CCK2 Equivalent:** `addons`\
2424 **Preferences Affected:** N/A
2425
2426 #### Windows (GPO)
2427 ```
2428 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2429 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2430 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2431 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2432 ```
2433 #### Windows (Intune)
2434 OMA-URI:
2435 ```
2436 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2437 ```
2438 Value (string):
2439 ```
2440 <enabled/>
2441 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2442 ```
2443 OMA-URI:
2444 ```
2445 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2446 ```
2447 Value (string):
2448 ```
2449 <enabled/>
2450 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2451 ```
2452 OMA-URI:
2453 ```
2454 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2455 ```
2456 Value (string):
2457 ```
2458 <enabled/>
2459 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2460 ```
2461 #### macOS
2462 ```
2463 <dict>
2464 <key>Extensions</key>
2465 <dict>
2466 <key>Install</key>
2467 <array>
2468 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2469 <string>//path/to/xpi</string>
2470 </array>
2471 <key>Uninstall</key>
2472 <array>
2473 <string>bad_addon_id@mozilla.org</string>
2474 </array>
2475 <key>Locked</key>
2476 <array>
2477 <string>addon_id@mozilla.org</string>
2478 </array>
2479 </dict>
2480 </dict>
2481 ```
2482 #### policies.json
2483 ```
2484 {
2485 "policies": {
2486 "Extensions": {
2487 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2488 "Uninstall": ["bad_addon_id@mozilla.org"],
2489 "Locked": ["addon_id@mozilla.org"]
2490 }
2491 }
2492 }
2493 ```
2494 ### ExtensionSettings
2495 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2496
2497 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2498
2499 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2500
2501 The configuration for each extension is another dictionary that can contain the fields documented below.
2502
2503 | Name | Description |
2504 | --- | --- |
2505 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2506 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2507 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2508 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2509 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2510 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the local file system, use a [```file:///``` URL](https://en.wikipedia.org/wiki/File_URI_scheme). If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2511 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration.
2512 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "locale" This setting can be used only for the default configuration.
2513 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2514 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2515 | `updates_disabled` | (Firefox 89, Firefox ESR 78.11) Boolean that indicates whether or not to disable automatic updates for an individual extension.
2516
2517 **Compatibility:** Firefox 69, Firefox ESR 68.1 (As of Firefox 85, Firefox ESR 78.7, installing a theme makes it the default.)\
2518 **CCK2 Equivalent:** N/A\
2519 **Preferences Affected:** N/A
2520
2521 #### Windows (GPO)
2522 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2523 ```
2524 {
2525 "*": {
2526 "blocked_install_message": "Custom error message.",
2527 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2528 "installation_mode": "blocked",
2529 "allowed_types": ["extension"]
2530 },
2531 "uBlock0@raymondhill.net": {
2532 "installation_mode": "force_installed",
2533 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2534 },
2535 "https-everywhere@eff.org": {
2536 "installation_mode": "allowed"
2537 }
2538 }
2539 ```
2540 #### Windows (Intune)
2541 OMA-URI:
2542 ```
2543 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2544 ```
2545 Value (string):
2546 ```
2547 <enabled/>
2548 <data id="ExtensionSettings" value='
2549 {
2550 "*": {
2551 "blocked_install_message": "Custom error message.",
2552 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2553 "installation_mode": "blocked",
2554 "allowed_types": ["extension"]
2555 },
2556 "uBlock0@raymondhill.net": {
2557 "installation_mode": "force_installed",
2558 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2559 },
2560 "https-everywhere@eff.org": {
2561 "installation_mode": "allowed"
2562 }
2563 }'/>
2564 ```
2565 #### macOS
2566 ```
2567 <dict>
2568 <key>ExtensionSettings</key>
2569 <dict>
2570 <key>*</key>
2571 <dict>
2572 <key>blocked_install_message</key>
2573 <string>Custom error message.</string>
2574 <key>install_sources</key>
2575 <array>
2576 <string>about:addons</string>
2577 <string>https://addons.mozilla.org/</string>
2578 </array>
2579 <key>installation_mode</key>
2580 <string>blocked</string>
2581 <key>allowed_types</key>
2582 <array>
2583 <string>extension</string>
2584 </array>
2585 </dict>
2586 <key>uBlock0@raymondhill.net</key>
2587 <dict>
2588 <key>installation_mode</key>
2589 <string>force_installed</string>
2590 <key>install_url</key>
2591 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2592 </dict>
2593 <key>https-everywhere@eff.org</key>
2594 <dict>
2595 <key>installation_mode</key>
2596 <string>allowed</string>
2597 </dict>
2598 </dict>
2599 </dict>
2600 ```
2601 #### policies.json
2602 ```
2603 {
2604 "policies": {
2605 "ExtensionSettings": {
2606 "*": {
2607 "blocked_install_message": "Custom error message.",
2608 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2609 "installation_mode": "blocked",
2610 "allowed_types": ["extension"]
2611 },
2612 "uBlock0@raymondhill.net": {
2613 "installation_mode": "force_installed",
2614 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2615 },
2616 "https-everywhere@eff.org": {
2617 "installation_mode": "allowed"
2618 }
2619 }
2620 }
2621 }
2622 ```
2623 ### ExtensionUpdate
2624 Control extension updates.
2625
2626 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2627 **CCK2 Equivalent:** N/A\
2628 **Preferences Affected:** `extensions.update.enabled`
2629
2630 #### Windows (GPO)
2631 ```
2632 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2633 ```
2634 #### Windows (Intune)
2635 OMA-URI:
2636 ```
2637 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionUpdate
2638 ```
2639 Value (string):
2640 ```
2641 <enabled/> or <disabled/>
2642 ```
2643 #### macOS
2644 ```
2645 <dict>
2646 <key>ExtensionUpdate</key>
2647 <true/> | <false/>
2648 </dict>
2649 ```
2650 #### policies.json
2651 ```
2652 {
2653 "policies": {
2654 "ExtensionUpdate": true | false
2655 }
2656 }
2657 ```
2658 ### FirefoxHome
2659 Customize the Firefox Home page.
2660
2661 **Compatibility:** Firefox 68, Firefox ESR 68 (SponsoredTopSites and SponsoredPocket were added in Firefox 95, Firefox ESR 91.4)
2662 **CCK2 Equivalent:** N/A\
2663 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`, `browser.newtabpage.activity-stream.feeds.topsites`, `browser.newtabpage.activity-stream.feeds.section.highlights`, `browser.newtabpage.activity-stream.feeds.section.topstories`, `browser.newtabpage.activity-stream.feeds.snippets`, `browser.newtabpage.activity-stream.showSponsoredTopSites`, `browser.newtabpage.activity-stream.showSponsored`
2664
2665 #### Windows (GPO)
2666 ```
2667 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2668 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2669 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredTopSites = 0x1 | 0x0
2670 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2671 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2672 Software\Policies\Mozilla\Firefox\FirefoxHome\SponsoredPocket = 0x1 | 0x0
2673 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2674 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2675 ```
2676 #### Windows (Intune)
2677 OMA-URI:
2678 ```
2679 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2680 ```
2681 Value (string):
2682 ```
2683 <enabled/>
2684 <data id="FirefoxHome_Search" value="true | false"/>
2685 <data id="FirefoxHome_TopSites" value="true | false"/>
2686 <data id="FirefoxHome_SponsoredTopSites" value="true | false"/>
2687 <data id="FirefoxHome_Highlights" value="true | false"/>
2688 <data id="FirefoxHome_Pocket" value="true | false"/>
2689 <data id="FirefoxHome_SponsoredPocket" value="true | false"/>
2690 <data id="FirefoxHome_Snippets" value="true | false"/>
2691 <data id="FirefoxHome_Locked" value="true | false"/>
2692 ```
2693 #### macOS
2694 ```
2695 <dict>
2696 <key>FirefoxHome</key>
2697 <dict>
2698 <key>Search</key>
2699 <true/> | <false/>
2700 <key>TopSites</key>
2701 <true/> | <false/>
2702 <key>SponsoredTopSites</key>
2703 <true/> | <false/>
2704 <key>Highlights</key>
2705 <true/> | <false/>
2706 <key>Pocket</key>
2707 <true/> | <false/>
2708 <key>SponsoredPocket</key>
2709 <true/> | <false/>
2710 <key>Snippets</key>
2711 <true/> | <false/>
2712 <key>Locked</key>
2713 <true/> | <false/>
2714 </dict>
2715 </dict>
2716 ```
2717 #### policies.json
2718 ```
2719 {
2720 "policies": {
2721 "FirefoxHome": {
2722 "Search": true | false,
2723 "TopSites": true | false,
2724 "SponsoredTopSites": true | false,
2725 "Highlights": true | false,
2726 "Pocket": true | false,
2727 "SponsoredPocket": true | false,
2728 "Snippets": true | false,
2729 "Locked": true | false
2730 }
2731 }
2732 }
2733 ```
2734 ### FlashPlugin (Deprecated)
2735 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2736
2737 `Allow` is a list of origins where Flash are allowed.
2738
2739 `Block` is a list of origins where Flash is not allowed.
2740
2741 `Default` determines whether or not Flash is allowed by default.
2742
2743 `Locked` prevents the user from changing Flash preferences.
2744
2745 **Compatibility:** Firefox 60, Firefox ESR 60\
2746 **CCK2 Equivalent:** `permissions.plugin`\
2747 **Preferences Affected:** `plugin.state.flash`
2748
2749 #### Windows (GPO)
2750 ```
2751 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2752 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2753 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2754 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2755 ```
2756 #### Windows (Intune)
2757 OMA-URI:
2758 ```
2759 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2760 ```
2761 Value (string):
2762 ```
2763 <enabled/>
2764 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2765 ```
2766 OMA-URI:
2767 ```
2768 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2769 ```
2770 Value (string):
2771 ```
2772 <enabled/> or <disabled/>
2773 ```
2774 OMA-URI:
2775 ```
2776 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2777 ```
2778 Value (string):
2779 ```
2780 <enabled/> or <disabled/>
2781 ```
2782 #### macOS
2783 ```
2784 <dict>
2785 <key>FlashPlugin</key>
2786 <dict>
2787 <key>Allow</key>
2788 <array>
2789 <string>http://example.org</string>
2790 </array>
2791 <key>Block</key>
2792 <array>
2793 <string>http://example.edu</string>
2794 </array>
2795 <key>Default</key>
2796 <true/> | <false/>
2797 <key>Locked</key>
2798 <true/> | <false/>
2799 </dict>
2800 </dict>
2801 ```
2802 #### policies.json
2803 ```
2804 {
2805 "policies": {
2806 "FlashPlugin": {
2807 "Allow": ["http://example.org/"],
2808 "Block": ["http://example.edu/"],
2809 "Default": true | false,
2810 "Locked": true | false
2811 }
2812 }
2813 }
2814 ```
2815 ### Handlers
2816 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2817
2818 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2819
2820 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2821
2822 | Name | Description |
2823 | --- | --- |
2824 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2825 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2826 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2827 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2828 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2829 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2830
2831 **Compatibility:** Firefox 78, Firefox ESR 78\
2832 **CCK2 Equivalent:** N/A\
2833 **Preferences Affected:** N/A
2834
2835 #### Windows (GPO)
2836 Software\Policies\Mozilla\Firefox\Handlers (REG_MULTI_SZ) =
2837 ```
2838 {
2839 "mimeTypes": {
2840 "application/msword": {
2841 "action": "useSystemDefault",
2842 "ask": true | false
2843 }
2844 },
2845 "schemes": {
2846 "mailto": {
2847 "action": "useHelperApp",
2848 "ask": true | false,
2849 "handlers": [{
2850 "name": "Gmail",
2851 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2852 }]
2853 }
2854 },
2855 "extensions": {
2856 "pdf": {
2857 "action": "useHelperApp",
2858 "ask": true | false,
2859 "handlers": [{
2860 "name": "Adobe Acrobat",
2861 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2862 }]
2863 }
2864 }
2865 }
2866 ```
2867 #### Windows (Intune)
2868 OMA-URI:
2869 ```
2870 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2871 ```
2872 Value (string):
2873 ```
2874 <enabled/>
2875 <data id="Handlers" value='
2876 {
2877 "mimeTypes": {
2878 "application/msword": {
2879 "action": "useSystemDefault",
2880 "ask": true | false
2881 }
2882 },
2883 "schemes": {
2884 "mailto": {
2885 "action": "useHelperApp",
2886 "ask": true | false,
2887 "handlers": [{
2888 "name": "Gmail",
2889 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2890 }]
2891 }
2892 },
2893 "extensions": {
2894 "pdf": {
2895 "action": "useHelperApp",
2896 "ask": true | false,
2897 "handlers": [{
2898 "name": "Adobe Acrobat",
2899 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2900 }]
2901 }
2902 }
2903 }
2904 '/>
2905 ```
2906 #### macOS
2907 ```
2908 <dict>
2909 <key>Handlers</key>
2910 <dict>
2911 <key>mimeTypes</key>
2912 <dict>
2913 <key>application/msword</key>
2914 <dict>
2915 <key>action</key>
2916 <string>useSystemDefault</string>
2917 <key>ask</key>
2918 <true/> | <false/>
2919 </dict>
2920 </dict>
2921 <key>schemes</key>
2922 <dict>
2923 <key>mailto</key>
2924 <dict>
2925 <key>action</key>
2926 <string>useHelperApp</string>
2927 <key>ask</key>
2928 <true/> | <false/>
2929 <key>handlers</key>
2930 <array>
2931 <dict>
2932 <key>name</key>
2933 <string>Gmail</string>
2934 <key>uriTemplate</key>
2935 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2936 </dict>
2937 </array>
2938 </dict>
2939 </dict>
2940 <key>extensions</key>
2941 <dict>
2942 <key>pdf</key>
2943 <dict>
2944 <key>action</key>
2945 <string>useHelperApp</string>
2946 <key>ask</key>
2947 <true/> | <false/>
2948 <key>handlers</key>
2949 <array>
2950 <dict>
2951 <key>name</key>
2952 <string>Adobe Acrobat</string>
2953 <key>path</key>
2954 <string>/System/Applications/Preview.app</string>
2955 </dict>
2956 </array>
2957 </dict>
2958 </dict>
2959 </dict>
2960 </dict>
2961 ```
2962 #### policies.json
2963 ```
2964 {
2965 "policies": {
2966 "Handlers": {
2967 "mimeTypes": {
2968 "application/msword": {
2969 "action": "useSystemDefault",
2970 "ask": false
2971 }
2972 },
2973 "schemes": {
2974 "mailto": {
2975 "action": "useHelperApp",
2976 "ask": true | false,
2977 "handlers": [{
2978 "name": "Gmail",
2979 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2980 }]
2981 }
2982 },
2983 "extensions": {
2984 "pdf": {
2985 "action": "useHelperApp",
2986 "ask": true | false,
2987 "handlers": [{
2988 "name": "Adobe Acrobat",
2989 "path": "/usr/bin/acroread"
2990 }]
2991 }
2992 }
2993 }
2994 }
2995 }
2996 ```
2997 ### HardwareAcceleration
2998 Control hardware acceleration.
2999
3000 **Compatibility:** Firefox 60, Firefox ESR 60\
3001 **CCK2 Equivalent:** N/A\
3002 **Preferences Affected:** `layers.acceleration.disabled`
3003
3004 #### Windows (GPO)
3005 ```
3006 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
3007 ```
3008 #### Windows (Intune)
3009 OMA-URI:
3010 ```
3011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
3012 ```
3013 Value (string):
3014 ```
3015 <enabled/> or <disabled/>
3016 ```
3017 #### macOS
3018 ```
3019 <dict>
3020 <key>HardwareAcceleration</key>
3021 <true/> | <false/>
3022 </dict>
3023 ```
3024 #### policies.json
3025 ```
3026 {
3027 "policies": {
3028 "HardwareAcceleration": true | false
3029 }
3030 }
3031 ```
3032 ### Homepage
3033 Configure the default homepage and how Firefox starts.
3034
3035 `URL` is the default homepage.
3036
3037 `Locked` prevents the user from changing homepage preferences.
3038
3039 `Additional` allows for more than one homepage.
3040
3041 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
3042
3043 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. If this is value is set for the Startpage, the user will always get the homepage at startup and cannot choose to restore their session.
3044
3045 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
3046 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
3047 **Preferences Affected:** `browser.startup.homepage`, `browser.startup.page`
3048
3049 #### Windows (GPO)
3050 ```
3051 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
3052 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
3053 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
3054 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
3055 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
3056 ```
3057 #### Windows (Intune)
3058 OMA-URI:
3059 ```
3060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
3061 ```
3062 Value (string):
3063 ```
3064 <enabled/>
3065
3066 <data id="HomepageURL" value="https://example.com"/>
3067 <data id="HomepageLocked" value="true | false"/>
3068 ```
3069 OMA-URI:
3070 ```
3071 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
3072 ```
3073 Value (string):
3074 ```
3075 <enabled/>
3076
3077 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
3078 ```
3079 OMA-URI:
3080 ```
3081 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
3082 ```
3083 Value (string):
3084 ```
3085 <enabled/>
3086
3087 <data id="StartPage" value="none | homepage | previous-session"/>
3088 ```
3089 #### macOS
3090 ```
3091 <dict>
3092 <key>Homepage</key>
3093 <dict>
3094 <key>URL</key>
3095 <string>http://example.com</string>
3096 <key>Locked</key>
3097 <true/> | <false/>
3098 <key>Additional</key>
3099 <array>
3100 <string>http://example.org</string>
3101 <string>http://example.edu</string>
3102 </array>
3103 <key>StartPage</key>
3104 <string>none | homepage | previous-session | homepage-locked</string>
3105 </dict>
3106 </dict>
3107 ```
3108 #### policies.json
3109 ```
3110 {
3111 "policies": {
3112 "Homepage": {
3113 "URL": "http://example.com/",
3114 "Locked": true | false,
3115 "Additional": ["http://example.org/",
3116 "http://example.edu/"],
3117 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
3118 }
3119 }
3120 }
3121 ```
3122 ### InstallAddonsPermission
3123 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
3124
3125 `Allow` is a list of origins where extension installs are allowed.
3126
3127 `Default` determines whether or not extension installs are allowed by default.
3128
3129 **Compatibility:** Firefox 60, Firefox ESR 60\
3130 **CCK2 Equivalent:** `permissions.install`\
3131 **Preferences Affected:** `xpinstall.enabled`
3132
3133 #### Windows (GPO)
3134 ```
3135 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
3136 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
3137 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
3138 ```
3139 #### Windows (Intune)
3140 OMA-URI:
3141 ```
3142 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
3143 ```
3144 Value (string):
3145 ```
3146 <enabled/>
3147 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3148 ```
3149 OMA-URI:
3150 ```
3151 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
3152 ```
3153 Value (string):
3154 ```
3155 <enabled/>
3156 ```
3157 #### macOS
3158 ```
3159 <dict>
3160 <key>InstallAddonsPermission</key>
3161 <dict>
3162 <key>Allow</key>
3163 <array>
3164 <string>http://example.org</string>
3165 <string>http://example.edu</string>
3166 </array>
3167 <key>Default</key>
3168 <true/> | <false/>
3169 </dict>
3170 </dict>
3171 ```
3172 #### policies.json
3173 ```
3174 {
3175 "policies": {
3176 "InstallAddonsPermission": {
3177 "Allow": ["http://example.org/",
3178 "http://example.edu/"],
3179 "Default": true | false
3180 }
3181 }
3182 }
3183 ```
3184 ### LegacyProfiles
3185 Disable the feature enforcing a separate profile for each installation.
3186
3187 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
3188
3189 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
3190
3191 This policy only work on Windows via GPO (not policies.json).
3192
3193 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
3194 **CCK2 Equivalent:** N/A\
3195 **Preferences Affected:** N/A
3196
3197 #### Windows (GPO)
3198 ```
3199 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
3200 ```
3201 #### Windows (Intune)
3202 OMA-URI:
3203 ```
3204 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
3205 ```
3206 Value (string):
3207 ```
3208 <enabled/> or <disabled/>
3209 ```
3210 ### LocalFileLinks
3211 Enable linking to local files by origin.
3212
3213 **Compatibility:** Firefox 68, Firefox ESR 68\
3214 **CCK2 Equivalent:** N/A\
3215 **Preferences Affected:** `capability.policy.localfilelinks.*`
3216
3217 #### Windows (GPO)
3218 ```
3219 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
3220 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
3221 ```
3222 #### Windows (Intune)
3223 OMA-URI:
3224 ```
3225 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
3226 ```
3227 Value (string):
3228 ```
3229 <enabled/>
3230 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3231 ```
3232 #### macOS
3233 ```
3234 <dict>
3235 <key>LocalFileLinks</key>
3236 <array>
3237 <string>http://example.org</string>
3238 <string>http://example.edu</string>
3239 </array>
3240 </dict>
3241 ```
3242 #### policies.json
3243 ```
3244 {
3245 "policies": {
3246 "LocalFileLinks": ["http://example.org/",
3247 "http://example.edu/"]
3248 }
3249 }
3250 ```
3251 ### ManagedBookmarks
3252 Configures a list of bookmarks managed by an administrator that cannot be changed by the user.
3253
3254 The bookmarks are only added as a button on the personal toolbar. They are not in the bookmarks folder.
3255
3256 The syntax of this policy is exactly the same as the [Chrome ManagedBookmarks policy](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ManagedBookmarks). The schema is:
3257 ```
3258 {
3259 "items": {
3260 "id": "BookmarkType",
3261 "properties": {
3262 "children": {
3263 "items": {
3264 "$ref": "BookmarkType"
3265 },
3266 "type": "array"
3267 },
3268 "name": {
3269 "type": "string"
3270 },
3271 "toplevel_name": {
3272 "type": "string"
3273 },
3274 "url": {
3275 "type": "string"
3276 }
3277 },
3278 "type": "object"
3279 },
3280 "type": "array"
3281 }
3282 ```
3283 **Compatibility:** Firefox 83, Firefox ESR 78.5\
3284 **CCK2 Equivalent:** N/A\
3285 **Preferences Affected:** N/A
3286
3287 #### Windows (GPO)
3288 Software\Policies\Mozilla\Firefox\ManagedBookmarks (REG_MULTI_SZ) =
3289 ```
3290 [
3291 {
3292 "toplevel_name": "My managed bookmarks folder"
3293 },
3294 {
3295 "url": "example.com",
3296 "name": "Example"
3297 },
3298 {
3299 "name": "Mozilla links",
3300 "children": [
3301 {
3302 "url": "https://mozilla.org",
3303 "name": "Mozilla.org"
3304 },
3305 {
3306 "url": "https://support.mozilla.org/",
3307 "name": "SUMO"
3308 }
3309 ]
3310 }
3311 ]
3312 ```
3313 #### Windows (Intune)
3314 OMA-URI:
3315 ```
3316 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ManagedBookmarks
3317 ```
3318 Value (string):
3319 ```
3320 <enabled/>
3321 <data id="JSON" value='
3322 [
3323 {
3324 "toplevel_name": "My managed bookmarks folder"
3325 },
3326 {
3327 "url": "example.com",
3328 "name": "Example"
3329 },
3330 {
3331 "name": "Mozilla links",
3332 "children": [
3333 {
3334 "url": "https://mozilla.org",
3335 "name": "Mozilla.org"
3336 },
3337 {
3338 "url": "https://support.mozilla.org/",
3339 "name": "SUMO"
3340 }
3341 ]
3342 }
3343 ]'/>
3344 ```
3345 #### macOS
3346 ```
3347 <dict>
3348 <key>ManagedBookmarks</key>
3349 <array>
3350 <dict>
3351 <key>toplevel_name</key>
3352 <string>My managed bookmarks folder</string>
3353 <dict>
3354 <key>url</key>
3355 <string>example.com</string>
3356 <key>name</key>
3357 <string>Example</string>
3358 </dict>
3359 <dict>
3360 <key>name</key>
3361 <string>Mozilla links</string>
3362 <key>children</key>
3363 <array>
3364 <dict>
3365 <key>url</key>
3366 <string>https://mozilla.org</string>
3367 <key>name</key>
3368 <string>Mozilla</string>
3369 </dict>
3370 <dict>
3371 <key>url</key>
3372 <string>https://support.mozilla.org/</string>
3373 <key>name</key>
3374 <string>SUMO</string>
3375 </dict>
3376 </array>
3377 </dict>
3378 </array>
3379 </dict>
3380 ```
3381 #### policies.json
3382 ```
3383 {
3384 "policies": {
3385 "ManagedBookmarks": [
3386 {
3387 "toplevel_name": "My managed bookmarks folder"
3388 },
3389 {
3390 "url": "example.com",
3391 "name": "Example"
3392 },
3393 {
3394 "name": "Mozilla links",
3395 "children": [
3396 {
3397 "url": "https://mozilla.org",
3398 "name": "Mozilla.org"
3399 },
3400 {
3401 "url": "https://support.mozilla.org/",
3402 "name": "SUMO"
3403 }
3404 ]
3405 }
3406 ]
3407 }
3408 }
3409 ```
3410 ### ManualAppUpdateOnly
3411
3412 Switch to manual updates only.
3413
3414 If this policy is enabled:
3415 1. The user will never be prompted to install updates
3416 2. Firefox will not check for updates in the background, though it will check automatically when an update UI is displayed (such as the one in the About dialog). This check will be used to show "Update to version X" in the UI, but will not automatically download the update or prompt the user to update in any other way.
3417 3. The update UI will work as expected, unlike when using DisableAppUpdate.
3418
3419 This policy is primarily intended for advanced end users, not for enterprises.
3420
3421 **Compatibility:** Firefox 87\
3422 **CCK2 Equivalent:** N/A\
3423 **Preferences Affected:** N/A
3424
3425 #### policies.json
3426 ```
3427 {
3428 "policies": {
3429 "ManualAppUpdateOnly": true | false
3430 }
3431 }
3432 ```
3433 ### NetworkPrediction
3434 Enable or disable network prediction (DNS prefetching).
3435
3436 **Compatibility:** Firefox 67, Firefox ESR 60.7\
3437 **CCK2 Equivalent:** N/A\
3438 **Preferences Affected:** `network.dns.disablePrefetch`, `network.dns.disablePrefetchFromHTTPS`
3439
3440 #### Windows (GPO)
3441 ```
3442 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
3443 ```
3444 #### Windows (Intune)
3445 OMA-URI:
3446 ```
3447 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
3448 ```
3449 Value (string):
3450 ```
3451 <enabled/> or <disabled/>
3452 ```
3453 #### macOS
3454 ```
3455 <dict>
3456 <key>NetworkPrediction</key>
3457 <true/> | <false/>
3458 </dict>
3459 ```
3460 #### policies.json
3461 ```
3462 {
3463 "policies": {
3464 "NetworkPrediction": true | false
3465 }
3466 ```
3467 ### NewTabPage
3468 Enable or disable the New Tab page.
3469
3470 **Compatibility:** Firefox 68, Firefox ESR 68\
3471 **CCK2 Equivalent:** N/A\
3472 **Preferences Affected:** `browser.newtabpage.enabled`
3473
3474 #### Windows (GPO)
3475 ```
3476 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
3477 ```
3478 #### Windows (Intune)
3479 OMA-URI:
3480 ```
3481 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
3482 ```
3483 Value (string):
3484 ```
3485 <enabled/> or <disabled/>
3486 ```
3487 #### macOS
3488 ```
3489 <dict>
3490 <key>NewTabPage</key>
3491 <true/> | <false/>
3492 </dict>
3493 ```
3494 #### policies.json
3495 ```
3496 {
3497 "policies": {
3498 "NewTabPage": true | false
3499 }
3500 ```
3501 ### NoDefaultBookmarks
3502 Disable the creation of default bookmarks.
3503
3504 This policy is only effective if the user profile has not been created yet.
3505
3506 **Compatibility:** Firefox 60, Firefox ESR 60\
3507 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3508 **Preferences Affected:** N/A
3509
3510 #### Windows (GPO)
3511 ```
3512 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3513 ```
3514 #### Windows (Intune)
3515 OMA-URI:
3516 ```
3517 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3518 ```
3519 Value (string):
3520 ```
3521 <enabled/> or <disabled/>
3522 ```
3523 #### macOS
3524 ```
3525 <dict>
3526 <key>NoDefaultBookmarks</key>
3527 <true/> | <false/>
3528 </dict>
3529 ```
3530 #### policies.json
3531 ```
3532 {
3533 "policies": {
3534 "NoDefaultBookmarks": true | false
3535 }
3536 }
3537 ```
3538 ### OfferToSaveLogins
3539 Control whether or not Firefox offers to save passwords.
3540
3541 **Compatibility:** Firefox 60, Firefox ESR 60\
3542 **CCK2 Equivalent:** `dontRememberPasswords`\
3543 **Preferences Affected:** `signon.rememberSignons`
3544
3545 #### Windows (GPO)
3546 ```
3547 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3548 ```
3549 #### Windows (Intune)
3550 OMA-URI:
3551 ```
3552 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3553 ```
3554 Value (string):
3555 ```
3556 <enabled/> or <disabled/>
3557 ```
3558 #### macOS
3559 ```
3560 <dict>
3561 <key>OfferToSaveLogins</key>
3562 <true/> | <false/>
3563 </dict>
3564 ```
3565 #### policies.json
3566 ```
3567 {
3568 "policies": {
3569 "OfferToSaveLogins": true | false
3570 }
3571 }
3572 ```
3573 ### OfferToSaveLoginsDefault
3574 Sets the default value of signon.rememberSignons without locking it.
3575
3576 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3577 **CCK2 Equivalent:** `dontRememberPasswords`\
3578 **Preferences Affected:** `signon.rememberSignons`
3579
3580 #### Windows (GPO)
3581 ```
3582 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3583 ```
3584 #### Windows (Intune)
3585 OMA-URI:
3586 ```
3587 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3588 ```
3589 Value (string):
3590 ```
3591 <enabled/> or <disabled/>
3592 ```
3593 #### macOS
3594 ```
3595 <dict>
3596 <key>OfferToSaveLoginsDefault</key>
3597 <true/> | <false/>
3598 </dict>
3599 ```
3600 #### policies.json
3601 ```
3602 {
3603 "policies": {
3604 "OfferToSaveLoginsDefault": true | false
3605 }
3606 }
3607 ```
3608 ### OverrideFirstRunPage
3609 Override the first run page. If the value is an empty string (""), the first run page is not displayed.
3610
3611 Starting with Firefox 83, Firefox ESR 78.5, you can also specify multiple URLS separated by a vertical bar (|).
3612
3613 **Compatibility:** Firefox 60, Firefox ESR 60\
3614 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3615 **Preferences Affected:** `startup.homepage_welcome_url`
3616
3617 #### Windows (GPO)
3618 ```
3619 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3620 ```
3621 #### Windows (Intune)
3622 OMA-URI:
3623 ```
3624 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3625 ```
3626 Value (string):
3627 ```
3628 <enabled/>
3629 <data id="OverridePage" value="https://example.com"/>
3630 ```
3631 #### macOS
3632 ```
3633 <dict>
3634 <key>OverrideFirstRunPage</key>
3635 <string>http://example.org</string>
3636 </dict>
3637 ```
3638 #### policies.json
3639 ```
3640 {
3641 "policies": {
3642 "OverrideFirstRunPage": "http://example.org"
3643 }
3644 }
3645 ```
3646 ### OverridePostUpdatePage
3647 Override the upgrade page. If the value is an empty string (""), no extra pages are displayed when Firefox is upgraded.
3648
3649 **Compatibility:** Firefox 60, Firefox ESR 60\
3650 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3651 **Preferences Affected:** `startup.homepage_override_url`
3652
3653 #### Windows (GPO)
3654 ```
3655 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3656 ```
3657 #### Windows (Intune)
3658 OMA-URI:
3659 ```
3660 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3661 ```
3662 Value (string):
3663 ```
3664 <enabled/>
3665 <data id="OverridePage" value="https://example.com"/>
3666 ```
3667 #### macOS
3668 ```
3669 <dict>
3670 <key>OverridePostUpdatePage</key>
3671 <string>http://example.org</string>
3672 </dict>
3673 ```
3674 #### policies.json
3675 ```
3676 {
3677 "policies": {
3678 "OverridePostUpdatePage": "http://example.org"
3679 }
3680 }
3681 ```
3682 ### PasswordManagerEnabled
3683 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3684
3685 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3686 **CCK2 Equivalent:** N/A\
3687 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3688
3689 #### Windows (GPO)
3690 ```
3691 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3692 ```
3693 #### Windows (Intune)
3694 OMA-URI:
3695 ```
3696 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3697 ```
3698 Value (string):
3699 ```
3700 <enabled/> or <disabled/>
3701 ```
3702 #### macOS
3703 ```
3704 <dict>
3705 <key>PasswordManagerEnabled</key>
3706 <true/> | <false/>
3707 </dict>
3708 ```
3709 #### policies.json
3710 ```
3711 {
3712 "policies": {
3713 "PasswordManagerEnabled": true | false
3714 }
3715 }
3716 ```
3717 ### PDFjs
3718 Disable or configure PDF.js, the built-in PDF viewer.
3719
3720 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3721
3722 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3723
3724 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3725
3726 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3727 **CCK2 Equivalent:** N/A\
3728 **Preferences Affected:** `pdfjs.diabled`, `pdfjs.enablePermissions`
3729
3730 #### Windows (GPO)
3731 ```
3732 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3733 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3734 ```
3735 #### Windows (Intune)
3736 OMA-URI:
3737 ```
3738 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3739 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3740 ```
3741 Value (string):
3742 ```
3743 <enabled/>or <disabled/>
3744 ```
3745 #### macOS
3746 ```
3747 <dict>
3748 <key>PDFjs</key>
3749 <dict>
3750 <key>Enabled</key>
3751 <true/> | <false/>
3752 <key>EnablePermissions</key>
3753 <true/> | <false/>
3754 </dict>
3755 </dict>
3756 ```
3757 #### policies.json
3758 ```
3759 {
3760 "policies": {
3761 "PDFjs": {
3762 "Enabled": true | false,
3763 "EnablePermissions": true | false
3764 }
3765 }
3766 }
3767 ```
3768 ### Permissions
3769 Set permissions associated with camera, microphone, location, notifications, autoplay, and virtual reality. Because these are origins, not domains, entries with unique ports must be specified separately. This explicitly means that it is not possible to add wildcards. See examples below.
3770
3771 `Allow` is a list of origins where the feature is allowed.
3772
3773 `Block` is a list of origins where the feature is not allowed.
3774
3775 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3776
3777 `Locked` prevents the user from changing preferences for the feature.
3778
3779 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3780
3781 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8, VirtualReality added in Firefox 80, Firefox ESR 78.2)\
3782 **CCK2 Equivalent:** N/A\
3783 **Preferences Affected:** `permissions.default.camera`, `permissions.default.microphone`, `permissions.default.geo`, `permissions.default.desktop-notification`, `media.autoplay.default`, `permissions.default.xr`
3784
3785 #### Windows (GPO)
3786 ```
3787 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3788 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3789 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3790 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3791 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3792 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3793 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3794 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3795 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3796 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3797 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3798 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3799 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3800 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3801 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3802 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3803 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3804 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3805 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3806 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3807 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3808 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Allow\1 = "https://example.org"
3809 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Block\1 = "https://example.edu"
3810 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\BlockNewRequests = 0x1 | 0x0
3811 Software\Policies\Mozilla\Firefox\Permissions\VirtualReality\Locked = 0x1 | 0x0
3812 ```
3813 #### Windows (Intune)
3814 OMA-URI:
3815 ```
3816 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3817 ```
3818 Value (string):
3819 ```
3820 <enabled/> or <disabled/>
3821 ```
3822 OMA-URI:
3823 ```
3824 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3825 ```
3826 Value (string):
3827 ```
3828 <enabled/> or <disabled/>
3829 ```
3830 OMA-URI:
3831 ```
3832 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3833 ```
3834 Value (string):
3835 ```
3836 <enabled/>
3837 <data id="Permissions" value="1&#xF000;https://example.org"/>
3838 ```
3839 OMA-URI:
3840 ```
3841 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3842 ```
3843 Value (string):
3844 ```
3845 <enabled/> or <disabled/>
3846 ```
3847 OMA-URI:
3848 ```
3849 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3850 ```
3851 Value (string):
3852 ```
3853 <enabled/> or <disabled/>
3854 ```
3855 OMA-URI:
3856 ```
3857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3858 ```
3859 Value (string):
3860 ```
3861 <enabled/>
3862 <data id="Permissions" value="1&#xF000;https://example.org"/>
3863 ```
3864 OMA-URI:
3865 ```
3866 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3867 ```
3868 Value (string):
3869 ```
3870 <enabled/>
3871 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3872 ```
3873 OMA-URI:
3874 ```
3875 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3876 ```
3877 Value (string):
3878 ```
3879 <enabled/>
3880 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3881 ```
3882 OMA-URI:
3883 ```
3884 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3885 ```
3886 Value (string):
3887 ```
3888 <enabled/> or <disabled/>
3889 ```
3890 OMA-URI:
3891 ```
3892 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Allow
3893 ```
3894 Value (string):
3895 ```
3896 <enabled/>
3897 <data id="Permissions" value="1&#xF000;https://example.org"/>
3898 ```
3899 OMA-URI:
3900 ```
3901 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Block
3902 ```
3903 Value (string):
3904 ```
3905 <enabled/>
3906 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3907 ```
3908 OMA-URI:
3909 ```
3910 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_BlockNewRequests
3911 ```
3912 Value (string):
3913 ```
3914 <enabled/> or <disabled/>
3915 ```
3916 OMA-URI:
3917 ```
3918 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/VirtualReality_Locked
3919 ```
3920 Value (string):
3921 ```
3922 <enabled/> or <disabled/>
3923 ```
3924 #### macOS
3925 ```
3926 <dict>
3927 <key>Permissions</key>
3928 <dict>
3929 <key>Camera</key>
3930 <dict>
3931 <key>Allow</key>
3932 <array>
3933 <string>https://example.org</string>
3934 <string>https://example.org:1234</string>
3935 </array>
3936 <key>Block</key>
3937 <array>
3938 <string>https://example.edu</string>
3939 </array>
3940 <key>BlockNewRequests</key>
3941 <true/> | <false/>
3942 <key>Locked</key>
3943 <true/> | <false/>
3944 </dict>
3945 <key>Microphone</key>
3946 <dict>
3947 <key>Allow</key>
3948 <array>
3949 <string>https://example.org</string>
3950 </array>
3951 <key>Block</key>
3952 <array>
3953 <string>https://example.edu</string>
3954 </array>
3955 <key>BlockNewRequests</key>
3956 <true/> | <false/>
3957 <key>Locked</key>
3958 <true/> | <false/>
3959 </dict>
3960 <key>Location</key>
3961 <dict>
3962 <key>Allow</key>
3963 <array>
3964 <string>https://example.org</string>
3965 </array>
3966 <key>Block</key>
3967 <array>
3968 <string>https://example.edu</string>
3969 </array>
3970 <key>BlockNewRequests</key>
3971 <true/> | <false/>
3972 <key>Locked</key>
3973 <true/> | <false/>
3974 </dict>
3975 <key>Notifications</key>
3976 <dict>
3977 <key>Allow</key>
3978 <array>
3979 <string>https://example.org</string>
3980 </array>
3981 <key>Block</key>
3982 <array>
3983 <string>https://example.edu</string>
3984 </array>
3985 <key>BlockNewRequests</key>
3986 <true/>
3987 <key>Locked</key>
3988 <true/>
3989 </dict>
3990 <key>Autoplay</key>
3991 <dict>
3992 <key>Allow</key>
3993 <array>
3994 <string>https://example.org</string>
3995 </array>
3996 <key>Block</key>
3997 <array>
3998 <string>https://example.edu</string>
3999 </array>
4000 <key>Default</key>
4001 <string>allow-audio-video | block-audio | block-audio-video</string>
4002 <key>Locked</key>
4003 <true/> | <false/>
4004 </dict>
4005 </dict>
4006 </dict>
4007 ```
4008 #### policies.json
4009 ```
4010 {
4011 "policies": {
4012 "Permissions": {
4013 "Camera": {
4014 "Allow": ["https://example.org","https://example.org:1234"],
4015 "Block": ["https://example.edu"],
4016 "BlockNewRequests": true | false,
4017 "Locked": true | false
4018 },
4019 "Microphone": {
4020 "Allow": ["https://example.org"],
4021 "Block": ["https://example.edu"],
4022 "BlockNewRequests": true | false,
4023 "Locked": true | false
4024 },
4025 "Location": {
4026 "Allow": ["https://example.org"],
4027 "Block": ["https://example.edu"],
4028 "BlockNewRequests": true | false,
4029 "Locked": true | false
4030 },
4031 "Notifications": {
4032 "Allow": ["https://example.org"],
4033 "Block": ["https://example.edu"],
4034 "BlockNewRequests": true | false,
4035 "Locked": true | false
4036 },
4037 "Autoplay": {
4038 "Allow": ["https://example.org"],
4039 "Block": ["https://example.edu"],
4040 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
4041 "Locked": true | false
4042 }
4043 }
4044 }
4045 }
4046 ```
4047 ### PictureInPicture
4048
4049 Enable or disable Picture-in-Picture as well as prevent the user from enabling or disabling it (Locked).
4050
4051 **Compatibility:** Firefox 78, Firefox ESR 78\
4052 **CCK2 Equivalent:** N/A\
4053 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
4054
4055 #### Windows (GPO)
4056 ```
4057 Software\Policies\Mozilla\Firefox\PictureInPicture\Enabled = 0x1 | 0x0
4058 Software\Policies\Mozilla\Firefox\PictureInPicture\Locked = 0x1 | 0x0
4059
4060 ```
4061 #### Windows (Intune)
4062 OMA-URI:
4063 ```
4064 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Enabled
4065 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PictureInPicture/PictureInPicture_Locked
4066 ```
4067 Value (string):
4068 ```
4069 <enabled/> or <disabled/>
4070 ```
4071 #### macOS
4072 ```
4073 <dict>
4074 <key>PictureInPicture</key>
4075 <dict>
4076 <key>Enabled</key>
4077 <true/> | <false/>
4078 <key>Locked</key>
4079 <true/> | <false/>
4080 </dict>
4081 </dict>
4082 ```
4083 #### policies.json
4084 ```
4085 {
4086 "policies": {
4087 "PictureInPicture": {
4088 "Enabled": true | false,
4089 "Locked": true | false
4090 }
4091 }
4092 }
4093 ```
4094 ### PopupBlocking
4095 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
4096
4097 `Allow` is a list of origins where popup-windows are allowed.
4098
4099 `Default` determines whether or not pop-up windows are allowed by default.
4100
4101 `Locked` prevents the user from changing pop-up preferences.
4102
4103 **Compatibility:** Firefox 60, Firefox ESR 60\
4104 **CCK2 Equivalent:** `permissions.popup`\
4105 **Preferences Affected:** `dom.disable_open_during_load`
4106
4107 #### Windows (GPO)
4108 ```
4109 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
4110 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
4111 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
4112 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
4113 ```
4114 #### Windows (Intune)
4115 OMA-URI:
4116 ```
4117 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
4118 ```
4119 Value (string):
4120 ```
4121 <enabled/>
4122 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
4123 ```
4124 OMA-URI:
4125 ```
4126 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
4127 ```
4128 Value (string):
4129 ```
4130 <enabled/> or <disabled/>
4131 ```
4132 OMA-URI:
4133 ```
4134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
4135 ```
4136 Value (string):
4137 ```
4138 <enabled/> or <disabled/>
4139 ```
4140 #### macOS
4141 ```
4142 <dict>
4143 <key>PopupBlocking</key>
4144 <dict>
4145 <key>Allow</key>
4146 <array>
4147 <string>http://example.org</string>
4148 <string>http://example.edu</string>
4149 </array>
4150 <key>Default</key>
4151 <true/> | <false/>
4152 <key>Locked</key>
4153 <true/> | <false/>
4154 </dict>
4155 </dict>
4156 ```
4157 #### policies.json
4158 ```
4159 {
4160 "policies": {
4161 "PopupBlocking": {
4162 "Allow": ["http://example.org/",
4163 "http://example.edu/"],
4164 "Default": true | false,
4165 "Locked": true | false
4166 }
4167 }
4168 }
4169 ```
4170 ### Preferences
4171 Set and lock preferences.
4172
4173 **NOTE** On Windows, in order to use this policy, you must clear all settings in the old **Preferences (Deprecated)** section.
4174
4175 Previously you could only set and lock a subset of preferences. Starting with Firefox 81 and Firefox ESR 78.3 you can set many more preferences. You can also set default preferences, user preferences and you can clear preferences.
4176
4177 Preferences that start with the following prefixes are supported:
4178 ```
4179 accessibility.
4180 app.update.* (Firefox 86, Firefox 78.8)
4181 browser.
4182 datareporting.policy.
4183 dom.
4184 extensions.
4185 general.autoScroll (Firefox 83, Firefox ESR 78.5)
4186 general.smoothScroll (Firefox 83, Firefox ESR 78.5)
4187 geo.
4188 gfx.
4189 intl.
4190 keyword.enabled (Firefox 95, Firefox ESR 91.4)
4191 layers.
4192 layout.
4193 media.
4194 network.
4195 pdfjs. (Firefox 84, Firefox ESR 78.6)
4196 places.
4197 print.
4198 signon. (Firefox 83, Firefox ESR 78.5)
4199 spellchecker. (Firefox 84, Firefox ESR 78.6)
4200 toolkit.legacyUserProfileCustomizations.stylesheets (Firefox 95, Firefox ESR 91.4)
4201 ui.
4202 widget.
4203 ```
4204 as well as the following security preferences:
4205 | Preference | Type | Default
4206 | --- | --- | ---
4207 | security.default_personal_cert | string | Ask Every Time
4208 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4209 | security.insecure_connection_text.enabled | bool | false
4210 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites.
4211 | security.insecure_connection_text.pbmode.enabled | bool | false
4212 | &nbsp;&nbsp;&nbsp;&nbsp;If set to true, adds the words "Not Secure" for insecure sites in private browsing.
4213 | security.insecure_field_warning.contextual.enabled | bool | true
4214 | &nbsp;&nbsp;&nbsp;&nbsp;If set to false, remove the warning for inscure login fields.
4215 | security.mixed_content.block_active_content | boolean | true
4216 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4217 | security.osclientcerts.autoload | boolean | false
4218 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4219 | security.ssl.errorReporting.enabled | boolean | true
4220 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4221 | security.tls.enable_0rtt_data | boolean | true
4222 | &nbsp;&nbsp;&nbsp;&nbsp;If false, TLS early data is turned off (Firefox 93, Firefox 91.2, Firefox 78.15).
4223 | security.tls.hello_downgrade_check | boolean | true
4224 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4225 | security.tls.version.enable-deprecated | boolean | false
4226 | &nbsp;&nbsp;&nbsp;&nbsp;If true, browser will accept TLS 1.0. and TLS 1.1 (Firefox 86, Firefox 78.8).
4227 | security.warn_submit_secure_to_insecure | boolean | true
4228 | &nbsp;&nbsp;&nbsp;&nbsp;If false, no warning is shown when submitting a form from https to http.
4229 &nbsp;
4230
4231 Using the preference as the key, set the `Value` to the corresponding preference value.
4232
4233 `Status` can be "default", "locked", "user" or "clear"
4234
4235 Default preferences can be modified by the user.
4236
4237 If a value is locked, it is also set as the default.
4238
4239 User preferences persist across invocations of Firefox. It is the equivalent of a user setting the preference. They are most useful when a preference is needed very early in startup so it can't be set as default by policy. An example of this is ```toolkit.legacyUserProfileCustomizations.stylesheets```.
4240
4241 User preferences persist even if the policy is removed, so if you need to remove them, you should use the clear policy.
4242
4243 See the examples below for more detail.
4244
4245 IMPORTANT: Make sure you're only setting a particular preference using this mechanism and not some other way.
4246
4247 Status
4248 **Compatibility:** Firefox 81, Firefox ESR 78.3\
4249 **CCK2 Equivalent:** `preferences`\
4250 **Preferences Affected:** Many
4251
4252 #### Windows (GPO)
4253 Software\Policies\Mozilla\Firefox\Preferences (REG_MULTI_SZ) =
4254 ```
4255 {
4256 "accessibility.force_disabled": {
4257 "Value": 1,
4258 "Status": "default"
4259 },
4260 "browser.cache.disk.parent_directory": {
4261 "Value": "SOME_NATIVE_PATH",
4262 "Status": "user"
4263 },
4264 "browser.tabs.warnOnClose": {
4265 "Value": false,
4266 "Status": "locked"
4267 }
4268 }
4269 ```
4270 #### Windows (Intune)
4271 OMA-URI:
4272 ```
4273 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Preferences
4274 ```
4275 Value (string):
4276 ```
4277 <enabled/>
4278 <data id="JSON" value='
4279 {
4280 "accessibility.force_disabled": {
4281 "Value": 1,
4282 "Status": "default"
4283 },
4284 "browser.cache.disk.parent_directory": {
4285 "Value": "SOME_NATIVE_PATH",
4286 "Status": "user"
4287 },
4288 "browser.tabs.warnOnClose": {
4289 "Value": false,
4290 "Status": "locked"
4291 }
4292 }'/>
4293 ```
4294 #### macOS
4295 ```
4296 <dict>
4297 <key>Preferences</key>
4298 <dict>
4299 <key>accessibility.force_disabled</key>
4300 <dict>
4301 <key>Value</key>
4302 <integer>1</integer>
4303 <key>Status</key>
4304 <string>default</string>
4305 </dict>
4306 <key>browser.cache.disk.parent_directory</key>
4307 <dict>
4308 <key>Value</key>
4309 <string>SOME_NATIVE_PATH</string>
4310 <key>Status</key>
4311 <string>user</string>
4312 </dict>
4313 <key>browser.tabs.warnOnClose</key>
4314 <dict>
4315 <key>Value</key>
4316 <false/>
4317 <key>Status</key>
4318 <string>locked</string>
4319 </dict>
4320 </dict>
4321 </dict>
4322 ```
4323 #### policies.json
4324 ```
4325 {
4326 "policies": {
4327 "Preferences": {
4328 "accessibility.force_disabled": {
4329 "Value": 1,
4330 "Status": "default"
4331 },
4332 "browser.cache.disk.parent_directory": {
4333 "Value": "SOME_NATIVE_PATH",
4334 "Status": "user"
4335 },
4336 "browser.tabs.warnOnClose": {
4337 "Value": false,
4338 "Status": "locked"
4339 }
4340 }
4341 }
4342 }
4343 ```
4344 ### Preferences (Deprecated)
4345 Set and lock certain preferences.
4346
4347 **Compatibility:** See below\
4348 **CCK2 Equivalent:** `preferences`\
4349 **Preferences Affected:** See below
4350
4351 | Preference | Type | Compatibility | Default
4352 | --- | --- | --- | ---
4353 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
4354 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
4355 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
4356 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
4357 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
4358 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
4359 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
4360 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
4361 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
4362 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
4363 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
4364 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
4365 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
4366 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
4367 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
4368 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
4369 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
4370 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page. Due to Firefox limitations, search sites can't be added. In addition, sites with the same name but different TLDs (example.org/example.com) will not display properly.
4371 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
4372 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
4373 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4374 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
4375 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4376 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
4377 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
4378 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
4379 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
4380 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
4381 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
4382 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
4383 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
4384 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
4385 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
4386 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
4387 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
4388 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
4389 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
4390 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
4391 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
4392 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
4393 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
4394 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
4395 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
4396 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
4397 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
4398 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
4399 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4400 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
4401 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
4402 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4403 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
4404 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
4405 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
4406 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
4407 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
4408 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
4409 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4410 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
4411 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
4412 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
4413 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4414 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
4415 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
4416 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
4417 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
4418 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
4419 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
4420 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
4421 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4422 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
4423 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4424 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
4425 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
4426 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
4427 | media.peerconnection.ice.obfuscate_host_addresses.whitelist (Deprecated) | string | Firefox 72, Firefox ESR 68.4 | N/A
4428 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4429 disabled
4430 | media.peerconnection.ice.obfuscate_host_addresses.blocklist | string | Firefox 79, Firefox ESR 78.1 | N/A
4431 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
4432 disabled
4433 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
4434 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
4435 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
4436 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
4437 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4438 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
4439 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
4440 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
4441 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
4442 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
4443 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
4444 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
4445 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
4446 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
4447 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
4448 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
4449 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
4450 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
4451 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
4452 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
4453 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
4454 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
4455 #### Windows (GPO)
4456 ```
4457 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
4458 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
4459 ```
4460 #### Windows (Intune)
4461 OMA-URI: (periods are replaced by underscores)
4462 ```
4463 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
4464 ```
4465 Value (string):
4466 ```
4467 <enabled/> or <disabled/>
4468 ```
4469 OMA-URI: (periods are replaced by underscores)
4470 ```
4471 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
4472 ```
4473 Value (string):
4474 ```
4475 <enabled/>
4476 <data id="Preferences_String" value="string_value"/>
4477 ```
4478 #### macOS
4479 ```
4480 <dict>
4481 <key>Preferences</key>
4482 <dict>
4483 <key>boolean_preference_name</key>
4484 <true/> | <false/>
4485 <key>string_preference_name</key>
4486 <string>string_value</string>
4487 </dict>
4488 </dict>
4489 ```
4490 #### policies.json
4491 ```
4492 {
4493 "policies": {
4494 "Preferences": {
4495 "boolean_preference_name": true | false,
4496 "string_preference_name": "string_value"
4497 }
4498 }
4499 }
4500 ```
4501 ### PrimaryPassword
4502 Require or prevent using a primary (formerly master) password.
4503
4504 If this value is true, a primary password is required. If this value is false, it works the same as if [`DisableMasterPasswordCreation`](#disablemasterpasswordcreation) was true and removes the primary password functionality.
4505
4506 If both DisableMasterPasswordCreation and PrimaryPassword are used, DisableMasterPasswordCreation takes precedent.
4507
4508 **Compatibility:** Firefox 79, Firefox ESR 78.1\
4509 **CCK2 Equivalent:** `noMasterPassword`\
4510 **Preferences Affected:** N/A
4511
4512 #### Windows (GPO)
4513 ```
4514 Software\Policies\Mozilla\Firefox\PrimaryPassword = 0x1 | 0x0
4515 ```
4516 #### Windows (Intune)
4517 OMA-URI:
4518 ```
4519 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PrimaryPassword
4520 ```
4521 Value (string):
4522 ```
4523 <enabled/> or <disabled/>
4524 ```
4525 #### macOS
4526 ```
4527 <dict>
4528 <key>PrimaryPassword</key>
4529 <true/> | <false/>
4530 </dict>
4531 ```
4532 #### policies.json
4533 ```
4534 {
4535 "policies": {
4536 "PrimaryPassword": true | false
4537 }
4538 }
4539 ```
4540 ### PromptForDownloadLocation
4541 Ask where to save each file before downloading.
4542
4543 **Compatibility:** Firefox 68, Firefox ESR 68\
4544 **CCK2 Equivalent:** N/A\
4545 **Preferences Affected:** `browser.download.useDownloadDir`
4546
4547 #### Windows (GPO)
4548 ```
4549 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
4550 ```
4551 #### Windows (Intune)
4552 OMA-URI:
4553 ```
4554 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
4555 ```
4556 Value (string):
4557 ```
4558 <enabled/> or <disabled/>
4559 ```
4560 #### macOS
4561 ```
4562 <dict>
4563 <key>PromptForDownloadLocation</key>
4564 <true/> | <false/>
4565 </dict>
4566 ```
4567 #### policies.json
4568 ```
4569 {
4570 "policies": {
4571 "PromptForDownloadLocation": true | false
4572 }
4573 }
4574 ```
4575 ### Proxy
4576 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
4577 To specify ports, append them to the hostnames with a colon (:).
4578
4579 `Mode` is the proxy method being used.
4580
4581 `Locked` is whether or not proxy settings can be changed.
4582
4583 `HTTPProxy` is the HTTP proxy server.
4584
4585 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
4586
4587 `SSLProxy` is the SSL proxy server.
4588
4589 `FTPProxy` is the FTP proxy server.
4590
4591 `SOCKSProxy` is the SOCKS proxy server
4592
4593 `SOCKSVersion` is the SOCKS version (4 or 5)
4594
4595 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
4596
4597 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
4598
4599 `AutoLogin` means do not prompt for authentication if password is saved.
4600
4601 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
4602
4603 **Compatibility:** Firefox 60, Firefox ESR 60\
4604 **CCK2 Equivalent:** `networkProxy*`\
4605 **Preferences Affected:** `network.proxy.type`, `network.proxy.autoconfig_url`, `network.proxy.socks_remote_dns`, `signon.autologin.proxy`, `network.proxy.socks_version`, `network.proxy.no_proxies_on`, `network.proxy.share_proxy_settings`, `network.proxy.http`, `network.proxy.http_port`, `network.proxy.ftp`, `network.proxy.ftp_port`, `network.proxy.ssl`, `network.proxy.ssl_port`, `network.proxy.socks`, `network.proxy.socks_port`
4606
4607 #### Windows (GPO)
4608 ```
4609 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none" | "system" | "manual" | "autoDetect" | "autoConfig"
4610 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
4611 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
4612 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
4613 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
4614 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
4615 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
4616 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
4617 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
4618 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
4619 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
4620 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
4621 ```
4622 #### Windows (Intune)
4623 OMA-URI:
4624 ```
4625 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
4626 ```
4627 Value (string):
4628 ```
4629 <enabled/>
4630 <data id="ProxyLocked" value="true | false"/>
4631 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
4632 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
4633 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
4634 <data id="SSLProxy" value="https://sslproxy.example.com"/>
4635 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
4636 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
4637 <data id="SOCKSVersion" value="4 | 5"/>
4638 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
4639 <data id="Passthrough" value="<local>"/>
4640 <data id="AutoLogin" value="true | false"/>
4641 <data id="UseProxyForDNS" value="true | false"/>
4642 ```
4643 #### macOS
4644 ```
4645 <dict>
4646 <key>Proxy</key>
4647 <dict>
4648 <key>Mode</key>
4649 <string>none | system | manual | autoDetect | autoConfig</string>
4650 <key>Locked</key>
4651 <true> | </false>
4652 <key>HTTPProxy</key>
4653 <string>https://httpproxy.example.com</string>
4654 <key>UseHTTPProxyForAllProtocols</key>
4655 <true> | </false>
4656 <key>SSLProxy</key>
4657 <string>https://sslproxy.example.com</string>
4658 <key>FTPProxy</key>
4659 <string>https://ftpproxy.example.com</string>
4660 <key>SOCKSProxy</key>
4661 <string>https://socksproxy.example.com</string>
4662 <key>SOCKSVersion</key>
4663 <string>4 | 5</string>
4664 <key>Passthrough</key>
4665 <string>&lt;local>&gt;</string>
4666 <key>AutoConfigURL</key>
4667 <string>URL_TO_AUTOCONFIG</string>
4668 <key>AutoLogin</key>
4669 <true> | </false>
4670 <key>UseProxyForDNS</key>
4671 <true> | </false>
4672 </dict>
4673 </dict>
4674 ```
4675 #### policies.json
4676 ```
4677 {
4678 "policies": {
4679 "Proxy": {
4680 "Mode": "none" | "system" | "manual" | "autoDetect" | "autoConfig",
4681 "Locked": true | false,
4682 "HTTPProxy": "hostname",
4683 "UseHTTPProxyForAllProtocols": true | false,
4684 "SSLProxy": "hostname",
4685 "FTPProxy": "hostname",
4686 "SOCKSProxy": "hostname",
4687 "SOCKSVersion": 4 | 5,
4688 "Passthrough": "<local>",
4689 "AutoConfigURL": "URL_TO_AUTOCONFIG",
4690 "AutoLogin": true | false,
4691 "UseProxyForDNS": true | false
4692 }
4693 }
4694 }
4695 ```
4696 ### RequestedLocales
4697 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
4698
4699 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
4700
4701 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
4702 **CCK2 Equivalent:** N/A\
4703 **Preferences Affected:** N/A
4704 #### Windows (GPO)
4705 ```
4706 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
4707 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
4708
4709 or
4710
4711 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
4712 ```
4713 #### Windows (Intune)
4714 OMA-URI:
4715 ```
4716 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
4717 ```
4718 Value (string):
4719 ```
4720 <enabled/>
4721 <data id="Preferences_String" value="de,en-US"/>
4722 ```
4723 #### macOS
4724 ```
4725 <dict>
4726 <key>RequestedLocales</key>
4727 <array>
4728 <string>de</string>
4729 <string>en-US</string>
4730 </array>
4731 </dict>
4732
4733 or
4734
4735 <dict>
4736 <key>RequestedLocales</key>
4737 <string>de,en-US</string>
4738 </dict>
4739
4740 ```
4741 #### policies.json
4742 ```
4743 {
4744 "policies": {
4745 "RequestedLocales": ["de", "en-US"]
4746 }
4747 }
4748
4749 or
4750
4751 {
4752 "policies": {
4753 "RequestedLocales": "de,en-US"
4754 }
4755 }
4756 ```
4757 <a name="SanitizeOnShutdown"></a>
4758
4759 ### SanitizeOnShutdown (Selective)
4760 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
4761
4762 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
4763
4764 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
4765 **CCK2 Equivalent:** N/A\
4766 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
4767 #### Windows (GPO)
4768 ```
4769 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4770 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4771 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4772 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4773 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4774 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4775 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4776 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4777 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4778 ```
4779 #### Windows (Intune)
4780 OMA-URI:
4781 ```
4782 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/A_SanitizeOnShutdown_Cache
4783 ```
4784 Value (string):
4785 ```
4786 <enabled/> or <disabled/>
4787 ```
4788 OMA-URI:
4789 ```
4790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/B_SanitizeOnShutdown_Cookies
4791 ```
4792 Value (string):
4793 ```
4794 <enabled/> or <disabled/>
4795 ```
4796 OMA-URI:
4797 ```
4798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/C_SanitizeOnShutdown_Downloads
4799 ```
4800 Value (string):
4801 ```
4802 <enabled/> or <disabled/>
4803 ```
4804 OMA-URI:
4805 ```
4806 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/D_SanitizeOnShutdown_FormData
4807 ```
4808 Value (string):
4809 ```
4810 <enabled/> or <disabled/>
4811 ```
4812 OMA-URI:
4813 ```
4814 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/E_SanitizeOnShutdown_History
4815 ```
4816 Value (string):
4817 ```
4818 <enabled/> or <disabled/>
4819 ```
4820 OMA-URI:
4821 ```
4822 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/F_SanitizeOnShutdown_Sessions
4823 ```
4824 Value (string):
4825 ```
4826 <enabled/> or <disabled/>
4827 ```
4828 OMA-URI:
4829 ```
4830 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/G_SanitizeOnShutdown_SiteSettings
4831 ```
4832 Value (string):
4833 ```
4834 <enabled/> or <disabled/>
4835 ```
4836 OMA-URI:
4837 ```
4838 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/H_SanitizeOnShutdown_OfflineApps
4839 ```
4840 Value (string):
4841 ```
4842 <enabled/> or <disabled/>
4843 ```
4844 OMA-URI:
4845 ```
4846 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4847 ```
4848 Value (string):
4849 ```
4850 <enabled/> or <disabled/>
4851 ```
4852 #### macOS
4853 ```
4854 <dict>
4855 <key>SanitizeOnShutdown</key>
4856 <dict>
4857 <key>Cache</key>
4858 <true/> | <false/>
4859 <key>Cookies</key>
4860 <true/> | <false/>
4861 <key>Downloads</key>
4862 <true/> | <false/>
4863 <key>FormData</key>
4864 <true/> | <false/>
4865 <key>History</key>
4866 <true/> | <false/>
4867 <key>Sessions</key>
4868 <true/> | <false/>
4869 <key>SiteSettings</key>
4870 <true/> | <false/>
4871 <key>OfflineApps</key>
4872 <true/> | <false/>
4873 <key>Locked</key>
4874 <true/> | <false/>
4875 </dict>
4876 </dict>
4877 ```
4878 #### policies.json
4879 ```
4880 {
4881 "policies": {
4882 "SanitizeOnShutdown": {
4883 "Cache": true | false,
4884 "Cookies": true | false,
4885 "Downloads": true | false,
4886 "FormData": true | false,
4887 "History": true | false,
4888 "Sessions": true | false,
4889 "SiteSettings": true | false,
4890 "OfflineApps": true | false,
4891 "Locked": true | false
4892 }
4893 }
4894 }
4895 ```
4896 ### SanitizeOnShutdown (All)
4897 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4898
4899 **Compatibility:** Firefox 60, Firefox ESR 60\
4900 **CCK2 Equivalent:** N/A\
4901 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`, `privacy.clearOnShutdown.cache`, `privacy.clearOnShutdown.cookies`, `privacy.clearOnShutdown.downloads`, `privacy.clearOnShutdown.formdata`, `privacy.clearOnShutdown.history`, `privacy.clearOnShutdown.sessions`, `privacy.clearOnShutdown.siteSettings`, `privacy.clearOnShutdown.offlineApps`
4902 #### Windows (GPO)
4903 ```
4904 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4905 ```
4906 #### Windows (Intune)
4907 OMA-URI:
4908 ```
4909 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4910 ```
4911 Value (string):
4912 ```
4913 <enabled/> or <disabled/>
4914 ```
4915 #### macOS
4916 ```
4917 <dict>
4918 <key>SanitizeOnShutdown</key>
4919 <true/> | <false/>
4920 </dict>
4921 ```
4922 #### policies.json
4923 ```
4924 {
4925 "policies": {
4926 "SanitizeOnShutdown": true | false
4927 }
4928 }
4929 ```
4930 ### SearchBar
4931 Set whether or not search bar is displayed.
4932
4933 **Compatibility:** Firefox 60, Firefox ESR 60\
4934 **CCK2 Equivalent:** `showSearchBar`\
4935 **Preferences Affected:** N/A
4936
4937 #### Windows (GPO)
4938 ```
4939 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4940 ```
4941
4942 #### Windows (Intune)
4943 OMA-URI:
4944 ```
4945 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4946 ```
4947 Value (string):
4948 ```
4949 <enabled/>
4950 <data id="SearchBar" value="unified | separate"/>
4951 ```
4952 #### macOS
4953 ```
4954 <dict>
4955 <key>SearchBar</key>
4956 <string>unified | separate</string>
4957 </dict>
4958 ```
4959 #### policies.json
4960 ```
4961 {
4962 "policies": {
4963 "SearchBar": "unified" | "separate"
4964 }
4965 }
4966 ```
4967 <a name="SearchEngines"></a>
4968
4969 ### SearchEngines (This policy is only available on the ESR.)
4970
4971 ### SearchEngines | Add
4972
4973 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4974
4975 `Name` is the name of the search engine.
4976
4977 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4978
4979 `Method` is either GET or POST
4980
4981 `IconURL` is a URL for the icon to use.
4982
4983 `Alias` is a keyword to use for the engine.
4984
4985 `Description` is a description of the search engine.
4986
4987 `PostData` is the POST data as name value pairs separated by &.
4988
4989 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4990
4991 `Encoding` is the query charset for the engine. It defaults to UTF-8.
4992
4993 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68, Encoding support in Firefox 91)\
4994 **CCK2 Equivalent:** `searchplugins`\
4995 **Preferences Affected:** N/A
4996
4997 #### Windows (GPO)
4998 ```
4999 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
5000 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
5001 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
5002 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
5003 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
5004 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
5005 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
5006 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
5007 ```
5008 #### Windows (Intune)
5009 OMA-URI:
5010 ```
5011 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
5012 ```
5013 Value (string):
5014 ```
5015 <enabled/>
5016 <data id="SearchEngine_Name" value="Example1"/>
5017 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
5018 <data id="SearchEngine_Method" value="GET | POST"/>
5019 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
5020 <data id="SearchEngine_Alias" value="example"/>
5021 <data id="SearchEngine_Description" value="Example Description"/>
5022 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
5023 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
5024 ```
5025 #### macOS
5026 ```
5027 <dict>
5028 <key>SearchEngines</key>
5029 <dict>
5030 <key>Add</key>
5031 <array>
5032 <dict>
5033 <key>Name</key>
5034 <string>Example1</string>
5035 <key>URLTemplate</key>
5036 <string>https://www.example.org/q={searchTerms}</string>
5037 <key>Method</key>
5038 <string>GET | POST </string>
5039 <key>IconURL</key>
5040 <string>https://www.example.org/favicon.ico</string>
5041 <key>Alias</key>
5042 <string>example</string>
5043 <key>Description</key>
5044 <string>Example Description</string>
5045 <key>SuggestURLTemplate</key>
5046 <string>https://www.example.org/suggestions/q={searchTerms}</string>
5047 <key>PostData</key>
5048 <string>name=value&q={searchTerms}</string>
5049 </dict>
5050 <array>
5051 </dict>
5052 </dict>
5053 ```
5054 #### policies.json
5055 ```
5056 {
5057 "policies": {
5058 "SearchEngines": {
5059 "Add": [
5060 {
5061 "Name": "Example1",
5062 "URLTemplate": "https://www.example.org/q={searchTerms}",
5063 "Method": "GET" | "POST",
5064 "IconURL": "https://www.example.org/favicon.ico",
5065 "Alias": "example",
5066 "Description": "Description",
5067 "PostData": "name=value&q={searchTerms}",
5068 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
5069 }
5070 ]
5071 }
5072 }
5073 }
5074 ```
5075 ### SearchEngines | Default
5076
5077 Set the default search engine. This policy is only available on the ESR.
5078
5079 **Compatibility:** Firefox ESR 60\
5080 **CCK2 Equivalent:** `defaultSearchEngine`\
5081 **Preferences Affected:** N/A
5082
5083 #### Windows (GPO)
5084 ```
5085 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
5086 ```
5087 #### Windows (Intune)
5088 OMA-URI:
5089 ```
5090 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
5091 ```
5092 Value (string):
5093 ```
5094 <enabled/>
5095 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
5096 ```
5097 #### macOS
5098 ```
5099 <dict>
5100 <key>SearchEngines</key>
5101 <dict>
5102 <key>Default</key>
5103 <string>NAME_OF_SEARCH_ENGINE</string>
5104 </dict>
5105 </dict>
5106 ```
5107 #### policies.json
5108 ```
5109 {
5110 "policies": {
5111 "SearchEngines": {
5112 "Default": "NAME_OF_SEARCH_ENGINE"
5113 }
5114 }
5115 }
5116 ```
5117 ### SearchEngines | PreventInstalls
5118
5119 Prevent installing search engines from webpages.
5120
5121 **Compatibility:** Firefox ESR 60\
5122 **CCK2 Equivalent:** `disableSearchEngineInstall`\
5123 **Preferences Affected:** N/A
5124
5125 #### Windows (GPO)
5126 ```
5127 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
5128 ```
5129 #### Windows (Intune)
5130 OMA-URI:
5131 ```
5132 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
5133 ```
5134 Value (string):
5135 ```
5136 <enabled/> or <disabled/>
5137 ```
5138 #### macOS
5139 ```
5140 <dict>
5141 <key>SearchEngines</key>
5142 <dict>
5143 <key>PreventInstalls</key>
5144 <true/> | <false/>
5145 </dict>
5146 </dict>
5147 ```
5148 #### policies.json
5149 ```
5150 {
5151 "policies": {
5152 "SearchEngines": {
5153 "PreventInstalls": true | false
5154 }
5155 }
5156 }
5157 ```
5158 ### SearchEngines | Remove
5159
5160 Hide built-in search engines. This policy is only available on the ESR.
5161
5162 **Compatibility:** Firefox ESR 60.2\
5163 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
5164 **Preferences Affected:** N/A
5165
5166 #### Windows (GPO)
5167 ```
5168 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
5169 ```
5170 #### Windows (Intune)
5171 OMA-URI:
5172 ```
5173 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
5174 ```
5175 Value (string):
5176 ```
5177 <enabled/>
5178 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
5179 ```
5180 #### macOS
5181 ```
5182 <dict>
5183 <key>SearchEngines</key>
5184 <dict>
5185 <key>Remove</key>
5186 <array>
5187 <string>NAME_OF_SEARCH_ENGINE</string>
5188 </array>
5189 </dict>
5190 </dict>
5191 ```
5192 #### policies.json
5193 ```
5194 {
5195 "policies": {
5196 "SearchEngines": {
5197 "Remove": ["NAME_OF_SEARCH_ENGINE"]
5198 }
5199 }
5200 }
5201 ```
5202 ### SearchSuggestEnabled
5203
5204 Enable search suggestions.
5205
5206 **Compatibility:** Firefox 68, Firefox ESR 68\
5207 **CCK2 Equivalent:** N/A\
5208 **Preferences Affected:** `browser.urlbar.suggest.searches`, `browser.search.suggest.enabled`
5209
5210 #### Windows (GPO)
5211 ```
5212 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
5213 ```
5214 #### Windows (Intune)
5215 OMA-URI:
5216 ```
5217 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchSuggestEnabled
5218 ```
5219 Value (string):
5220 ```
5221 <enabled/> or <disabled/>
5222 ```
5223 #### macOS
5224 ```
5225 <dict>
5226 <key>SearchSuggestEnabled</key>
5227 <true/> | <false/>
5228 </dict>
5229 ```
5230 #### policies.json
5231 ```
5232 {
5233 "policies": {
5234 "SearchSuggestEnabled": true | false
5235 }
5236 }
5237 ```
5238 ### SecurityDevices
5239
5240 Install PKCS #11 modules.
5241
5242 **Compatibility:** Firefox 64, Firefox ESR 60.4\
5243 **CCK2 Equivalent:** `certs.devices`\
5244 **Preferences Affected:** N/A
5245
5246 #### Windows (GPO)
5247 ```
5248 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
5249 ```
5250 #### Windows (Intune)
5251 OMA-URI:
5252 ```
5253 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
5254 ```
5255 Value (string):
5256 ```
5257 <enabled/>
5258 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
5259 ```
5260 #### macOS
5261 ```
5262 <dict>
5263 <key>SecurityDevices</key>
5264 <dict>
5265 <key>NAME_OF_DEVICE</key>
5266 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
5267 </dict>
5268 </dict>
5269 ```
5270
5271 #### policies.json
5272 ```
5273 {
5274 "policies": {
5275 "SecurityDevices": {
5276 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
5277 }
5278 }
5279 }
5280 ```
5281 ### ShowHomeButton
5282 Show the home button on the toolbar.
5283
5284 Future versions of Firefox will not show the home button by default.
5285
5286 **Compatibility:** Firefox 88, Firefox ESR 78.10\
5287 **CCK2 Equivalent:** N/A\
5288 **Preferences Affected:** N/A
5289
5290 #### Windows (GPO)
5291 ```
5292 Software\Policies\Mozilla\Firefox\ShowHomeButton = 0x1 | 0x0
5293 ```
5294 #### Windows (Intune)
5295 OMA-URI:
5296 ```
5297 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ShowHomeButton
5298 ```
5299 Value (string):
5300 ```
5301 <enabled/> or <disabled/>
5302 ```
5303 #### macOS
5304 ```
5305 <dict>
5306 <key>ShowHomeButton</key>
5307 <true/> | <false/>
5308 </dict>
5309 ```
5310 #### policies.json
5311 ```
5312 {
5313 "policies": {
5314 "ShowHomeButton": true | false
5315 }
5316 }
5317 ```
5318 ### SSLVersionMax
5319
5320 Set and lock the maximum version of TLS.
5321
5322 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5323 **CCK2 Equivalent:** N/A\
5324 **Preferences Affected:** `security.tls.version.max`
5325
5326 #### Windows (GPO)
5327 ```
5328 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5329 ```
5330 #### Windows (Intune)
5331 OMA-URI:
5332 ```
5333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
5334 ```
5335 Value (string):
5336 ```
5337 <enabled/>
5338 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5339 ```
5340 #### macOS
5341 ```
5342 <dict>
5343 <key>SSLVersionMax</key>
5344 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5345 </dict>
5346 ```
5347
5348 #### policies.json
5349 ```
5350 {
5351 "policies": {
5352 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5353 }
5354 }
5355 ```
5356 ### SSLVersionMin
5357
5358 Set and lock the minimum version of TLS.
5359
5360 **Compatibility:** Firefox 66, Firefox ESR 60.6\
5361 **CCK2 Equivalent:** N/A\
5362 **Preferences Affected:** `security.tls.version.min`
5363
5364 #### Windows (GPO)
5365 ```
5366 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5367 ```
5368 #### Windows (Intune)
5369 OMA-URI:
5370 ```
5371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
5372 ```
5373 Value (string):
5374 ```
5375 <enabled/>
5376 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
5377 ```
5378 #### macOS
5379 ```
5380 <dict>
5381 <key>SSLVersionMin</key>
5382 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
5383 </dict>
5384 ```
5385
5386 #### policies.json
5387 ```
5388 {
5389 "policies": {
5390 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
5391 }
5392 }
5393 ```
5394 ### SupportMenu
5395 Add a menuitem to the help menu for specifying support information.
5396
5397 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
5398 **CCK2 Equivalent:** helpMenu\
5399 **Preferences Affected:** N/A
5400
5401 #### Windows (GPO)
5402 ```
5403 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
5404 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
5405 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
5406 ```
5407 #### Windows (Intune)
5408 OMA-URI:
5409 ```
5410 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
5411 ```
5412 Value (string):
5413 ```
5414 <enabled/>
5415 <data id="SupportMenuTitle" value="Support Menu"/>
5416 <data id="SupportMenuURL" value="http://example.com/support"/>
5417 <data id="SupportMenuAccessKey" value="S">
5418 ```
5419 #### macOS
5420 ```
5421 <dict>
5422 <key>SupportMenu</key>
5423 <dict>
5424 <key>Title</key>
5425 <string>SupportMenu</string>
5426 <key>URL</key>
5427 <string>http://example.com/support</string>
5428 <key>AccessKey</key>
5429 <string>S</string>
5430 </dict>
5431 </dict>
5432 ```
5433 #### policies.json
5434 ```
5435 {
5436 "policies": {
5437 "SupportMenu": {
5438 "Title": "Support Menu",
5439 "URL": "http://example.com/support",
5440 "AccessKey": "S"
5441 }
5442 }
5443 }
5444 ```
5445 ### UserMessaging
5446
5447 Prevent Firefox from messaging the user in certain situations.
5448
5449 `WhatsNew` Remove the "What's New" icon and menuitem.
5450
5451 `ExtensionRecommendations` If false, don't recommend extensions while the user is visiting web pages.
5452
5453 `FeatureRecommendations` If false, don't recommend browser features.
5454
5455 `UrlbarInterventions` If false, Don't offer Firefox specific suggestions in the URL bar.
5456
5457 `SkipOnboarding` If true, don't show onboarding messages on the new tab page.
5458
5459 **Compatibility:** Firefox 75, Firefox ESR 68.7\
5460 **CCK2 Equivalent:** N/A\
5461 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`, `browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`, `browser.aboutwelcome.enabled`
5462
5463 #### Windows (GPO)
5464 ```
5465 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
5466 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
5467 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
5468 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
5469 Software\Policies\Mozilla\Firefox\UserMessaging\SkipOnboarding = 0x1 | 0x0
5470 ```
5471 #### Windows (Intune)
5472 OMA-URI:
5473 ```
5474 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_WhatsNew
5475 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_ExtensionRecommendations
5476 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_FeatureRecommendations
5477 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_UrlbarInterventions
5478 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~UserMessaging/UserMessaging_SkipOnboarding
5479 ```
5480 Value (string):
5481 ```
5482 <enabled/> or <disabled/>
5483 ```
5484 #### macOS
5485 ```
5486 <dict>
5487 <key>UserMessaging</key>
5488 <dict>
5489 <key>WhatsNew</key>
5490 <true/> | <false/>
5491 <key>ExtensionRecommendations</key>
5492 <true/> | <false/>
5493 <key>FeatureRecommendations</key>
5494 <true/> | <false/>
5495 <key>UrlbarInterventions</key>
5496 <true/> | <false/>
5497 <key>SkipOnboarding</key>
5498 <true/> | <false/>
5499 </dict>
5500 </dict>
5501 ```
5502 #### policies.json
5503 ```
5504 {
5505 "policies": {
5506 "UserMessaging": {
5507 "WhatsNew": true | false,
5508 "ExtensionRecommendations": true | false,
5509 "FeatureRecommendations": true | false,
5510 "UrlbarInterventions": true | false
5511 "SkipOnboarding": true | false
5512 }
5513 }
5514 }
5515 ```
5516 ### WebsiteFilter
5517 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns.
5518 The arrays are limited to 1000 entries each.
5519
5520 If you want to block all URLs, you can use `<all_urls>` or `*://*/*`. You can't have just a `*` on the right side.
5521
5522 For specific protocols, use `https://*/*` or `http://*/*`.
5523
5524 As of Firefox 83 and Firefox ESR 78.5, file URLs are supported.
5525
5526 **Compatibility:** Firefox 60, Firefox ESR 60\
5527 **CCK2 Equivalent:** N/A\
5528 **Preferences Affected:** N/A
5529
5530 #### Windows (GPO)
5531 ```
5532 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
5533 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
5534 ```
5535 #### Windows (Intune)
5536 OMA-URI:
5537 ```
5538 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
5539 ```
5540 Value (string):
5541 ```
5542 <enabled/> <data id="WebsiteFilter" value="1&#xF000;&#60;all_urls&#62;"/>
5543 ```
5544 OMA-URI:
5545 ```
5546 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
5547 ```
5548 Value (string):
5549 ```
5550 <enabled/>
5551 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
5552 ```
5553 #### macOS
5554 ```
5555 <dict>
5556 <key>WebsiteFilter</key>
5557 <dict>
5558 <key>Block</key>
5559 <array>
5560 <string><all_urls></string>
5561 </array>
5562 <key>Exceptions</key>
5563 <array>
5564 <string>http://example.org/*</string>
5565 </array>
5566 </dict>
5567
5568 </dict>
5569 ```
5570 #### policies.json
5571 ```
5572 {
5573 "policies": {
5574 "WebsiteFilter": {
5575 "Block": ["<all_urls>"],
5576 "Exceptions": ["http://example.org/*"]
5577 }
5578 }
5579 }
5580 ```
5581 ### WindowsSSO
5582 Allow Windows single sign-on for Microsoft, work, and school accounts.
5583
5584 If this policy is set to true, Firefox will use credentials stored in Windows to sign in to Microsoft, work, and school accounts.
5585
5586 **Compatibility:** Firefox 91\
5587 **CCK2 Equivalent:** N/A\
5588 **Preferences Affected:** `network.http.windows-sso.enabled`
5589
5590 #### Windows (GPO)
5591 ```
5592 Software\Policies\Mozilla\Firefox\WindowsSSO = 0x1 | 0x0
5593 ```
5594 #### Windows (Intune)
5595 OMA-URI:
5596 ```
5597 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/WindowsSSO
5598 ```
5599 Value (string):
5600 ```
5601 <enabled/> or <disabled/>
5602 ```
5603 #### policies.json
5604 ```
5605 {
5606 "policies": {
5607 "WindowsSSO": true | false
5608 }
5609 }
5610 ```

patrick-canterino.de