]> git.p6c8.net - policy-templates.git/blob - README.md
correct ampersands
[policy-templates.git] / README.md
1 **These policies are in active development and so might contain changes that do not work with current versions of Firefox.**
2
3 **You should use the [officially released versions](https://github.com/mozilla/policy-templates/releases) if you are deploying changes.**
4
5 Policies can be specified using the [Group Policy templates on Windows](https://github.com/mozilla/policy-templates/tree/master/windows), [Intune on Windows](https://support.mozilla.org/kb/managing-firefox-intune), [configuration profiles on macOS](https://github.com/mozilla/policy-templates/tree/master/mac), or by creating a file called `policies.json`. On Windows, create a directory called `distribution` where the EXE is located and place the file there. On Mac, the file goes into `Firefox.app/Contents/Resources/distribution`. On Linux, the file goes into `firefox/distribution`, where `firefox` is the installation directory for firefox, which varies by distribution or you can specify system-wide policy by placing the file in `/etc/firefox/policies`.
6
7 | Policy Name | Description
8 | --- | --- |
9 | **[`AppAutoUpdate`](#appautoupdate)** | Enable or disable automatic application update.
10 | **[`AppUpdateURL`](#appupdateurl)** | Change the URL for application update.
11 | **[`Authentication`](#authentication)** | Configure sites that support integrated authentication.
12 | **[`BlockAboutAddons`](#blockaboutaddons)** | Block access to the Add-ons Manager (about:addons).
13 | **[`BlockAboutConfig`](#blockaboutconfig)** | Block access to about:config.
14 | **[`BlockAboutProfiles`](#blockaboutprofiles)** | Block access to About Profiles (about:profiles).
15 | **[`BlockAboutSupport`](#blockaboutsupport)** | Block access to Troubleshooting Information (about:support).
16 | **[`Bookmarks`](#bookmarks)** | Add bookmarks in either the bookmarks toolbar or menu.
17 | **[`CaptivePortal`](#captiveportal)** | Enable or disable the detection of captive portals.
18 | **[`Certificates`](#certificates)** |
19 | **[`Certificates -> ImportEnterpriseRoots`](#certificates--importenterpriseroots)** | Trust certificates that have been added to the operating system certificate store by a user or administrator.
20 | **[`Certificates -> Install`](#certificates--install)** | Install certificates into the Firefox certificate store.
21 | **[`Cookies`](#cookies)** | Configure cookie preferences.
22 | **[`DisableSetDesktopBackground`](#disablesetdesktopbackground)** | Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
23 | **[`DisableMasterPasswordCreation`](#disablemasterpasswordcreation)** | Remove the master password functionality.
24 | **[`DisableAppUpdate`](#disableappupdate)** | Turn off application updates.
25 | **[`DisableBuiltinPDFViewer`](#disablebuiltinpdfviewer)** | Disable the built in PDF viewer.
26 | **[`DisabledCiphers`](#disabledciphers)** | Disable ciphers.
27 | **[`DisableDefaultBrowserAgent`](#disabledefaultbrowseragent)** | Prevent the default browser agent from taking any actions (Windows only).
28 | **[`DisableDeveloperTools`](#disabledevelopertools)** | Remove access to all developer tools.
29 | **[`DisableFeedbackCommands`](#disablefeedbackcommands)** | Disable the menus for reporting sites.
30 | **[`DisableFirefoxScreenshots`](#disablefirefoxscreenshots)** | Remove access to Firefox Screenshots.
31 | **[`DisableFirefoxAccounts`](#disablefirefoxaccounts)** | Disable Firefox Accounts integration (Sync).
32 | **[`DisableFirefoxStudies`](#disablefirefoxstudies)** | Disable Firefox studies (Shield).
33 | **[`DisableForgetButton`](#disableforgetbutton)** | Disable the "Forget" button.
34 | **[`DisableFormHistory`](#disableformhistory)** | Turn off saving information on web forms and the search bar.
35 | **[`DisablePasswordReveal`](#disablepasswordreveal)** | Do not allow passwords to be revealed in saved logins.
36 | **[`DisablePocket`](#disablepocket)** | Remove Pocket in the Firefox UI.
37 | **[`DisablePrivateBrowsing`](#disableprivatebrowsing)** | Remove access to private browsing.
38 | **[`DisableProfileImport`](#disableprofileimport)** | Disables the "Import data from another browser" option in the bookmarks window.
39 | **[`DisableProfileRefresh`](#disableprofilerefresh)** | Disable the Refresh Firefox button on about:support and support.mozilla.org
40 | **[`DisableSafeMode`](#disablesafemode)** | Disable safe mode within the browser.
41 | **[`DisableSecurityBypass`](#disablesecuritybypass)** | Prevent the user from bypassing security in certain cases.
42 | **[`DisableSystemAddonUpdate`](#disablesystemaddonupdate)** | Prevent system add-ons from being installed or update.
43 | **[`DisableTelemetry`](#disabletelemetry)** | DisableTelemetry
44 | **[`DisplayBookmarksToolbar`](#displaybookmarkstoolbar)** | Set the initial state of the bookmarks toolbar.
45 | **[`DisplayMenuBar (Deprecated)`](#displaymenubar-deprecated)** | Set the initial state of the menubar.
46 | **[`DisplayMenuBar`](#displaymenubar)** | Set the state of the menubar.
47 | **[`DNSOverHTTPS`](#dnsoverhttps)** | Configure DNS over HTTPS.
48 | **[`DontCheckDefaultBrowser`](#dontcheckdefaultbrowser)** | Don't check if Firefox is the default browser at startup.
49 | **[`DefaultDownloadDirectory`](#defaultdownloaddirectory)** | Set the default download directory.
50 | **[`DownloadDirectory`](#downloaddirectory)** | Set and lock the download directory.
51 | **[`EnableTrackingProtection`](#enabletrackingprotection)** | Configure tracking protection.
52 | **[`EncryptedMediaExtensions`](#encryptedmediaextensions)** | Enable or disable Encrypted Media Extensions and optionally lock it.
53 | **[`EnterprisePoliciesEnabled`](#enterprisepoliciesenabled)** | Enable policy support on macOS.
54 | **[`Extensions`](#extensions)** | Control the installation, uninstallation and locking of extensions.
55 | **[`ExtensionSettings`](#extensionsettings)** | Manage all aspects of extensions.
56 | **[`ExtensionUpdate`](#extensionupdate)** | Control extension updates.
57 | **[`FlashPlugin`](#flashplugin)** | Configure the default Flash plugin policy as well as origins for which Flash is allowed.
58 | **[`FirefoxHome`](#firefoxhome)** | Customize the Firefox Home page.
59 | **[`HardwareAcceleration`](#hardwareacceleration)** | Control hardware acceleration.
60 | **[`Handlers`](#handlers)** | Configure default application handlers.
61 | **[`Homepage`](#homepage)** | Configure the default homepage and how Firefox starts.
62 | **[`InstallAddonsPermission`](#installaddonspermission)** | Configure the default extension install policy as well as origins for extension installs are allowed.
63 | **[`LegacyProfiles`](#legacyprofiles)** | Disable the feature enforcing a separate profile for each installation.
64 | **[`LocalFileLinks`](#localfilelinks)** | Enable linking to local files by origin.
65 | **[`NetworkPrediction`](#networkprediction)** | Enable or disable network prediction (DNS prefetching).
66 | **[`NewTabPage`](#newtabpage)** | Enable or disable the New Tab page.
67 | **[`NoDefaultBookmarks`](#nodefaultbookmarks)** | Disable the creation of default bookmarks.
68 | **[`OfferToSaveLogins`](#offertosavelogins)** | Control whether or not Firefox offers to save passwords.
69 | **[`OfferToSaveLoginsDefault`](#offertosaveloginsdefault)** | Set the default value for whether or not Firefox offers to save passwords.
70 | **[`OverrideFirstRunPage`](#overridefirstrunpage)** | Override the first run page.
71 | **[`OverridePostUpdatePage`](#overridepostupdatepage)** | Override the upgrade page.
72 | **[`PasswordManagerEnabled`](#passwordmanagerenabled)** | Remove (some) access to the password manager.
73 | **[`PDFjs`](#pdfjs)** | Disable or configure PDF.js, the built-in PDF viewer.
74 | **[`Permissions`](#permissions)** | Set permissions associated with camera, microphone, location, and notifications.
75 | **[`PictureInPicture`](#pictureinpicture)** | Enable or disable Picture-in-Picture.
76 | **[`PopupBlocking`](#popupblocking)** | Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
77 | **[`Preferences`](#preferences)** | Set and lock some preferences.
78 | **[`PromptForDownloadLocation`](#promptfordownloadlocation)** | Ask where to save each file before downloading.
79 | **[`Proxy`](#proxy)** | Configure proxy settings.
80 | **[`RequestedLocales`](#requestedlocales)** | Set the the list of requested locales for the application in order of preference.
81 | **[`SanitizeOnShutdown` (All)](#sanitizeonshutdown-all)** | Clear all data on shutdown.
82 | **[`SanitizeOnShutdown` (Selective)](#sanitizeonshutdown-selective)** | Clear data on shutdown.
83 | **[`SearchBar`](#searchbar)** | Set whether or not search bar is displayed.
84 | **[`SearchEngines`](#searchengines-this-policy-is-only-available-on-the-esr)** |
85 | **[`SearchEngines -> Default`](#searchengines--default)** | Set the default search engine.
86 | **[`SearchEngines -> PreventInstalls`](#searchengines--preventinstalls)** | Prevent installing search engines from webpages.
87 | **[`SearchEngines -> Remove`](#searchengines--remove)** | Hide built-in search engines.
88 | **[`SearchEngines -> Add`](#searchengines--add)** | Add new search engines.
89 | **[`SearchSuggestEnabled`](#searchsuggestenabled)** | Enable search suggestions.
90 | **[`SecurityDevices`](#securitydevices)** | Install PKCS #11 modules.
91 | **[`SSLVersionMax`](#sslversionmax)** | Set and lock the maximum version of TLS.
92 | **[`SSLVersionMin`](#sslversionmin)** | Set and lock the minimum version of TLS.
93 | **[`SupportMenu`](#supportmenu)** | Add a menuitem to the help menu for specifying support information.
94 | **[`UserMessaging`](#usermessaging)** | Don't show certain messages to the user.
95 | **[`WebsiteFilter`](#websitefilter)** | Block websites from being visited.
96
97 ### AppAutoUpdate
98
99 Enable or disable **automatic** application update.
100
101 If set to true, application updates are installed without user approval.
102
103 If set to false, application updates are downloaded but the user can choose when to install the update.
104
105 If you have disabled updates via DisableAppUpdate, this policy has no effect.
106
107 **Compatibility:** Firefox 75, Firefox ESR 68.7\
108 **CCK2 Equivalent:** N/A\
109 **Preferences Affected:** app.update.auto
110
111 #### Windows (GPO)
112 ```
113 Software\Policies\Mozilla\Firefox\AppAutoUpdate = 0x1 | 0x0
114 ```
115 #### Windows (Intune)
116 OMA-URI:
117 ```
118 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppAutoUpdate
119 ```
120 Value (string):
121 ```
122 <enabled/> or <disabled/>
123 ```
124 #### macOS
125 ```
126 <dict>
127 <key>AppAutoUpdate</key>
128 <true/> | <false/>
129 </dict>
130 ```
131 #### policies.json
132 ```
133 {
134 "policies": {
135 "AppAutoUpdate": true | false
136 }
137 }
138 ```
139 ### AppUpdateURL
140
141 Change the URL for application update.
142
143 **Compatibility:** Firefox 62, Firefox ESR 60.2\
144 **CCK2 Equivalent:** N/A\
145 **Preferences Affected:** `app.update.url`
146
147 #### Windows (GPO)
148 ```
149 Software\Policies\Mozilla\Firefox\AppUpdateURL = "https://yoursite.com"
150 ```
151 #### Windows (Intune)
152 OMA-URI:
153 ```
154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/AppUpdateURL
155 ```
156 Value (string):
157 ```
158 <enabled/>
159 <data id="AppUpdateURL" value="https://yoursite.com"/>
160 ```
161 #### macOS
162 ```
163 <dict>
164 <key>AppUpdateURL</key>
165 <string>https://yoursite.com</string>
166 </dict>
167 ```
168 #### policies.json
169 ```
170 {
171 "policies": {
172 "AppUpdateURL": "https://yoursite.com"
173 }
174 }
175 ```
176 ### Authentication
177
178 Configure sites that support integrated authentication.
179
180 See https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication for more information.
181
182 `PrivateBrowsing` enables integrated authentication in prviate browsing.
183
184 **Compatibility:** Firefox 60, Firefox ESR 60 (AllowNonFQDN added in 62/60.2, AllowProxies added in 70/68.2, Locked added in 71/68.3, PrivateBrowsing added in 77/68.9)\
185 **CCK2 Equivalent:** N/A\
186 **Preferences Affected:** `network.negotiate-auth.trusted-uris`,`network.negotiate-auth.delegation-uris`,`network.automatic-ntlm-auth.trusted-uris`,`network.automatic-ntlm-auth.allow-non-fqdn`,`network.negotiate-auth.allow-non-fqdn`,`network.automatic-ntlm-auth.allow-proxies`,`network.negotiate-auth.allow-proxies`,`network.auth.private-browsing-sso`
187
188 #### Windows (GPO)
189 ```
190 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\1 = "mydomain.com"
191 Software\Policies\Mozilla\Firefox\Authentication\SPNEGO\2 = "https://myotherdomain.com"
192 Software\Policies\Mozilla\Firefox\Authentication\Delegated\1 = "mydomain.com"
193 Software\Policies\Mozilla\Firefox\Authentication\Delegated\2 = "https://myotherdomain.com"
194 Software\Policies\Mozilla\Firefox\Authentication\NTLM\1 = "mydomain.com"
195 Software\Policies\Mozilla\Firefox\Authentication\NTLM\2 = "https://myotherdomain.com"
196 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\SPNEGO = 0x1 | 0x0
197 Software\Policies\Mozilla\Firefox\Authentication\AllowNonFQDN\NTLM = 0x1 | 0x0
198 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\SPNEGO = 0x1 | 0x0
199 Software\Policies\Mozilla\Firefox\Authentication\AllowProxies\NTLM = 0x1 | 0x0
200 Software\Policies\Mozilla\Firefox\Authentication\Locked = 0x1 | 0x0
201 Software\Policies\Mozilla\Firefox\Authentication\PrivateBrowsing = 0x1 | 0x0
202 ```
203 #### Windows (Intune)
204 OMA-URI:
205 ```
206 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_SPNEGO
207 ```
208 Value (string):
209 ```
210 <enabled/>
211 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
212 ```
213 OMA-URI:
214 ```
215 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Delegated
216 ```
217 Value (string):
218 ```
219 <enabled/>
220 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
221 ```
222 OMA-URI:
223 ```
224 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_NTLM
225 ```
226 Value (string):
227 ```
228 <enabled/>
229 <data id="Authentication" value="1&#xF000;mydomain&#xF000;2&#xF000;https://myotherdomain.com"/>
230 ```
231 OMA-URI:
232 ```
233 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_AllowNonFQDN
234 ```
235 Value (string):
236 ```
237 <enabled/>
238 <data id="Authentication_AllowNonFQDN_NTLM" value="true | false"/>
239 <data id="Authentication_AllowNonFQDN_SPNEGO" value="true | false"/>
240 ```
241 OMA-URI:
242 ```
243 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_Locked
244 ```
245 Value (string):
246 ```
247 <enabled/> or <disabled/>
248 ```
249 OMA-URI:
250 ```
251 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Authentication/Authentication_PrivateBrowsing
252 ```
253 Value (string):
254 ```
255 <enabled/> or <disabled/>
256 ```
257 #### macOS
258 ```
259 <dict>
260 <key>Authentication</key>
261 <dict>
262 <key>SPNEGO</key>
263 <array>
264 <string>mydomain.com</string>
265 <string>https://myotherdomain.com</string>
266 </array>
267 <key>Delegated</key>
268 <array>
269 <string>mydomain.com</string>
270 <string>https://myotherdomain.com</string>
271 </array>
272 <key>NTLM</key>
273 <array>
274 <string>mydomain.com</string>
275 <string>https://myotherdomain.com</string>
276 </array>
277 <key>AllowNonFQDN</key>
278 <dict>
279 <key>SPNEGO</key>
280 <true/> | <false/>
281 <key>NTLM</key>
282 <true/> | <false/>
283 </dict>
284 <key>AllowProxies</key>
285 <dict>
286 <key>SPNEGO</key>
287 <true/> | <false/>
288 <key>NTLM</key>
289 <true/> | <false/>
290 </dict>
291 <key>Locked</key>
292 <true/> | <false/>
293 <key>PrivateBrowsing</key>
294 <true/> | <false/>
295 </dict>
296 </dict>
297 ```
298 #### policies.json
299 ```
300 {
301 "policies": {
302 "Authentication": {
303 "SPNEGO": ["mydomain.com", "https://myotherdomain.com"],
304 "Delegated": ["mydomain.com", "https://myotherdomain.com"],
305 "NTLM": ["mydomain.com", "https://myotherdomain.com"],
306 "AllowNonFQDN": {
307 "SPNEGO": true | false,
308 "NTLM": true | false
309 },
310 "AllowProxies": {
311 "SPNEGO": true | false,
312 "NTLM": true | false
313 },
314 "Locked": true | false,
315 "PrivateBrowsing": true | false
316 }
317 }
318 }
319 ```
320 ### BlockAboutAddons
321
322 Block access to the Add-ons Manager (about:addons).
323
324 **Compatibility:** Firefox 60, Firefox ESR 60\
325 **CCK2 Equivalent:** `disableAddonsManager`\
326 **Preferences Affected:** N/A
327
328 #### Windows (GPO)
329 ```
330 Software\Policies\Mozilla\Firefox\BlockAboutAddons = 0x1 | 0x0
331 ```
332 #### Windows (Intune)
333 OMA-URI:
334 ```
335 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutAddons
336 ```
337 Value (string):
338 ```
339 <enabled/> or <disabled/>
340 ```
341 #### macOS
342 ```
343 <dict>
344 <key>BlockAboutAddons</key>
345 <true/> | <false/>
346 </dict>
347 ```
348 #### policies.json
349 ```
350 {
351 "policies": {
352 "BlockAboutAddons": true | false
353 }
354 }
355 ```
356 ### BlockAboutConfig
357
358 Block access to about:config.
359
360 **Compatibility:** Firefox 60, Firefox ESR 60\
361 **CCK2 Equivalent:** `disableAboutConfig`\
362 **Preferences Affected:** N/A
363
364 #### Windows (GPO)
365 ```
366 Software\Policies\Mozilla\Firefox\BlockAboutConfig = 0x1 | 0x0
367 ```
368 #### Windows (Intune)
369 OMA-URI:
370 ```
371 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutConfig
372 ```
373 Value (string):
374 ```
375 <enabled/> or <disabled/>
376 ```
377 #### macOS
378 ```
379 <dict>
380 <key>BlockAboutConfig</key>
381 <true/> | <false/>
382 </dict>
383 ```
384 #### policies.json
385 ```
386 {
387 "policies": {
388 "BlockAboutConfig": true | false
389 }
390 }
391 ```
392 ### BlockAboutProfiles
393
394 Block access to About Profiles (about:profiles).
395
396 **Compatibility:** Firefox 60, Firefox ESR 60\
397 **CCK2 Equivalent:** `disableAboutProfiles`\
398 **Preferences Affected:** N/A
399
400 #### Windows (GPO)
401 ```
402 Software\Policies\Mozilla\Firefox\BlockAboutProfiles = 0x1 | 0x0
403 ```
404 #### Windows (Intune)
405 OMA-URI:
406 ```
407 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutProfiles
408 ```
409 Value (string):
410 ```
411 <enabled/> or <disabled/>
412 ```
413 #### macOS
414 ```
415 <dict>
416 <key>BlockAboutProfiles</key>
417 <true/> | <false/>
418 </dict>
419 ```
420 #### policies.json
421 ```
422 {
423 "policies": {
424 "BlockAboutProfiles": true | false
425 }
426 }
427 ```
428 ### BlockAboutSupport
429
430 Block access to Troubleshooting Information (about:support).
431
432 **Compatibility:** Firefox 60, Firefox ESR 60\
433 **CCK2 Equivalent:** `disableAboutSupport`\
434 **Preferences Affected:** N/A
435
436 #### Windows (GPO)
437 ```
438 Software\Policies\Mozilla\Firefox\BlockAboutSupport = 0x1 | 0x0
439 ```
440 #### Windows (Intune)
441 OMA-URI:
442 ```
443 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/BlockAboutSupport
444 ```
445 Value (string):
446 ```
447 <enabled/> or <disabled/>
448 ```
449 #### macOS
450 ```
451 <dict>
452 <key>BlockAboutSupport</key>
453 <true/> | <false/>
454 </dict>
455 ```
456 #### policies.json
457 ```
458 {
459 "policies": {
460 "BlockAboutSupport": true | false
461 }
462 }
463 ```
464 ### Bookmarks
465
466 Add bookmarks in either the bookmarks toolbar or menu. Only `Title` and `URL` are required. If `Placement` is not specified, the bookmark will be placed on the toolbar. If `Folder` is specified, it is automatically created and bookmarks with the same folder name are grouped together.
467
468 **Compatibility:** Firefox 60, Firefox ESR 60\
469 **CCK2 Equivalent:** `bookmarks.toolbar`,`bookmarks.menu`\
470 **Preferences Affected:** N/A
471
472 #### Windows (GPO)
473 ```
474 Software\Policies\Mozilla\Firefox\Bookmarks\1\Title = "Example"
475 Software\Policies\Mozilla\Firefox\Bookmarks\1\URL = "https://example.com"
476 Software\Policies\Mozilla\Firefox\Bookmarks\1\Favicon = "https://example.com/favicon.ico"
477 Software\Policies\Mozilla\Firefox\Bookmarks\1\Placement = "toolbar" | "menu"
478 Software\Policies\Mozilla\Firefox\Bookmarks\1\Folder = "FolderName"
479 ```
480 #### Windows (Intune)
481 OMA-URI:
482 ```
483 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Bookmarks/Bookmark01
484 ```
485 Value (string):
486 ```
487 <enabled/>
488 <data id="BookmarkTitle" value="Example"/>
489 <data id="BookmarkURL" value="https://example.com"/>
490 <data id="BookmarkFavicon" value="https://example.com/favicon.ico"/>
491 <data id="BookmarkPlacement" value="toolbar | menu"/>
492 <data id="BookmarkFolder" value="FolderName"/>
493 ```
494 #### macOS
495 ```
496 <dict>
497 <key>Bookmarks</key>
498 <array>
499 <dict>
500 <key>Title</key>
501 <string>Example</string>
502 <key>URL</key>
503 <string>https://example.com</string>
504 <key>Favicon</key>
505 <string>https://example.com/favicon.ico</string>
506 <key>Placement</key>
507 <string>toolbar | menu</string>
508 <key>Folder</key>
509 <string>FolderName</string>
510 </dict>
511 </array>
512 </dict>
513 ```
514 #### policies.json
515 ```
516 {
517 "policies": {
518 "Bookmarks": [
519 {
520 "Title": "Example",
521 "URL": "https://example.com",
522 "Favicon": "https://example.com/favicon.ico",
523 "Placement": "toolbar" | "menu",
524 "Folder": "FolderName"
525 }
526 ]
527 }
528 }
529 ```
530 ### CaptivePortal
531 Enable or disable the detection of captive portals.
532
533 **Compatibility:** Firefox 67, Firefox ESR 60.7\
534 **CCK2 Equivalent:** N/A\
535 **Preferences Affected:** `network.captive-portal-service.enabled`
536
537 #### Windows (GPO)
538 ```
539 Software\Policies\Mozilla\Firefox\CaptivePortal = 0x1 | 0x0
540 ```
541 #### Windows (Intune)
542 OMA-URI:
543 ```
544 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CaptivePortal
545 ```
546 Value (string):
547 ```
548 <enabled/> or <disabled/>
549 ```
550 #### macOS
551 ```
552 <dict>
553 <key>CaptivePortal</key>
554 <true/> | <false/>
555 </dict>
556 ```
557 #### policies.json
558 ```
559 {
560 "policies": {
561 "CaptivePortal": true | false
562 }
563 }
564 ```
565 ### Certificates
566
567 ### Certificates | ImportEnterpriseRoots
568
569 Trust certificates that have been added to the operating system certificate store by a user or administrator.
570
571 Note: This policy only works on Windows and macOS. For Linux discussion, see [bug 1600509](https://bugzilla.mozilla.org/show_bug.cgi?id=1600509).
572
573 See https://support.mozilla.org/kb/setting-certificate-authorities-firefox for more detail.
574
575 **Compatibility:** Firefox 60, Firefox ESR 60 (macOS support in Firefox 63, Firefox ESR 68)\
576 **CCK2 Equivalent:** N/A\
577 **Preferences Affected:** `security.enterprise_roots.enabled`
578
579 #### Windows (GPO)
580 ```
581 Software\Policies\Mozilla\Firefox\Certificates\ImportEnterpriseRoots = 0x1 | 0x0
582 ```
583 #### Windows (Intune)
584 OMA-URI:
585 ```
586 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_ImportEnterpriseRoots
587 ```
588 Value (string):
589 ```
590 <enabled/> or <disabled/>
591 ```
592 #### macOS
593 ```
594 <dict>
595 <key>Certificates</key>
596 <dict>
597 <key>ImportEnterpriseRoots</key>
598 <true/> | <false/>
599 </dict>
600 </dict>
601 ```
602 #### policies.json
603 ```
604 {
605 "policies": {
606 "Certificates": {
607 "ImportEnterpriseRoots": true | false
608 }
609 }
610 }
611 ```
612 ### Certificates | Install
613
614 Install certificates into the Firefox certificate store. If only a filename is specified, Firefox searches for the file in the following locations:
615
616 - Windows
617 - %USERPROFILE%\AppData\Local\Mozilla\Certificates
618 - %USERPROFILE%\AppData\Roaming\Mozilla\Certificates
619 - macOS
620 - /Library/Application Support/Mozilla/Certificates
621 - ~/Library/Application Support/Mozilla/Certificates
622 - Linux
623 - /usr/lib/mozilla/certificates
624 - /usr/lib64/mozilla/certificates
625 - ~/.mozilla/certificates
626
627 Starting with Firefox 65, Firefox 60.5 ESR, a fully qualified path can be used, including UNC paths. You should use the native path style for your operating system. We do not support using %USERPROFILE% or other environment variables on Windows.
628
629 If you are specifying the path in the policies.json file on Windows, you need to escape your backslashes (`\\`) which means that for UNC paths, you need to escape both (`\\\\`). If you use group policy, you only need one backslash.
630
631 Certificates are installed using the trust string `CT,CT,`.
632
633 Binary (DER) and ASCII (PEM) certificates are both supported.
634
635 **Compatibility:** Firefox 64, Firefox ESR 64\
636 **CCK2 Equivalent:** `certs.ca`\
637 **Preferences Affected:** N/A
638
639 #### Windows (GPO)
640 ```
641 Software\Policies\Mozilla\Firefox\Certificates\Install\1 = "cert1.der"
642 Software\Policies\Mozilla\Firefox\Certificates\Install\2 = "C:\Users\username\cert2.pem"
643 ```
644 #### Windows (Intune)
645 OMA-URI:
646 ```
647 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Certificates/Certificates_Install
648 ```
649 Value (string):
650 ```
651 <enabled/>
652 <data id="Certificates_Install" value="1&#xF000;cert1.der&#xF000;2&#xF000;C:\Users\username\cert2.pem"/>
653 ```
654 #### macOS
655 ```
656 <dict>
657 <key>Certificates</key>
658 <dict>
659 <key>Install</key>
660 <array>
661 <string>cert1.der</string>
662 <string>/Users/username/cert2.pem</string>
663 </array>
664 </dict>
665 </dict>
666 ```
667 #### policies.json
668 ```
669 {
670 "policies": {
671 "Certificates": {
672 "Install": ["cert1.der", "/home/username/cert2.pem"]
673 }
674 }
675 }
676 ```
677 ### Cookies
678 Configure cookie preferences.
679
680 `Allow` is a list of origins (not domains) where cookies are always allowed. You must include http or https.
681
682 `Block` is a list of origins (not domains) where cookies are always blocked. You must include http or https.
683
684 `Default` determines whether cookies are accepted at all.
685
686 `AcceptThirdParty` determines how third-party cookies are handled.
687
688 `ExpireAtSessionEnd` determines when cookies expire.
689
690 `RejectTracker` only rejects cookies for trackers.
691
692 `Locked` prevents the user from changing cookie preferences.
693
694 **Compatibility:** Firefox 60, Firefox ESR 60 (RejectTracker was added in Firefox 63)\
695 **CCK2 Equivalent:** N/A\
696 **Preferences Affected:** `network.cookie.cookieBehavior`,`network.cookie.lifetimePolicy`
697
698 #### Windows (GPO)
699 ```
700 Software\Policies\Mozilla\Firefox\Cookies\Allow\1 = "https://example.com"
701 Software\Policies\Mozilla\Firefox\Cookies\Block\1 = "https://example.org"
702 Software\Policies\Mozilla\Firefox\Cookies\Default = 0x1 | 0x0
703 Software\Policies\Mozilla\Firefox\Cookies\AcceptThirdParty = "always" | "never" | "from-visited"
704 Software\Policies\Mozilla\Firefox\Cookies\ExpireAtSessionEnd = 0x1 | 0x0
705 Software\Policies\Mozilla\Firefox\Cookies\RejectTracker = 0x1 | 0x0
706 Software\Policies\Mozilla\Firefox\Cookies\Locked = 0x1 | 0x0
707 ```
708 #### Windows (Intune)
709 OMA-URI:
710 ```
711 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Allow
712 ```
713 Value (string):
714 ```
715 <enabled/>
716 <data id="Cookies_Allow" value="1&#xF000;https://example.com"/>
717 ```
718 OMA-URI:
719 ```
720 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Block
721 ```
722 Value (string):
723 ```
724 <enabled/>
725 <data id="Cookies_Block" value="1&#xF000;https://example.org"/>
726 ```
727 OMA-URI:
728 ```
729 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Default
730 ```
731 Value (string):
732 ```
733 <enabled/> or <disabled/>
734 ```
735 OMA-URI:
736 ```
737 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_AcceptThirdParty
738 ```
739 Value (string):
740 ```
741 <enabled/>
742 <data id="Cookies_AcceptThirdParty" value="always | never | from-visited"/>
743 ```
744 OMA-URI:
745 ```
746 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_ExpireAtSessionEnd
747 ```
748 Value (string):
749 ```
750 <enabled/> or <disabled/>
751 ```
752 OMA-URI:
753 ```
754 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_RejectTracker
755 ```
756 Value (string):
757 ```
758 <enabled/> or <disabled/>
759 ```
760 OMA-URI:
761 ```
762 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Cookies/Cookies_Locked
763 ```
764 Value (string):
765 ```
766 <enabled/> or <disabled/>
767 ```
768 #### macOS
769 ```
770 <dict>
771 <key>Cookies</key>
772 <dict>
773 <key>Allow</key>
774 <array>
775 <string>http://example.com</string>
776 </array>
777 <key>Block</key>
778 <array>
779 <string>http://example.org</string>
780 </array>
781 <key>Default</key>
782 <true/> | <false/>
783 <key>AcceptThirdParty</key>
784 <string>always | never | from-visited</string>
785 <key>ExpireAtSessionEnd</key>
786 <true/> | <false/>
787 <key>RejectTracker</key>
788 <true/> | <false/>
789 <key>Locked</key>
790 <true/> | <false/>
791 </dict>
792 </dict>
793 ```
794 #### policies.json
795 ```
796 {
797 "policies": {
798 "Cookies": {
799 "Allow": ["http://example.org/"],
800 "Block": ["http://example.edu/"],
801 "Default": true | false,
802 "AcceptThirdParty": "always" | "never" | "from-visited",
803 "ExpireAtSessionEnd": true | false,
804 "RejectTracker": true | false,
805 "Locked": true | false
806 }
807 }
808 }
809 ```
810 ### DisableSetDesktopBackground
811 Remove the "Set As Desktop Background..." menuitem when right clicking on an image.
812
813 **Compatibility:** Firefox 60, Firefox ESR 60\
814 **CCK2 Equivalent:** `removeSetDesktopBackground`\
815 **Preferences Affected:** N/A
816
817 #### Windows (GPO)
818 ```
819 Software\Policies\Mozilla\Firefox\DisableSetDesktopBackground = 0x1 | 0x0
820 ```
821 #### Windows (Intune)
822 OMA-URI:
823 ```
824 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSetDesktopBackground
825 ```
826 Value (string):
827 ```
828 <enabled/> or <disabled/>
829 ```
830 #### macOS
831 ```
832 <dict>
833 <key>DisableSetDesktopBackground</key>
834 <true/> | <false/>
835 </dict>
836 ```
837 #### policies.json
838 ```
839 {
840 "policies": {
841 "DisableSetDesktopBackground": true | false
842 }
843 }
844 ```
845 ### DisableMasterPasswordCreation
846 Remove the master password functionality.
847
848 **Compatibility:** Firefox 60, Firefox ESR 60\
849 **CCK2 Equivalent:** `noMasterPassword`\
850 **Preferences Affected:** N/A
851
852 #### Windows (GPO)
853 ```
854 Software\Policies\Mozilla\Firefox\DisableMasterPasswordCreation = 0x1 | 0x0
855 ```
856 #### Windows (Intune)
857 OMA-URI:
858 ```
859 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableMasterPasswordCreation
860 ```
861 Value (string):
862 ```
863 <enabled/> or <disabled/>
864 ```
865 #### macOS
866 ```
867 <dict>
868 <key>DisableMasterPasswordCreation</key>
869 <true/> | <false/>
870 </dict>
871 ```
872 #### policies.json
873 ```
874 {
875 "policies": {
876 "DisableMasterPasswordCreation": true | false
877 }
878 }
879 ```
880 ### DisableAppUpdate
881 Turn off application updates.
882
883 **Compatibility:** Firefox 60, Firefox ESR 60\
884 **CCK2 Equivalent:** `disableFirefoxUpdates`\
885 **Preferences Affected:** N/A
886
887 #### Windows (GPO)
888 ```
889 Software\Policies\Mozilla\Firefox\DisableAppUpdate = 0x1 | 0x0
890 ```
891 #### Windows (Intune)
892 OMA-URI:
893 ```
894 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableAppUpdate
895 ```
896 Value (string):
897 ```
898 <enabled/> or <disabled/>
899 ```
900 #### macOS
901 ```
902 <dict>
903 <key>DisableAppUpdate</key>
904 <true/> | <false/>
905 </dict>
906 ```
907 #### policies.json
908 ```
909 {
910 "policies": {
911 "DisableAppUpdate": true | false
912 }
913 }
914 ```
915 ### DisableBuiltinPDFViewer
916 Disable the built in PDF viewer. PDF files are downloaded and sent externally.
917
918 **Compatibility:** Firefox 60, Firefox ESR 60\
919 **CCK2 Equivalent:** `disablePDFjs`\
920 **Preferences Affected:** `pdfjs.disabled`
921
922 #### Windows (GPO)
923 ```
924 Software\Policies\Mozilla\Firefox\DisableBuiltinPDFViewer = 0x1 | 0x0
925 ```
926 #### Windows (Intune)
927 OMA-URI:
928 ```
929 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableBuiltinPDFViewer
930 ```
931 Value (string):
932 ```
933 <enabled/> or <disabled/>
934 ```
935 #### macOS
936 ```
937 <dict>
938 <key>DisableBuiltinPDFViewer</key>
939 <true/> | <false/>
940 </dict>
941 ```
942 #### policies.json
943 ```
944 {
945 "policies": {
946 "DisableBuiltinPDFViewer": true | false
947 }
948 }
949 ```
950 ### DisabledCiphers
951 Disable specific cryptographic ciphers.
952
953 ---
954 **Note:**
955
956 This policy was updated in Firefox 78 to allow enabling ciphers as well. Setting the value to true disables the cipher, setting the value to false enables the cipher. Previously setting the value to true or false disabled the cipher.
957
958 ---
959 **Compatibility:** Firefox 76, Firefox ESR 68.8 (TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 were added in Firefox 78)\
960 **CCK2 Equivalent:** N/A\
961 **Preferences Affected:** N/A
962
963 #### Windows (GPO)
964 ```
965 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
966 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
967 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
968 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
969 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
970 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
971 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_CBC_SHA = 0x1 | 0x0
972 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_CBC_SHA = 0x1 | 0x0
973 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_3DES_EDE_CBC_SHA = 0x1 | 0x0
974 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x1 | 0x0
975 Software\Policies\Mozilla\Firefox\DisabledCiphers\TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x1 | 0x0
976 ```
977 #### Windows (Intune)
978 OMA-URI:
979 ```
980 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_128_CBC_SHA
981 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
982 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
984 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
985 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
986 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_CBC_SHA
987 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_CBC_SHA
988 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_3DES_EDE_CBC_SHA
989 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_128_GCM_SHA256
990 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DisabledCiphers/DisabledCiphers_TLS_RSA_WITH_AES_256_GCM_SHA384
991 ```
992 Value (string):
993 ```
994 <enabled/> or <disabled/>
995 ```
996 #### macOS
997 ```
998 <dict>
999 <key>DisabledCiphers</key>
1000 <dict>
1001 <key>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</key>
1002 <true/> | <false/>
1003 <key>TLS_DHE_RSA_WITH_AES_256_CBC_SHA</key>
1004 <true/> | <false/>
1005 <key>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</key>
1006 <true/> | <false/>
1007 <key>TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA</key>
1008 <true/> | <false/>
1009 <key>TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</key>
1010 <true/> | <false/>
1011 <key>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</key>
1012 <true/> | <false/>
1013 <key>TLS_RSA_WITH_AES_128_CBC_SHA</key>
1014 <true/> | <false/>
1015 <key>TLS_RSA_WITH_AES_256_CBC_SHA</key>
1016 <true/> | <false/>
1017 <key>TLS_RSA_WITH_3DES_EDE_CBC_SHA</key>
1018 <true/> | <false/>
1019 <key>TLS_RSA_WITH_AES_128_GCM_SHA256</key>
1020 <true/> | <false/>
1021 <key>TLS_RSA_WITH_AES_256_GCM_SHA384</key>
1022 <true/> | <false/>
1023 </dict>
1024 </dict>
1025 ```
1026 #### policies.json
1027 ```
1028 {
1029 "policies": {
1030 "DisabledCiphers" {
1031 "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1032 "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1033 "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": true | false,
1034 "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": true | false,
1035 "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": true | false,
1036 "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": true | false,
1037 "TLS_RSA_WITH_AES_128_CBC_SHA": true | false,
1038 "TLS_RSA_WITH_AES_256_CBC_SHA": true | false,
1039 "TLS_RSA_WITH_3DES_EDE_CBC_SHA": true | false
1040 "TLS_RSA_WITH_AES_128_GCM_SHA256": true | false
1041 "TLS_RSA_WITH_AES_256_GCM_SHA384": true | false
1042 }
1043 }
1044 }
1045 ```
1046 ### DisableDefaultBrowserAgent
1047 Prevent the default browser agent from taking any actions. Only applicable to Windows; other platforms don’t have the agent.
1048
1049 **Compatibility:** Firefox 75, Firefox ESR 68.7 (Windows only)\
1050 **CCK2 Equivalent:** N/A\
1051 **Preferences Affected:** N/A
1052
1053 #### Windows (GPO)
1054 ```
1055 Software\Policies\Mozilla\Firefox\DisableDefaultBrowserAgent = 0x1 | 0x0
1056 ```
1057 #### Windows (Intune)
1058 OMA-URI:
1059 ```
1060 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDefaultBrowserAgent
1061 ```
1062 Value (string):
1063 ```
1064 <enabled/> or <disabled/>
1065 ```
1066 #### policies.json
1067 ```
1068 {
1069 "policies": {
1070 "DisableDefaultBrowserAgent": true | false
1071 }
1072 }
1073 ```
1074 ### DisableDeveloperTools
1075 Remove access to all developer tools.
1076
1077 **Compatibility:** Firefox 60, Firefox ESR 60\
1078 **CCK2 Equivalent:** `removeDeveloperTools`\
1079 **Preferences Affected:** `devtools.policy.disabled`
1080
1081 #### Windows (GPO)
1082 ```
1083 Software\Policies\Mozilla\Firefox\DisableDeveloperTools = 0x1 | 0x0`
1084 ```
1085 #### Windows (Intune)
1086 OMA-URI:
1087 ```
1088 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableDeveloperTools
1089 ```
1090 Value (string):
1091 ```
1092 <enabled/> or <disabled/>
1093 ```
1094 #### macOS
1095 ```
1096 <dict>
1097 <key>DisableDeveloperTools</key>
1098 <true/> | <false/>
1099 </dict>
1100 ```
1101 #### policies.json
1102 ```
1103 {
1104 "policies": {
1105 "DisableDeveloperTools": true | false
1106 }
1107 }
1108 ```
1109 ### DisableFeedbackCommands
1110 Disable the menus for reporting sites (Submit Feedback, Report Deceptive Site).
1111
1112 **Compatibility:** Firefox 60, Firefox ESR 60\
1113 **CCK2 Equivalent:** N/A\
1114 **Preferences Affected:** N/A
1115
1116 #### Windows (GPO)
1117 ```
1118 Software\Policies\Mozilla\Firefox\DisableFeedbackCommands = 0x1 | 0x0
1119 ```
1120 #### Windows (Intune)
1121 OMA-URI:
1122 ```
1123 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFeedbackCommands
1124 ```
1125 Value (string):
1126 ```
1127 <enabled/> or <disabled/>
1128 ```
1129 #### macOS
1130 ```
1131 <dict>
1132 <key>DisableFeedbackCommands</key>
1133 <true/> | <false/>
1134 </dict>
1135 ```
1136 #### policies.json
1137 ```
1138 {
1139 "policies": {
1140 "DisableFeedbackCommands": true | false
1141 }
1142 }
1143 ```
1144 ### DisableFirefoxScreenshots
1145 Remove access to Firefox Screenshots.
1146
1147 **Compatibility:** Firefox 60, Firefox ESR 60\
1148 **CCK2 Equivalent:** N/A\
1149 **Preferences Affected:** `extensions.screenshots.disabled`
1150
1151 #### Windows (GPO)
1152 ```
1153 Software\Policies\Mozilla\Firefox\DisableFirefoxScreenshots = 0x1 | 0x0
1154 ```
1155 #### Windows (Intune)
1156 OMA-URI:
1157 ```
1158 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxScreenshots
1159 ```
1160 Value (string):
1161 ```
1162 <enabled/> or <disabled/>
1163 ```
1164 #### macOS
1165 ```
1166 <dict>
1167 <key>DisableFirefoxScreenshots</key>
1168 <true/> | <false/>
1169 </dict>
1170 ```
1171 #### policies.json
1172 ```
1173 {
1174 "policies": {
1175 "DisableFirefoxScreenshots": true | false
1176 }
1177 }
1178 ```
1179 ### DisableFirefoxAccounts
1180 Disable Firefox Accounts integration (Sync).
1181
1182 **Compatibility:** Firefox 60, Firefox ESR 60\
1183 **CCK2 Equivalent:** `disableSync`\
1184 **Preferences Affected:** `identity.fxaccounts.enabled`
1185
1186 #### Windows (GPO)
1187 ```
1188 Software\Policies\Mozilla\Firefox\DisableFirefoxAccounts = 0x1 | 0x0
1189 ```
1190 #### Windows (Intune)
1191 OMA-URI:
1192 ```
1193 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxAccounts
1194 ```
1195 Value (string):
1196 ```
1197 <enabled/> or <disabled/>
1198 ```
1199 #### macOS
1200 ```
1201 <dict>
1202 <key>DisableFirefoxAccounts</key>
1203 <true/> | <false/>
1204 </dict>
1205 ```
1206 #### policies.json
1207 ```
1208 {
1209 "policies": {
1210 "DisableFirefoxAccounts": true | false
1211 }
1212 }
1213 ```
1214 ### DisableFirefoxStudies
1215 Disable Firefox studies (Shield).
1216
1217 **Compatibility:** Firefox 60, Firefox ESR 60\
1218 **CCK2 Equivalent:** N/A\
1219 **Preferences Affected:** N/A
1220
1221 #### Windows (GPO)
1222 ```
1223 Software\Policies\Mozilla\Firefox\DisableFirefoxStudies = 0x1 | 0x0
1224 ```
1225 #### Windows (Intune)
1226 OMA-URI:
1227 ```
1228 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFirefoxStudies
1229 ```
1230 Value (string):
1231 ```
1232 <enabled/> or <disabled/>
1233 ```
1234 #### macOS
1235 ```
1236 <dict>
1237 <key>DisableFirefoxStudies</key>
1238 <true/> | <false/>
1239 </dict>
1240 ```
1241 #### policies.json
1242 ```
1243 {
1244 "policies": {
1245 "DisableFirefoxStudies": true | false
1246 }
1247 }
1248 ```
1249 ### DisableForgetButton
1250 Disable the "Forget" button.
1251
1252 **Compatibility:** Firefox 60, Firefox ESR 60\
1253 **CCK2 Equivalent:** `disableForget`\
1254 **Preferences Affected:** N/A
1255
1256 #### Windows (GPO)
1257 ```
1258 Software\Policies\Mozilla\Firefox\DisableForgetButton = 0x1 | 0x0
1259 ```
1260 #### Windows (Intune)
1261 OMA-URI:
1262 ```
1263 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableForgetButton
1264 ```
1265 Value (string):
1266 ```
1267 <enabled/> or <disabled/>
1268 ```
1269 #### macOS
1270 ```
1271 <dict>
1272 <key>DisableForgetButton</key>
1273 <true/> | <false/>
1274 </dict>
1275 ```
1276 #### policies.json
1277 ```
1278 {
1279 "policies": {
1280 "DisableForgetButton": true | false
1281 }
1282 }
1283 ```
1284 ### DisableFormHistory
1285 Turn off saving information on web forms and the search bar.
1286
1287 **Compatibility:** Firefox 60, Firefox ESR 60\
1288 **CCK2 Equivalent:** `disableFormFill`\
1289 **Preferences Affected:** ` browser.formfill.enable`
1290
1291 #### Windows (GPO)
1292 ```
1293 Software\Policies\Mozilla\Firefox\DisableFormHistory = 0x1 | 0x0
1294 ```
1295 #### Windows (Intune)
1296 OMA-URI:
1297 ```
1298 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableFormHistory
1299 ```
1300 Value (string):
1301 ```
1302 <enabled/> or <disabled/>
1303 ```
1304 #### macOS
1305 ```
1306 <dict>
1307 <key>DisableFormHistory</key>
1308 <true/> | <false/>
1309 </dict>
1310 ```
1311 #### policies.json
1312 ```
1313 {
1314 "policies": {
1315 "DisableFormHistory": true | false
1316 }
1317 }
1318 ```
1319 ### DisablePasswordReveal
1320 Do not allow passwords to be shown in saved logins
1321
1322 **Compatibility:** Firefox 71, Firefox ESR 68.3\
1323 **CCK2 Equivalent:** N/A
1324 **Preferences Affected:** N/A
1325
1326 #### Windows (GPO)
1327 ```
1328 Software\Policies\Mozilla\Firefox\DisablePasswordReveal = 0x1 | 0x0
1329 ```
1330 #### Windows (Intune)
1331 OMA-URI:
1332 ```
1333 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePasswordReveal
1334 ```
1335 Value (string):
1336 ```
1337 <enabled/> or <disabled/>
1338 ```
1339 #### macOS
1340 ```
1341 <dict>
1342 <key>DisablePasswordReveal</key>
1343 <true/> | <false/>
1344 </dict>
1345 ```
1346 #### policies.json
1347 ```
1348 {
1349 "policies": {
1350 "DisablePasswordReveal": true | false
1351 }
1352 }
1353 ```
1354 ### DisablePocket
1355 Remove Pocket in the Firefox UI. It does not remove it from the new tab page.
1356
1357 **Compatibility:** Firefox 60, Firefox ESR 60\
1358 **CCK2 Equivalent:** `disablePocket`\
1359 **Preferences Affected:** `extensions.pocket.enabled`
1360
1361 #### Windows (GPO)
1362 ```
1363 Software\Policies\Mozilla\Firefox\DisablePocket = 0x1 | 0x0
1364 ```
1365 #### Windows (Intune)
1366 OMA-URI:
1367 ```
1368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePocket
1369 ```
1370 Value (string):
1371 ```
1372 <enabled/> or <disabled/>
1373 ```
1374 #### macOS
1375 ```
1376 <dict>
1377 <key>DisablePocket</key>
1378 <true/> | <false/>
1379 </dict>
1380 ```
1381 #### policies.json
1382 ```
1383 {
1384 "policies": {
1385 "DisablePocket": true | false
1386 }
1387 }
1388 ```
1389 ### DisablePrivateBrowsing
1390 Remove access to private browsing.
1391
1392 **Compatibility:** Firefox 60, Firefox ESR 60\
1393 **CCK2 Equivalent:** `disablePrivateBrowsing`\
1394 **Preferences Affected:** N/A
1395
1396 #### Windows (GPO)
1397 ```
1398 Software\Policies\Mozilla\Firefox\DisablePrivateBrowsing = 0x1 | 0x0
1399 ```
1400 #### Windows (Intune)
1401 OMA-URI:
1402 ```
1403 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisablePrivateBrowsing
1404 ```
1405 Value (string):
1406 ```
1407 <enabled/> or <disabled/>
1408 ```
1409 #### macOS
1410 ```
1411 <dict>
1412 <key>DisablePrivateBrowsing</key>
1413 <true/> | <false/>
1414 </dict>
1415 ```
1416 #### policies.json
1417 ```
1418 {
1419 "policies": {
1420 "DisablePrivateBrowsing": true | false
1421 }
1422 }
1423 ```
1424 ### DisableProfileImport
1425 Disables the "Import data from another browser" option in the bookmarks window.
1426
1427 **Compatibility:** Firefox 60, Firefox ESR 60\
1428 **CCK2 Equivalent:** N/A\
1429 **Preferences Affected:** N/A
1430
1431 #### Windows (GPO)
1432 ```
1433 Software\Policies\Mozilla\Firefox\DisableProfileImport = 0x1 | 0x0
1434 ```
1435 #### Windows (Intune)
1436 OMA-URI:
1437 ```
1438 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileImport
1439 ```
1440 Value (string):
1441 ```
1442 <enabled/> or <disabled/>
1443 ```
1444 #### macOS
1445 ```
1446 <dict>
1447 <key>DisableProfileImport</key>
1448 <true/> | <false/>
1449 </dict>
1450 ```
1451 #### policies.json
1452 ```
1453 {
1454 "policies": {
1455 "DisableProfileImport": true | false
1456 }
1457 }
1458 ```
1459 ### DisableProfileRefresh
1460 Disable the Refresh Firefox button on about:support and support.mozilla.org, as well as the prompt that displays offering to refresh Firefox when you haven't used it in a while.
1461
1462 **Compatibility:** Firefox 60, Firefox ESR 60\
1463 **CCK2 Equivalent:** `disableResetFirefox`\
1464 **Preferences Affected:** `browser.disableResetPrompt`
1465
1466 #### Windows (GPO)
1467 ```
1468 Software\Policies\Mozilla\Firefox\DisableProfileRefresh = 0x1 | 0x0
1469 ```
1470 #### Windows (Intune)
1471 OMA-URI:
1472 ```
1473 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableProfileRefresh
1474 ```
1475 Value (string):
1476 ```
1477 <enabled/> or <disabled/>
1478 ```
1479 #### macOS
1480 ```
1481 <dict>
1482 <key>DisableProfileRefresh</key>
1483 <true/> | <false/>
1484 </dict>
1485 ```
1486 #### policies.json
1487 ```
1488 {
1489 "policies": {
1490 "DisableProfileRefresh": true | false
1491 }
1492 }
1493 ```
1494 ### DisableSafeMode
1495 Disable safe mode within the browser.
1496
1497 On Windows, this disables safe mode via the command line as well.
1498
1499 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, macOS)\
1500 **CCK2 Equivalent:** `disableSafeMode`\
1501 **Preferences Affected:** N/A
1502
1503 #### Windows (GPO)
1504 ```
1505 Software\Policies\Mozilla\Firefox\DisableSafeMode = 0x1 | 0x0
1506 ```
1507 #### Windows (Intune)
1508 OMA-URI:
1509 ```
1510 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSafeMode
1511 ```
1512 Value (string):
1513 ```
1514 <enabled/> or <disabled/>
1515 ```
1516 #### macOS
1517 ```
1518 <dict>
1519 <key>DisableSafeMode</key>
1520 <true/> | <false/>
1521 </dict>
1522 ```
1523 #### policies.json
1524 ```
1525 {
1526 "policies": {
1527 "DisableSafeMode": true | false
1528 }
1529 }
1530 ```
1531 ### DisableSecurityBypass
1532 Prevent the user from bypassing security in certain cases.
1533
1534 `InvalidCertificate` prevents adding an exception when an invalid certificate is shown.
1535
1536 `SafeBrowsing` prevents selecting "ignore the risk" and visiting a harmful site anyway.
1537
1538 **Compatibility:** Firefox 60, Firefox ESR 60\
1539 **CCK2 Equivalent:** N/A\
1540 **Preferences Affected:** `security.certerror.hideAddException`,`browser.safebrowsing.allowOverride`
1541
1542 #### Windows (GPO)
1543 ```
1544 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\InvalidCertificate = 0x1 | 0x0
1545 Software\Policies\Mozilla\Firefox\DisableSecurityBypass\SafeBrowsing = 0x1 | 0x0
1546 ```
1547 #### Windows (Intune)
1548 OMA-URI:
1549 ```
1550 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_InvalidCertificate
1551 ```
1552 Value (string):
1553 ```
1554 <enabled/> or <disabled/>
1555 ```
1556 OMA-URI:
1557 ```
1558 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/P_DisableSecurityBypass_SafeBrowsing
1559 ```
1560 Value (string):
1561 ```
1562 <enabled/> or <disabled/>
1563 ```
1564
1565 #### macOS
1566 ```
1567 <dict>
1568 <key>DisableSecurityBypass</key>
1569 <dict>
1570 <key>InvalidCertificate</key>
1571 <true/> | <false/>
1572 <key><SafeBrowsing/key>
1573 <true/> | <false/>
1574 </dict>
1575 </dict>
1576 ```
1577 #### policies.json
1578 ```
1579 {
1580 "policies": {
1581 "DisableSecurityBypass": {
1582 "InvalidCertificate": true | false,
1583 "SafeBrowsing": true | false
1584 }
1585 }
1586 }
1587 ```
1588 ### DisableSystemAddonUpdate
1589 Prevent system add-ons from being installed or update.
1590
1591 **Compatibility:** Firefox 60, Firefox ESR 60\
1592 **CCK2 Equivalent:** N/A\
1593 **Preferences Affected:** N/A
1594
1595 #### Windows (GPO)
1596 ```
1597 Software\Policies\Mozilla\Firefox\DisableSystemAddonUpdate = 0x1 | 0x0
1598 ```
1599 #### Windows (Intune)
1600 OMA-URI:
1601 ```
1602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableSystemAddonUpdate
1603 ```
1604 Value (string):
1605 ```
1606 <enabled/> or <disabled/>
1607 ```
1608 #### macOS
1609 ```
1610 <dict>
1611 <key>DisableSystemAddonUpdate</key>
1612 <true/> | <false/>
1613 </dict>
1614 ```
1615 #### policies.json
1616 ```
1617 {
1618 "policies": {
1619 "DisableSystemAddonUpdate": true | false
1620 }
1621 }
1622 ```
1623 ### DisableTelemetry
1624 Prevent the upload of telemetry data.
1625
1626 Mozilla recommends that you do not disable telemetry. Information collected through telemetry helps us build a better product for businesses like yours.
1627
1628 **Compatibility:** Firefox 60, Firefox ESR 60\
1629 **CCK2 Equivalent:** `disableTelemetry`\
1630 **Preferences Affected:** `datareporting.healthreport.uploadEnabled,datareporting.policy.dataSubmissionEnabled`
1631
1632 #### Windows (GPO)
1633 ```
1634 Software\Policies\Mozilla\Firefox\DisableTelemetry = 0x1 | 0x0
1635 ```
1636 #### Windows (Intune)
1637 OMA-URI:
1638 ```
1639 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisableTelemetry
1640 ```
1641 Value (string):
1642 ```
1643 <enabled/> or <disabled/>
1644 ```
1645 #### macOS
1646 ```
1647 <dict>
1648 <key>DisableTelemetry</key>
1649 <true/> | <false/>
1650 </dict>
1651 ```
1652 #### policies.json
1653 ```
1654 {
1655 "policies": {
1656 "DisableTelemetry": true | false
1657 }
1658 }
1659 ```
1660 ### DisplayBookmarksToolbar
1661 Set the initial state of the bookmarks toolbar. A user can still hide it and it will stay hidden.
1662
1663 **Compatibility:** Firefox 60, Firefox ESR 60\
1664 **CCK2 Equivalent:** `displayBookmarksToolbar`\
1665 **Preferences Affected:** N/A
1666
1667 #### Windows (GPO)
1668 ```
1669 Software\Policies\Mozilla\Firefox\DisplayBookmarksToolbar = 0x1 | 0x0
1670 ```
1671 #### Windows (Intune)
1672 OMA-URI:
1673 ```
1674 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayBookmarksToolbar
1675 ```
1676 Value (string):
1677 ```
1678 <enabled/> or <disabled/>
1679 ```
1680 #### macOS
1681 ```
1682 <dict>
1683 <key>DisplayBookmarksToolbar</key>
1684 <true/> | <false/>
1685 </dict>
1686 ```
1687 #### policies.json
1688 ```
1689 {
1690 "policies": {
1691 "DisplayBookmarksToolbar": true | false
1692 }
1693 }
1694 ```
1695 ### DisplayMenuBar (Deprecated)
1696 Set the initial state of the menubar. A user can still hide it and it will stay hidden.
1697
1698 **Compatibility:** Firefox 60, Firefox ESR 60 (Windows, some Linux)\
1699 **CCK2 Equivalent:** `displayMenuBar`\
1700 **Preferences Affected:** N/A
1701
1702 #### Windows (GPO)
1703 ```
1704 Software\Policies\Mozilla\Firefox\DisplayMenuBar = 0x1 | 0x0
1705 ```
1706 #### macOS
1707 ```
1708 <dict>
1709 <key>DisplayMenuBar</key>
1710 <true/> | <false/>
1711 </dict>
1712 ```
1713 #### policies.json
1714 ```
1715 {
1716 "policies": {
1717 "DisplayMenuBar": true | false
1718 }
1719 }
1720 ```
1721 ### DisplayMenuBar
1722 Set the state of the menubar.
1723
1724 `always` means the menubar is shown and cannot be hidden.
1725
1726 `never` means the menubar is hidden and cannot be shown.
1727
1728 `default-on` means the menubar is on by default but can be hidden.
1729
1730 `default-off` means the menubar is off by default but can be shown.
1731
1732 **Compatibility:** Firefox 73, Firefox ESR 68.5 (Windows, some Linux)\
1733 **CCK2 Equivalent:** `displayMenuBar`\
1734 **Preferences Affected:** N/A
1735
1736 #### Windows (GPO)
1737 ```
1738 Software\Policies\Mozilla\Firefox\DisplayMenuBar = "always", "never", "default-on", "default-off"
1739 ```
1740 #### Windows (Intune)
1741 OMA-URI:
1742 ```
1743 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DisplayMenuBar_Enum
1744 ```
1745 Value (string):
1746 ```
1747 <enabled/>
1748 <data id="DisplayMenuBar" value="always | never | default-on | default-off"/>
1749 ```
1750 #### macOS
1751 ```
1752 <dict>
1753 <key>DisplayMenuBar</key>
1754 <string>always | never | default-on | default-off</string>
1755 </dict>
1756 ```
1757 #### policies.json
1758 ```
1759 {
1760 "policies": {
1761 "DisplayMenuBar": "always", "never", "default-on", "default-off"
1762 }
1763 }
1764 ```
1765 ### DNSOverHTTPS
1766 Configure DNS over HTTPS.
1767
1768 `Enabled` determines whether DNS over HTTPS is enabled
1769
1770 `ProviderURL` is a URL to another provider.
1771
1772 `Locked` prevents the user from changing DNS over HTTPS preferences.
1773
1774 `ExcludedDomains` excludes domains from DNS over HTTPS.
1775
1776 **Compatibility:** Firefox 63, Firefox ESR 68 (ExcludedDomains added in 75/68.7)\
1777 **CCK2 Equivalent:** N/A\
1778 **Preferences Affected:** `network.trr.mode`,`network.trr.uri`
1779
1780 #### Windows (GPO)
1781 ```
1782 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Enabled = 0x1 | 0x0
1783 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ProviderURL = "URL_TO_ALTERNATE_PROVIDER"
1784 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\Locked = 0x1 | 0x0
1785 Software\Policies\Mozilla\Firefox\DNSOverHTTPS\ExcludedDomains\1 = "example.com"
1786 ```
1787 #### Windows (Intune)
1788 OMA-URI:
1789 ```
1790 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Enabled
1791 ```
1792 Value (string):
1793 ```
1794 <enabled/> or <disabled/>
1795 ```
1796 OMA-URI:
1797 ```
1798 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ProviderURL
1799 ```
1800 Value (string):
1801 ```
1802 <enabled/>
1803 <data id="String" value="URL_TO_ALTERNATE_PROVIDER"/>
1804 ```
1805 OMA-URI:
1806 ```
1807 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_Locked
1808 ```
1809 Value (string):
1810 ```
1811 <enabled/> or <disabled/>
1812 ```
1813 OMA-URI:
1814 ```
1815 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~DNSOverHTTPS/DNSOverHTTPS_ExcludedDomains
1816 ```
1817 Value (string):
1818 ```
1819 <enabled/>
1820 <data id="List" value="1&#xF000;example.com"/>
1821 ```
1822 #### macOS
1823 ```
1824 <dict>
1825 <key>DNSOverHTTPS</key>
1826 <dict>
1827 <key>Enabled</key>
1828 <true/> | <false/>
1829 <key>ProviderURL</key>
1830 <string>URL_TO_ALTERNATE_PROVIDER</string>
1831 <key>Locked</key>
1832 <true/> | <false/>
1833 <key>ExcludedDomains</key>
1834 <array>
1835 <string>example.com</string>
1836 </array>
1837 </dict>
1838 </dict>
1839 ```
1840 #### policies.json
1841 ```
1842 {
1843 "policies": {
1844 "DNSOverHTTPS": {
1845 "Enabled": true | false,
1846 "ProviderURL": "URL_TO_ALTERNATE_PROVIDER",
1847 "Locked": true | false,
1848 "ExcludedDomains": ["example.com"]
1849 }
1850 }
1851 }
1852 ```
1853 ### DontCheckDefaultBrowser
1854 Don't check if Firefox is the default browser at startup.
1855
1856 **Compatibility:** Firefox 60, Firefox ESR 60\
1857 **CCK2 Equivalent:** `dontCheckDefaultBrowser`\
1858 **Preferences Affected:** `browser.shell.checkDefaultBrowser`
1859
1860 #### Windows (GPO)
1861 ```
1862 Software\Policies\Mozilla\Firefox\DontCheckDefaultBrowser = 0x1 | 0x0
1863 ```
1864 #### Windows (Intune)
1865 OMA-URI:
1866 ```
1867 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DontCheckDefaultBrowser
1868 ```
1869 Value (string):
1870 ```
1871 <enabled/> or <disabled/>
1872 ```
1873 #### macOS
1874 ```
1875 <dict>
1876 <key>DontCheckDefaultBrowser</key>
1877 <true/> | <false/>
1878 </dict>
1879 ```
1880 #### policies.json
1881 ```
1882 {
1883 "policies": {
1884 "DontCheckDefaultBrowser": true | false
1885 }
1886 }
1887 ```
1888 ### DefaultDownloadDirectory
1889 Set the default download directory.
1890
1891 You can use ${home} for the native home directory.
1892
1893 **Compatibility:** Firefox 68, Firefox ESR 68\
1894 **CCK2 Equivalent:** N/A\
1895 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`
1896
1897 #### Windows (GPO)
1898 ```
1899 Software\Policies\Mozilla\Firefox\DefaultDownloadDirectory = "${home}\Downloads"
1900 ```
1901 #### Windows (Intune)
1902 OMA-URI:
1903 ```
1904 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DefaultDownloadDirectory
1905 ```
1906 Value (string):
1907 ```
1908 <enabled/>
1909 <data id="Preferences_String" value="${home}\Downloads"/>
1910 ```
1911 #### macOS
1912 ```
1913 <dict>
1914 <key>DefaultDownloadDirectory</key>
1915 <string>${home}/Downloads</string>
1916 </dict>
1917 ```
1918 #### policies.json (macOS and Linux)
1919 ```
1920 {
1921 "policies": {
1922 "DefaultDownloadDirectory": "${home}/Downloads"
1923 }
1924 ```
1925 #### policies.json (Windows)
1926 ```
1927 {
1928 "policies": {
1929 "DefaultDownloadDirectory": "${home}\\Downloads"
1930 }
1931 ```
1932 ### DownloadDirectory
1933 Set and lock the download directory.
1934
1935 You can use ${home} for the native home directory.
1936
1937 **Compatibility:** Firefox 68, Firefox ESR 68\
1938 **CCK2 Equivalent:** N/A\
1939 **Preferences Affected:** `browser.download.dir`,`browser.download.folderList`,`browser.download.useDownloadDir`
1940
1941 #### Windows (GPO)
1942 ```
1943 Software\Policies\Mozilla\Firefox\DownloadDirectory = "${home}\Downloads"
1944 ```
1945 #### Windows (Intune)
1946 OMA-URI:
1947 ```
1948 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/DownloadDirectory
1949 ```
1950 Value (string):
1951 ```
1952 <enabled/>
1953 <data id="Preferences_String" value="${home}\Downloads"/>
1954 ```
1955 #### macOS
1956 ```
1957 <dict>
1958 <key>DownloadDirectory</key>
1959 <string>${home}/Downloads</string>
1960 </dict>
1961 ```
1962 #### policies.json (macOS and Linux)
1963 ```
1964 {
1965 "policies": {
1966 "DownloadDirectory": "${home}/Downloads"
1967 }
1968 ```
1969 #### policies.json (Windows)
1970 ```
1971 {
1972 "policies": {
1973 "DownloadDirectory": "${home}\\Downloads"
1974 }
1975 ```
1976 ### EnableTrackingProtection
1977 Configure tracking protection.
1978
1979 If this policy is not configured, tracking protection is not enabled by default in the browser, but it is enabled by default in private browsing and the user can change it.
1980
1981 If `Value` is set to false, tracking protection is disabled and locked in both the regular browser and private browsing.
1982
1983 If `Value` is set to true, tracking protection is enabled by default in both the regular browser and private browsing and the `Locked` value determines whether or not a user can change it.
1984
1985 If `Cryptomining` is set to true, cryptomining scripts on websites are blocked.
1986
1987 If `Fingerprinting` is set to true, fingerprinting scripts on websites are blocked.
1988
1989 `Exceptions` are origins for which tracking protection is not enabled.
1990
1991 **Compatibility:** Firefox 60, Firefox ESR 60 (Cryptomining and Fingerprinting added in 70/68.2, Exceptions added in 73/68.5)\
1992 **CCK2 Equivalent:** N/A\
1993 **Preferences Affected:** `privacy.trackingprotection.enabled`,`privacy.trackingprotection.pbmode.enabled`,`privacy.trackingprotection.cryptomining.enabled`,`privacy.trackingprotection.fingerprinting.enabled`
1994
1995 #### Windows (GPO)
1996 ```
1997 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Value = 0x1 | 0x0
1998 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Locked = 0x1 | 0x0
1999 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Cryptomining = 0x1 | 0x0
2000 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Fingerprinting = 0x1 | 0x0
2001 Software\Policies\Mozilla\Firefox\EnableTrackingProtection\Exceptions\1 = "https://example.com"
2002 ```
2003 #### Windows (Intune)
2004 OMA-URI:
2005 ```
2006 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/TrackingProtection
2007 ```
2008 Value (string):
2009 ```
2010 <enabled/>
2011 <data id="TrackingProtectionLocked" value="true | false"/>
2012 <data id="Cryptomining" value="true | false"/>
2013 <data id="Fingerprinting" value="true | false"/>
2014 <data id=TrackingProtection_Exceptions" value="1&#xF000;https://example.com"/>
2015 ```
2016 #### macOS
2017 ```
2018 <dict>
2019 <key>EnableTrackingProtection</key>
2020 <dict>
2021 <key>Value</key>
2022 <true/> | <false/>
2023 <key><Locked</key>
2024 <true/> | <false/>
2025 <key><Cryptomining</key>
2026 <true/> | <false/>
2027 <key><Fingerprinting</key>
2028 <true/> | <false/>
2029 <key>Exceptions</key>
2030 <array>
2031 <string>https://example.com</string>
2032 </array>
2033 </dict>
2034 </dict>
2035 ```
2036 #### policies.json
2037 ```
2038 {
2039 "policies": {
2040 "EnableTrackingProtection": {
2041 "Value": true | false,
2042 "Locked": true | false,
2043 "Cryptomining": true | false,
2044 "Fingerprinting": true | false,
2045 "Exceptions": ["https://example.com"]
2046 }
2047 }
2048 ```
2049 ### EncryptedMediaExtensions
2050 Enable or disable Encrypted Media Extensions and optionally lock it.
2051
2052 If `Enabled` is set to false, encrypted media extensions (like Widevine) are not downloaded by Firefox unless the user consents to installing them.
2053
2054 If `Locked` is set to true and `Enabled` is set to false, Firefox will not download encrypted media extensions (like Widevine) or ask the user to install them.
2055
2056 **Compatibility:** Firefox 77, Firefox ESR 68.9\
2057 **CCK2 Equivalent:** N/A\
2058 **Preferences Affected:** `media.eme.enabled`
2059
2060 #### Windows (GPO)
2061 ```
2062 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Enabled = 0x1 | 0x0
2063 Software\Policies\Mozilla\Firefox\EncryptedMediaExtensions\Locked = 0x1 | 0x0
2064 ```
2065 #### Windows (Intune)
2066 OMA-URI:
2067 ```
2068 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Enabled
2069 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~EncryptedMediaExtensions/EncryptedMediaExtensions_Locked
2070 ```
2071 Value (string):
2072 ```
2073 <enabled/>or <disabled/>
2074 ```
2075 #### macOS
2076 ```
2077 <dict>
2078 <key>EncryptedMediaExtensions</key>
2079 <dict>
2080 <key>Enabled</key>
2081 <true/> | <false/>
2082 <key><Locked</key>
2083 <true/> | <false/>
2084 </dict>
2085 </dict>
2086 ```
2087 #### policies.json
2088 ```
2089 {
2090 "policies": {
2091 "EncryptedMediaExtensions": {
2092 "Enabled": true | false,
2093 "Locked": true | false
2094 }
2095 }
2096 ```
2097 ### EnterprisePoliciesEnabled
2098 Enable policy support on macOS.
2099
2100 **Compatibility:** Firefox 63, Firefox ESR 60.3 (macOS only)\
2101 **CCK2 Equivalent:** N/A\
2102 **Preferences Affected:** N/A
2103
2104 #### macOS
2105 ```
2106 <dict>
2107 <key>EnterprisePoliciesEnabled</key>
2108 <true/>
2109 </dict>
2110 ```
2111 ### Extensions
2112 Control the installation, uninstallation and locking of extensions.
2113
2114 `Install` is a list of URLs or native paths for extensions to be installed.
2115
2116 `Uninstall` is a list of extension IDs that should be uninstalled if found.
2117
2118 `Locked` is a list of extension IDs that the user cannot disable or uninstall.
2119
2120 **Compatibility:** Firefox 60, Firefox ESR 60\
2121 **CCK2 Equivalent:** `addons`\
2122 **Preferences Affected:** N/A
2123
2124 #### Windows (GPO)
2125 ```
2126 Software\Policies\Mozilla\Firefox\Extensions\Install\1 = "https://addons.mozilla.org/firefox/downloads/somefile.xpi"
2127 Software\Policies\Mozilla\Firefox\Extensions\Install\2 = "//path/to/xpi"
2128 Software\Policies\Mozilla\Firefox\Extensions\Uninstall\1 = "bad_addon_id@mozilla.org"
2129 Software\Policies\Mozilla\Firefox\Extensions\Locked\1 = "addon_id@mozilla.org"
2130 ```
2131 #### Windows (Intune)
2132 OMA-URI:
2133 ```
2134 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Install
2135 ```
2136 Value (string):
2137 ```
2138 <enabled/>
2139 <data id="Extensions" value="1&#xF000;https://addons.mozilla.org/firefox/downloads/somefile.xpi&#xF000;2&#xF000;//path/to/xpi"/>
2140 ```
2141 OMA-URI:
2142 ```
2143 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Uninstall
2144 ```
2145 Value (string):
2146 ```
2147 <enabled/>
2148 <data id="Extensions" value="1&#xF000;bad_addon_id@mozilla.org"/>
2149 ```
2150 OMA-URI:
2151 ```
2152 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/Extensions_Locked
2153 ```
2154 Value (string):
2155 ```
2156 <enabled/>
2157 <data id="Extensions" value="1&#xF000;addon_id@mozilla.org"/>
2158 ```
2159 #### macOS
2160 ```
2161 <dict>
2162 <key>Extensions</key>
2163 <dict>
2164 <key>Install</key>
2165 <array>
2166 <string>https://addons.mozilla.org/firefox/downloads/somefile.xpi</string>
2167 <string>//path/to/xpi</string>
2168 </array>
2169 <key>Uninstall</key>
2170 <array>
2171 <string>bad_addon_id@mozilla.org</string>
2172 </array>
2173 <key>Locked</key>
2174 <array>
2175 <string>addon_id@mozilla.org</string>
2176 </array>
2177 </dict>
2178 </dict>
2179 ```
2180 #### policies.json
2181 ```
2182 {
2183 "policies": {
2184 "Extensions": {
2185 "Install": ["https://addons.mozilla.org/firefox/downloads/somefile.xpi", "//path/to/xpi"],
2186 "Uninstall": ["bad_addon_id@mozilla.org"],
2187 "Locked": ["addon_id@mozilla.org"]
2188 }
2189 }
2190 }
2191 ```
2192 ### ExtensionSettings
2193 Manage all aspects of extensions. This policy is based heavily on the [Chrome policy](https://dev.chromium.org/administrators/policy-list-3/extension-settings-full) of the same name.
2194
2195 This policy maps an extension ID to its configuration. With an extension ID, the configuration will be applied to the specified extension only. A default configuration can be set for the special ID "*", which will apply to all extensions that don't have a custom configuration set in this policy.
2196
2197 To obtain an extension ID, install the extension and go to about:support. You will see the ID in the Extensions section. I've also created an extension that makes it easy to find the ID of extensions on AMO. You can download it [here](https://github.com/mkaply/queryamoid/releases/tag/v0.1).
2198
2199 The configuration for each extension is another dictionary that can contain the fields documented below.
2200
2201 | Name | Description |
2202 | --- | --- |
2203 | `installation_mode` | Maps to a string indicating the installation mode for the extension. The valid strings are `allowed`,`blocked`,`force_installed`, and `normal_installed`.
2204 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`allowed` | Allows the extension to be installed by the user. This is the default behavior. There is no need for an install_url; it will automatically be allowed based on the ID.
2205 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`blocked`| Blocks installation of the extension and removes it from the device if already installed.
2206 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`force_installed`| The extension is automatically installed and can't be removed by the user. This option is not valid for the default configuration and requires an install_url.
2207 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`normal_installed`| The extension is automatically installed but can be disabled by the user. This option is not valid for the default configuration and requires an install_url.
2208 | `install_url`| Maps to a URL indicating where Firefox can download a force_installed or normal_installed extension. If installing from the addons.mozilla.org, use the following URL (substituting SHORT_NAME from the URL on AMO), https://addons.mozilla.org/firefox/downloads/latest/SHORT_NAME/latest.xpi. If installing from the local file system, use a file:/// URL. Languages packs are available from https://releases.mozilla.org/pub/firefox/releases/VERSION/PLATFORM/xpi/LANGUAGE.xpi. If you need to update the extension, you can change the name of the extension and it will be automatically updated. Extensions installed from file URLs will additional be updated when their internal version changes.
2209 | `install_sources` | A list of sources from which installing extensions is allowed. **This is unnecessary if you are only allowing the installation of certain extensions by ID.** Each item in this list is an extension-style match pattern. Users will be able to easily install items from any URL that matches an item in this list. Both the location of the *.xpi file and the page where the download is started from (i.e. the referrer) must be allowed by these patterns. This setting can be used only for the default configuration. If you want to allow the install of extensions from the recommended add-ons page, you must add `about:addons` to this list.
2210 | `allowed_types` | This setting whitelists the allowed types of extension/apps that can be installed in Firefox. The value is a list of strings, each of which should be one of the following: "extension", "theme", "dictionary", "langpack" This setting can be used only for the default configuration.
2211 | `blocked_install_message` | This maps to a string specifying the error message to display to users if they're blocked from installing an extension. This setting allows you to append text to the generic error message displayed when the extension is blocked. This could be be used to direct users to your help desk, explain why a particular extension is blocked, or something else. This setting can be used only for the default configuration.
2212 | `restricted_domains` | An array of domains on which content scripts can't be run. This setting can be used only for the default configuration.
2213
2214 **Compatibility:** Firefox 69, Firefox ESR 68.1\
2215 **CCK2 Equivalent:** N/A\
2216 **Preferences Affected:** N/A
2217
2218 #### Windows (GPO)
2219 ```
2220 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2221 {
2222 "*": {
2223 "blocked_install_message": "Custom error message.",
2224 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2225 "installation_mode": "blocked",
2226 "allowed_types": ["extension"]
2227 },
2228 "uBlock0@raymondhill.net": {
2229 "installation_mode": "force_installed",
2230 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2231 },
2232 "https-everywhere@eff.org": {
2233 "installation_mode": "allowed",
2234 }
2235 }
2236 ```
2237 #### Windows (Intune)
2238 OMA-URI:
2239 ```
2240 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Extensions/ExtensionSettings
2241 ```
2242 Value (string):
2243 ```
2244 <enabled/>
2245 <data id="ExtensionSettings" value='
2246 "*": {
2247 "blocked_install_message": "Custom error message.",
2248 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2249 "installation_mode": "blocked",
2250 "allowed_types": ["extension"]
2251 },
2252 "uBlock0@raymondhill.net": {
2253 "installation_mode": "force_installed",
2254 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2255 },
2256 "https-everywhere@eff.org": {
2257 "installation_mode": "allowed",
2258 }'/>
2259 ```
2260 #### macOS
2261 ```
2262 <dict>
2263 <key>ExtensionSettings</key>
2264 <dict>
2265 <key>*</key>
2266 <dict>
2267 <key>blocked_install_message</key>
2268 <string>Custom error message.</string>
2269 <key>install_sources</key>
2270 <array>
2271 <string>about:addons</string>
2272 <string>https://addons.mozilla.org/</string>
2273 </array>
2274 <key>installation_mode</key>
2275 <string>blocked</string>
2276 <key>allowed_types</key>
2277 <array>
2278 <string>extension</string>
2279 </array>
2280 </dict>
2281 <key>uBlock0@raymondhill.net</key>
2282 <dict>
2283 <key>installation_mode</key>
2284 <string>force_installed</string>
2285 <key>install_url</key>
2286 <string>https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi</string>
2287 </dict>
2288 <key>https-everywhere@eff.org</key>
2289 <dict>
2290 <key>installation_mode</key>
2291 <string>allowed</string>
2292 </dict>
2293 </dict>
2294 </dict>
2295 ```
2296 #### policies.json
2297 ```
2298 {
2299 "policies": {
2300 "ExtensionSettings": {
2301 "*": {
2302 "blocked_install_message": "Custom error message.",
2303 "install_sources": ["about:addons","https://addons.mozilla.org/"],
2304 "installation_mode": "blocked",
2305 "allowed_types": ["extension"]
2306 },
2307 "uBlock0@raymondhill.net": {
2308 "installation_mode": "force_installed",
2309 "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi"
2310 },
2311 "https-everywhere@eff.org": {
2312 "installation_mode": "allowed"
2313 }
2314 }
2315 }
2316 }
2317 ```
2318 ### ExtensionUpdate
2319 Control extension updates.
2320
2321 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2322 **CCK2 Equivalent:** N/A\
2323 **Preferences Affected:** `extensions.update.enabled`
2324
2325 #### Windows (GPO)
2326 ```
2327 Software\Policies\Mozilla\Firefox\ExtensionUpdate = 0x1 | 0x0
2328 ```
2329 #### Windows (Intune)
2330 OMA-URI:
2331 ```
2332 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/ExtensionUpdate
2333 ```
2334 Value (string):
2335 ```
2336 <enabled/> or <disabled/>
2337 ```
2338 #### macOS
2339 ```
2340 <dict>
2341 <key>ExtensionUpdate</key>
2342 <true/> | <false/>
2343 </dict>
2344 ```
2345 #### policies.json
2346 ```
2347 {
2348 "policies": {
2349 "ExtensionUpdate": true | false
2350 }
2351 }
2352 ```
2353 ### FlashPlugin
2354 Configure the default Flash plugin policy as well as origins for which Flash is allowed.
2355
2356 `Allow` is a list of origins where Flash are allowed.
2357
2358 `Block` is a list of origins where Flash is not allowed.
2359
2360 `Default` determines whether or not Flash is allowed by default.
2361
2362 `Locked` prevents the user from changing Flash preferences.
2363
2364 **Compatibility:** Firefox 60, Firefox ESR 60\
2365 **CCK2 Equivalent:** `permissions.plugin`\
2366 **Preferences Affected:** `plugin.state.flash`
2367
2368 #### Windows (GPO)
2369 ```
2370 Software\Policies\Mozilla\Firefox\FlashPlugin\Allow\1 = "https://example.org"
2371 Software\Policies\Mozilla\Firefox\FlashPlugin\Block\1 = "https://example.edu"
2372 Software\Policies\Mozilla\Firefox\FlashPlugin\Default = 0x1 | 0x0
2373 Software\Policies\Mozilla\Firefox\FlashPlugin\Locked = 0x1 | 0x0
2374 ```
2375 #### Windows (Intune)
2376 OMA-URI:
2377 ```
2378 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Allow
2379 ```
2380 Value (string):
2381 ```
2382 <enabled/>
2383 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2384 ```
2385 OMA-URI:
2386 ```
2387 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Locked
2388 ```
2389 Value (string):
2390 ```
2391 <enabled/> or <disabled/>
2392 ```
2393 OMA-URI:
2394 ```
2395 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Flash/FlashPlugin_Default
2396 ```
2397 Value (string):
2398 ```
2399 <enabled/> or <disabled/>
2400 ```
2401 #### macOS
2402 ```
2403 <dict>
2404 <key>FlashPlugin</key>
2405 <dict>
2406 <key>Allow</key>
2407 <array>
2408 <string>http://example.org</string>
2409 </array>
2410 <key>Block</key>
2411 <array>
2412 <string>http://example.edu</string>
2413 </array>
2414 <key>Default</key>
2415 <true/> | <false/>
2416 <key>Locked</key>
2417 <true/> | <false/>
2418 </dict>
2419 </dict>
2420 ```
2421 #### policies.json
2422 ```
2423 {
2424 "policies": {
2425 "FlashPlugin": {
2426 "Allow": ["http://example.org/"],
2427 "Block": ["http://example.edu/"],
2428 "Default": true | false,
2429 "Locked": true | false
2430 }
2431 }
2432 }
2433 ```
2434
2435
2436
2437 ### Handlers
2438 Configure default application handlers. This policy is based on the internal format of `handlers.json`.
2439
2440 You can configure handlers based on a mime type (`mimeTypes`), a file's extension (`extensions`), or a protocol (`schemes`).
2441
2442 Within each handler type, you specify the given mimeType/extension/scheme as a key and use the following subkeys to describe how it is handled.
2443
2444 | Name | Description |
2445 | --- | --- |
2446 | `action`| Can be either `saveToDisk`, `useHelperApp`, `useSystemDefault`.
2447 | `ask` | If `true`, the user is asked if what they want to do with the file. If `false`, the action is taken without user intervention.
2448 | `handlers` | An array of handlers with the first one being the default. If you don't want to have a default handler, use an empty object for the first handler. Choose between path or uriTemplate.
2449 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`name` | The display name of the handler (might not be used).
2450 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`path`| The native path to the executable to be used.
2451 | &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;`uriTemplate`| A url to a web based application handler. The URL must be https and contain a %s to be used for substitution.
2452
2453 **Compatibility:** Firefox 78, Firefox ESR 78\
2454 **CCK2 Equivalent:** N/A\
2455 **Preferences Affected:** N/A
2456
2457 #### Windows (GPO)
2458 ```
2459 Software\Policies\Mozilla\Firefox\ExtensionSettings (REG_MULTI_SZ) =
2460 {
2461 "mimeTypes": {
2462 "application/msword": {
2463 "action": "useSystemDefault",
2464 "ask": true | false
2465 }
2466 },
2467 "schemes": {
2468 "mailto": {
2469 "action": "useHelperApp",
2470 "ask": true | false,
2471 "handlers": [{
2472 "name": "Gmail",
2473 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2474 }]
2475 }
2476 },
2477 "extensions": {
2478 "pdf": {
2479 "action": "useHelperApp",
2480 "ask": true | false,
2481 "handlers": [{
2482 "name": "Adobe Acrobat",
2483 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2484 }]
2485 }
2486 }
2487 }
2488 ```
2489 #### Windows (Intune)
2490 OMA-URI:
2491 ```
2492 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Handlers
2493 ```
2494 Value (string):
2495 ```
2496 <enabled/>
2497 <data id="Handlers" value='
2498 {
2499 "mimeTypes": {
2500 "application/msword": {
2501 "action": "useSystemDefault",
2502 "ask": true | false
2503 }
2504 },
2505 "schemes": {
2506 "mailto": {
2507 "action": "useHelperApp",
2508 "ask": true | false,
2509 "handlers": [{
2510 "name": "Gmail",
2511 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&amp;url=%s"
2512 }]
2513 }
2514 },
2515 "extensions": {
2516 "pdf": {
2517 "action": "useHelperApp",
2518 "ask": true | false,
2519 "handlers": [{
2520 "name": "Adobe Acrobat",
2521 "path": "C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe"
2522 }]
2523 }
2524 }
2525 }
2526 '/>
2527 ```
2528 #### macOS
2529 ```
2530 <dict>
2531 <key>Handlers</key>
2532 <dict>
2533 <key>mimeTypes</key>
2534 <dict>
2535 <key>application/msword</key>
2536 <dict>
2537 <key>action</key>
2538 <string>useSystemDefault</string>
2539 <key>ask</key>
2540 <true/> | <false/>
2541 </dict>
2542 </dict>
2543 <key>schemes</key>
2544 <dict>
2545 <key>mailto</key>
2546 <dict>
2547 <key>action</key>
2548 <string>useHelperApp</string>
2549 <key>ask</key>
2550 <true/> | <false/>
2551 <key>handlers</key>
2552 <array>
2553 <dict>
2554 <key>name</key>
2555 <string>Gmail</string>
2556 <key>uriTemplate</key>
2557 <string>https://mail.google.com/mail/?extsrc=mailto&url=%s</string>
2558 </dict>
2559 </array>
2560 </dict>
2561 </dict>
2562 <key>extensions</key>
2563 <dict>
2564 <key>pdf</key>
2565 <dict>
2566 <key>action</key>
2567 <string>useHelperApp</string>
2568 <key>ask</key>
2569 <true/> | <false/>
2570 <key>handlers</key>
2571 <array>
2572 <dict>
2573 <key>name</key>
2574 <string>Adobe Acrobat</string>
2575 <key>path</key>
2576 <string>/System/Applications/Preview.app</string>
2577 </dict>
2578 </array>
2579 </dict>
2580 </dict>
2581 </dict>
2582 </dict>
2583 ```
2584 #### policies.json
2585 ```
2586 {
2587 "mimeTypes": {
2588 "application/msword": {
2589 "action": "useSystemDefault",
2590 "ask": false
2591 }
2592 },
2593 "schemes": {
2594 "mailto": {
2595 "action": "useHelperApp",
2596 "ask": true | false,
2597 "handlers": [{
2598 "name": "Gmail",
2599 "uriTemplate": "https://mail.google.com/mail/?extsrc=mailto&url=%s"
2600 }]
2601 }
2602 },
2603 "extensions": {
2604 "pdf": {
2605 "action": "useHelperApp",
2606 "ask": true | false,
2607 "handlers": [{
2608 "name": "Adobe Acrobat",
2609 "path": "/usr/bin/acroread"
2610 }]
2611 }
2612 }
2613 }
2614 ```
2615 ### FirefoxHome
2616 Customize the Firefox Home page.
2617
2618 **Compatibility:** Firefox 68, Firefox ESR 68\
2619 **CCK2 Equivalent:** N/A\
2620 **Preferences Affected:** `browser.newtabpage.activity-stream.showSearch`,`browser.newtabpage.activity-stream.feeds.topsites`,`browser.newtabpage.activity-stream.feeds.section.highlights`,`browser.newtabpage.activity-stream.feeds.section.topstories`,`browser.newtabpage.activity-stream.feeds.snippets`
2621
2622 #### Windows (GPO)
2623 ```
2624 Software\Policies\Mozilla\Firefox\FirefoxHome\Search = 0x1 | 0x0
2625 Software\Policies\Mozilla\Firefox\FirefoxHome\TopSites = 0x1 | 0x0
2626 Software\Policies\Mozilla\Firefox\FirefoxHome\Highlights = 0x1 | 0x0
2627 Software\Policies\Mozilla\Firefox\FirefoxHome\Pocket = 0x1 | 0x0
2628 Software\Policies\Mozilla\Firefox\FirefoxHome\Snippets = 0x1 | 0x0
2629 Software\Policies\Mozilla\Firefox\FirefoxHome\Locked = 0x1 | 0x0
2630 ```
2631 #### Windows (Intune)
2632 OMA-URI:
2633 ```
2634 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/CustomizeFirefoxHome
2635 ```
2636 Value (string):
2637 ```
2638 <enabled/>
2639 <data id="FirefoxHome_Search" value="true | false"/>
2640 <data id="FirefoxHome_TopSites" value="true | false"/>
2641 <data id="FirefoxHome_Highlights" value="true | false"/>
2642 <data id="FirefoxHome_Pocket" value="true | false"/>
2643 <data id="FirefoxHome_Snippets" value="true | false"/>
2644 <data id="FirefoxHome_Locked" value="true | false"/>
2645 ```
2646 #### macOS
2647 ```
2648 <dict>
2649 <key>FirefoxHome</key>
2650 <dict>
2651 <key>Search</key>
2652 <true/> | <false/>
2653 <key>TopSites</key>
2654 <true/> | <false/>
2655 <key>Highlights</key>
2656 <true/> | <false/>
2657 <key>Pocket</key>
2658 <true/> | <false/>
2659 <key>Snippets</key>
2660 <true/> | <false/>
2661 <key>Locked</key>
2662 <true/> | <false/>
2663 </dict>
2664 </dict>
2665 ```
2666 #### policies.json
2667 ```
2668 {
2669 "policies": {
2670 "FirefoxHome": {
2671 "Search": true | false,
2672 "TopSites": true | false,
2673 "Highlights": true | false,
2674 "Pocket": true | false,
2675 "Snippets": true | false,
2676 "Locked": true | false
2677 }
2678 }
2679 }
2680 ```
2681 ### HardwareAcceleration
2682 Control hardware acceleration.
2683
2684 **Compatibility:** Firefox 60, Firefox ESR 60\
2685 **CCK2 Equivalent:** N/A\
2686 **Preferences Affected:** `layers.acceleration.disabled`
2687
2688 #### Windows (GPO)
2689 ```
2690 Software\Policies\Mozilla\Firefox\HardwareAcceleration = 0x1 | 0x0
2691 ```
2692 #### Windows (Intune)
2693 OMA-URI:
2694 ```
2695 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/HardwareAcceleration
2696 ```
2697 Value (string):
2698 ```
2699 <enabled/> or <disabled/>
2700 ```
2701 #### macOS
2702 ```
2703 <dict>
2704 <key>HardwareAcceleration</key>
2705 <true/> | <false/>
2706 </dict>
2707 ```
2708 #### policies.json
2709 ```
2710 {
2711 "policies": {
2712 "HardwareAcceleration": true | false
2713 }
2714 }
2715 ```
2716 ### Homepage
2717 Configure the default homepage and how Firefox starts.
2718
2719 `URL` is the default homepage.
2720
2721 `Locked` prevents the user from changing homepage preferences.
2722
2723 `Additional` allows for more than one homepage.
2724
2725 `StartPage` is how Firefox starts. The choices are no homepage, the default homepage or the previous session.
2726
2727 With Firefox 78, an additional option as added for `Startpage`, `homepage-locked`. This allows for locking the homepage, but still allowing the user to choose whether or not they want to restore their session.
2728
2729 **Compatibility:** Firefox 60, Firefox ESR 60 (StartPage was added in Firefox 60, Firefox ESR 60.4, homepage-locked added in Firefox 78)\
2730 **CCK2 Equivalent:** `homePage`,`lockHomePage`\
2731 **Preferences Affected:** `browser.startup.homepage`,`browser.startup.page`
2732
2733 #### Windows (GPO)
2734 ```
2735 Software\Policies\Mozilla\Firefox\Homepage\URL = "https://example.com"
2736 Software\Policies\Mozilla\Firefox\Homepage\Locked = 0x1 | 0x0
2737 Software\Policies\Mozilla\Firefox\Homepage\Additional\1 = "https://example.org"
2738 Software\Policies\Mozilla\Firefox\Homepage\Additional\2 = "https://example.edu"
2739 Software\Policies\Mozilla\Firefox\Homepage\StartPage = "none" | "homepage" | "previous-session" | "homepage-locked"
2740 ```
2741 #### Windows (Intune)
2742 OMA-URI:
2743 ```
2744 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageURL
2745 ```
2746 Value (string):
2747 ```
2748 <enabled/>
2749
2750 <data id="HomepageURL" value="https://example.com"/>
2751 <data id="HomepageLocked" value="true | false"/>
2752 ```
2753 OMA-URI:
2754 ```
2755 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageAdditional
2756 ```
2757 Value (string):
2758 ```
2759 <enabled/>
2760
2761 <data id="HomepageAdditional" value="1&#xF000;http://example.org&#xF000;2&#xF000;http://example.edu"/>
2762 ```
2763 OMA-URI:
2764 ```
2765 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Homepage/HomepageStartPage
2766 ```
2767 Value (string):
2768 ```
2769 <enabled/>
2770
2771 <data id="StartPage" value="none | homepage | previous-session"/>
2772 ```
2773 #### macOS
2774 ```
2775 <dict>
2776 <key>Homepage</key>
2777 <dict>
2778 <key>URL</key>
2779 <string>http://example.com</string>
2780 <key>Locked</key>
2781 <true/> | <false/>
2782 <key>Additional</key>
2783 <array>
2784 <string>http://example.org</string>
2785 <string>http://example.edu</string>
2786 </array>
2787 <key>StartPage</key>
2788 <string>none | homepage | previous-session | homepage-locked</string>
2789 </dict>
2790 </dict>
2791 ```
2792 #### policies.json
2793 ```
2794 {
2795 "policies": {
2796 "Homepage": {
2797 "URL": "http://example.com/",
2798 "Locked": true | false,
2799 "Additional": ["http://example.org/",
2800 "http://example.edu/"],
2801 "StartPage": "none" | "homepage" | "previous-session" | "homepage-locked"
2802 }
2803 }
2804 }
2805 ```
2806 ### InstallAddonsPermission
2807 Configure the default extension install policy as well as origins for extension installs are allowed. This policy does not override turning off all extension installs.
2808
2809 `Allow` is a list of origins where extension installs are allowed.
2810
2811 `Default` determines whether or not extension installs are allowed by default.
2812
2813 **Compatibility:** Firefox 60, Firefox ESR 60\
2814 **CCK2 Equivalent:** `permissions.install`\
2815 **Preferences Affected:** `xpinstall.enabled`
2816
2817 #### Windows (GPO)
2818 ```
2819 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\1 = "https://example.org"
2820 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Allow\2 = "https://example.edu"
2821 Software\Policies\Mozilla\Firefox\InstallAddonsPermission\Default = 0x1 | 0x0
2822 ```
2823 #### Windows (Intune)
2824 OMA-URI:
2825 ```
2826 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Allow
2827 ```
2828 Value (string):
2829 ```
2830 <enabled/>
2831 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2832 ```
2833 OMA-URI:
2834 ```
2835 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Addons/InstallAddonsPermission_Default
2836 ```
2837 Value (string):
2838 ```
2839 <enabled/>
2840 ```
2841 #### macOS
2842 ```
2843 <dict>
2844 <key>InstallAddonsPermission</key>
2845 <dict>
2846 <key>Allow</key>
2847 <array>
2848 <string>http://example.org</string>
2849 <string>http://example.edu</string>
2850 </array>
2851 <key>Default</key>
2852 <true/> | <false/>
2853 </dict>
2854 </dict>
2855 ```
2856 #### policies.json
2857 ```
2858 {
2859 "policies": {
2860 "InstallAddonsPermission": {
2861 "Allow": ["http://example.org/",
2862 "http://example.edu/"],
2863 "Default": true | false
2864 }
2865 }
2866 }
2867 ```
2868 ### LegacyProfiles
2869 Disable the feature enforcing a separate profile for each installation.
2870
2871 If this policy set to true, Firefox will not try to create different profiles for installations of Firefox in different directories. This is the equivalent of the MOZ_LEGACY_PROFILES environment variable.
2872
2873 If this policy set to false, Firefox will create a new profile for each unique installation of Firefox.
2874
2875 This policy only work on Windows via GPO (not policies.json).
2876
2877 **Compatibility:** Firefox 70, Firefox ESR 68.2 (Windows only, GPO only)\
2878 **CCK2 Equivalent:** N/A\
2879 **Preferences Affected:** N/A
2880
2881 #### Windows (GPO)
2882 ```
2883 Software\Policies\Mozilla\Firefox\LegacyProfiles = = 0x1 | 0x0
2884 ```
2885 #### Windows (Intune)
2886 OMA-URI:
2887 ```
2888 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LegacyProfiles
2889 ```
2890 Value (string):
2891 ```
2892 <enabled/> or <disabled/>
2893 ```
2894 ### LocalFileLinks
2895 Enable linking to local files by origin.
2896
2897 **Compatibility:** Firefox 68, Firefox ESR 68\
2898 **CCK2 Equivalent:** N/A\
2899 **Preferences Affected:** `capability.policy.localfilelinks.*`
2900
2901 #### Windows (GPO)
2902 ```
2903 Software\Policies\Mozilla\Firefox\LocalFileLinks\1 = "https://example.org"
2904 Software\Policies\Mozilla\Firefox\LocalFileLinks\2 = "https://example.edu"
2905 ```
2906 #### Windows (Intune)
2907 OMA-URI:
2908 ```
2909 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/LocalFileLinks
2910 ```
2911 Value (string):
2912 ```
2913 <enabled/>
2914 <data id="LocalFileLinks" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
2915 ```
2916 #### macOS
2917 ```
2918 <dict>
2919 <key>LocalFileLinks</key>
2920 <array>
2921 <string>http://example.org</string>
2922 <string>http://example.edu</string>
2923 </array>
2924 </dict>
2925 ```
2926 #### policies.json
2927 ```
2928 {
2929 "policies": {
2930 "LocalFileLinks": ["http://example.org/",
2931 "http://example.edu/"]
2932 }
2933 }
2934 ```
2935 ### NetworkPrediction
2936 Enable or disable network prediction (DNS prefetching).
2937
2938 **Compatibility:** Firefox 67, Firefox ESR 60.7\
2939 **CCK2 Equivalent:** N/A\
2940 **Preferences Affected:** `network.dns.disablePrefetch`,`network.dns.disablePrefetchFromHTTPS`
2941
2942 #### Windows (GPO)
2943 ```
2944 Software\Policies\Mozilla\Firefox\NetworkPrediction = 0x1 | 0x0
2945 ```
2946 #### Windows (Intune)
2947 OMA-URI:
2948 ```
2949 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NetworkPrediction
2950 ```
2951 Value (string):
2952 ```
2953 <enabled/> or <disabled/>
2954 ```
2955 #### macOS
2956 ```
2957 <dict>
2958 <key>NetworkPrediction</key>
2959 <true/> | <false/>
2960 </dict>
2961 ```
2962 #### policies.json
2963 ```
2964 {
2965 "policies": {
2966 "NetworkPrediction": true | false
2967 }
2968 ```
2969 ### NewTabPage
2970 Enable or disable the New Tab page.
2971
2972 **Compatibility:** Firefox 68, Firefox ESR 68\
2973 **CCK2 Equivalent:** N/A\
2974 **Preferences Affected:** `browser.newtabpage.enabled`
2975
2976 #### Windows (GPO)
2977 ```
2978 Software\Policies\Mozilla\Firefox\NewTabPage = 0x1 | 0x0
2979 ```
2980 #### Windows (Intune)
2981 OMA-URI:
2982 ```
2983 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NewTabPage
2984 ```
2985 Value (string):
2986 ```
2987 <enabled/> or <disabled/>
2988 ```
2989 #### macOS
2990 ```
2991 <dict>
2992 <key>NewTabPage</key>
2993 <true/> | <false/>
2994 </dict>
2995 ```
2996 #### policies.json
2997 ```
2998 {
2999 "policies": {
3000 "NewTabPage": true | false
3001 }
3002 ```
3003 ### NoDefaultBookmarks
3004 Disable the creation of default bookmarks.
3005
3006 This policy is only effective if the user profile has not been created yet.
3007
3008 **Compatibility:** Firefox 60, Firefox ESR 60\
3009 **CCK2 Equivalent:** `removeDefaultBookmarks`\
3010 **Preferences Affected:** N/A
3011
3012 #### Windows (GPO)
3013 ```
3014 Software\Policies\Mozilla\Firefox\NoDefaultBookmarks = 0x1 | 0x0
3015 ```
3016 #### Windows (Intune)
3017 OMA-URI:
3018 ```
3019 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/NoDefaultBookmarks
3020 ```
3021 Value (string):
3022 ```
3023 <enabled/> or <disabled/>
3024 ```
3025 #### macOS
3026 ```
3027 <dict>
3028 <key>NoDefaultBookmarks</key>
3029 <true/> | <false/>
3030 </dict>
3031 ```
3032 #### policies.json
3033 ```
3034 {
3035 "policies": {
3036 "NoDefaultBookmarks": true | false
3037 }
3038 }
3039 ```
3040 ### OfferToSaveLogins
3041 Control whether or not Firefox offers to save passwords.
3042
3043 **Compatibility:** Firefox 60, Firefox ESR 60\
3044 **CCK2 Equivalent:** `dontRememberPasswords`\
3045 **Preferences Affected:** `signon.rememberSignons`
3046
3047 #### Windows (GPO)
3048 ```
3049 Software\Policies\Mozilla\Firefox\OfferToSaveLogins = 0x1 | 0x0
3050 ```
3051 #### Windows (Intune)
3052 OMA-URI:
3053 ```
3054 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLogins
3055 ```
3056 Value (string):
3057 ```
3058 <enabled/> or <disabled/>
3059 ```
3060 #### macOS
3061 ```
3062 <dict>
3063 <key>OfferToSaveLogins</key>
3064 <true/> | <false/>
3065 </dict>
3066 ```
3067 #### policies.json
3068 ```
3069 {
3070 "policies": {
3071 "OfferToSaveLogins": true | false
3072 }
3073 }
3074 ```
3075 ### OfferToSaveLoginsDefault
3076 Sets the default value of signon.rememberSignons without locking it.
3077
3078 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3079 **CCK2 Equivalent:** `dontRememberPasswords`\
3080 **Preferences Affected:** `signon.rememberSignons`
3081
3082 #### Windows (GPO)
3083 ```
3084 Software\Policies\Mozilla\Firefox\OfferToSaveLoginsDefault = 0x1 | 0x0
3085 ```
3086 #### Windows (Intune)
3087 OMA-URI:
3088 ```
3089 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OfferToSaveLoginsDefault
3090 ```
3091 Value (string):
3092 ```
3093 <enabled/> or <disabled/>
3094 ```
3095 #### macOS
3096 ```
3097 <dict>
3098 <key>OfferToSaveLoginsDefault</key>
3099 <true/> | <false/>
3100 </dict>
3101 ```
3102 #### policies.json
3103 ```
3104 {
3105 "policies": {
3106 "OfferToSaveLoginsDefault": true | false
3107 }
3108 }
3109 ```
3110 ### OverrideFirstRunPage
3111 Override the first run page. If the value is blank, no first run page is displayed.
3112
3113 **Compatibility:** Firefox 60, Firefox ESR 60\
3114 **CCK2 Equivalent:** `welcomePage`,`noWelcomePage`\
3115 **Preferences Affected:** `startup.homepage_welcome_url`
3116
3117 #### Windows (GPO)
3118 ```
3119 Software\Policies\Mozilla\Firefox\OverrideFirstRunPage = "http://example.org"
3120 ```
3121 #### Windows (Intune)
3122 OMA-URI:
3123 ```
3124 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverrideFirstRunPage
3125 ```
3126 Value (string):
3127 ```
3128 <enabled/>
3129 <data id="OverridePage" value="https://example.com"/>
3130 ```
3131 #### macOS
3132 ```
3133 <dict>
3134 <key>OverrideFirstRunPage</key>
3135 <string>http://example.org</string>
3136 </dict>
3137 ```
3138 #### policies.json
3139 ```
3140 {
3141 "policies": {
3142 "OverrideFirstRunPage": "http://example.org"
3143 }
3144 ```
3145 ### OverridePostUpdatePage
3146 Override the upgrade page. If the value is blank, no upgrade page is displayed.
3147
3148 **Compatibility:** Firefox 60, Firefox ESR 60\
3149 **CCK2 Equivalent:** `upgradePage`,`noUpgradePage`\
3150 **Preferences Affected:** `startup.homepage_override_url`
3151
3152 #### Windows (GPO)
3153 ```
3154 Software\Policies\Mozilla\Firefox\OverridePostUpdatePage = "http://example.org"
3155 ```
3156 #### Windows (Intune)
3157 OMA-URI:
3158 ```
3159 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/OverridePostUpdatePage
3160 ```
3161 Value (string):
3162 ```
3163 <enabled/>
3164 <data id="OverridePage" value="https://example.com"/>
3165 ```
3166 #### macOS
3167 ```
3168 <dict>
3169 <key>OverridePostUpdatePage</key>
3170 <string>http://example.org</string>
3171 </dict>
3172 ```
3173 #### policies.json
3174 ```
3175 {
3176 "policies": {
3177 "OverridePostUpdatePage": "http://example.org"
3178 }
3179 ```
3180 ### PasswordManagerEnabled
3181 Remove access to the password manager via preferences and blocks about:logins on Firefox 70.
3182
3183 **Compatibility:** Firefox 70, Firefox ESR 60.2\
3184 **CCK2 Equivalent:** N/A\
3185 **Preferences Affected:** `pref.privacy.disable_button.view_passwords`
3186
3187 #### Windows (GPO)
3188 ```
3189 Software\Policies\Mozilla\Firefox\PasswordManagerEnabled = 0x1 | 0x0
3190 ```
3191 #### Windows (Intune)
3192 OMA-URI:
3193 ```
3194 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PasswordManagerEnabled
3195 ```
3196 Value (string):
3197 ```
3198 <enabled/> or <disabled/>
3199 ```
3200 #### macOS
3201 ```
3202 <dict>
3203 <key>PasswordManagerEnabled</key>
3204 <true/> | <false/>
3205 </dict>
3206 ```
3207 #### policies.json
3208 ```
3209 {
3210 "policies": {
3211 "PasswordManagerEnabled": true | false
3212 }
3213 }
3214 ```
3215 ### PDFjs
3216 Disable or configure PDF.js, the built-in PDF viewer.
3217
3218 If `Enabled` is set to false, the built-in PDF viewer is disabled.
3219
3220 If `EnablePermissions` is set to true, the built-in PDF viewer will honor document permissions like preventing the copying of text.
3221
3222 Note: DisableBuiltinPDFViewer has not been deprecated. You can either continue to use it, or switch to using PDFjs->Enabled to disable the built-in PDF viewer. This new permission was added because we needed a place for PDFjs->EnabledPermissions.
3223
3224 **Compatibility:** Firefox 77, Firefox ESR 68.9\
3225 **CCK2 Equivalent:** N/A\
3226 **Preferences Affected:** `pdfjs.diabled`,`pdfjs.enablePermissions`
3227
3228 #### Windows (GPO)
3229 ```
3230 Software\Policies\Mozilla\Firefox\PDFjs\Enabled = 0x1 | 0x0
3231 Software\Policies\Mozilla\Firefox\PDFjs\EnablePermissions = 0x1 | 0x0
3232 ```
3233 #### Windows (Intune)
3234 OMA-URI:
3235 ```
3236 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_Enabled
3237 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~PDFjs/PDFjs_EnablePermissions
3238 ```
3239 Value (string):
3240 ```
3241 <enabled/>or <disabled/>
3242 ```
3243 #### macOS
3244 ```
3245 <dict>
3246 <key>PDFjs</key>
3247 <dict>
3248 <key>Enabled</key>
3249 <true/> | <false/>
3250 <key><EnablePermissions</key>
3251 <true/> | <false/>
3252 </dict>
3253 </dict>
3254 ```
3255 #### policies.json
3256 ```
3257 {
3258 "policies": {
3259 "PSFjs": {
3260 "Enabled": true | false,
3261 "EnablePermissions": true | false
3262 }
3263 }
3264 ```
3265 ### Permissions
3266 Set permissions associated with camera, microphone, location, notifications, and autoplay. Because these are origins, not domains, entries with unique ports must be specified separately. See examples below.
3267
3268 `Allow` is a list of origins where the feature is allowed.
3269
3270 `Block` is a list of origins where the feature is not allowed.
3271
3272 `BlockNewRequests` determines whether or not new requests can be made for the feature.
3273
3274 `Locked` prevents the user from changing preferences for the feature.
3275
3276 `Default` specifies the default value for Autoplay. block-audio-video is not supported on Firefox ESR 68.
3277
3278 **Compatibility:** Firefox 62, Firefox ESR 60.2 (Autoplay added in Firefox 74, Firefox ESR 68.6, Autoplay Default/Locked added in Firefox 76, Firefox ESR 68.8)\
3279 **CCK2 Equivalent:** N/A\
3280 **Preferences Affected:** `permissions.default.camera`,`permissions.default.microphone`,`permissions.default.geo`,`permissions.default.desktop-notification`,`media.autoplay.default`
3281
3282 #### Windows (GPO)
3283 ```
3284 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\1 = "https://example.org"
3285 Software\Policies\Mozilla\Firefox\Permissions\Camera\Allow\2 = "https://example.org:1234"
3286 Software\Policies\Mozilla\Firefox\Permissions\Camera\Block\1 = "https://example.edu"
3287 Software\Policies\Mozilla\Firefox\Permissions\Camera\BlockNewRequests = 0x1 | 0x0
3288 Software\Policies\Mozilla\Firefox\Permissions\Camera\Locked = 0x1 | 0x0
3289 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Allow\1 = "https://example.org"
3290 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Block\1 = "https://example.edu"
3291 Software\Policies\Mozilla\Firefox\Permissions\Microphone\BlockNewRequests = 0x1 | 0x0
3292 Software\Policies\Mozilla\Firefox\Permissions\Microphone\Locked = 0x1 | 0x0
3293 Software\Policies\Mozilla\Firefox\Permissions\Location\Allow\1 = "https://example.org"
3294 Software\Policies\Mozilla\Firefox\Permissions\Location\Block\1 = "https://example.edu"
3295 Software\Policies\Mozilla\Firefox\Permissions\Location\BlockNewRequests = 0x1 | 0x0
3296 Software\Policies\Mozilla\Firefox\Permissions\Location\Locked = 0x1 | 0x0
3297 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Allow\1 = "https://example.org"
3298 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Block\1 = "https://example.edu"
3299 Software\Policies\Mozilla\Firefox\Permissions\Notifications\BlockNewRequests = 0x1 | 0x0
3300 Software\Policies\Mozilla\Firefox\Permissions\Notifications\Locked = 0x1 | 0x0
3301 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Allow\1 = "https://example.org"
3302 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Block\1 = "https://example.edu"
3303 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Default = "allow-audio-video" | "block-audio" | "block-audio-video"
3304 Software\Policies\Mozilla\Firefox\Permissions\Autoplay\Locked = 0x1 | 0x0
3305 ```
3306 #### Windows (Intune)
3307 OMA-URI:
3308 ```
3309 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_BlockNewRequests
3310 ```
3311 Value (string):
3312 ```
3313 <enabled/> or <disabled/>
3314 ```
3315 OMA-URI:
3316 ```
3317 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Location/Location_Locked
3318 ```
3319 Value (string):
3320 ```
3321 <enabled/> or <disabled/>
3322 ```
3323 OMA-URI:
3324 ```
3325 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Allow
3326 ```
3327 Value (string):
3328 ```
3329 <enabled/>
3330 <data id="Permissions" value="1&#xF000;https://example.org"/>
3331 ```
3332 OMA-URI:
3333 ```
3334 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_BlockNewRequests
3335 ```
3336 Value (string):
3337 ```
3338 <enabled/> or <disabled/>
3339 ```
3340 OMA-URI:
3341 ```
3342 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Notifications/Notifications_Locked
3343 ```
3344 Value (string):
3345 ```
3346 <enabled/> or <disabled/>
3347 ```
3348 OMA-URI:
3349 ```
3350 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Allow
3351 ```
3352 Value (string):
3353 ```
3354 <enabled/>
3355 <data id="Permissions" value="1&#xF000;https://example.org"/>
3356 ```
3357 OMA-URI:
3358 ```
3359 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Block
3360 ```
3361 Value (string):
3362 ```
3363 <enabled/>
3364 <data id="Permissions" value="1&#xF000;https://example.edu"/>
3365 ```
3366 OMA-URI:
3367 ```
3368 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Default
3369 ```
3370 Value (string):
3371 ```
3372 <enabled/>
3373 <data id="Autoplay_Default" value="allow-audio-video | block-audio | block-audio-video"/>
3374 ```
3375 OMA-URI:
3376 ```
3377 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Permissions~Autoplay/Autoplay_Locked
3378 ```
3379 Value (string):
3380 ```
3381 <enabled/> or <disabled/>
3382 ```
3383 #### macOS
3384 ```
3385 <dict>
3386 <key>Permissions</key>
3387 <dict>
3388 <key>Camera</key>
3389 <dict>
3390 <key>Allow</key>
3391 <array>
3392 <string>https://example.org</string>
3393 <string>https://example.org:1234</string>
3394 </array>
3395 <key>Block</key>
3396 <array>
3397 <string>https://example.edu</string>
3398 </array>
3399 <key>BlockNewRequests</key>
3400 <true/> | <false/>
3401 <key>Locked</key>
3402 <true/> | <false/>
3403 </dict>
3404 <key>Microphone</key>
3405 <dict>
3406 <key>Allow</key>
3407 <array>
3408 <string>https://example.org</string>
3409 </array>
3410 <key>Block</key>
3411 <array>
3412 <string>https://example.edu</string>
3413 </array>
3414 <key>BlockNewRequests</key>
3415 <true/> | <false/>
3416 <key>Locked</key>
3417 <true/> | <false/>
3418 </dict>
3419 <key>Location</key>
3420 <dict>
3421 <key>Allow</key>
3422 <array>
3423 <string>https://example.org</string>
3424 </array>
3425 <key>Block</key>
3426 <array>
3427 <string>https://example.edu</string>
3428 </array>
3429 <key>BlockNewRequests</key>
3430 <true/> | <false/>
3431 <key>Locked</key>
3432 <true/> | <false/>
3433 </dict>
3434 <key>Notifications</key>
3435 <dict>
3436 <key>Allow</key>
3437 <array>
3438 <string>https://example.org</string>
3439 </array>
3440 <key>Block</key>
3441 <array>
3442 <string>https://example.edu</string>
3443 </array>
3444 <key>BlockNewRequests</key>
3445 <true/>
3446 <key>Locked</key>
3447 <true/>
3448 </dict>
3449 <key>Autoplay</key>
3450 <dict>
3451 <key>Allow</key>
3452 <array>
3453 <string>https://example.org</string>
3454 </array>
3455 <key>Block</key>
3456 <array>
3457 <string>https://example.edu</string>
3458 </array>
3459 <key>Default</key>
3460 <string>allow-audio-video | block-audio | block-audio-video</string>
3461 <key>Locked</key>
3462 <true/> | <false/>
3463 </dict>
3464 </dict>
3465 </dict>
3466 ```
3467 #### policies.json
3468 ```
3469 {
3470 "policies": {
3471 "Permissions": {
3472 "Camera": {
3473 "Allow": ["https://example.org","https://example.org:1234"],
3474 "Block": ["https://example.edu"],
3475 "BlockNewRequests": true | false,
3476 "Locked": true | false
3477 },
3478 "Microphone": {
3479 "Allow": ["https://example.org"],
3480 "Block": ["https://example.edu"],
3481 "BlockNewRequests": true | false,
3482 "Locked": true | false
3483 },
3484 "Location": {
3485 "Allow": ["https://example.org"],
3486 "Block": ["https://example.edu"],
3487 "BlockNewRequests": true | false,
3488 "Locked": true | false
3489 },
3490 "Notifications": {
3491 "Allow": ["https://example.org"],
3492 "Block": ["https://example.edu"],
3493 "BlockNewRequests": true | false,
3494 "Locked": true | false
3495 },
3496 "Autoplay": {
3497 "Allow": ["https://example.org"],
3498 "Block": ["https://example.edu"],
3499 "Default": "allow-audio-video" | "block-audio" | "block-audio-video",
3500 "Locked": true | false
3501 }
3502 }
3503 }
3504 }
3505 ```
3506 ### PictureInPicture
3507
3508 Enable or disable Picture-in-Picture.
3509
3510 **Compatibility:** Firefox 78, Firefox ESR 78\
3511 **CCK2 Equivalent:** N/A\
3512 **Preferences Affected:** `media.videocontrols.picture-in-picture.video-toggle.enabled`
3513
3514 #### Windows (GPO)
3515 ```
3516 Software\Policies\Mozilla\Firefox\PictureInPicture = 0x1 | 0x0
3517 ```
3518 #### Windows (Intune)
3519 OMA-URI:
3520 ```
3521 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PictureInPicture
3522 ```
3523 Value (string):
3524 ```
3525 <enabled/> or <disabled/>
3526 ```
3527 #### macOS
3528 ```
3529 <dict>
3530 <key>PictureInPicture</key>
3531 <true/> | <false/>
3532 </dict>
3533 ```
3534 #### policies.json
3535 ```
3536 {
3537 "policies": {
3538 "PictureInPicture": true | false
3539 }
3540 }
3541 ```
3542 ### PopupBlocking
3543 Configure the default pop-up window policy as well as origins for which pop-up windows are allowed.
3544
3545 `Allow` is a list of origins where popup-windows are allowed.
3546
3547 `Default` determines whether or not pop-up windows are allowed by default.
3548
3549 `Locked` prevents the user from changing pop-up preferences.
3550
3551 **Compatibility:** Firefox 60, Firefox ESR 60\
3552 **CCK2 Equivalent:** `permissions.popup`\
3553 **Preferences Affected:** `dom.disable_open_during_load`
3554
3555 #### Windows (GPO)
3556 ```
3557 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\1 = "https://example.org"
3558 Software\Policies\Mozilla\Firefox\PopupBlocking\Allow\2 = "https://example.edu"
3559 Software\Policies\Mozilla\Firefox\PopupBlocking\Default = 0x1 | 0x0
3560 Software\Policies\Mozilla\Firefox\PopupBlocking\Locked = 0x1 | 0x0
3561 ```
3562 #### Windows (Intune)
3563 OMA-URI:
3564 ```
3565 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Allow
3566 ```
3567 Value (string):
3568 ```
3569 <enabled/>
3570 <data id="Permissions" value="1&#xF000;https://example.org&#xF000;2&#xF000;https://example.edu"/>
3571 ```
3572 OMA-URI:
3573 ```
3574 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Default
3575 ```
3576 Value (string):
3577 ```
3578 <enabled/> or <disabled/>
3579 ```
3580 OMA-URI:
3581 ```
3582 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Popups/PopupBlocking_Locked
3583 ```
3584 Value (string):
3585 ```
3586 <enabled/> or <disabled/>
3587 ```
3588 #### macOS
3589 ```
3590 <dict>
3591 <key>PopupBlocking</key>
3592 <dict>
3593 <key>Allow</key>
3594 <array>
3595 <string>http://example.org</string>
3596 <string>http://example.edu</string>
3597 </array>
3598 <key>Default</key>
3599 <true/> | <false/>
3600 <key>Locked</key>
3601 <true/> | <false/>
3602 </dict>
3603 </dict>
3604 ```
3605 #### policies.json
3606 ```
3607 {
3608 "policies": {
3609 "PopupBlocking": {
3610 "Allow": ["http://example.org/",
3611 "http://example.edu/"],
3612 "Default": true | false,
3613 "Locked": true | false
3614 }
3615 }
3616 }
3617 ```
3618 ### Preferences
3619 Set and lock certain preferences.
3620
3621 **Compatibility:** See below\
3622 **CCK2 Equivalent:** `preferences`\
3623 **Preferences Affected:** See below
3624
3625 | Preference | Type | Compatibility | Default
3626 | --- | --- | --- | ---
3627 | accessibility.force_disabled | integer | Firefox 70, Firefox ESR 68.2 | 0
3628 | &nbsp;&nbsp;&nbsp;&nbsp;If set to 1, platform accessibility is disabled.
3629 | app.update.auto (Deprecated - Switch to AppAutoUpdate policy) | boolean | Firefox 68, Firefox ESR 68 | true
3630 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Firefox doesn't automatically install update.
3631 | browser.bookmarks.autoExportHTML | boolean | Firefox 70, Firefox ESR 68.2 | false
3632 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are exported on shutdown.
3633 | browser.bookmarks.file | string | Firefox 70, Firefox ESR 68.2 | N/A
3634 | &nbsp;&nbsp;&nbsp;&nbsp;If set, the name of the file where bookmarks are exported and imported.
3635 | browser.bookmarks.restore_default_bookmarks | boolean | Firefox 70, Firefox ESR 68.2 | N/A
3636 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are restored to their defaults.
3637 | browser.cache.disk.enable | boolean | Firefox 68, Firefox ESR 68 | true
3638 | &nbsp;&nbsp;&nbsp;&nbsp;If false, don't store cache on the hard drive.
3639 | ~browser.cache.disk.parent_directory~ | string | Firefox 68, Firefox ESR 68 | Profile temporary directory
3640 | &nbsp;&nbsp;&nbsp;&nbsp;~If set, changes the location of the disk cache.~ This policy doesn't work. It's being worked on.
3641 | browser.fixup.dns_first_for_single_words | boolean | Firefox 68, Firefox ESR 68 | false
3642 | &nbsp;&nbsp;&nbsp;&nbsp;If true, single words are sent to DNS, not directly to search.
3643 | browser.newtabpage.activity-stream.default.sites | string | Firefox 72, ESR 68.4 | Locale dependent
3644 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of URLs to use as the default top sites on the new tab page.
3645 | browser.places.importBookmarksHTML | boolean | Firefox 70, Firefox ESR 68.2
3646 | &nbsp;&nbsp;&nbsp;&nbsp;If true, bookmarks are always imported on startup.
3647 | browser.safebrowsing.phishing.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3648 | &nbsp;&nbsp;&nbsp;&nbsp;If false, phishing protection is not enabled (Not recommended)
3649 | browser.safebrowsing.malware.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3650 | &nbsp;&nbsp;&nbsp;&nbsp;If false, malware protection is not enabled (Not recommended)
3651 | browser.search.update | boolean | Firefox 68, Firefox ESR 68 | true
3652 | &nbsp;&nbsp;&nbsp;&nbsp;If false, updates for search engines are not checked.
3653 | browser.slowStartup.notificationDisabled | boolean | Firefox 70, Firefox ESR 68.2 | false
3654 | &nbsp;&nbsp;&nbsp;&nbsp;If true, a notification isn't shown if startup is slow.
3655 | browser.tabs.warnOnClose | boolean | Firefox 68, Firefox ESR 68 | true
3656 | &nbsp;&nbsp;&nbsp;&nbsp;If false, there is no warning when the browser is closed.
3657 | browser.taskbar.previews.enable | boolean | Firefox 70, Firefox ESR 68.2 (Windows only) | false
3658 | &nbsp;&nbsp;&nbsp;&nbsp;If true, tab previews are shown in the Windows taskbar.
3659 | browser.urlbar.suggest.bookmark | boolean | Firefox 68, Firefox ESR 68 | true
3660 | &nbsp;&nbsp;&nbsp;&nbsp;If false, bookmarks aren't suggested when typing in the URL bar.
3661 | browser.urlbar.suggest.history | boolean | Firefox 68, Firefox ESR 68 | true
3662 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history isn't suggested when typing in the URL bar.
3663 | browser.urlbar.suggest.openpage | boolean | Firefox 68, Firefox ESR 68 | true
3664 | &nbsp;&nbsp;&nbsp;&nbsp;If false, open tabs aren't suggested when typing in the URL bar.
3665 | datareporting.policy.dataSubmissionPolicyBypassNotification | boolean | Firefox 68, Firefox ESR 68 | false
3666 | &nbsp;&nbsp;&nbsp;&nbsp;If true, don't show the privacy policy tab on first run.
3667 | dom.allow_scripts_to_close_windows | boolean | Firefox 70, Firefox ESR 68.2 | false
3668 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web page can close windows.
3669 | dom.disable_window_flip | boolean | Firefox 68, Firefox ESR 68 | true
3670 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can focus and activate windows.
3671 | dom.disable_window_move_resize | boolean | Firefox 68, Firefox ESR 68 | false
3672 | &nbsp;&nbsp;&nbsp;&nbsp;If true, web pages can't move or resize windows.
3673 | dom.event.contextmenu.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3674 | &nbsp;&nbsp;&nbsp;&nbsp;If false, web pages can't override context menus.
3675 | dom.keyboardevent.keypress.hack.dispatch_non_printable_keys.addl | string | Firefox 68, Firefox ESR 68 | N/A
3676 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3677 | dom.keyboardevent.keypress.hack.use_legacy_keycode_and_charcode.addl | string | Firefox 68, Firefox ESR 68 | N/A
3678 | &nbsp;&nbsp;&nbsp;&nbsp;See https://support.mozilla.org/en-US/kb/dom-events-changes-introduced-firefox-66
3679 | dom.xmldocument.load.enabled | boolean | Firefox ESR 68.5 | true.
3680 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.load is not available.
3681 | dom.xmldocument.async.enabled | boolean | Firefox ESR 68.5 | true
3682 | &nbsp;&nbsp;&nbsp;&nbsp;If false, XMLDocument.async is not available.
3683 | extensions.blocklist.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3684 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the extensions blocklist is not used (Not recommended)
3685 | extensions.getAddons.showPane | boolean | Firefox 68, Firefox ESR 68 | N/A
3686 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Recommendations tab is not displayed in the Add-ons Manager.
3687 | extensions.htmlaboutaddons.recommendations.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3688 | &nbsp;&nbsp;&nbsp;&nbsp;If false, recommendations are not shown on the Extensions tab in the Add-ons Manager.
3689 | geo.enabled | boolean | Firefox 70, Firefox ESR 68.2 | true
3690 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the geolocation API is disabled. | Language dependent
3691 | intl.accept_languages | string | Firefox 70, Firefox ESR 68.2
3692 | &nbsp;&nbsp;&nbsp;&nbsp;If set, preferred language for web pages.
3693 | media.eme.enabled (Deprecated - Switch to EncryptedMediaExtensions policy) | boolean | Firefox 70, Firefox ESR 68.2 | true
3694 | &nbsp;&nbsp;&nbsp;&nbsp;If false, Encrypted Media Extensions are not enabled.
3695 | media.gmp-gmpopenh264.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3696 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the OpenH264 plugin is not downloaded.
3697 | media.gmp-widevinecdm.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3698 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Widevine plugin is not downloaded.
3699 | media.peerconnection.enabled | boolean | Firefox 72, Firefox ESR 68.4 | true
3700 | &nbsp;&nbsp;&nbsp;&nbsp;If false, WebRTC is disabled
3701 | media.peerconnection.ice.obfuscate_host_addresses.whitelist | string | Firefox 72, Firefox ESR 68.4 | N/A
3702 | &nbsp;&nbsp;&nbsp;&nbsp;If set, a list of domains for which mDNS hostname obfuscation is
3703 disabled
3704 | network.dns.disableIPv6 | boolean | Firefox 68, Firefox ESR 68 | false
3705 | &nbsp;&nbsp;&nbsp;&nbsp;If true, IPv6 DNS lokoups are disabled.
3706 | network.IDN_show_punycode | boolean | Firefox 68, Firefox ESR 68 | false
3707 | &nbsp;&nbsp;&nbsp;&nbsp;If true, display the punycode version of internationalized domain names.
3708 | places.history.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3709 | &nbsp;&nbsp;&nbsp;&nbsp;If false, history is not enabled.
3710 | print.save_print_settings | boolean | Firefox 70, Firefox ESR 68.2 | true
3711 | &nbsp;&nbsp;&nbsp;&nbsp;If false, print settings are not saved between jobs.
3712 | security.default_personal_cert | string | Firefox 68, Firefox ESR 68 | Ask Every Time
3713 | &nbsp;&nbsp;&nbsp;&nbsp;If set to Select Automatically, Firefox automatically chooses the default personal certificate.
3714 | security.mixed_content.block_active_content | boolean | Firefox 70, Firefox ESR 68.2 | true
3715 | &nbsp;&nbsp;&nbsp;&nbsp;If false, mixed active content (HTTP and HTTPS) is not blocked.
3716 | security.osclientcerts.autoload | boolean | Firefox 72 (Windows), Firefox 75 (macOS) | false
3717 | &nbsp;&nbsp;&nbsp;&nbsp;If true, client certificates are loaded from the operating system certificate store.
3718 | security.ssl.errorReporting.enabled | boolean | Firefox 68, Firefox ESR 68 | true
3719 | &nbsp;&nbsp;&nbsp;&nbsp;If false, SSL errors cannot be sent to Mozilla.
3720 | security.tls.hello_downgrade_check | boolean | Firefox 72, Firefox ESR 68.4 | true
3721 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the TLS 1.3 downgrade check is disabled.
3722 | ui.key.menuAccessKeyFocuses | boolean | Firefox 68, Firefox ESR 68 | true
3723 | &nbsp;&nbsp;&nbsp;&nbsp;If false, the Alt key doesn't show the menubar on Windows.
3724 | widget.content.gtk-theme-override | string | Firefox 72, Firefox ESR 68.4 (Linux only) | N/A
3725 | &nbsp;&nbsp;&nbsp;&nbsp;If set, overrides the GTK theme for widgets.
3726 #### Windows (GPO)
3727 ```
3728 Software\Policies\Mozilla\Firefox\Preferences\boolean_preference_name = 0x1 | 0x0
3729 Software\Policies\Mozilla\Firefox\Preferences\string_preference_name = "string_value"
3730 ```
3731 #### Windows (Intune)
3732 OMA-URI: (periods are replaced by underscores)
3733 ```
3734 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/boolean_preference_name
3735 ```
3736 Value (string):
3737 ```
3738 <enabled/> or <disabled/>
3739 ```
3740 OMA-URI: (periods are replaced by underscores)
3741 ```
3742 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Preferences/string_preference_name
3743 ```
3744 Value (string):
3745 ```
3746 <enabled/>
3747 <data id="Preferences_String" value="string_value"/>
3748 ```
3749 #### macOS
3750 ```
3751 <dict>
3752 <key>Preferences</key>
3753 <dict>
3754 <key>boolean_preference_name</key>
3755 <true/> | <false/>
3756 <key>string_preference_name</key>
3757 <string>string_value</string>
3758 </dict>
3759 </dict>
3760 ```
3761 #### policies.json
3762 ```
3763 {
3764 "policies": {
3765 "Preferences": {
3766 "boolean_preference_name": true | false,
3767 "string_preference_name": "string_value"
3768 }
3769 }
3770 }
3771 ```
3772 ### PromptForDownloadLocation
3773 Ask where to save each file before downloading.
3774
3775 **Compatibility:** Firefox 68, Firefox ESR 68\
3776 **CCK2 Equivalent:** N/A\
3777 **Preferences Affected:** `browser.download.useDownloadDir`
3778
3779 #### Windows (GPO)
3780 ```
3781 Software\Policies\Mozilla\Firefox\PromptForDownloadLocation = 0x1 | 0x0
3782 ```
3783 #### Windows (Intune)
3784 OMA-URI:
3785 ```
3786 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/PromptForDownloadLocation
3787 ```
3788 Value (string):
3789 ```
3790 <enabled/> or <disabled/>
3791 ```
3792 #### macOS
3793 ```
3794 <dict>
3795 <key>PromptForDownloadLocation</key>
3796 <true/> | <false/>
3797 </dict>
3798 ```
3799 #### policies.json
3800 ```
3801 {
3802 "policies": {
3803 "PromptForDownloadLocation": true | false
3804 }
3805 }
3806 ```
3807 ### Proxy
3808 Configure proxy settings. These settings correspond to the connection settings in Firefox preferences.
3809 To specify ports, append them to the hostnames with a colon (:).
3810
3811 `Mode` is the proxy method being used.
3812
3813 `Locked` is whether or not proxy settings can be changed.
3814
3815 `HTTPProxy` is the HTTP proxy server.
3816
3817 `UseHTTPProxyForAllProtocols` is whether or not the HTTP proxy should be used for all other proxies.
3818
3819 `SSLProxy` is the SSL proxy server.
3820
3821 `FTPProxy` is the FTP proxy server.
3822
3823 `SOCKSProxy` is the SOCKS proxy server
3824
3825 `SOCKSVersion` is the SOCKS version (4 or 5)
3826
3827 `Passthrough` is list of hostnames or IP addresses that will not be proxied. Use `<local>` to bypass proxying for all hostnames which do not contain periods.
3828
3829 `AutoConfigURL` is a URL for proxy configuration (only used if Mode is autoConfig).
3830
3831 `AutoLogin` means do not prompt for authentication if password is saved.
3832
3833 `UseProxyForDNS` to use proxy DNS when using SOCKS v5.
3834
3835 **Compatibility:** Firefox 60, Firefox ESR 60\
3836 **CCK2 Equivalent:** `networkProxy*`\
3837 **Preferences Affected:** `network.proxy.type`,`network.proxy.autoconfig_url`,`network.proxy.socks_remote_dns`,`signon.autologin.proxy`,`network.proxy.socks_version`,`network.proxy.no_proxies_on`,`network.proxy.share_proxy_settings`,`network.proxy.http`,`network.proxy.http_port`,`network.proxy.ftp`,`network.proxy.ftp_port`,`network.proxy.ssl`,`network.proxy.ssl_port`,`network.proxy.socks`,`network.proxy.socks_port`
3838
3839 #### Windows (GPO)
3840 ```
3841 Software\Policies\Mozilla\Firefox\Proxy\Mode = "none", "system", "manual", "autoDetect", "autoConfig"
3842 Software\Policies\Mozilla\Firefox\Proxy\Locked = 0x1 | 0x0
3843 Software\Policies\Mozilla\Firefox\=Proxy\HTTPProxy = https://httpproxy.example.com
3844 Software\Policies\Mozilla\Firefox\Proxy\UseHTTPProxyForAllProtocols = 0x1 | 0x0
3845 Software\Policies\Mozilla\Firefox\Proxy\SSLProxy = https://sslproxy.example.com
3846 Software\Policies\Mozilla\Firefox\Proxy\FTPProxy = https://ftpproxy.example.com
3847 Software\Policies\Mozilla\Firefox\Proxy\SOCKSProxy = https://socksproxy.example.com
3848 Software\Policies\Mozilla\Firefox\Proxy\SOCKSVersion = 0x4 | 0x5
3849 Software\Policies\Mozilla\Firefox\Proxy\Passthrough = <local>
3850 Software\Policies\Mozilla\Firefox\Proxy\AutoConfigURL = URL_TO_AUTOCONFIG
3851 Software\Policies\Mozilla\Firefox\Proxy\AutoLogin = 0x1 | 0x0
3852 Software\Policies\Mozilla\Firefox\Proxy\UseProxyForDNS = 0x1 | 0x0
3853 ```
3854 #### Windows (Intune)
3855 OMA-URI:
3856 ```
3857 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/Proxy
3858 ```
3859 Value (string):
3860 ```
3861 <enabled/>
3862 <data id="ProxyLocked" value="true | false"/>
3863 <data id="ConnectionType" value="none | system | manual | autoDetect | autoConfig"/>
3864 <data id="HTTPProxy" value="https://httpproxy.example.com"/>
3865 <data id="UseHTTPProxyForAllProtocols" value="true | false"/>
3866 <data id="SSLProxy" value="https://sslproxy.example.com"/>
3867 <data id="FTPProxy" value="https://ftpproxy.example.com"/>
3868 <data id="SOCKSProxy" value="https://socksproxy.example.com"/>
3869 <data id="SOCKSVersion" value="4 | 5"/>
3870 <data id="AutoConfigURL" value="URL_TO_AUTOCONFIG"/>
3871 <data id="Passthrough" value="<local>"/>
3872 <data id="AutoLogin" value="true | false"/>
3873 <data id="UseProxyForDNS" value="true | false"/>
3874 ```
3875 #### macOS
3876 ```
3877 <dict>
3878 <key>Proxy</key>
3879 <dict>
3880 <key>Mode</key>
3881 <string>none | system | manual | autoDetect | autoConfig</string>
3882 <key>Locked</key>
3883 <true> | </false>
3884 <key>HTTPProxy</key>
3885 <string>https://httpproxy.example.com</string>
3886 <key>UseHTTPProxyForAllProtocols</key>
3887 <true> | </false>
3888 <key>SSLProxy</key>
3889 <string>https://sslproxy.example.com</string>
3890 <key>FTPProxy</key>
3891 <string>https://ftpproxy.example.com</string>
3892 <key>SOCKSProxy</key>
3893 <string>https://socksproxy.example.com</string>
3894 <key>SOCKSVersion</key>
3895 <string>4 | 5</string>
3896 <key>Passthrough</key>
3897 <string>&lt;local>&gt;</string>
3898 <key>AutoConfigURL</key>
3899 <string>URL_TO_AUTOCONFIG</string>
3900 <key>AutoLogin</key>
3901 <true> | </false>
3902 <key>UseProxyForDNS</key>
3903 <true> | </false>
3904 </dict>
3905 </dict>
3906 ```
3907 #### policies.json
3908 ```
3909 {
3910 "policies": {
3911 "Proxy": {
3912 "Mode": "none", "system", "manual", "autoDetect", "autoConfig",
3913 "Locked": true | false,
3914 "HTTPProxy": "hostname",
3915 "UseHTTPProxyForAllProtocols": true | false,
3916 "SSLProxy": "hostname",
3917 "FTPProxy": "hostname",
3918 "SOCKSProxy": "hostname",
3919 "SOCKSVersion": 4 | 5
3920 "Passthrough": "<local>",
3921 "AutoConfigURL": "URL_TO_AUTOCONFIG",
3922 "AutoLogin": true | false,
3923 "UseProxyForDNS": true | false
3924 }
3925 }
3926 }
3927 ```
3928 ### RequestedLocales
3929 Set the the list of requested locales for the application in order of preference. It will cause the corresponding language pack to become active.
3930
3931 Note: For Firefox 68, this can now be a string so that you can specify an empty value.
3932
3933 **Compatibility:** Firefox 64, Firefox ESR 60.4, Updated in Firefox 68, Firefox ESR 68\
3934 **CCK2 Equivalent:** N/A\
3935 **Preferences Affected:** N/A
3936 #### Windows (GPO)
3937 ```
3938 Software\Policies\Mozilla\Firefox\RequestedLocales\1 = "de"
3939 Software\Policies\Mozilla\Firefox\RequestedLocales\2 = "en-US"
3940
3941 or
3942
3943 Software\Policies\Mozilla\Firefox\RequestedLocales = "de,en-US"
3944 ```
3945 #### Windows (Intune)
3946 OMA-URI:
3947 ```
3948 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/RequestedLocalesString
3949 ```
3950 Value (string):
3951 ```
3952 <enabled/>
3953 <data id="Preferences_String" value="de,en-US"/>
3954 ```
3955 #### macOS
3956 ```
3957 <dict>
3958 <key>RequestedLocales</key>
3959 <array>
3960 <string>de</string>
3961 <string>en-US</string>
3962 </array>
3963 </dict>
3964
3965 or
3966
3967 <dict>
3968 <key>RequestedLocales</key>
3969 <string>de,en-US</string>
3970 </dict>
3971
3972 ```
3973 #### policies.json
3974 ```
3975 {
3976 "policies": {
3977 "RequestedLocales": ["de", "en-US"]
3978 }
3979 }
3980
3981 or
3982
3983 {
3984 "policies": {
3985 "RequestedLocales": "de,en-US"
3986 }
3987 }
3988 ```
3989 <a name="SanitizeOnShutdown"></a>
3990
3991 ### SanitizeOnShutdown (Selective)
3992 Clear data on shutdown. Choose from Cache, Cookies, Download History, Form & Search History, Browsing History, Active Logins, Site Preferences and Offline Website Data.
3993
3994 Previously, these values were always locked. Starting with Firefox 74 and Firefox ESR 68.6, you can use the `Locked` option to either keep the values unlocked (set it to false), or lock only the values you set (set it to true). If you want the old behavior of locking everything, do not set `Locked` at all.
3995
3996 **Compatibility:** Firefox 68, Firefox ESR 68 (Locked added in 74/68.6)\
3997 **CCK2 Equivalent:** N/A\
3998 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
3999 #### Windows (GPO)
4000 ```
4001 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cache = 0x1 | 0x0
4002 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Cookies = 0x1 | 0x0
4003 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Downloads = 0x1 | 0x0
4004 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\FormData = 0x1 | 0x0
4005 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\History = 0x1 | 0x0
4006 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Sessions = 0x1 | 0x0
4007 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\SiteSettings = 0x1 | 0x0
4008 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\OfflineApps = 0x1 | 0x0
4009 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown\Locked = 0x1 | 0x0
4010 ```
4011 #### Windows (Intune)
4012 OMA-URI:
4013 ```
4014 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~SanitizeOnShutdown/I_SanitizeOnShutdown_Locked
4015 ```
4016 Value (string):
4017 ```
4018 <enabled/> or <disabled/>
4019 ```
4020 #### macOS
4021 ```
4022 <dict>
4023 <key>SanitizeOnShutdown</key>
4024 <dict>
4025 <key>Cache</key>
4026 <true/> | <false/>
4027 <key>Cookies</key>
4028 <true/> | <false/>
4029 <key>Downloads</key>
4030 <true/> | <false/>
4031 <key>FormData</key>
4032 <true/> | <false/>
4033 <key>History</key>
4034 <true/> | <false/>
4035 <key>Sessions</key>
4036 <true/> | <false/>
4037 <key>SiteSettings</key>
4038 <true/> | <false/>
4039 <key>OfflineApps</key>
4040 <true/> | <false/>
4041 <key>Locked</key>
4042 <true/> | <false/>
4043 </dict>
4044 </dict>
4045 ```
4046 #### policies.json
4047 ```
4048 {
4049 "policies": {
4050 "SanitizeOnShutdown": {
4051 "Cache": true | false,
4052 "Cookies": true | false,
4053 "Downloads": true | false,
4054 "FormData": true | false,
4055 "History": true | false,
4056 "Sessions": true | false,
4057 "SiteSettings": true | false,
4058 "OfflineApps": true | false,
4059 "Locked": true | false
4060 }
4061 }
4062 }
4063 ```
4064 ### SanitizeOnShutdown (All)
4065 Clear all data on shutdown, including Browsing & Download History, Cookies, Active Logins, Cache, Form & Search History, Site Preferences and Offline Website Data.
4066
4067 **Compatibility:** Firefox 60, Firefox ESR 60\
4068 **CCK2 Equivalent:** N/A\
4069 **Preferences Affected:** `privacy.sanitize.sanitizeOnShutdown`,`privacy.clearOnShutdown.cache`,`privacy.clearOnShutdown.cookies`,`privacy.clearOnShutdown.downloads`,`privacy.clearOnShutdown.formdata`,`privacy.clearOnShutdown.history`,`privacy.clearOnShutdown.sessions`,`privacy.clearOnShutdown.siteSettings`,`privacy.clearOnShutdown.offlineApps`
4070 #### Windows (GPO)
4071 ```
4072 Software\Policies\Mozilla\Firefox\SanitizeOnShutdown = 0x1 | 0x0
4073 ```
4074 #### Windows (Intune)
4075 OMA-URI:
4076 ```
4077 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/C_SanitizeOnShutdown
4078 ```
4079 Value (string):
4080 ```
4081 <enabled/> or <disabled/>
4082 ```
4083 #### macOS
4084 ```
4085 <dict>
4086 <key>SanitizeOnShutdown</key>
4087 <true/> | <false/>
4088 </dict>
4089 ```
4090 #### policies.json
4091 ```
4092 {
4093 "policies": {
4094 "SanitizeOnShutdown": true | false
4095 }
4096 }
4097 ```
4098 ### SearchBar
4099 Set whether or not search bar is displayed.
4100
4101 **Compatibility:** Firefox 60, Firefox ESR 60\
4102 **CCK2 Equivalent:** `showSearchBar`\
4103 **Preferences Affected:** N/A
4104
4105 #### Windows (GPO)
4106 ```
4107 Software\Policies\Mozilla\Firefox\SearchBar = "unified" | "separate"
4108 ```
4109
4110 #### Windows (Intune)
4111 OMA-URI:
4112 ```
4113 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchBar
4114 ```
4115 Value (string):
4116 ```
4117 <enabled/>
4118 <data id="Permissions" value="unified | separate"/>
4119 ```
4120 #### macOS
4121 ```
4122 <dict>
4123 <key>SearchBar</key>
4124 <string>unified | separate</string>
4125 </dict>
4126 ```
4127 #### policies.json
4128 ```
4129 {
4130 "policies": {
4131 "SearchBar": "unified" | "separate"
4132 }
4133 }
4134 ```
4135 <a name="SearchEngines"></a>
4136
4137 ### SearchEngines (This policy is only available on the ESR.)
4138
4139 ### SearchEngines | Default
4140
4141 Set the default search engine. This policy is only available on the ESR.
4142
4143 **Compatibility:** Firefox ESR 60\
4144 **CCK2 Equivalent:** `defaultSearchEngine`\
4145 **Preferences Affected:** N/A
4146
4147 #### Windows (GPO)
4148 ```
4149 Software\Policies\Mozilla\Firefox\SearchEngines\Default = NAME_OF_SEARCH_ENGINE
4150 ```
4151 #### Windows (Intune)
4152 OMA-URI:
4153 ```
4154 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Default
4155 ```
4156 Value (string):
4157 ```
4158 <enabled/>
4159 <data id="SearchEngines_Default" value="NAME_OF_SEARCH_ENGINE"/>
4160 ```
4161 #### macOS
4162 ```
4163 <dict>
4164 <key>SearchEngines</key>
4165 <dict>
4166 <key>Default</key>
4167 <string>NAME_OF_SEARCH_ENGINE</string>
4168 </dict>
4169 </dict>
4170 ```
4171 #### policies.json
4172 ```
4173 {
4174 "policies": {
4175 "SearchEngines": {
4176 "Default": "NAME_OF_SEARCH_ENGINE"
4177 }
4178 }
4179 }
4180 ```
4181 ### SearchEngines | PreventInstalls
4182
4183 Prevent installing search engines from webpages.
4184
4185 **Compatibility:** Firefox ESR 60\
4186 **CCK2 Equivalent:** `disableSearchEngineInstall`\
4187 **Preferences Affected:** N/A
4188
4189 #### Windows (GPO)
4190 ```
4191 Software\Policies\Mozilla\Firefox\SearchEngines\PreventInstalls = 0x1 | 0x0
4192 ```
4193 #### Windows (Intune)
4194 OMA-URI:
4195 ```
4196 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_PreventInstalls
4197 ```
4198 Value (string):
4199 ```
4200 <enabled/> or <disabled/>
4201 ```
4202 #### macOS
4203 ```
4204 <dict>
4205 <key>SearchEngines</key>
4206 <dict>
4207 <key>PreventInstalls</key>
4208 <true/> | <false/>
4209 </dict>
4210 </dict>
4211 ```
4212 #### policies.json
4213 ```
4214 {
4215 "policies": {
4216 "SearchEngines": {
4217 "PreventInstalls": true | false
4218 }
4219 }
4220 }
4221 ```
4222 ### SearchEngines | Remove
4223
4224 Hide built-in search engines. This policy is only available on the ESR.
4225
4226 **Compatibility:** Firefox ESR 60.2\
4227 **CCK2 Equivalent:** `removeDefaultSearchEngines` (removed all built-in engines)\
4228 **Preferences Affected:** N/A
4229
4230 #### Windows (GPO)
4231 ```
4232 Software\Policies\Mozilla\Firefox\SearchEngines\Remove\1 = NAME_OF_SEARCH_ENGINE
4233 ```
4234 #### Windows (Intune)
4235 OMA-URI:
4236 ```
4237 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_Remove
4238 ```
4239 Value (string):
4240 ```
4241 <enabled/>
4242 <data id="SearchEngines_Remove" value="1&#xF000;NAME_OF_SEARCH_ENGINE"/>
4243 ```
4244 #### macOS
4245 ```
4246 <dict>
4247 <key>SearchEngines</key>
4248 <dict>
4249 <key>Remove</key>
4250 <array>
4251 <string>NAME_OF_SEARCH_ENGINE</string>
4252 </array>
4253 </dict>
4254 </dict>
4255 ```
4256 #### policies.json
4257 ```
4258 {
4259 "policies": {
4260 "SearchEngines": {
4261 "Remove": ["NAME_OF_SEARCH_ENGINE"]
4262 }
4263 }
4264 }
4265 ```
4266 ### SearchEngines | Add
4267
4268 Add new search engines (up to five). This policy is only available on the ESR. `Name` and `URLTemplate` are required.
4269
4270 `Name` is the name of the search engine.
4271
4272 `URLTemplate` is the search URL with {searchTerms} to substitute for the search term.
4273
4274 `Method` is either GET or POST
4275
4276 `IconURL` is a URL for the icon to use.
4277
4278 `Alias` is a keyword to use for the engine.
4279
4280 `Description` is a description of the search engine.
4281
4282 `PostData` is the POST data as name value pairs separated by &.
4283
4284 `SuggestURLTemplate` is a search suggestions URL with {searchTerms} to substitute for the search term.
4285
4286 **Compatibility:** Firefox ESR 60 (POST support in Firefox ESR 68)\
4287 **CCK2 Equivalent:** `searchplugins`\
4288 **Preferences Affected:** N/A
4289
4290 #### Windows (GPO)
4291 ```
4292 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Name = "Example1"
4293 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\URLTemplate = "https://www.example.org/q={searchTerms}"
4294 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Method = "GET" | "POST"
4295 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\IconURL = "https://www.example.org/favicon.ico"
4296 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Alias = "example"
4297 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\Description = "Example Description"
4298 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\SuggestURLTemplate = "https://www.example.org/suggestions/q={searchTerms}"
4299 Software\Policies\Mozilla\Firefox\SearchEngines\Add\1\PostData = "name=value&q={searchTerms}"
4300 ```
4301 #### Windows (Intune)
4302 OMA-URI:
4303 ```
4304 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox~Search/SearchEngines_1
4305 ```
4306 Value (string):
4307 ```
4308 <enabled/>
4309 <data id="SearchEngine_Name" value="Example1"/>
4310 <data id="SearchEngine_URLTemplate" value="https://www.example.org/q={searchTerms"/>
4311 <data id="SearchEngine_Method" value="GET | POST"/>
4312 <data id="SearchEngine_IconURL" value="https://www.example.org/favicon.ico"/>
4313 <data id="SearchEngine_Alias" value="example"/>
4314 <data id="SearchEngine_Description" value="Example Description"/>
4315 <data id="SearchEngine_SuggestURLTemplate" value="https://www.example.org/suggestions/q={searchTerms}"/>
4316 <data id="SearchEngine_PostData" value="name=value&amp;q={searchTerms}"/>
4317 ```
4318 #### macOS
4319 ```
4320 <dict>
4321 <key>SearchEngines</key>
4322 <dict>
4323 <key>Add</key>
4324 <array>
4325 <dict>
4326 <key>Name</key>
4327 <string>Example1</string>
4328 <key>URLTemplate</key>
4329 <string>https://www.example.org/q={searchTerms}</string>
4330 <key>Method</key>
4331 <string>GET | POST </string>
4332 <key>IconURL</key>
4333 <string>https://www.example.org/favicon.ico</string>
4334 <key>Alias</key>
4335 <string>example</string>
4336 <key>Description</key>
4337 <string>Example Description</string>
4338 <key>SuggestURLTemplate</key>
4339 <string>https://www.example.org/suggestions/q={searchTerms}</string>
4340 <key>PostData</key>
4341 <string>name=value&q={searchTerms}</string>
4342 </dict>
4343 <array>
4344 </dict>
4345 </dict>
4346 ```
4347 #### policies.json
4348 ```
4349 {
4350 "policies": {
4351 "SearchEngines": {
4352 "Add": [
4353 {
4354 "Name": "Example1",
4355 "URLTemplate": "https://www.example.org/q={searchTerms}",
4356 "Method": "GET" | "POST",
4357 "IconURL": "https://www.example.org/favicon.ico",
4358 "Alias": "example",
4359 "Description": "Description",
4360 "PostData": "name=value&q={searchTerms}",
4361 "SuggestURLTemplate": "https://www.example.org/suggestions/q={searchTerms}"
4362 }
4363 ]
4364 }
4365 }
4366 }
4367 ```
4368 ### SearchSuggestEnabled
4369
4370 Enable search suggestions.
4371
4372 **Compatibility:** Firefox 68, Firefox ESR 68\
4373 **CCK2 Equivalent:** N/A\
4374 **Preferences Affected:** `browser.urlbar.suggest.searches`,`browser.search.suggest.enabled`
4375
4376 #### Windows (GPO)
4377 ```
4378 Software\Policies\Mozilla\Firefox\SearchSuggestEnabled = 0x1 | 0x0
4379 ```
4380 #### Windows (Intune)
4381 OMA-URI:
4382 ```
4383 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SearchSuggestEnabled
4384 ```
4385 Value (string):
4386 ```
4387 <enabled/> or <disabled/>
4388 ```
4389 #### macOS
4390 ```
4391 <dict>
4392 <key>SearchSuggestEnabled</key>
4393 <true/> | <false/>
4394 </dict>
4395 ```
4396 #### policies.json
4397 ```
4398 {
4399 "policies": {
4400 "SearchSuggestEnabled": true | false
4401 }
4402 }
4403 ```
4404 ### SecurityDevices
4405
4406 Install PKCS #11 modules.
4407
4408 **Compatibility:** Firefox 64, Firefox ESR 60.4\
4409 **CCK2 Equivalent:** `certs.devices`\
4410 **Preferences Affected:** N/A
4411
4412 #### Windows (GPO)
4413 ```
4414 Software\Policies\Mozilla\Firefox\SecurityDevices\NAME_OF_DEVICE = PATH_TO_LIBRARY_FOR_DEVICE
4415 ```
4416 #### Windows (Intune)
4417 OMA-URI:
4418 ```
4419 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SecurityDevices
4420 ```
4421 Value (string):
4422 ```
4423 <enabled/>
4424 <data id="SecurityDevices" value="NAME_OF_DEVICE&#xF000;PATH_TO_LIBRARY_FOR_DEVICE"/>
4425 ```
4426 #### macOS
4427 ```
4428 <dict>
4429 <key>SecurityDevices</key>
4430 <dict>
4431 <key>NAME_OF_DEVICE</key>
4432 <string>PATH_TO_LIBRARY_FOR_DEVICE</string>
4433 </dict>
4434 </dict>
4435 ```
4436
4437 #### policies.json
4438 ```
4439 {
4440 "policies": {
4441 "SecurityDevices": {
4442 "NAME_OF_DEVICE": "PATH_TO_LIBRARY_FOR_DEVICE"
4443 }
4444 }
4445 }
4446 ```
4447 ### SSLVersionMax
4448
4449 Set and lock the maximum version of TLS.
4450
4451 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4452 **CCK2 Equivalent:** N/A\
4453 **Preferences Affected:** `security.tls.version.max`
4454
4455 #### Windows (GPO)
4456 ```
4457 Software\Policies\Mozilla\Firefox\SSLVersionMax = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4458 ```
4459 #### Windows (Intune)
4460 OMA-URI:
4461 ```
4462 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMax
4463 ```
4464 Value (string):
4465 ```
4466 <enabled/>
4467 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4468 ```
4469 #### macOS
4470 ```
4471 <dict>
4472 <key>SSLVersionMax</key>
4473 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4474 </dict>
4475 ```
4476
4477 #### policies.json
4478 ```
4479 {
4480 "policies": {
4481 "SSLVersionMax": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4482 }
4483 }
4484 ```
4485 ### SSLVersionMin
4486
4487 Set and lock the minimum version of TLS.
4488
4489 **Compatibility:** Firefox 66, Firefox ESR 60.6\
4490 **CCK2 Equivalent:** N/A\
4491 **Preferences Affected:** `security.tls.version.min`
4492
4493 #### Windows (GPO)
4494 ```
4495 Software\Policies\Mozilla\Firefox\SSLVersionMin = "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4496 ```
4497 #### Windows (Intune)
4498 OMA-URI:
4499 ```
4500 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SSLVersionMin
4501 ```
4502 Value (string):
4503 ```
4504 <enabled/>
4505 <data id="SSLVersion" value="tls1 | tls1.2 | tls1.3"/>
4506 ```
4507 #### macOS
4508 ```
4509 <dict>
4510 <key>SSLVersionMin</key>
4511 <string>tls1 | tls1.1 | tls1.2 | tls1.3</string>
4512 </dict>
4513 ```
4514
4515 #### policies.json
4516 ```
4517 {
4518 "policies": {
4519 "SSLVersionMin": "tls1" | "tls1.1" | "tls1.2" | "tls1.3"
4520 }
4521 }
4522 ```
4523 ### SupportMenu
4524 Add a menuitem to the help menu for specifying support information.
4525
4526 **Compatibility:** Firefox 68.0.1, Firefox ESR 68.0.1\
4527 **CCK2 Equivalent:** helpMenu\
4528 **Preferences Affected:** N/A
4529
4530 #### Windows (GPO)
4531 ```
4532 Software\Policies\Mozilla\Firefox\SupportMenu\Title = "Support Menu"
4533 Software\Policies\Mozilla\Firefox\SupportMenu\URL = "http://example.com/support"
4534 Software\Policies\Mozilla\Firefox\SupportMenu\AccessKey = "S"
4535 ```
4536 #### Windows (Intune)
4537 OMA-URI:
4538 ```
4539 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/SupportMenu
4540 ```
4541 Value (string):
4542 ```
4543 <enabled/>
4544 <data id="SupportMenuTitle" value="Support Menu"/>
4545 <data id="SupportMenuURL" value="http://example.com/support"/>
4546 <data id="SupportMenuAccessKey" value="S">
4547 ```
4548 #### macOS
4549 ```
4550 <dict>
4551 <key>SupportMenu</key>
4552 <dict>
4553 <key>Title</key>
4554 <string>SupportMenu</string>
4555 <key>URL</key>
4556 <string>http://example.com/support</string>
4557 <key>AccessKey</key>
4558 <string>S</string>
4559 </dict>
4560 </dict>
4561 ```
4562 #### policies.json
4563 ```
4564 {
4565 "policies": {
4566 "SupportMenu": {
4567 "Title": "Support Menu",
4568 "URL": "http://example.com/support",
4569 "AccessKey": "S"
4570 }
4571 }
4572 }
4573 ```
4574 ### UserMessaging
4575
4576 Prevent installing search engines from webpages.
4577
4578 `WhatsNew` Remove the "What's New" icon and menuitem. (Firefox 75 only)
4579
4580 `ExtensionRecommendations` Don't recommend extensions.
4581
4582 `FeatureRecommendations` Don't recommend browser features.
4583
4584 `UrlbarInterventions` Don't offer Firefox specific suggestions in the URL bar. (Firefox 75 only)
4585
4586 **Compatibility:** Firefox 75, Firefox ESR 68.7\
4587 **CCK2 Equivalent:** N/A\
4588 **Preferences Affected:** `browser.messaging-system.whatsNewPanel.enabled`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons`,`browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features`
4589
4590 #### Windows (GPO)
4591 ```
4592 Software\Policies\Mozilla\Firefox\UserMessaging\WhatsNew = 0x1 | 0x0
4593 Software\Policies\Mozilla\Firefox\UserMessaging\ExtensionRecommendations = 0x1 | 0x0
4594 Software\Policies\Mozilla\Firefox\UserMessaging\FeatureRecommendations = 0x1 | 0x0
4595 Software\Policies\Mozilla\Firefox\UserMessaging\UrlbarInterventions = 0x1 | 0x0
4596 ```
4597 #### Windows (Intune)
4598 OMA-URI:
4599 ```
4600 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_WhatsNew
4601 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_ExtensionRecommendations
4602 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_FeatureRecommendations
4603 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/UserMessaging_UrlbarInterventions
4604 ```
4605 Value (string):
4606 ```
4607 <enabled/> or <disabled/>
4608 ```
4609 #### macOS
4610 ```
4611 <dict>
4612 <key>UserMessaging</key>
4613 <dict>
4614 <key>WhatsNew</key>
4615 <true/> | <false/>
4616 <key>ExtensionRecommendations</key>
4617 <true/> | <false/>
4618 <key>FeatureRecommendations</key>
4619 <true/> | <false/>
4620 <key>UrlbarInterventions</key>
4621 <true/> | <false/>
4622 </dict>
4623 </dict>
4624 ```
4625 #### policies.json
4626 ```
4627 {
4628 "policies": {
4629 "UserMessaging": {
4630 "WhatsNew": true | false,
4631 "ExtensionRecommendations": true | false,
4632 "FeatureRecommendations": true | false,
4633 "UrlbarInterventions": true | false
4634 }
4635 }
4636 }
4637 ```
4638 ### WebsiteFilter
4639 Block websites from being visited. The parameters take an array of Match Patterns, as documented in https://developer.mozilla.org/en-US/Add-ons/WebExtensions/Match_patterns. Only http/https addresses are supported at the moment. The arrays are limited to 1000 entries each.
4640
4641 **Compatibility:** Firefox 60, Firefox ESR 60\
4642 **CCK2 Equivalent:** N/A\
4643 **Preferences Affected:** N/A
4644
4645 #### Windows (GPO)
4646 ```
4647 Software\Policies\Mozilla\Firefox\WebsiteFilter\Block\1 = "<all_urls>"
4648 Software\Policies\Mozilla\Firefox\WebsiteFilter\Exceptions\1 = "http://example.org/*"
4649 ```
4650 #### Windows (Intune)
4651 OMA-URI:
4652 ```
4653 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Block
4654 ```
4655 Value (string):
4656 ```
4657 <enabled/>
4658 <data id="WebsiteFilter" value="1&#xF000;<all_urls>"/>
4659 ```
4660 OMA-URI:
4661 ```
4662 ./Device/Vendor/MSFT/Policy/Config/Firefox~Policy~firefox/B_WebsiteFilter_Exceptions
4663 ```
4664 Value (string):
4665 ```
4666 <enabled/>
4667 <data id="WebsiteFilter" value="1&#xF000;http://example.org/*"/>
4668 ```
4669 #### macOS
4670 ```
4671 <dict>
4672 <key>WebsiteFilter</key>
4673 <dict>
4674 <key>Block</key>
4675 <array>
4676 <string><all_urls></string>
4677 </array>
4678 <key>Exceptions</key>
4679 <array>
4680 <string>http://example.org/*</string>
4681 </array>
4682 </dict>
4683
4684 </dict>
4685 ```
4686 #### policies.json
4687 ```
4688 {
4689 "policies": {
4690 "WebsiteFilter": {
4691 "Block": ["<all_urls>"],
4692 "Exceptions": ["http://example.org/*"]
4693 }
4694 }
4695 }
4696 ```

patrick-canterino.de